home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Wed Mar 5, 1997 Volume 9 : Issue 15
- ISSN 1004-042X
-
- Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
- News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Field Agent Extraordinaire: David Smith
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
-
- CONTENTS, #9.15 (Wed, Mar 5, 1997)
-
- File 1--Childporn: Guardian Angels, Netpics
- File 2--Cu Digest, #9.14, Sun 2 Mar 97--Childporn: Guardian Angel
- File 3--CYBERANGELS FACE PROJECT
- File 4--CyberAngles Faces project: CuD #9.14, Sun Mar 2, 1997
- File 5-- CUD Submission in reply to CuD 9.14 Guardian Angels
- File 6--Cu Digest Header Info (unchanged since 13 Dec, 1996)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: Mon, 3 Mar 1997 10:06:15 GMT
- From: charles@ANATOMY.UCL.AC.UK(Charles King)
- Subject: File 1--Childporn: Guardian Angels, Netpics
-
- Gabriel Hatcher's reply seem to be a form letter. I received an
- identical letter last week when I wrote to him complaining about
- the FACE project. Clearly, he is not concerned with mounting an
- adequate defence of his actions. As far as his protestations of
- legality go, such acts are specifically prohibited in the UK
- under section 97 of the Children's Act 1989. I suppose the law in
- America is different.
-
- ------------------------------
-
- Date: Mon, 03 Mar 97 08:44:32 GMT
- From: dbell@ZHOCHAKA.DEMON.CO.UK("David G. Bell")
- Subject: File 2--Cu Digest, #9.14, Sun 2 Mar 97--Childporn: Guardian Angel
-
- I think the CyberAngels FACE scheme is pretty well thought out, but I do
- wonder if they quite realise the implications of the international
- nature of the Internet.
-
- There are, I suggest, two main problems.
-
- First, different countries do have different laws. Here in the UK, the
- definition of paedophile material has a lower age limit than in the USA,
- although the CyberAngels are setting a cut-off point of 15, which would
- also be illegal here. Perhaps more important are the way in which UK
- law makes 'faked' images as illegal as the real stuff, and the
- protections in law for the victims in sex cases. The FACE database, if
- published, would be at risk from such protection laws.
-
- The second problem is that the scheme depends on an Internet user who
- looks at the database, and recognises somebody. There are going to be
- false alarms. It's even possible that many of these victims are not
- known to _any_ Internet user. Here in the UK there have been several
- major cases of alleged "satanic child abuse" which have eventually
- collapsed, with dreadful effects on the innocent families involved. I
- don't want to see paedophiles escape, but I do know of the harm that can
- be done by a witch hunt.
-
- And, frankly, I find the average of 80 victims per paedophile, suggested
- by the CyberAngels, rather difficult to believe. I hope they can
- provide a good source for this claim. According to reports in the UK,
- most cases are within a family, and this figure suggests that other
- cases could routinely involve a couple of hundred victims. Since the
- "satanic ritual abuse" scares started in the USA, and have turned out
- to be largely unfounded here in the UK, I'm afraid that I tend to be
- sceptical.
-
- But if they can gather information that leads to a paedophile, without
- provoking the persecution of innocent families, it will be something
- wonderful, that they can be justly proud of.
-
- ------------------------------
-
- Date: Wed, 5 Mar 1997 18:53 EDT
- From: "E. Allen Smith" <EALLENSMITH@mbcl.rutgers.edu>
- Subject: File 3--CYBERANGELS FACE PROJECT
-
- A response to Colin Hatcher's letter to CuD:
-
- As a reader and occassional contributor to CuD, I find your
- characterization of CuD as a place where demonization occurs
- quite insulting. Indeed, it indicates that neither you nor your
- organization is responsive to criticism on ethical grounds. (I
- suspect my posting to CuD regarding your monitoring scheme may
- have contributed to your negative feelings regarding CuD; I will
- clarify my statements by that I was not advocating mail-bombing
- the CyberAngels, but simply that you would better serve the
- Internet community by concentrating on actual problems such as
- spam.)
-
- To the degree that "do-gooder" is treated negatively on CuD, it
- is because of such phenomena as "we're from the government and
- we're here to help you." Only organizations (e.g., the Red Cross)
- with a history of competent, helpful action should be free from
- this suspicion; neither the CyberAngels nor their parent
- organization the Guardian Angels match this description.
