home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Sun Apr 28, 1996 Volume 8 : Issue 33
- ISSN 1004-042X
-
- Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
- News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Field Agent Extraordinaire: David Smith
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
-
- CONTENTS, #8.33 (Sun, Apr 28, 1996)
-
- File 1--Kevin Mitnick Pleads Guilty to Hacking Charges
- File 2--Scientology Lawsuits (Legal Bytes, Vol 4, No. 1)
- File 3--The CDA's Silver Lining (from: Legal Bytes, Vol 4, No. 1)
- File 4--Werd, be there or die -- (Summercon 96)
- File 5--Amer. Fam. Assoc. Demands investigation of Compuserve
- File 6--Cu Digest Header Info (unchanged since 7 Apr, 1996)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: Thu, 25 Apr 1996 07:32:29 -0400 (EDT)
- From: Q*Bert <qbert@access.digex.net>
- Subject: File 1--Kevin Mitnick Pleads Guilty to Hacking Charges
-
-
- (originally from Rogue Agent ::: )
-
- RETURN TO STATESIDE: Mitnick pleads guilty to hacking charges
- Copyright (C) 1996 Nando.net
-
- LOS ANGELES (Apr 22, 1996 10:01 p.m. EDT) -- Reputed
- information highway bandit Kevin D. Mitnick, who has allegedly
- violated some of the nation's most protected computer systems,
- pleaded guilty Monday to hacking-related charges.
-
- ...................
-
- The 32-year-old man, who the government once called a
- "computer terrorist," also admitted to possessing other people's
- drivers' licenses in the Raleigh, N.C. , apartment where he was
- arrested. Pfaelzer also found he violated probation in a 1989
- conviction. He is charged with 23 counts of computer fraud.
-
- ...................
-
- Mitnick faces a maximum of 20 years in prison, but prosecutors
- were loathe to speculate on how long he will actually serve,
- saying it depends on how Pfaelzer interprets sentencing
- guidelines. The sentencing is scheduled for July 15.
-
- Prosecutors were hardly crowing about the plea, which had been
- repeatedly delayed. There are other charges that could be filed
- against him, said Assistant U.S. Attorney David J. Schindler.
- "This does not resolve this case entirely ... The investigation
- continues."
-
- If Mitnick pleaded not guilty, his case would have gone back
- to North Carolina for trial. After the hearing, Mitnick was
- led away in handcuffs by federal marshals. He is being detained
- at a federal jail in downtown Los Angeles.
-
- ...................
-
- He was later accused of causing millions of dollars in damage
- to MCI, Inc., and also allegedly produced a false report stating
- that the late Security Pacific Bank lost $400 million during the
- first quarter of 1988. That was four days after the bank turned
- him down for a job, because he did not inform them of his
- criminal record.
-
- Mitnick pleaded guilty in 1989 in Los Angeles to stealing
- computer programs and illegally intruding into computer networks
- in the U.S. and England. He was sentenced to one year in
- prison.
-
- ...................
-
- While the government has portrayed Mitnick as a threat to
- national security, the pudgy, bespectacled man's grandmother,
- Reba Vartanian, said prosecutors and others are out to "hyping"
- her grandson's case.
-
- The Las Vegas woman said there is a different side to his life
- that the media has never reported. She said his reputation as a
- computer hacker made it impossible for him to find work and to
- have a normal life.
- ...................
-
- ------------------------------
-
- Date: Fri, 26 Apr 1996 20:41:17 -0400
- From: PeteK1@AOL.COM
- Subject: File 2--Scientology Lawsuits (Legal Bytes, Vol 4, No. 1)
-
-
- Spring 1996, Volume 4, Number 1
- __________________________________
-
- By George, Donaldson & Ford, L.L.P.
- Attorneys at Law
- 114 West Seventh Street, Suite 1000
- Austin, Texas 78701
- (512) 495-1400
- (512) 499-0094 (FAX)
- gdf@gdf.com
- http://www.gdf.com
- __________________________________
-
- Copyright (c) 1996 George, Donaldson & Ford, L.L.P.
- (Permission is granted freely to redistribute
- this newsletter in its entirety electronically.)
- ___________________________________
-
- David H. Donaldson, Jr., Publisher, dhdonald@gdf.com
- Peter D. Kennedy, Editor, pkennedy@gdf.com
-
-
- 2. THE SCIENTOLOGY LAWSUITS AND LAWYER LETTERS: THE PROBLEM
- FACED BY ON-LINE SERVICES WHO GET NOTICE OF USERS' ALLEGED
- VIOLATIONS
-
- The Jihad.
