[alt.society.cu-digest] Cu Digest, #3.05

TK0JUT2%NIU.BITNET@UICVM.uic.edu (02/10/91)

  ****************************************************************************
                  >C O M P U T E R   U N D E R G R O U N D<
                                >D I G E S T<
              ***  Volume 3, Issue #3.05 (February 9, 1991)   **
  ****************************************************************************

MODERATORS:   Jim Thomas / Gordon Meyer  (TK0JUT2@NIU.bitnet)
ARCHIVISTS:   Bob Krause / Alex Smith / Bob Kusumoto
RESIDENT SYSTEM CRASH VICTIM::  Brendan Kehoe

USENET readers can currently receive CuD as alt.society.cu-digest. Back
issues are also available on Compuserve (in: DL0 of the IBMBBS sig),
PC-EXEC BBS (414-789-4210), and at 1:100/345 for those on FIDOnet.
Anonymous ftp sites: (1) ftp.cs.widener.edu (temporarily down); (2)
cudarch@chsun1.uchicago.edu E-mail server: archive-server@chsun1.uchicago.edu.

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.  CuD material may be reprinted as long as the source is
cited.  Some authors, however, do copyright their material, and those
authors should be contacted for reprint permission.  It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles relating to
the Computer Underground.  Articles are preferred to short responses.
Please avoid quoting previous posts unless absolutely necessary.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
DISCLAIMER: The views represented herein do not necessarily represent the
            views of the moderators. Contributors assume all responsibility
            for assuring that articles submitted do not violate copyright
            protections.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

CONTENTS THIS ISSUE:
File 1: Moderators' Corner
File 2: From the Mailbag
File 3: Arrest of Phiber Optik
File 4: The Dictator: My thoughts
File 5: Chaos Computer Club Congress
File 6: The Feds (In this case the FCC) hits Ham Packet BBS Ops.
File 7: FCC Citation of Packet BBSs for Store-and-Forward Msg
File 8: Book Review--Exporting the First Amendment

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

----------------------------------------------------------------------

********************************************************************
***  CuD #3.05, File 1 of 8: Moderator's corner                  ***
********************************************************************

From: Moderators
Subject: Moderators' Corner
Date: February 7, 1991

++++++++++
In this file:
1. RETALIATION IS NOT THE ANSWER
2. CONFERENCE ON COMPUTER INVESTIGATION CONFERENCE
++++++++++

+++++++++++++++++++
Retaliation is *not* the Answer
+++++++++++++++++++

We've heard "rumors" about plans for retaliation against informants and
others who have added to the victim list of law enforcement zealousness. We
have been, and continue to be, unequivocal in our opposition to such
behavior! Informants are a symptom of the problem and not its cause.
Victims are created by abuse of power, by ignorance of agents, by
inadequate Constitutional protections in a time of rapidly changing
technology, and by a cultural mentality that sees witches to be hunted in
anything mysterious.  We are not required to like paid informants,
especially when they appear responsible for creating victims rather than
protecting society. Sometimes, in serious cases, they are necessary, but
should be used with caution. But, they should be used with caution.
Informants, by definition, betray, and the ethical issue for law
enforcement is one of maintaining a balance between necessity and unethical
practice. It is this balance that seems to be out of kilter in the RIPCO
informant incident, and we view the problem as one of restoring the balance
AND NOT retaliating against the paid informant. Informants must live with
their conscience and with the stigma they earn.  From all accounts, law
enforcement agents respect informants as little as the rest of us; they
only find them useful. So, there is little need to retaliate: Loss of
status and the corresponding condemnation is sufficient response.  An
anonymous poster shares similar thoughts in file #4, below.

+++++++++++
Conference on Computer Investigation Conference
+++++++++++

The Criminal Justice Statistics Association will be holding a conference on
INVESTIGATION COMPUTER CRIME (March 18-20) in Washington D.C. The blurb
reads:
   Audience: Law enforcement and prosecutorial personnel assigned to the
   computer crimes cases

   Objectives: To train personnel in the technical and legal aspects
   of computer crimes. Covers issues such as computer crime methods
   and detection, crime scene search procedures and computer evidence
   preservation, the application of existing laws, interaction with
   techincal experts, and prevention education.

A registration fee is $100 per class day and classes will be held in the
Computer Center's facility at 555 New Jersey Avenue, NW, Suite 860,
Washington DC.  For more information, contact person is:
    Jim Zepp, Director
    NCJS (Suite 860)
    555 New Jersey Avenue, NW
    Washington, DC 20001           (202-638-4155)

********************************************************************
                           >> END OF THIS FILE <<
***************************************************************************
res;res on aca101;ct; uf file; ch'3.03' to'3.05';res

------------------------------

From: Various
Subject: From the Mailbag
Date:  9 Feb, 1991

********************************************************************
***  CuD #3.05: File 2 of 8: From the Mailbag                    ***
********************************************************************

Subject: CuDs available in New Zealand
From: patrick@SIDEWAYS.GEN.NZ(Pat Cain)
Date: Sat, 02 Feb 91 01:53:55 NZD

