Copy Link
Add to Bookmark
Report
Computer Undergroud Digest Vol. 09 Issue 66
Computer underground Digest Wed Sep 3, 1997 Volume 9 : Issue 66
ISSN 1004-042X
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
Archivist: Brendan Kehoe
Shadow Master: Stanton McCandlish
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Field Agent Extraordinaire: David Smith
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
CONTENTS, #9.66 (Wed, Sep 3, 1997)
File 1--High Profile Detainee Seeks Legal Help
File 2--Kevin Mitnick Press Release
File 3--Strangelovian pronouncements from the Hudson Institute
File 4--EPIC Opposes EHI / Experian
File 5--On Media Hacks and Hackers (Crypt reprint)
File 6--Digital Highway Robbery (fwd)
File 7--Cu Digest Header Info (unchanged since 7 May, 1997)
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
---------------------------------------------------------------------
Date: Thu, 04 Sep 1997 16:08:09 -0400
From: Evian Sim <evian@escape.com>
Subject: File 1--High Profile Detainee Seeks Legal Help
September 3, 1997
Mr. Kevin Mitnick has been detained in Federal custody without
bail on computer "hacking" allegations for over thirty months.
Having no financial resources, Mr. Mitnick has been appointed
counsel from the Federal Indigent Defense Panel. As such, Mr.
Mitnick's representation is limited; his attorney is not permitted
to assist with civil actions, such as filing a Writ of Habeas
Corpus.
For the past two years, Mr. Mitnick has attempted to assist in his
own defense by conducting legal research in the inmate law library
at the Metropolitan Detention Center (hereinafter "MDC") in Los
Angeles, California. Mr. Mitnick's research includes reviewing
court decisions for similar factual circumstances which have
occurred in his case. MDC prison officials have been consistently
hampering Mr. Mitnick's efforts by denying him reasonable access
to law library materials. Earlier this year, Mr. Mitnick's lawyer
submitted a formal request to Mr. Wayne Siefert, MDC Warden,
seeking permission to allow his client access to the law library
on the days set aside for inmates needing extra law library time.
The Warden refused.
In August 1995, Mr. Mitnick filed an administrative remedy request
with the Bureau of Prisons complaining that MDC policy in
connection with inmate access to law library materials does not
comply with Federal rules and regulations. Specifically, the
Warden established a policy for MDC inmates that detracts from
Bureau of Prison's policy codified in the Code of Federal
Regulations.
Briefly, Federal law requires the Warden to grant additional law
library time to an inmate who has an "imminent court deadline".
The MDC's policy circumvents this law by erroneously interpreting
the phrase "imminent court deadline" to include other factors,
such as, whether an inmate exercises his right to assistance of
counsel, or the type of imminent court deadline.
For example, MDC policy does not consider detention (bail),
motion, status conference, or sentencing hearings as imminent
court deadlines for represented inmates. MDC officials use this
policy as a tool to subject inmates to arbitrary and capricious
treatment. It appears MDC policy in connection with inmate legal
activities is inconsistent with Federal law and thereby affects
the substantial rights of detainees which involve substantial
liberty interests.
In June 1997, Mr. Mitnick finally exhausted administrative
remedies with the Bureau of Prisons. Mr. Mitnick's only avenue of
vindication is to seek judicial review in a Court of Law. Mr.
Mitnick wishes to file a Writ of Habeas Corpus challenging his
conditions of detention, and a motion to compel Federal
authorities to follow their own rules and regulations.
Mr. Mitnick is hoping to find someone with legal experience, such
as an attorney or a law student willing to donate some time to
this cause to insure fair treatment for everyone, and to allow
detainees to effectively assist in their own defense without
"Government" interference. Mr. Mitnick needs help drafting a
Habeas Corpus petition with points and authorities to be submitted
by him pro-se. His objective is to be granted reasonable access
to law library materials to assist in his own defense.
If you would like to help Kevin, please contact him at the
following address:
Mr. Kevin Mitnick
Reg. No. 89950-012
P.O. Box 1500
Los Angeles, CA 90053-1500
------------------------------
Date: Thu, 04 Sep 1997 16:13:29 -0400
From: Evian Sim <evian@escape.com>
Subject: File 2--Kevin Mitnick Press Release
Press Release
August 7, 1997
THE UNITED STATES V. KEVIN DAVID MITNICK
I. Proceedings to Date
With 25 counts of alleged federal computer and wire fraud violations still
pending against him, the criminal prosecution of Kevin Mitnick is
approaching its most crucial hour. The trial is anticipated to begin in
January, 1998. In reaching this point, however, Kevin has already
experienced years of legal battles over alleged violations of the
conditions of his supervised release and for possession of unauthorized
cellular access codes.
A. Settling the "Fugitive" Question
The seemingly unexceptional charges relating to supervised release
violations resulted in months of litigation when the government attempted
to tack on additional allegations for conduct occurring nearly three years
after the scheduled expiration of Kevin's term of supervised release in
December, 1992. The government claimed that Kevin had become a fugitive
prior to the expiration of his term, thereby "tolling" the term and
allowing for the inclusion of additional charges. After months of
increasingly bold assertions concerning Kevin's "fugitive" status,
evidentiary hearings were held in which the government was forced to
concede that its original position in this matter was unsupported by the
facts.
B. Sentencing
In June of this year Kevin was sentenced for certain admitted violations of
his supervised release and for possession of unauthorized access codes.
The court imposed a sentence of 22 months instead of the 32 months sought
by the government. Since Kevin has been in custody since his arrest in
February 1995, this sentence has been satisfied. We are currently
preparing a request for release on bail.
During this stage of the proceedings, the government sought to impose
restrictions on Kevin's access to computers which were so severe as to
virtually prohibit him from functioning altogether in today's society. The
proposed restrictions sought to completely prohibit Kevin from "using or
possessing" all computer hardware equipment, software programs, and
wireless communications equipment. After arguments that such restrictions
unduly burdened Kevin's freedom to associate with the on-line computer
community and were not reasonably necessary to ensure the protection of the
public, the court modified its restrictions by allowing for computer access
with the consent of the Probation Office. Nonetheless, the defense
believes that the severe restrictions imposed upon Mr. Mitnick are
unwarranted in this case and is, therefore, pursuing an appeal to the Ninth
Circuit.
II. The Government Seeks to make an Example of Mr. Mitnick
One of the strongest motivating factors for the government in the
prosecution of Kevin Mitnick is a desire to send a message to other
would-be "hackers". The government has hyped this prosecution by
exaggerating the value of loss in the case, seeking unreasonably stiff
sentences, and by painting a portrait of Kevin which conjures the likeness
of a cyber-boogie man.
There are a number of objectives prompting the government's tactics in this
respect. First, by dramatically exaggerating the amount of loss at issue
in the case (the government arbitrarily claims losses exceed some $80
million) the government can seek a longer sentence and create a
high-profile image for the prosecution. Second, through a long sentence
for Kevin, the government hopes to encourage more guilty pleas in future
cases against other hackers. For example, a prosecutor offering a moderate
sentence in exchange for a guilty plea would be able to use Kevin Mitnick's
sentence as an example of what "could happen" if the accused decides to go
to trial. Third, by striking fear into the hearts of the public over the
dangers of computer hackers, the government hopes to divert scrutiny away
from its own game-plan regarding the control and regulation of the Internet
and other telecommunications systems.
III. Crime of Curiosity
The greatest injustice in the prosecution of Kevin Mitnick is revealed when
one examines the actual harm to society (or lack thereof) which resulted
from Kevin's actions. To the extent that Kevin is a "hacker" he must be
considered a purist. The simple truth is that Kevin never sought monetary
gain from his hacking, though it could have proven extremely profitable.
Nor did he hack with the malicious intent to damage or destroy other
people's property. Rather, Kevin pursued his hacking as a means of
satisfying his intellectual curiosity and applying Yankee ingenuity. These
attributes are more frequently promoted rather than punished by society.
The ongoing case of Kevin Mitnick is gaining increased attention as the
various issues and competing interests are played out in the arena of the
courtroom. Exactly who Kevin Mitnick is and what he represents, however,
is ultimately subject to personal interpretation and to the legacy which
will be left by "The United States v. Kevin David Mitnick".
______________________________
Donald C. Randolph
------------------------------
Date: Wed, 03 Sep 1997 17:48:41 -0700
From: Jonathan Wallace <jw@bway.net>
Subject:Ratings Systems for the Web (SLAC Bulletin fwd, 1 sept)
SLAC Bulletin September 1, 1997
-----------------------------
The SLAC bulletin is a periodic mailer on Internet freedom of
speech issues from the authors of Sex, Laws and Cyberspace (Henry
Holt 1996). For more information, contact Jonathan Wallace,
jw@bway.net, or visit our Web pages at
http://www.spectacle.org/freespch/.
-------------------------------
RATINGS SYSTEMS FOR THE WEB
by Jonathan Wallace jw@bway.net
In our book, we supported self-rating of Web sites as
good citizenship. Not long after the book came out, I
had serious second thoughts about this; one of the
first essays distributed to the SLAC list was entitled
"Why I Will Not Rate My Site"
(http://www.spectacle.org/cda/rate.html).
Now, the issue of ratings systems has come to the fore
again. The Supreme Court threw out the Communications
Decency Act in June, and the same organizations that
defended the CDA--Focus on the Family, Enough is
Enough, The American Family Association--are out there
arguing for ratings systems. President Clinton has
supported this idea with some vague words about "a
V-chip for the Internet." And Senator Murray of
Washington, among others, has introduced legislation
calling for mandatory self-rating and criminal
prosecution for mis-rating of Web sites.
This week in New York, a group of news organizations
got together in New York and agreed that they would not
rate their sites. This was an act of courage, possibly
a major crack in the facade, as some of these
organizations had previously been favorable to ratings.
But how do you rate the news? It portrays violence
every day, as it covers wars and revolutions around the
world. Are photographs of starving children or massacre
victims pornography? Do you want to prevent your
children from reading news on the Web?
Let's distinguish three possible approaches to ratings:
third party ratings systems, self-rating, government
rating. In the third scenario--unlikely--the government
picks everyone's rating. Let's discard that one and
talk about the other two.
In a third party rating system, the American Family
Association puts up its own server, which rates the Net
according to the AFA's values. So do the People for the
American Way (progressive-left organization), the
Christian Coalition, the AFL-CIO, etc. etc. You use
software which checks the server of your chosen
organization to determine the acceptability of a Web
site. All of this is free choice based on a free
market; you are paying for the software; the government
is nowhere in the picture. No-one has placed a rating
on their own site; and anyone who chooses can avoid
ratings systems entirely, choosing not to use any of
the third party servers available.
By contrast, self-ratings force us to a one-size fits
all system. How do I select a rating for my own pages?
When I wrote that I would not rate my own site, I was
concerned about my Auschwitz Alphabet pages
(http://www.spectacle.org/695/ausch.html) which contain
explicit descriptions of human medical experimentation
and upsetting photographs. Do I rate them the same way
as Sexyweb.com? Will we create a rating system which is
so fine-tuned it contains gradations for "Mindless
violence", "news violence," and "Violence with
redeeming social value"? If so, what parent is going to
want to fine-tune browser software with hundreds of
available choices?
This problem exists before the government even gets
involved--but is much exacerbated by the passage of
laws against mistaken self-rating. Suppose I give An
Auschwitz Alphabet the equivalent of a PG rating, and
then a parent in Tennessee complains to the local
prosecutor? Government enforcement of "voluntary"
ratings will certainly engender these kinds of
nightmares.
If I refuse to rate my site at all, most of the
software available under a self-ratings system will
block it along with all other unrated sites. (Earlier
this summer, there was a report, later denied, that the
next release of Microsoft Internet Explorer would come
configured, out of the box, to block unrated sites.
Ironically, Microsoft's MSN is one of the organizations
now refusing ratings.) Thus, I will eventually give up
the majority of my monthly audience of more than 20,000
people.
The problem with ratings is similar to the problems
with computer software in general--you can have systems
that are easy to use, or systems that are powerful, but
not both. An easy to use ratings system would contain
five or six ratings, like the Motion Picture
Association of America scheme. But such a system would
not have the precision necessary to distinguish An
Auschwitz Alphabet from Sexyweb.com.
A system capable of making very fine distinctions
between works of entertainment value appealing only to
prurient instincts and works entertaining for other
reasons, between works of news, historical, cultural,
scientific and artistic value, would have to contain
thousands of gradations. And who is qualified to
judge? The work of rating literary works has been going
on since there have been literary works--we call it
"criticism". If you can't get, say, Edmund Wilson,
Alfred Kazin et al. to agree on the value of a
particular work, who else can you trust to do so? Will
you trust the author himself, and then clap him in jail
if his ego leads him to mis-rate?
About a year and a half ago, a free speech activist in
Canada carried out a successful April Fool's Day joke:
he circulated a file calling for the rating of all
library books with a bar code system. Many people took
the mail seriously and reacted with horror. Not all of
them were equally horrified about rating the Net. But
what is the difference? Why is An Auschwitz Alphabet
sacrosanct if printed on paper, but subject to rating
if posted on the Web?
Last night I watched a discussion on a show called The
Web, a CNet production which runs on the Science
Fiction channel. A representative of Enough is Enough
debated the Webmistress of Sexyweb.com. The moderator
asked smart questions, but the battle over ratings was
lost at the moment the producer picked the guests. The
owners of X-rated services are among the only content
providers who will be happy to self-rate, and who will
pick the most stringent possible ratings, to protect
themselves against obscenity prosecutions if possible.
They will still make their dollar. It is the rest of
us--the amateur providers of serious, sometimes
controversial content on the Web--who have the most to
fear from a government-backed ratings system.
If you want to support third party ratings servers on
the Web, go right ahead. I'll ignore their existence. But I
remain convinced that if we see a "voluntary" self-rating system
backed by government enforcement, my only choice will be to refuse
to rate my pages. And to disappear from the screens of most of my
readers.
------------------------------
Date: Wed, 3 Sep 1997 18:48:55 -0500 (CDT)
From: Crypt Newsletter <crypt@sun.soci.niu.edu>
Subject: File 3--Strangelovian pronouncements from the Hudson Institute
The declarations of think tank national security mandarins always
make for good reading. The Hudson Institute, founded in 1961 by
one of the prototypes for Dr. Strangelove -- Herman Kahn, is chock
full of such individuals. And ex-NSA chief William Odom is its
director of security studies.
And so it is in this rarefied atmosphere that Mary C. FitzGerald,
one of the institute's research fellows, a self-confessed
"computer illiterate," came to write about a subject she called
"Russian Views on Electronic and Information Warfare."
The Russians, she wrote recently, are planning on using computer
viruses delivered over the Net to smite their enemies in time of
war. As proof of the veracity of the plan, FitzGerald cites the
story of a computer virus, written by the U.S. military, that
struck down the Iraqi air defense network in the Gulf War.
The only trouble with this particular story is that it is, indeed,
only that. In fact, it's one of the more persistent myths about
computer viruses.
This legend was the result of an April Fool's hoax run amok.
Appearing in an April 1991 issue of Infoworld magazine, the Gulf
War virus story was a cleverly written joke by reporter John Gantz
who called it "totally a spoof." Gullible editors at US News &
World Report bit hard and paved it over as a hot scoop. The news
magazine subsequently immortalized it in its 1992 book on the
conflict, "Triumph Without Victory." Since then it's also been
passed on in a number of official U.S. Department of Defense
documents.
Unsurprisingly, FitzGerald refused to believe it was an April
Fool's joke. The Russians believed it, she said. Experts from
Lawrence Livermore National Laboratory believed it -- she said.
Officials from Northrop Grumman were coming to interview her --
she said. So FitzGerald insisted she believed it, too.
Information warriors at the USAF's College of Aerospace Doctrine
at Maxwell AFB in Alabama have coined the term "fictive
environment" to describe what happens when bogus tales are spun to
deceive the enemy during Net war. Ironically, FitzGerald is also
an adjunct professor at Maxwell. At Crypt News, we don't call this
"fictive environment." We call it being gored by your own bull.
George Smith, Crypt Newsletter
crypt@sun.soci.niu.edu
Additional material on this topic of interest was/is published in
current issues of the Netly News and Crypt Newsletter.
http://www.soci.niu.edu/~crypt
------------------------------
Date: Fri, 29 Aug 1997 16:24:08 -0400
From: Marc Rotenberg <rotenberg@epic.org>
Subject: File 4--EPIC Opposes EHI / Experian
Press Release
August 29, 1997
EPIC Opposes EHI / Experian
The Electronic Privacy Information Center said today that Experian
has misled consumers and ISPs about a new on-line service that
will likely increase the amount of SPAM that Internet users
receive.
In an August 21, 1997 press release Experian claims that "EHI's
program as been reviewed by the Electronic Privacy Information
Center (EPIC) and the Center for Democracy and Technology (CDT).
Both organizations approve of the program's respect for consumer
privacy."
Contrary to Experian claims, EPIC conducted no formal review of
the program, did not approve of the program's practices, and did
not consent to the use of EPIC's name in Experian's promotional
statements.
At a metting in Washington earlier this year, Experian's Ian Oxman
was told repeatedely that EPIC would not and could not endorse
this program. When word got out that Experian intended to include
EPIC's name in the EHI press release, Mr. Oxman was instructed by
an email to remove EPIC's name.
Marc Rotenberg, director of EPIC, said that "the EHI program fails
to uphold basic fair information practices. There is no
opportunity for users to correct or inspect their data, nor is
there any effort to control secondary use. EHI offers one model
for controlling SPAM, but it is hardly ideal."
"We are particularly concerned that ISP's would get into the
business tracking preferences and sending SPAM to their own
customers. The privacy implications are staggering."
"We are also less than overwhelmed by Experian's recent success
with on-line database management."
"We urge ISPs that are want to maintain user trust and show
support for consumer privacy not to back the EHI effort,"
Rotenberg said.
------------------------------
Date: 27 Aug 97 00:36:12 EDT
From: "George Smith [CRYPTN]" <70743.1711@CompuServe.COM>
Subject: File 5--On Media Hacks and Hackers (Crypt reprint)
Source - CRYPT NEWSLETTER 44
ON MEDIA HACKS AND HACKERS: THE TROUBLE WITH JOURNALISTS IS . . .
THEY JUST WON'T STOP
In as fine a collection of stereotypes as can be found, the
Associated Press furnished a story on July 14 covering the annual
DefCon hacker get together in Las Vegas. It compressed at least one
hoary cliche into each paragraph.
Here is a summary of them.
The lead sentence: "They're self-described nerds . . . "
Then, in the next sentence, "These mostly gawky, mostly male
teen-agers . . . also are the country's smartest and slyest
computer hackers."
After another fifty words, "These are the guys that got beat up in
high school and this is their chance to get back . . . "
Add a sprinkling of the obvious: "This is a subculture of computer
technology . . ."
Stir in a paraphrased hacker slogan: "Hacking comes from an
intellectual desire to figure out how things work . . ."
A whiff of crime and the outlaw weirdo: "Few of these wizards will
identify themselves because they fear criminal prosecution . . . a
25-year-old security analyst who sports a dog collar and nose ring,
is cautious about personal information."
Close with two bromides that reintroduce the stereotype:
"Hackers are not evil people. Hackers are kids."
As a simple satirical exercise, Crypt News rewrote the Associated
Press story as media coverage of a convention of newspaper editors.
It looked like this:
LAS VEGAS -- They're self-described nerds, dressing in starched
white shirts and ties.
These mostly overweight, mostly male thirty, forty and
fiftysomethings are the country's best known political pundits,
gossip columnists and managing editors. On Friday, more than 1,500
of them gathered in a stuffy convention hall to swap news and
network.
"These are the guys who ate goldfish and dog biscuits at frat
parties in college and this is their time to strut," said Drew
Williams, whose company, Hill & Knowlton, wants to enlist the best
editors and writers to do corporate p.r.
"This is a subculture of corporate communicators," said Williams.
Journalism comes from an intellectual desire to be the town crier
and a desire to show off how much you know, convention-goers said.
Circulation numbers and ad revenue count for more than elegant
prose and an expose on the President's peccadillos gains more
esteem from ones' peers than klutzy jeremiads about corporate
welfare and white-collar crime.
One group of paunchy editors and TV pundits were overheard joking
about breaking into the lecture circuit, where one well-placed talk
to a group of influential CEOs or military leaders could earn more
than many Americans make in a year.
Few of these editors would talk on the record for fear of
professional retribution. Even E.J., a normally voluble 45-year-old
Washington, D.C., editorial writer, was reticent.
"Columnists aren't just people who write about the political
scandal of the day," E.J. said cautiously. "I like to think of
columnists as people who take something apart that, perhaps, didn't
need taking apart."
"We are not evil people. We're middle-aged, professional
entertainers in gray flannel suits."
+++++++++
["Underground: Tales of Hacking, Madness and Obsession on the
Electronic Frontier" by Suelette Dreyfus with research by Julian
Assange, Mandarin, 475 pp.]
Excerpts and ordering information for "Underground" can be found
on the Web at http://www.underground-book.com .
George Smith, Ph.D., edits the Crypt Newsletter from Pasadena,
CA.
------------------------------
Date: Thu, 4 Sep 1997 21:17:37 +0100
From: "Richard K. Moore" <rkmoore@iol.ie>
Subject: File 6--Digital Highway Robbery (fwd)
from The Nation Digital Edition
http://www.thenation.com
Digital Highway Robbery
Where is the "competition" the Telecom-
munications Act was supposed to provide?
By Robert W. McChesney
The 1996 Telecommunications Act has just marked its first year of
existence. From Bill Clinton to Newt Gingrich, the bipartisan proponents of
the legislation promised it would unleash a "digital revolution," combining
fantastic technologies with the genius of the unregulated market. At the
very least, competition would improve products and services and lower cable
and telephone charges for consumers. In the long run, the
Telecommunications Act would usher in the Information Age, an era of
unprecedented human freedom and economic prosperity. None of the above
promises have materialized, nor is there any reason to believe they will.
Here's what has happened:
In early February, the Federal Communications Commission began allocating
the digital spectrum to the existing commercial broadcasters. Without any
public debate or competitive arrangement, the largest media companies in
the world are being handed what could become the equivalent of at least
five new channels in every market where they currently own one. This
near-secret process virtually guarantees that Disney/Cap Cities, Time
Warner, General Electric, Westinghouse, Viacom, the Tribune Company and the
News Corporation, among others, can maintain their rule over U.S. media for
another generation or two. It is worth noting that The Washington Post
estimated the value of this digital spectrum to run as high as $70 billion.
The stench of corruption is so thick that The Wall Street Journal even ran
a front-page article on March 17 deploring the giveaway, and Bob Dole
followed suit in a New York Times Op-Ed two weeks later. As Senator John
McCain puts it, broadcasters "are about to pull off one of the great scams
in American history."
Since the Telecommunications Act gave a green light to consolidation by
lifting many media ownership restrictions and advising the F.C.C. to
eliminate the rest as soon as possible, its passage was like firing the gun
to launch the Oklahoma land rush. In telephony, the seven regional Baby
Bells will soon be reduced to five because of the Bell Atlantic-NYNEX and
PacTel-SBC Communications mergers. MCI is joining with British Telecom, and
almost all industry analysts expect even more consolidation in the next few
years. MCI president Gerald Taylor states that the probable outcome will be
"four to six global gangs" dominating the world telecommunications market.
The recent World Trade Organization telecommunications "liberalization"
deal -- pushed for by the United States on behalf of its telecom firms --
almost assures that outcome.
In broadcasting, the major networks are now permitted to own stations
reaching up to 35 percent of the population, and there are loopholes that
effectively make the percentage somewhat higher. Rupert Murdoch's Fox
Broadcasting purchased the New World chain in 1996 and now has twenty-two
stations reaching 40 percent of the population. Westinghouse's CBS, G.E.'s
NBC and Disney's ABC are all shopping to expand their holdings to the legal
limit. In radio, the restrictions were loosened even more, and the past
year has seen a wave of unprecedented consolidation. The two largest radio
chains now control some 180 stations between them; one, Westinghouse,
captures 40 percent of all radio revenues in New York, Chicago,
Philadelphia and Boston. In cable television, as Variety notes, "mergers
and consolidations have transformed the cable-network marketplace into a
walled-off community controlled by a handful of media monoliths."
To communications companies, then, the act has been a big success. The U.S.
commercial media system is currently dominated by a few conglomerates --
Disney, the News Corporation, G.E., cable giant T.C.I., Universal, Sony,
Time Warner and Viacom -- with annual media sales ranging from $7 billion
to $23 billion. These giants are often major players in broadcast TV, cable
TV, film production, music production, book publishing, magazine
publishing, theme parks and retail operations. The system has a second tier
of another fifteen or so companies, like Gannett, Cox Communications, Dow
Jones, The New York Times Co. and Newhouse's Advance Communications, with
annual sales ranging from $1 billion to $5 billion.
That the 1996 Telecommunications Act's most immediate effect was to
sanctify this concentrated corporate control is not surprising; its true
mission never had anything to do with increasing competition or empowering
consumers. Among other things, it was about getting the issue of
fundamental communications policy-making off the Congressional and public
agenda and safely installed in the hands of the F.C.C. and other
administrative agencies, where special interests duke it out for the best
possible deals with minimal or nonexistent public involvement. It was also
about having a statute that rejected the notion that there was a public
interest in communication that the market could not satisfy. The only
debate concerned whether the cable companies, the broadcasters, the Baby
Bells or the long-distance carriers would get the most breaks. A few crumbs
were tossed to "special interest" groups like schools and hospitals, but
only when they didn't interfere with the pro-business thrust of the
legislation.
Why did Congress give the act such overwhelming bipartisan approval? Most
members of Congress are very comfortable handing issues over to big
business, especially when the corporate cause is encased in the approved
jargon of "choice," "competition," "free markets" and the like. Also, the
debate was framed in terms of technocratic issues that few members could
possibly have understood. Finally, one need only look at the strength of
the broadcast, cable, computer and telecommunications lobbies. The National
Association of Broadcasters, for example, is generally regarded as one of
the two or three most dominant lobbies in Washington, if not the absolute
leader. The N.A.B.'s PAC alone -- not to mention member companies and
executives -- has increased its contributions to Congressional races
fivefold over the past decade, to nearly $1 million by 1996. The phone
companies are every bit as lavish.
By any known theory of democracy, such a concentration of control over
media into so few hands, especially hands that have distinct self-interests
that are often at odds with the needs of a democratic political culture, is
a severe problem. Yet the sponsors of the Telecommunications Act said not
to worry. If their beloved "free" market didn't introduce competition and
break up the corporate media monopoly, digital technology and the Internet
would.
Yet it is with the Internet that the Telecommunications Act reaches tragic
proportions. In keeping with the model the corporate giants prefer, the key
decisions on the Net's future will be made by the F.C.C. and other
administrative bodies, and these decisions, unbeknown to the general
public, will probably determine its future course. Guided by the dictum
"Whoever makes the most money sets the course," the Internet has already
turned dramatically away from the noncommercial, nonprofit, independent and
open public sphere that it promised to be just a few years ago. The media,
telecommunications and computer giants are doing everything within their
power to see that the Internet is drawn into their empires. The outcome is
still very much in doubt -- and the Internet will likely remain a
tremendous and even revolutionary asset in many respects -- but there is
little reason to believe that digital technology unaided by social policy
can miraculously overcome the power of the media and communications
conglomerates. As Frank Beacham, one of the Internet's earliest and most
fervent advocates, lamented last year, the market-driven Internet is
shifting "from being a participatory medium that serves the interests of
the public to being a broadcast medium where corporations deliver
consumer-oriented information. Interactivity would be reduced to little
more than sales transactions and e-mail."
The most disastrous consequence of the Telecommunications Act, however, may
well be the F.C.C.'s new policy to convert broadcasting from analog to
digital formats. The telecom law advised the F.C.C. to institute such a
policy and to favor the existing broadcasters (surprise, surprise), though
otherwise it provides little instruction on how best to proceed. With the
switch to digital television, the technical quality will improve, the
number of channels will have the potential to increase by a factor of at
least five and television sets will likely become a primary means for
Americans to access the World Wide Web. This will be a communications
revolution on the level of the introduction of AM radio in the twenties and
VHF television in the forties and fifties. "Everything will be different"
with digital television, F.C.C. chairman Reed Hundt proclaims. "The change
is so extreme that many people have not grasped it."
The White House and Hundt claim that handing out new licenses is no
giveaway, because while they will allow the existing commercial
broadcasters to use chunks of the digital spectrum at no charge (as is the
current practice) the F.C.C. will also require them to do some "public
interest" broadcasting for as much as 5 percent of their airtime. An
inkling of just how rigorous Hundt's new "public interest" standard might
be came last summer when the F.C.C. instituted a new policy whereby
commercial broadcasters are required to do three hours of children's
"educational" programming per week. The only catch is that these shows will
all be advertising-supported, which means that the basic problem is not
eliminated. The Wall Street Journal observes that many advertising agencies
regarded the deal as providing a "marketing bonanza" for Madison Avenue,
which is always on the lookout for new ways to carpet-bomb the "littlest
consumers."
The most "radical" public service proposal by Senator McCain, Hundt and the
Clinton Administration is to require some free airtime for political
candidates, whereas "moderates," like The New York Times, merely ask that
the broadcasters be required to speed the conversion to digital format.
Regardless of the final deal, when the dust clears the commercial
broadcasters will be sitting in the catbird seat. What is being negotiated
now are the terms of the surrender. Indeed, by proceeding with the spectrum
allocation before determining a public interest standard, the F.C.C. is
effectively giving away whatever leverage it might have.
The F.C.C.'s digital TV plan is a ripoff, pure and simple. Instead of six
to ten "free" channels in every market we may have forty to a hundred, but
they will be owned by the same corporations, all mimicking one another to
provide the tried and true commercial fare. Or the media giants may attempt
to use the spectrum for nonbroadcast applications, if that seems more
profitable. We are told by countless P.R. flacks that the commercial
broadcasters will "give the people what they want," but the truth is that
they will, as always, give advertisers and their shareholders what they
want. "We're here to serve advertisers," CBS C.E.O. Michael Jordan recently
stated. "That's our raison d'=EAtre."
In all these areas -- media and communications corporate concentration, the
Internet and digital television -- it is imperative that we have the public
debate that the corporate interests have done so much to prohibit. There
are lots of ideas floating around outside the corridors of power. Why not
lease the spectrum and use the proceeds ($2 billion to $5 billion annually)
to subsidize all forms of noncommercial broadcasting? Why not require
broadcasters to provide advertising-free news and children's programming
every day, and why not have the decisions for this programming made by
kids' TV producers and journalists, insteady of by Rupert Murdoch and other
corporate chieftains? Why not tax advertising and use those funds to
subsidize kids' TV and noncommercial journalism? Why not make sure that
there are dozens of digital TV channels for public access, community groups
and noncommercial utilization? Why not require as a licensing condition
that broadcasters not televise any political advertising? It is not enough
to give free airtime; we need to abolish the entirely bogus,
anti-democratic practice of TV political ads.
What we need then is another Telecommunications Act, but one that reflects
the full intelligence and interests of our population, not the needs of a
handful of super-powerful corporations. There has been a groundswell of
media activism in the past year or two, with the founding of the Cultural
Environment Movement and the Media & Democracy Congress, and the renewed
interest by organized labor in media policy issues. Moreover,
Representative Bernie Sanders and members of the Congressional Progressive
Caucus have earmarked breaking up the media as a key issue for democratic
politics. But we have a long way to go. The lesson for activists of all
stripes is clear: As long as we have the current media system, progressive
social change is going to be vastly more difficult, if not impossible. It
is incumbent upon all democratic activists to incorporate media politics
into their agenda.
------------------------------------------------------------------------
Robert W. McChesney teaches journalism at the University of Wisconsin. He
is the author of Corporate Media and the Threat to Democracy (Seven
Stories) and co-author, with Edward S. Herman, of The Global Media: The New
Missionaries of Corporate Capitalism (Cassell).
------------------------------------------------------------------------
Join a discussion in the Digital Edition Forums.
Or send your letter to the editor to letters@thenation.com.
The Nation Digital Edition http://www.thenation.com
Copyright (c) 1997, The Nation Company, L.P. All rights reserved.
Electronic redistribution for nonprofit purposes is permitted, provided
this notice is attached in its entirety. Unauthorized, for-profit
redistribution is prohibited. For further information regarding reprinting
and syndication, please call The Nation at (212) 242-8400, ext. 226 or send
e-mail to Max Block at mblock@thenation.com.
------------------------------
Date: Thu, 7 May 1997 22:51:01 CST
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 7--Cu Digest Header Info (unchanged since 7 May, 1997)
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.
CuD is available as a Usenet newsgroup: comp.society.cu-digest
Or, to subscribe, send post with this in the "Subject:: line:
SUBSCRIBE CU-DIGEST
Send the message to: cu-digest-request@weber.ucsd.edu
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.
To UNSUB, send a one-line message: UNSUB CU-DIGEST
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
(NOTE: The address you unsub must correspond to your From: line)
Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.
In ITALY: ZERO! BBS: +39-11-6507540
UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
Web-accessible from: http://www.etext.org/CuD/CuD/
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
URL: http://www.soci.niu.edu/~cudigest/
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.
DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.
------------------------------
End of Computer Underground Digest #9.66
************************************