mirror of
https://github.com/fdiskyou/Zines.git
synced 2025-03-09 00:00:00 +01:00
518 lines
27 KiB
Text
518 lines
27 KiB
Text
![]() |
==Phrack Inc.==
|
||
|
|
||
|
Volume Three, Issue Thirty-five, File 11 of 13
|
||
|
|
||
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
||
|
PWN PWN
|
||
|
PWN Phrack World News PWN
|
||
|
PWN PWN
|
||
|
PWN Issue XXXV / Part Two PWN
|
||
|
PWN PWN
|
||
|
PWN Compiled by Dispater PWN
|
||
|
PWN PWN
|
||
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
||
|
|
||
|
Justice Revs Up Battle On Computer Crime October 7, 1991
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
by Michael Alexander (ComputerWorld)(Page 4)
|
||
|
|
||
|
Washington D.C. -- The nation's top federal computer crime law enforcers
|
||
|
announced plans to escalate the war on computer crime.
|
||
|
|
||
|
At the federal government's 14th National Computer Security Conference held in
|
||
|
Washington D.C., officials at the U.S. Department of Justice said the
|
||
|
department is launching a computer crime unit that will be charged with
|
||
|
prosecuting crimes and pushing for stiffer penalties for convicted computer
|
||
|
outlaws.
|
||
|
|
||
|
"Computer crime is on the rise, and the Justice Department is taking this area
|
||
|
very seriously -- as well as the FBI, U.S. Secret Service, and the military,"
|
||
|
said Mary Spearing, chief of general litigation and legal advice in the
|
||
|
criminal division at the Justice Department.
|
||
|
|
||
|
The new crime unit will also advocate closing loopholes in the government's
|
||
|
computer crime statute. The Computer Fraud & Abuse Act of 1986 "is outmoded
|
||
|
and outdated," said Scott Charney, a computer crime prosecutor and chief of the
|
||
|
new computer crime unit.
|
||
|
|
||
|
The Justice Department wants to amend the law with a provision that would make
|
||
|
inserting a virus or worm into a computer system a crime, Charney said.
|
||
|
|
||
|
Those convicted of computer crimes will more often be sentenced according to
|
||
|
federal guidelines rather than on recommendation of prosecutors, who may ask
|
||
|
for lighter penalties, said Mark Rasch, the government's attorney who
|
||
|
prosecuted Robert Morris in the infamous Internet worm case.
|
||
|
|
||
|
A new Justice Department policy now mandates that all defendants will be
|
||
|
treated equally, without regard for personal history or other factors that
|
||
|
might mitigate stiffer sentences, Rasch said.
|
||
|
|
||
|
"The penalties for computer crime will become increasingly more severe,"
|
||
|
predicted Kent Alexander, assistant U.S. attorney in Atlanta <prosecutor of the
|
||
|
Atlanta members of the Legion of Doom>. "In five years, they are going to look
|
||
|
back and think a year in jail was a light sentence."
|
||
|
|
||
|
The FBI is "staffing up to address concerns about computer crimes" and
|
||
|
increasing its training efforts, said Mike Gibbons, FBI supervisory special
|
||
|
agent <who worked on both the Morris and the Clifford Stoll KGB hackers
|
||
|
cases>.
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
Supreme Court Refuses Morris Appeal October 14, 1991
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
by Michael Alexander (ComputerWorld)(Page 14)
|
||
|
|
||
|
Washington, D.C. -- The U.S. Supreme Court refused without comment to hear
|
||
|
Robert T. Morris' appeal last week, ending a legal journey that began nearly
|
||
|
three years ago when he injected a worm into the Internet network.
|
||
|
|
||
|
While the trek is over for Morris, there remain serious questions about the
|
||
|
Computer Fraud and Abuse Act of 1986, the statute under which he was
|
||
|
prosecuted.
|
||
|
|
||
|
The refusal to review the Morris case leave intact a "bone breaker" law that
|
||
|
could transform otherwise law-abiding computer users in felons and inhibit the
|
||
|
creative uses of computer technology according to Thomas Viles, an attorney at
|
||
|
the Silverglate & Good law firm in Boston. Viles authored a friend of the
|
||
|
court brief in the Morris appeal on behalf of the Electronic Frontier
|
||
|
Foundation.
|
||
|
|
||
|
Some legal experts worry that computer users who enter a computer system
|
||
|
without authorization, either unwittingly or with the intention of merely
|
||
|
looking around, could be given penalties that are overly severe.
|
||
|
|
||
|
"A single computer entry is of an entirely different order than the destruction
|
||
|
of data or the intentional alteration of data, just as simple trespass is
|
||
|
pretty minor stuff compared to vandalism or burglary," Viles said. "Now if
|
||
|
people whose livelihoods depend on computers get into somebody else's computer
|
||
|
without authorization, they could be in Leavenworth for five years."
|
||
|
|
||
|
The Morris appeal boiled down to the critical question of whether he intended
|
||
|
to cause the harm that ensued after he set loose his ill-conceived computer
|
||
|
program on November 2, 1988.
|
||
|
|
||
|
In 1990, a federal judge in Syracuse, New York ruled that it was not necessary
|
||
|
for the government to prove that Morris intended to cause harm, only that
|
||
|
Morris intended to access computers with authorization or to exceed
|
||
|
authorization that he may have had. Earlier this year a federal appeals court
|
||
|
upheld Morris' May 1990 conviction under which he received three years
|
||
|
probation, a $10,000 fine, and 400 hours of community service.
|
||
|
|
||
|
That affirmation goes against the widely accepted tenet that an injury can
|
||
|
amount to a crime only when deliberately intended, Viles said. "The law
|
||
|
distinguishes, say, between murder and manslaughter. You can't be guilty of
|
||
|
murder if the killing was utterly accidental and unintended."
|
||
|
|
||
|
A General Accounting Office (GAO) report released in 1989 noted other flaws in
|
||
|
the federal computer statute. While the law makes it a felony to access a
|
||
|
computer without authorization, the law does not define what is meant by
|
||
|
"access" or "authorization," the GAO reported.
|
||
|
|
||
|
UPDATING THE LAW
|
||
|
|
||
|
U.S. Department of Justice Officials recently acknowledged that the Computer
|
||
|
Fraud and Abuse Act is outdated and noted that it should be refined <see
|
||
|
Justice Revs Up Battle On Computer Crime (the previous article)>. Scott
|
||
|
Charney, chief of the Justice Department's newly created computer crime unit,
|
||
|
said the department will lobby to fortify the law with provisions that would
|
||
|
outlaw releasing viruses and worms and make it a felony to access a computer
|
||
|
without authorization and cause damage through reckless behavior.
|
||
|
|
||
|
Trespassing into a computer is more serious than it may appear at first
|
||
|
glance, Charney said. "It is not easy to determine what happened, whether
|
||
|
there was damage, how safe the system now is or what the intruder's motives
|
||
|
were."
|
||
|
|
||
|
Some legal experts said they believe the law is already overly broad and do not
|
||
|
advocate expanding it with new provisions. "It is a far-reaching law, whose
|
||
|
boundaries are still not known," said Marc Rotenberg, an attorney and director
|
||
|
of the Washington, D.C. office of Computer Professionals for Social
|
||
|
Responsibility. "The way I read the law is, the Justice Department has
|
||
|
everything it needs and more," he said. "After the Morris decisions, if you
|
||
|
sneeze, you could be indicted."
|
||
|
|
||
|
The Morris case pointed out deficiencies in the law that have resulted from
|
||
|
technology's rapid advance, said Thomas Guidoboni, the Washington, D.C.-based
|
||
|
attorney who defended Morris.
|
||
|
|
||
|
Neither Guidoboni nor Morris were surprised by the Supreme Court's refusal to
|
||
|
hear his appeal, according to Guidoboni. "Robert's case had a particular
|
||
|
problem in that it was the first one involving the 1986 act. They like to take
|
||
|
cases after the circuit courts had had some chance to play with them and see if
|
||
|
there is a disagreement."
|
||
|
|
||
|
Morris is working as a computer programmer in Cambridge, Massachusetts for a
|
||
|
company that "knows who he is and what he's done," Guidoboni said. He declined
|
||
|
to identify the company.
|
||
|
|
||
|
<Editor's Note: Morris was actually the SECOND person to be tried under the
|
||
|
1986 Computer Fraud and Abuse Act. The first person was Herbert Zinn, Jr.
|
||
|
a/k/a Shadow Hawk of Chicago, Illinois, who was convicted in 1989 in a
|
||
|
prosecution led by William Cook, a now former assistant U.S. attorney whose
|
||
|
name most of you should recognize from the Craig Neidorf (Knight Lightning)
|
||
|
and Lynn Doucette (Kyrie) cases.
|
||
|
|
||
|
Zinn was tried as a minor and therefore in a bench trial before a sole judge.
|
||
|
Morris is the first person to be tried under the Act in front of a jury.
|
||
|
Zinn's conviction earned him 10 months in a juveniles prison facility in South
|
||
|
Dakota, a fine of $10,000, and an additional 2 1/2 years of probation that
|
||
|
began after his prison term ended.
|
||
|
|
||
|
For additional information about the Shadow Hawk case, please read "Shadow
|
||
|
Hawk Gets Prison Term," which appeared in Phrack World News, Issue 24,
|
||
|
Part 2.
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
Justice Unit Spurred On By Cross-Border Hackers October 21, 1991
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
by Michael Alexander (ComputerWorld)(Page 6)
|
||
|
|
||
|
Washington D.C. -- The U.S. Department of Justice's formal launch of a computer
|
||
|
crime unit was prompted largely by an alarming rise in computer invasions that
|
||
|
traverse geographic and jurisdictional boundaries, according to a top Justice
|
||
|
Department official.
|
||
|
|
||
|
Robert Mueller III, assistant U.S. attorney general, said the Justice
|
||
|
Department needs to be better prepared to prosecute computer criminals. he is
|
||
|
one of the architects of a five-person unit recently established by the justice
|
||
|
department expressly to combat computer crime.
|
||
|
|
||
|
"One of the principal functions of the unit is to anticipate areas where
|
||
|
federal, state, and local law enforcement will have to expend resources in the
|
||
|
future," Mueller said. "One that comes immediately to our attention is crime
|
||
|
related to computers used as a target as in The Cuckoo's Egg." He was
|
||
|
referring to author Clifford Stoll's account of how he tracked West German
|
||
|
hackers who penetrated U.S. computers for the KGB in exchange for cash and
|
||
|
cocaine.
|
||
|
|
||
|
Increasingly, computer crimes cut across state and international boundaries,
|
||
|
making them difficult to investigate because of jurisdictional limits and
|
||
|
differing laws, Mueller said. The computer crime unit will be charged with
|
||
|
coordinating the efforts of U.S. attorneys general nationwide during
|
||
|
investigations of crimes that may have been committed by individuals in several
|
||
|
states.
|
||
|
|
||
|
One of the unit's first assignments will be to take a pivotal role in OPERATION
|
||
|
SUN-DEVIL, last year's much-publicized roundup of computer hackers in several
|
||
|
states. That investigation is still under way, although no arrests have
|
||
|
resulted, Justice Department officials said.
|
||
|
|
||
|
The unit will coordinate efforts with foreign law enforcers to prosecute
|
||
|
hackers who enter U.S. computer systems from abroad while also working to
|
||
|
promote greater cooperation in prosecuting computer criminals according to
|
||
|
Mueller.
|
||
|
|
||
|
The unit will also assist in investigations when computers are used as a tool
|
||
|
of a crime -- for example, when a computer is used to divert electronically
|
||
|
transferred funds -- and when computers are incidental to a crime, such as when
|
||
|
a money launderer uses a computer to store records of illegal activities,
|
||
|
Mueller said.
|
||
|
|
||
|
"There have been many publicized cases involving people illegally accessing
|
||
|
computers, from phone phreaks to hackers trying to take military information,"
|
||
|
said Scott Charney, chief of the new computer unit. "Those cases have high
|
||
|
importance to us because any time that computers are the target of an offense,
|
||
|
the social cost is very high. If you bring down the Internet and cripple 6,000
|
||
|
machines and inconvenience thousands of users, there is a high social cost to
|
||
|
that type of activity."
|
||
|
|
||
|
The computer crime unit will also work to promote closer cooperation between
|
||
|
the Justice Department and businesses that have been the victims of computer
|
||
|
crime, Charney said.
|
||
|
|
||
|
Law enforcers are better trained and more knowledgeable in investigating and
|
||
|
prosecuting computer crimes, Charney said. "Businesses need not be concerned
|
||
|
that we are going to come in, remove all of their computers, and shut their
|
||
|
businesses down. FBI and Secret Service agents can go in and talk to the
|
||
|
victim in a language they understand and get the information they need with a
|
||
|
minimum amount of intrusion."
|
||
|
|
||
|
<Editor's Note: "Businesses need not be concerned that we are going to come
|
||
|
in, remove all of their computers, and shut their businesses down." Excuse
|
||
|
me, but I think STEVE JACKSON GAMES in Austin, Texas might disagree with that
|
||
|
statement. Mr. Charney -- Perhaps you should issue an apology!>
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
V I E W P O I N T
|
||
|
|
||
|
Let's Look Before We Legislate October 21, 1991
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
by Marc Rotenberg (ComputerWorld)(Page 25)
|
||
|
|
||
|
"Laws Are Adequate To Handle Computer Crime -- 'Net Police' Not Needed"
|
||
|
|
||
|
The U.S. Department of Justice is now circulating a proposal to expand the
|
||
|
reach of federal computer crime law. On first pass, this might seem a sensible
|
||
|
response to concerns about computer crime. The reality, however, it that the
|
||
|
current federal law is more than adequate and the Justice Department proposal
|
||
|
is poorly conceived.
|
||
|
|
||
|
The Justice Department proposal will give federal agencies broad authority to
|
||
|
investigate computer crime, allowing them to intercede in any situations
|
||
|
involving a computer hooked to a network.
|
||
|
|
||
|
Creating a worm or virus could become a felony act, no questions asked.
|
||
|
Espionage laws would be broadened and intent requirements would be lowered.
|
||
|
Certain procedural safeguards would be removed from existing law.
|
||
|
|
||
|
CURRENT LAW ADEQUATE
|
||
|
|
||
|
Taken as a whole, the proposal will make it possible for the federal government
|
||
|
to prosecute many more computer crimes, but the question is whether this
|
||
|
additional authority will improve computer security. Between the current
|
||
|
federal statute, the Morris decision, and the sentencing guidelines, federal
|
||
|
prosecutors already have more than enough tools to prosecute computer crime.
|
||
|
|
||
|
Under the Computer Fraud & Abuse Act, passed in 1984 and amended in 1986, the
|
||
|
unauthorized use of a computer system is a felony. Though the act does not
|
||
|
define what "authorization" is or how it is obtained, a person found guilty
|
||
|
faces up to five years in jail and fines of $250,000. It is a far-reaching law
|
||
|
whose boundaries are still not known.
|
||
|
|
||
|
THE MORRIS FACTOR
|
||
|
|
||
|
The Morris case strengthened the hand of federal prosecutors still further.
|
||
|
The judge ruled that it was not necessary for the government to prove that
|
||
|
Morris intended the harm that resulted when the worm was released, only that he
|
||
|
intended unauthorized use when he did what he did.
|
||
|
|
||
|
>From a common law viewpoint, that's a surprising result. Traditional criminal
|
||
|
law distinguishes between trespass, burglary, and arson. In trespass, which is
|
||
|
a misdemeanor, the offense is entering onto someone else's property. Burglary
|
||
|
is simple theft and arson is destruction. To punish a trespasser as an
|
||
|
arsonist is to presume an intent that may not exist.
|
||
|
|
||
|
A federal appeals court affirmed the Morris decision, and the Supreme Court has
|
||
|
refused to hear his appeal, so now the computer crime statute is essentially a
|
||
|
trip-wire law. The government only has to show that the entry was unauthorized
|
||
|
-- not that any resulting harm was intentional.
|
||
|
|
||
|
There is another aspect of the Morris case that should be clearly understood.
|
||
|
Some people were surprised that Morris served no time and jumped to the
|
||
|
conclusion that sentencing provisions for this type of offense were
|
||
|
insufficient. In fact, under the existing federal sentencing guidelines,
|
||
|
Morris could easily have received two years in jail. The judge in Syracuse,
|
||
|
New York, considered that Morris was a first-time offender, had no criminal
|
||
|
record, was unlikely to commit a crime in the future, and, not unreasonably,
|
||
|
decided that community service and a stiff fine were appropriate.
|
||
|
|
||
|
To "depart" as the judge did from the recommended sentence was unusual. Most
|
||
|
judges follow the guidelines and many depart upwards.
|
||
|
|
||
|
That said, if the Department of Justice persists in its efforts, there are at
|
||
|
least three other issues that should be explored.
|
||
|
|
||
|
UNANSWERED QUESTIONS
|
||
|
|
||
|
First there is the question of whether it is sensible to expand the authority
|
||
|
of federal agents at the expense of local police and state government. If
|
||
|
theft from a cash register is routinely prosecuted by local police, why should
|
||
|
the FBI be called in if the cash register is a computer?
|
||
|
|
||
|
What will happen to the ability of state government to tailor their laws to
|
||
|
their particular needs? Do we really want "Net Police"?
|
||
|
|
||
|
There is also the need to explore the government's performance in recent
|
||
|
computer crime investigations before granting new powers. For example, the
|
||
|
botch Operation Sun-Devil raid, which involved almost one quarter of all Secret
|
||
|
Service agents, resulted in hardly a conviction. (A good cop could have done
|
||
|
better in a night's work.)
|
||
|
|
||
|
In a related investigation, Steve Jackson, the operator of a game business in
|
||
|
Texas was nearly forced out of business by a poorly conceived raid.
|
||
|
|
||
|
In fact, documents just released to Computer Professionals for Social
|
||
|
Responsibility by the Secret Service under the Freedom of Information Act raise
|
||
|
substantial questions about the conduct, scope, and purpose of Operation
|
||
|
Sun-Devil investigations. They reveal, for example, that the Secret Service
|
||
|
monitored and downloaded information from a variety of on-line newsletters and
|
||
|
conferences.
|
||
|
|
||
|
A congressional hearing to assess Operation Sun-Devil would certainly be in
|
||
|
order before granting federal officials new powers.
|
||
|
|
||
|
PROTECTION OF RIGHTS
|
||
|
|
||
|
Finally we should not rush to create new criminal sanctions without fully
|
||
|
recognizing the important civil liberties interests in information
|
||
|
technologies, such as the rights of privacy and free expression. There are,
|
||
|
for example, laws that recognize a special First Amendment interest in newsroom
|
||
|
searches.
|
||
|
|
||
|
But no case has yet made clear the important principle that similar protections
|
||
|
should be extended to computer bulletin boards. New criminal sanctions without
|
||
|
necessary procedural safeguards throws off an important balance in the criminal
|
||
|
justice system.
|
||
|
|
||
|
Expanding the reach of federal law might sound good to many people who are
|
||
|
concerned about computer crime, but broadening criminal law is always
|
||
|
double-edged. Could you prove to a court that you have never used a computer
|
||
|
in an "unauthorized" manner?
|
||
|
|
||
|
<Editor's Note: Marc Rotenberg is the Director of the Washington office of
|
||
|
Computer Professionals for Social Responsibility and he has testified in both
|
||
|
the House of Representatives and the Senate on computer crime legislation.>
|
||
|
_______________________________________________________________________________
|
||
|
|
||
|
PWN Quicknotes
|
||
|
~~~~~~~~~~~~~
|
||
|
|
||
|
1. Operation Sun-Devil Scope Emerges (ComputerWorld, 10/14/91, page 119)
|
||
|
--
|
||
|
The Computer Professionals for Social Responsibility (CPSR), an advocacy
|
||
|
group, received more than 2,400 documents from the U.S. Secret Service
|
||
|
under the Freedom of Information Act. The documents relate to Operation
|
||
|
Sun-Devil, last year's nationwide dragnet through the hacker underground.
|
||
|
An early look at the documents reveals that the scope of the operation was
|
||
|
considerably broader than the U.S. Secret Service has admitted, said Marc
|
||
|
Rotenberg, director of CPSR's Washington, D.C. office. CPSR will soon hold
|
||
|
a press conference to discuss the findings, he added.
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
2. 6 Police Employees Probed for Wiretaps (Washington Post/AP, 10/24/91, page
|
||
|
A4) -- Jefferson City, Missouri -- Missouri's Highway Patrol is
|
||
|
investigating six employees implicated in three illegal wiretaps, officials
|
||
|
said.
|
||
|
|
||
|
The wiretaps were "stupid" and were intended to "gain personal information
|
||
|
in an effort to supervise subordinates," said Colonel C.E. 'Mel' Fisher,
|
||
|
the patrol's chief.
|
||
|
|
||
|
Fisher said that six employees are on administrative leave without pay
|
||
|
after a two-month internal investigation confirmed conversations were
|
||
|
recorded at patrol headquarters and at a troop office in Kirkwood,
|
||
|
Missouri.
|
||
|
|
||
|
Fisher did not identify the employees, who face hearings that could lead
|
||
|
to possible penalties ranging from a written reprimand to dismissal. It is
|
||
|
a federal felony to conduct an illegal wiretap. He said the FBI
|
||
|
investigated the wiretaps.
|
||
|
|
||
|
Major Bobby G. Gibson, chief of the patrol's Criminal Investigation Bureau,
|
||
|
in which two of the wiretaps occurred, committed suicide on October 9,
|
||
|
1991. He was among five defendants in a $7 million federal lawsuit filed
|
||
|
recently by a black patrolman, Corporal Oliver Dixon, who alleged he had
|
||
|
been wiretapped and denied promotions because of his race. All of the
|
||
|
defendants, including Fisher, are white.
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
3. Patrick Townson, the moderator of the Internet's Telecom Digest
|
||
|
(comp.dcom.telecom) was less than pleased when an unknown person placed
|
||
|
Phrack 34 into alt.dcom.telecom. Townson consistently preaches about the
|
||
|
evils of hacking, but we know that he did not learn everything he knows
|
||
|
about telecommunications in the classroom. See you after World War Three
|
||
|
Pat! We know who you are, we know who you WERE and we know what crimes
|
||
|
you have committed in the realm of telecommunications. We're anxious to
|
||
|
talk some more with you about this in the near future.
|
||
|
|
||
|
See below:
|
||
|
|
||
|
"I assume you saw the stuff which was left in alt.dcom.telecom today:
|
||
|
A whole series of messages telling how to break into several voicemail
|
||
|
systems; how to break into the MILNET; a program designed to discover
|
||
|
passwords; and other obnoxious files. All of them were left by the same
|
||
|
anonymous user at the same non-existent site. Siemens Medical Systems
|
||
|
(one of the victims in the theft-of-voicemail-services tutorial in
|
||
|
alt.dcom.telecom today) has been notified that their 800 number link to
|
||
|
voicemail is now under attack, and given the box number involved. Like
|
||
|
cockroaches, you can stomp on those people all you like; they seem to
|
||
|
survive. One person has said in the event of WW-3, the only species to
|
||
|
survive will be the cockroaches and the hackerphreaks. Good socially
|
||
|
responsible computing, that's what it is! PAT"
|
||
|
_______________________________________________________________________________
|
||
|
|
||
|
4. The existence of back issues of Phrack Inc. found in a user's home
|
||
|
directory was enough for a system administrator at Tufts University in
|
||
|
Massachusetts to revoke a users account. Michael Godwin, an attorney for
|
||
|
the Electronic Frontier Foundation went to bat for this individual and
|
||
|
succeeded in restoring the user's account. The incident prompted the
|
||
|
following response by a reader of Telecom Digest (comp.dcom.telecom):
|
||
|
|
||
|
On Oct 19 at 11:51, TELECOM Moderator writes:
|
||
|
|
||
|
> Is it easier and more pragmatic for a
|
||
|
> system administrator to answer to his/her superiors regarding files at
|
||
|
> the site which harassed or defrauded some third party (ie. telco) or
|
||
|
> to simply remove the files and/or discontinue the feed" PAT]
|
||
|
|
||
|
But this requires a judgment call on the part of the system
|
||
|
administrator, does it not? Most of the system administrators that I
|
||
|
know are too busy administering the system to worry about this file or
|
||
|
that feed, except perhaps as it relates to traffic volume or disk space
|
||
|
consumed.
|
||
|
|
||
|
Will we ever get to the point where those in charge will stop dreaming of
|
||
|
practicing mind control? I am so sick of those who are paranoid that
|
||
|
someone somewhere may actually express an uncontrolled thought or idea to
|
||
|
someone else.
|
||
|
|
||
|
Ah, the advantages of owning one's own UUCP site ...
|
||
|
_______________________________________________________________________________
|
||
|
|
||
|
5. The National Public Network Begins Now. You Can Help Build it.
|
||
|
|
||
|
Telecommunications in the United States is at a crossroads. With the
|
||
|
Regional Bell Operating Companies now free to provide content, the shape
|
||
|
of the information networking is about to be irrevocably altered. But
|
||
|
will that network be the open, accessible, affordable network that the
|
||
|
American public needs? You can help decide this question.
|
||
|
|
||
|
The Electronic Frontier Foundation recently presented a plan to Congress
|
||
|
calling for the immediate deployment of a national network based on
|
||
|
existing ISDN technology, accessible to anyone with a telephone
|
||
|
connection, and priced like local voice service. We believe deployment of
|
||
|
such a platform will spur the development of innovative new information
|
||
|
services, and maximize freedom, competitiveness, and civil liberties
|
||
|
throughout the nation.
|
||
|
|
||
|
The EFF is testifying before Congress and the FCC; making presentations to
|
||
|
public utility commissions from Massachusetts to California; and meeting
|
||
|
with representatives from telephone companies, publishers, consumer
|
||
|
advocates, and other stakeholders in the telecommunications policy debate.
|
||
|
|
||
|
The EFF believes that participants on the Internet, as pioneers on the
|
||
|
electronic frontier, need to have their voices heard at this critical
|
||
|
moment.
|
||
|
|
||
|
To automatically receive a description of the platform and details, send
|
||
|
mail to archive-server@eff.org, with the following line:
|
||
|
|
||
|
send documents open-platform-overview
|
||
|
|
||
|
or send mail to eff@eff.org.
|
||
|
_______________________________________________________________________________
|
||
|
|
||
|
6. The September/October 1991 issue of The Humanist has a cover story
|
||
|
regarding Cyberspace, rights and freedoms on nets such as Usenet, and makes
|
||
|
reference to Craig Neidorf, Jolnet, Prodigy and other matters.
|
||
|
_______________________________________________________________________________
|
||
|
|
||
|
7. A Virginia Beach restaurateur plead guilty to illegally taping a telephone
|
||
|
call by Governor L. Douglas Wilder and said he arranged for the tape to be
|
||
|
delivered to the staff of Senator Charles Robb, D-Va., hoping it would be
|
||
|
damaging to Wilder and politically helpful to Robb.
|
||
|
|
||
|
Robert Dunnington, a onetime social companion of Robb's, admitted in
|
||
|
federal court that he intercepted a 1988 car phone call by then-Lt.
|
||
|
Governor Wilder as part of his hobby of monitoring and recording cellular
|
||
|
calls.
|
||
|
|
||
|
From February 1988 to October 1990, Dunnington overheard and taped hundreds
|
||
|
of calls and, his attorney said, it was "just happenstance" that Wilder's
|
||
|
call was picked up. (Washington Post)
|
||
|
_______________________________________________________________________________
|
||
|
|
||
|
8. A Federal District Judge in New York ruled that a computer-network company
|
||
|
is not legally liable for the contents of information it disseminates.
|
||
|
While the decision could be influential because it tackles free speech on
|
||
|
an electronic network, it is not clear how the ruling would affect bulletin
|
||
|
boards ^S^Qon which users add comments. The decision concerned an electronic
|
||
|
gossip column carried by CompuServe. In the decision, the judge stated
|
||
|
"CompuServe has no more editorial control over such a publication than
|
||
|
does a public library, bookstore or newsstand, and it would be no more
|
||
|
feasible for CompuServe to examine every publication it carries for
|
||
|
potentially defamatory statements than it would be for any other
|
||
|
distributor to do so." (Wall Street Journal, October 31, 1991)
|
||
|
_______________________________________________________________________________
|