Computer underground Digest Sun Apr 9, 1995 Volume 7 : Issue 28 ISSN 1004-042X Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) Archivist: Brendan Kehoe Semi-retiring Shadow Archivist: Stanton McCandlish Intelligent Agent: David Smith Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Monster Editor: Loch Nesshrdlu CONTENTS, #7.28 (Sun, Apr 9, 1995) File 1--CuD FidoNet Distribution Site in Belgium File 2--GovAccess.114v2:: The Persecution of Phil Zimmermann, American File 3--In Response to Censorship at University of Memphis (#7.26) File 4--Cu Digest Header Info (unchanged since 19 Mar, 1995) CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN THE CONCLUDING FILE AT THE END OF EACH ISSUE. --------------------------------------------------------------------- Date: 06 Apr 95 17:48:26 +0100 From: Jerome De Greef <Jerome.De.Greef@f759.n291.z2.fidonet.org> Subject: File 1--CuD FidoNet Distribution Site in Belgium I'm the sysop of Stratomic BBS (Brussels, Belgium) and I'm connected to FidoNet (2:291/759). I receive CuD (great thing ;-) ) through UUCP since Nr 7.15 and it's available via File Request (magic word 'CUD') on my system (unlisted nodes and points welcome). I have even created a file echo to distribute it to the nodes and points that poll on my system. Would it be possible to get the dist site status and to add my system in the CU Digest Header Info ? I think my system is the only one in Europe who distribute CuD via File Request so I think it would be a great thing to inform the european CuD readers that it is possible to get it from Stratomic BBS (via FREQ or via a connection to the file echo). I know there's another Dist Site in Belgium (Virtual Access BBS) but they are not on FidoNet (so no FREQ) and their CuD collection is not very up-to-date (I send them some old Nr). Well, I hope I'll get an answer and... thanks for the work ! Peace... Jerome email: jerome.de.greef@f759.n291.z2.fidonet.org 2:291/759@fidonet.org ------------------------------ Date: Mon, 3 Apr 1995 20:22:53 -0700 From: Jim Warren <jwarren@WELL.SF.CA.US> Subject: File 2--GovAccess.114v2:: The Persecution of Phil Zimmermann, American This is a copy of my now-available MicroTimes report of a visit from federal investigators, three days after I publicly critized the FBI and NSA about a related matter, in an op-ed in the San Francisco Examiner. Following the report, there are implications as to how similarly-outraged citizens might take effective action to halt the gross miscarriage of justice herein detailed. And there are supplementary thoughts following my visit with a federal prosecutor who, like the guards at the concentration camps, is just doing his job. When I finished it, I could no longer see the keyboard. I was crying - with frustration and rage and shame that MY nation and MY government could be doing this. --jim &&&&&&&&&&&&&&&&&&&& [Written on March 2nd, this is appearing in the April, 1995, editions of MicroTimes, with total circulation exceeding 230,000 in California.] Is Phil Zimmermann being persecuted? Why? By whom? Who's next? by Jim Warren (c) 1995 345 Swett Road, Woodside CA 94062; email/jwarren@well.com Permission herewith granted to redistribute-in-full for any nonprofit use. I write this today, March 2nd, because I envision the possibility of somehow being enjoined from speaking or writing about this, by a federal grand jury in San Jose, next Tuesday. Subpoena follows op-ed On Wednesday, February 22nd, an op-ed piece that I wrote appeared in the San Jose Mercury News, captioned, "Encryption could stop computer crackers." In the wake of massive Internet break-ins, I urged adopting nationwide, standardized, by-default, end-to-end data-communications and file encryption using the most-secure scrambling technologies that are publicly known and published worldwide. I criticized the FBI and NSA (National Security Agency) for zealously - and successfully - opposing all such protection, thus seriously endangering innocent citizens and law-abiding businesses. On February 26th, a similar op-ed of mine appeared in the Sunday edition of the combined San Francisco Examiner and San Francisco Chronicle, emphasizing the unnecessary danger and billions of dollars of losses resulting from the government's preoccupation with protecting and greatly-enhancing its evesdropping capabilities. Three days later, two U.S. Customs Special Agents appeared at my home, unannounced, and soon handed me a federal grand jury subpoena. I am, "commanded to appear and testify before the Grand Jury of the United States District Court," on March 7th. The subpoena was dated February 27th - the first workday after the Sunday Examiner's op-ed piece. Whoever said government is inefficient? Interview recording prohibited The agents - two pleasant, businesslike young women - said they were here about Phil Zimmermann and his encryption software known as PGP, "Pretty Good Privacy." I laughed and said, "Oh - okay, come on in," and led them up to my office, grabbing a tape-recorder along the way. I sat down and - prominently turning on the recorder - said, without being confrontational, that I'd like to record the interview. Woppps! - flag on the play. They said they would want to take a copy of the tape with them when they left. That was fine with me, so I turned off my recorder and went for a second recorder from my car. Drat! - I wish I'd left the recorder running, because when I returned, they had decided they needed approval from Assistant U.S. Attorney Bill Keane, the AUSA in charge of investigating Zimmermann and PGP. They called Keane. He was out. They left a message, then said that - in the absence of his approval - they would have to forego the interview, and made motions to leave. I was curious about what they wanted, and it occurred to me that I probably couldn't record my testimony before the grand jury, anyway. So after some discussion, we agreed not to record. In the process, they offered to allow me to copy their interview notes - which I thought was a rather-neat show of good faith. However, before we began, the senior agent looked at me with a moment of clear hesitancy and suspicion, and asked several times that I verify that our conversation was not being recorded. I did, pointing out that it would be a criminal misdemeanor - in California - if I recorded them in this private place without their knowledge. Part-way through the interview, Keane returned his agent's call. I asked if he say why we couldn't record the interview, with both of us having a tape. He said only that he didn't wish to have it done. Apparently we citizens aren't the only ones who are paranoid. Realworld Big Brother The interview was relaxed, candid and cordial. The agents said they were just seeking the facts of what actually happened - to wit: On April 10, 1991, shortly after the Gulf War, a message from WHMurray@DOCKMASTER.NCSC.MIL cascaded across the computer nets, warning about one sentence in buried in a massive "anti-terrorism" bill authored by Senators Biden and DeConcini. Their Senate Bill 266 declared, "It is the sense of Congress that providers of electronic communications services and manufacturers of electronic communications service equipment shall ensure that communications systems permit the government to obtain the plain text contents of voice, data, and other communications when appropriately authorized by law." Bill Murray, then a computer-security consultant to the NSA, wrote: "The referenced language requires that manufacturers build trap-doors into all cryptographic equipment and that providers of confidential channels reserve to themselves, their agents, and assigns the ability to read all traffic. "Are there readers of this list that believe that it is possible for manufacturers of crypto gear to include such a mechanism and also to reserve its use to those "appropriately authorized by law" to employ it? "Are there readers of this list who believe that providers of electronic communications services can reserve to themselves the ability to read all the traffic and still keep the traffic "confidential" in any meaningful sense? "Is there anybody out there who would buy crypto gear or confidential services from vendors who were subject to such a law? "David Kahn asserts that the sovereign always attempts to reserve the use of cryptography to himself. Nonetheless, if this language were to be enacted into law, it would represent a major departure. An earlier Senate went to great pains to assure itself that there were no trapdoors in the DES [federally-adopted Data Encryption Standard]. Mr. Biden and Mr. DeConcini want to mandate them. "The historical justification of such reservation has been "national security;" just when that justification begins to wane, Mr. Biden wants to use "law enforcement." Both justifications rest upon appeals to fear. "In the United States the people, not the Congress, are sovereign; it should not be illegal for the people to have access to communications that the government cannot read. We should be free from unreasonable search and seizure; we should be free from self-incrimination. "The government already has powerful tools of investigation at its disposal; it has demonstrated precious little restraint in their use. "Any assertion that all use of any such trap-doors would be only "when appropriately authorized by law" is absurd on its face. It is not humanly possible to construct a mechanism that could meet that requirement; any such mechanism would be subject to abuse. "I suggest that you begin to stock up on crypto gear while you can still get it." The net went ballistic over this Orwellian mandate. PGP - Pretty Good Privacy Prior to this, Phil Zimmermann, a sometime cryptographer and small computer consultant near the University of Colorado in Boulder, had been developing a PC implementation of public-key encryption, as described in the open literature, published worldwide more than a decade earlier. He had idle thoughts of possibly making it available as shareware, perhaps for educational purposes for fellow crypto hobbyists. He called it, "PGP" - Pretty Good Privacy. But public-key crypto using any reasonably-robust key-sizes is reputed to be uncrackable. And intentionally building a back-door into a beautiful crypto implementation is about like welding a tractor tire on the back of a classic '63 Corvette - obscene! Kelly Goen, located in the San Francisco Bay area, was also interested in crypto. He and Zimmermann became acquainted - as is common among technoids with similar interests. In that context, Zimmermann apparently gave Goen a copy of PGP - also common behavior among us propeller-heads. S. 266 goads guerrilla crypto When Murray's message flashed across the nets, thousands of us were infuriated - and frightened. In the wake of the Gulf War, S. 266 seemed likely to become law, permanently prohibiting Americans from having the privacy protection that technology could easily provide. S. 266 would also prohibit PGP - at least in any respectable form. So - with more than a little of the spirit of freedom that is the heritage of all Americans - and the help citizens "stock up on crypto gear while you still can," it was decided to make this privacy protection tool available to everyone, immediately. Goen would upload copies - fully annotated sources, binaries and documentation - to as many BBSs (bulletin board systems) and host-computers around the United States as possible. Zimmermann agreed - especially since S. 266 would soon outlaw PGP. A night-time call Goen sent email to MicroTimes on May 24th, saying, "the intent here is to invalidate the socalled trap-door provision of the new senate bill coming down the pike before it has a possibility of making it into law." He said we could publish details about it, "provided of course mum is the word until the code is actually flooded to the networks at large." He also called me - as a MicroTimes columnist, and probably because I had organized the recently-completed First Conference on Computers, Freedom & Privacy, or maybe because of my comments on the net critical of the S. 266 mandate. I had several conversations with Goen, and later with Zimmermann - who seemed more passive about the project. Now, four years after the fact, this is re-constructed from random notes I took at the time, plus my recollections - some of which remain quite vivid. D-Day, defending freedom On a weekend around the first of June, Goen began uploading complete PGP to systems around the U.S. He called several times, telling me his progress. He was driving around the Bay Area with a laptop, acoustic coupler and a cellular phone. He would stop at a pay-phone; upload a number of copies for a few minutes, then disconnect and rush off to another phone miles away. He said he wanted to get as many copies scattered as widely as possible around the nation before the government could get an injunction and stop him. I thought he was being rather paranoid. In light of the following, perhaps he was just being realistic. Government counter-attacks About two years after the PGP uploads, the government began threatening to prosecute Zimmermann for illegal trafficking in munitions - cryptography. [He was first visited by U.S. Customs agents on Feb. 17, 1993.] For more than two years, they have been investigating whether he "exported" PGP. It appears at press-time that they will probably prosecute him. The allegation seems to be that, since he permitted someone else - over whom he had no control anyway - to upload PGP to some Internet hosts inside the United States, Zimmermann thus exported this controlled munition! This ignores the fact that most of those same Internet hosts also have DES crypto software from AT&T, Sun, SCO and BSD, part of their standard domestic Unix systems. The DES is under the same export prohibition as PGP. The same is true for RSA's public-key crypto tools that reside on thousands of Internet hosts around the nation. This bizarre lunacy also ignores that public-key was published, worldwide, fifteen years ago, and is available from numerous foreign software competitors including entrepreneurs in former Easter Bloc countries - as is the DES. Based on what they told me at the time and everything I've learned since then: Zimmermann never even uploaded PGP files for public access. Goen studiously limited his uploads to U.S. systems, as permitted by law and routinely done with identically-regulated AT&T and RSA software. They certainly didn't care about exporting PGP. Hell, most of the rest of the world already purchases public-key products from numerous vendors except U.S. companies. They did want to pre-empt S. 266 before it became law - just as millions of people do all the time regarding all sorts of pending legislation. And the offending mandate was later deleted from S. 266, anyway. Zimmermann and Goen wanted to protect this nation's citizens. S. 266 wasn't threatening other nation's citizens; it was threatening Americans! Why the persecution? Some apologists say the government is just trying to clarify the law. Bull! If that's what they want, they should investigate and prosecute AT&T or Sun or SCO or RSA. Each makes millions peddling systems to U.S. Internet host-owners that include identically-controlled crypto modules, particularly including RSA public-key packages that are at-least as powerful as PGP. But thugs don't pick on targets that can defend themselves. Goons go for the frail and weak and helpless - like Phil Zimmermann. Maybe this is a rogue prosecutor trying to make a name for himself. But apparently Keane can't seek a grand jury indictment for this "crime" without clearance from the Department of Justice in Washington. Maybe it's just our government wasting thousands of staff hours and millions of dollars to publicly flog Zimmermann as a lesson to any other pissant citizen who dares to do what AT&T, Sun and RSA can do with impunity. This appears to be nothing less than an arrogant, oppressive government using all of its might and all of its power to flail and torture one poor citizen, to teach him that he is dirt and intimidate everyone else. Is this what our nation has become? Is this the America we want? Coincidental subpoena? As a footnote, I must say that my initial assumption was that the agents' arrival two days after my op-ed piece appeared was simply coincidental - that they were just-now getting around to tying-up loose ends of this wasteful multi-year investigation. They said they were responding to a letter I had sent to the grand jury a year or two earlier, when I first heard they were investigating Zimmermann. As I write this, and try to maintain some slight semblance of reason, about half the time I think the timing was accidental - and half the time I think I'm being naive. A frightening experience But I gotta tell ya, I awakened hours before dawn this morning, wondering if somehow I was going to be the next victim of this governmental obscenity. The government's stated policy is to attack opponents with overpowering force. They are certainly doing that to Zimmermann. I feel threatened and intimidated - and furious and outraged that it should be happening in MY nation, prosecuted by MY government. I cry for what Phil Zimmermann must be going through. He had little financial resources to begin with; this has already cost him, dearly. For almost two years, he has been under the horrifying threat of wasting all of his assets including his home, just to defend himself against the outrageous abuse of a federal government that will go to any expense to "win." And if Zimmermann looses, he goes to prison for years of mandatory incarceration. When he comes out, his young daughter will be a teen-ager. All because he dared to write a cryptographic program that the government couldn't crack, that someone else made available to U.S. citizens. If there is any justice remaining in this nation, this screams out for immediate redress! Folks who care can send much-needed donations to the Zimmermann legal defense fund in care of his attorney, Phil DuBois, 2305 Broadway, Boulder CO 80304; 303-444-3885; dubois@csn.org . --- Warren has received the Hugh M. Hefner First Amendment Award (1994), the James Madison Freedom-of-Information Award from the Society of Professional Journalists - Northern California (1994) and the Electronic Frontier Foundation Pioneer Award in its first year (1992). He led the successful 1993 effort to make state legislation and statutes available via the public nets without state charge and organized and chaired the landmark First Conference on Computers, Freedom & Privacy (1991). He founded InfoWorld, was founding host of PBS' "Computer Chronicles," founding editor of Dr. Dobb's Journal, and has chaired various computer and mathematics organizations. He holds graduate degrees in computing (Stanford), medical information science (UC Medical Center) and mathematics & statistics, began working as a programmer in 1968, and was a mathematics teacher and professor for ten years before that. He also serves on Autodesk's Board of Directors. &&&&&&&&&&&&&&&&&&&& Give Us Your Poor, Your Weak ... for Harassment & Intimidation Copies of other cryptographic software that fall under exactly the same export controls and prohibitions as PGP - sold by Hewlett-Packard, AT&T, Sun, SGI, SCO, BSD, etc. - as part of their standard domestic Unix systems are available on hundreds of thousands of host-computers connected to the global Internet in the United States. ViaCrypt in Phoenix AZ sells copies of PGP. MIT provides several versions of PGP - including full source-code - for free downloading from one of their Internet host computers. US News and World Reports' Vic Sussman tells me a copy is on Compu$erve. The prosecutor knows this; I have discussed it with him. But there is no attempt to indict AT&T, Sun, H-P, SGI, SCO, BSD, etc. There is no attempt to prosecute MIT or CompuServe for continuing to make what Phil created freely available via the Internet and CPN. After all, Compu$erve has a warning in capital letters saying that CI$ customers outside of the U.S. should not download it. ViaCrypt is not being investigated for selling PGP throughout the nation - not even to computer stores located near the Iranian or North Korean Consulates. MIT restricts access: A PGP recipient must first type "yes" to four questions, and may have to connect to MIT through one of the more-than-two-million Internet host-computers in the U.S., by telnet if they are outside the nation. But PGP's creator - who is not known to have uploaded *any* copies for public access - and his aquaintance, are the only ones being investigated. Most of the remainder of this edition of GovAccess details what I know - and opine (!!) - of why Washington is spending hundreds of thousands of tax-dollars and thousands of limited staff hours of experienced investigators and talented legal professionals on this lunatic persecution. &&&&&&&&&&&&&&&&&&&& A Grand Jury is Usually the Lapdog of the Prosecutor - BUT ... There are at least three members of this grand jury who have Internet accounts, according to cryptographer Charlie Merritt who was testifying before them and asked them. And the grand jury has been assembled in the heart of Silicon Valley. The best address that I can think of for the federal grand jury - composed of concerned citizens - from which Keane is seeking this indictment, is: Fore-person and Members Federal Grand Jury in the Zimmermann/Goen case 280 S. First St. San Jose CA 95113 I'm told that there are about 25 members, and I doubt that they have a copier in the grand jury room. I don't know whether Keane would be violating postal regulations if he opened and withheld from those addressees, first-class mail addressed in this manner. I have no evidence to believe that he would withhold it. &&&&&&&&&&&&&&&&&&&& Washington is Often Not Involved in a Local Prosecution - BUT ... My assumption is that Keane is being directed to persecute <sic> this investigation by his superiors in Washington - that it wouldn't be happening if Washington didn't want it. When I said that to him, he told me only that his superiors in Washington are kept informed of his actions and the progress on the case - as one would certainly hope. In fact, I'm told that he cannot seek an indictment in this kind of case without approval from Washington. He's a good lieutenant. Personally, I think he's doing what he's told. Keane's most-senior superior in the Department of Justice is: Unived States Attorney General Janet Reno Department of Justice, Room 5111 10th St & Constitution Ave NW Washington DC 20530 fax/202-514-4371 My belief is that USAG Reno *does* have the authority to stop this idiocy. Keane's ultimate superior is: President Bill Clinton 1600 Pennsylvania Ave Washington DC 20500 fax/202-456-2461 president@whitehouse.gov His official, public response would undoubtedly be that he should not get involved in an ongoing criminal investigation. But BYTE columnist and sci fi writer Jerry Pournelle has pointed out that that's absolute nonsense. 1. Our elected officials damn-well *better* be in charge of their bureaucrats. And if this President isn't, he needs to be replaced. 2. The President certainly has the power to pardon and halt criminal investigations before-the-fact, as Gerald Ford illustrated with Nixon. Much of Pournelle's June column in BYTE will focus on this case. Pournelle is urging that the President simply pardon Zimmermann for any possible wrong-doing, and let him get back to his family and on with his life. [announced here with Jerry's explicit prior permission] So what do *you* think? Don't tell me - tell the folks, above, who *can* make a difference. --jim &&&&&&&&&&&&&&&&&&&& Later Thoughts - After Meeting with Asst US Attorney Keane on Friday, 3/10 On Monday, 3/6, before I was to appear for the grand jury on the following day, I finally reached Keane. He agreed that I did not need to come down for the grand jury (now why do I think he wouldn't want me speaking to his lap-dog? :-), and we agreed instead, that I would come in for an interview with him and his agents at the end of the week. As soon as we began, he volunteered that he didn't anticipate that I had any exposure and didn't consider me a target of their investigation. I appreciated that. He also said he would tell me if that changed. Oh. We met for about four hours (folks rarely accuse me of brevity). I was completely candid, and told them all of the above and lots more - including most of the opinions ... with which he was very patient. <grin> I found Keane reasonable, attentive, even-handed and probably a very good prosecutor (and we *need* good prosecutors). However, my impression was that he had rather-limited understanding of the nets - e.g., he'd never even heard of Fidonet, and seemed convinced that the primary way that PGP was distributed was by USENET from the WELL! (He said that's why they are pursuing the investigation in California rather than back in Colorado.) I continued to be favorably impressed by the Customs investigators, and I honestly don't think Keane is one of the bad guys - though I suspect that he may be too focused on on the nitty-gritty of seeking evidence for prosecution, and too-little focused on seeking principled, equitable *Justice*. The fact is, I honestly feel a bit sorry for him - because I think he's a good prosecutor, and I believe Washington is telling him to pursue this case, which is probably turning into a public relations debacle as its capricious injustice becomes more and more clear ... and it's Bill Keane's name and reputation that is going to be trashed. The real responsibility lies with the anonymous Washington gang, who never have to face their victims, who are blindly intent on intimidating all of us by making an example of Zimmermann - just like street-thugs always pick the frail and weak to terrorize, so as to intimidate a community into submission. The only difference is that this time, the community can't turn to the law-enforcement officials for help. I told Keane that, okay, WE GOT THE MESSAGE. God!, I'm ashamed of my government's myopic, self-serving leadership. &&&&&&&&&&&&&&&&&&&& Trial attorneys - prosecutors and defense - too-often seem more interested in "winning" the trial "game" than they are interested in Truth or Justice. Too-often, they excuse such immorality by saying that the costly, abusive, terrifying adversarial system will assure Truth and Justice. Attorneys are the gun-slingers of the 20th Century - but only their clients get shot. ------------------------------ From: kadie@SAL.CS.UIUC.EDU(Carl M Kadie) Subject: File 3--In Response to Censorship at University of Memphis (#7.26) Date: 3 Apr 1995 16:59:11 GMT >>Apparently the motivation behind David Hooper's case was a thing called >>"Title IX", which requires the school to provide an environment free of >>sexual or racial hostility. This alt.comp.acad-freedom.talk FAQ file seem relevant: =========== ftp://ftp.eff.org/pub/CAF/faq/censorship-and-harassment ========= q: Must/should universities ban material that some find offensive (from Netnews facilities, email, libraries, and student publications, etc) in order to comply with antiharassment laws? a: No. U.S. federal courts have said that harassing speech is different from offensive speech. While face-to-face harassment can be prohibited, mere offensive speech is protected by the principles of academic freedom and, at state universities, by the Constitution. The courts have also said that that it is unconstitutional at state universities to base campus speech restrictions on EEOC rules. Here is part of a decision: ==============Excerpt uwm-post-v-u-of-wisconsin ========== (3) PARALLEL TO TITLE VII LAW The Board of Regents argues that this Court should find the UW Rule constitutional because its prohibition of discriminatory speech which creates a hostile environment has parallels in the employment setting. The Board notes that, under Title VII, an employer has a duty to take appropriate corrective action when it learns of pervasive illegal harassment. See Meritor Savings Bank v. Vinson, 477 U.S. 57, 72 (1986). The Board correctly states Title VII law. However, its argument regarding Title VII law has at least three difficulties. First, Title VII addresses employment, not educational, settings. Second, even if Title VII governed educational settings, the Meritor holding would not apply to this case. The Meritor Court held that courts should look to agency principles when determining whether an employer is to be held liable for its employee's actions. See id. Since employees may act as their employer's agents, agency law may hold an employer liable for its employees actions. In contrast, agency theory would generally not hold a school liable for its students' actions since students normally are not agents of the school. Finally, even if the legal duties set forth in Meritor applied to this case, they would not make the UW Rule constitutional. Since Title VII is only a statute, it cannot supersede the requirements of the First Amendment. ============================ The intellectual freedom principles developed by libraries offer some guidance. The American Library Association statement on Challenged Materials says: "Freedom of expression is protected by the Constitution of the United States, but constitutionally protected expression is often separated from unprotected expression only by a dim and uncertain line. The Constitution requires a procedure designed to focus searchingly on challenged expression before it can be suppressed. An adversary hearing is a part of this procedure." Private institutions are legally free to violate the standards set by the Constitution and academic freedom. They should not, however, try to justify their violations with appeals to government rules. - Carl ANNOTATED REFERENCES (All these documents are available on-line. Access information follows.) =================<a href="ftp://ftp.eff.org/pub/CAF/academic/speech-codes.aaup"> academic/speech-codes.aaup =================</a> * Speech Codes (AAUP) On Freedom of Expression and Campus Speech Codes Expression - An official statement of the American Association of University Professors (AAUP) It says in part: "On a campus that is free and open, no idea can be banned or forbidden. No viewpoint or message may be deemed so hateful or disturbing that it may not be expressed." =================<a href="ftp://ftp.eff.org/pub/CAF/law/uwm-post-v-u-of-wisconsin"> law/uwm-post-v-u-of-wisconsin =================</a> * Expression -- Hate Speech -- UWM Post v. U Of Wisconsin The full text of UWM POST v. U. of Wisconsin. This recent district court ruling goes into detail about the difference between protected offensive expression and illegal harassment. It even mentions email. It concludes: "The founding fathers of this nation produced a remarkable document in the Constitution but it was ratified only with the promise of the Bill of Rights. The First Amendment is central to our concept of freedom. The God-given "unalienable rights" that the infant nation rallied to in the Declaration of Independence can be preserved only if their application is rigorously analyzed. The problems of bigotry and discrimination sought to be addressed here are real and truly corrosive of the educational environment. But freedom of speech is almost absolute in our land and the only restriction the fighting words doctrine can abide is that based on the fear of violent reaction. Content-based prohibitions such as that in the UW Rule, however well intended, simply cannot survive the screening which our Constitution demands." =================<a href="ftp://ftp.eff.org/pub/CAF/law/doe-v-u-of-michigan"> law/doe-v-u-of-michigan =================</a> * Expression -- Hate Speech -- Doe v. U of Michigan This is Doe v. University of Michigan. In this widely referenced decision, the district judge down struck the University's rules against discriminatory harassment because the rules were found to be too broad and too vague. =================<a href="ftp://ftp.eff.org/pub/CAF/law/broadrick-v-oklahoma"> law/broadrick-v-oklahoma =================</a> * Expression -- Vague Regulation -- Broadrick v. Oklahoma, et al. Summary of case law on overly vague regulation of expression. It says a statute is unconstitutionally vague when "men of common intelligence must necessarily guess at its meaning." =================<a href="ftp://ftp.eff.org/pub/CAF/law/naacp-v-button"> law/naacp-v-button =================</a> * Expression -- Overbroad Regulation -- NAACP v. Button, et al. Summary of case law on overly broad regulation of expression. It says "[b]ecause First Amendment freedoms need breathing space to survive, government may regulate in the area only with narrow specificity." =================<a href="ftp://ftp.eff.org/pub/CAF/law/pd-of-chicago-v-mosley"> law/pd-of-chicago-v-mosley =================</a> * Expression -- Content Regulation -- Police Department of Chicago v. Mosley Summary of case law on content-based regulation of expression. It says that "above all else, the First Amendment means that government has no power to restrict expression because of its message, its ideas, its subject matter, or its content." =================<a href="ftp://ftp.eff.org/pub/CAF/law/rav-v-st-paul.1"> law/rav-v-st-paul.1 =================</a> * Expression -- Hate Speech -- RAV v. St Paul -- 1 The Supreme Court's _R.A.V. v. City of St. Paul_ decision about hate crimes. The Court overturned St. Paul's Bias-Motivated Crime Ordinance, which prohibits the display of a symbol which one knows or has reason to know "arouses anger, alarm or resentment in others on the basis of race, color, creed, religion or gender." By 9-0, the Court said the law as overly broad. By 5-4, the Court said that the law was also unfairly selective because it only tried to protect some groups. Included: summary, majority opinion, 3 concurring opinions. =================<a href="ftp://ftp.eff.org/pub/CAF/law/young-conservatives-v-sau"> law/young-conservatives-v-sau =================</a> * Expression -- Offensive -- Young Conservatives v. SAU A UPI story that tells how Stephen F. Austin University originally banned a group's "sexist" flyers, but when challenged, the ban was lifted and a cash settlement was given to the students whose free-speech was violated by the ban. =================<a href="ftp://ftp.eff.org/pub/CAF/law/cohen-v-california.1"> law/cohen-v-california.1 =================</a> * Expression -- Offensive -- Cohen v. California -- 1 Definition of "fighting words"; why no right not to be offended The definition of fighting words from _Chaplinsky v. New Hampshire_ and then _Cohen v. California_. Also, says quotes the Supreme Court saying that there is no universal right to not hear offensive expression. =================<a href="ftp://ftp.eff.org/pub/CAF/law/cohen-v-california.2"> law/cohen-v-california.2 =================</a> * Expression -- Offensive -- Cohen v. California -- 2 Netnews article with reference _Cohen v. California_, "in which the court ruled that Cohen's jacket, which stated "Fuck the Draft" was a protected form of free speech, even though he wore it in a county courthouse." =================<a href="ftp://ftp.eff.org/pub/CAF/law/cohen-v-california.3"> law/cohen-v-california.3 =================</a> * Expression -- Offensive -- Cohen v. California -- 3 Here are excerpts from several Supreme Court decisions inclusing _Cohen v. Calfiornia_. They say that offensive public expression is protected if those offended can "effectively avoid further bombardment of their sensibilities simply by averting their eyes." =================<a href="ftp://ftp.eff.org/pub/CAF/law/cohen-v-california.4"> law/cohen-v-california.4 =================</a> * Expression -- Regulation of Tone -- Cohen v. California -- 4 A short quote from _Cohen v. California_: "We cannot sanction the view that the constitution, while solicitous of the cognitive content of individual speech, has little or no regard for that emotive function which, practically speaking, may often be the more important element of the overall message sought to be communicated." =================<a href="ftp://ftp.eff.org/pub/CAF/law/quiet-reading"> law/quiet-reading =================</a> * Expression -- Harassment -- Quiet Reading of _Playboy_ Excerpts from a newspaper report that a federal district judge has said that "quiet reading" of a _Playboy_ magazine by a firefighter does not create a sexually harassing atmosphere. [Editorial comment: I think this supports the idea that rather banning "porn" from a general academic computer, it is more appropriate to ban harassment.] =================<a href="ftp://ftp.eff.org/pub/CAF/library/challenged-materials.ala"> library/challenged-materials.ala =================</a> * Challenged Materials (ALA) An interpretation by the American Library Association of the "Library Bill of Rights". It says in part "The Constitution requires a procedure designed to focus searchingly on challenged expression before it can be suppressed. An adversary hearing is a part of this procedure." =================<a href="http://www.eff.org/CAF/faq/netnews.liability.html"> faq/netnews.liability =================</a> * Netnews -- On University Liability for Netnews q: Does a University reduce its likely liability by screening Netnews for offensive articles and newsgroups? a: Not necessarily. By screening articles and newsgroups the ... =================<a href="http://www.eff.org/CAF/faq/netnews.reading.html"> faq/netnews.reading =================</a> * Netnews -- Policies on What Users Read q: Should my university remove (or restrict) Netnews newsgroups because some people find them offensive? If it doesn't have the resources to carry all newsgroups, how should newsgroups be selected? a: Material should not be restricted just because it is offensive to ... =================<a href="http://www.eff.org/CAF/faq/computer-porn.html"> faq/computer-porn =================</a> * Banning "porn" from university computers q: Should universities create a rule banning "porn" on university computers? a: In my opinion, no. Such a rule would be unnecessary and too broad. ... q: Should universities create a rule banning "porn" on university computers? a: In my opinion, no. Such a rule would be unnecessary and too broad. ... =================<a href="ftp://ftp.eff.org/pub/CAF/filters.email"> filters.email =================</a> * How Unix users can filter out harassing email by themselves ================= ================= If you have gopher, you can browse the CAF archive with the command gopher gopher.eff.org These document(s) are also available by anonymous ftp (the preferred method) and by email. To get the file(s) via ftp, do an anonymous ftp to ftp.eff.org (192.77.172.4), and then: cd /pub/CAF/academic get speech-codes.aaup cd /pub/CAF/law get uwm-post-v-u-of-wisconsin cd /pub/CAF/law get doe-v-u-of-michigan cd /pub/CAF/law get broadrick-v-oklahoma cd /pub/CAF/law get naacp-v-button cd /pub/CAF/law get pd-of-chicago-v-mosley cd /pub/CAF/law get rav-v-st-paul.1 cd /pub/CAF/law get young-conservatives-v-sau cd /pub/CAF/law get cohen-v-california.1 cd /pub/CAF/law get cohen-v-california.2 cd /pub/CAF/law get cohen-v-california.3 cd /pub/CAF/law get cohen-v-california.4 cd /pub/CAF/law get quiet-reading cd /pub/CAF/library get challenged-materials.ala cd /pub/CAF/faq get netnews.liability cd /pub/CAF/faq get netnews.reading cd /pub/CAF/faq get computer-porn cd /pub/CAF get filters.email To get the file(s) by email, send email to ftpmail@decwrl.dec.com Include the line(s): connect ftp.eff.org cd /pub/CAF/academic get speech-codes.aaup cd /pub/CAF/law get uwm-post-v-u-of-wisconsin cd /pub/CAF/law get doe-v-u-of-michigan cd /pub/CAF/law get broadrick-v-oklahoma cd /pub/CAF/law get naacp-v-button cd /pub/CAF/law get pd-of-chicago-v-mosley cd /pub/CAF/law get rav-v-st-paul.1 cd /pub/CAF/law get young-conservatives-v-sau cd /pub/CAF/law get cohen-v-california.1 cd /pub/CAF/law get cohen-v-california.2 cd /pub/CAF/law get cohen-v-california.3 cd /pub/CAF/law get cohen-v-california.4 cd /pub/CAF/law get quiet-reading cd /pub/CAF/library get challenged-materials.ala cd /pub/CAF/faq get netnews.liability cd /pub/CAF/faq get netnews.reading cd /pub/CAF/faq get computer-porn cd /pub/CAF get filters.email ------------------------------ Date: Sun, 19 Mar 1995 22:51:01 CDT From: CuD Moderators <cudigest@sun.soci.niu.edu> Subject: File 4--Cu Digest Header Info (unchanged since 19 Mar, 1995) Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically. CuD is available as a Usenet newsgroup: comp.society.cu-digest Or, to subscribe, send a one-line message: SUB CUDIGEST your name Send it to LISTSERV@VMD.CSO.UIUC.EDU The editors may be contacted by voice (815-753-0303), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115, USA. To UNSUB, send a one-line message: UNSUB CUDIGEST <your name> Send it to LISTSERV@VMD.CSO.UIUC.EDU (NOTE: The address you unsub must correspond to your From: line) Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" On Delphi in the General Discussion database of the Internet SIG; on RIPCO BBS (312) 528-5020 (and via Ripco on internet); and on Rune Stone BBS (IIRGWHQ) (203) 832-8441. CuD is also available via Fidonet File Request from 1:11/70; unlisted nodes and points welcome. EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown) In ITALY: Bits against the Empire BBS: +39-464-435189 In LUXEMBOURG: ComNet BBS: +352-466893 UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/ ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/ aql.gatech.edu (128.61.10.53) in /pub/eff/cud/ world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/ uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/ wuarchive.wustl.edu in /doc/EFF/Publications/CuD/ EUROPE: nic.funet.fi in pub/doc/cud/ (Finland) ftp.warwick.ac.uk in pub/cud/ (United Kingdom) JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD ftp://www.rcac.tdi.co.jp/pub/mirror/CuD The most recent issues of CuD can be obtained from the Cu Digest WWW site at: URL: http://www.soci.niu.edu:80/~cudigest/ COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ------------------------------ End of Computer Underground Digest #7.28 ************************************