Computer underground Digest Wed Oct 29, 1997 Volume 9 : Issue 78 ISSN 1004-042X Editor: Jim Thomas (cudigest@sun.soci.niu.edu) News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu) Archivist: Brendan Kehoe Shadow Master: Stanton McCandlish Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Field Agent Extraordinaire: David Smith Cu Digest Homepage: http://www.soci.niu.edu/~cudigest CONTENTS, #9.78 (Wed, Oct 29, 1997) File 1--Sen. Lott's comments on Encryption (Cong. Record) File 2--NPR Reporter Indicted For Trading Porn on the Net File 3--Hack into Yale File 4--Mitnick Might Get Computer Use File 5--IRISS'98 Internet Research and Information for Social (fwd) File 6--Re: In "Web things to do when you're dead" (CuD 9.73) File 7--Electronic Frontier Canada opposes Internet content control File 8--Cu Digest Header Info (unchanged since 7 May, 1997) CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN THE CONCLUDING FILE AT THE END OF EACH ISSUE. --------------------------------------------------------------------- Date: Sat, 25 Oct 1997 09:19:53 -0700 (PDT) From: Mike Godwin <mnemonic@well.com> Subject: File 1--Sen. Lott's comments on Encryption (Cong. Record) ((MODERATORS' COMMENT: The following is taken from The Well's EFF conference. Information about The Well can be obtained at: http://www.well.com)) From the Congressional Record ---------------------------------------------------------- ENCRYPTION (Senate - October 21, 1997) ---------------------------------------------------------- [Page: S10879] Mr. LOTT. Mr. President, I would like to report to my colleagues on the activities in the House to establish a new export policy on encryption. This is an issue that is still at the top of my list of legislation I hope this Congress can resolve within the next 2 months. The House's actions last month turned a spotlight on how this issue should ultimately be resolved. Let me briefly review the issue. Encryption is a mathematical way to scramble and unscramble digital computer information during transmission and storage. The strength of encryption is a function of its size, as measured in computer bits. The more bits an encryption system has, the more difficult it is for someone else to illegally unscramble or hack into that information. Today's computer encryption systems commonly used by businesses range from 40 bits in key length to 128 bits. A good hacker, let's say a criminal or a business competitor, can readily break into a computer system safeguarded by a lower-technology 40-bit encryption system. On the other hand, the 128-bit encryption systems are much more complex and pose a significant challenge to any would-be hacker. Obviously, all of us would prefer to have the 128-bit systems. And equally as important, we would like to buy such systems from American companies. Firms we can routinely and safely do business with. Foreign companies and individuals also want to buy such systems from American companies. They admire and respect our technological expertise, and trust our business practices. The United States remains the envy of the world in terms of producing top-notch encryption and information security products. However, current regulations prohibit U.S. companies from exporting encryption systems stronger than the low-end, 40-bit systems. A few exceptions have been made for 56-bit systems. Until recently, it has been the administration's view that stronger encryption products are so inherently dangerous they should be classified at a level equal to munitions, and that the export of strong encryption must be heavily restricted. While we are restricting our own international commerce, foreign companies are now manufacturing and selling stronger, more desirable encryption systems, including the top-end 128-bit systems, anywhere in the world they want. Clearly, our policy doesn't make sense. Just as clearly, our export policies on encryption have not kept up to speed with either the ongoing changes in encryption technology or the needs and desires of foreign markets for U.S. encryption products. My intention is neither to jeopardize our national security nor harm law enforcement efforts. I believe we must give due and proper regard to the national security and law enforcement implications of any changes in our policy regarding export of encryption technology. But it is painfully obvious we must modernize our export policies on encryption technology, so that U.S. companies can participate in the world's encryption marketplace. The legislative initiative on this issue has always been about exports, but this summer that changed. During the past month, the FBI has attempted to change the debate by proposing a series of new mandatory controls on the domestic sale and use of encryption products. Let me be clear. There are currently no restrictions on the rights of Americans to use encryption to protect their personal financial or medical records or their private e-mail messages. There have never been domestic limitations, and similarly, American businesses have always been free to buy and use the strongest possible encryption to protect sensitive information from being stolen or changed. But now, the FBI proposes to change all that. The FBI wants to require that any company that produces or offers encryption security products or services guarantee immediate access to plain text information without the knowledge of the user. Their proposal would subject software companies and telecommunications providers to prison sentences for failure to guarantee immediate access to all information on the desktop computers of all Americans. That would move us into an entirely new world of surveillance, a very intrusive surveillance, where every communication by every individual can be accessed by the FBI. Where is probable cause? Why has the FBI assumed that all Americans are going to be involved in criminal activities? Where is the Constitution? And how would this proposal possibly help the FBI? According to a forthcoming book by the M.I.T. Press, of the tens of thousands of cases handled annually by the FBI, only a handful have involved encryption of any type, and even fewer involved encryption of computer data. Let's face it--despite the movies, the FBI solves its cases with good old-fashioned police work, questioning potential witnesses, gathering material evidence, and using electronic bugging or putting microphones on informants. Restricting encryption technology in the U.S. would not be very helpful to the FBI. The FBI proposal won't work. I have talked with experts in the world of software and cryptography, who have explained that the technology which would provide compliance with the FBI standard simply does not exist. The FBI proposal would force a large unfunded mandate on our high technology firms, at a time when there is no practical way to accomplish that mandate. Rather than solve problems in our export policy, this FBI proposal would create a whole new body of law and regulations restricting our domestic market. This and similar proposals would also have a serious impact on our foreign market. Overseas businesses and governments believe that the U.S. might use its keys to computer encryption systems to spy on their businesses and politicians. Most U.S. software and hardware manufacturers believe this is bad for business and that nobody will trust the security of U.S. encryption products if this current policy continues. In fact, this proposal appears to violate the European Union's data-privacy laws, and the European Commission is expected to reject it this week. So, the FBI proposal would: Invade our privacy; be of minimal use to the FBI; would require nonexistent technology; would create new administrative burdens; and would seriously damage our foreign markets. This is quite a list. Mr. President, the FBI proposal is simply wrong. I have learned that even the administration does not support this new FBI proposal. So why does the FBI believe it must now subject all Americans to more and more surveillance? This independent action by the FBI has created confusion and mixed signals which are troublesome for the Senate as it works on this legislation. Perhaps the FBI and the Justice Department need to focus immediately on a coordinated encryption position. Mr. President, I congratulate the members of the House Commerce Committee for rejecting this FBI approach by a vote margin of more than 2 to 1. I am sure all of my colleagues are sympathetic to the fact that emerging technologies create new problems for the FBI. But we must acknowledge several truths as Congress goes forward to find this new policy solution. People increasingly need strong information security through encryption and other means to protect their personal and business information. This demand will grow, and somebody will meet it. In the long term, it is clearly in our national interest that U.S. companies meet the market demand. Individuals and businesses will either obtain that protection from U.S. firms or from foreign firms. I firmly believe that all of our colleagues want American firms to successfully compete for this business. Today there are hundreds of suppliers of strong encryption in the world marketplace. Strong encryption can be easily downloaded off the Internet. Even if Congress wanted to police or eliminate encryption altogether, I am not sure that is doable. So, let's deal with reality. Clamping down on the constitutional rights of American citizens, in an attempt to limit the use of a technology, is the wrong solution. The wrong solution. This is especially true with encryption technology because it has so many beneficial purposes. It prevents hackers and espionage agents from stealing valuable information, or worse, from breaking into our own computer networks. It prevents them from disrupting our power supply, our financial markets, and our air traffic control system. This is scary--and precisely why we want this technology to be more available. Only a balanced solution is acceptable. Ultimately, Congress must empower Americans to protect their own information. Americans should not be forced to only communicate in ways that simply make it more convenient for law enforcement officials. This is not our national tradition. It is not consistent with our heritage. It should not become a new trend. Mr. President, I would like to establish a framework to resolve this difficult issue. I hope to discuss it with the chairmen and ranking members of the key committees. I especially look forward to working with the chairman of the Commerce, Science and Transportation Subcommittee on Communications, Senator Burns. He was the first to identify this issue and try to solve it legislatively. His approach on this issue has always been fair and equitable, attempting