home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Sun Oct 12, 1997 Volume 9 : Issue 73
- ISSN 1004-042X
-
- Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
- News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Field Agent Extraordinaire: David Smith
- Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
-
- CONTENTS, #9.73 (Sun, Oct 12, 1997)
-
- File 1--"Net Law: How Lawyers Use the Internet" by Jacobsen
- File 2--Markup of H.R. 695 (SAFE) ACT
- File 3--Secret FBI Files Web Site
- File 4--Things to Do on the Web When You're Dead
- File 5--Agent Steal in Gray Areas
- File 6--Export Controls and Scare Tactics
- File 7--Netly News special report: "The Privacy Snatchers"
- File 8--Spam Analysis
- File 9--THE X-STOP FILES: The Truth Isn't Out There
- File 10--Mitnick Trial Date Set
- File 11--Cu Digest Header Info (unchanged since 7 May, 1997)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: Wed, 01 Oct 1997 11:25:25 EST
- From: "Rob Slade, doting grandpa of Ryan & Trevor"
- Subject: File 1--"Net Law: How Lawyers Use the Internet" by Jacobsen
-
- BKNLHLUI.RVW 970221
-
- "New Law: How Lawyers Use the Internet", Paul Jacobsen, 1997, 1-56592-258-1,
- U$29.95
- %A Paul Jacobsen jacobsen@brainerd.net
- %C 103 Morris Street, Suite A, Sebastopol, CA 95472
- %D 1997
- %G 1-56592-258-1
- %I O'Reilly & Associates, Inc.
- %O U$29.95/C$42.95 800-998-9938 707-829-0515 fax: 707-829-0104 nuts@ora.com
- %P 254
- %T "New Law: How Lawyers Use the Internet"
-
- Come on. You give it a title like that *and* stick in an AOL disk and still
- expect me to refrain from joking?
-
- Well then, this is a realistic and reasonable overview of net uses and
- usefulness for lawyers. Not usage; per se; the coverage of actual Internet
- applications is fairly brief. The content is more of a sales pitch, in line
- with other Songline titles, studded with personal testimonials and examples.
- (The book does, though, properly note that law offices will probably want a
- direct, dedicated link to the net, rather than the dialup arrangement most
- other books push.)
-
- Along the way there are numerous, helpful resources recommended. A large
- proportion of these do, as expected, deal with US law, but overall the book is
- less US-centric than others of its ilk, given that the practice of law must be
- similar anywhere.
-
- "Netlaw" (cf. BKNETLAW.RVW) is for people; "Net Law" is for lawyers.
-
- copyright Robert M. Slade, 1997 BKNLHLUI.RVW 970221
-
- ------------------------------
-
- Date: Fri, 26 Sep 1997 17:05:57 -0500
- From: cudigest@SUN.SOCI.NIU.EDU(Computer underground Digest)
- Subject: File 2--Markup of H.R. 695 (SAFE) ACT
-
- Source - http://www.house.gov/commerce/full/092497/markup.htm
-
- Full Committee Markup
- September 24, 1997
- 2123 Rayburn House Office Building
-
- PDF Versions of Committee Print and Amendments will be available by
- 11:00 AM EDT [IMAGE] Some of the the documents below have been created
- using Adobe Acrobat. To view these documents, you will need the Adobe
- PDF Viewer
-
- H.R. 695 SECURITY AND FREEDOM THROUGH ENCRYPTION (SAFE) ACT, was
- ordered reported, amended, by a roll call vote of 44 yeas to 6 nays
- (Roll Call Vote #42).
-
- A unanimous consent request by Mr. Bliley to discharge the
- Subcommittee on Telecommunications, Trade, and Consumer Protection
- from further consideration and proceed to the immediate consideration
- of H.R. 695, as reported to the House by the Committee on the
- Judiciary, was agreed to without objection.
-
- The following amendments were offered.
-
- An Amendment in the Nature of a Substitute by Mr. Tauzin, #1, was
- AGREED TO, amended, by a voice vote. (A unanimous consent request by
- Mr. Tauzin to have the Amendment in the Nature of a Substitute
- considered as base text for purposes of amendment was agreed to
- without objection.)
