Computer underground Digest    Wed  Jan 16, 1996   Volume 8 : Issue 05
                          ISSN  1004-042X

      Editors: Jim Thomas and Gordon Meyer ([email protected]
      Archivist: Brendan Kehoe
      Shadow Master: Stanton McCandlish
      Field Agent Extraordinaire:   David Smith
      Shadow-Archivists: Dan Carosone / Paul Southworth
                         Ralph Sims / Jyrki Kuoppala
                         Ian Dickinson
      Cu Digest Homepage: http://www.soci.niu.edu/~cudigest

CONTENTS, #8.05 (Wed, Jan 16, 1996)

File 1--Cryptography and Privacy
File 2--Justice Dept. press release: no PGP prosecution (fwd)
File 3--FLASH: Phil Zimmermann case dropped!
File 4--      CompuServe poetry
File 5--Compuserve: "Shooting the Cyber-Messenger"
File 6--Letter to Wiesenthal Cente in re "hate speech" ban
File 7--News Release >> Child Safe Ratings on the Internet (fwd)
File 8--AP/NYT: Jewish Groups Call for Internet Censorship
File 9--Cu Digest Header Info (unchanged since 16 Dec, 1995)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

---------------------------------------------------------------------

Date: Wed, 27 Dec 1995 15:00:46 -0600
From: Zachariah P. Babayco <address@missing>
Subject: File 1--Cryptography and Privacy

((MODERATORS' NOTE: Mr. Babayco's was accidentally deleted from
the forward. We apologize for the error. Although
Phil Zimmerman no longer faces charges (see below), the following
article provides a helpful background for those who've forgotten
the central issues in cryptology controversy)).

This work is Copyright (C) Zachariah P. Babayco 1995.

Cryptography and Privacy

During the past few years, the debate concerning electronic privacy
has intensified greatly.  As more and more information is being
transmitted over electronic channels such as the Internet, the
chances of interception become greater and greater.  The main defense
against this is the use of computer encryption products, which
scramble the contents of a document so that only certain people can
read it.  A popular encryption program is Pretty Good Privacy, or
P.G.P.  Phillip Zimmermann, the creator of P.G.P., is currently under
investigation by the government for exporting the program.
Zimmermann gave his program away because he believes that people have
the right to encryption, but government officials take the position
that encryption is all right, but only if the they can read the
private information if they need to.  As computers are used more and
more, electronic privacy will become extremely important.

Cryptography is the science of creating codes that enable you and
another person to communicate privately.  It uses special
mathematical formulas, called keys, that enable two or more people to
communicate privately.  The science of cryptography dates back to the
time of Julius Caesar, who used a simple substitution method (letting
the letter A equal C, B equal to D, and so on) to send messages to
his generals in the field (Schwartau, 149).  A more recent example of
the use of cryptography is in World War Two, where both the Allied
and the Axis forces employed codes to keep their secrets safe from
the other side.

There are numerous types of encryption methods, ranging from the
simple substitution mentioned above, to complex mathematical formulas
which would take supercomputers years to decode, but only two that
concern this debate.

The first widely used encryption system was the Data Encryption
Standard, or DES.  DES was created in the late 1970's, due to a
growing concern over the security of electronic fund transfers and
the confidentiality of government files (Encyclopedia Britannica).
However, it is now showing its age and vulnerability.  DES is a
single key encryption system, where a single code key is used to
encrypt a message.  This means that whoever has a copy of the key can
decrypt the message, so the legitimate users must take care not to
let the key fall into the wrong hands.  The only safe way to exchange
a key between two people is to use a secure channel, such as a secure
phone line, but as Phillip Zimmermann states, "If you have a secure
channel for exchanging keys, then why do you need cryptography in the
first place" (P.G.P. User's Guide)?  DES is also vulnerable to
advances in technology, as Winn Schwartau states in his book
Information Warfare: Chaos on the Electronic Superhighway:

(the following is an indented quote)

In fact, the battle may be over now, because DES is breakable.  At the
March 1993 Data Security Conference, Dr. Martin Hellman presented a
theoretical approach to cracking DES . . . .On August 20, 1993,
Michael Wiener of Bell-Northern Research in Canada published a paper
"showing how to build an exhaustive DES key search machine for $1
million that can find a key in 3.5 hours on average."  (152)

(the quote ends here)

The second type, public key cryptography systems such as P.G.P., work
differently than DES.  With P.G.P., a person has two keys: a public
key and a private key.  The private key is kept on the person's home
computer, while the public key can be given to whomever the person
pleases.  To send a private message to a friend with P.G.P., for
example, the sender would encrypt the message with his friend's
public key.  The message is now unreadable except to his friend
because only she has the corresponding private key (P.G.P. User's
Guide).

P.G.P. is a relatively new computer program, designed to provide
privacy for its users.  It works on the same principle that public
key systems use, but has many more features.  For example, a user can
select the amount of security that P.G.P. provides - a small key is
faster, but less secure; a large key provides the best security, but
is slower.  A user can also sign a message with his own secret key,
making it impossible for someone to change the message.

P.G.P. has had a short but eventful history.  On April 16, 1993,
Phillip Zimmermann, the creator of P.G.P., was preparing to release
the initial version of P.G.P. when the government announced its own
cryptographic product, the Clipper Chip.  The Clipper Chip is also
based on the public key system, but unlike P.G.P., it requires a copy
of each secret key to be held in escrow, for use by law enforcement
agents if they could demonstrate a need for it.  Zimmermann completed
P.G.P. and released it, hoping that it would be seen as a better
alternative to Clipper.  Within a short time however, somebody
uploaded a copy of the program to the Internet, where it spread
across the country, and around the world.  Not too long after that,
Zimmermann was visited by federal agents who informed him that he was
now under investigation for "illegal export of munitions." (Holmes
56a).  As of November 1995, Zimmermann is waiting  for a decision.
If he is indicted, he would have to serve a mandatory four to five
year prison sen tence, and be fined $1 million.

To the federal investigators, P.G.P. is seen as a violation of United
States export law.  The law, which was passed during the Cold War in
the early 1950's, classified strong encryption products as munitions,
like a bomb or an air-to-air missile, and placed heavy restrictions
on their export.  The law is still in place 40 years later, even
though the Soviet Union is no longer a threat to our national
security.  When somebody made P.G.P. available on the Internet, the
program was seen as a violation of this law (Holmes 56a).

Federal officials are also concerned about P.G.P. because of its
strength.  While designing the program, Zimmermann decided to use an
encryption algorithm called IDEA.  Cryptographers have repeatedly
tested the IDEA algorithm for years, and have found it, for the
present, unbreakable (P.G.P. User's Guide).  Law enforcement
officials are concerned that if powerful cryptography is made widely
available, criminals will take advantage of it.  FBI assistant
director James Kallstrom states that "We're in the business of
criminal information . .  . if we're closed off from that
information, it will alter the balance between us and the criminals."
(Levy 55).

When the Clinton administration announced the Clipper Chip, one of
their main points was that since encryption could be used by
criminals, people and businesses should use Clipper because law
enforcement agents would be able to listen in on the conversations if
they suspected a crime was being committed.  However, due to
manufacturing problems with the chips themselves, lack of interest in
the marketplace, and protest from over 40,000 Internet users (Levy
56), the proposal was withdrawn.

The Clipper Chip is not the only governmental proposition concerning
privacy.  In 1991, several years before the Clipper proposal, the
Senate Judiciary Committee considered attaching the following onto
Bill 266, an anti-crime bill:

(the following is an indented quote)

It is in the sense of Congress that providers of electronic
communications services and manufacturers of electronic
communications service equipment shall ensure that communications
systems permit the government to obtain the plain-text contents of
voice, data, and other communications when appropriately authorized
by law.  (Schwartau 153-154).

(the quote ends here)

The Committee had apparently anticipated the arrival of the Clipper
Chip, and attempted to make sure that future products would be able
to use it immediately.  Before the modified bill could me made into
law though, the addition was removed because of protest by several
civil liberty groups.

Government officials also cite recent arrests that, in their eyes,
justify the need for restrictions on strong cryptography.  In
September 1995, several people were arrested on America OnLine, an
Internet provider.  The people had been under investigation for
several years and were suspected to be exchanging pornographic files
through the service.  When they were arrested and had their
belongings searched, FBI agents found encrypted files on their
computers.  In a speech before the International Cryptography
Institute on September 21, 1995, FBI Director Louis Freeh stated that
". . .  We've seen this problem . . . the obstacle of encrypted
records standing in the way of our lawful grand jury access
procedures . . . ".  Freeh also states that he is not suggesting that
the government regulate cryptography, but simply be able to serve
search warrants and court orders as they always have: "If we are
foreclosed from these areas . . . the safety of this country will be
impaired"  (Freeh 9/21/95)

At the other end of the spectrum are the pro-privacy and civil liberty
groups.  Some of these groups argue against governmental restrictions
on cryptography by citing the First Amendment, the right to free
speech, or the Fourth Amendment, the right to privacy.  One
organization, the Electronic Frontier Foundation, takes a legal
approach to the issue.  The EFF's goal is ". . . to ensure that the
principles embodied in the Constitution and Bill of Rights are
protected as new communications technologies emerge." (EFF World Wide
Web Homepage)  The EFF investigates civil rights cases involving
computers, and argues against the cryptography issues and
restrictions.  The EFF was one of the main protestors that caused the
Clipper Chip proposal to fail.  Recently, the EFF has set up a
defense fund for Phillip Zimmermann, and will soon be taking the
federal government to court to argue against the export laws.

For the present, the debate over encryption and privacy is going
favorably for the activist's side.  The Clipper proposal has been
withdrawn, and the government is not planning to introduce another
product anytime soon.  However, Phillip Zimmermann could still go to
jail, and the FBI is pushing for the ability to tap one out of every
100 telephone lines in every major American city.  This debate is not
over yet.


Works Cited


Andrews, Edmund L.  "U.S. Plans to Push Giving F.B.I. Access in
Computer        Codes."  New York Times (Late New York Edition) 5 February
1994: 1+.

Arthur, Charles.  "Identity Crisis on the Internet."  New Scientist 11
March   1995: 14-15.

"Cryptology."  Encyclopedia Britannica.  1987 ed.

"EFF to Defend Crypto Rights Legally."  Electronic Frontier Foundation
Home Page.  October 1995: http://www.eff.org/

Freeh, Louis.  "Speech Before The International Cryptography
Institute." Federal Bureau of Investigation World Wide Web Site. 21
September 1995:  http://www.fbi.gov/crypto.htm

Grossman, Wendy.  "Internet Encryption Ban Violates Free Speech."  New
       Scientist 15 April 1995: 22.

Holmes, Stanley.  "A Question of Privacy."  Rocky Mountain News 10
June 1995:  56a.

Levy, Steven.  "The Encryption Wars: Is Privacy Good or Bad?".
Newsweek 24 April 1995: 55-6.

Lewis, Peter H.  "Software Author Focus of U.S. Inquiry."  The New
York Times (Late New York Edition) 10 April 1995: D6.

---, "Between a Hacker And a Hard Place."  The New York Times (Late
New York        Edition) 10 April 1995: D1.

"Privacy, Business, and the Internet."  The New York Times (Late New
York    Edition 23 April 1995: 16.

Quittner, Joshua.  "Unmasked on the Net."  Time 6 March 1995: 72-73.

Schwartau, Winn.  Information Warfare: Chaos on the Information
Superhighway.  New York: Thunder's Mouth Press, 1994.

Sussman, Vic S.  "Lost in Kafka Territory."  U.S. News & World Report
3 April 1995: 32-3.

Wayner, Peter.  "Picking the Crypto Locks." Byte Oct. 1995: 77-80.

Zimmermann, Phillip.  PGP User's Guide. MIT: MIT Press, 1994.

------------------------------

Date: Thu, 11 Jan 1996 22:56:57 -0600 (CST)
From: David Smith <[email protected]>
Subject: File 2--Justice Dept. press release: no PGP prosecution (fwd)

                       San Jose Office                   (408) 535-5061
                       280 South First Street, Suite 371
                       San Jose, California 95113       FAX: (408) 535-5066


                           PRESS RELEASE


FOR IMMEDIATE RELEASE
January 11, 1995



       Michael J. Yamaguchi, United States Attorney for the

Norther District of California, announced today that his office

has declined prosectution of any individuals in connection with

the posting to USENET in June 1991 of the encryption program

known as "Pretty Good Privacy."  The investigation has been

closed.  No further comment will be made by the U.S. Attorney's

office on the reasons for declination.

       Assistant U.S. Attorney William P. Keane of the U.S.

Attorney's Office in San Jose at (408) 535-5053 oversaw the

government's investigation of the case.

------------------------------

Date: Thu, 11 Jan 1996 14:36:09 -0800 (PST)
From: Declan McCullagh <[email protected]>
Subject: File 3--FLASH: Phil Zimmermann case dropped!

This is FABULOUS news! Please distribute widely!

-Declan


// [email protected] // My opinions are not in any way those of the EFF //


Subject--Zimmermann case is dropped.
Date--Mon, 8 Jan 1996 03:35:46 -0700 (MST)
From--Philip Zimmermann <[email protected]>

-----BEGIN PGP SIGNED MESSAGE-----

My lead defense lawyer, Phil Dubois, received a fax this morning from
the Assistant US Attorney in Northern District of California, William
Keane.  The letter informed us that I "will not be prosecuted in connection
with the posting to USENET in June 1991 of the encryption program
Pretty Good Privacy.  The investigation is closed."

This brings to a close a criminal investigation that has spanned the
last three years.  I'd like to thank all the people who helped us in
this case, especially all the donors to my legal defense fund.  Apparently,
the money was well-spent.  And I'd like to thank my very capable defense
team:  Phil Dubois, Ken Bass, Eben Moglen, Curt Karnow, Tom Nolan, and Bob
Corn-Revere.  Most of the time they spent on the case was pro-bono.  I'd
also like to thank Joe Burton, counsel for the co-defendant.

There are many others I can thank, but I don't have the presence of mind
to list them all here at this moment.  The medium of email cannot express
how I feel about this turn of events.


 -Philip Zimmermann
  11 Jan 96

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBMPDy4WV5hLjHqWbdAQEqYwQAm+o313Cm2ebAsMiPIwmd1WwnkPXEaYe9
pGR5ja8BKSZQi4TAEQOQwQJaghI8QqZFdcctVYLm569I1/8ah0qyJ+4fOfUiAMda
Sa2nvJR7pnr6EXrUFe1QoSauCASP/QRYcKgB5vaaOOuxyXnQfdK39AqaKy8lPYbw
MfUiYaMREu4=
=9CJW
-----END PGP SIGNATURE-----

------------------------------

From: "David Gersic" <[email protected]>
Date:          Thu, 11 Jan 1996 23:27:22 CDT
Subject: File 4--      CompuServe poetry

 THOUGHTS

 THE THOUGHT POLICE ARE COMING
 THEY'RE COMING TO TAKE ME AWAY
 IT SEEMS THAT CONGRESS DOESN'T LIKE
 WHAT I HAD TO SAY

 THEY READ MY MAIL AND SCANNED MY FILES
 AND WATCHED WHERE I HAD BEEN
 THEY CRAWLED THE WEB AND PEERED WITHIN
 THEY SAID MY SPEECH WAS SIN

 IT ALL BEGAN WITH A SIMPLE REQUEST
 "DO YOU LIKE SEX AS MUCH AS I?'
 BIG BROTHER SMILED HIS KNOWING SMILE
 AND HE BEGAN TO SPY

 THEY KNEW MY EVERY THOUGHT
 THEY KNEW MY EVERY DESIRE
 IT SEEMS MY CRIME FROM THEIR POINT OF VIEW
 WAS SENDING IT OVER THE WIRE

 YOU CANNOT FIGHT A MONSTER
 THAT IS MORE POWERFUL THAN YOU
 SO EVEN IF YOU WANT TO
 DON'T ASK SOMEONE TO SCREW

 THE THOUGHT POLICE ARE COMING
 THEY'RE COMING TO TAKE ME AWAY
 THE THOUGHT POLICE ARE COMING
 THEY DIDN'T LIKE WHAT I HAD TO SAY


======================================================================
David Gersic                                       [email protected]
Do not believe in miracles; rely on them.


------------------------------

Date: Sun, 14 Jan 1996 15:20:50 -0500 (EST)
From: "Declan B. McCullagh" <[email protected]>
Subject: File 5--Compuserve: "Shooting the Cyber-Messenger"

This article has some interesting information on how Compuserve went far
beyond what was legally necessary. A German official says:

  He said the prosecutor, Manfred Wick, acting on his own volition is
  investigating pornography on the Net and during his investigation
  discussed the situation with CIS's management, whose offices are in
  Munich, but issued no threats, orders or warnings.

-Declan

----------------------------------------------------------------------------

From http://www.d-comm.com/

                        SHOOTING THE CYBER-MESSENGER

  Has the Internet really become so much a reality that it is where
  World War III will be fought? And has the world become so small that
  the main combatants will be the cybernauts of the US and the
  government of Germany? Well, if Rambo-types in the US have their way,
  that is exactly what may be happening and it all began as a Christmas
  Eve surprise. The first many of us heard of it was that night in the
  following message in alt.censorship from Phil Reed:

  "Effective this weekend (apparently Friday night), CompuServe (CIS)
  has apparently begun blocking access ... to 'indecent' newsgroups,
  including the alt.sex.* hierarchy, alt.binaries.pictures.erotica.*,
  and other groups such as alt.politics.homosexuality. The timing is
  obvious; by doing it late on Friday before a long holiday weekend,
  they hope to slow the uprise of outrage."

  As we were to learn within the next few day, CIS banned some 200
  newsgroups. Outrage against the company was immediate. A campaign to
  cancel accounts with the American company was begun. Theory had it,
  that CIS had caved in to the proposed Net censorship called for in the
  "Communications Decency Act" the US Congress looks ready to enact
  soon. However, a day or two later a press release from CIS appeared.
  It claimed, "The access to certain newsgroups was blocked by order of
  the German Government. They issued an ultimatum to block the
  newsgroups on THEIR list or get out of Germany."

  Within hours anti-German hatred was sprouting from all over the US as
  the Rambos came out from under their rocks. And within days (during
  which we learnt that the German authority referred to in CIS's
  statement was the Munich prosecutor), at least one such bigot was
  shouting, "This affair with the German (or Bavarian, as has been
  noted) government and CompuServe's immediate bowing to pressure cannot
  be tolerated. Protests should be lodged to *every* German-oriented
  newsgroup and web page you can find. If this goes unchallenged, we
  have lost the first battle in the coming war. Time now to pick up your
  guns and start fighting."

  While another shouted, "We will be leading an organised attack to take
  the city of Munich electronically next week -- mail-bombing by
  Americans is perfectly legal, and will be coordinated by the Viet-Nam
  veterans. If you have any good mail-bombs or viruses, drop me a note,
  and I will give you the anon address for the retired general who is
  doing this. It is all perfectly legal, and we are getting help from
  the Canadian and Australians. The AMERICAN REVOLUTION is NOW HERE!
  American ISPs against the Munich City Government! This is WAR! To
  protect the FatherLand and FREEDOM OF SPEECH!"

  Thomas Wulfing, a spokesman at the German Embassy, London, told
  d.Comm, "There have been no comments on the situation from the German
  national or the Bavarian governments. My latest information is that it
  was the Munich prosecutor who authorised this action. It's good that
  we clarify this thing. As far as I know the prosecutor has taken up
  that issue. He wants a way of banning the free access to pornography
  on the Internet and within that plan has informed CIS. And CIS as far
  as I know has agreed because it has no interest whatsoever in
  promoting pornography."

  He said the prosecutor, Manfred Wick, acting on his own volition is
  investigating pornography on the Net and during his investigation
  discussed the situation with CIS's management, whose offices are in
  Munich, but issued no threats, orders or warnings. Asked why Wick
  would be investigating porn on the Net considering Germany's more
  relaxed attitude towards sexually explicit material, Wulfing noted,
  "The limit in Germany is the age and of course the promotion of
  violence of child pornography. These types of things are strictly
  prohibited. The Age of Consent for sexual activities is 16, but to
  distribute that in print or film or whatever, it is 18."

  Asked about the threat of e-mail bombs and virus attacks from net nuts
  in the States, Wulfing told us, "I wasn't aware of these threats from
  the US. So I don't think the Munich or German authorities have taken
  action so far. Of course, if that story is going to be verified the
  German government takes it very seriously. Indeed it sounds very
  scary."

  So what's the real story? Just how did CIS, one of the world's largest
  Internet service providers come to ban 200 newsgroups? Detlef
  Borchers, a reporter in Germany, says according to a 22 November 1995
  press release from the Munich Police Department, "the police were at
  the CompuServe office and they found material for further
  investigations. This is more than just Usegroups. It could be
  considerably more; some sources are claiming that a CompuServe
  employee was posting child porn."

  According to Borchers, CIS issued a statement the next day, 23
  November. He says, "The relevant passage is the first: 'CompuServe and
  the police discussed and found a solution'. No legal action threat is
  mentioned in this statement. The solution was 'cleaning' the
  Newsgroups. Unfortunately, this worked only on one of the seven
  newsgroups servers CompuServe has -- the one which is serving the
  CIM-Software."

  Borchers adds that in the interim, "the German CompuServe management
  resigned. The new manager is supposed to be Mitch Wolfsson, now
  European Manager of MSN, who is not too eager to comment."

  So who's to be believed? The Munich and German authorities who claim
  to have only informed CIS that it was investigating kiddieporn on the
  Net, or CIS? It's difficult to know yet, but one does have to wonder.
  If CIS was told Mr Wick was investigating child pornography, why did
  it ban such newsgroups as alt.binaries.erotic.senior-citizens,
  alt.binaries.pictures.erotica.pregnant, alt.recovery.addiction.sexual
  and alt.recovery.sexual-addiction (both therapy groups),
  alt.sex.fetish.wrestling, alt.sex.reptiles, alt.sexy.bald.captains
  (about Star Trek's Capt Pecard), among many others which appear
  unlikely to deal in kiddieporn?

  The implications of CompuServe's capitulation go far beyond the
  boundaries of Germany's jurisdiction. The Internet is an ever changing
  medium with new sites and newsgroups appearing all the time. A service
  provider cannot guarantee that it has successfully denied access to
  all illegal sites. It may have identified all of these sites an hour
  ago, and successfully banned access to them, but since then, several
  may have moved locations while ten new sites may have been placed on
  the Web.

  The problem is worse still: what exactly must the service providers
  restrict access to? What about pornographic sites that should not be
  accessed by minors -- already highlighted by the German authorities as
  an important issue.? There is no way of knowing whether the user of
  the service is fifty or five years of age. The nett result: ban all
  access to pornographic material.

  If this approach were to be taken by the service providers, what would
  be the reaction of magazines such as Playboy and Penthouse, both of
  which have Web sites? The publishing houses would probably attempt to
  get a court order forcing service providers to allow access to their
  sites (except in a few notable countries where the magazines are still
  considered illegal).

  For the service provider, the whole process of providing access is
  becoming far too complex. The service provider is simply the
  messenger, not the provider of content, and as such there is no reason
  why the messenger should be shot.

------------------------------

Date: Fri, 12 Jan 96 22:15:33 PST
From: [email protected]
Subject: File 6--Letter to Wiesenthal Cente in re "hate speech" ban

This is the text of a letter I sent to the Wiesenthal center in response
to their letter to Internet service providers, asking them to
ban hate speech.


I believe that the Center's letter to 2,000 Internet service providers
(ISP's),
as reported in yesterday's New York Times, represents an unfortunate
choice by the Center to engage in activities harmful to free speech
in this country.

I am a Jewish businessman and attorney, resident in New York City. Since
January 1995, I have used my leisure time to create and operate a Web
site called The Ethical Spectacle (http://www.spectacle.org)
which covers the intersection
(or collision) of ethics, law and politics in our society.
In June 1995, I published "An Auschwitz Alphabet"
(http://www.spectacle.org/695/ausch.html) as a special issue
of the Spectacle. It is a collection of resources and essays
pertaining to Auschwitz, including quotations from Primo Levi,
Elie Wiesel, Hannah Arendt and Tadeusz Borowski, photographs,
a portion of the Passover service, and my own essay, "What I
Learned From Auschwitz." In the months since then, I have
received mail from several hundred people in the US, Sweden,
England, Belgium, Australia, New Zealand and Canada, thanking
me for the "Alphabet", reminiscing about family members who
were victims of the Holocaust, and generally proving the
potency of the Internet as a force for education and freedom.

I am not in agreement with your request to ISP's to censor
hate speech on their systems. Any censorship of speech
ultimately boomerangs to injure good speech, and one
of the tenets of what I call the "free speech rulebook" is that
no-one--not the government, not Netcom, not the Wiesenthal
Center--is godlike enough to decide for other people what speech
may be heard. A few years ago, the Canadian Supreme Court
accepted Professor Catharine MacKinnon's arguments that
pornography not merely encourages, but IS, the oppression of
women. I believe MacKinnon is correct in principle (as I
very much believe the Wiesenthal Center is correct in principle)
but look at the application: Canadian Customs now enforces the
law selectively to ban gay speech and the angry feminist writings
of MacKinnon colleague Andrea Dworkin, while the pornography
business continues on as before.

I understand that the First Amendment only protects speech against
government action. Rabbi Hier's speeches, and  his testimony to the
Senate on the bomb recipe bill, contain at least pro forma
recognition that the First Amendment protects hate speech. But
by calling on ISP's to band together to ban hate, you are asking
them to constitute themselves a private government. The First
Amendment no longer means anything when private action ensures
that disfavored views cannot gain access to the means of
communication.

I make a distinction for access providers such as Compuserve,
Prodigy, and America Online. They are the electronic equivalent
of bookstores, as the Cubby v. Compuserve case established,
and have a right to decide what "books" to carry. But
ISP's such as Netcom and Interramp provide nothing more
than a wire to the Internet. The inevitable direction the
law must take, if we value free speech in this country, is
to treat these ISP's as common carriers. Contrary to your request
that they "edit" the speech they carry, it is imperative that
they have no right whatever to do so.

The development of telegraphy in this country provides a significant
precedent. Western Union abused its monopoly by refusing to carry
cables from reporters to their newspapers, seeing them as
competition for its own wire service business. The Congress
responded by declaring Western Union a common carrier,
forbidding it from determining which speech can be carried
over the wire.

If ISP's respond to your letter and get in the habit of shutting
off hate speech, history and human nature dictates that
this authority will later be used to ban speech about
feminism, abortion, radical politics or whatever else is the
"bete noir" of the moment. An ISP which has the right to
refuse to carry the Institute for Historical Review can exercise
that right just as easily to refuse the Wiesenthal Center access
to the Internet.

To paraphrase Count Talleyrand, your request to ISP's was not
only morally wrong, but also a mistake. Hate speech on the
Internet, though vile and distressing, is fragmented and in
plain sight, where it can be monitored and answered. Numerous
Internet sites, like yours, the Nizkor Project and the Ethical
Spectacle, exist to answer hate speech. If ISP's
comply with your request, one of two things will happen. Either
hate speech will go completely underground, becoming more mysterious,
attractive and powerful to its audience because forbidden. Or, what
is even more likely, hate groups will simply band together to create
their own ISP, providing all their foul ideas from one easily
accessible menu. You will then be in the position of having to
fall back to a call for government censorship.

Free speech is the cornerstone of liberty. The only security
lies in John Milton's stand, taken in The Aeropagitica,
his essay to Parliament about
the licensing of printing presses and books: "Prove all things,
hold fast that which is good."

   -----------------------------
Jonathan Blumen
The Ethical Spectacle
http://www.spectacle.org

------------------------------

Date: Thu, 11 Jan 1996 22:41:08 -0600 (CST)
From: Avi Bass <[email protected]>
Subject: File 7--News Release >> Child Safe Ratings on the Internet (fwd)

---------- Forwarded message ----------
Date--Thu, 11 Jan 1996 20:41:41 -0400
From--ted resnick <[email protected]>
Subject--News Release >> Child Safe Ratings on the Internet

THE MCKINLEY GROUP SAYS GREEN LIGHT MEANS GO

  New Green Light Icon to Appear on all Web Sites Not Containing
               Material Apparently Intended for Mature Audiences

SAUSALITO, CA (January 9, 1996) - In response to the increasing
concern over the accessibility of Internet sites containing offensive
or inappropriate content for the broader audience, The McKinley Group
announced today that it has positioned a Green Light icon to appear
next to descriptions of all the reviewed Web sites in its Magellan
Internet Directory <http://www.mckinley.com> that were free of
adult-only material at the time of review. Magellan is the first
Internet Directory to offer this "safe sites" screening feature.

"The Green Light category is a valuable extension of the unique rating
and evaluation system that has been developed by the McKinley Group,"
said Sandra Treacy, director of San Francisco School Volunteers.
"Given the unregulated nature of Internet content, this feature will
prove to be a widely used indicator for parents, teachers, children
and the average user."

In addition to the Green Light designation, Magellan gives users a
thorough review of individual Internet sites and rates them using a
unique system. Rated sites are awarded one to four stars for overall
quality, based on depth, organization, and 'net appeal' (is it
innovative, funny, hip, cool or thought-provoking).


Please bookmark The Magellan for future reference.  You can also find
a more in-depth account of our Green Light Sites at

http://www.mckinley.com/mckinley-txt/246.html#greenlight

Have a good one!
Ted Resnick

------------------------------

Date: Wed, 10 Jan 1996 07:33:47 -0800 (PST)
From: Declan McCullagh <[email protected]>
Subject: File 8--AP/NYT: Jewish Groups Call for Internet Censorship

Now that the cravens at Compuserve have acquiesced to one censorship
attempt, more will be forthcoming. Not a slippery slope as much as a
domino effect.

I'm amused that Mr. Giles from Compuserve has had a sudden change of heart.

-Declan

 -----------------------------------------------------------------

Jan 9 -- BOSTON (AP) -- White supremacist groups that once spread their
racist messages at rallies and in leaflets are now going high-tech
on the Internet -- a trend a leading Jewish human rights group wants
to stop.
       The Simon Weisenthal Center on Tuesday began sending hundreds of
letters to Internet access providers asking them to refuse to carry
messages that ``promote racism, anti-Semitism, mayhem and
violence.''...
       The Internet allows users to ``show the whole world what's wrong
about what the hate speakers are saying,'' said Mike Godwin, staff
counsel for the Electronic Frontier Foundation, a civil liberties
group dealing with computer communications.
       ``The correct place to try and put pressure is on the people who
create the content, not the person who provides access to it,''
said CompuServe spokesman William Giles.
       The roughly 250 hate groups in the United States, whose previous
methods reached a limited audience, now ``have a magnificent
marketing technology dumped in their laps,'' said Rabbi Abraham
Cooper, associate dean of the Weisenthal center, based in Los
Angeles. ``They are able to dress up their message in a way that
looks ... presentable.''...
       Prodigy spokesman Brian Ek said the service does employ systems
operators who monitor content on its proprietary bulletin boards
and can remove any messages with ``blatant expressions of bigotry,
racism or hate.''

 ---------------------------------------------------------------------

Forwarded from IP:

UNITED STATES 3 Wednesday, Jan. 10, 1996
Jewish Group Seeks Internet Restraints

Citing "the rapidly expanding presence of organized hate groups on the
Internet,'' a leading Jewish human rights group Tuesday began sending
letters to hundreds of Internet access providers and universities asking
them to refuse to carry messages that "promote racism, anti-Semitism,
may-hem and violence.'' The letter from the Simon Wiesenthal Center, a
425,000-member organization based in Los Angeles, is the latest in a
growing effort by legislators and private interest groups to censor
offensive material on the global data network, which now connects millions
of computer users worldwide. "Internet providers have a First Amendment
right and a moral obligation not to provide these groups with a platform
for their destructive propa-ganda, '' Rabbi Abraham Cooper, the center's
associate dean, wrote in the letter that was sent to Internet service
providers. Rabbi Cooper said the group's target was not the many discussion
forums where individuals debate such topics as whether the Holocaust
actually oc-curred, but rather the Internet's World Wide Web. Dozens of
groups, from white supremacists to anarchists, have pub-lished documents on
the Web about their points of view. Some are revi-sionist histories
questioning whether there was a Holocaust and some are racist tracts
denigrating blacks, Jews, homosexuals and other minorities. By PETER H.
LEWIS

------------------------------

Date: Sun, 16 Dec 1995 22:51:01 CDT
From: CuD Moderators <[email protected]>
Subject: File 9--Cu Digest Header Info (unchanged since 16 Dec, 1995)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send post with this in the "Subject:: line:

    SUBSCRIBE CU-DIGEST
Send the message to:   [email protected]

DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.

The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at:  Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

To UNSUB, send a one-line message:   UNSUB CU-DIGEST
Send it to  [email protected]
(NOTE: The address you unsub must correspond to your From: line)

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on  internet);
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

EUROPE:  In BELGIUM: Virtual Access BBS:  +32-69-844-019 (ringdown)
        Brussels: STRATOMIC BBS +32-2-5383119 2:291/[email protected]
        In ITALY: ZERO! BBS: +39-11-6507540
        In LUXEMBOURG: ComNet BBS:  +352-466893

 UNITED STATES:  etext.archive.umich.edu (192.131.22.8)  in /pub/CuD/
                 ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
                 aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
                 world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
                 wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
 EUROPE:         nic.funet.fi in pub/doc/cud/ (Finland)
                 ftp.warwick.ac.uk in pub/cud/ (United Kingdom)


The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
 URL: http://www.soci.niu.edu/~cudigest/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.  CuD material may  be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission.  It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified.  Readers are encouraged to submit reasoned articles
relating to computer culture and communication.  Articles are
preferred to short responses.  Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
           the views of the moderators. Digest contributors assume all
           responsibility for ensuring that articles submitted do not
           violate copyright protections.

------------------------------

End of Computer Underground Digest #8.05
************************************