Copy Link
Add to Bookmark
Report
Computer Undergroud Digest Vol. 09 Issue 78
Computer underground Digest Wed Oct 29, 1997 Volume 9 : Issue 78
ISSN 1004-042X
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
Archivist: Brendan Kehoe
Shadow Master: Stanton McCandlish
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Field Agent Extraordinaire: David Smith
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
CONTENTS, #9.78 (Wed, Oct 29, 1997)
File 1--Sen. Lott's comments on Encryption (Cong. Record)
File 2--NPR Reporter Indicted For Trading Porn on the Net
File 3--Hack into Yale
File 4--Mitnick Might Get Computer Use
File 5--IRISS'98 Internet Research and Information for Social (fwd)
File 6--Re: In "Web things to do when you're dead" (CuD 9.73)
File 7--Electronic Frontier Canada opposes Internet content control
File 8--Cu Digest Header Info (unchanged since 7 May, 1997)
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
---------------------------------------------------------------------
Date: Sat, 25 Oct 1997 09:19:53 -0700 (PDT)
From: Mike Godwin <mnemonic@well.com>
Subject: File 1--Sen. Lott's comments on Encryption (Cong. Record)
((MODERATORS' COMMENT: The following is taken from The Well's
EFF conference. Information about The Well can be obtained
at: http://www.well.com))
From the Congressional Record
----------------------------------------------------------
ENCRYPTION (Senate - October 21, 1997)
----------------------------------------------------------
[Page: S10879]
Mr. LOTT. Mr. President, I would like to report to my colleagues on the
activities in the House to establish a new export policy on encryption.
This is an issue that is still at the top of my list of legislation I
hope this Congress can resolve within the next 2 months. The House's
actions last month turned a spotlight on how this issue should
ultimately be resolved.
Let me briefly review the issue. Encryption is a mathematical way to
scramble and unscramble digital computer information during transmission
and storage. The strength of encryption is a function of its size, as
measured in computer bits. The more bits an encryption system has, the
more difficult it is for someone else to illegally unscramble or hack
into that information.
Today's computer encryption systems commonly used by businesses range
from 40 bits in key length to 128 bits. A good hacker, let's say a
criminal or a business competitor, can readily break into a computer
system safeguarded by a lower-technology 40-bit encryption system. On
the other hand, the 128-bit encryption systems are much more complex and
pose a significant challenge to any would-be hacker.
Obviously, all of us would prefer to have the 128-bit systems. And
equally as important, we would like to buy such systems from American
companies. Firms we can routinely and safely do business with. Foreign
companies and individuals also want to buy such systems from American
companies. They admire and respect our technological expertise, and
trust our business practices. The United States remains the envy of the
world in terms of producing top-notch encryption and information
security products.
However, current regulations prohibit U.S. companies from exporting
encryption systems stronger than the low-end, 40-bit systems. A few
exceptions have been made for 56-bit systems. Until recently, it has
been the administration's view that stronger encryption products are so
inherently dangerous they should be classified at a level equal to
munitions, and that the export of strong encryption must be heavily
restricted.
While we are restricting our own international commerce, foreign
companies are now manufacturing and selling stronger, more desirable
encryption systems, including the top-end 128-bit systems, anywhere in
the world they want. Clearly, our policy doesn't make sense. Just as
clearly, our export policies on encryption have not kept up to speed
with either the ongoing changes in encryption technology or the needs
and desires of foreign markets for U.S. encryption products.
My intention is neither to jeopardize our national security nor harm law
enforcement efforts. I believe we must give due and proper regard to the
national security and law enforcement implications of any changes in our
policy regarding export of encryption technology. But it is painfully
obvious we must modernize our export policies on encryption technology,
so that U.S. companies can participate in the world's encryption
marketplace. The legislative initiative on this issue has always been
about exports, but this summer that changed.
