home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Sun Apr 21, 1996 Volume 8 : Issue 32
- ISSN 1004-042X
-
- Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
- News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Field Agent Extraordinaire: David Smith
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
-
- CONTENTS, #8.32 (Sun, Apr 21, 1996)
-
- File 1--Golden Key Campaign
- File 2--(Fwd) Congress puts bomb-making material on internet
- File 3--Canadian "criminalization of technology"
- File 4--Re: Cu Digest, #8.29, Apr 11, 1996
- File 5--Re: The Day the Sites Went Out in Georgia?
- File 6--Proposed Swedish law about computer-mediated communication
- File 7--Cu Digest Header Info (unchanged since 7 Apr, 1996)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: 23 Apr 1996 21:47:56 -0500
- From: "David Sobel" <sobel@EPIC.ORG>
- Subject: File 1--Golden Key Campaign
-
- PRESS RELEASE
-
- Wednesday, April 24, 1996
-
- URL: http://www.privacy.org/ipc/
-
- Contact: Marc Rotenberg, EPIC, 202/544-9240
- Lori Fena, EFF, 415/436-9333
- Barbara Simons, USACM 408/463-5661
- Kurt Stammberger, RSA 415/595-8782
-
- ------------------------------------------
-
- INTERNET PRIVACY COALITION FORMED
-
- Golden Key Campaign Launched
-
- Groups Urge Good Technology for Privacy and Security
-
- Senator Burns to Introduce Legislation
-
- ------------------------------------------
-
- WASHINGTON, DC -- A new coalition today urged support for strong
- technologies to protect privacy and security on the rapidly
- growing Internet. The Internet Privacy Coalition said that new
- technologies were critical to protect private communications and
- on-line commerce, and recommended relaxation of export controls
- that limit the ability of US firms to incorporate encryption in
- commercial products.
-
- Phil Zimmermann, author of the popular encryption program Pretty
- Good Privacy, expressed support for the effort of the new
- coalition. "It is time to change crypto policy in the United
- States. I urge those who favor good tools for privacy to back the
- efforts of the Internet Privacy Coalition."
-
- GOLDEN KEY CAMPAIGN LAUNCHED
-
- The Coalition has asked companies and Internet users to display a
- golden key and envelope to show support for strong encryption
- technology. Copies of the logo are available at the group's web
- page on the Internet.
-
- According to Lori Fena, director of the Electronic Frontier
- Foundation, the purpose of the campaign is to educate the public
- about new techniques for privacy protection. "Society's feelings
- about privacy have not changed, only the medium has," said Ms.
- Fena.
-
- US industry has pressed the US government to relax export controls
- on encryption as consumer demand for software products has
- increased. They cite the fact that foreign companies have been
- able to sell strong products in overseas markets that are now
- restricted for US firms.
-
- Jim Bidzos, President and CEO of RSA Data Security, said that US
- firms continue to face excessive burdens. "Encryption is the key
- to on-line commerce. Government regulations are simply keeping US
- firms out of important markets."
-
- The Internet Privacy Coalition is the first net-based effort to
- bring together a broad base of companies, cryptographers and
- public interest organizations around the central goal of promoting
- privacy and security on the Internet andurging relaxation of
- export controls.
-
- Dr. Barbara Simons, chair of the public policy committee of the
- Association for Computing said, "The broad support for the Golden
- Key campaign shows that the reform of encryption policy is a
- shared goal for companies, users, and professional associations."
-
- SENATOR BURNS TO INTRODUCE LEGISLATION
-
- The Internet Privacy Coalition is being established as Congress
- considers new legislation to relax export controls on encryption.
- Senator Conrad Burns (R-MT) today introduced legislation that
- would relax export controls on commercial products containing
- technologies for privacy such as encryption.
-
- Marc Rotenberg, director of the Electronic Privacy Information
- Center, said "We believe that Senator Burns has put forward a
- constructive proposal. We look forward to working with him to
- ensure that good tools for privacy and security are widely
- available to Internet users."
-
- Hearings on Senator Burns bill are expected to take place in early
- June. The proposal has already gathered support from a bipartisan
- coalition in Congress.
