Computer underground Digest Tue Dec 17, 1996 Volume 8 : Issue 89 ISSN 1004-042X Editor: Jim Thomas (cudigest@sun.soci.niu.edu) News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu) Archivist: Brendan Kehoe Shadow Master: Stanton McCandlish Field Agent Extraordinaire: David Smith Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Cu Digest Homepage: http://www.soci.niu.edu/~cudigest CONTENTS, #8.89 (Tue, Dec 17, 1996) File 1--Jonathan Wallace letter in re Censorship/Blocking File 2--Internet and Copyright (fwd) File 3--EDITORIAL: Troubles On The Net... File 4--clueless paranoid politicians. (fwd) File 5--Major Denial of Service Attack Hits San Francisco (fwd) File 6--German Cabinet Approves Internet Regulation (fwd) File 7--Cu Digest Header Info (unchanged since 13 Dec, 1996) CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN THE CONCLUDING FILE AT THE END OF EACH ISSUE. --------------------------------------------------------------------- Date: Tue, 10 Dec 1996 22:31:18 -0500 (EST) From: jw@bway.net Subject: File 1--Jonathan Wallace letter in re Censorship/Blocking Dear Mr. Milburn: I am a business executive and attorney, publisher of The Ethical Spectacle, http://www.spectacle.org, and co-author of Sex, Laws and Cyberspace (Henry Holt, 1996), a book on Internet freedom of speech. In that book, we support blocking software as a less restrictive alternative to the Communications Decency Act. Perhaps naively, I never imagined that companies like yours would use their power in the marketplace not merely to assist parents in controlling what their children see, but to block speech which has nothing to do with your stated mission. Your actions in blocking Bennett Haselton's Peacefire.org site and in threatening his ISP with a total block of all its subscribers are extremely reprehensible and reflect very poorly on your company. Your customers--and potential purchasers-- deserve to have a full understanding of your company's behavior, so that they can make informed product decisions. Effective immediately, I am mirroring Bennett's essay "Where Do They Not Want You to Go Today?" on my site at http://www.spectacle.org/peace.html, along with my own essay, "Don't Buy Cybersitter." I will also be distributing copies of this letter in the Fight Censorship mailing list (which is read by many journalists nationwide) and in other Internet publications. Sincerely yours, Jonathan Wallace jw@bway.net ------------------------------ Date: Wed, 11 Dec 1996 19:47:48 -0600 (CST) From: Avi Bass Subject: File 2--Internet and Copyright (fwd) ---------- Forwarded message ---------- Subject--Internet and Copyright I received permission to send out a copy of the following letter, thinking it would be interesting for some of you on the list and because this is a current topic in the news... Susan ========== >The following is a letter by CEO's from 11 important Internet and >Telecommunications firms. It focuses on the sections in the WIPO >treaties that would make Internet Service Providers liable for >unauthorized transmissions of copyrighted works. > >The key point of the letter are: > >- The exclusive rights created by these Articles could result in > making service providers liable without knowledge for every > potentially infringing communication on the Internet. > >- Such potential liabilities would force us to monitor third-party > communications. > >- Not only is this technically and economically impractical, it would > require us to violate individual citizens' privacy rights. > >- The result would be sharply increased prices for Internet/online > services, reduced privacy for users, and reduced connectivity among > "information have nots" in our society and throughout the world. > > >The letter follows > >----------------------------------------------------------- >December 10, 1996 > >President William J. Clinton >The White House >1600 Pennsylvania Avenue, N.W. >Washington, DC 20500 > >Dear Mr. President, > > As CEOs of America's leading Internet, online, and communications >companies, we write to express our great concern about draft language in >the "Basic Proposal for the Protection of Literary and Artistic Works" and >the so- called "New Instrument," supported by your Administration, >currently under consideration at the World Intellectual Property >Organization ("WIPO") Diplomatic Conference in Geneva. > > Our companies have significant intellectual property interests to >protect on the NII and GII, and we strongly support the development of all >future technological measures that will help to prevent infringements of >copyright in the online environment. We are supportive of the >Administration's goal of updating the Berne Convention for the digital >age. However, this goal must not be achieved in a way that severely >limits development of the Internet/online medium as a widely accessible, >low-cost means of communication. > > Our companies build and operate the "Information Highway" that >figures so prominently in your vision of the 21st Century. We provide the >facilities for hundreds of millions of Internet communications that flow >over our networks each day. These transmissions travel in digital form >and are often compressed, split among separate packets, and/or encrypted, >each of which forecloses any practical way of knowing their content. >Unfortunately, in their current form, Articles 7 and 10 of this draft >treaty would create and codify new and significant exclusive rights over >transmission of information and over the operation of computer servers >that relay information on the Internet by making an automatic, ephemeral >copy of a communication while sending it toward its destination. > > The exclusive rights created by these Articles could result in making >service providers liable without knowledge for every potentially >infringing communication on the Internet. Such potential liabilities >would force us to monitor third-party communications. Not only is this >technically and economically impractical, it would require us to violate >individual citizens' privacy rights. The result would be sharply >increased prices for Internet/online services, reduced privacy for users, >and reduced connectivity among "information have nots" in our society and >throughout the world. > > We have negotiated with all stakeholders in an attempt to address >these concerns, while preserving all the important substantive features of >the draft treaty. Unfortunately, our attempts to seek a balanced >resolution have thus far been rejected by the Administration. _Unless >Articles 7 and 10 of the draft treaty address these critical concerns, we >will have no choice but to work to prevent its ratification by Congress._ > > Some members of your Administration understand that we are correct on >the merits of this debate. Others contend that the treaty would not >affect the issue of liability. It is important to understand, however, >that the proposed treaty would be self-executing in many countries. >Further, Articles 7 and 10 may be perceived as precluding protections from >liability for conduit providers and limitations on liability for service >providers who act in a timely fashion to "take down" material to protect >the rights of content owners. > > We urge you to reconsider the Administration's current position >before the WIPO Convention makes a final determination on the issue. >Rational policy, simple fairness, and consistency with your >Administration's many positions on the importance of the Internet require >nothing less. > > >William L. Schrader >Chairman, President and CEO >PSINet, Inc. > >Steve Case >Chairman and CEO >America Online, Inc. > >Raymond W. Smith >Chairman and CEO >Bell Atlantic Corporation > >John L. Clendenin >Chairman and CEO >BellSouth Corporation > >Robert Massey >President and CEO >CompuServe Incorporated > >Gerald H. Taylor >CEO >MCI Communications Corporation > >James Q. Crowe >Chairman and CEO >MFS Communications Company, Inc. > >David W. Garrison >President, CEO and Chairman >Netcom On-Line Communication Services, Inc. > >Ivan Seidenberg >Chairman and CEO >NYNEX > >Paul W. DeLacey >President and CEO >Prodigy, Inc. > >John Sidgmore >President and CEO >UUNet Technologies, Inc. > > >cc: Vice President Albert Gore, Jr. > Secretary Mickey Kantor > Ira Magaziner > Greg Simon > Dan Tarullo > > >----- End Included Message ----- > >~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ >James Love / love@tap.org / P.O. Box 19367, Washington, DC 20036 >Voice: 202/387-8030; Fax 202/234-5176 >Center for Study of Responsive Law > Consumer Project on Technology; http://www.essential.org/cpt > Taxpayer Assets Project; http://www.tap.org ------------------------------ Date: Mon, 16 Dec 1996 20:40:25 -0600 (CST) From: "Scott A. Davis" Subject: File 3--EDITORIAL: Troubles On The Net... The following is a small exerpt from an article from the Philadelphia Inquirer and a follow-up editorial from Scott A. Davis. Scott is the system administrator and Editor In Chief of Banzai-Institute.org, a site dedicated to conservative and common sense opinion and commentary on the news. The following article, as well as others like it can be found at http://www.banzai-institute.org. Scott can be reached by email at sdavis@fc.net or sdavis@banzai-institute.org TITLE: *** Troubles on the Net mirror those elsewhere "Recent accounts of bogus news downloaded from the Internet, along with fresh reports of online child pornography and cybersex leading to offline rape and murder, make this a good time to ask: What is going on with this Internet thing, anyway?" "The Internet is portrayed by turns as monstrous -- a fountain of obscenity, hate and lies -- or as the brightest hope for democracy and liberty, the renaissance of letter-writing, and on-demand access to the unexpurgated wisdom of everyone from William Shakespeare to Homer Simpson." ----------------------------------------------------------------------- [Begin Editorial] Let me answer the original question "What is going on with this Internet thing, anyway?" What is going on is that like real society, it is becoming cluttered with idiots who have nothing better to do than to spam the world with their commercial advertisements, upload pictures of their latest 12 year old boy-toy or to partake in other activity that gives the Internet a bad name. The Internet was developed by people who have an education level much higher than the typical American. It was developed for the purpose of exchanging information between researchers in educational institutions and/or government agencies. Some years later, the Internet became semi-public when large companies and other organizations were taking part. This occurrence didn't do much to lower the quality of the net, as the "new" people to come onboard had some common sense about them. These large companies, in the eyes of many, had the same need for the Internet as did the government and educational institutions. Then came the World Wide Web. While the web is a great tool and a fantastic resource, it has...and will be, in my opinion the death of the Internet. One cannot put a price on the wealth of information that the web can produce. One can visit the Smithsonian Institution, every major college, government agencies, et. al. And for that reason, the web won't be going away any time soon. But the advent of the web, as well as it's continuous use and promotion has opened the doors to placing loaded guns in the hands of children, so to speak. For instance, the Philadelphia Inquirer's article goes on to say "In an ongoing investigation that has produced 80 arrests and 66 convictions over the last three years, the FBI last week raided the homes of Internet users suspected of downloading child pornography in 20 cities in its crackdown on kiddie porn that is being transmitted via online services and the Internet." And for that effort, I must say that this is one good thing that the government is doing in respect to the Internet. What have people like this done for the Internet? Well, besides cluttering my news server with pictures of six year old boys, we see or read almost on a daily basis about attempts by the government to enact regulation and monitoring of our revered network. And the government's behavior and thoughts regarding this medium are at times, bloated and fallacious. While these people who commit crimes using the Internet should be punished just as if they had walked outside their front door and perpetrated the act out on the street, they are causing some entities in position of power and other decision makers to think that people become more susceptible because the crime was committed with or originated with a computer and the Internet. The Internet is nothing special. It is not the "new society" or "global community" in the sense that many portray it to be. In many ways, it is nothing more than an extension of the lives we live away from the computer. We can't legally abduct a child while walking down the street by luring them away from their parents with a candy bar. It is terribly sad, and angering at times, to see that decent, intelligent people who use the net have been mobbed with idiots, but we have to learn when and where to draw the line. The Inquirer's article quoted Neal Goldsmith, social psychologist and publisher of the online periodical BusinessTech.com as saying "Finding a better fit, a comfort level, between people and the Internet machine will take a few years..." Sooner or later, he says, "common sense has to prevail." Other items that the Inquirer's article lists that I personally think are bad reflections on the net are: "In July, three Penncrest High School juniors, one of them an Eagle Scout, were caught breaking into the chemistry lab at their school carrying a "shopping list" of chemicals, dozens of bomb recipes and a terrorist handbook that had been downloaded from the Internet." I went down to one of the local book stores here in Virginia the other day and saw several copies of "The Anarchist Cookbook" on the shelf. These punks could have just as easily done the same thing. Just because information like is available on the Internet means nothing more than they didn't have to get off their lazy asses to go to the book store and spend their lunch money on the book, which I'm sure contains some of the same information they obtained on the net. "Police say a Maryland woman, Sharon Lopatka, was killed last month by a man she had met on the Internet who had agreed to fulfill her bizarre request to be tortured to death." It takes all kinds to make the world go 'round. A match made in heaven, evidently. "A Columbia University graduate student, Oliver Jovanovic, was charged nine days ago with the sexual torture of a woman he allegedly met in a chat room on America Online." Well, as Neal Goldsmith said, "common sense has to prevail." However, it is obvious that that time is not yet upon us. There are still stupid people in this world who do stupid things and promote stupid misconceptions about the Internet. This story might have been printed deep in the bowels of your local news paper had it not involved a computer. But since these two people met over a computer, the world has the story plastered to it's face. "Advice columnist Ann Landers has been airing the painful stories of people who say that their marriages are breaking up because of online affairs, or that finally meeting that dream cyberlover turned into a real-life nightmare." ...and just like in real life, if you ain't gettin' it at home, you gotta go elsewhere. ...and in typical fashion, let's write a cry-baby letter to Ann Landers rather than solve the problem at home. The point is, the Internet is not some new-sprung, disproportionate world. It's just another medium for the same injustices and misgivings to take place as do in the real world. Crimes and other unfortunate happenings should not be spotlighted because they entail the use of a computer. That's what I think. ------------------------------ Date: Tue, 17 Dec 1996 00:20:30 -0500 (EST) From: "noah@enabled.com" Subject: File 4--clueless paranoid politicians. (fwd) From -Noah ---------- Forwarded message ---------- Date--Mon, 16 Dec 1996 21:21:17 -0600 (CST) From--Brett L. Hawn Parolees can be kept offline By Courtney Macavinta December 16, 1996, 6:30 p.m. PT A branch of the U.S. Department of Justice today approved new restrictions on parolees that allow judges to prohibit them from using the Internet. Adding to restrictions parolees already face on their travel and association, the U.S. Parole Commission stated: "Responding to increased criminal use of the Internet has approved the discretionary use of special conditions of parole that would impose tight restrictions on the use of computers by high-risk parolees." The Commission made the decision noting the "surge of 'how-to' information available on the Internet and other computer online services." The statement went on to say that the Net gives sophisticated offenders new avenues to commit crime or forge criminal associations. The new restrictions would allow the parolee to get written permission to surf the Net or get an Internet account. The provision allows for unannounced searches of a parolee's computer system and could require a daily computer log of the user's activity. ------------------------------ Date: Tue, 17 Dec 1996 08:49:13 -0500 (EST) From: "noah@enabled.com" Subject: File 5--Major Denial of Service Attack Hits San Francisco (fwd) From -Noah ---------- Forwarded message ---------- Date--Tue, 17 Dec 1996 08:56:06 -0500 From--Betty G. O'Hearn We thank our sponsors: Internet Security Solutions New Dimensions International - Security Training Secure Computing Corporation HOMECOM Communications National Computer Security Association OPEN SOURCE SOLUTIONS, Inc. Denial of Service- COMPUTER ATTACKS AGAINST WEBCOM By Elizabeth Weise AP Cyberspace Writer SAN FRANCISCO (AP) -- An computer attack against WebCom, one of the nation's larger World Wide Web service providers, knocked out more than 3,000 Web sites for 40 hours this weekend during the busiest shopping season of the year. The attack began Saturday morning at 12:20 a.m., said Web Communications' chief operating officer Chris Schefler from the company's offices in Santa Cruz, Calif. Service resumed at 4 p.m. Sunday. WebCom helps companies and individuals set up Web sites and provides storage space on its computer from which the sites run. The outage was particularlyhard on retailers who promote and sell products on WebCom-based home pages. The attack, launched by an unknown individual or party, blocked service by sending as many as 200 messages a second to the WebCom server, or host computer. This specific "denial of service" attack, known as a SYN-flood, leaves the computer unable to respond to the flood of messages, which queue up and eventually render it unable to function at all. A91996 Associated Press __________________________________________________________________ **************************************************************** DIRECT REQUESTS to: list@infowar.com with one-line in the BODY, NOT in the subject line. Subscribe news_from_wschwartau TO JOIN GROUP Unsubscribe news_from_wschwartau TO LEAVE GROUP **************************************************************** http://www.Infowar.Com Managed by Winn Schwartau winn@infowar.com Interpact, Inc. 11511 Pine St. Seminole, FL 33772 813-393-6600 Voice 813-393-6361 FAX Comments, Content, Sponsor Opportunties Betty O'Hearn Assistant to Mr.Winn Schwartau betty@infowar.com 813-367-7277 Voice 813-363-7277 FAX ------------------------------ Date: Wed, 18 Dec 1996 07:13:12 -0500 (EST) From: "noah@enabled.com" Subject: File 6--German Cabinet Approves Internet Regulation (fwd) Source -Noah ========================= Date--Wed, 18 Dec 1996 03:34:31 -0500 From--Betty G. O'Hearn Thanks to Infowar.Com sponsors: Internet Security Solutions New Dimensions International - Security Training Secure Computing Corporation HOMECOM Communications National Computer Security Association OPEN SOURCE SOLUTIONS, Inc. ____________________________________________________ From--alm@znet.com Date--Tue, 17 Dec 1996 21:49:08 -0700 Subject--[Fwd--BEYOND THE FRINGE--27-16] B E Y O N D T H E F R I N G E ======================================================= Vol. 27 No.16 December 17, 1996 Subject--German Cabinet Approves Internet Regulation <> T H E V O I C E O F C Y B E R F R E E A M E R I C A <> NOTE: Controversial subjects are open to debate. We welcome your input for or against anything presented here in the search for truth. We feel that CENSORSHIP of ideas is far worse than anything zealous or extremist individuals might say and look forward to your participation. December 11, 1996 By Terence Gallagher BONN, Germany (Reuter) - German Chancellor Helmut Kohl's cabinet aapproved an Internet regulatory bill Wednesday that seeks to protect users' privacy and keep out smut and Nazi propaganda. With its ``multimedia law,'' Germany is forging ahead with a project that the United States and other governments have largely given up as impossible controlling the content of the Internet without compromising civil liberties. Cyberspace ``is not a law-free zone,'' Education and Research Minister Juergen Ruettgers told a news conference. ``No one should think that special technologies put them beyond the reach of the law.'' The new law covers businesses such as telebanking and database services as well as online services. It says that acts already prohibited in Germany and conducting fraudulent business -- will also be illegal in electronic form. CompuServe, the world's second largest online information service, said recently it would consider moving its German operations to a neighboring country if the law becomes too restrictive. The draft law reflects German sensitivities to the confidentiality of personal data, requiring service providers to store as little data as possible. It also reflects the struggle between federal and state authorities over which has the right to regulate the Internet. The German law puts responsibility for suspect content on ``suppliers,'' but this is not clearly defined. Online services such as Compuserve and America Online could be held responsible for legally questionable material after being warned that such material can be accessed through their systems, provided they have the technical means to block it. The German law would pioneer the use of ``digital signatures'' -- strings of data encrypted to establish the origin of transmitted messages. The signatures could prevent fraudulent commercial transactions on the computer network by matching a publicly accessible data string with a confidential number, or key, registered with a central authority. Such signatures could play a major role in preventing computer crime, Interior Minister Manfred Kanther said. The law would bar programs that track users' paths through the Internet, recording what sites they have visited, and would require the opportunity for anonymous use of the system. It also calls for the electronic ``tagging'' of material unsuitable for minors, so it could be filtered out with something similar to the V-chip now under development in the U.S. television industry. After consultations with state governments next week, the government hopes the law will take effect in August 1997, ahead of the planned deregulation of European telecommunications markets in January 1998. "This destiny does not tire, nor can it be broken, and its mantle of strength descends upon those in its service." - Francis Parker Yockey, IMPERIUM _________________________________________________________________ **************************************************************** DIRECT REQUESTS to: list@infowar.com with one-line in the BODY, NOT in the subject line. Subscribe news_from_wschwartau TO JOIN GROUP Unsubscribe news_from_wschwartau TO LEAVE GROUP **************************************************************** http://www.Infowar.Com Managed by Winn Schwartau winn@infowar.com Interpact, Inc./Infowar.Com 11511 Pine St. Seminole, FL 33772 813-393-6600 Voice 813-393-6361 FAX Comments, Content, Sponsor Opportunties Betty O'Hearn Assistant to Mr.Winn Schwartau betty@infowar.com 813-367-7277 Voice 813-363-7277 FAX Happy Holidays and Best Wishes for a Healthy and Happy New Year from Winn Schwartau and the staff from Infowar.Com!! ------------------------------ Date: Thu, 15 Dec 1996 22:51:01 CST From: CuD Moderators Subject: File 7--Cu Digest Header Info (unchanged since 13 Dec, 1996) Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically. CuD is available as a Usenet newsgroup: comp.society.cu-digest Or, to subscribe, send post with this in the "Subject:: line: SUBSCRIBE CU-DIGEST Send the message to: cu-digest-request@weber.ucsd.edu DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS. The editors may be contacted by voice (815-753-0303), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115, USA. To UNSUB, send a one-line message: UNSUB CU-DIGEST Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU (NOTE: The address you unsub must correspond to your From: line) Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" On Delphi in the General Discussion database of the Internet SIG; on RIPCO BBS (312) 528-5020 (and via Ripco on internet); and on Rune Stone BBS (IIRGWHQ) (860)-585-9638. CuD is also available via Fidonet File Request from 1:11/70; unlisted nodes and points welcome. EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown) In ITALY: ZERO! BBS: +39-11-6507540 In LUXEMBOURG: ComNet BBS: +352-466893 UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/ aql.gatech.edu (128.61.10.53) in /pub/eff/cud/ world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/ wuarchive.wustl.edu in /doc/EFF/Publications/CuD/ EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland) ftp.warwick.ac.uk in pub/cud/ (United Kingdom) The most recent issues of CuD can be obtained from the Cu Digest WWW site at: URL: http://www.soci.niu.edu/~cudigest/ COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ------------------------------ End of Computer Underground Digest #8.89 ************************************