- Cooperation between the CyberAngels and such government
- organizations
-
- Another example of why the CyberAngels are not so trusted can be
- found in your claim that you should report any possible child
- pornography, even if it may be innocent (e.g., morphed), by
- asking if the person would do away with laws against child
- pornography. First, your statement shows an ignoring of the
- principle that letting the guilty go free is preferable to
- punishing the innocent - a principle found in all free legal
- systems. While your reporting of an event does not result in and
- of itself in direct judicial punishment, the investigation of
- child pornography production (like that for other emotion-charged
- crimes) is noticeably harrassing in and of itself. When you bring
- such harrassment (potentially including tabloid media
- involvement) on an innocent person, you are ethically if not
- legally to blame. An example of such a case (albeit not resulting
- from CyberAngel action, so far as I know) can be found in the
- same CuDigest as your article. Second, removing the possibility
- of prosecution for possibly morphed images does not remove the
- possibility of prosecution for the _production_ of child
- pornography - the only phase in which a child is being actually
- harmed. The claim that limits on free speech and freedom of the
- press regarding the distribution or possession of child
- pornography are necessary to prevent its creation is negated by
- phenomena on the Internet such as copyright violations. Quite
- simply, I find it highly unlikely that most persons paying for
- the reception of child pornography are paying money (directly or
- indirectly) to the producers of such material. Therefore, the
- remaining illegality of such possession or distribution can only
- be attributed to "do-gooder" intrusion of their morality on
- others, a fault for which politicians are often to blame. Given
- this consideration, I would therefore regard the CyberAngel
- search for "probable cause" (in this and in other cases) in about
- the same light as the encouraging of informing on one's neighbor
- in totalitarian states such as the USSR under Communism; while I
- am not in favor of making such behavior illegal (it is free
- speech, something that I wish to protect), I certainly find it
- ultimately unethical.
-
- I would like again to encourage the CyberAngels to concentrate on
- matters directly harmful to the Internet, such as the
- aforementioned spams. While you may claim that your activities
- are necessary to prevent governmental infringement (such as the
- CDA) on the rights of Internet users, I find this claim
- reminiscent of self-censorship resulting from threats of
- governmental censorship. Moreover, reporting information to the
- goverment cannot be described as discouraging government
- involvement and regulation.
-
- ------------------------------
-
- Date: Wed, 5 Mar 1997 15:43:00 -0800
- From: Jason Harrison <harrison@cs.ubc.ca>
- Subject: File 4--CyberAngles Faces project: CuD #9.14, Sun Mar 2, 1997
-
- In Mr Hatcher's posts to CuD, he has repeatedly stated the
- importance of stopping child pornographers and child abusers.
- His proposed method is to identify the child victims of the
- pornographer and abusers and used these children to identify the
- people many of us would like to remove from the streets.
-
- Many of the complaints about his method, hinge on the fact that
- identifying victims ignores the wishes of the victims and perhaps
- even their rights. Mr. Hatcher responds that "ending the abuse"
- is the goal that should be pre-eminent in our minds.
-
- Here's another take, from the victims. Mr Hatcher, the victims
- that you want to save do not want to be publicly identified. If
- there is any possible way for the identities of the victims to be
- released beyond the official Law Enforcement channels, and the
- CyberAngels are NOT in that group, then the CyberAngels may face
- suits by the identified victims for damages to their reputation.
-
- Why? Let me set the scenario. Recently here in Canada, which has
- slightly stronger laws against child pornography than in the States
- it has been recently realized that a "child sexual abuse" ring worked
- out of the Maple Leaf Gardens in Toronto. The Maple Leaf Gardens is a
- large hockey arena in downtown Toronto.
-
- Today, The Globe and Mail published the following article:
-
- Victims of sexual assaults went public, feel punished
-
- DEEP SCARS / After suffering as boys and teens, two men
- complain they can't find support and are unfairly painted
- as potential abusers.
-
- Wednesday, March 5, 1997
- By Jane Gadd
- The Globe and Mail
-
- http://www.globeandmail.com/docs/news/19970305/GlobeFront/UVICTN.html
-
- I'll let you examine the content of the article yourself. To
- summarize:
-
- - All sexual abusers were sexually abused themselves.
- - Society is very afraid of (potential) sexual abusers.
- - Society is thus very afraid of sexual abuse victims.
-
- - But, only 7% of sexual abuse victims go on to become
- sexual abusers.
-
- An example taken from the article:
-
- Eric...was sexually molested beginning at the age of 9 by his
- stepfather's father. His visits to the man, and sexual relations,
- continued until Eric was 15, when he told his mother. She called
- the police, and his abuser was jailed for 10 years on numerous
- counts of sexual assault.
-
- Eric recalled the first visit: It was a winter evening, and his
- stepfather took him to visit the old man, leaving him there
- overnight. "I didn't know him. It was bedtime and he had a
- pullout couch. I remember him sitting beside me and saying
- everything was okay. And then he took my pants off."
-
- That first time, the sex was one-way--Eric submitted to caresses
- from the older man. But over the following six years he was drawn
- into full reciprocal sexual acts.
-
- "I have a tremendous amount of guilt and shame for staying in the
- relationship," he said. "What I remember is I didn't want the
- sexual relationship . . . but I wanted the companionship of a
- father-figure to do all the normal father-son things with--going
- to movies and arcades, shopping, things like that. He took me to
- work with him, and he let me drive even though I was too young. I
- felt he was the one person who cared about me."
-
- After his abuser was jailed, Eric buried the issue for close to
- 10 years.
-
- "I don't remember any counselling. I was given a
- pamphlet. . . . The police asked me if I had felt any serious
- effects from the relationship, and I said 'No, I have a
- girlfriend. I just want to put it behind me.' "
-
- The woman he married was sympathetic when he told her about the
- abuse shortly after the relationship began. But since then, the
- marriage has broken up and his former wife has withheld access to
- his two sons on the grounds that Eric is at risk of being a child
- abuser.
-
- So say that Eric's abuser had taken photographs and had uploaded
- them to the Internet, and thanks to the Faces project Eric's
- abuser had been arrested. Eric went on to get consulting, and
- had not told his wife that he was a victim of sexual abuse. She
- then found out through the Faces project that he had been a
- victim and thus had her laywer argue in court for controlled
- access to her AND his children because he was a child abuse
- victim, and MAY become a child abuser [note the 7% figure
- above for victims becoming perpetrators].
-
- Eric would have grounds IMHO to sue the CyberAngels and all law
- enforcement agencies associated with the release of his sexual
- abuse victim status for damages to his reputation.
-
- -Jason
-
- --
- -------------------------------------------------------------------------------
- J. Harrison@cs.ubc.ca http://www.cs.ubc.ca/spider/harrison
- Graduate Motto: Free-time with guilt. ftp://ftp.cs.ubc.ca/pub/local/quotes
-
-
- ------------------------------
-
- Received: (from NIU for <baal@nym.alias.net> via BSMTP)
- Received: (from A01STCS@NIU for MAILER@NIU via NJE)
- (UCLA/Mail V1.500 M-SMTP-7496-585); Wed, 05 Mar 97 23:49:35 CST
- Received: from anon.lcs.mit.edu by mvs.cso.niu.edu (IBM MVS SMTP V3R1) with TCP;
- Wed, 05 Mar 97 23:49:20 LCL
- Date: 6 Mar 1997 05:49:05 -0000
- Message-ID: <19970306054905.25480.qmail@anon.lcs.mit.edu>
- From: Baal <Baal@NYM.ALIAS.NET>
- To: cudigest@SUN.SOCI.NUI.EDU
- Subject: File 5-- CUD Submission in reply to CuD 9.14 Guardian Angels
- References: <cud.970302203535.14474@unicom.com>
- Reply-To: Baal@NYM.ALIAS.NET
- Cc: Baal@NYM.ALIAS.NET, angels@WAVENET.COM, tk0jut2@MVS.CSO.NIU.EDU
-
- Jim, I'd like to submit this to CuD. I realize it is rather long, and
- would not object terribly if it was edited; I would just ask that you
- send me the edited copy for my perusal prior to posting in CuD. (I'll
- make a small note regarding the editing, and PGP-sign the edited copy.)
-
- I'm sending the full article to `Gabriel Hatcher', for his
- rebuttal/comments.