-
- For Internet users who are interested in following the debate
- about encryption policy, the IPC has set up a Web page with
- information about encryption regulations, court challenges,
- legislative developments, and organizations and companies involved
- in the campaign.
-
- The Internet Privacy Coalition was established by more than a
- dozen of the nation's leading cryptographers, and thirty
- associations, companies, and civil liberties organizations
- committed to strong privacy and security technology for all users
- of the Internet.
-
- URL: http://www.privacy.org/ipc/
-
- ----------------------------------------------
-
-
- A KEY, AN ENVELOPE -- Both are historic means for communicating
- privately and protecting personal information. Today, encryption
- tools provide this privacy in the electronic world.
-
- The Golden Key Campaign is being launched to raise awareness and
- support for the preservation of the right to communicate privately
- and the availability of new techniques which make it possible.
-
- Privacy, a fundamental human right, has been affirmed by the US
- Supreme Court, the constitutions and laws of many countries, and
- the United Nations Universal Declaration of Human Rights.
- Privacy must be preserved as we move from paper to electronic
- communications.
-
- The Internet Privacy Coalition is urging members of the net
- community to display a Golden Key & Envelope symbol on their Web
- pages to show support for the right of privacy and the freedom to
- use good tools of privacy without government restraints.
-
- ------------------------------
-
- Date: Sun, 21 Apr 1996 00:46:55 -0400
- From: tallpaul <tallpaul@pipeline.com>
- Subject: File 2--(Fwd) Congress puts bomb-making material on internet
-
- Ah, the things one thinks about late at night. The post below is
- self-explanatory and might make a wonderful short piece for _CuD_. I
- personally checked the URL and instructions and Rochkind is correct. The
- good folks in Congress really did post to the internet how to make
- "babyfood bombs" and a nasty detanator for them as well!
-
- As "Mr. Roger's Capital Hill Neighborhood" might put it: "the word for
- today Congressmen and Congresswomen is 'clueless.' Can you spell
- C-L-U-E-L-E-S-S?"
-
- >----- Forwarded message (jrochkin@cs.oberlin.edu (Jonathan Rochkind))
-
-
- At 11:45 PM 04/19/96, Rich Graves wrote:
-
- >Oh yeah, and Biden read the full text of the "Attention All Unabomber
- >Wannabes" and "Babyfood Bombs" documents into the Congressional Record,
- >supposedly to underscore the point that those nasty Republicans are
- >endorsing such nasty nasty stuff. Sort of like Exon's little blue book.
- >
- >So if you want to know how to build a baby-food bomb, simply write your
- >congresscritter.
-
- Or access the congressional record on thomas, as Rich gives earlier gives
- us a URL to. Go to http://thomas.loc.gov/r104/r104s17ap6.html, choose the
- second TERRORISM PREVENTION ACT--CONFERENCE REPORT link, choose the first
- BIDEN link.
-
- Congress is putting information on how to build babyfood bombs on the
- internet! Clearly, the first thing the FBI would do under the law Biden
- wants is wiretap congress to see who is accessing the congressional record.
-
- Wonder what the congressional librarians who run thomas think of that.
-
- ((MODERATORS' NOTE: For this without access to the original,
- here is the text))
-
- ++++++++++++++++++++++++++++++++
-
- TERRORISM PREVENTION ACT--CONFERENCE REPORT (Senate - April 17, 1996)
-
-
-
- Mr. BIDEN. Mr. President, I yield myself such time as I may use within
- the limit of the time I have.
-
- This provision is very straightforward and simple. It is beyond me why
- it was taken out of the Senate version of the language that was sent
- to the House.
-
- I have heard many colleagues stand up on the floor here and rail
- against pornography on the Internet, and for good reason. Even when we
- thought we had corrected the language that Senator Exon introduced to
- comport with the first amendment, I still hear in my State, and I hear
- of people writing about how so and so is promoting pornography on the
- Internet because they will not ban pornography on the Internet.
-
- Yet, in the bill, we came along--all of us here--and the genesis of
- this came from Senator Feinstein, when it was initially offered. The
- majority leader, Senator Hatch, and I had some concerns with this, and
- we thought the language to ban teaching people how to make bombs on
- the Internet or engage in terrorist activities on the Internet might
- violate the first amendment. Senators Dole, Hatch, and I worked to
- tighten the language and came up with language that was tough and true
- to civil liberties. It was accepted by unanimous consent.
-
- We have all heard about the bone-chilling information making its way
- over the Internet, about explicit instructions about how to detonate
- pipe bombs and even, if you can believe it, baby food bombs. Senator
- Feinstein quoted an Internet posting that detailed how to build and
- explode one of these things, which concludes that `If the explosion
- don't get'em, the glass will. If the glass don't get'em, the nails
- will.'
-
- I would like to give you a couple of illustrations of the kinds of
- things that come across the Internet. This is one I have in my hand
- which was downloaded. It said, `Baby food bombs by War Master.' And
- this is actually downloaded off the Internet. It says:
-
- These simple, powerful bombs are not very well known, even though all
- of the materials can be obtained by anyone (including minors). These
- things are so--
-
- I will delete a word because it is an obscenity.
-
- powerful that they can destroy a CAR. The explosion can actually twist
- and mangle the frame. They are extremely deadly and can very easily
- kill you and blow the side of a house out if you mess up while
- building it. Here is how they work.
-
- This is on the Internet now. It says:
-
- Go to Sports Authority or Herman's Sport Shop and buy
- shotgun shells. It is by the hunting section. At the Sports Authority
- that I go to you can actually buy shotgun shells without a parent or
- an adult. They don't keep it behind the glass counter, or anything
- like that. It is $2.96 for 25 shells.
-
- And then it says:
-
- Now for the hard part. You must cut open the plastic housing of the
- bullet to get to the sweet nectar that is the gun powder. The place
- where you can cut is CRUCIAL. It means a difference between it blowing
- up in your face or not.
-
- Then there is a diagram, which is shown as to how to do that on the
- Internet. Then it says:
-
- You must not make the cut directly where the gun powder is, or it will
- explode. You cut it where the pellets are.
-
- And then it goes through this in detail. And then it gets to the end,
- and it says:
-
- Did I mention that this is also highly illegal? Unimportant stuff that
- is cool to know.
-
- And then it rates shotgun shells by two numbers, gauge, pellet size,
- and goes into great detail. It is like building an erector set. It
- does it in detail.
-
- So what Senators Dole and Hatch and I did, we said you should not be
- able to do this, but we have a first amendment problem, possibly. So
- we added a provision that says that you have to have the intent, when
- you are teaching people how to do this, that the person using it is
- using it for the purpose of doing harm.
-
- So it seems to me that this is pretty straightforward. Granted, I want
- to stop pornography on the Internet. I think pornography does harm to
- the minds of the people who observe it, particularly young people. But
- if that does harm, how much harm is done by teaching a 15-year-old
- kid, a 12-year-old kid, or a 20-year-old person, with great detail,
- how to build a baby food bomb, or how to build an automatic particle
- explosion provision, or how to build light bulb bombs.
-
- ------------------------------
-
- Date: Mon, 8 Apr 1996 10:50:41 -0700 (PDT)
- From: Doc_Holliday@AWWWSOME.COM(M. Steven McClanahan)
- Subject: File 3--Canadian "criminalization of technology"
-
- Regarding the following letter reprinted in CuD:
-
- >
- > "An Act to amend the Criminal Code and to amend certain other Acts"The
- >new subsection 487(2.1)(a) would provide that a person authorized to
- >search a computer system for data may use any computer system in the
- >building "to search any data contained in or available to the computer
- >system." The quoted language does not distinguish between the two
- >sources of data. However, there is good reason to treat data available to the
- >computer system differently from data contained within it. Data available
- >to the system may be physically located outside of the jurisdiction of
- >the issuer of the warrant, potentially bringing the persons authorizing and
- >conducting the search into conflict with foreign law. A similar concern
- >is identified and addressed in the existing subsection 487(2), which
- >provides for modified search warrants in circumstances where the subject of the
- >search "is believed to be in any other territorial division" within
- >Canada. In the context of the search of a computer system, it is quite probable
- >that the data available to the computer system includes data located in
- >jurisdictions outside of Canada. The international nature of the
- >difficulty calls for a solution beyond that offered by subsection 487(2).
