Computer underground Digest Sun Feb 9, 1997 Volume 9 : Issue 08 ISSN 1004-042X Editor: Jim Thomas (cudigest@sun.soci.niu.edu) News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu) Archivist: Brendan Kehoe Shadow Master: Stanton McCandlish Field Agent Extraordinaire: David Smith Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Cu Digest Homepage: http://www.soci.niu.edu/~cudigest CONTENTS, #9.08 (Sun, Feb 9, 1997) File 1--LAWSUIT: Case Filed with "Intent to Annoy" File 2--"Hacking Chinatown" File 3--An Auschwitz Alphabet (In re Milburn/Solid Oak) File 4--CyberLex -(Summary of legal issues) Updated 1/97 (fwd) File 5--Cu Digest Header Info (unchanged since 13 Dec, 1996) CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN THE CONCLUDING FILE AT THE END OF EACH ISSUE. --------------------------------------------------------------------- Date: Thu, 30 Jan 1997 10:25:04 -0700 From: --Todd Lappin-- Subject: File 1--LAWSUIT: Case Filed with "Intent to Annoy" THE CDA DISASTER NETWORK January 30, 1997 Today Mr. Steve Silberman -- one of my distinguished comrades at Wired News -- brings us an interesting scoop about a new lawsuit that has been filed challenging one of the little-known provisions of the Communications Decency Act. The new suit targets a section of the CDA that criminalizes any "indecent" computer communications intended to "annoy" another person. This provision outlaws constitutionally protected communications among other adults, including public officials. Under the CDA, such actions could be prosecuted as a felony, punishable by a fine and up to two years imprisonment. The lawsuit was filed to protect the "annoy.com" Web site at http://annoy.com. Steve's full report follows below. Work the network! --Todd Lappin--> Section Editor WIRED Magazine (From: http://www.wired.com/news/ ) Designed to Annoy, Web Site Flouts CDA by Steve Silberman 11:29 am PST 29 Jan 97 - If "flaming" is the favorite sport of the online world, annoy.com is a high-octane flame-thrower on a mission. Slated for launch Thursday, annoy.com takes aim at the provision in the Communications Decency Act that bans communication "with intent to annoy." By offering an online service that delivers scathing, anonymous postcards to public figures, and dishes up corrosive commentary and graphics hammering every hot-button issue from abortion to Zionism, annoy.com's creator, Clinton Fein, hopes to engage readers in dialogues about freedom and censorship that will continue past the Supreme Court's review of the CDA this spring. "Some might call it subversive," Fein declares. "We call it democracy." On Thursday morning, Fein and his attorneys, Mike Traynor and William Bennett Turner, will file a complaint for declaratory and injunctive relief in the US District Court in San Francisco, naming Fein's ApolloMedia Corporation as the plaintiff, and Attorney General Janet Reno as the defendant. The suit aims to establish that the provisions banning annoying and "indecent" speech in the CDA are "unconstitutional on their face," overbroad, and indefensible. Fein says he's angry that media critiques of the CDA focused on wording in the act that claimed to protect children from vaguely defined "indecency," and ignored provisions throttling communication between adults. "Where was The New York Times," asks Fein. "Covering the O. J. trial?" Traynor insists that his client's intentionally provocative site - abuzz with four-letter words and ire-arousing icons - is "not about throwing mudpies, but having the elbow room to use blunt, robust language, not just language that's PC. ApolloMedia and its lawyers are not deliberately urging people to use nasty language. They're encouraging people to be very forceful in their defense of freedom." Annoy.com is divided into sections with titles like "Heckle," "Censure," and "Weekly Irrit8." The ransom-letter layout and label-maker fonts on annoy.com are like a call to battle stations, but many of the texts - including the polymorphously perturbing "annoy libs," with a menu of targets including Sen. Jesse Helms - are as witty as they are angry. "Media Muck" aims barbs at perceived hypocrisy in all media, from dead-tree to digital, and guest writers will contribute essays to the site on inflammatory topics, starting with novelist Patricia Nell Warren's "Youth - Seen But Not Heard," and a rant by Gary McIntosh titled "Pornography Is Good for You." With a conferencing system on board called "Gibe" - think late-'80s Spy crossed with Electric Minds. Fein's commitment to the Bill of Rights, he says, began in South Africa, where Fein, as he puts it, grew up censored. "The First Amendment was a strong motivation for my coming to America," Fein says. "Imagine how I felt when I realized America was kidding about it." Annoy.com is not Fein's first attempt to resist censorship. Threatened by the Navy for reproducing a Navy recruiting poster in his CD-ROM production of Randy Shilts' "Conduct Unbecoming: Gays and Lesbians in the U.S. Military" - depicting an African American who was later discharged for being gay - Fein included both the poster and the Navy's threatening letter in the final product. The acerbic Fein says one of his goals for annoy.com is "to get people to talk to each other even if they hate each other." For Jonah Seiger of the Center for Democracy and Technology, the addition of the ApolloMedia complaint to the arsenal of legal challenges to the CDA "makes sense because it makes sense to raise every question and pick every nit about this law." Fein vows that even if the Supreme Court does not overturn the injunction made against the CDA by a panel of three federal judges in Philadelphia last June, annoy.com will stay up and running. "The issues that it touches on are not going away," he says. "Whether the CDA is there or not, you've still got Bill Clinton and Congress signing stupid legislation." Copyright 1993-97 Wired Ventures, Inc. and affiliated companies. All rights reserved. ### +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ This transmission was brought to you by.... THE CDA DISASTER NETWORK The CDA Disaster Network is a moderated distribution list providing up-to-the-minute bulletins and background on efforts to overturn the Communications Decency Act. To subscribe, send email to < with "subscribe cda-bulletin" in the message body. To unsubscribe, send email to < with "unsubscribe cda-bulletin" in the message body. ------------------------------ Date: Sat, 8 Feb 1997 09:01:52 -0600 From: Richard Thieme Subject: File 2--"Hacking Chinatown" "Hacking Chinatown" by Richard Thieme "Forget it, Jake. It's Chinatown." Those are the last words of the movie "Chinatown," just before the police lieutenant shouts orders to the crowd to clear the streets so the body of an innocent woman, murdered by the Los Angeles police, can be removed. "Chinatown," with Jack Nicholson as Jake Gittes, is a fine film: it defines an era (the thirties in the United States) and a genre -- film noir -- that is a unique way to frame reality. "Film noir" is a vision of a world corrupt to the core in which nevertheless it is still possible, as author Raymond Chandler said of the heroes of the best detective novels, to be "a man of honor. Down these mean streets a man must go who is not himself mean, who is neither tarnished nor afraid." "Chinatown" also defines life in the virtual world -- that consensual hallucination we have come to call "cyberspace." The virtual world is a simulation of the "real world." The "real world" too is a symbolic construction, a set of nested structures that -- as we peel them away in the course of our lives -- reveals more and more complexity and ambiguity. The real world IS Chinatown, and computer hackers -- properly understood -- know this better than anyone. There are several themes in "Chinatown." (1) People in power are in seamless collusion. They take care of one another. They don't always play fair. And sooner or later, we discover that "we" are "they." A veteran police detective told me this about people in power. "There's one thing they all fear -- politicians, industrialists, corporate executives -- and that's exposure. They simply do not want anyone to look too closely or shine too bright a light on their activities." I grew up in Chicago, Illinois, known for its political machine and cash-on-the-counter way of doing business. I earned money for my education working with the powerful Daley political machine. In exchange for patronage jobs -- supervising playgrounds, hauling garbage -- I worked with a precinct captain and alderman. My job was to do what I was told. I paid attention to how people behaved in the real world. I learned that nothing is simple, that people act instinctively out of self-interest, and that nobody competes in the arena of real life with clean hands. I remember sitting in a restaurant in a seedy neighborhood in Chicago, listening to a conversation in the next booth. Two dubious characters were upset that a mutual friend faced a long prison term. They looked and sounded different than the "respectable" people with whom I had grown up in an affluent part of town. As I grew up, however, I learned how my friends' fathers really made money. Many of their activities were disclosed in the newspaper. They distributed pornography before it was legal, manufactured and sold illegal gambling equipment, distributed vending machines and juke boxes to bars that had to take them or face the consequences. I learned that a real estate tycoon had been a bootlegger during prohibition, and the brother of the man in the penthouse upstairs had died in Miami Beach in a hail of bullets. For me, it was an awakening: I saw that the members of the power structures in the city -- business, government, the religious hierarchy, and the syndicate or mafia -- were indistinguishable, a partnership that of necessity included everyone who wanted to do business. Conscious or unconscious, collusion was the price of the ticket that got you into the stadium; whether players on the field or spectators in the stands, we were all players, one way or another. Chicago is South Africa, South Africa is Chinatown, and Chinatown is the world. There is no moral high ground. We all wear masks, but under that mask is ... Chinatown. (2) You never really know what's going on in Chinatown. The police in Chinatown, according to Jake Gittes, were told to do "as little as possible" because things that happened on the street were the visible consequences of strings pulled behind the scenes. If you looked too often behind the curtain -- as Gittes did -- you were taught a painful lesson. We often don't understand what we're looking at on the Internet. As one hacker recently emailed in response to someone's fears of a virus that did not and could not exist, "No information on the World Wide Web is any good unless you can either verify it yourself or it's backed up by an authority you trust." The same is true in life. Disinformation in the virtual world is an art. After an article I wrote for an English magazine about detective work on the Internet appeared, I received a call from a global PR firm in London. They asked if I wanted to conduct "brand defense" for them on the World Wide Web. What is brand defense? If one of our clients is attacked, they explained, their Internet squad goes into action. "Sleepers" (spies inserted into a community and told to wait until they receive orders) in usenet groups and listserv lists create distractions, invent controversies; web sites (on both sides of the question) go into high gear, using splashy graphics and clever text to distort the conversation. Persons working for the client pretend to be disinterested so they can spread propaganda. It reminded me of the time my Democratic Party precinct captain asked if I wanted to be a precinct captain. Are you retiring? I asked. Of course not! he laughed. You'd be the Republican precinct captain. Then we'd have all our bases covered. The illusions of cyberspace are seductive. Every keystroke leaves a luminous track in the melting snow that can be seen with the equivalent of night vision goggles. Hacking means tracking -- and counter-tracking -- and covering your tracks -- in the virtual world. Hacking means knowing how to follow the flow of electrons to its source and understand on every level of abstraction -- from source code to switches and routers to high level words and images -- what is really happening. Hackers are unwilling to do as little as possible. Hackers are need-to-know machines driven by a passion to connect disparate data into meaningful patterns. Hackers are the online detectives of the virtual world. You don't get to be a hacker overnight. The devil is in the details. Real hackers get good by endless trial and error, failing into success again and again. Thomas Alva Edison, inventor of the electric light, invented a hundred filaments that didn't work before he found one that did. He knew that every failure eliminated a possibility and brought him closer to his goal. Listen to "Rogue Agent" set someone straight on an Internet mailing list: "You want to create hackers? Don't tell them how to do this or that. Show them how to discover it for themselves. Those who have the innate drive will dive in and learn by trial and error. Those who don't, comfortable to stay within the bounds of their safe little lives, fall by the wayside. "There's no knowledge so sweet as that which you've discovered on your own." In Chinatown, an unsavory character tries to stop Jake Gittes from prying by cutting his nose. He reminds Gittes that "curiosity killed the cat." Isn't it ironic that curiosity, the defining characteristic of an intelligent organism exploring its environment, has been prohibited by folk wisdom everywhere? The endless curiosity of hackers is regulated by a higher code that may not even have a name but which defines the human spirit at its best. The Hacker's Code is an affirmation of life itself, life that wants to know, and grow, and extend itself throughout the "space" of the universe. The hackers' refusal to accept conventional wisdom and boundaries is a way to align his energies with the life-giving passion of heretics everywhere. And these days, that's what needed to survive. Robert Galvin, the grand patriarch of Motorola, maker of cell-phones and semi-conductors, says that "every significant decision that changes the direction of a company is a minority decision. Whatever is the intuitive presumption -- where everyone agrees, "Yeah, that's right" -- will almost surely be wrong." Motorola has succeeded by fostering an environment in which creativity thrives. The company has institutionalized an openness to heresy because they know that wisdom is always arriving at the edge of things, on the horizons of our lives, and when it first shows up -- like a comet on the distant edges of the solar system -- it is faint and seen by only a few. But those few know where to look. Allen Hynek, an astronomer connected with the U. S. Air Force investigation of UFOs, was struck by the "strangeness" of UFO reports, the cognitive dissonance that characterizes experiences that don't fit our orthodox belief systems. He pointed out that all the old photographic plates in astronomical observatories had images of Pluto on them, but until Clyde Tombaugh discovered Pluto and said where it was, no one saw it because they didn't know where to look. The best computer consultants live on the creative edge of things. They are path-finders, guides for those whom have always lived at the orthodox center but who find today that the center is constantly shifting, mandating that they learn new behaviors, new skills in order to be effective. In order to live on the edge. The edge is the new center. The center of a web is wherever we are. When I looked out over the audience at DefCon IV, the hackers' convention, I saw an assembly of the most brilliant and most unusual people I had ever seen in one room. It was exhilarating, and I felt as if I had come home. There in that room for a few hours or a few days, we did not have to explain anything. We knew who we were and what drove us in our different ways to want to connect the dots of data into meaningful patterns. We know we build on quicksand, but building is too much fun to give up. We know we leave tracks, but going is so much more energizing than staying home. We know that curiosity can get your nose slit, but then we'll invent new ways to smell. Computer programmers write software applications that are doomed to be as obsolete as wire recordings or programs for an IBM XT. The infrastructures built by our engineers are equally doomed. Whether a virtual world of digital bits or a physical world of concrete and steel, our civilization is a Big Toy that we build and use up at the same time. The fun of the game is to know that it is a game, and winning is identical with our willingness to play. To say that when we engage with one another in cyberspace we are "Hacking Chinatown" is a way to say that asking questions is more important than finding answers. We do not expect to find final answers. But the questions must be asked. We refuse to do as little as possible because we want to KNOW. Asking questions is how human beings create opportunities for dignity and self-transcendence; asking questions is how we are preparing ourselves to leave this island earth and enter into a trans-galactic web of life more diverse and alien than anything we have encountered. Asking questions that uncover the truth is our way of refusing to consent to illusions and delusions, our way of insisting that we can do it better if we stay up later, collaborate with each other in networks with no names, and lose ourselves in the quest for knowledge and self-mastery. This is how proud, lonely men and women, illuminated in the darkness by their glowing monitors, become heroes in their own dramas as they wander the twisting streets of cyberspace and their own lives. Even in Chinatown, Jake. Even in Chinatown. copyright Richard Thieme 1997 ------------------------------ Date: Sat, 08 Feb 1997 09:32:04 -0800 From: Jonathan Wallace Subject: File 3--An Auschwitz Alphabet (In re Milburn/Solid Oak) ((MODERATORS' NOTE: Although we normally attempt to give both sides to every issue such as this, an attempt to contact Mr. Milburn of Solid Oak led to a bizarrre "never contact this site" again response from him, and an accusaton that CuD was harassing and intimidating him and his employees. Although this was, we have since learned, a canned response, it prevents us from further attempts to solicit a view from the "other side." Milburn's response to CuD would seem to confirm the criticisms of him and his company)). =================== Brian Milburn President, Solid Oak Software Dear Mr. Milburn: In December you added my site, The Ethical Spectacle, http://www.spectacle.org, to Cybersitter's list of blocked sites because of my criticism of your company (see http://www.spectacle.org/alert/cs.html). Below is a small sampling of the letters I receive every day from teachers and students about my Holocaust compilation, "An Auschwitz Alphabet", http://www.spectacle.org/695/ausch.html. Please read these over and reflect on the following issues: 1. Why do you think your dislike of criticism is more important than the benefit these students gain from accessing my site? 2. Why do you think you are more qualified than these teachers to determine what our children should see? There is a trend beginning in state legislatures to pass legislation mandating that schools buy blocking software. For as long as you continue blocking The Ethical Spectacle, I will share a copy of this correspondence with any school system or university considering purchasing your product. Here are three of the teachers who have assigned An Auschwitz Alphabet to their classes: "I just discovered your work online and am impressed! I am teaching a second level composition course thematically based on the Holocaust. I am teaching research writing skills in a computer lab with access to e-mail and the Internet and WWW. Have been surfing around looking for source material for myself and also for places to send the students. Some of them learned a little about the Holocaust in high school, but most are not too aware. Some are of German background and want to know what happened. This is a four year university in Michigan and most of the students are traditional freshmen, although I do have a couple of older students too." "I just wanted to let you know that I found your site as I was gathering resources to teach a unit on the Holocaust to my middle school students. They will be reading the book Night by Elie Weisel. That will serve as a launching pad into our study. Your site is going to be a fabulous resource. Most of what I have found so far is not very 'kid friendly'. Your site is going to allow them to explore on their own as they learn more about a topic most of them know nothing about. Thanks for providing such a valuable resource." "I am teaching summer school--US history, 20th Century--and found the Alphabet a powerful tool to convey what must be known about the Holocaust. "Each student was given a letter to read to the class. A few others read excerpts from the recollections of a child I found on another server. When we were finished, I needed to say no more." And here are a few of the students from around the world who have written to me: "I am a tenth grade student in Australia and I would just like to congratulate you on this homepage. This information has been most helpful for an assignment I am doing. So thanks." "I am an Abilene Christian University student in Texas. I am doing a report over the Holocaust. You information is wonderful and greatly appreciated. Keep it up." "Hey, I would like to congratulate you on your wonderful page, I am currently in the middle of a huge holocaust project for school, Im in eigth grade and your page helped me the most, I found it to be thorough, clean and very factual. I like it and will reccomend it to many of my friends!! Thank-you for your wonderful service!!" "I think this is great. I am a 14 year old boy that lives in Indiana. (USA) I really think what you are doing is important. If kids my age aren't told of this tragedy, than it will be forgotten about and the likelier the possibility of it happening again in some shape or form. Thank you." "I am a college student writing a paper on the happenings in Auschwitz. The pages that I read were enlighting as to what really occured. Many people do not believe in the Holocaust but after my presentation some changed their minds. Thank you for condensing many hours of reading." "Your Auschwitz Alphabet is amazing. Funny how you can be researching to write a paper and end up reading an entire collection of information that is actually extremely interesting. All I can say is wow. Truly awesome." "After coming across your page when looking for information for a school research assignment, I was amazed at the information in your 'Auschwitz Alphabet'. It has given me many ideas for my 1000 word essay due next week :-)" "I am a student at Jakarta International School and presently in tenth grade. At this moment I am doing research on the Holocaust. And by searching through the web I learned a lot of information about the Holocaust from you. So I was wondering if I could interview you and ask you some questions about the Holocaust in Auschwitz and asking how people escaped from the Holocaust." This is one of my favorites: [An Italian girl]"I read all the books of Primo Levi, I hope in one best world I'm only 14 but I know a lot of things about the past I'm not a Jew but I will don't forget..." There's no shame in correcting a moral misstep. I suggest you unblock my pages, and those of your other critics such as Bennett Haselton of Peacefire, www.peacefire.org, immediately. Otherwise you will continue to raise serious questions as to your competence to determine what is safe for children to see. Sincerely yours, Jonathan Wallace ------------------------------ Date: Sun, 2 Feb 1997 13:48:13 -0600 (CST) From: David Smith Subject: File 4--CyberLex -(Summary of legal issues) Updated 1/97 (fwd) CyberLex may have been around for a while, but since I just discovered it that makes it a new resource.......... This is a monthly summary of news items about legal developments and high profile events affecting the online community. David Smith * bladex@bga.com * President, EFF-Austin * 512-304-6308 * ---------- Forwarded message ---------- Date--Sat, 1 Feb 1997 12:12:59 -0800 From--Jonathan Rosenoer Subject--CyberLex - Updated 1/97 Dear CyberLaw/CyberLex subscriber: Here is the latest edition of CyberLex! Best regards, Jonathan ||||||||||||||||||||||||||||||| CYBERLEX by Jonathan Rosenoer Notable legal developments reported in December 1996 include the following: # A state court judge ruled that Minnesota may enforce consumer protection laws against out-of-state businesses operating on the World Wide Web. The decision comes in a case on Internet gambling. __Minnesota v. Granite Gate Resorts__, No. C 6-95-007227 (Dist. Ct. Cty of Ramsey, filed July 18, 1995). # Georgia Tech Lorraine, the European platform of the Georgia Institute of Technology, has been sued for failing to comply with a French law requiring that goods and services be offered in French in addition to any other language in which they may be offered. # One third of Internet users provide false demographic data at Internet sites because they are not told how the information will be used and fear it will end up on a marketing list, according to a new study of 14,000 Web users by the Georgia Institute of Technology. # Charles Morrell, 34, a disgruntled former employee of a Connecticut Internet company (Diversified Technologies Group), was arrested and charged with felony computer crime relating to the erasure of all the company's computer files, including backups. # A World Wide Web service company, WebCom in San Francisco, California, suffered a syn-flood/denial-of-service attack that knocked out more than 3,000 Web sites for 40 hours during the holiday shopping season. WebCom halted the attacks after tracing the source of the attacks to MCI Communications Corp., which, in turn, tracked further back to CANet in Canada and a compromised account on BC.Net in Vancouver, British Columbia. As it could not end the attack, MCI blocked all traffic from CANet. # The US Air Force temporarily closed its Web site and the Department of Defense temporarily shuttered 80 other Internet sites after hackers broke into the Air Force's site and replaced files with prank messages and a sexually-explicit video clip. # FBI agents participated in searches in 20 cities as part of a nationwide investigation into the use of computer online services and the Internet to lure children into illicit sex and to distribute child pornography. The 3-year old investigation has already resulted in 80 arrests, 103 indictments and charges, 66 felony convictions, and 207 searches. # The Center for Media Education and the Consumer Federation of America, both non-profit groups, urged the Federal Communications Commission to set guidelines for children's advertising and marketing on the Internet. The groups find that companies collect personally identifiable information from children without disclosing how the information will be used, or who will have access to it -- all without requesting parental consent. # The US Supreme Court agreed to decide whether the Communications Decency Act, which bans the transmission of indecent material to minors, violates the First Amendment. # A television industry group announced a rating system that will rank shows based on appropriateness for age groups, similar to that used for movies. The system, which will determine the shows blocked by the V-chip that will be built into new televisions, is subject to Federal Communications Commission approval. Critics complain the approach is too vague and of little use to parents, particularly regarding shows with violence or sexual themes. # A Brooklyn, NY, jury awarded $5.3 million in favor of a former executive secretary, Patricia Geressy, who claimed she developed carpal tunnel syndrome using keyboards made by Digital Equipment Corp. Two other women, Jill Jackson and Janet Tolo, were awarded $306,000 and $278,000, respectively. No defective keyboard design was found, but Digital was faulted for failing to issue warnings about the dangers of repetitive typing. # Labor Secretary Robert Reich said the government is moving ahead with new regulations to prevent repetitive motion injuries in the workplace. # An Australian Federal Court upheld copyright protection for a popular shareware program, the Trumpet Winsock application. This program allows personal computers to access the Internet. Software developer Trumpet Software International filed suit against OzEmail, the largest Internet service provider in Australia and New Zealand, after learning that 60,000 unauthorized copies had been made. The court also ruled that OzEmail violated the Trade Practices Act by misleading and deceiving people that it had permission to publish the shareware. # The California Supreme Court ruled that prosecutors may not solicit financial assistance from crime victims, as they may create a legally cognizable conflict of interest for the prosecutor." The ruling came in a case involving the alleged theft of trade secret and confidential information from Borland International. The District Attorney accepted more than $13,000 from Borland, after telling the company it needed money for a computer expert and other expenses relating to the case. __People v. Eubanks__, 927 P.2d 310, 59 Cal.Rptr.2d 200, 1996 Cal. LEXIS 6829 (1996). # Cyber Promotions, Inc., a purveyor of unsolicited e-mail, agreed to settle a trademark infringement lawsuit brought by Prodigy Services Corp. The settlement followed the issuance of a permanent injunction ordering Cyber Promotions to stop sending unsolicited e-mail advertisements falsely indicating they came from Prodigy. # A US District Court Judge in San Francisco ruled that the First Amendment was violated by a 1993 State Department export ban relating to a software encryption program (Snuffle) written by Dr. Daniel Bernstein. # The Business Software Alliance, a group that includes IBM, Microsoft, Apple Computer, and nine other companies, criticized the Clinton administration on early versions of regulations implementing an October 1 compromise allowing for the export of robust computer-encryption software. A November 15, 1996, executive order provides that the Justice Department will play a consulting role with the Commerce Department, which is viewed as giving law-enforcement to big a role in the export process. The order also indicates that export licenses for 56-bit key encryption software will be considered largely on a case-by-case basis, instead of being automatically allowed. It is further faulted for not accounting in the export review process for the availability of comparable overseas technology. And the order is also criticized for giving the Government the upper hand in developing a key-recovery system that would allow for the legal breaking of encrypted data once a warrant is obtained, as well as for prescribing a system that might enable Government decryption of messaging during transmission. # America Online says it has resolved concerns of 19 state Attorneys General, agreeing to make better pricing disclosures and extending the date that customers can receive automatic refunds relating to its change to new flat-fee pricing of $19.95 per month. # The World Trade Organization, a trade pact with 128 member nations, endorsed the Information Technology Agreement, which will abolish import duties on computers, software, semiconductors and telecommunications equipment between July 1, 1997, and January 1, 2000. # Final treaties agreed to by 160 nations, negotiating under the auspices of the United Nation's World Intellectual Property Organization, will reflect that temporary copies of copyrighted materials automatically made when a user is browsing the Internet will not be considered a copyright violation. A proposed treaty to extend copyright protection to databases was set aside, as many countries were not ready to address the issue. # Unauthorized service conversion, commonly known as "slamming," is the most frequently lodged consumer grievance about long-distance companies, according to the Federal Communications Commission's "Common Carrier Scorecard." # Microsoft Corp. has renegotiated license agreements with major computer makers, blocking them from using Microsoft's Windows operating system unless Microsoft's screen comes up when a user boots up. Several computer makers have provided a copy of the new agreement to the Justice Department for review. # The Federal Communications Commission unanimously approved technical standards for advanced digital television. # Television broadcasters, including CBS, Fox, and others, filed suit in federal court in Miami against a satellite programming company, PrimeTime 24 (a unit of Great Universal American Industries Inc.), alleging that illegally provides network shows to certain satellite dish owners. Federal law allows satellite carriers to sell network programming to consumers who cannot obtain decent reception of network programs. The broadcasters complain that PrimeTime 24 crowds out network affiliates and discourages advertisers from buying time on local stations. Sources for CyberLex include the Wall Street Journal, New York Times, Marin Independent Journal, The (San Franciso) Recorder, USA Today, and Le Monde. CyberLex (tm) is published solely as an educational service. The author is a California attorney. He may be contacted at cyberlaw@cyberlaw.com. Questions and comments may be posted at the CyberLaw Internet site (www.cyberlaw.com), hosted by Best Internet Communications, Inc. (www.best.com). ISDN Internet connectivity is provided by InterNex (www.internex.com). Legal research assistance is provided by Lexis-Nexis. CyberLex is a trademark of Jonathan Rosenoer. Copyright (c) 1997 Jonathan Rosenoer; All Rights Reserved. ||||||||||||||||||||||||||||||||||||| CyberLaw.com Jonathan Rosenoer, Esq. | Kentfield, California, USA cyberlaw@cyberlaw.com | www.cyberlaw.com Ph. 415-461-3108 | Fax 415-461-4013 ||||||||||||||||||||||||||||||||||||| ------------------------------ ------------------------------ Date: Thu, 15 Dec 1996 22:51:01 CST From: CuD Moderators Subject: File 5--Cu Digest Header Info (unchanged since 13 Dec, 1996) Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically. CuD is available as a Usenet newsgroup: comp.society.cu-digest Or, to subscribe, send post with this in the "Subject:: line: SUBSCRIBE CU-DIGEST Send the message to: cu-digest-request@weber.ucsd.edu DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS. The editors may be contacted by voice (815-753-0303), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115, USA. To UNSUB, send a one-line message: UNSUB CU-DIGEST Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU (NOTE: The address you unsub must correspond to your From: line) Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" On Delphi in the General Discussion database of the Internet SIG; on RIPCO BBS (312) 528-5020 (and via Ripco on internet); and on Rune Stone BBS (IIRGWHQ) (860)-585-9638. CuD is also available via Fidonet File Request from 1:11/70; unlisted nodes and points welcome. EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown) In ITALY: ZERO! BBS: +39-11-6507540 In LUXEMBOURG: ComNet BBS: +352-466893 UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/ aql.gatech.edu (128.61.10.53) in /pub/eff/cud/ world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/ wuarchive.wustl.edu in /doc/EFF/Publications/CuD/ EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland) ftp.warwick.ac.uk in pub/cud/ (United Kingdom) The most recent issues of CuD can be obtained from the Cu Digest WWW site at: URL: http://www.soci.niu.edu/~cudigest/ COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ------------------------------ End of Computer Underground Digest #9.08 ************************************