Computer underground Digest    Wed  Feb 28, 1996   Volume 8 : Issue 18
                           ISSN  1004-042X

       Editor: Jim Thomas (TK0JUT2@MVS.CSO.NIU.EDU)
       News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
       Archivist: Brendan Kehoe
       Shadow Master: Stanton McCandlish
       Field Agent Extraordinaire:   David Smith
       Shadow-Archivists: Dan Carosone / Paul Southworth
                          Ralph Sims / Jyrki Kuoppala
                          Ian Dickinson
       Cu Digest Homepage: http://www.soci.niu.edu/~cudigest

CONTENTS, #8.18 (Wed, Feb 28, 1996)

File 1--     CDT Press Release/2d suit against CDA
File 2--Are you feeling threatened by the CDA?
File 3--British virus writer to jail for 18 months
File 4--(Fwd) RE: White House Not Decent
File 5--Response to "French Book Banning"
File 6--NIU President Responds to Telecommunications Bill
File 7--Cu Digest Header Info (unchanged since 16 Dec, 1995)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

---------------------------------------------------------------------

Date:         Mon, 26 Feb 1996 17:09:15 -0600
From:         Stephen Smith <libertas@COMP.UARK.EDU>
Subject: File 1--     CDT Press Release/2d suit against CDA

Following is a relase prepared by the Center for Democracy and Technology
on the challenge to CDA:



CDA IS UNCONSTITUTIONAL, FAILS TO RECOGNIZE
UNIQUE NATURE OF THE INTERNET

On Monday, February 26, the Citizens Internet Empowerment
Coalition, the American Library Association, America Online,
Compuserve, Prodigy, Microsoft, NETCOM, The Commercial Internet
eXchange, The Newspaper Association of America, Wired Magazine,
Hotwired, Families Against Internet Censorship, and several other
plaintiffs filed suit in a Federal Court in Philadelphia PA
seeking to overturn the Communications Decency Act on the
grounds that it is a violation of the First Amendment rights of
all Internet users.

In a 55 page complaint that details the history of the Internet
and outlines how the network operates, the CIEC intends to educate
the court on how the Internet functions and why the broad content
regulations imposed by the CDA threaten the very existence of the
Internet as a viable medium for free expression, education, and
commerce. Among other things, the CIEC challenge argues that:

   * The Internet is a unique communications medium which deserves
First Amendment protections at least as broad as those afforded to
print media.

   * Individual users and Parents, not the Federal Government,
should determine for themselves and their children what material
comes into their homes based on their own tastes and values.

   * The CDA will be ineffective at protecting children from
"indecent" or "patently" offensive material online.

The CIEC challenge is separate from the case brought by the ACLU,
EFF, EPIC, Planned Parenthood, and several other plaintiffs in the
same Philadelphia court on February 8, 1996. The ACLU effort has
made significant and important headway in the past several weeks.
The CIEC case will reinforce the ACLU's efforts while focusing on
the unique nature of the Internet and alternatives to government
content regulations. ACLU and CIEC attorneys are closely
coordinating their efforts, and it is expected that the courts
will eventually consolidate the two cases.

The outcome of the legal challenges to the CDA will likely
determine the legal status of speech on the Internet and the
future of the First Amendment in the Information Age.

Citizens Internet Empowerment Coalition Members and Plaintiffs

The Citizens Internet Empowerment Coalition is a large and diverse
group of Internet users, businesses, non-profit groups, and civil
liberties advocates, who share the common goal of protecting the
First Amendment and the viability of the Internet as a means of
free expression, education, and commerce. CIEC members believe
that parents, not the United States Government, are the best and
most appropriate judges of what material is appropriate for
themselves and their children.

Named Plaintiffs in the CIEC Challenge to the Communications
Decency Act:

American Library Association
America Online, Inc.
American Booksellers Association
American Booksellers Foundation for Free Expression
American Society of Newspaper Editors
Association of American Publishers
Association of Publishers, Editors and Writers
Citizens Internet Empowerment Coalition
Commercial Internet eXchange
Compuserve, Inc.
Families Against Internet Censorship
Freedom to Read Foundation
HotWired Ventures Ltd.
Interactive Digital Software Association
Interactive Services Association
Microsoft Corporation
Microsoft Network
NETCOM On-Line Communications Services, Inc.
Newspaper Association of America
Prodigy, Inc.
Society of Professional Journalists
Wired Ventures Ltd.

