home *** CD-ROM | disk | FTP | other *** search
- ┌──────────────────┐ ╔═══════════════════════════════╗ ┌──────────────────┐
- │ Founded By: │ ║ Network Information Access ║ │ Other World BBS │
- │ Guardian Of Time ├─╢ 09OCT90 ║─┤ Txt Files Only! │
- │ Judge Dredd │ ║ Guardian Of Time ║ │ See EOF If Any ? │
- └────────┬─────────┘ ║ File 57 ║ └─────────┬────────┘
- │ ╚═══════════════════════════════╝ │
- │ ╔═══════════════════════════╗ │
- └──────────────╢The Network Thought Machine║────────────┘
- ╚═══════════════════════════╝
-
- These past few months have been interesting with everything dealing from our
- own deficit down to the meeting of NIA's Creators. Well during this great
- time, I've been collecting some files. I had planned on making a series,
- but I figured that I better get something out, since it has been sometime.
-
- ----NIA----NIA----NIA----NIA----
-
- "Ethical Standards By Louis Howell"
-
- The lack of a consensus on ethical standards among computer users is
- serious, but even if one existed I'm not sure how much effect it would
- have on law enforcement, the media, and the public in general, who
- wouldn't know what we were talking about. The destructive hackers would
- continue to get all the attention and thus color people's opinions of
- the whole community. All the agreement in the world won't help if the
- regulations are being written by outsiders who don't know what they are
- doing.
-
- For example, our society still has not come up with any consistent way
- to put a value on information. Copyright and patent laws have been
- tailored to the corporate arena, where typical infractions are large
- enough to merit serious penalties, the legal costs are minor compared
- to the other sums involved, and no lives are ruined in the process.
- Attempts to apply this legal system to individuals and small software
- sweatshops appears to be the moral equivalent of correcting a wayward
- child by swatting him over the head with a 2-by-4.
-
- In the recent Bell South fiasco, the company apparently put a value on
- the stolen 911 document roughly equivalent to the entire cost of
- producing it. This strikes me as completely absurd, since only a copy
- was made---Bell South did not lose the use of the document or suffer
- any other financial loss as a result of the incident. If you go by
- some kind of "fair market value" criterion, the value would be closer
- to that of a paperback book. Even if trade secrets were involved, as
- was originally thought, it still seems unfair to charge a thief with
- the cost of the entire development project. Some kind of lost revenue
- standard seems more reasonable, but computing it could be a legal
- nightmare.
-
- For an item that is on the market, even valuing the information at
- market value may not be appropriate. To be specific, suppose some
- software company spends about $100,000 to write a great C compiler.
- They put it on the market for $1000, and it sells. Now suppose some
- high school hacker manages to snarf a copy of this compiler for his
- own personal use. He gets caught, and is charged with stealing it.
- What now is the value of the object he has stolen (which can make a
- big difference in court)? To say $100,000 is absurd, since the
- company still has the compiler. Even $1000 may be too high, though.
- The company has not lost $1000 in revenue because there is no way
- the kid could have afforded to buy the program. If he couldn't
- steal it, he still wouldn't have bought it, so the effect on the
- company is the same as if he had done nothing at all! If the company
- loses nothing, is it not better that the kid have the use of the
- best tools for his work?
-
- This argument won't work for any tangible object. If a crook steals
- a diamond ring, it is silly to argue that he would not have otherwise
- bought it, since there is still a real diamond ring missing. With
- information theft, though, it's hard to say that anyone really loses.
-
- I'm not seriously suggesting that this type of software theft should
- be legal, since then there would be no way for the company to recoup
- its investment. There is no practical way to implement a socialist
- "welfare distribution" system, since even those who could pay would
- find it easy to obtain free copies of anything. The trouble is in
- trying to couple an economy of tangible goods that are expensive to
- reproduce with one of intangible goods that can be reproduced for
- almost nothing. It's a tough problem, and I don't claim to have a
- pat answer.
-
- On the other hand, in my example the fact does remain that no one was
- hurt. The offense strikes me as more comparable to a minor case of
- shoplifting than to the theft of a tangible $1000 object. I certainly
- wouldn't call it a felony, and seriously damaging the career of such
- a talented kid would probably be a net harm to society. I propose that
- the appropriate penalty be just enough to "teach the kid a lesson",
- but no more.
-
- Any thoughts? Just how much SHOULD information be worth?
- --
- Louis Howell
-
- "A few sums!" retorted Martens, with a trace of his old spirit. "A major
- navigational change, like the one needed to break us away from the comet
- and put us on an orbit to Earth, involves about a hundred thousand separate
- calculations. Even the computer needs several minutes for the job."
-
- ----NIA----NIA----NIA----NIA----
-
- "BBS's And The Law By John McCarthy
-
- In my opinion, electronic bulletin boards will be classed as
- publications entitled to First Amendment protection. I think
- the courts will do it even if Congress and states make laws
- to the contrary. However, it won't be really effective until
- there is a major court case. I hope CPSR will use their
- grant to mount such a case as soon as a suitable case can
- be found.
-
- I base this opinion on the Stanford University case of rec.humor.funny.
- Early in 1989, Robert Street, Vice-President for Information and
- Professor of Civil Engineering, decided to delete r.h.f from
- the computers under his jurisdiction. He had his underlings
- take responsibility. The story is long and perhaps interesting,
- but I'll condense. There were petitions, and the President, Donald
- Kennedy, referred the matter to the Academic Senate which
- referred it to its Steering Committee to come up with a
- recommendation.
-
- Now here's the point relevant to my opinion in the first paragraph.
- When I visited President Kennedy, he supposed the Senate Steering
- Committee would refer the matter to the Committee on Research, and
- said he didn't accept my "metaphor" of the newsgroup files as a
- library. I think most of the world's officials are in the same state
- Kennedy was. Electronic bulletin boards and newsgroups are vague
- hitech things rather than publications.
-
- This caused me to think, and I decided to make the point that
- "library" wasn't a metaphor but a fact. The Steering Committee
- accepted that idea and referred the issue to the Committee on
- Libraries. At that point the battle was essentially won.
-
- The Committee on Libraries opined that the same principles
- applied to electronic libraries as to paper libraries -
- universality tempered only by budget. The Steering Committee
- accepted the recommendation and asked the Vice-President for
- Information whether preferred to back down or have a Senate
- discussion. He backed down, and we haven't had trouble since.
-
- Note that the whole matter was fought out in the absence of
- specific complaints about jokes in r.h.f and ignoring the
- fact that there are plenty of newsgroups with material far
- more likely to offend than anything Brad Templeton lets by.
-
- In short before you can get a good decision, you have to get
- them to pay attention, and "them" is the courts, and a lawsuit
- is required.
-
- ----NIA----NIA----NIA----NIA----
-
- "Best Evidence"
-
- As far as I can see, no-one actually answered Gene Spafford's question
- about whether the law sees a difference between the New York Times
- and a basement produced sheet. I have never heard of such a difference
- being argued in a censorship case. The legal movement has been in
- the direction off erasing differences. For example, advertisements
- have been granted First Amendment protection to some extent.
-
- Concerning "best evidence". There obviously needs to be some
- compromise here between keeping evidence and letting someone
- get on with his work. There are several possibilities.
-
- 1. A person's disk could be printed and he could stipulate via
- his lawyer that the printout was correct. Then he could have
- his disk back. When facts are stipulated by the prosecution
- and defense, judges permit reneging on the stipulation only
- in exceptional cases.
-
- 2. He could have a right to a copy of the confiscated files.
-
- 3. If his computer was an IBM PC XT, this could be stipulated,
- and he could get his computer back. Any PC XT or the documentation
- of the PC XT would be acceptable evidence if he should destroy
- the one he got back.
-
- I believe courts would support such compromises on the grounds
- that refusal by prosecutors to make them would constitute
- "unreasonable search and seizure".
-
- ----NIA----NIA----NIA----NIA----
-
- "Laws And Possible Ideas By Mike"
-
- >
- >Mike, how can the contents of a hard disk be printed in a way that meets
- >this definition? I'm not thinking of ASCII files, which obviously
- >present no problem. I suppose dBASE files and spreadsheet commands can
- >be printed using their internal print commands. But what about .EXE
- >files and similar binary stuff?
-
- Well, let me note first of all that in most of the seizures I know
- about, it's been the text files that have been of primary interest to
- law-enforcement folks.
-
- But let's say they want to prove software piracy. Since the rules
- of evidence allow some kinds of duplicates to be considered, in
- effect, originals, and other kinds of duplicates to be just as
- admissible as originals, the logical thing to do, it seems to me,
- would be to have the government witness download binary files from
- the system in question, then run it on her own system or on the
- government's. That should be testimony sufficient to persuade a
- jury that software theft was going on.
-
- The problem is, neither the issues nor the procedures have been
- hammered out yet. There may be cases we haven't anticipated, and
- the procedures err on the side of inclusiveness precisely because
- the law-enforcement establishment is so hazy on what the legal
- and social issues are.
-
- >Does this definition include ordinary photocopies as duplicates?
-
- Yes.
-
- >I understand handwritten copies are not "duplicates" as defined above,
- >but are they completely invalid or valid only when nothing better is
- >available?
-
- The latter.
-
- >> Rule 1003. Admissibility of Duplicates.
- >> [This is the rule Spafford hasn't heard of.]
- >> A duplicate is admissible to the same extent as an original unless
- >> (1) a genuine question is raised
- >
- >Presumably as opposed to a frivolous question, just to delay things?
-
- Right. Judges know when the challenge is frivolous.
-
- >> as to the authenticity of the original
- > ^^^^^^^^
- >Shouldn't that be duplicate?
-
- No. This clause applies, I think, to cases in which it is not the document's
- contents but the document's authenticity that is in question. (E.g., the
- Howard Hughes will that left money to Melvin Dummar.)
-
- >> or (2) in the circumstances it would be unfair to admit the duplicate
- >> in lieu of the original.
- >
- >I'm curious--couldd you give an example of (2)?
-
- Not offhand. It may be that the drafters had no particular example in mind,
- but wanted to leave an out in the event that an obvious unfairness came
- along.
-
- >> It is also believed that any pressure brought to bear on the defendant
- >> provides additional motivation for plea bargains.
- >
- >Seems like one of the many unfair parts of RICO, that it
- >institutionalizes seizure onm indictment. And the seizure itself may
- >work irretrievable harm, even if the defendant is found innocent and the
- >property ultimately restored.
-
- You'll find no disagreement here on that score.
-
- -Mike
-
- ----NIA----NIA----NIA----NIA----
-
- GUBERNATORIAL CANDIDATE SUPPORTS ELECTRONIC FREEDOM & PRIVACY
-
- Folks, we have a good chance of having a **State Governor** who
- (a) understands and favors technology, and -- more important --
- (b) has signed and released the following statement (he just faxUed
- a signed copy to me; IUll fax it to anyone who requests it).
- -- Jim Warren, 9/16/90 [jwarren@well.sf.ca.us, or 415-851-7075/voice]
-
- STATEMENT BY JIM GALLAWAY, CANDIDATE FOR GOVERNOR OF NEVADA
-
- I am the Republican candidate for Governor of the State of
- Nevada. I have been in the private telecomm industry for most of
- 20 years, and have been a principal in several telecomm and
- computer start-ups. I understand, support, and have practiced
- technological innovation.
- My wife and I have known Jim Warren for well over a decade. He
- has outlined some of the current issues about which owners and
- users of systems for e-mail, BBS, teleconferencing, electronic
- publishing and personal computing are deeply concerned.
-
- These are my positions, relative to some of the recent law
- enforcement practices by some government agents:
- 1. Government responses to alleged misdemeanors and crimes must
- be no more than comparable to the seriousness of the wrong-doings.
- 2. Simple electronic trespass without harm must be treated as
- any other simple trespass. It does not justify armed raids on teenagers,
- forced entry of private homes, nor seizure of telephone
- handsets, answering machines, computer printers, published
- documentation, audio tapes and the like.
- 3. The notion that equipment can be RarrestedS and held
- inaccessible to its owner, without promptly charging the owner with
- a crime, is absolutely unacceptable. The practice of holding
- seized equipment and data for months or years is a serious penalty
- that must be imposed only by a court of law and only after a fair
- and public hearing and judicial finding of guilt.
- 4. Teleconferencing and BBS systems must have the same
- protections against suppression, prior restraint, search or seizure
- as do newspapers, printing presses and public meeting places.
- 5. The contents of electronic-mail and of confidential or
- closed teleconferencing exchanges must have the same protections
- against surveillance or seizure as does First Class Mail in a U.S.
- Post Office, and private discussions among a group in a home or boardroom.
-
- As Governor of the State of Nevada I will vigorously support all
- of these positions -- both statewide and nationally.
- /s/ Jim Gallaway, candidate for the Governor of Nevada
-
- [Please post & circulate]
-
- ----NIA----NIA----NIA----NIA----
-
- "Nelson's Canons: A Bill Of Information Rights"
-
-
- Amelia's news system is totally trashed for a while. Back to eos.
- You might notice that rule #6 is missing. I went back to the copy of
- Computer Lib/Dream Machines and that rule is missing there. [Obvious
- references to the Monty-Python philosophers sketech, noted.] Here is
- Nelson's Canon as promise to the net and Ted himself.
- --enm
- -----
-
- 1. EASY AND ARBITRARY FRONT ENDS.
- 2. SMOOTH AND RAPID DATA ACCESS.
- 3. RICH DATA FACILITIES.
- 4. RICH DATA SERVICES BASED ON THESE STRUCTURES.
- 5. "FREEDOM FROM SPYING AND SABOTAGE"
- 7. COPYRIGHT.
-
- 1. EASY AND ARBITRARY FRONT ENDS.
- THE TEN-MINUTE RULE
- TEXT MUST MOVE.
-
- 2. SMOOTH AND RAPID DATA ACCESS.
- FREEDOM OF ROVING.
-
- 3. RICH DATA FACILITIES.
- 4. RICH DATA SERVICES BASED ON THESE STRUCTURES.
- A. ANTHOLOGICAL FREEDOM.
- B. STEP-OUT WINDOWING.
- C. DISANTHOLOGIAL FREEDOM.
-
- 5. "FREEDOM FROM SPYING AND SABOTAGE."
- FREEDOM FROM BEING MONITORED.
- FIDUCIAL SYSTEM FOR TELLING WHICH VERSION IS AUTHENTIC.
-
- 7. COPYRIGHT.
-
- It is essential to state these firmly and publically, because you are
- going to see a lot of systems in the near future that proport to be
- the last-word cat's-pajama systems to bring you "all the information
- you need any time, anywhere." Unless you thought about it you may be
- snowed by systems which are inherently and deeply limiting. Here are
- some of the things which I think we all want. (The salesman for the
- other system will say they are impossible, or "We don't know how to do
- that yet." the standard put down. But these things are possible, if we
- design them in from the bottom up, and there are many different valid
- approaches which could bring these thing into being.)
-
- These are rules, derived from common sense and uncommon concern, about
- what people can and should have in general screen systems, systems to
- read from.
-
- 1. EASY AND ARBITRARY FRONT ENDS.
-
- The "front-end" of a system -- that is, the program that creates the
- presentations for the user and interacts with him -- must be clear and
- simple to use and understand.
-
- THE TEN-MINUTE RULE. Any system which cannot be well taught to a
- laymen in ten minutes, by a tutor in their presence of a responding
- setup, is too complicated. This may sound far too stringent; I think
- not. Rich and powerful systems maybe given front ends which are
- nonetheless ridiculously clear; this is a design problem of the
- foremost importance.
