Copy Link
Add to Bookmark
Report

Computer Undergroud Digest Vol. 08 Issue 32

  


Computer underground Digest Sun Apr 21, 1996 Volume 8 : Issue 32
ISSN 1004-042X

Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
Archivist: Brendan Kehoe
Shadow Master: Stanton McCandlish
Field Agent Extraordinaire: David Smith
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest

CONTENTS, #8.32 (Sun, Apr 21, 1996)

File 1--Golden Key Campaign
File 2--(Fwd) Congress puts bomb-making material on internet
File 3--Canadian "criminalization of technology"
File 4--Re: Cu Digest, #8.29, Apr 11, 1996
File 5--Re: The Day the Sites Went Out in Georgia?
File 6--Proposed Swedish law about computer-mediated communication
File 7--Cu Digest Header Info (unchanged since 7 Apr, 1996)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

---------------------------------------------------------------------

Date: 23 Apr 1996 21:47:56 -0500
From: "David Sobel" <sobel@EPIC.ORG>
Subject: File 1--Golden Key Campaign

PRESS RELEASE

Wednesday, April 24, 1996

URL: http://www.privacy.org/ipc/

Contact: Marc Rotenberg, EPIC, 202/544-9240
Lori Fena, EFF, 415/436-9333
Barbara Simons, USACM 408/463-5661
Kurt Stammberger, RSA 415/595-8782

------------------------------------------

INTERNET PRIVACY COALITION FORMED

Golden Key Campaign Launched

Groups Urge Good Technology for Privacy and Security

Senator Burns to Introduce Legislation

------------------------------------------

WASHINGTON, DC -- A new coalition today urged support for strong
technologies to protect privacy and security on the rapidly
growing Internet. The Internet Privacy Coalition said that new
technologies were critical to protect private communications and
on-line commerce, and recommended relaxation of export controls
that limit the ability of US firms to incorporate encryption in
commercial products.

Phil Zimmermann, author of the popular encryption program Pretty
Good Privacy, expressed support for the effort of the new
coalition. "It is time to change crypto policy in the United
States. I urge those who favor good tools for privacy to back the
efforts of the Internet Privacy Coalition."

GOLDEN KEY CAMPAIGN LAUNCHED

The Coalition has asked companies and Internet users to display a
golden key and envelope to show support for strong encryption
technology. Copies of the logo are available at the group's web
page on the Internet.

According to Lori Fena, director of the Electronic Frontier
Foundation, the purpose of the campaign is to educate the public
about new techniques for privacy protection. "Society's feelings
about privacy have not changed, only the medium has," said Ms.
Fena.

US industry has pressed the US government to relax export controls
on encryption as consumer demand for software products has
increased. They cite the fact that foreign companies have been
able to sell strong products in overseas markets that are now
restricted for US firms.

Jim Bidzos, President and CEO of RSA Data Security, said that US
firms continue to face excessive burdens. "Encryption is the key
to on-line commerce. Government regulations are simply keeping US
firms out of important markets."

The Internet Privacy Coalition is the first net-based effort to
bring together a broad base of companies, cryptographers and
public interest organizations around the central goal of promoting
privacy and security on the Internet andurging relaxation of
export controls.

Dr. Barbara Simons, chair of the public policy committee of the
Association for Computing said, "The broad support for the Golden
Key campaign shows that the reform of encryption policy is a
shared goal for companies, users, and professional associations."

SENATOR BURNS TO INTRODUCE LEGISLATION

The Internet Privacy Coalition is being established as Congress
considers new legislation to relax export controls on encryption.
Senator Conrad Burns (R-MT) today introduced legislation that
would relax export controls on commercial products containing
technologies for privacy such as encryption.

Marc Rotenberg, director of the Electronic Privacy Information
Center, said "We believe that Senator Burns has put forward a
constructive proposal. We look forward to working with him to
ensure that good tools for privacy and security are widely
available to Internet users."

Hearings on Senator Burns bill are expected to take place in early
June. The proposal has already gathered support from a bipartisan
coalition in Congress.

For Internet users who are interested in following the debate
about encryption policy, the IPC has set up a Web page with
information about encryption regulations, court challenges,
legislative developments, and organizations and companies involved
in the campaign.

The Internet Privacy Coalition was established by more than a
dozen of the nation's leading cryptographers, and thirty
associations, companies, and civil liberties organizations
committed to strong privacy and security technology for all users
of the Internet.

URL: http://www.privacy.org/ipc/

----------------------------------------------


A KEY, AN ENVELOPE -- Both are historic means for communicating
privately and protecting personal information. Today, encryption
tools provide this privacy in the electronic world.

The Golden Key Campaign is being launched to raise awareness and
support for the preservation of the right to communicate privately
and the availability of new techniques which make it possible.

Privacy, a fundamental human right, has been affirmed by the US
Supreme Court, the constitutions and laws of many countries, and
the United Nations Universal Declaration of Human Rights.
Privacy must be preserved as we move from paper to electronic
communications.

The Internet Privacy Coalition is urging members of the net
community to display a Golden Key & Envelope symbol on their Web
pages to show support for the right of privacy and the freedom to
use good tools of privacy without government restraints.

------------------------------

Date: Sun, 21 Apr 1996 00:46:55 -0400
From: tallpaul <tallpaul@pipeline.com>
Subject: File 2--(Fwd) Congress puts bomb-making material on internet

Ah, the things one thinks about late at night. The post below is
self-explanatory and might make a wonderful short piece for _CuD_. I
personally checked the URL and instructions and Rochkind is correct. The
good folks in Congress really did post to the internet how to make
"babyfood bombs" and a nasty detanator for them as well!

As "Mr. Roger's Capital Hill Neighborhood" might put it: "the word for
today Congressmen and Congresswomen is 'clueless.' Can you spell
C-L-U-E-L-E-S-S?"

>----- Forwarded message (jrochkin@cs.oberlin.edu (Jonathan Rochkind))


At 11:45 PM 04/19/96, Rich Graves wrote:
>Oh yeah, and Biden read the full text of the "Attention All Unabomber
>Wannabes" and "Babyfood Bombs" documents into the Congressional Record,
>supposedly to underscore the point that those nasty Republicans are
>endorsing such nasty nasty stuff. Sort of like Exon's little blue book.
>
>So if you want to know how to build a baby-food bomb, simply write your
>congresscritter.

Or access the congressional record on thomas, as Rich gives earlier gives
us a URL to. Go to http://thomas.loc.gov/r104/r104s17ap6.html, choose the
second TERRORISM PREVENTION ACT--CONFERENCE REPORT link, choose the first
BIDEN link.

Congress is putting information on how to build babyfood bombs on the
internet! Clearly, the first thing the FBI would do under the law Biden
wants is wiretap congress to see who is accessing the congressional record.

Wonder what the congressional librarians who run thomas think of that.

((MODERATORS' NOTE: For this without access to the original,
here is the text))

++++++++++++++++++++++++++++++++

TERRORISM PREVENTION ACT--CONFERENCE REPORT (Senate - April 17, 1996)



Mr. BIDEN. Mr. President, I yield myself such time as I may use within
the limit of the time I have.

This provision is very straightforward and simple. It is beyond me why
it was taken out of the Senate version of the language that was sent
to the House.

I have heard many colleagues stand up on the floor here and rail
against pornography on the Internet, and for good reason. Even when we
thought we had corrected the language that Senator Exon introduced to
comport with the first amendment, I still hear in my State, and I hear
of people writing about how so and so is promoting pornography on the
Internet because they will not ban pornography on the Internet.

Yet, in the bill, we came along--all of us here--and the genesis of
this came from Senator Feinstein, when it was initially offered. The
majority leader, Senator Hatch, and I had some concerns with this, and
we thought the language to ban teaching people how to make bombs on
the Internet or engage in terrorist activities on the Internet might
violate the first amendment. Senators Dole, Hatch, and I worked to
tighten the language and came up with language that was tough and true
to civil liberties. It was accepted by unanimous consent.

We have all heard about the bone-chilling information making its way
over the Internet, about explicit instructions about how to detonate
pipe bombs and even, if you can believe it, baby food bombs. Senator
Feinstein quoted an Internet posting that detailed how to build and
explode one of these things, which concludes that `If the explosion
don't get'em, the glass will. If the glass don't get'em, the nails
will.'

I would like to give you a couple of illustrations of the kinds of
things that come across the Internet. This is one I have in my hand
which was downloaded. It said, `Baby food bombs by War Master.' And
this is actually downloaded off the Internet. It says:

These simple, powerful bombs are not very well known, even though all
of the materials can be obtained by anyone (including minors). These
things are so--

I will delete a word because it is an obscenity.

powerful that they can destroy a CAR. The explosion can actually twist
and mangle the frame. They are extremely deadly and can very easily
kill you and blow the side of a house out if you mess up while
building it. Here is how they work.

This is on the Internet now. It says:

Go to Sports Authority or Herman's Sport Shop and buy
shotgun shells. It is by the hunting section. At the Sports Authority
that I go to you can actually buy shotgun shells without a parent or
an adult. They don't keep it behind the glass counter, or anything
like that. It is $2.96 for 25 shells.

And then it says:

Now for the hard part. You must cut open the plastic housing of the
bullet to get to the sweet nectar that is the gun powder. The place
where you can cut is CRUCIAL. It means a difference between it blowing
up in your face or not.

Then there is a diagram, which is shown as to how to do that on the
Internet. Then it says:

You must not make the cut directly where the gun powder is, or it will
explode. You cut it where the pellets are.

And then it goes through this in detail. And then it gets to the end,
and it says:

Did I mention that this is also highly illegal? Unimportant stuff that
is cool to know.

And then it rates shotgun shells by two numbers, gauge, pellet size,
and goes into great detail. It is like building an erector set. It
does it in detail.

So what Senators Dole and Hatch and I did, we said you should not be
able to do this, but we have a first amendment problem, possibly. So
we added a provision that says that you have to have the intent, when
you are teaching people how to do this, that the person using it is
using it for the purpose of doing harm.

So it seems to me that this is pretty straightforward. Granted, I want
to stop pornography on the Internet. I think pornography does harm to
the minds of the people who observe it, particularly young people. But
if that does harm, how much harm is done by teaching a 15-year-old
kid, a 12-year-old kid, or a 20-year-old person, with great detail,
how to build a baby food bomb, or how to build an automatic particle
explosion provision, or how to build light bulb bombs.

------------------------------

Date: Mon, 8 Apr 1996 10:50:41 -0700 (PDT)
From: Doc_Holliday@AWWWSOME.COM(M. Steven McClanahan)
Subject: File 3--Canadian "criminalization of technology"

Regarding the following letter reprinted in CuD:

>
> "An Act to amend the Criminal Code and to amend certain other Acts"The
>new subsection 487(2.1)(a) would provide that a person authorized to
>search a computer system for data may use any computer system in the
>building "to search any data contained in or available to the computer
>system." The quoted language does not distinguish between the two
>sources of data. However, there is good reason to treat data available to the
>computer system differently from data contained within it. Data available
>to the system may be physically located outside of the jurisdiction of
>the issuer of the warrant, potentially bringing the persons authorizing and
>conducting the search into conflict with foreign law. A similar concern
>is identified and addressed in the existing subsection 487(2), which
>provides for modified search warrants in circumstances where the subject of the
>search "is believed to be in any other territorial division" within
>Canada. In the context of the search of a computer system, it is quite probable
>that the data available to the computer system includes data located in
>jurisdictions outside of Canada. The international nature of the
>difficulty calls for a solution beyond that offered by subsection 487(2).
>It is necessary to have two distinct sets of provisions, one of which
>governs
>the search of data "contained in" a computer system and another specifically
>designed to address the difficulty of searching data "available to" a
>computer system. The words "or available to" should be removed from the
>proposed amendment to both subsections 487(2.1)(a) and 487(2.2)(a).

This sets dangerous precedent, as it seeks to make criminal the possession
of hardware, software and/or knowledge to configure systems so as to access
information the ruling junta may find objectionable. If you've configured
your system to automatically log onto another system that is connected to
something the government has defined as "criminal," then you are subject
criminal liability for information gained in a broad search as authorized
by this law. If you are a "newbie," even though your system might be
capable of accessing such information, because you could not configure it
to do so, then you are not subject to criminal liability. This would make
the same hardware, software and Internet connections criminal in one
situation and not in another, based solely on the level of expertise of the
user!

>Finally, we are concerned about the potential for self-incriminatory
>activity by the person whose property is the subject of a search.
>Subsection 487(2.1) would authorize the person conducting the search to
>use the computer system in order to search, reproduce, and seize data.
>Subsection 487(2.2), while similar, would add that the person whose
>property is being searched "shall, on presentation of the warrant, permit the
>person carrying out the search" to use the computer system. It is unclear from
>this language whether the person whose property is being searched is
>required to take positive steps to assist the person carrying out the
>search. Our concern is that the inherent vagueness of the proposed
>provision allows for such an interpretation. If the computer system is
>accessible only by first supplying a password, the person may have to
>supply it. If the data being searched is encrypted, the person may have to
>provide the decryption key. This would amount to being compelled to assist in
>the discovery of evidence against oneself, which is inconsistent with the
>most fundamental principles of criminal law. The proposed amendment should
>be rewritten to remedy its potentially dangerous vagueness.

The obvious solution to the above is to suffer "cyber-amnesia" when the
cops come busting down your door. Possession of encryption software should
not be illegal in any jurisdiction, however, realistically, most cops
assume, if it's encrypted it must be illegal - why else would you encrypt
it? It's a catch 22 situation and one in which you lose either way.

Speaking as one who had a Power Macintosh with a 2 gigabyte hard disk drive
and all my backups subpeonaed in a civil case, I can tell you that the
other side is not likely to want or accept your help in determining what is
on your mass storage devices and/or in learning how your systems work. I
had to stand by while the attorney corrupted all the data on my hard drive
trying to beat my PGP encryption. Then he did the same thing to my back
ups. Despite my protests I would have GIVEN them the key to decrypt the
data - he didn't trust me. This is in a CIVIL case, imagine how they would
feel in a CRIMINAL matter.

They spent days trying to get past PGP and could not. Even if they had, all
they would have gotten was copies of email between my wife and I. The
downside was it took me two weeks to reconstruct my hard drive, time which
the courts refused to order the attorney that started all this to pay me
for. (They did sanction him after he threatened to punch me during a
deposition for refusing to reveal my sources - which were protected by
attorney-client privilege - which I thought was interesting; apparently he
could waste all my time, but he couldn't hit me.) The court decided my data
had no value and that having to rebuild my hard drive was a "minor
inconveneince" compared to the "interests of justice."

Since it is a no win situation, extending cooperation is problematic. It
probably won't do any good. My experience told me most people in law
enforcement have not advanced, technologically, past the level of an Atari
2600 and are completely baffled by complex systems. Based on what they did
with a Mac system, I doubt they would even be able to access anything now
that I use a SPARCstation 4.

An attitude seems to have developed in the prosecution of computer crime
that "the ends justifies the means." As the voters have gone along like
sheep and surrendered many civil rights in the prosecution of drug related
crimes, they are similarly doing in the prosecution of computer crimes
having to do with the Internet and claims of "child porn." This is
extremely dangerous as. If you look long and hard enough on any system,and
systems accessible to it, you can, eventually, find something that will
offend someone. Therefore, applying the rule that "the ends justifies the
means," everyone who connects to a computer network is thereby
"criminalized."

The frigthening part is that, whether or not the innocent victim is doing
anything illegal, the reams of good press such actions bring for
prosecutors and police just encourages them. After it is all through and
nothing illegal is found, law enforcement still looks good in the press,
(because the public has been whipped up into such a frenzy they preceive
any action as "good"). The victims of such harassment are always "guilty"
in the eyes of the public, simply because the government took any action.

------------------------------

From: Dave++ Ljung <dxl@HPESDXL.FC.HP.COM>
Subject: File 4--Re: Cu Digest, #8.29, Apr 11, 1996
Date: Mon, 15 Apr 96 13:01:07 MDT

|Olsen concocted this scheme that he calls L18, for "Less than 18."
|Under it, every net-user must label every USENET post, email message,
|FTP site file, web page, chat room, IRC channel...

Wow. That's quite a bit.

Well, here's a thought. They can't possibly fine people for *NOT*
labeling non-offensive material as being L18 (non-offensive). Even
if they did, you could always add some four-letter exon somewhere in
the post to make sure that it was no longer L18.

So what's the point?

Well - the point is that most of the content on the net is provided
by us 'adults.' So it would be amazingly easy to boycott the L18 label.

What will be the effect? Well - one unfortunate effect is that anyone
who is pegged as under 18 will (for a hopefully short time) be unable
to access much of anything the net. In the long run this would make
the L18 plan so infeasible that it would become valueless, and hopefully
would be dropped.

One way to protect the kids from the nasty adult's ideas is by censoring
any such ideas. Another way is to keep the kids out. I don't prefer
either, but the latter is better than censorship.

------------------------------

Date: Fri, 19 Apr 1996 07:16:20 -0700 (PDT)
From: Declan McCullagh <declan@EFF.ORG>
Subject: File 5--Re: The Day the Sites Went Out in Georgia?

---------- Forwarded message ----------
Date--Fri, 19 Apr 1996 03:59:06 -0400
From--Mike Godwin <mnemonic@well.com>


Georgia Legislative Information


HB 1630 Computer or telephone network; transmitting misleading
data (3.7K)

*** BILL STATUS *** 04/18/96

HB 1630

Computer or telephone network;
transmitting misleading data

1. Parsons 40th 2. Scoggins 24th 3. Coker 31st

House Comm: Ind / Senate Comm: ST&I /
House Vote: Yeas 142 Nays 26 Senate Vote: Yeas 48 Nays 0
----------------------------------------
House Action Senate
----------------------------------------
2/8/96 Read 1st Time 3/5/96
2/9/96 Read 2nd Time 3/13/96
2/26/96 Favorably Reported 3/13/96
Sub Committee Amend/Sub Am
2/29/96 Read 3rd Time 3/14/96
2/29/96 Passed/Adopted 3/14/96
FSFA Comm/Floor Amend/Sub CAFA
3/15/96 Amend/Sub Disagreed To
Recedes 3/18/96
4/3/96 Sent to Governor
4/18/96 Signed by Governor
1029 Act/Veto Number
7/1/96 Effective Date
----------------------------------------

Code Sections amended: 16-9-93.1
*** FIRST READER *** 02/07/96

HB 1630

A BILL to amend Article 6 of Chapter 9 of Title 16 of the Official
Code of Georgia Annotated, known as the "Georgia Computer Systems
Protection Act," so as to provide that it shall be unlawful for any
person or organization knowingly to transmit certain misleading data
through a computer or telephone network for the purpose of setting up,
maintaining, operating, or exchanging data with an electronic mailbox,
home page, or any other electronic information storage bank; and for
other purposes.
*** FULL TEXT *** 02/29/96

HB 1630 HB 1630/FSFA

H. B. No. 1630 (FLOOR SUBSTITUTE)(AM)
By: Representative Parsons of the 40th



A BILL TO BE ENTITLED
AN ACT


To amend Article 6 of Chapter 9 of Title 16 of the Official
Code of Georgia Annotated, known as the "Georgia Computer
Systems Protection Act," so as to provide that it shall be
unlawful for any person or organization knowingly to
transmit certain misleading data through a computer or
telephone network for the purpose of setting up,
maintaining, operating, or exchanging data with an
electronic mailbox, home page, or any other electronic
information storage bank; to provide for a penalty; to
provide that civil actions are allowed; to repeal
conflicting laws; and for other purposes.

BE IT ENACTED BY THE GENERAL ASSEMBLY OF GEORGIA:

SECTION 1.

Article 6 of Chapter 9 of Title 16 of the Official Code of
Georgia Annotated, known as the "Georgia Computer Systems
Protection Act," is amended by adding, following Code
Section 16-9-93, a new Code Section 16-9-93.1 to read as
follows:

"16-9-93.1.

(a) It shall be unlawful for any person, any organization,
or any representative of any organization knowingly to
transmit any data through a computer network or over the
transmission facilities or through the network facilities
of a local telephone network for the purpose of setting
up, maintaining, operating, or exchanging data with an
electronic mailbox, home page, or any other electronic
information storage bank or point of access to electronic
information if such data uses any individual name, trade
name, registered trademark, logo, legal or official seal,
or copyrighted symbol to falsely identify the person,
organization, or representative transmitting such data or
which would falsely state or imply that such person,
organization, or representative has permission or is
legally authorized to use such trade name, registered


H. B. No. 1630 (SUB)
-1-

HB 1630/FSFA

trademark, logo, legal or official seal, or copyrighted
symbol for such purpose when such permission or
authorization has not been obtained; provided, however,
that no telecommunications company or Internet access
provider shall violate this Code section solely as a
result of carrying or transmitting such data for its
customers.

(b) Any person violating subsection (a) of this Code
section shall be guilty of a misdemeanor.

(c) Nothing in this Code section shall be construed to
limit an aggrieved party's right to pursue a civil action
for equitable or monetary relief, or both, for actions
which violate this Code section."

SECTION 2.

Nothing contained herein shall prohibit a member of the
General Assembly from using the state seal or the Georgia
flag which contains the state seal on a home page that is
clearly identified with the name of the member as the home
page of that member.

SECTION 3.

All laws and parts of laws in conflict with this Act are
repealed.

H. B. No. 1630 (SUB)

------------------------------

Date: Fri, 12 Apr 1996 09:36:07 -0700 (PDT)
From: Olle Jarnefors <ojarnef@ADMIN.KTH.SE>
Subject: File 6--Proposed Swedish law about computer-mediated communication

It might be interesting to readers of the CU Digest to know how
the problems of freedom of expression on the Internet are
tackled in Sweden. Professor Jacob Palme at Stockholm
University and the Royal Institute of Technology has arranged
for publication of the English summary of the recent proposal
from a Swedish government committee, at

< http://www.dsv.su.se/~jpalme/SOU-1996-40-eng.html >

Professor Palme's introduction and the full text of the proposed
law follows here.

--
Olle Jarnefors, Royal Institute of Technology (KTH) <ojarnef@admin.kth.se>

-----

(This initial text was written by Jacob Palme.)

A Swedish government committee has put forward a proposal
covering partly the same issues as the famous U.S.
"Communications Decency Act".

The committee does not propose that anything is unlawful in
BBSes and the Internet except what would be unlawful according
to other Swedish laws (for example copyright laws, libel laws,
child pornography laws). The main issue for the proposal is
which responsibility the provider of a data base (WWW data base,
BBS, news server, etc.) has on the content. According to the law
proposal, sysop must remove illegal items, but only under two
conditions:

1. The item was obviously illegal. I.e. on borderline cases, the
sysop does not have to remove the item.

2. The sysop was aware of the existence of the item. I.e. the
sysop is not forced to pre-censor information, but if the
sysop is informed of the occurrence of illegal items in the
data base, these must be removed.

A sysop which does not follow these rules, can be punished by
fines or a maximum of 2 years prison.

The next step is that the Swedish government will send the
proposal to organizations who are allowed to comment on it. In
this stage, anyone can send their views on the proposal to the
government. After that, the government may prepare a (possibly
modified) proposal to the Swedish parliament, and the parliament
may turn it into a law.

-----

ELECTRONIC MEDIATION SERVICES BILL


_Areas of application_

ARTICLE 1. This law applies to services that are intended for the
electronic mediation of messages.

The law does not apply to:

1. the provision alone of a network or other connections for the
transmission of messages,

2. mediation of messages within an agency or between agencies or
within an enterprise or a legal group of enterprises, and

3. such services that are covered by the regulations in the
Freedom of the Press Act [this is the pride of Swedish
legislation, a constitutional law originally adopted in 1766,
pertaining to printed media /OJ] or the Fundamental Law on
Freedom of Expression [this constitutional law regulates radio
and television /OJ].

In the law, "messages" means text, images, sounds and other
information being transmitted in electronic form.


_Exceptions from the Data Act_

ARTICLE 2. The provisions in Sections 1-20 and 22-25 of the Data
Act (1973:289) shall not be applied to personal registers
[i.e. any computer file holding data about identifyable natural
persons /OJ] that are maintained by a service according to this
law, to the extent that

1. the registers contain only regular running text and
information about messages and users of the service, and

2. the register is maintained for the purpose of enabling users
to deposit or collect information with a view to free exchange
of opinions, free and comprehensive information and freedom of
artistic creation.

In the law, "regular running text" means information that has
not been structured to facilitate the acquisition of personal
information.


_An overview of the service_

ARTICLE 3. The service supplier shall have supervision over the
service to the degree necessary with regards to the scope and
aim of the operation.


_Information to the user_

ARTICLE 4. The service supplier shall, as soon as possible,
inform each person who wishes to use the service about

1. who is supplying the service,

2. that the users are responsible for the content of the
messages that they post, and

3. to what extent incoming messages become available to other
users.

If an agency supplies the service it should also mention that
messages which are mediated may become public documents.


_The hindrance of continued distribution_

ARTICLE 5. If it is obvious that a user, by posting a message,
has made himself guilty of a crime or infringement of copyright
or that the contents of the message are liable to be used in
crime, the service supplier shall hinder further distribution of
the message. The same applies to any person who supervises the
service on behalf of the service supplier.

The first paragraph is not in effect if the message is intended
to be received only by one or more designated recipients
(electronic mail).


_Penalties_

ARTICLE 6. A person who intentionally or through negligence
violates article 4 or who intentionally violates article 5 shall
be sentenced to pay a fine or to imprisonment for at most six
months, or, if the crime is serious, to imprisonment for at most
two years. If the offence is of only a minor nature the offender
shall not be sentenced.

The first paragraph is not applied if the offence is punishable
under the Penal Code.


_Forfeiture_

ARTICLE 7. Computers and other equipment that have been used in
a crime under this law may be declared forfeited, if this is
called for in order to prevent crime or for other special
reasons.

------------------------------

Date: Thu, 21 Mar 1996 22:51:01 CST
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 7--Cu Digest Header Info (unchanged since 7 Apr, 1996)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send post with this in the "Subject:: line:

SUBSCRIBE CU-DIGEST
Send the message to: cu-digest-request@weber.ucsd.edu

DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.

The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

To UNSUB, send a one-line message: UNSUB CU-DIGEST
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
(NOTE: The address you unsub must correspond to your From: line)

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
In ITALY: ZERO! BBS: +39-11-6507540
In LUXEMBOURG: ComNet BBS: +352-466893

UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)


The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
URL: http://www.soci.niu.edu/~cudigest/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.

------------------------------

End of Computer Underground Digest #8.32
************************************

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT