Computer underground Digest Wed Jan 16, 1996 Volume 8 : Issue 05 ISSN 1004-042X Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU Archivist: Brendan Kehoe Shadow Master: Stanton McCandlish Field Agent Extraordinaire: David Smith Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Cu Digest Homepage: http://www.soci.niu.edu/~cudigest CONTENTS, #8.05 (Wed, Jan 16, 1996) File 1--Cryptography and Privacy File 2--Justice Dept. press release: no PGP prosecution (fwd) File 3--FLASH: Phil Zimmermann case dropped! File 4-- CompuServe poetry File 5--Compuserve: "Shooting the Cyber-Messenger" File 6--Letter to Wiesenthal Cente in re "hate speech" ban File 7--News Release >> Child Safe Ratings on the Internet (fwd) File 8--AP/NYT: Jewish Groups Call for Internet Censorship File 9--Cu Digest Header Info (unchanged since 16 Dec, 1995) CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN THE CONCLUDING FILE AT THE END OF EACH ISSUE. --------------------------------------------------------------------- Date: Wed, 27 Dec 1995 15:00:46 -0600 From: Zachariah P. Babayco <address@missing> Subject: File 1--Cryptography and Privacy ((MODERATORS' NOTE: Mr. Babayco's was accidentally deleted from the forward. We apologize for the error. Although Phil Zimmerman no longer faces charges (see below), the following article provides a helpful background for those who've forgotten the central issues in cryptology controversy)). This work is Copyright (C) Zachariah P. Babayco 1995. Cryptography and Privacy During the past few years, the debate concerning electronic privacy has intensified greatly. As more and more information is being transmitted over electronic channels such as the Internet, the chances of interception become greater and greater. The main defense against this is the use of computer encryption products, which scramble the contents of a document so that only certain people can read it. A popular encryption program is Pretty Good Privacy, or P.G.P. Phillip Zimmermann, the creator of P.G.P., is currently under investigation by the government for exporting the program. Zimmermann gave his program away because he believes that people have the right to encryption, but government officials take the position that encryption is all right, but only if the they can read the private information if they need to. As computers are used more and more, electronic privacy will become extremely important. Cryptography is the science of creating codes that enable you and another person to communicate privately. It uses special mathematical formulas, called keys, that enable two or more people to communicate privately. The science of cryptography dates back to the time of Julius Caesar, who used a simple substitution method (letting the letter A equal C, B equal to D, and so on) to send messages to his generals in the field (Schwartau, 149). A more recent example of the use of cryptography is in World War Two, where both the Allied and the Axis forces employed codes to keep their secrets safe from the other side. There are numerous types of encryption methods, ranging from the simple substitution mentioned above, to complex mathematical formulas which would take supercomputers years to decode, but only two that concern this debate. The first widely used encryption system was the Data Encryption Standard, or DES. DES was created in the late 1970's, due to a growing concern over the security of electronic fund transfers and the confidentiality of government files (Encyclopedia Britannica). However, it is now showing its age and vulnerability. DES is a single key encryption system, where a single code key is used to encrypt a message. This means that whoever has a copy of the key can decrypt the message, so the legitimate users must take care not to let the key fall into the wrong hands. The only safe way to exchange a key between two people is to use a secure channel, such as a secure phone line, but as Phillip Zimmermann states, "If you have a secure channel for exchanging keys, then why do you need cryptography in the first place" (P.G.P. User's Guide)? DES is also vulnerable to advances in technology, as Winn Schwartau states in his book Information Warfare: Chaos on the Electronic Superhighway: (the following is an indented quote) In fact, the battle may be over now, because DES is breakable. At the March 1993 Data Security Conference, Dr. Martin Hellman presented a theoretical approach to cracking DES . . . .On August 20, 1993, Michael Wiener of Bell-Northern Research in Canada published a paper "showing how to build an exhaustive DES key search machine for $1 million that can find a key in 3.5 hours on average." (152) (the quote ends here) The second type, public key