home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
The Hacker Chronicles - A…the Computer Underground
/
The Hacker Chronicles - A Tour of the Computer Underground (P-80 Systems).iso
/
cud4
/
cud417.txt
< prev
next >
Wrap
Text File
|
1992-11-05
|
37KB
|
732 lines
Computer underground Digest Sun Apr 12, 1992 Volume 4 : Issue 17
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
Associate Editor: Etaion Shrdlu, Jr.
Arcmeisters: Brendan Kehoe and Bob Kusumoto
CONTENTS, #4.17 (Apr 12, 1992)
**CONT'
Issues of CuD can be found in the Usenet alt.society.cu-digest news
group, on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG,
and DL0 and DL12 of TELECOM, on Genie, on the PC-EXEC BBS at (414)
789-4210, and by anonymous ftp from ftp.eff.org (192.88.144.4),
chsun1.spc.uchicago.edu, and ftp.ee.mu.oz.au. To use the U. of
Chicago email server, send mail with the subject "help" (without the
quotes) to archive-server@chsun1.spc.uchicago.edu.
European distributor: ComNet in Luxembourg BBS (++352) 466893.
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted as long as the source
is cited. Some authors do copyright their material, and they should
be contacted for reprint permission. It is assumed that non-personal
mail to the moderators may be reprinted unless otherwise specified.
Readers are encouraged to submit reasoned articles relating to
computer culture and communication. Articles are preferred to short
responses. Please avoid quoting previous posts unless absolutely
necessary.
DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.
----------------------------------------------------------------------
Date: Mon, 06 Apr 92 10:18:49 EST
From: "John F. McMullen (at Marist)" <KNXD%MARISTB.BITNET@CUNYVM.CUNY.EDU>
Subject: Panel Discussion on Computer Crime & First Amendment
There will be a 2-hour panel discussion on "Computer Crime & First
Amendment Concerns" at 10:30AM on Sunday, April 12th at the 17th
annual Trenton Computer Festival (TCF'92). I will moderate the panel
which will be composed of Donald Delaney, New York State Police Senior
Investigator responsible for computer crime and telecommunications
fraud; Mike Godwin, in-house counsel, Electronic Frontier Foundation
(EFF); Emmanuel Goldstein, editor & publisher - "2600:The Hacker
Quarterly; and Phiber Optik, well-know hacker (previously arrested by
Delaney).
TCF is the oldest computer festival/show in the world, preceding even
the legendary "West Coast Computer Faire". It is held on Saturday &
Sunday, April 11 & 12th at Mercer County College, outside of Trenton,
NJ It will contain over 170 commercial exhibits, the largest computer
flea market on the East Coast (8 acres) and 2 days of seminars, talks
and panel discussions. The keynote speaker (Saturday - 3:00PM) is Paul
Grayson, CEO of Micrografx.
The New York Amateur Computer Club (NYACC), on of the festival's
co-sponsors, is providing bus service from New York City to and from
TCF. A bus leaves 11th Street and 6th Avenue at 8:00AM on Saturday and
8:30 on Sunday (The Sunday bus originates in Long Island). For
details, call Lewis Tanner (212 928-0577 between 7&9PM).
------------------------------
Date: Mon, 30 Mar 92 09:29:10 EST
From: 34AEJ7D@CMUVM.BITNET
Subject: Bogus News Release - Computers and Children
The "News Release" in the latest CUD looks entirely bogus to me.
It is unlikely that sANY group would release a legitimate
news release anonymously,e.g., even terrorist groups like the ALF,
PLO and IRA issue their news releases under thier own banner. Anything
less defeats the entire purpose and propaganda objective of making such
a "release" at all.
So what is the purpose of this release? Perhaps it is a "prank"
perpetrated by someone who gained access to someone else's account
carelessly left logged in. Perhaps it is an attempt at harassment of
the person mentioned at the bottom of the release, akin to the "send
Mr. X 10 copies of the encyclopedia" tactic some Usenetters favor when
miffed. Or perhaps it is a lead in to a pitch for a donation to a
"cause".
Whatever the case, as published it is highly suspect, IMHO.
------------------------------
Date: Wed, 8 Apr 92 22:31:01 CST
From: Jim Thomas <jthomas@well.sf.ca.us>
Subject: Addendum to "News Release - Computers and Children"
In mid-March, Ron Hults, of the Fresno (Calif.) police Public
Infnormation Office, released a press release announcing a news
conference to be held on March 19. The above poster, as have many
others, found the press release, which dramatized a BBS link to
pedophilia and other extreme activity, sufficiently incredible to
doubt its authenticity. The press release indicated that it was the
product of the Fresno Police Department's PIO. The release generated
passionate discussion on comp.org.eff.talk as a reflection of "the
ignorance of law enforcement." In this case, however, Fresno police
seem to themselves have become victims of their own writer's
sensationalism.
Detective Frank Clark, who held the news conference advertised by the
release, intended only to present a summary of the possible forms of
computer abuse to which children are vulnerable. These ranged across
the gamut of activities, from the most benign to the most extreme.
Detective Clark indicated that the extreme sex offenses to which the
release referred constituted about 3 minutes of a 45 minute
presentation. The PIO office, as well as the media covering the news
conference, focused on the extreme sex-related incidents and ignored
the rest. Detective Clark indicated that his purpose was to remind
parents of the importance of familiarizing themselves with their
children's computer activity. He also used the conference to raise the
issue of computer courtesy and ethics, and to identify local resources
(schools, classes, and other forums) available for obtaining further
information about computer use. The release and subsequent coverage
downplayed this.
He did not write the release and was unable to review the final text.
He was quite unhappy with it, and recognizes (and apologized for) the
offense it caused some people. He was quite explicit that, while
opposing the use of computers to prey on others, he nonetheless shares
many of the concerns about protection of civil and Constitutional
rights.
The problem with the Fresno PIO press release, as with similar media
coverage, is the tendency of writers to find the dramatic angle and
ignore the real issues. Perhaps we should all begin to more
aggressively contact publishers and other media personnel to educate
them on the issues when we find such gross distortion.
------------------------------
From: Net Wrider <nwrider@uanonymous.uunet.uu.net>
Date: Thu, 9 Apr 1992 9:00:25 EDT
Subject: "Hacker "Profiles" May Curb Computer Frauds"
Hacker 'Profiles' May Curb Computer Frauds
Soudrce: THE INDEPENDENT March 21, 1992, Saturday (p. 6)
By SUSAN WATTS, Technology Correspondent
THE Federal Bureau of Investigation is dealing with computer hackers
as it would rapists and murderers - by building "profiles" of their
actions.
Its computer researchers have discovered that, in the same way that
other offenders often favour the same weapons, materials or times of
day to perpetrate their crimes, hackers prefer to use trusted
routines to enter computer systems, and follow familiar paths once
inside. These patterns can prove a rich source of information for
detectives.
The FBI is developing a modified version of detection software from
SRI International - an American technology research organization.
Teresa Lunt, a senior computer scientist at SRI, said hackers would
think twice about breaking into systems if they knew computer
security specialists were building a profile of them. At the very
least, they would have to constantly change their hacking methods. Ms
Lunt, who is is seeking partners in Britain to help develop a
commercial version of the software, believes hackers share with
psychotic criminals a desire to leave their hallmark.
"Every hacker goes through a process peculiar to themselves that is
almost a signature to their work," she said. "The FBI has printed out
long lists of the commands hackers use when they break in. Hackers
are surprisingly consistent in the commands and options they use. They
will often go through the same routines. Once they are in they will
have a quick look around the network to see who else is logged on,
then they might try to find a list of passwords."
SRI"s software, the development of which is sponsored by the US
Defense Department, is "intelligent" - it sits on a network of
computers and watches how it is used. The software employs
statistical analysis to determine what constitutes normal usage of the
network, and sets off a warning if an individual or the network
behaves abnormally.
A more sophisticated version of the program can adapt itself daily to
accommodate deviations in the "normal" behaviour of people on the
network. It might, for example, keep track of the number of temporary
files created, or how often people collect data from an outside source
or send out information.
The program could even spot quirks in behaviour that companies were
not expecting to find.
The idea is that organizations that rely on sensitive information,
such as banks or government departments, will be able to spot
anomalies via their computers. They might pick up money being
laundered through accounts, if a small company or individual carries
out an unusually large transaction.
------------------------------
From: David Sobel <dsobel@WASHOFC.CPSR.ORG>
Date: Tue, 7 Apr 1992 15:37:37 EDT
Subject: CPSR FOIAs FBI
CPSR FOIAs FBI
In response to the FBI's recent proposal that digital communications
networks be configured so as to morre easily facilitate electronic
surveillance, Computer Professionals for Social Responsibility (CPSR)
has filed a request under the
Freedom of Information Act (FOIA) seeking:
copies of all records regarding the Bureau's
decision to seek new legislative authority for wire
surveillance in the digital communications network.
And following published reports that the FBI is developing a "hacker
profile," CPSR has also requested:
copies of all records regarding the Bureau's
creation of a "profile" of computer "hackers" or
others who seek unauthorized access to computer
systems. This request includes, but is not limited
to, information concerning the FBI's relationship with
SRI International and its use of SRI software.
We will post the results of these requests ... but it could be a while.
David Sobel
CPSR Legal Counsel
dsobel@washofc.cpsr.org
------------------------------
Date: Sun, 12 Apr 92 14:52:02 CDT
From: <wt.70317@slinknet.uunet.uu.net>
Subject: FBI Wants to Tap Phone Firms to Eavesdrop (Reprint)
"FBI Wants to Tap Phone Firms for New Eavesdropping Devices"
Source: Chicago Tribune, April 12, 1992 (Sect. 7: 9b)
NEW YORK (Reuters)--The FBI wants the nations telephone companies to
stop rolling out advanced digital phone systems that stymie the
agency's practice of listening in on criminal conversations.
At stake is the future of the wiretap, one of the bureau's most
effective investigative stools, which is getting harder to engineer as
phone systems grow more complex.
The Federal Bureau of Investigation says modern telephone networks,
which rely on digital and fiber-optic systems, are making it difficult
to eavesdrop on phone calls in criminal investigations.
So the bureau has drafted legislation that would require phone
companies to stop deploying digital technology until they can come up
with a way for the bureau to preserve the wiretap.
For regional and long-distance phone companies that have spent
billions of dollars to upgrade systems and galvanize the U.S. lead in
telecommunications, the FBI proposals are late at best and
anti-competitive at worst.
"It is late...this stuff is already out there," said Ken Pitt, a chief
spokesman for Bell Atlantic Corp., one of seven regional telephone
companies, known as the Baby Bells, formed by the breakup of American
Telephone & Telegraph Co.
AT&T and the Baby Bells, as represented by the U.S. Telephone
Association, oppose the draft bill as written.
Researcher Douglas Conn, associate director of Columbia University's
Institute for Tele-Information, said the dispute could threaten the
U.S. position in global communications.
"It is a very, very touch and difficult issue. On the one side is the
very real concern of the FBI. On the other are the telephone companies
and organizations that support using an advanced telecommunications
network to compete internationally," Conn said.
But the FBI is pressing forward.
FBI Director William Sessions recently wrote a column for the New York
Times about the potential threat to the effectiveness of law
enforcement.
"Wiretapping is one of the most effective means of combating drug
trafficking, organized crime, kidnaping and corruption in government,"
Sessions wrote in the column, which was published last month.
"The Federal Bureau of Investigation does not want the new digital
technology that is spreading across America to impair this crucial
law-enforcement technique."
The FBI says it uses telephone wiretaps in just 1 percent of its
investigations and only with a court warrant. But those cases tend to
be major ones involving organized crime and drug traffickers.
By law, telephone companies are required to assist the FBI in
court-approved wiretapping.
But company officials say they are baffled that the FBI, long known for
inventing ingenious investigative tools, expects them to develop the
wiretap technology.
The Federal Communications Commission, which regulates
telecommunications, is also worried about the proposed legislation.
"Our most overriding concern is the potential negative impact this
could have on the development of the telecommunications
infrastructure," said James Spurlock, a top FCC official.
"There are real public policy questions here."
FCC Chairman Alfred Sikes wants U.S. phone companies to speed up their
use of digital systems and fiber optics to compete with technologies
surfacing in Japan, France and Germany.
Regional phone companies are on the threshold of deploying digital
equipment in the local service loops that take in residential
customers, the same leg of the service that the FBI uses in
wiretapping.
But with the coming installation of Integrated Services Digital
Network systems into homes and residences, conventional wiretapping
devices may produce little more than an incomprehensible jumble of
sound.
James Kallstrom, chief of the FBI's engineering and technical services
division, says the bureau proposal would mean only one more
requirement among hundreds that phone companies write into their
systems.
"We are looking for them to take in our requirements as they take in
hundreds of other requirements when they design these things," he
said.
"The have hundreds of internal design requirements to account for
billing and routing and new services. This would be another."
Kallstrom also disputed the argument that the FBI's proposals would
impede technological development or impose big costs, saying changes
could be designed into software or manufactured into switches.
Officials from BellSouth Corp., Bell Atlantic, Nynex Corp., among
other Baby Bells, as well as telecommunications companies American
Telephone & Telegraph Co. and GTE Corp., have met with FBI technicians
at an FBI training center to hammer out the problem.
"These meetings are better refining the issue" and easing some of the
adversity, said BellSouth spokesman Bill McCloskey. But the session
resolved little.
------------------------------
Date: Thu, 9 Apr 92 21:17:54 PDT
From: jwarren@AUTODESK.COM(Jim Warren)
Subject: POSSIBLE INTEREST: Electr.CivLib - model candidate's statement & ideas
Hi,
This concerns practical efforts to assure that traditional
constitutional rights and protections remain clearly guaranteed, even in
the context of modern technology -- in the "Information Age" and across
the "Electronic Frontier."
For this 1992 election-year, the foll owing offers possible models for
do-it-yourself citizen-based political action. Please "copy, post and
circulate" this 3-part document wherever and to whomever you wish. Please
feel free to modify Parts 2 and 3 however you wish -- over your own signature.
After all, freedom always *has* been a
do-it-yourself project.
This introduction is PART-1 of three parts.
PART-2 provides a model cover-letter & facts you might use:
1. First, it *briefly* mentions the electronic civil liberties issues.
2. Its next part is intended to get the attention of a candidate and/or
their campaign staff by illustrating cheap, effective net communications.
3. The next part illustrates that a great number of people (candidate-
translation: "voters") are involved.
4. *Very important*: It outlines our ability to communicate with masses
of people/voters -- at little or no cost.
5. Equally important -- it requests *specific commitment to act* from a
candidate.
6. It offers a matching commitment to publicize their position.
PART-3 is a model candidate's statement committing to specific action.
Note: All successful politicians have mastered the art of *sounding* like
they are supportive of the hundreds or thousands of causes and pleas that
are urged upon them. Good-sounding, vaguely-supportive statements are worth
virtually nothing. Anything less than their issuing a public position
statement committing to explicit action must be considered as meaningless.
Election season is the one time when we have our best chance at
efficient and effective citizen action. All it takes is time and effort.
(And, I walk it like I talk it -- I have forwarded customized versions of
the cover-letter and model-statement to several state and federal candidates
-- all of whom are seeking re-election or election to higher office.)
I would be happy to help others working on these issues, time permitting.
The more people who send this cover letter and model statement to
candidates -- and phone campaign headquarters and ask questions at
candidates' forums; the more sensitized they will become to this
constituency and these fundamental issues of a free society.
Speak and write, now; speak and write, often.
"The price of freedom ..."
--Jim Warren, Electronic Civil Liberties Initiative,
345 Swett Road, Woodside CA 94062; fax/415-851-2814
email/ jwarren@well.sf.ca.us
[ For identification purposes only: organizer/chair of First Conference on
Comnputers, Freedom & Privacy (1991), first-year recipient of Electronic
Frontier Foundation Pioneer Award (1992), MicroTimes contributing editor &
columnist, Autodesk Board of Directors member, founding of InfoWorld,
founding editor of Dr. Dobb's Journal, past chair of ACM, SIGMICRO and
SIGPLAN chapters, etc., blah blah blah. ]
=============== PART-2, MODEL COVER-LETTER TO CANDIDATE(S) ================
Dear [candidate],
A growing percentage of the 12-16 million people who are "online" --
using networked computers -- are expressing increasing concern about
protecting traditional civil liberties and personal privacy in the
"Information Age." (People are "coming online" at a rate much faster than
the explosive growth of personal computing in the past fifteen years.)
As they use networked computers for electronic-mail, teleconferencing,
information exchange and personal records, they are reporting increasing
threats to electronic "speech," "press," "assembly" and personal privacy.
Electronic messages can have massive, persuasive impact.
For instance: In 1990, a single notice sent out across computer nets
prompted 30,000 complaints about Lotus Corporation's plans to sell personal
data on 20-million consumers. Lotus quickly withdrew their "Marketplace"
product before sales ever began.
Or: In Spring, 1991, a single message sent into the computer nets
prompted thousands of complaints to Senators Biden and DeConcini. It
concerned legislation they had introduced, reportedly requested by the FBI
via Senator Thurmond, that would have crippled secure voice and data
communications for U.S. citizens and business. The Senators withdrew the
proposal with three weeks of the net-circulated note.
Who and how many are interested?
Almost all users are adults. Most are well-educated. Most have upscale
incomes. Most have significant discretion for spending and contributions.
Recent published research indicates there are about 14.2-million people
sharing 1.3-million "host" computers on the "Internet" network. This
includes about 960,000 people using 12,000+ home/personal computers as shared
BBSs -- networked electronic "bulletin board systems." These offer free or
almost-free teleconferencing and electronic-mail. [Matrix News, Feb., 1992,
1120 S. Capitol-of-Texas Hwy., Bldg. 2-300, Austin, TX 78746.]
(In addition, there are also the commercial systems such as CompuServe,
Prodigy, GEnie and MCImail -- but they have only several million users and
are costly in comparison to the much larger Internet computer matrix.)
Mass-discussions of freedom and privacy concerns are escalating.
Almost-instant mass-circulated online "newspapers" and "news-groups,"
plus numerous popular teleconferences, increasingly carry reports of
electronic civil-liberties and privacy concerns. Credit-data abuses,
covert employer surveillance, corporate espionage, seizure of electronic
publications, searches of entire electronic post offices, and government
opposition to secure communications are greatly escalating these concerns.
These issues are rapidly penetrating the public press and television.
Example: The First Conference on Computers, Freedom and Privacy (1991),
prompted well in excess of 80 pages of press, including the New York Times,
Los Angeles Times, Wall Street Journal, Time Magazine, Business Week,
Scientific American, Germany's Der Spiegel, etc.. [For copies, contact
CFP#1 chair, Jim Warren, 345 Swett Road, Woodside CA 94062; 415-851-7075.]
Functionally-free, almost-instantaneous mass communication is available.
It is trivial for anyone to "broadcast" comments or information across
the nets to thousands of people, almost immediately and for free or perhaps
costing $15-$20/month. Over a million people read news-groups in USENET,
which is just one of thousands of electronic "newspapers."
And, system-owners and system-operators -- those often most-deeply
concerned about these civil liberties, privacy and content-liability issues
-- can have every user of their system receive whatever message they choose,
perhaps only once, or perhaps every time each person logs-in. Without cost.
Various of these "sysops" are agreeing to inform every one of their users --
often numbering in the thousands -- about candidates who commit to act to
protect civil liberties and privacy against new, technology-based threats.
We ask for your commitment.
A number of people who are well-known across this huge network are
asking candidates to commit to specific action, to make clear that
constitutional protections unquestionably apply across this new "electronic
frontier." We ask that you issue a formal position statement, committing to
act on these matters. (We recognize that an informal statement of general
principles is of minimal value without specifics or commitment to action.)
We ask that you commit to protecting Constitutional freedoms, regardless
of technology. Enclosed is a "model" that you might use as a starting point.
(It illustrates some of the issues that many people feel are most important.)
Commitment is reciprocal.
If you commit to act, we will promptly broadcast it far and wide across
this massive, high-speed network. And, if your opponent(s) who receive this
request, avoid explicit commitment -- by inaction, ambiguous statement or by
specific refusal -- we will publicize that with equal vigor.
Additionally, some of us are prepared to assist committed candidates to
publicize/discuss all of their positions and issues -- not just these online
issues -- via this free, fast, pervasive mass-medium.
And finally, candidates who address these issues first can generate
notice in the public press and television -- especially re protecting freedom
of speech, press, assembly and personal privacy. Numerous reporters have
shown active interest in these issues, to say nothing of 300-400 computer
trade periodicals. Some of us have lists of lay and trade reporters
interested in these issues and would be happy to assist your p.r. staff
in publicizing your commitment.
I appreciate your attention to these comments and requests, and look
forward to your timely reply.
<<signature & affiliation, if any>>
=================== PART-3, MODEL CANDIDATE'S STATEMENT ====================
Guaranteeing Constitutional Freedoms into the 21st Century
Preface
Harvard Law Professor Laurence H. Tribe, one of the nation's
leading Constitutional scholars, views technological threats to our
traditional constitutional freedoms and protections as so serious that --
for the first time in his career -- he has proposed a Constitutional
Amendment:
"This Constitution's protections for the freedoms of speech, press,
petition and assembly, and its protections against unreasonable searches and
seizures and the deprivation of life, liberty or property without due
process of law, should be construed as fully applicable without regard to
the technological method or medium through which information content is
generated, stored, altered, transmitted or controlled."
-- First Conf. on Computers, Freedom & Privacy, 3/27/91, Burlingame CA
In the absence of such a constitutional clarification, legislation and
regulation are the only alternatives to assure that citizens are protected
from technological threats against their constitutional rights and freedoms.
Candidate's Commitment to Action
(model statement)
Preface: It has been over two centuries since our Constitution and Bill
of Rights were adopted. The great technological changes in the interim --
especially in computing, telecommunications and electronics -- now pose a
clear and present danger to the rights and protections guaranteed in those
great documents. Therefore:
Commitment: In the first legislative session after I am [re]elected, I
will author or co-author legislation reflecting the following specifics, and
I will actively support and testify in favor of any similar legislation as
may be introduced by others. Further, I will actively seek to include in
such legislation, explicit personal civil and/or criminal penalties against
any agent, employee or official of the government who violates any of these
statutes. And finally, I will keep all citizens who express interest in
legislative progress on these matters fully and timely informed.
The protections guaranteed in the Constitution and its Amendments shall
be fully applicable regardless of the current technology of the time. This
particularly includes, but is not limited to:
Speech: Freedom of speech shall be equally protected, whether by voice
or in written form as in the 18th Century, or by electronic transmission or
computer communication as in the 20th Century and thereafter.
Press: Freedom of the press shall be equally protected, whether its
information is distributed by print as in the 18th Century, or by networked
computers or other electronic forms, as in the 20th Century and thereafter.
Liability for content: Just as a printer is not liable for content of
leaflets printed for a customer, so also shall the owner or operator of a
computer or electronic or telecommunications facility be held harmless for
the content of information distributed by users of that facility, except as
the owner or operator may, by contract, control information content. Those
who author statements and those who have contractual authority to control
content shall be the parties singularly responsible for such content.
Assembly: Freedom of assembly shall be equally protected, whether by
face-to-face meeting as in the 18th Century, or by computer-based electronic-
conference or other teleconference as in the 20th Century and thereafter.
The right to hold confidential meetings shall be equally protected, whether
they be by personal meeting in private chambers, or by computer-assisted or
electronic-based means.
Self-defense: The right of the people to keep and use computers and
communications connections shall not be abridged by the government.
Search & seizure: The right of the people to be secure in their papers
and effects, against unreasonable searches and seizures, shall be fully
applicable to their electronic mail, computerized information and personal
computer systems.
Warrants: No warrants for search or seizure shall issue for computerized
information, but upon probable cause, supported by oath or affirmation, and
particularly describing the computer system to be searched and the specific
information to be seized.
Secure information vaults: Just as search and seizure of letters in a post-
office, and papers in a bank-vault lock-box, and surveillance of telephone
conversations by wire-tap, each require a separate warrant for each postal
address, lock-box and telephone line, so also shall a separate warrant be
required for each electronic-mail address and/or computer files of each
suspect, when stored in a computer facility or archive shared by others.
And further, computer files stored in a shared facility or archive by or for
a citizen who is neither named in a warrant nor associated with a suspect
so-named, may not be used against that un-named citizen, if seized or
discovered during legal search of or for files of a suspect.
Self-incrimination: No person shall be compelled in any civil or
criminal case to be a witness against himself or herself, nor be compelled
to provide information retained only in their mind, nor otherwise be
compelled to assist the translation or decoding of information that he or
she believes may be self-incriminating.
Property: Private property shall not be taken for public use without
just compensation, nor shall such property be used nor sold by any
government agency for less than fair market value, in which case all such
proceeds shall promptly derive singularly to its last owner prior to
government seizure.
Speedy release: Anyone not accused of a crime shall enjoy the right to
a speedy release and return of all of their property, as may be seized
under any warrant, particularly including their computerized information.
The government shall be fully liable for any damage befalling property or
information they have seized.
[signed] _____________________________________ [date] _________________
_________________________ [please print or type]
_________________________ title / current office / office sought
_________________________ address
_________________________
_________________________
_________________________ campaign-office voice-phone number
_________________________ campaign-office fax number
_________________________ campaign-office electronic-mail address
[ Additional copies of this model candidate's position commitment are
available from:
Jim Warren, Electronic Civil Liberties Initiative,
345 Swett Road, Woodside CA 94062; (415)851-7075, fax/(415)851-2814;
electronic-mail/ jwarren@autodesk.com -or- jwarren@well.sf.ca.us . 4/4/92
For identification purposes, only: Warren was the Chair of the First
Conference on Computers, Freedom & Privacy held in March, 1991, a recipient
in 1992 of one of the Electronic Frontier Foundation's first Pioneer Awards,
is a Contributing Editor and "futures" columnist for MicroTimes, a member of
the Board of Directors of Autodesk (one of the nation's half-dozen largest
sofdetware companies), founded several trade periodicals, and is a writer
and entrepreneur, well-known across the computer industry. ]
------------------------------
Date: Sun, 12 Apr 92 12:12:32 CDT
From: Moderators <tk0jut1@mvs.cso.niu.edu>
Subject: JIM WARREN nominated to the Consumers Union Board of Dirs
The Consumer Union has recently nominated JIM WARREN as a candidate
for election to their Board of Directors. Jim is one of 13 candidates
for six seats on the Board. Candidates are electeed by CONSUMER
REPORTS subscribers, who are receiving their ballots this month.
CuD readers who subscribe to CONSUMER REPORTS should be especially
interested in Jim's nomination and consider him as one of their six
choices for several reasons:
For years, Jim has been a leader in fighting for inexpensive access to
computer technology and on-line services. He has also been a primary
figure in addressing broader consumer issues, such as consumer rights,
credit reporting, and consumer tracking.
Jim is a recipient of the Electronic Frontier Foundation's PIONEER
award for his sustained contributions to the computer community. In
summarizing Jim's accomplishments, Mitch Kapor wrote:
Jim Warren has been active in electronic networking for many
years. Most recently he has organized the First Computers,
Freedom and Privacy Conference, set-p the first online
public dialogue link with the California legislature, and
has been instrumental is assuring that rights common to
older mediums and technologies are extended to computer
networking.
Jim's knowledge of and commitment to the issues of consumer rights
would make him a valuable addition to the CU Board. If you subscribe
to Consumer Reports (or know anybody who does), think about asking
them to vote for JIM WARREN as a way of expanding cyberspace
representation where it can have an impact.
------------------------------
Date: 03 Feb 92 17:33:41 EST
From: The Mad Poet <71110.4334@COMPUSmERVE.COM>
Subject: MONDO 2000 poem
DOES SHE DO THE VULCAN MIND MELD ON THE FIRST DATE?
By Nick Herbert
From MONDO 2000, the magazine for cyberspace
I want your bra size, baby,
Fax number, E-mail address,
Modem com code, ID,
Phone machine access.
Give me your thumb print, password,
Blood type and credit check;
Give me your antibody spectrum,
Your immune response spec.
Let's break bread together, baby,
Exchange cryptographic primes;
Let's link up our parallel ports;
And go on-line in real-time.
Let's indulge in covalent bondage;
Let's communicate in C.
Let's merge our energy bodies
And bob in the quantum sea.
I wanna swim in your gene pool, mama;
Snort your pheromones up close range;
Tune in your neurotransmitters,
Introduce you to Doctor Strange.
I wanna surf in your quantum potentia;
Mess with your thermostat;
Wanna tour your molecular orbits;
Wanna feed your Schrodinger cat.
Let's surgically merge our organs;
Our kidneys, our lungs and our hearts;
Let's read physics journals together
And laugh at the dirty parts.
Let's Bell-connect our bellies
With some quantum-adhesive glue;
Let's do new stuff to each other
That Newton never knew.
I wanna feel your viscosity, honey,
Melt my rheological mind;
Let your female force-field vortex
Deform my male spacetime.
------------------------------
End of Computer Underground Digest #3.25
***********************
Downloaded From P-80 International Information Systems 304-744-2253