Computer underground Digest Tue Jan 30, 1996 Volume 8 : Issue 09 ISSN 1004-042X Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU Archivist: Brendan Kehoe Shadow Master: Stanton McCandlish Field Agent Extraordinaire: David Smith Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Cu Digest Homepage: http://www.soci.niu.edu/~cudigest CONTENTS, #8.09 (Tue, Jan 30, 1996) File 1--Bernie S. 1/26 hearing File 2--Default gateway to .fidonet.org going down (fwd) File 3--The "Space" of Cyberspace (fwd) File 4--Privacy in the Workplace File 5--Cu Digest Header Info (unchanged since 16 Dec, 1995) CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN THE CONCLUDING FILE AT THE END OF EACH ISSUE. --------------------------------------------------------------------- Date: Tue, 30 Jan 1996 05:50:36 -0500 (EST) From: Emmanuel Goldstein <emmanuel@2600.COM> Subject: File 1--Bernie S. 1/26 hearing The events of 1/26/96 were about as unbelievable as the events that have transpired throughout this case. The only positive development is that more people are slowly starting to realize what's happening. Two and a half hours after the sentencing was to be held, the judge arrived in the courtroom. His demeanor seemed significantly more upbeat and open than his previous appearances. Perhaps this had to do with the fact that Ed's lawyer and members of the press were in attendance. The judge allowed everyone involved in the case to speak: Probation Officer Scott Hoak, Haverford Township Detective John K. Morris, Secret Service Agent Thomas L. Varney, Ed's attorney (Ken Trujillo), and Ed himself. Throughout the hearing, the main issue was whether or not Cummings was a threat to the community. Varney was adament in his assessment of Cummings as a danger but when pressed by Trujillo could come up with nothing more substantive than the books found in Cummings' home. These books came from publishers like Loompanix and dealt with such things as making bombs and establishing false identities. The other damning evidence was a list of Secret Service frequencies (from an issue of Monitoring Times), a copy of a magazine article that listed Secret Service codenames for President Reagan (dated 1983), and a material that the Secret Service had suspected was C4 but which later turned out not to be. For some reason they feel compelled to mention this at each hearing as if C4 had actually been found when in fact the substance was something dentists use to mold dentures (the owner of the house was a dentist). Trujillo successfully managed to get Varney to admit that no guns or explosives of any sort were found. No evidence was presented to indicate that Cummings was ever a threat of any sort to anybody. What's more, Cummings proved his responsibility by immediately getting a job after the Secret Service locked him up for most of last year and also by dutifully showing up for each hearing that was scheduled in Easton, even though the threat of more prison time loomed. Cummings apologized to the court for his "odd curiosity" of the past, insisting that he merely collected books and information and never caused harm to anyone. His lawyer pleaded with the judge to allow Cummings to pick up the pieces of his life and not be subjected to any more inhumane treatment. In the end, the judge was not interested in whether or not Cummings posed a threat. He saw a probation violation and therefore withdrew the probation. Sentencing was postponed to March 5th. But the judge showed some compassion. He lowered the $250,000 bail to $100,000. Currently Cummings is imprisoned in the maximum wing of the prison where people with the highest bail are kept. He's with murderers and rapists. Conditions are appalling. One of the prisoners is on death row - his name is Joseph Henry and he bit off a woman's nipples and clitoris before strangling her with a slinky. These are the kinds of people the Secret Service has condemned Cummings to be with. When Cummings was originally put on probation years ago, the probation officer told him he thought the whole thing was a big waste of time. The only thing he was accused of, after all, was taking batteries out of a tone dialer that a cop was questioning him about. And the really ironic part was that Cummings wasn't even the person who took the batteries out - it was one of his friends. But he was not about to turn a friend in for something so absurd. After all, this was a very minor thing - he paid a fine of nearly $3,000 and was put on probation and that was it. When the Secret Service threw Cummings in prison for possession of a red box in early 1995, they knew he could be screwed again when he finally got out since being arrested is a probation violation. And Special Agent Thomas Varney spent a great deal of effort to see that this is exactly what happened. He made multiple trips to Easton and convinced the local authorities to lock Cummings up as if he were the most sadistic of killers. On Friday, Cummings' probation officer did an aboutface and told the court that he thought Cummings represented a very great danger to the community. Outside the courtroom, he and the other local law enforcement people crowded around Varney like kids surrounding a rock star. He was their hero and maybe one day they would be just like him. It would be good to say that the press showed up and the rest of the world finally got to see one of the greatest injustices perpetrated by the Secret Service. But the only headlines to come out of this charade said things like "Judge Hangs Up On Phone Hacker - Bail Revoked After He Continues To Commit Telecom Fraud". Not only has Cummings never been convicted of any kind of fraud - he's never even been accused of it. This is a case based entirely on perceptions and a sick vendetta by a government agency that has turned into a genuine threat against free thinking people everywhere. When Cummings is sentenced on March 5th, he could be put into prison for years. This is what the Secret Service will attempt to ensure. They have to be stopped and they have to be held accountable for what they've already done. We need to be able to protect individual rights against this kind of abuse and so far we have all failed miserably. We have little more than a month to get it right. ------------------------------ From: "David Gersic" <A02DAG1@NOC.NIU.EDU> Date: Sat, 27 Jan 1996 22:45:21 CDT Subject: File 2--Default