- >It is necessary to have two distinct sets of provisions, one of which
- >governs
- >the search of data "contained in" a computer system and another specifically
- >designed to address the difficulty of searching data "available to" a
- >computer system. The words "or available to" should be removed from the
- >proposed amendment to both subsections 487(2.1)(a) and 487(2.2)(a).
-
- This sets dangerous precedent, as it seeks to make criminal the possession
- of hardware, software and/or knowledge to configure systems so as to access
- information the ruling junta may find objectionable. If you've configured
- your system to automatically log onto another system that is connected to
- something the government has defined as "criminal," then you are subject
- criminal liability for information gained in a broad search as authorized
- by this law. If you are a "newbie," even though your system might be
- capable of accessing such information, because you could not configure it
- to do so, then you are not subject to criminal liability. This would make
- the same hardware, software and Internet connections criminal in one
- situation and not in another, based solely on the level of expertise of the
- user!
-
- >Finally, we are concerned about the potential for self-incriminatory
- >activity by the person whose property is the subject of a search.
- >Subsection 487(2.1) would authorize the person conducting the search to
- >use the computer system in order to search, reproduce, and seize data.
- >Subsection 487(2.2), while similar, would add that the person whose
- >property is being searched "shall, on presentation of the warrant, permit the
- >person carrying out the search" to use the computer system. It is unclear from
- >this language whether the person whose property is being searched is
- >required to take positive steps to assist the person carrying out the
- >search. Our concern is that the inherent vagueness of the proposed
- >provision allows for such an interpretation. If the computer system is
- >accessible only by first supplying a password, the person may have to
- >supply it. If the data being searched is encrypted, the person may have to
- >provide the decryption key. This would amount to being compelled to assist in
- >the discovery of evidence against oneself, which is inconsistent with the
- >most fundamental principles of criminal law. The proposed amendment should
- >be rewritten to remedy its potentially dangerous vagueness.
-
- The obvious solution to the above is to suffer "cyber-amnesia" when the
- cops come busting down your door. Possession of encryption software should
- not be illegal in any jurisdiction, however, realistically, most cops
- assume, if it's encrypted it must be illegal - why else would you encrypt
- it? It's a catch 22 situation and one in which you lose either way.
-
- Speaking as one who had a Power Macintosh with a 2 gigabyte hard disk drive
- and all my backups subpeonaed in a civil case, I can tell you that the
- other side is not likely to want or accept your help in determining what is
- on your mass storage devices and/or in learning how your systems work. I
- had to stand by while the attorney corrupted all the data on my hard drive
- trying to beat my PGP encryption. Then he did the same thing to my back
- ups. Despite my protests I would have GIVEN them the key to decrypt the
- data - he didn't trust me. This is in a CIVIL case, imagine how they would
- feel in a CRIMINAL matter.
-
- They spent days trying to get past PGP and could not. Even if they had, all
- they would have gotten was copies of email between my wife and I. The
- downside was it took me two weeks to reconstruct my hard drive, time which
- the courts refused to order the attorney that started all this to pay me
- for. (They did sanction him after he threatened to punch me during a
- deposition for refusing to reveal my sources - which were protected by
- attorney-client privilege - which I thought was interesting; apparently he
- could waste all my time, but he couldn't hit me.) The court decided my data
- had no value and that having to rebuild my hard drive was a "minor
- inconveneince" compared to the "interests of justice."
-
- Since it is a no win situation, extending cooperation is problematic. It
- probably won't do any good. My experience told me most people in law
- enforcement have not advanced, technologically, past the level of an Atari
- 2600 and are completely baffled by complex systems. Based on what they did
- with a Mac system, I doubt they would even be able to access anything now
- that I use a SPARCstation 4.
-
- An attitude seems to have developed in the prosecution of computer crime
- that "the ends justifies the means." As the voters have gone along like
- sheep and surrendered many civil rights in the prosecution of drug related
- crimes, they are similarly doing in the prosecution of computer crimes
- having to do with the Internet and claims of "child porn." This is
- extremely dangerous as. If you look long and hard enough on any system,and
- systems accessible to it, you can, eventually, find something that will
- offend someone. Therefore, applying the rule that "the ends justifies the
- means," everyone who connects to a computer network is thereby
- "criminalized."
-
- The frigthening part is that, whether or not the innocent victim is doing
- anything illegal, the reams of good press such actions bring for
- prosecutors and police just encourages them. After it is all through and
- nothing illegal is found, law enforcement still looks good in the press,
- (because the public has been whipped up into such a frenzy they preceive
- any action as "good"). The victims of such harassment are always "guilty"
- in the eyes of the public, simply because the government took any action.
-
- ------------------------------
-
- From: Dave++ Ljung <dxl@HPESDXL.FC.HP.COM>
- Subject: File 4--Re: Cu Digest, #8.29, Apr 11, 1996
- Date: Mon, 15 Apr 96 13:01:07 MDT
-
- |Olsen concocted this scheme that he calls L18, for "Less than 18."
- |Under it, every net-user must label every USENET post, email message,
- |FTP site file, web page, chat room, IRC channel...
-
- Wow. That's quite a bit.
-
- Well, here's a thought. They can't possibly fine people for *NOT*
- labeling non-offensive material as being L18 (non-offensive). Even
- if they did, you could always add some four-letter exon somewhere in
- the post to make sure that it was no longer L18.
-
- So what's the point?
-
- Well - the point is that most of the content on the net is provided
- by us 'adults.' So it would be amazingly easy to boycott the L18 label.
-
- What will be the effect? Well - one unfortunate effect is that anyone
- who is pegged as under 18 will (for a hopefully short time) be unable
- to access much of anything the net. In the long run this would make
- the L18 plan so infeasible that it would become valueless, and hopefully
- would be dropped.
-
- One way to protect the kids from the nasty adult's ideas is by censoring
- any such ideas. Another way is to keep the kids out. I don't prefer
- either, but the latter is better than censorship.
-
- ------------------------------
-
- Date: Fri, 19 Apr 1996 07:16:20 -0700 (PDT)
- From: Declan McCullagh <declan@EFF.ORG>
- Subject: File 5--Re: The Day the Sites Went Out in Georgia?
-
- ---------- Forwarded message ----------
- Date--Fri, 19 Apr 1996 03:59:06 -0400
- From--Mike Godwin <mnemonic@well.com>
-
-
- Georgia Legislative Information
-
-
- HB 1630 Computer or telephone network; transmitting misleading
- data (3.7K)
-
- *** BILL STATUS *** 04/18/96
-
- HB 1630
-
- Computer or telephone network;
- transmitting misleading data
-
- 1. Parsons 40th 2. Scoggins 24th 3. Coker 31st
-
- House Comm: Ind / Senate Comm: ST&I /
- House Vote: Yeas 142 Nays 26 Senate Vote: Yeas 48 Nays 0
- ----------------------------------------
- House Action Senate
- ----------------------------------------
- 2/8/96 Read 1st Time 3/5/96
- 2/9/96 Read 2nd Time 3/13/96
- 2/26/96 Favorably Reported 3/13/96
- Sub Committee Amend/Sub Am
- 2/29/96 Read 3rd Time 3/14/96
- 2/29/96 Passed/Adopted 3/14/96
- FSFA Comm/Floor Amend/Sub CAFA
- 3/15/96 Amend/Sub Disagreed To
- Recedes 3/18/96
- 4/3/96 Sent to Governor
- 4/18/96 Signed by Governor
- 1029 Act/Veto Number
- 7/1/96 Effective Date
- ----------------------------------------
-
- Code Sections amended: 16-9-93.1
- *** FIRST READER *** 02/07/96
-
- HB 1630
-
- A BILL to amend Article 6 of Chapter 9 of Title 16 of the Official
- Code of Georgia Annotated, known as the "Georgia Computer Systems
- Protection Act," so as to provide that it shall be unlawful for any
- person or organization knowingly to transmit certain misleading data
- through a computer or telephone network for the purpose of setting up,
- maintaining, operating, or exchanging data with an electronic mailbox,
- home page, or any other electronic information storage bank; and for
- other purposes.
- *** FULL TEXT *** 02/29/96
-
- HB 1630 HB 1630/FSFA
-
- H. B. No. 1630 (FLOOR SUBSTITUTE)(AM)
- By: Representative Parsons of the 40th
-
-
-
- A BILL TO BE ENTITLED
- AN ACT
-
-
- To amend Article 6 of Chapter 9 of Title 16 of the Official
- Code of Georgia Annotated, known as the "Georgia Computer
- Systems Protection Act," so as to provide that it shall be
- unlawful for any person or organization knowingly to
- transmit certain misleading data through a computer or
- telephone network for the purpose of setting up,
- maintaining, operating, or exchanging data with an
- electronic mailbox, home page, or any other electronic
- information storage bank; to provide for a penalty; to
- provide that civil actions are allowed; to repeal
- conflicting laws; and for other purposes.
-
- BE IT ENACTED BY THE GENERAL ASSEMBLY OF GEORGIA:
-
- SECTION 1.
-
- Article 6 of Chapter 9 of Title 16 of the Official Code of
- Georgia Annotated, known as the "Georgia Computer Systems
- Protection Act," is amended by adding, following Code
- Section 16-9-93, a new Code Section 16-9-93.1 to read as
- follows:
-
- "16-9-93.1.
-
- (a) It shall be unlawful for any person, any organization,
- or any representative of any organization knowingly to
- transmit any data through a computer network or over the
- transmission facilities or through the network facilities
- of a local telephone network for the purpose of setting
- up, maintaining, operating, or exchanging data with an
- electronic mailbox, home page, or any other electronic
- information storage bank or point of access to electronic
- information if such data uses any individual name, trade
- name, registered trademark, logo, legal or official seal,
- or copyrighted symbol to falsely identify the person,
- organization, or representative transmitting such data or
- which would falsely state or imply that such person,
- organization, or representative has permission or is
- legally authorized to use such trade name, registered
-
-
- H. B. No. 1630 (SUB)
- -1-
-
- HB 1630/FSFA
-
- trademark, logo, legal or official seal, or copyrighted
- symbol for such purpose when such permission or
- authorization has not been obtained; provided, however,
- that no telecommunications company or Internet access
- provider shall violate this Code section solely as a
- result of carrying or transmitting such data for its
- customers.
-
- (b) Any person violating subsection (a) of this Code
- section shall be guilty of a misdemeanor.
-
- (c) Nothing in this Code section shall be construed to
- limit an aggrieved party's right to pursue a civil action
- for equitable or monetary relief, or both, for actions
- which violate this Code section."
-
- SECTION 2.
-
- Nothing contained herein shall prohibit a member of the
- General Assembly from using the state seal or the Georgia
- flag which contains the state seal on a home page that is
- clearly identified with the name of the member as the home
- page of that member.
-
- SECTION 3.
-
- All laws and parts of laws in conflict with this Act are
- repealed.
-
- H. B. No. 1630 (SUB)
-
- ------------------------------
-
- Date: Fri, 12 Apr 1996 09:36:07 -0700 (PDT)
- From: Olle Jarnefors <ojarnef@ADMIN.KTH.SE>
- Subject: File 6--Proposed Swedish law about computer-mediated communication
-
- It might be interesting to readers of the CU Digest to know how
- the problems of freedom of expression on the Internet are
- tackled in Sweden. Professor Jacob Palme at Stockholm
- University and the Royal Institute of Technology has arranged
- for publication of the English summary of the recent proposal
- from a Swedish government committee, at
-
- < http://www.dsv.su.se/~jpalme/SOU-1996-40-eng.html >
-
- Professor Palme's introduction and the full text of the proposed
- law follows here.
-
- --
- Olle Jarnefors, Royal Institute of Technology (KTH) <ojarnef@admin.kth.se>
-
- -----
-
- (This initial text was written by Jacob Palme.)
-
- A Swedish government committee has put forward a proposal
- covering partly the same issues as the famous U.S.
- "Communications Decency Act".
-
- The committee does not propose that anything is unlawful in
- BBSes and the Internet except what would be unlawful according
- to other Swedish laws (for example copyright laws, libel laws,
- child pornography laws). The main issue for the proposal is
- which responsibility the provider of a data base (WWW data base,
- BBS, news server, etc.) has on the content. According to the law
- proposal, sysop must remove illegal items, but only under two
- conditions:
-
- 1. The item was obviously illegal. I.e. on borderline cases, the
- sysop does not have to remove the item.
-
- 2. The sysop was aware of the existence of the item. I.e. the
- sysop is not forced to pre-censor information, but if the
- sysop is informed of the occurrence of illegal items in the
- data base, these must be removed.
-
- A sysop which does not follow these rules, can be punished by
- fines or a maximum of 2 years prison.
-
- The next step is that the Swedish government will send the
- proposal to organizations who are allowed to comment on it. In
- this stage, anyone can send their views on the proposal to the
- government. After that, the government may prepare a (possibly
- modified) proposal to the Swedish parliament, and the parliament
- may turn it into a law.
-
- -----
-
- ELECTRONIC MEDIATION SERVICES BILL
-
-
- _Areas of application_
-
- ARTICLE 1. This law applies to services that are intended for the
- electronic mediation of messages.
-
- The law does not apply to:
-
- 1. the provision alone of a network or other connections for the
- transmission of messages,
-
- 2. mediation of messages within an agency or between agencies or
- within an enterprise or a legal group of enterprises, and
-
- 3. such services that are covered by the regulations in the
- Freedom of the Press Act [this is the pride of Swedish
- legislation, a constitutional law originally adopted in 1766,
- pertaining to printed media /OJ] or the Fundamental Law on
- Freedom of Expression [this constitutional law regulates radio
- and television /OJ].
-
- In the law, "messages" means text, images, sounds and other
- information being transmitted in electronic form.
-
-
- _Exceptions from the Data Act_
-
- ARTICLE 2. The provisions in Sections 1-20 and 22-25 of the Data
- Act (1973:289) shall not be applied to personal registers
- [i.e. any computer file holding data about identifyable natural
- persons /OJ] that are maintained by a service according to this
- law, to the extent that
-
- 1. the registers contain only regular running text and
- information about messages and users of the service, and
-
- 2. the register is maintained for the purpose of enabling users
- to deposit or collect information with a view to free exchange
- of opinions, free and comprehensive information and freedom of
- artistic creation.
-
- In the law, "regular running text" means information that has
- not been structured to facilitate the acquisition of personal
- information.
-
-
- _An overview of the service_
-
- ARTICLE 3. The service supplier shall have supervision over the
- service to the degree necessary with regards to the scope and
- aim of the operation.
-
-
- _Information to the user_
-
- ARTICLE 4. The service supplier shall, as soon as possible,
- inform each person who wishes to use the service about
-
- 1. who is supplying the service,
-
- 2. that the users are responsible for the content of the
- messages that they post, and
-
- 3. to what extent incoming messages become available to other
- users.
-
- If an agency supplies the service it should also mention that
- messages which are mediated may become public documents.
-
-
- _The hindrance of continued distribution_
-
- ARTICLE 5. If it is obvious that a user, by posting a message,
- has made himself guilty of a crime or infringement of copyright
- or that the contents of the message are liable to be used in
- crime, the service supplier shall hinder further distribution of
- the message. The same applies to any person who supervises the
- service on behalf of the service supplier.
-
- The first paragraph is not in effect if the message is intended
- to be received only by one or more designated recipients
- (electronic mail).
-
-
- _Penalties_
-
- ARTICLE 6. A person who intentionally or through negligence
- violates article 4 or who intentionally violates article 5 shall
- be sentenced to pay a fine or to imprisonment for at most six
- months, or, if the crime is serious, to imprisonment for at most
- two years. If the offence is of only a minor nature the offender
- shall not be sentenced.
-
- The first paragraph is not applied if the offence is punishable
- under the Penal Code.
-
-
- _Forfeiture_
-
- ARTICLE 7. Computers and other equipment that have been used in
- a crime under this law may be declared forfeited, if this is
- called for in order to prevent crime or for other special
- reasons.
-
- ------------------------------
-
- Date: Thu, 21 Mar 1996 22:51:01 CST
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 7--Cu Digest Header Info (unchanged since 7 Apr, 1996)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send post with this in the "Subject:: line:
-
- SUBSCRIBE CU-DIGEST
- Send the message to: cu-digest-request@weber.ucsd.edu
-
- DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
-
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CU-DIGEST
- Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
- Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
- In ITALY: ZERO! BBS: +39-11-6507540
- In LUXEMBOURG: ComNet BBS: +352-466893
-
- UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #8.32
- ************************************
-
-
-