Members of the Citizens Internet Empowerment Coalition:

Americans for Tax Reform
Association of American University Presses, Inc.
Association of National Advertisers
Association of Research Librarians
Center for Democracy and Technology
Coalition for Networked Information
Media Access Project
Media Institute
Microsystems Software, Inc.
National Assoc. of State Universities & Land Grant Colleges
People for the American Way
Recording Industry Association of America
Special Libraries Association
Surfwatch Software, Inc.
University of California Santa Barbara Library

------------------------------

Date: Tue, 27 Feb 1996 16:47:15 -0500
From: ACLUGPC@AOL.COM
Subject: File 2--Are you feeling threatened by the CDA?

To any interested parties:

We have become aware of an effort to promote the voices of people who
are presently not represented in the pending law suits challenging the
CDA.  If you feel that material you have posted, are posting, or will
be posting may be considered "indecent" or "patently offensive," you
might want to consider getting involved.

Jim Crawford, a partner at the Philadelphia law firm of Schnader,
Harrison, Segal & Lewis, is preparing an amicus brief in support the
ACLU's challenge to the indecency provisions contained in the recently
passed telecommunications law.  The brief will focus on the
overbreadth of the CDA, with particular emphasis on two groups of
amici -- content providers (those who place content on the Internet
that the CDA now criminalizes or potentially criminalizes under its
overbroad language); and access providers (ISPs, mainly).  As to
content providers, the argument will be that there is a tremendous
amount of socially valuable expression on the Internet that could be
termed "indecent," or "patently offensive," depending on the community
standards to be applied, under the CDA's overbroad provisions, but
which should not be censored as to adults or minors.   Amici want to
provide the court with very specific examples of such expression.

Among others, Crawford is interested in physicians' or medical groups;
universities and professors; artists; musicians; museums; and
businesses (who

may use provocative advertising and marketing techniques).  In other
words, if you are concerned that the content of your postings may be
considered "indecent" or "patently offensive," the amici may be
interested in hearing from you.

Anyone who is interested in being considered for amicus status should
forward a   statement of interest to Jennifer in Jim Crawford's office
at Jennifer_DuFault_James@SHSL.com.

Please feel free to pass this on to other persons who may be
interested.

Thank you.   Vic Walczak

------------------------------

Date: Thu, 29 Feb 1996 00:59:11 -0600 (CST)
From: Crypt Newsletter <crypt@sun.soci.niu.edu>
Subject: File 3--British virus writer to jail for 18 months

In mid-November 1995, the English trial of virus-writer Chris Pile
ended with a bang after months of stops and starts when the 26
year-old Devon man was sent away for 18 months as punishment for
spreading and inciting others to distribute the SMEG computer
viruses, programs of his design.

It was a depressing tale that stretched over a year, from
Pile's arrest and the confiscation of his computer by New Scotland
Yard's computer crime unit in 1994, to his conviction in Crown
Court in mid-1995, to the inevitable sentencing which sent him up
for a year and a half stint in an English bighouse the same
week when many others in computerland where trotting out shiny new
wares at ComDex in Las Vegas.

During the case, Pile admitted to five counts of unauthorized access
to computers to facilitate crime and five of unauthorized
modifications of computer software between 1993 and April 1994. He
also confessed to a charge of inciting others to spread viruses.

The English newspaper The Independent referred to Pile, known
briefly as the Black Baron in the virus underground, as a "'mad and
reclusive boffin' who wreaked havoc on computer systems by spreading
[viruses] . . . across the world . . ." [Webster's New World
Dictionary informs readers "mad boffin" is Brit slang for "mad
scientist."]

The Times asserted Microprose had been struck by one of Pile's
SMEG viruses and estimated that it lost 500,000 pounds in business
and wasted 480 man hours checking files for Pile's replicating code.
Another company, named Apricot, was claimed to have been closed while
clearing a third of its machines from a Pile-written virus infection.

In America, Dr. Alan Solomon - developer of the UK-based Solomon
Anti-virus Toolkit (S&S International), worked the news of Pile's
downfall into a presentation given by his firm at ComDex in Las
Vegas, Nevada. The following week, Graham Cluley - a colleague and
employee of Solomon at S&S, privately remarked on the Compuserve
on-line service that the  severity of Pile's sentence surprised him.

The treatment of Pile, an unemployed self-taught programmer, by the
English press was slightly reminiscent of the US media's portrayal of
Kevin Mitnick.  For the press, Pile was writ large as a young
cyber-madman bent on corrupted programming that resulted in
computer data damage escalating into the millions of dollars. Worse,
his code was said to be in the hands of shadowy criminal arch-fiends
in the US and Europe. Mitnick, of course, had been attributed with
cartoonish superhuman malevolence by the US media, a man dangerous
enough to bring down the Internet, steal the Christmas card list from
your computer and/or break into military computers controlling
NORAD.

English newspapers repeatedly reprinted the activation message from
Pile's SMEG.Pathogen virus.  "Your hard disk is being corrupted
courtesy of PATHOGEN!  Programmed in the U.K. (Yes, NOT Bulgaria!)
[C] the Black Baron 1993-94.  Featuring SMEG v0.1: Simulated
Metamorphic Encryption Generator! 'Smoke me a kipper, I'll be back
for breakfast.....' Unfortunately some of your data won't!!!!!"
Only superficially baleful and menacing, the message was a mixture of
quote from an English TV show named "Red Dwarf" and the stereotypical
gloating anti-style of previous virus writers to numerous to count.

For The Independent Pile was the "most famous" of virus-writers and
the "most dangerous" of a small band of them working in England.  The
Independent exaggerated when adding further that Pile's viruses,
called SMEG.Queeg and SMEG.Pathogen, were "the two most sophisticated
ever written." This was probably surprising news even to the anti-virus
software developers interviewed for the Black Baron stories. Indeed,
Alan Solomon's "Virus Encyclopedia," a compilation of technical notes
on computer viruses gives them a page a piece, neither much more nor
less than the hundreds of other entries in the book.

Pile's viruses, however, had reached "criminal elements" working in
Northern Ireland, the US, and Germany, according to the Independent.

The demonization and denunciation of Pile was unusually harsh in
light of the fact that prosecution witness Jim Bates commented to
Crypt Newsletter that UK authorities were uninterested in sending
officials overseas to collect evidence on the SMEG viruses in the
United States because a guilty verdict had been arrived at by
mid-1995.

Bates was the prosecution's point man in the case against Pile.  He
was, perhaps, the most experienced for the job, having played a
starring role in another famous U.K. computer crime case - the
prosecution of Joe Popp for the AIDS Information diskette extortion
scheme - in 1991.

In late 1989, Jim Bates was among the first to examine software
called the AIDS Information Trojan. The AIDS Info Trojan, as it
became known, was used as part of a computer blackmail attempt
launched by Popp, an erratic scientist living in Cleveland, Ohio.
Popp had concocted a scheme to extort money from PC users in Europe.
It involved the programming of a software booby-trap that masqueraded
as a database containing information on AIDS and how to assess an
individual's risk of contracting the disease.

The database, as one might expect, was trivial and contained only the
barest information on AIDS. However, when an unwitting user installed
the software, the AIDS Information Trojan created hidden
directories and files on the computer while hiding a counter in
one of the system's start-up files.  Once the count reached 90, Popp's
creation would encrypt the directory entries, alter the names of files
with the intent of making them inaccessible and present the operator with
a message to send approximately $200 to a postal drop in Panama City for
a cure reversing the effects of the program. The AIDS Information Trojan
came with a vaguely menacing warning not to install the software if one
didn't intend to pay for it at once.

Popp mailed 20,000 sets of the trojan on disk to users in Europe,
apparently subscribers to a now defunct magazine called PC Business
World.  The plan quickly fizzled but Bates was among the first to
analyze Popp's A
on it to English authorities.

The disks were eventually traced back to Popp and New Scotland Yard
began a lengthy process of extraditing him to England to stand
trial for computer blackmail in connection with the disks, a
battle which took almost another two years.  Bates was flown to
Cleveland during this time to present evidence in court which
persuaded American authorities to hand over Popp for extradition
to London. Bates also analyzed Popp's original AIDS Information
Trojan software, source code and a program which was evidently
intended to reverse the effects of the logic bomb, thus
regenerating a victim's data.

However, instead of going smoothly, the Popp trial became a source of
controversy.  It was claimed the Cleveland man was unfit to stand
trial because he began wearing a cardboard box over his head, making
it impossible to determine whether he was legitimately non compos mentis
or merely shamming.  As a result, Bates said to Crypt, Popp was
declared a "public disgrace" by the court and ejected from the
country. In England, this is an unusual classification which,
apparently, allows the case to remain open, the purpose being - on
this occasion, according to Bates - to discourage by intimidation
the authoring of books or a publicity tour of talk shows in the
United States by the defendant. At the time, it was difficult to
tell if Bates was being serious or facetious.

Chris Pile, unlike Joe Popp, appeared not to be flat crazy. Plus,
his computer viruses worked too well. It didn't take much work to
scare the uninformed with them. And Pile's legal defense team was
unable to muster the kind of sophisticated defense necessary to
mitigate Jim Bates' expertise.

For Pile's prosecution, Bates furnished collection and evaluation
of evidence relating to the spread of the Pile/SMEG viruses and
damages attributed to them.

Pile, said Bates, had attached a SMEG virus to a computer game and
uploaded it to a bulletin board system in the United Kingdom.  The
virus writer had also targeted the Dutch-made Thunderbyte anti-virus
software, initially by infecting one of the company's anti-virus
programs distributed via the shareware route.  After examining
software and source code for Pile's computer virus encryption
engine, named the SMEG, Bates also maintained Pile had invested
a great deal of time in fine-tuning subsequent editions of it
so it specifically generated computer virus samples opaque to
the Thunderbyte anti-virus scanning software.

Although there has been little unusual about this habit of virus
writers since 1993, it surely must have seemed remarkable
techno-magic to the English Crown Court. The judge treated it so.

"I dare say you were looking forward to reading in the computer
press about the exploits of the Black Baron," said judge Jeremy
Griggs to the defendant. "Those who seek to wreak mindless havoc on
one of the vital tools of our age cannot expect lenient treatment,"
he thundered before sending Pile over for eighteen months.

In the wake of Pile's sentencing, English newspapers continually
exaggerated the virus-writer as an international menace. The Times
of London echoed The Independent's hyperbole, maintaining Pile had
written a "training manual" for virus-writers found "in America and
Northern Ireland where it was being used by criminals."

Ali Rafati, as part of Pile's legal defense, said his client was a
"sad recluse."  The real Pile is difficult to describe in any detail
even though an excessively overwrought and lugubrious "Biography of a
virus-writer" was written about him by a cyber acquaintance and
circulated widely in the computer virus underground in 1994, just
before he was arrested by New Scotland Yard.

As bombastic as anything written by The Independent, Black Baron's
biography begins:

"In 1969 Neil Armstrong stepped onto the moon. It was a momentous
year for the world. But no-one [sic] at the time paid much attention to
a baby boy being born in a town in southern England. This baby boy
was destined to grow into one of the most infamous computer virus
writers of all time. In 1969 The Black Baron was born!"

Curiously, almost 80 percent of the Black Baron's "biography" is a
reprint of material written by Ross M. Greenberg, a semi-retired
programmer who wrote the Flu_Shot and VirexPC sets of anti-virus
software. The reprint dates from 1988 and contains standard
anti-virus rant and rave, calling virus-writers "worms." One
supposes it could be called mildly irritating by the thin-skinned.

In any case, if the Black Baron's biography is taken at face value,
Greenberg's anti-virus-writer spiel was the seed that formed the basis
of Pile's desire to write viruses as a means toward impressing people.

Black Baron's biography reads (errors reprinted), ". . . when
computers stop attracting social inadequates, but whom I am refering
to the arrogant members of the anti-virus lobby as well as the
nefarious virus authors. But what of the Black Baron? What is he? Is
he a malicious criminal? A computer terrorist? A social inadequate
trying to reassure himself of his own inadequacies through destroying
computer data? I don't [believe] so. I have spoken to Black Baron on
a number of occassions. He is happy to discuss his work, and, at my
request, he has even released a document detailing the design of SMEG.
He doesn't feed on the panic and fear that SMEG viruses such as
Pathogen and Queeg cause. Rather he revels in the embarrasement and
panic which his software causes the arrogant anti-virus writers."

At the time, Pile was unemployed. The "biography" concludes:

"After talking with him, I understand the Black Baron. I feel sorry for
him as well. He is a highly gifted individual who has not been given a
chance by computer society. So he has made his own chance. We all need
recognition. Mainly through employment, but we as thinking machines must
receive recognition for our abilities. Otherwise we sink into melancholy
and paranoida. Black Baron has received his recognition. We, the
computer society are responsible for the creation of Pathogen, Queeg,
SMEG and all the other computer viruses. We have no one to blame but
ourselves. It is our desire to keep the computer fraternity a closed
club which has alienated so many of our colleagues. By rubbing their
noses in it, so to speak, we have begged for trouble, and like the
inhabitants of Troy, we have received it."

English newspapers reported Pile had confessed to police he had
written the viruses to "increase his self-esteem" and because England
appeared not to have produced any virus writers capable of programming
samples capable of spreading in the real world.

The legal offices of Rafferty and Woodmansea, Pile's legal team were
contacted repeatedly by Crypt Newsletter but could not be reached for
opinion. Surprisingly, a secretary on the end of the phone claimed
they lacked e-mail addresses.

http://www.soci.niu.edu/~crypt

------------------------------

Date: Sun, 25 Feb 1996 21:20:41 -0500
From: IPS@OLYMPUS.NET(Steve O'Keefe)
Subject: File 4--(Fwd) RE: White House Not Decent

Sent--	Sunday, February 25, 1996 9:43 AM
To--	cypherpunks@toad.com

(Reprinted without permission from the Seattle Times
Personal Technology section)

White House Site Blocked

Add the White House to the Internet's extensive list of dens of
sin.

Surfwatch, a widely used software program that prevents access
to, and downloading of, sexually explicit material on the
Internet, accidently blocked access to the White House home page
recently - all because a "White House for Kids" Web site address
contained the word "couples."

That's a dirty word in the Surfwatch universe because many
sexually explicit online sites use it as part of their come-on.

In this case, "couples" merely referred to the Executive Branch
tandems of President and Hillary Rodham Clinton and Al and Tipper
Gore.

Surfwatch fixed the problem within hours, although some might
still find the site offensive.

For political reasons, that is.

------------------------------

Date: Wed, 28 Feb 1996 07:47:54 -0800 (PST)
From: beust@SOPHIA.ILOG.FR(Cedric Beust)
Subject: File 5--Response to "French Book Banning"

Declan McCullagh <declan@WELL.COM> writes

: (I'm already hosting a book banned by the French government:
:     http://www.cs.cmu.edu/~declan/le-secret/)

      Ok this is it. I have tried my best to resist the urge to reply, but
      this new mention is one too many. I can't let any more misinformation
      spread like this.

      First of all, I have nothing against you. Declan, and I respect the
      cause you *think* you are defending, but I will try to show that you
      have gone too far in this quest, and that you lost the minimum sense
      of "esprit critique" under the so-called motivation of defending free
      speech.

      Le Grand Secret is *not* a "book banned by the French government". It
      is a book banned by Francois Miterrand's family, on their request
      (and that of their lawyer's, who also has many good reasons to see
      this book withdrawn from the shelves as I will make clear below).

      The book hasn't been censored because of so-called sensitive material
      contained in it, but on the sole criterion that it relates private
      details of Mr. Mitterrand and relatives. This is a simple breach of
      privacy affair, not an attempt to hide away information from the public
      by some government cabal (remember, there is no cabal, and this
      applies to real life too :-)).

      If you had the curiosity to have the book read by a French speaking
      person, they would have let you know very quickly that this book
      contains *nothing* sensational. You can read here and there a few
      clear abuses of privileges (implying the lawyer I mentioned above,
      thus his haste to have the court censor it), but nothing unsuspected
      (you do expect the relatives of the president of a nation to have
      some privileges, don't you ? I am not saying this is normal, but just
      that it can be expected, and is no secret).

      Now, let me try to explain why you shouldn't be hosting this book.

      In France (just like in the United States and more and more
      countries), the government is trying to have a stake at
      -- somehow -- introducing regulations in the Internet. France might
      have its own CDA very soon. This kind of very unfortunate affair (*)
      is exactly what the government is expecting to justify a quick
      intervention and the creation of hasty measures to stop this den of
      pirates that dwell in the Internet. For you are a pirate, Declan,
      because you are violating the copyright law that applies to this book
      (the United States signed the Berne agreement regarding copyright and
      intellectual property). Are you aware of this ? Are you aware that
      what you are doing is exactly the same as hosting a pirate copy of,
      say, Microsoft NT, on your web page and say to all "come and download
      it" ?

      Don't you have the impression that by trying to defend the free
      speech on the Internet, you are doing exactly the opposite ?

      It's curious to see that as soon as the mere consideration of free
      speech comes into play, all actors (you first, this might apply to
      the EFF as well) suddenly lose all sense of criticism and are more
      hasty to wave blindly the banner of free speech than initiate a more
      thorough enquiry in order to make sure what this is all about.

      Please, Declan, don't think I am bashing your overall work. I am
      just trying to say you should be more careful when exercising your
      right to fight censorship and promote free speech.

      Regards,

Cedric BEUST
beust@sophia.inria.fr


(*)   (I remind the CUDers that it all started when a French cybercafe decided
      to put the book online right after it was withdrawn from the
      stores. I can elaborate and give more precise details on how and why
      the bartender was arrested afterwards in case this is of interest)

------------------------------

Date: Thu, 29 Feb 1996 03:23:52 -0600
From: cudigest@SUN.SOCI.NIU.EDU(Computer underground Digest)
Subject: File 6--NIU President Responds to Telecommunications Bill

               NIU RESPONDS TO TELECOMMUNICATIONS BILL

   President John E. La Tourette
   February 16, 1996

Since passage earlier this month of the Telecommunications Act of
1996, colleges and universities across the country have been
struggling to understand the potential implications of the bill's
so-called "indecency" provisions as they relate to faculty, staff
and student use of the Internet. As you may know, a federal judge in
Philadelphia recently granted a temporary restraining order that
prohibits the U.S. Justice Department from enforcing the indecency
provisions; however even that decision left supporters and opponents
confused. Clearly, this issue will not be definitively resolved
anytime soon, and we recognize the need to address campus concerns
in the interim. In consultation with NIU legal counsel and policy
experts at the American Council on Education and the American
Association of State Colleges and Universities, I offer the
following thoughts.

At the heart of the controversy are provisions which prohibit
Internet users from sending "indecent" material to minors or from
making such material available in any way that could be accessible
to children. Critics have also charged that a little-noticed
provision in the indecency section of the legislation would ban all
discussion of abortion on computer networks. (On this point,
President Clinton has clearly stated that the Justice Department
will not enforce a provision that is clearly in violation of the
First Amendment.)

Two basic issues define this controversy: the definition of
indecency, and institutional and individual liability. As these are
issues of infinite complexity, no official or organization has yet
issued a definitive interpretation of the legal issues involved. The
American Council on Education, the American Library Association and
the American Association of State Colleges and Universities are
working in Washington to craft technical amendments to the
Telecommunications Bill that would resolve many of the issues that
concern their member institutions. Additionally, Sen. Patrick Leahy
(D-Vermont) and Sen. Russell Feingold (D-Wisconsin), both members of
the Senate Judiciary Committee, introduced a bill (SB1567) on
February 9 which would strip out the indecency provisions
altogether.

Controversy surrounding use of the Internet clearly identifies a
mismatch between the speed of technological advancement and our
nation's ability to thoughtfully deal with ensuing constitutional
questions. Further, the legal questions with which we are faced go
far beyond issues of alleged "indecency." For example, the American
Association of State Colleges and Universities (AASCU) recently
urged its members to adopt a "code of ethics" for students using the
Internet, and suggests that students be required to agree to follow
the code before being given e-mail addresses. AASCU's recommendation
follows an incident at the University of Maryland in which a student
posted unsubstantiated hearsay on the Internet about a local woman
whom he said had been abusing her high school-aged daughter. The
student listed the woman's phone number on this world-wide post, and
she subsequently received numerous harrassing calls.

AASCU's most recent posting on this subject suggests that colleges,
universities and other providers of Internet access could be held
harmless for indecent or harrassing posts by students if the network
manager can show that the institution has taken good faith,
reasonable, effective and appropriate actions under the
circumstances to restrict or prevent access to minors to (indecent)
communications. It remains unclear, however, how an institution
could prove "good faith" in an environment where students have
access to many campus computer servers, and where millions of e-mail
and other Internet communications by students and faculty are sent
daily. AASCU officials also note that the Justice Department will
likely develop guidelines for owners and operators of computer
servers on what "reasonable and appropriate" measures they can take
to avoid transmission or display of indecent content to minors.
AASCU plans to further discuss the implications of the
Communications Decency Act at a meeting next month of campus
governmental relations and communications representatives; NIU will
be represented at that meeting.

In the meantime, Northern Illinois University will continue to
foster and protect academic freedom in teaching, research and
creative artistry as strongly as ever. That this will continue is
unmistakably guaranteed by the governance standards of the Board of
Trustees and the University Constitution. The University has not
changed any policy or any operation as a result of this law being
passed -- there is still access to the Internet, home pages and the
other uses which have been provided to our academic community.
Moreover, it is unlikely that reasonable and responsible use of this
communications tool will result in adverse consequences for
individual members of the university community. University employees
are financially protected in the responsible performance of their
duties through the newly strengthened Indemnification Policy in our
new Board's bylaws. At the same time, we take very seriously any
real or potential threats to academic freedom, and will continue to
closely monitor developments in this case. Although there are many
unanswered questions that we could discuss internally, it is more
appropriate for faculty and staff concerns to be communicated to our
elected officials in Washington. A list of their names and
addresses, including e-mail addresses, is attached.

The telecommunications act was several years in the making, received
extensive bipartisan support, and was intended to liberate
technology and make it work more effectively for all citizens.
Unfortunately, as often happens in our legislative process, some
unintended provisions made their way into what is otherwise a
positive set of reforms. We all have an interest in seeing the goals
of the original legislation realized. At the same time, we are
appropriately concerned about the imposition of vague,
"community-based" decency standards on the normal, scholarly
activities of this or any institution of higher learning.

_________________________________________________________________


   Illinois Senators

   Carol Moseley-Braun
   SH-320 Hart Senate Office Building
   Washington, D.C. 20510-1301
   202/224-2854
   E-Mail: senator@moseley-braun.senate.gov

   Paul Simon
   SD-462 Dirksen Senate Office Building
   Washington, D.C. 20510-1302
   202/224-2152
   E-Mail: senator@simon.senate.gov

_________________________________________________________________


   U.S. Representatives from Northern Illinois Districts

   Philip M. Crane
   233 Cannon House Office Building
   Washington, D.C. 20515-1308
   202/225-3711


   J. Dennis Hastert
   2453 Rayburn House Office Building
   Washington, D.C. 20515-1314
   202/225-2976
   FAX: 202/225-0697
   E-Mail: dhastert@hr.house.gov


   Donald Manzullo
   426 Cannon House Office Building
   Washington, D.C. 20515-1316
   202/225-5676
_________________________________________________________________


   President John E. La Tourette
   February 16, 1996






------------------------------

Date: Sun, 16 Dec 1995 22:51:01 CDT
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 7--Cu Digest Header Info (unchanged since 16 Dec, 1995)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send post with this in the "Subject:: line:

     SUBSCRIBE CU-DIGEST
Send the message to:   cu-digest-request@weber.ucsd.edu

DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.

The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at:  Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

To UNSUB, send a one-line message:   UNSUB CU-DIGEST
Send it to  CU-DIGEST-REQUEST@WEBER.UCSD.EDU
(NOTE: The address you unsub must correspond to your From: line)

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on  internet);
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

EUROPE:  In BELGIUM: Virtual Access BBS:  +32-69-844-019 (ringdown)
         Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
         In ITALY: ZERO! BBS: +39-11-6507540
         In LUXEMBOURG: ComNet BBS:  +352-466893

  UNITED STATES:  etext.archive.umich.edu (192.131.22.8)  in /pub/CuD/
                  ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
                  aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
                  world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
                  wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
  EUROPE:         nic.funet.fi in pub/doc/cud/ (Finland)
                  ftp.warwick.ac.uk in pub/cud/ (United Kingdom)


The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
  URL: http://www.soci.niu.edu/~cudigest/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.  CuD material may  be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission.  It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified.  Readers are encouraged to submit reasoned articles
relating to computer culture and communication.  Articles are
preferred to short responses.  Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
            the views of the moderators. Digest contributors assume all
            responsibility for ensuring that articles submitted do not
            violate copyright protections.

------------------------------

End of Computer Underground Digest #8.18
************************************