gateway to .fidonet.org going down (fwd) --- (fwd) --- *** The Free Ride is Over! *** ===================== Effective March 1, 1996, the Internet Gateway at 1:1/31 will be *shutting down*. At that point, there will be NO MORE "default" gateway for E-Mail coming INbound from the Internet for Zone-1. The reasons for this termination of service are numerous ... o Most recently, an excommunicated SysOp has gone on a rampage of forging subscription messages to subscribe numerous FidoNet addresses to numerous unwanted Internet mailing-lists in a deliberate attempt to "break" the FidoNet routing structure and the gateway structure. Many of the other gateways have already shut down operations. o Many of the *C routing systems have taken it upon themselves to either "bounce" (many doing it improperly addressed) or to deliberately "bit-bucket" NetMail coming from the gateway. I can no longer deal with the voluminous NetMail being received from End-Nodes querying what has happened to their inbound E-Mail coming thru the gateway. o The gateways systems and the "f###.n###.z#.fidonet.org" address syntax was designed for "casual mail", not for subscribing to massive mailing-lists and such. Many people have found ways to deliberately by-pass the controls at the gateways and subscribe to mailing-lists, forcing the inbound traffic to route in thru the gateways and clogging up the FidoNet routing structures. These days, it is fairly easy and inexpensive to get an account with any of the many Internet Service Providers thoughout the country. Those that really need to subscribe to mailing-lists should go that route. o The original intent of setting up the .fidonet.org domain was to have gateways situated geographically close to the Nodes they serve so that the load would be distributed and routing problems on the FidoNet side would be reduced. As of this writing, there are only 34 Nets out of the 431 Nets in Zone-1 which have their INbound E-Mail coming in via gateways other than the "default" gateway. The existing gateway operators and gateway software authors have always been willing to help a new gateway with their setup. The *Cs at the Net level just haven't done their part to strive for getting local gateways in place in their Nets. It just doesn't seem fair to me to keep relying on ONE gateway and the Backbone routing structure to handle over 90% of the Zone's traffic, does it? o People have been writing software which does NOT conform to proper addressing specs which have severly impacted operations of the gateway without even consulting me or even letting me know that their programs exist. o I find that I no longer have the time nor inclination to keep supporting a gateway where folks continue to break the rules of its use and bypass the controls. FidoNet in general has taken this service for granted for far too long. People seem to feel that Free use of Internet E-Mail is something they get automatically when they are granted a Node Number in FidoNet. o The I.E.E.E., the organization who has been providing the resources and bandwidth for the flow of all this traffic can no longer support the endeavor. Some services *will* CONTINUE to be provided ... o The Domain-Name-Service, which tells the Internet world where to send traffic for destinations within the .fidonet.org domain (and which defines which addresses are 'valid') will continue to be operated. However, the "default MX-record" which sent all undefined traffic for those Nets which did not otherwise have another gateway declared, will be DELETED! o We will continue to operate the DNS until such time as the InterNIC removes the .fidonet.org domain. Since the InterNIC will expect and annual service fee of $50.00 for the domain in March, it is possible that the .fidonet.org domain may dissappear. I do not plan on paying this fee out of my own pocket. o We will continue to operate the gateway at 1:13/10 (our other gateway address) on a REGISTERED-ONLY basis. This means that there will be a process whereby INDIVIDUAL Zone-1 Nodes will be able to Register to use the gateway and have an Internet address assigned. Incoming E-Mail for all REGISTERED systems will be packed on HOLD and must be picked up by direct Poll. NOTHING will be routed via the Backbone (except Bounces back to UNregistered Nodes). (Please see instructions below for Registering to use 1:13/10) How to Register to use the Gateway at 1:13/10 --------------------------------------------- To register your system to use the gateway services at 1:13/10, simply send a File-Request for REGISTER to 1:13/10. This will pass your Primary address into a function process that will dynamically re-configure the related configuration files and routing during the next hourly update process. After that, you should be able to use the gateway and any E-Mail coming INbound from the Internet will be packed on *HOLD* at 1:13/10 for your system to pickup. Note that your system is assigned a special address, which is NOT in the old 'f###.n###.z#.fidonet.org' syntax. Do NOT advertise that address as it will NOT be valid. Point systems may NOT register and may NOT use this gateway. Burt Juda Postmaster/Hostmaster (Feel free to distribute this as widely as possible) ------------------------------ Date: Sat, 02 Dec 95 15:32:15 From: Jim Thomas <jthomas@sun.soci.niu.edu> Subject: File 3--The "Space" of Cyberspace (fwd) --- fwd message --- Date--Tue, 28 Nov 1995 21:21:00 -0600 From--lemaitre monique j <tc0mjl1@corn.cso.niu.edu> Subject--The "Space" of Cyberspace This is a very long text, so you may want to press the "D" button (the author's name and address appear at the end.) I thought it was relevant to several themes which appeared briefly on the list such as the "gender-lessness" of the NET...It also brought back echoes of Gilles Deleuze whose untimely death a few weeks ago was never mentioned on this list...Saludos!ML. THE "SPACE" OF CYBERSPACE: Body Politics, Frontiers and Enclosures The following comments were prompted by the reading of Laura Miller "Women and Children First: Gender and the Settling of the Electronic Frontier", one of the essays in James Brook and Iain A. Boal, RESISTING THE VIRTUAL LIFE: The Culture and Politics of Information, San Franciso: City Lights, 1995. Miller's essay is the first and only one I have read after buying the book. I was drawn to it by the circumstance that I have been revising an essay of my own on the terrain of electronic communication in the Zapatista struggle for autonomy and democracy. In my own writing I had used the metaphor of the "frontier" and for that reason was curious about Miller's essay. Miller's essay critiques the metaphor of "frontier" as part of a discussion of how the assumption that traditional gender roles are simply reproduced in cyberspace might help provide a rationale for state regulation. Her point of departure is the word "frontier" in the name of the "Electronic Frontier Foundation", a well-known institution that argues for self-regulation and fights against government interference in cyberspace. She makes two arguments which interest me. First, she argues that the adoption of the metaphor of "frontier" is a problematic extension of the traditional American spacial concept to what is actually a non-spacial phenomena: The Net. Second, she warns that applying traditional American notions of the "frontier" --such as those embodied in classical Western narratives-- risks an unconscious reproduction of the social roles (gender) characteristic of those notions. Spaceless cyberspace? With respect to the first of these arguments, she writes: "The Net on the other hand, occupies precisely no physical space (although the computers and phone lines that make it possible do). It is a completely bodiless, symbolic thing with no discernable boundaries or location. . . . Unlike land, the Net was created by its pioneers." (p. 51) She also refers to the Net as "an artifact" (p. 51) and as "incorporeal" (p. 57). While this concept of the Net fits in nicely with the title of the book in which the essay appears (Resisting the Virtual Life), the rest of her essay demonstrates how its formulation misleads. The problem with the characterization is that it treats the Net as if it were a system of machines (computers and phone lines) whereas it has only existed and only continues to exist in the communicative actions of the humans who created and continue to recreate it. This particular system of machines is just like any other system of machines: a moment of human social relationships. While the machine system is truly an "artifact so humanly constructed", the machine system is not "the Net"; it is only the sinew or perhaps the nervous system of a Net constituted by human interactions. As an evolving series of human interactions the Net occupies precisely the space of those participating human beings. Humans as corporeal beings always occupy space and their personal and collective interactions structure and restructure that space. One of the things that discussion of cyberspace requires is a recognition of its "body politics" --something Miller clearly understands in the later part of her essay although she doesn't bring it to bear in this characterization of the Net. While arguing against the overstatement of women's vulnerability to aggression on line, she points to important differences between "cyber-rapists" and real rapists. "I see my body", she writes, "as the site of my heightened vulnerability as a woman. But on line --where I have no body and neither does anyone else-- I consider rape to be impossible." But of course, she does have a body and when she is on line her body is seated in front of a computer terminal, alone or in company, comfortably or uncomfortably, with her fingers punching a mouse button or banging on a keyboard, her eyes more or less glued to the screen and her mind flickering back and forth from the images on the screen to the rest of her physical existence. The very real "corporality" not only of the Net but of all computer work has been pointed out by all those concerned with the various ways in which the use of computers has involved very real bodily harm. (This issue is apparently treated in the same book in a separate essay by Dennis Hayes on "Digital Palsy".) The most immediately salient aspect of Miller's body's situation, however, is that it cannot be touched physically by any would-be cyber-rapists --except through the mediation of typed words and her reception of them, which she considers ought to be and are in fact under her control. In her vigorous argument that a great many women are quite able to hold their own in "the rough and tumble of public discourse" --and that women who can't should learn to-- she suggests ways in which women's activities on the Net are actually "blurring" and thus overcoming crippling gender divisions rather than reproducing them. Thus in the very midst of her central argument about gender, Miller's argument implicitly recognizes that the Net constitutes a set of interrelationships among bodies, a mediated and relatively "safe" set, but a set of relationships among bodies nevertheless. Herein can be found one obvious source of the appeal of spacial concepts such as cyber"space" or "frontier". In as much as the Net only exists as active human interactions, humans necessarily experience their activity on the Net in terms of their own sensual activity (which only exists in space) interacting in a mediated way with that of others. The immediate "space" of the Net is not even all that hard to define. It consists of the local spaces of participation in the Net and everything that connects them, not just the telecommunications technologies but the interactions themselves. The form of the interaction matters in understanding its character, its advantages and limitations, but that is true in ALL forms of human interaction as those who study them are well aware. Those local spaces and even those connections can quite definitely be "locatable" in time and space. The problem of "boundaries" appears only when we begin to study the "space" of the Net as including not only those who participate directly but those who participate indirectly: those working in the computer and telecommunications industry, those influencing or influenced by the participants of the Net, those standing "outside" of it but worrying about it, commenting on it, trying to ignore it, and so on. The treatment of the Net as "incorporeal" just won't do. The complexity of the space which it constitutes calls for analysis as well as body and social politics. Miller knows this even if she doesn't like the spacial metaphors; her essay is a form of participation in those social politics. I would just argue that such metaphors ARE helpful. Like any metaphor they have their limitations --which is why we use so many different ones. But, by focusing our attention on many of the very real, quite material aspects of the Net, they help us think about this new fluctuating set of human activities, their interactions, dangers and opportunities. Frontiers The second aspect of her argument, in which she critiques the treatment of historical, geographical frontiers in American popular culture, I read as essentially an argument about ideology. She wants us to think about how the old Western frontier was perceived and conceptualized in order to get us to think more deeply about the use of the concept "frontier" vis a vis the Net. While I find her critique a rich and useful one, I also think that beyond the issue of ideological representations there is the question of other, non-ideological, historical parallels between the Western frontier and current "frontiers" in cyberspace. Her first concern is the image of the frontier as space of freedom. She writes "The frontier, as a realm of limitless possibilities and few social controls, hovers, grail-like, in the American psyche, the dream our national identity is based on, but a dream that's always, somehow, just vanishing away. . . . For central to the idea of the frontier is that it contains no (or very few) other people --fewer than two per square mile according to the nineteeth-century historian Frederick Turner. The freedom the frontier promises is a liberation from the demands of society . . ." (pp. 50-51) She then goes on to argue that the Net is so full of people that it "has nothing but society to offer" (p. 51) and therefore the use of the concept of frontier to talk about the Net is inappropriate. The problem with this conceptualization is that it is a very culturally biased misrepresentation of the Western frontier. It's not that Turner was wrong about population density but that the characterization ignores the social dynamics of the frontier. In the first place, as Miller mentions, the frontier was a "frontier" only for the European invaders; it was already inhabited by the indigenous peoples of the Americas. Moreover, as historical works on their cultures have made clear, the frontier was densely inhabited --given the character of their ways of life. With hunting and gathering and shifting agriculture much larger physical space is required on a per capita basis than in human societies based on sedentary agriculture and urbanized trade and industry. The view of the frontier as "empty" space was definitely that of the invaders moving West out of an increasingly urbanized capitalist society and was a view that either failed to understand the indigenous culture or dismissed it as invalid. If the indigenous would "sell" the land and move out quietly the market would serve. More frequently, the armed might of the state was used to drive them out. Beyond this question of perspective (European versus indigenous), the material underpinnings of the view of the frontier as an "empty" space into which one can escape "from the demands of society" requires more analysis than Miller gives it. It was more than an ideological construct. It might be seen as expressing the views of individuals, either anti-social or just adventurous, who did "go West" to escape various "demands of society". For the individual trapper or hunter, for instance, the land might well have appeared "empty". However, it seems more likely that such lone wanderers frequently met and interacted with the existing indigenous peoples and one of the reccurrent themes of both history and myth is how they often crossed over to participate in these very different cultures. This was apparently as true of gauchos in the Argentine pampas as it was of mountain men in North America. In colonial language, they "went native". Even Hollywood has repeately woven this theme into its cinemagraphic treatments of the frontier; a film like Dances with Wolves being a recent example. Setting aside this source of the view of the frontier as "emptiness", we should recognize that the colonization of the frontier by invaders from the East was very much a social process. The vast majority of people who "went West" did so in groups --in families, in wagon trains, by the boatload, or trainfull--with the object not only of getting land, but of building and participating in new communities. The totally isolated trapper or homesteading family was the exception, not the rule. Even when farms or ranches were large, the local neighbors and town formed a social context for family activity. After the very first "settlers", the vast majority of those who colonized "the frontier" took land immediately adjacent to that which was already taken, not in the midst of some lost, pristine wilderness. The classic Western narratives that Miller refers us to have often portrayed just such sociality. The usual experience of the pioneer colonizer of the West was not of "emptiness" but of collective activity, of people working together to found new communities. When Miller writes "Unlike real space, cyberspace must be shared.", she is misrepresenting the reality of the frontier in which much of the social dynamics of the Westward movement involved the sharing of space, not with the indigenous for the most part, but among the colonizers themselves. More to the point, perhaps, with respect to the Western frontier as with the electronic frontier, is the notion of "escaping" from the "demands of society". When taken at a social rather than individual level, the history of the European colonization of the West can be seen to have involved a great deal of movement "away from" the hardships, repression and exploitation of capitalism which emerged in the Atlantic basin. American ideology celebrates escape from religious persecution, but that was interwoven with other persecutions. A great many of those who "went West", whether across the ocean or across the American continents, did so because their lands had been stolen by others. That theft was accomlished to a considerable degree through processes of "enclosure" of the land in which its one-time inhabitants were driven out. This was part of what Marxists call "primitive accumulation", i.e., the genesis of new class relations based on excluding the possibility of self-determination for most people so that they would be forced to prostitute themselves in the emerging capitalist labor market. Others emmigrated because the new conditions of both economic and political life in industrializing European (and then American) cities were so hard. Low wages and awful living conditions could drive families West for land. So too could political repression, such as that which followed the 1848 revolutions in Europe, lead people to seek elsewhere for better opportunities. The "demands of society" which such immigrants were escaping were not simply those of living together, but were the demands of an untamed capitalism for their life energies under oppressive conditions which often killed. This was part of the actual history of the "Western" frontier, not just an ideologically constructed myth. The dream of "limitless possibilities and few social controls" is certainly part of the enduring myths of the "American psyche". But the myth endures precisely because realization of the dream has demanded an open-ended social situation for which generations have fought and struggled. Although I have made no systematic study of the "classic Western narratives" to which Millar alludes, it seems to me rather rare that "the frontier is [portrayed as] a lawless society of men . . . [a] romance of individualistic masculinity". With the affirmation that Hollywood films and Western novels pay homage to "individualistic masculinity", I would agree. On the other hand, I find it difficult to think of films that deal purely with a "lawless society of men" --with the possible exception of Sergio Leone's spagetti Westerns. Even films like the Wild Bunch --in which the central group is both lawless and masculine-- such activity is situated within a larger social setting so that the Wild Bunch appear as pathological misfits. Miller juxtaposes the "frontier" and "civilization", associating the later with the arrival of women and children. But as indicated above, for the most part men and women and children arrived together. The "frontier" was the frontier OF civilization, its cutting edge, its invading intrusion into other people's life spaces. I also find her analysis of the portrayal of the gender dynamics of many Western narratives quite accurate: the presentation of women and children as victims or potential victims, needing to be protected (and dominated) by men. But in describing and analysing these relationships, Miller passes over to the analysis of social dynamics --especially between men and women-- and leaves the whole issue of the "emptiness" of the frontier behind. In terms of thinking about the process of pushing out the "frontiers" of cyberspacial civilization, I think the most important thing about the parallel with the Western frontier is the central process of creation. Miller notes that "Unlike land, the Net was created by its pioneers." Yet, one of the appeals of the metaphor of the frontier is just this myth --and reality-- of creation. In the case of the Western frontier, no new piece of the earth was created whole cloth. Those who went West because their own lands had been "enclosed" in the East, imposed a new set of enclosures on the land of Native Americans. Nevertheless, it was certainly true that from the point of view of the colonizers, they created a "new land". They did this by transforming the land from a state that supported hunting and gathering cultures to one that supported sedentary agriculture and urbanization. The "land" of capitalist civilization was not the same "land" as that of the indigneous people. A plowed and fertilized field is not a prairie. A town organized physically by fixed buildings is not a "camp" set up for a season by a geographically mobile tribe. The social and political life of fields and towns is clearly not the same as that of indigenous cultures. For good or bad, not only a new kind of land was created but also a new kind of society. The fact that this "creation" amounted to a "destruction" from the point of view of the indigenous doesn't wipe out the process of creation, it only critiques it. "The frontier", Miller writes, "exists beyond the edge of settled or owned land. As the land that doesn't belong to anybody (or to people who 'don't count' like Native Americans), it is on the verge of being acquired; currently unowned, but still ownable." This view of the frontier, which I take to be an aspect of "frontier" ideology to which Miller points (rather than her own point of view), clearly embodies a capitalist perspective not only on land but on society. Not only is it well known that many indigenous peoples had no notion of "owning" land, but the assertion of "ownership" by colonizers was one of those aspects of the frontier that made it the cutting edge of capitalist civilization. In the few cases where the new arrivals accepted the indigenous culture's value systems and merely exercised usufruct of the land, they were examples of "going native" and could hardly be considered part of the advancing Western capitalist civilization. There were also utopian communities created quite intentionally as something different, hopefully better, than the repressive capitalism from which their founders had fled. But these were exceptions, precisely because "going West" was a social process in which people brought the acquired habits and institutions of their past with them. However much they may have been fleeing adverse material conditions, those same conditions tended to catch up with them all too quickly --precisely because they carried the germs of those conditions with them, especially "ownership". The early pioneers of the Western frontier sought their own freedom in land enclosed from the indigenous. But when they took and then claimed ownership rights they instituted a property system in the frontier that would eventually overwhelm them. In a few years, or a few generations at most, their ownership would be lost to other owners. Powerful railroad or mining interests would drive them out or buy them out and usurp their property in land, or bankers and suppliers would take advantage of their debts during economic downturns, foreclose, evict them and seize their lands. Close on the heels of the pioneers of the frontier was the same class of lords of property from whom they had fled. The same was true of the frontier artisans and merchants who helped to build the towns and set up businesses there. Libertarians often celebrate such "entrepreneurs" just as they sometimes lament the arrival of monopolistic corporations that absorb or drive such entrepreneurs out of business. But as with the farmers who staked property claims in land, such independent businessmen and women carried with them the seeds of their own downfall. For the "entrepreneur", whether on the Western frontier or the electronic frontier is caught in a double bind. On the one hand, they may be dedicated and inventive workers plying their skills to create something new, whether a 19th Century blacksmithy or a late 20th Century software operation. But if they seek their independence within the framework of the rules of "private property", they are forced to work within the logic of the market. While a few may survive to become powerful capitalists in their own right, most have been and will continue to fall before the workings of those rules and that logic --according to which the stronger capitalist drives out or takes over the weaker. The thoroughly modern version of enclosure is the expropriation of businesses by businesses. Moreover, whether they succeed or fail, all who play by the rules lose their autonomy as each "frontier" is reduced to just another integrated section of the invading capitalist economy. This fundamental dynamic of the old West demonstrates one reason why the metaphor of the "frontier" is useful, even indispensible, for thinking about the socio-political dynamics of the Net and the rest of the informational society. The metaphor has been widely used vis a vis the Net not only because people, working sometimes alone but always within a social fabric of interconnections, have created and settled new electronic spaces but also because hard on their heels have come the lords of capital using all means possible to takeover, incorporate and valorize those spaces. The subordination of the Net to commercial and industrial profit has become the name of the game. The "dream" of "limitless possibilities and few social controls" doesn't just "somehow", "vanish away"; it has been repeatedly destroyed through corporate enclosure and complementary state repression. But just as pioneers on the Western frontier resisted the enclosure of their lands or the takeover of their small businesses by corporate interests, so too do the pioneers of cyberspace resist the commercialization of the Net. Like other free spirits (e.g., some musicians and artists) the pioneers of cyberspace can create new spaces for their own (very social) purposes (pleasure, politics, etc) as part of a process of self-valorization that at least initially threatens or transcends existing norms of capitalist society. Corporate capital then tries either to enclose their spaces by commercializing them if they look profitable, or to crush them with the state if they look dangerous. (If it just ignores them we can conclude either that their space is not profitable or that it is not dangerous to the capitalist game. Indeed, it may be playing a useful role --such as keeping workers off the streets and the market growing-- in ways compatible with the social logic of capitalist society.) One increasingly important zone on the electronic frontier has been that of the circulation of political struggles of various groups and movements fighting against exploitation and for new ways of being. These sub-spaces provide opportunities not only for the experimentation with alternatives to current institutions but also for attacking the larger capitalist system. One such group is the Zapatista Army of National Liberation whose uprising began in the mountains of Chiapas, the southernmost state of Mexico, but whose political message has spread around the globe through the electronic circulation of information. E-mail, soon complemented by gopher and web sites, both produced and then linked a highly effective international mobilization in support of the Zapatistas and against the Mexican government's attempts to belittle and attack them. When, in the wake of the peso crisis in December 1994, the Zapatistas were seen as threatening the interests of international investors in Mexico, some (e.g., Chase Manhattan Bank) called for their "elimination". The Mexican government, in point of fact, ordered an army force of 50,000 to invade Zapatista territory in Chiapas and wipe out the uprising. (It failed.) Others in the circuit of investment capital sought to tap the flow of information among the networks of solidarity for their own purposes. They sought out individuals within the Net who were involved in producing and circulating that information and offered them lots of money to redirect those flows to corporate investors who would pay for the "inside scoop" about the investment climate in Mexico and points South. The offers were refused so this autonomous "frontier" of resistance and discussion of the Zapatista alternative continues. Had those approached sold out, the autonomy of the activity would have become illusory as little by little the information being circulated became more geared to what investors need to know and less to what is needed to struggle against them. The metaphor of the frontier allows us to understand this dynamic in a way that appreciates both the energy and imagination of the pioneers and the dangers which beset them. Criticizing the comparison of the clipper chip (which would give government the ability to eavesdrop on all encrypted computer communications) with the imposition of barbed wire on the prairie, Miller suggests that the metaphor implies a necessary surrender to fate. But the metaphor survives such critique because it evokes not surrender but resistance. No matter how many frontiers have been taken over and subordinated, no matter how many pioneers have been forced or induced to surrendering their freedom, the metaphor lives on. It survives not just because ideology preserves the myth but because the dream lives and the struggle lives. Each time some new space and time of human endeavor is colonized and taken over by the work/profit logic of capital, there are always people who break away and create new spaces and new times where they can be freer to elaborate their own lives in the manner they see fit. The ability of capital to enclose (commercialize) or crush those new spaces is never assured. The consequences of each such confrontation remain open. And in a period in which there are an extraordinarily large number of breakaways and a multiplicity of acts of creation, the threat to the survival of the system grows and the potential to realize an array of alternatives is great. That is the excitment of any frontier and that is the reason the metaphor survives. Harry Cleaver Austin,Texas hmcleave@eco.utexas.edu http://www.eco.utexas.edu:80/Homepages/Faculty/Cleaver/index.html ------------------------------ Date: Thu, 28 Dec 1995 11:10:58 -0500 From: Galkin@AOL.COM Subject: File 4--Privacy in the Workplace *+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+ THE COMPUTER LAW REPORT *+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+ December 28, 1995 [#15] ===================================== GENERAL INFO: The Computer Law Report is distributed (usually) weekly for free and is prepared by William S. Galkin, Esq. The Report is designed specifically for the non-lawyer. To subscribe, send e-mail to galkin@aol.com. All information contained in The Computer Law Report is for the benefit of the recipients, and should not be relied on or considered as legal advice. Copyright 1995 by William S. Galkin. ===================================== ABOUT THE AUTHOR: Mr. Galkin is an attorney in private practice in Owings Mills, Maryland (which is a suburb of Baltimore). He has been an adjunct professor of Computer Law at the University of Maryland School of Law and has concentrated his private practice in the Computer Law area since 1986. He represents small startup, midsized and large companies, across the U.S. and internationally, dealing with a wide range of legal issues associated with computers and technology, such as developing, marketing and protecting software, purchasing and selling complex computer systems, and launching and operating a variety of online business ventures. He also enjoys writing about computer law issues! ===> Mr. Galkin is available for consultation with individuals and companies, wherever located, and can be reached as follows: E-MAIL: galkin@aol.com/TELEPHONE: 410-356-8853/FAX: 410-356-8804/MAIL: 10451 Mill Run Circle, Suite 400, Owings Mills, Maryland 21117. Articles in The Report are available to be published as columns in both print and electronic publications. Please contact Mr. Galkin for the terms of such usage. ^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^ *^*^ THIS WEEK'S SPONSOR *^*^ This week's sponsor is Challenge Press, publisher of the soon to be released "INTERNET CHALLENGE GUIDE TO COPYRIGHTS." This publication provides well-organized and detailed information essential for people either doing or thinking about doing business online, or who are advising or assisting others concerning doing business online. The price is only $45 plus $3.50 handling and shipping (in the U.S.). Reserve your copy now by calling Challenge Press at (800) 963-5297 or by sending e-mail to ChallengeP@aol.com, or by mail at P.O. Box 20862, Baltimore, MD 21209. ^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^ *+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+ ELECTRONIC PRIVACY RIGHTS: THE WORKPLACE *+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+ [This is the second of a series of articles discussing privacy rights in the digital age.] With the rise of technology there arose a fear of surveillance. However, George Orwell's 1984 passed us by without noticeable big brother control, and the national concern over espionage diminished with the demise of the U.S.S.R. These past threats were concerns over the use of technology by governments that had sufficient resources to use the technology for sinister purposes. The new threat is not technology in the hands of government, it is technology alone. What once required massive manpower, now requires merely a personal computer. Technology has made the power to monitor others widely available, whether to governments, private enterprise or individuals. This article discusses some of the laws applicable to the monitoring of employees in the private workplace. An employee, by the very nature of the employment relationship, must be subject to some level of monitoring by the employer. However, this monitoring has limits. Courts have held that it is a tortuous invasion of privacy for an employer to monitor employee telephone conversions. Similarly, mail carried through the U.S. postal service is granted a high level of protection. However, much employee communication now takes place over private and public networks via e-mail, or voice mail. These forms of communication are very different from telephone calls and letters. For example, after transmission and receipt, these communications are stored for an indefinite period of time on equipment under the exclusive control of the employer. Additionally, these communications can be examined without the knowledge of the communicators. As is often the case, the law has difficulty keeping pace with the issues raised by fast changing technology. Electronic Communications Privacy Act - In the federal sphere, only the Electronic Communications Privacy Act of 1986 (ECPA) directly prohibits the interception of e-mail transmissions. The ECPA prohibits the interception by (1) unauthorized individuals or (2) individuals working for a government entity, acting without a proper warrant. The ECPA is mostly concerned with the unauthorized access by employees or corporate competitors trying to find out valuable information. However, while there is no specific prohibition in the ECPA for an employer to monitor the e-mail of employees, the ECPA does not specifically exempt employers. The ECPA has several exceptions to the application of the prohibition of interception of electronic communications. The three most relevant to the workplace are (1) where one party consents, (2) where the provider of the communication service can monitor communications, and (3) where the monitoring is done in the ordinary course of business. The first exception, consent, can be implied or actual. Several courts have placed a fairly high standard for establishing implied consent. For example one court held that "knowledge of the capability of monitoring alone cannot be considered implied consent." Accordingly, for an employer to ensure the presence of actual consent, it should prepare, with advice of counsel, a carefully worded e-mail Policy Statement which explains the scope of employer monitoring. This Policy Statement should be signed by the employees. One example of how this Policy Statement needs to be carefully written is that if it states that personal communications will be monitored only to determine whether there is business content in the communications, then this would probably not amount to consent to review the full text of personal communications. Additionally, notice that communications might be monitored may have a significantly different legal affect than a notice stating that communications will be monitored. The second exemption is that the ECPA exempts from liability the person or entity providing the communication service. Where this service is provided by the employer, the ECPA has been interpreted as permitting the employers broad discretion to read and disclose the contents of e-mail communications, without the employee's consent. However, employers should not rely on this exception, because it might not apply in all cases, such as to incoming (as opposed to internal e-mail) if the e-mail service is provided by a common carrier (e.g., America Online or MCI mail, which are not provided by the employer). Under the third exception, courts will analyze whether the content of the interception was business or personal and allow the interception of only business-content communications. State laws - State tort laws are often viewed as the primary sources of protection for privacy of electronic communications. The most common tort that would apply is the tort of invasion of privacy. This tort occurs where "one who intentionally intrudes, physically or otherwise, upon the solitude or seclusion of another or his private affairs or concerns, is subject to liability to the other for invasion of his privacy, if the intrusion would be highly offensive to a reasonable person." This tort does not require that personal information be actually acquired, disclosed or used. However, the intrusion must be intentional and highly offensive to a reasonable person. Additionally, there must be a reasonable expectation of privacy by the employee. Employees often believe that their communications are private because they have a password which they can select and change independently or because they are communicating through outside common carriers. Cases have often turned upon whether this belief was reasonable given the fact that the employer had the ability all along to access the files, though the employees were not aware of this. In determining the outcome, courts will weigh the reasonableness of the employee's expectation of privacy against the business interest of the employer in monitoring the communication. However, it is important to emphasize that in the final analysis courts have traditionally held that legitimate business interests permit employers to intercept communications. Additionally, state constitutions might provide some protection. A number of state constitutions provide a specific right of privacy. But, only California has specifically determined that its constitution provides a cause of action against nongovernmental entities. However, even in California, the courts will give significant weight to the business interests of the employer. Conclusion - As discussed, much of the law of privacy in the workplace turns on the reasonable expectation of privacy. When evaluating different situations, it is important to keep in mind that the law in this area is a moving target, as recently expressed by Professor David Post of Georgetown University Law Center (in The American Lawyer, October 1995) "until we have all spent more time in this new electronic environment, who can say what our expectations really are --let alone whether they are reasonable?" In the workplace, federal and state laws provide some protection to employee communications. However, this protection is quite limited. Until the law develops further, employers should prepare carefully drafted Policy Statements that explain how the employer intends to monitor employee communications. And employees, even in the absence of such Policy Statements, would be well advised to consider their communications available and accessible to the employer. Also, where privacy is an issue, employees and employers can create a more productive work environment if they work together to jointly develop a Policy Statement that balances the legitimate interests of both the employer and the employees. ------------------------------ Date: Sun, 16 Dec 1995 22:51:01 CDT From: CuD Moderators <cudigest@sun.soci.niu.edu> Subject: File 5--Cu Digest Header Info (unchanged since 16 Dec, 1995) Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically. CuD is available as a Usenet newsgroup: comp.society.cu-digest Or, to subscribe, send post with this in the "Subject:: line: SUBSCRIBE CU-DIGEST Send the message to: cu-digest-request@weber.ucsd.edu DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS. The editors may be contacted by voice (815-753-0303), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115, USA. To UNSUB, send a one-line message: UNSUB CU-DIGEST Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU (NOTE: The address you unsub must correspond to your From: line) Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" On Delphi in the General Discussion database of the Internet SIG; on RIPCO BBS (312) 528-5020 (and via Ripco on internet); and on Rune Stone BBS (IIRGWHQ) (203) 832-8441. CuD is also available via Fidonet File Request from 1:11/70; unlisted nodes and points welcome. EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown) Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org In ITALY: ZERO! BBS: +39-11-6507540 In LUXEMBOURG: ComNet BBS: +352-466893 UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/ ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/ aql.gatech.edu (128.61.10.53) in /pub/eff/cud/ world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/ wuarchive.wustl.edu in /doc/EFF/Publications/CuD/ EUROPE: nic.funet.fi in pub/doc/cud/ (Finland) ftp.warwick.ac.uk in pub/cud/ (United Kingdom) The most recent issues of CuD can be obtained from the Cu Digest WWW site at: URL: http://www.soci.niu.edu/~cudigest/ COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ------------------------------ End of Computer Underground Digest #8.09 ************************************