Computer underground Digest    Sun  Feb 4, 1996   Volume 8 : Issue 12
                           ISSN  1004-042X

       Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU
       Archivist: Brendan Kehoe
       Shadow Master: Stanton McCandlish
       Field Agent Extraordinaire:   David Smith
       Shadow-Archivists: Dan Carosone / Paul Southworth
                          Ralph Sims / Jyrki Kuoppala
                          Ian Dickinson
       Cu Digest Homepage: http://www.soci.niu.edu/~cudigest

CONTENTS, #8.12 (Sun, Feb 4, 1996)

File 1--big bro closing in (AOL records searched)
File 2--German Prosecutors now Threatening AMERICA ONLINE
File 3--AP: UMass censors Zundelmirror
File 4--EFC:  -- Net Censorship Backfires --
File 5--First Raid to Japanese ISP for distribution of obscenity
File 6--ISP's and Common Carrier status (A response to Mr. Townson)
File 7--Academic Press virus book borrows from SKISM/40Hex
File 8--Journal of Technology Law & Policy
File 9--Gay Oregon State Rep. George Eighmey Is OUT on the Web
File 10--Re: Big Copyright Ruling
File 11--Cu Digest Header Info (unchanged since 16 Dec, 1995)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

---------------------------------------------------------------------

From: "James P. Galasyn" <blackbox@HALCYON.COM>
Subject: File 1--big bro closing in (AOL records searched)
Date: Mon, 29 Jan 1996 10:41:11 -0800 (PST)

NJ POLICE INTERNET INVESTIGATION OF MURDER THREATENS PRIVACY
Excerpted, Trenton Times, 1/28/96

Police needs vie with privacy

The bizarre E.Windsor killing that led to a gay "chat room" on
America OnLine (AOL) has underscored how on-line computer
discussions & e-mail -  thought by many users to be private - are
vulnerable to routine criminal investigations.  Fairfax Co. VA
police assisting in the local investigation of the 1/5 murder of
Hesse Unger of Hamilton, obtained a criminal search warrant and
descended on America Online's Vienna, Va., headquarters Monday to
perform the first such search ever of America Online records.
After sifting through electronic information and e-mail all day,
officers confiscated dozens of files and turned them over to
authorities in New Jersey.  East Windsor Detective John Funda said
local police received the files Thursday evening, but had not yet
examined them.

The search of the America Online (AOL) computers has sparked fierce
debate on the Internet and given law enforcement agencies food for
thought.  Although civil and criminal court subpoenas have been
served on on-line services in recent years, this week's search
warrant has demonstrated law enforcement's ability to reach
information some computer users incorrectly thought was
confidential.
"IN FIVE YEARS, we are going to see police pulling someone's
America Online records or Compuserve records" commonly, said David
Banisar, an analyst for the Washington-based Electronic Privacy
Information Center, 'a watchdog group specializing electronic
communication issues.  "They are going to have access to very
personal, private information," he said.  "They will be able to
read your messages, find out who you talk to, even what your
fetishes might be.  And right now, very little of that information
is being protected."

But law enforcement sources said that to obtain most computer
records, investigators will have to seek search warrants under the
same standards that now apply to searches of private homes and
businesses.  Still, police are enthusiastic about the potentially
incriminating information stored in computers.  "It's an 'area in
the future that we'll look at as an avenue to gather information
and evidence," said Fairfax County Police Lt.  Judi Lukens Torian.
"We don't want to overstep our bounds, and this would be used only
in necessary cases.  But there is a lot of information on those
disks that could,be vital to cases."

The case that led to the search began Jan. 5 in East Windsor when
police found the lime-covered body of Unger, 38, wrapped in a blue
plastic tarpaulin in the basement of George Hemenway's Jeffrey Lano
home.  Hemenway, 39, has confessed to shooting and killing Unger
while a 15-year-old Hamilton boy looked on ' prosecutors said.  The
teenager, whose name is being withheld due to his age, told The
Times that he, Unger and Hemenway had met through AOL.  The boy
said the three computer users often met in an AOL chat room titled
"NJ M4M," which is the shorthand title for "New Jersey Men for
Men," a gay-themed chat room.

