Copy Link
Add to Bookmark
Report

Computer Undergroud Digest Vol. 07 Issue 14

  



Computer underground Digest Sun Feb 19, 1995 Volume 7 : Issue 14
ISSN 1004-042X

Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
Archivist: Brendan Kehoe
Retiring Shadow Archivist: Stanton McCandlish
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Copy Ediotr: Ettie-Ann Shrdlu

CONTENTS, #7.14 (Sun, Feb 19, 1995)

File 1--Finnish anonymity compromised by Interpol (fwd)
File 2--Unauthorized Access (Cu Documentary)
File 3--(fwd) PETITION to Congress to Stop Senate Bill S.314
File 4--OREGON HOUSE BILL 2319 -
File 5--CuD's WWW Homepage - http://sun.soci.niu.edu:80/~cudigest
File 6--Cu Digest Header Info (unchanged since 18 Feb, 1995)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

----------------------------------------------------------------------

Date: Sun, 19 Feb 1995 21:41:12 -0600 (CST)
From: David Smith <bladex@BGA.COM>
Subject: File 1--Finnish anonymity compromised by Interpol (fwd)

---------- Forwarded message ----------
From--an0@anon.penet.fi (The Anonymous Administrator)
Organization--Anonymous contact service
Reply-To--an0@anon.penet.fi
Date--Sat, 18 Feb 1995 12:03:58 UTC
Subject--Anon.penet.fi compromised!

I am pretty shocked! Based on a request from Interpol, the Finnish
police have gotten a search&seizure warrant on my home and the
anon.penet.fi server, and gotten the real mail address of a user that
has allegedly posted material stolen from the Church of Scientology.
Fortunately I managed to prevent them from getting more than this one,
single address.

There is going to be a very high-level public debate on how it is
possible that a country that prides itself on honoring human rights
and privacy very strongly has allowed this to happen. Maybe we can use
the publicity to stop this from happening again.

But in this situation, I find it pretty understandable that some of
you might want all traces of your ID removed. I have now added the
alias "remove@anon.penet.fi" to my server. If you want to be removed,
just send a (possibly empty) message to that address. But I am hoping
it won't be empty. I am hoping that you do outline *why* you have
needed the server, and what you think about the actions of the Finnish
authorities.

The messages will be anonymized using the normal anon.penet.fi
procedure, and used to support the demand for a re-interpretation of
the privacy laws in Finland.

If you *don't* want to be removed, but still want to send a comment,
you can use the addresses anon-support@lists.otol.fi (if you are *for*
keeping the server) and anon-against@lists.otol.fi (if you are
*against* the server). If you want to be anonymous, use
anon-support@anon.penet.fi and anon-against@anon.penet.fi.

Julf (admin@anon.penet.fi)

------------------------------

Date: Fri, 17 Feb 1995 14:26:27 +0000
From: A. Savage <savage@dfw.net>
Subject: File 2--Unauthorized Access (Cu Documentary)

(MODERATORS' COMMENT: A hearty congrats to "A. Torq.")

UNAUTHORIZED ACCESS

"Unauthorized Access [is] a documentary that tells the story of the
computer underground from our side, it captures the hacker world
from Hamburg to Los Angeles and virtually everywhere in between."
2600 - The Hacker Quarterly

Computers are becoming an integral part of our everyday existence.
They are used to store and send a multitude of information, from
credit reports and bank withdrawals, to personal letters and highly
sensitive military documents. So how secure are our computer
systems?

The computer hacker is an expert at infiltrating secured systems,
such as those at AT&T, TRW, NASA or the DMV. Most computer systems
that have a telephone connection have been under siege at one time
or another, many without their owner's knowledge. The really good
hackers can reroute the telephone systems, obtain highly sensitive
corporate and government documents, download individual's credit
reports, make free phone calls globally, read private electronic
mail and corporate bulletins and get away without ever leaving a
trace.

So who are these hackers? Just exactly WHAT do they do and WHY do
they do it? Are they really a threat? What do they DO with the
information that they obtain? What are the consequences of their
actions? Are hackers simply playing an intellectual game of chess
or are hackers using technology to fight back and take control of
a bureaucratic system that has previously appeared indestructible?

Unauthorized Access is a documentary that demistifies the hype and
propaganda surrounding the computer hacker. Shot in 15 cities and
4 countries, the film hopes to expose the truths of this subculture
focusing on the hackers themselves. Unauthorized Access is
a view from inside the global underground.

For a copy send a money order for 15 UK Pounds (PAL/European
Standard) or 25$ US Dollars (NTSC/American Standard) to:

Savage Productions
Suite One
281 City Road
London EC1V 1LA
England

or contact <savage@dfw.net>

------------------------------

Date: Sun, 19 Feb 1995 13:51:50 -0600 (CST)
From: David Smith <bladex@BGA.COM>
Subject: File 3--(fwd) PETITION to Congress to Stop Senate Bill S.314

Attached is a net.petition opposing Senate Bill S.314.

Personally, rather than requesting that Congress simply stop all debate
and action on S.314 (as this petition asks), I support the solution
advocated by Lance Rose in the latest issue of Computer Underground
Digest -- which is a tuck, modification, and alteration of the bill to
make it more amenable to online interests. Lance suggests such things as
removing the "and otherwise make available" phrases that has spooked the
Net; defining jurisdiction as the location of the BBS or system; and a
couple of other ideas. I hope that this is the course taken by national
groups like the Center for Democratic Technology, Electronic Private
Iniative Center, and Electronic Frontier Foundation.

---------- Forwarded message ----------
From--noring@netcom.com (Jon Noring)
Subject--PETITION to Congress to Stop Senate Bill S.314
Summary--S. 314 Poses a real danger to freedom of expression on all E-Networks

[Please distribute this Petition far and wide, and upload it everywhere (where
appropriate, of course).]

*** PROTECT THE INTERNET. READ THIS MESSAGE ***

This document is an electronic Petition Statement to the
U.S. Congress regarding pending legislation, the
"Communications Decency Act of 1995" (S. 314) which will
have, if passed, very serious negative ramifications for
freedom of expression on Usenet, the Internet, and all
electronic networks. The proposed legislation would remove
guarantees of privacy and free speech on all electronic
networks, including the Internet, and may even effectively
close them down as a medium to exchange ideas and
information.

For an excellent analysis of this Bill by the Center for
Democracy and Technology (CDT), refer to the Appendix
attached at the end of this document. The text to S. 314
is also included in this Appendix.

This document is somewhat long, but the length is necessary
to give you sufficient information to make an informed
decision. Time is of the essence, we are going to turn
this petition and the signatures in on 3/16/95, so if you
are going to sign this please do so ASAP or at least before
midnight Wednesday, March 15, 1995.

Even if you read this petition after the due date, please
submit your signature anyway as we expect Congress to
continue debating these issues in the foreseeable future
and the more signatures we get, the more influence the
petition will have on discussion. And even if Congress
rejects S. 314 while signatures are being gathered, do
submit your signature anyway for the same reason.

Please do upload this petition statement as soon as
possible to any BBS and on-line service in your area.
If you have access to one of the major national on-line
services such as CompuServe, Prodigy, AOL, etc., do try
to upload it there. We are trying to get at least 5000
signatures. Even more signatures are entirely possible
if we each put in a little effort to inform others, such
as friends and coworkers, about the importance of this
petition to electronic freedom of expression.

Here is a brief table of contents:

(1) Introduction (this section)
(2) The Petition Statement
(3) Instructions for signing this petition
(4) Credits
(Appendix) Analysis and text of S. 314 (LONG but excellent)


******(2) The Petition Statement

In united voice, we sign this petition against passage of S. 314 (the
"Communications Decency Act of 1995") for these reasons:

S. 314 would prohibit not only individual speech that is "obscene, lewd,
lascivious, filthy, or indecent", but would prohibit any provider of
telecommunications service from carrying such traffic, under threat of
stiff penalty. Even aside from the implications for free speech, this
would cause an undue - and unjust - burden upon operators of the various
telecommunications services. In a time when the citizenry and their
lawmakers alike are calling for and passing "no unfunded mandates" laws
to the benefit of the states, it is unfortunate that Congress might seek to
impose unfunded mandates upon businesses that provide the framework for
the information age.

An additional and important consideration is the technical feasibility of
requiring the sort of monitoring this bill would necessitate. The
financial burden in and of itself - in either manpower or technology to
handle such monitoring (if even legal under the Electronic Communications
Privacy Act) - would likely cause many smaller providers to go out of
business, and most larger providers to seriously curtail their services.

The threat of such penalty alone would result in a chilling effect in the
telecommunications service community, not only restricting the types of
speech expressly forbidden by the bill, but creating an environment
contrary to the Constitutional principles of free speech, press, and
assembly - principles which entities such as the Internet embody as
nothing has before.

By comparison, placing the burden for content control upon each individual
user is surprisingly simple in the online and interactive world, and there
is no legitimate reason to shift that burden to providers who carry that
content. Unlike traditional broadcast media, networked media is
comparatively easy to screen on the user end - giving the reader, viewer,
or participant unparalleled control over his or her own information
environment. All without impacting or restricting what any other user
wishes to access. This makes regulation such as that threatened by this
S. 314 simply unnecessary.

In addition, during a period of ever-increasing commercial interest in
arenas such as the Internet, restriction and regulation of content or the
flow of traffic across the various telecommunications services would have
serious negative economic effects. The sort of regulation proposed by this
bill would slow the explosive growth the Internet has seen, giving the
business community reason to doubt the medium's commercial appeal.

We ask that the Senate halt any further progress of this bill. We ask
that the Senate be an example to Congress as a whole, and to the nation
at large - to promote the general welfare as stated in the Preamble to
the Constitution by protecting the free flow of information and ideas
across all of our telecommunications services.


******(3) Instructions for signing the petition

======================================
Instructions for Signing This Petition
======================================

It must first be noted that this is a petition, not a
vote. By "signing" it you agree with *all* the requests
made in the petition. If you do not agree with everything
in this petition, then your only recourse is to not sign
it.

In addition, all e-mail signatures will be submitted to
Congress, the President of the United States, and the
news media.

Including your full name is optional, but *very highly
encouraged* as that would add to the effectiveness of the
petition. Signing via an anonymous remailer is highly
discouraged, but not forbidden, as an attempt will be made
to separately tally signatures from anonymous remailers.

Because this is a Petition to the U.S. Congress, we ask
that you state, as instructed below, whether or not you
are a U.S. citizen. We do encourage non-U.S. citizens to
sign, but their signatures will be tallied separately.

Signing this petition is not hard, but to make sure your
signature is not lost or miscounted, please follow these
directions EXACTLY:

1) Prepare an e-mail message. In the main body (NOT the
Subject line) of your e-mail include the ONE-LINE statement:

SIGNED <Internet e-mail address> <Full name> <US Citizen>

You need not include the "<" and ">" characters. 'SIGNED'
should be capitalized. As stated above, your full name is
optional, but highly recommended. If you do supply your
name, please don't use a pseudonym or nickname, or your
first name -- it's better to just leave it blank if it's
not your full and real name. If you are a U.S. citizen,
please include at the end of the signature line a 'YES',
and if you are not, a 'NO'. All signatures will be
tallied whether or not you are a U.S. Citizen

****************************************************
Example: My e-mail signature would be:

SIGNED dave@kachina.altadena.ca.us Dave C. Hayes YES
****************************************************

2) Please DON'T include a copy of this petition, nor any
other text, in your e-mail message. If you have comments
to make, send e-mail to me personally, and NOT to the
special petition e-mail signature address.

3) Send your e-mail message containing your signature to
the following Internet e-mail address and NOT to me:

===========================
s314-petition@netcom.com
===========================

4) Within a few days of receipt of your signature, an
automated acknowledgment will be e-mailed to you for e-mail
address verification purposes. You do not need to respond or
reply to this acknowledgement when you receive it. We may
also contact you again in the future should we need more
information, such as who your House Representative and
Senators are, which is not asked here as it is unclear
whether such information is needed.

Thank you for signing this petition!


******(4) Credits

The petition statement was written by slowdog
<slowdog@wookie.net>, super.net.freedom.fighter.

The rest of this document mostly collated from the net
by Dave Hayes, net.freedom.fighter.