cryptography systems such as P.G.P., work differently than DES. With P.G.P., a person has two keys: a public key and a private key. The private key is kept on the person's home computer, while the public key can be given to whomever the person pleases. To send a private message to a friend with P.G.P., for example, the sender would encrypt the message with his friend's public key. The message is now unreadable except to his friend because only she has the corresponding private key (P.G.P. User's Guide). P.G.P. is a relatively new computer program, designed to provide privacy for its users. It works on the same principle that public key systems use, but has many more features. For example, a user can select the amount of security that P.G.P. provides - a small key is faster, but less secure; a large key provides the best security, but is slower. A user can also sign a message with his own secret key, making it impossible for someone to change the message. P.G.P. has had a short but eventful history. On April 16, 1993, Phillip Zimmermann, the creator of P.G.P., was preparing to release the initial version of P.G.P. when the government announced its own cryptographic product, the Clipper Chip. The Clipper Chip is also based on the public key system, but unlike P.G.P., it requires a copy of each secret key to be held in escrow, for use by law enforcement agents if they could demonstrate a need for it. Zimmermann completed P.G.P. and released it, hoping that it would be seen as a better alternative to Clipper. Within a short time however, somebody uploaded a copy of the program to the Internet, where it spread across the country, and around the world. Not too long after that, Zimmermann was visited by federal agents who informed him that he was now under investigation for "illegal export of munitions." (Holmes 56a). As of November 1995, Zimmermann is waiting for a decision. If he is indicted, he would have to serve a mandatory four to five year prison sen tence, and be fined $1 million. To the federal investigators, P.G.P. is seen as a violation of United States export law. The law, which was passed during the Cold War in the early 1950's, classified strong encryption products as munitions, like a bomb or an air-to-air missile, and placed heavy restrictions on their export. The law is still in place 40 years later, even though the Soviet Union is no longer a threat to our national security. When somebody made P.G.P. available on the Internet, the program was seen as a violation of this law (Holmes 56a). Federal officials are also concerned about P.G.P. because of its strength. While designing the program, Zimmermann decided to use an encryption algorithm called IDEA. Cryptographers have repeatedly tested the IDEA algorithm for years, and have found it, for the present, unbreakable (P.G.P. User's Guide). Law enforcement officials are concerned that if powerful cryptography is made widely available, criminals will take advantage of it. FBI assistant director James Kallstrom states that "We're in the business of criminal information . . . if we're closed off from that information, it will alter the balance between us and the criminals." (Levy 55). When the Clinton administration announced the Clipper Chip, one of their main points was that since encryption could be used by criminals, people and businesses should use Clipper because law enforcement agents would be able to listen in on the conversations if they suspected a crime was being committed. However, due to manufacturing problems with the chips themselves, lack of interest in the marketplace, and protest from over 40,000 Internet users (Levy 56), the proposal was withdrawn. The Clipper Chip is not the only governmental proposition concerning privacy. In 1991, several years before the Clipper proposal, the Senate Judiciary Committee considered attaching the following onto Bill 266, an anti-crime bill: (the following is an indented quote) It is in the sense of Congress that providers of electronic communications services and manufacturers of electronic communications service equipment shall ensure that communications systems permit the government to obtain the plain-text contents of voice, data, and other communications when appropriately authorized by law. (Schwartau 153-154). (the quote ends here) The Committee had apparently anticipated the arrival of the Clipper Chip, and attempted to make sure that future products would be able to use it immediately. Before the modified bill could me made into law though, the addition was removed because of protest by several civil liberty groups. Government officials also cite recent arrests that, in their eyes, justify the need for restrictions on strong cryptography. In September 1995, several people were arrested on America OnLine, an Internet provider. The people had been under investigation for several years and were suspected to be exchanging pornographic files through the service. When they were arrested and had their belongings searched, FBI agents found encrypted files on their computers. In a speech before the International Cryptography Institute on September 21, 1995, FBI Director Louis Freeh stated that ". . . We've seen this problem . . . the obstacle of encrypted records standing in the way of our lawful grand jury access procedures . . . ". Freeh also states that he is not suggesting that the government regulate cryptography, but simply be able to serve search warrants and court orders as they always have: "If we are foreclosed from these areas . . . the safety of this country will be impaired" (Freeh 9/21/95) At the other end of the spectrum are the pro-privacy and civil liberty groups. Some of these groups argue against governmental restrictions on cryptography by citing the First Amendment, the right to free speech, or the Fourth Amendment, the right to privacy. One organization, the Electronic Frontier Foundation, takes a legal approach to the issue. The EFF's goal is ". . . to ensure that the principles embodied in the Constitution and Bill of Rights are protected as new communications technologies emerge." (EFF World Wide Web Homepage) The EFF investigates civil rights cases involving computers, and argues against the cryptography issues and restrictions. The EFF was one of the main protestors that caused the Clipper Chip proposal to fail. Recently, the EFF has set up a defense fund for Phillip Zimmermann, and will soon be taking the federal government to court to argue against the export laws. For the present, the debate over encryption and privacy is going favorably for the activist's side. The Clipper proposal has been withdrawn, and the government is not planning to introduce another product anytime soon. However, Phillip Zimmermann could still go to jail, and the FBI is pushing for the ability to tap one out of every 100 telephone lines in every major American city. This debate is not over yet. Works Cited Andrews, Edmund L. "U.S. Plans to Push Giving F.B.I. Access in Computer Codes." New York Times (Late New York Edition) 5 February 1994: 1+. Arthur, Charles. "Identity Crisis on the Internet." New Scientist 11 March 1995: 14-15. "Cryptology." Encyclopedia Britannica. 1987 ed. "EFF to Defend Crypto Rights Legally." Electronic Frontier Foundation Home Page. October 1995: http://www.eff.org/ Freeh, Louis. "Speech Before The International Cryptography Institute." Federal Bureau of Investigation World Wide Web Site. 21 September 1995: http://www.fbi.gov/crypto.htm Grossman, Wendy. "Internet Encryption Ban Violates Free Speech." New Scientist 15 April 1995: 22. Holmes, Stanley. "A Question of Privacy." Rocky Mountain News 10 June 1995: 56a. Levy, Steven. "The Encryption Wars: Is Privacy Good or Bad?". Newsweek 24 April 1995: 55-6. Lewis, Peter H. "Software Author Focus of U.S. Inquiry." The New York Times (Late New York Edition) 10 April 1995: D6. ---, "Between a Hacker And a Hard Place." The New York Times (Late New York Edition) 10 April 1995: D1. "Privacy, Business, and the Internet." The New York Times (Late New York Edition 23 April 1995: 16. Quittner, Joshua. "Unmasked on the Net." Time 6 March 1995: 72-73. Schwartau, Winn. Information Warfare: Chaos on the Information Superhighway. New York: Thunder's Mouth Press, 1994. Sussman, Vic S. "Lost in Kafka Territory." U.S. News & World Report 3 April 1995: 32-3. Wayner, Peter. "Picking the Crypto Locks." Byte Oct. 1995: 77-80. Zimmermann, Phillip. PGP User's Guide. MIT: MIT Press, 1994. ------------------------------ Date: Thu, 11 Jan 1996 22:56:57 -0600 (CST) From: David Smith <bladex@BGA.COM> Subject: File 2--Justice Dept. press release: no PGP prosecution (fwd) San Jose Office (408) 535-5061 280 South First Street, Suite 371 San Jose, California 95113 FAX: (408) 535-5066 PRESS RELEASE FOR IMMEDIATE RELEASE January 11, 1995 Michael J. Yamaguchi, United States Attorney for the Norther District of California, announced today that his office has declined prosectution of any individuals in connection with the posting to USENET in June 1991 of the encryption program known as "Pretty Good Privacy." The investigation has been closed. No further comment will be made by the U.S. Attorney's office on the reasons for declination. Assistant U.S. Attorney William P. Keane of the U.S. Attorney's Office in San Jose at (408) 535-5053 oversaw the government's investigation of the case. ------------------------------ Date: Thu, 11 Jan 1996 14:36:09 -0800 (PST) From: Declan McCullagh <declan@EFF.ORG> Subject: File 3--FLASH: Phil Zimmermann case dropped! This is FABULOUS news! Please distribute widely! -Declan // declan@eff.org // My opinions are not in any way those of the EFF // Subject--Zimmermann case is dropped. Date--Mon, 8 Jan 1996 03:35:46 -0700 (MST) From--Philip Zimmermann <prz@acm.org> -----BEGIN PGP SIGNED MESSAGE----- My lead defense lawyer, Phil Dubois, received a fax this morning from the Assistant US Attorney in Northern District of California, William Keane. The letter informed us that I "will not be prosecuted in connection with the posting to USENET in June 1991 of the encryption program Pretty Good Privacy. The investigation is closed." This brings to a close a criminal investigation that has spanned the last three years. I'd like to thank all the people who helped us in this case, especially all the donors to my legal defense fund. Apparently, the money was well-spent. And I'd like to thank my very capable defense team: Phil Dubois, Ken Bass, Eben Moglen, Curt Karnow, Tom Nolan, and Bob Corn-Revere. Most of the time they spent on the case was pro-bono. I'd also like to thank Joe Burton, counsel for the co-defendant. There are many others I can thank, but I don't have the presence of mind to list them all here at this moment. The medium of email cannot express how I feel about this turn of events. -Philip Zimmermann 11 Jan 96 -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBMPDy4WV5hLjHqWbdAQEqYwQAm+o313Cm2ebAsMiPIwmd1WwnkPXEaYe9 pGR5ja8BKSZQi4TAEQOQwQJaghI8QqZFdcctVYLm569I1/8ah0qyJ+4fOfUiAMda Sa2nvJR7pnr6EXrUFe1QoSauCASP/QRYcKgB5vaaOOuxyXnQfdK39AqaKy8lPYbw MfUiYaMREu4= =9CJW -----END PGP SIGNATURE----- ------------------------------ From: "David Gersic" <A02DAG1@NOC.NIU.EDU> Date: Thu, 11 Jan 1996 23:27:22 CDT Subject: File 4-- CompuServe poetry THOUGHTS THE THOUGHT POLICE ARE COMING THEY'RE COMING TO TAKE ME AWAY IT SEEMS THAT CONGRESS DOESN'T LIKE WHAT I HAD TO SAY THEY READ MY MAIL AND SCANNED MY FILES AND WATCHED WHERE I HAD BEEN THEY CRAWLED THE WEB AND PEERED WITHIN THEY SAID MY SPEECH WAS SIN IT ALL BEGAN WITH A SIMPLE REQUEST "DO YOU LIKE SEX AS MUCH AS I?' BIG BROTHER SMILED HIS KNOWING SMILE AND HE BEGAN TO SPY THEY KNEW MY EVERY THOUGHT THEY KNEW MY EVERY DESIRE IT SEEMS MY CRIME FROM THEIR POINT OF VIEW WAS SENDING IT OVER THE WIRE YOU CANNOT FIGHT A MONSTER THAT IS MORE POWERFUL THAN YOU SO EVEN IF YOU WANT TO DON'T ASK SOMEONE TO SCREW THE THOUGHT POLICE ARE COMING THEY'RE COMING TO TAKE ME AWAY THE THOUGHT POLICE ARE COMING THEY DIDN'T LIKE WHAT I HAD TO SAY ====================================================================== David Gersic a02dag1@noc.niu.edu Do not believe in miracles; rely on them. ------------------------------ Date: Sun, 14 Jan 1996 15:20:50 -0500 (EST) From: "Declan B. McCullagh" <declan+@CMU.EDU> Subject: File 5--Compuserve: "Shooting the Cyber-Messenger" This article has some interesting information on how Compuserve went far beyond what was legally necessary. A German official says: He said the prosecutor, Manfred Wick, acting on his own volition is investigating pornography on the Net and during his investigation discussed the situation with CIS's management, whose offices are in Munich, but issued no threats, orders or warnings. -Declan ---------------------------------------------------------------------------- From http://www.d-comm.com/ SHOOTING THE CYBER-MESSENGER Has the Internet really become so much a reality that it is where World War III will be fought? And has the world become so small that the main combatants will be the cybernauts of the US and the government of Germany? Well, if Rambo-types in the US have their way, that is exactly what may be happening and it all began as a Christmas Eve surprise. The first many of us heard of it was that night in the following message in alt.censorship from Phil Reed: "Effective this weekend (apparently Friday night), CompuServe (CIS) has apparently begun blocking access ... to 'indecent' newsgroups, including the alt.sex.* hierarchy, alt.binaries.pictures.erotica.*, and other groups such as alt.politics.homosexuality. The timing is obvious; by doing it late on Friday before a long holiday weekend, they hope to slow the uprise of outrage." As we were to learn within the next few day, CIS banned some 200 newsgroups. Outrage against the company was immediate. A campaign to cancel accounts with the American company was begun. Theory had it, that CIS had caved in to the proposed Net censorship called for in the "Communications Decency Act" the US Congress looks ready to enact soon. However, a day or two later a press release from CIS appeared. It claimed, "The access to certain newsgroups was blocked by order of the German Government. They issued an ultimatum to block the newsgroups on THEIR list or get out of Germany." Within hours anti-German hatred was sprouting from all over the US as the Rambos came out from under their rocks. And within days (during which we learnt that the German authority referred to in CIS's statement was the Munich prosecutor), at least one such bigot was shouting, "This affair with the German (or Bavarian, as has been noted) government and CompuServe's immediate bowing to pressure cannot be tolerated. Protests should be lodged to *every* German-oriented newsgroup and web page you can find. If this goes unchallenged, we have lost the first battle in the coming war. Time now to pick up your guns and start fighting." While another shouted, "We will be leading an organised attack to take the city of Munich electronically next week -- mail-bombing by Americans is perfectly legal, and will be coordinated by the Viet-Nam veterans. If you have any good mail-bombs or viruses, drop me a note, and I will give you the anon address for the retired general who is doing this. It is all perfectly legal, and we are getting help from the Canadian and Australians. The AMERICAN REVOLUTION is NOW HERE! American ISPs against the Munich City Government! This is WAR! To protect the FatherLand and FREEDOM OF SPEECH!" Thomas Wulfing, a spokesman at the German Embassy, London, told d.Comm, "There have been no comments on the situation from the German national or the Bavarian governments. My latest information is that it was the Munich prosecutor who authorised this action. It's good that we clarify this thing. As far as I know the prosecutor has taken up that issue. He wants a way of banning the free access to pornography on the Internet and within that plan has informed CIS. And CIS as far as I know has agreed because it has no interest whatsoever in promoting pornography." He said the prosecutor, Manfred Wick, acting on his own volition is investigating pornography on the Net and during his investigation discussed the situation with CIS's management, whose offices are in Munich, but issued no threats, orders or warnings. Asked why Wick would be investigating porn on the Net considering Germany's more relaxed attitude towards sexually explicit material, Wulfing noted, "The limit in Germany is the age and of course the promotion of violence of child pornography. These types of things are strictly prohibited. The Age of Consent for sexual activities is 16, but to distribute that in print or film or whatever, it is 18." Asked about the threat of e-mail bombs and virus attacks from net nuts in the States, Wulfing told us, "I wasn't aware of these threats from the US. So I don't think the Munich or German authorities have taken action so far. Of course, if that story is going to be verified the German government takes it very seriously. Indeed it sounds very scary." So what's the real story? Just how did CIS, one of the world's largest Internet service providers come to ban 200 newsgroups? Detlef Borchers, a reporter in Germany, says according to a 22 November 1995 press release from the Munich Police Department, "the police were at the CompuServe office and they found material for further investigations. This is more than just Usegroups. It could be considerably more; some sources are claiming that a CompuServe employee was posting child porn." According to Borchers, CIS issued a statement the next day, 23 November. He says, "The relevant passage is the first: 'CompuServe and the police discussed and found a solution'. No legal action threat is mentioned in this statement. The solution was 'cleaning' the Newsgroups. Unfortunately, this worked only on one of the seven newsgroups servers CompuServe has -- the one which is serving the CIM-Software." Borchers adds that in the interim, "the German CompuServe management resigned. The new manager is supposed to be Mitch Wolfsson, now European Manager of MSN, who is not too eager to comment." So who's to be believed? The Munich and German authorities who claim to have only informed CIS that it was investigating kiddieporn on the Net, or CIS? It's difficult to know yet, but one does have to wonder. If CIS was told Mr Wick was investigating child pornography, why did it ban such newsgroups as alt.binaries.erotic.senior-citizens, alt.binaries.pictures.erotica.pregnant, alt.recovery.addiction.sexual and alt.recovery.sexual-addiction (both therapy groups), alt.sex.fetish.wrestling, alt.sex.reptiles, alt.sexy.bald.captains (about Star Trek's Capt Pecard), among many others which appear unlikely to deal in kiddieporn? The implications of CompuServe's capitulation go far beyond the boundaries of Germany's jurisdiction. The Internet is an ever changing medium with new sites and newsgroups appearing all the time. A service provider cannot guarantee that it has successfully denied access to all illegal sites. It may have identified all of these sites an hour ago, and successfully banned access to them, but since then, several may have moved locations while ten new sites may have been placed on the Web. The problem is worse still: what exactly must the service providers restrict access to? What about pornographic sites that should not be accessed by minors -- already highlighted by the German authorities as an important issue.? There is no way of knowing whether the user of the service is fifty or five years of age. The nett result: ban all access to pornographic material. If this approach were to be taken by the service providers, what would be the reaction of magazines such as Playboy and Penthouse, both of which have Web sites? The publishing houses would probably attempt to get a court order forcing service providers to allow access to their sites (except in a few notable countries where the magazines are still considered illegal). For the service provider, the whole process of providing access is becoming far too complex. The service provider is simply the messenger, not the provider of content, and as such there is no reason why the messenger should be shot. ------------------------------ Date: Fri, 12 Jan 96 22:15:33 PST From: jblumen@interramp.com Subject: File 6--Letter to Wiesenthal Cente in re "hate speech" ban This is the text of a letter I sent to the Wiesenthal center in response to their letter to Internet service providers, asking them to ban hate speech. I believe that the Center's letter to 2,000 Internet service providers (ISP's), as reported in yesterday's New York Times, represents an unfortunate choice by the Center to engage in activities harmful to free speech in this country. I am a Jewish businessman and attorney, resident in New York City. Since January 1995, I have used my leisure time to create and operate a Web site called The Ethical Spectacle (http://www.spectacle.org) which covers the intersection (or collision) of ethics, law and politics in our society. In June 1995, I published "An Auschwitz Alphabet" (http://www.spectacle.org/695/ausch.html) as a special issue of the Spectacle. It is a collection of resources and essays pertaining to Auschwitz, including quotations from Primo Levi, Elie Wiesel, Hannah Arendt and Tadeusz Borowski, photographs, a portion of the Passover service, and my own essay, "What I Learned From Auschwitz." In the months since then, I have received mail from several hundred people in the US, Sweden, England, Belgium, Australia, New Zealand and Canada, thanking me for the "Alphabet", reminiscing about family members who were victims of the Holocaust, and generally proving the potency of the Internet as a force for education and freedom. I am not in agreement with your request to ISP's to censor hate speech on their systems. Any censorship of speech ultimately boomerangs to injure good speech, and one of the tenets of what I call the "free speech rulebook" is that no-one--not the government, not Netcom, not the Wiesenthal Center--is godlike enough to decide for other people what speech may be heard. A few years ago, the Canadian Supreme Court accepted Professor Catharine MacKinnon's arguments that pornography not merely encourages, but IS, the oppression of women. I believe MacKinnon is correct in principle (as I very much believe the Wiesenthal Center is correct in principle) but look at the application: Canadian Customs now enforces the law selectively to ban gay speech and the angry feminist writings of MacKinnon colleague Andrea Dworkin, while the pornography business continues on as before. I understand that the First Amendment only protects speech against government action. Rabbi Hier's speeches, and his testimony to the Senate on the bomb recipe bill, contain at least pro forma recognition that the First Amendment protects hate speech. But by calling on ISP's to band together to ban hate, you are asking them to constitute themselves a private government. The First Amendment no longer means anything when private action ensures that disfavored views cannot gain access to the means of communication. I make a distinction for access providers such as Compuserve, Prodigy, and America Online. They are the electronic equivalent of bookstores, as the Cubby v. Compuserve case established, and have a right to decide what "books" to carry. But ISP's such as Netcom and Interramp provide nothing more than a wire to the Internet. The inevitable direction the law must take, if we value free speech in this country, is to treat these ISP's as common carriers. Contrary to your request that they "edit" the speech they carry, it is imperative that they have no right whatever to do so. The development of telegraphy in this country provides a significant precedent. Western Union abused its monopoly by refusing to carry cables from reporters to their newspapers, seeing them as competition for its own wire service business. The Congress responded by declaring Western Union a common carrier, forbidding it from determining which speech can be carried over the wire. If ISP's respond to your letter and get in the habit of shutting off hate speech, history and human nature dictates that this authority will later be used to ban speech about feminism, abortion, radical politics or whatever else is the "bete noir" of the moment. An ISP which has the right to refuse to carry the Institute for Historical Review can exercise that right just as easily to refuse the Wiesenthal Center access to the Internet. To paraphrase Count Talleyrand, your request to ISP's was not only morally wrong, but also a mistake. Hate speech on the Internet, though vile and distressing, is fragmented and in plain sight, where it can be monitored and answered. Numerous Internet sites, like yours, the Nizkor Project and the Ethical Spectacle, exist to answer hate speech. If ISP's comply with your request, one of two things will happen. Either hate speech will go completely underground, becoming more mysterious, attractive and powerful to its audience because forbidden. Or, what is even more likely, hate groups will simply band together to create their own ISP, providing all their foul ideas from one easily accessible menu. You will then be in the position of having to fall back to a call for government censorship. Free speech is the cornerstone of liberty. The only security lies in John Milton's stand, taken in The Aeropagitica, his essay to Parliament about the licensing of printing presses and books: "Prove all things, hold fast that which is good." ----------------------------- Jonathan Blumen The Ethical Spectacle http://www.spectacle.org ------------------------------ Date: Thu, 11 Jan 1996 22:41:08 -0600 (CST) From: Avi Bass <te0azb1@corn.cso.niu.edu> Subject: File 7--News Release >> Child Safe Ratings on the Internet (fwd) ---------- Forwarded message ---------- Date--Thu, 11 Jan 1996 20:41:41 -0400 From--ted resnick <tedres@mckinley.com> Subject--News Release >> Child Safe Ratings on the Internet THE MCKINLEY GROUP SAYS GREEN LIGHT MEANS GO New Green Light Icon to Appear on all Web Sites Not Containing Material Apparently Intended for Mature Audiences SAUSALITO, CA (January 9, 1996) - In response to the increasing concern over the accessibility of Internet sites containing offensive or inappropriate content for the broader audience, The McKinley Group announced today that it has positioned a Green Light icon to appear next to descriptions of all the reviewed Web sites in its Magellan Internet Directory <http://www.mckinley.com> that were free of adult-only material at the time of review. Magellan is the first Internet Directory to offer this "safe sites" screening feature. "The Green Light category is a valuable extension of the unique rating and evaluation system that has been developed by the McKinley Group," said Sandra Treacy, director of San Francisco School Volunteers. "Given the unregulated nature of Internet content, this feature will prove to be a widely used indicator for parents, teachers, children and the average user." In addition to the Green Light designation, Magellan gives users a thorough review of individual Internet sites and rates them using a unique system. Rated sites are awarded one to four stars for overall quality, based on depth, organization, and 'net appeal' (is it innovative, funny, hip, cool or thought-provoking). Please bookmark The Magellan for future reference. You can also find a more in-depth account of our Green Light Sites at http://www.mckinley.com/mckinley-txt/246.html#greenlight Have a good one! Ted Resnick ------------------------------ Date: Wed, 10 Jan 1996 07:33:47 -0800 (PST) From: Declan McCullagh <declan@WELL.COM> Subject: File 8--AP/NYT: Jewish Groups Call for Internet Censorship Now that the cravens at Compuserve have acquiesced to one censorship attempt, more will be forthcoming. Not a slippery slope as much as a domino effect. I'm amused that Mr. Giles from Compuserve has had a sudden change of heart. -Declan ----------------------------------------------------------------- Jan 9 -- BOSTON (AP) -- White supremacist groups that once spread their racist messages at rallies and in leaflets are now going high-tech on the Internet -- a trend a leading Jewish human rights group wants to stop. The Simon Weisenthal Center on Tuesday began sending hundreds of letters to Internet access providers asking them to refuse to carry messages that ``promote racism, anti-Semitism, mayhem and violence.''... The Internet allows users to ``show the whole world what's wrong about what the hate speakers are saying,'' said Mike Godwin, staff counsel for the Electronic Frontier Foundation, a civil liberties group dealing with computer communications. ``The correct place to try and put pressure is on the people who create the content, not the person who provides access to it,'' said CompuServe spokesman William Giles. The roughly 250 hate groups in the United States, whose previous methods reached a limited audience, now ``have a magnificent marketing technology dumped in their laps,'' said Rabbi Abraham Cooper, associate dean of the Weisenthal center, based in Los Angeles. ``They are able to dress up their message in a way that looks ... presentable.''... Prodigy spokesman Brian Ek said the service does employ systems operators who monitor content on its proprietary bulletin boards and can remove any messages with ``blatant expressions of bigotry, racism or hate.'' --------------------------------------------------------------------- Forwarded from IP: UNITED STATES 3 Wednesday, Jan. 10, 1996 Jewish Group Seeks Internet Restraints Citing "the rapidly expanding presence of organized hate groups on the Internet,'' a leading Jewish human rights group Tuesday began sending letters to hundreds of Internet access providers and universities asking them to refuse to carry messages that "promote racism, anti-Semitism, may-hem and violence.'' The letter from the Simon Wiesenthal Center, a 425,000-member organization based in Los Angeles, is the latest in a growing effort by legislators and private interest groups to censor offensive material on the global data network, which now connects millions of computer users worldwide. "Internet providers have a First Amendment right and a moral obligation not to provide these groups with a platform for their destructive propa-ganda, '' Rabbi Abraham Cooper, the center's associate dean, wrote in the letter that was sent to Internet service providers. Rabbi Cooper said the group's target was not the many discussion forums where individuals debate such topics as whether the Holocaust actually oc-curred, but rather the Internet's World Wide Web. Dozens of groups, from white supremacists to anarchists, have pub-lished documents on the Web about their points of view. Some are revi-sionist histories questioning whether there was a Holocaust and some are racist tracts denigrating blacks, Jews, homosexuals and other minorities. By PETER H. LEWIS ------------------------------ Date: Sun, 16 Dec 1995 22:51:01 CDT From: CuD Moderators <cudigest@sun.soci.niu.edu> Subject: File 9--Cu Digest Header Info (unchanged since 16 Dec, 1995) Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically. CuD is available as a Usenet newsgroup: comp.society.cu-digest Or, to subscribe, send post with this in the "Subject:: line: SUBSCRIBE CU-DIGEST Send the message to: cu-digest-request@weber.ucsd.edu DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS. The editors may be contacted by voice (815-753-0303), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115, USA. To UNSUB, send a one-line message: UNSUB CU-DIGEST Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU (NOTE: The address you unsub must correspond to your From: line) Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" On Delphi in the General Discussion database of the Internet SIG; on RIPCO BBS (312) 528-5020 (and via Ripco on internet); and on Rune Stone BBS (IIRGWHQ) (203) 832-8441. CuD is also available via Fidonet File Request from 1:11/70; unlisted nodes and points welcome. EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown) Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org In ITALY: ZERO! BBS: +39-11-6507540 In LUXEMBOURG: ComNet BBS: +352-466893 UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/ ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/ aql.gatech.edu (128.61.10.53) in /pub/eff/cud/ world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/ wuarchive.wustl.edu in /doc/EFF/Publications/CuD/ EUROPE: nic.funet.fi in pub/doc/cud/ (Finland) ftp.warwick.ac.uk in pub/cud/ (United Kingdom) The most recent issues of CuD can be obtained from the Cu Digest WWW site at: URL: http://www.soci.niu.edu/~cudigest/ COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ------------------------------ End of Computer Underground Digest #8.05 ************************************