-
- A fierce battle has been raging both on line and in courtrooms
- across the country between the Church of Scientology and a handful
- of its former members. Disillusioned with the church, these former
- members have posted large amounts of the church's purportedly
- secret and sacred texts on a Usenet newsgroup devoted to debating
- Scientology. The church, claiming these texts are trade secrets
- and copyrighted, has responded with a fierce litigation strategy
- that has ensnared third parties from the Washington Post (which
- printed portions of the texts) to the Internet access giant Netcom
- (which distributed the alt.religion.scientology newsgroup
- containing the texts).
-
- The Scientology litigation -- brought in federal courts in
- Virginia, Colorado and California under the name of the church's
- parent corporation, the "Religious Technology Center" -- has
- spawned the most extensive group yet of legal rulings concerning
- the scope of on-line copyright protection. The Scientology church
- claims that its litigation is redefining on-line copyright law, and
- to a great extent it is right. Take away the controversial nature
- of the Scientology religion and the reportedly silly nature of much
- of its "scripture," and the Scientology lawsuits have concretely
- raised core issues about the scope of copyright protection in the
- new world of decentralized, democratized and vastly expanded
- distribution and copying offered by the Internet, as well as the
- responsibilities of the system administrators who facilitate
- communications through interconnected computer networks.
-
- This article does not attempt a comprehensive review of all
- the questions raised by the Scientology cases, but rather discusses
- two interrelated issues that have so far gained little attention --
- (1) the competing tension between copyright and defamation law in
- whether prior review of on-line content is necessary or wise, and
- (2) what the proper response should be to a demand to remove
- offending material from a system.
-
- The sysops' old dilemma.
-
- Prior to the Scientology litigation, case law directly
- concerning on-line copyright liability was limited to two trial
- court decisions, PLAYBOY ENTERPRISES, INC. v. FRENA and SEGA
- ENTERPRISES, LTD. v. MAPHIA. The core holding of these two cases,
- particularly FRENA, seemed to be a strong affirmation of the
- principle of strict liability in copyright law. Under FRENA,
- system operators would be liable for copyright infringement, even
- if they were unaware of the infringing files on their system,
- because their systems facilitated unauthorized copying and
- distribution. See "BBS Sysop Liability for Copyright Infringement:
-
- Let the Operator Beware!," Legal Bytes, Vol 2, No. 1. The FRENA
- decision was criticized for not giving sufficient weight to the
- sysop's denial that he knew about the offending images, but because
- it was one of just two rulings on the subject, it carried
- considerable weight. After FRENA and MAPHIA, the common wisdom
- recommended a hands-on approach to avoid liability for copyright
- infringement -- reviewing all files before making them publicly
- available.
-
- The hands-on approach to avoid copyright violations has been,
- as lawyers say, "in some tension" with two well-known cases
- concerning on-line services' liability for defamation. In 1991, a
- New York federal court held in CUBBY v. COMPUSERVE that CompuServe
- was not responsible for the content of a newsletter it carried,
- because it did not review the newsletter and exercised no editorial
- control over it. Because CompuServe acted as a conduit or
- distributor, it was not actually "publishing" the newsletter. See
- "Are Electronic Bulletin Board System Operators Liable for their
- Users' Libellous Statements," Legal Bytes, Vol 1, No. 1. Four
- years later, a New York state court ruled the other way about
- another service, Prodigy, in STRATTON OAKMONT v. PRODIGY. Because
- Prodigy, unlike CompuServe, had marketed itself as a family system,
- had reviewed the content of postings and claimed the right to edit
- them, it was a "publisher" and had to answer for the truth of
- defamatory statements made by its users. Like FRENA, the PRODIGY
- case has been criticized and may well be wrong, but like FRENA, it
- has carried considerable weight because of a scarcity of precedent.
-
- After CUBBY and PRODIGY, the common wisdom was that on-line services
- should not review the content of messages passing through unless
- they want to answer for their truth, which is not easy. Hands off.
-
- Interactive services have thus been facing a real dilemma
- about the content they carry that is provided by others, even
- before anyone complains -- hands on (to avoid possible liability
- for copyright infringement) or hands off (to avoid becoming a
- "publisher" of defamation)?
-
- Although it may seem glacial to those directly affected, the
- law is actually moving with relative speed to address this
- unworkable problem. On the defamation front, Congress has enacted
- the Communications Decency Act of 1996, which for all the vitriol
- directed to it, has a bright side: it contains a provision which
- broadly protects interactive services from liability for libels
- posted by others. See "The Communications Decency Act's Silver
- Lining," in this issue. Under this new federal law, STRATTON
- OAKMONT v. PRODIGY is overruled on-line services do not become the
- "publisher" of on-line content they did not create, even if they
- actively restrict access to "objectionable" materials.
-
- On the copyright front, a recent decision may foretell a
- relaxation of the harsh and potentially unfair results of the
- strict liability rule as applied by the court in FRENA. While no
- court will tolerate flagrant encouragement or participation in
- copyright infringement, the FRENA court's conclusion that the
- sysops' knowledge is entirely irrelevant will likely be eased. =
-
- This step toward balancing copyright protection and on-line
- communications is taking place in the Scientology litigation,
- particularly in the decision from the California lawsuit involving
- Netcom On-Line Communications Services.
-
- Netcom avoids liability for direct infringement.
-
- Using a local-access BBS, a disillusioned former Scientology
- minister, Dennis Erlich, posted portions of the Scientology
- religious tracts on the Usenet newsgroup alt.religion.scientology. =
-
- The local-access BBS got its Usenet feed though Netcom On-Line
- Communications Services, a national Internet access provider. When
- the Church of Scientology learned of Erlich's postings, it sued him
- in federal court in San Francisco, demanded that the local BBS and
- Netcom cut Erlich's access off, and when they didn't, sued the BBS
- and Netcom for copyright infringement. The church relied on the
- FRENA case and argued that Netcom was liable because copyright law
- is strict liability.
-
- Because this case (and all the Scientology cases) involved
- Usenet, rather than a small, dial-up BBS, the threat of strict
- liability upped the stakes considerably. Usenet traffic carries
- vast amounts of material, much of it encoded, only loosely
- organized, all of it unsolicited by the system administrator and
- overseen by no one. No Internet access provider could hope to
- review Usenet for potential copyright violations before making the
- 20,000 or more newsgroups available. But the penalties for even
- unintentional copyright infringement are draconian -- seizure
- orders, injunctions, damages of up to $20,000 for each violation,
- not to mention paying the other side's attorney's fees and costs.
-
- In a long, carefully written opinion issued November 21, 1995,
- Judge Whyte did not follow the logic of Frena to impose strict
- liability. RELIGIOUS TECHNOLOGY CENTER v. NETCOM ON-LINE
- COMMUNICATION SERVICES, INC., 907 F. Supp. 1361 (N.D. Cal. 1995). =
-
- "Although copyright is a strict liability statue," he wrote, "there
- should still be some element of volition or causation which is
- lacking where a defendant's system is merely used to create a copy
- by a third party." Netcom was not liable for direct copyright
- infringement, because there was no such "volition" - the copyright
- and distribution happened as a natural part of Usenet, without any
- direct action by Netcom in relation to the offending messages. =
-
- While Netcom escaped the claim of direct infringement, it did not
- fare as well against the church's claim of "contributory
- infringement," as we will see.
-
- The sysops' new dilemma -- what to do about notice of an alleged
- violation?
-
- The holding in NETCOM that on-line services -- at least
- Internet service providers -- are not liable for direct copyright
- infringement for materials passing through their system, if adopted
- broadly, will give interactive services some relief from what had
- been an unknown and unknowable legal exposure.
-
- A different issue arises, though, when an on-line service is
- given notice of an alleged violation -- whether copyright
- infringement or libel. There is a fundamental difference in on-
- line publication from paper publication -- on line, the material is
- continuously available thanks to the on-line service, while the
- traditional print distributor delivers the publication and is done
- with it. Can a lawyers' demand letter change the playing field,
- and force a "hands off" on-line distributor like Netcom or
- CompuServe to review its contents and decide whether to remove
- offending postings -- upon pain of a civil lawsuit?
-
- The Church of Scientology demanded that Netcom remove the
- texts from its server. Netcom refused to remove the texts without
- better proof of a copyright violation, and while the texts
- automatically rolled off Netcom's servers after 11 days, this did
- not happen until they had passed on to Usenet and thence around the
- world. The church claimed that Netcom's inaction, if not a direct
- infringement, still made it liable because it could have easily
- prevented the world-wide distribution.
-
- Judge Whyte was convinced, at least in theory. He ruled that
- Netcom's inaction in the face of the church's demands could make it
- liable for contributory copyright infringement. Netcom had made a
- static argument -- that it should never be liable for copyright
- infringement, because it can never know beforehand whether a Usenet
- posting violates a copyright. But Judge Whyte took a more dynamic
- view -- while Netcom is not responsible for infringement of which
- it had no notice, he held that it cannot sit idly by once it is
- presented with proof of a copyright violation. He thought that
- Netcom's failure to cancel the postings after receiving the demand
- letter was a "substantial participation" in the distribution that
- invokes contributory liability, and that if Netcom "knew or should
- have known" that the postings infringed the church's copyright, it
- would be liable.
-
- But what proof is enough to show that an on-line service "knew
- or should have known" of an infringement? Judge Whyte held that
- the church's demand letter and Netcom's refusal to even look at the
- allegedly infringing material was enough evidence to send the case
- to trial. This "knew or should have known" standard obviously does
- not provide concrete guidance, particularly because the question is
- whether Netcom "should have known" that Erlich's postings were
- infringing the church's copyright is a really a legal one, and
- hardly an easy one at that. However, the court's opinion does at
- least allow a system administrator, ideally with help from a
- knowledgeable lawyer, to focus on particular questions: Does the
- notice of violation identify which materials are at issue? Does it
- provide specific evidence of copyright ownership or just a vague
- claim? Does the posting constitute fair use?
-
- Demands to remove offending material are becoming commonplace,
- and they put on-line services in a jam. Unlike traditional
- publishers like Time or The Washington Post, on-line services are
- not staffed to review materials for legal problems like libel,
- invasion of privacy or even copyright infringement. On-line
- services are in the access and distribution business; they create
- relatively little content themselves. How much effort does an on-
- line service have to put into evaluating these demands? While the
- safest course would be always to accede to threats, doing so is
- inconsistent with the traditional wide-open, robust debate that
- makes the Internet what it is. The NETCOM case bears watching as
- these questions have arisen, but have not yet been answered. It is
- also not clear yet whether the CDA's broad protection from libel
- lawsuits will protect on-line services after they are made aware of
- offending statements. See "The Communications Decency Act's Silver
- Lining," in this issue. Stay tuned; as sure as the sun rises in
- the east, there will be more lawsuits over on-line services'
- responsibility for their users' actions.
-
- ------------------------------
-
- Date: Fri, 26 Apr 1996 20:41:17 -0400
- From: PeteK1@AOL.COM
- Subject: File 3--The CDA's Silver Lining (from: Legal Bytes, Vol 4, No. 1)
-
-
- Spring 1996, Volume 4, Number 1
- __________________________________
-
- By George, Donaldson & Ford, L.L.P.
- Attorneys at Law
- 114 West Seventh Street, Suite 1000
- Austin, Texas 78701
- (512) 495-1400
- (512) 499-0094 (FAX)
- gdf@gdf.com
- http://www.gdf.com
- __________________________________
-
- Copyright (c) 1996 George, Donaldson & Ford, L.L.P.
- (Permission is granted freely to redistribute
- this newsletter in its entirety electronically.)
- ___________________________________
-
- David H. Donaldson, Jr., Publisher, dhdonald@gdf.com
- Peter D. Kennedy, Editor, pkennedy@gdf.com
- 3. THE COMMUNICATIONS DECENCY ACT'S SILVER LINING
-
- Until now, two court opinions -- CUBBY v. COMPUSERVE and
- STRATTON OAKMONT v. PRODIGY -- have dominated any discussion about
- whether interactive computer services are responsible for what
- users say on line. See "The Scientology Lawsuits and Lawyers'
- Letters," in this issue; "BBS Sysop Liability for Copyright
- Infringement: Let the Operator Beware!," Legal Bytes, Vol 2, No.
- 1. The two cases (simplified) are seen as opposites: CompuServe,
- the "hands off" network, escaped liability for a newsletter carried
- on its system, while Prodigy, supposedly a "hands on" publisher
- with control over its users' postings, was forced to answer for a
- user's defamatory words.
-
- All this has been changed now, and by a most unlikely law.
-
- The very Communications Decency Act of 1996 which is reviled
- throughout the on-line world for its controversial restrictions on
- "indecent" communications, also includes a very broad protection
- for on-line services from tort liability. Congress passed this
- provision specifically to overrule the STRATTON OAKMONT ruling.
-
- Section 508 of the CDA, which will be codified at 47 U.S.C.
- 15 230(c)(1), states:
-
- No provider or user of an interactive computer service shall
- be treated as a publisher or speaker of any information
- provided by another information content provider.
-
- The law defines "information content provider" broadly as "any
- person or entity that is responsible, in whole or in part, for the
- creation or the development of information provided through the
- Internet or any other interactive computer service." 47 U.S.C.
- 15 230(e)(3). So long as the interactive computer service does not
- create the content ("in whole or in part"), it cannot be found to
- be the "publisher."
-
- The CDA also prohibits a court from holding any provider or
- user of an interactive computer service liable because it (1) makes
- efforts to screen material; or (2) provides the means by which to
- screen material. This attacks from another angle the STRATTON
- OAKMONT ruling, where the Court considered Prodigy's "dirty word"
- filtering software in concluding it exercised editorial control
- over its users and so was a "publisher."
-
- The CDA leaves no doubt that it is meant to pre-empt all state
- tort laws: "No cause of action may be brought and no liability may
- be imposed under any State or local law that is inconsistent with
- this section." 47 U.S.C. 15 230(d)(3).
-
- Apparently, when the CDA was being drafted, the interactive
- computer service industry objected to the "indecency" prohibition
- because it might require the services to aggressively filter or
- review on-line content, even if they had not been doing so. And
- under STRATTON OAKMONT, this would make them the "publisher" of
- everything their services carried.
-
- Section 509 was added as an attempt to address this concern,
- without removing the controversial "indecency" prohibition. Now,
- under the CDA, an on-line service is no longer legally the
- "publisher" or "speaker" of other people's words. Therefore,
- federal law preclude a finding of an essential element --
- publication -- in any defamation claim in any of the 50 states
- against an on-line service, when the complaint is about someone
- else's words (as in CUBBY and STRATTON OAKMONT). For the same
- reason, the CDA would also precludes liability for any related tort
- (such as "false light" and "disclosure of private facts") that
- requires a finding of publication.
-
- No doubt the CDA's breadth will be tested. For example, when
- has an interactive service created content "in part" so that it
- cannot take advantage of Section 509? And does Section 509
- preclude, as its language appears to, defamation claims based on
- the continued availability of on-line libel even after an on-line
- service has been asked, but has failed or refused, to remove it?
-
- In any case, discussions of on-line liability can no longer begin
- and end with CUBBY and STRATTON OAKMONT -- Congress has profoundly
- changed the landscape with Section 509 of the CDA.
-
- ------------------------------
-
- Date: Tue, 23 Apr 1996 17:30:19 -0400 (EDT)
- From: Q*Bert <qbert@access.digex.net>
- Subject: File 4--Werd, be there or die -- (Summercon 96)
-
- Phrack Magazine and Cult of the Dead Cow proudly present:
-
- The 1996 Summer Security Conference
-
-
- "SUMMERCON IX"
-
- June 15th, 1996
-
- Georgetown Holiday Inn
- Washington D.C.
-
-
- This is the official announcement and open invitation to the 1996
- incarnation of Summercon. In the past, Summercon was an invite-only
- hacker gathering held annually in St. Louis, Missouri. Starting in
- 1995, SummerCon became an open event to any and all interested
- parties: Hackers, Phreaks, Pirates, Virus Writers, System Administrators,
- Law Enforcement Officials, Neo-Hippies, Secret Agents, Teachers,
- Disgruntled Employees, Telco Flunkies, Journalists, New Yorkers,
- Programmers, Conspiracy Nuts, Musicians, Nudists, and Rug Sucking Wannabes.
-
- Senators Exon and Coats, and all the rest of the flaming assholes
- who voted for the CDA will be ejected from the confrence if they
- show their weasely faces. Censors for SOL.com, Deutsch
- Bundestpost officials, and other flaming losers.
-
-
- Piss off, We MADE CyberSpace, you just tried to BUY it.
-
-
- LOCATION:
-
- The Georgetown Holiday Inn
- 2101 Wisconsin Ave. NW
- Washington, DC
-
- The hotel is located in scenic Georgetown, close to the Mall
- and the Smithsonian Museums as well as all the major tourist
- attractions in D.C...
-
- Georgetown itself is a major tourist area, with many fine shops,
- restaurants, PUBS and NIGHTCLUBS located there. If you can't
- figure out anything to do here, you need to get a life pretty badly.
-
-
- DIRECTIONS:
-
- from I66 coming east:
- Just keep going east. Take the Key Bridge exit off of 66,
- the bridge will be a left at the 3rd light after you take
- the exit. It's hard to miss, keep left and you will be forced
- over the bridge pretty much. On the other side of the bridge,
- take a right on M street (right and left being the ONLY choices
- possible.) keep right on the bridge and you will again be forced
- onto M street. Go down M and take a left at the second or third
- light. Go up 2-3 blocks and take a right (either or), and
- proceed to Wisconsin Ave. Take a left on Wisconsin. There is NO
- left turn from M st. onto Wisconsin, thus the diverse route.
- (Hey welcome to DC, run by the U.S. Congress who act as if they)
- (have been smoking crack, and Mayor Barry, who actually has.)
- (You will soon discover the same logic that brought you the CDA.)
-
- >From MD and 95 North:
-
- Take 95 south to 495 towards Northern Virginia.
- Take the George Washington Parkway South to Key Bridge.
- Follow I66 East directions above rest of the way from Key bridge.