-
- Baal <Baal@nym.alias.net>
- 1024/A21829FD 1995/07/10 PGP public key on keyservers
- PGP Key Fingerprint: 5A 64 DB DB 2C FE C0 FE 63 A7 A3 59 58 DA A6 EA
-
-
- -----BEGIN PGP SIGNED MESSAGE-----
-
- > Message-ID: <cud.970302203535.14474@unicom.com>
- > Date: Sun, 02 Mar 1997 20:35:34 GMT
- > Subject--Cu Digest, #9.14, Sun 2 Mar 97--Childporn--Guardian Angels, Netpics
- > Reply-To: tk0jut2@mvs.cso.niu.edu
- > Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
-
- > CYBERANGELS FACE PROJECT
-
- BTW, Gabriel, your PGP-signature, at least as posted in CuD, failed to
- verify. You also haven't signed your PGP-key.
-
- > The concerns voiced about the CyberAngels FACE project are valid
- > concerns and deserve an answer.
-
- Thank you for acknowledging this.
-
- > The insulting tone of some of the posts to date however is sad to see.
- > Disagreement is often expressed in CuD by abusing and demonizing the
- > opponent. In other words the critic cannot conceive that another person
- > could be intelligent and yet disagree with them.
-
- This feature, for better or worse, is common to discourse on the net.
-
- > Thus our project is dismissed as "dim-witted" or ill thought out, when
- > what the writer perhaps means is that they disagree with it.
-
- Perhaps the writer means exactly what they said: i.e. that your project
- is dim-witted and ill thought out. Obviously they disagree with it, but
- I think that using these words conveys rather more than simple
- disagreement. Let's face it... this is an emotional issue, and emotions
- are going to run high on both sides.
-
- > I disagree with a number of the contributors to CuD but I would not
- > claim for a moment that they were stupid people based on the fact that I
- > didn't agree with their opinion. I consider it a weakness to be so
- > quick to judge and condemn when in fact the details of the project are
- > not even known by those criticising it.
-
- The fact that your project is dim-witted and ill thought out does not
- necessarily imply that you lack intelligence--mere intelligence does not
- automatically guarantee that one will embark on appropriate courses of
- action.
-
- > The main areas of concern about our FACE project appear to be:
-
- > A) CONCERN FOR THE CHILDREN WHO WILL BE "VICTIMIZED" BY THE PROJECT
-
- > Some critics have written that we are contributing to
- > "double-victimization", while one from England wrote that we were lucky
- > we didn't live in the UK as we would go to jail there for such a
- > project.
-
- You're lucky that you don't live in Canada either, as you would go to
- jail here also.
-
- > In other words this criticism equates us with the original abusers of
- > the children,
-
- Not at all. Possession of child pornography is illegal, regardless of
- the purpose for which it is held. In child pornography cases here in
- Canada, I understand that even defence counsel must go to the offices of
- the police to view the evidence--even counsel for the accused is not
- permitted to either possess or view the evidence except though the
- police.
-
- From: "Tracking high-tech pedophiles"
- The Toronto Globe & Mail, Saturday, December 14, 1996
- page A1, A12
-
- [...]
-
- "The printouts are required for defence lawyers, who must, however,
- view them in the Project P office, because otherwise the lawyers
- would technically possess the material. A written description,
- called a breakdown, of each shot is provided for the defence to
- keep."
-
- > and suggests that while we may well be well meaning "do-gooders" we are
- > in fact hurting the children and exploiting them for our own ends. The
- > term "do-gooders" is invariably used as a term of abuse as you can see
- > from the post in CuD - a "do-gooder" is by definition ignorant and
- > unskilled in the area they work.
-
- To a degree, is this not true? Are you not, in fact, exploiting them in
- order to further your own political agendas? (I see your agendas as
- cracking down on encryption, key-escrow, anonymity and general policing
- of the Net. Please correct me if you are not, in fact, in favour of all
- of these measures.)
-
- > It is my belief that a child who is being raped by adults for their
- > pleasure would like the torture to stop.
-
- This is an entirely reasonable assumption.
-
- > It is the FACE project's intent to assist in stopping the abuse.
-
- This next statement, however, is not. You are operating under the
- assumption that the current materials making the rounds of the net are
- in fact, current--when this is necessarily not the case. Quite a bit of
- it has been scanned in from materials published decades ago.
-
- Consider the following:
-
- From: "Tracking high-tech pedophiles"
-
- "Project P has also offered hope to people who have memories of
- being abused as children and believe it was recorded on film, or to
- parents who fear their children were assaulted by pedophiles. Every
- week Staff Sgt. Matthews gets letters accompanied by photographs of
- children asking whether investigators have seen them on the
- Internet, with the hope that they can identify the abusers.
