Computer underground Digest    Tue  Nov 4, 1997   Volume 9 : Issue 80
                          ISSN  1004-042X

      Editor: Jim Thomas ([email protected])
      News Editor: Gordon Meyer ([email protected])
      Archivist: Brendan Kehoe
      Shadow Master: Stanton McCandlish
      Shadow-Archivists: Dan Carosone / Paul Southworth
                         Ralph Sims / Jyrki Kuoppala
                         Ian Dickinson
      Field Agent Extraordinaire:   David Smith
      Cu Digest Homepage: http://www.soci.niu.edu/~cudigest

CONTENTS, #9.80 (Tue, Nov 4, 1997)

File 1--WILL "HATE SPEECH" BECOME 5th HORSEMAN OF THE  APOCALYPSE?
File 2--Cu Digest Header Info (unchanged since 7 May, 1997)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

---------------------------------------------------------------------

Date: Tue, 28 Oct 1997 23:58:55 -0500
From: Paul Kneisel <[email protected]>
Subject: File 1--WILL "HATE SPEECH" BECOME 5th HORSEMAN OF THE  APOCALYPSE?

  WILL "HATE SPEECH" BECOME FIFTH HORSEMAN OF THE APOCALYPSE?
                    The Tired Four Horsemen

by tallpaul

    ROPER: So now you'd give the Devil benefit of law!

    MORE: Yes. What would you do? Cut a great road through the law to get
after the Devil?

    ROPER: I'd cut down every law in England to do that!

    MORE: Oh? And when the last law was down, and the Devil turned round
on you--where would you hide, Roper, the laws all being flat? This
country's planted thick with laws from coast to coast--man's laws, not
God's--and if you cut them down--and you're just the man to do it--d'you
really think you could stand upright in the winds that would blow then?
Yes, I'd give the Devil benefit of law, for my own safety's sake.

    --Robert Bolt   "A Man For All Seasons"

You haven't heard much from the Four Horsemen of the Apocalypse recently.
The dreaded "hackers, terrorists, drug dealers and kiddie pornographers" of
cyberspace who once caused Presidents and Prime Ministers to tremble and
mothers to herd their children into their beds at sundown have been
strangely quiet, if only measured by the absence of significant media
reports to the contrary. Perhaps in these modern times the wages of sin are
no longer death but just a really tired feeling, as comedienne Paula
Poundstone comments.

Yet the Four Horsemen once caused millions people off-the-net to call for
all manner of controls on the Global Information Superhighway.

Part I: The Tired Four Horsemen

Concerned parents "cruising the net" to see what their children were
exposed to found little evidence of drug dealing. There is a lot of spam
for $50,000 a week pyramid schemes, but little advertising at web sites for
Jack's House'O'Crack, Crack Attack, or Crack'n'Smack.

Where are the "terrorists" on the Internet against whom we need increased
government powers? (I use the term here as the government uses it, not as
anti-hate or civil-libertarian forces might.)

Even the most anti-Islamic forces do not charge that we can find web pages
from "Crazy Abdul's" where you can buy AK-47 assault rifles and C4 plastic
explosive at "prices so low they're INSANE!"

The very phrase "terrorist" has a considerable political bias that makes
the whole notion of supporting a cop crackdown on "hate crimes" exceedingly
problematical. Black churches burn up in the South, abortion clinics blow
up, and members of right-wing and fundamentalist Christian militias are
convicted of crimes ranging from multiple murders down the list of lesser
felonies. But not a single such right-wing individual is identified on the
FBI's current "Ten Most Wanted" list.[1]

Chillingly, *the* "major investigation" for today's FBI does not involve
any of the bank robberies or murders for which right-wing hate-based forces
are suspected.[2] It involves cemetery desecrations. It's easy to imagine
that the investigation centers on those who spray paint swastikas and Nazi
slogans in Jewish cemeteries since we read so many stories about this in
the daily papers. But the imagination is wrong. Rather the *top-listed*
investigation is of inferentially anti-hate activists for ostensibly
desecrating cemeteries with the phrase ""H[awaii] P[olice] D[epartment]
ignores hate crimes. Ignore this."[3]

Nor is the international scene better. The State Department just released
its own list of "international terrorist organizations."[4] Only three of
the 31 organizations have a recognizable right-wing orientation. These are
the archly anti-Semitic Aum Shinrikyo (AUM) cult in Japan and the two
right-wing-Zionist groups Kach and Kahane Chai. Not surprisingly, the State
Department was unable to find a single military-based death squad or
neo-fascist group in the world to which it was willing to pin the
"terrorist" designation. Nor, with the exception of those groups ostensibly
based in Islam or AUM, is there a single recognizably-named political (as
opposed to religious) anti-Semitic organization listed.

"Kiddie porn" got a small boost in the past week or so when international
police consortiums charged several people with trafficking and even got a
conviction of one person in the U.S.[5] Even the power of a conviction to
motivate people was offset by several factors. The first was that it
occurred under existing laws and conditions without any special need for
changes. The second was that the man convicted was already in prison when
he used a prison-based computer to commit the new crime for which he was
convicted, showing that convictions do not forever prevent the crime from
occurring. The third was the release of Methodist minister Rev. Nathaniel
T. Grady after serving ten years for rape, sodomy, and sexual abuse of six
children between three and five years old.[6] An appeals court ruled that
Rev. Grady was falsely convicted in one of the sexual hysterias sweeping
the country.

The hysteria around "kiddie porn" on the net has its own prehistory
beginning over a decade ago with the "missing children" scare that led to a
significant increase in photos appearing on milk cartons. It then moved to
the "Satanic molestations" at day care centers and "recovered memory
therapy" that virtually guaranteed that you, too, could discover that you
were a victim of childhood sexual molestation. The hysteria culminated with
J. Quitter's article in _TIME_ magazine about an ostensible study of
"kiddie porn" on the net via Marty Rimm and Carnegie Mellon University.[7]

The cooler heads discovered that most missing children were only missing to
one parent. The other parent, involved in a messy divorce, has snatched the
child. The Satanic scare, reflected in cases like McMartin in California
and Michaels in New Jersey, started to break down. Incredibly expensive
trials led either to no convictions or convictions reversed on appeal as
saner courts examined the ostensible evidence and saw none to examine.
"Recovered memories" of sexual abuse cracked when therapists specializing
in such ostensible therapy started losing big lawsuits to the innocent
people they targeted as molesters. The Rimm study on the Internet soon came
under enormous criticism.[7]

Of course, all of the Four Horsemen (along with every other group in the
world) are on the net. This includes "kiddie pornographers" or at least
those accused of it. It is easy argue that even one convicted "kiddie porn"
trafficker is one too many. The same can be said of cannibals like Jeffrey
Dahmer. But does it justify the creation of a Kitchen Decency Act where
warrentless searches are permitted for fear that we will have Hannibal
Lecter as a dinner guest?

The use of the Horseman to motivate a crackdown on civil liberties becomes
even more problematical as people discover that the arguments are used to
bolster a different politic. "Many of these companies are using the
public's discomfort with new technologies and the hysteria of easy access
to pornography on the Internet to further an anti-gay agenda," said Loren
Javier, GLAAD's Interactive Media Director.[8]

Even the infamous "hacker menace" has lost its ability to motivate attacks
on the U.S. Bill of Rights.

Part of this is due to increased public knowledge of computers and systems.
Press coverage of _2600_ magazine's recent beyondHOPE hacker convention in
New York City tended to be free from the hysteria that has marked such
coverage in the past.[9]

Another reason why the Four Horsemen lack motivational power for the
crackdown is that the dire predictions made for the past 30 years have not
come true. Leon Festinger, in his book _When Prophecy Fails_, showed how
failed predictions often lead those who made them to cling to, rather
abandon, the prediction. But such actions only pertain to those actually
making the predictions, not the bulk of the citizenry who only heard the
prediction made. Hackerdom has produced events like the Internet worm a few
years ago but even this was not the disaster that the control-pundits
warned about. Despite the horrible predictions, the average citizen has
spent thirty years since Captain Crunch and the original phone phreaks
waiting for the *first* massively destructive shoe to drop.

No, these Horseman have not produced the Apocalypse from which forces
hostile to the U.S. Bill of Rights want to protect us.

The issue of quality encryption and anonymous remailers has also run into
difficulties as a mass motivator for additional government control of
cyberspace.

When export controls on PGP were in place, the labyrinthine procedures
necessary to get a copy were likely beyond the capability of most new
users. Learning to use it was even more daunting, although considerably
assisted by new books like those from O'Reilly and Associates.[10]

Anonymous remailer systems introduce yet another level of complexity. By
the end of the process, Steve Harris, the author of the "John Doe"
front-end software for PGP and remailers, once estimated that only 500
people in the world were sophisticated enough to use the whole system.[11]
This represents quite a comedown for a society reared on the dreaded "Red
Menace" from the former Soviet Union or the hysteria of a millennia-old
Satanic conspiracy sacrificing 50,000 children a year just in the U.S.

The mere existence of highly secure encryption systems that potential
criminals *might* use does not in itself create a global problem. Andy
Oram, an editor at O'Reilly & Associates and the moderator of the
discussion list for Computer Professionals for Social Responsibility,
points out that commercial needs can severely limit the use of technology
of anonymity. "Repressive forces have constantly argued that they need to
control encryption and anonymous remailers in order to attack pornography.
But the vast majority of distributors of pornography can't hide themselves,
because they want payment. They have to advertise their presence! They're
the last people to hide behind encryption and anonymity."

Nor are the remailer systems all that secure against actions using existing
laws and technologies (whether overt or covert.)

<penit.fi> in Finland, the oldest of the systems, shut down after the owner
received a subpoena to deliver the name of a user. The others, as standard
computer systems, are as vulnerable to individual attack as any other
individual system.

We saw a federal armored combat vehicle gradually demolish the fortified
headquarters of the Branch Davidian compound in Waco, Texas. Is the notion
of a cyber-siege so outlandish then, where government computer systems
would launch simultaneous SYNC attacks against a rogue remailer system if
the same government deemed it was actively being used by terrorists? The
recent attack by forces supporting the anti-Basque policies of the Spanish
government on the Institute For Global Communications (IGC) site indicates
"no."

Of course the anonymous remailers themselves are not anonymous. The owners
and administrators are subject to the same system of social defense (or
political attack) as all other individuals in society. A simple court
injunction would likely shut them down or result in the arrest on contempt
charges of any administrator who disobeyed.

Any of the Four Horsemen can be used to whip up a short-term concern. Such
hysterias are not difficult to create. Social psychologists can track the
movement of local versions of mass hysteria across geographic areas as if
they were weather fronts.

A gruesome child kidnapping and murder can capture headlines until a Royal
Celebrity dies. Bombing a public building calls for changes in laws until
that story is swept away by news of a large drug raid, only to have that
replaced by a tale of young hackers "reprogramming the orbits of space
satellites."

Even the well-known mass hysterias of the past were so often simply local
upsurges that burned out in one area and then moved on to the next.
Outbursts of the European Witch Craze might last for decades in different
countries but took the form of waves of short-term hysteria sweeping
through villages and counties. The Salem Witch Trials, probably the best
known hysteria in the U.S., was obviously limited to the Salem area. Less
well known is that by 1692 the major Salem jury, led by its foreman Thomas
Fisk, had recovered and shame-faced, issued a written apology for their
actions to their victims (or to the community and those victims still
alive.)[12] In the language of today's Internet, the hanging jury confessed
they were a group of "clueless newbies."

None of the short-term "god ain't it horrible" stories about the net serve
to create the type of mass sustained public concern necessary to rewrite or
reinterpret citizen rights to give governments sweeping new powers to
"protect" citizens.

Government claims to protect citizens' privacy with new anti-encryption
proposals are, at best, little more than the pious wishes of bureaucrats.
This was clearly seen last month when a hacker group intercepted and
published pager communications by White House functionaries.

"We are publicizing this flaw in the hopes that it will finally be fixed,"
said Pamela Finkel, one of the organizers of the Hackers On Planet Earth
(HOPE) conference and a lead spokesperson for the group. "It's an excellent
example of why we need encryption to protect sensitive information.

"I hope that this demonstration causes encryption to be added to the pager
network," Finkel added. "This incident shows that the President's policy on
encryption is so poorly crafted that it could have even compromised his own
personal security."[13]

The totality of pro-regulation arguments around the Four Horseman take on a
separate four related characteristics. "First, the occasional conviction we
get shows that criminal behavior is epidemic on the net. Second, without
new laws we cannot get convictions. Third, encryption prevents us from
getting convictions but the new encryption rules we propose will let us
protect your privacy. Fourth, we cannot protect our own."

Only the Tooth Fairy lets you have all four at the same price.

This does not stop the forces opposed to civil liberties from pushing for
new laws with new arguments.

It does, however, make their past efforts increasingly problematical for
them, with a character somewhere between the Orwellian and the humorous.

One central problem -- given the existence of telephones and computers --is
the *relative* unimportance of the Internet. The two pre-Internet
technologies make the Internet little more that a set of protocols
concerning data. One set, like TCP/IP, determines how data is transmitted
over the phones via computer. The other, like the World Wide Web and the
Usenet news groups, determines how pre-existing data is stored. The
Internet could disappear tomorrow while phones plus computers would permit
all of the Horseman to continue their ostensible gallop, either via direct
modem-to-modem connections or via non-Internet private bulletin board systems.

A more Orwellian view was recently expressed by Alan McDonald, "a senior
executive with the FBI," who said "that 'extremist' positions on electronic
encryption are a threat to normal law enforcement and are elitist and
nondemocratic. Insisting that the United States had remained true to the
Constitution and to a system of ordered liberties, McDonald says: 'When
people don't know much about electronic surveillance, they are fearful of
it. But when they know Congress passed laws and the Supreme Court reviewed
them and that there are numerous constraints and procedures, then it makes
sense to them. It seems rational and balanced'."[14]

Perhaps the greatest sense of Orwellian doublethink from FBI pundits here
is over the notion of judicial review. The courts have indeed reviewed
cases brought before it by McDonald's "privacy extremists" and struck down
the laws. The Zimmerman case involving the export of PGP encryption
technology was dropped. The Communications Decency Act was declared
unconstitutional. Recent state attempts to control the Internet by New York
and Georgia have similarly been struck down.[15]

Measured even from the standpoint of the U.S. judiciary, the positions the
FBI denounces as "extremist," elitist, and undemocratic far better define
the actions of the FBI and other branches of the U.S. executive branch of
government than its opponents.

Yet the same executive branch of government funds its own extremism in
these areas with $US 250 million a year. This is a sizeable chunk of
change, but, according to the President's Commission on Critical
Infrastructure Protection, is not sufficient to even "jump start" the
battle against "physical and cyber threats." A dollar just doesn't go as
far these days as it did when J. Edgar Hoover headed the FBI and Richard
Nixon called for Law And Order. Now the Clinton government wants an
additional $US 250 million for 1999 "and $100 million each succeeding year
until they reach $1 billion in 2004."[16]

Some find this effort far more chilling to the well-being of the citizenry
than the mythology of the Four Horsemen themselves.

Something else is required to motivate an increasingly tax-shy electorate
to pop for a billion a year as the Horsemen increasingly fail to provide
sufficient motivation.

Then ... however ... there is the new issue of "hate speech."

FOOTNOTES

[1] Federal Bureau of Investigation: "the FBI's TEN MOST WANTED fugitives,"
via:

<http://www.fbi.gov/mostwant/tenlist.htm>, accessed 13 Oct 97.

[2] Federal Bureau of Investigation: "Major Investigations." via:

<http://www.fbi.gov/majcases.htm>, accessed 13 Oct 97.

[3] Federal Bureau of Investigation: "Cemetery Desecration," via:

<http://www.fbi.gov/majcases/desecration/hawaii.htm>, accessed 13 Oct 97.

[4] Office of the Co-ordinator for Counterterrorism of the U.S. State
Department, "Foreign Terrorist Organizations," via:

<http://www.state.gov/www/global/terrorism/terrorist_orgs_list.html>,
accessed 13 Oct 97.

[5] _New York Times_, 5 Sep 97. no author listed in summary via EduPage
<[email protected]>, "Minnesota Child Molester Convicted of Cyber
Porn," 7 Sep 97.

[6] David Stout, "Conviction for Child Abuse Overturned 10 Years Later,"
_New York Times,_, 30 Sep 97, p. B3. no on-net source found to cite.

[7] See "The Rimm/Carnegie Mellon University/TIME Cyberporn 'study' Debate
(NIU Sociology 476 - Ethics of Fieldwork Segment)," via:

<http://venus.soci.niu.edu/~cudigest/rimm/rimm.html>. accessed 5 Sep 1997.

[8] "Disturbing Anti-gay Trend Continues in Cyberspace," "GLAADLines"
electronic news post, 25 Aug 97, Gay & Lesbian Alliance Against Defamation
<[email protected]> and via:

<http://www.glaad.org>.

[9] For examples of the press coverage of "beyondHOPE," see for example The
Cheshire Catalyst's web age via:

<http://digital.net/~cheshire/#hope>

[10] Simson Garfinkel, _PGP: Pretty Good Privacy_, (O'Reilly & Associates,
Sebastopol, CA: 1995).

[11] Steve Harris, via:

<http://www.compulink.co.uk/~net-services/pgp/>

[12] Thomas Fisk, Thomas Pearly senior, William Fish, et al. "We confess
that we ourselves were not capable to understand...." quoted by Kurt
Seligman, _The History of Magic and the Occult_ (Harmony Books, New York:
1983) p. 191.

[13] Pamela Finkel, "Media Advisory: Hackers Expose Vulnerability in White
House Security," 16 Sep 97, via:

<http://www.inch.com/~esoteric/pam_suggestion/formal.html>

[14] no author, "FBI says privacy 'extremists' are 'elitist'," TechWire, 25
Sep 97. summary republished in electronic form by EduPage, 28 Sep 97 via
Edupage Editors <[email protected]>.

[15] no author listed, "Internet restrictions overturned in New York [and]
Georgia," _WiredNews_, 20 Jun 97. summary republished in electronic form by
EduPage, 23 Jun 97.

"In the New York case, a law similar to the federal Communications Decency
Act was declared unconstitutional because it sought to regulate
transactions occurring outside the state's borders, thereby violating the
Constitution's interstate commerce clause. 'The judge was waiting to hear
the Supreme Court's decision on the CDA, but decided that in any event it
doesn't matter because under this commerce law, it is too burdensome for
people to speak at all in this medium,' says an American Civil Liberties
Union attorney. In Georgia, a federal judge issued a preliminary injunction
against a law that made it illegal to use a name that "falsely identifies"
the sender of an electronic message, such as a pseudonym or an anonymous
e-mail address." republished by EduPage, 23 Jun 97.

[16] no author listed, "Cyber threats of concern to presidential
commission," _Washington Post_, 6 Sep 97. republished as summary in
electronic form by EduPage, 7 Sep 97.

                     ++++  PART II   ++++

Unlike the chimera of "kiddie porn," drug dealers, international
terrorists, or nefarious hacker plots worthy of "the Mind of Fu Manchu," an
enormous amount of hate-based propaganda exists on the net, as do the
organizations publishing it.[17]

The terrorists, drug dealers, and "kiddie pornographers" may not have a
very public net presence[18]; the neo-Nazi, K.K.K., and other openly
fascist groups do.[17] The leaders of the Colombian cocaine cartels do not
have personal web pages but you can view web pages like that of noted
Holocaust-Revisionist Arthur Butz. You won't find an enormous number of
documents extolling the positive social virtues of pedophilia but you can
find a veritable _Cliff's Notes_ of homophobia.[19]

Unlike the myth of the international hacker menace that has to be
periodically created, Auschwitz was real. So are the people on the net who
denied that it happened. So are the people on the net who want it to happen
again. Other forms of propaganda against the Romis (Gypsies), illegal
immigrants, physically handicapped, and other targets of Nazi mass
extermination are routine occurrences on the web and in the Usenet news
groups.[20]

The question of how to handle net-based and action-oriented hate propaganda
is increasingly asked.

One group argues "nothing." But these people are not the target of
pro-government[21] arguments for intervention against the "Four Horsemen."
Nor is the group composed of many potential victims of hate-action.

There are a variety of ways in which action concerning the net can be
considered.

The first is the individual/collective dichotomy. Collective action, in
turn, can be directed to produce anti-hate intervention by corporate ISPs,
government, or by grassroots users.

Some urge corporate action against hate on the net. Late in 1995 the Simon
Wiesenthal Center (SWC) called for ISPs to deny fascists web sites. This
did not produce any diminution of the fascist presence. It did, however,
bring strong criticisms against the SWC and defenses of "free speech for
Nazis." Other actions were taken against the K.K.K. on America Online and
similar attacks against hate-based forces on <geocities>.

One problem with such campaigns is that they result in the mantle of
martyrdom falling, not on the victims and survivors of Auschwitz, but on
those defending the very fascist criminals who produced Auschwitz. The rush
to mirror Zundel's web site illustrated this.

Similar public campaigns to pressure ISPs to remove web pages do nothing to
reduce or eliminate other forms of hate-based net behavior contained in
e-mail or on discussion groups.

The corporate-based anti-hate strategy will always fail. There are tens of
thousands of ISPs on the net, and hate-forces will always be able to locate
a home-base on at least one of them. Even when an ISP is successfully
pressured, the offending forces relocate to another provider.

In a reversal of off-the-net common sense, the net provides a strange
equality among ISPs regardless of size, capitalization, advertising, or
"prestige." The Plaza Hotel at the corner of New York's Central Park can
provide luxury accommodations; the Bed'n'Bite Trailer Motel on Tobacco Road
cannot. Once on the net, however, <Bed-n-Byte.com> provides web services
essentially identical to <Plaza.com>. In cyberspace every ISP is as
geographically close to the user as every other ISP; new web sites are just
an URL away. Different ISPs' web-oriented services may be marginally
different in upload or download time but from the end-user's perspective
they are functionally identical because the hardware, software, and
operating protocols are effectively the same.

This also holds for such things as e-mail and ancillary services like
mailing list 'bots. In a reversal of the normal economy of scale, the
smaller provider may even provide better services via things like
user-to-modem ratios or technical support than the biggest carriers.

Successful pressures on ISPs cannot even substantially increase costs of
the hate-based forces. Market mechanisms have reduced basic
"all-you-can-eat" net access to the $US 15-25/month rate.

The next strategy for "kicking hate off the net" relies on the
police/military might of the various states.

This must occur on an international level if it is to be successful. The
cyberpunk slogan that "National borders are just speedbumps on the global
information superhighway" is especially important here.

In abstract terms, the net is post-internationalist. It has moved to a
globalism that no longer recognizes the very nation states around which one
must be internationalist. For many on the net, such nations are little more
than the "dot two-letter" suffixes on e-mail addresses and even these
disappear as the large ISPs go multinational.
In concrete terms, Dilbert no longer bothers or even thinks about whether
<www.foobar.com> is located in the U.S. or in Elbonia. Attacks by one
government on E. Zundel's Holocaust Revisionist site resulted in the site
being mirrored in other countries. Cyberpunks took but a few hours to
publish "workarounds" for German users when CompuServe cut some news groups
in its German feed.

In short, calling on national governments to fight internationalized hate
only works if all of the governments participate equally in the
crackdown.[22] In Thomas More's words, we can no longer tear down the laws
of England to get to the devil; we must tear down the laws of every country
to get to the same English devil.

When I leave my house to fight off-the-net actions against fascist-based
hate speech I know I am far more likely to be physically assaulted by the
police protecting the fascists than I am by the fascists themselves.

Working with the 1960's civil rights movement exposed me to the actions of
both the K.K.K. and the cops. One central difference was that the cop wore
a badge and gun outside his uniform; the Klansman often wore the same badge
and carried the same gun beneath his white sheet.

Unfortunately this process did not end with the 1960s.

As I write this the national newspapers still cover the case of Abner
Louima, the Haitian man assaulted in a NY police station. Police decided to
"teach him respect" for the law by sodomizing him with a bathroom plunger
doing severe injuries to his colon and other internal organs, according to
widespread press reports. Then they rammed the same plunger down his
throat, doing even more injury to his mouth and throat.

This excellent example of how police protect us from hate occurred in
liberal NY. One wonders what cases have gone unreported elsewhere in the
world in geographic locations less interested in "handcuffing" the police.

Let us not forget other actions by armed state representatives, as when
elite-trained U.S. soldiers stationed further South recently murdered a
black couple.

Nor was the old Southern judiciary necessarily better that the local
sheriff's office. Too often one sensed from legal decisions not to punish
those convicted of hate crimes that we faced not the metaphorical "hanging
judge" but a literal extra-legal lynching one.

In this sense, the Devil and the law were one and the same. The judicial
black robes of More's Law might have constrained the devil; relying on the
same black-robed figure for protection from the devil only damned the
victims of hate-action that More's Law was to protect.

Hoover's FBI provided the evidence to convict a few hate-activists during
the late civil rights period, largely through paying KKK informants. But
the wrath of Hoover, through programs like COINTELPRO, was directed at the
same forces the Klan targeted. The FBI did not fight hatred on a broad
front; rather it spent money and used its agents to whip up the very hatred
it condemned. Hoover branded Dr. M.L. King as the "most notorious liar in
America" while bugging his phones, sending him anonymous blackmailing
letters designed to have him commit suicide, and spending covert money to
create the image of another leader of the "Negro struggle." Similar efforts
were directed against the anti-war movement. Even more sustained efforts
were directed against groups like the Black Panther Party. Many Party
members who were convicted under the hate-oriented atmosphere remain in
jail today. In some cases, their unjustified convictions are only today
being overturned as is seen in the case of geronimo ji Jaga (Elmer
"Geronimo" Pratt).[23]

Perhaps the best known case -- Mumia Abu-Jamal -- is still under a death
sentence while his case is being appealed.[24]

Hoover and the official COINTELPRO program were a long time ago. It may be
comforting to repeat "that was then; this is now" as if the words are some
crucifix waved in front of the 1960s Devil of Hate in order to convince
ourselves that cop-based hatred vanished when Richard Nixon finally died.
While comforting, it is not true. Nor is the constant repetition of
hate-based action among the cops and military a matter of a single Devil.

Dracula may die at the end of every vampire film only to rise again at the
beginning of the sequel. But Dracula is only one entity while the forces of
hate are countless; their name is Legion.

The Tennessee-based hate-filled "Good Old Boys Roundups" were attended by
120-200 Treasury agents and some 45 agents from the Department of
Justice.[25] These estimates include people from only two federal agencies
and none from the military. Estimates from those agencies are lacking.
Missing also are attendance figures from any of the country's local police
departments.

The story could have broken several years earlier had any cop wanted to
act. But there is a massive and continuous differentiation in the police
mentality between wrongdoing by citizens and the *identical* wrongdoing by
the cops themselves.

This difference is illustrated by two stories in the 24 September _New York
Times_. Serpico, NY's famed "honest cop" played by actor Al Pacino in the
1973 movie of the same name, just showed up to testify at a City Council
meeting on police corruption.[26] Today, 26 years after Serpico revealed
massive corruption among NY cops, police hostility to him has not vanished.
"... plainclothes officers guarding the entrance to City Hall gave him
looks that could have cooled burning coals. For sure, they were polite,
those men, some of whom were little boys when Frank Serpico blew the
whistle. But they glared in unvarnished hostility...."[26]

The issue is far more than merely cop-hate-(whistle-blowing)cop. The same
issue of the paper reported retaliatory attacks on the nurse who first
reported the Louima police-brutality case to the police Internal Affairs
Bureau.[27] The Bureau failed to log the complaint.

Dealing with the Devil of Hate, once ensconced among the cops, is far more
difficult than merely calling The Exorcist.

In the "Butler" case, Canadian courts, following the lead of "radical"
feminists A. Dworkin and C. MacKinnon, created strong legal sanctions
against printed matter like "pornography" deemed to disparage women and
other "minorities."[28] Almost immediately in the political ROTFLMAO event
of the decade, Butler was used to ban several of Dworkin's works as
pornographic.

Butler was then used by Canadian customs as precedent for a general
crackdown on gay and lesbian bookstores in that country. [29] One wonders
what percentage of lesbians routinely oppress women and how many homosexual
men are convicted of heterosexual rape. But such questions did not appear
to bother Customs as its agents found the ostensibly anti-hate law useful
to act on their own homophobic impulses.

Elsewhere in Canada, other laws designed to bolster law enforcement in
today's new electronic climate brought charges that police misused the laws
against citizens concerning both wiretapping[30] and more general issues of
privacy.[31]


Internationally, we repeatedly see the dominant role of the cops and
military in leading the very violent hate-based action many want them to
stop. Have we so soon forgotten the revelations of how the "death squads"
in Latin and South America killed tens to hundreds of thousands of
"dissidents?" If our collective memory does not extend back into the late
1980s what of the reports this year of how forces in the S. African police
killed anti-apartheid leader Steve Biko?

Yet the utmost charity is extended to *this* form of hatred, with pardons
and general amnesties for cops and Generals pronounced in the spirit of
"reconciliation" and "forgiveness."

Even under the abstractly best of conditions, reliance on state agencies to
fight fascism is exceedingly dangerous. Fascism has little power under good
conditions; it develops only when conditions are bad and the very state on
which one relies is itself threatened. History repeatedly shows that at
such times fascist supporters in the cops and military increase
significantly. Relying on the state during such times is like buying
insurance against kangaroo bites that is cancelled as soon as one moves to
Australia.

Germany today has passed strong laws to deal with things like "child
pornography and neo-Nazi behavior." But these laws have been used to ban
the "Radikal" net site and charge *anti*-fascists with illegal activity.[32]

The same police mandated by German law to prosecute neo-Nazi activity
assist the same fascists to avoid arrest and prosecution under these laws.
A covert intelligence operation conducted by the Simon Wiesenthal
Center[33] into European fascist activity documented how such
police-assisted fascism organizing occurs and the exact hate-oriented
groups and individuals who benefit from it.

Overt pro-fascist actions are also increasing in the German military
paralleling other German attacks on Turkish immigrants and Romis. "Germany
Alert" wrote "German soldiers were involved in some 120 reported incidents
involving pro-Nazi, anti-Semitic or anti-foreigner hate over the past year,
the Defense ministry revealed. Incidents have more than doubled since last
year, the government admitted, as concern about extreme right wing
nationalism in the military mounted."[34]

The same does not unfold in the opposite direction, for the Devil, once
ennobled with the sanctity of law, becomes forever angelic and protected.
Nowhere has this been more clearly observed than the case of Erich Mielke.
Listed as the "number two man in East Germany for three decades,"[35] he
was convicted in 1993 for the murder of two cops.

The facts of the case were simple yet astounding. Mielke was a young
Communist in Germany during the 1930s, assigned to the defense of the
German Communist Party's headquarters. Two high-ranking Storm Troopers in
the Berlin police were assigned by the Nazi Party to use their police rank
to physically attack Communists working at the HQ. When protests against
this went unanswered by the police, Mielke did what many anti-fascists
throughout the political spectrum did a few years later. He went out. He
killed both cops. Then he went underground.

For this action in 1931, he was convicted by a German court 62 years later.

Between cops hating Serpico and cops hating Mielke, it's enough to make
even Saint Thomas More turn in his halo.

FOOTNOTES

[17] see, for example, HateWatch via:
<http://hatewatch.org/>, accessed 3 Sep 97.

"HateWatch is a web based organization that monitors the growing and
evolving threat of hate group activity on the Internet. Started in 1996,
HateWatch provides an online resource for concerned individuals, academics,
activists and the media to keep abreast of and to combat online bigotry.
Because the Internet has eliminated geographical and monetary boundaries
that once existed for hate groups, we must be vigilant in monitoring these
sometimes violent people and their activities in cyberspace."

[18] This is not to say that groups listed by the State Department as
"terrorist" have no web pages; some do. But they are outnumbered by the
neo-fascists and other related groups.

[19] see, for example: Jeff Vos, "The Homosexual Threat" via:

<http://www.crusader.net/texts/cng/homo.html>, accessed 3 Sep 1997.

Earlier, Vos was a leading member of the CyberNaziGroup. see, for example,
his articles "The Manifesto of the CyberNaziGroup: Let Your Life Be a
Lightening Bolt!" and "The CNG: An Idea for On-Line Organizations."
available as files FD005.TXT and FD008.TXT via:

<ftp://ftp.nyct.net/pub/users/tallpaul/Docs/Fascist/>.

[20] Another detailed list of anti-hate/anti-fascist web sites is available
from what started as a project at the University of Michigan's School of
Information, via:
<http://www.sils.umich.edu/~plefr/HomePage2.html>.

These sites frequently contain URLs to the hate-oriented web pages.

[21] The phrase "pro-government" here does not refer just to the current
U.S. government. The "Four Horsemen" arguments are used, in one form or
another, by an enormous number of different governments and political
systems from Iran to Singapore, and from the People's Republic of China to
the Republic of Korea.

[22] Some forces are organizing to this end, if not for *all* governments
at least for a significant number. See, for example, Clive Parker,
"E[uropean] U[nion] sends in the Internet police," _The Times [of London]_,
24 Sep 1997. Barker summarized a speech by EU Commissioner Martin
Bangemann, speaking at the Telecom Interactive 97 conference in Geneva, "a
call for an international charter to establish worldwide standards for
policing the Internet and the broadcasting and multimedia industries."

For a *partial* list of U.S. local to global censorship attempts, see the
Electronic Frontier Foundation's "Action Alerts" site via:

<http://www.eff.org/pub/Alerts/Foreign_and_local/index.html>

[23] no author, via Associated Press, "Black Panther Geronimo Pratt granted
new trial after 25 years," 29 May 97. see also, Edward J. Boyer, "For Pratt
Legal Wheels Grind Slowly," _Los Angeles Times_ 3 Jun 97. reprinted in the
_ANTIFA INFO-BULLETIN," 3 Jun 97, via:

<gopher://gopher.igc.apc.org:7021/11/europe>.

[24] for details on the controversy, the background of the Mumia case, and
the current status of the death-row appeals, see:
<http://www.mumia.org>

[25] see _New York Times_, 3 Apr 1996, p. D20:4.

[26] Clyde Haberman, "Serpico Steps Out of the Shadows to Testify," _NY
Times_, 24 Sep 1997, p. B1.

[27] John Kifner, "Nurse Tells of Retaliation For Effort in Louima Case,"
_NY Times_, 24 Sep 1997, p. B4.

[28] Adrienne Weller and Andrea Bauer, "Catharine MacKinnon: Crusader for a
Rightwing Women's Movement," _Freedom Socialist_, Vol. 15, No. 1. available
on-line as file "FN002.TXT" via:

<ftp://ftp.nyct.net/pub/users/tallpaul/Footnote/>.

Edward H. Hurley, "Pornography Makes For Strange Bedfellows: The
feminist/right-wing union against pornography," _Ethical Spectacle_ Nov 95,
via:

<http://www.spectacle.org/997/hurley.html>, accessed 13 Oct 97.

[29] Wendy McElroy and Catherine Siemann, "Right now Little Sisters
Bookstore in Vancouver is in court...." no date, press release, reposted to
Usenet news group <soc.feminism> by Jeffrey Shallit,
<[email protected]>. 18 Aug 94, via:

<http://www.mit.edu/activities/safe/safe/canada/feminists-free-exp-org>.
accessed 13 Oct 97.

[30] no author, "Wiretapping probe urged," _The Toronto Star_,  Oct 1997,
on-line through the Electronic Frontiers Canada via:

<http://insight.mcmaster.ca/org/efc/pages/media/toronto.star.06oct97b.html>.
accessed 11 Oct 97.

[31] Campbell Clark, "Quebec breaking own privacy rules: watchdog," _The
Montreal Gazette_, 8 Oct 1997, on-line through he Electronic Frontiers
Canada via:

<http://insight.mcmaster.ca/org/efc/pages/media/gazette.08oct97.html>.
accessed 11 Oct 97.

[32] no author listed, "German court to try woman for guerrilla
hyperlinks," _New York Times_, 6 Jun 97, summary republished by EduPage, 8
Jun 97. no author listed, "New German law restricting cyberspace," _New
York Times_, 5 Jul 97, summary republished by EduCom, 6 Jul 97.

[33] no author [Simon Wiesenthal Center], "SWC Operations Report: Part
IV--Findings," posted in file dated 24 Dec 96, via:

<http://www.shamash.org/holocaust/neo-nazis/swc4.txt>, accessed 21 Sep 97.

[34] no author ["Germany Alert", "German Military Hate Incidents Double,"
26 Oct 97. via:

<http://alertnet.com/ga/>, accessed 27 Oct 97.

[35] Larry Thorson, "Another Attempt in Court to Punish East German
Leaders," Associated Press via _The News-Times_. via:

<http://www.newstimes.com/archive/nov1395/ina.htm> accessed 28 Sep 1997.

------------------------------

Date: Thu, 7 May 1997 22:51:01 CST
From: CuD Moderators <[email protected]>
Subject: File 2--Cu Digest Header Info (unchanged since 7 Oct, 1997)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send post with this in the "Subject:: line:

    SUBSCRIBE CU-DIGEST
Send the message to:   [email protected]

DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.

The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
or U.S. mail at:  Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

To UNSUB, send a one-line message:   UNSUB CU-DIGEST
Send it to  [email protected]
(NOTE: The address you unsub must correspond to your From: line)

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on  internet);
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

        In ITALY: ZERO! BBS: +39-11-6507540

 UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
   Web-accessible from: http://www.etext.org/CuD/CuD/
                 ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
                 aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
                 world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
                 wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
 EUROPE:         nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
                 ftp.warwick.ac.uk in pub/cud/ (United Kingdom)


The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
 URL: http://www.soci.niu.edu/~cudigest/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.  CuD material may  be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission.  It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified.  Readers are encouraged to submit reasoned articles
relating to computer culture and communication.  Articles are
preferred to short responses.  Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
           the views of the moderators. Digest contributors assume all
           responsibility for ensuring that articles submitted do not
           violate copyright protections.

------------------------------

End of Computer Underground Digest #9.80
************************************