Much help came from Jon Noring, INFJ and
self.proclaimed.net.activist who made a few
suggestions and will be tallying the signatures.

Thanks to the EFF and CDT for the excellent analysis of
the bill.

(p.s., send your signature to s314-petition@netcom.com)


******(Appendix) Analysis and text of S. 314

[This analysis provided by the Center for Democracy and
Technology, a non-profit public interest organization.
CDT's mission is to develop and advocate public policies
that advance Constitutional civil liberties and democratic
values in new computer and communications technologies.
For more information on CDT, ask Jonah Seiger
<jseiger@cdt.org>.]

CDT POLICY POST 2/9/95

SENATOR EXON INTRODUCES ONLINE INDECENCY LEGISLATION

A. OVERVIEW

Senators Exon (D-NE) and Senator Gorton (R-WA) have
introduced legislation to expand current FCC regulations
on obscene and indecent audiotext to cover *all* content
carried over all forms of electronic communications
networks. If enacted, the "Communications Decency Act of
1995" (S. 314) would place substantial criminal liability
on telecommunications service providers (including
telephone networks, commercial online services, the
Internet, and independent BBS's) if their network is used
in the transmission of any indecent, lewd, threatening or
harassing messages. The legislation is identical to a
proposal offered by Senator Exon last year which failed
along with the Senate Telecommunications reform bill (S.
1822, 103rd Congress, Sections 801 - 804). The text the
proposed statute, with proposed amendment, is appended at
the end of this document.

The bill would compel service providers to chose between
severely restricting the activities of their subscribers
or completely shutting down their email, Internet access,
and conferencing services under the threat of criminal
liability. Moreover, service providers would be forced to
closely monitor every private communication, electronic
mail message, public forum, mailing list, and file archive
carried by or available on their network, a proposition
which poses a substantial threat to the freedom of speech
and privacy rights of all American citizens.

S. 314, if enacted, would represent a tremendous step
backwards on the path to a free and open National
Information Infrastructure. The bill raises fundamental
questions about the ability of government to control
content on communications networks, as well as the locus
of liability for content carried in these new
communications media.

To address this threat to the First Amendment in digital
media, CDT is working to organize a broad coalition of
public interest organizations including the ACLU, People
For the American Way, and Media Access Project, along with
representatives from the telecommunications, online
services, and computer industries to oppose S. 314 and to
explore alternative policy solutions that preserve the
free flow of information and freedom of speech in the
online world. CDT believes that technological
alternatives which allow individual subscribers to control
the content they receive represent a more appropriate
approach to this issue.


B. SUMMARY AND ANALYSIS OF S. 314

S. 314 would expand current law restricting indecency and
harassment on telephone services to all telecommunications
providers and expand criminal liability to *all* content
carried by *all* forms of telecommunications networks.
The bill would amend Section 223 of the Communications Act
(47 U.S.C. 223), which requires carriers to take steps to
prevent minors from gaining access to indecent audiotext
and criminalizes harassment accomplished over interstate
telephone lines. This section, commonly known as the
Helms Amendment (having been championed by Senator Jesse
Helms), has been the subject of extended Constitutional
litigation in recent years.

* CARRIERS LIABLE FOR CONDUCT OF ALL USERS ON THEIR
NETWORKS

S. 314 would make telecommunication carriers (including
telephone companies, commercial online services, the
Internet, and BBS's) liable for every message, file, or
other content carried on its network -- including the
private conversations or messages exchanged between two
consenting individuals.

Under S. 314, anyone who "makes, transmits, or otherwise
makes available any comment, request, suggestion,
proposal, image, or other communication" which is
"obscene, lewd, lascivious, filthy, or indecent" using a
"telecommunications device" would be subject to a fine of
$100,000 or two years in prison (Section (2)(a)).

In order to avoid liability under this provision, carriers
would be forced to pre-screen all messages, files, or
other content before transmitting it to the intended
recipient. Carriers would also be forced to prevent or
severely restrict their subscribers from communicating
with individuals and accessing content available on other
networks.

Electronic communications networks do not contain discrete
boundaries. Instead, users of one service can easily
communicate with and access content available on other
networks. Placing the onus, and criminal liability, on
the carrier as opposed to the originator of the content,
would make the carrier legally responsible not only for
the conduct of its own subscribers, but also for content
generated by subscribers of other services.

This regulatory scheme clearly poses serious threats to
the free flow of information throughout the online world
and the free speech and privacy rights of individual
users. Forcing carriers to pre-screen content would not
only be impossible due to the sheer volume of messages, it
would also violate current legal protections.

* CARRIERS REQUIRED TO ACT AS PRIVATE CENSOR OF ALL
PUBLIC FORUMS AND ARCHIVES

S. 314 would also expand current restrictions on access to
indecent telephone audiotext services by minors under the
age of 18 to cover similar content carried by
telecommunications services (such as America Online and
the Internet). (Sec (a)(4)).

As amended by this provision, anyone who, "by means of
telephone or telecommunications device, makes, transmits,
or otherwise makes available (directly or by recording
device) any indecent communication for commercial purposes
which is available to any person under the age of 18 years
of age or to any other person without that person's
consent, regardless of whether the maker of such
communication placed the call or initiated the
communication" would be subject of a fine of $100,000 or
two years in prison.

This would force carries to act as private censors of all
content available in public forums or file archives on
their networks. Moreover, because there is no clear
definition of indecency, carriers would have to restrict
access to any content that could be possibly construed as
indecent or obscene under the broadest interpretation of
the term. Public forums, discussion lists, file archives,
and content available for commercial purposes would have
to be meticulously screened and censored in order to avoid
potential liability for the carrier.

Such a scenario would severely limit the diversity of
content available on online networks, and limit the
editorial freedom of independent forum operators.

ADDITIONAL NOTABLE PROVISIONS

* AMENDMENT TO ECPA

Section (6) of the bill would amend the Electronic
Communications Privacy Act (18 USC 2511) to prevent the
unauthorized interception and disclosure of "digital
communications" (Sec. 6). However, because the term
"digital communication" is not defined and 18 USC 2511
currently prevents unauthorized interception and
disclosure of "electronic communications" (which includes
electronic mail and other forms of communications in
digital form), the effect of this provision has no clear
importance.

* CABLE OPERATORS MAY REFUSE INDECENT PUBLIC ACCESS
PROGRAMMING

Finally, section (8) would amend sections 611 and 612 of
the Communications Act (47 USC 611 - 612) to allow any
cable operator to refuse to carry any public access or
leased access programming which contains "obscenity,
indecency, or nudity".

C. ALTERNATIVES TO EXON: RECOGNIZE THE UNIQUE USER
CONTROL CAPABILITIES OF INTERACTIVE MEDIA

Government regulation of content in the mass media has
always been considered essential to protect children from
access to sexually-explicit material, and to prevent
unwitting listeners/views from being exposed to material
that might be considered extremely distasteful. The
choice to protect children has historically been made at
the expense of the First Amendment ban on government
censorship. As Congress moves to regulate new interactive
media, it is essential that it understand that interactive
media is different than mass media. The power and
flexibility of interactive media offers a unique
opportunity to enable parents to control what content
their kids have access to, and leave the flow of
information free for those adults who want it. Government
control regulation is simply not needed to achieve the
desired purpose.

Most interactive technology, such as Internet browsers and
the software used to access online services such as
America Online and Compuserve, already has the capability
to limit access to certain types of services and selected
information. Moreover, the electronic program guides
being developed for interactive cable TV networks also
provide users the capability to screen out certain
channels or ever certain types of programming. Moreover,
in the online world, most content (with the exception of
private communications initiated by consenting
individuals) is transmitted by request. In other words,
users must seek out the content they receive, whether it
is by joining a discussion or accessing a file archive.
By its nature, this technology provides ample control at
the user level. Carriers (such as commercial online
services, Internet service providers) in most cases act
only as "carriers" of electronic transmissions initiated
by individual subscribers.

CDT believes that the First Amendment will be better
served by giving parents and other users the tools to
select which information they (and their children) should
have access to. In the case of criminal content the
originator of the content, not the carriers, should be
responsible for their crimes. And, users (especially
parents) should be empowered to determine what information
they and their children have access to. If all carriers
of electronic communications are forced restrict content
in order to avoid criminal liability proposed by S. 314,
the First Amendment would be threatened and the usefulness
of digital media for communications and information
dissemination would be drastically limited.


D. NEXT STEPS

The bill has been introduced and will next move to the
Senate Commerce Committee, although no Committee action
has been scheduled. Last year, a similar proposal by
Senator Exon was approved by the Senate Commerce committee
as an amendment to the Senate Telecommunications Bill (S.
1822, which died at the end of the 103rd Congress). CDT
will be working with a wide range of other interest groups
to assure that Congress does not restrict the free flow of
information in interactive media.


TEXT OF 47 U.S.C. 223 AS AMENDED BY S. 314

**NOTE: [] = deleted
ALL CAPS = additions

47 USC 223 (1992)

Sec. 223. [Obscene or harassing telephone calls in the District
of Columbia or in interstate or foreign communications]

OBSCENE OR HARASSING UTILIZATION OF TELECOMMUNICATIONS
DEVICES AND FACILITIES IN THE DISTRICT OF COLUMBIA OR IN
INTERSTATE OR FOREIGN COMMUNICATIONS"

(a) Whoever--

(1) in the District of Columbia or in interstate or foreign
communication by means of [telephone] TELECOMMUNICATIONS
DEVICE--

(A) [makes any comment, request, suggestion or proposal]
MAKES, TRANSMITS, OR OTHERWISE MAKES AVAILABLE ANY COMMENT,REQUEST,
SUGGESTION, PROPOSAL, IMAGE, OR OTHER COMMUNICATION which is
obscene, lewd, lascivious, filthy, or indecent;

[(B) makes a telephone call, whether or not conversation ensues,
without disclosing his identity and with intent to annoy, abuse,
threaten, or harass any person at the called number;]


"(B) MAKES A TELEPHONE CALL OR UTILIZES A TELECOMMUNICATIONS
DEVICE, WHETHER OR NOT CONVERSATION OR COMMUNICATIONS
ENSUES,WITHOUT DISCLOSING HIS IDENTITY AND WITH INTENT TO ANNOY,
ABUSE, THREATEN, OR HARASS ANY PERSON AT THE CALLED NUMBER OR WHO
RECEIVES THE COMMUNICATION;


(C) makes or causes the telephone of another repeatedly or
continuously to ring, with intent to harass any person at the
called number; or

[(D) makes repeated telephone calls, during which conversation
ensues, solely to harass any person at the called number; or]

(D) MAKES REPEATED TELEPHONE CALLS OR REPEATEDLY INITIATES
COMMUNICATION WITH A TELECOMMUNICATIONS DEVICE, DURING WHICH
CONVERSATION OR COMMUNICATION ENSUES, SOLELY TO HARASS ANY PERSON
AT THE CALLED NUMBER OR WHO RECEIVES THE COMMUNICATION,

(2) knowingly permits any [telephone facility]
TELECOMMUNICATIONS FACILITY under his control to be used
for any purpose prohibited by this section, shall be fined not more
than $[50,000]100,000 or imprisoned not more than [six months] TWO
YEARS, or both.

(b)(1) Whoever knowingly--

(A) within the United States, by means of [telephone]
TELECOMMUNICATIONS DEVICCE, makes (directly or by recording device)
any obscene communication for commercial purposes to any person,
regardless of whether the maker of such communication placed the
call or INITIATED THE COMMUNICATION; or

(B) permits any [telephone facility] TELECOMMUNICATIONS
FACILITY under such person's control to be used for an activity
prohibited by subparagraph (A), shall be fined in accordance with
title 18, United States Code, or imprisoned not more than two
years, or both.

(2) Whoever knowingly--

(A) within the United States, [by means of telephone],
makes BY MEANS OF TELEPHONE OR TELECOMMUNICATIONS DEVICE, MAKES,
TRANSMITS, OR MAKES AVAILABLE(directly or by recording device) any
indecent communication for commercial purposes which is available
to any person under 18 years of age or to any other person without
that person's consent, regardless of whether the maker of such
communication placed the call OR INITIATED THE COMMUNICATION; or


(B) permits any [telephone facility] TELECOMMUNICATIONS
FACILITY under such person's control to be used for an activity
prohibited by subparagraph (A), shall be fined not more than
$[50,000] 100,000 or imprisoned not more than [six months]
TWO YEARS, or both.


(3) It is a defense to prosecution under paragraph (2) of this
subsection that the defendant restrict access to the prohibited
communication to persons 18 years of age or older in accordance
with subsection (c) of this section and with such procedures as the
Commission may prescribe by regulation.

(4) In addition to the penalties under paragraph (1), whoever,
within the United States, intentionally violates paragraph
(1) or (2) shall be subject to a fine of not more than $[50,000]
100,000 for each violation. For purposes of this paragraph, each
day of violation shall constitute a separate violation.

(5)(A) In addition to the penalties under paragraphs (1), (2),
and (5), whoever, within the United States, violates paragraph (1)
or (2) shall be subject to a civil fine of not more than $[50,000]
100,000 for each violation. For purposes of this paragraph, each
day of violation shall constitute a separate violation.

(B) A fine under this paragraph may be assessed either--

(i) by a court, pursuant to civil action by the Commission or
any attorney employed by the Commission who is designated by the
Commission for such purposes, or

(ii) by the Commission after appropriate administrative
proceedings.

(6) The Attorney General may bring a suit in the appropriate
district court of the United States to enjoin any act or practice
which violates paragraph (1) or (2). An injunction may be granted
in accordance with the Federal Rules of Civil Procedure.

(c)(1) A common carrier within the District of Columbia or
within any State, or in interstate or foreign commerce, shall not,
to the extent technically feasible, provide access to a
communication specified in subsection (b) from the
telephone of any subscriber who has not previously requested in
writing the carrier to provide access to such communication if the
carrier collects from subscribers an identifiable charge for such
communication that the carrier remits, in whole or in part, to the
provider of such communication.

(2) Except as provided in paragraph (3), no cause of action may
be brought in any court or administrative agency against any common
carrier, or any of its affiliates, including their officers,
directors, employees, agents, or authorized representatives on
account of--

(A) any action which the carrier demonstrates was taken in good
faith to restrict access pursuant to paragraph (1) of this
subsection; or

(B) any access permitted--

(i) in good faith reliance upon the lack of any representation
by a provider of communications that communications provided by
that provider are communications specified in subsection (b), or

(ii) because a specific representation by the provider did not
allow the carrier, acting in good faith, a sufficient period to
restrict access to communications described in subsection (b).

(3) Notwithstanding paragraph (2) of this subsection, a provider
of communications services to which subscribers are denied access
pursuant to paragraph (1) of this subsection may bring an action
for a declaratory judgment or similar action in a court. Any such
action shall be limited to the question of whether the
communications which the provider seeks to provide fall within
the category of communications to which the carrier will provide
access only to subscribers who have previously requested such
access.

*********************************************

NOTE: This version of the text shows the actual text of current law as
it would be changed. For the bill itself, which consists of unreadable
text such as:

[...]
(1) in subsection (a)(1)--
(A) by striking out `telephone' in the matter above
subparagraph (A) and inserting `telecommunications device';
(B) by striking out `makes any comment, request,
suggestion, or proposal' in subparagraph (A) and inserting
`makes, transmits, or otherwise makes available any
comment, request, suggestion, proposal, image, or other
communication';
(C) by striking out subparagraph (B) and inserting the
following:
`(B) makes a telephone call or utilizes a
[...]

See:

ftp.eff.org, /pub/EFF/Legislation/Bills_new/s314.bill
gopher.eff.org, 1/EFF/Legislation/Bills_new, s314.bill
http://www.eff.org/pub/EFF/Legislation/Bills_new/s314.bill

************** End of Petition Statement ************************

------------------------------

From: Terry.Liberty-Parker@libertybbs.ima.infomail.com (Terry Liberty-Parker)
Date: 09 Feb 95 08:26:51
Subject: File 4--OREGON HOUSE BILL 2319 -

Forwarded (from: LIBALERT) by Terry Liberty-Parker using timEd.
Originally from ERIC GRAY (76:48/200.0) to ALL.
Original dated: Feb 05 '95, 03:42

This message was from LES LEMKE to ALL,
and was forwarded to you by ERIC GRAY.
-------------------------
( HB 2319 Page 1 )



68th OREGON LEGISIATIVE ASSEMBLY - 1995 Regular Session


HOUSE BILL 2319

Ordered printed by the Speaker pursuant to House Rule 12.00A (5),
Presession filed (at the request of Representative Kevin Mannix)


SUMMARY

The following summary is not prepared by the sponsors of the measure
and is not a part of the body thereof subject to consideration by the
Legislative Assembly, It is an editor's brief statement of the
essential features of the measure as introduced.

Directs operators of computer networks to keep records of
identity of users of network and of personal information about
individuals that is disclosed to users. Requires disclosure to
individual when information about individual is accessed by user of
network. Sets rules for disclosures. Allows injunction or maximum
civil penalty of $100,000, or both, for violation.


A BILL FOR AN ACT

Relating to computer information systems.

Be It Enacted by the People of the State of Oregon:

SECTION 1. As used in sections 1 to 3 of this Act:

(1) To "access" means to instruct, communicate with, store data in,
retrieve data from or otherwise make use of any resources of a
computer, computer system or computer network.

(2) "Computed' means, but is not limited to, an electronic device
that performs logical, arithmetic or memory functions by the
manipulations of electronic, magnetic or optical signals or
impulses, and includes all input, output, processing, storage,
software or communication facilities that are connected or
related to such a device in a system or network.

(3) "Computer network" means, but is not limited to, the
interconnection of communi cationlines, including microwave or
other means of electronic communication, with a computer through
remote terminals or a complex consisting of two or more
interconnected computers.

(4) "Computer program" means, but is not limited to, a series of
instructions or statements, in a form acceptable to a computer,
that permits the functioning of a computer system in a manner
designed to provide appropriate products from or usage of such
computer system.

(5) "Computer software" means, but is not limited to, computer
programs, procedures and associated documentation concerned with
the operation of a computer system.

(6) "Computer system" means, but is not limited to, a set of related,
connected or un connected, computer equipment, devices and
software.

(7) "Data" means a representation of information, knowledge, facts,
concepts, computer software, computer programs or instructions.
"Data" may be in any form, in storage media, or as stored in the
memory of the computer, or in transit, or presented on a display
device. "Data" includes, but is not limited to, computer or human
readable forms of numbers, text, stored voice, graphics and images.


SECTION 2.

(1) An owner or operator of a computer network or computer system
shall establish procedures requiring each person who accesses the
network or system to disclose

NOTE: Matter in boldfaced type in an amended section is new; matter
[italic and bracketed] is existing law to be omitted. New sections
are in boldfaced type.

LC 984




[1]



---
* Origin: Stargate Oregon - North Bend, Oregon USA (1:356/3)

* OLX 2.2 TD * The oldest question known to man: "Where are my keys?!"

___ GOMail v2.0t Beta [94-0145]
- Origin: The Desert Reef * LIB * Tuc.Az * V.34 * 602 624 6386 (76:48/200)

--- timEd 1.00
* Origin: LibertyBBS Austin,Tx [512]462-1776 (1:382/804)

------------------------------

Date: Sun 19 May 19943 22:51:01 EDT
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 5--CuD's WWW Homepage - http://sun.soci.niu.edu:80/~cudigest

CuD now has it's own WWW site.

It currently includes back issues of CuDs, and links to other
related Web sites.

URL: http://sun.soci.niu.edu:80/~cudigest


------------------------------


------------------------------

Date: Thu, 23 Oct 1994 22:51:01 CDT
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 6--Cu Digest Header Info (unchanged since 18 Feb, 1995)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send a one-line message: SUB CUDIGEST your name
Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
In ITALY: Bits against the Empire BBS: +39-461-980493
In LUXEMBOURG: ComNet BBS: +352-466893

UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)

JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD
ftp://www.rcac.tdi.co.jp/pub/mirror/CuD

The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
URL: http://sun.soci.niu.edu:80/~cudigest

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.

------------------------------

End of Computer Underground Digest #7.14
************************************

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT