Computer underground Digest    Tue  Jan 30, 1996   Volume 8 : Issue 09
                           ISSN  1004-042X

       Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU
       Archivist: Brendan Kehoe
       Shadow Master: Stanton McCandlish
       Field Agent Extraordinaire:   David Smith
       Shadow-Archivists: Dan Carosone / Paul Southworth
                          Ralph Sims / Jyrki Kuoppala
                          Ian Dickinson
       Cu Digest Homepage: http://www.soci.niu.edu/~cudigest

CONTENTS, #8.09 (Tue, Jan 30, 1996)

File 1--Bernie S. 1/26 hearing
File 2--Default gateway to .fidonet.org going down (fwd)
File 3--The "Space" of Cyberspace (fwd)
File 4--Privacy in the Workplace
File 5--Cu Digest Header Info (unchanged since 16 Dec, 1995)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

---------------------------------------------------------------------

Date: Tue, 30 Jan 1996 05:50:36 -0500 (EST)
From: Emmanuel Goldstein <emmanuel@2600.COM>
Subject: File 1--Bernie S. 1/26 hearing

The events of 1/26/96 were about as unbelievable as the events that
have transpired throughout this case. The only positive development
is that more people are slowly starting to realize what's happening.

Two and a half hours after the sentencing was to be held, the judge
arrived in the courtroom. His demeanor seemed significantly more
upbeat and open than his previous appearances. Perhaps this had to
do with the fact that Ed's lawyer and members of the press were in
attendance. The judge allowed everyone involved in the case to speak:
Probation Officer Scott Hoak, Haverford Township Detective John K.
Morris, Secret Service Agent Thomas L. Varney, Ed's attorney (Ken
Trujillo), and Ed himself.

Throughout the hearing, the main issue was whether or not Cummings
was a threat to the community. Varney was adament in his assessment
of Cummings as a danger but when pressed by Trujillo could come
up with nothing more substantive than the books found in Cummings'
home. These books came from publishers like Loompanix and dealt
with such things as making bombs and establishing false identities.
The other damning evidence was a list of Secret Service frequencies
(from an issue of Monitoring Times), a copy of a magazine article
that listed Secret Service codenames for President Reagan (dated 1983),
and a material that the Secret Service had suspected was C4 but which
later turned out not to be. For some reason they feel compelled to
mention this at each hearing as if C4 had actually been found when in
fact the substance was something dentists use to mold dentures (the
owner of the house was a dentist).

Trujillo successfully managed to get Varney to admit that no guns or
explosives of any sort were found. No evidence was presented to indicate
that Cummings was ever a threat of any sort to anybody. What's more,
Cummings proved his responsibility by immediately getting a job after
the Secret Service locked him up for most of last year and also by
dutifully showing up for each hearing that was scheduled in Easton,
even though the threat of more prison time loomed.

Cummings apologized to the court for his "odd curiosity" of the past,
insisting that he merely collected books and information and never
caused harm to anyone. His lawyer pleaded with the judge to allow
Cummings to pick up the pieces of his life and not be subjected to
any more inhumane treatment.

In the end, the judge was not interested in whether or not Cummings
posed a threat. He saw a probation violation and therefore withdrew
the probation. Sentencing was postponed to March 5th. But the judge
showed some compassion. He lowered the $250,000 bail to $100,000.

Currently Cummings is imprisoned in the maximum wing of the prison
where people with the highest bail are kept. He's with murderers and
rapists. Conditions are appalling. One of the prisoners is on death
row - his name is Joseph Henry and he bit off a woman's nipples and
clitoris before strangling her with a slinky. These are the kinds of
people the Secret Service has condemned Cummings to be with.

When Cummings was originally put on probation years ago, the probation
officer told him he thought the whole thing was a big waste of time.
The only thing he was accused of, after all, was taking batteries out
of a tone dialer that a cop was questioning him about. And the really
ironic part was that Cummings wasn't even the person who took the
batteries out - it was one of his friends. But he was not about to
turn a friend in for something so absurd. After all, this was a very
minor thing - he paid a fine of nearly $3,000 and was put on probation
and that was it.

When the Secret Service threw Cummings in prison for possession of
a red box in early 1995, they knew he could be screwed again when he
finally got out since being arrested is a probation violation. And
Special Agent Thomas Varney spent a great deal of effort to see that
this is exactly what happened. He made multiple trips to Easton and
convinced the local authorities to lock Cummings up as if he were the
most sadistic of killers.

On Friday, Cummings' probation officer did an aboutface and told the
court that he thought Cummings represented a very great danger to the
community. Outside the courtroom, he and the other local law enforcement
people crowded around Varney like kids surrounding a rock star. He was
their hero and maybe one day they would be just like him.

It would be good to say that the press showed up and the rest of the
world finally got to see one of the greatest injustices perpetrated
by the Secret Service. But the only headlines to come out of this
charade said things like "Judge Hangs Up On Phone Hacker - Bail
Revoked After He Continues To Commit Telecom Fraud". Not only has
Cummings never been convicted of any kind of fraud - he's never
even been accused of it. This is a case based entirely on perceptions
and a sick vendetta by a government agency that has turned into a
genuine threat against free thinking people everywhere.

When Cummings is sentenced on March 5th, he could be put into prison
for years. This is what the Secret Service will attempt to ensure.
They have to be stopped and they have to be held accountable for what
they've already done. We need to be able to protect individual rights
against this kind of abuse and so far we have all failed miserably.
We have little more than a month to get it right.

------------------------------

From: "David Gersic" <A02DAG1@NOC.NIU.EDU>
Date:          Sat, 27 Jan 1996 22:45:21 CDT
Subject: File 2--Default gateway to .fidonet.org going down (fwd)

                            --- (fwd) ---



                  *** The Free Ride is Over! ***
                      =====================

Effective March 1, 1996,  the Internet Gateway at 1:1/31 will
be *shutting down*.  At that point, there will be NO MORE "default"
gateway for E-Mail coming INbound from the Internet for Zone-1.

The reasons for this termination of service are numerous ...

 o Most recently, an excommunicated SysOp has gone on a rampage of
   forging subscription messages to subscribe numerous FidoNet addresses
   to numerous unwanted Internet mailing-lists in a deliberate attempt
   to "break" the FidoNet routing structure and the gateway structure.
   Many of the other gateways have already shut down operations.

 o Many of the *C routing systems have taken it upon themselves to
   either "bounce" (many doing it improperly addressed) or to
   deliberately "bit-bucket" NetMail coming from the gateway.
   I can no longer deal with the voluminous NetMail being received
   from End-Nodes querying what has happened to their inbound E-Mail
   coming thru the gateway.

 o The gateways systems and the "f###.n###.z#.fidonet.org" address
   syntax was designed for "casual mail", not for subscribing to
   massive mailing-lists and such.  Many people have found ways to
   deliberately by-pass the controls at the gateways and subscribe
   to mailing-lists, forcing the inbound traffic to route in thru
   the gateways and clogging up the FidoNet routing structures.
   These days, it is fairly easy and inexpensive to get an account
   with any of the many Internet Service Providers thoughout the
   country.  Those that really need to subscribe to mailing-lists
   should go that route.

 o The original intent of setting up the .fidonet.org domain was to
   have gateways situated geographically close to the Nodes they
   serve so that the load would be distributed and routing problems
   on the FidoNet side would be reduced.
   As of this writing, there are only 34 Nets out of the 431 Nets
   in Zone-1 which have their INbound E-Mail coming in via gateways
   other than the "default" gateway.  The existing gateway operators
   and gateway software authors have always been willing to help
   a new gateway with their setup.  The *Cs at the Net level just
   haven't done their part to strive for getting local gateways in
   place in their Nets.  It just doesn't seem fair to me to keep
   relying on ONE gateway and the Backbone routing structure to handle
   over 90% of the Zone's traffic, does it?

 o People have been writing software which does NOT conform to
   proper addressing specs which have severly impacted operations
   of the gateway without even consulting me or even letting me
   know that their programs exist.

 o I find that I no longer have the time nor inclination to keep
   supporting a gateway where folks continue to break the rules
   of its use and bypass the controls.
   FidoNet in general has taken this service for granted for far too
   long.  People seem to feel that Free use of Internet E-Mail is
   something they get automatically when they are granted a Node Number
   in FidoNet.

 o The I.E.E.E., the organization who has been providing the resources
   and bandwidth for the flow of all this traffic can no longer
   support the endeavor.

Some services *will* CONTINUE to be provided ...

 o The Domain-Name-Service, which tells the Internet world where to
   send traffic for destinations within the .fidonet.org domain
   (and which defines which addresses are 'valid') will continue
   to be operated.  However, the "default MX-record" which sent
   all undefined traffic for those Nets which did not otherwise have
   another gateway declared, will be DELETED!

 o We will continue to operate the DNS until such time as the InterNIC
   removes the .fidonet.org domain.
   Since the InterNIC will expect and annual service fee of $50.00 for
   the domain in March, it is possible that the .fidonet.org domain
   may dissappear.  I do not plan on paying this fee out of my own
   pocket.

 o We will continue to operate the gateway at 1:13/10 (our other
   gateway address) on a REGISTERED-ONLY basis.  This means that
   there will be a process whereby INDIVIDUAL Zone-1 Nodes will be
   able to Register to use the gateway and have an Internet address
   assigned.  Incoming E-Mail for all REGISTERED systems will be
   packed on HOLD and must be picked up by direct Poll.
   NOTHING will be routed via the Backbone (except Bounces back
   to UNregistered Nodes).
   (Please see instructions below for Registering to use 1:13/10)


          How to Register to use the Gateway at 1:13/10
          ---------------------------------------------

To register your system to use the gateway services at 1:13/10,
simply send a File-Request for REGISTER to 1:13/10.
This will pass your Primary address into a function process that will
dynamically re-configure the related configuration files and routing
during the next hourly update process.  After that, you should be able
to use the gateway and any E-Mail coming INbound from the Internet will
be packed on *HOLD* at 1:13/10 for your system to pickup.

Note that your system is assigned a special address, which is NOT
in the old 'f###.n###.z#.fidonet.org' syntax.  Do NOT advertise
that address as it will NOT be valid.

Point systems may NOT register and may NOT use this gateway.

                                Burt Juda
                                  Postmaster/Hostmaster

   (Feel free to distribute this as widely as possible)

------------------------------

Date: Sat, 02 Dec 95 15:32:15
From: Jim Thomas <jthomas@sun.soci.niu.edu>
Subject: File 3--The "Space" of Cyberspace (fwd)

 --- fwd message ---

Date--Tue, 28 Nov 1995 21:21:00 -0600
From--lemaitre monique j <tc0mjl1@corn.cso.niu.edu>
Subject--The "Space" of Cyberspace

This is a very long text, so you may want to press the "D" button (the
author's name and address appear at the end.)  I thought it was
relevant to several themes which appeared briefly on the list such as
the "gender-lessness" of the NET...It also brought back echoes of
Gilles Deleuze whose untimely death a few weeks ago was never
mentioned on this list...Saludos!ML.


THE "SPACE" OF CYBERSPACE: Body Politics, Frontiers and Enclosures

The following comments were prompted by the reading of Laura Miller
"Women and Children First: Gender and the Settling of the Electronic
Frontier", one of the essays in James Brook and Iain A. Boal,
RESISTING THE VIRTUAL LIFE: The Culture and Politics of Information,
San Franciso: City Lights, 1995.  Miller's essay is the first and only
one I have read after buying the book.  I was drawn to it by the
circumstance that I have been revising an essay of my own on the
terrain of electronic communication in the Zapatista struggle for
autonomy and democracy.  In my own writing I had used the metaphor of
the "frontier" and for that reason was curious about Miller's essay.

Miller's essay critiques the metaphor of "frontier" as part of a
discussion of how the assumption that traditional gender roles are
simply reproduced in cyberspace might help provide a rationale for
state regulation.  Her point of departure is the word "frontier" in
the name of the "Electronic Frontier Foundation", a well-known
institution that argues for self-regulation and fights against
government interference in cyberspace.  She makes two
arguments which interest me.  First, she argues that the adoption of
the metaphor of "frontier" is a problematic extension of the
traditional American spacial concept to what is actually a non-spacial
phenomena: The Net. Second, she warns that applying traditional
American notions of the "frontier" --such as those embodied in
classical Western narratives-- risks an unconscious reproduction of
the social roles (gender) characteristic of those notions.

Spaceless cyberspace?

With respect to the first of these arguments, she writes: "The Net on
the other hand, occupies precisely no physical space (although the
computers and phone lines that make it possible do).  It is a
completely bodiless, symbolic thing with no discernable boundaries or
location. . . . Unlike land, the Net was created by its pioneers." (p.
51)  She also refers to the Net as "an artifact" (p. 51) and as
"incorporeal" (p. 57).  While this concept of the Net fits in nicely
with the title of the book in which the essay appears (Resisting the
Virtual Life), the rest of her essay demonstrates how its formulation
misleads.

The problem with the characterization is that it treats the Net as if
it were a system of machines (computers and phone lines) whereas it
has only existed and only continues to exist in the communicative
actions of the humans who created and continue to recreate it.  This
particular system of machines is just like any other system of
machines: a moment of human social relationships.  While the machine
system is truly an "artifact so humanly constructed", the machine
system is not "the Net"; it is only the sinew or perhaps the nervous
system of a Net constituted by human interactions.  As an evolving
series of human interactions the Net occupies precisely the space of
those participating human beings. Humans as corporeal beings always
occupy space and their personal and collective interactions structure
and restructure that space.  One of the things that discussion of
cyberspace requires is a recognition of its "body politics"
--something Miller clearly understands in the later part of her essay
although she doesn't bring it to bear in this characterization of the
Net.

While arguing against the overstatement of women's vulnerability to
aggression on line, she points to important differences between
"cyber-rapists" and real rapists. "I see my body", she writes, "as the
site of my heightened vulnerability as a woman.  But on line --where I
have no body and neither does anyone else-- I consider rape to be
impossible."  But of course, she does have a body and when she is on
line her body is seated in front of a computer terminal, alone or in
company, comfortably or uncomfortably, with her fingers punching a
mouse button or banging on a keyboard, her eyes more or less glued to
the screen and her mind flickering back and forth from the images on
the screen to the rest of her physical existence.   The very real
"corporality" not only of the Net but of all computer work has been
pointed out by all those concerned with the various ways in which the
use of computers has involved very real bodily harm.  (This issue is
apparently treated in the same book in a separate essay by Dennis
Hayes on "Digital Palsy".)  The most immediately salient aspect of
Miller's body's situation, however, is that it cannot be touched
physically by any would-be cyber-rapists --except through the
mediation of typed words and her reception of them, which she
considers ought to be and are in fact under her control.  In her
vigorous argument that a great many women are quite able to hold their
own in "the rough and tumble of public discourse" --and that women who
can't should learn to--  she suggests ways in which women's activities
on the Net are actually "blurring" and thus overcoming crippling
gender divisions rather than reproducing them.  Thus in the very midst
of her central argument about gender, Miller's argument implicitly
recognizes that the Net constitutes a set of interrelationships among
bodies, a mediated and relatively "safe" set, but a set of
relationships among bodies nevertheless.

Herein can be found one obvious source of the appeal of spacial
concepts such as cyber"space" or "frontier".  In as much as the Net
only exists as active human interactions, humans necessarily
experience their activity on the Net in terms of their own sensual
activity (which only exists in space) interacting in a mediated way
with that of others.  The immediate "space" of the Net is not even all
that hard to define. It consists of the local spaces of participation
in the Net and everything that connects them, not just the
telecommunications technologies but the interactions themselves.  The
form of the interaction matters in understanding its character, its
advantages and limitations, but that is true in ALL forms of human
interaction as those who study them are well aware.  Those local
spaces and even those connections can quite definitely be "locatable"
in time and space.  The problem of "boundaries" appears only when we
begin to study the "space" of the Net as including not only those who
participate directly but those who participate indirectly: those
working in the computer and telecommunications industry, those
influencing or influenced by the participants of the Net, those
standing "outside" of it but worrying about it, commenting on it,
trying to ignore it, and so on.  The treatment of the Net as
"incorporeal" just won't do.  The complexity of the space which it
constitutes calls for analysis as well as body and social politics.
Miller knows this even if she doesn't like the spacial metaphors; her
essay is a form of participation in those social politics.  I would
just argue that such metaphors ARE helpful. Like any metaphor they
have their limitations --which is why we use so many different ones.
But, by focusing our attention on many of the very real, quite
material aspects of the Net, they help us think about this new
fluctuating set of human activities, their interactions, dangers and
opportunities.

Frontiers

The second aspect of her argument, in which she critiques the
treatment of historical, geographical frontiers in American popular
culture, I read as essentially an argument about ideology.  She wants
us to think about how the old Western frontier was perceived and
conceptualized in order to get us to think more deeply about the use
of the concept "frontier" vis a vis the Net.  While I find her
critique a rich and useful one, I also think that beyond the issue of
ideological representations there is the question of other,
non-ideological, historical parallels between the Western frontier and
current "frontiers" in cyberspace.

Her first concern is the image of the frontier as space of freedom.
She writes "The frontier, as a realm of limitless possibilities and
few social controls, hovers, grail-like, in the American psyche, the
dream our national identity is based on, but a dream that's always,
somehow, just vanishing away. . . . For central to the idea of the
frontier is that it contains no (or very few) other people --fewer
than two per square mile according to the nineteeth-century historian
Frederick Turner.  The freedom the frontier promises is a liberation
from the demands of society . . ." (pp. 50-51)  She then goes on to
argue that the Net is so full of people that it "has nothing but
society to offer" (p. 51) and therefore the use of the concept of
frontier to talk about the Net is inappropriate.

The problem with this conceptualization is that it is a very
culturally biased misrepresentation of the Western frontier.  It's not
that Turner was wrong about population density but that the
characterization ignores the social dynamics of the frontier.  In the
first place, as Miller mentions, the frontier was a "frontier" only
for the European invaders; it was already inhabited by the indigenous
peoples of the Americas.  Moreover, as historical works on their
cultures have made clear, the frontier was densely inhabited --given
the character of their ways of life.  With hunting and gathering and
shifting agriculture much larger physical space is required on a per
capita basis than in human societies based on sedentary agriculture
and urbanized trade and industry.  The view of the frontier as "empty"
space was definitely that of the invaders moving West out of an
increasingly urbanized capitalist society and was a view that either
failed to understand the indigenous culture or dismissed it as
invalid.  If the indigenous would "sell" the land and move out quietly
the market would serve.  More frequently, the armed might of the state
was used to drive them out.

Beyond this question of perspective (European versus indigenous), the
material underpinnings of the view of the frontier as an "empty" space
into which one can escape "from the demands of society" requires more
analysis than Miller gives it.  It was more than an ideological
construct.  It might be seen as expressing the views of individuals,
either anti-social or just adventurous, who did "go West" to escape
various "demands of society".  For the individual trapper or hunter,
for instance, the land might well have appeared "empty".  However, it
seems more likely that such lone wanderers frequently met and
interacted with the existing indigenous peoples and one of the
reccurrent themes of both history and myth is how they often crossed
over to participate in these very different cultures.  This was
apparently as true of gauchos in the Argentine pampas as it was of
mountain men in North America.  In colonial language, they "went
native".  Even Hollywood has repeately woven this theme into its
cinemagraphic treatments of the frontier; a film like Dances with
Wolves being a recent example.

Setting aside this source of the view of the frontier as "emptiness",
we should recognize that the colonization of the frontier by invaders
from the East was very much a social process.  The vast majority of
people who "went West" did so in groups --in families, in wagon
trains, by the boatload, or trainfull--with the object not only of
getting land, but of building and participating in new communities.
The totally isolated trapper or homesteading family was the exception,
not the rule.  Even when farms or ranches were large, the local
neighbors and town formed a social context for family activity.  After
the very first "settlers", the vast majority of those who colonized
"the frontier" took land immediately adjacent to that which was
already taken, not in the midst of some lost, pristine wilderness.
The classic Western narratives that Miller refers us to have often
portrayed just such sociality.  The usual experience of the pioneer
colonizer of the West was not of "emptiness" but of collective
activity, of people working together to found new communities.  When
Miller writes "Unlike real space, cyberspace must be shared.", she is
misrepresenting the reality of the frontier in which much of the
social dynamics of the Westward movement involved the sharing of
space, not with the indigenous for the most part, but among the
colonizers themselves.

More to the point, perhaps, with respect to the Western frontier as
with the electronic frontier, is the notion of "escaping" from the
"demands of society".  When taken at a social rather than individual
level, the history of the European colonization of the West can be
seen to have involved a great deal of movement "away from" the
hardships, repression and exploitation of capitalism which emerged in
the Atlantic basin.  American ideology celebrates escape from
religious persecution, but that was interwoven with other
persecutions.

A great many of those who "went West", whether across the ocean or
across the American continents, did so because their lands had been
stolen by others.  That theft was accomlished to a considerable degree
through processes of "enclosure" of the land in which its one-time
inhabitants were driven out.  This was part of what Marxists call
"primitive accumulation", i.e., the genesis of new class relations
based on excluding the possibility of self-determination for most
people so that they would be forced to prostitute themselves in the
emerging capitalist labor market.  Others emmigrated because the new
conditions of both economic and political life in industrializing
European (and then American) cities were so hard.  Low wages and awful
living conditions could drive families West for land.  So too could
political repression, such as that which followed the 1848 revolutions
in Europe, lead people to seek elsewhere for better opportunities.

The "demands of society" which such immigrants were escaping were not
simply those of living together, but were the demands of an untamed
capitalism for their life energies under oppressive conditions which
often killed.  This was part of the actual history of the "Western"
frontier, not just an ideologically constructed myth.  The dream of
"limitless possibilities and few social controls" is certainly part of
the enduring myths of the "American psyche".  But the myth endures
precisely because realization of the dream has demanded an open-ended
social situation for which generations have fought and struggled.

Although I have made no systematic study of the "classic Western
narratives" to which Millar alludes, it seems to me rather rare that
"the frontier is [portrayed as] a lawless society of men . . . [a]
romance of individualistic masculinity".   With the affirmation that
Hollywood films and Western novels pay homage to "individualistic
masculinity", I would agree.  On the other hand, I find it difficult
to think of films that deal purely with a "lawless society of men"
--with the possible exception of Sergio Leone's spagetti Westerns.
Even films like the Wild Bunch --in which the central group is both
lawless and masculine-- such activity is situated within a larger
social setting so that the Wild Bunch appear as pathological misfits.
Miller juxtaposes the "frontier" and "civilization", associating the
later with the arrival of women and children.  But as indicated above,
for the most part men and women and children arrived together.  The
"frontier" was the frontier OF civilization, its cutting edge, its
invading intrusion into other people's life spaces.  I also find her
analysis of the portrayal of the gender dynamics of many Western
narratives quite accurate:  the presentation of women and children as
victims or potential victims, needing to be protected (and dominated)
by men. But in describing and analysing these relationships, Miller
passes over to the analysis of social dynamics --especially between
men and women-- and leaves the whole issue of the "emptiness" of the
frontier behind.

In terms of thinking about the process of pushing out the "frontiers"
of cyberspacial civilization, I think the most important thing about
the parallel with the Western frontier is the central process of
creation.  Miller notes that "Unlike land, the Net was created by its
pioneers."  Yet, one of the appeals of the metaphor of the frontier is
just this myth --and reality-- of creation.  In the case of the
Western frontier, no new piece of the earth was created whole cloth.
Those who went West because their own lands had been "enclosed" in the
East, imposed a new set of enclosures on the land of Native Americans.
Nevertheless, it was certainly true that from the point of view of the
colonizers, they created a "new land".  They did this by transforming
the land from a state that supported hunting and gathering cultures to
one that supported sedentary agriculture and urbanization.  The "land"
of capitalist civilization was not the same "land" as that of the
indigneous people.  A plowed and fertilized field is not a prairie.  A
town organized physically by fixed buildings is not a "camp" set up
for a season by a geographically mobile tribe. The social and
political life of fields and towns is clearly not the same as that of
indigenous cultures.  For good or bad, not only a new kind of land was
created but also a new kind of society.  The fact that this "creation"
amounted to a "destruction" from the point of view of the indigenous
doesn't wipe out the process of creation, it only critiques it.

"The frontier", Miller writes, "exists beyond the edge of settled or
owned land.  As the land that doesn't belong to anybody (or to people
who 'don't count' like Native Americans), it is on the verge of being
acquired; currently unowned, but still ownable."  This view of the
frontier, which I take to be an aspect of "frontier" ideology to which
Miller points (rather than her own point of view), clearly embodies a
capitalist perspective not only on land but on society.  Not only is
it well known that many indigenous peoples had no notion of "owning"
land, but the assertion of "ownership" by colonizers was one of those
aspects of the frontier that made it the cutting edge of capitalist
civilization.  In the few cases where the new arrivals accepted the
indigenous culture's value systems and merely exercised usufruct of
the land, they were examples of "going native" and could hardly be
considered part of the advancing Western capitalist civilization.
There were also utopian communities created quite intentionally as
something different, hopefully better, than the repressive capitalism
from which their founders had fled.  But these were exceptions,
precisely because "going West" was a social process in which people
brought the acquired habits and institutions of their past with them.

However much they may have been fleeing adverse material conditions,
those same conditions tended to catch up with them all too quickly
--precisely because they carried the germs of those conditions with
them, especially "ownership".  The early pioneers of the Western
frontier sought their own freedom in land enclosed from the
indigenous.  But when they took and then claimed ownership rights they
instituted a property system in the frontier that would eventually
overwhelm them.  In a few years, or a few generations at most, their
ownership would be lost to other owners.  Powerful railroad or mining
interests would drive them out or buy them out and usurp their
property in land, or bankers and suppliers would take advantage of
their debts during economic downturns, foreclose, evict them and seize
their lands.  Close on the heels of the pioneers of the frontier was
the same class of lords of property from whom they had fled.

The same was true of the frontier artisans and merchants who helped to
build the towns and set up businesses there. Libertarians often
celebrate such "entrepreneurs" just as they sometimes lament the
arrival of monopolistic corporations that absorb or drive such
entrepreneurs out of business.  But as with the farmers who staked
property claims in land, such independent businessmen and women
carried with them the seeds of their own downfall.  For the
"entrepreneur", whether on the Western frontier or the electronic
frontier is caught in a double bind.  On the one hand, they may be
dedicated and inventive workers plying their skills to create
something new, whether a 19th Century blacksmithy or a late 20th
Century software operation.  But if they seek their independence
within the framework of the rules of "private property", they are
forced to work within the logic of the market.  While a few may
survive to become powerful capitalists in their own right, most have
been and will continue to fall before the workings of those rules and
that logic --according to which the stronger capitalist drives out or
takes over the weaker.  The thoroughly modern version of enclosure is
the expropriation of businesses by businesses.  Moreover, whether they
succeed or fail, all who play by the rules lose their autonomy as each
"frontier" is reduced to just another integrated section of the
invading capitalist economy.

This fundamental dynamic of the old West demonstrates one reason why
the metaphor of the "frontier" is useful, even indispensible, for
thinking about the socio-political dynamics of the Net and the rest of
the informational society.  The metaphor has been widely used vis a
vis the Net not only because people, working sometimes alone but
always within a social fabric of interconnections, have created and
settled new electronic spaces but also because hard on their heels
have come the lords of capital using all means possible to takeover,
incorporate and valorize those spaces.  The subordination of the Net
to commercial and industrial profit has become the name of the game.
The "dream" of "limitless possibilities and few social controls"
doesn't just "somehow", "vanish away"; it has been repeatedly
destroyed through corporate enclosure and complementary state
repression.

But just as pioneers on the Western frontier resisted the enclosure of
their lands or the takeover of their small businesses by corporate
interests, so too do the pioneers of cyberspace resist the
commercialization of the Net.  Like other free spirits (e.g., some
musicians and artists) the pioneers of cyberspace can create new
spaces for their own (very social) purposes (pleasure, politics, etc)
as part of a process of self-valorization that at least initially
threatens or transcends existing norms of capitalist society.
Corporate capital then tries either to enclose their spaces by
commercializing them if they look profitable, or to crush them with
the state if they look dangerous.  (If it just ignores them we can
conclude either that their space is not profitable or that it is not
dangerous to the capitalist game.  Indeed, it may be playing a useful
role --such as keeping workers off the streets and the market
growing-- in ways compatible with the social logic of capitalist
society.)

One increasingly important zone on the electronic frontier has been
that of the circulation of political  struggles of various groups and
movements fighting against exploitation and for new ways of being.
These sub-spaces provide opportunities not only for the
experimentation with alternatives to current institutions but also for
attacking the larger capitalist system.

One such group is the Zapatista Army of National Liberation whose
uprising began in the mountains of Chiapas, the southernmost state of
Mexico, but whose political message has spread around the globe
through the electronic circulation of information.  E-mail, soon
complemented by gopher and web sites, both produced and then linked a
highly effective international mobilization in support of the
Zapatistas and against the Mexican government's attempts to belittle
and attack them.

When, in the wake of the peso crisis in December 1994, the Zapatistas
were seen as threatening the interests of international investors in
Mexico, some (e.g., Chase Manhattan Bank) called for their
"elimination".  The Mexican government, in point of fact, ordered an
army force of 50,000 to invade Zapatista territory in Chiapas and wipe
out the uprising.  (It failed.)  Others in the circuit of investment
capital sought to tap the flow of information among the networks of
solidarity for their own purposes.  They sought out individuals within
the Net who were involved in producing and circulating that
information and offered them lots of money to redirect those flows to
corporate investors who would pay for the "inside scoop" about the
investment climate in Mexico and points South.  The offers were
refused so this autonomous "frontier" of resistance and discussion of
the Zapatista alternative continues.  Had those approached sold out,
the autonomy of the activity would have become illusory as little by
little the information being circulated became more geared to what
investors need to know and less to what is needed to struggle against
them.

The metaphor of the frontier allows us to understand this dynamic in a
way that appreciates both the energy and imagination of the pioneers
and the dangers which beset them.  Criticizing the comparison of the
clipper chip (which would give government the ability to eavesdrop on
all encrypted computer communications) with the imposition of barbed
wire on the prairie, Miller suggests that the metaphor implies a
necessary surrender to fate.  But the metaphor survives such critique
because it evokes not surrender but resistance.  No matter how many
frontiers have been taken over and subordinated, no matter how many
pioneers have been forced or induced to surrendering their freedom,
the metaphor lives on.  It survives not just because ideology
preserves the myth but because the dream lives and the struggle lives.
Each time some new space and time of human endeavor is colonized and
taken over by the work/profit logic of capital, there are always
people who break away and create new spaces and new times where they
can be freer to elaborate their own lives in the manner they see fit.
The ability of capital to enclose (commercialize) or crush those new
spaces is never assured.  The consequences of each such confrontation
remain open.  And in a period in which there are an extraordinarily
large number of breakaways and a multiplicity of acts of creation, the
threat to the survival of the system grows and the potential to
realize an array of alternatives is great.  That is the excitment of
any frontier and that is the reason the metaphor survives.

Harry Cleaver
Austin,Texas
hmcleave@eco.utexas.edu
http://www.eco.utexas.edu:80/Homepages/Faculty/Cleaver/index.html

------------------------------

Date: Thu, 28 Dec 1995 11:10:58 -0500
From: Galkin@AOL.COM
Subject: File 4--Privacy in the Workplace

*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+
THE COMPUTER LAW REPORT
*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+
December 28, 1995 [#15]

=====================================
GENERAL INFO: The Computer Law Report is distributed (usually) weekly for
free and is prepared by William S. Galkin, Esq. The Report is designed
specifically for the non-lawyer. To subscribe, send e-mail to galkin@aol.com.
All information contained in The Computer Law Report is for the benefit of
the recipients, and should not be relied on or considered as legal advice.
Copyright 1995 by William S. Galkin.
=====================================
ABOUT THE AUTHOR: Mr. Galkin is an attorney in private practice in Owings
Mills, Maryland (which is a suburb of Baltimore). He has been an adjunct
professor of Computer Law at the University of Maryland School of Law and has
concentrated his private practice in the Computer Law area since 1986. He
represents small startup, midsized and large companies, across the U.S. and
internationally, dealing with a wide range of legal issues associated with
computers and technology, such as developing, marketing and protecting
software, purchasing and selling complex computer systems, and launching and
operating a variety of online business ventures. He also enjoys writing about
computer law issues!

===> Mr. Galkin is available for consultation with individuals and companies,
wherever located, and can be reached as follows: E-MAIL:
galkin@aol.com/TELEPHONE: 410-356-8853/FAX: 410-356-8804/MAIL: 10451 Mill Run
Circle, Suite 400, Owings Mills, Maryland 21117. Articles in The Report are
available to be published as columns in both print and electronic
publications. Please contact Mr. Galkin for the terms of such usage.

           ^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^

                         *^*^ THIS WEEK'S SPONSOR *^*^

This week's sponsor is Challenge Press, publisher of the soon to be released
"INTERNET CHALLENGE GUIDE TO COPYRIGHTS." This publication provides
well-organized and detailed information essential for people either doing or
thinking about doing business online, or who are advising or assisting others
concerning doing business online. The price is only $45 plus $3.50 handling
and shipping (in the U.S.). Reserve your copy now by calling Challenge Press
at (800) 963-5297 or by sending e-mail to ChallengeP@aol.com, or by mail at
P.O. Box 20862, Baltimore, MD 21209.
           ^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^

*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+
ELECTRONIC PRIVACY RIGHTS: THE WORKPLACE
*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+

[This is the second of a series of articles discussing privacy rights in the
digital age.]

With the rise of technology there arose a fear of surveillance. However,
George Orwell's 1984 passed us by without noticeable big brother control, and
the national concern over espionage diminished with the demise of the
U.S.S.R.

These past threats were concerns over the use of technology by governments
that had sufficient resources to use the technology for sinister purposes.
The new threat is not technology in the hands of government, it is technology
alone. What once required massive manpower, now requires merely a personal
computer. Technology has made the power to monitor others widely available,
whether to governments, private enterprise or individuals. This article
discusses some of the laws applicable to the monitoring of employees in the
private workplace.

An employee, by the very nature of the employment relationship, must be
subject to some level of monitoring by the employer. However, this monitoring
has limits.   Courts have held that it is a tortuous invasion of privacy for
an employer to monitor employee telephone conversions. Similarly, mail
carried through the U.S. postal service is granted a high level of
protection.

However, much employee communication now takes place over private and public
networks via e-mail, or voice mail. These forms of communication are very
different from telephone calls and letters. For example, after transmission
and receipt, these communications are stored for an indefinite period of time
on equipment under the exclusive control of the employer. Additionally, these
communications can be examined without the knowledge of the communicators. As
is often the case, the law has difficulty keeping pace with the issues raised
by fast changing technology.

Electronic Communications Privacy Act -

In the federal sphere, only the Electronic Communications Privacy Act of 1986
(ECPA) directly prohibits the interception of e-mail transmissions. The ECPA
prohibits the interception by (1) unauthorized individuals or (2) individuals
working for a government entity, acting without a proper warrant. The ECPA is
mostly concerned with the unauthorized access by employees or corporate
competitors trying to find out valuable information. However, while there is
no specific prohibition in the ECPA for an employer to monitor the e-mail of
employees, the ECPA does not specifically exempt employers.

The ECPA has several exceptions to the application of the prohibition of
interception of electronic communications. The three most relevant to the
workplace are (1) where one party consents, (2) where the provider of the
communication service can monitor communications, and (3) where the
monitoring is done in the ordinary course of business.

The first exception, consent,  can be implied or actual. Several courts have
placed a fairly high standard for establishing implied consent. For example
one court held that "knowledge of the capability of monitoring alone cannot
be considered implied consent." Accordingly, for an employer to ensure the
presence of actual consent, it should prepare, with advice of counsel, a
carefully worded e-mail Policy Statement which explains the scope of employer
monitoring. This Policy Statement should be signed by the employees. One
example of how this Policy Statement needs to be carefully written is that if
it states that personal communications will be monitored only to determine
whether there is business content in the communications, then this would
probably not amount to consent to review the full text of personal
communications. Additionally, notice that communications might be monitored
may have a significantly different legal affect than a notice stating that
communications will be monitored.

The second exemption is that the ECPA exempts from liability the person or
entity providing the communication service. Where this service is provided by
the employer, the ECPA has been interpreted as permitting the employers broad
discretion to read and disclose the contents of e-mail communications,
without the employee's consent. However, employers should not rely on this
exception, because it might not apply in all cases, such as to incoming (as
opposed to internal e-mail) if the e-mail service is provided by a common
carrier (e.g., America Online or MCI mail, which are not provided by the
employer).

Under the third exception, courts will analyze whether the content of the
interception was business or personal and allow the interception of only
business-content communications.

State laws -

State tort laws are often viewed as the primary sources of protection for
privacy of electronic communications. The most common tort that would apply
is the tort of invasion of privacy. This tort occurs where "one who
intentionally intrudes, physically or otherwise, upon the solitude or
seclusion of another or his private affairs or concerns, is subject to
liability to the other for invasion of his privacy, if the intrusion would be
highly offensive to a reasonable person."

This tort does not require that personal information be actually acquired,
disclosed or used. However, the intrusion must be intentional and highly
offensive to a reasonable person. Additionally, there must be a reasonable
expectation of privacy by the employee.

Employees often believe that their communications are private because they
have a password which they can select and change independently or because
they are communicating through outside common carriers. Cases have often
turned upon whether this belief was reasonable given the fact that the
employer had the ability all along to access the files, though the employees
were not aware of this. In determining the outcome, courts will weigh the
reasonableness of the employee's expectation of privacy against the business
interest of the employer in monitoring the communication. However, it is
important to emphasize that in the final analysis courts have traditionally
held that legitimate business interests permit employers to intercept
communications.

Additionally, state constitutions might provide some protection. A number of
state constitutions provide a specific right of privacy. But, only California
has specifically determined that its constitution provides a cause of action
against nongovernmental entities. However, even in California, the courts
will give significant weight to the business interests of the employer.

Conclusion -

As discussed, much of the law of privacy in the workplace turns on the
reasonable expectation of privacy. When evaluating different situations, it
is important to keep in mind that the law in this area is a moving target, as
recently expressed by Professor David Post of Georgetown University Law
Center (in The American Lawyer, October 1995) "until we have all spent more
time in this new electronic environment, who can say what our expectations
really are --let alone whether they are reasonable?"

In the workplace, federal and state laws provide some protection to employee
communications. However, this protection is quite limited. Until the law
develops further, employers should prepare carefully drafted Policy
Statements that explain how the employer intends to monitor employee
communications. And employees, even in the absence of such Policy Statements,
would be well advised to consider their communications available and
accessible to the employer. Also, where privacy is an issue, employees and
employers can create a more productive work environment if they work together
to jointly develop a Policy Statement that balances the legitimate interests
of both the employer and the employees.

------------------------------

Date: Sun, 16 Dec 1995 22:51:01 CDT
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 5--Cu Digest Header Info (unchanged since 16 Dec, 1995)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send post with this in the "Subject:: line:

     SUBSCRIBE CU-DIGEST
Send the message to:   cu-digest-request@weber.ucsd.edu

DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.

The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at:  Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

To UNSUB, send a one-line message:   UNSUB CU-DIGEST
Send it to  CU-DIGEST-REQUEST@WEBER.UCSD.EDU
(NOTE: The address you unsub must correspond to your From: line)

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on  internet);
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

EUROPE:  In BELGIUM: Virtual Access BBS:  +32-69-844-019 (ringdown)
         Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
         In ITALY: ZERO! BBS: +39-11-6507540
         In LUXEMBOURG: ComNet BBS:  +352-466893

  UNITED STATES:  etext.archive.umich.edu (192.131.22.8)  in /pub/CuD/
                  ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
                  aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
                  world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
                  wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
  EUROPE:         nic.funet.fi in pub/doc/cud/ (Finland)
                  ftp.warwick.ac.uk in pub/cud/ (United Kingdom)


The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
  URL: http://www.soci.niu.edu/~cudigest/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.  CuD material may  be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission.  It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified.  Readers are encouraged to submit reasoned articles
relating to computer culture and communication.  Articles are
preferred to short responses.  Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
            the views of the moderators. Digest contributors assume all
            responsibility for ensuring that articles submitted do not
            violate copyright protections.

------------------------------

End of Computer Underground Digest #8.09
************************************