Copy Link
Add to Bookmark
Report

Computer Undergroud Digest Vol. 08 Issue 33

  


Computer underground Digest Sun Apr 28, 1996 Volume 8 : Issue 33
ISSN 1004-042X

Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
Archivist: Brendan Kehoe
Shadow Master: Stanton McCandlish
Field Agent Extraordinaire: David Smith
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest

CONTENTS, #8.33 (Sun, Apr 28, 1996)

File 1--Kevin Mitnick Pleads Guilty to Hacking Charges
File 2--Scientology Lawsuits (Legal Bytes, Vol 4, No. 1)
File 3--The CDA's Silver Lining (from: Legal Bytes, Vol 4, No. 1)
File 4--Werd, be there or die -- (Summercon 96)
File 5--Amer. Fam. Assoc. Demands investigation of Compuserve
File 6--Cu Digest Header Info (unchanged since 7 Apr, 1996)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

---------------------------------------------------------------------

Date: Thu, 25 Apr 1996 07:32:29 -0400 (EDT)
From: Q*Bert <qbert@access.digex.net>
Subject: File 1--Kevin Mitnick Pleads Guilty to Hacking Charges


(originally from Rogue Agent ::: )

RETURN TO STATESIDE: Mitnick pleads guilty to hacking charges
Copyright (C) 1996 Nando.net

LOS ANGELES (Apr 22, 1996 10:01 p.m. EDT) -- Reputed
information highway bandit Kevin D. Mitnick, who has allegedly
violated some of the nation's most protected computer systems,
pleaded guilty Monday to hacking-related charges.

...................

The 32-year-old man, who the government once called a
"computer terrorist," also admitted to possessing other people's
drivers' licenses in the Raleigh, N.C. , apartment where he was
arrested. Pfaelzer also found he violated probation in a 1989
conviction. He is charged with 23 counts of computer fraud.

...................

Mitnick faces a maximum of 20 years in prison, but prosecutors
were loathe to speculate on how long he will actually serve,
saying it depends on how Pfaelzer interprets sentencing
guidelines. The sentencing is scheduled for July 15.

Prosecutors were hardly crowing about the plea, which had been
repeatedly delayed. There are other charges that could be filed
against him, said Assistant U.S. Attorney David J. Schindler.
"This does not resolve this case entirely ... The investigation
continues."

If Mitnick pleaded not guilty, his case would have gone back
to North Carolina for trial. After the hearing, Mitnick was
led away in handcuffs by federal marshals. He is being detained
at a federal jail in downtown Los Angeles.

...................

He was later accused of causing millions of dollars in damage
to MCI, Inc., and also allegedly produced a false report stating
that the late Security Pacific Bank lost $400 million during the
first quarter of 1988. That was four days after the bank turned
him down for a job, because he did not inform them of his
criminal record.

Mitnick pleaded guilty in 1989 in Los Angeles to stealing
computer programs and illegally intruding into computer networks
in the U.S. and England. He was sentenced to one year in
prison.

...................

While the government has portrayed Mitnick as a threat to
national security, the pudgy, bespectacled man's grandmother,
Reba Vartanian, said prosecutors and others are out to "hyping"
her grandson's case.

The Las Vegas woman said there is a different side to his life
that the media has never reported. She said his reputation as a
computer hacker made it impossible for him to find work and to
have a normal life.
...................

------------------------------

Date: Fri, 26 Apr 1996 20:41:17 -0400
From: PeteK1@AOL.COM
Subject: File 2--Scientology Lawsuits (Legal Bytes, Vol 4, No. 1)


Spring 1996, Volume 4, Number 1
__________________________________

By George, Donaldson & Ford, L.L.P.
Attorneys at Law
114 West Seventh Street, Suite 1000
Austin, Texas 78701
(512) 495-1400
(512) 499-0094 (FAX)
gdf@gdf.com
http://www.gdf.com
__________________________________

Copyright (c) 1996 George, Donaldson & Ford, L.L.P.
(Permission is granted freely to redistribute
this newsletter in its entirety electronically.)
___________________________________

David H. Donaldson, Jr., Publisher, dhdonald@gdf.com
Peter D. Kennedy, Editor, pkennedy@gdf.com


2. THE SCIENTOLOGY LAWSUITS AND LAWYER LETTERS: THE PROBLEM
FACED BY ON-LINE SERVICES WHO GET NOTICE OF USERS' ALLEGED
VIOLATIONS

The Jihad.