-
- The smiling faces of these children, posing in class photographs or
- hamming it up in photo booths, are posted above the computer that
- is printing out the images of child pornography in Project P's back
- room. The investigators say it's almost impossible to look for
- ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
- matches among the hundreds of printouts a day, but they like to
- ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
- have the photos posted there as a reminder of the innocent victims
- hurt by the trade in such material."
-
-
- > Our FACE project has been carefully researched for the past 6 months and
- > we are proceeding slowly and with high regard for the victims. I find
- > it strange that people believe that a child who is being sexually abused
- > would prefer the rape to continue rather than face the "embarrassment"
- > of having themselves identified and rescued.
-
- Read the above, Gabriel. Even the officer in charge of "Project P" the
- largest unit dedicated to fighting child pornography in North America,
- is of the opinion that your methods aren't 't workable. The odds of
- your actually "saving" a child are therefore negligible.
-
- > It is certainly true that some children who are being raped by their
- > fathers are worried about getting him into trouble, and it is certainly
- > true that many children being abused inside families do not inform
- > teachers either because of shame and humiliation or in some cases
- > because they are threatened with terrible consequences if they ever
- > tell. Nevertheless it is in the best interests of all victims of child
- > abuse, and for our society as a whole, that child predators are stopped,
- > and part of stopping child abuse is by identifying child abuse victims.
-
- Granted. However, as stated in the article above, even the head of
- Project P apparently regards your methods as unworkable.
-
- I must commend you, however--you are one of the only persons engaged in
- the fight against child pornography who has *ever* raised the fact that
- the overwhelming majority of abuse takes place in families. (My
- understanding is that very little, if any, of this material makes it
- onto the net.)
-
- > The average pedophile predator abuses 80 children before they are finally
- > brought to justice.
-
- Your source for this statistic, please?
-
- > This being the case, it is in our interests to act fast when we discover
- > them. Identifying the victim of child abuse gives Law Enforcement in
- > many cases a direct lead to abusers.
-
- This may be true, in theory--in practice it is another thing
- entirely--witness Staff Sgt. Matthew's comments in the Globe and Mail
- article above.
-
- > B) CONCERN THAT CYBERANGELS FACE UNIT DOES NOT UNDERSTAND THE
- > TECHNOLOGY OF CHILD PORNOGRAPHY
-
- > It has been said that CyberAngels does not understand that child
- > pornography can be forged, and that any child's face can be pasted onto
- > any pornographic scene etc... Exactly what evidence does the critic
- > have of our lack of understanding in these matters? I would suggest no
- > evidence at all, for certainly none is offered. In fact we are
- > perfectly well aware that modern computer programs are very capable of
- > such things. I own and use Photoshop myself and am fully versed in what
- > it can do with photographs.
-
- Fair enough.
-
- > The laws on child pornography are very clear here in the USA:
- >
- > ==================================================
- >
- > "Child pornography" is defined as speech that:
- >
- > 1) visually depicts
-
- Visually depicts what? Has something been left out here?
-
- > 2) sexual conduct - which might include sex, masturbation, and "lewd
- > exhibition of genitals" --
-
- Whatever `lewd exhibition of genitals' is... this is extremely
- subjective...
-
- > 3) by actual children under the age of 18,
- >
- > It is constitutionally UNPROTECTED. You can go to jail for
- > distributing it *or* for possessing it.
-
- Actually, U.S. law if fairly lenient. The laws here in Canada are *far*
- stricter, even covering artificial child pornography (morphed or
- hand-drawn images, and even *text*. It is my understanding that there
- is a bill by a Senator Hatch which would also criminalize artificial
- child pornography in the U.S.A., although your 1st Amendment would
- continue to protect expression in text form, as it should.)
-
- > The rationale behind this exception is that child pornography
- > necessarily involves the use of children in sexual contexts; and that to
- > suppress such use, the law can ban distribution and possession of child
- > pornography as well as its production. The category is therefore
- > limited to *actual* depictions of children; it almost certainly
- > excludes, say, paintings (or computer-generated images) of fictional
- > children, or verbal descriptions of sexual conduct involving children.
-
- As I said, Canadian law makes no such distinctions, which is the primary
- reason I am opposed to it. Senator Hatch's legislation would also
- change this state of affairs.
-
- > [From "Cyberspace Law for Non-Lawyers" by Larry Lessig, David Post, Eugene
- > Volokh
- > http://www.ssrn.com/cyberlaw ]
- > ==================================================
-
- > So what are our criteria for selecting images from which to crop? FACE
- > members must make decisions about the following:
-
- > 1) The original photo should have been taken in the last few years.
- >
- > a) Consider hair styles and clothing: are they something you
- > would see people wearing today?
- >
- > b) Does the photo have a yellow or brown tint to it, If so it may
- > be too old.
- >
- > c) Consider decor in the room like pictures, beds, wallpaper.
- > Could you buy something like that today? If not the photo may
- > be too old.
-
- While all of these are clues, they are hardly definitive.
-
- > 2. The child must appear to be under 15 years old.
-
- > a) Consider the hands and eyes of the victim.
- >
- > b) Try to determine if the photo has been changed in any way to
- > make it look like child porn. (If your viewer can magnify the
- > size of the image, you may be able to determine if there have
- > or have not been any alterations.) The most obvious retouch
- > methods used when fabricating child pornography is the masking
- > of pubic hair, the reduction of breast size in the case of
- > women, and the placing of a child's head on top of a adults's
- > body.
-
- All of these judgments are highly subjective--how the hell are you
- supposed to differentiate a 15-year-old from a 16-year-old? (I know
- women that are well into their twenties, yet they tell me they're often
- asked for I.D. going into bars, as they appear to be about 13-14.)
-
- Under Canadian law, even the morphing of an image to make it appear that
- the person depicted is underage (or even describing them as underage,
- even if they are not, makes the image or text child pornography.)
-
- > In the case of highly skilled graphic designers the changed image will
- > appear "seamless". In the case of a seamless image, CyberAngels are
- > advised to treat it as a piece of genuine child pornography.
-
- Advised by whom?
-
- > 3) If the child is just standing, sitting, or laying we can NOT use it
- > unless it meets one of the below requirements:
- >
- > a) The child is being sexually abused by someone else in the photo.
- >
- > b) The child is doing something sexual (eg. masturbation, pulling
- > her dress up to expose him or herself, or posing in an overtly
- > sexual nature).
-
- Direct sexual abuse, masturbation (or insertion of an object into the
- anus or vagina) I think I can agree with. However, the term `overtly
- sexual nature' is rather broad, and subject to wide interpretation.
-
- > One thing to be very careful of, is to try and determine if the image
- > comes from a nudist camp. If it does, and it is just child nudity
- > rather than sexual abuse, then we CANNOT use the image as these are
- > legal images. What the images are used for by pedophiles is sickening
- > and sad, but the images in and of themselves are legal under US law.
-
- If you had your way, would you have this changed under U.S. law?
-
- > 4) The image CANNOT be used if the child's face is showing pain
- > or distress or if the child is peforming oral sex and
- > therefore the face cannot be cropped. If FACE searcher can
- > find one unuseable image of a child involved in oral sex and
- > another simple nude picture of the same child that would
- > normally not be useable as it is legal, then we can couple the
- > two images and use the nudist face, as we have evidence that
- > sexual abuse occurred.
-
- A question, if I may--why the exclusion of images involving pain or
- distress? (Does this somehow make the child's face harder to identify?)
-
- > Images to be included in the FACE database must be approved by 5 separate
- > people. For an image to be included all 5 persons of the selection
- > committee must agree unanimously.
-
- Who are the members of this selection committee, and what are their
- qualifications? How were they selected, and by whom?
-
- > The logic of our critic appears to be that since child pornography can
- > be spoofed it is therefore not possible to ever decide whether something
- > is child pornography or not. Presumably the same critic would then
- > favor the abolition of the laws against child pornography on the same
- > grounds?
-
- The problem is, that the existence of decent morphing software breaks
- the link between the production of child pornography and the abuse of
- actual children. It is no longer necessary to abuse an actual child to
- produce such images. Accordingly, there is not always an actual
- victimized child to "rescue."
-
- > In fact what we are doing is searching for "probable cause" for deeper
- > investigation by Law Enforcement. It is not for CyberAngels to make a
- > judicial ruling about whether something is an illegal image or not.
-
- Really, now. You admitted above, that your 5-member committee judges
- whether to pass along an image to the police or not. You are already,
- ipso facto, making judgments about the legality or illegality of
- images. If you were truly making no judgments, you would pass along
- either *all* of the images, or *none*.
-
- > That decision is made by a court, and in some cases by a jury, following
- > expert witnesses and examination of the images by experts in the field
- > (compare for example OJ Simpson's Magli shoes, where a jury had to
- > decide whether the image was genuine after hearing expert testimony).
- > CyberAngels FACE Unit is selecting possible examples of child abuse,
- > asking for public assistance in identifying the faces used in the images
- > and presenting the evidence to Law Enforcement.
-
- Are any of the people on your "selection committee" qualified to make
- such legal or forensic judgments? If not, then you have no business to
- be making them.
-
- > And what if the face used in the child pornography belongs to a child
- > who has _never_ been abused? Wouldn't the parents wish to know that
- > someone was using their child's face to create such an image for the
- > sexual gratification of pedophiles worldwide? I certainly would like to
- > know that if one of my kids was being exploited in such a way.
-
- And how is this to be determined, exactly? If a child's picture is
- published, then the parents (and the child themselves) essentially lose
- any control over its use.
-
- > C) CONCERN THAT WE ARE BREAKING THE LAW BY GATHERING EVIDENCE
- >
- > Our critics continue to paint us as ignorant newbies who know nothing
- > about law, law enforcement, obscenity, pornography, child pornography,
- > child abuse, psychology or internet technology. Notice that the
- > accusation is always that we are "dim-witted" and rarely stops at "I
- > disagree".
-
- The only reasonable course of action is to make the assumption that you
- are unqualified, unless and until, you prove otherwise.
-
- > In fact CyberAngels core membership are experts in a wide range of the
- > above mentioned fields. I am a post graduate researcher and lecturer
- > (History, International Relations) with 17 years teaching experience,
- > including work at the University of London, England, and am also an
- > expert in security (20 years).
-
- Irrelevant. Given the nature of this medium, anyone can claim to be
- anyone, or have any qualifications they wish in this forum. I could
- just as easily claim to be an M.D., Ph.D. or a pink elephant for that
- matter.
-
- > Other members of CyberAngels core team are professional Law Enforcement
- > members, child psychologists and mental health counsellors, internet
- > system administrators, network managers, usenet admins, webmasters and
- > technicians, numerous lawyers from both criminal and civil fields, and
- > numerous representatives of child abuse/support organizations. Our FACE
- > project is being developed in consultation with as much expertise as we
- > can find.
-
- The difference, my dear Gabriel, is that experts who testify in court
- have to submit some sort of evidence as to their qualifications, in
- order for them to be accepted as experts by the court. Your `experts'
- do not. We have only your word for it. Care to name some of your
- CyberAngels or the people who have been advising you?
-
- > We are following guidelines for gathering evidence given to us after
- > discussion with the FBI "Innocent Images" project running out of
- > Baltimore. Our Usenet Director discussed how we could help the FBI in
- > their investigations with agent Doris Heppler who is one of those in
- > charge of the project.
-
- > The advice we received from the FBI is the advice we follow:
- >
- > 1) Images are downloaded to floppy disks for viewing purposes.
-
- Good thing you're in the U.S. In Canada, this would tend to
- automatically one make liable to charges of both making and possessing
- child pornography, under Section 163.1 of the Criminal Code.
-
- > 2) If the image is suspected to be illegal, the headers are recorded.
-
- Fine and good. However, given the relatively rapid expiration times of
- binary newsgroups, and the fact that (at least to my knowledge) none of
- the archiving services store intact binaries, what is the point?
-
- > 3) The floppy disk is reformatted to erase all trace of the suspected
- > illegal image.
-
- So, you destroy the actual `evidence'.
-
- > 4) The headers are passed up the chain of command to the next level
- > for verification.
-
- How is verification performed, given the constraints I've listed above?
- What is there to link a particular image with a particular set of
- headers? Are you not essentially, breaking the chain of evidence here?
-
- > 5) No suspected illegal images are EVER stored on computer, nor sent
-
- by email or snail mail.
-
- No doubt, this is to try and avoid charges of distribution... fair
- enough.
-
- > 6) Following verification either
- >
- > i) The headers are passed on to FBI agents. or
- >
- > ii) The encoded binary is downloaded to floppy disk (not decoded)
-
- and the disk is then carried physically to the local FBI
- office.
-
- The encoded binary is downloaded to floppy disk from where? Above, you
- stated that: " No suspected illegal images are EVER stored on computer,
- nor sent by email or snail mail." So, where *are* you getting them
- from?
-
- Further, how can you ensure that the images downloaded are identical to
- those identified by the headers, particularly if they are not decoded?
