Computer underground Digest Wed Apr 26, 1995 Volume 7 : Issue 33 ISSN 1004-042X Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) Archivist: Brendan Kehoe Shadow Master: Stanton McCandlish Field Agent Extraordinaire: David Smith Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Copy Desecrator: Emo Shrdlu CONTENTS, #7.33 (Wed, Apr 26, 1995) File 1--EPIC On Gov't Guidelines File 2-- Lorrie Faith Cranor's CFP95 Conference Report File 3--DEATH ROW INMATE GETS HOME PAGE ON INTERNET (fwd) File 4--Cu Digest Header Info (unchanged since 19 Apr, 1995) CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN THE CONCLUDING FILE AT THE END OF EACH ISSUE. --------------------------------------------------------------------- Date: 26 Apr 1995 16:32:35 -0400 From: "Marc Rotenberg" <rotenberg@EPIC.ORG> Subject: FIle 1--EPIC On Gov't Guidelines Electronic Privacy Information Center 666 Pennsylvania Avenue, S.E. Washington, DC 20003 (202) 544-9240 info@epic.org * P R E S S R E L E A S E * April 27, 1995 EPIC URGES SPECTER TO PROCEED CAUTIOUSLY WASHINGTON -- In a letter sent today to Senator Arlen Specter, the Electronic Privacy Information Center, a leading civil liberties organization, urged the Congress to proceed cautiously in the wake of the tragic bombing incident in Oklahoma. EPIC said that "any expansion of federal authority to investigate political activity could have a profound impact upon communication networks and the future of electronic democracy." Senator Specter is holding hearings tomorrow on counter-terrorism proposals. The EPIC letter focused on the history of the Attorney General guidelines which permit the government to conduct investigations of domestic organizations. The original guidelines were issued in 1976 by Attorney General Edward Levi. The "Levi Guidelines," as they came to be known, recognized the FBI's legitimate investigative needs while seeking to protect the First Amendment rights of dissident politic organizations. The Guidelines were promulgated in the wake of Watergate and the revelations of the Senate's Church Committee investigation. According to EPIC, the Levi Guidelines reflected the post- Watergate consensus that the investigation of controversial or unpopular political groups had at times been overzealous and had violated fundamental constitutional rights. In 1983 President Reagan's Attorney General, William French Smith, issued a new set of guidelines that replaced the Levi Guidelines. The "Smith Guidelines" were far less restrictive than the Levi Guidelines. As President Reagan's FBI Director William Webster said, the Smith Guidelines "should eliminate any perceptions that actual or imminent commission of a violent crime is a prerequisite to investigation." The critical section of the Smith Guidelines cited in the EPIC letter provides that "[a] domestic security/terrorism investigation may be initiated when facts or circumstances reasonably indicate that two or more persons are engaged in an enterprise for the purpose of furthering political or social goals wholly or in part through activities that involve force or violence and a violation of the criminal laws of the United States." EPIC said that "the current guidelines provide the FBI with ample authority to initiate investigations of organizations and individuals similar to those alleged to have been involved in the Oklahoma City bombing." EPIC noted that public information concerning paramilitary right-wing organizations in general -- and the Michigan Militia in particular -- has been readily available to the FBI and other law enforcement agencies for some time. EPIC also noted that former Attorney General Griffin Bell and former Assistant Attorney General Victoria Toensing have recently expressed the view that the FBI possessed sufficient authority under the Smith Guidelines to investigate and monitor the activities of this organization and affiliated individuals. Finally, EPIC urged Senator Specter to give similar careful consideration to any proposals for the modification of the wiretap statute or privacy statutes that would diminish the freedoms that all American currently enjoy. Earlier this year, EPIC recommended that Congress not appropriate $500 million for a national wiretap program developed by the FBI. EPIC said that the program would increase the vulnerability of the nation's communications infrastructure. EPIC said today that it will continue to oppose funding of the program. -30- ELECTRONIC PRIVACY INFORMATION CENTER WASHINGTON, DC INFO@EPIC.ORG April 26, 1995 Honorable Arlen Specter Chairman Judiciary Subcommittee on Terrorism, Intelligence and Gov't Information United States Senate 161 Dirksen Office Building Washington, DC 20510 Dear Senator Specter: We write on behalf of the Electronic Privacy Information Center ("EPIC"), a non-profit research organization concerned with the protection of privacy and civil liberties. We are particularly interested in the preservation of Constitutional freedoms in the evolving communications infrastructure. Increasingly, the Internet and other digital systems facilitate the expression of political opinions and have, in effect, become the electronic town squares of our information society. For this reason, EPIC believes that any expansion of federal authority to investigate political activity and/or expression could have a profound impact upon those networks and the future of electronic democracy. As the Committee begins its examination of the tragic events in Oklahoma City, we urge careful and deliberate consideration of any proposal that would alter current guidelines governing the investigation and monitoring of domestic political activity or the collection and use of personal information. The Congress must be careful not to compromise fundamental constitutional values as it seeks to address the obvious security concerns in the wake of recent events. As Justice Powell observed in the Keith case: History abundantly documents the tendency of Government -- however benevolent and benign its motives -- to view with suspicion those who most fervently dispute its policies. [Constitutional] protections become the more necessary when the targets of official surveillance may be those suspected of unorthodoxy in their political beliefs. The danger to political dissent is acute where the Government attempts to act under so vague a concept as the power to protect "domestic security." Given the difficulty of defining the domestic security interest, the danger of abuse in acting to protect that interest becomes apparent. United States v. United States District Court, 407 U.S. 297, 314 (1972). In order to assess whether it is necessary to make changes in the current policies concerning the investigation of domestic organizations, we believe it is necessary to look closely at the history of federal investigative authority. As you know, the evolution of the current requirements governing the FBI's conduct of domestic security investigations dates back to 1976. In that year, President Ford's Attorney General, Edward Levi, issued "Guidelines on Domestic Security Investigation," which came to be known as the "Levi Guidelines." This directive, which recognized the FBI's legitimate investigative needs while seeking to protect the First Amendment rights of dissident politic organizations, was promulgated in the wake of Watergate and the revelations of the Senate's Church Committee investigation./1/ The Levi Guidelines reflected the post-Watergate consensus that the investigation of controversial or unpopular political groups had at times been overzealous and had violated fundamental constitutional rights./2/ Seven years later, in 1983, the Levi Guidelines were superseded by the "Attorney General's Guidelines on General Crimes, Racketeering Enterprise and Domestic Security/Terrorism Investigations," issued by Attorney General William French Smith (the "Smith Guidelines"). The revised guidelines were generally considered to be far less restrictive than the Levi Guidelines. As FBI Director William Webster noted at the time of their issuance, the Smith Guidelines "should eliminate any perceptions that actual or imminent commission of a violent crime is a prerequisite to investigation."/3/ The guidelines provide, in pertinent part, that [a] domestic security/terrorism investigation may be initiated when facts or circumstances reasonably indicate that two or more persons are engaged in an enterprise for the purpose of furthering political or social goals wholly or in part through activities that involve force or violence and a violation of the criminal laws of the United States. Smith Guidelines (reprinted in 32 Crim. L. Rep. (BNA) 3087 (1983)), Section III (B)(1). The standard of "reasonable indication" is substantially lower than probable cause. In determining whether there is reasonable indication of a federal criminal violation, a Special Agent may take into account any facts or circumstances that a prudent investigator would consider. However, the standard does require specific facts indicating a past, current, or impending violation. There must be an objective, factual basis for initiating the investigation; a mere hunch is insufficient. Id., Section II (C)(1). Given the constitutional command that the government may not suppress or punish statements advocating criminal activity unless they pose an immediate and substantial danger to public safety, Brandenburg v. Ohio, 395 U.S. 444 (1969), the Smith Guidelines afford the FBI considerable leeway in pursuing investigations of potential violent crime. In a 1984 en banc opinion interpreting the Smith Guidelines, the Seventh Circuit Court of Appeals found that the directive strikes an appropriate balance between First Amendment rights and legitimate law enforcement. As Judge Posner wrote for the court, [the FBI] may not investigate a group solely because the group advocates [an unpopular cause]; but it may investigate any group that advocates the commission, even if not immediately, of terrorist acts in violation of federal law. It need not wait until the bombs begin to go off, or even until the bomb factory is found. Alliance to End Repression v. City of Chicago, 742 F.2d 1007, 1015 (7th Cir. 1984). Thus, the current guidelines provide the FBI with ample authority to initiate investigations of organizations and individuals similar to those alleged to have been involved in the Oklahoma City bombing. In reaching this conclusion, we note that a good deal of public source material concerning paramilitary right-wing organizations in general -- and the Michigan Militia in particular -- has been readily available to the FBI and other law enforcement agencies for some time. For instance, a front page article about the Michigan Militia in the Detroit Free Press last fall reported: Their goal is to keep the U.S. government in check, through threat of armed rebellion if need be. Gun control advocates, federal firearms agents and the United Nations are among the perceived threats. ... Federal officials are aware of these groups, but "we are not monitoring their growth," said Stanley Zimmerman, head of the Detroit office of the federal Bureau of Alcohol, Tobacco and Firearms. "It would be our preference that the militia groups would use the power of the vote rather than the threat of armed violent confrontation to accomplish their goals." "They Cite their Disgust with Government," Detroit Free Press, October 13, 1994, at 1A. Indeed, the Justice Department was specifically alerted to the activities of the Michigan Militia. Morris Dees, director of the Southern Poverty Law Center, disclosed in a recent interview that: We warned Attorney General Reno in a letter last October concerning this Militia of Michigan, the one that's involved in this case, and pointed out that they should be checking on them. ... [T]hese people, like Mark Koernke, are out actually advocating the overthrow of the United States government with individuals who are practicing and training with explosives, with assault weapons. ABC News, "This Week with David Brinkley," April 23, 1995. In recent comments concerning the adequacy of the Smith Guidelines, former Attorney General Griffin Bell and former Assistant Attorney General Victoria Toensing have expressed the view that the FBI possessed sufficient authority to investigate and monitor the activities of this organization and affiliated individuals. This conclusion is consistent with the observation of former FBI Director Webster, noted above, that the current guidelines "should eliminate any perceptions that actual or imminent commission of a violent crime is a prerequisite to investigation." As you commence your review into this matter, we strongly urge you to consider the views of many experts who share the opinion of these former officials. We urge you also to give similar careful consideration to any proposals for the modification of the wiretap statute or privacy statutes that would diminish the freedoms that all Americans currently enjoy. Any such proposal must be carefully drafted to address specific and identifiable harms. We urge you also to proceed cautiously in the area of electronic communications. Our country is in the process of developing the communication tools that will take us into the next century. While we share the President's belief that irresponsible speech should be opposed by responsible speech, we do not believe that enhanced surveillance of lawful activity by American citizens will serve the country well. Political and associational rights form the foundation of our democratic society. As the Committee and Congress examine the nation's contemporary security needs, the temptation to find expedient quick fixes must be resisted. Issues as fundamental as the ones you propose to address deserve and demand a thorough and open national debate. We look forward to working with you and the Committee as you consider these difficult questions. Sincerely, Marc Rotenberg, Director David L. Sobel, Legal Counsel cc: Sen. Fred Thompson Sen. Spencer Abraham Sen. Strom Thurmond Sen. Herbert Kohl Sen. Patrick Leahy Sen. Dianne Feinstein ================================================================== Notes /1/ See, generally, Final Report of the Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities, S. Rep. 755, 94th Cong., 2d Sess. (1976). /2/ Although some critics maintained that the guidelines were unduly restrictive, Attorney General Levi explained that they authorized the initiation of an investigation on the basis of a relatively benign statement such as "The rulers have set the time for the party; let us bring the fireworks," delivered by a group with no known propensity for violence. Alliance to End Repression v. City of Chicago, 742 F.2d 1007, 1012 (7th Cir. 1984) (quoting Congressional testimony of Attorney General Levi). /3/ Alliance to End Repression v. City of Chicago, 561 F. Supp. 575, 578 n.5 (N.D. Ill. 1983) (quoting internal FBI memorandum). ==================== Marc Rotenberg (Rotenberg@epic.org) * 202-544-9240 (tel) Electronic Privacy Information Center * 202-547-5482 (fax) 666 Pennsylvania Ave, SE, Suite 301 * ftp/gopher/wais cpsr.org Washington, DC 20003 * HTTP://epic.digicash.com/epic ------------------------------ Date: Mon, 24 Apr 1995 01:22:02 -0500 From: jim thomas <tk0jut1@CS.NIU.EDU> Subject: FIle 2-- Lorrie Faith Cranor's CFP95 Conference Report Lorrie Faith Cranor's CFP95 Conference Report ----------------------------------------------------------------- Copyright 1995 by Lorrie Faith Cranor. Permission to distribute this report electronically is granted, provided you do not distribute it for direct commercial advantage. This report is a description of CFP95 as I experienced it. The unattributed opinions liberally sprinkled throughout are, of course, my own. ------------------------------------------------------------------- I attended the Fifth Conference on Computers, Freedom and Privacy (http://www-techlaw.stanford.edu/CFP95.html) March 28 through 31 at the San Francisco Airport Marriott Hotel. Having thoroughly enjoyed the previous two CFP conferences, I had been looking forward to CFP95 for quite some time -- and I was not disappointed. The conference began on March 28 with a full day of tutorial programs. I arrived too late to attend the tutorials, but in time to enjoy an evening ice cream reception and meet some of the other attendees. The informal discussions I began that evening and which I continued between sessions throughout the conference proved to be as valuable as the formal sessions. The main part of the CFP95 program got off to a slow start on March 29 with keynote speaker John Morgridge, chairman of the board of Cisco systems. Morgridge described the current status of computer networks as "the era of use," in which we will have to address more difficult issues than we faced while we were just concentrating on "the plumbing." But he failed to shed much light on what these issues are or how we might face them. The next session, "Student Databases: For Education and For Life," proved more enlightening and quite controversial. Barbara Clements, Council of Chief State School Officers, outlined the advantages of electronic student records databases over the traditional paper filing systems. She argued that electronic systems are more accurate, take up less space, and are more secure. In addition, if these systems follow standard conventions they can make it much easier for information to be transfered between schools. But panelist Anita Hoge, was quite critical of standardized student information databases, especially those that contain information obtained through standardized tests. She described an exam given to her son in a Pennsylvania public school. Hoge said this "Educational Quality Assessment" was designed to measure predispositions of students towards certain types of behaviors. For example, the exam described a hypothetical situation in which the student's friends were planning an outing to spray paint graffiti around town. The student is asked whether he or she would go along. A negative response is interpreted as a predisposition towards anti-social behavior. According to Hoge, the results of this exam can be used to identify students with mental and behavioral disorders, classify them as special education students, send this information to the government, and make the students eligible for Medicaid. While most of the audience probably agreed with Hoge that such exams are inappropriate, many people were not convinced by Hoge's conclusion that the use of standardized exams and standardized student information databases was the first step in the government's effort to sneak socialized health care through the back door. Stanford Law Professor Margaret Jane Radin gave an interesting lunch time presentation that inspired fish jokes throughout the rest of the conference. Radin described two property rights paradigms and discussed the advantages and disadvantages of applying them in cyberspace. Traditionally, intellectual property has been considered a form of economic property that could be bought and sold in a free market. However, land (especially the land on which the family home is built) has been considered a form of property that has personal value beyond the monetary value that can be obtained by selling it. She also speculated that as more people flock to cyberspace, the Internet may evolve into something similar to what broadcast TV has become. She described the TV audience as "potential customers delivered to advertisers for a fee." Thus, she explained, the TV broadcast industry is a giant commercial fishing industry. "It would be good if cyberspace doesn't turn us into fish," she concluded. A panel discussion on Intelligent Transportation Systems raised some important privacy considerations, but was not nearly as provocative as the next two sessions of the day: "Transaction Records In Interactive Services" and "A Case Against Computers." The transaction records panelists debated a variety of issues including who owns personal information records (the person who provides them or the organization that collects them), the merits of "opt-in" and "opt-out" privacy protection systems, and where the responsibility for privacy violations should rest. The Case Against Computers session, dubbed the "luddite session," featured four panelists critical of computer technology. Jerry Mander began by reminding everyone that people used to get along just fine without computers. He suggested that contrary to what electronic activists claim, computers help people feel more powerful, but are not actual instruments of empowerment. Rather, he argued, computers enforce centralized power structures that take power out of the hands of individuals. In addition he was critical of the fact that computer professionals do not receive training on how to critique computers. Finally, he expressed dismay at the way computers and other new technologies have been accepted by the public without debate or consideration of their downsides. Panelist Ted Roszak then discussed the fact that most computer users are not computer experts -- and don't wish to be. He urged computer experts to remember that when designing computer systems. Panelist Chet Bowers gave a very academic presentation that was probably lost on most of the audience. The point of his presentation seemed to be that we were not properly considering the cultural impact of computers. Richard Sclove, the only panelist with an email address (or at least the only one who mentioned it), reminded us that information technology effects everyone, even people who don't use computers. Although the panelists raised some excellent points, I don't think this panel did a very good job of addressing their audience. The panelists came across as a bunch of middle-aged (or older) academic luddites, a characterization that won them little respect or credibility with the techies in the audience. In fact, during the Q & A period one audience member (who seemed to have missed the point of the presentation entirely) asked the panel, "Are you guys not getting it? What are you missing?" The day's panel discussions were followed by the Electronic Frontier Foundation (http://www.eff.org) Pioneer Awards presentation, an EFF-sponsored reception, and dinner. At dinner each table was given a question to discuss and answer, with prizes being awarded for the best answers. Some tables took this quite seriously while others resented being told what to talk about and submitted answers more humorous than insightful (my own table taking the latter approach). The next day of conference sessions began with a panel titled "Defining Access Paradigms: Libraries, Rural Areas, and International Aspects." While not particularly controversial, the panel addressed some interesting problems. Karen Coyle of the University of California described the free lending library as a product of the print world. She explained that libraries generally purchase books but lease electronic materials -- sometimes on a per-use basis. If libraries had to pay per-use fees on all their materials, they would likely have to pass some of these fees onto their patrons. In addition libraries face problems in distributing electronic information to patrons who want to take the information with them. Panelist Christine Borgman's warning against causing a situation in which only the elite have access to knowledge, led one audience member to question whether technology really widens the knowledge gap. He cited as evidence the fact that he as access to as much information as a millionaire has. Apparently it didn't occur to this gentleman (probably a member of the middle class) that he is a member of the information elite, not the information poor. The next session, "A Net for All: Where Are the Minorities?", featured an interesting discussion of efforts to bring the Net to minority and underprivledged populations. Art McGee of the Institute for Global Communications described the famous New Yorker cartoon featuring one dog introducing another dog to the Internet. The cartoon caption reads, "On the Internet, nobody knows you're a dog." This led McGee to comment that the second dog should have asked, "What's wrong with being a dog?". He added that technology gives people the power to express themselves in their own voices, without having their messages spun by the media. But he reminded the audience that there are still a lot of illiterate people and "all the computers in the world won't help them if they can't read." Panelist Barbara Simons added that the computer revolution has had a negative impact on uneducated people because there are now fewer unskilled jobs. An afternoon of discussion on "Freedom and Responsibility of Electronic Speech" followed lunch, an address by Esther Dyson, and a panel discussion on online activism. The electronic speech discussion began with presentations from three individuals who have been involved in freedom of electronic speech disputes. Brock Meeks, who was sued for defamation because of something he posted as part of an online newsletter (http://cyberwerks.com:70/1/cyberwire), discussed his case. Because the case was settled out of court, it sets no legal precedent, but Meeks proposed that people who enter into a discussion on the Internet should be considered "public figures" who cannot be easily libeled. He suggested the public figure characterization is appropriate because Internet discussion participants have easy access to the same public forum as those who might try to defame them. Jean Camp (http://www.cs.cmu.edu/afs/cs/user/jeanc/www/home.html), a doctoral student at Carnegie Mellon University discussed CMU's censorship of sexually explicit Usenet newsgroups (http://www.cs.cmu.edu/afs/cs/user/kcf/www/censor/index.html). Roger Karraker, a journalism professor who maintained an electronic conferencing system at Santa Rosa Junior College, described a case in which a female student filed a sex discrimination complaint against him after hearing that derogatory remarks had been made against her on a men-only discussion group. Karraker said one of the mistakes he made with the conferencing system was in describing it as an extension of the student newspaper, because newspaper publishers are responsible for their content. Karraker said individuals should be responsible for their own speech in electronic discussion groups. The second half of the electronic speech discussion took the form of a "Socratic forum" (somewhat like a TV talk show) led by Stanford Law Professor Kim Taylor-Thompson. Taylor-Thompson described hypothetical situations and posed questions to the nine panelists. The discussion was animated and brought out some interesting ideas. However, too much of the debate was between the lawyers on the panel. CMU student Donna Riley -- whose introduction as the founder of the feminist Clittoral Hoods (http://www.cs.cmu.edu/afs/cs/user/kcf/www/censor/misc/clitoral-hoods-announ ce.html) organization brought a startled reaction from the audience -- and Ira Kaufman of the Anti-Defamation League could hardly get a word in. The second day of the conference concluded with a dinner speech by Roger Wilkins and an evening of Birds of a Feather sessions. Probably the most well-attended BOF was the public forum on cryptography policy. Members of the National Research Council cryptography committee listened and took notes as conference attendees expressed their concerns. The final day of CFP95 began too early in the morning with an 8 am talk by Willis Ware. The audience was sparse and sleepy from two nights of BOFs which ran until midnight (followed by informal discussions which ended early in the morning). Most of the conference attendees had dragged themselves out of bed in time for the next session: Can We Talk Long Distance? Removing Impediments to Secure International Communications. This panel was of particular interest to many of the audience members. While most of the discussion centered around issues which have been brought up repeatedly over the past few years, Cypherpunk Tim May summed things up nicely by characterizing the encryption controversy as a debate between those who feel that their communication is "none of your damn business" versus those who ask, "What have you got to hide?". A session on copyright and the Net included an interesting discussion about how copyright should be enforced in cyberspace. In response to often-repeated claims that it is not possible to enforce copyright laws on the Net, Attorney Lance Rose pointed out that intelligent software agents that can be programmed to search the Net for certain types of news can also be programmed to search the Net for copyright infringements. Michael Kepplinger of the U.S. Patent and Trademark Office and Law Professor Pamela Samuelson debated the "Green Paper" produced by the Working Group on Intellectual Property Rights. Samuelson criticized the Green Paper authors for assuming that there will not be any useful content on the Internet until Congress passes strict intellectual property laws. However, she said that people are already finding useful information on the Internet. She was also critical of the Green Paper for suggesting that online service providers should be held strictly liable for copyright infringement. Kepplinger denied that the Green Paper included strict liability language. Brad Templeton of ClariNet Communications Corp. followed up by asserting that most people respect copyright, regardless of whether or not it is enforced. Templeton, whose company provides Associated Press and other news feeds over the Internet, said that ClariNet has been profitable under the current copyright laws. Lenny Foner (http://foner.www.media.mit.edu/people/foner/), a graduate student at the MIT Media Lab and the winner of the CFP95 Student Paper Competition, presented his research on agents during lunch. Foner described a "matchmaker" system he is developing that is designed to demonstrate the feasibility of a large scale distributed system in which it is essential to build in privacy. Lenny's research is interesting for its technological goals as well as its political goals. By the afternoon of the last day of the conference, a large portion of conference attendees had migrated from their chairs to the floor in the back of the conference hall. Students, journalists, long-haired hackers, and libertarians camped out with backpacks and laptops on the audio platform and the surrounding floor space. One gentleman fell asleep, but was woken by a journalist when he started to snore. At one point Conference Chair Carey Heckman pointed out that there were plenty of empty seats towards the front, but nobody in the back moved forward. A session titled "It Oughta Be a Crime" kicked off an afternoon filled with some of the most interesting sessions of the conference. Scott Charney of the Justice Department opened his remarks by reminding the audience that "there is always a percentage of the population up to no good." Although only a small percentage of those up to no good are currently computer literate, 30 years from now everyone is likely to be computer literate, he said. He added that there are some types of behavior -- such as extortion and wire fraud -- that is clearly criminal conduct, however, there are other types of behavior that fall into grey areas. For example, some people don't think breaking into a computer system to look at files should be considered criminal if the intruder does not change or remove any of the files. However, Charney pointed out that companies that discover break-ins end up spending a lot of time checking all their files to make sure none have been changed or removed. This can be both inconvenient and quite expensive. Santa Clara District Attorney Ken Rosenblatt discussed statements by some people (including writer Bruce Sterling) that police have no business on the Net because electronic conflicts are more a "cultural war" than criminal behavior. However, Rosenblatt said that all laws are an expansion of cultural norms. Panelist Mark Traphagan of the Software Publishers Association concluded the session with a discussion of copyright infringement. He claimed that China has a 99 percent piracy rate making it "virtually a one-copy country." This session brought much disagreement from the audience members, some of whom interrupted the speakers. This prompted CFP founder Jim Warren to remind the audience that all sides need to be heard. Many conference attendees anticipated that the session titled "Who Owns the Law? The Debate Over Legal Citation Form and What It Means" would only be interesting to lawyers. However this session proved to be the most animated of the entire conference. After the four panelists gave their opening statements, Glenn Tenney of Fantasia Systems Inc. gave each of them five minutes in which to question the other panelists. This format provoked a lively debate about the U.S. legal citation system. Jamie Love of the Taxpayers Assets Project complained that West Publishing's page numbers must be used when citing most court opinions. Because one cannot determine the West pagination from the official court documents, one must visit a law library or pay online charges to West to find the complete citations. With an increasing amount of legal research being conducted online, this can get very expensive. However, West argues that they spend a lot of time verifying the accuracy of the opinions they publish and should be compensated for their work. Besides, they say, it is not their fault that the courts do not provide accurate copies of their opinions that can be cited in legal proceedings. The final CFP95 session featured several presentations about anonymity, pseudonyms, and the technologies that make such things possible. To illustrate the use of pseudonyms, some of the panelists replaced the names on their name badges and exchanged name cards. Leading moderator Roger Clarke to introduce panelists Gary Marx and Kent Walker as "Kent and or Gary." David Chaum described the electronic cash products being developed by his company, DigiCash. Writer Steven Levy then gave an excellent presentation on anonymous remailers. Science Fiction Writer David Brin wrapped things up with some thoughts on the conference as a whole. After this session, the chairs of all five CFP conferences commented on the past and future of CFP. Plans are already underway for CFP96 (http://web.mit.edu/cfp96) to be held March 27-30, 1996 in Boston. -- Lorrie Faith Cranor (lorracks@cs.wustl.edu) April 3, 1995 /\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\ Lorrie Faith Cranor Engineering and Policy, Computer Science Washington University http://dworkin.wustl.edu/~lorracks/ 1 Brookings Dr Box 1045 St. Louis, MO 63130 "UNLESS someone like you cares a whole awful lot, lorracks@cs.wustl.edu nothing is going to get better. It's not." -Dr.Seuss Look for the Crossroads special issue on computers and society, available May 1 from http://info.acm.org/crossroads/ Students: Are you doing interdisciplinary research related to computers and society? Are you interested in joining an online discussion group to exchange ideas with other students? Send me email for more information. ------------------------------ Date: Wed, 26 Apr 1995 00:10:14 -0500 (CDT) From: David Smith <bladex@BGA.COM> Subject: FIle 3--DEATH ROW INMATE GETS HOME PAGE ON INTERNET (fwd) ---------- Forwarded message ---------- DEATH ROW INMATE GETS HOME PAGE ON THE INTERNET Illinois death row inmate Girvies Davis, who is scheduled to be executed by lethal injection on May 17, 1995, has become the first death row prisoner in the United States to take his case directly to the people on the Internet. Girvies' home page went online April 24, 1995. For the first time since Illinois re-enacted the death penalty in 1977, the State is faced with the very real likelihood of executing a man for a crime he did not commit. Internet users can learn more about the facts surrounding Girvies' conviction and death sentencing by accessing his home page at: http://www.mcs.net/~bkmurph/girvies.htm Girvies was convicted and sentenced to death in 1980 for a crime in which -- in all probability -- he had no involvement at all. Girvies' home page contains links to his clemency petition to the Governor, articles written about his plight, "evidence" that Internet users can examine for themselves, pictures and audio of Girvies, and the e-mail address of Illinois Governor Jim Edgar, who holds Girvies' fate in his hands. For more information, contact Mr. Davis' attorneys via electronic mail at bkmurph@mcs.net or contact Brian Murphy or David Schwartz at (312) 222-9350. ------------------------------ Date: Sun, 19 Apr 1995 22:51:01 CDT From: CuD Moderators <cudigest@sun.soci.niu.edu> Subject: FIle 4--Cu Digest Header Info (unchanged since 19 Apr, 1995) Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically. CuD is available as a Usenet newsgroup: comp.society.cu-digest Or, to subscribe, send a one-line message: SUB CUDIGEST your name Send it to LISTSERV@VMD.CSO.UIUC.EDU The editors may be contacted by voice (815-753-0303), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115, USA. To UNSUB, send a one-line message: UNSUB CUDIGEST <your name> Send it to LISTSERV@VMD.CSO.UIUC.EDU (NOTE: The address you unsub must correspond to your From: line) Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" On Delphi in the General Discussion database of the Internet SIG; on RIPCO BBS (312) 528-5020 (and via Ripco on internet); and on Rune Stone BBS (IIRGWHQ) (203) 832-8441. CuD is also available via Fidonet File Request from 1:11/70; unlisted nodes and points welcome. EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown) Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org In ITALY: Bits against the Empire BBS: +39-464-435189 In LUXEMBOURG: ComNet BBS: +352-466893 UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/ ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/ aql.gatech.edu (128.61.10.53) in /pub/eff/cud/ world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/ uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/ wuarchive.wustl.edu in /doc/EFF/Publications/CuD/ EUROPE: nic.funet.fi in pub/doc/cud/ (Finland) ftp.warwick.ac.uk in pub/cud/ (United Kingdom) JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD ftp://www.rcac.tdi.co.jp/pub/mirror/CuD The most recent issues of CuD can be obtained from the Cu Digest WWW site at: URL: http://www.soci.niu.edu:80/~cudigest/ COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ------------------------------ End of Computer Underground Digest #7.33 ************************************