A fierce battle has been raging both on line and in courtrooms
across the country between the Church of Scientology and a handful
of its former members. Disillusioned with the church, these former
members have posted large amounts of the church's purportedly
secret and sacred texts on a Usenet newsgroup devoted to debating
Scientology. The church, claiming these texts are trade secrets
and copyrighted, has responded with a fierce litigation strategy
that has ensnared third parties from the Washington Post (which
printed portions of the texts) to the Internet access giant Netcom
(which distributed the alt.religion.scientology newsgroup
containing the texts).

The Scientology litigation -- brought in federal courts in
Virginia, Colorado and California under the name of the church's
parent corporation, the "Religious Technology Center" -- has
spawned the most extensive group yet of legal rulings concerning
the scope of on-line copyright protection. The Scientology church
claims that its litigation is redefining on-line copyright law, and
to a great extent it is right. Take away the controversial nature
of the Scientology religion and the reportedly silly nature of much
of its "scripture," and the Scientology lawsuits have concretely
raised core issues about the scope of copyright protection in the
new world of decentralized, democratized and vastly expanded
distribution and copying offered by the Internet, as well as the
responsibilities of the system administrators who facilitate
communications through interconnected computer networks.

This article does not attempt a comprehensive review of all
the questions raised by the Scientology cases, but rather discusses
two interrelated issues that have so far gained little attention --
(1) the competing tension between copyright and defamation law in
whether prior review of on-line content is necessary or wise, and
(2) what the proper response should be to a demand to remove
offending material from a system.

The sysops' old dilemma.

Prior to the Scientology litigation, case law directly
concerning on-line copyright liability was limited to two trial
court decisions, PLAYBOY ENTERPRISES, INC. v. FRENA and SEGA
ENTERPRISES, LTD. v. MAPHIA. The core holding of these two cases,
particularly FRENA, seemed to be a strong affirmation of the
principle of strict liability in copyright law. Under FRENA,
system operators would be liable for copyright infringement, even
if they were unaware of the infringing files on their system,
because their systems facilitated unauthorized copying and
distribution. See "BBS Sysop Liability for Copyright Infringement:

Let the Operator Beware!," Legal Bytes, Vol 2, No. 1. The FRENA
decision was criticized for not giving sufficient weight to the
sysop's denial that he knew about the offending images, but because
it was one of just two rulings on the subject, it carried
considerable weight. After FRENA and MAPHIA, the common wisdom
recommended a hands-on approach to avoid liability for copyright
infringement -- reviewing all files before making them publicly
available.

The hands-on approach to avoid copyright violations has been,
as lawyers say, "in some tension" with two well-known cases
concerning on-line services' liability for defamation. In 1991, a
New York federal court held in CUBBY v. COMPUSERVE that CompuServe
was not responsible for the content of a newsletter it carried,
because it did not review the newsletter and exercised no editorial
control over it. Because CompuServe acted as a conduit or
distributor, it was not actually "publishing" the newsletter. See
"Are Electronic Bulletin Board System Operators Liable for their
Users' Libellous Statements," Legal Bytes, Vol 1, No. 1. Four
years later, a New York state court ruled the other way about
another service, Prodigy, in STRATTON OAKMONT v. PRODIGY. Because
Prodigy, unlike CompuServe, had marketed itself as a family system,
had reviewed the content of postings and claimed the right to edit
them, it was a "publisher" and had to answer for the truth of
defamatory statements made by its users. Like FRENA, the PRODIGY
case has been criticized and may well be wrong, but like FRENA, it
has carried considerable weight because of a scarcity of precedent.

After CUBBY and PRODIGY, the common wisdom was that on-line services
should not review the content of messages passing through unless
they want to answer for their truth, which is not easy. Hands off.

Interactive services have thus been facing a real dilemma
about the content they carry that is provided by others, even
before anyone complains -- hands on (to avoid possible liability
for copyright infringement) or hands off (to avoid becoming a
"publisher" of defamation)?

Although it may seem glacial to those directly affected, the
law is actually moving with relative speed to address this
unworkable problem. On the defamation front, Congress has enacted
the Communications Decency Act of 1996, which for all the vitriol
directed to it, has a bright side: it contains a provision which
broadly protects interactive services from liability for libels
posted by others. See "The Communications Decency Act's Silver
Lining," in this issue. Under this new federal law, STRATTON
OAKMONT v. PRODIGY is overruled on-line services do not become the
"publisher" of on-line content they did not create, even if they
actively restrict access to "objectionable" materials.