to balance industry wants with law enforcement requirements. I believe there are other possible ideas which could lead to a consensus resolution of the encryption issue. It is my hope that industry and law enforcement can come together to address these issues, not add more complexity and problems. The bill passed by the House Commerce Committee included a provision establishing a National Encryption Technology Center. It would be funded by in-kind contributions of hardware, software, and technological expertise. The National Encryption Technology Center would help the FBI stay on top of encryption and other emerging computer technologies. This is a big step. This is a big step in the right direction. It is time to build on that positive news to resolve encryption policy. Mr. President, there is an op-ed piece which appeared in the Wall Street Journal on Friday, September 26. It is well written and informative, despite the fact that its author is a good friend of mine. Mr. Jim Barksdale is the president and CEO of Netscape Communications and is well-versed in encryption technology. Mr. Barksdale's company does not make encryption products; they license such products from others. They sell Internet and business software and, as Jim has told me many times, his customers require strong encryption features and will buy those products either from us or foreign companies. Again, let's deal with reality. The credit union manager in Massachusetts, the real estate agent in Mississippi, the father writing an e-mail letter to his daughter attending a California university, each want privacy and security when using the computer. They will buy the best systems available to ensure that privacy and security. And, in just the same way, the banker in Brussels, Belgium, the rancher in Argentina, and the mother writing e-mail to her daughter in a university in Calcutta, India, each of these people also want privacy and security. They also will buy the best systems available to ensure that privacy and security. And they want encryption systems they trust--American systems. That's what this debate is about. Mr. President, if Congress does not modernize our export controls, we run the real risk of destroying the American encryption industry. And we risk giving a significant and unfair advantage to our foreign business competitors. [Page: S10881] ------------------------------ Date: Fri, 17 Oct 1997 18:19:13 GMT From: owner-cyber-liberties@aclu.org Subject: File 2--NPR Reporter Indicted For Trading Porn on the Net Cyber-liberties Update NPR Reporter Indicted For Trading Porn on the Net While Researching Story A veteran reporter for National Public Radio, who says he was engaged in lawful newsgathering activities, was indicted in late August by a federal grand jury for allegedly receiving and sending child pornography through the Internet, Jane Kirtley, Executive Director of the Reporters Committee for Freedom of the Press (RCFP) said. Larry Matthews pleaded not guilty to nine felony counts of possession of child pornography and six counts of distribution of such material in federal District Court in Maryland, saying that he was using the material as research for a freelance story on child pornography on the Internet. Matthews had reported three stories on the issue prior to his indictment, Kirtley said. "This is exactly the type of action we predicted would happen when Senator Hatch moved to pass the Child Pornography Prevention Act (CPPA) which amended the Privacy Protection Act of 1980. The new law removes exemptions that protected journalists from federal search and seizures and creates an overbroad definition of pornography," she said. "The amendment was unnecessary since child pornography is already illegal and the amendment leads to the overzealous persecution of journalists engaged in protected newsgathering activities," Kirtley said. The ACLU along with other week free-speech advocates recently filed an appeal before the Court of Appeals in the Ninth Circuit to another decision which upheld the CPPA as constitutional. The suit is a pre-enforcement challenge to the law and claims it is unconstitutional because it criminalizes the publication or transmission of non-obscene images that "appear" to portray children involved in sexual acts. The law applies to computer-generated images, morphed images, films and drawings, and bans any depiction that "is, or appears to be, of a minor engaged in sexually explicit conduct." +++++++++++++++++ About Cyber-Liberties Update: ACLU Cyber-Liberties Update Editor: Cassidy Sehgal (Cassidy_Sehgal@aclu.org) American Civil Liberties Union National Office 125 Broad Street, New York, New York 10004 To subscribe to the ACLU Cyber-Liberties Update, send a message to majordomo@aclu.org with "subscribe Cyber-Liberties" in the body of your message. To terminate your subscription, send a message to majordomo@aclu.org with "unsubscribe Cyber-Liberties" in the body. ------------------------------ Date: Sun, 19 Oct 1997 21:16:13 -0500 (CDT) From: Avi Bass <te0azb1@corn.cso.niu.edu> Subject: File 3--Hack into Yale Hacker breaks into Yale e-mail By Jeff Herzog, The Yale Daily News, Oct. 16, 1997 Although no students realized it, Yale's computers were under attack Tuesday. A computer hacker "attacked" one of Yale's main e-mail account servers under the nose of Information and Technology Service officials. ITS staff detected a breach of the Pantheon login server as the attacker aimed to capture passwords and login names, ITS officials said. "The primary purpose of the attack was to use Yale as an attack point for other sites," Director of Academic Computing Services Philip Long said. As a result of the security breech, ITS required all pantheon users to change their account passwords. "We don't have evidence of damage or tampering with accounts, but we think it's important for students to change their security passwords as a precaution," Long said. ITS administrators said they believe that the hacker used a "sniffer," a rogue program designed to capture undetected all login names and passwords. As to the extent of damage the hacker caused, Long added, "We don't have evidence of small or wide spread compromise of accounts." <snip> ------------------------------ Date: Sun, 12 Oct 1997 16:14:45 -0400 From: "Evian S. Sim" <evian@escape.com> Subject: File 4--Mitnick Might Get Computer Use Valley Focus North Hills Alleged Hacker May Get Use of Computer Los Angeles Times (LT) FRIDAY October 10, 1997 By: ASSOCIATED PRESS Edition: Valley Edition Section: Metro Page: 3 Pt. B Story Type: Column; Brief; Wire Word Count: 312 A federal judge may allow Kevin Mitnick use of a computer to help him defend himself against computer and wire fraud charges. U.S. District Judge Mariana Pfaelzer earlier had vowed to keep Mitnick away from computers, but she seemed to back away from that edict after listening to lawyers' arguments Wednesday. Mitnick, who grew up in the Valley and began his electronic obsession by breaking into Los Angeles Unified School District computers while a student at Monroe High School in North Hills, was on parole for other computer-related convictions when he allegedly went on a three-year hacking spree in 1992. He has been in prison since he was arrested in 1995. Pfaelzer set an April 14 trial on 25 counts of computer and wire fraud, possessing unlawful access devices, damaging computers and intercepting electronic messages. Mitnick has pleaded not guilty to those charges. If convicted, he could face another five to 10 years in prison. <snip> Assistant U.S. Attorney David Schindler said that if all the documents were printed it would fill up a space larger than the courtroom. Pfaelzer seemed to warm to the notion that Mitnick have access to a laptop computer, and she told both sides to confer on how Mitnick could best view the evidence against him. Mitnick has been in jail since he was arrested in February 1995 in Raleigh, N.C., after an investigation and cross-country manhunt ended in a trap sprung by Tsutomo Shimomura, an expert in computer security. Copyright (c) 1997, Times Mirror Company ------------------------------ Date: 97-10-19 14:59:13 EDT From: John.Kirriemuir@bristol.ac.uk (John Kirriemuir) Subject: File 5--IRISS'98 Internet Research and Information for Social (fwd) 1st call for delegates for IRISS and 2nd call for abstracts for IRISS IRISS'98 Internet Research and Information for Social Scientists 25-27 March 1998 University of Bristol, UK http://www.sosig.ac.uk/iriss/ email: iriss-info@bris.ac.uk A three day conference hosted by the Institute for Learning and Research Technology at the University of Bristol. The first international IRISS conference aims to bring together social scentists who are interested in the Internet, either as a means of supporting and enhancing their work, or as a focus for their research. ***CONFERENCE THEMES*** The themes of this year's conference are Internet skills, sites and social effects. The conference aims to reflect the practical and theoretical questions raised by the increasing role of networked information in the social sciences and society. Topics for debate include: * how can social scientists make effective use of the Internet in their work? * where and how are social scientists using the Internet to enhance their work and what effect is it having on traditional roles and working methods? * what high quality information can the Internet supply to social scientists? * what impact does the Internet have on individuals and society and what visions do we have for the future? ***ATTENDING IRISS AS A DELEGATE*** This is the first call for delegates for IRISS. Confirmed, to date, for the conference are: * several high-profile keynote speakers * a large variety of papers and presentations, covering all of the conference themes, and presented by speakers from a combination of academic, commercial, public and social/voluntary organisations * pre and during conference hands-on workshops, in fully networked rooms and conducted by experienced Internet for Social Scientist trainers * the main conference dinner, held in the prestigious Harveys Restaurant and Museum - see: http://www.sosig.ac.uk/iriss/harveys.html Bristol is a city in the west of England; it is served by an international airport, located 11 miles south of the city. The city has two major train stations, with frequent train services to London (in under 2 hours) and other cities. South Wales is a few minutes away by train or car, and the scenic areas of the Cotswolds, Cornwall and Devon are all easily accessible, as are attractions such as the city of Bath, Stonehenge and Avebury. Bristol itself is a thriving cosmopolitan city, with a very lively social and cultural scene. The city has many famous sites of interest, such as the Clifton suspension bridge and the S.S. Great Britain, which are within a short distance of the conference location and accomodation. Various on-line guides to Bristol include: http://www.epost.co.uk/standards/bestofbris.html http://www.bristol.digitalcity.org/org/council/about-bristol.html A reduction is available to all delegates registering before 19 December 1997. Further details on booking can be found on the IRISS Web site. ***CALL FOR PAPERS*** We invite papers and participation from: * practitioners in the field who use the Internet to support their day to day work * researchers using Internet information and communication in their research * librarians developing their Internet knowledge and skills to serve a social science user group * educators interested in using the Internet for teaching and learning * information providers who publish on the Internet and wish to reach the social science community In addition to concurrent paper and workshop sessions the conference will feature an ongoing poster session and a dedicated Internet Gallery in a fully networked environment enabling contributors to display high quality Internet resources. ***HOW TO CONTRIBUTE*** If you are interested in submitting a paper, joining the Internet Gallery or ongoing poster session, visit our Web site at: http://www.sosig.ac.uk/iriss/ for conference information together with online booking and submission forms. The Web site will be updated frequently as information becomes available and will include full programme details and abstracts. The deadline for the submission of abstracts is 7 November 1997. ***CONFERENCE FEE*** Delegates presenting papers will pay a reduced conference fee. A reduction will also be available to all delegates registering before 19 December 1997. Full details are available from the Web site. ***HOST A MEETING AT IRISS*** Would your organisation or professional association like to host a meeting at IRISS? We can provide free meeting rooms and refreshments for groups booking to attend the conference. Special discounts are available to groups of 10 or more. For further information contact the Conference Secretary at: iriss-info@bris.ac.uk General conference enquiries should be directed to: IRISS Conference Secretariat Institute for Learning and Research Technology University of Bristol 8 Woodland Road BRISTOL BS8 1TN, UK Tel: +44 (0)117 928 8474 Fax: +44 (0)117 928 8473 Email: iriss-info@bris.ac.uk IRISS Web site: http://www.sosig.ac.uk/iriss/ ------------------------------ Date: Mon, 13 Oct 97 11:01:45 MDT From: Dave++ Ljung <dxl@HPESDXL.FC.HP.COM> Subject: File 6--Re: In "Web things to do when you're dead" (CuD 9.73) I couldn't help but comment on this: |Things to Do on the Web When You're Dead | by David Blatner <david@afterlife.org> | | ... But I wonder how many people's sites are simply being "turned off" | when they no longer have a voice (or a checkbook) to sustain them? I like how you sneaked in that bit about the checkbook. That comment seems to imply that a web presence should be free. I fear a society where people not only don't have to work to supply themselves with food and shelter, but they have a 'right' to a home page? Frightening. Who exactly would pay for such a society? -------------------------------------------------- |From--The Old Bear <oldbear@arctos.com> |Subject--Spam Analysis | | 3. the apparent evolution of a subset of standard English | punctuation which might be called 'spammese'. Excellent catch on the exclamation point. I've been filtering my mailbox for spam as well - and I've found that the To, From and Subject fields can often give away spam - part of my filter searches for: From:.*(success|money|mailbot) To:.*(free@|you@|success|nobody@|friend@|money|askme|prices) Subject:.*(18\+|Pix|Hot.*Website|Adult.*Video) I only hit normal email (normail? ;) once with these regexps, and only because I screwed up and used 18+ instead of 18\+. I find that false positives aren't a problem because procmail saves off guessed SPAM and sends a reply explaining that the message was recognized as spam and gives contact instructions if this is a mistake. Not once has a spammer used my contact instructions to get spam to me. -------------------------------------------------- |From--Jonathan Wallace <jw@bway.net> |Subject--File 9--THE X-STOP FILES: The Truth Isn't Out There | | So another censorware product has been found to secretly been |blacklisting gay and lesbian material, anti-censorship sites, feminist... I fully agree with your analysis that censorware doesn't work and will probably never work well. I am however concerned that we are pointing out the impracticalities of one of the concepts we used to our defense against censorship of the entire net. So - to play Devil's Advocate for a moment, let's say you have children that you want to use the computer, but you really don't want them to access pornography when you're not looking. Sure - you could tell them to be a better parent, but my parents were great and I would've been up until two in the morning finding out what the female body looks like if we had the net when I was a kid :) Disregarding the discussion over whether or not we should allow our kids to look at such material, let's just assume: 1) Parents have the right to decide their kids shouldn't view such material 2) Kids will try to view such material regardless of what they are taught 3) Just keeping these kids off the net isn't necessarily fair. Whether or not it's true isn't as important, because a huge amount of the population believes that it's true and will fight for it strongly. So what solution do we give these people? Right now they have none, except to watch their children every moment they are on the computer. Can we find a solution? One possibility I came up with was creating a 'safeweb'. Safeweb would be similar to self-rating, but instead of deciding what category a page would fit into (a difficult thing to do), there would only be one 'rating' - that a page was deemed 'safe' - or at least innocuous. What would determine 'safe'? Well - it's not as big of an issue anymore, because it's not really an issue of censorship - you could have a democratic majority decision on an easy to follow set of standards for safe. You wouldn't have to worry about whether or not different levels of nudity or 'language' would be included, you could just not include any of it. I know there can be nitpicking here, i.e., are greek statues considered nudity, and so forth, but I don't think that flaws the idea. So the beauty of it is the end result, not the idea itself. You end up having a web with a small percentage of which is deemed safe (in the Barney sense :). Then parents can set the browser to view safe material only, much like censorware. The beauty is that suddenly the parents see what they are limiting their children to by trying to censor any material that might have nudity or 'dirty words' in it, for golly's sake ;) Then it's up to the parents to decide if they want their children to be limited by their own decisions. One could argue that point #1 above is illegitimate, that we should stop these parents from limiting their children's growth, but then again, I don't think there's much you can do to help children whose parents will only let them on BarneyWeb. But finally we'd have an answer for the fundamentalists. Any thoughts? Dave Ljung ------------------------------ Date: Fri, 17 Oct 1997 13:42:16 -0400 From: Paul Kneisel <tallpaul@nyct.net> Subject: File 7--Electronic Frontier Canada opposes Internet content control Electronic Frontier Canada says the Canadian Human Rights Commission should not attempt to control Internet content ELECTRONIC FRONTIER CANADA (EFC) --- PRESS RELEASE (For immediate release --- Thursday, October 16, 1997) <http://insight.mcmaster.ca/org/efc/pages/pr/efc-pr.16oct97.html> Electronic Frontier Canada (EFC), Canada's premier organization devoted to the protection of freedom of expression in cyberspace, is opposed to the Canadian Human Rights Commission's current attempt to control the flow of information on the Internet. In a series of hearings that began in Toronto on October 14th, a Human Rights Tribunal will attempt to decide if a California web site spreading Ernst Zundel's hateful messages is a discriminatory practice that falls under the jurisdiction and within the scope of the Canadian Human Rights Act. EFC's opposition to the Commission's agenda should not be interpreted as support for Zundel. Like the vast majority of Canadians, EFC finds Zundel's anti-Semitic views ludicrous, grotesque, and offensive. However, in the words of Oliver Wendell Holmes, EFC believes that free speech means "freedom for the thought that we hate." EFC believes the expression of controversial opinions, no matter how erroneous or repugnant, should be protected from government censorship by the Charter of Rights and Freedoms. "Of course, this doesn't mean that all speech is protected," says David Jones, EFC's president and a professor of computer science at McMaster University. "The Charter does not, for example, protect fraud, libel, or death threats, whether over the Internet or not." "Expressions of opinion, and even claiming that the Holocaust is a hoax," adds EFC vice-president Jeffrey Shallit, "should be protected." EFC favours the repeal of all Canadian laws restricting hate speech. "Laws intended to restrict 'bad' speech are often too broadly written, and have the potential to restrict genuine debate," explains Shallit, who is a computer science professor at the University of Waterloo. "Let's not forget that the Communications Decency Act was recently found to be unconstitutional by the U.S. Supreme Court," he says, "in part because it did not distinguish between 'obscene' speech and speech that was merely 'indecent'." "I'm sure if the Commission thought it could prove that the Zundelsite fell within the legal definition of 'hate propaganda', as defined in sections 319 and 320 of the Criminal Code," says Jones, "then this would be a criminal proceedings." "Instead," continues Jones, "the worst this Tribunal can decide is that publishing the web site is a 'discriminatory practice' under the Canadian Human Rights Act, that 'exposes people to hatred or contempt'." "It's a broader and more flexible legal concept, and the standard of proof is not as rigourous because the penalty that can be imposed is less severe." "But on the other hand," says Jones, "if the Tribunal issues a cease-and-desist order and the web pages do not go away, Zundel might be jailed for contempt." "I question whether it is a distortion of the judicial process, considering the eventual outcome may be the same, to allow the Commission to attempt to do through the back door what they could not possibly hope to achieve through the front door," says Jones. This is not about technology, not about jurisdiction, not about regulating the Internet, and not about setting legal precedents," asserted Bernie Farber of the Canadian Jewish Congress during a recently televised debate on CBC Newsworld. "This is about punishing Ernst Zundel," he said. "I'm sure some people would like to skip the hearing and go straight to the punishment," says Jones, "but the details really do matter in this case. This hearing is all about whether a government department can re-interpret an old law to give itself sweeping new regulatory powers over the Internet." Section 13(1) of the Canadian Human Rights Act was introduced by Parliament to control hateful messages on telephone answering machines. "It is too crude an analogy to suggest that a collection of Internet web pages is the same thing as an answering machine," says Jones. "The whole context and inter-connectedness of the web and the way people interact with and navigate through the medium are different in important and significant ways." "If Canadians want content on the Internet to be controlled by the government, then what we need is a broad national debate to decide where we want to draw the line," suggests Shallit. "Dusting off old pieces of legislation and misapplying them to this new communication medium is not the way for Canadians to step into the 21st century." EFC acknowledges that Canadians need effective strategies for dealing with controversial or hateful speech, but EFC's position is that the proper remedy for racist speech is not less speech, but more speech. EFC gives high praise to hard-working community organizations like Ken McVay's Nizkor Project, which maintains a huge electronic archive of material devoted to preserving the history of the Holocaust and dedicated to the memory of all who died at the hands of the Nazis. "Instead of banishing the hatemongers to the shadows, or making them martyrs by giving them an expensive show trial," says Shallit, "the Nizkor Project shines the intense light of public scrutiny on people like Zundel and exposes their deceptive messages for what they are - warts and all. It is an approach that really works." Another notable web site, run by the McGill Hillel student organization to support the Jewish student community, provides one of the most extensive lists of hyperlinks to hate web sites ever compiled. There purpose, of course, is not to promote hatred, but to educate people about its enduring presence in society. "Electronic Frontier Canada is pleased to announce donations to both the Nizkor Project and McGill Hillel Student Centre," said EFC president David Jones, "to encourage them to continue their efforts in dealing with hateful content on the Internet. In our view, theirs is the only approach that has had any significant success." "At the end of the day," says Jones, "no matter what the Tribunal decides, the Canadian government cannot possibly hope to control the flow of information on the Net." "Sure, they can go ahead and lock Zundel behind bars, if they decide the law allows it," concedes Jones, "but once the information is on the Net, it's not going to disappear." ---------------------------------------------------- EFC Contact Information: Electronic Frontier Canada Dr. David Jones, djones@efc.ca phone: (905) 525-9140 ext. 24689, fax: (905) 546-9995 Dr. Jeffrey Shallit, shallit@efc.ca phone: (519) 888-4804, fax: (519) 885-1208 Dr. Richard Rosenberg, rosen@efc.ca phone: (604) 822-4142, fax: (604) 822-5485 Electronic Frontier Canada's, online archives: URL: http://www.efc.ca ------------------------------ Date: Thu, 7 May 1997 22:51:01 CST From: CuD Moderators <cudigest@sun.soci.niu.edu> Subject: File 8--Cu Digest Header Info (unchanged since 7 May, 1997) Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically. CuD is available as a Usenet newsgroup: comp.society.cu-digest Or, to subscribe, send post with this in the "Subject:: line: SUBSCRIBE CU-DIGEST Send the message to: cu-digest-request@weber.ucsd.edu DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS. The editors may be contacted by voice (815-753-6436), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115, USA. To UNSUB, send a one-line message: UNSUB CU-DIGEST Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU (NOTE: The address you unsub must correspond to your From: line) Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" On Delphi in the General Discussion database of the Internet SIG; on RIPCO BBS (312) 528-5020 (and via Ripco on internet); CuD is also available via Fidonet File Request from 1:11/70; unlisted nodes and points welcome. In ITALY: ZERO! BBS: +39-11-6507540 UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD Web-accessible from: http://www.etext.org/CuD/CuD/ ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/ aql.gatech.edu (128.61.10.53) in /pub/eff/cud/ world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/ wuarchive.wustl.edu in /doc/EFF/Publications/CuD/ EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland) ftp.warwick.ac.uk in pub/cud/ (United Kingdom) The most recent issues of CuD can be obtained from the Cu Digest WWW site at: URL: http://www.soci.niu.edu/~cudigest/ COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ------------------------------ End of Computer Underground Digest #9.78 ************************************