Computer underground Digest Sun Apr 26, 1998 Volume 10 : Issue 26 ISSN 1004-042X Editor: Jim Thomas (cudigest@sun.soci.niu.edu) News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu) Archivist: Brendan Kehoe Shadow Master: Stanton McCandlish Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Field Agent Extraordinaire: David Smith Cu Digest Homepage: http://www.soci.niu.edu/~cudigest CONTENTS, #10.26 (Sun, Apr 26, 1998) File 1--EFF challenge to New Mexico Net Censorship Law File 2--FAQ Using the Law to Harrass The Cult v. the ARSCC File 3--"Understanding Digital Signatures", Gail L. Grant File 4--Court Finds AOL Immune from Libel Suit File 5--Re: Cu Digest, #10.25, Weds 22 Apr 98 File 6--Federal Courts use Censorware (Spectacle Press Release) File 7--Cu Digest Header Info (unchanged since 12 April, 1998) CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN THE CONCLUDING FILE AT THE END OF EACH ISSUE. --------------------------------------------------------------------- Date: Sun, 26 Apr 1998 16:57:09 -0500 From: jthomas@VENUS.SOCI.NIU.EDU(Jim Thomas) Subject: File 1--EFF challenge to New Mexico Net Censorship Law Source: http://www.eff.org April 22, 1998 Statement of Barry Steinhardt, President of the Electronic Frontier Foundation (EFF) on the Legal Challenge to the New Mexico Net Censorship Law. The Electronic Frontier Foundation (EFF) believes that SB 127, New Mexico's recently passed law banning the dissemination of material deemed "harmful to minors" on the Internet, is patently unconstitutional. This law represents a threat to freedom of expression, not only in New Mexico, but across the country. The EFF, as a content provider, and its members, would be compelled to either refrain from communicating constitutionally protected speech or face potential criminal prosecution. Because of this threat, we join today as a plaintiff in the challenge filed today by the American Civil Liberties Union (ACLU). The EFF was the first national non-profit group established to protect free expression, privacy and open access to information in the electronic age and has used the Internet to educate the public about civil liberties and legal issues as they arise in cyberspace. The EFF was a party to the successful challenge to the Federal Communications Decency Act (CDA) in Reno v. ACLU, decided by the US Supreme Court only last June. We believe the New Mexico law is equally defective. The EFF's public education efforts that would be affected include the extensive online resources on its web site. These resources include articles, court cases, legal papers, news releases, newsletters, and excerpts from public discussions related to the EFF's legal, legislative, educational, and advocacy work. Section A in SB 127, as it affects the EFF, is even broader and more censorial that the CDA. The term "harmful to a minor" is defined as any communication "which in whole, or in part, depicts actual or simulated nudity, sexual intercourse or any other sexual conduct." The Legislature did not even attempt to qualify this term by requiring that the speech be viewed in its overall context or that its value to minors or adults be taken into account. Because the definitions used in SB 127 are so broad and so unqualified, it would include everything from a web site's representation of Michalangelo's David, to the publication of the Biblical Song of Solomon on a newsgroup. It would certainly encompass information in many of the archives that the EFF maintains on its web site. Language purporting to limit the application of the law to those who "knowingly and intentionally initiate or engage in communication" with a minor cannot save the law. For most speakers on the Internet, it is not possible to limit speech to an audience that is known to be adults only. Laws like SB 127, such as the even narrower CDA, will inevitably and unconstitutionally restrict the speech available to adults, who will be reduced to receiving only that speech which is deemed suitable for children. As the Supreme Court said in _Reno v. ACLU_: "Given the size of the potential audience for most messages, in the absence of a viable age verification process, the sender must be charged with knowing that one or more minor will likely view it. Knowledge that, for instance, one or more members of a 100-person chat group will be minors and therefore that it would be a crime to send the group and indecent message and would surely burden communication among adults." In addition to the restricting Constitutionally protected speech, SB 127 would also violate the Interstate Commerce Clause of the US Constitution. SB 127 is not limited to purely intrastate New Mexico communications. It seeks to broadly regulate an inherently "interstate", even international medium. A recent decision from New York, American Library Ass'n v. Pataki, 969 F.Supp. 160, 164 (S.D.N.Y. 1997) dealt with the interstate commerce issue. The ALA case dealt with a New York State statute that, like SB 127, sought to restrict speech on the Internet that was "harmful to minors", without limiting the geographic reach of its prohibition. In that decision, which the State of New York did not appeal, the judge held that the law was invalid because it was an "unconstitutional projection of New York law into conduct that occurs wholly outside New York; that the burdens on interstate commerce [by enforcement of this law] ... could paralyze development of the Internet altogether; and finally, that the Commerce Clause ordains that only Congress can legislate in this area, subject, of course, to whatever limitations other provisions of the Constitution (such as the First Amendment) may require." Given the fatal constitutional defects in the new law and its potential to damage free speech on the Internet, the EFF believes that it has no recourse other than to join in this case. ------------------------------ Date: Sun, 19 Apr 1998 20:42:25 -0700 (PDT) From: Jim Thomas <jthomas@well.com> Subject: File 2--FAQ Using the Law to Harrass The Cult v. the ARSCC ((Those who keep up with the Church of Scientology's "War on the Net" will find the following interesting, reproduced from The Well with permission)). eff.661.705: Scientology, the Net, and Free Speech From--beckyjo@umich.edu (Rebecca Jo McLaughlin) Subject--Litigation FAQ Newsgroups--alt.religion.scientology Date--Thu, 16 Apr 1998 14:45:00 GMT FAQ USING THE LAW TO HARASS THE CULT VS. THE ARSCC* On alt.religion.scientology you can get flamed. You can also get harassed, investigated, fair gamed, raided, arrested or sued. The people below know, first-hand, how seriously the cult takes their dead leader's commands: "The law can be used very easily to harass..." Coming up: 22 April 1998: [Ward, Henson] The parties are ordered to appear for a pre-trail conference. The parties should be prepared to discuss the following issues: (1) Whether this case should be consolidated with the related case RTC v. Ward, Case No. C-96-20207, for trial; (2) The trial schedule; (3) Estimated length of the proceedings; and (4) Available trial dates in April, May , and June. *** DENNIS ERLICH. Dennis is accused of violating the cult's copyrights by posting some of the "Operating Thetan" (OT) materials. The cult raided Dennis, going through his home and confiscating personal belongings. He is being defended pro bono by the mighty MoFo; donations are gratefully accepted. Send your checks or money orders to: Morrison & Foerster, 425 Market St., San Francisco, CA 94105 Attn: Carla Oakley - Dennis Erlich Defense Fund Telephone: (415) 677-7000 Facsimile: (415) 677-7522 International funds can be accepted. You can also wire donations to them. Call for instructions. **Make sure you label your check "Dennis Erlich Defense Fund".** Also - "seekon" maintains a "Friends of Dennis Erlich Page" www.netcom.com/~seekon/friends.html Dennis also faces attack on another front: the cult has provided his ex-wife (the Venomous Rosa) with a lawyer so that she and the cult can drag Dennis through court on a variety of child-support related cases. For more info: http://www.snafu.de/~tilman/mystory/#10 http://www.snafu.de/~tilman/mystory/denseize.txt ****** KEITH HENSON. Having read the New Operating Thetan (NOTs) levels, Keith Henson believes that Scientology is practicing medicine without a license. He was sued for posting the relevant sections - NOTS 34 - that describe these practices. Recently, Judge Whyte ruled against Henson in summary judgment and planned to conduct a "bench trial" to determine wilfulness. Sadly for the judge, the Supreme Court determined that people like Keith are entitled to a jury trial. The Honorable Whyte is now attempting to lump Keith and Grady's cases together. On a related front, the cult takes offense at Keith picketing their various organizations. The judge, at a recent hearing to strike Henson's trial brief, denied their ex parte application in no uncertain terms: "There is a lot of silliness going on here, and this court is not going to entertain it! The statements of counsel in their briefs are just that, and not evidence." For more info: http://www.cs.cmu.edu/~dst/NOTs/ http://www2.thecia.net/users/rnewman/scientology/home.html#HENSON http://homepages.skylink.net/~teddy/picketpage/picket.html Keith is accepting donations to offset the increasing costs of litigation: H. Keith Henson P.O. Box 60012 Palo Alto, CA 94306 **** FACTnet is a bulletin-board system containing a huge library of information about Scientology and other cults. On 22 August 1995, FACTnet directors, Bob Penny and Larry Wollersheim were raided. FACTnet is being sued for (surprise!) copyright infringement. For more info:. http://www.factnet.org/battle.htm http://www2.thecia.net/users/rnewman/scientology/home.html#FACTNET http://www2.dgsys.com/~alerma/ FACTNET is accepting donations toward their operations and their legal defense. Send to FACTNET Inc., PO Box 3135, Boulder, CO 80307-3135. You may also charge your donation (see http://www.factnet.org for details). **** ZENON PANOUSSIS. Zenon posted the widely-read Secret Scriptures materials to a.r.s. and was promptly sued. It is unlikely that the cult lawyers expected that their own actions would result in Sweden becoming the only country in the world where the Secret Scriptures may be legally obtained. For more info: http://scncases.simplenet.com (webbed documents of most NOTs-connected cases in Sweden) http://www.dtek.chalmers.se/~d1dd/cos/ ***** RAY RANDOLPH. Ray has a domain name, scientology_kills.net, that offends the cult. They claim it infringes upon their trademarks and are suing. Ray is represented by the ACLU and EFF in this skirmish. For more info: http://www.ezlink.com/~rayr/scieno.htm **** KARIN SPAINK. Karin and 12 Dutch internet providers are being sued by the cult for having the Fishman Affidavit (containing parts of OT1 through OT7) on homepages. The cult lost the February 1996 trial, was ordered to pay costs and has appealed. The appeal was scheduled for June 1996, but to date, the cult has not moved on it. The defendants believe the reason for this is that Co$ is afraid it will lose. >From Karin: "The full-fledged case - which they started on the day the short-term lawsuit served in court - is still on its way. We hope to have a verdict this year. For more info: http://www.xs4all.nl/~kspaink http://www2.thecia.net/users/rnewman/scientology/dutch/home.html **** GRADY WARD On 21 March 1996, RTC filed a lawsuit against Grady accusing him of being the elusive net entity, Scamizdat, who posted the Upper Level Materials Scientology cannot seem to keep under wraps. Grady is defending himself in forma pauperis. At a recent summary judgment hearing, Judge Whyte ruled against RTC, clearing the way for a trial. At the recent pretrial hearing, the judge stunned the cult by remarking that the cult had to prove at three things at trial: (1) that the proffered evidence were authentic Usenet posts or IRC chat logs (FRE Rule 901); (2) that Grady Ward somehow was associated with any authenticated posts that had been adjudged to be infringing; and (3) if (1) and (2) were met, that Grady Ward's acts were "wilful" for purposes of copyright law. Currently, Judge Whyte is attempting to get cases of Ward and Henson combined into one. Grady accepts donations to defray mounting legal expenses. Send donations to Grady Ward, 3449 Martha Ct., Arcata, CA 95521 For more info: http://www2.thecia.net/users/rnewman/scientology/home.html#GRADY http://superlink.net/user/mgarde/new.htm **** Corrections, additions, deletions? Mail beckyjo@umich.edu. * And, of course, we do not exist. ------------------------------ Date: Mon, 20 Apr 1998 08:54:03 -0800 From: "Rob Slade, doting grandpa of Ryan and Trevor" <rslade@sprint.ca> Subject: File 3--"Understanding Digital Signatures", Gail L. Grant BKUNDISI.RVW 980221 "Understanding Digital Signatures", Gail L. Grant, 1998, 0-07-012554-6, U$34.95 %A Gail L. Grant %C 300 Water Street, Whitby, Ontario L1N 9B6 %D 1998 %G 0-07-012554-6 %I McGraw-Hill Ryerson/Osborne %O U$34.95 905-430-5000 fax: 905-430-5020 louisea@McGrawHill.ca %P 298 p. %T "Understanding Digital Signatures" Part one is general background. Chapter one is a brief and rough background of the Internet. Some of the statements are questionable, as are a number of the figures, but it is probably reasonable for the target business audience. The title "Security and the Internet," for chapter two, is only half right. Some general topics that security needs to address are raised, but the Internet isn't mentioned. (The figures convey even less information than in the first chapter, and the situation is not helped by the fact that the figure numbers are not used in the text, so the reader has no idea what passage they are supposed to support.) Again, "Securing the Internet," in chapter three, is a reasonable basic primer on cryptography for the non- technical, but doesn't talk about the Internet yet. The most important point made is the difference between encryption and authentication. Chapter four, on the public key infrastructure, is the weakest, in that it only deals with hierarchical certificate authority systems. It is interesting that the term "network of trust," seemingly used for a group of certificate authorities, is so similar to the term "web of trust" which PGP (Pretty Good Privacy) uses for such a radically different concept. Part two is entitled "Case Studies," and it does have them, but not in the usual style. "Uses of Public Key Systems," in chapter five, still seems to belong to the background section. Chapters six, seven, and eight, on identification and authentication, securing communication, and application integration, say *that* certificates are being used, but give almost no information on how. Chapter nine lists the operational steps in a SET (Secure Electronic Transaction protocol) transaction. Part three looks at technical, legal, and business issues, and at the development of requirements specifications for digital signatures. Chapter ten is only technical by the broadest possible definition of the term, and does not provide enough detail or background for readers to begin to make the decisions that might be necessary. The legal issues chapter eleven raises are at least clear enough to have legal counsel begin to consider, and are not as US-centric as is normally the case. Chapter twelve's review of business issues is a decent discussion starter. The requirements planning tools in chapter thirteen are probably too generic to be of use without further background. Part four is a listing of vendors. Each vendor entry provides contact information, company background, and a description of products or services. Many also list distinctives of the companies, future intentions, and a list of major customers. Chapters cover vendors of certificate authority products and application toolkits. A final chapter looks at the future. copyright Robert M. Slade, 1998 BKUNDISI.RVW 980221 ------------------------------ Date: Thu, 23 Apr 1998 17:16:07 -0400 From: "EPIC-News List" <epic-news@epic.org> Subject: File 4--Court Finds AOL Immune from Libel Suit Source: EPIC Volume 5.05 April 23, 1998 -------------------------------------------------------------- Published by the Electronic Privacy Information Center (EPIC) Washington, D.C. http://www.epic.org/ *** 1998 EPIC Cryptography and Privacy Conference *** http://www.epic.org/events/crypto98/ ======================================================================= [2] Court Finds AOL Immune From Libel Suit ======================================================================= A federal judge in Washington has ruled that America Online cannot be sued for posting an allegedly defamatory item by gossip columnist Matt Drudge. The ruling came in a lawsuit filed by White House official Sidney Blumenthal after Drudge reported that Blumenthal had "a spousal abuse past that has been effectively covered up." The suit named as defendants both Drudge and AOL, which carried "The Drudge Report" under a license agreement with the columnist. In an opinion issued on April 22, U.S. District Judge Paul L. Friedman held that AOL enjoys broad immunity from suit under a surviving provision of the Communications Decency Act (most of which was struck down by the Supreme Court last summer). That provision, which was intended to encourage online providers to "self-police" their systems for "offensive" content, states: No provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider. The judge noted that, under the terms of its agreement with Drudge, AOL retained "certain editorial rights ... including the right to require changes in content and to remove it." While finding that the CDA provision relieves the online service of any potential liability, Judge Friedman noted an anomaly in the result: Because it has the right to exercise editorial control over those with whom it contracts and whose words it disseminates, it would seem only fair to hold AOL to the liability standards applied to a publisher or, at least, like a book store owner or library, to the liability standards applied to a distributor. But Congress has made a different policy choice by providing immunity even where the interactive service provider has an active, even aggressive role in making available content prepared by others. The suit against Drudge will proceed, and attorneys for Blumenthal have indicated that they will appeal the dismissal of AOL as a defendant. ======================================================================= Subscription Information ======================================================================= The EPIC Alert is a free biweekly publication of the Electronic Privacy Information Center. To subscribe or unsubscribe, send email to epic-news@epic.org with the subject: "subscribe" (no quotes) or "unsubscribe". A Web-based form is available at: http://www.epic.org/alert/subscribe.html Back issues are available at: http://www.epic.org/alert/ ------------------------------ Date: Thu, 23 Apr 1998 10:24:51 -0400 (EDT) From: "John S. Cronin" <jsc@SWAMP.OIT.GATECH.EDU> Subject: File 5--Re: Cu Digest, #10.25, Weds 22 Apr 98 In article <cud.980423030708.22236@unicom.com> you wrote: > From--"Frank Knobbe" <FKnobbe@BELLSOUTH.NET> > Date--Fri, 17 Apr 1998 23:07:17 -0600 > Subject--File 6--Re--"tagging color printers" (CuD 10.22) > > > Date--06 Apr 1998 15:29:44 -0400 > > From--Mark Atwood <mra@POBOX.COM> > > Subject--File 3--US Govt wants to "tag" color printers > > [...] > > > "In addition, Castle said, practical and realistic measures to tag > > scanners and printers must be considered, in order to identify the > > source of the counterfeit notes." > > > > In other words, he wants every color printer to embed some sort of > > signature into its output, so that the "authorities" can determine > > where it came from. > > > > I remember, back in high school civics, one of the bits of patriotic > > propaganda that was dispenced to us, was that the USSR required all > > photocopiers to embed a machine id and page number into its output, > > so that the "authorites" could control their use as publishing > > tools. > > > > Now the USA wants to do the same thing. > > [...] > > Great! I'm so curious to see how they are gonna tackle this issue. Put > an ID on top of the page? Sure, go right ahead, I have to use my > scissors anyway to cut out the Lincoln's. > > The only way this would work, would be to overlay the copy with a fine > barcode type output, where the lines stretch across the whole page. > Which means the ID changes when the fuser gets old'n'dirty. Plus, > imagine how many people would return that copier because "it's broke > and procudes crappy output". > > How about mandatory copier paper with a watermark? All you need to do > is equip the copier's paper cassette with a padlock. > > Of course, alternatively you could try to improve security with newer > dollar bills that have additional security features such as holograms, > etc. but that would be too easy.... > > The world is going crazy, and it's not gonna get better... I wish I had been paying better attention. Recently, I was watching one of the major news programs (ABC, CBS or NBC - I don't remember which one because my room mate had control of the remote). They had a segment on counterfeiting and the new $20 bill. They spent quite a bit of time talking about counterfeiting US currency using ordinary color printers, and how over 50% of all counterfeit bills are now coming from color printers. The part that really floored me was when they mentioned that Treasury was going to ask printer makers to begin making printers that will refuse to print currency. ?! Now I wonder if the news folks misunderstood this tagging concept, or if Treasury is really that clueless about the state of computing and what is possible? I have not been able to find any more info on this. I really do wonder though - does Treasury really believe this is possible, especially in the price range of $200 printers? I really wonder how they expect this to be implemented, if this is true. Not that I think it will happen anytime soon, if at all. Has anybody else heard about this? ------------------------------ Date: Sun, 26 Apr 1998 14:06:21 -0500 From: jthomas3@SUN.SOCI.NIU.EDU(Jim Thomas) Subject: File 6--Federal Courts use Censorware (Spectacle Press Release) Source: http://www.spectacle.org/cwp/courtcen.html The Censorware Project Federal Courts Use Censorware; Free Speech Advocates Object By the Censorware Project April 22, 1998 FOR IMMEDIATE RELEASE Contact: Jonathan Wallace daytime: 212-513-7777 evening: 718-797-9808 email: jw@bway.net New York, April 22, 1998 -- The Censorware Project, an organization which battles the use of blocking software by public institutions including schools and libraries, announced today that it has learned that federal courts are using the WebSENSE censorware product, at least in the Eighth, Ninth and Tenth judicial circuits (covering twenty-two states and Guam). WebSENSE was installed by the Administrative Office of the Courts, apparently without the knowledge or consent of the judges themselves. "I am really disturbed that the federal court administrators have installed censorware, especially in light of federal judge Leonie Brinkema's recent decision in the Loudoun County, Virginia case," said James Tyre, a First Amendment attorney who is a founding member of the Censorware Project. "In that decision, available at http://www.venable.com/ORACLE/opinion.htm, the judge suggested that blocking a web site in a library is like pulling a book from the shelves. It is particularly shocking that the Administrative Office of the Courts thinks that federal judges need to be protected against the Internet -- and that our tax money is being spent to buy censorware for this purpose. It would be ironic indeed if Judge Brinkema is prevented by WebSENSE from visiting the very sites at issue in the Loudoun County case, blocked by X-Stop, a competitor of WebSENSE." One site erroneously blocked by the WebSENSE product under its "Hacking" category is http://www.digicrime.com/ -- a humorous site created by security experts to educate the public about computer crime. "WebSENSE apparently took the site for a real computer crime site," Tyre said. "DigiCrime is not just one bad block out of 200,000: it is one of 54 hand-picked sites by the makers of WebSENSE itself included in the downloadable demo versions of the product. Although The Censorware Project has not done a full analysis of WebSENSE, one must seriously question its claims to accuracy if it cannot even get its demo blocks right." WebSENSE also reportedly blocks A Different Light Bookstore, http://www.adlbooks.com/, specializing in gay or lesbian literature. The company claims that the product blocks 200,000 sites. ________________________________________________________________ The Censorware Project is a group of Internet activists opposed to blocking software and ratings systems for the Web on the grounds that both approaches promote government censorship of the Net. For more information, please contact Jonathan Wallace at jw@bway.net. ------------------------------ Date: Thu, 7 May 1997 22:51:01 CST From: CuD Moderators <cudigest@sun.soci.niu.edu> Subject: File 7--Cu Digest Header Info (unchanged since 12 April, 1998) Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically. CuD is available as a Usenet newsgroup: comp.society.cu-digest Or, to subscribe, send post with this in the "Subject:: line: SUBSCRIBE CU-DIGEST Send the message to: cu-digest-request@weber.ucsd.edu DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS. The editors may be contacted by voice (815-753-6436), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115, USA. To UNSUB, send a one-line message: UNSUB CU-DIGEST Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU (NOTE: The address you unsub must correspond to your From: line) Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" On Delphi in the General Discussion database of the Internet SIG; on RIPCO BBS (312) 528-5020 (and via Ripco on internet); CuD is also available via Fidonet File Request from 1:11/70; unlisted nodes and points welcome. In ITALY: ZERO! BBS: +39-11-6507540 UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD Web-accessible from: http://www.etext.org/CuD/CuD/ ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/ aql.gatech.edu (128.61.10.53) in /pub/eff/cud/ world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/ wuarchive.wustl.edu in /doc/EFF/Publications/CuD/ EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland) ftp.warwick.ac.uk in pub/cud/ (United Kingdom) The most recent issues of CuD can be obtained from the Cu Digest WWW site at: URL: http://www.soci.niu.edu/~cudigest/ COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ------------------------------ End of Computer Underground Digest #10.26 ************************************