On the copyright front, a recent decision may foretell a
relaxation of the harsh and potentially unfair results of the
strict liability rule as applied by the court in FRENA. While no
court will tolerate flagrant encouragement or participation in
copyright infringement, the FRENA court's conclusion that the
sysops' knowledge is entirely irrelevant will likely be eased. =

This step toward balancing copyright protection and on-line
communications is taking place in the Scientology litigation,
particularly in the decision from the California lawsuit involving
Netcom On-Line Communications Services.

Netcom avoids liability for direct infringement.

Using a local-access BBS, a disillusioned former Scientology
minister, Dennis Erlich, posted portions of the Scientology
religious tracts on the Usenet newsgroup alt.religion.scientology. =

The local-access BBS got its Usenet feed though Netcom On-Line
Communications Services, a national Internet access provider. When
the Church of Scientology learned of Erlich's postings, it sued him
in federal court in San Francisco, demanded that the local BBS and
Netcom cut Erlich's access off, and when they didn't, sued the BBS
and Netcom for copyright infringement. The church relied on the
FRENA case and argued that Netcom was liable because copyright law
is strict liability.

Because this case (and all the Scientology cases) involved
Usenet, rather than a small, dial-up BBS, the threat of strict
liability upped the stakes considerably. Usenet traffic carries
vast amounts of material, much of it encoded, only loosely
organized, all of it unsolicited by the system administrator and
overseen by no one. No Internet access provider could hope to
review Usenet for potential copyright violations before making the
20,000 or more newsgroups available. But the penalties for even
unintentional copyright infringement are draconian -- seizure
orders, injunctions, damages of up to $20,000 for each violation,
not to mention paying the other side's attorney's fees and costs.

In a long, carefully written opinion issued November 21, 1995,
Judge Whyte did not follow the logic of Frena to impose strict
liability. RELIGIOUS TECHNOLOGY CENTER v. NETCOM ON-LINE
COMMUNICATION SERVICES, INC., 907 F. Supp. 1361 (N.D. Cal. 1995). =

"Although copyright is a strict liability statue," he wrote, "there
should still be some element of volition or causation which is
lacking where a defendant's system is merely used to create a copy
by a third party." Netcom was not liable for direct copyright
infringement, because there was no such "volition" - the copyright
and distribution happened as a natural part of Usenet, without any
direct action by Netcom in relation to the offending messages. =

While Netcom escaped the claim of direct infringement, it did not
fare as well against the church's claim of "contributory
infringement," as we will see.

The sysops' new dilemma -- what to do about notice of an alleged
violation?

The holding in NETCOM that on-line services -- at least
Internet service providers -- are not liable for direct copyright
infringement for materials passing through their system, if adopted
broadly, will give interactive services some relief from what had
been an unknown and unknowable legal exposure.

A different issue arises, though, when an on-line service is
given notice of an alleged violation -- whether copyright
infringement or libel. There is a fundamental difference in on-
line publication from paper publication -- on line, the material is
continuously available thanks to the on-line service, while the
traditional print distributor delivers the publication and is done
with it. Can a lawyers' demand letter change the playing field,
and force a "hands off" on-line distributor like Netcom or
CompuServe to review its contents and decide whether to remove
offending postings -- upon pain of a civil lawsuit?

The Church of Scientology demanded that Netcom remove the
texts from its server. Netcom refused to remove the texts without
better proof of a copyright violation, and while the texts
automatically rolled off Netcom's servers after 11 days, this did
not happen until they had passed on to Usenet and thence around the
world. The church claimed that Netcom's inaction, if not a direct
infringement, still made it liable because it could have easily
prevented the world-wide distribution.

Judge Whyte was convinced, at least in theory. He ruled that
Netcom's inaction in the face of the church's demands could make it
liable for contributory copyright infringement. Netcom had made a
static argument -- that it should never be liable for copyright
infringement, because it can never know beforehand whether a Usenet
posting violates a copyright. But Judge Whyte took a more dynamic
view -- while Netcom is not responsible for infringement of which
it had no notice, he held that it cannot sit idly by once it is
presented with proof of a copyright violation. He thought that
Netcom's failure to cancel the postings after receiving the demand
letter was a "substantial participation" in the distribution that
invokes contributory liability, and that if Netcom "knew or should
have known" that the postings infringed the church's copyright, it
would be liable.

But what proof is enough to show that an on-line service "knew
or should have known" of an infringement? Judge Whyte held that
the church's demand letter and Netcom's refusal to even look at the
allegedly infringing material was enough evidence to send the case
to trial. This "knew or should have known" standard obviously does
not provide concrete guidance, particularly because the question is
whether Netcom "should have known" that Erlich's postings were
infringing the church's copyright is a really a legal one, and
hardly an easy one at that. However, the court's opinion does at
least allow a system administrator, ideally with help from a
knowledgeable lawyer, to focus on particular questions: Does the
notice of violation identify which materials are at issue? Does it
provide specific evidence of copyright ownership or just a vague
claim? Does the posting constitute fair use?

Demands to remove offending material are becoming commonplace,
and they put on-line services in a jam. Unlike traditional
publishers like Time or The Washington Post, on-line services are
not staffed to review materials for legal problems like libel,
invasion of privacy or even copyright infringement. On-line
services are in the access and distribution business; they create
relatively little content themselves. How much effort does an on-
line service have to put into evaluating these demands? While the
safest course would be always to accede to threats, doing so is
inconsistent with the traditional wide-open, robust debate that
makes the Internet what it is. The NETCOM case bears watching as
these questions have arisen, but have not yet been answered. It is
also not clear yet whether the CDA's broad protection from libel
lawsuits will protect on-line services after they are made aware of
offending statements. See "The Communications Decency Act's Silver
Lining," in this issue. Stay tuned; as sure as the sun rises in
the east, there will be more lawsuits over on-line services'
responsibility for their users' actions.

------------------------------

Date: Fri, 26 Apr 1996 20:41:17 -0400
From: PeteK1@AOL.COM
Subject: File 3--The CDA's Silver Lining (from: Legal Bytes, Vol 4, No. 1)


Spring 1996, Volume 4, Number 1
__________________________________

By George, Donaldson & Ford, L.L.P.
Attorneys at Law
114 West Seventh Street, Suite 1000
Austin, Texas 78701
(512) 495-1400
(512) 499-0094 (FAX)
gdf@gdf.com
http://www.gdf.com
__________________________________

Copyright (c) 1996 George, Donaldson & Ford, L.L.P.
(Permission is granted freely to redistribute
this newsletter in its entirety electronically.)
___________________________________

David H. Donaldson, Jr., Publisher, dhdonald@gdf.com
Peter D. Kennedy, Editor, pkennedy@gdf.com
3. THE COMMUNICATIONS DECENCY ACT'S SILVER LINING

Until now, two court opinions -- CUBBY v. COMPUSERVE and
STRATTON OAKMONT v. PRODIGY -- have dominated any discussion about
whether interactive computer services are responsible for what
users say on line. See "The Scientology Lawsuits and Lawyers'
Letters," in this issue; "BBS Sysop Liability for Copyright
Infringement: Let the Operator Beware!," Legal Bytes, Vol 2, No.
1. The two cases (simplified) are seen as opposites: CompuServe,
the "hands off" network, escaped liability for a newsletter carried
on its system, while Prodigy, supposedly a "hands on" publisher
with control over its users' postings, was forced to answer for a
user's defamatory words.

All this has been changed now, and by a most unlikely law.

The very Communications Decency Act of 1996 which is reviled
throughout the on-line world for its controversial restrictions on
"indecent" communications, also includes a very broad protection
for on-line services from tort liability. Congress passed this
provision specifically to overrule the STRATTON OAKMONT ruling.

Section 508 of the CDA, which will be codified at 47 U.S.C.
15 230(c)(1), states:

No provider or user of an interactive computer service shall
be treated as a publisher or speaker of any information
provided by another information content provider.

The law defines "information content provider" broadly as "any
person or entity that is responsible, in whole or in part, for the
creation or the development of information provided through the
Internet or any other interactive computer service." 47 U.S.C.
15 230(e)(3). So long as the interactive computer service does not
create the content ("in whole or in part"), it cannot be found to
be the "publisher."

The CDA also prohibits a court from holding any provider or
user of an interactive computer service liable because it (1) makes
efforts to screen material; or (2) provides the means by which to
screen material. This attacks from another angle the STRATTON
OAKMONT ruling, where the Court considered Prodigy's "dirty word"
filtering software in concluding it exercised editorial control
over its users and so was a "publisher."

The CDA leaves no doubt that it is meant to pre-empt all state
tort laws: "No cause of action may be brought and no liability may
be imposed under any State or local law that is inconsistent with
this section." 47 U.S.C. 15 230(d)(3).

Apparently, when the CDA was being drafted, the interactive
computer service industry objected to the "indecency" prohibition
because it might require the services to aggressively filter or
review on-line content, even if they had not been doing so. And
under STRATTON OAKMONT, this would make them the "publisher" of
everything their services carried.

Section 509 was added as an attempt to address this concern,
without removing the controversial "indecency" prohibition. Now,
under the CDA, an on-line service is no longer legally the
"publisher" or "speaker" of other people's words. Therefore,
federal law preclude a finding of an essential element --
publication -- in any defamation claim in any of the 50 states
against an on-line service, when the complaint is about someone
else's words (as in CUBBY and STRATTON OAKMONT). For the same
reason, the CDA would also precludes liability for any related tort
(such as "false light" and "disclosure of private facts") that
requires a finding of publication.

No doubt the CDA's breadth will be tested. For example, when
has an interactive service created content "in part" so that it
cannot take advantage of Section 509? And does Section 509
preclude, as its language appears to, defamation claims based on
the continued availability of on-line libel even after an on-line
service has been asked, but has failed or refused, to remove it?

In any case, discussions of on-line liability can no longer begin
and end with CUBBY and STRATTON OAKMONT -- Congress has profoundly
changed the landscape with Section 509 of the CDA.

------------------------------

Date: Tue, 23 Apr 1996 17:30:19 -0400 (EDT)
From: Q*Bert <qbert@access.digex.net>
Subject: File 4--Werd, be there or die -- (Summercon 96)

Phrack Magazine and Cult of the Dead Cow proudly present:

The 1996 Summer Security Conference


"SUMMERCON IX"

June 15th, 1996

Georgetown Holiday Inn
Washington D.C.


This is the official announcement and open invitation to the 1996
incarnation of Summercon. In the past, Summercon was an invite-only
hacker gathering held annually in St. Louis, Missouri. Starting in
1995, SummerCon became an open event to any and all interested
parties: Hackers, Phreaks, Pirates, Virus Writers, System Administrators,
Law Enforcement Officials, Neo-Hippies, Secret Agents, Teachers,
Disgruntled Employees, Telco Flunkies, Journalists, New Yorkers,
Programmers, Conspiracy Nuts, Musicians, Nudists, and Rug Sucking Wannabes.

Senators Exon and Coats, and all the rest of the flaming assholes
who voted for the CDA will be ejected from the confrence if they
show their weasely faces. Censors for SOL.com, Deutsch
Bundestpost officials, and other flaming losers.


Piss off, We MADE CyberSpace, you just tried to BUY it.


LOCATION:

The Georgetown Holiday Inn
2101 Wisconsin Ave. NW
Washington, DC

The hotel is located in scenic Georgetown, close to the Mall
and the Smithsonian Museums as well as all the major tourist
attractions in D.C...

Georgetown itself is a major tourist area, with many fine shops,
restaurants, PUBS and NIGHTCLUBS located there. If you can't
figure out anything to do here, you need to get a life pretty badly.


DIRECTIONS:

from I66 coming east:
Just keep going east. Take the Key Bridge exit off of 66,
the bridge will be a left at the 3rd light after you take
the exit. It's hard to miss, keep left and you will be forced
over the bridge pretty much. On the other side of the bridge,
take a right on M street (right and left being the ONLY choices
possible.) keep right on the bridge and you will again be forced
onto M street. Go down M and take a left at the second or third
light. Go up 2-3 blocks and take a right (either or), and
proceed to Wisconsin Ave. Take a left on Wisconsin. There is NO
left turn from M st. onto Wisconsin, thus the diverse route.
(Hey welcome to DC, run by the U.S. Congress who act as if they)
(have been smoking crack, and Mayor Barry, who actually has.)
(You will soon discover the same logic that brought you the CDA.)

>From MD and 95 North:
Take 95 south to 495 towards Northern Virginia.
Take the George Washington Parkway South to Key Bridge.
Follow I66 East directions above rest of the way from Key bridge.