CHAT ROOMS allow users with common interests to exchange electronic
messages as they sit before their computers, which are connected
to the service by modems and phone lines.

Two other AOL users - Michelle Benson, 24, of Trenton and Timothy
Brown, 24, of Hightstown - became involved in the East Windsor
murder case when Hemenway asked them to help remove Unger's body
from his basement, prosecutors said.  Benson later informed police
about the body, and she and Brown have been charged with tampering
with evidence.

Fairfax County police obtained the AOL search warrant and handed
over their information to local investigators, who already had
seized the computers of Hemenway, Unger and the teenager, said East
Windsor Detective John Funda.  A computer expert with the New
Jersey State Police Technical Support Unit has begun examining the
files stored on the hard drives of those computers, Funda said.
"One of the computers we're looking at had a lot of files that were
deleted.  Someone was deleting like crazy," said Funda, who added
that experts often can retrieve files that have been deleted from
a hard drive.

The combined information from the hard drives and the AOL search
may shed light on the motive and planning of the homicide, Funda
said.  It's possible the hard drives will contain much more
information than was turned up with the AOL search, because the on-
line provider does not archive chat room conversations, and e-mail
sent between members is purged from the AOL system five days after
it is read, AOL spokeswoman Pam McGraw said.  Unread e-mail is
purged from the system after 30 days, the spokeswoman said.

ON THE OTHER HAND, computer users can easily choose to save
permanent copies of their on-line excursions to their hard drives.
Several crime and computer specialists said Thursday that the East
Windsor case is the first time they had heard of a homicide victim
meeting his attacker on-line.  And the unusual case has led
investigators into controversial terrain.  Appeals courts have not
specifically ruled on law enforcement access to such records, but
Congress is considering several bills that would try to curb some
behavior online, including criminalizing indecentspeech.  Banisar,
whose group advocates special due process protections before
authorities can search on-line users' data, said Monday's search
illustrates how people other than the targets can be scrutinized
in a cornputer-based criminal probe.

Mary J.	Culnan, a Georgetown University	associate professor
and expert on computer privacy laws, said many	computer users
believe what they write on-line "goes off into the cosmos, never
to be seen again.  They don't know there is an archives.  "We
already grapple with the issue of police overstepping its bounds,"
Culnan added.  "With technology today, that becomes even more
creepy."

McGraw of AOL said it is the company's policy to comply with
subpoenas and that the service cooperated fully with this
investigation.

"We certainly respect and abide by our customers' right to
privacy," she said.  "But we also are going to follow the law.  We
have 4.5 million customers - that's the size of a city.  When we
have some problems, we have to deal with it responsibly."

Posted in pol-abuse@igc.apc.org
To subscribe, send this message: subscribe pol-abuse
To this address: majordomo@igc.apc.org

------------------------------

Date: Fri, 2 Feb 1996 19:13:52 -0500
From: PNOEric@AOL.COM
Subject: File 2--German Prosecutors now Threatening AMERICA ONLINE

FYI. From Cowles/SIMBA Media Daily 2/2/96.

GERMAN PROSECUTORS NOW THREATENING AMERICA ONLINE

German prosecutors now are threatening to file criminal charges
against America Online as well as CompuServe for allowing access to a
neo-Nazi World Wide Web site.

The charge would be inciting racial hatred for allowing access to
material that contends the Holocaust never happened. Publishing or
distributing neo-Nazi or Holocaust-denial literature is a crime in
Germany.

Mannheim prosecutors are attempting to ban access to a site run by a
German-born activist named Ernst Zuendel, now said to live in Toronto.
Zuendel runs The Zundelsite at
http://www.webcom.com/~ezundel/english/.

Last week CompuServe Inc. and a German company, T-Online, were
threatened with legal action and T-Online shut off Web access. Now
America Online, which recently began service in Germany in partnership
with Bertelsmann AG, has been threatened.

AOL CEO Steve Case said in a statement that "this could be one of the
most important developments affecting our industry." He said AOL will
discuss the issue with German prosecutors and explore the options
available.

The online services take the position that, like telephone companies,
they are a common carrier and not responsible for content put up by
others.

Zuendel's site is hosted by Web Communications of Santa Cruz, CA,
which sells Web space and boasts that it is home to 1,536 Web sites,
including Tupperware and Jamaica tourism.

Rob Gelphman, a spokesman for the company, told Media Daily that the
company views itself as a common carrier "like the Postal Service. If
we monitor or edit the content, we become a publisher, and therefore
liable. But we don't like what this guy is doing."

He said the company has not been contacted by German authorities.
Ironically, traffic on Zuendel's site has been "unbelievable" because
of the publicity, Gelphman said.

Last December, Bavarian prosecutors forced CompuServe to prevent
millions of customers worldwide from accessing some 200 sexually
oriented Internet newsgroups.

------------------------------

Date: Fri,  2 Feb 1996 19:42:46 -0500 (EST)
From: "Declan B. McCullagh" <declan+@CMU.EDU>
Subject: File 3--AP: UMass censors Zundelmirror

UMass Shuts Down Web Site Containing Material Discounting Holocaust

   By Associated Press, 02/02/96


       BOSTON (AP) - A University of Massachusetts graduate student
       has been ordered to remove material he posted on a web site of
       the school's computer system that claims the Nazi Holocaust
       never happened.

       Lewis McCarthy said he posted the writings to protest attempts
       by the German government to censor the Internet. McCarthy said
       he is not a neo-Nazi, just an advocate for absolute freedom of
       speech.

[...background on zundel...]

       The action sparked protest from Internet users around the
       world.  Two free-speech advocates, Rich Graves at Stanford
       University and Declan McCullagh at Carnegie-Mellon University,
       obtained the material from Zundel's web site and posted it on
       the Internet.

[...object is to spread zundelish material to make difficult to
censor...]

       McCarthy said he joined in the effort because he believes the
       threat of censorship is worse than Nazi propaganda.

       ``Deutsche Telekom is trying to suppress unpopular speech,''
       McCarthy told The Boston Globe, ``and I believe that's wrong
       and dangerous.''

      [...]

------------------------------

Date: Thu, 1 Feb 96 20:37:14 EST
From: djones@INSIGHT.MCMASTER.CA(David Jones)
Subject: File 4--EFC:  -- Net Censorship Backfires --

URL = http://www.efc.ca/pages/pr/efc-pr.01feb96.html
--

  ELECTRONIC FRONTIER CANADA (EFC) --- PRESS RELEASE

(For immediate release --- February 1, 1996)


Net Censorship Backfires

Germany's clumsy attempt to block access to specific sites
has resulted in the controversial information being copied
all over the Internet.

German prosecutors are at it again -- bumbling around in cyberspace,
trying to block access to information they think might be illegal under
German law.  According to some reports, the prosecutors hope the case
will end up in court where it may start to resolve some of the
uncertain legal issues about who is responsible for information
accessible through computer networks.

They've declared a computer in Santa Cruz, California (www.webcom.com)
to be 'off limits' because one of Web Communications' more than 1,500
customers is Ernst Zundel -- a Canadian resident notorious for claiming
the Holocaust is a Jewish hoax.  Stefan Althoff, spokespeson for
Deutsche Telekom, indicates his company's T-Online service (Germany's
largest) has complied with a request from the Mannheim prosecutor's office.
``We have blocked access via the Internet to Herr Zuendel and
his information,'' he says.

* Smoke and Mirror Sites *

``What's ironic, is that this latest attempt at censorship has backfired.
Instead of limiting the audience for Zundel's propaganda, Germany's
clumsy attempt to block access has resulted in the information being
copied to new locations in cyberspace and becoming even more accessible,
... and with the publicity, more people might want to visit these web pages
to see what all the fuss is about,'' says David Jones, president of
Electronic Frontier Canada, a non-profit organization that advocates
freedom of expression on the Internet.  ``It's rather unfortunate,''
says Jones, who stressed that EFC ``strongly disagrees with Zundel's views.''

So-called 'mirror sites', which contain copies of Zundel's propaganda,
are springing up at various locations in the world-wide-web.
``It reminds me of the Greek myth in which Hercules battled the
many-headed serpent, Hydra.  Whenever he sliced off one head with
his sword, two more grew back in its place,'' comments
EFC vice-president, Jeffrey Shallit.

The appearance of so many mirror sites is partly due to the efforts
of Declan McCullagh, a free speech activist, who has packaged up the
controversial information into a single file and posted a message in
a Usenet newsgroup with instructions on ``how to open your very own
Zundelsite mirror archive in five minutes or less.''  So far there are
at least ten mirror sites, including ones at Carnegie Mellon University,
Stanford University, and MIT.  ``If Germany starts to prevent their
University's from connecting to other Universities outside the country,
it defeats the purpose of them being on the Internet in the first place,''
observes David Jones.

* Detours on the Infobahn *

Mirror sites aren't the only headache for German censors.
The oft-quoted adage: ``The Internet recognizes censorship as damage
and routes information around it'' still rings true.  ``Students in
Stuttgart, Germany who can't access Zundel's web pages directly can
still visit them indirectly, by using an innovative and award-winning
web site in Toronto called the 'Canadianizer','' explains Jones.
[ URL = http://www.io.org/~themaxx/canada/can.html ]
Created as a sort of joke, this web site in Toronto, allows you to
type in the URL of *another* web site that could be anywhere in the world.
The computer in Toronto then fetches a copy of that web page and
inserts a few 'Canadianisms', such as ending a sentence with 'eh?'.
Once Canadianized, the web page is displayed for you.  But since the
page appears to be coming from Toronto, the German blocking mechanism
will be fooled -- it cannot detect that the information really originated
in California.  ``It's just a detour on the Infobahn,'' says Jones.

* Information wants to be free; Information wants to be true *

If censorship won't work, you might wonder, what should be done about
people like Zundel who spread hate and lies?  ``Zundel thrives on
publicity,'' says EFC's Jeffrey Shallit. ``The right right way to deal
with him is either to ignore him, or to counter his propaganda with the
truth about the Holocaust.''  Shallit points to the efforts of the
'Nizkor Project', based in Vancouver, which has assembled a huge
electronic archive on the Holocaust that researchers around the world
can consult to counter the bogus claims of Holocaust deniers.
``Anyone with an open mind will see who's telling the truth,''
says Shallit, who himself lost many relatives in the Holocaust.

The approach is not new; Justice William O. Douglas, said in 1958:
``The way to combat noxious ideas is with other ideas.  The way to combat
falsehoods is with truth.''  Ken McVay, who runs the Nizkor Project,
was recently named to the prestigious 'Order of British Columbia'
for his successful work fighting hate in Canada and elsewhere.

Montreal newspaper reporter, Matt Friedman, recently wrote:
``... while the mainstream and the traditional authorities
dither about, befuddled by the growth and power of the on-line medium,
unable to settle on either a coherent plan of action or a means of
combating hatred without bringing down the Internet in its wake,
McVay and his colleagues are doing battle -- and winning.''


-30-

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
EFC Contact Information:


Electronic Frontier Canada

 Dr. David Jones        phone: (905) 525-9140 x24689    fax: (905) 546-9995
        email: djones@efc.ca

 Dr. Jeff Shallit       phone: (519) 888-4804           fax: (519) 885-1208
        email: shallit@efc.ca

 Dr. Richard Rosenberg  phone: (604) 822-4142           fax: (604) 822-5485
        email: rosen@efc.ca


Electronic Frontier Canada, online archives:

 URL:   http://www.efc.ca/


- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Other Contact Information:

The original "Zundelsite"
http://www.webcom.com/~ezundel

The company that runs the computer that houses the "Zundelsite"
is "Web Communications", 125 Water St, Suite A1, Santa Cruz, CA  95060
They are directing media inquiries to:
  Rob Gelphmanphone: (408) 451-8420
email: gelphman@ix.netcom.com

The "Canadianizer" was created by Rob Stanley and Andrew Chak.
This site was awarded a *prize* by a Toronto radio station
(102.1 FM "The Edge") and a software company "InContext Spider".
URL:http://www.io.org/~themaxx/canada/can.html

Declan McCullaghphone:(412) 441-6768
email: declan@well.com
Declan McCullagh's page on circumnavigating German censorship, URL =
http://www.cs.cmu.edu//afs/cs/user/declan/www/Not_By_Me_Not_My_Views/censorship.
 html

The Nizkor Project combats hate propaganda by telling the truth.
URL:http://www.almanac.bc.ca/
Ken McVay is director of the Nizkor Project,
email: kmcvay@nizkor.almanac.bc.ca

The Simon Wiesenthal Center (Toronto Office) is concerned about
online hate propaganda.  Their spokesperson in Canada is Sol Littman.
phone:(416) 864-9735
The Simon Wiesenthal Center (Los Angeles office),  phone: (310) 553-1303

Matt Friedman, Montreal newspaper reporter who has covered the issue
of hate propaganda on the Net extensivelyphone: (514) 486-3613
email: mattf@friedman.interax.net

------------------------------

Date: Thu, 1 Feb 1996 22:21:31 +0900 (JST)
From: Kenji Rikitake <kenji@RESEAU.TOYONAKA.OSAKA.JP>
Subject: File 5--First Raid to Japanese ISP for distribution of obscenity

Nikkei Shimbun Newspaper Morning Edition, Page 39, February 1, 1996
edition wrote that on January 31st Tokyo Metropolitan Police
investigated an Internet Provider in Sumida-ku, Tokyo (Mainichi
Shimbun reported that the provider was Bekkoame/Internet) for alleged
distribution of obscene graphic materials, along with two members of
Bekkoame, one aged 28 lived in Edogawa-ku, and the other aged 18 lived
in Shinagawa-ku, both in Metropolitan Tokyo. The police says that the
28-years-old member put 67 obscene pictures for open retrieval through
Internet since last December, and that the 18-years-old member put 8
obscene pictures since last September. Nikkei shimbun says the police
would arrest the 28-years-old member soon.

This is the first time for Japanese Police to arrest persons who
distribute what-police-considers-obscene materials on the Internet,
while there has been a few cases of similar investigation on
non-Internet BBSes.  Japanese Criminal Law Article 175 says
distribution of obscene pictures or literatures constitutes a crime of
maximum 2 years imprisonment with labor or a maximum fine of
2,500,000yen.

My questions: Is the ISP (Bekkoame/Internet) liable on relaying
pornographic materials? What about pornographic anime pictures widely
available in the Internet? Well, one thing is for sure: beware of
getting raided, Japanese underground activists.

 // Kenji Rikitake <kenji@reseau.toyonaka.osaka.jp>

------------------------------

Date: Mon, 29 Jan 1996 12:57:45 -0800 (PST)
From: Jeremy Lassen <jlassen@MINDCRIME.AX.COM>
Subject: File 6--ISP's and Common Carrier status (A response to Mr. Townson)

>there is no prohibition
>against you starting your own newspaper to print it instead. An ISP
>who takes a responsible approach and refuses service to any variety
>of clients --

Patrick Townson Seems to be missing an important point here.  ISPs
are not Newspapers. They are not even Content providers.  They are
Common Carriers.  As soon as an ISP starts deciding who and what they
will carry, they make themselves liable for everything that
originates, or passes through their system.

Mr. Townson says to this What a cop out!   What a damn cop out!!!!

This is not a cop out'. his is a smart and necessary business
decision.

One of the major On line providers (Prodigy, I think) was FOUND
LIABLE for a user's post  BECAUSE THEY CLAIM TO CONTROL AND REGULATE
what goes on their system.  The judge ruled that  the service
provider did not have common carrier status because of this.

From a legal standpoint, the moment ISP's decide they will not carry
something, they are saying they are responsible for everything they
do carry, including e-mail, public posts, FTP sights, Websights,
etc....

If Mr. Townson wants to publish a newspaper, electronic or otherwise,
he can decide what he wants to carry.   But If he wants to be a
common carrier (ISP),  And have the protection that the law provides
for common carriers, He can not simply block a certain group, or
person because he finds their politics or ideology offensive.  This
is not a cop out. THIS IS THE LAW!

Neo-Nazi's use the telephone system.  Should AT&T refuse to allow
them to use the phones, just because they don't agree with what the
Neo-Nazi's are saying?  Of course not.  In fact, they could be sued
if they tried to do so.

The bottom line is, If an ISP is willing to take responsibility for
EVERYTHING that comes and goes through its system, then by all means,
refuse to carry and propagate any offensive material, BUT if they
want common carrier protection, they can not pick and choose what
they will and will not carry.  There is a legal precedent for this.

I think all ISP's should keep this in mind before they start refusing
to carry things.  ISP's are not content providers, and they are not
publishers.  They are common carriers.

Aside from any questions of liability, The best response to Mr.
Townson was made by Voltaire, hundreds of years ago -- I disapprove
of what you say, but I will defend to the death your right to say it.

Keep talking Mr. Townson.  Just because I find your  blatant
disregard for the first amendment offensive, If I were your ISP, I
would not prohibit you from using my service, nor would I refuse to
propagate any messages of yours that passed through my system.

------------------------------

Date: Thu, 18 Jan 1996 19:17:48 -0600 (CST)
From: Crypt Newsletter <crypt@sun.soci.niu.edu>
Subject: File 7--Academic Press virus book borrows from SKISM/40Hex

 Faithful readers of Crypt Newsletter know that when they see
the tired hacker bromide "Information wants to be free!" it's
time to grasp the wallet firmly because a ripoff is in the
making.  Danish programmer Rune Skardhamar's computer virus
book for Academic Press ($35 cash money) drop-kicks the reader
with cliches like "Information [on computer viruses] needs to be
free" in the introduction and goes steadily downhill with a
collection of humorous errors, non-working computer virus samples
pulled from virus exchange BBSes and rudimentary anti-virus
programs which, if assembled, either corrupt computer files
or pronounce virus-infected programs clean.

One source for the book is phalcon/SKISM's 40Hex magazine which
Skardhamar calls possessed of a "propagandist" view of computer viruses.
Paradoxically, one of the viruses included in the book is a direct
action .COM-infector produced by the earliest version of the
phalcon/SKISM MPC virus-maker software which, as published, does not
work.  Skardhamar's PS-MPC virus sample contains a small error in one
of its DOS function calls that ensures its code cannot be written
to host files and while it's an easy correction for most people
familiar with computer viruses, it's probably beyond the ability of
the audience of beginners at which the book is aimed.

Purely by serendipity, this is to Skardhamar's advantage.

Here's why:

"Virus Detection and Elimination" also comes with a companion diskette
containing some TASM-compatible assembly language programs written
by the author for the purpose of detecting and disinfecting the viruses
included in the book.  The "disinfector" for the PS-MPC virus is quite
novel in approach:  It cleans the virus by truncating infected programs
by the virus's length and then overwriting the remainder of the
program with garbage from memory, totally corrupting the file.
This appears to be another laughable gaffe which most readers
won't run across simply because the virus the book's "cleaner" is
paired with isn't contagious.

Another interesting example of Skardhamar's approach to virus
detection is the scanning program designed for a companion virus
included in the book.  The virus, written by "Wonko the Sane" and
dubbed "The slightly orange avenger" works if you detect the typo
in the code and add a space. (Even for those who don't recognize
it, the error is so small that running the instructions for the
virus through any assembler will flag it and prevent compilation
until a correction is made.) However, the scanner for "Wonko the
Sane's" companion virus doesn't work, instead inspecting infected
files, the binary images of the virus, and gaily announcing to the
user "OK"!

Although not all of the programs on Skardhamar's diskette were
tested, the reader might approach the code (particularly the
detection and disinfection routines) slowly, given the performance
of other examples offered upon it.  Indeed, disclaimers peppered
liberally across the diskette balefully proclaim:

"No responsibility whatsoever will be taken for any damage
incidential [sic] or otherwise resulting from the use or misuse of
this program. Neither will responsibility be taken for omissions
or errors in the code, comments etc. You are now resonsibly [sic]
for your own actions."

This type of indirect warning that the reader is about to suffer
a computer hotfoot is paraphrased straight from the computer virus
underground.

The point to be made here, and which I suspect was a bit beyond
the technical editors at Academic Press when they went over the
manuscript - is "Virus Detection and Elimination" is in many ways,
simply the product of trolling virus exchange BBSes and refitting
the subject matter recovered in a more expensive-looking suit.
It's fair to say that lay readers will find portions of "Virus
Detection and Elimination" extremely fascinating
but it would have been easier on consumers to give it a title like
"What I Found After a Few Months of Visiting Virus Exchanges on
BBSes and the Internet" since there is nothing in the book's enclosed
programing that is of much practical use in "detection and
elimination." Of course, a good editor could shorten the new title
to something a bit more zippy and saleable.

Additionally, "Virus Detection and Elimination" covers technique, also
apparently lifted from 40Hex and other files from the computer
underground, on making viruses refractory to trivial attempts at
analysis. In its computer virus history portion, retold again is the
legend of Bulgaria as computer virus factory for the world. The story
has been repeated and exaggerated so often for magazines and newspapers
it's now an inescapable tenet of computer virus lore.  An enterprising
individual in search of a few quick bucks would be smart to consider
printing up some black T-shirt's, perhaps emblazoned with "I survived
the Bulgarian computer virus factory!" and setting up a kiosk at
hacker conventions in 1996.

Dave Hannon, an editorial staffer at Academic Press, commented to
Crypt that English was Skardhamar's second language.  For readers
of "Virus Detection and Elimination," it's, uh, noticeable.  As for the
faults in the anti-virus programs and viruses included with the book,
Hannon also conceded appraising the material and code included in the
book was beyond the technical ability of its American publisher and it
fell to the author to look over his own material for mistakes of this
nature prior to publication.

"Please do not use the information carried in this book to wreck
havoc," Skardhamar writes near the end of his book. He means "wreak
havoc."  Further, he writes, "Any stupid fool can make a virus; the
genius is the one who will put the coding techniques to some creative
use."  In view of the "code" included with "Virus Detection and
Elimination," this statement - as Skardhamar's parting shot - is
a bone-crusher. His bones, though, not yours, making the book
a solid collector's item amid the increasing "lore" devoted to
the world of computer viruses.


http://www.soci.niu.edu/~crypt
Crypt Newsletter

------------------------------

Date: Thu, 01 Feb 1996 12:54:25 -0500
From: altom@NERVM.NERDC.UFL.EDU
Subject: File 8--Journal of Technology Law & Policy

                  Journal of Technology Law & Policy
                       University of Florida
                           College of Law

             ******************************************
                           CALL FOR PAPERS
                    *****************************

                             Spring 1996

   The Journal of Technology Law & Policy is devoted to exploring the
legal and policy issues raised by emerging technology.  We invite
contributions of original works for our Spring, 1996 issue.  Student
contributions are encouraged.

   To promote access to the Journal, the Journal will be published on the
World Wide Web.  Submissions to the Journal are encouraged to take full
advantage of this medium.  Relevant graphics, sound, and video may be
utilized.

   There are no length limitations for submissions.  Submissions must
include a copy in electronic form.  All citations should be in Bluebook
and endnote form.  Please include the URL of any cited information
available online.

  _____________________________
http://grove.ufl.edu/~techlaw
techlaw@grove.ufl.edu
Fax number: (352)-377-7655

Mailing Address:
Journal of Technology Law & Policy
University of Florida
College of Law
P.O. 117640
Gainesville, FL 32611-7640

------------------------------

Date: Sun, 28 Jan 1996 23:07:00 EST
From: davidbat@PRODIGY.COM(MR DAVID W BATTERSON)
Subject: File 9--Gay Oregon State Rep. George Eighmey Is OUT on the Web

by David Batterson

PORTLAND--Oregon State Rep. George Eighmey (D-Portland), a longtime
prominent figure in Oregon's GLBT community, has now launched his own
site on the growing World Wide Web.

Eighmey has been out for some time now, and has no qualms about
appearing publicly in an electronic venue that reaches worldwide. In
addition to information on current legislative proposals, there are
links to other governmental Web sites in the state and elsewhere.

He has worked in the State Legislature on issues revolving around
corrections, children and families, and the rights of the terminally
ill.  In addition to lawyering, Eighmey is a community activist,
donating his time to the Oregon Gay and Lesbian Law Association, Our
House of Portland (an AIDS hospice), REACH Community Development,
Ladd's Addition and Hosford-Abernathy Neighborhood Associations and
the Oregon Speak Out Project.

The Web address for Rep. George Eighmey is:
http://www.portals.pdx.edu/~eighmey. E-mail: RepGeorge@aol.com.

###

David Batterson's Web site is at:
http://pages.prodigy.com/webazine/homepage.htm. Or you may e-mail
him
via: davidbat@prodigy.com.

------------------------------

Date: Thu, 1 Feb 1996 11:36:23 +0000
From: Joshua M.K. Masur <jmkm@echonyc.com>
Subject: File 10--Re: Big Copyright Ruling

On  1 Feb 96 at 10:40, I wrote:

> Quoth _US Law Week_ vol 64 no.28, pp. 64 LW 1109-1110:
>
> "A competitor that copied a CD-ROM telephone directory and then
> made that information accessible via an original search program on
> the Internet did not commit a copyright violation[.]...  [T]he
> court held that the 'shrinkwrap license' employed by the CD-ROM
> manufacturer to limit the use of its product is unenforceable...."
>
> The case in question is ProCD v. Zeidenberg, decided by the US
> District Court for the Western District of Wisconsin, 95-C-671-C
> 1/4/96.
>
> "The listings are ... a collection of facts arranged in a
> non-original fashion" and therefore not subject to copyright;
> furthermore, the court recognized that the defendant was not
> actually publishing the raw data on the net, but providing
> added-value -- search results.

The court relied on precedent (Feist Publications, Inc. vs. Rural
Telephone Services Co., 499 US 340, 1991) that states that phone
company "white pages" are not copyrightable because they contain raw
information lacking "the minimum degree of creativity necessary to
constitute a copyrightable compilation of facts." [US Law Week 64 LW
2451].  This appears likely to stand up to appeal.

> Most important to us all, though, the "license contained on the
> discs' packaging is not bargained for by the product purchaser and
> thus is unenforceable under Sections 2-206, 2-207, and 2-209 of
> the Uniform Commercial Code."  Basically, the buyer doesn't have
> "adequate opportunity" to review the terms of the contract before
> purchase to validate it as a contract.

The legal theory behind this finding is that because licences try to
replace any actual agreement between the producer and consumer of
software, the software becomes goods, rather than services, and is
thus subject to limitations of the UCC.  "[T]he terms...[are] not
presented...at the time of sale[;]... the [user does] not receive
the opportunity to inspect or consider those terms."  [US Law Week
64 LW 2451]  Specifically, it cites the fact that licenses often
change between initial purchase and upgrade purchase as rendering
them invalid generally.

This is sure to be challenged on appeal, with briefs no doubt filed
by the Sofware Publishers' Association, among others.  It remains
unclear whether this portion of the decision will stand over the long
term, but clearly, the potential impact is huge.


Please note that I am not a lawyer and am bringing this subject up
for your information, discussion, and review.

------------------------------

Date: Sun, 16 Dec 1995 22:51:01 CDT
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 11--Cu Digest Header Info (unchanged since 16 Dec, 1995)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send post with this in the "Subject:: line:

     SUBSCRIBE CU-DIGEST
Send the message to:   cu-digest-request@weber.ucsd.edu

DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.

The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at:  Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

To UNSUB, send a one-line message:   UNSUB CU-DIGEST
Send it to  CU-DIGEST-REQUEST@WEBER.UCSD.EDU
(NOTE: The address you unsub must correspond to your From: line)

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on  internet);
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

EUROPE:  In BELGIUM: Virtual Access BBS:  +32-69-844-019 (ringdown)
         Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
         In ITALY: ZERO! BBS: +39-11-6507540
         In LUXEMBOURG: ComNet BBS:  +352-466893

  UNITED STATES:  etext.archive.umich.edu (192.131.22.8)  in /pub/CuD/
                  ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
                  aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
                  world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
                  wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
  EUROPE:         nic.funet.fi in pub/doc/cud/ (Finland)
                  ftp.warwick.ac.uk in pub/cud/ (United Kingdom)


The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
  URL: http://www.soci.niu.edu/~cudigest/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.  CuD material may  be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission.  It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified.  Readers are encouraged to submit reasoned articles
relating to computer culture and communication.  Articles are
preferred to short responses.  Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
            the views of the moderators. Digest contributors assume all
            responsibility for ensuring that articles submitted do not
            violate copyright protections.

------------------------------

End of Computer Underground Digest #8.12
************************************