-
- An amendment to the Tauzin Amendment in the Nature of a Substitute
- by Mr. Markey, #1A, was AGREED TO by a roll call vote of 40 yeas to
- 11 nays (Roll Call Vote #41).
-
- An amendment by Mr. Oxley to the Markey Amendment to the Tauzin
- Amendment in the Nature of a Substitute, #1A(1), was NOT AGREED TO
- by a roll call vote of 16 yeas to 35 nays (Roll Call Vote #40).
-
- An amendment to the Tauzin Amendment in the Nature of a Substitute
- by Mr. Tauzin, #1B, was AGREED TO by a voice vote.
-
- THE COMMITTEE ADJOURNED SUBJECT TO THE CALL OF THE CHAIR
-
-
- U.S. House Seal The Committee on Commerce
- 2125 Rayburn House Office Building
- Washington, DC 20515
- (202) 225-2927
- Commerce@mail.house.gov
-
- ------------------------------
-
- Date: Mon, 6 Oct 1997 16:42:27 -0500 (CDT)
- From: Michael Ravnitzky <mikerav@IX.NETCOM.COM>
- Subject: File 3--Secret FBI Files Web Site
-
- Please pardon any interruption, but I believe that you may be interested in
- the Secret FBI Files Website at
-
- http://www.crunch.com/01secret/01secret.htm
-
- This free site has been carefully compiled from FBI records and lists
- thousands of important and interesting FBI Files that you can get very
- easily from the government simply by asking.
-
- This material has never, repeat never been published before anywhere. If
- you are interested in FBI files, this is a wonderful resource.
-
- Sorry again for any interruption, and I won't send you any other
- correspondence, but I hope you can provide me with some feedback on my
- website, which is real a labor of love. And if you like it, tell a friend.
-
- Michael Ravnitzky
- Second Year Law Student
- MikeRav@ix.netcom.com
- http://www.crunch.com/01secret/01secret.htm
-
- ------------------------------
-
- Date: Fri, 3 Oct 97 09:01:28 -0700
- From: "Gordon R. Meyer" <grmeyer@ricochet.net>
- Subject: File 4--Things to Do on the Web When You're Dead
-
- Moderators' Note: Okay, the last thing we "need" is another
- Internet-based newsletter. Nonetheless, "NetBits" has arrived on the
- scene and it's fresh, interesting, and helpful. If you're interested in a
- nice mix of articles on technology, society, and news -- all with a 'net
- focus -- give NetBits a try. The article below is from their second issue.
-
- To subscribe to NetBITS, send email to <netbits-on@netbits.net>.
- Visit the NetBITS Web site at <http://www.netbits.net/>.
-
-
- Things to Do on the Web When You're Dead
- ----------------------------------------
- by David Blatner <david@afterlife.org>
-
- Perhaps it speaks to my Western-based culture that I was so
- surprised when a friend of mine [not our friend and colleague Cary
- Lu, who had no desire to build a Web site before he passed away,
- as mentioned in TidBITS-399_. -Adam] asked me some time ago if I
- would host his Web site after he died. I had simply not given any
- thought to the problem of what happens to a site after someone
- passes away or can no longer support it for health reasons.
-
- This man had put several years of work into his Web site, and it
- had become an archive of his life's musings and beliefs. He felt
- (and feels) strongly that this material should remain available to
- people after he is no longer around to share it, and there is no
- reason why this shouldn't be possible. The site takes up little
- space, requires no real maintenance, and holds a treasure-trove of
- wonderful writing that will probably never see its way into print.
-
- I don't know how many elderly people or people with terminal
- illnesses are currently building Web pages, but I can only assume
- that the number is increasing and that within the next few years
- the "passing on" question will become one of significance. There
- are many important and emotional issues at stake here, as people's
- personal Web sites become repositories and reflections of who they
- are and what they feel is important to share with others.
-
- I believe this situation calls for an international not-for-profit
- organization. People could bequest their Web sites to this
- organization with the knowledge that the site will be available
- indefinitely to their loved ones and other interested parties.
- Some small commercial startups already offer this kind of service,
- but I'm more concerned about people who won't be able to afford an
- expensive solution that requires trust funds or other
- sophisticated financing.
-
-
- **Enter the AfterLife** -- AfterLife is just such an organization.
- Over the past few months, several volunteers have been working
- together to address the concerns and issues of archiving Web sites
- after their authors die. The effort is still very much in its
- developmental stage, and more volunteers are needed. Currently,
- AfterLife has been donated server space and bandwidth, and the
- organization is applying for tax-exempt status in the United
- States.
-
- I was honored that my friend asked me to protect something so
- precious to him, and I willingly agreed. But I wonder how many
- people's sites are simply being "turned off" when they no longer
- have a voice (or a checkbook) to sustain them? I keep thinking: if
- my grandparents had built a Web site, wouldn't I want it archived
- and available online in the years to come for my grandchildren?
-
- Of course, no one knows what the online world will look like in my
- grandchildren's time. There's no question that the Web will evolve
- during the intervening years, and AfterLife will be exploring
- issues surrounding the conversion of Web pages into other formats
- for the continuance of access when that becomes necessary. Since
- HTML is relatively simple and HTML files are pure text, Web pages
- stand a much better chance of surviving into an unknown technical
- future than content that requires specific hardware or operating
- systems. CD-ROMs, for instance, may physically last for many
- years, but that's no help if there aren't any CD-ROM drives to
- read them or applications that understand the file formats used.
-
- You can find more information about AfterLife at the Web site
- below or by sending email to <info@afterlife.org>. If you are
- interested in either participating as a volunteer or bequeathing
- your Web site to AfterLife, drop us a line. Although AfterLife is
- still at an early stage, we want to encourage people to start
- thinking about the issues involved as the Web, along with the rest
- of us, continues to age.
-
- <http://www.afterlife.org/>
-
- ------------------------------
-
- Date: Sat, 4 Oct 1997 17:55:31 -0400
- From: grayarea <grayarea@openix.com>
- Subject: File 5--Agent Steal in Gray Areas
-
- ((MODERATORS NOTE: Netta Gilboa, editor of Gray Areas,
- sent the following information over to us. Gray Areas is a
- nifty magazine that's been around for a few years, and mixes
- rock, cyberculture, counterculture, and generally fringe news
- unavailable elsewhere. It's well checking out)).
-
- Two articles by Justin Petersen, a.k.a. Agent Steal, were just
- published by Gray Areas Magazine. The first is called "Hackers
- In Chains" and details some encounters Justin had with other
- notorious computer hackers while in federal prison. The second
- piece is called "Everything A Hacker Needs To Know About Getting
- Busted By The Feds. The articles are available on the Gray Areas
- Magazine Home Page at: http://www.grayarea.com/gray2.htm
-
- ------------------------------
-
- Date: Mon, 29 Sep 97 10:48:22 MDT
- From: Dave++ Ljung <dxl@HPESDXL.FC.HP.COM>
- Subject: File 6--Export Controls and Scare Tactics
-
- |Which would you rather have export controls on, technology used
- |for encryption or technology used in the development of nuclear
- |weaponry? The answer is obvious to most people.
-
- Is it? Let's not shoot ourselves in the foot - if you make strong
- encryption technology available, then you let *any* technology that
- can be sent through encryption channels available.
-
- |Here's the conundrum: The mandarins of law enforcement say that ...
- |machines employed in the engineering of modern thermonuclear bombs can
- |be sold to Russian scientists in the former Soviet Union's most famous
- |nuclear weapons shop.
-
- No - the law doesn't say that at all. SGI broke export regulations by
- selling those computers, your article even admits that later:
-
- |Around the same time the Department of Commerce, along with the
- |Department of Justice, began a criminal investigation of the case.
-
- It seems that the 'mandarins of law enforcement' don't like strong
- encryption *or* export of computing technology that can create
- nuclear weaponry.
-
- |This is similar to the arguments fielded by concerned Netizens
- |against control of encryption, with one small exception: The first U.S
- |hydrogen bomb blew a crater one mile wide in the Pacific atoll of
- |Eniwetok.
-
- And the plans for that bomb could have been sent using encryption. There
- you go shooting your other foot, that must hurt. All you're doing is
- using the same scare tactics that the 'law' is using to stop
- encryption. Encryption in itself is not dangerous, but it admittedly
- can transmit dangerous information. Workstations by themselves are
- not dangerous, but they can create dangerous things, such as nuclear
- weaponry. If you use scare tactics to focus on the dangerous
- possibilities of technology, you might as well hand it all in now.
-
- |The four machines, for which Silicon Graphics was paid
- |$200,000, aren't really supercomputers, argued Thompson. At Silicon
- |Graphics, he said, they're thought of as "desktop servers," capable of
-
- Well - that's what they are. Admittedly the lines between PCs, workstations,
- servers and supercomputers is no longer clear, I think most of the
- industry would consider such machines as servers, not supercomputers.
-
- |supercomputers made by Cray Research. Conversely, a 486 PC -- what
- |this article is being written on -- is capable of approximately 12.5
- |million operations per second. Compared to it, the SGI machines in
- |question are, relatively speaking, Crays.
-
- Now you're just being silly. Conversely, say, an Altair 8800 -- what
- this reply is being written on -- is capable of a couple of operations
- per second. Compared to it, the 486 PC in your house is, relatively
- speaking, the most powerful computer ever made. Please destroy it
- immediately - don't let it fall into the hands of the Russkies.
-
- |Thus, since Silicon Graphics insisted it was unaware of
- |Chelyabinsk-70's true nature, there was no need to review the sale.
-
- You are absolutely correct. I won't defend SGI because the made a
- mistake and they broke the law. In fact, they're direct competitors
- with the company I work for, so I don't really want to discuss SGI at
- all. But I don't see what this has to do with the *government* selling
- supercomputers to Russia (which they didn't), or with strong encryption,
- or ... heck, with anything except maybe the discussion of export controls,
- which didn't seem to be the point of your article.
-
- So, what exactly is your point, George?
-
- ------------------------------
-
- Date: Fri, 3 Oct 1997 13:48:12 -0400
- From: Declan McCullagh <declan@well.com>
- Subject: File 7--Netly News special report: "The Privacy Snatchers"
-
- Source - fight-censorship@vorlon.mit.edu
-
- Recently the FBI has started to demand a creepy new anti-privacy
- law. It requires that all future technologies -- from cell
- phones to WordPerfect -- include a kind of electronic peephole
- to let law enforcement agents snoop through your private files
- and communications without your knowledge or permission. One
- House committee has already approved the FBI's bill.
-
- Such easy access is the fantasy of every unethical policeman and
- corrupt bureaucrat. Now, the police say they'll never peek
- through this peephole without a judge's approval. But history
- reveals that time and again, the FBI, the military and other law
- enforcement organizations have ignored the law and spied on
- Americans illegally, without court authorization. Government
- agencies have subjected hundreds of thousands of law-abiding
- Americans to unjust surveillance, illegal wiretaps and
- warrantless searches. Eleanor Roosevelt, Martin Luther King,
- feminists, gay rights leaders and Catholic priests were spied on.
- Even Supreme Court justices were monitored. Can we trust the FBI?
-
- Visit the Netly News for a special report on The Privacy Snatchers:
-
- http://cgi.pathfinder.com/netly/opinion/0,1042,1466,00.html
-
- ------------------------------
-
- Date: Tue, 30 Sep 1997 09:03:21 -0400 (EDT)
- From: editor@TELECOM-DIGEST.ORG
- Subject: File 8--Spam Analysis
-
- ((MODERATORS' NOTE: For those not familiar with Pat Townson's
- TELECOM DIGEST, it's an exceptional resource. From the header
- of TcD:
- "TELECOM Digest is an electronic journal devoted mostly but
- not exclusively to telecommunications topics. It is
- circulated anywhere there is email, in addition to various
- telecom forums on a variety of public service systems and
- networks including Compuserve and America On Line. It is also
- gatewayed to Usenet where it appears as the moderated
- newsgroup 'comp.dcom.telecom'. Subscriptions are available to
- qualified organizations and individual readers. Write and tell
- us how you qualify:
- * ptownson@massis.lcs.mit.edu * ======" ))
- ==================
-
-
-
- Source - TELECOM Digest Tue, 30 Sep 97 Volume 17 : Issue 265
-
- Date: Sun, 28 Sep 1997 19:02:54 -0400
- From--The Old Bear <oldbear@arctos.com>
- Subject--Spam Analysis
-
-
- Pat:
-
- The following is something I did about two months ago to get a better
- understanding of the kind of "unsolicitied commercial email" that
- is being spewed into my mailbox. Readers of TELECOM Digest may
- find it of interest, particularly the observations about:
-
- 1. the *size* of the typical spam email message versus
- the that of the typical legitimate individual message;
-
- 2. the volume of spam compared with legitimate messages
- (other than subscribed mailing lists and other solicited
- bulk mail);
-
- 3. the apparent evolution of a subset of standard English
- punctuation which might be called 'spammese'.
-
-
- From--oldbear@arctos.com (The Old Bear)
- Subject--the case of the telltale exclamation point !
- Date--Fri, 1 Aug 1997 18:48:18 -0400
-
- Since the beginning of the year, rather than deleting email SPAM, I
- have been filtering it off into a file called "SPAM" for purposes of
- intellectual curiosity.
-
- Well, it being a slow Friday afternoon, I decided to do some analysis.
-
- First, let me say that I already filter the 'from:' field to sort
- mail from subscribed lists and newsletters into appropriate folders.
- That reduces the mail volume in my general in-box considerably.
-
- I also filter mail from about ten individuals from whom I regularly
- expect to receive mail into a priority folder.
-
- That left 2,195 messages as "general" in-box material, or for the 213
- days, an average of 10.3 unclassified messages per day.
-
- Of these 2,195 messages, I had manually sorted out 715 "spam" messages,
- or roughly 32% of the total unclassified message traffic.
-
- It should be noted that on a 'number of bytes' basis, the percentage
- of "spam" is much larger, totally 3,385KB of 6,809KB, or 50%. This
- means that the average "spam" email is 4.74KB compared with the
- average "real" e-mail being only 2.31KB including headers. A very
- scary statistic.
-
- Having noticed that spammers are not only verbose, but have a propensity
- to use needless exclamation points in the subject line, I decided to
- see what would happen if I filtered out any email message from the
- unclassified message traffic which contained a "!" in the subject line.
-
- Of 715 spams, 262 messages were selected -- a detection rate of 37%.
-
- Of 1480 "real" messages, 75 were selected -- a false positive rate of
- only 5%.
-
- A further examination of the "false positives" showed that 22 of
- them related to the contact management software "ACT!" made by
- Symantec and about which I had been in correspondence with several
- other users at one point earlier in the year. Obviously, an
- unfortunate choice of product name.
-
- Another 20 messages were replies to subject lines containing "!"
- which I foolishly had originated myself, such as "Happy birthday!"
- and "thanks!" -- something I pledge never to do again.
-
- That brings random "false positives" to 33, or 2% which may or may not
- be an acceptable level to any particular email user.
-
- In summary, based upon my sample (your mileage may vary), just
- filtering for exclamation points intercepts 37% of incoming "spam"
- while erroneously intercepting only 2% of bona fide message traffic.
-
- Personally, manually trashing ten messages per day is not so onerous
- that I would risk losing 2% of my valid unclassified email. But it
- does provide some indication of how "intelligent" filtering might be
- possible under current circumstances.
-
- Unfortuantely, 'professional' spammers eventually will figure out the
- filtering algorithms much like professional tax advisors have figured
- out what provokes an electronic IRS audit flag, or how shrewd job
- applicants have figured out what will get their resumes flagged by
- personnel departments which use electronic scanning.
-
- Even so, most of the annoying amateur multi-level marketing and chain
- letter garbage is so stupidly constructed that taking it out of the
- mailstream should be relatively easy -- even though doing it at the
- end point remains a tremendously inefficient use of resources.
-
-
- Cheers,
-
- The Old Bear
-
- ------------------------------
-
- Date: Thu, 09 Oct 1997 09:01:18 -0700
- From: Jonathan Wallace <jw@bway.net>
- Subject: File 9--THE X-STOP FILES: The Truth Isn't Out There
-
- SLAC Bulletin, October 9, 1997
- -----------------------------
-
- The SLAC bulletin is a periodic mailer on Internet freedom of
- speech issues from the authors of Sex, Laws and Cyberspace (Henry
- Holt 1996). For more information, contact Jonathan Wallace,
- jw@bway.net, or visit our Web pages at
- http://www.spectacle.org/freespch/.