-
- TEXT MUST MOVE, that is, slide on the screen when the user moves
- forward or backward within the text he is reading. The alternative,
- to clear the screen and lay out a new presentation, is baffling to the
- eye and thoroughly disorienting, even with practice.
-
- Many computer people do not yet understand the necessity of this. The
- problem is that if the screen is cleared, and something new then
- appears on it, there is no visual way to tell when their new thing
- came from: sequence and structure become baffling. Having it slide
- on the screen allows you to understand where you've been and where you
- are going; a feeling you also get from turning pages of a book. (Some
- close substitutes may be possible on some types of screen.
-
- On front ends supplied to normal users, there must be no explicit
- computer languages requiring input control strings, no visible
- esoteric symbols. Graphical control structures having clarity and
- safety, or very clear task oriented keyboards, are among the prime
- alternatives.
-
- All operations must be fail-safe.
-
- Arbitrary front ends must be attachable: since we are talking about
- from text, or text-and-picture complexes, stores on a large data
- system, the presentation front end must be separatable from the data
- services provided further down in the system, so the user may attach
- his own front-end system, his own styles of operation and his own
- private conveniences for roving, editing and other forms of work or
- play at the screen.
-
- 2. SMOOTH AND RAPID DATA ACCESS.
-
- The system must be built to make possible fast and arbitrary access to
- a potentially huge data base, allowing extremely large files (at least
- into the billions of characters). However, the system should be
- contrived to allow you to read forward, back, or across links without
- substantial hesitation. Such access must be implicit, not requiring
- knowledge of where things are physically stored or what the interest
- file names may happen to be. File divisions must be invisible to the
- user in all his roving operations (FREEDOM OF ROVING): boundaries must
- be invisible in the final presentations, and the user must not need to
- know about them.
-
- 3. RICH DATA FACILITIES.
-
- Arbitrary linkages must be possible between portions of text, or text
- and pictures; annotation of anything must be provided for;
- collateration should be a standard facility, between any pair of
- well-defined objects: PLACEMARK facilities must be allowed to drop
- anchor at, or in anything. These features imply private annotations
- to publicity-accessible materials as a standard automatic service
- mode.
-
- 4. RICH DATA SERVICES BASED ON THESE STRUCTURES.
-
- The user must be allowed multiple rovers (movable placemarks at
- points of current activity); making possible, especially, multiple
- windows (to the location of each rover) with displays of collateral
- links.
-
- The system should also have provision for high-level mooting and the
- automatic keeping of historical trails.
-
- Then, a complex of certain very necessary and very powerful facilities
- based on these things, viz.:
-
- A. ANTHOLOGICAL FREEDOM: the user must be able to combine easily
- anything he finds into an "anthology," a rovable collection of these
- materials having the structure he wants. The linkage information for
- such anthologies must be separately transportable and passable between
- users.
-
- B. STEP-OUT WINDOWING: from a place in such an anthology, the user
- must be able to step out of the anthology and into the previous
- context of the material. For instance, if he has just read a
- quotation, he should be able to have the present anthological context
- dissolve around the quotation (while it stays on the screen), and the
- original context reappear around it. The need for this in a
- scholarship should be obvious.
-
- C. DISANTHOLOGIAL FREEDOM: the user must be able to step out of an
- anthology in such a way and not return if he chooses. (This has
- important implications for what must also really be happening in the
- file structure.)
-
- Earlier versions of public documents must be retained, as users will
- have linked to them.
-
- However, where possible, linkages must also be able to survive
- revisions of one or both objects.
-
- 5. "FREEDOM FROM SPYING AND SABOTAGE."
- The assumption must be made at the outset of a wicked and malevolent
- governmental authority . If such a situation does not develop, well
- and good; if it does, the system will have a few minimal safeguards
- built in.
-
- FREEDOM FROM BEING MONITORED. The use of pseudonyms and dummy
- accounts by individuals, as well as the omission of certain
- record-keeping by the system program, are necessary here. File
- retention under dummy accounts is also required.
-
- Because of the danger of file sabotage, and the private at-home
- retention by individuals of files that also exist on public systems,
- it is necessary to have FIDUCIAL SYSTEM FOR TELLING WHICH VERSION IS
- AUTHENTIC. The doctoring of on-line documents, the rewriting of
- history--cf. both Winston Smith's continuous revision of the
- encyclopedia in Nineteen Eighty-Four and "The White House"-- is a
- constant danger. Thus our systems must have a number of complex
- provisions for verification of falsification, especially the creation
- of multilevel fiducials (parity systems), and their storage must be
- localizible and separate to small parts of files.
-
- 7. COPYRIGHT.
-
- Copyright must of course be retained, but a universal flexible rule
- has to be worked out, permitting material to be transmitted and copied
- under specific circumstances for the payment of a royality fee,
- surcharges on top of your other expenses in using the system.
-
- For any individual section of material, such a royality should have a
- maximum: i.e., " by now you've bought it."
-
- Varying royalty rates, however, should be the arbitrary choice of the
- copyright holder: except that royalities should not varying sharply
- locally within a tissue of material. On public screens, moving
- between areas of different royalties cost must be sharply marked.
-
- ----NIA----NIA----NIA----NIA----
-
- "Sex And Networks By Jef"
-
- >Remember the Abernathy article in the Houston Chronicle?
- >
- >I think the after-effects have hit home! I just received notice that
- >all non-academic news-feeds (that's me) can no longer receive
- >alt.sex.anything. In order to "justify" this policy, the facilities
- >director decided to cut ALL alt.whatever from outside users of usenet
- >here at IU.
- >
- >reason than to buy time before their local thought police overstep
- >their bounds!
- >
-
- Well at PSUVM they also cut all alt.sex.*. Thier justifcation was as I
- understand it 'Interstate transportation of pornographic material.'
-
- - Jef
-
- 'Freedom is irrelevant. Self-determination is irrelevant...Death is irrelevant."
- - The Borg
-
- ----NIA----NIA----NIA----NIA----
-
- "Secret Service By John Moore"
-
- ]I've been informed that there's some text missing from this story;
- ]the following is a corrected version.
-
- I have a number of reactions to Len Rose's story.
-
- The first is that the SS is really over-reacting to this situation.
- Len was treated just as badly as a mugger or rapist, and yet was
- at most (if he is to be believed) guilty of bad judgement and
- some property ownership violations best settled with civil
- law. It's a shame that the lords of the 1st amendment (the
- mass media) are collaborators in this brutal assault on the
- first amendment rights of computer users.
-
- The second is if you have proprietary source code, you cannot complain
- if you get hassled in some way (although the SS police state tactics
- were way out of line). It is just not smart, in this day of computer
- "crime" hysteria, to have anything you shouldn't have. On the other hand,
- when I was young (and enough years ago - 20 - that the statute of limitations
- has LONG past), a group of us did some university hacking and ourselves
- had proprietary source of an OS (now defunct), so I understand the
- urge. In fact, at the time it was the only way of learning about OS
- construction. That is no longer true.
-
- The third is that Len was really naive about how to act when accosted
- by the law. Even if one is COMPLETELY innocent, the best thing to do is
- to shut up and say nothing until your attorney is present. Len really blew
- it by trying to be cooperative. The people behind this jihad are just
- going to take advantage of such cooperation.
-
- The fourth is that we are going to have to get some sanity into this whole
- issue. If someone vandalizes a computer, they should be treated like
- vandals, not murderers (and I hope they go to jail for that vandalism!).
- If they trespass in a computer, they should be treated like trespassers.
- If data is "stolen," its owners shouldn't claim that the "thief"
- took away from them whatever it cost to make the data. After all, the
- owners still have it, and unless the data is used competitively against
- them, they really suffered no dollar cost at all. I hold AT&T to blame
- for some of this mess! Their allegations, in various cases, of huge
- thefts just serve to inflame the situation. I would be ashamed to
- work for AT&T as a software engineer! Yes - one shouldn't steal AT&T
- source code or marketing documents. But, a computer hacker who grabbed
- a source of Unix for his own use didn't steal $20,000,000,000 as was
- alleged in one case - he stole $1000 or so (unless he distributes that
- source code). It is more akin to theft of service (a 'la cable TV fame)
- than theft of property.
- --
- John Moore
-
- ----NIA----NIA----NIA----NIA----
-
- "Secret Service By Dr. Roger Rabbit"
-
- In article <3108@mindlink.UUCP> a80@mindlink.UUCP (Greg Goss) writes:
- }> rabbit@hyprion.ddmi.com writes:
- }>
- }> In article <11608@medusa.cs.purdue.edu> spaf@cs.purdue.edu (Gene You know - I
- }> wonder why the SS just doesn't get a computer expert to
- }> come with them to the site of the raid and duplicate the hard drive
- }> contents? Why do they need to take someone's machine?? ... And, I DON'T
- }>
- }
- }There are too many "tricks" to hide information.
- }
- }You mentioned Poland. One of the solidarity tricks was to circulate a floppy
- }with some report on tractor production or something boring on it. Then you
- }take Norton and unerase a file with some innocuous name and read the
- }newsletter. Then you erase it again and pass it on.
- }
- [Other tricks mentioned]
-
- Thats why I said that they should send someone in to look at the machine.
- Give the owner of the machine a choice: "Either you let this expert take
- as much time looking at your machine as he deems neccessary, or we take
- it away." That would seem to me to be the more reasonable approach to take
- in an "innocent until proven guilty" system.
-
- I personaly beleive that the SS confiscations are an attempt to bypass
- Due Process in order to punish those that they think are guilty. Perhaps
- they don't have enough evidence for an indictment, perhaps they don't want
- to spend the $$$ for a trial - whatever. In any event, the government is
- pissing on The Constitution and I don't like it a bit. (Yes - I have
- already written lengthy letters to my US Reps and Senators about this.)
-
- By the way - could someone E-MAIL me the address of the EFF so that I
- can get more involved in their organization. We had better take back our
- rights before it becomes neccessary to use guns to do so.
-
- --
- >>> BAN: Nuclear Power, US Intervention in South America, Toxic Waste
- >>> (Including dip) Trash Incinerators, Nuclear Weapons, Poverty,
- >>> Racism, Sexism, Specieism, etc... Write to: Toons for a Better World,
- >>> 2001 Yatza St., Toontown, CA 90128 E-MAIL: rabbit@hyprion.ddmi.com
-
- ----NIA----NIA----NIA----NIA----
-
- "SS And YOU By Mike"
-
- Brian Yamauchi writes:
-
- >Perhaps some net.legal.expert can answer a question -- can Steve Jackson
- >(and other victims) sue the SS (and other agencies) for his losses? If
- >he does, what are his chances (assuming he and his employees are not
- >charged/convicted)?
-
- Based on what we currently know about the warrant, the chances are
- not very good. In general, the Federal Tort Claims Act bars actions
- against law-enforcement agents and agencies that cause harm to individuals
- while executing a lawful warrant. For a cause of action to accrue
- against, say, the Secret Service, it would have to be shown that the
- SS went beyond the authorization of the search warrant when they sought
- and seized all that property and paper and Steve Jackson Games.
-
- Now, the warrant was sealed, which means that few people have had
- access to the warrant itself and therefore few can say whether the
- language of the warrant has been overstepped. But since very broad
- search warrants have been held to be lawful in the past, I think the
- odds are fairly poor that Steve Jackson Games will recover in tort
- against the federal government.
-
- It's still possible, however, that we may all be surprised on that
- issue.
-
- --Mike
-
- Mike Godwin, UT Law School |"If the doors of perception were cleansed
- mnemonic@ccwf.cc.utexas.edu | every thing would appear to man as it is,
- (512) 346-4190 | infinite."
- | --Blake
-
- ----NIA----NIA----NIA----NIA----
-
- "TO TRACE OR NOT TO TRACE"
-
- Take apart the phone and look for any devices that might be home-made or
- contain their own batteries etc etc,
- Contact the CuD and ask for plans for an Icon box, make it yourself
- Call the phone company and tell them to stop tracing your line.
- Check the back of Radio Electronics magazine, look for small adds from
- FBN companies, there is usually something there.
-
- If none of these work, then you are probably better off not knowing if
- your line is being traced or not.
-
- ----NIA----NIA----NIA----NIA----
-
- "To Trace Or Not To Trace II By Tim Maroney"
-
- >Take apart the phone and look for any devices that might be home-made or
- >contain their own batteries etc etc,
-
- More likely is that anything like a universal bug would be attached to
- the wall near the home phone switching board, probably in a separate
- plastic box labelled "phone company property -- do not open" or
- something similar. A universal bug is a particularly nasty little toy
- that allows the phone microphone to be used as a general-purpose sonic
- bug when the phone is on hook.
- --
- Tim Maroney, Mac Software Consultant, sun!hoptoad!tim, tim@toad.com
-
- FROM THE FOOL FILE:
- "Yet another piece of evidence that it's a Communist society which is being
- presented as good, but which we probably would not want to live in."
- -- Ken Arromdee on rec.arts.startrek, on the Federation's Red Menace
-
- ----NIA----NIA----NIA----NIA----
-
- "Drug Of The Government By Dr. Roger Rabbit"
-
- }
- } If the (relatively few) criminals manage to create
- } an atmosphere of fear and cause basic rights and our
- } ability to do business to be under attack THEN THE
- } CRIMINALS HAVE ALSO WON!
- }
-
- RIGHT!
-
- }
- }In the former case, we can take care and learn how to protect
- }ourselves from, what we hope remains, a small minority of
- }irresponsible or malicious people, random chance.
- }
-
- Like I've always said - government is a drug which people use as a
- (perceived) easy way out of some predicament. Some criminals start
- harming people and we immediatly cry to the government to solve the
- problem instead of taking care of the matter ourselves (ie: tightening
- up our system security, etc).
-
- Just like drugs, government never really solves any problems but (at
- best) provides some temporary solution or the *ILLUSION* of a solution
- (ie: the rhetoric that the SS is putting out about "taking a substantial
- bite out of computer crime).
-
- One day the "drug" addict wakes up and finds that he has more problems
- than he can handle. His life is totally out of control and he can do
- nothing for himself. He is addicted to the "drug" of government.
-
- What price is he paying? 1> He now lacks any will or ability to solve
- problems for himself. 2> He has signed away all of his Constitutional
- Rights to the government.
-
- This is one of the basic problems that I see in society today - the
- lack of community initiative in solving problems at the grass roots
- level. In the "olden days" (ie: before FDR), people solved problems
- on their own in communities - they did not ask for a hulking, inhumane
- bureaucracy to do it for them. They picked up valuable skills which
- made them better people. This is what is wrong with today's society-
- people are too lazy or scared to take the initiative and the government
- is all too eager to "help" out, while in the process, slowly dismatling
- the Constitution.
-
- }In the latter case, we are all under attack and the govt is acting as
- }a pervasive agent in all our lives, we can't defend against that by
- }putting "bars on the windows" etc., when the govt knocks to take our
- }systems we have to let them in the front door.
- }
-
- Thats why I said in one of my previous postings that I would rather
- deal with the threat of some hacker busting into my system than to
- feel "safe" with the government "protecting" me.
-
- }
- }Even being exonerated in the end would be an almost useless outcome,
- }swell, they destroyed my business and my career but I should be
- }thankful they didn't send me to jail?
- }
- } THE CURRENT ATMOSPHERE OF FEAR MUST BE STOPPED!!!
- }
- Yes - but the problem is that there are very few people who 1> Are
- smart/interested enough to really care and 2> would be willing to
- risk their neck in the fight. I really don't see a solution to this
- "constitution-bashing", although I won't give up.
-
- }Consider this a cry of anguish, pain and anxiety from a fellow
- }citizen.
- }
-
- Add my voice to that cry of anguish and pain. I really wonder what this
- country will be like in, say the year 2020. I don't want to think about
- it.
-
- Dr. Rabbit says "THINK - JUST DO IT"
-
- --
- >>> BAN: Nuclear Power, US Intervention in South America, Toxic Waste
- >>> (Including dip) Trash Incinerators, Nuclear Weapons, Poverty,
- >>> Racism, Sexism, Specieism, etc... Write to: Toons for a Better World,
- >>> 2001 Yatza St., Toontown, CA 90128 E-MAIL: rabbit@hyprion.ddmi.com
-
- ----NIA----NIA----NIA----NIA----
-
- "Screaming First Or Sundevil? By ICEMAN"
-
- Perhaps someone can help clarify to me what the SS hopes to
- achieve with Operation "Screaming Fist" (oops, that was Gibson;
- I guess I mean "SunDevil", or maybe :-) "Poorly lubricated Fist")
-
- a) The secret service must surely know that the main threat of computer
- crime does not come from the 18-year-olds but from the professional
- crackers who get paid loads of money to raid corporate information
- systems, just like the majority of "normal" crime is not the 12-year
- olds who do doorbell-ditching.
-
- b) However, I have not yet heard of a case where a professional cracker
- (ie, someone who is directly making money from cracking) has been
- convicted or even accussed of doing so. (If anyone knows of any,
- please correct me.)
-
- Given these two things, it seems that the SS is either trying to "clear
- the field" of the petty offenders (by making the punishments so extreme
- that no one dare crack casually) so as to better pursue the professionals;
- and/or is trying stop the amateur hackers before they get a chance to go
- pro. Now, I am not going to argue legality or constitutionality, since
- I know little about either, but it would seem that the SS is destined
- to fail for strictly practical reasons.
-
- First off, if they do intend to go after the professional crackers
- at some point, it would seem they are ill-equipped to do so. We have
- already witnessed the stunning ability of their experts. If I were
- a professional, I wouldn't be too scared. Even if they do get people
- who can actually insert a floppy right-side-up, I do not think they
- will ever get people of the same caliber of professional crackers.
- And even if they did, information space is not like physical space,
- where you will always leave behind evidence. Even the most perfect
- robbery can be noticed by the fact that SOMETHING IS GONE. An excellent
- cracker could get into a system, rob it blind, and leave no clues.
- Any evidence of his visit is only electronic, and can thus be
- manipulated or erased. Note that I am not arguing that computer
- information theft is inevitable; I am merely arguing that typical police
- procedures work at finding a criminal after a crime, and in computer
- crime that is not always possible. Thus, the crime MUST be stopped by
- making systems more secure, something which the SysOp, and not the
- SS, must do.
-
- Secondly, if the SS is trying to discourage casual crackers, it is
- doing a *REALLY* lousy job of it. By choosing to pursue the associates
- of the crackers instead of the crackers themselves, they are only going
- to make the crackers less likely to expose themselves to non-crackers.
- I would think this would result in crackers more quickly becoming
- professionals (ie, only cracking when it is worth their while).
-
- I welcome comments.
-
- -ice
-
- =============
- "Those who understand are master to those who use, but do not undertand."
- - a noted 1st century Roman historian
- =============
-
- ----NIA----NIA----NIA----NIA----
-
- "Cybertoon By CAT-TALK"
-
- In article <26353@cs.yale.edu> evans-ron@cs.yale.edu (Ron Warren Evans) writes:
- }What is "CyberToon"? Does it exist, or is this just a put-on?
- }It sounds very interesting.
-
- Cybertoon" is a book about a group of scientist who formed a consortium
- back in the 1850's to carry our experiments in genetic engineering. They
- hid their research from the rest of the world because 1> People would
- probably hurt them for messing with "nature" and 2> Mankind would probably
- take the results of their research and use it for no good (as usual).
-
- They ended up engineering about 3 dozen species. The common features of
- these beings were that they were quite resiliant to adverse environmental
- events (their super immune system prevented almost all deseases from
- affecting them and causing death and they could take a lot of physical
- abuse without much adverse affects [Ie: having anvils and piano's dropped
- on their heads without injury]). These beings were also immortal.
-
- Some of the species engineered were quasi-bipedal cats, rabbits, mice,
- dogs and ducks. These beings were called "toons".
-
- Basically, this book gives a history of how "toons" came into being. No -
- they aren't animated figures, they are real beings.
-
- This book is not published by any big publisher and is only available
- from the author. About 1500 copies have been distributed so far. One
- of the problems is that the book is 149 chapters (about 4100 pages)
- separated into five volumes.
-
- ----NIA----NIA----NIA----NIA----
-
- "TO THE TROOPS IN THE MIDDLE EAST"
-
- A MESSAGE FROM VETERANS TO THE TROOPS AT FORT SAUDI ARABIA
- ----------------------------------------------------------
-
- The US government is dressing you up in poison gas suits to
- play rambo for them in the Persian Gulf. You are sitting out in the
- middle of the desert with your ass on the line, wondering what's going
- to happen next. We suspect you are a decoy to draw the gas attack which
- would be used as an excuse for a US invasion of Kuwait and Iraq.
-
- We know what you are going through, because we spent some time
- in the shooting gallery too. As veterans we want to say straight up:
- you have no more interest in fighting in the war the US is preparing for
- today, than we did in the war they were waging in the 60's. Vietnam era
- GIs were told that we were bringing Asian people democracy. We wound
- up killing 2.5 million of those people in a war of genocide. You are
- in the Middle East supposedly to protect "our" oil. You could wind up
- killing hundreds of thousands. AND FOR WHAT? So that the pentagon can
- finally establish Fort Saudi Arabia, like they have been wanting to for
- so long? So that the US can control the oil resources of that region that
- don't belong to us in the first place? So they, by extension, can control
- their main economic competitors like Japan and in Europe who depend on that
- oil? The bottom line seems to be expanding the US empire as the motive and
- hair trigger politics and massive troop deployments as the method.
-
- The situation is volatile. When the orders come to Rambo out, your
- response will profoundly impact the lives of millions of people in the
- Middle East and have unknown effects on world history. The politicians
- stuck you in a situation where you can't now see the end result of your
- actions. But you, like us, will have to live with those results forever.
-
- The brass want you to obey, we want you to think. We feel that our
- experience may have an effect on your decisions. Those of us who sat in the
- jungles of Vietnam learned that we could see no bravery in "Search and
- Destroy" missions in which we directed massive firepower to slaughter
- anything that moved. We could find no glory in destroying the village to
- save it. Similarly, many Beirut vets speak of the rude awakening when they
- realized that the people they were sent to "protect" hated them and that every
- US GI was a sitting duck. (Remember the Marine barracks?) Those of us who
- are vets of the US invasion of Panama ask where is the honor in house-to-house
- terror, or in pushing back the Panamanian families who had come to mass grave
- sites seeking to identify and reclaim their loved ones. You undoubtedly will
- have many of the same experiences we did. Ghosts march through our dreams
- every night. Your nightmares have yet to begin.
-
- CHECK OUT THESE FACTS:
-
- * Its one thing to kill,die or get maimed for a worthy cause. But once the
- smoke clears and the shooting is over, as history has shown time and again,
- we shouldn't have been in there.
-
- * When you are choking in a poisoned atmosphere, remember that you are facing
- chemical and other weapons sold to Iraq by Western powers only too happy to
- make a buck off the deal.
-
- And ask any veteran who suffers from Agent Orange exposure what help you
- cant expect if you survive. Remember that the US is still operating massive
- defoliation programs in Central and South America under the phony excuse of
- the war on drugs.
-
- * Remember too, that for 8 years the US government cheered on Iraq while it
- gassed Iran and its own Kurdish people.
-
- * Bush says you are there to stop naked aggression. That hypocrite has no right
- to speak on this question, having just finished invading Panama.
-
- * Saddam Hussein is a reactionary ruler who invaded Kuwait in his own
- interests. But while the US media calls him a fascist madman, the US
- government is busily trying to keep you from being able to but unapproved
- record albums. In the US, racism and police attacks are on the rise. There
- are major efforts to stifle political protests, and women are fighting their
- own government to protect their reproductive rights.
-
- Meanwhile you sweat it out on a lie and a humbug. Sure, there are those
- Rambozoids who can hardly wait for the order to charge. Well, let those who
- proudly wear the "KILL THEM ALL AND LET GOD SORT THEM OUT" shirts pay the price.
- But to those of you who question blindly going along with the program, we have
- something to say.
-
- You should know that while you are carrying out your orders there are
- veterans from previous wars and military actions leading demonstrations agaisnt
- your presence in the Middle East. We will welcome you back to join our ranks.
- Like you, we were ordered to do our duty. Take Vietnam (which some of us tried
- to do). Fooled at first, we began to question the lies and the hypocrisy that
- put us there. Many of us were sickened by what we were ordered to do. Others
- were inspired by the heroic resistance of the Vietnamese. We began to resist.
- Thousands of us in Vietnam (and in the U.S.) refused to carry out orders.
- Whole companies and naval units mutinied and refused to fight. A half million
- US troops deserted. GI resistance took every form, from the fragging of
- officers, to a number of troops that actually joined and fought for the other
- side. Out of all that we learned to question what the hell is going on. All
- the government learned was to tell bigger lies. Welcome to Fort Saudi Arabia.
-
- As veterans we came to understand that our duty was to the people of
- the world and to the future, not to the Empire. We resisted and rebelled.
- WHAT ARE YOU GOING TO DO?
-
-
- US TROOPS OUT OF THE MIDDLE EAST!!!
-
- Vietnam Veterns Agaisnt the War Anti-Imperialist
- 4710 University Way NE #1612
- Seattle, WA 98105
- (206) 292-1624
-
- ----NIA----NIA----NIA----NIA----
-
-
- Guardian Of Time
- Judge Dredd
- Ignorance, Theres No Excuse.
- For questions or comments write to:
- Internet: elisem@nuchat.sccsi.com
- ..!uunet!nuchat!elisem
- Fidonet: 1:106/69.0
- or
- NIA FeedBack
- Post Office Box 299
- Santa Fe, Tx 77517-0299
- [OTHER WORLD BBS]
-