Computer underground Digest Sun Jun 25, 1995 Volume 7 : Issue 53 ISSN 1004-042X Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU Archivist: Brendan Kehoe Shadow Master: Stanton McCandlish Field Agent Extraordinaire: David Smith Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson la Triviata: Which wine goes best with Unix? CONTENTS, #7.53 (Sun, Jun 25, 1995) File 1--Commentary and Background on CCC (Cincinatti) BBS Bust File 2--Message From Bubba IMPORTANT! PLEASE READ!! (fwd) File 3--german police only seizes computers with pgp File 4--GovAccess.145: Newt opposes censors File 5--GovAccess.143: Cybersex! What to do? What to do? File 6--File 1--Against Intellectual Property File 7-- FBI to search 30,000+ US homes/businesses File 8--Cu Digest Header Info (unchanged since 19 Apr, 1995) CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN THE CONCLUDING FILE AT THE END OF EACH ISSUE. --------------------------------------------------------------------- Date: Thu, 22 Jun 1995 23:01:43 PDT From: Paul J. Ste. Marie <pstemari@well.sf.ca.us> Subject: File 1--Commentary and Background on CCC (Cincinatti) BBS Bust ((MODERATORS' NOTE: The follow post reports on a meeting of users of the Cincinnati Computer Connection, and includes a comment by the CCC Sysop, reprinted with permission)). I attended the meeting held tonight by the users of the Cincinnati Computer Connection. About 100 users were in attendance. Here's what I found out: On Friday 6/16/95 5 BBS's in the Cincinnati area were seized by the "Regional Electronic Computer Intelligence" task force organized by Hamilton County Sheriff Simon Leis (of Mapplethorpe fame). All materials were seized and held under sealed search warrants, but no charges have been filed so far. Two of the BBS's are back on-line to a limited extent. The BBS's involved are: Cincinnati Computer Connection Data: 513-752-1055 Sysop Bob Emerson, bob.emerson@cccbbs.cincinnati.oh.us Up All Night Sysop Steve Brown Love Land Data: 513-683-8814 Fox Palace (no info) Inner State BBS (no info) The only comment to date by Leis is that things other than computer porn are being investigated. He declined to attend the meeting. The Cincinnati Computer Connection is a large BBS, with about 25 nodes. There is an adult area on the board, but access is quite limited and the files are screened fairly carefully. (I previously mentioned in email that I got the general impression that there were no adult areas on the board, but that was not correct.) Sysop Bob Emerson has retained Lou Serkin (spelling?) as his attorney, who has been trying to reach <mnemonic>. Many users expressed support for Emerson at the meeting, which was taped by crews from all the major Cincinnati television stations. I'm still researching to see what coverage I can find in the Cincinnati newspapers. Ann Hartman from WNKU taped a few sound bites from me on the Exon bill, and will air a show about this on WNKU (NPR affiliate in Northern Kentucky) Thurs 6/29 @ 4 pm. Her number is (606)572-6564. ============================= Here's the statement from the Sysop about what happened: Date: 06-17-95 (09:03) Number: 27 of 1384 (Refer# NONE) To: ALL From: SYSOP Subj: C.C.C. BBS Read: (N/A) Status: PUBLIC MESSAGE Conf: Main Board (0) Read Type: GENERAL (+) HAS REPLIES Well boys and girles it seems the GOD of Hamilton County has spoken! On Friday at about 10:00am the Hamilton County Sheriff department showed up at the C.C.C BBS and took all of our computers and related items. Seems they where looking for X-Rated pictures. They had NO idea what they where doing so some of the stuff may be worthless. The best thing anyone can do right now is to let them know you have rights and call, and or write everyone you can think of. Since they knew what they where looking fo all they needed to take was the hard drive or the server, no one they sent knew anything about computers other that the very basics. They just took everything to show they could do it and to make it hard on you and me. We have around 5000 people that use this system (NOT all subscribers) and I think if we spread the word to other systems and make a LOT of phone calls someone will have to start to hear us. So please call the TV news stations the Papers and for sure the Hamilton County Shefiff's offices and ask for Simon if you want but make sure you let them know how you feel. Thats the only way there gonna know how much your ticked off. Anyone that does this please leave a message and let us know what there responce to you was. The Cincinnati Computer Connection will be back on-line in a few days. I'm gonna have to buy a ton of computer in the next few days so please hang in there with me. Thanks Bob... PS I'm realy bad at getting things like this rolling if anyone has numbers and addresses they can post please do so and we can make a difference. ============================= Here's a letter from a user to Sheriff Simon Leis about this incident: The Cincinnati Computer Connection Node 15 06-23-95 01:09 Name: PAUL STE.MARIE Date: 06-20-95 (20:11) Number: 787 of 1391 (Refer# NONE) To: ALL From: BOB HEIGES Subj: THURSDAY'S MEETING Read: (N/A) Status: PUBLIC MESSAGE Conf: Main Board (0) Read Type: GENERAL (+) HAS REPLIES This is a copy of a letter I sent AS YOUR SPOKESPERSON to Sheriff Leis. The sheriff was on Channel 5 saying that he had not gotten his invitation yet (no doubt true!), so I FAXed him a copy to back up the one he will get in the mail. A copy went to Chs 5, 9, 12, 19. ---------------------------------------------------------------------- Dear Sheriff Leis, I am writing this letter as a spokesperson for the users of one of the computer bulletin board systems (BBS) "raided" last Friday by the Regional Electronics Computer Intelligence (RECI) task force. I do not speak for or represent any BBS operator, nor do I operate a BBS myself. You and others from your department or RECI task force are invited to attend a "town hall" meeting on Thursday, the 22nd of June. This meeting will be held at the Tom A. Moore Building, 3457 Montgomery Road, at 7:30 PM. There are two purposes for this meeting. First, many of the people affected by the BBS shut down want to know what happened. I'm sure I don't need to tell you that the rumors are not complimentary to either the Sheriff's Department or the task force, but most of us understand that there may be two very different sides to this issue. You and/or a spokesperson for you will be welcome to speak to the group. We anticipate some media coverage, so both sides of the issue will be on the record. If you require special arrangements to attend, please let me know what they are. Sheriff Leis, I look forward to meeting you Thursday evening. I hope, if nothing else, you leave the meeting knowing that BBSers - both operators and users - are not a bunch of dirty old men drooling over porn. As a matter of fact, we anticipate that there will numerous families at the meeting. I am providing a copy of this invitation to a few media organizations. If you cannot attend the meeting and choose instead to give us a written statement, we will read that at the meeting and provide complete, unedited copies to the media. Sincerely, s/bob heiges <<<>>> ============================= Here's another statement from a BBS user: As many of you know, the Computer Task Force, or perhaps better named The Smut Gestapo , raided Bob Emerson, sysop of Cincinnati Computer Connection and removed over $100,000 in computer equipment. This is one of the better BBS's in our area. Out of over 81,000 files only 40 could be classified, in their opinion, as adult and pornographic in nature. Note, we did say, "Their Opinion!" Without going into long comments about all the Rights we are losing on what seems to be a daily basis, What's Next? Are we going to be told on what side of the street we have to walk? If you go to Church, are we going to be told, where we have to go? Censorship, now there's a word for you to consider. Webster's New World Dictionary, of the American Language, College Edition, defines it, in part, as follows: 1. A censoring 2. A system of censoring 3. The work or position of a censor. Now, if you look at Censor: You'll find some of the following: 1. To supervise public morals or better yet: 2. A person who tells people how to behave or perhaps: A person whose task is to examine literature, motion pictures, etc., and remove or prohibit anything considered unsuitable. Now here are just a few more thing to consider. Isn't Censorship illegal? And, what in the world has happened to our Freedom of Choice, Speech and who knows how many more? Are we going back in time? Perhaps we're all living in Germany, second world war. The GESTAPO would come crashing through anyone's door, for any reason, confiscate whatever, and perhaps drag you off to a Concentration Camp! Where are we now? In the U.S.A.? All this could make you really wonder? Enough of the soap box. Bob is not the type of person, Thank GOD, who puts his head in the sand or runs like a frightened child. His system, CCC, is back on line! THAT'S RIGHT! He bought NEW EQUIPMENT and is back! However, he could use you help. ANYTHING, you can send, Dimes or Dollars. Just drop something in the mail and send it to: Bob Emerson 4466 Dogwood Drive Batavia, Ohio 45103 Even if you don't call his system, you will be helping other sysops keep their BBS's up and running and give yourself some place to call. Of course, you can elect not to become involved and keep the money in your pocket. However, in a short time you maybe trying to sell you modem, since there will be NO local systems to call. What will to be worth? Not much, since it will be a worthless piece of equipment. #12 of 12: Paul J. Ste. Marie (pstemari) Thu Jun 22 '95 (23:04) 16 lines In general, the users in Cincinnati are furious. There's about 5,000 users on the CCC BBS (I have little info on the other boards raided). Aparently Leis has harassed the sysop, Bob Emerson, in the past in regards to his video store. There are also some strange quirks in this. The BBS was operated out of Clarement County, outside Leis's jurisdiction of Hamilton County, and Leis did not brief the Clarement County representative on his RECI task force about this raid in advance. Some of the other 4 boards are located in Kentucky, not Cincinnati. Finally, there is apparently some sort of FBI operation going on IRT AOL and kiddie porn. Emerson's case is not involved in this, and both he and the users of this BBS emphatically denied and denounced kiddie porn. I'll post more news as it becomes available. ------------------------------ Date: Fri, 23 Jun 1995 09:45:38 -0600 From: Gordon R. Meyer <grmeyer@mcs.com Subject: File 2--Message From Bubba IMPORTANT! PLEASE READ!! (fwd) ((MODERATORS' NOTE: The following was forwarded by a user of one of the raided BBSes in Cincinatti)) Because of events that occurred on June 16 in the Greater Cincinnati area, where I live, I will no longer be posting binary picture files to any Usenet group. No more "Bubba's Odds n' ends." I know that doesn't break everyone's heart, but I did get some nice mail from some interesting people. On Friday, June 16, a Task Force of local law enforcement authorities from two Ohio counties and one Northern Kentucky county served five search warrants looking for pornography and other material that could be transmitted in such a manner that it could be obtained by minors. In other words, binary pictures and textual materials that could and were posted to Usenet groups and to BBSs. No arrests were made and no charges have been filed. The warrants were served without indictments or charges having been previously made. It was a classic fishing expedition. The stated purpose was to search for pornography. The obvious true purpose was to chill the free exercise of First Amendment rights. They want to make people scared to post material. Legal? It is. Wrong? It certainly is in my book. Have I been chilled? I certainly have. The warrants resulted in the seizure of more than a million dollars worth of computers and software. Frankly, I can't afford to have my computer confiscated and kept by law enforcement and prosecutors while they search it for information to present to a Grand Jury to try to get indictments so they can prosecute people for peddling smut on the internet. Frankly, they probably won't get much of value to them. They have been trying to prosecute what they deem obscene for years now. I have lived in this area for almost 20 years and I don't recall that the Hamilton County Sheriff and the prosecutor have had one successful prosecution. So, lately, they have been resorting to threats and fear tactics. It works, sometimes. It is working with me. The authorities can hold those seized com-puters and the software and files until they no longer need them for eviden-tiary purposes. That could be a year or more. Ask yourself this. What condition do you think those computers are going to be in when they are returned? Do you suppose some HDDs might "accidentally" be erased? Do you think other components might get crippled? Could a power surge suddenly occur while one of the computers is plugged in? Another thing to think about is that the computers can and probably would be kept by the authori-ties and sold if and charges were successfully brought against an owner and a conviction (including a plea bargain) obtained. I understand that the First Amendment is local law as far as the rest of the world is concerned. But, here it is just as irrelevant to cer-tain prosecuters and cops as it is to someone living in Italy. I suggest that what happened where I live may seem to be an isolated incident to most people. But, I also suggest that the incident may be iso-lated, but the mind-set that brought it about is not. This will occur in other parts of the US. It's a shame, but our own local law enforcement authorities are a greater threat to our free speech rights than are any of the politicians and bureaucrats in Washington. Later, bubba ------------------------------ Date: Sun, 18 Jun 1995 21:41:00 +0200 From: M.VIRTEL@BIONIC.ZER.DE(Martin Virtel) Subject: File 3--german police only seizes computers with pgp german police only seizes computers with pgp ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ on june 13th, the german police raided approx. 50 offices and private homes in the whole country in search of evidence about a left-leaning terrorist group, Antiimperialistische Zellen (AIZ). from the northern town of Neum|nster, near Kiel, comes this report: --quote-- police searched a building used among others by the left-wing information bureau "Omega", and seized everything at sight. the list of the seized material, which includes archives, computers equipment and files, is about 30 pages long. among other items, an "address list of foreign subscribers of Radikal" [a left-wing publication] was seized. every door in the building was opened (by brute force, in most cases). only the presence of a lawyer prevented police from seizing the computer equipment of "Notruf", a sexual abuse self-help group for women whose office happened to be in the same building, but had no connections whatsoever to "Omega". interesting remarks were made by one of the policeman who inspected the computer equipment at the sexual abuse self-help group "Notruf": "If it had PGP installed, no lawyer would have prevented us from seizing this computer", he said. --unquote-- (bitter irony on) which leads us to the astonishing conclusion that there *are* policemen who know what PGP is (bitter irony off), and further Philip Zimmermann's case that widespread use of pgp is a matter of solidarity - even solidarity whith people supposedly supporting awful things such as bombings. background information: the *AIZ - Antiimperialistische Zellen* (who triggered the raid) are thought to be the follow-up of Rote Armee Fraktion (RAF), a violent left- wing german terrorist group that was active above all in the 1970ies. So far, AIZ have claimed to be the authors of two bombings against government representatives. inidentally, nobody was injured or killed at these bombings, but anonymous press releases thought to be written by AIZ members forsee further attacks on "german elite persons". cryptography is not illegal in germany. ------------------------------ Date: Thu, 22 Jun 1995 08:15:22 -0700 From: jwarren@WELL.COM(Jim Warren) Subject: File 4--GovAccess.145: Newt opposes censors Gingrich Advocates Adult Responsibility to Control Sex-Crazed Children in Senate [Folks, this looks *great* and all that - the Newt's stood up for freedom - but as someone noted long ago, "No [wo]man's freedom is safe while the legislature sits." It ain't over 'til it's over. Eternal vigilence, and all that. --jim] PRESS RELEASE -- For Immediate Release June 21, 1995 Contact: the Center for Democracy and Technology at +1.202.637.9800 CENTER FOR DEMOCRACY AND TECHNOLOGY PRAISES SPEAKER GINGRICH'S OPPOSITION TO EXON/COATS INTERNET CENSORSHIP BILL. In a move that is a boon for freedom of speech rights for Internet users, Speaker of the House Newt Gingrich has condemned the Exon/Coats "Communications Decency Act" as a "clear violation of free speech and ... a violation of the right of adults to communicate with each other." "Speaker Gingrich has demonstrated that he understands the unique nature of interactive media such as the Internet," said CDT Executive Director Jerry Berman. "Gingrich's leadship on this issue will assure that new interactive media will be free to grow without unproductive government intrusion, and that the First Amendment rights of users will be protected." The statement from the Republican leader came on the same day that Rep. Chris Cox (R-CA) and Rep. Ron Wyden (D-OR) announced that they are developing a different approach to the problem of children's access to controversial material on the Internet. Cox and Wyden say that they seek to encourage the development of blocking and filtering technologies that empower parents to screen the material to which their children have access. At the same time, they hope to keep the growing Internet free from intrusive and ineffective regulation by the Federal Communications Commission. "Along with the Speaker, Congessmen Cox and Wyden know that federal content censorship such as has existed in radio and television mass media will not be effective at protecting children," said Daniel Weitzner, CDT Deputy Director. "In the decentralized, global Internet environment, we must rely on user control technology to enable users and parents to determine for themselves the information that they and their children receive." The Exon Internet censorship bill was strongly opposed in the Senate by Senator Patrick Leahy (D-VT) and Senator Russell Feingold (D-WI). The Exon/Coats bill was approved, however, by the Senate last week and is still awaiting House action. Gingrich made his remarks (attached below) last night on a national television show, the Progress Report carried on National Empowerment Television during a discussion with Rep. Bob Walker (R-PA) and Progress and Freedom Foundation Chairman Jay Keyworth. Gingrich said: "I think that the Amendment you referred to by Senator Exon in the Senate will have no real meaning and have no real impact and in fact I don't think will survive. It is clearly a violation of free speech and it's a violation of the right of adults to communicate with each other. I don't agree with it and I don't think it is a serious way to discuss a serious issue, which is, how do you maintain the right of free speech for adults while also protecting children in a medium which is available to both? That's also frankly a problem with television and radio, and it's something that we have to wrestle with in a calm and mature way as a society. I think by offering a very badly thought out and not very productive amendment, if anything, that put the debate back a step." The Center for Democracy and Technology is a non-profit public interest organization. The Center's mission is to develop and advocate public policies that advance constitutional civil liberties and democratic values in new computer and communications technologies. [For info, info@cdt.org ------------------------------ Date: Wed, 21 Jun 1995 06:54:06 -0700 From: jwarren@WELL.COM(Jim Warren) Subject: File 5--GovAccess.143: Cybersex! What to do? What to do? This is my "ACCESS" column in the July, 1995, issue of Government Technology. It circulates to more than 60,000 state and local government officials, elected, appointed, administrative and staff. I wrote it almost two months ago. Cybersex! What to do? What to do? by Jim Warren It's not bad enough that provincial, net-naive federal senators have threatened every citizen and sysop with a $100,000 fine and two years in prison or both for using or knowingly permitting the use of any "telecommunications device" for any "comment, request, suggestion, proposal, image, or other communication which is obscene, lascivious, filthy, or indecent" [see April, 1995, column]. Now some equally naive state politicians are leaping aboard the pandering platform - with unrealistic legislative language to regulate things about which they know nothing. Like many frightened and naive parents, they have made the mistake of believing the foolishness aired during ratings races in evening teevee news - sex is even better than blood in grabbing viewers. These proposals are akin to ordinances, a century ago, that required someone to walk fifty paces ahead of a horseless carriage, ringing a bell or swinging a lantern. Dumb! Embarrassing! But those legislative committees and rule-making bodies that conduct reasoned, responsible deliberations on proposed cyber-censorship legislation will find that there are substantive issues and alternatives worth considering: Technology as excuse What most people do online on the global computer networks is speak. The only difference is that their speech uses electronic waves rather than sound waves. Or they may be chatting in private electronic rooms, assembling in electronic Hyde Parks or publishing paperless periodicals using fully-recyclable digital ink. Contrary what one sees in the ratings-race of television exploitation, sexual content is a tiny, tiny fraction of the information available on and shared across the global computer networks. Sex stories available on the net are often far less erotic than Danielle Steel novels. Provocatively titled graphics files well may be originated by a proud husband, picturing a dowdy housewife in a two-piece bathing suit. And certainly most of the electronic chat and commentary is less outrageous than what can be heard over phone lines or at bars and cocktail parties. Successful precedents concerning sexual expression could threaten the fundamental freedom of expression regarding other subjects. E.g., the legal arm of the Church of Scientology is vigorously litigating to force a bulletin-board operator to entirely prohibit all access to a COS critic whom COS contends has distributed pages of its copyrighted works, and is also demanding that a major network services provider monitor all public transmissions that pass through its facilities and censor them of copyrighted COS text. Legislative and regulatory bodies should consider carefully, the implications of attempting to use technology as an excuse for attacking First Amendment freedoms. Baby's bath water Ill-phrased legislation targeted only for technology-aided speech, press or assembly could inadvertently prohibit electronic exchange of text or images in medical records, legal briefs, court evidence, suicide intervention, child-safety information, law enforcement details, sex counseling, AIDS awareness, art history, gallery photography, and so on - especially recognizing that computer networks are global in scope. Sexual content forms a continuum, from essential to outrageous. Furthermore, what may be inappropriate for one group is crucial for another group. Technological solutions There are problems with cybersex - most of them related to children. But, perhaps the greatest reason for responsible policy-makers to go slowly in mandating cyber-censorship is that there are often computer solutions to the problems that computer networks have created regarding offensive content: Filters. Computer programs can allow users to self-censor offensive text. "Bozo filters" automatically reject messages from offensive senders. Programs can scan all incoming text and 'X'-out words and phrases that the user specifies as being objectionable. Filter lists can be passworded for adult control. Blockers. Similar software could allow parents, teachers and librarians to limit the computer sites and/or addressees to which their children, students or patrons can have access. Such limits could be inclusive or exclusive - allowing the supervising person to specify what is accessible, or what is blocked. Tracers. Parents and teachers wishing to monitor where their children are going and who they are playing with could require that they use software that records all user-ids, site-names and file-names accessed by each child. Those who are offended by such parental or teacher oversight need not use them. For people who are being harassed, reader software could be designed and warranted to retain a certified copy of all such transactions, for use as evidence in criminal prosecution or civil litigation. User-ids and computer site-names. Most sysops that offer adult content - at least those who hope to stay out of jail - are more-than-willing to prohibit access by children. But they need to be able to identify minors. Parents and institutions that provide user-ids for children could include "kid" as part of the user-id, such as "kid.jim". Schools could choose site-names that include "K12" as part of their names. Then, sysops of adult sites could easily reject access requests from such user-ids and site-names. Additionally, this would allow children to identify other children - or would provide strong evidence of intent, against a suspected pedophile who used a child or school id. Similarly, operators wishing to offer adult content could use site-names that include "xx" and "xxx" as a dot-delimited part of their site's name. Then parents, schools and libraries could use blocking or filtering software to prohibit access to such clearly-marked adult sites. Of course, this would allow kids to more-easily find the adult sites, and allow the rare pedophile to identify children - but that simply reflects the real world. User and site lists. Concerned organizations could set up directories of all user-ids declared as belonging to minors - perhaps provided by parents or schools. Similar directories could list all adult sites. Various groups - the Moral Majority, the Sexual Freedom League, etc. - could maintain lists of "recommended" and "offensive" sites. What technology has endangered, it can sometimes protect. Give it a chance. ------------------------------ Date: Thu, 22 Jun 1995 15:08:44 -0500 From: Neil Rickert <rickert@CS.NIU.EDU> Subject: File 6--File 1--Against Intellectual Property In comp.society.cu-digest you write: >AGAINST INTELLECTUAL PROPERTY >There is a strong case for opposing intellectual property. There are a number >of negative consequences of the ownership of information, such as retarding >of innovation and exploitation of poor countries. ... I have a great deal of sympathy for Martin's argument. However, I suspect that it is unworkable. Let me first make two points in support of the proposal. 1: It is impossible to account for the origin of intellectual property. If I create something valuable -- a book or a computer program -- then my creativity owes something to my teachers and to all of the other reading I have done. My ability to create is a consequence of what I was given by my forebears. I owe it to them to likewise pass on my own inventions. 2: Intellectual property is contrary to human nature. You can see this by looking at young children. They seem to have a natural sense of physical property. But when it comes to ideas they always want to share. But there is another side, and the other side exists because of the nature of our economies, and the nature of businesses. Martin makes the case that a creator often feels rewarded adequately if people use her intellectual creation. I agree. But imagine someone has created a great new computer program. She hears that it is being widely used. She may feel elated. But then she hears that the users have purchased it from Microhard corporation, which is selling it as its own creation, and is making $$millions. I think her elation will quickly turn to anger. Perhaps she would not be upset if Microhard corporation made it clear that this was her invention, was available free, and purchasers were only buying the setup and support to make the product easily available to them. But Microhard corporation has done enough in creative packaging that it wants to consider this its own product. Martin suggests that such plagiarism will not be a serious problem, because there are social pressures. I think he is largely correct when it comes to individuals. But the only pressure corporations feel is the pressure of the "bottom line," so they will not be so easily dissuaded from plagiarizing. Moreover, as rich corporations, they can spend some of their profits on TV advertizing so as to maintain an image. I have suggested that intellectual property is contrary to human nature. Under the law a corporation is a virtual person, but corporations are not responsive to the drives of human nature. In a sense corporations are themselves contrary to human nature. Perhaps a problem with current law is that it fails to distinguish adequately between private individual use of intellectual property, and corporate and business use of intellectual property. There is a de facto distinction, in that it is rarely useful to file a lawsuit against individuals on these issues. Maybe the law should be moved in a direction more consistent with current practice. ------------------------------ Date: Fri, 23 Jun 95 14:09:15 EDT From: "W. K. (Bill) Gorman" <34AEJ7D@CMUVM.CSV.CMICH.EDU> Subject: File 7-- FBI to search 30,000+ US homes/businesses FBI plans to search upwards of 30,000 American homes and businesses were "leaked" in a VERY BRIEF mention on the Rush Limbaugh show 6/21/95. Mr. Limbaugh referred to a USA Today article, presumably of the same date, which referenced a newspaper in CT as the original source. According to the article, the FBI, apparently in anticipation of the passage of the Constitution-aborting Anti-Terrorism bill AND the equally totalitarian Exon "Communications 'Decency' Act" which has been attached to the Telecom Reform Act, has leaked plans to conduct SEARCHES OF THE HOMES AND BUSINESSES OF 30,000+ AMERICANS. Their rationale for this is the claim that these persons - now get this - MAY HAVE VIEWED some form of "child pornography", real or morphed, on their PC screens sometime in the past. Articles describing this totalitarian lunacy have also appeared in the Fort Wayne newspaperson 6/21/95. No mention of it that I am aware of from TV journalists. No guts, guys? Will the feds find it expedient to seize every single piece of computer equipment found in these homes, along with any firearms, cash, jewelry, other valuables or financial records, regardless of whether or not anything actually ILLEGAL is found? Past performance indicates that this is likely to be the case. How many innocent Americans will be killed in these raids? How many children? How many pets will be tortured to death for the amusement of those conducting the raid, as was the kitten which was stomped to death by a rogue BATF agent during the infamous Lamplugh raid, as revealed during testimony before the Senate Judiciary Terrorism Subcommittee? Why is anyone who would perform such a psychotic act permitted to hold a position of responsibility in government service or law enforcement? Has Congress lost all touch with reality? Are they TRYING to see how many ways they can find to force Americans into the burgeoning militias? Are they TRYING to make the appellation "jack-booted thugs" actually synonimous with all federal law enforcement personnel? W. K. Gorman <bj496@Cleveland.Freenet.Edu> Copyright (C) 1995 by W. K. Gorman. With explicit reservation of all rights, exclusively and without prejudice, per UCC 1-207. Any commercial or for-profit use of all or any part of this message, in any form, is expressly forbidden. Opinions are my own. ------------------------------ Date: Sun, 19 Apr 1995 22:51:01 CDT From: CuD Moderators <cudigest@sun.soci.niu.edu> Subject: File 8--Cu Digest Header Info (unchanged since 19 Apr, 1995) Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically. CuD is available as a Usenet newsgroup: comp.society.cu-digest Or, to subscribe, send a one-line message: SUB CUDIGEST your name Send it to LISTSERV@VMD.CSO.UIUC.EDU The editors may be contacted by voice (815-753-0303), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115, USA. To UNSUB, send a one-line message: UNSUB CUDIGEST Send it to LISTSERV@VMD.CSO.UIUC.EDU (NOTE: The address you unsub must correspond to your From: line) Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" On Delphi in the General Discussion database of the Internet SIG; on RIPCO BBS (312) 528-5020 (and via Ripco on internet); and on Rune Stone BBS (IIRGWHQ) (203) 832-8441. CuD is also available via Fidonet File Request from 1:11/70; unlisted nodes and points welcome. EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown) Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org In ITALY: Bits against the Empire BBS: +39-464-435189 In LUXEMBOURG: ComNet BBS: +352-466893 UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/ ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/ aql.gatech.edu (128.61.10.53) in /pub/eff/cud/ world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/ wuarchive.wustl.edu in /doc/EFF/Publications/CuD/ EUROPE: nic.funet.fi in pub/doc/cud/ (Finland) ftp.warwick.ac.uk in pub/cud/ (United Kingdom) JAPAN: ftp://www.rcac.tdi.co.jp/pub/mirror/CuD The most recent issues of CuD can be obtained from the Cu Digest WWW site at: URL: http://www.soci.niu.edu:80/~cudigest/ COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ------------------------------ End of Computer Underground Digest #7.53 ************************************