-
- > 7) All members involved in such activity should make contact with local or
- > regional FBI offices and ask for assistance and guidance.
-
- > All FACE project members are advised to make direct contact and meet
- > with both their local FBI agents AND with their ISP admins to discuss
- > their involvement in this project. It is not the case that CyberAngels
- > are operating alone and in secret and could therefore be confused with
- > pedophiles.
-
- Then you wouldn't mind publishing a membership list of the various
- personnel involved?
-
- > The same is true in other countries - members are advised to contact
- > their local or federal law enforcement and ask for guidelines as to how
- > they can assist in the gathering of evidence and the stopping of the
- > online trade in child pornography and the real life activities of
- > pedophiles and child predators.
-
- Just out of curiosity, are you aware of any Canadians who have
- approached either the Ontario Provincial Police (the OPP is responsible
- for Project "P") or the RCMP?
-
- If so, what was their response?
-
- > D) CONCERN THAT PEDOPHILES WILL JOIN CYBERANGELS AS A COVER FOR
- > GETTING THEIR HANDS ON CHILD PORNOGRAPHY
- >
- > Some critics are concerned that pedophiles will join CyberAngels as a
- > cover for getting their hands on child pornography and being immune from
- > prosecution. What evidence do these critics have of this? I have never
- > seen any.
-
- Even though I am opposed to what you are doing, nevertheless, I believe
- that you are correct here. I think that the probability of such an
- occurrence is extremely remote.
-
- [snip]
-
- > How many pedophiles do you know who would be happy to register their
- > names and addresses with the FBI and risk background investigations,
- > when they can obtain child pornography freely and safely without needing
- > to do that?
-
- Are you claiming then, that all of your CyberAngels (engaged in this
- project at least) have submitted themselves to (and passed) background
- checks by law-enforcement officials?
-
- Furthermore, you state that pedophiles, `can obtain child pornography
- freely and safely'; Staff Sgt. Matthews, the head of Project P, has made
- statements to the effect that methods (essentially identical to the ones
- you are using) to identify abuse victims are unworkable. So, therefore,
- what is the point of the project?
-
- > Any CyberAngel member who stores illegal images on a Hard drive is as
- > guilty as anyone else of possession of child pornography. Storing of
- > images is not permitted by law except for by Law Enforcement or their
- > agents, and, while we seek ultimately to act as official agents for the
- > FBI we are at present involved only at an informal level with them as
- > private citizens. What this means is that all CyberAngels members are
- > bound by the same laws as anyone else. Abuse it, you lose it.
-
- I'm not entirely certain about American law, but under Canadian law,
- even storage of an image to a floppy disk is illegal. I must admit to
- being disturbed by your admission that you seek to act as `official
- agents for the FBI.' My belief is that you and your CyberAngels are
- nothing more than a bunch of cyber-vigilantes.
-
- > Well, no doubt there will be more questions, but I hope I have answered
- > some of CuD reader's concerns. I would certainly appreciate it if
- > critics confined themselves to stating their disagreements and reasons,
- > rather than abusing me personally or insulting my intelligence or
- > expertise.
-
- Your expertise, Sir, not to mention that of your colleagues, has yet to
- be established.
-
- > There is nothing "dim-witted" about what we are doing - in fact it is
- > very carefully planned and thought out.
-
- Something can be very carefully planned and thought out, yet still be
- dim-witted, or ill-advised.
-
- > And by the way, if anyone is wondering why they cannot find our FACE
- > database yet, it is because 6 months after the project began we are
- > still researching and studying the legal, practical and moral aspects.
- > It seems to me that it is our critics who are running around
- > half-cocked, not CyberAngels.
-
- Ok, so you mean you've already *started* the project, without reaching a
- decision as to all the legal, moral and other implications?!
-
- If that isn't dim-witted or ill-advised, what is?
-
- ------------------------------
-
- Date: Thu, 15 Dec 1996 22:51:01 CST
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 6--Cu Digest Header Info (unchanged since 13 Dec, 1996)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send post with this in the "Subject:: line:
-
- SUBSCRIBE CU-DIGEST
- Send the message to: cu-digest-request@weber.ucsd.edu
-
- DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
-
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CU-DIGEST
- Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
- In ITALY: ZERO! BBS: +39-11-6507540
- In LUXEMBOURG: ComNet BBS: +352-466893
-
- UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #9.15
- ************************************
-
-
-