-
- >From VA and 95 South:
-
- Get on 395 North follow signs to National Airport.
- At National Airport, turn around and follow directions to hotel
- from National Airport below.
- (No, we aren't fucking with your head, this is really the right way)
-
- >From National Airport:
-
- Tell the cabbie to take you to the hotel. OR
- Take George Washington Parkway to the Key Bridge / Rosslyn Exit.
- Follow I66 East directions from above from Key Bridge.
-
- >From Dulles Airport:
-
- Tell the cabbie to take you to the hotel. OR
- Take the Dulles Access road back southeast away from the Airport.
- This will dump you out on I66 eastbound. (See above) If you are trying
- to get TO Dulles, take I66 westbound and get in the right hand lane
- after the Sycamore St. exit, and veer to the right to take the next
- exit to the airport. Get in the left hand lane, and stay there to
- avoid being on the toll road. There is a parallel road that leads
- to the airport, but it's a local toll highway, stay left and avoid
- giving Virginia money unnecessarily.
-
- Taxis:
- The average airport fare runs around $20 from national, to $30 for
- Dulles. Your mileage may vary however with local road conditions.
-
-
- CONFERENCE INFO:
-
- It has always been our contention that cons are for socializing.
- "Seekret Hacker InPh0" is never really discussed except in private
- circles, so the only way anyone is going to get any is to meet new people
- and take the initiative to start interesting conversations.
-
- Because of this, the formal speaking portion of Summercon will be
- held on one day, not two or three, leaving plenty of time for people
- to explore the city, compare hacking techniques, or go trashing and
- clubbing with their heretofore unseen online companions.
-
- If you are coming from out of town and want the full hacker/tourist
- experience, we will informally meet in the lobby of the Georgetown
- Holiday Inn Friday, June 14th, 1996, at 2pm. From there we will
- have an informal hacker sight-seeing tour of DC, including the FBI
- headquarters and other interesting (and legal) places to go.
-
- The sight-seeing will converge with DC locals and mall security at
- 2600 in Pentagon City Mall Friday, June 14th, 1996, at 6pm. Although
- this isn't the first Friday of the month, this is definitely an official
- 2600 meeting, and likely to be the biggest one ever. This informal
- meeting will be held until about 8pm.
-
- The formal conference will be held on Saturday, June 15th, 1996, from
- 10am to 6pm (with a break for lunch). There will be a variety of speakers,
- panel discussions, demonstrations, and other events guaranteed to keep
- everyone entertained.
-
- No video or audio tapes will be allowed in the conference room.
- No still photography will be permitted in the conference room without
- prior permission of all those being photographed. Violation of these
- policies expresses your consent for the aggrived parties to pound
- you flat.
-
- There will be no selling of t-shirts, disks, firewalls, payphones, etc.
- in or around the conference area without prior permission of the organizers.
- If you are interested in demoing or selling something, please contact us
- at the address listed at the bottom. Violation of these provisions
- expresses your consent for the organizers to pound you flat.
-
-
- There will however be a charity wAr3Z drive, please bring your tax
- deductible donation of pirated software on media you don't need
- back, for deposit and free redistribution amongst the n33Dy.
-
-
- We ARE what YOU want to BE.
-
- SPEAKERS:
-
- The speakers list for Summercon IX is still being finalized, but it is sure
- to be even more dynamic and interesting than previous years. Speakers at
- Summercon '95 included such people as ex-CIA agent Robert Steele, author
- Winn Shwartau, Cypherpunk founder Eric Hughes, movie producer Annaliza
- Savage, and numerous past and present minions of UUSoft Technologies.
- Will the last cool UUSoft employee to leave please turn off the lights
- and lock the door.
-
- If you are an expert in some aspect of computer, network, or telco security
- and are interested in speaking at Summercon, please contact us to discuss
- the possibility further at the address listed at the end of this document.
-
- We are also going to be having short speeches by real hackers or phreakers
- giving their own perspective on some issue or insight into a new technology.
- This is an open invitation for you hackers to be heard; just provide us with
- a brief outline of the topic you will be covering and the amount of time you
- will take (suggested: 5 - 15 minutes) at the address listed below.
-
-
- COSTS:
-
- Costs for SummerCon IX are as follows:
-
- Secret Service / F.B.I. Rate: $500.00
- Government / Institutional Rate: $ 80.00
- Hacker / Individual Rate: $ 20.00
-
-
- Members of the United States Secret Service, and anyone that has in the past
- or currently is providing information or services to the Secret Service are
- required to pay the 'Secret Service Rate'. Cliffy, PMF, Gail, Agent Steele,
- this means you.
-
- Employees of a local, state, or federal government, members and associates
- of any L.E.O., and employees of any corporation working in the area of
- computer security must pay the 'Government / Institutional Rate'.
-
- Anyone that does not fit into one of the above categories is eligible for
- the 'Individual / Hacker Rate'.
-
- Due to historical lack of interest, there will not be pre-registration
- for the conference. Registration will begin at 9am the day of the
- conference, and will continue for the duration of the conference or until
- the meeting facilities have reached their capacity. Since the latter
- is likely to occur, it is suggested you don't oversleep, but hangovers
- are OK.
-
- No purchase orders, checks, money orders, foreign currency, stock certificates,
- IOUs, or coins will be accepted for registration. Secret Service agents,
- small unmarked bills only, please.
-
- Sorry for this being a bit more expensive than last year for the hackers,
- DC seems to be a more expensive place to hold a conference and the expenses
- are several times what they were in Atlanta.
-
- Bring money for t-shirts, they are cool, and if don't buy one you are
- lame anyhow and don't fucking deserve it!
-
-
- HOTEL INFORMATION:
-
- Georgetown Holiday Inn
- 2102 Wisconsin Ave NW
- Washington, DC
-
- Phone Number: (202) 338-4600
-
- The cost for a double occupancy room at the Georgetown Holiday Inn is $99.
- There is no special conference rate, there is no need to mention you are
- with a conference at all, the people in reservations probably won't know
- what you are talking about anyhow. The $99 rate is however a a special
- rate being held by Holiday Inn, so don't be afraid to tell them so if they
- try to quote you a higher rate.
-
- If the hotel is damaged in any manner, you are going to pay for it, and you
- will probably end up in jail. And even if you are lucky enough to get away
- with it, the rest of the hackers staying at the hotel will end up paying for
- it, and I'm sure that's going to make you a well-liked and respected hacker,
- especially among some of the bigger hackers who might feel tempted to inflict
- bodily harm on someone who causes any damage to the hotel. Please act
- responsibly, don't drink and drive, chew all your food before you swallow,
- don't swallow your gum, and recycle.
-
-
- CONTACTING SUMMERCON ORGANIZERS:
-
- You can contact the Summercon organizers through e-mail. If you haven't
- figured out e-mail yet, you probably shouldn't be coming to Summercon.
-
- As a final note, if you are planning on coming to Summercon, we would
- appreciate you sending e-mail to us with the subject of "GOING TO SCON"
- or something similar, just so that we have a rough idea of how many
- people are going to show up.
-
-
- E-mail: scon@2600.com
-
- ------------------------------
-
- Date: Fri, 19 Apr 1996 14:39:43 -0800
- From: telstar@wired.com (--Todd Lappin-->)
- Subject: File 5--Amer. Fam. Assoc. Demands investigation of Compuserve
-
- Although the courts are still debating the constitutionality of the
- Communications Decency Act, the Cyberporn Witch Hunt of 1996 is already
- getting underway...
-
- On April 1, 1996, the American Family Association -- a fundamentalist group
- based in Mississippi -- sent a letter to Attorney General Janet Reno
- demanding that the Department of Justice launch a criminal investigation of
- CompuServe.
-
- The letter, signed by Patrick A. Trueman, Director of Governmental Affairs
- for the AFA, reads as follows:
-
- "I am writing to urge a criminal investigation of H&R Block, Inc. and
- Compuserve for potential violations of the Communications Decency Act.
- CompuServe, a division of H&R Block, Inc., as of Friday, March 29, 1996, is
- offering pornography and other sexually oriented material on its on-line
- service to its users, including children... I hope that you will have an
- investigator review material available to children on CompuServe and take
- appropriate action."
-
- As Barry Steinhardt, Associate Director of the ACLU, explains in the
- following article, "This just proves what we've maintained all along: This
- law, this Communications Decency Act, is going to be a vehicle for the
- radical religious right to impose its brand of morality on the rest of the
- country."
-
- (Many thanks go out to the kind folks at the San Jose Mercury News for
- graciously giving me permission to redistribute the full text of this
- article to you now.)
-
- Read on for details, and of course...
-
- Work the network!
-
- --Todd Lappin-->
- Section Editor
- WIRED Magazine
-
- =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
- =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
-
- COMPUSERVE CALLED INDECENT
-
- CHRISTIAN GROUP SAYS ON-LINE SERVICE VIOLATES TELECOMMUNICATIONS ACT.