During the past month, the FBI has attempted to change the debate by
proposing a series of new mandatory controls on the domestic sale and
use of encryption products. Let me be clear. There are currently no
restrictions on the rights of Americans to use encryption to protect
their personal financial or medical records or their private e-mail
messages. There have never been domestic limitations, and similarly,
American businesses have always been free to buy and use the strongest
possible encryption to protect sensitive information from being stolen
or changed. But now, the FBI proposes to change all that.
The FBI wants to require that any company that produces or offers
encryption security products or services guarantee immediate access to
plain text information without the knowledge of the user. Their proposal
would subject software companies and telecommunications providers to
prison sentences for failure to guarantee immediate access to all
information on the desktop computers of all Americans. That would move
us into an entirely new world of surveillance, a very intrusive
surveillance, where every communication by every individual can be
accessed by the FBI.
Where is probable cause? Why has the FBI assumed that all Americans are
going to be involved in criminal activities? Where is the Constitution?
And how would this proposal possibly help the FBI? According to a
forthcoming book by the M.I.T. Press, of the tens of thousands of cases
handled annually by the FBI, only a handful have involved encryption of
any type, and even fewer involved encryption of computer data. Let's
face it--despite the movies, the FBI solves its cases with good
old-fashioned police work, questioning potential witnesses, gathering
material evidence, and using electronic bugging or putting microphones
on informants. Restricting encryption technology in the U.S. would not
be very helpful to the FBI.
The FBI proposal won't work. I have talked with experts in the world of
software and cryptography, who have explained that the technology which
would provide compliance with the FBI standard simply does not exist.
The FBI proposal would force a large unfunded mandate on our high
technology firms, at a time when there is no practical way to accomplish
that mandate.
Rather than solve problems in our export policy, this FBI proposal would
create a whole new body of law and regulations restricting our domestic
market.
This and similar proposals would also have a serious impact on our
foreign market. Overseas businesses and governments believe that the
U.S. might use its keys to computer encryption systems to spy on their
businesses and politicians. Most U.S. software and hardware
manufacturers believe this is bad for business and that nobody will
trust the security of U.S. encryption products if this current policy
continues. In fact, this proposal appears to violate the European
Union's data-privacy laws, and the European Commission is expected to
reject it this week.
So, the FBI proposal would: Invade our privacy; be of minimal use to the
FBI; would require nonexistent technology; would create new
administrative burdens; and would seriously damage our foreign markets.
This is quite a list.
Mr. President, the FBI proposal is simply wrong. I have learned that
even the administration does not support this new FBI proposal. So why
does the FBI believe it must now subject all Americans to more and more
surveillance?
This independent action by the FBI has created confusion and mixed
signals which are troublesome for the Senate as it works on this
legislation. Perhaps the FBI and the Justice Department need to focus
immediately on a coordinated encryption position.
Mr. President, I congratulate the members of the House Commerce
Committee for rejecting this FBI approach by a vote margin of more than
2 to 1.
I am sure all of my colleagues are sympathetic to the fact that emerging
technologies create new problems for the FBI.
But we must acknowledge several truths as Congress goes forward to find
this new policy solution. People increasingly need strong information
security through encryption and other means to protect their personal
and business information. This demand will grow, and somebody will meet
it. In the long term, it is clearly in our national interest that U.S.
companies meet the market demand. Individuals and businesses will either
obtain that protection from U.S. firms or from foreign firms. I firmly
believe that all of our colleagues want American firms to successfully
compete for this business. Today there are hundreds of suppliers of
strong encryption in the world marketplace. Strong encryption can be
easily downloaded off the Internet. Even if Congress wanted to police or
eliminate encryption altogether, I am not sure that is doable.
So, let's deal with reality. Clamping down on the constitutional rights
of American citizens, in an attempt to limit the use of a technology, is
the wrong solution. The wrong solution. This is especially true with
encryption technology because it has so many beneficial purposes. It
prevents hackers and espionage agents from stealing valuable
information, or worse, from breaking into our own computer networks. It
prevents them from disrupting our power supply, our financial markets,
and our air traffic control system. This is scary--and precisely why we
want this technology to be more available.
Only a balanced solution is acceptable. Ultimately, Congress must
empower Americans to protect their own information. Americans should not
be forced to only communicate in ways that simply make it more
convenient for law enforcement officials. This is not our national
tradition. It is not consistent with our heritage. It should not become
a new trend.
Mr. President, I would like to establish a framework to resolve this
difficult issue. I hope to discuss it with the chairmen and ranking
members of the key committees. I especially look forward to working with
the chairman of the Commerce, Science and Transportation Subcommittee on
Communications, Senator Burns. He was the first to identify this issue
and try to solve it legislatively. His approach on this issue has always
been fair and equitable, attempting to balance industry wants with law
enforcement requirements.
I believe there are other possible ideas which could lead to a consensus
resolution of the encryption issue. It is my hope that industry and law
enforcement can come together to address these issues, not add more
complexity and problems. The bill passed by the House Commerce Committee
included a provision establishing a National Encryption Technology
Center. It would be funded by in-kind contributions of hardware,
software, and technological expertise. The National Encryption
Technology Center would help the FBI stay on top of encryption and other
emerging computer technologies. This is a big step. This is a big step
in the right direction.
It is time to build on that positive news to resolve encryption policy.
Mr. President, there is an op-ed piece which appeared in the Wall Street
Journal on Friday, September 26. It is well written and informative,
despite the fact that its author is a good friend of mine. Mr. Jim
Barksdale is the president and CEO of Netscape Communications and is
well-versed in encryption technology. Mr. Barksdale's company does not
make encryption products; they license such products from others. They
sell Internet and business software and, as Jim has told me many times,
his customers require strong encryption features and will buy those
products either from us or foreign companies.
Again, let's deal with reality. The credit union manager in
Massachusetts, the real estate agent in Mississippi, the father writing
an e-mail letter to his daughter attending a California university, each
want privacy and security when using the computer. They will buy the
best systems available to ensure that privacy and security. And, in just
the same way, the banker in Brussels, Belgium, the rancher in Argentina,
and the mother writing e-mail to her daughter in a university in
Calcutta, India, each of these people also want privacy and security.
They also will buy the best systems available to ensure that privacy and
security. And they want encryption systems they trust--American systems.
That's what this debate is about.
Mr. President, if Congress does not modernize our export controls, we
run the real risk of destroying the American encryption industry. And we
risk giving a significant and unfair advantage to our foreign business
competitors.
[Page: S10881]
------------------------------
Date: Fri, 17 Oct 1997 18:19:13 GMT
From: owner-cyber-liberties@aclu.org
Subject: File 2--NPR Reporter Indicted For Trading Porn on the Net
Cyber-liberties Update
NPR Reporter Indicted For Trading Porn on the Net While
Researching Story
A veteran reporter for National Public Radio, who says he was
engaged in lawful newsgathering activities, was indicted in late
August by a federal grand jury for allegedly receiving and
sending child pornography through the Internet, Jane Kirtley,
Executive Director of the Reporters Committee for Freedom of the
Press (RCFP) said.
Larry Matthews pleaded not guilty to nine felony counts of
possession of child pornography and six counts of distribution of
such material in federal District Court in Maryland, saying that
he was using the material as research for a freelance story on
child pornography on the Internet.
Matthews had reported three stories on the issue prior to his
indictment, Kirtley said.
"This is exactly the type of action we predicted would happen
when Senator Hatch moved to pass the Child Pornography Prevention
Act (CPPA) which amended the Privacy Protection Act of 1980. The
new law removes exemptions that protected journalists from
federal search and seizures and creates an overbroad definition
of pornography," she said.
"The amendment was unnecessary since child pornography is already
illegal and the amendment leads to the overzealous persecution of
journalists engaged in protected newsgathering activities,"
Kirtley said.
The ACLU along with other week free-speech advocates recently
filed an appeal before the Court of Appeals in the Ninth Circuit
to another decision which upheld the CPPA as constitutional.
The suit is a pre-enforcement challenge to the law and claims it
is unconstitutional because it criminalizes the publication or
transmission of non-obscene images that "appear" to portray
children involved in sexual acts. The law applies to
computer-generated images, morphed images, films and drawings,
and bans any depiction that "is, or appears to be, of a minor
engaged in sexually explicit conduct."
+++++++++++++++++
About Cyber-Liberties Update:
ACLU Cyber-Liberties Update Editor:
Cassidy Sehgal (Cassidy_Sehgal@aclu.org)
American Civil Liberties Union
National Office 125 Broad Street,
New York, New York 10004
To subscribe to the ACLU Cyber-Liberties Update, send a message to
majordomo@aclu.org with "subscribe Cyber-Liberties" in the body of your
message. To terminate your subscription, send a message to
majordomo@aclu.org with "unsubscribe Cyber-Liberties" in the body.
------------------------------
Date: Sun, 19 Oct 1997 21:16:13 -0500 (CDT)
From: Avi Bass <te0azb1@corn.cso.niu.edu>
Subject: File 3--Hack into Yale
Hacker breaks into Yale e-mail
By Jeff Herzog, The Yale Daily News, Oct. 16, 1997
Although no students realized it, Yale's computers were under attack
Tuesday.
A computer hacker "attacked" one of Yale's main e-mail account servers
under the nose of Information and Technology Service officials.
ITS staff detected a breach of the Pantheon login server as the
attacker aimed to capture passwords and login names, ITS officials
said.
"The primary purpose of the attack was to use Yale as an attack point
for other sites," Director of Academic Computing Services Philip Long
said. As a result of the security breech, ITS required all pantheon
users to change their account passwords.
"We don't have evidence of damage or tampering with accounts, but we
think it's important for students to change their security passwords
as a precaution," Long said.
ITS administrators said they believe that the hacker used a "sniffer,"
a rogue program designed to capture undetected all login names and
passwords.
As to the extent of damage the hacker caused, Long added, "We don't
have evidence of small or wide spread compromise of accounts."
<snip>
------------------------------
Date: Sun, 12 Oct 1997 16:14:45 -0400
From: "Evian S. Sim" <evian@escape.com>
Subject: File 4--Mitnick Might Get Computer Use
Valley Focus North Hills Alleged Hacker May Get Use of Computer
Los Angeles Times (LT)
FRIDAY October 10, 1997
By: ASSOCIATED PRESS
Edition: Valley Edition
Section: Metro
Page: 3 Pt. B
Story Type: Column; Brief;
Wire Word Count: 312
A federal judge may allow Kevin Mitnick use of a computer to help
him defend himself against computer and wire fraud charges.
U.S. District Judge Mariana Pfaelzer earlier had vowed to keep
Mitnick away from computers, but she seemed to back away from
that edict after listening to lawyers' arguments Wednesday.
Mitnick, who grew up in the Valley and began his electronic
obsession by breaking into Los Angeles Unified School District
computers while a student at Monroe High School in North Hills,
was on parole for other computer-related convictions when he
allegedly went on a three-year hacking spree in 1992. He has been
in prison since he was arrested in 1995.
Pfaelzer set an April 14 trial on 25 counts of computer and wire
fraud, possessing unlawful access devices, damaging computers and
intercepting electronic messages.
Mitnick has pleaded not guilty to those charges. If convicted, he
could face another five to 10 years in prison.
<snip>
Assistant U.S. Attorney David Schindler said that if all the
documents were printed it would fill up a space larger than the
courtroom.
Pfaelzer seemed to warm to the notion that Mitnick have access to
a laptop computer, and she told both sides to confer on how
Mitnick could best view the evidence against him.
Mitnick has been in jail since he was arrested in February 1995
in Raleigh, N.C., after an investigation and cross-country
manhunt ended in a trap sprung by Tsutomo Shimomura, an expert in
computer security.
Copyright (c) 1997, Times Mirror Company
------------------------------
Date: 97-10-19 14:59:13 EDT
From: John.Kirriemuir@bristol.ac.uk (John Kirriemuir)
Subject: File 5--IRISS'98 Internet Research and Information for Social (fwd)
1st call for delegates for IRISS and
2nd call for abstracts for IRISS
IRISS'98 Internet Research and Information for Social
Scientists
25-27 March 1998
University of Bristol, UK
http://www.sosig.ac.uk/iriss/
email: iriss-info@bris.ac.uk
A three day conference hosted by the Institute for Learning
and Research Technology at the University of Bristol.
The first international IRISS conference aims to bring
together social scentists who are interested in the
Internet, either as a means of supporting and
enhancing their work, or as a focus for their research.
***CONFERENCE THEMES***
The themes of this year's conference are Internet skills, sites and
social effects. The conference aims to reflect the practical and
theoretical questions raised by the increasing role of networked
information in the social sciences and society. Topics for debate
include:
* how can social scientists make effective use of the
Internet in their work?
* where and how are social scientists using the Internet
to enhance their work and what effect is it having on
traditional roles and working methods?
* what high quality information can the Internet supply to
social scientists?
* what impact does the Internet have on individuals and
society and what visions do we have for the future?
***ATTENDING IRISS AS A DELEGATE***
This is the first call for delegates for IRISS. Confirmed, to date,
for the conference are:
* several high-profile keynote speakers
* a large variety of papers and presentations, covering all of the
conference themes, and presented by speakers from a combination of
academic, commercial, public and social/voluntary organisations
* pre and during conference hands-on workshops, in fully networked
rooms and conducted by experienced Internet for Social Scientist
trainers
* the main conference dinner, held in the prestigious Harveys
Restaurant and Museum - see:
http://www.sosig.ac.uk/iriss/harveys.html
Bristol is a city in the west of England; it is served by an
international airport, located 11 miles south of the city. The city has
two major train stations, with frequent train services to London (in
under 2 hours) and other cities. South Wales is a few minutes away by
train or car, and the scenic areas of the Cotswolds, Cornwall and Devon
are all easily accessible, as are attractions such as the city of Bath,
Stonehenge and Avebury.
Bristol itself is a thriving cosmopolitan city, with a very lively
social and cultural scene. The city has many famous sites of
interest, such as the Clifton suspension bridge and the S.S. Great
Britain, which are within a short distance of the conference location
and accomodation. Various on-line guides to Bristol include:
http://www.epost.co.uk/standards/bestofbris.html
http://www.bristol.digitalcity.org/org/council/about-bristol.html
A reduction is available to all delegates registering before 19
December 1997. Further details on booking can be found on the IRISS Web
site.
***CALL FOR PAPERS***
We invite papers and participation from:
* practitioners in the field who use the Internet to
support their day to day work
* researchers using Internet information and communication
in their research
* librarians developing their Internet knowledge and skills
to serve a social science user group
* educators interested in using the Internet for teaching
and learning
* information providers who publish on the Internet and
wish to reach the social science community
In addition to concurrent paper and workshop sessions the
conference will feature an ongoing poster session and a
dedicated Internet Gallery in a fully networked environment
enabling contributors to display high quality Internet
resources.
***HOW TO CONTRIBUTE***
If you are interested in submitting a paper, joining the
Internet Gallery or ongoing poster session, visit our Web
site at:
http://www.sosig.ac.uk/iriss/
for conference information together with online booking and
submission forms. The Web site will be updated frequently
as information becomes available and will include full
programme details and abstracts. The deadline for the
submission of abstracts is 7 November 1997.
***CONFERENCE FEE***
Delegates presenting papers will pay a reduced conference
fee. A reduction will also be available to all delegates
registering before 19 December 1997. Full details are
available from the Web site.
***HOST A MEETING AT IRISS***
Would your organisation or professional association like to
host a meeting at IRISS? We can provide free meeting
rooms and refreshments for groups booking to attend the
conference. Special discounts are available to groups of
10 or more. For further information contact the Conference
Secretary at:
iriss-info@bris.ac.uk
General conference enquiries should be directed to:
IRISS Conference Secretariat
Institute for Learning and Research Technology
University of Bristol
8 Woodland Road
BRISTOL
BS8 1TN, UK
Tel: +44 (0)117 928 8474
Fax: +44 (0)117 928 8473
Email: iriss-info@bris.ac.uk
IRISS Web site: http://www.sosig.ac.uk/iriss/
------------------------------
Date: Mon, 13 Oct 97 11:01:45 MDT
From: Dave++ Ljung <dxl@HPESDXL.FC.HP.COM>
Subject: File 6--Re: In "Web things to do when you're dead" (CuD 9.73)
I couldn't help but comment on this:
|Things to Do on the Web When You're Dead
| by David Blatner <david@afterlife.org>
|
| ... But I wonder how many people's sites are simply being "turned off"
| when they no longer have a voice (or a checkbook) to sustain them?
I like how you sneaked in that bit about the checkbook.
That comment seems to imply that a web presence should be free.
I fear a society where people not only don't have to work to supply
themselves with food and shelter, but they have a 'right' to a home
page? Frightening. Who exactly would pay for such a society?
--------------------------------------------------
|From--The Old Bear <oldbear@arctos.com>
|Subject--Spam Analysis
|
| 3. the apparent evolution of a subset of standard English
| punctuation which might be called 'spammese'.
Excellent catch on the exclamation point. I've been filtering my
mailbox for spam as well - and I've found that the To, From and Subject
fields can often give away spam - part of my filter searches for:
From:.*(success|money|mailbot)
To:.*(free@|you@|success|nobody@|friend@|money|askme|prices)
Subject:.*(18\+|Pix|Hot.*Website|Adult.*Video)
I only hit normal email (normail? ;) once with these regexps, and
only because I screwed up and used 18+ instead of 18\+.
I find that false positives aren't a problem because procmail saves off
guessed SPAM and sends a reply explaining that the message was recognized
as spam and gives contact instructions if this is a mistake. Not once
has a spammer used my contact instructions to get spam to me.
--------------------------------------------------
|From--Jonathan Wallace <jw@bway.net>
|Subject--File 9--THE X-STOP FILES: The Truth Isn't Out There
|
| So another censorware product has been found to secretly been
|blacklisting gay and lesbian material, anti-censorship sites, feminist...
I fully agree with your analysis that censorware doesn't work and will
probably never work well. I am however concerned that we are pointing
out the impracticalities of one of the concepts we used to our defense
against censorship of the entire net.
So - to play Devil's Advocate for a moment, let's say you have children
that you want to use the computer, but you really don't want them to
access pornography when you're not looking. Sure - you could tell
them to be a better parent, but my parents were great and I would've
been up until two in the morning finding out what the female body
looks like if we had the net when I was a kid :)
Disregarding the discussion over whether or not we should allow our
kids to look at such material, let's just assume:
1) Parents have the right to decide their kids shouldn't view such material
2) Kids will try to view such material regardless of what they are taught
3) Just keeping these kids off the net isn't necessarily fair.
Whether or not it's true isn't as important, because a huge amount of
the population believes that it's true and will fight for it strongly.
So what solution do we give these people? Right now they have none, except
to watch their children every moment they are on the computer. Can we
find a solution? One possibility I came up with was creating a 'safeweb'.
Safeweb would be similar to self-rating, but instead of deciding what
category a page would fit into (a difficult thing to do), there would
only be one 'rating' - that a page was deemed 'safe' - or at least
innocuous. What would determine 'safe'? Well - it's not as big
of an issue anymore, because it's not really an issue of censorship -
you could have a democratic majority decision on an easy to follow
set of standards for safe. You wouldn't have to worry about whether or
not different levels of nudity or 'language' would be included, you could
just not include any of it. I know there can be nitpicking here, i.e.,
are greek statues considered nudity, and so forth, but I don't think
that flaws the idea.
So the beauty of it is the end result, not the idea itself. You end up
having a web with a small percentage of which is deemed safe (in the
Barney sense :). Then parents can set the browser to view safe material
only, much like censorware. The beauty is that suddenly the parents
see what they are limiting their children to by trying to censor any
material that might have nudity or 'dirty words' in it, for golly's sake ;)
Then it's up to the parents to decide if they want their children to
be limited by their own decisions. One could argue that point #1 above
is illegitimate, that we should stop these parents from limiting their
children's growth, but then again, I don't think there's much you can
do to help children whose parents will only let them on BarneyWeb.
But finally we'd have an answer for the fundamentalists.
Any thoughts?
Dave Ljung
------------------------------
Date: Fri, 17 Oct 1997 13:42:16 -0400
From: Paul Kneisel <tallpaul@nyct.net>
Subject: File 7--Electronic Frontier Canada opposes Internet content control
Electronic Frontier Canada says the Canadian Human Rights Commission should
not attempt to control Internet content
ELECTRONIC FRONTIER CANADA (EFC) --- PRESS RELEASE
(For immediate release --- Thursday, October 16, 1997)
<http://insight.mcmaster.ca/org/efc/pages/pr/efc-pr.16oct97.html>
Electronic Frontier Canada (EFC), Canada's premier organization devoted to
the protection of freedom of expression in cyberspace, is opposed to the
Canadian Human Rights Commission's current attempt to control the flow of
information on the Internet.
In a series of hearings that began in Toronto on October 14th, a Human
Rights Tribunal will attempt to decide if a California web site spreading
Ernst Zundel's hateful messages is a discriminatory practice that falls
under the jurisdiction and within the scope of the Canadian Human Rights Act.
EFC's opposition to the Commission's agenda should not be interpreted as
support for Zundel. Like the vast majority of Canadians, EFC finds Zundel's
anti-Semitic views ludicrous, grotesque, and offensive. However, in the
words of Oliver Wendell Holmes, EFC believes that free speech means
"freedom for the thought that we hate."
EFC believes the expression of controversial opinions, no matter how
erroneous or repugnant, should be protected from government censorship by
the Charter of Rights and Freedoms.
"Of course, this doesn't mean that all speech is protected," says David
Jones, EFC's president and a professor of computer science at McMaster
University. "The Charter does not, for example, protect fraud, libel, or
death threats, whether over the Internet or not."
"Expressions of opinion, and even claiming that the Holocaust is a hoax,"
adds EFC vice-president Jeffrey Shallit, "should be protected." EFC favours
the repeal of all Canadian laws restricting hate speech.
"Laws intended to restrict 'bad' speech are often too broadly written, and
have the potential to restrict genuine debate," explains Shallit, who is a
computer science professor at the University of Waterloo. "Let's not forget
that the Communications Decency Act was recently found to be
unconstitutional by the U.S. Supreme Court," he says, "in part because it
did not distinguish between 'obscene' speech and speech that was merely
'indecent'."
"I'm sure if the Commission thought it could prove that the Zundelsite fell
within the legal definition of 'hate propaganda', as defined in sections
319 and 320 of the Criminal Code," says Jones, "then this would be a
criminal proceedings."
"Instead," continues Jones, "the worst this Tribunal can decide is that
publishing the web site is a 'discriminatory practice' under the Canadian
Human Rights Act, that 'exposes people to hatred or contempt'." "It's a
broader and more flexible legal concept, and the standard of proof is not
as rigourous because the penalty that can be imposed is less severe."
"But on the other hand," says Jones, "if the Tribunal issues a
cease-and-desist order and the web pages do not go away, Zundel might be
jailed for contempt."
"I question whether it is a distortion of the judicial process, considering
the eventual outcome may be the same, to allow the Commission to attempt to
do through the back door what they could not possibly hope to achieve
through the front door," says Jones.
This is not about technology, not about jurisdiction, not about regulating
the Internet, and not about setting legal precedents," asserted Bernie
Farber of the Canadian Jewish Congress during a recently televised debate
on CBC Newsworld. "This is about punishing Ernst Zundel," he said.
"I'm sure some people would like to skip the hearing and go straight to the
punishment," says Jones, "but the details really do matter in this case.
This hearing is all about whether a government department can re-interpret
an old law to give itself sweeping new regulatory powers over the Internet."
Section 13(1) of the Canadian Human Rights Act was introduced by Parliament
to control hateful messages on telephone answering machines. "It is too
crude an analogy to suggest that a collection of Internet web pages is the
same thing as an answering machine," says Jones. "The whole context and
inter-connectedness of the web and the way people interact with and
navigate through the medium are different in important and significant ways."
"If Canadians want content on the Internet to be controlled by the
government, then what we need is a broad national debate to decide where we
want to draw the line," suggests Shallit. "Dusting off old pieces of
legislation and misapplying them to this new communication medium is not
the way for Canadians to step into the 21st century."
EFC acknowledges that Canadians need effective strategies for dealing with
controversial or hateful speech, but EFC's position is that the proper
remedy for racist speech is not less speech, but more speech.
EFC gives high praise to hard-working community organizations like Ken
McVay's Nizkor Project, which maintains a huge electronic archive of
material devoted to preserving the history of the Holocaust and dedicated
to the memory of all who died at the hands of the Nazis.
"Instead of banishing the hatemongers to the shadows, or making them
martyrs by giving them an expensive show trial," says Shallit, "the Nizkor
Project shines the intense light of public scrutiny on people like Zundel
and exposes their deceptive messages for what they are - warts and all. It
is an approach that really works."
Another notable web site, run by the McGill Hillel student organization to
support the Jewish student community, provides one of the most extensive
lists of hyperlinks to hate web sites ever compiled. There purpose, of
course, is not to promote hatred, but to educate people about its enduring
presence in society.
"Electronic Frontier Canada is pleased to announce donations to both the
Nizkor Project and McGill Hillel Student Centre," said EFC president David
Jones, "to encourage them to continue their efforts in dealing with hateful
content on the Internet. In our view, theirs is the only approach that has
had any significant success."
"At the end of the day," says Jones, "no matter what the Tribunal decides,
the Canadian government cannot possibly hope to control the flow of
information on the Net."
"Sure, they can go ahead and lock Zundel behind bars, if they decide the
law allows it," concedes Jones, "but once the information is on the Net,
it's not going to disappear."
----------------------------------------------------
EFC Contact Information:
Electronic Frontier Canada
Dr. David Jones, djones@efc.ca
phone: (905) 525-9140 ext. 24689, fax: (905) 546-9995
Dr. Jeffrey Shallit, shallit@efc.ca
phone: (519) 888-4804, fax: (519) 885-1208
Dr. Richard Rosenberg, rosen@efc.ca
phone: (604) 822-4142, fax: (604) 822-5485
Electronic Frontier Canada's, online archives:
URL: http://www.efc.ca
------------------------------
Date: Thu, 7 May 1997 22:51:01 CST
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 8--Cu Digest Header Info (unchanged since 7 May, 1997)
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.
CuD is available as a Usenet newsgroup: comp.society.cu-digest
Or, to subscribe, send post with this in the "Subject:: line:
SUBSCRIBE CU-DIGEST
Send the message to: cu-digest-request@weber.ucsd.edu
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.
To UNSUB, send a one-line message: UNSUB CU-DIGEST
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
(NOTE: The address you unsub must correspond to your From: line)
Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.
In ITALY: ZERO! BBS: +39-11-6507540
UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
Web-accessible from: http://www.etext.org/CuD/CuD/
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
URL: http://www.soci.niu.edu/~cudigest/
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.
DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.
------------------------------
End of Computer Underground Digest #9.78
************************************