>From VA and 95 South:
Get on 395 North follow signs to National Airport.
At National Airport, turn around and follow directions to hotel
from National Airport below.
(No, we aren't fucking with your head, this is really the right way)

>From National Airport:
Tell the cabbie to take you to the hotel. OR
Take George Washington Parkway to the Key Bridge / Rosslyn Exit.
Follow I66 East directions from above from Key Bridge.

>From Dulles Airport:
Tell the cabbie to take you to the hotel. OR
Take the Dulles Access road back southeast away from the Airport.
This will dump you out on I66 eastbound. (See above) If you are trying
to get TO Dulles, take I66 westbound and get in the right hand lane
after the Sycamore St. exit, and veer to the right to take the next
exit to the airport. Get in the left hand lane, and stay there to
avoid being on the toll road. There is a parallel road that leads
to the airport, but it's a local toll highway, stay left and avoid
giving Virginia money unnecessarily.

Taxis:
The average airport fare runs around $20 from national, to $30 for
Dulles. Your mileage may vary however with local road conditions.


CONFERENCE INFO:

It has always been our contention that cons are for socializing.
"Seekret Hacker InPh0" is never really discussed except in private
circles, so the only way anyone is going to get any is to meet new people
and take the initiative to start interesting conversations.

Because of this, the formal speaking portion of Summercon will be
held on one day, not two or three, leaving plenty of time for people
to explore the city, compare hacking techniques, or go trashing and
clubbing with their heretofore unseen online companions.

If you are coming from out of town and want the full hacker/tourist
experience, we will informally meet in the lobby of the Georgetown
Holiday Inn Friday, June 14th, 1996, at 2pm. From there we will
have an informal hacker sight-seeing tour of DC, including the FBI
headquarters and other interesting (and legal) places to go.

The sight-seeing will converge with DC locals and mall security at
2600 in Pentagon City Mall Friday, June 14th, 1996, at 6pm. Although
this isn't the first Friday of the month, this is definitely an official
2600 meeting, and likely to be the biggest one ever. This informal
meeting will be held until about 8pm.

The formal conference will be held on Saturday, June 15th, 1996, from
10am to 6pm (with a break for lunch). There will be a variety of speakers,
panel discussions, demonstrations, and other events guaranteed to keep
everyone entertained.

No video or audio tapes will be allowed in the conference room.
No still photography will be permitted in the conference room without
prior permission of all those being photographed. Violation of these
policies expresses your consent for the aggrived parties to pound
you flat.

There will be no selling of t-shirts, disks, firewalls, payphones, etc.
in or around the conference area without prior permission of the organizers.
If you are interested in demoing or selling something, please contact us
at the address listed at the bottom. Violation of these provisions
expresses your consent for the organizers to pound you flat.


There will however be a charity wAr3Z drive, please bring your tax
deductible donation of pirated software on media you don't need
back, for deposit and free redistribution amongst the n33Dy.


We ARE what YOU want to BE.

SPEAKERS:

The speakers list for Summercon IX is still being finalized, but it is sure
to be even more dynamic and interesting than previous years. Speakers at
Summercon '95 included such people as ex-CIA agent Robert Steele, author
Winn Shwartau, Cypherpunk founder Eric Hughes, movie producer Annaliza
Savage, and numerous past and present minions of UUSoft Technologies.
Will the last cool UUSoft employee to leave please turn off the lights
and lock the door.

If you are an expert in some aspect of computer, network, or telco security
and are interested in speaking at Summercon, please contact us to discuss
the possibility further at the address listed at the end of this document.

We are also going to be having short speeches by real hackers or phreakers
giving their own perspective on some issue or insight into a new technology.
This is an open invitation for you hackers to be heard; just provide us with
a brief outline of the topic you will be covering and the amount of time you
will take (suggested: 5 - 15 minutes) at the address listed below.


COSTS:

Costs for SummerCon IX are as follows:

Secret Service / F.B.I. Rate: $500.00
Government / Institutional Rate: $ 80.00
Hacker / Individual Rate: $ 20.00


Members of the United States Secret Service, and anyone that has in the past
or currently is providing information or services to the Secret Service are
required to pay the 'Secret Service Rate'. Cliffy, PMF, Gail, Agent Steele,
this means you.

Employees of a local, state, or federal government, members and associates
of any L.E.O., and employees of any corporation working in the area of
computer security must pay the 'Government / Institutional Rate'.

Anyone that does not fit into one of the above categories is eligible for
the 'Individual / Hacker Rate'.

Due to historical lack of interest, there will not be pre-registration
for the conference. Registration will begin at 9am the day of the
conference, and will continue for the duration of the conference or until
the meeting facilities have reached their capacity. Since the latter
is likely to occur, it is suggested you don't oversleep, but hangovers
are OK.

No purchase orders, checks, money orders, foreign currency, stock certificates,
IOUs, or coins will be accepted for registration. Secret Service agents,
small unmarked bills only, please.

Sorry for this being a bit more expensive than last year for the hackers,
DC seems to be a more expensive place to hold a conference and the expenses
are several times what they were in Atlanta.

Bring money for t-shirts, they are cool, and if don't buy one you are
lame anyhow and don't fucking deserve it!


HOTEL INFORMATION:

Georgetown Holiday Inn
2102 Wisconsin Ave NW
Washington, DC

Phone Number: (202) 338-4600

The cost for a double occupancy room at the Georgetown Holiday Inn is $99.
There is no special conference rate, there is no need to mention you are
with a conference at all, the people in reservations probably won't know
what you are talking about anyhow. The $99 rate is however a a special
rate being held by Holiday Inn, so don't be afraid to tell them so if they
try to quote you a higher rate.

If the hotel is damaged in any manner, you are going to pay for it, and you
will probably end up in jail. And even if you are lucky enough to get away
with it, the rest of the hackers staying at the hotel will end up paying for
it, and I'm sure that's going to make you a well-liked and respected hacker,
especially among some of the bigger hackers who might feel tempted to inflict
bodily harm on someone who causes any damage to the hotel. Please act
responsibly, don't drink and drive, chew all your food before you swallow,
don't swallow your gum, and recycle.


CONTACTING SUMMERCON ORGANIZERS:

You can contact the Summercon organizers through e-mail. If you haven't
figured out e-mail yet, you probably shouldn't be coming to Summercon.

As a final note, if you are planning on coming to Summercon, we would
appreciate you sending e-mail to us with the subject of "GOING TO SCON"
or something similar, just so that we have a rough idea of how many
people are going to show up.


E-mail: scon@2600.com

------------------------------

Date: Fri, 19 Apr 1996 14:39:43 -0800
From: telstar@wired.com (--Todd Lappin-->)
Subject: File 5--Amer. Fam. Assoc. Demands investigation of Compuserve

Although the courts are still debating the constitutionality of the
Communications Decency Act, the Cyberporn Witch Hunt of 1996 is already
getting underway...

On April 1, 1996, the American Family Association -- a fundamentalist group
based in Mississippi -- sent a letter to Attorney General Janet Reno
demanding that the Department of Justice launch a criminal investigation of
CompuServe.

The letter, signed by Patrick A. Trueman, Director of Governmental Affairs
for the AFA, reads as follows:

"I am writing to urge a criminal investigation of H&R Block, Inc. and
Compuserve for potential violations of the Communications Decency Act.
CompuServe, a division of H&R Block, Inc., as of Friday, March 29, 1996, is
offering pornography and other sexually oriented material on its on-line
service to its users, including children... I hope that you will have an
investigator review material available to children on CompuServe and take
appropriate action."

As Barry Steinhardt, Associate Director of the ACLU, explains in the
following article, "This just proves what we've maintained all along: This
law, this Communications Decency Act, is going to be a vehicle for the
radical religious right to impose its brand of morality on the rest of the
country."

(Many thanks go out to the kind folks at the San Jose Mercury News for
graciously giving me permission to redistribute the full text of this
article to you now.)

Read on for details, and of course...

Work the network!

--Todd Lappin-->
Section Editor
WIRED Magazine

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

COMPUSERVE CALLED INDECENT

CHRISTIAN GROUP SAYS ON-LINE SERVICE VIOLATES TELECOMMUNICATIONS ACT.

By RORY J. O'CONNOR
Mercury News Washington Bureau

April 19, 1996

(Re-distributed by permission from the San Jose Mercury News:
http://www.sjmercury.com)


WASHINGTON -- A fundamentalist Christian group has demanded a federal
criminal investigation of the CompuServe on-line service, alleging that it
has violated anti-smut provisions in a recently enacted telecommunications
law.

The American Family Association, based in Tupelo, Miss., asked the Justice
Department to investigate in an April 1 letter to Attorney General Janet
Reno. The organization's letter is apparently the first complaint lodged
under terms of the Communications Decency Act, a controversial part of the
sweeping rewrite of U.S. telecommunications law passed in February. The law
makes it a crime to transmit ''indecent'' material via computer in such a
way that children might view it.

The act, largely crafted by Sen. James Exon, D-Neb., was bitterly contested
by computer users and civil libertarians. Proponents said the law would
make cyberspace a safer place for children. Opponents said it would chill
free speech on-line, criminalizing material that would be protected under
the First Amendment if it were printed on paper.

A group of plaintiffs, led by the American Civil Liberties Union, sued the
Justice Department in February seeking to overturn the law as
unconstitutional. The case is still pending. The department has agreed in
court not to conduct formal investigations into violations of the law, or
to indict or prosecute anyone under it, while the case is pending, a
spokesman said.

The AFA maintains the Communications Decency Act is far too weak and was
gutted in Congress to placate computer industry interests. In the letter to
the Justice Department, the group alleged CompuServe offers ''pornography
and other sexually oriented materials . . . to its users, including
children.''

The group singled out a service called Mac Glamour, an adult forum that,
among other things, offers color photos of nude women. The service was
promoted on CompuServe's ''What's New'' screen when subscribers connected
at the end of March.

CompuServe clearly marks the forum as an adult area and gives instructions
to users how they can block the service from their computers. Among the
controls provided by CompuServe, the main subscriber in a household, who
must be an adult, can block access to adult sites from his or her account.

The Mississippi group says that isn't sufficient. In a household that
hadn't blocked the adult area, the invitation could have been seen and the
images viewed by a minor, it said.

''This is exactly the kind of incident that Congress, in drafting the bill,
anticipated,'' said Patrick Trueman, director of government affairs for the
AFA in Washington. ''The objection we had was that it was available to
children. If this isn't prosecutable, I don't know what is.''

CompuServe did not respond to repeated calls seeking comment. But an
industry group representing on-line service providers, the Information
Services Association, said the letter to Reno was designed to interfere in
the pending court case.

''It's clearly a publicity device during an important juncture in the
litigation,'' said Bob Smith, the association's executive director. He
called the law's language a ''vague and unclear standard that could make a
wide range of material, including medical information and certain
literature, illegal as well.''

The Justice Department said it had received the letter but wouldn't act on
it until the court case is over.

The ACLU called the letter an attempt to coerce commercial services to
remove otherwise legal adult material from their computers under threat of
the large fines and prison terms spelled out in the act.

''This just proves what we've maintained all along: This law, this
Communications Decency Act, is going to be a vehicle for the radical
religious right to impose its brand of morality on the rest of the
country,'' said Barry Steinhardt, associate director of the ACLU. ''They
are going after Constitutionally protected images.''

Trueman readily acknowledged that the AFA considers the law too weak, and
if the CompuServe case isn't prosecuted, ''it's time for Congress to start
from scratch.'' He said on-line services should have to automatically block
all adult material from view unless a subscriber specifically requests
access to it.

But civil libertarians and privacy advocates reject that approach, which is
the subject of a New York court case concerning an adult public access
cable TV channel.

''It would cause a rather large collection of personal data'' about users
of adult services, said David Banisar, policy analyst for the Electronic
Privacy Information Center in Washington. ''It would be a particularly
explosive list that CompuServe could sell, with all sorts of
ramifications.''

=A91996 Mercury Center.

------------------------------

Date: Thu, 21 Mar 1996 22:51:01 CST
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 6--Cu Digest Header Info (unchanged since 7 Apr, 1996)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send post with this in the "Subject:: line:

SUBSCRIBE CU-DIGEST
Send the message to: cu-digest-request@weber.ucsd.edu

DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.

The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

To UNSUB, send a one-line message: UNSUB CU-DIGEST
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
(NOTE: The address you unsub must correspond to your From: line)

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
In ITALY: ZERO! BBS: +39-11-6507540
In LUXEMBOURG: ComNet BBS: +352-466893

UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)


The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
URL: http://www.soci.niu.edu/~cudigest/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.

------------------------------

End of Computer Underground Digest #8.33
************************************

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT