Copy Link
Add to Bookmark
Report

Computer Undergroud Digest Vol. 04 Issue 21

  



Computer underground Digest Sun May 10, 1992 Volume 4 : Issue 21

Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
Associate Editor: Etaion Shrdlu, Jr.
Arcmeisters: Brendan Kehoe and Bob Kusumoto

CONTENTS, #4.21 (May 10, 1992)
File 1--Police PR meets style v. substance
File 2--BloomBecker's 5 points for crime policy
File 3--The Forgotten Victims of the "Bill Cook" Raids
File 4--A Forgotten Victim of the 1990 Raids
File 5--Pay Craig's Legal Fees For 29 Cents?
File 6--Online Debate Article
File 7--Two Cornell Students Indicted in Virus Case

Issues of CuD can be found in the Usenet alt.society.cu-digest news
group, on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG,
and DL0 and DL12 of TELECOM, on Genie in the PF*NPC RT libraries, on
the PC-EXEC BBS at (414) 789-4210, and by anonymous ftp from
ftp.eff.org (192.88.144.4), chsun1.spc.uchicago.edu, and
ftp.ee.mu.oz.au. To use the U. of Chicago email server, send mail
with the subject "help" (without the quotes) to
archive-server@chsun1.spc.uchicago.edu. European distributor: ComNet
in Luxembourg BBS (++352) 466893.

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted as long as the source
is cited. Some authors do copyright their material, and they should
be contacted for reprint permission. It is assumed that non-personal
mail to the moderators may be reprinted unless otherwise specified.
Readers are encouraged to submit reasoned articles relating to
computer culture and communication. Articles are preferred to short
responses. Please avoid quoting previous posts unless absolutely
necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.

----------------------------------------------------------------------

Date: Sat, 2 May 1992 18:18 CDT
From: <BOEHLEFELD@WISCSSC.BITNET>
Subject: File 1-- Police PR meets style v. substance

A late response, but regarding the discussion of the Fresno police
press release (discussed in Cu Digest, #4.18):

I don't have a scientific sample, but I've looked at information from
a variety of police/law enforcement agencies for several years as
a journalist. I have only known one PIO who has had journalism
training before entering law enforcement, and her time on the PIO
desk was limited. Many of the releases I saw over the years included
misspellings, grammatical and other errors. (So, too, did many of
the police reports I have looked at over the years.) I have seen
similar releases about LSD being circulated on stickers with cartoon
characters, and about 'unsavory strangers' lurking in communities.

The sensationalism of the writing concerned me far more than the
minor details of spelling or apparent lack of letterhead. I have
a computer, I have a modem, I have children and I have an acquaintance
who claims to run an x-rated bbs. I also manage to keep these elements
of my life separated. But, if we acknowledge that the computer literacy
of various members of our society ranges from none to much, and that
many of us, likely, fall somewhere in between, I'm afraid hype of
the kind this press release generates will not do much in ensuring
that the potential benefits of personal electronic media will accrue
to all of us. It seems fear tactics generate fear, not understanding.
Sensationalism is not produced by 'the media' alone.

I think your response, which included reports of conversations
you apparently had with Fresno police personnel, put the actual
event in better perspective.

I'm not suggesting that every police department needs to hire a
public relations specialist (though friends in PR probably would),
but each of us who writes for public consumption would do well to
consider how we get attention for an issue we believe is important.
(The other recent post about preparing material for posting had
some good advice.)

In other words: If you want to be believed, keep it simple. Keep
it straight.

------------------------------

Date: Mon, 4 May 1992 8:50:01 GMT
From: NEELY_MP@DARWIN.NTU.EDU.AU(Mark P. Neely, Northern Territory
Subject: File 2--BloomBecker's 5 points for crime policy

In response to: CuD 4.14 BloomBecker's Legal Guidelines at CV&SC Conference

BloomBecker's 5 points for a nationwide set of legal guidelines for
computer crime are fundamentally flawed!

> 1. The creation of a $200 crime law deductible. Damages incurred below
> that figure would not be the subject of criminal action.

"Damages" would presumably include the $$$ spent in wages for someone
to inspect the system for maliciously inserted code. It would not be
hard at all to run up a wages bill in excess of $200 in doing so.
Ergo, _all_ computer intrusions would be the subject of criminal
action.

One alternative is to set a realistically higher damages threshold for
criminal proceedings, and allow the "victim" to seek a civil remedy
against the alleged intruder.

> 2. The creation of a civil course of action for inadequate computer
> security

This sounds, at first sight, quite fair. For instance, here in Darwin
Australia, I can be given a ticket for failing to lock my car doors!
This measure was introduced in an effort to raise public awareness of
escalating car thefts, and to promote public responsibility for
prevention (which is always better than any cure :)

But it is difficult to see how such a measure can be justly applied to
computer security. My primary problem is the phrase "inadequate
computer security". Locking my car door takes a bit of forethought
and a second or two upon my exiting the vehicle. "Locking" a computer
system would require considerable administration time and money.

I would also assume that the "inadequacy" of the security is to be
measured in light of the data/system to be protected? Is the civil
penalty to be applied to government and quasi-government systems?

Are personal computer operators/ BBS SysOps to be made subject to such
a requirement?

> 3. The making of reckless computing a felony. "Reckless computing" is
> classified as anything which could potentially cause damage.

Weird... Ctrl-C'ing at the right time could "potentially cause damage"
by crashing the host machine. Causing a conflict of 2 TSR's at your
end (thereby causing your machine to lock up) necessitating a reboot
(and hence dropping the connection) could "potentially cause damage"
to the host system.

Sorry..."reckless" as opposed to "intentional" conduct should NOT be
the subject of criminal actions unless there is good grounds for doing
so.

Recklessness in, for example, the area of driving a motor vehicle may
justifiably be the subject of legal sanctions - but only because of
the danger to life that it causes. I don't think there is an analogous
justification in the area of computer misuse!

> 4. The making a careless computing a misdemeanor.

How do you distinguish "careless" and "reckless"? Does not "careless"
computing have "the potential to cause damage"?

> 5. The enactment of greater protection against unreasonable search and
> seizure.

Now that is something I would support.

------------------------------

Date: Sun, 3 May 92 23:45 CDT
From: uucp@DOGFACE.AUSTIN.TX.US
Subject: File 3--The Forgotten Victims of the "Bill Cook" Raids

A little over two years ago, there was much in Texas that caught the
interest of law enforcement personnel concentrating on computer crime.
Two investigations in other parts of the country focused attention on
individuals in the Austin and Dallas areas, the most well-known of
whom is Steve Jackson, the owner of an Austin-based game publishing
company.

In July of 1989, Secret Service agents were examining electronic mail
records of a privately-owned computer system in Illinois owned by Rich
Andrews. Those records, which contained the computer equivalent of a
list of all mail sent through a particular post office, showed that a
copy of a newsletter called "Phrack" had been sent to Loyd
Blankenship, the managing editor at Steve Jackson Games, Loyd
Blankenship, in late February of 1989. It had also been sent to
thousands of others, but none of them were working on a book that, the
Secret Service agents felt, romanticized computer crime.

The editor of the Phrack newsletter, a pre-law student at the
University of Missouri/Columbia by the name of Craig Neidorf, made the
activities of the telephone underground the focus of his publication.
He gave space to individuals fascinated with the telephones in their
lives, and with the technology that connected them. As phone company
technology grew to depend upon computers, so did those who read the
Bell Labs technical journals as if they were the sports page. The
pages of Phrack came to include technical discussions of computer
security issues.

Mr. Neidorf, thought the Illinois Secret Service and the Illinois U.S.
Attorney-General's office, was up to no good. There was no difference
in their minds between writing about the computer underground and
participating in it. In the last days of January, 1990, Secret
Service agent Timothy Foley conducted a formal interview with Mr.
Neidorf in his college frat house. According to an affidavit sworn to
by Agent Foley, the two discussed the author of an article in Phrack
that contained a modified version of an element from an AT&T computer
operating system. The article was penned (under a pseudonym) by
Leonard Rose, Jr., a computer consultant who lived in Maryland at the
time, the affidavit said.

Mr. Rose was not unknown to computer professionals and enthusiasts in
Texas and around the country. His electronic mail and telephone
records were enough to shift the Secret Service's interest to Texas.
What follows is an informal chronology of the events between January
of 1990 and today. It is incomplete, partly out of consideration for
the wishes and privacy of some of the people with whom I spoke, and
partly because of the troubled calm that people have felt after the
departure of the current masters of Operation SunDevil.

1/90: Bell Communications Research security manager Henry M.
Kluepfel dials into Loyd Blankenship's home BBS, the Phoenix
Project, under his real name. By mid-February, he has seen
and read an issue of Phrack on the system, copied a list of
the system's users who might have read the newsletter, and
called the Secret Service. According to Agent Foley's
affidavits, what Kluepfel saw there was a threat to the
business of Kluepfel's employer and other telephone
companies.

2/90: Search warrants are given for the residences of Bob Izenberg
(2/20), Loyd Blankenship (2/28) and Chris Goggans (2/28),
and at the office of Steve Jackson Games (2/28). The SJG
warrant is unsigned; the other warrants are signed by U.S.
Magistrate Stephen H. Capelle on the day that they're
served. Although the warrant specifies that only computer
equipment and media may be seized as evidence, Secret
Service interest goes farther afield. Several videotapes of
public access programs are seized from one residence. Three
hours after the raid at another, Secret Service agents have
called Austin computer store owner Rick Wallingford at home,
to verify that he sold a pinball machine to one of the
warrant subjects. Prior to executing the warrants, Secret
Service agents have gone to security personnel at the
University of Texas to discuss the individuals, and to
obtain driver's license information and physical
descriptions. A subpoena is served at the University to
obtain access to Chris Goggans' computer records. Public
access computers attctc/killer (run by AT&T) and
elephant/puzzle (run by Izenberg) cease operation. The
former, which Secret Service agents claimed to have run "to
monitor the hacker community" was closed by AT&T order. The
latter was closed when the machine was seized under warrant.
The Steve Jackson Games "Illuminati" BBS goes down when it
is seized as evidence.

3/90: Semi-public access computer rpp386, in service since
September of 1987, drops most user accounts and connections
to other computers. Said its owner, John Haugh, "The
investigation with SunDevil was starting to get too close.
I knew Bill Kennedy, Bob Izenberg and Charlie Boykin. It
seemed reasonable that my system would come under
investigation." It didn't, and Mr. Haugh said that he has
never been contacted by any law enforcement officials with
regards to these matters.

4/90: Newsweek article "The Hacker Dragnet" by John Schwartz
discusses the Steve Jackson Games raid, among other issues.

6/90: Steve Jackson is told by the Secret Service that his seized
property can be picked up. Some of it is damaged, and one
hard disk, some hardware and assorted papers are not
returned.

9/90: Houston Chronicle article "War on Computer Crime Waged With
Search, Seizure" by Joe Abernathy discusses Steve Jackson
Games and Operation SunDevil. Agent Foley, on the phone in
Chicago, refuses return of property seized from Izenberg
residence.

1/91: Bill Kennedy gets a phone call from the Secret Service about
his knowledge of Len Rose. He is told that he's not under
investigation, and the Baltimore, Maryland Federal
prosecutor confirms this.

4/91: Byte magazine columnist Jerry Pournelle gives his
hall-of-shame "Onion of the Year" award to Agent Foley,
saying, "Mr. Foley's actions in Austin, Texas, regarding
Steve Jackson Games not only exceeded his authority, but
weren't even half competently done."

5/91: Steve Jackson Games and the Electronic Frontiers Foundation
file a civil suit against the Secret Service agents,
Bellcore technical personnel and others for damages.

9/91: U.S. Magistrate Capelle grants Izenberg's motion to unseal
the affidavit in support of search warrant filed by Agent
Foley on behalf of the Secret Service.

Now: The Steve Jackson Games suit presumably continues. The
Secret Service claims, in court documents, that all
investigations which have not resulted in indictments are
still in progress.


WHO'S WHO

LOYD BLANKENSHIP: (aka The Mentor): Handed unsigned search warrant in
Austin, TX on 3/1/90, pursuant to which the feds seized $10K of
computer equipment. To this date, none of the equipment has been
returned, and no charges or indictments have been made. Still works
for Steve Jackson Games (who is in the middle of suing the government
thanks to the EFF!). Now runs a usenet node out of his house
(loydb@fnordbox.uucp).

CHRIS GOGGANS: Former employee of Steve Jackson Games. Unavailable
for comment.

JOHN HAUGH: Computer consultant in Austin, TX. Owner/operator of
rpp386 semi-public computer system. On computer
criminals: "These are the people that are making it
hard for us...Forcing the government to be
investigating people in the first place."

BOB IZENBERG: Former operator of public access Unix site "elephant".
Handed search warrant in Austin, TX on 2/20/90. U.S.
inventory of seized property: minimum $34,000, give or take
a $900 hammer. Court motion to unseal affidavit for search
warrant granted early 9/91. No charges or indictments.
Property not returned, pursuant to "ongoing investigation."
Runs public access usenet site "dogface" at home.

BILL KENNEDY: Computer consultant in Pipe Creek, TX. Contacted by
Secret Service agents over the phone at a friend's home. (It is a
subject for speculation how it was known that he was at this
particular friend's house. Monitoring of phone activity at Kennedy's
home might have given this information.) During the half hour
conversation, he was told that he was not under investigation, and was
asked about his association with other individuals under scrutiny. A
copy of a note which stated that he was not under investigation was
faxed to him. Subsequent phone conversation with the Baltimore
Federal prosecutor confirmed this. After Len Rose pled guilty,
Kennedy was told that he would be flown to Baltimore to testify, but
never was called upon to do so. He called the Baltimore Federal
prosecutor back at this point and was told that they "were through
with him." Of the investigation,
and of former Chicago prosecutor William Cook, Kennedy said, "They may
not have had enough live sacrifices to suit them... Cook was on a
witch hunt: If they didn't have anything, they'd make some."

As mentioned earlier, there are names and events left unmentioned at
individual request. It is difficult to convey the frustration, anger
at various individuals, and desire to put it all behind that the named
and un-named individuals with whom I spoke have expressed. As one
said, "The emotional toll was pretty steep." But, hey, aren't we all
safer? Wasn't it all worth it?

------------------------------

Date: Sat, 2 May, 1992 21:19:04 CDT
From: anonymous@unixville.edu
Subject: File 4--A Forgotten Victim of the 1990 Raids

One victim of the January, 1990 raids, has preferred to remain out of
the public eye and has successfully kept a low profile. We'll call
him "Joe." Joe ran Jolnet, a Unix public access BBS in Lockport,
Illinois, about 30 miles southwest of Chicago across the river from
Joliet. Joe reportedly discovered files on his system containing E911
information purloined from BellSouth's computers by Legion of Doom
member Robert Riggs (who used the handle "Robert Johnson"). Joe
reported their existence to whom he believed to be the proper telecom
authorities, which included providing access to Jolnet for Bellcore's
Henry Kluepfel. They took no immediate action. Joe cooperated with
the authorities, but ultimately had his equipment confiscated anyway.

The files Riggs obtained were related to BellSouth's E911 system, and
from Jolnet he sent parts of them to others. Since 1988, the Secret
Service had been investigating "computer intrusions," particularly a
few Legion of Doom members. The arrest and indictment of Riggs led
them to Craig Neidorf, who published a portion of the edited E911
maintenance files in Phrack 24 under the sig of "The Eavesdropper." In
January 18, 1990, The Secret Service and security personnel from
Southwestern Bell and Bellcore found the Phrack file and a password
cracking program called login.c among Craig Neidorf's posessions. They
traced the login.c program back to Len Rose, and on February 1, 1990,
they searched his premises in Maryland, where they found unauthorized
Unix sourcecode in his possession. Not realizing how ballistic the
Secret Service and AT&T would go over possession of unlicensed
software, and threatened with major felony charges of transporting
stolen property across state lines (18 USC 2314) and wire fraud (18
USC 1030(a)(6), Len indicated that he sent a copy of the program to
Joe.

The next day (February 2), Secret Service Special Agent Barbara Golden
obtained a warrant to search Joe's house under 18 USC 2314 and 18 USC
1030(a)(6). They would look for disks, documents, and anything else
that seemed computer-related. Secret Service agents and various
security officials wasted little time in trooping out to Joe's brown
ranch house with the yellow trim. On February 3, they struck. Marty
Flynn of AT&T Corporate Information Security valued the software Joe
was suspected to have (which included UNIX SVR 3.1 and 3.2, and
Starland 3.0 Network Software) at over $250,000. Flynn checked AT&T
records and informed the agents that Joe held only a limited $100
"Tool Chest" agreement. Joe's previous cooperation with Kluepfel for
over a year was forgotten. Joe was raided and he lost much of his
equipment, even though he was never indicted.

Joe's fall from grace--from cooperative citizen to victim--was another
in the list of disrupted lives caused by the Secret Service and
others. Those who were indicted paid a heavy price, but the
victimization of those who are unindicted must not be forgotten.

The Players:

Joe, at last report, was employed, relatively happy, and just wanted
to be left alone. He still did not have his equipment returned, and
was not trying to get it.

Craig Neidorf has graduated from the University of Missouri and plans
to go to law school.

Len Rose is completing the last few weeks of a one-year sentence in a
community release center in Chicago.

Robert Riggs was released from prison in 1991 and periodically appears
at conferences.

Henry Kluepfel, former Assistant U.S. Attorney William J. Cook, and
Secret Service Special Agents Timothy Foley and Barbara Golden are
defendants in a civil sought brought against them for reckless
behavior in the subsequent raid on Steve Jackson Games.

------------------------------

Date: Fri, 8 May 1992 15:27:50 -0500
From: Moderators <tk0jut2@mvs.cso.niu.edu>
Subject: File 5--Pay Craig's Legal Fees For 29 Cents?

Craig Neidorf's legal fees, incurred from his defense against felony
charges in the "PHRACK" case, remain high. He is paying them off
bit-by-bit, but the process is slow.

For new readers, Craig was indicted by the U.S. Government on charges
of wire fraud and theft as the result of publishing what federal
prosecutor William J. Cook erroneously believed to be proprietary
information. Because of the efforts of John Nagle, Sheldon Zenner
(Craig's attorney) was able to show that the information published in
Phrack was available in public documents for about $12.95 (see Bob
Izenberg's post, above). The prosecution dropped the case even before
it finished presenting it. Craig's "victory" exacted an emotional and
financial toll. His legal expenses were in excess of $100,000 even
after generous help from supporters.

Craig's case represented a landmark in the relationship of cyperspace
and the law. It marked the beginning of the Electronic Frontier
Foundation and Cud; it created an awareness of the need to fight for
the same Constitutional protections in the electronic frontier as
exist in more conventional realms; it stimulated involvement of a
number of socially conscious persons from a broad spectrum of
professions (e.g., Mitch Kapor, Dorothy Denning, Jim Warren, John
Perry Barlow, Marc Rotenberg); it challenged (and reduced) what some
saw as the abuse of power by law enforcement agents and prosecutors in
pursuing "computer crime"; and it led to open public debates about
over both the freedoms and the responsibilities of the new electronic
world.

Craig was initially tempted to accept a plea-bargain. In some ways,
this would have been more beneficial: He would have lower legal fees
and it would not have been as disruptive to his life. He chose to
fight on principle, and we have all benefited from his choice.

We can *ALL* help Craig for only a few minutes and a 29 cent stamp.
Craig as been nominated for a Playboy Foundation award worth $5,000
toward his legal fees. The award is for those who have contributed to
protecting First Amendment rights, and Craig's contributions to
stimulating public awareness of and action on such rights in
cyberspace is undeniably significant. Here's the blurb for the award:

PLAYBOY FOUNDATION OPENS NOMINATIONS FOR 1992 HUGH M.
HEFNER FIRST AMENDMENT AWARDS

"Established in 1979 by the Playboy Foundation to celebrate the
25th Anniversary of Playboy Magazine, the awards program is
designed to educate the public about First Amendment issues and
to honor individuals who have made significant contributions to
enhance and protect First Amendment rights of Americans."

Readers are encouraged to send a letter in support of Craig Neidorf's
nomination to:

Jill Chukerman or Kris Farley
Playboy Foundation
680 North Lake Shore Drive
Chicago, IL 60611

(312)751-8000

NOTE: THE DEADLINE FOR LETTERS IS MAY 22 !! The winners will be
announced in September. Below is a rough draft of our own letter:

+++ cut here +++

9 May, 1992


Jill Chukerman or Kris Farley
Playboy Foundation
680 North Lake Shore Drive
Chicago, IL 60611

Dear Persons:

I am writing in support of Craig Neidorf's nomination for the Playboy
Foundation's "Hugh M. Hefner First Amendment Award." Craig's
contributions to enhance Constitutional protections of the First
Amendment have been unique and substantial. At extreme personal cost,
he chose to fight for a Constitutional principle he believed in, which
ultimately led to an awareness by others of the need to protect the
rights of electronic media.

While in highschool, Craig founded an electronic newsletter called
PHRACK that was available to the public by means of a computer and a
telephone modem. PHRACK published a variety of articles and news
blurbs, authored by others, on computer culture. In 1989 (Craig was
now a senior at the University of Missouri), PHRACK published a
document that BellSouth (a regional Bell telephone company) asserted
was "proprietary," and its publication, it argued, indicated theft and
wire fraud. In early 1990, the U.S. Secret Service acted on these
allegations. Craig was tried in July, 1990. The defense demonstrated
that the material published in PHRACK was available to the general
public for about $12.95, and the prosecution dropped the case.
Although he "won," the victory disrupted his academic performance
and resulted in over $100,000 in defense fees.

Craig could have accepted the advice of his friends, who argued that
it would be both cheaper and less traumatic to accept a plea bargain
than to fight his case in federal court. However, Craig recognized
that there were a number of principles involved. He was especially
concerned that a large corporation, aided by seemingly over-zealous
law enforcement personnel, could produce a "chilling effect" on the
rights to expression by intimidating and punishing those who published
material it did not like. Craig chose to fight.

Craig's choice had substantial consequences. His case generated
considerable interest among users of electronic media, and it seemed
to many that Craig was being victimized unjustly for publishing in
electronic form the type of material that would have been accepted in
a more conventional paper format. In fighting for the principle of
freedom of speech, Craig stimulated others to organize and participate
in protecting and enhancing Constitutional liberties in the electronic
frontier. Craig is a courageous pioneer who put principle before
personal expediency. If not for his willingness to resist encroachment
on First Amendment freedoms, there would not be the current interest
in organizing to protect them in the electronic media.

Craig intends to enter law school and pursue his interest in civil
liberties. His actions exemplify the spirit of the Award making him a
most-deserving candidate, hope that you share the views of myself and
others that he would be a worthy recipient.

If I can provide any further information, do not hesitate to contact
me.



Sincerely,

Jim Thomas
Professor, Sociology/Criminal Justice
Northern Illinois University
DeKalb, IL 60115

------------------------------

Date: Wed, 6 May 92 15:50:12 CDT
From: Joe.Abernathy@HOUSTON.CHRON.COM(Joe Abernathy)
Subject: File 6--Online Debate Article

This article appeared in the Washington report of the Sunday, May 3,
Houston Chronicle. Please send feedback and further developments to
Joe.Abernathy@houston.chron.com (800) 735-3820

Hungry candidates might share a byte
Computer-based electronic communities emerge as political constituency


By JOE ABERNATHY
Copyright 1992, Houston Chronicle

A leading figure in computer communications is issuing a challenge
this weekend for the major presidential candi dates to participate in
the first national online political debate.

And a spokesman for at least one presidential hopeful - Democratic
front-runner Bill Clinton - said the candidate likely would accept the
invitation.

A spokeswoman for President Bush's campaign said no decisions will be
made about any debates until after the primary season. Bush is
expected to clinch the GOP nomination in state conventions this
weekend in Maine and Wyoming.

"But depending upon how it's organized, as we get closer to the
general election, it may be something we will consider,'' said Darcy
Campbell, the Bush spokeswoman.

The debate would be a milestone in a year marked by firsts for a
nascent electronic democracy movement.

Empowered by the ability to quickly reach an audience estimated at 8
million to 15 million people, at little cost, organizers of this new
political community envision the debate as a way to bring the major
presidential candidates and media into potential personal contact with
every citizen who owns a computer and a modem - the device that lets
computers communicate via phone lines.

Online activist Jim Warren's proposal for the debate is being
distributed to the campaigns of Clinton, Bush and the other most
prominent candidate - prospective independent H. Ross Perot, as well
as to Democrat Jerry Brown, Republican Patrick Buchanan and
Libertarian Andre Marrou.

It calls for a panel of three reporters from major media outlets to
communicate online with each candidate over the course of a week in a
moderated newsgroup - an electronic roundtable set up for the purpose.

A parallel, unmoderated newsgroup would allow direct discussion of the
issues by everyone online, while the journalists on the panel would be
required to accept proposed questions from the online audience. Jeff
Eller, campaign spokesman for Clinton, the governor of Arkansas, said
Clinton likely would participate.

"I don't think that would be a problem at all,'' he said, adding that
the campaign already has placed position papers and other information
online. "Anything that brings more people into the system is a great
idea.''

The Perot campaign did not respond to an interview request.

The debate proposal is the latest development in a series of events
drawing attention to the emergence of computer-based electronic
communities as a political constituency.

Notably, a proposal by Perot to organize electronic town meetings has
set fire to an online grass roots movement to put him on the ballot as
an independent. Democratic candidate Jerry Brown already has gone
online for direct electronic give-and-take with potential supporters.

In California and Alabama, a number of major candidates have signed
agreements to enact legislation to protect civil liberties such as
free speech and privacy regardless of whether they are exercised on
paper, on computer networks, or in media yet to be envisioned.

"This is the first time that 8 to 15 million people have been online
out of all of history, and that suddenly provides a critical mass for
political action,'' said Warren. "That provides an interesting
constituency.

"Secondly, the candidates who have any awareness of modern technology
realize that this is an essentially free opportunity to reach millions
of voters, in a manner unrestricted by cost or sound bite editing or
interviewers' reinterpretations.''

Warren is a member of the board of directors of the software firm
Autodesk; a columnist for MicroTimes; the founder of the Infoworld
newspaper; founding host of the PBS series Computer Chronicles; and
organizer of the First Conference on Computers, Freedom & Privacy, a
seminal event in giving shape to the online political community.

"National online interaction between citizens and their
representatives by far will provide the most efficient and effective
means of having legitimate representation and active citizen
participation in the governmental process,'' he said, adding that this
gives rise to a number of interesting considerations.

"A large percentage of the people who are online are well educated,
affluent citizens who are often leaders within their communities. I
think there are too many people online for government to successfully
suppress what is developing, this communication mechanism that is
developing so rapidly.

"One of its major advantages for legitimate candidates is that
communications have to be long on information and short on useless
emotional content ... which undoubtedly horrifies some politicians.''

Soaring sales of personal computers are likely to strengthen the new
online electorate. Analysts say that 7 million personal computers were
sold last year, bringing the number of home users to 20 million - plus
60 million in business.

As many as 15 million people are linked on the global Internet
computer network, with the number growing. The commercial service
Prodigy now claims 1.5 million users, while CompuServe claims to reach
980,000, and GEnie around 600,000.

Users of smaller scale community bulletin board systems represent a
potentially even larger group, although it's hard to say where one
begins and the next ends. Boardwatch magazine, which loosely monitors
the field, estimates that there are several tens of thousands of such
BBSs around the country. Each of them allows from a handful to several
hundred personal computer users to call in and trade messages,
computer software, and other information.

Current issues often are hot topics, the most recent example being the
Rodney King verdict in Los Angeles, which is prominent in online
conversation just as it is dominating national news.

In Washington, the chairman of the House Administrative Committee
recently said that all House members will have, by next year, full
interactive access to users of the Internet computer network, which is
quickly eclipsing the academic and military worlds that gave birth to
it.

While the new online electorate is likely to bring change, it is not
supplanting traditional methods. Instead, computer-based conferencing
is adding a new dimension to the traditional process by which a grass
roots candidate is drafted.

Perot, who has not yet himself been spotted online, has become a
beneficiary, as services such as the Whole Earth 'Lectronic Link
(WELL) in San Francisco, the commercial Prodigy information service,
and a "Perot for President'' bulletin board communicate strategy and
rally potential supporters.

As the best known computer link of writers, thinkers and activists,
the WELL has become the online focus of the intellectual issues raised
by the Perot movement.

But the Prodigy service, with its broader presence among non-experts,
has become the battle front, as Perot support ers frantically trade
information on efforts to get his name placed on the ballots of all 50
states.

One typical message recently posted to a Prodigy confer ence promoted
a Perot rally in Houston.

In Colorado, meanwhile, the new "Online for H. Ross Perot'' bulletin
board may offer a measure of the breadth of support.

"I want to send you $5,'' wrote Marjorie Darling, who is described as
"about 80'' and got involved through Senior Net, an activity organized
by Dave Hughes, an online activist who runs the Perot board.

"We hear the third candidate has only been a spoiler' and can never,
or has never made it running for president,'' wrote Darling. "But none
of those has been 'Ross Perot, Business Man.'

"You can make it!''

------------------------------

Date: 10 May 92 20:49:04 EDT
From: Gordon Meyer <72307.1502@COMPUSERVE.COM>
Subject: File 7--Two Cornell Students Indicted in Virus Case

TWO AT CORNELL INDICTED IN VIRUS CASE

Two Cornell University students now have been indicted for felonies in
connection with the computer virus case that came to light last
February at the Ithaca, N.Y., university.

David Blumenthal and Mark Pilgrim are accused of embedding a virus in
three Apple Macintosh computer games that were sent from Cornell's
computer center to an archive at Stanford University. Authorities say
from there, the games were duplicated and wound up in computers across
the U.S., Japan and Great Britain.

Blumenthal, 20, and Pilgrim, 19, who, in convicted, face a maximum
four years in prison, were arrested in February on misdemeanor
charges, which were increased to felonies because the virus is
believed to have caused more than $1,000 in damage, said county
District Attorney George Dentes.

Reprinted from A NETWORKER'S JOURNAL May 8, 1992

------------------------------

End of Computer Underground Digest #4.21
************************************




← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT