Copy Link
Add to Bookmark
Report

Computer Undergroud Digest Vol. 09 Issue 14

  


Computer underground Digest Sun Mar 2, 1997 Volume 9 : Issue 14
ISSN 1004-042X

Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
Archivist: Brendan Kehoe
Shadow Master: Stanton McCandlish
Shadow-Archivists: Dan Carosone / Paul Southworth
Field Agent Extraordinaire: David Smith
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest

CONTENTS, #9.14 (Sun, Mar 2, 1997)

File 1--CyberAngels - more info from Colin ("Gabriel") Hatcher
File 2--CYBERANGELS FACE PROJECT
File 3--Netpics Interviewed after FW Arrests - Tx Telecom Jrnl (fwd)
File 4--Cu Digest Header Info (unchanged since 13 Dec, 1996)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

---------------------------------------------------------------------

Date: Thu, 27 Feb 1997 13:23:27 -0500
From: Udhay Shankar N <udhay@pobox.com>
Subject: File 1--CyberAngels - more info from Colin ("Gabriel") Hatcher

Editors :

Following is the text of correspondence between myself and
Gabriel Hatcher of FACES.

Udhay
To: gabriel@cyberangels.org
From: Udhay Shankar N <udhay@pobox.com>
Subject--File 1 of Cu Digest, #9.09, Sun 16 Jan 97

Dear Mr. Hatcher,

Please refer the abovementioned Cu Digest. I agree with the views expressed
by David Smith
in that post and I think your picture database will further traumatise the
victims of child
pornography. Maybe if you make it available through some kind of auth.
process ?

USN
=
Date--Tue, 25 Feb 1997 13:09:03 -0800
To: Udhay Shankar N <udhay@pobox.com>
From--"CyberAngels Director : Colin Gabriel Hatcher"
<gabriel@cyberangels.org>
Subject--Re: File 1 of Cu Digest, #9.09, Sun 16 Jan 97

>Dear Mr. Hatcher,
>
>Please refer the abovementioned Cu Digest. I agree with the views expressed
>by David Smith in that post and I think your picture database will further
>traumatise the victims of child pornography. Maybe if you make it available
>through some kind of auth. process ?
>

Dear USN


Thankyou for your views. I do not however agree with you. Our FACE
project has been carefully researched for the past 6 months and we are
proceeding slowly and with high regard for the victims. I find it strange
that you believe that a child who is being raped for the pleasure of adults
would prefer the rape to continue rather than be "embarrassed" by having
themselves identified and rescued. Our project is all about rescuing the
victims of crime, and I believe we are giving due regard to their concerns.
Since the choice may be between being publicly identified and rescued, or
the abuse continuing, I believe identification and rescue is the better
option.

In some cases it may even be true that a child would prefer the torture to
continue rather than have their father get into trouble - but in cases like
these I would suggest that there is a compelling interest greater than the
child's wish - the need to stop the crime continuing and bring a pedophile
to justice.

The average pedophile sexually abuses 80 separate victims before being
arrested. It is important to identify them and stop them before many more
children are hurt. A child victim's face may lead Police to an abuser -
either an abductor or indeed a family who are abusing their own child.

This project is being developed in consultation with other expert
organizations in the area of child abuse, with Federal Law Enforcement
authorities and with our own experts in child psychology. Our research and
development continues. Be advised that we are extremely thoughtful about
what we are doing. We have no plans to break any laws, and this project
proceeds at all times with expert legal advice.


regards

Gabriel


*********************************************************************
Colin Gabriel Hatcher
CYBERANGELS Internet Safety Organization

gabriel@cyberangels.org

http://www.cyberangels.org

Information about PGP, and our PGP
public Key is available from our WWW site.

"All that is required for the triumph of evil is
that good people remain silent and do nothing"
(after Edmund Burke)

CYBERANGELS (TM) is a Division of the
Guardian Angels International Alliance,
which is a 501c3 non-profit organization.

501(c)(3) #11-2592739.

*********************************************************************



To: "CyberAngels Director : Colin Gabriel Hatcher" <gabriel@cyberangels.org>
From--Udhay Shankar N <udhay@pobox.com>
Subject--Re: File 1 of Cu Digest, #9.09, Sun 16 Jan 97

At 01:09 PM 2/25/97 -0800, you wrote:

>Thankyou for your views. I do not however agree with you. Our FACE
>project has been carefully researched for the past 6 months and we are
>proceeding slowly and with high regard for the victims. I find it strange
>that you believe that a child who is being raped for the pleasure of adults
>would prefer the rape to continue rather than be "embarrassed" by having
>themselves identified and rescued.

Are you following the debate this has initiated on the Cu Digest mailing
list ? There are,
I believe, some important concerns / objections to your project which have
been enunciated
there, such as the various possibilities for abuse of such a system. What
are the safeguards
you are building into the process ? The question is academic to me (living
as I do in India)
but it could be vital for the others who have voiced their feelings. I do
not think anybody
is against your stated objective, but there seem to be plenty of grey areas
here. Some idea
of what your failsafes are would be helpful.

Regards,

Udhay

PS: I would like your permission to forward this discussion to the CuD
mailing list and my own
BBS if appropriate.

PPS: Just curious - what exactly did you mean by the quote marks surrounding
the word
"embarrassed" in your post, reproduced above ? Either you meant to imply
that it was lifted
from my email to you, or you were being satirical. Both are, I would think,
inappropriate here.
=
Date--Wed, 26 Feb 1997 10:30:48 -0800
To: Udhay Shankar N <udhay@pobox.com>
From--"CyberAngels Director : Colin Gabriel Hatcher"
<gabriel@cyberangels.org>
Subject--Re: File 1 of Cu Digest, #9.09, Sun 16 Jan 97

Udhay Shankar N wrote:

>Are you following the debate this has initiated on the Cu Digest mailing
>list ? There are, I believe, some important concerns / objections to your
>project which have been enunciated there, such as the various possibilities
>for abuse of such a system. What are the safeguards you are building into
>the process ? The question is academic to me (living as I do in India) but
>it could be vital for the others who have voiced their feelings. I do not
>think anybody is against your stated objective, but there seem to be plenty
>of grey areas here. Some idea of what your failsafes are would be helpful.

The concerns voiced about the FACE project are concerns that

>PS: I would like your permission to forward this discussion to the CuD
>mailing list and my own BBS if appropriate.

Thankyou for asking - most people do not. I have no problem with you
posting this discussion to CUD.

>PPS: Just curious - what exactly did you mean by the quote marks surrounding
>the word "embarrassed" in your post, reproduced above ? Either you meant to
>imply that it was lifted from my email to you, or you were being satirical.
>Both are, I would think, inappropriate here.

The use of quotation marks was neither a quote nor satirical, just a figure
of speech. It refers to the fact that some people would use the term
"embarrassed" to describe the experience, but I would not.

regards

Gabriel


*********************************************************************
Colin Gabriel Hatcher
CYBERANGELS Internet Safety Organization

gabriel@cyberangels.org

http://www.cyberangels.org

Information about PGP, and our PGP
public Key is available from our WWW site.

"All that is required for the triumph of evil is
that good people remain silent and do nothing"
(after Edmund Burke)

CYBERANGELS (TM) is a Division of the
Guardian Angels International Alliance,
which is a 501c3 non-profit organization.

501(c)(3) #11-2592739.

------------------------------

Date: Wed, 26 Feb 1997 13:47:51 -0800
From: "CyberAngels Director : Colin Gabriel Hatcher"
Subject: File 2--CYBERANGELS FACE PROJECT

-----BEGIN PGP SIGNED MESSAGE-----

CYBERANGELS FACE PROJECT

The concerns voiced about the CyberAngels FACE project are valid concerns
and deserve an answer. The insulting tone of some of the posts to date
however is sad to see. Disagreement is often expressed in CuD by abusing
and demonizing the opponent. In other words the critic cannot conceive
that another person could be intelligent and yet disagree with them. Thus
our project is dismissed as "dim-witted" or ill thought out, when what the
writer perhaps means is that they disagree with it. I disagree with a
number of the contributors to CuD but I would not claim for a moment that
they were stupid people based on the fact that I didn't agree with their
opinion. I consider it a weakness to be so quick to judge and condemn when
in fact the details of the project are not even known by those criticising
it.

The main areas of concern about our FACE project appear to be:

A) CONCERN FOR THE CHILDREN WHO WILL BE "VICTIMIZED" BY THE PROJECT

Some critics have written that we are contributing to
"double-victimization", while one from England wrote that we were lucky we
didn't live in the UK as we would go to jail there for such a project. In
other words this criticism equates us with the original abusers of the
children, and suggests that while we may well be well meaning "do-gooders"
we are in fact hurting the children and exploiting them for our own ends.
The term "do-gooders" is invariably used as a term of abuse as you can see
from the post in CuD - a "do-gooder" is by definition ignorant and
unskilled in the area they work.

It is my belief that a child who is being raped by adults for their
pleasure would like the torture to stop. It is the FACE project's intent
to assist in stopping the abuse. Our FACE project has been carefully
researched for the past 6 months and we are proceeding slowly and with high
regard for the victims. I find it strange that people believe that a child
who is being sexually abused would prefer the rape to continue rather than
face the "embarrassment" of having themselves identified and rescued.

It is certainly true that some children who are being raped by their
fathers are worried about getting him into trouble, and it is certainly
true that many children being abused inside families do not inform teachers
either because of shame and humiliation or in some cases because they are
threatened with terrible consequences if they ever tell. Nevertheless it
is in the best interests of all victims of child abuse, and for our society
as a whole, that child predators are stopped, and part of stopping child
abuse is by identifying child abuse victims.

The average pedophile predator abuses 80 children before they are finally
brought to justice. This being the case, it is in our interests to act
fast when we discover them. Identifying the victim of child abuse gives
Law Enforcement in many cases a direct lead to abusers.

B) CONCERN THAT CYBERANGELS FACE UNIT DOES NOT UNDERSTAND THE TECHNOLOGY OF
CHILD PORNOGRAPHY

It has been said that CyberAngels does not understand that child
pornography can be forged, and that any child's face can be pasted onto any
pornographic scene etc... Exactly what evidence does the critic have of
our lack of understanding in these matters? I would suggest no evidence at
all, for certainly none is offered. In fact we are perfectly well aware
that modern computer programs are very capable of such things. I own and
use Photoshop myself and am fully versed in what it can do with photographs.

The laws on child pornography are very clear here in the USA:

==================================================

"Child pornography" is defined as speech that:

1) visually depicts
2) sexual conduct - which might include sex, masturbation, and "lewd
exhibition of genitals" --
3) by actual children under the age of 18,

It is constitutionally UNPROTECTED. You can go to jail for distributing it
*or* for possessing it.

The rationale behind this exception is that child pornography necessarily
involves the use of children in sexual contexts; and that to suppress such
use, the law can ban distribution and possession of child pornography as
well as its production. The category is therefore limited to *actual*
depictions of children; it almost certainly excludes, say, paintings (or
computer-generated images) of fictional children, or verbal descriptions of
sexual conduct involving children.

[From "Cyberspace Law for Non-Lawyers" by Larry Lessig, David Post, Eugene
Volokh
http://www.ssrn.com/cyberlaw ]
==================================================

So what are our criteria for selecting images from which to crop? FACE
members must make decisions about the following:


1) The original photo should have been taken in the last few years.

a) Consider hair styles and clothing: are they something you would see
people wearing today?
b) Does the photo have a yellow or brown tint to it, If so it may be too old.
c) Consider decor in the room like pictures, beds, wallpaper. Could you
buy something like that today? If not the photo may be too old.


2.The child must appear to be under 15 years old.

a) Consider the hands and eyes of the victim.
b) Try to determine if the photo has been changed in any way to make it
look like child porn. (If your viewer can magnify the size of the image,
you may be able to determine if there have or have not been any
alterations.) The most obvious retouch methods used when fabricating child
pornography is the masking of pubic hair, the reduction of breast size in
the case of women, and the placing of a child's head on top of a adults's
body.

In the case of highly skilled graphic designers the changed image will
appear "seamless". In the case of a seamless image, CyberAngels are
advised to treat it as a piece of genuine child pornography.


3) If the child is just standing, sitting, or laying we can NOT use it
unless it meets one of the below requirements:

a) The child is being sexually abused by someone else in the photo.
b) The child is doing something sexual (eg. masturbation, pulling her dress
up to expose him or herself, or posing in an overtly sexual nature).

One thing to be very careful of, is to try and determine if the image comes
from a nudist camp. If it does, and it is just child nudity rather than
sexual abuse, then we CANNOT use the image as these are legal images. What
the images are used for by pedophiles is sickening and sad, but the images
in and of themselves are legal under US law.


4) The image CANNOT be used if the child's face is showing pain or
distress or if the child is peforming oral sex and therefore the face
cannot be cropped. If FACE searcher can find one unuseable image of a
child involved in oral sex and another simple nude picture of the same
child that would normally not be useable as it is legal, then we can couple
the two images and use the nudist face, as we have evidence that sexual
abuse occurred.

Images to be included in the FACE database must be approved by 5 separate
people. For an image to be included all 5 persons of the selection
committee must agree unanimously.


The logic of our critic appears to be that since child pornography can be
spoofed it is therefore not possible to ever decide whether something is
child pornography or not. Presumably the same critic would then favor the
abolition of the laws against child pornography on the same grounds?

In fact what we are doing is searching for "probable cause" for deeper
investigation by Law Enforcement. It is not for CyberAngels to make a
judicial ruling about whether something is an illegal image or not. That
decision is made by a court, and in some cases by a jury, following expert
witnesses and examination of the images by experts in the field (compare
for example OJ Simpson's Magli shoes, where a jury had to decide whether
the image was genuine after hearing expert testimony). CyberAngels FACE
Unit is selecting possible examples of child abuse, asking for public
assistance in identifying the faces used in the images and presenting the
evidence to Law Enforcement.

And what if the face used in the child pornography belongs to a child who
has _never_ been abused? Wouldn't the parents wish to know that someone
was using their child's face to create such an image for the sexual
gratification of pedophiles worldwide? I certainly would like to know that
if one of my kids was being exploited in such a way.


C) CONCERN THAT WE ARE BREAKING THE LAW BY GATHERING EVIDENCE

Our critics continue to paint us as ignorant newbies who know nothing about
law, law enforcement, obscenity, pornography, child pornography, child
abuse, psychology or internet technology. Notice that the accusation is
always that we are "dim-witted" and rarely stops at "I disagree".

In fact CyberAngels core membership are experts in a wide range of the
above mentioned fields. I am a post graduate researcher and lecturer
(History, International Relations) with 17 years teaching experience,
including work at the University of London, England, and am also an expert
in security (20 years). Other members of CyberAngels core team are
professional Law Enforcement members, child psychologists and mental health
counsellors, internet system administrators, network managers, usenet
admins, webmasters and technicians, numerous lawyers from both criminal and
civil fields, and numerous representatives of child abuse/support
organizations. Our FACE project is being developed in consultation with as
much expertise as we can find.

We are following guidelines for gathering evidence given to us after
discussion with the FBI "Innocent Images" project running out of Baltimore.
Our Usenet Director discussed how we could help the FBI in their
investigations with agent Doris Heppler who is one of those in charge of
the project.

The advice we received from the FBI is the advice we follow:

1) Images are downloaded to floppy disks for viewing purposes.
2) If the image is suspected to be illegal, the headers are recorded.
3) The floppy disk is reformatted to erase all trace of the suspected
illegal image.
4) The headers are passed up the chain of command to the next level for
verification.
5) No suspected illegal images are EVER stored on computer, nor sent by
email or snail mail.
6) Following verification either i) The headers are passed on to FBI agents.
or ii) The encoded binary is downloaded to floppy disk (not decoded) and
the disk is then carried physically to the local FBI office.
7) All members involved in such activity should make contact with local or
regional FBI offices and ask for assistance and guidance.

All FACE project members are advised to make direct contact and meet with
both their local FBI agents AND with their ISP admins to discuss their
involvement in this project. It is not the case that CyberAngels are
operating alone and in secret and could therefore be confused with
pedophiles. The same is true in other countries - members are advised to
contact their local or federal law enforcement and ask for guidelines as to
how they can assist in the gathering of evidence and the stopping of the
online trade in child pornography and the real life activities of
pedophiles and child predators.


D) CONCERN THAT PEDOPHILES WILL JOIN CYBERANGELS AS A COVER FOR GETTING
THEIR HANDS ON CHILD PORNOGRAPHY

Some critics are concerned that pedophiles will join CyberAngels as a cover
for getting their hands on child pornography and being immune from
prosecution. What evidence do these critics have of this? I have never
seen any.

Why would a pedophile join CyberAngels in order to look at child
pornography? In case anyone didn't know the binaries newsgroups are full
of such illegal images that can be downloaded and viewed in minutes.
Pedophiles can also use the Fserves from the IRC nets and gain access to
thousands of child pornography images in that way. Providing no images are
ever stored to the Hard Drive, no pedophile can ever be convicted of
possession of child pornography, as there will be no evidence. The only
times pedophiles are convicted of possession of child pornography is when
either a) Their computers are seized and found to contain large archives of
child pornography, or b) They send illegal images by email to someone else.
In other words it is completely unnecessary for a pedophile to join
CyberAngels in order to view child pornography with impunity. This is
probably why we do not have members who are pedophiles. How many
pedophiles do you know who would be happy to register their names and
addresses with the FBI and risk background investigations, when they can
obtain child pornography freely and safely without needing to do that?

Any CyberAngel member who stores illegal images on a Hard drive is as
guilty as anyone else of possession of child pornography. Storing of
images is not permitted by law except for by Law Enforcement or their
agents, and, while we seek ultimately to act as official agents for the FBI
we are at present involved only at an informal level with them as private
citizens. What this means is that all CyberAngels members are bound by the
same laws as anyone else. Abuse it, you lose it.


Well, no doubt there will be more questions, but I hope I have answered
some of CuD reader's concerns. I would certainly appreciate it if critics
confined themselves to stating their disagreements and reasons, rather than
abusing me personally or insulting my intelligence or expertise. There is
nothing "dim-witted" about what we are doing - in fact it is very carefully
planned and thought out. And by the way, if anyone is wondering why they
cannot find our FACE database yet, it is because 6 months after the project
began we are still researching and studying the legal, practical and moral
aspects. It seems to me that it is our critics who are running around
half-cocked, not CyberAngels.

-----BEGIN PGP SIGNATURE-----
Version: 2.6

iQCVAwUBMxSvUrrnmi5CcKeBAQE3iwQAh3fHaDJm6U/GZIGkl29VSBkeTfyhKuLS
71uAIgmq4QaweKuuqQU2yUstCA8gldUwUGN3MVDwH15jTe9EG2s+nMJ/fxu3UIJ2
JoBqezt5MFS1rcXhakKyRGDLCIxYhDK4poED+PuJDBYxEA18gTep2RChWXG6W1dC
PnyRoTU1iDw=
=iaEf
-----END PGP SIGNATURE-----


*********************************************************************
Colin Gabriel Hatcher
CYBERANGELS Internet Safety Organization

gabriel@cyberangels.org

http://www.cyberangels.org

Information about PGP, and our PGP
public Key is available from our WWW site.

"All that is required for the triumph of evil is
that good people remain silent and do nothing"
(after Edmund Burke)

CYBERANGELS (TM) is a Division of the
Guardian Angels International Alliance,
which is a 501c3 non-profit organization.

------------------------------

Date: Fri, 28 Feb 1997 22:45:37 -0600 (CST)
From: David Smith <bladex@BGA.COM>
Subject: File 3--Netpics Interviewed after FW Arrests - Tx Telecom Jrnl (fwd)

Date--Fri, 28 Feb 1997 16:55:05 -0600 (CST)
From--Gene Crick <gcrick@tpoint.net>

TTJ is a digest of news/analysis for telecommunications professionals
Re-posting is allowed where appropriate, if full attribution included
ALL COPYRIGHTS (1995-97) RETAINED BY TEXAS TELECOMMUNICATIONS JOURNAL

=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=
Texas Telecommunications Journal volume 2, number 10


For the First Time: Netpics Responds to Charges

EXCLUSIVE TTJ INTERVIEW OFFERS NEW VIEWS IN CONTROVERSIAL WEB ARRESTS



In a case that promises to set Constitutional precedent for the
Internet, Fort Worth vice officers recently arrested owners of
"Netpics" website on charges of possessing child pornography and
promoting obscene material via the Internet. Fort Worth PD,
assisted by Dallas officers, confiscated 17 computers and data in
Azle and Dallas, bringing charges against 3 people.

Since the arrest, media have reported police charges that Netpics
offered subscribers sexually-oriented graphics images, including
illegal obscenity
and child pornography.

The people at Netpics have declined any public comment during
this storm. Now however they have decided to speak, offering
their response to charges.

This special issue of the Texas Telecommunications Journal is
dedicated to an exclusive copyrighted interview with spokesmen
for WebbWorld, including its president, Ben Ives, supported by
chief attorneys, led by Larry Brown. (WebbWorld Corporation owns
and operated the Netpics web site presence.)

TTJ Editor Gene Crick explores the defendants' side of the story.
And what Netpics has to say presents a different picture from
what we have been told by others. At least one thing is certain:
these Texas website arrests may well prove to be the Internet's
first clear case of pornography prosecution for content on a
Usenet server. That legal concept has vast implications.

[Information from this TTJ interview is also being published
online in the New York Times CyberTimes section:
www.nytimes.com ]

---------------------------------------------------------------------------


NOW, NETPICS REPLIES... an Exclusive Interview with TTJ editor
Gene Crick


GC: You have been arrested by Fort Worth police as owners of
WebbWorld, the corporation that operated Netpics. The Netpics
business was described very critically in one national
publication as being "a subscription-based service that allowed
users to download pornographic pictures of children."

And one of the country's leading publications describes you as
"trolling" the Internet, collecting sexual images which you then
resold to clients who paid $11.95 a month to view and download
graphic files on your website.

Are these statements correct? Did you knowingly maintain and
distribute child pornography on the Netpics site?

NP: Absolutely not. We offered only the same Usenet lists and
contents available on thousands of Internet servers around the
world. And while we featured adult-oriented newsgroups, we
took exhaustive measures to eliminate any content we felt might
even resemble child pornography.


GC: Police say they downloaded five images of underage girls from
Netpics. Do you now believe there was child pornography
available on Netpics' site?

NP: If there was, it was despite our best efforts. During the
8 months vice police say they were investigating us,
approximately 1,400,000 files passed through our servers. We
believe the few objectionable images they found prove Netpics
was successful in eliminating these kinds of images.


GC: Didn't you promote and advertise the Netpics web site as
having "adult images?" How about Child pornography?

NP: Netpics was designed for adult access to the Internet,
that's the market we went into this business to serve. But we
offered no child pornography and in fact posted clear notice
that we would not provide nor permit those images on Netpics.


GC: Are there other businesses like this currently operating?

NP: Yes, several. Ironically, it seems likely that another
adult site operator, from California, may have been the source
of this complaint. He had threatened to create problems for us
with the authorities.


GC: So could a competitor have been behind images police found
on Netpics?

NP: Interesting question. We hope police will use file header
details to track down the people actually responsible for
putting this on the web.


GC: Did you take any actions to prevent or remove any child
pornography on your website?

NP: Extensively. We continually worked to identify newsgroups
likely to carry those images. Not only did we block those
notorious groups, but we kept continual track of filenames
posted on them. We then filtered all our groups for those
files, to thwart people spamming unacceptable images to other
Usenet groups we did carry.

In addition to this, from the first day to the last we spent 3
to 4 hours screening as many of the incoming images as we
could, to delete this kind of pornography. Of course with up
to 14,000 images coming from Usenet daily, we could only watch
the most likely sources of unacceptable posts.

For the record, those efforts weren't because we felt legally
required to do so. We have children ourselves, and felt a
moral obligation.


Where did you obtain the images you offered your subscribers?

Off the Internet Usenet, and nowhere else. We at Netpics never
created, scanned or posted a single image of any kind.


Did you review or select the images before or after they were
offered by Netpics?

We couldn't check every picture in every news group, but we
reviewed new postings to "high risk" groups before they were
offered to the public. These were the groups where problems
had been observed in the past.


Were all Usenet newsgroups offered by WebbWorld? or just those
with graphic sexual content?

We offered approximately 188 Usenet newsgroups, mainly
featuring adult topics. But these are available everywhere;
our main market appeal was convenience and easy to use software
for viewing graphics on the web.


How many images did you have on Netpics?

We never retained any images ourselves, we merely archived
about three days of Usenet traffic. So typically we might have
40,000 images on our system at any given time. Recently it's
been a bit less because graphic file sizes are growing and we
were running out of disk space.


How many of these images did the police charge were obscene or
contained child pornography?

We've heard they have five files alleged as child pornography.
Those images were apparently shown to a doctor who estimates
the ages of people shown. Reportedly, four might be underage
teenagers; and the other maybe eleven years old. We don't know
for sure, we've never seen the pictures.


How much equipment and how many files did the police seize?

They took it all: Ben (Ives)'s computer at home and 16 sytems
at our server site in Dallas, plus router, monitors, software,
data records and everything. Desk, chair... they even took
the pencils from Ben's house!


Can you operate without what they took?

You mean stay in business? Not a chance! We can't even file
our personal tax returns until we get some of those files back.


Have the authorities said when it will be returned?

There has been no talk of returning anything.


Prior to the current arrest, WebbWorld has been sued by Playboy
Enterprises for copyright infringement. What is the status of
that legal action?

We are seeking a stay in that suit, pending outcome of these
charges, should hear from the judge on that ruling Monday
afternoon. (3/3/97)

In both cases, we're being charged for what appears worldwide
on Usenet, content we have not created nor even knew about.
Apparently in this case some people may have scanned Playboy
pages and illegally posted them to newsgroups hosted
everywhere, including Netpics.

And in both cases, our small startup company has become the
legal target for the same content carried by MCI, Sprint and
many thousands of other net hosts. We feel Netpics is being
made an example for political goals.


Could you give a little background on the WebbWorld stockholders
arrested for operating Netpics? Are you in any other business
besides WebbWorld?

This is our first business venture together <rueful laugh>...
and it's probably our last.

Brian Ellis is a computer consultant who worked fulltime with
WebbWorld. James Gurkin owns and operates a Fort Worth
security guard company. Ben Ives is a manager with the Postal
Service, or was: they've placed him on administrative leave and
he expects to be fired soon.


How has this affected the WebbWorld people personally?

What do you think? It's devastating. Ben has been hit worst
so far: publicly arrested and humiliated; losing his job;
having to move and give up his phone; denied access to his
children; and having his name unjustly associated with child
pornography. Pretty tough on a man who spends his spare time
teaching classes in Positive Parenting. That's over now, too.


The Fort Worth vice police estimate you have been making at least
$500,000 a month from Netpics. That's more than 40,000 monthly
subscribers. Is this accurate? If this is not true, how much
did the operation earn?

That is simply ridiculous! The police now possess all our
accounting information, which clearly shows our total gross
revenue for 1996 was around $550,000. WebbWorld didn't even
start breaking even until maybe July. I can't guess where they
got such grossly overstated figures.


How many people subscribed to Netpics?

We had been growing slowly but steadily. At the time we were
shut down Netpics had around 13,000 subscribers.


Will those customers be pursued by law enforcement?

Doesn't look like it. Local officials have been quoted as
recognizing that subscribing is not illegal; only the actual
possession of illegal materials. Besides, we did not keep any
records of who downloaded files.


In Texas, transmitting child pornography is a felony with a
maximum ten years sentence and $10,000 fine. And the promotion
of obscenity is a misdemeanor that can bring two years and
another $10,000 fine. So conviction on counts of these charges
could mean long jail sentences and huge fines. How are you
paying the costs of your defense?

We don't know; this is obviously going to be a long and costly
litigation and we're completely out of business. Plus we've
just had to post more than $150,000 in court bonds for the
arrests.

About the only bright spot has been the offers of help from
concerned operators and users of the Internet. They have been
coming in to our information/assistance website at
www.netpics.com.

And finally, how have representatives of the media treated you?

They've been pretty ruthless; lots of pressure and not much
presumption of innocence. Some stories more or less just said
we are guilty.

But to be fair, I guess that's partly understandable. Until
now, they've only heard one side of this story, a very
distorted one. From now on, people can check with Larry
(Brown): LBrown9695@aol.com 817/332-4150

---------------------------------------------------------------------------

Bottom Line from TTJ: Hearing Netpics' version of facts suggests
this case is more complicated, and perhaps more important, than
originally apparent. As with the police version, there are
differing views and conflicting statements that will be resolved
in a court. But whether this ends in conviction or acquittal
fundamental precedents will be set for Usenet and content
liability on the Internet.



28 February, 1997

=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=
Note: TTJ is a journal of information, opinion and telecom advocacy.
We cannot guarantee accuracy of these early, informal reports;
please check with official sources to confirm critical results.
Subscribers may request details or forward specific questions.
Subscription info: Gene Crick gcrick@main.org 512/303-1021 fx 321-3163

------------------------------

Date: Thu, 15 Dec 1996 22:51:01 CST
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 4--Cu Digest Header Info (unchanged since 13 Dec, 1996)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send post with this in the "Subject:: line:

SUBSCRIBE CU-DIGEST
Send the message to: cu-digest-request@weber.ucsd.edu

DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.

The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

To UNSUB, send a one-line message: UNSUB CU-DIGEST
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
(NOTE: The address you unsub must correspond to your From: line)

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
In ITALY: ZERO! BBS: +39-11-6507540
In LUXEMBOURG: ComNet BBS: +352-466893

UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)


The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
URL: http://www.soci.niu.edu/~cudigest/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.

------------------------------

End of Computer Underground Digest #9.14
************************************

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT