Copy Link
Add to Bookmark
Report

Computer Undergroud Digest Vol. 05 Issue 90

  



Computer underground Digest Wed Dec 1 1993 Volume 5 : Issue 90
ISSN 1004-042X

Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
Archivist: Brendan Kehoe
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Copy Editor: Tamen O. DeSchrew, III

CONTENTS, #5.90 (Dec 1 1993)
File 1--Conference in Russia
File 2--HR 3627 - Export Controls on Cryptography Software
File 3--Psuedospoofed again
File 4--re: Student sues to regain Internet access (CuD 5.88)
File 5--Re: Cu Digeset, #5.89
File 6--Commentary on Cyber-issues in Elansky/Ionizer Sentence

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115.

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
WHQ) (203) 832-8441 NUP:Conspiracy; RIPCO BBS (312) 528-5020
CuD is also available via Fidonet File Request from 1:11/70; unlisted
nodes and points welcome.
EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
In ITALY: Bits against the Empire BBS: +39-461-980493

ANONYMOUS FTP SITES:
AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
EUROPE: ftp.funet.fi in pub/doc/cud. (Finland)
UNITED STATES:
aql.gatech.edu (128.61.10.53) in /pub/eff/cud
etext.archive.umich.edu (141.211.164.18) in /pub/CuD/cud
ftp.eff.org (192.88.144.4) in /pub/cud
halcyon.com( 202.135.191.2) in /pub/mirror/cud
ftp.warwick.ac.uk in pub/cud (United Kingdom)
KOREA: ftp: cair.kaist.ac.kr in /doc/eff/cud

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.

----------------------------------------------------------------------

Date: 23 Nov 1993 22:29:56 U
From: "Anne" <harwell@BANDW.PANAM.EDU>
Subject: File 1--Conference in Russia

CALL FOR PAPERS

----- (Feel Free To Cross Post This Announcement) ----

Association for International Education

Announces

the First International Conference on Distance Education
in Russia

DISTANCE LEARNING AND NEW TECHNOLOGIES IN EDUCATION

and the Exhibition

BUILDING AN EDUCATIONAL ENVIRONMENT

July 5-8, 1994
Moscow, Russia

CONFERENCE AND EXHIBITION

This conference will display a range of ongoing projects,
studies and initiatives that reflect Russia's needs for changes
in higher education, and the application of new information,
telecommunication, and distance education technologies in the
Russian educational and training sectors.

The conference will stimulate the investigation of practical
approaches to introducing Russians to the new democratic educational
system and market-oriented economy through distance learning and
mass media, as well as to providing Russian students and adults
with world-wide telecommunications access to higher education
institutions and training agencies.

The goal of the exhibition is to demonstrate modern information,
communication, and multimedia technologies, along with their
applications in education and training. It will provide conference
participants with information on the state-of-the-art in
creating the learning environment and classrooms of the 21st
century.

TOPICS OF THE CONFERENCE
Distance Education:
Theory
Quality and Standards; Recognition and Academic
Mobility
Higher Education; Training and Re-training
Economics, Management and Marketing of Distance
Education
Priorities and Strategies

Educational Environment:
Information Technologies in the Classroom
Electronic Tutors and Testing Systems
Multimedia
Audio- and Video-Conferences
Computer Mediated Communications
Innovative Solutions

DEMONSTRATIONS
The conference will also serve as a site for the
showcasing of completed or ongoing projects.

The Information Systems Research Institute of Russia
(ISRIR) is responsible for the Federal program aimed at
the development of new information technologies in
Russian higher education. ISRIR will award limited number
of grants to support selected projects. Other
organizations and foundations are invited to observe the
presentations of working projects and other activities.

EXHIBITION
The exhibition focuses on the equipment, systems,
software and other products or processes that can be used
in distance learning and education process in general.
Organizations, corporations, and institutions are invited
to present their educational products supportive to
distance learning and international education.

Special guest tours of decision-makers and experts from
Russian Ministries, governmental agencies, state and
private comp3anies and institutions will be organized.
Invitations are being sent to key people from the
user/purchaser community in Russia.

The winners of a national competition for creative
software will demonstrate their products to potential
partners.

SUBMISSION OF PAPERS
The official languages for presentations are Russian
and English. Translation facilities will be provided on
request. All the presented papers must be in English.

Prospective presenters must submit the following to the
Program Committee by January 1, 1994, by fax or e-mail in
plain ASCII form:
(i) presenter proposal form;
(ii) a one-page abstract suitable for the conference
program booklet.
Please indicate under which topic you feel your paper
should be presented.

Acceptance of a paper implies a commitment on the part
of the author(s) to present it at the conference.
Accepted papers will be published in the conference
proceedings.

Final decisions on acceptance of papers for the 1994
conference proceedings will be made by the Program
Committee of international experts by February 1, 1994.
All presenters will be notified.


KEY DATES
January 1 - Deadline of submission of abstracts
February 1 - Notification of acceptance of papers
March 1 - Preliminary program will be published.
Deadline of submission of full papers
in English (not exceeding 5000 words)
April 1 - Conference registration deadline
July 5 - Conference starts


CONFERENCE REGISTRATION FEE
Payment before April 1, 1994: USD 200
Payment after April 1, 1994: USD 250
This payment does not include accommodation and
transportation expenses.

Chairman of the International Program Committee
+-----------------------------------------------
Michael G. Moore, Editor
The American Journal of Distance Education

Chairman of The National Organizing Committee
+---------------------------------------------
Alexander N. Tikhonov
First Vice-Chairman,
Russian Federation State Committee
for Higher Education (Ministry)

THE ASSOCIATION FOR INTERNATIONAL EDUCATION
The Association was created in 1993 and is a not-for-
profit, non-governmental, publicly supported, educational
service organization with the goal of assisting in
enhancing the quality and availability of international
educational exchange programs using computer,
telecommunication and information technologies, and
developing a distance education system in Russia.

Its objective is, among others, to provide a channel
for the international exchange of information, experience
and material in the field of education technology,
including new information technologies in distance
education - with particular reference to business,
technical and vocational education, industrial and
commercial training, teacher training and continuing
education.

The Association unites leading Russian educational and
academic institutions, including State Pedagogical
University, Peoples Friendship University. The
Association is supported by the Russian Federation State
Committee for Higher Education and Information Systems
Research Institute of Russia.

SPONSORS
Organisations interested in acting as co-sponsors of
the Conference are asked to contact the Conference
Secretariat for further information.

o
+ X-------- Cut here -----------------------------------
O

First International Conference on
Distance Education in Russia

"DISTANCE LEARNING AND NEW TECHNOLOGIES IN EDUCATION"

PRESENTER PROPOSAL FORM

First name, last name:___________________________________
+________________________________________________________
Job or Title:____________________________________________
+________________________________________________________
Organisation:____________________________________________
Title of the paper:______________________________________

Sessions of the Conference:

Distance Education:
Theory
Quality and Standards
Recognition and Academic Mobility
Higher Education
Training and Re-training
Economics, Management and Marketing of
Distance Education
Educational Environment:
Information Technologies in a Classroom
Electronic Tutors and Testing Systems
Multimedia
Audio- and Video-Conferencing
Computer Mediated Communications
Innovative Solutions

Co-presenters:___________________________________________
Equipment Needs:_________________________________________
+________________________________________________________
Address:_________________________________________________
+________________________________________________________
Telephone (work, home):__________________________________
Facsimile:_______________________________________________
E-mail:__________________________________________________

Please return to the Conference Secretariat:
ROSNIIIS (12-4), 22 Shepkina, 129090 Moscow, Russia
Fax: 7(095) 954-5127 and 288-1861
Internet: DE_RUSSIA_1994@AIE.MSK.SU
O
+--X-------- Cut here -----------------------------------
o

First International Conference on Distance Education in
Russia

"DISTANCE LEARNING AND NEW TECHNOLOGIES IN EDUCATION"

INFORMATION REQUEST

To receive future Conference/Exhibition
announcements, please complete this form, detach and send
to the address below.

First name, last name:___________________________________
+________________________________________________________
Job or Title:____________________________________________
+________________________________________________________
Organisation:____________________________________________
Address:_________________________________________________
+________________________________________________________
Telephone (work, home):__________________________________
Facsimile:_______________________________________________
E-mail:__________________________________________________

Please add your questions, ideas and comments below.
+________________________________________________________
+________________________________________________________
+________________________________________________________
+________________________________________________________
+________________________________________________________
+________________________________________________________
+________________________________________________________
+________________________________________________________
+________________________________________________________
+________________________________________________________
+________________________________________________________


Please return to the Conference Secretariat:
ROSNIIIS (12-4), 22 Shepkina, 129090 Moscow, Russia
Fax: 7(095) 954-5127 and 288-1861
Internet: DE_RUSSIA_1994@AIE.MSK.SU

------------------------------

Date: 26 Nov 1993 23:18:39 GMT
From: Dave Banisar <Banisar@washofc.cpsr.org>
Subject: File 2--HR 3627 - Export Controls on Cryptography Software

Maria Cantwell
1st District, Washington
1520 Longworth Building
Washington, DC 20515
202-225-6311


Congress of the United States
House of Representatives
Washington, DC 20515-4701



For Immediate Release For More Information
November 23, 1993 Larry West (202) 225-6311


Cantwell Introduces "Encryption" bill to Expand Export Markets for US
Computer and Software Companies

US Rep. Maria Cantwell (D-WA) has introduced legislation to amend the
Export Administration Act to allow US computer and software
manufacturers to compete in an international market that could mean as
much as $6 billion to $9 billion a year to American high-tech
industries. Cantwell's bill would liberalize export controls on software
that features encryption capabilities, which protect computer data
against unauthorized disclosure, theft or alteration.

As communications systems link more and more computers and telephones
around the world, Cantwell said, businesses and indviduals are becoming
more concerned about protecting the privacy of their electronic files,
messages and transactions. She said the worldwide demand for
cryptographic software, and computer systems that employ such software,
is growing rapidly and American companies must be allowed to meet that
demand. According to Cantwell, this legislation is needed to ensure that
American companies do not lose critical international markets to foreign
competitors, who operate with few export restrictions. Currently, more
than 200 software and hardware products for text, file and data
encryption are available from 20 foreign countries.

"The Export Administration Act has erected a wall between American
high-tech companies and their international customers -- it's time to
lower the wall," Cantwell said. "Computer and software technology are
among the most competitive fields in the world, and American companies
are the clear leaders. To maintain that lead, American companies must be
able to respond to worldwide consumer demand."

Robert Holleyman, president of the Business Software Alliance, an
association of America's nine leading software companies, applauded
Cantwell for introducing the leigslation and said the bill would "assist
US software companies and maintaining their competitive edge in
international markets."

Dr. Nathan Myhrvold, senior vice president for Advance Technology at
Microsoft Corporation in Redmond, Washington, also praised Cantwell for
her leadership on this issue.

"The ability to include encryption features in software we sell
markets," Myhrvold said. " We commend Rep. Cantwell for recognizing the
importance of this issue to the American software industry."


CANTWELL ON EXPORT CONTROLS/ ADD ONE

Cantwell said current export controls that prohibit the export of
American software programs that offer good encryption capabilities only
make it harder for American companies to compete internationally. She
said the regulations ignore the realities of today's post-Cold War
global economy and the needs of one of this country's most innovative
and successful industries. American software companies currently
command a 75 percent worldwide market share, and many of those companies
earn more than 50 percent of their annual revenues from exports, but
Cantwell said that could change quickly.

"The United States' export control system is broken and needs to be
fixed," Cantwell said. "It was designed as a tool of the Cold War, to
help America fight against enemies that no longer exist. If we continue
to prevent American companies from meeting the worldwide demand for
cryptographic software, America gains nothing -- but those companies
stand to lose $6 billion and $9 billion a year."

Paul Brainerd, CEO of Aldus in Seattle, said, "Rep. Cantwell's bill
would liberalize outdated export controls, which are threatening the
continued success of America's software companies in world markets. In
order to remain competitive worldwide, American companies must be able
to offer features -- like information security -- demanded by our
customers and available from foreign companies."

Cantwell said her legislation would not interfere with the
government's ability to control exports to nations with terrorist
tendencies (such as Iran, Libya and Syria) or other embargoed countries
(such as Cuba and North Korea). On the other hand, she said, current
export controls on American software do not prevent anyone from
obtaining cryptographic software.

"Much of this is ordinary shrink-wrapped software," Cantwell said,
"the kind millions of people buy every day for their home and business
computers at regular retail outlets. International consumers who cannot
purchase American computer systems and software programs with encryption
features don't do without, they just buy those products elsewhere. They
are concerned with protecting their privacy and keeping their businesses
secure."

Cantwell said she is determined to bring the issue out from behind
closed doors and into the light of public debate before the House
Subcommittee on Economic Policy, Trade and Environment marks up the
Export Administration Act early next year. She said she hopes her bill
will encourage the Administration to act quickly to revise export
controls on software -- perhaps before Congress reconvenes in late
January.

"The Administration is reviewing this issue, and I think they are
interested in making the changes that will allow American companies to
remain competitive," Cantwell said. "I would like nothing better than
to come back to Congress after the recess and discover that the problem
had been solved."

###


AMERICAN COMPUTER COMPANIES MUST BE ALLOWED TO
EXPORT SOFTWARE WITH ENCRYPTION CAPABILITIES


_Introduction and Summary_

America's computer software and hardware companies, including such
well-known companies as Apple, DEC, Hewlett-Packard, IBM, Lotus,
Microsoft, Novell and Wordperfect, have been among the country's most
internationally competitive firms earning more than one-half of their
revenues from exports. Unfortunately, this vital American industry is
directly threatened by unilateral U.S. Government export controls which
prevent those companies from meeting worldwide user demand for software
that includes encryption capabilities to protect computer data against
unauthorized disclosure, theft or alteration. Legislative action is
needed to ensure that American companies do not lose critical
international markets to foreign software companies that operate without
significant export restrictions.


_The Problem_

With ready access to powerful, interconnected, computers, business and
home users increasingly are relying on electronic information storage
and transmissions to conduct their affairs. At the same time, computer
users worldwide are demanding that computer software offer encryption
capabilities to ensure that their data is secure and its integrity is
maintained.

Unfortunately, current unilateral U.S. "munitions" export controls
administered by the National Security Agency and the State Department
effectively prohibit the export of American software programs offering
good encryption capabilities.

Yet these unilateral U.S. controls are _not_ effective in restricting
the availability of encryption abroad. More than 200 generally
available, mass-market foreign commercial programs and products, as well
as many programs available from the Internet, all offer good encryption.
In addition, generally available software with encryption capabilities
is sold within the U.S. at thousands of retail outlets, by mail and over
the phone. These programs may be transferred abroad in minutes by
anyone using a public telephone line and a computer modem.

The only result of continued U.S. export controls is to threaten the
continued preeminence of America's computer software and hardware
companies in world markets. American software companies stand to lose
between $6 and $9 billion in annual revenues from sales of generally
available software. In addition, American hardware companies are losing
hundreds of millions of dollars in computer system sales every year,
because sales increasingly are dependent on the ability of a U.S. firm
to offer encryption as a feature of an integrated customer solution
involving hardware, software and services.


_The Solution_

Legislation introduced by U.S. Rep. Maria Cantwell would ensure that
exports of software with encryption capabilities would be controlled by
the Secretary of Commerce as a commercial item and would be exportable.
This legislation is strongly supported by the Business Software Alliance
and the Industry Coalition on Technology Transfer.


+-----------------------------------------------------------------------

SECTION-BY-SECTION ANALYSIS OF CANTWELL BILL
EXPORT CONTROL LIBERALIZATION FOR
INFORMATION ECURITY PROGRAMS AND PRODUCTS


_Section 1_

Section 1 amends the Export Administration Act by adding a new
subsection that specifically addresses exports of computer hardware,
software and technology for information security including encryption.
The new subsection has three basic provisions:

1) It gives the Secretary of Commerce exclusive authority over the
export of such programs and products except those which are specifically
designed for military use, including command, control and intelligence
applications or for deciphering encrypted information.

2) The Government is generally prohibited from requiring a validated
export license for the export of generally available software (e.g. mass
market commercial or public domain software) or computer hardware simply
because it incorporates such software.
Nevertheless, the Secretary will be able to continue controls on
countries of terrorists (like Lybia, Syria and Iran) or other embargoed
countries (like Cuba and North Korea) pursuant to the Trading With The
Enemy Act os the International Emergency Economic Powers Act (except for
instances where IEEPA is employed to extend EAA-based controls when the
EAA is not in force).

3) The Secretary is required to grant validated licenses for exports of
sotware to commercial users in any country to which exports of such
software has been approved for use by foreign financial institutions.
Importantly, the Secretary is not required to grant such export
approvals if there is substantial evidence that the software will be
diverted or modified for military or terrorists' end-use or re-exported
without requisite authorization.


_Section 2_

Section 2 provides definitions necessary for the proper implementation
of the substantive provisions. For example, generally available
software is offered for sale or licensed to the public without
restriction and available through standard commercial channels of
distribution; sold as is without further customization; and designed to
be installed by the purchaser without additional assistance from the
publisher. Computer hardware and computing devices are also defined.


+--------------------------------------------------------------------



103D CONGRESS H.R. 3627
1ST SESSION

---------------------------------------

IN THE HOUSE OF REPRESENTATIVES

MS. CANTWELL (for herself and ___) introduced the following bill which
was referred to the Committee on __________.


---------------------------------------

A BILL

To amend the Export Administration Act of 1979 with
respect to the control of computers and related equipment.


1 Be it enacted by the Senate and House of Representa-
2 tives of the United States of America in Congress Assembled,
3 SECTION 1. GENERALLY AVAILABLE SOFTWARE
4 Section 17 of the Export Administration Act of 1979
5 (50 U.S.C. App. 2416) is amended by adding at the end
6 thereof the following new subsection:
7 %%(g) COMPUTERS AND RELATED EQUIPMENT.---
8 %%(1) GENERAL RULE.---Subject to paragraphs
9 (2) and (3), the Secretary shall have exclusive au-


2


1 thority to control exports of all computer hardware,
2 software and technology for information security
3 (including encryption), except that which is specifi-
4 cally designed or modified for military use, including
5 command, control and intelligence applications.
6 %%(2) ITEMS NOT REQUIRING LICENSES.---No
7 validated license may be required, except pursuant
8 to the Trading With The Enemy Act or the Inter-
9 national Emergency Economic Powers Act (but only
10 to the extent that the authority of such act is not
11 exercised to extend controls imposed under this act),
12 for the export or reexport of---
13 %%(A) any software, including software with
14 encryption capabilities, that is---
15 %%(i) generally available, as is, and is
16 designed for installation by the purchaser;
17 or
18 %%(ii) in the public domain or publicly
19 available because it is generally accessible
20 to the interested public in any form; or
21 %%(B) any computing device soley because
22 it incorporates or employs in any form software
23 (including software with encryption capabilities)
24 exempted from any requirement for a validated
25 license under subparagraph (A).


3


1 %%(3) SOFTWARE WITH ENCRYPTION CAPABILI-
2 TIES.---The Secretary shall authorize the export or
3 reexport of software with encryption capabilities for
4 nonmilitary end-uses in any country to which ex-
5 ports of software of similar capability are permitted
6 for use by financial institutions not controlled in fact
7 by United States persons, unless there is substantial
8 evidence that such software will be---
9 %%(A) diverted to a military end-use or an
10 end-use supporting international terrorism;
11 %%(B) modified for military or terrorist end-
12 use; or
13 %%(C) reexported without requisite United
14 States authorization.
15 %%(4) DEFINITIONS.---As used in this
16 subsection---
17 %%(A) the term %generally available' means,
18 in the case of software (including software with
19 encryption capabilities), software that is offered
20 for sale, license, or transfer to any person with-
21 out restriction through any commercial means,
22 including, but not limited to, over-the-counter
23 retail sales, mail order transactions, phone
24 order transactions, electronic distribution, or
25 sale on approval;


4


1 %%(B) the term %as is' means, in the case of
2 software (including software with encryption ca-
3 pabilities), a software program that is not de-
4 signed, developed, or tailored by the software
5 company for specific purchasers, except that
6 such purchasers may supply certain installation
7 parameters needed by the software program to
8 function properly with the purchaser's system
9 and may customize the software program by
10 choosing among options contained in the soft-
11 ware program;
12 %%(C) the term %is designed for installation
13 by the purchaser' means, in the case of soft-
14 ware (including software with encryption capa-
15 bilities)---
16 %%(i) the software company intends for
17 the purchaser (including any licensee or
18 transferee), who may not be the actual
19 program user, to install the software pro-
20 gram on a computing device and has sup-
21 plied the necessary instructions to do so,
22 except that the company may also provide
23 telephone help line services for software in-
24 stallation, electronic transmission, or basic
25 operations; and---



5


1 %%(ii) that the software program is de-
2 signed for installation by the purchaser
3 without further substantial support by the
4 supplier;
5 %%(D) the term %computing device' means a
6 device which incorporates one or more
7 microprocessor-based central processing units
8 that can accept, store, process or provide out-
9 put of data; and
10 %%(E) the term %computer hardware', when
11 used in conjunction with information security,
12 includes, but is not limited to, computer sys-
13 tems, equipment, application-specific assem-
14 blies, modules and integrated circuits.''

------------------------------

Date: Tue, 30 Nov 93 09:05:29 -0500
From: ferguson@ICP.NET(Paul Ferguson x2044)
Subject: File 3--Psuedospoofed again

In Cu Digest, #5.89, Michael Roberts <nagap@mindvox.phantom.com>
forwarded a message entitled "A Psychopunk's Manifesto," which
contains a byline of "...by T.C. Hughes."

This "document" has already made its rounds in the cypberspatial world
and its originator has stirred up quite a bit of trouble by incessant
claims of conspiracy in the .cypherpunks agenda.

CuD readers should be aware that "T.C. Hughes" does not exist; this
"manifesto" is a psuedospoof in itself. The "T.C. Hughes" moniker is
an apparent conjugation of the real identities of Tim May and Eric
Hughes (who, in fact, did not author the original message), who
started the .cypherpunks mailing list. The message, if memory serves
me correctly, was originally composed by an12070, an anonymous
harbinger at penet.fi, who has appeared under several alaises,
including Medusa, The Executioner, S.Boxx and more recently, The
Pervert.

Looks like the psuedospoof has come home to roost.

------------------------------

Date: Sun, 28 Nov 93 23:45:08 EDT
From: Jerry Leichter <leichter@LRW.COM>
Subject: File 4--re: Student sues to regain Internet access (CuD 5.88)

A recent CuD article reports on the case of Gregory Steshenko, who was
terminated by Microsoft for some of his network postings, then began
posting from his University of Texas account, and is now suing the
university when it responded to complaints by removing his account (or
at least his network posting privileges). Mr. Steshenko claims First
Amendment protections, and the article quotes various "electronic
frontier" personalities describing this as an important case for free
speech on the networks.

It bothers me how little thought these spokesmen appear to be giving
to the effects of what they are defending. The Internet has been
described as an anarchy, but in fact only relatively small parts of
the Internet are actually anarchic. Most of the Internet, in fact, is
better described as self-governing. There are a variety of social
norms concerning network use and interactions. One doesn't post
messages to unrelated groups. One doesn't evade moderation
restrictions. One maintains a certain (rather limited, it must be
admitted) degree of restraint in how one describes other network
participants. There are few effective mechanisms for enforcing these
norms, and they are certainly broken on an all-too-regular basis; but
the network continues to function because social pressure *can* be
applied to those who become too annoying; and in the most outrageous
cases, it's possible to remove the offenders' access to the net. I
can cite two specific examples of this in the recent past:

- A regular poster to the INFO-VAX mailing list lost patience with
some of the sillier postings appearing there and began to
berate those who asked "dumb" questions. As time went on,
his postings became more and more abusive, and eventually a
fair amount of bandwidth was being used in debates about his
postings, rather then the technical issues that group is list
is meant to discuss. The list maintainer, who's been very
"hands-off" over the years, asked the abuser to tone things
down. This drew a characteristically insulting response.
The list maintainer modified the forwarding software to
block all postings by this person.

Needless to say, cries of "censorship!" were heard for a while
(though not, interestingly enough, from the person being
censored; to his credit, he had a message forwarded to the
list acknowledging the right of the list maintainer to do what
he had done) - but the list soon settled back to more useful
issues.

- Someone posted messages ostensibly asking for information about some
sex phone lines - but in fact really acting as ads for those
lines. The messages were posted to every single Usenet news
group. The person's account was removed after multiple
complaints to his system manager. He then obtained an account
on a different system, and started his postings again. This
time, his account was removed rather quickly. He's been
quiet since.

Depending on how you look at these two incidents, they either
represent self-government or censorship. My own view is that it's the
former. No community can exist without some degree of self definition
and regulation. It's all too easy to disrupt a discussion; all it
takes is a powerful and insistent voice. That's not hard to acquire
on the network; all it takes is the willingness to spend time typing.
(In the case of the sex phone line ads, all it took was a dumb program
to walk the list of newsgroups.)

I expect Mr. Steshenko will probably prevail: Individualism is a
strong thread in our political and legal history, and is exteremely
powerful in the area of free speech. Even if he loses his lawsuit,
he'll get Internet access in some other form, and continue his
(according to the original article) offensive postings and other
actions. Some will cheer this as an extension of First Amendment
rights to electronic media. I think it makes an excellent example of
why "First Amendment rights" should *not* be blindly extended to all
electronic media without careful analysis.

I can ignore a leaflet or newspaper; I can choose not to stop and
listen to a speaker on a public street. It's much harder to be quite
so accepting of loudspeakers at 3:00 AM, or of repeated harranging
telephone calls. And, indeed, speech using the latter modalities is
much more tightly regulated than that using the former. Where do the
electronic media fall? I submit they fall somewhere in between:
Messages are more easily ignored than, say, people who show up at
meetings and spend all their time shouting about their pet peeve, but
in large enough volume inappropriate messages are at least as damaging
to discourse. Private Email is more easily ignored than telephone
calls, but either can constitute harrassment. (While in principle,
direct speech can also be harrassing, except for recent "political
correctness" cases, it's not easy to find even claims of harrassment
in this form. Phone harrassment, on the other hand, is seen enough in
need of regulation that you can find quotations from tarriffs and laws
touching on the matter in the front of any phone book.)

------------------------------

Date: Wed, 1 Dec 1993 02:02:31 GMT
From: kadie@CS.UIUC.EDU(Carl M Kadie)
Subject: File 5--Re: Cu Digeset, #5.89

Anon by Request (a student at UTD) writes:

>It would seem to me that Steshenko has violated his contract with UTD.
>The document we have to sign in order to get an account makes it clear
>that the system is to be used for educational purposes only, and that
>we are subject to account cancellation if we abuse privileges...

But does the U. of Texas at Dallas interpret and apply this policy
consistently or does it single out offensive speech for punishment?

Any institution that calls itself a university should interpret
"educational purposes" broadly. The "Joint Statement on Rights and
Freedoms of Students", the main statement of academic freedom for U.S.
students, says:

Academic institutions exist for the transmission of knowledge, the
pursuit of truth, the development of students, and the general
well-being of society. Free inquiry and free expression are
indispensable to the attainment of these goals. As members of the
academic community, students should be encouraged to develop the
capacity for critical judgment and to engage in a sustained and
independent search for truth.

From what I know of Steshenko's postings, they easily fits this broad
interpretation of "educational".

>Why does he think he can get away from this at a government-run
>facility, when he couldn't at Microsoft?

Because like any organization, the U. of Texas must work within its
charters, these include the U.S. Constitution. The U.S. Supreme Court
has said that this limits the Government's authority to control the
media that owns and controls. The rationale is that it would be
dangerous for a Government that is elected by the people to have too
much control on the content of what people read and write.

The Supreme Court calls created forums, like a student newspaper or
campus mail systems, limited public forums. It says that the
government can limited who may access these forums and/or what topics
may be discussed. But otherwise, "it is bound by the same standards as
apply in a traditional public forum"; "content-based prohibition must
be narrowly drawn to effectuate a compelling state interest."

_Public Schools Law: Teachers' and Students' Rights_ 2nd Ed. by Martha
M. McCarthy and Nelda H. Cambron-McCabe says:
"Although school boards are not obligated to support student
papers, if a given publication was originally created as a free speech
forum, removal of financial or other school board support can be
construed as an unlawful effort to stifle free expression. In essence,
school authorities cannot withdraw support from a student publication
simply because of displeasure with the content. In an illustrative
case, the Eight Circuit Court of Appeals ruled that a university could
not change its funding policy for a student paper based on the 'hue
and cry' of the public objecting to a particular issue [Stanley v.
Magrath, 719 F.2d 279, 282-283 (8th Cir. 1983).]

- Carl

REFERENCES

ftp://ftp.eff.org/pub/academic/academic/student.freedoms.aaup
ftp://ftp.eff.org/pub/academic/faq/media.control

------------------------------

Date: Wed, 1 Dec 1993 22:51:01 EST
From: IIRG <rune@world.std.com>
Subject: File 6--Commentary on Cyber-issues in Elansky/Ionizer Sentence

IIRG RESPONSE TO THE ELANSKY SENTENCING

The sentencing of Michael Elansky to 28 months in prison makes us
wonder who will be the next victim of our judicial system. Although we
may not agree with Judge Miano's ruling on the alleged probation
violations, we can understand the ruling resulted mainly due to
Miano's lack of knowledge in the field of telecommunications. The
initial charges that were the reason for Mike's arrest were dropped.
Given this, we wonder just how he violated his probation. It makes no
sense to us, nor to the many people we've consulted. Our main concerns
now are the terms of Mike's probation:

1. A ban preventing anyone under 18 years of age to use Elansky's
computer bulletin board, The Ware House.

This is an interesting idea. How does the Judge propose that Mike
enforce this? If a simple statement of age at logon is expected to be
enough, then this ruling is essentially unenforceable. A 13 year old
child can simply logon as a 35 year old adult.

On the other hand, if the Judge expects mail in registrations with a
photo-copy of a driver's license m from his users, this would defeat
the purpose of running the board in the first place, which is to
promote free exchange of information and ideas between the users under
the freedom which anonymity provides. Unfortunately, many systems have
been forced to adopt this policy.

2. A ban on Elansky (Ionizer) placing pyrotechnic information or any
other "harmful" information on his bulletin board.

It would be difficult to cite a more blatant example of First
Amendment infringement than the above. "Harmful" is an utterly
subjective term entirely open to interpretation. Harmful to whom or to
what? And just who would be charged with determining whether or
not a particular piece of information is "harmful?" In addition,
according to mandate one, there would be no users under the age of 18.
Aren't adults entitled to freedom from government censorship, or is
this becoming another Red China? Where's the EFF when you need them?

3. A requirement that a probation officer have complete freedom to
search Elansky's computer system to ensure the requirements have
not been violated.

Does this mean Mike must grant sysop access to a probation officer?
We personally know of no sysop that would like an untrained, computer
illiterate individual rummaging through his BBS. "Big Brother"
conspiracy freaks will love this one.

We only hope that in future cases, courts will become more educated as
to the inner workings of the BBS community. If the current trend
continues, we can only see a gross violation of personal privacy in
the future.

Will the proposed "Information Super-Highway" become a super
speed-trap?

------------------------------

End of Computer Underground Digest #5.90
************************************




← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT