[alt.society.cu-digest] Cu Digest, #2.14

TK0JUT2%NIU.BITNET@UICVM.uic.edu (11/30/90)

  ****************************************************************************
                  >C O M P U T E R   U N D E R G R O U N D<
                                >D I G E S T<
              ***  Volume 2, Issue #2.14 (November 30, 1990)   **
  ****************************************************************************

MODERATORS:   Jim Thomas / Gordon Meyer  (TK0JUT2@NIU.bitnet)
ARCHIVISTS:   Bob Krause / Alex Smith / Brendan Kehoe
USENET readers can currently receive CuD as alt.society.cu-digest.

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.  CuD material may be reprinted as long as the source is
cited.  Some authors, however, do copyright their material, and those
authors should be contacted for reprint permission.
It is assumed that non-personal mail to the moderators may be reprinted
unless otherwise specified. Readers are encouraged to submit reasoned
articles relating to the Computer Underground.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
DISCLAIMER: The views represented herein do not necessarily represent the
            views of the moderators. Contributors assume all responsibility
            for assuring that articles submitted do not violate copyright
            protections.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

CONTENTS:
File 1: Moderators' Corner
File 2: Len Rose Indicted
File 3: CPSR's FOIA request from the FBI
File 4: International Information Retrieval Guild
File 5: A Note on Censorship
File 6: Two Comments on Prodigy
File 7: Don't Talk to Cops
File 8: Response to DEA/PBX News Story

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

----------------------------------------------------------------------

********************************************************************
***  CuD #2.14: File 1 of 8: Moderator's corner                  ***
********************************************************************

From:      Moderators
Subject: Moderators' Corner
Date:      November 30, 1990

++++++++++
In this file:
1. FTP INFORMATION
++++++++++

+++++++++++++++++++++
FTP Information
+++++++++++++++++++++

We *DO NOT* maintain archives at NIU, and other than back issues of CuD, we
cannot send out archival material. Back issues can be obtained from two ftp
sites:

1. WIDENER: The *CORRECT* Widener ftp address is:
%% ftp cs.widener.edu
or%% ftp 192.55.239.132

On decompressing Zfiles:
The archivist just put up a 16-bit uncompress utility for DOS that'll do the
trick. Get pub/dos/uncom.exe first; then to uncompress anything with the .Z
extension, do it thusly:

	C:\XFER >UNCOM FOO.Z > FOO

(it'll appear on the standard output). He hasn't played with it much yet,
so it may have a -o option or something to it.  The site is available from
6 pm to 6 am.

2. BLAKE: The address and archive list is available to subscribers only.
All files are Zfiles, and if you are using a unix system, use the
"decompress +filename+" command.

+++++++

We have added additional papers and other material to the archives.  We are
ESPECIALLY INTERESTED in receiving papers from lawyers or law students on
CU-related topics. This can include summaries of recent law,
bibliographies, or other material that would be of interest. We have added
the computer crime statutes from Illinois (16D-3) and California (502,
502.7), the ECPA, and other material.  We hope to compile a strong set of
law-related articles and laws, so if you come across any related files,
pass them along.

********************************************************************
                           >> END OF THIS FILE <<
***************************************************************************

------------------------------

From:      Moderators
Subject:   Len Rose Indicted
Date:      29 November, 1990

********************************************************************
***  CuD #2.14: File 2 of 8: Len Rose Indicted                   ***
********************************************************************

                    "Man is Charged in Computer Crime"
                            By Joseph Sjostrom
         From: Chicago Tribune, 28 November, 1990: Section 2, p. 2

Du Page County prosecutors have indicted a Naperville resident in
connection with an investigation into computer tampering.

Leonard Rose, 31, of 799 Royal St. George St., Naperville, was charged by
the Du Page County grand jury last week with violating the 1988 "computer
tampering" law that prohibits unauthorized entry into a computer to copy,
delete or damage programs or data contained in it.

Rose, who lived in Baltimore until last September or October, is under
federal indictment there for allegedly copying and disseminating a valuable
computer program owned by AT&T. The Du Page indictment charges him with
copying the same program from the computer of a Naperville software firm
that employed him for a week in October.

His alleged tampering with computers there was noticed by other employees,
according to Naperville police. A search warrant was obtained for Rose's
apartment last month, and two computers and a quantity of computer data
storage discs were confiscated, police said.

The Du Page County and federal indictments charge that Rose made
unauthorized copies of the AT&T Unix Source Code, a so-called operating
system that gives a computer its basic instructions on how to function.

The federal indictment says Rose's illegal actions there were commited
between May 1988 and January 1990.  The Du Page County indictment alleges
he tampered with the Naperville firm's computers on Oct. 17.
                                (end article)

                    *************************************
Although we have not yet seen the indictment, we have been told that charges
were made under the following provisions of the Illinois Criminal Code:
                    *************************************

              From:   SMITH-HURD ILLINOIS ANNOTATED STATUTES
            COPR. (c) WEST 1990  No Claim to Orig. Govt. Works
                  CHAPTER 38.  CRIMINAL LAW AND PROCEDURE
                     DIVISION I. CRIMINAL CODE OF 1961
                       TITLE III. SPECIFIC OFFENSES
                PART C. OFFENSES DIRECTED AGAINST PROPERTY
                        ARTICLE 16D. COMPUTER CRIME

                       1990 Pocket Part Library References

 16D-3. COMPUTER tampering

  s 16D-3. COMPUTER Tampering.  (a) A person commits the offense of COMPUTER
 tampering when he knowingly and without the authorization of a COMPUTER'S
 owner, as defined in Section 15-2 of this Code, or in excess of the authority
 granted to him:
   (1) Accesses or causes to be accessed a COMPUTER or any part thereof, or a
  program or data;
   (2) Accesses or causes to be accessed a COMPUTER or any part thereof, or a
  program or data, and obtains data or services;
   (3) Accesses or causes to be accessed a COMPUTER or any part thereof, or a
  program or data, and damages or destroys the COMPUTER or alters, deletes or
  removes a COMPUTER program or data;
   (4) Inserts or attempts to insert a "program" into a COMPUTER or COMPUTER
  program knowing or having reason to believe that such "program" contains
  information or commands that will or may damage or destroy that COMPUTER, or
  any other COMPUTER subsequently accessing or being accessed by that COMPUTER,
  or that will or may alter, delete or remove a COMPUTER program or data from
  that COMPUTER, or any other COMPUTER program or data in a COMPUTER
  subsequently accessing or being accessed by that COMPUTER, or that will or may
  cause loss to the users of that COMPUTER or the users of a COMPUTER which
  accesses or which is accessed by such "program".
  (b) Sentence.
   (1) A person who commits the offense of COMPUTER tampering as set forth in
  subsection (a)(1) of this Section shall be guilty of a Class B misdemeanor.
   (2) A person who commits the offense of COMPUTER tampering as set forth in
  subsection (a)(2) of this Section shall be guilty of a Class A misdemeanor and
  a Class 4 felony for the second or subsequent offense.
   (3) A person who commits the offense of COMPUTER tampering as set forth in
  subsection (a)(3) or subsection (a)(4) of this Section shall be guilty of a
  Class 4 felony and a Class 3 felony for the second or subsequent offense.
  (c) Whoever suffers loss by reason of a violation of subsection (a)(4) of this
 Section may, in a civil action against the violator, obtain appropriate
 relief.  In a civil action under this Section, the court may award to the
 prevailing party reasonable attorney's fees and other litigation expenses.
                              (end Ill. Law)
                 +++++++++++++++++++++++++++++++++++++++++

Illinois employs determinate sentencing, which means that the judge is
bound by sentencing guidelines established by law for particular kinds of
offenses (See Illinois' Univied Code of Corrections, Chapter 38, Sections
1005-8-1, 1006-8-2, 1005-5-3.1, and 1005-3.2).

Computer tampering carries either a Class 4 felony sentence, which can
include prison time of from one to three years, or a Class A misdemeanor
sentence.  With determinate sentencing, the judge selects a number between
this range (for example, two years), and this is the time to be served.
With mandatory good time, a sentence can be reduced by half, and an
additional 90 days may be taken off for "meritorious good time." Typical
Class 4 felonies include reckless homicide,  possession of a controlled
substance, or unlawful carrying of a weapon.

A Class A misdemeanor, the most serious, carries imprisonment of up to one
year. Misdemeanants typically serve their time in jail, rather than prison.
Ironically, under Illinois law, it is conceivable that if an offender were
sentenced to prison for a year or two as a felon, he could be released
sooner than if he were sentenced as a misdemeanant because of differences
in calculation of good time.

********************************************************************
                           >> END OF THIS FILE <<
***************************************************************************

------------------------------

From: <mrotenberg@CDP.UUCP>
Subject: CPSR's FOIA request from the FBI
Date: Thu, 29 Nov 90 09:55:52 -0800

********************************************************************
***  CuD #2.14: File 3 of 8: CPSR'S FOIA action with the FBI     ***
********************************************************************

CPSR entered its first appearance today in federal district court in the
case CPSR v. FBI.  CPSR is seeking information from the FBI under the
Freedom of Information Act regarding the monitoring and surveillance of
computer bulletin boards used by political and advocacy organizations.

Judge Stanley Harris began the status call by indicating that the case
would be transferred to the newest member of the Court, Judge Michael
Boudin, son of the late civil rights attorney Leonard Boudin.  He mentioned
in passing that the decision to transfer the case was "made by a computer"
and that he "had nothing to do with it."

Judge Harris asked the parties to go ahead with their motions so that the
proceeding would not be delayed.  Assistant US Attorney Mark Nagle
indicated that the FBI had located one document responsive to CPSR's
request and that he expected the FBI would release this document shortly
without any sections excised.  He said that the government would then file
by January 15 a motion for summary judgment.

David Sobel, CPSR Counsel, and Marc Rotenberg, appearing as co-counsel,
then indicated to the Court that CPSR would likely challenge the adequacy
of the FBI's search for responsive documents.

Marc Rotenberg CPSR Washington Office.

********************************************************************
                           >> END OF THIS FILE <<
***************************************************************************

------------------------------

From:     <KRAUSER@SNYSYRV1.BITNET>
Subject:  International Information Retrieval Guild
Date:     Wed, 28 Nov 90 21:18 EDT

********************************************************************
***  CuD #2.14: File 4 of 8: Internt'l Info Retrieval Guild      ***
********************************************************************

The following article describes the who and why of a computer group called
The International Information Retrieval Guild. I asked this group if they
would write an article for the readers of CuD in the hopes that other
computer groups past or present would write similar articles.  I hope this
article will cast more light on what the "computer underground and hackers"
are and I invite other groups to send me an article about themselves.  My
mail address is KRAUSER@SNYSYRV1.BITNET.

      =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

                     Who? What? When? Why? and Where?

                                    THE
                               INTERNATIONAL
                                INFORMATION
                                 RETRIEVAL
                                   GUILD

      =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

This article has been published to answer a few basic questions regarding
The International Information Retrieval Guild.  We hope that those who read
these words will do so in an objective manner.

The I.I.R.G. Yesterday.....

The I.I.R.G. is not a new organization suddenly appearing on the scene. The
I.I.R.G. was originally founded by the Mercenary in 1982.  In the following
six years the group grew to prominence in the Commodore 64 community and
created numerous share-ware utilities as well as text files.

The guild at this time was divided into two chapters, One would concentrate
on the publishing of text files and share-ware, While the second would
concentrate on the accumulation of data for the organization.  At its peak
in those 6 years the I.I.R.G. ran a network of six bulletin board systems
spanning the East coast of the United States, as well as one system in
South Africa.

The group was comprised of individuals ranging from 17 to 42 years of age,
all of those having a wide variety of backgrounds and interests.

With the demise of the mainstream Commodore 64 community, (I know I'll
catch some flack on that one), and the introduction of the much superior
Amiga, the group was disbanded except for a small core of the founding
members.

Of the four surviving original members, their loyalty was divided.  Two
went with the graphics capabilities and multi-tasking of the Amiga, And Two
went with the IBM.

The I.I.R.G. Today...

In early March of 1990, for the first time in over two years.  The founding
members reconvened and discussed reforming the guild as a Vocal
organization. (It must be noted that in earlier days the I.I.R.G. was an
invitation only organization) The sudden shift in attitudes was due to the
negative publicity afforded hackers in the press and television.

After a brief hiatus to Canada in April, Mercenary set about establishing
the groups bulletin board system and contacting former members throughout
the United States.  Knighthack, another of the founding members, was
contacted and set about the plans for publishing PHANTASY.  Phantasy is to
be the I.I.R.G.'s voice to the world, a forum for discussing topics of
interest to the Computer Underground.  At this point I'd like to have
Mercenary discuss this.

The I.I.R.G. was founded on the principal of exploration, The group as a
whole does not advocate illegal activities.  To us Hacking is an Artform to
be nurtured and condoned.  Phantasy will only publish legally obtainable
information and is not intended to be a replacement for Phrack.  (Although
we do understand someone else will now be publishing Phrack, we wish them
the best of luck..)

The I.I.R.G. today is a small core of enthusiasts with a wide range of
computer preferences (IBM,AMIGA,DEC,etc) and will no longer concentrate on
one machine.  I'd like to point out that freedom of speech is one of our
constitutional rights, But it seems that certain members of the
Law-enforcement establishment and certain politicians have forgotten this.

It's high time that the media also remembered this and looked at things
from our prospective. Techno Terrorists,high tech bandits, modern day
robin-hoods, this is all I see appear in the media.  What about Hacker
cracks sex offender's security (Pete Leppik) or Hacker plugs multi-million
dollar security hole?  Let's see some positive articles folks... Now I know
theres always a few bad apples in the bunch,and I don't dispute this, but
for the most part a true hacker is driven by curiosity about the world.
This is the same kid who took the family stereo apart when he was six not
one of Yassar's boys.  I hope I've made my point and have gotten the
message across, As long as there are things to take apart,chinese
restaurants open till 2am,and a computer.. There will be hackers..

Mercenary....


Phantasy may be obtained at the following Systems...

     1. IIRG Headquarters- The Rune Stone BBS - 1200/2400 Baud 24 Hours
         Call for the Earliest possible releases of Phantasy and other
         IIRG files. Our system will be going private so call Now while
         you still can, at (203) 485-0088.

     2. Lightning Systems- 24 hours - at (414) 363-4282

     3. Sycamore Elite- 24 Hours - at (815) 895-5573

     4. TAP's BBS at (502) 499-8933

********************************************************************
                           >> END OF THIS FILE <<
***************************************************************************

------------------------------

From: Czar Donic (California)
Subject: A Note on Censorship
Date: Mon, 26 Nov 90 15:40:43 0800

********************************************************************
***  CuD #2.14: File 5 of 8: A Note on Censorship                ***
********************************************************************

The recent debate or discussion in the Computer Underground Digest
concerning censorship is one more example of how technology has managed to
outpace legislation.  Naturally, the First Amendment covers freedom of
expression in all of its manifestations, but exclusions have not yet been
codified to the extent that we can point to a corpus of specific precedents
to support restrictions thereon.  It should be obvious to anyone that the
term "no law" means "no law," but ever since the prohibition against saying
"fire in a crowded theatre," people have been trying to modify the
constitution, trying to read that part of the first ammendment as meaning
"no law except . . ." or "no law but . . . ."  It is one of the greatest
ironies that those who consider themselves "strict constructionists" have
the most difficulty with this ammendment.

The issue seems to revolve around property rights vs. free speech rights.
In the case of broadcast media, the airwaves are defined as belonging to
the public and this allows the government, as OUR representative, to
regulate the content of programming, even involving itself in the news to
some extent.  For example, a fine arts station in Chicago, WFMT, once
elected to continue its classical music programming in the face of attack
by other interests who wanted its frequency.  The attacks took the form of
complaints about its lack of news coverage, especially on "communism."  The
station owners issued a statement that went something like this:  "WFMT
serves a purpose that is not altered by temporary interruptions."  The
station eventually won, but only at the cost of deflection from its
"purpose."  The price was involvement in the political and legal arena.

It seems to me that this is where we are right now in the issue of
censorship in the computer network area.  Who owns the network lines?  Who
owns the machines?  Who decides what information and in what form is
available to you?  Finally, we have an even deeper question which is "who
owns what information," which can be expressed as an even more philosophic
one:  "who owns information?"

Obviously, the framers of the constitution did not have internet on their
minds when when they were writing the constitution.  They did, however,
have an interest in the free flow of information.  Once a government can
restrict the information available to you, it can control every other
aspect of your life.  Avoiding or preventing such a situation was the
entire premise of the first amendment.

EDITING VS. CENSORSHIP

It should be obvious that an attempt to censor an individual's right to
freely express and distribute his ideas is contrary to common sense.  To
argue that publications such as Playboy and Penthouse must pay for
contributions from evangelical christians would clearly be absurd.  Equally
absurd would be to require that every BIBLE come complete with a
centerfold.  What is not so clear is whether such publications should be
forced to "air dissenting views."  Already, equal time provisions force
electronic journalists to make air time available in such cases.  Once this
crack in the rights of the "editor" is opened, all sorts of questions
arise.  Much debate is squandered over whether or not certain views are
"mainstream" enough to be considered "worthy dissent."

So the absurdity becomes compounded.  On the one hand we recognize that
dissenting opinions should be expressed.  On the other, we make certain
that those opinions do not dissent too much.  To paraphrase Barry
Goldwater, moderation in the defense of mediocrity is no virtue.  If
freedom of speech is to mean anything, it must mean that uncomfortable
views be expressed.

PRIVATE PROPERTY AND FREE SPEECH

We now come to the issue of property rights vs. expression rights.  It
seems perfectly reasonable that someone who puts up his own computer, his
own software, his own telephone line, his own electricity bills, should
have complete control over any and all activity that transpires on his BBS.
At the very least, he has the perogative of shutting it down or using an
unlisted number.

PUBLIC FUNDS AND FREE SPEECH

The recent argument over whether NSF has the right to censor gif files is
analogous to the recent controversy over NEA funding of what a few
retrograde senators consider morally offensive.  The recent flack over the
Maplethorp exhibit is a fairly clear example of this mentality.  Because of
it, congress rushed to adopt the Jessie Helms agenda.  Now, congress has
backed off as a result of Joe Papp and other famous artists refusing grants
and prominent reviewers resigning.

WALMART AND 7-11

The "moral majority" threatened to boycott 7-11 if it didn't stop selling
Playboy and Penthouse.  7-11 caved in.  Walmart followed suit, but then
proceeded to ban rock magazines (lot's of sex in those) but not hunting or
gun magazines.  Now Sam Walton is a bible thumper for the southern midwest
and went into it with gusto.  7-11, on the other hand, simply bowed to
pressure.  Now it is bankrupt.  People stopped going there.  Now another
group threatened Burger King and it turned around a wrote what seems to be
like the loyalty oaths of the 50's promising to sponsor only programs that
reflected "family values."

What people like us have to do is let people like Burger King know that we
will boycott them if they continue to knuckle under to extremists.

SOLUTION

Even though NSF has little choice but to try to exorcise the GIFS from
their system, Americans interested in free speech should be as vocal as
possible arguing for their continuance.  The reason is that we want battles
over free speech to be fought on the level or at the line of pornography.
As long as we can keep these bigoted zealots busy reading pornography and
worrying about it, they will be unable to attack more important and
meaningful forms of free speech.

Suppose there were no GIFS on the nets?  Then they would go after anything
else they could understand.  What about personal notes from one person to
another?  Will we have to document that every syllable is of scientific
import?  Suppose someone still believes in the steady state theory of the
universe rather than the big bang.  Do we cut him off because his views are
clearly invalid (so far as we know)?  It could very well happen if we did
not have the GIFS as a buffer.  We can recognize that the GIFS are of no
value whatsoever, that such material is available elsewhere, that they take
up valuable disk or tape space, that they clog the lines that could be
better used otherwise.  So what?  Their values remains as pawns in the game
of censorship and they are the most valuable ones we have.

Czar D.

********************************************************************
                           >> END OF THIS FILE <<
***************************************************************************

------------------------------

From:  Alex Gross and Steven W. Grabhorn
Subject: Two Comments on Prodigy
Date:   November 29, 1990

********************************************************************
***  CuD #2.14: File 6 of 8: More on Prodigy                     ***
********************************************************************

{Prodigy has been receiving considerable criticism in the past few weeks
because of its policies on e-mail, alleged censorship, and other problems
that some users identify. There has been a lively discussion in Pat
Townson's TELECOM DIGEST (available from the internet or by dropping a note
to:  TELECOM@EECS.NWU.EDU). The following typify the kinds of issues
underlying Prodigy's policies -- moderators}

From: Alex Gross <71071.1520@COMPUSERVE.COM>
Subject: more on prodigy and censorship
Date: 27 Nov 90 01:05:43 EST

Tales of censorship on Prodigy have been ringing a great big bell with
me, and I think you'll see why from the following message which I wrote as
an answer to a query about the French Minitele service two years ago.  It
was first posted on CompuServe's FLEFO (Foreign Language Education Forum)
and then got its life prolonged by being included in a Minitele info file
that is still posted there.  I guess the point is that a lot of people
everywhere are still quite frightened by the idea of free speech.  Also, what
about the free flow of information across boundaries (or even inside
boundaries telecom was supposed to bring--how free is it really going to
turn out to be, and for whom?  It's really sounding like Prodigy is Minitele
revisited.  I've added translations of some of the French words into English,
but otherwise it's as I wrote it then.


"My own experiences with Minitele are limited to the CTL branch between
Feb & June of 1988, & I don't know how applicable my observations will be
to Minitele as a whole or to what may have happened since.  But I fear the
worst.  First of all, it is expensive, $25 per hour from what I hear.  This
wasn't true with CTL at the beginning.  For close to a year, it was absolutely
free to North Americans--this was because they were trying to drum up sub-
scribers over here.  Another version went that they were running big ads
in France to get people to sign up for the CTL branch there (they have
competitive companies over there running pieces of it) on the premise that
they would be able to "talk directly with America."  I came in on the end
of this & had about 6 weeks of free service which then went to $4 per hour
to $10 & presumably to $25.  I quit at the $4 level.

"There really wasn't an awful lot to do on this branch.  You could go into
"Le Bar" & bavarder/taper (talk/type) 1 on 1 in real-time with the French.  You
cd engage in something very remotely resembling free public discussion on some-
thing called Le Forum.  Or you cd try some of the other "entertainments,"
mostly limited or dumb in one way or another.  I'll take each of the three
in order.

"Conversations in "Le Bar" were I think on the whole worse than those you
might have on a BBS here using the CHAT option.  Let's compare it to going
to a party where you really had no idea who the guests might be, and they all
turned out to have little in common.  I had one or two pleasant chats, but most
of them were of the "Et quelle heure est-il a New York?" variety ("What time is
it in NYC?").   Many of the US-niks spoke only English, & a lot of the French
seemed happy to reply this way.  I found at least 2 bilingual Parisian
secretaries there.  Some of the talk was sex-oriented.  Many had "PSEUDOs"
(handles) like Cuddles or Fondles or BIG-T*TS.  Oh yes, we all had
PSEUDO's--mine was FRANGLAIS, which was generally appreciated.  (Franglais is
the kind of French no one is supposed to speak, but almost everyone does--it
is a combo of French with lots of English words, FRANcais & anGLAIS.)  Some
will no doubt call me a snob, but not too much really got said.

"Oh yes, some of the French affect an abbreviated slang, a la Metal
Hurlant, (Heavy Metal, originally a French mag) something like "k'veute
feravekma, magoss?" which wd not be too helpful for language-learning.
("Whatchawanna doowidmebabee?")  Also, some of them don't even like computers
& seemed surprised when I told them Minitele counted as one--so user-friendly
is the interface that they really think they're on a typewriter or a tele-
phone.  All conversations in Le Bar, by the way, are private between
those in them.

"So much for Le Bar.  As for "Le Forum," that was simply terrible.  They
practised rigorous censorship, & msgs cd take as long as 10 days to appear
on the Bd while someone performed "Validation des Textes" ("text accredita-
tion," I guess, but it sounds worse in French).   At that time many
of the msgs posted in this "public" part were in English, but about a third
were in French.  There were repeated anti-american msgs such as "All Americans
are stupid cowboys" or "Les americains sont tous des barbares" ("americains are
all barbarians") & such ilk.  I have French cousins & have been hearing this
for 35 years, but I was sad to see it still going on.  Also, some of them
have convinced themselves that France now leads the world technologically, &
I saw one msg claiming that the computer was invented by those two great
Frenchmen Pascal & Babbage (!) (to many French, any name ending in "-age" can
sound French.)

The best thing we had from it all was a party of 30 NYC area minitelistes,
& afterwards I posted a msg stating in French that our group had awarded
the PRIX DERRIDA for total stupidity to the Babbagehead and the PRIX
ETIEMBLE for some other sottise (stupidity).  (Explanation: the French go
for literary prizes with names like PRIX THIS & PRIX THAT--Derrida is the
name of a virtually unreadable literary critic, Etiemble wrote the book first
condemning the use of "Franglais."  The message finally got posted.  Where
criticism is concerned, the French can dish it out, but they really can't
take it.  I also (FINALLY) provoked them into posting a msg complaining about
the censorship, but even this was censored.  Le Forum was the only part of
of Minitele I saw remotely comparable to CIS forums like FLEFO.

"As for the other services, how often do you need to know Air France times
or read Agence France Presse bulletins or consult a French astrologer?  And
even if the real Minitele is more complete, do you really need to know the
names & addresses of all the dry cleaners in Marseilles?   Hope this helps.
Salut!   Alex"

And like it said then, Greetings!   Alex

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

From: "Steven W. Grabhorn" <grabhorn%gandalf.nosc.mil@nosc.mil>
Subject: Prodigy "Protesters" Respond
Date: 27 Nov 90 05:33:19 GMT

I know we've seen quite a bit of discussion about Prodigy in the last
several weeks, however, I'd like to pass along an article I received from
some of the Prodigy members involved in the "protest."  Prodigy certainly
does own its own service and it seems like they can do what they see fit
with it.  However, I thought it might be a good idea to forward some
thoughts from the other side of the fence. Although I use Prodigy
occasionally, the thoughts below may or may not reflect my own feelings,
and the usual disclaimers about myself and my employer apply.

               ----------Begin Article------------

NEW PRODIGY GUIDELINES RESTRICT USE OF PRIVATE E-MAIL

FOR IMMEDIATE RELEASE, NOVEMBER 24, 1990:

Prodigy Service, the IBM/Sears owned home computer service, has taken
another unprecedented step in its clampdown on private electronic
communication.

In what appears to be a direct response to the growing strength and
visibility of Prodigy members who are protesting Prodigy's abandonment of
its much publicized "flat fee" billing structure and proposed e-mail
charges, the service has very quietly issued a new set of "messaging
guidelines" (see attached) [not included ?? -sg].] Imposition of these
guidelines will restrict the private exchange of information on Prodigy in
ways never before attempted on a commercial online service.

Russ Singer, a protest coordinator remarks, "Obviously Prodigy feels an
informed membership is not in their best interest."

Six days after being issued, existence of the new regulations is unknown to
most Prodigy users.  The guidelines have not been announced on the
"Highlights" screen members encounter when logging on to the service.

Among the guidelines, which take effect immediately, are prohibitions on:
Contacting Prodigy's online merchants and advertisers for any reason other
than to "purchase goods and services" and to "communicate about specific
orders placed online"; "A mailing with a request to recipients to continue
distribution to others," which Prodigy describes as "chain letters". Use of
"automated message distribution programs (other than those provided by
Prodigy); and the threat of termination of users who fail to provide a
credit card number but who continue to send a large number of messages .

The guidelines are vague and raise disturbing questions about free speech
and the sanctity of private communication. These issues have aroused the
concern of the ACLU and other legislative and consumer groups.  Although
issued universally, the intent of the guidelines seems aimed at stemming
the protest.

Says Henry Niman, another protest coordinator, "These guidelines don't make
sense from a monetary standpoint. If Prodigy goes ahead with e-mail
charges, in only five weeks these rules will be unnecessary." Although $.25
per message would afford Prodigy a bloated profit margin, most users on the
service would find the cost prohibitive.

Adds Niman, "These regulations do nothing more than create confusion and
intimidation. What purpose is served by requiring, under threat of termina-
tion, a credit card number from members who have already established a
billing arrangement with the service?"

Should e-mail charges be imposed, Prodigy, which is believed to be 80%
advertiser supported, will have created an electronic marketplace in which
merchants cannot benefit from customer to customer referrals.  With the
addition of Prodigy's latest guidelines, merchants will be denied customer
feedback on the condition of that marketplace.  Many protesters are asking,
"Don't advertisers have an interest in knowing what management is doing?"

Singer adds, "If what Prodigy wants to be is a shopping mall then it should
advertise itself that way, not as a flat rate interactive service.
Restricting users to submitting posts to Prodigy's public bulletin boards
makes Prodigy no more 'interactive' than a letter to the editor in a
newspaper."

Prodigy's campaign to silence dissent on the service began on October 30th
when Prodigy expelled ten of the most visible members of the protest group
(The Cooperative Defense Committee). An hour later discussion of e-mail
charges was prohibited on the only PUBLIC forum provided for member
feedback .  Fifteen days later, Prodigy targeted four more protesters by
sending them newly devised "warning" notices informing them that private
"mass mailings" might be used as grounds for termination.

If Prodigy's new "guidelines" applied universally, you would not be getting
this FAX.

FOR FURTHER INFORMATION, CONTACT:  PENELOPE HAY (213) 472 0443

********************************************************************
                           >> END OF THIS FILE <<
***************************************************************************

------------------------------

From: Reprint
Subject: Don't Talk to Cops
Date: November 27, 1990

********************************************************************
***  CuD #2.14: File 7 of 8: Don't Talk to Cops                  ***
********************************************************************

[reposted from misc.legal K. Henson]

	~ There have been a lot of recent discussions of police searches
	~ in the electronic-publishing cases (invasions of businesses),
	~ and in the Grateful Dead newsgroups (cars with friendly bumper
	~ stickers being prime harassment targets.)
	~ I just saw this leaflet that looked relevant,
	~ so I'm asciifying it for your enjoyment.
	~ 		Bill

DON'T TALK TO COPS
------------------
	By Robert W. Zeuner, Member of the New York State Bar

"GOOD MORNING!  My name is investigator Holmes.  Do you mind answering
a few simple questions?"  If you open your door one day and are greeted
with those words, STOP AND THINK!  Whether it is the local police or
the FBI at your door, you have certain legal rights of which you ought
to be aware before you proceed any further.

	In the first place, when the law enforcement authorities come
to see you, there are no "simple questions".  Unless they are
investigating a traffic accident, you can be sure they want information
about somebody.  And that somebody may be you!

	Rule Number One to remember when confronted by the authorities
is that there is no law requiring you to talk with the police, the
FBI, or the representative of any other investigative agency.  Even the
simplest questions may be loaded, and the seemingly harmless bits of
information which you volunteer may later become vital links in a chain
of circumstantial evidence against you or a friend.

	DO NOT INVITE THE INVESTIGATOR INTO YOUR HOME!

	Such an invitation not only gives him the opportunity to look around for
clues to your lifestyle, frieds, reading material, etc., but also tends to
prolong the conversation.  And the longer the conversation, the more chance
there is for a skilled investigator to find out what he wants to know.

	Many times a police officer will ask you to accompany him to the
police station to answer a few questions.  In that case, simply thank him
for the invitation and indicate that you are not disposed to accept it at
that time.  Often the authorities simply want to photograph a person for
identification purposes, a procedure which is easily accomplished by
placing him in a private room with a two-way mirror at the station, asking
him a few innocent questions, and then releasing him.

	If the investigator becomes angry at your failure to cooperate and
threatens you with arrest, stand firm.  He cannot legally place you under
arrest or enter your home without a warrant signed by a judge.  If he
indicates that he has such a warrant, ask to see it.  A person under
arrest, or located on premises to be searched, generally must be shown a
warrant if he requests it and must be given a chance to read it.

	Without a warrant, an officer depends solely on your helpfulness to obtain
the information he wants.  So, unless you are quite sure of yourself, don't
be helpful.

	Probably the wisest approach to take to a persistent investigator is
simply to say: "I'm quite busy now.  If you have any questions that you
feel I can answer, I'd be happy to listen to them in my lawyer's office.
Goodbye!"

	Talk is cheap.  But when that talk involves the law enforcement
authorities, it may cost you, or someone close to you, dearly.

++++++
This leaflet has been printed as a public service by individuals
concerned with the growing role of authoritarianism and police power in
our society.  Please feel free to copy or republish.

Any typos are mine, as is the damage from squashing italics into UPPER-CASE.

					Thanks; Bill
# Bill Stewart 908-949-0705 erebus.att.com!wcs AT&T Bell Labs 4M-312 Holmdel NJ
Government is like an elephant on drugs: It's very confused, makes lots of
noise, can't do anything well, stomps on anyone in its way, and it sure
eats a lot.

********************************************************************
                           >> END OF THIS FILE <<
***************************************************************************

------------------------------

From: Various
Subject: Response to DEA/PBX News Story
Date: November 29, 1990

********************************************************************
***  CuD #2.14: File 8 of 8: Responses to DEA/PBX News story     ***
********************************************************************

From: Defensor Vindex <anonymous@usa>
Subject: Response to Joe Abernathy's article in CuD 2.13
Date: Tue, 27 Nov 90 21:49:44 cst

Mr. Abernathy:

This response is to your column about the theft of telephone services,
recently reprinted (with your permission, as I understand it) by the
Computer Underground Digest.

I agree that a major theft, including a theft of telephone services, is
news.  As such, it was entirely legitimate for you to write your story.
What I find disturbing is your use of the generic term "hacker" for any
criminal or alleged criminal that knows how to spell electron or technical.
It inflames without informing.

Unfortunately, it appears to sell papers.  My complaint is probably
useless, since language is constantly evolving, but it still disturbs me
that a misunderstood part of our society is defamed needlessly.

Sorta like Asimov (as Dr. X) wrote in "The Sensuous Dirty Old Man" a few
years ago,  wrote about the meaning of "gay":

[ paraphrased with apologies ]

"The dictionary says 'gay' means 'excited with merriment, lighthearted.' So
you go up to an NFL linebacker who's just made his fourth sack of the day
and is obviously 'excited with merriment, lighthearted,' and you say:
'You're gay, aren't you?'

"Whether he is or he isn't, you'll almost certainly be surprised by the
response."

"Hacker", like "gay", is perhaps becoming redefined--no matter what its
roots, it is acquiring a new meaning and life of its own, and true
"hackers" may need to find a new label (unfortunately, it, too will likely
be subverted), but I wish you wouldn't sensationalize ordinary theft in
order to carry out a private crusade.

Besides, those crooks weren't "hackers," no matter what they called
themselves.  At best they were "phone phreaks."  And Joe, by now you ought
to know the difference.

                   *************************************

From: Jack Minard <deleted>
Subject: I have in my hand a list of hackers....
Date: Wed, 28 Nov 90 11:42:57 cst

(Sigh!). Why does CuD print articles from Joe Abernathy? His articles on
the Great Porno Netscam have hurt the entire electronic community, and he
hasn't made many friends with this latest article.  It's another scare
story about hackers (and others?) and gives only one side of hackers.
Here's what pisses me off about the article.

No self-respecting hacker is going to rip-off, especially after Sun Devil.
Technically, the people breaking into the DEA's pbx were fone phreaks,
hardly the same as hackers. But does Tail-gunner Joe check? No, he just
tosses out a label that the public finds sexy and convenient. Doesn't he
realize how inaccurate and simplistic his story is? Maybe somebody
originally hacked out the PBX number and gave it out, but once somebody
gets the number there's no need to hack. It's a contradiction in terms, and
ripping off a L-D company by carding just ain't hacking.  Repeat: THAT
AIN'T HACKING!

Where does this $1.8 million cost come from? I think he just multiplied 18
months by the $100,000 figure that an "Arizona Prosecutor" game him.  At
about a quarter a minute, it would take 9.25 kids dialing 24 hours a day, 7
days a week for 18 months to run up this figure.  Why didn't our
hard-hitting investigative reporter start asking some obvious questions
like either how can so much be done so long so often by so many or why
couldn't the DEA figure out something was wrong if there was so much use?
Dimes to donuts says the prosecutor he quoted was Gail Thakeray, always a
good source for exaggeration when it comes to hacker hysteria. Why didn't
he try to check out these figures?  What do they mean? I think carders are
scum, but I also think they are accused of trumped up charges. The disuse
doctrine might be debated, but using ld lines isn't quite the same thing as
stealing them. If the crime is so serious, why did it take 18 months to
find it out, and then only incidentally during the investigation of another
crime? Didn't our intrepid journalist think about asking these kinds of
questions?

The article is filled with quotes, stories, and comments by people who are
anti-hacker. This may be fine in a story attacking hackers. But since the
suspects don't seem to be hackers, and since the quotes are so one-sided,
it seems like another hatchet job. If he has ins with all these
unidentified hackers he mentions, you'd think he could at least try to
either get his facts straight and present another side.

If Joe had asked me, I'd say yeh, I'm a hacker, and so are my friends, and
we, and people like us, don't rip off. You may like us or not, disagree
with what we do or not, but most of us draw a line at that kind of ripoff
and the line's not ambiguous. It's clear--carding is wrong and using a pbx
isn't what hacking's all about. But from Joe's slanted article, you'd think
that we're the world's greatest menace.

Finally, he says that some of his info came from people identifying
themselves as hackers in late night conference calls.  Did these people
trust Joe not to say anything they revealed to him? Why doesn't he tell us
about his other sources of info and who initiated the calls?

Most of us are still pissed about his stories about porn and the nets which
were yellow journalism that sells papers and gets attention. It's great
that the cud editors print all sides so let's see if they print this.

                      *******************************

{Moderators note: We have not read the earlier stories to which this author
alludes. As to why we printed the story, we encourage Joe to send his
CU-related stories to us, and he sent that at our request. Whatever
political or ideological differences may exist, in phone conversations and
e-mail we have, without exception, found Joe to be decent and helpful.  We
learn by discussing issues, and we strongly encourage people to respond
with substantive critiques. The term "hacker" is something worth debating,
because, according to many of the indictments we have read, hacking is
defined a priori as a criminal act.  As a consequence, if one claims to be
a hacker, this claim could conceivably be used as evidence in a trial.
After all, if explaining Kermit is evidence of collusion, as it was to
justify the raid on Steve Jackson Games, debates over what constitutes a
hacker are not trivial -- moderators}.

********************************************************************

------------------------------

                           **END OF CuD #2.14**
********************************************************************