I run a bbs in New Zealand and archive CuD -- all the issues of CuD are
here.  Plus miscellaneous other telecoms related files.  If you get any
inquiries from New Zealand people then perhaps you could direct them here?

e-mail: patrick@sideways.gen.nz
bbs phone: +64 4 661231 (v21/v22/v22bis)
            (no fees, charges or donations reqd.)
CuDs are located in: /public/telecoms/cud

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

From: BIFF@PHOENIX.COM(Biff)
Subject: CuD #3.04, File 3 of 4: The Politics of the ECPA of 1986
Date: Wed, 30 Jan 91 20:11:11 EST

Reprint from BMUG (Berkeley MacIntosh Users' Group) writes:

->A more
->emotional defense was made by John Stanton, Executive VP of McCaw
->Communications, who stated "The inhibition of the growth of cellular
->technology and paging technology, forced by the lack of privacy, is
->unfair."

The commercial use of the public airwaves by cellular communications
providers is unfair. The transmission of their signals through my body
without my permission is unfair. Life is not fair, Mr. Stanton. There is no
Constitutional guarantee of fairness, especially for corporations over
citizens.

->For example, John
->Stanton of McCaw testified that "Encryption devices make it difficult to
->roam  from system to system," generated scratchy sound, and required 30%
->more investment for the base unit, and 100% for the phone.     Mr. Colgan's
->estimated high grade commercial encryption as costing $40 for the
->encryption chip (quantity one), plus associated circuitry .  In either
->case, the net cost for several million subscribers was estimated in the
->tens if not hundreds of millions of dollars.

Before anyone starts to feel sorry for the cost involved for the cellular
folks to add encryption to the phones, consider the following facts:

	1. The cellular industry is already switching to digital mode
	because they are running out of room. This digital mode is
	encrypted (to the casual listener) and privacy of the cellular
	user is protected.

	2. The cost of the parts to add encryption to a cellular phone is
	hardly 100% of the cost of the phone. The estimates from
	non-cellular, and thus less opposed to adding the encryption
	devices, spokespeople are that encryption would add $5 to the
	cost.

	3. There is no need for "high grade" encryption. Cellular users
	need no more than simple encryption, since the only people ANY
	encryption will stop are the casual listeners. A serious privacy
	invader will tap into the trunks leading out of the cellular
	switch and bypass all the nonsense.

	4. Only poorly designed encryption systems would make it harder
	to roam. If the cellular industry can't design their systems
	properly, why should the rest of us be held to account for it?

	5. There are already several encryption systems in use by law
	enforcement agencies, and one of those could easily be used by
	cellular providers. The technology is not new.

	6. Anyone who wants you to believe that cellular manufacturers
	buy ANYTHING at single quantity prices is prevaricating through
	their orthodonture.

	7. Scratchy sound for some is better than denying to ALL the
	rights to receive signals transmitted on the public airwaves.

->John Stanton of McCaw commented  that if the U.S.
->passed the ECPA, then it would enjoy superior communications privacy to
->that available in Europe.

This was, and probably still is, the view of the cellular industry.
They feel that legislation guarantees privacy, and they are more than
happy to tell cellular users that their calls are completely private.
Instead of spending the money to MAKE the calls private, they spend the
money to make listening illegal.

->This last point deserves elaboration.  Under ECPA, monitoring of cordless
->phone frequencies is not prohibited, although it is hard to argue that the
->average individual's "expectation of privacy" is any different for a
->cordless phone than it would be for a cellular phone.

Arguing that any prudent human would believe that cordless
communications were private is beyond imagination. But even cordless
phone manufacturers are playing the game by adding "security codes",
which don't stop anyone from listening, just from dialing your phone.

->In contrast to the detailed arguments submitted by the parties discussed
->above, the one page letter submitted by The Source had a minor impact at
->best, suggesting that the ECPA, by not preempting state statutes, could
->expose the online service industry to an entangling web of federal and
->state statutes.

The tangle has started. California has, according to reports I have
seen, enacted a law prohibiting the reception of cordless phones and
baby monitors. They have preempted the FCC and the US Congress in this
matter. The IRS has ruled that IRS agents may monitor cordless phone
conversations to gather evidence of wrongdoing. A judge in an eastern
state has ruled the use of a scanner to monitor cordless phones and
identify drug dealers, by the local sheriff's department, is legal.

Sigh... Life is not fair, D00D.

********************************************************************
                           >> END OF THIS FILE <<
***************************************************************************

------------------------------

From:   Newsbytes (Barbara and John McMullen)
Subject: Arrest of Phiber Optik
Date: February 8, 1991

********************************************************************
***  CuD #3.05: File 3 of 8: Arrest of Phiber Optik              ***
********************************************************************

NEW YORK STATE POLICE ARREST "PHIBER OPTIK" 2/8/91
EAST FARMINGDALE, NEW YORK, U.S.A., 1991 FEB 8(NB) --
CORRECTION: The February 7th Newsbytes piece on this story said that the
alleged illegal activity committed by 18 year-old Mark Abene, "Phiber
Optic" took place on JULY 9, 1990. The date of the alleged incident was
actually JANUARY 9th, 1990.

The corrected story follows:
Major Timothy Rabbett of the New York State Police has announced the arrest
of Mark Abene, 18, of Queens, NY for allegedly tampering with a New York
Telephone Computer Computer to provide free access for Abene and unnamed
others to have unbilled access to a "900" telephone.

The arrest,  which was made by New York State Police Officers and a member
of the United States Secret Service, came after a year's investigation by
those two agencies. Abene, who is also known by the computer handle "Phiber
Optik", is charged with felony counts of Computer Tampering, First Degree
and Computer Trespass and a misdemeanor charge of theft of services. New
York State Senior Investigator Donald Delaney told Newsbytes that each of
the felony charges carries maximum sentences of from 1 to 4 years in
prison.

The charges allege that Abene, on January 9th, 1990, obtained access to a
New York Telephone Company computer through the use of a stolen credit card
number and, having gained access, activated an unassigned telephone number.
According to the charges, he then arranged "call-forwarding" from the
unassigned number to a "900" number, a procedure that allegedly allowed
Abene and others to make free calls through the unassigned number to the
"900" number.

Search warrants relating to this investigation were executed on Abene and
two others, known as "Acid Phreak" and "Scorpion", on January 24th, 1990
and computer equipment, diskettes, notebooks and other materials were taken
into custody at that time. The arrest of Abene was said to have been the
result of the year-long study of these materials in conjunction with
materials received from various telephone companies.

Newsbytes has learned that the other subjects of the search warrants and
investigations will be charged under Federal statutes for allegations
relating to the investigation. Abene, had he been charged under federal
statues, would have been considered a minor at the time of the alleged
acts; under New York state regulation, he is classified as an adult and is
being charged as such.

While Abene, on the advice of attorney, was not available for comment, Mrs.
Gloria Abene, his mother, told Newsbytes that her son was "taken away with
handcuffs on". Delaney told Newsbytes that this is standard procedure
because "You cannot bring an un-handcuffed prisoner into a New York City
police precinct for booking." Abene was taken into custody at 10:10 AM on
February 5th and taken to the Queens County Detention Center where he was
held until 11:30 PM on the same evening when he was released under his own
recognizance.

Delaney commented on the arrest to Newsbytes, saying "I hope that by
arresting the people that have been committing these crimes and publicizing
their arrests, we reduce the occurrence of these activities.  There has
been a recent reduction in computer crime and I think that it is due, in
part, to the publicity that has surrounded similar arrests.

(Barbara E. McMullen & John F. McMullen/19910207)

********************************************************************
                           >> END OF THIS FILE <<
***************************************************************************

------------------------------

From: Anonymous  (from Ripco BBS)
Subject: The Dictator: My thoughts
Date: 02/08/91

********************************************************************
***  CuD #3.05: File 4 of 8: The Dictator--My Thoughts           ***
********************************************************************

Well, since others have put up what they thought about the Dictator, I may
as well add mine.

I am not so mad at The Dictator (I'm not really mad at all 'cuz I don't
know him, I don't hack systems/phreak, and I haven't seen black-and-white
proof) as I am at the intrusion into the underground.

It was one thing to bust hacks, phreaks, carders, etc.  You play, you pay.
Every hack/phreak/'rate knows and accepts that.  The problem I have is that
we were violated.  Face it, we were raped.  An outsider came in, got into
some exclusive boards (and some non-exclusive ones, too, that were busted
for no reason), made people trust him, and fucked them.

We should be mad at ourselves.  The guy went to SummerCon unnoticed! They
videotaped shit, he called boards, etc.  How could people who can bring
networks down to their knees be duped by someone who probably thinks DTMF
is "Dumb Tight Mother Fucker"?

Social Engineering.

Sound familiar?  The guy hacked his way into the underground!  What irony!
This gives the story a little twist!  WE got socially engineered for once.
This is a "shoe is on the other foot" type scenario.  He made a quality
hack!  He probably thought he was doing the cool 007 James Bond deal when
he did whatever he did or didn't do.  You know, infiltrating the enemy,
behind the lines, all that stuff.

At any rate, instead of blowing the guy up (he still might be innocent, you
know), I think we should use hacker ethics to deal with this situation.

You ask, what are hacker ethics in this situation?  1) A quality hack
should not be punished.  2) A hack can show leaks in security, and is
therefore beneficial in some respects.

He did make a quality hack whether we want to admit it or not.  It was
immoral and everything, but it was a quality hack.  Like when someone
breaks into a system and grabs stuff, he doesn't feel he should be busted.
Well, fair is fair.  Let the courts bust him and whoever for illegal
procedure or whatever.  That's their place, not ours.  He has shown leaks
in security.  What security? you ask.  Exactly.  There is no security.
Security CAN be implemented.  It doesn't have to be elitist, either.

At any rate, IF (and it's a big if) The Dictator or anyone else did
infiltrate the underground, wouldn't it be better to fix the holes than
retaliate against some stooge?

I don't blame The Dictator, or even the guys who are giving their kids a
nice new Mac courtesy of Doc Ripco (tho he might).  Personally I only hold
the "brains" of the operation responsible like Gail (got a job yet?)
Thackeray.  Nice career move.  Too bad it blew up like the Hindenburg.

At was the people who instigated the investigation who should be blamed.
And us for being such idiots.  The Dictator was a mere cog in the machine.
Let the guy live with whatever conscience he has.  Some day he will
realize that the SS used him and threw him away like a soiled condom.  He
got used like he used us.  What is the SS doing for him now?  Probably
nothing.  He's probably sitting at home, sweating, and shitting in his
pants everytime he starts his car.  Isn't that punishment enough?

If the SS wants to play CIA, and it can get buffoons to play 007, then it
will be sorry in the end.  I think they should stick to counterfeiters
instead.  The FBI probably would have done a better job at busting the real
criminals and leaving the amatures alone.  The REAL feds, the FBI dudes,
are probably laughing at this whole thing.

The CIA probably knows more about us than anyone, but they're smart.  They
stick to their business rather than trying to get the glory.

That's my opinion.

********************************************************************
                           >> END OF THIS FILE <<
***************************************************************************

------------------------------

From: Bill Fischer <wmf%chinet.chi.il.us@GATECH.BITNET>
Subject: Chaos Computer Club Congress
Date: Mon, 28 Jan 91 10:00:13 CST

********************************************************************
***  CuD #3.05: File 5 of 8: Chaos Computer Conference (Reprint) ***
********************************************************************

{Reprinted with permission from:  Risks Digest, 10.80}
=============================================================================

-Date: 24 Jan 91 14:19 GMT+0100
-From: Klaus Brunnstein <brunnstein@rz.informatik.uni-hamburg.dbp.de>
-Subject: 7th Chaos Computer Congress, Hamburg, 27-29 Dec 1990

In its 7th year, the annual conference of Chaos Computer Club was held in
Hamburg (Germany) in the last week of December. A broad spectrum of themes was
offered, dominated by networking, but also covering legal aspects, ecological
computing, freedom of information, female computer handling, psychology of
hackers and others.  Among the more than 300 participants, only few people from
European countries (Netherland, Italy) and USA participated.  The Congress
newspaper (covering reports about most sessions, available as *.DOC or *.TXT
files, see below) is only in German.  Though the printed (DTP-ed) version of it
looks more professionally, some essential discussions (e.g.  female computer
handling, computer viruses, the new German Information Security Agency, GISA)
are missing; quality and readability of articles is rather mixed.  As there
were only few spectacular themes (phreaking, copying bank cards), public
interest and coverage in newsmedia, as compared to CCC'89 (the year, when the
KGB hack was published) was moderate.

Among the spectacular themes, a group HACK-TIC from Netherland demonstrated a
machine (about 1,500$) to copy credit and Eurocheque cards (EC); according to
Wau Holland (co-founder of CCC), this was arranged "to demonstrate the
insecurity of these plastique cards".  While the speaker of Hamburg's saving
bank (HASPA, which was the victim of CCC's famous "Btx/HASPA-attack") said that
this is impossible, a journalist of BILD (a German boulevard newspaper)
received a printout of his account with a copy of his card, but when trying to
order money from a teller machine, his card was collected.

The most spectacular event was a workshop on (phone) "Phreaking".  Experiences
and methods how "to call as far as possible with as many phreaks as possible at
lowest possible price" were described in some detail (few of which were
written).  Tricks with German PTT's 130-number (and connection to US' 700/800
numbers) as well as with the (PTT-internal) test number 1177 to establish
low-cost (at least for the phreaks) teleconferences and voice mailboxes were
discussed. It is surprising to hear from a US phreak that the old tricks (2,600
MHz, red boxes to simulate the coins' click) even work today; some new
experiences esp.  tricks with Calling Cards (due to missing expiration date on
some cards or delayed update of MCI databank) were added to "help fight the
excessive telephone costs".  Dutch phreaks informed about "use" of 008-numbers;
a hotel reservation service at a large airport does not check the validity of
credit cards (file: PHREAK.DOC).  The workshop was not concerned with legal
aspects of Phreaking.

Several sessions were devoted to networking.  Chaos Computer Club runs a
network ("Zerberus") with gateways to international networks and a growing
number of regional mailbox systems.  Despite mixed (or even bad) experiences
with new mailbox systems and gateways (the gateway group emailed invitation to
this workshop; 50% of the invitations came back, essentially with "error-mail";
file NETWCHAoS.DOC), several sessions were devoted to introductions into
networking (file WSI-NET.DOC covering a detailed INTERNET survey; several files
on GATOR, a GATEway ORientation guide to regional and international
communication and gateways).  A special report was devoted to communication of
graphic and sound data, where special standards, command languages and software
are under development (file SCF.DOC).  Special discussions were devoted to
applications of mailboxes for ecological purposes (file UMWE-DFU.DOC) and as
infrastructure for publications (file Med-DFU.DOC), as well as to aspects of
(German) publication laws (file PRESRECH.DOC).

One session was devoted to CCCs idea to aid the former GDR (now "5 new federal
countries") in establishing a citizen computer network "DDRNET".  Despite of
significant aid by computer dealers (who spontaneously donated PCs, software
and modems in significant numbers) and despite of the interest of local groups
and parties (New Forum, essential force in the East-German revolution), tax and
organization problems finally stopped the project when German reunification
happened.  The document (file: DDRNET.DOC) gives a lively example of good ideas
and plans being killed by hostile bureaucracy.

Following earlier CCC' discussions on sociological aspects of hacking, a
student (Tommy) described his examination thesis (diplom work) relating
Psychology and Computing (file PSYCHO.DOC, thesis in compacted form: PSYCH.LZH
in 109kBytes). According to Tommy, hackers exhibit their self-consciousness as
an elite by their techno-speak. "Ordinary" people of same age with no
understanding of computing are rather suspicious about hackers, even more as
computers appear as threats to their civil rithts and working places.  In such
controversies, hackers seems to flee reality, mostly unconsciously, and they
live in simulated worlds such as Cyberspace ("not as dangerous as other
drugs").  Anonymous or technically depersonalized communication (e.g.
mailboxes) lowers the threshold of moral scruples, resulting in communication
garbage and flames. Btw: as in previous years, a special workshop on Cyberspace
demonstrated EEG-coupled graphical devices and software (file: CYBER.DOC); the
sub-culture (as initiated by Gibson's book "Neuromancer") developing around
this techno-drug has it's first European magazines (Decoder, Cyberpunk).

A special discussion developed on computer "viruses".  Two speakers working
with Ralph Burger (author of the "Big Book of Computer Viruses", also
publishing virus code in German, English and Russian) described his work to
classify new viruses and to establish a databank of virus code.  In their
classification, the group starts with a specific model of virus mechanisms
including self-encryption; this model is in some contradiction with other
classification (e.g.  as a virus in their model must always have an effect,
parent viruses like DO NOTHING having no effect would not be a virus while
their descendants are), and stealth mechanisms other than encryption are
not foreseen. The speakers argued that information on virus details should
be easily accessible to all relevant parties.

A controversial discussion arose when the author of this report informed about
the establishment of CARO (=Computer Antivirus Research Organisation, cofounded
by V.Bonchev/Sofia, Ch.Fischer/Karlsruhe, F.Skulason/Rejkjavik, A.Solomon/UK,
M.Swimmer/Hamburg, M.Weiner/Vienna and the author) to establish a database with
virus specimen and procedures to quickly analyse new viruses and distribute the
disassemblies for verification and antivirus development.  As the number of
viruses grows significantly (more than 400 MsDos viruses known, plus new
developments visible in Soviet Union, Hungary etc) with advanced stealth
methods and more sophisticated damage, restrictions in the access to such virus
specimen based on concepts of "trusted persons" and "need to know" are
presently discussed (also controversially).  In contrast to such concepts,
CCC'90 participants and the speakers expressed their view that such virus
specimen should be accessible to any interested party.

Summary: apart from the session on phone phreaking, Chaos Computer Club visibly
demonstrated its distance to criminal activities which dominated the last
conferences (e.g.  KGB hack).  In discussing themes of technical and related
interests, they return to the list of items which were described in their
foundation document (file THESEN.TXT, October 1981).  Themes related to civil
rights (e.g.  "Freedom of Information") are visibly of more interest than
classical hacking techniques.  As CCC did not discuss any consequences of the
KGB case (after the trial in March 1990) for its members or related persons,
CCC omitted the opportunity to prepare for it's role in future hacks in it's
environment.  While their annual conference was less chaotically organized than
last year, it's structure and future developments remain as the name indicates:
chaotic and computer-minded, yet with a sense for new ideas and applications.

********************************************************************
                           >> END OF THIS FILE <<
***************************************************************************

------------------------------

From: Visualize Whirled Peas <brewer@ACE.ENET.DEC.COM>
Subject: The Feds (In this case the FCC) hits Ham Packet BBS Ops.
Date: Thu, 31 Jan 91 08:55:45 PST

********************************************************************
***  CuD #3.05: File 6 of 8: The Feds hit Ham Packet BBS Ops.    ***
********************************************************************

-Newsgroups: rec.ham-radio
Subject: FCC Citation of Packet BBSs for Store-and-Forward Msg

                   FCC CENSORS/CENSURES PACKET RADIO
                            Tom Clark, W3IWI
                            January 30, 1991

Today a number of packet BBSs on the east coast received citations from the
FCC's Norfolk (actually Virginia Beach) Field Office which may well spell
the end to much of amateur packet radio. According to Jim, WA4ONG the
following packet BBSs (and perhaps others) are involved: N3LA, WA3TSW,
KA3CNT, KA3T, WA3ZNW, W3IWI, WA4ONG, WB0TAX and N4HOG [my copy of the
citation has not yet arrived in the mail -- the details in this message are
taken from a copy WA4ONG faxed to me].

The letter dated January 25th from Mr. J. J. Freeman, Engineer in Charge at
the Norfolk Office, to WA4ONG states:

"I have received a report that indicates you may have operated your amateur
 radio station, call sign WA4ONG, in violation of Section 97.113(a) of the
 Commission's Rules. It appears that you used the Ama-teur Radio Service to
 facilitate the business activity of THE COALITION TO STOP U.SD.
 INTERVENTION IN THE MIDDLE EAST."

"Specifically, on or about January 5, 1991 you received a packet radio
 message originated by amateur radio station WA3QNS. You then transmitted
 this packet radio message to another amateur radio station. The message
 was:

   { Here appears a copy of the message sent by WA3QNS@N3LA.PA originat-ed
     at 22:22z on Jan.5 with the BID #21035_N3LA, Subject: Call This Number
     ASAP. The message listed the business telephones and fax numbers for
     "The Coalition" as well as a 1-900-xxx-xxxx number to call to
     "register your voice" I won't repeat the bulletin here, because
     repeating the bulletin would make it illegal to send this message! }
(Continued in Part 2)
/EX

SB  URGENT@USA < W3IWI  $38141_W3IWI
FCC CITES BBSs FOR @USA MSG (Part 2/4)
R:910131/0445z 38141@W3IWI.MD.USA.NOAM [Balto/Wash MD/DC]

                FCC CENSORS/CENSURES PACKET RADIO cont'd

"This activity was a facilitation of the business affairs of the Coali-tion
 to Stop U.S. Intervention in the Middle East and therefor {sic} in
 violation of Section 97.113(a)."

The FCC citation then contains the boilerplate demanding a response within
10 days explaining circumstances and correct actions, and then closing with
a chilling "to determine what, if any, enforcement action is required to
insure current and future rule compliance" and a state-ment that future
transgressions will bring fines and/or license revoca-tion.

That's the facts. I'll now discuss some of the implications and recommended
actions.

                            THE IMPLICATIONS

The implications of the action by the FCC's Norfolk Field Office are
absolutely appalling. What is implied is that each and every station in a
store-and-forward network is responsible for the actual message CONTENT
passing through each node. The BBSs were cited because their calls were in
the message header "audit trail". The  FCC's action states that each BBS
SYSOP is personally responsible for the "correctness" of all messages
merely passing through his system. Here, the W3IWI mail switch handles
about 10,000 messages per month automatically. There is NO WAY that I can
vouch for every bit that passes through!

If the FCC had instead gleaned its information from on-the-air monitor-ing,
then all the THENET/NETROM/ROSE/TCPIP/DIGIPEATER switches handling the
message would have been equally culpable! The implication of the FCC action
is that a node control operator must read all information and be prepared
to shut the system down at the first hint of an "inappropriate" message.
It's hard enough to watch the information passing on 1200 BPS links --
imagine the impossibility of "censoring" 56 kBPS or faster channels.
(Continued in Part 3)
/EX

SB  URGENT@USA < W3IWI  $38142_W3IWI
FCC CITES BBSs FOR @USA MSG (Part 3/4)
R:910131/0445z 38142@W3IWI.MD.USA.NOAM [Balto/Wash MD/DC]

                     THE IMPLICATIONS cont'd

In future networks where redundant channels exist, it is quite possible
that a given message will be fragmented and parts of it sent via several
parallel paths. The message may exist as a complete entity only at the ends
of a virtual path. It would be impossible to implement the censor-ship the
FCC seems to be demanding with such a network, so the "legali-ty" will
interfere with development of new technology.

Consider another recent development: amateur packet radio satellites.
PACSAT is licensed by the FCC with a US trustee and a cadre of US sy-sops.
PACSAT is, in essence, a flying BBS with the sysops on the ground.  In
order to screen out "offensive" messages, a ground-based SYSOP has to use a
radio channel to verify message CONTENT. But the FCC letter says that the
very act of reading an "offensive" message on the radio is illegal. If the
Norfolk FCC action is allowed to stand, the logical implication is that
PACSATs must be turned off!

A number of us have discussed such issues with responsible individuals at
the FCC in Washington ever since the first fledgling days of packet radio.
The signal that the FCC sent was that the sole responsibility for the
CONTENT of a message lays with the ORIGINATOR. The actions of the Norfolk
Office seem to indicate a new policy has been adopted which effectively
kills packet radio.

Or -- perhaps -- the Norfolk Engineer in Charge who issued the citations
was offended by the particular message and chose to take out his
frus-trations on all the "King's Messengers" who brought the message to
him?

                   W3IWI COMMENTS AND RECOMMENDATIONS

It is ironic that the WA3QNS message that brought down the wrath of the FCC
a number of the BBSs that "touched" his message brought a very vocal
response from the packet community informing him that

 (1) 1-900-xxx-xxxx are in fact commercial ventures designed to raise
     money and that a call to the number would cost the caller.

 (2) The subject message was probably in violation of 97.113(a) and
     probably illegal
(Continued in Part 4)
/EX

SB  URGENT@USA < W3IWI  $38143_W3IWI
FCC CITES BBSs FOR @USA MSG (Part 4/4)
R:910131/0445z 38143@W3IWI.MD.USA.NOAM [Balto/Wash MD/DC]

              W3IWI COMMENTS AND RECOMMENDATIONS cont'd

Personally, I have been silent (but very frustrated) that about the 10% of
bulletins addressed @USA (or @ALLUS, @ALLBBS, etc.) that are in poor taste.
I have grown tired if blather about censorship, First Amendment Rights and
the incredible volumes of hate mail. WA3QNS, by his statements and by the
responses to his statements from other folks, has been one of the causes of
this frustration. I have longed for the return to normalcy with messages on
technical topics and personal communications.  I have found it frustrating
to pay the electric power bill and pay for the W3IWI hardware for others to
engage in marginally offensive "Free Speech". I have wished that the
(ab)users of @USA would have exercised more discretion with
self-censorship.

But I have gritted what teeth I have left and avoided being a censor.  Now,
the FCC's CENSURE has left me with no alternative than to be a CENSOR.

Until the FCC tells me that I can do otherwise, I will only release @USA
messages that I personally screen and am willing to stake my license on.
The priority on my time is such that I don't expect to have time to screen
@USA bulletins. Any complaints about my decision will be sent to /dev/null.

For the vast majority of you who do not abuse the system, I'm sorry that
this situation has come up and that your ability to "fan out" informa-tion
will be hindered. Since there have been very few instances of "offensive"
personal messages, I'll take the risk of keeping all other packet mail
flowing here and I hope the other BBS SYSOPs do likewise.  But PLEASE
exercise self-policing. The BBS SYSOPs don't want to be held responsible
for YOUR words.

The ARRL has already been informed about the Norfolk citations. Because of
the potentially devastating impact on all packet radio if the Norfolk
situation is allowed to stand, I anticipate a lot of phone calls to be made
in the next few days!

73 de Tom, W3IWI

********************************************************************
                           >> END OF THIS FILE <<
***************************************************************************

------------------------------

From: "Michael E. Marotta" <MERCURY@LCC.EDU>
Subject: Book Review--Exporting the First Amendment
Date: Sun, 27 Jan 91 09:11 EST

********************************************************************
***  CuD #3.05: File 7 of 8: Review--Exporting the First Amndmnt ***
********************************************************************

BOOK REVIEW: Exporting the First Amendment: The Press-Government Crusade
1945-1952 by Margaret A. Blanchard, Longman Publishers, New York, 1986.

This book was reviewed in the same issue (Vol. 39, No. 3. Oct 1987) of the
Federal Communication Law Journal that contains the article "An Electronic
Soapbox: Computer Bulletin Boards and the First Amendment." "Soapboax" was
cited by The Electronic Frontier Foundation in the amicus curiae brief on
behalf of Len Rose.  EXPORTING THE FIRST AMENDMENT is the more telling
tale.

Time and again, Eleanor Roosevelt and her team mates from the United States
were overpowered by compromisers who viewed "freedom of the press" as a
necessary evil.  To most of the delegates to the press conventions in
Geneva and New York, RESTRICTING the press by adopting "principles of
responsibility" was more important.

Freedom of the press was for everyone EXCEPT...  Except for issues of
national security (all nations agreed with that).  Except for when the
press in one place insults the politicians in another place (Egypt's King
Farouk enjoyed the Riveria and Monte Carlo).  Except when materials are
injurious to youth (Scandanavia and France feared American comic books and
the communists hated the daily comics because in the background was all
this luxury).  Except when opinions are injurious to the reputation of
natural and legal individuals (a "legal individual" is a corporation).  And
indeed, while Eleanor Roosevelt was insisting that the press should be
free, the United States was chasing "communist" writers at home and abroad.

Sadly, the author actually shares the views of the totalitarians.  To
Blanchard, the press is like religion or politics, it is an institution
than cannot be superimposed on a culture.  However, freedom of the press is
merely a logical extension of the freedom to speak which comes from the
freedom to think.  Why it is that Islam and Christianity and atheism,
socialism and communism and capitalism, hot dogs and tofu and tacos can be
exported and imported but freedom of the press cannot?

Recently, the National Science Foundation pressured a sysop into dropping
"obscene" GIF files from his FTP directory.  (The fate of publishers like
Craig Neidorf and Steve Jackson has been well-documented.)  To the extent
that we compromise, we deliver to our enemies the weapons that are used
against us.  The failure of the "First Amendment Crusade" following World
War II is still haunting us today.  The threat to your right to think comes
not from the fact that Egypt and Israel impose censorship, but that the
United States imposes censorship.  The key difference is that for them, it
is the rule and for us, it is the exception.  So be it.

Very often in cyberspace, we come upon systems that ask us not to post
"illegal" information on bombs or lockpicking or sex or credit cards.  A
sysop or moderator has a right to define what is appropriate on their
system.  But stop and think.  There is nothing inherently ILLEGAL about
publishing these facts.  Security textbooks are one source.  Mystery
stories are another.  If you don't know how cars or credit card numbers are
stolen, you cannot PROTECT yourself and you become dependent upon the
socialized police forces to inefficiently record your losses.  And why is
it wrong to write about SEX?  What next, walking down the street?

Freedom of the press comes from freedom to think.  EXPORTING THE FIRST
AMENDMENT is the sad story of what happened when these principles were
compromised.

********************************************************************
                           >> END OF THIS FILE <<
***************************************************************************

------------------------------

Subject: Michigan Bell Fends off BBS Complainant
From: "Michael E. Marotta" <MERCURY@LCC.EDU> Subject: News from Michigan
Date: Tue, 29 Jan 91 15:24 EST

********************************************************************
***  CuD #3.05: File 8 of 8: The CU in the News                  ***
********************************************************************

From:  GRID News. vol 2 nu 4. January 29, 1991.  World GRID Association, P. O.
    Box 15061, Lansing, MI  48901 USA
    -----------------------------------------------------------------Michigan

           Bell Fends off BBS Complainant by Michael E. Marotta

James R. Imhoff is the sysop of Variety and Spice BBS.  In January
of 1990, Michigan Bell began assessing him business rates.  He filed a
complaint with the Michigan Public Service Commission.  MBT filed for and
was granted a motion hearing.  On January 18, 1991 at 10:00 am, a hearing
was conducted by telephone.  Judge Daniel Nickerson presided.  Two MPSC
staffers were present in person.  Michigan Bell's Craig Anderson and Char
Hoffman were connected and James R. Imhoff was connected.

At that time, Michigan Bell asked for several "discoveries".  As the
defendants, they had a right to know what proofs and witnesses Imhoff
intended to rely on.  Judge Nickerson granted most of the eight requests.

Docket U9725 James Imhoff vs Michigan Bell Telephone was heard on January
29, 1991.  Present were Bruce Rainey, Tomasin Garcia, and Sam Khattar of
the MPSC staff.  Craig Anderson, Charlene Hoffman, Nancy M. Rhoads,  and
Amy Edwards of Michigan Bell.  James Robert Imhoff appeared, also.  Daniel
Nickerson was the administrative law judge.

We met in a pre-hearing at 9:00 am.  The judge announced that the purpose
of the pre-hearing was to define the issues of discovery.  Craig Anderson,
speaking for Bell, said that discovery was not resolved.  The MPSC staff
said that it did not see the complainant's reponses to the request for
discovery until this morning.  Craig Anderson said he had a motion. The
judge said he would continue presently.

Anderson's motion was heard.  "I spoke to Imhoff and reminded him of the
deadline," he said. That deadline was Friday, January 25, 1991 at 5:00 pm.
According to Anderson, Imhoff delivered the responses to Bell on Monday at
12:10 pm. Speaking for the MPSC staff, Tomasin Garcia said she did not
receive the response.  Anderson said that Imhoff did not provide addresses
or other materials as directed by the judge.  MBT asked that Imhoff be
precluded from calling witnesses as they did not have adequate time to
prepare a defense or response.

James Imhoff said that he delivered the materials to Bell's Michigan Avenue
Detroit office at 4 pm on Friday, January 25, 1991,  but that the guard was
unconcerned.  The guard did not know Craig Anderson.  Imhoff said that
three guards were present, two men chatting with women, a third woman
chatting with another woman.  Imhoff also said that he did not know he was
to give materials to the MPSC staff, he thought he was to delivery them to
MBT staff.  Further, he does not know the addresses of his witnesses
because they are all computer people whom he knows online only.  He did not
know who could and could not appear.

Judge Nickerson asked Imhoff if he received a letter outlining his
responsibilities.  Imhoff replied that he did not know if he got the letter
because he gets a lot of mail, some of it redundant.

Some discussion transpired on the state of readiness of security at MBT and
whether and when every package delivered is logged.

After a recess to consider the arguments, Daniel Nickerson ruled.
"Discovery is allowed," he said, calling it an important aspect of an
efficient and fair hearing. "Therefore," he said,"I find that my order was
not complied with.  Both staff and respondent are prejudiced for not
receiving the answers...  The matter of dismissed without prejudice."

James Imhoff said he would file again and take it up later.

After the hearing, I spoke with the principals and the audience.  Craig
Anderson said that Michigan Bell is not interested in going after every
BBS.  He would not comment on two hypothetical cases.  He would not say
whether he would consider file uploads to be a value rendered and he did
not feel he could say what this might mean in an information society.
Anderson and his colleagues all agreed that these issues would have to be
addressed in the future as we continue to wire our network nation.

I also spoke with James Imhoff.  "I do charge for access," Imhoff said.
When a user sends him money, "they get time on my system... they get into
the library."  Imhoff feels he should not be charged business rates.  "The
last seven years I have run this system I have not made dime one on this
system. I actually lose between $100 and $150  a month. It is a hobby for
this reason. If I were charging by the minute like a Prodigy or a
CompuServe, it would be a business.  I just want to get close to
break-even.  According to the IRS, any time you lose money on a business for
three years, that is a hobby.  I make anywhere from $1000 to $1200 a year
and it costs me about $800 a month. The cost of a man's toys do not
determine whether his hobby is a business or a residence.

Kevin Craft, sysop of Beam Rider noted that Imhoff seemed "not well
prepared."  Rick Wisckol, former sysop of Northern Point said that when
faced with Michigan Bell, you "shouldn't wing it. ...Get someone who can
work the ropes on the same level as Michigan Bell."

Imhoff said that he was a target in a larger conspiracy.  He said that
there are 50 million registered home modems in American.  If Bell can
collect an extra $3 per month, he said, that will be an extra $150 million
per month in income. "Going after me is just the first step."

********************************************************************

------------------------------

                           **END OF CuD #3.05**
********************************************************************