-
- By RORY J. O'CONNOR
- Mercury News Washington Bureau
-
- April 19, 1996
-
- (Re-distributed by permission from the San Jose Mercury News:
- http://www.sjmercury.com)
-
-
- WASHINGTON -- A fundamentalist Christian group has demanded a federal
- criminal investigation of the CompuServe on-line service, alleging that it
- has violated anti-smut provisions in a recently enacted telecommunications
- law.
-
- The American Family Association, based in Tupelo, Miss., asked the Justice
- Department to investigate in an April 1 letter to Attorney General Janet
- Reno. The organization's letter is apparently the first complaint lodged
- under terms of the Communications Decency Act, a controversial part of the
- sweeping rewrite of U.S. telecommunications law passed in February. The law
- makes it a crime to transmit ''indecent'' material via computer in such a
- way that children might view it.
-
- The act, largely crafted by Sen. James Exon, D-Neb., was bitterly contested
- by computer users and civil libertarians. Proponents said the law would
- make cyberspace a safer place for children. Opponents said it would chill
- free speech on-line, criminalizing material that would be protected under
- the First Amendment if it were printed on paper.
-
- A group of plaintiffs, led by the American Civil Liberties Union, sued the
- Justice Department in February seeking to overturn the law as
- unconstitutional. The case is still pending. The department has agreed in
- court not to conduct formal investigations into violations of the law, or
- to indict or prosecute anyone under it, while the case is pending, a
- spokesman said.
-
- The AFA maintains the Communications Decency Act is far too weak and was
- gutted in Congress to placate computer industry interests. In the letter to
- the Justice Department, the group alleged CompuServe offers ''pornography
- and other sexually oriented materials . . . to its users, including
- children.''
-
- The group singled out a service called Mac Glamour, an adult forum that,
- among other things, offers color photos of nude women. The service was
- promoted on CompuServe's ''What's New'' screen when subscribers connected
- at the end of March.
-
- CompuServe clearly marks the forum as an adult area and gives instructions
- to users how they can block the service from their computers. Among the
- controls provided by CompuServe, the main subscriber in a household, who
- must be an adult, can block access to adult sites from his or her account.
-
- The Mississippi group says that isn't sufficient. In a household that
- hadn't blocked the adult area, the invitation could have been seen and the
- images viewed by a minor, it said.
-
- ''This is exactly the kind of incident that Congress, in drafting the bill,
- anticipated,'' said Patrick Trueman, director of government affairs for the
- AFA in Washington. ''The objection we had was that it was available to
- children. If this isn't prosecutable, I don't know what is.''
-
- CompuServe did not respond to repeated calls seeking comment. But an
- industry group representing on-line service providers, the Information
- Services Association, said the letter to Reno was designed to interfere in
- the pending court case.
-
- ''It's clearly a publicity device during an important juncture in the
- litigation,'' said Bob Smith, the association's executive director. He
- called the law's language a ''vague and unclear standard that could make a
- wide range of material, including medical information and certain
- literature, illegal as well.''
-
- The Justice Department said it had received the letter but wouldn't act on
- it until the court case is over.
-
- The ACLU called the letter an attempt to coerce commercial services to
- remove otherwise legal adult material from their computers under threat of
- the large fines and prison terms spelled out in the act.
-
- ''This just proves what we've maintained all along: This law, this
- Communications Decency Act, is going to be a vehicle for the radical
- religious right to impose its brand of morality on the rest of the
- country,'' said Barry Steinhardt, associate director of the ACLU. ''They
- are going after Constitutionally protected images.''
-
- Trueman readily acknowledged that the AFA considers the law too weak, and
- if the CompuServe case isn't prosecuted, ''it's time for Congress to start
- from scratch.'' He said on-line services should have to automatically block
- all adult material from view unless a subscriber specifically requests
- access to it.
-
- But civil libertarians and privacy advocates reject that approach, which is
- the subject of a New York court case concerning an adult public access
- cable TV channel.
-
- ''It would cause a rather large collection of personal data'' about users
- of adult services, said David Banisar, policy analyst for the Electronic
- Privacy Information Center in Washington. ''It would be a particularly
- explosive list that CompuServe could sell, with all sorts of
- ramifications.''
-
- =A91996 Mercury Center.
-
- ------------------------------
-
- Date: Thu, 21 Mar 1996 22:51:01 CST
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 6--Cu Digest Header Info (unchanged since 7 Apr, 1996)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send post with this in the "Subject:: line:
-
- SUBSCRIBE CU-DIGEST
- Send the message to: cu-digest-request@weber.ucsd.edu
-
- DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
-
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CU-DIGEST
- Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
- Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
- In ITALY: ZERO! BBS: +39-11-6507540
- In LUXEMBOURG: ComNet BBS: +352-466893
-
- UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #8.33
- ************************************
-
-
-