Copy Link
Add to Bookmark
Report
Computer Undergroud Digest Vol. 09 Issue 62
Computer underground Digest Sun Aug 17, 1997 Volume 9 : Issue 62
ISSN 1004-042X
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
Archivist: Brendan Kehoe
Shadow Master: Stanton McCandlish
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Field Agent Extraordinaire: David Smith
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
CONTENTS, #9.62 (Sun, Aug 17, 1997)
File 1--Jacking in from the "Slam the Spam" Port (CyberWire Disp)
File 2--Islands in the Clickstream: Sex, Religion and Cyberspace
File 3--CIVIL LIB GROUPS ASK FCC TO BLOCK FBI ELEC SURVEIL. PROPOSAL
File 4--HOPE On A Rope, report from NYC hacker convention, from Netly
File 5--The extent of spam
File 6--ACLU Cyber-Liberties Update, August 7, 1997
File 7--Cu Digest Header Info (unchanged since 7 May, 1997)
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
---------------------------------------------------------------------
Date: Sat, 9 Aug 1997 15:33:30 -0500
From: jthomas@SUN.SOCI.NIU.EDU(Jim Thomas)
Subject: File 1-- Jacking in from the "Slam the Spam" Port (CyberWire Disp)
CyberWire Dispatch // Copyright (c) 1997 // August 6 //
Jacking in from the "Slam the Spam" Port:
By Lewis Z. Koch
Special correspondent
CyberWire Dispatch
CHICAGO--Fuck you!!!
Do I have your attention? I know I have your attention.
Granted, "Fuck you" is an unpleasant way of getting your attention,
especially in reasonably polite society. And if this kind of in-your-face,
attention-getting device were to occur several times a day, well, it might
not be surprising then if the greeting were judged as akin to "fighting
words," words that the Supreme Court has long defined as excluded from First
Amendment protection.
Fighting words have been conceptualized by the Court as words "likely to
provoke the average person to retaliation, and thereby cause a breach of the
peace," yet every day, people are receiving a "Fuck You" invasion of their
computers, their peace breached by unwanted, undesired, distasteful E-mail a
form known universally as "spam."
Today spammers say "Fuck you" via your computer five or ten times a day.
Next month, or next year, it may be fifty times a day.
This is just a sample of a sample dredged from a single day of my E-mail:
"Forgive me for taking a moment of your time. But here is the IDEAL
Christmas gift...ten traditional Christmas carols recorded in REAL, HARD
ROCK versions." (Note: this is August and I am Jewish.)
Or this (regardless of ethnicity) "*Sexy *Erotic *Lewd and Desirable
LIVE NUDE DANCES -24 hours a day." (Lewd AND Desirable?)
Yet, for the most part, recipients are unable to retaliate in force or in
kind, in such a way as the Court might well approve. The "self-help" remedy
of reaching out to the spammers machines and turning off the outbound flow
at the source falls afoul of most states', and countries' computer crime
laws.
Joe and Jane Citizen-User find themselves hapless, captive targets of this
daily assault because spammers use their cunning to invade your personal
computer yet all the while hiding their identity. Where can we go for
redress?
Wait! What's that I hear? From out of the West-it's the thundering
hoofbeats of the great horse Silver! There, over there on the horizon, a
masked man, sitting a top on a white stallion, crying out, "Hi Ho Silver!
Awwaaayyyy"
Who is that masked man?
It's the Lone Ranger, only this time he's called "Hacker X."
The Lone Ranger, aka Hacker X, posted today, for the second time in six
months, the password file for SpamMeister Sanford Wallace's Cyberpromo
server to various Usenet newsgroups including alt.2600, alt.news and
news.misc.
Hacker X previously posted the names, addresses and yes, phone numbers of
Wallace's clients. Needless to say, Wallace was outraged. He posted a
reward and called the FBI.
Nothing much happened except that Wallace's clients received many, many
irate phone calls.
Wallace, and spammeisters are as irrepressible as they are greedy. Our "in"
boxes continue to be filled with trash, like the drunk who hurls his empty
whiskey bottle against our front porch steps, already littered with the
shards of empty whiskey bottles tossed away by passing drunks/spammiesters.
Hacker X also deserves some plaudits from the gay community as his renegade
Usenet posting includes the evidence that Wallace offers support for serious
hate mongering in housing the "godhatesfags.com" domain and lists the
password and attendant IP information for that as well.
Along with this treasure drove of mined data, Hacker X also published a
note/rant of his own:
"As I assumed, Mr. Wallace has not learned his lesson from the last time I
talked to you, so I decided to go a bit father this time, post up more
information, from more systems, and a little bit of news on what that low-
life degenerate, festering pile of goo is doing in front of his keyboard,
behind your backs, right under your noses...
"Sanford Wallace uses the same password on every machine, and the same root
password as his regular password. Guess he has no admin. What a class
operation Not exactly rocket science. His userid is wallace, with a
Password of "sTUv6x8r." Guessed the root password yet? Go knock yourself
out."
The Wallace Factor
================
After the first assault by Hacker X, Wallace reportedly offered a $15,000.00
reward - reportedly, that is, if you want to take his Spamship's word for it
that he would pay anyone $15,000.00 for anything. Wallace also said he
alerted the FBI to the hack. Now, the likelihood of an FBI task force doing
some kind of federal step-and-fetch-it routine to help Wallace seems to be
about zero, especially considering that there are some people in the Justice
Department who don't much particularly believe in spammers' rights to spam
and have the power to say "no" to the FBI. Besides, the FBI had better be
chasing and locking down every subway-bombing terrorist before they start
devoting energy to satisfying demands by wealthy, irate spammers.
"Contrary to Wallace's claim, he didn't catch me," says Hacker X, "My thanks
go out to all of you who offered up your support in advance (defense fund
and so on). It was greatly appreciated. If you want to show your support,
send the funds to the NAACP college fund - they could put it to better use."
To the hackers who trashed Wallace's Web site, Hacker X had this sage
advice, "Those of you who decided to make changes to Mr. Wallace's web page
- please, PLEASE clean up after yourselves. If you can't clean up, you
probably should just leave it, as you will be caught."
Hacker X also offered a warning note to "the folks at Netcom. Mr. Wallace
has a script that fingers @netcom.com every 10 minutes, and sifts for new
users to add to a list. Netcom is a complete waste of bandwidth and I can't
stand them and their users for the most part, but some of them are actually
cool, and deserve SOME sort of notification of what that sleezebag is doing
to them."
Spam is increasing not decreasing. Spammer self-regulation? In this
instance, it's more like self-abuse. They're not only going to do it until
they need glasses, they're likely to do it even if they were to go blind.
I am a First Amendment purist and believe that those rights even extend to
advertising. But the First Amendment also gives me the right to be left
alone. I choose to get E-mail and I receive over 250 a day from
organizations and lists I have chosen to ask for E-mail. My choice.
Spammers, on the other hand, are forcing their way into my computer, into my
mind. Spam E-mail is a physical invasion, a physical intrusion. It is their
"Fuck you" to me. No choice. No choice but to fight back, or at least
support those who are fighting for me. One group, CAUCE is fighting by
being uncompromising in their lobbying for a flat out ban on unsolicited
commercial mail.
Spamford Wallace is an Internet outlaw who has violated the basic open
tenets upon which the Net was built. If the citizens of Netville and the Net
marshals can't stop the outlaw spammers - then it's time call for the Lone
Ranger.
Hi ho Silver, Aaaaaaawaaaay (with spam).
---------------------
Lewis Z. Koch <lzkoch@wwa.com> is an investigative reporter and former NBC
correspondent.
[Note:. If you want one just one killer-complete story about unsolicited
bulk e-mail, check out Barry D. Bowen's 6,200 word, three sidebars plus
extensive resources piece at the Sun-World site.
http://www.sun.com/sunworldonline/swol-08-1997/swol-08-junkemail.html]
------------------------------
Date: Sat, 09 Aug 1997 14:47:20
From: Richard Thieme <rthieme@thiemeworks.com>
Subject: File 2--Islands in the Clickstream: Sex, Religion and Cyberspace
There aren't many safe bets in the world, but here's one:
things are often the opposite of what they seem.
Religion and sex, for example.
Carl Jung noted that when people talk about religion, they
are often talking about sexuality, and when people talk about
sexuality they are often talking about religious and spiritual
realities.
Religious experience involves a contextual shift in how we
understand everything and our relationship to it. We let go of
the psychic center around which we have organized ourselves and
our boundaries dissolve. We lose ourselves and find ourselves.
Our personality undergoes a hierarchical restructuring, and we
feel ourselves literally being "made new" as we organize around a
new center.
The experience has nothing to do with the way people
subsequently interpret the experience. That is the work of a
religious community which teaches an initiate to fuse its
construction of reality with an experience that in itself is
beyond words. That's the work of organized religion.
The vision of universal connectedness that often attends
religious experience is simply the truth about the world. Mystics
are just ordinary people who see that.
Sexuality too is about losing ourselves in the deepest
intimacy, our boundaries dissolving as we become present to
another so profoundly that we are transformed by the experience.
Sexual love in its depths is as redemptive as any sacrifice, as
fulfilling as any self-surrender.
Over time we bring to the persons we truly love an attitude
that is almost religious. The person to whom we come closer and
closer becomes at the same time more and more an unknowable
mystery. We discover a kind of piety and gratitude infusing our
relationship, what some traditions call grace.
Carl Jung's one-time mentor, Sigmund Freud, said that
neurosis is the price we pay for civilization. Neurosis is a kind
of mental artifact, a structure we build and live in as if it is
reality itself. The towers and pinnacles of our cultures are
built on the bedrock of our need to simulate the world.
That means we live in our heads instead of our real
experience. Our religious experience devolves into religious
symbols. We relate to the symbols as if they are the things they
stand for.
We do the same thing with sexuality and love. We exchange
words or symbols of our intimacy -- in speech, in writing, and in
pixels -- as if we are experiencing the intimacy that touched us
in the depths of our being.
It IS hard to know when we're talking about sexuality and
when we're talking about religious experience, isn't it? In both
domains, we struggle to find a language to say what it means to
lose ourselves and find ourselves. The metaphorical language of
paradox is the only way. Those metaphors are powerful, often
archetypal images, and we project the depths of our souls onto
them so quickly and unconsciously that we don't even know we're
doing it.
Sexuality is rampant in cyberspace. I don't mean the
millions of explicit images but the quest of a civilization to
connect with itself, to lose itself in a self-transcendent
experience, to "get it together" in a new way.
It is no accident that so many cybergames take the form of a
Quest, an archetypal journey in search of a Holy Grail.
It is also no accident that cyberspace sizzles with sex.
VCRs first became popular after "x-rated films" were tolerated in
mainstream movie theaters and middle Americans wanted to take
them home. Then the home-video industry was built. Now x-rated
videos account for about 25% of all rentals, and sex related
sites are the envy of entrepreneurs who want to make money in
cyberspace.
Where your heart is, your cash travels rapidly. Cash is the
dye in the arteries of our souls.
And where there's sex and money, there's religion. Not
religious experience but religion.
The virtual nights are alive with the echoing boots of the
rigidly righteous, the thought police on patrol down these mean
streets.
The CyberPolice are upset about sex. Naturally. It doesn't
take a psychiatrist to know that people condemn the things they
crave to do. Hypocrisy -- especially in the religious
establishment -- has always been the first enemy of real
spirituality.
The intertwined tendrils of sexuality and religion tell us
what the CyberPolice fear most. They seldom get upset about
hatred, cruelty, and chilling indifference. Bodies can pile up by
the thousands in the Balkans with nary a peep from the pulpit,
but let women begin to control their own bodies -- through
contraception, abortion, or divorce -- and they're damned and
denounced daily.
Better to face ourselves than rage at our heart's desire in
another.
The end result of real spirituality is the growth of the
whole human being, the integration of our fragmented selves and
the connection of our integrated self with others and with the
universe. The spiritual journey always involves confronting the
truth of ourselves and welcoming it into our heads and hearts.
Luke Skywalker tore off Darth Vadar's helmet and stared at
his own face. In nightmares, we run from fragments of ourselves,
only to be liberated when we turn and embrace them.
Cyberspace is a symbolic representation of the human soul.
Everything that shows up in cyberspace is an image of ourselves.
And for what else, after all, do we hunger and thirst but
connection with one another and with ultimate meaning and with
others throughout the universe? The search for extraterrestrial
life is nothing but consciousness in one form or manifestation
striving to connect with consciousness in another. The goal of
consciousness is to become aware of itself in all of the forms
through which it constructs representations of reality.
Between we human beings and our own souls there are
ultimately no barriers but the ones we erect to protect ourselves
from the terror of self-knowledge and self-transcendence. Between
we human beings and those we love, there are ultimately no
barriers but the ones we erect to protect ourselves from the
dizzying freefall of intimacy and self-surrender.
Those are powerful realities emerging in cyberspace.
Of course the hoofbeats of the CyberPolice come thundering
at once, driven by their fear of freedom, their horror at their
own humanity. But the triumph of the human heart is to seek
itself and to find itself and from that quest and adventure no
one can keep us.
for Shirley, on her birthday
**********************************************************************
Islands in the Clickstream is a weekly column written by
Richard Thieme exploring social and cultural dimensions
of computer technology. Comments are welcome.
Feel free to pass along columns for personal use, retaining this
signature file. If interested in (1) publishing columns
online or in print, (2) giving a free subscription as a gift, or
(3) distributing Islands to employees or over a network,
email for details.
To subscribe to Islands in the Clickstream, send email to
rthieme@thiemeworks.com with the words "subscribe islands" in the
body of the message. To unsubscribe, email with "unsubscribe
islands" in the body of the message.
Richard Thieme is a professional speaker, consultant, and writer
focused on the impact of computer technology on individuals and
organizations.
Islands in the Clickstream (c) Richard Thieme, 1997. All rights reserved.
ThiemeWorks P. O. Box 17737 Milwaukee WI 53217-0737 414.351.2321
------------------------------
Date: Mon, 11 Aug 1997 16:54:26 -0400
From: Jonah Seiger <cdt-editor@CDT.ORG>
Subject: File 3-- CIVIL LIB GROUPS ASK FCC TO BLOCK FBI ELEC SURVEIL. PROPOSAL
The Center for Democracy and Technology /____/ Volume 3, Number 12
----------------------------------------------------------------
CDT POLICY POST Volume 3, Number 12 August 11, 1997
(1) CIVIL LIBERTIES GROUPS ASK FCC TO BLOCK FBI ELECTRONIC SURVEILLANCE
PROPOSAL
The Center for Democracy and Technology and the Electronic Frontier
Foundation today filed a petition with the Federal Communications
Commission to block the FBI from using the 1994 "Digital Telephony" law to
expand government surveillance powers.
The law, officially known as the "Communications Assistance for Law
Enforcement Act" (CALEA), was intended to preserve law enforcement
wiretapping ability in the face of changes in communications technologies.
In their filing, CDT and EFF argue that the FBI has tried to use CALEA to
expand its surveillance capabilities by forcing telephone companies to
install intrusive and expensive surveillance features that threaten privacy
and violate the scope of the law.
The CDT/EFF petition follows a July 16 petition by the Cellular
Telecommunications Industry Association (CTIA), which asked the FCC to
intervene in the implementation of CALEA. Under a provision of CALEA
designed to ensure public accountability over law enforcement surveillance
ability, CDT and EFF urged the Commission to accept the CTIA request and
expand its inquiry to cover privacy issues.
CALEA specifically prevents law enforcement from dictating the design of
telecommunications networks. Instead, CALEA created a public process for
developing technical standards through industry standards bodies. However,
since CALEA was enacted, the FBI has sought to force industry to agree to
standards that would dramatically expand law enforcement surveillance
power.
The full text of the CDT/EFF petition, links to the CTIA petition, as well
as background on the debate over CALEA implementation, are available online
at http://www.cdt.org/digi_tele/
________________________________________________________________________
(2) SUMMARY OF CDT/EFF FCC PETITION
CDT and EFF allege that the FBI is using CALEA to expand its surveillance
ability well beyond what the law allows and in ways that pose serious risks
to privacy:
* ACCESS TO CONTENTS OF DIGITAL MESSAGES WITHOUT SEARCH WARRANT:
In packet switching systems (currently used on the Internet, but
likely to be the future of voice switching as well), the FBI wants
delivery of the entire packet data stream in response to a pen
register order, which is issued on the most minimal of justifications,
relying on law enforcement to "minimize" the content to get at the
addressing information. This would effectively obliterate the
distinction between call contents and 'signaling' information, and
would amount to a substantial expansion of law enforcement
surveillance authority, and falls well beyond the intent of CALEA.
CDT and EFF urge the Commission to delete this provision from the
proposed standards. This is one of the most far reaching aspects of
CALEA implementation.
* REAL-TIME LOCATION TRACKING INFORMATION ON WIRELESS PHONE USERS: CDT
and EFF asked the FCC to block FBI and industry proposals for
location information in wireless networks. The proposed standard
would effectively turn the cellular network into a nationwide, real
time location tracking system. CDT and EFF argue that the proposal
goes too far and violates CALEA.
* MONITORING OF ALL PARTICIPANTS IN A CONFERENCE CALL, EVEN AFTER THE
TARGET IS NO LONGER PARTICIPATING: The FBI wants to expand the
standard to include this feature. Such monitoring, CDT and EFF
argue, would violate the limits of the Constitution's Fourth
Amendment.
* ACCESS TO A BROADER RANGE OF INFORMATION UNDER SO-CALLED PEN REGISTERS
AND TRAP AND TRACE DEVICES: Law enforcement can obtain approval for
these devices, which are supposed to collect only dialed number
information, under a very low legal standard, much lower than the
showing required to intercept the content of communications. The FBI
is urging the industry to put more detailed "profiling" information on
the signaling channel, on the assumption that it would be accessible
under the lower legal standard. CDT and EFF urge the Commission to
address privacy concerns about access to transactional data.
Specifically, CDT and EFF ask the Commission to require the telephone
companies to ensure that law enforcement only gets the information it
is authorized to receive.
CDT and EFF believe that the FCC must intervene to ensure that privacy is
protected as CALEA is implemented.
The full text of the filing is available online at
http://www.cdt.org/digi_tele/
________________________________________________________________________
(3) CALEA BACKGROUND AND THE INDUSTRY STANDARDS SETTING PROCESS
The digital telephony law, officially known as the Communications
Assistance for Law Enforcement Act (CALEA), was adopted in 1994 and
requires telephone companies to ensure that their systems can accommodate
law enforcement wiretaps. The law also includes a privacy provision,
requiring law enforcement and industry to implement the surveillance
requirements in a manner that "protect[s] the privacy and security of
communications ... not authorized to be intercepted."
CALEA defers in the first instance to industry standards-setting bodies to
develop technical standards for implementing the law's general surveillance
assistance requirements. Industry bodies have developed a draft standard,
to which the FBI vociferously objected on the grounds that it did not give
law enforcement enough surveillance powers. The FBI's objections have
prevented the adoption of a consensus standard.
The CDT/EFF filing relies on Section 107(b) of CALEA, which provides:
"If industry associations or standards-setting organizations
fail to issue technical requirements or standards or if a
Government agency or any other person believes that such
requirements or standards are deficient, the agency or person
may petition the Commission to establish, by rule, technical
requirements or standards that ... (2) protect the privacy
and security of communications not authorized to be
intercepted ... "
The Commission has yet to decide whether it will address CALEA issues. The
Commission may solicit further comments on the CTIA, CDT, and EFF
pleadings, issue a Notice of Inquiry, or issue a Notice of Proposed
Rulemaking. CALEA is scheduled to take full effect on October 25, 1998
with our without a standard being adopted.
_____________________________________________________________________________
(4) SUBSCRIPTION INFORMATION
Be sure you are up to date on the latest public policy issues affecting
civil liberties online and how they will affect you! Subscribe to the CDT
Policy Post news distribution list. CDT Policy Posts, the regular news
publication of the Center For Democracy and Technology, are received by
more than 13,000 Internet users, industry leaders, policy makers and
activists, and have become the leading source for information about
critical free speech and privacy issues affecting the Internet and other
interactive communications media.
--------
To subscribe to CDT's Policy Post list, send mail to
policy-posts-request@cdt.org
with a subject:
subscribe policy-posts
------------------------------
Date: Mon, 11 Aug 1997 11:00:08 -0400
From: Declan McCullagh <declan@well.com>
Subject: File 4--HOPE On A Rope, report from NYC hacker convention, from Netly
Source - fight-censorship@vorlon.mit.edu
*********
http://pathfinder.com/netly/opinion/0,1042,1282,00.html
The Netly News (http://netlynews.com/)
August 11, 1997
HOPE On A Rope
by Noah Robischon (noah@pathfinder.com)
Nothing makes hackers happier than breaking into
a computer that another hacker set up, especially when
an appreciative audience is watching. Small surprise,
then, that there were plenty of grins at last
weekend's Beyond HOPE hacker convention in New York
City.
The first break-in attempt came at about 4 a.m.
on Friday when a huge, tattoo-encrusted Englishman
named Cyberjunkie ran a utility that probed the
network of HOPE's Dutch sister conference, Hacking In
Progress. The plan: to expose any weaknesses, then
peel away the security measures of the target computer
like the layers of an onion. The program quickly found
several obvious security holes. "So I had to do
something," Cyberjunkie says. "It's a bit like waving
a red flag at a bull, isn't it?" Like the encierro at
Pamplona, Cyberjunkie sent a stampede of null
information into one of the server's memory buffers
until it choked and overloaded. Quietly attached at
the end was a simple script that granted him the
access he wanted. (In hacker argot, this is known as
an IMAP exploit.)
[...]
------------------------------
Date: Sun, 10 Aug 1997 12:04:16 +0100
From: Anthony Moore <anthony.moore@usa.net>
Subject: File 5--The extent of spam
With regards to the recent article about the Samsung hoax, I would
like to voice my opinions...
This mail is the latest in a long line of spam mails to hit my mailbox.
I get on average 10 mails per day, of which only 1 or 2 are not spam.
Why is it, that companies feel they have a god given right to fill our
mailboxes with crap? It is illegal in many places to "spam" fax
machines so why should they be allowed to "spam" the internet with
unwanted advertisements.
I have been compiling a list of all those who have spammed my box
within the last 4 months and I have no less than 200 names on it. I am
sure many others are in the situation. I am lucky in that I can
killfile on my postserver, but many others are unable to do this either
because they don't understand the concept of killfiles, or because their
mail packages don't allow killfiling.
Unfortunately killfiling doesn't always work. I have set it up to send
a rather abusive message to all those who I have indicated I don't want
to receive mail from. As soon as they realise that their mails are
bouncing back, they change there email addresses and you still get it.
This is more of a problem in the UK than the US and Canada due to the
cost of phone calls (Which is not exactly helped by those idiots who
insist on sending word documents and the like attached to emails).
What the internet needs is an opt-in system rather than an opt-out
system. The sooner it comes into force, the sooner we get clutter free
mail boxes.
------------------------------
Date: Thu, 7 Aug 1997 22:14:13 GMT
From: "ACLU Cyber-Liberties Update Owner"@newmedium.com
Subject: File 6--ACLU Cyber-Liberties Update, August 7, 1997
ACLU Cyber-Liberties Update Special
Thursday, August 7, 1997
* ACLU's Issues Open Letter on Internet Ratings
* Is Cyberspace Burning?
Internet Ratings May Torch Free Speech on the Net, ACLU Warns
* White Paper Executive Summary: Fahrenheit 451.2 -- Is Cyberspace Burning?
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Dear Fellow Member of the Internet Community:
I am writing to express the American Civil Liberties Union's (ACLU) very
deep concern about the tenor and the outcome of the recent White House
"Summit" on Internet content rating and filtering. We fear that the
stunning and sweeping victory for free speech on the Internet won in the
Supreme Court case Reno v. ACLU is being put at risk by a headlong and
uncritical rush to embrace content rating and blocking systems,
that may banish provocative and controversial speech to the farthest corners
of cyberspace.
Attached is the ACLU White Paper, Fahrenheit 451.2: Is Cyberspace Burning?
-- How Rating and Blocking Proposals May Torch Free Speech on the Internet.
The White Paper examines the free speech implications of the various
proposals for Internet blocking and rating. Individually, each of the
proposals poses some threat to open and robust speech on the Internet --
some pose a considerably greater threat than others.
But linked together, the various schemes for rating and blocking could
create a regime of private "voluntary" censorship that is every bit as
threatening to what the Supreme Court called "the most participatory form of
mass speech yet developed."
This time the threat may not come from the blazing inferno that would have
been set off if the CDA had gone into effect, but from the dense smoke
created by "voluntary" blocking technology, that hides all but the most
innocuous speech from plain view.
We fear that the widespread adoption of the rating and blocking schemes
will move us inexorably towards an Internet that is bland and homogenized.
The major commercial sites will still be readily available -- they will
have the resources and inclination to self-rate and third-party rating
services will be inclined to give them acceptable ratings. Quirky and
idiosyncratic speech, individual home pages, or postings to controversial
newsgroups will be blocked by the filters and made invisible by the search
engines.
As the lead plaintiff and attorneys in Reno v. ACLU, we call for an open
and genuine debate and discussion among the Net community, industry, policy
makers and family groups about the details and free speech
implications of the systems that now exist and that are being proposed.
Civil libertarians, human rights organizations, librarians, and Internet
users, speakers and providers all joined together to defeat the CDA. We
achieved a victory which established a legal framework for the Internet that
gives it the highest constitutional protection.
All that we achieved can now be squandered, if those same groups
participate in a redesign of the very architecture of the Internet that
builds in tools for content blocking that are readily available to waiting
private and governmental censors.
The movement to embrace the new blocking schemes has built with remarkable
speed, but it is not too late for the Internet community to slowly and
carefully examine these proposals and to reject those that will transform
the Internet from a true marketplace of ideas, into just another
mainstream, lifeless medium.
We urge you to read the paper and join us in the debate.
Sincerely,
Barry Steinhardt
Associate Director
[Fahrenheit 451.2 may be found at:
http://www.aclu.org/issues/cyber/burning.html]
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Is Cyberspace Burning?
Internet Ratings May Torch Free Speech on the Net, ACLU Warns
FOR IMMEDIATE RELEASE
Thursday, August 7, 1997
NEW YORK -- In a 15-page white paper released today, the American Civil
Liberties Union warned that government-coerced, industry efforts to rate
content on the Internet could torch free speech online.
After reviewing plans that came out of a White House summit on Internet
censorship, the ACLU said that it was genuinely alarmed at industry leaders'
unabashed enthusiasm in pledging to create a variety of schemes to regulate
and block controversial online speech.
It was not any one proposal or announcement that gave cause for alarm, the
ACLU said, but rather the failure to examine the longer-term implications
for the Internet of rating and blocking schemes.
"In the physical world, people censor the printed word by burning books,"
said Barry Steinhardt, Associate Director of the ACLU and one of the
paper's authors. "But in the virtual world, you can just as easily censor
controversial speech by banishing it to the farthest corners of cyberspace
with blocking and rating schemes."
The recent rush to regulate comes in the wake of a sweeping Supreme Court
victory in Reno v. ACLU, confirming that the Internet is analogous to
books, not broadcast, and is deserving of the highest First Amendment
protection. The ACLU was a lead plaintiff and litigator in the suit.
"Today, all that we have achieved may now be lost, if not in the bright
flames of censorship then in the dense smoke of the many ratings and
blocking schemes promoted by some of the very people who fought for
freedom," the ACLU warns.
The white paper, entitled Fahrenheit 451.2: Is Cyberspace Burning? details
the free speech threats of the various ratings plans being proposed. The
ACLU offers a set of five recommendations and principles, and discusses
self-rating, third-party ratings, and the use of filtering software in
homes and libraries.
Perhaps the greatest danger to free speech online is the notion of
self-rating, the ACLU said, a concept "no less offensive to the First
Amendment than a proposal that publishers of books and magazines rate each
and every article or story, or a proposal that everyone engaged in a street
corner conversation rate his or her comments." Applying the rating
requirement to the active and vibrant conversational areas of the Internet
-- chat rooms, news groups and mailing lists -- would be analogous to
requiring all of us to rate our telephone, dinner party or water cooler
conversations, the ACLU said.
Third-party ratings systems pose free speech problems as well. With
few third-party rating products currently available, the potential
for arbitrary censorship increases.
In addition, the ACLU said that the use of filtering programs in
public libraries, which are governmental entities, would violate the
First Amendment. These programs often block access to valuable speech,
including safer sex information, gay and lesbian web sites, and even
speech that is critical of the filtering software itself.
During the summit, according to the white paper, Vice President Gore,
along with industry and non-profit groups, announced the creation of a
web site that provides direct links to a variety of blocking programs.
Calling for the producers of all of these products to put real power
in users' hands, the ACLU urged them to provide full disclosure of
their lists of blocked speech and the criteria for blocking.
The white paper was distributed today along with an open letter from
Steinhardt to members of the Internet community. "It is not too late for
the Internet community to slowly and carefully examine these proposals and
to reject those that will transform the Internet from a true marketplace
of ideas into just another mainstream, lifeless medium," Steinhardt said
in the letter.
The ACLU also sent the paper to President Clinton and Vice President Gore,
and to industry leaders and policy makers involved in the White House
summit. In a separate letter to industry leaders, Steinhardt requested a
meeting to discuss the proposed plans for rating and blocking.
The principal authors of Is Cyberspace Burning? are Ann Beeson, Chris
Hansen and Barry Steinhardt. Hansen and Beeson are ACLU national staff
attorneys who were members of the Reno v. ACLU litigation team.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Fahrenheit 451.2: Is Cyberspace Burning?
How Rating and Blocking Proposals May Torch
Free Speech on the Internet
Executive Summary
In the landmark case Reno v. ACLU, the Supreme Court overturned the
Communications Decency Act, declaring that the Internet deserves the same
high level of free speech protection afforded to books and other printed
matter.
But today, all that we have achieved may now be lost, if not in the bright
flames of censorship then in the dense smoke of the many ratings and
blocking schemes promoted by some of the very people who fought
for freedom.
The ACLU and others in the cyber-liberties community were genuinely alarmed
by the tenor of a recent White House summit meeting on Internet censorship
at which industry leaders pledged to create a variety of
schemes to regulate and block controversial online speech.
But it was not any one proposal or announcement that caused our alarm;
rather, it was the failure to examine the longer-term implications for
the Internet of rating and blocking schemes.
The White House meeting was clearly the first step away from the
principle that protection of the electronic word is analogous to protection
of the printed word. Despite the Supreme Court's strong rejection of a
broadcast analogy for the Internet, government and industry leaders alike
are now inching toward the dangerous and incorrect position that the
Internet is like television, and should be rated and censored
accordingly.
Is Cyberspace burning? Not yet, perhaps. But where there's smoke,
there's fire.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
ACLU Cyber-Liberties Update Editor:
Lisa Kamm (kamml@aclu.org)
American Civil Liberties Union National Office
125 Broad Street
New York, New York 10004
------------------------------
Date: Thu, 7 May 1997 22:51:01 CST
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 7--Cu Digest Header Info (unchanged since 7 May, 1997)
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.
CuD is available as a Usenet newsgroup: comp.society.cu-digest
Or, to subscribe, send post with this in the "Subject:: line:
SUBSCRIBE CU-DIGEST
Send the message to: cu-digest-request@weber.ucsd.edu
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.
To UNSUB, send a one-line message: UNSUB CU-DIGEST
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
(NOTE: The address you unsub must correspond to your From: line)
Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.
In ITALY: ZERO! BBS: +39-11-6507540
UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
Web-accessible from: http://www.etext.org/CuD/CuD/
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
URL: http://www.soci.niu.edu/~cudigest/
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.
DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.
------------------------------
End of Computer Underground Digest #9.62
************************************