home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Sun Feb 9, 1997 Volume 9 : Issue 08
- ISSN 1004-042X
-
- Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
- News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Field Agent Extraordinaire: David Smith
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
-
- CONTENTS, #9.08 (Sun, Feb 9, 1997)
-
- File 1--LAWSUIT: Case Filed with "Intent to Annoy"
- File 2--"Hacking Chinatown"
- File 3--An Auschwitz Alphabet (In re Milburn/Solid Oak)
- File 4--CyberLex -(Summary of legal issues) Updated 1/97 (fwd)
- File 5--Cu Digest Header Info (unchanged since 13 Dec, 1996)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: Thu, 30 Jan 1997 10:25:04 -0700
- From: --Todd Lappin-- <telstar@wired.com>
- Subject: File 1--LAWSUIT: Case Filed with "Intent to Annoy"
-
- THE CDA DISASTER NETWORK
-
- January 30, 1997
-
- Today Mr. Steve Silberman -- one of my distinguished comrades at Wired
- News -- brings us an interesting scoop about a new lawsuit that has
- been filed challenging one of the little-known provisions of the
- Communications Decency Act.
-
-
- The new suit targets a section of the CDA that criminalizes any
- "indecent" computer communications intended to "annoy" another person.
- This provision outlaws constitutionally protected communications among
- other adults, including public officials. Under the CDA, such actions
- could be prosecuted as a felony, punishable by a fine and up to two
- years imprisonment. The lawsuit was filed to protect the "annoy.com"
- Web site at http://annoy.com.
-
-
- Steve's full report follows below.
-
-
- Work the network!
-
-
- --Todd Lappin-->
-
- Section Editor
-
- WIRED Magazine
-
- (From: http://www.wired.com/news/ )
-
-
- Designed to Annoy, Web Site Flouts CDA
-
-
- by Steve Silberman
-
-
- 11:29 am PST 29 Jan 97 - If "flaming" is the favorite sport of the
- online world, annoy.com is a high-octane flame-thrower on a
- mission.
-
- Slated for launch Thursday, annoy.com takes aim at the provision
- in the Communications Decency Act that bans communication "with
- intent to annoy."
-
-
- By offering an online service that delivers scathing, anonymous
- postcards to public figures, and dishes up corrosive commentary
- and graphics hammering every hot-button issue from abortion to
- Zionism, annoy.com's creator, Clinton Fein, hopes to engage
- readers in dialogues
-
- about freedom and censorship that will continue past the Supreme
- Court's
- review of the CDA this spring.
-
-
- "Some might call it subversive," Fein declares. "We call it
- democracy."
-
-
- On Thursday morning, Fein and his attorneys, Mike Traynor and William
- Bennett Turner, will file a complaint for declaratory and injunctive
- relief in the US District Court in San Francisco, naming Fein's
- ApolloMedia Corporation as the plaintiff, and Attorney General Janet
- Reno as the defendant. The suit aims to establish that the provisions
- banning annoying and "indecent" speech in the CDA are
- "unconstitutional
- on their face," overbroad, and indefensible.
-
-
- Fein says he's angry that media critiques of the CDA focused on
- wording
- in the act that claimed to protect children from vaguely defined
- "indecency," and ignored provisions throttling communication between
- adults. "Where was The New York Times," asks Fein. "Covering the O. J.
- trial?"
-
- Traynor insists that his client's intentionally provocative site -
- abuzz
- with four-letter words and ire-arousing icons - is "not about throwing
- mudpies, but having the elbow room to use blunt, robust language, not
- just language that's PC. ApolloMedia and its lawyers are not
-
- deliberately urging people to use nasty language. They're encouraging
- people to be very forceful in their defense of freedom."
-
- Annoy.com is divided into sections with titles like "Heckle,"
- "Censure,"
- and "Weekly Irrit8." The ransom-letter layout and label-maker fonts on
- annoy.com are like a call to battle stations, but many of the texts -
- including the polymorphously perturbing "annoy libs," with a menu of
- targets including Sen. Jesse Helms - are as witty as they are angry.
-
-
- "Media Muck" aims barbs at perceived hypocrisy in all media, from
- dead-tree to digital, and guest writers will contribute essays to the
- site on inflammatory topics, starting with novelist Patricia Nell
- Warren's "Youth - Seen But Not Heard," and a rant by Gary McIntosh
- titled "Pornography Is Good for You." With a conferencing system on
- board called "Gibe" - think late-'80s Spy crossed with Electric Minds.
-
-
- Fein's commitment to the Bill of Rights, he says, began in South
- Africa,
- where Fein, as he puts it, grew up censored. "The First Amendment was
- a
- strong motivation for my coming to America," Fein says. "Imagine how I
- felt when I realized America was kidding about it."
- Annoy.com is not Fein's first attempt to resist censorship. Threatened
- by the Navy for reproducing a Navy recruiting poster in his CD-ROM
- production of Randy Shilts' "Conduct Unbecoming: Gays and Lesbians in
- the
- U.S. Military" - depicting an African American who was later
- discharged
- for being gay - Fein included both the poster and the Navy's
- threatening
- letter in the final product. The acerbic Fein says one of his goals
- for
- annoy.com is "to get people to talk to each other even if they hate
- each
- other."
-
- For Jonah Seiger of the Center for Democracy and Technology, the
- addition of the ApolloMedia complaint to the arsenal of legal
- challenges
- to the CDA "makes sense because it makes sense to raise every question
- and pick every nit about this law."
-
- Fein vows that even if the Supreme Court does not overturn the
- injunction made against the CDA by a panel of three federal judges in
- Philadelphia last June, annoy.com will stay up and running. "The
- issues
- that it touches on are not going away," he says. "Whether the CDA is
- there or not, you've still got Bill Clinton and Congress signing
- stupid
-
- legislation."
-
- <smaller>Copyright 1993-97 Wired Ventures, Inc. and affiliated
- companies.
- All rights reserved. </smaller>
-
-
- ###
-
-
- +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
-
- This transmission was brought to you by....
-
-
- THE CDA DISASTER NETWORK
-
-
- The CDA Disaster Network is a moderated distribution list providing
- up-to-the-minute bulletins and background on efforts to overturn the
- Communications Decency Act. To subscribe, send email to
- <<majordomo@wired.com> with "subscribe cda-bulletin" in the message
- body. To unsubscribe, send email to <<info-rama@wired.com> with
- "unsubscribe cda-bulletin" in the message body.
-
- ------------------------------
-
- Date: Sat, 8 Feb 1997 09:01:52 -0600
- From: Richard Thieme <rthieme@thiemeworks.com>
- Subject: File 2--"Hacking Chinatown"
-
- "Hacking Chinatown"
- by
- Richard Thieme
-
- "Forget it, Jake. It's Chinatown."
- Those are the last words of the movie "Chinatown," just
- before the police lieutenant shouts orders to the crowd to clear
- the streets so the body of an innocent woman, murdered by the Los
- Angeles police, can be removed.
- "Chinatown," with Jack Nicholson as Jake Gittes, is a fine
- film: it defines an era (the thirties in the United States) and a
- genre -- film noir -- that is a unique way to frame reality.
- "Film noir" is a vision of a world corrupt to the core in
- which nevertheless it is still possible, as author Raymond
- Chandler said of the heroes of the best detective novels, to be
- "a man of honor. Down these mean streets a man must go who is not
- himself mean, who is neither tarnished nor afraid."
- "Chinatown" also defines life in the virtual world -- that
- consensual hallucination we have come to call "cyberspace." The
- virtual world is a simulation of the "real world." The "real
- world" too is a symbolic construction, a set of nested structures
- that -- as we peel them away in the course of our lives --
- reveals more and more complexity and ambiguity.
- The real world IS Chinatown, and computer hackers --
- properly understood -- know this better than anyone.
-
- There are several themes in "Chinatown."
-
- (1) People in power are in seamless collusion. They take
- care of one another. They don't always play fair. And sooner or
- later, we discover that "we" are "they."
- A veteran police detective told me this about people in
- power.
- "There's one thing they all fear -- politicians,
- industrialists, corporate executives -- and that's exposure. They
- simply do not want anyone to look too closely or shine too bright
- a light on their activities."
- I grew up in Chicago, Illinois, known for its political
- machine and cash-on-the-counter way of doing business. I earned
- money for my education working with the powerful Daley political
- machine. In exchange for patronage jobs -- supervising
- playgrounds, hauling garbage -- I worked with a precinct captain
- and alderman. My job was to do what I was told.
- I paid attention to how people behaved in the real world. I
- learned that nothing is simple, that people act instinctively out
- of self-interest, and that nobody competes in the arena of real
- life with clean hands.
-
- I remember sitting in a restaurant in a seedy neighborhood
- in Chicago, listening to a conversation in the next booth. Two
- dubious characters were upset that a mutual friend faced a long
- prison term. They looked and sounded different than the
- "respectable" people with whom I had grown up in an affluent part
- of town.
- As I grew up, however, I learned how my friends' fathers
- really made money. Many of their activities were disclosed in the
- newspaper. They distributed pornography before it was legal,
- manufactured and sold illegal gambling equipment, distributed
- vending machines and juke boxes to bars that had to take them or
- face the consequences. I learned that a real estate tycoon had
- been a bootlegger during prohibition, and the brother of the man
- in the penthouse upstairs had died in Miami Beach in a hail of
- bullets.
- For me, it was an awakening: I saw that the members of the
- power structures in the city -- business, government, the
- religious hierarchy, and the syndicate or mafia -- were
- indistinguishable, a partnership that of necessity included
- everyone who wanted to do business. Conscious or unconscious,
- collusion was the price of the ticket that got you into the
- stadium; whether players on the field or spectators in the
- stands, we were all players, one way or another.
- Chicago is South Africa, South Africa is Chinatown, and
- Chinatown is the world. There is no moral high ground. We all
- wear masks, but under that mask is ... Chinatown.
-
- (2) You never really know what's going on in Chinatown.
- The police in Chinatown, according to Jake Gittes, were told
- to do "as little as possible" because things that happened on the
- street were the visible consequences of strings pulled behind the
- scenes. If you looked too often behind the curtain -- as Gittes
- did -- you were taught a painful lesson.
- We often don't understand what we're looking at on the
- Internet. As one hacker recently emailed in response to someone's
- fears of a virus that did not and could not exist, "No
- information on the World Wide Web is any good unless you can
- either verify it yourself or it's backed up by an authority you
- trust."
- The same is true in life.
- Disinformation in the virtual world is an art. After an
- article I wrote for an English magazine about detective work on
- the Internet appeared, I received a call from a global PR firm in
- London. They asked if I wanted to conduct "brand defense" for
- them on the World Wide Web.
- What is brand defense?
- If one of our clients is attacked, they explained, their
- Internet squad goes into action. "Sleepers" (spies inserted into
- a community and told to wait until they receive orders) in usenet
- groups and listserv lists create distractions, invent
- controversies; web sites (on both sides of the question) go into
- high gear, using splashy graphics and clever text to distort the
- conversation. Persons working for the client pretend to be
- disinterested so they can spread propaganda.
- It reminded me of the time my Democratic Party precinct
- captain asked if I wanted to be a precinct captain.
- Are you retiring? I asked.
- Of course not! he laughed. You'd be the Republican precinct
- captain. Then we'd have all our bases covered.
-
- The illusions of cyberspace are seductive. Every keystroke
- leaves a luminous track in the melting snow that can be seen with
- the equivalent of night vision goggles.
- Hacking means tracking -- and counter-tracking -- and
- covering your tracks -- in the virtual world. Hacking means
- knowing how to follow the flow of electrons to its source and
- understand on every level of abstraction -- from source code to
- switches and routers to high level words and images -- what is
- really happening.
- Hackers are unwilling to do as little as possible. Hackers
- are need-to-know machines driven by a passion to connect
- disparate data into meaningful patterns. Hackers are the online
- detectives of the virtual world.
- You don't get to be a hacker overnight.
- The devil is in the details. Real hackers get good by
- endless trial and error, failing into success again and again.
- Thomas Alva Edison, inventor of the electric light, invented a
- hundred filaments that didn't work before he found one that did.
- He knew that every failure eliminated a possibility and brought
- him closer to his goal.
- Listen to "Rogue Agent" set someone straight on an Internet
- mailing list:
- "You want to create hackers? Don't tell them how to do this
- or that. Show them how to discover it for themselves. Those who
- have the innate drive will dive in and learn by trial and error.
- Those who don't, comfortable to stay within the bounds of their
- safe little lives, fall by the wayside.
- "There's no knowledge so sweet as that which you've
- discovered on your own."
-
- In Chinatown, an unsavory character tries to stop Jake
- Gittes from prying by cutting his nose. He reminds Gittes that
- "curiosity killed the cat."
- Isn't it ironic that curiosity, the defining characteristic
- of an intelligent organism exploring its environment, has been
- prohibited by folk wisdom everywhere?
- The endless curiosity of hackers is regulated by a higher
- code that may not even have a name but which defines the human
- spirit at its best. The Hacker's Code is an affirmation of life
- itself, life that wants to know, and grow, and extend itself
- throughout the "space" of the universe. The hackers' refusal to
- accept conventional wisdom and boundaries is a way to align his
- energies with the life-giving passion of heretics everywhere. And
- these days, that's what needed to survive.
- Robert Galvin, the grand patriarch of Motorola, maker of
- cell-phones and semi-conductors, says that "every significant
- decision that changes the direction of a company is a minority
- decision. Whatever is the intuitive presumption -- where everyone
- agrees, "Yeah, that's right" -- will almost surely be wrong."
- Motorola has succeeded by fostering an environment in which
- creativity thrives. The company has institutionalized an openness
- to heresy because they know that wisdom is always arriving at the
- edge of things, on the horizons of our lives, and when it first
- shows up -- like a comet on the distant edges of the solar system
- -- it is faint and seen by only a few. But those few know where
- to look.
- Allen Hynek, an astronomer connected with the U. S. Air
- Force investigation of UFOs, was struck by the "strangeness" of
- UFO reports, the cognitive dissonance that characterizes
- experiences that don't fit our orthodox belief systems. He
- pointed out that all the old photographic plates in astronomical
- observatories had images of Pluto on them, but until Clyde
- Tombaugh discovered Pluto and said where it was, no one saw it
- because they didn't know where to look.
- The best computer consultants live on the creative edge of
- things. They are path-finders, guides for those whom have always
- lived at the orthodox center but who find today that the center
- is constantly shifting, mandating that they learn new behaviors,
- new skills in order to be effective. In order to live on the
- edge.
- The edge is the new center. The center of a web is wherever
- we are.
-
- When I looked out over the audience at DefCon IV, the
- hackers' convention, I saw an assembly of the most brilliant and
- most unusual people I had ever seen in one room. It was
- exhilarating, and I felt as if I had come home. There in that
- room for a few hours or a few days, we did not have to explain
- anything. We knew who we were and what drove us in our different
- ways to want to connect the dots of data into meaningful
- patterns.
- We know we build on quicksand, but building is too much fun
- to give up. We know we leave tracks, but going is so much more
- energizing than staying home. We know that curiosity can get your
- nose slit, but then we'll invent new ways to smell.
- Computer programmers write software applications that are
- doomed to be as obsolete as wire recordings or programs for an
- IBM XT. The infrastructures built by our engineers are equally
- doomed. Whether a virtual world of digital bits or a physical
- world of concrete and steel, our civilization is a Big Toy that
- we build and use up at the same time. The fun of the game is to
- know that it is a game, and winning is identical with our
- willingness to play.
-
- To say that when we engage with one another in cyberspace we
- are "Hacking Chinatown" is a way to say that asking questions is
- more important than finding answers. We do not expect to find
- final answers. But the questions must be asked. We refuse to do
- as little as possible because we want to KNOW.
- Asking questions is how human beings create opportunities
- for dignity and self-transcendence; asking questions is how we
- are preparing ourselves to leave this island earth and enter into
- a trans-galactic web of life more diverse and alien than anything
- we have encountered.
- Asking questions that uncover the truth is our way of
- refusing to consent to illusions and delusions, our way of
- insisting that we can do it better if we stay up later,
- collaborate with each other in networks with no names, and lose
- ourselves in the quest for knowledge and self-mastery.
- This is how proud, lonely men and women, illuminated in the
- darkness by their glowing monitors, become heroes in their own
- dramas as they wander the twisting streets of cyberspace and
- their own lives.
- Even in Chinatown, Jake. Even in Chinatown.
-
- copyright Richard Thieme 1997
-
- ------------------------------
-
- Date: Sat, 08 Feb 1997 09:32:04 -0800
- From: Jonathan Wallace <jw@bway.net>
- Subject: File 3--An Auschwitz Alphabet (In re Milburn/Solid Oak)
-
- ((MODERATORS' NOTE: Although we normally attempt to give both
- sides to every issue such as this, an attempt to contact Mr.
- Milburn of Solid Oak led to a bizarrre "never contact this site"
- again response from him, and an accusaton that CuD was harassing
- and intimidating him and his employees. Although this was, we have
- since learned, a canned response, it prevents us from further
- attempts to solicit a view from the "other side." Milburn's
- response to CuD would seem to confirm the criticisms of him and
- his company)).
-
- ===================
-
- Brian Milburn
- President,
- Solid Oak Software
-
- Dear Mr. Milburn:
-
- In December you added my site, The Ethical Spectacle,
- http://www.spectacle.org, to Cybersitter's list of blocked
- sites because of my criticism of your company
- (see http://www.spectacle.org/alert/cs.html).
-
- Below is a small sampling of the letters I receive every day
- from teachers and students about my
- Holocaust compilation, "An Auschwitz Alphabet",
- http://www.spectacle.org/695/ausch.html.
-
- Please read these over and reflect on the following
- issues:
-
- 1. Why do you think your dislike of criticism is more important
- than the benefit these students gain from accessing my site?
-
- 2. Why do you think you are more qualified than these teachers
- to determine what our children should see?
-
- There is a trend beginning in state legislatures to pass
- legislation mandating that schools buy blocking software.
- For as long as you continue blocking The Ethical Spectacle,
- I will share a copy of this correspondence with any
- school system or university considering purchasing
- your product.
-
- Here are three of the teachers who have assigned An
- Auschwitz Alphabet to their classes:
-
-
- "I just discovered your work online and am impressed! I am teaching a
- second level composition course thematically based on the Holocaust. I
- am teaching research writing skills in a computer lab with access to
- e-mail and the Internet and WWW. Have been surfing around looking for
- source material for myself and also for places to send the students.
- Some of them learned a little about the Holocaust in high school, but
- most are not too aware. Some are of German background and want to know
- what happened. This is a four year university in Michigan and most of
- the students are traditional freshmen, although I do have a couple of
- older students too."
-
- "I just wanted to let you know that I found your site as I was gathering
- resources to teach a unit on the Holocaust to my middle school students.
- They will be reading the book Night by Elie Weisel. That will serve as a
- launching pad into our study. Your site is going to be a fabulous
- resource. Most of what I have found so far is not very 'kid friendly'.
- Your site is going to allow them to explore on their own as they learn
- more about a topic most of them know nothing about. Thanks for providing
- such a valuable resource."
-
- "I am teaching summer school--US history, 20th Century--and found the
- Alphabet a powerful tool to convey what must be known about the
- Holocaust.
-
- "Each student was given a letter to read to the class. A few others read
- excerpts from the recollections of a child I found on another server.
- When we were finished, I needed to say no more."
-
- And here are a few of the students from around the
- world who have written to me:
-
-
- "I am a tenth grade student in Australia and I would just like to
- congratulate you on this homepage. This information has been most
- helpful for an assignment I am doing. So thanks."
-
- "I am an Abilene Christian University student in Texas. I am doing a
- report over the Holocaust. You information is wonderful and greatly
- appreciated. Keep it up."
-
- "Hey, I would like to congratulate you on your wonderful page, I am
- currently in the middle of a huge holocaust project for school, Im in
- eigth grade and your page helped me the most, I found it to be thorough,
- clean and very factual. I like it and will reccomend it to many of my
- friends!! Thank-you for your wonderful service!!"
-
-
- "I think this is great. I am a 14 year old boy that lives in Indiana.
- (USA) I really think what you are doing is important. If kids my age
- aren't told of this tragedy, than it will be forgotten about and the
- likelier the possibility of it happening again in some shape or form.
- Thank you."
-
- "I am a college student writing a paper on the happenings in Auschwitz.
- The pages that I read were enlighting as to what really occured. Many
- people do not believe in the Holocaust but after my presentation some
- changed their minds. Thank you for condensing many hours of reading."
-
- "Your Auschwitz Alphabet is amazing. Funny how you can be researching to
- write a paper and end up reading an entire collection of information
- that is actually extremely interesting. All I can say is wow. Truly
- awesome."
-
- "After coming across your page when looking for information for a school
- research assignment, I was amazed at the information in your 'Auschwitz
- Alphabet'. It has given me many ideas for my 1000 word essay due next
- week :-)"
-
- "I am a student at Jakarta International School and presently in tenth
- grade. At this moment I am doing research on the Holocaust. And by
- searching through the web I learned a lot of information about the
- Holocaust from you. So I was wondering if I could interview you and ask
- you some questions about the Holocaust in Auschwitz and asking how
- people escaped from the Holocaust."
-
- This is one of my favorites:
-
- [An Italian girl]"I read all the books of Primo Levi, I hope in one best
- world I'm only 14 but I know a lot of things about the past I'm not a
- Jew but I will don't forget..."
-
- There's no shame in correcting a moral misstep. I suggest
- you unblock my pages, and those of your other critics
- such as Bennett Haselton of Peacefire, www.peacefire.org,
- immediately. Otherwise you will continue to raise serious
- questions as to your competence to determine what is safe
- for children to see.
-
- Sincerely yours,
- Jonathan Wallace
-
- ------------------------------
-
- Date: Sun, 2 Feb 1997 13:48:13 -0600 (CST)
- From: David Smith <bladex@BGA.COM>
- Subject: File 4--CyberLex -(Summary of legal issues) Updated 1/97 (fwd)
-
- CyberLex may have been around for a while, but since I just discovered it
- that makes it a new resource..........
-
- This is a monthly summary of news items about legal developments and high
- profile events affecting the online community.
-
- David Smith *
- bladex@bga.com *
- President, EFF-Austin *
- 512-304-6308 *
-
- ---------- Forwarded message ----------
- Date--Sat, 1 Feb 1997 12:12:59 -0800
- From--Jonathan Rosenoer <cyberlaw@cyberlaw.com>
- Subject--CyberLex - Updated 1/97
-
- Dear CyberLaw/CyberLex subscriber:
-
- Here is the latest edition of CyberLex!
-
- Best regards,
- Jonathan
-
- |||||||||||||||||||||||||||||||
-
- CYBERLEX
- by Jonathan Rosenoer
-
- Notable legal developments reported in December 1996 include the following:
-
-
- # A state court judge ruled that Minnesota may enforce consumer protection
- laws against out-of-state businesses operating on the World Wide Web. The
- decision comes in a case on Internet gambling. __Minnesota v. Granite Gate
- Resorts__, No. C 6-95-007227 (Dist. Ct. Cty of Ramsey, filed July 18,
- 1995).
-
- # Georgia Tech Lorraine, the European platform of the Georgia Institute of
- Technology, has been sued for failing to comply with a French law requiring
- that goods and services be offered in French in addition to any other
- language in which they may be offered.
-
- # One third of Internet users provide false demographic data at Internet
- sites because they are not told how the information will be used and fear
- it will end up on a marketing list, according to a new study of 14,000 Web
- users by the Georgia Institute of Technology.
-
- # Charles Morrell, 34, a disgruntled former employee of a Connecticut
- Internet company (Diversified Technologies Group), was arrested and charged
- with felony computer crime relating to the erasure of all the company's
- computer files, including backups.
-
- # A World Wide Web service company, WebCom in San Francisco, California,
- suffered a syn-flood/denial-of-service attack that knocked out more than
- 3,000 Web sites for 40 hours during the holiday shopping season. WebCom
- halted the attacks after tracing the source of the attacks to MCI
- Communications Corp., which, in turn, tracked further back to CANet in
- Canada and a compromised account on BC.Net in Vancouver, British Columbia.
- As it could not end the attack, MCI blocked all traffic from CANet.
-
- # The US Air Force temporarily closed its Web site and the Department of
- Defense temporarily shuttered 80 other Internet sites after hackers broke
- into the Air Force's site and replaced files with prank messages and a
- sexually-explicit video clip.
-
- # FBI agents participated in searches in 20 cities as part of a nationwide
- investigation into the use of computer online services and the Internet to
- lure children into illicit sex and to distribute child pornography. The
- 3-year old investigation has already resulted in 80 arrests, 103
- indictments and charges, 66 felony convictions, and 207 searches.
-
- # The Center for Media Education and the Consumer Federation of America,
- both non-profit groups, urged the Federal Communications Commission to set
- guidelines for children's advertising and marketing on the Internet. The
- groups find that companies collect personally identifiable information from
- children without disclosing how the information will be used, or who will
- have access to it -- all without requesting parental consent.
-
- # The US Supreme Court agreed to decide whether the Communications Decency
- Act, which bans the transmission of indecent material to minors, violates
- the First Amendment.
-
- # A television industry group announced a rating system that will rank
- shows based on appropriateness for age groups, similar to that used for
- movies. The system, which will determine the shows blocked by the V-chip
- that will be built into new televisions, is subject to Federal
- Communications Commission approval. Critics complain the approach is too
- vague and of little use to parents, particularly regarding shows with
- violence or sexual themes.
-
- # A Brooklyn, NY, jury awarded $5.3 million in favor of a former executive
- secretary, Patricia Geressy, who claimed she developed carpal tunnel
- syndrome using keyboards made by Digital Equipment Corp. Two other women,
- Jill Jackson and Janet Tolo, were awarded $306,000 and $278,000,
- respectively. No defective keyboard design was found, but Digital was
- faulted for failing to issue warnings about the dangers of repetitive
- typing.
-
- # Labor Secretary Robert Reich said the government is moving ahead with
- new regulations to prevent repetitive motion injuries in the workplace.
-
- # An Australian Federal Court upheld copyright protection for a popular
- shareware program, the Trumpet Winsock application. This program allows
- personal computers to access the Internet. Software developer Trumpet
- Software International filed suit against OzEmail, the largest Internet
- service provider in Australia and New Zealand, after learning that 60,000
- unauthorized copies had been made. The court also ruled that OzEmail
- violated the Trade Practices Act by misleading and deceiving people that it
- had permission to publish the shareware.
-
- # The California Supreme Court ruled that prosecutors may not solicit
- financial assistance from crime victims, as they may create a legally
- cognizable conflict of interest for the prosecutor." The ruling came in a
- case involving the alleged theft of trade secret and confidential
- information from Borland International. The District Attorney accepted
- more than $13,000 from Borland, after telling the company it needed money
- for a computer expert and other expenses relating to the case. __People v.
- Eubanks__, 927 P.2d 310, 59 Cal.Rptr.2d 200, 1996 Cal. LEXIS 6829 (1996).
-
- # Cyber Promotions, Inc., a purveyor of unsolicited e-mail, agreed to
- settle a trademark infringement lawsuit brought by Prodigy Services Corp.
- The settlement followed the issuance of a permanent injunction ordering
- Cyber Promotions to stop sending unsolicited e-mail advertisements falsely
- indicating they came from Prodigy.
-
- # A US District Court Judge in San Francisco ruled that the First
- Amendment was violated by a 1993 State Department export ban relating to a
- software encryption program (Snuffle) written by Dr. Daniel Bernstein.
-
- # The Business Software Alliance, a group that includes IBM, Microsoft,
- Apple Computer, and nine other companies, criticized the Clinton
- administration on early versions of regulations implementing an October 1
- compromise allowing for the export of robust computer-encryption software.
- A November 15, 1996, executive order provides that the Justice Department
- will play a consulting role with the Commerce Department, which is viewed
- as giving law-enforcement to big a role in the export process. The order
- also indicates that export licenses for 56-bit key encryption software will
- be considered largely on a case-by-case basis, instead of being
- automatically allowed. It is further faulted for not accounting in the
- export review process for the availability of comparable overseas
- technology. And the order is also criticized for giving the Government the
- upper hand in developing a key-recovery system that would allow for the
- legal breaking of encrypted data once a warrant is obtained, as well as for
- prescribing a system that might enable Government decryption of messaging
- during transmission.
-
- # America Online says it has resolved concerns of 19 state Attorneys
- General, agreeing to make better pricing disclosures and extending the date
- that customers can receive automatic refunds relating to its change to new
- flat-fee pricing of $19.95 per month.
-
- # The World Trade Organization, a trade pact with 128 member nations,
- endorsed the Information Technology Agreement, which will abolish import
- duties on computers, software, semiconductors and telecommunications
- equipment between July 1, 1997, and January 1, 2000.
-
- # Final treaties agreed to by 160 nations, negotiating under the auspices
- of the United Nation's World Intellectual Property Organization, will
- reflect that temporary copies of copyrighted materials automatically made
- when a user is browsing the Internet will not be considered a copyright
- violation. A proposed treaty to extend copyright protection to databases
- was set aside, as many countries were not ready to address the issue.
-
- # Unauthorized service conversion, commonly known as "slamming," is the
- most frequently lodged consumer grievance about long-distance companies,
- according to the Federal Communications Commission's "Common Carrier
- Scorecard."
-
- # Microsoft Corp. has renegotiated license agreements with major computer
- makers, blocking them from using Microsoft's Windows operating system
- unless Microsoft's screen comes up when a user boots up. Several computer
- makers have provided a copy of the new agreement to the Justice Department
- for review.
-
- # The Federal Communications Commission unanimously approved technical
- standards for advanced digital television.
-
- # Television broadcasters, including CBS, Fox, and others, filed suit in
- federal court in Miami against a satellite programming company, PrimeTime
- 24 (a unit of Great Universal American Industries Inc.), alleging that
- illegally provides network shows to certain satellite dish owners. Federal
- law allows satellite carriers to sell network programming to consumers who
- cannot obtain decent reception of network programs. The broadcasters
- complain that PrimeTime 24 crowds out network affiliates and discourages
- advertisers from buying time on local stations.
-
- Sources for CyberLex include the Wall Street Journal, New York Times, Marin
- Independent Journal, The (San Franciso) Recorder, USA Today, and Le Monde.
-
- CyberLex (tm) is published solely as an educational service. The author is
- a California attorney. He may be contacted at cyberlaw@cyberlaw.com.
- Questions and comments may be posted at the CyberLaw Internet site
- (www.cyberlaw.com), hosted by Best Internet Communications, Inc.
- (www.best.com). ISDN Internet connectivity is provided by InterNex
- (www.internex.com). Legal research assistance is provided by Lexis-Nexis.
- CyberLex is a trademark of Jonathan Rosenoer. Copyright (c) 1997 Jonathan
- Rosenoer; All Rights Reserved.
-
- |||||||||||||||||||||||||||||||||||||
- CyberLaw.com
- Jonathan Rosenoer, Esq. | Kentfield, California, USA
- cyberlaw@cyberlaw.com | www.cyberlaw.com
- Ph. 415-461-3108 | Fax 415-461-4013
- |||||||||||||||||||||||||||||||||||||
-
- ------------------------------
-
-
- ------------------------------
-
- Date: Thu, 15 Dec 1996 22:51:01 CST
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 5--Cu Digest Header Info (unchanged since 13 Dec, 1996)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send post with this in the "Subject:: line:
-
- SUBSCRIBE CU-DIGEST
- Send the message to: cu-digest-request@weber.ucsd.edu
-
- DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
-
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CU-DIGEST
- Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
- In ITALY: ZERO! BBS: +39-11-6507540
- In LUXEMBOURG: ComNet BBS: +352-466893
-
- UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #9.08
- ************************************
-
-
-