home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Hacker Chronicles 1
/
HACKER1.ISO
/
cud3
/
cud305a.txt
< prev
next >
Wrap
Text File
|
1992-08-18
|
6KB
|
117 lines
****************************************************************************
>C O M P U T E R U N D E R G R O U N D<
>D I G E S T<
*** Volume 3, Issue #3.05 (February 9, 1991) **
****************************************************************************
MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet)
ARCHIVISTS: Bob Krause / Alex Smith / Bob Kusumoto
RESIDENT SYSTEM CRASH VICTIM:: Brendan Kehoe
USENET readers can currently receive CuD as alt.society.cu-digest. Back
issues are also available on Compuserve (in: DL0 of the IBMBBS sig),
PC-EXEC BBS (414-789-4210), and at 1:100/345 for those on FIDOnet.
Anonymous ftp sites: (1) ftp.cs.widener.edu (temporarily down); (2)
cudarch@chsun1.uchicago.edu E-mail server: archive-server@chsun1.uchicago.edu.
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted as long as the source is
cited. Some authors, however, do copyright their material, and those
authors should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles relating to
the Computer Underground. Articles are preferred to short responses.
Please avoid quoting previous posts unless absolutely necessary.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
DISCLAIMER: The views represented herein do not necessarily represent the
views of the moderators. Contributors assume all responsibility
for assuring that articles submitted do not violate copyright
protections.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
CONTENTS THIS ISSUE:
File 1: Moderators' Corner
File 2: From the Mailbag
File 3: Arrest of Phiber Optik
File 4: The Dictator: My thoughts
File 5: Chaos Computer Club Congress
File 6: The Feds (In this case the FCC) hits Ham Packet BBS Ops.
File 7: FCC Citation of Packet BBSs for Store-and-Forward Msg
File 8: Book Review--Exporting the First Amendment
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
----------------------------------------------------------------------
********************************************************************
*** CuD #3.05, File 1 of 8: Moderator's corner ***
********************************************************************
From: Moderators
Subject: Moderators' Corner
Date: February 7, 1991
++++++++++
In this file:
1. RETALIATION IS NOT THE ANSWER
2. CONFERENCE ON COMPUTER INVESTIGATION CONFERENCE
++++++++++
+++++++++++++++++++
Retaliation is *not* the Answer
+++++++++++++++++++
We've heard "rumors" about plans for retaliation against informants and
others who have added to the victim list of law enforcement zealousness. We
have been, and continue to be, unequivocal in our opposition to such
behavior! Informants are a symptom of the problem and not its cause.
Victims are created by abuse of power, by ignorance of agents, by
inadequate Constitutional protections in a time of rapidly changing
technology, and by a cultural mentality that sees witches to be hunted in
anything mysterious. We are not required to like paid informants,
especially when they appear responsible for creating victims rather than
protecting society. Sometimes, in serious cases, they are necessary, but
should be used with caution. But, they should be used with caution.
Informants, by definition, betray, and the ethical issue for law
enforcement is one of maintaining a balance between necessity and unethical
practice. It is this balance that seems to be out of kilter in the RIPCO
informant incident, and we view the problem as one of restoring the balance
AND NOT retaliating against the paid informant. Informants must live with
their conscience and with the stigma they earn. From all accounts, law
enforcement agents respect informants as little as the rest of us; they
only find them useful. So, there is little need to retaliate: Loss of
status and the corresponding condemnation is sufficient response. An
anonymous poster shares similar thoughts in file #4, below.
+++++++++++
Conference on Computer Investigation Conference
+++++++++++
The Criminal Justice Statistics Association will be holding a conference on
INVESTIGATION COMPUTER CRIME (March 18-20) in Washington D.C. The blurb
reads:
Audience: Law enforcement and prosecutorial personnel assigned to the
computer crimes cases
Objectives: To train personnel in the technical and legal aspects
of computer crimes. Covers issues such as computer crime methods
and detection, crime scene search procedures and computer evidence
preservation, the application of existing laws, interaction with
techincal experts, and prevention education.
A registration fee is $100 per class day and classes will be held in the
Computer Center's facility at 555 New Jersey Avenue, NW, Suite 860,
Washington DC. For more information, contact person is:
Jim Zepp, Director
NCJS (Suite 860)
555 New Jersey Avenue, NW
Washington, DC 20001 (202-638-4155)
********************************************************************
>> END OF THIS FILE <<
***************************************************************************
res;res on aca101;ct; uf file; ch'3.03' to'3.05';res