-
- THE X-STOP FILES: The Truth Isn't Out There
-
- by Seth Finkelstein
-
- So another censorware product has been found to secretly been
- blacklisting gay and lesbian material, anti-censorship sites, feminist
- resources and an incomprehensible scattershot collection of totally
- innocuous organizations. We can treat this as yet another "bad apple" in
- the endless search for the magic anti-porn program. Or we can use it as
- a basis for examining why such a program won't ever exist.
-
- A censorware blacklist seems to enjoy the enviable status of
- being assumed perfect until exposed as otherwise. Even though
- CyberSitter and NetNanny were caught banning the National Organization
- for Women, and CyberPatrol stigmatizes feminist discussion and
- electronic newspaper articles about gays as "Sexual Acts", every new
- expose of this type seems to follow a pattern. First, it is greeted with
- great surprise (and denial) by too many people. Then the company's
- public relations staff issues a weasel-worded press release of
- excuses. Finally, later, we are told that that particular program may
- have problems, but there's another one which is better, and the cycle
- begins anew.
-
- The X-stop case is notable not for what it was exposed to be
- banning in secret - that had a heavy helping of the usual suspects who
- fare badly under any sort of blacklisting. But the significance lies in
- that the claims it made were such an egregious example of statements
- which were dubious to ludicrous, yet were frequently uncritically
- repeated in debate. Journalists would not dream of, say, gullibly
- accepting a politician's claim that no campaign actions violated
- controlling legal authority even though all records are secret and
- would not be disclosed, but the outlandish propaganda of
- censorware-touters is too often parroted without the slightest
- skepticism (this isn't restricted to X-Stop, others such as BESS,
- Websense, etc. have received similar build-ups, and are now starting
- along the cycle of exposure described above).
-
- Just to start, X-stop's marketers made a prominent assertion
- that their censorware had a blacklist which contained only entries for
- material which is obscene according to the _Miller_ standard (a
- definition set out by the Supreme Court). Note this is not a vague
- claim about "pornography", which is a broad and hard to pin down term,
- but a very strong statement about a legal standard. Obscenity is a
- legal terms of art. A complex test must be met, and it is a difficult
- judicial determination. All material is initially presumed non-obscene
- until such a ruling. Moreover, obscenity is not a constant, not an
- intrinsic property, but a geographic variable. It varies from place to
- place, that is the "community standards" part of the _Miller_ test
- (note this prong is typically greatly overemphasized by people trying
- to suppress material, it's just one aspect of a highly involved
- determination).
-
- Just from this, it should be obvious that either X-Stop was
- lying, or it was a *very* small list. No great knowledge is required,
- just basic understanding of the meaning of the terms in the claim. And
- such a list would be unlikely to please many censorware advocates. For
- example, explicit safer-sex educational information, a frequent
- subject of controversy, wouldn't be obscene.
-
- Perhaps someone wants to be generous, and rewrite X-Stop's claim
- into something such as "likely to be obscene somewhere in the country".
- This would still be a near-impossible task to list with any significant
- coverage of the net. There are so many sites on the Internet, all
- changing so rapidly, that it would require an army of censors to even
- try to keep up in evaluating them. And people who have some knowledge of
- how to make a legal determination typically aren't working for minimum
- wage.
-
- X-Stop's answer to the above barrier was the "Mudcrawler"
- searching program. However, for a computer program to have any sort of
- ability to apply a complex legal standard would be an
- artificial-intelligence breakthrough of Nobel Prize magnitude. It hardly
- will be the technology of a little company making blacklists. While
- this perhaps isn't obvious to the general public, it should be clear to
- anyone with the most minimal familiarity with technical issues.
-
- Yet with all of this pointing to the near-impossibility of
- X-Stop's claims, they passed very much unchallenged. The lesson here
- isn't "another bad blocker". It is rather how easy it is for even the
- most absurd censorware public-relations fluff to be taken seriously,
- while the truth is far different. And that whenever censor-minded people
- are given free reign to ban with secret blacklists, no matter what they
- say in public, in reality they also target their traditional enemies -
- feminists, gays and lesbians, anti-censorship sites, and so on.
-
- ----------------------------------------------------
- Seth Finkelstein is a software developer who takes a
- particular interest in censorware and ratings systems.
- His Web pages on the subject are at
- http://www.mit.edu/activities/safe/labeling/summary.html.
-
-
- ---------------------------------------
- Jonathan Wallace
- The Ethical Spectacle http://www.spectacle.org
- Co-author, Sex, Laws and Cyberspace http://www.spectacle.org/freespch/
-
- "We must be the change we wish to see in the world."--Gandhi
-
- ------------------------------
-
- Date: Thu, 09 Oct 1997 20:31:49 -0400
- From: "Evian S. Sim" <evian@escape.com>
- Subject: File 10--Mitnick Trial Date Set
-
- October 8, 1997
-
- By DAVID HOUSTON
- City News Service
-
- LOS ANGELES (CNS) - A federal judge today seemed to back away
- from her earlier promise not to let famed hacker Kevin Mitnick
- anywhere near a computer to prepare for his trial.
-
- Mitnick attorney Donald Randolph told U.S. District Judge Mariana
- Pfaelzer there are potentially millions of documents on databases
- that could take hundreds of hours to inspect and read.
-
- Assistant U.S. Attorney David Schindler said if all the documents
- were printed it would fill up a larger space than the courtroom.
-
- Reluctantly, the judge seemed to warm to the idea of allowing the
- defendant to use a computer. She told Randolph to confer with
- prosecutors to find the best way for Mitnick to view evidence
- against him.
-
- But Pfaelzer warned: "I'm not going to have a whole succession
- of unfortunate events to take place because while he was
- incarcerated we gave him access to a computer."
-
- Randolph wants Mitnick to be allowed to use a laptop computer,
- under supervision, at the federal Metropolitan Detention Center.
- He promised the computer would be modem-less, to prevent Mitnick
- from wreaking the kind of havoc he has done in the past.
-
- Mitnick was on parole for other computer-related offenses when he
- and co-defendant Lewis DePayne went on a 1992-95 hacking spree.
-
- According to a 25-count federal indictment, Mitnick and DePayne
- stole millions of dollars in software from high-tech companies,
- damaged USC computers and used stolen computer passwords.
-
- DePayne, who is not in custody, did not show up in court today.
- Attorney Richard Sherman said his client was in San Francisco.
- Pfaelzer's comments came during a trial date-setting status
- conference.
-
- The judge tentatively set trial for April 14. But Randolph
- warned that it might have to be pushed back if it takes longer
- than expected to view the computer-held evidence.
-
- "I'm told it could take more than 200 hours to look at all the
- stuff that is there," he said.
-
- Earlier this year, Pfaelzer told Randolph "no way, no how" would
- she allow the habitual hacker access to another computer.
-
- Pfaelzer has good reason to be leery of Mitnick.
-
- He has been before her several times for different,
- computer-related offenses. In June, she gave him 22 months
- behind bars for violating his parole and breaking into Pacific
- Bell's computers.
-
- The judge also chastised Randolph for the amount of bills he has
- submitted to the court for Mitnick's defense---particularly for
- computer experts. Mitnick has no money and the government is
- paying the legal bills.
-
- "I've rarely ever seen bills that high. I'm absolutely stunned
- at what those bills look like," she said. "If you think you're
- going to have an unlimited budget, you're wrong."
-
- ------------------------------
-
- Date: Thu, 7 May 1997 22:51:01 CST
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 11--Cu Digest Header Info (unchanged since 7 May, 1997)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send post with this in the "Subject:: line:
-
- SUBSCRIBE CU-DIGEST
- Send the message to: cu-digest-request@weber.ucsd.edu
-
- DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
-
- The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CU-DIGEST
- Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- In ITALY: ZERO! BBS: +39-11-6507540
-
- UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
- Web-accessible from: http://www.etext.org/CuD/CuD/
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #9.73
- ************************************
-
-
-