Copy Link
Add to Bookmark
Report

Computer Undergroud Digest Vol. 09 Issue 09

  


Computer underground Digest Sun Feb 16, 1997 Volume 9 : Issue 09
ISSN 1004-042X

Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
Archivist: Brendan Kehoe
Shadow Master: Stanton McCandlish
Field Agent Extraordinaire: David Smith
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest

CONTENTS, #9.09 (Sun, Feb 16, 1997)

File 1--Cyber Angels FACES Project
File 2--FYI: "Contributory copyright infringement"
File 3--Re: "Hacking Chinatown"
File 4--Coalition Letter on Privacy and Airline Security
File 5--BELLSOUTH CHALLENGES AT&T ACCESS CHARGE PROPOSAL (fwd)
File 6--Cu Digest Header Info (unchanged since 13 Dec, 1996)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

---------------------------------------------------------------------

Date: Sun, 9 Feb 1997 18:40:06 +0000
From: David Smith <bladex@bga.com>
Subject: Fle 1--Cyber Angels FACES Project

Attached is an excerpt from the December Cyber Angels bulletin
containing the details of their FACES project.


------- Excerpt Begins -------

****************************************************************

USENET TEAM NEWS

USENET "FACE" PROJECT

"FACE" = FREEING ABUSED CHILDREN from EXPLOITATION

WE ARE IN THE PROCESS OF CONSTRUCTING AN ONLINE DATABASE OF THE
FACES OF THE CHILDREN WHO HAVE BEEN ABUSED AND PHOTOGRAPHED TO MAKE
CHILD PORNOGRAPHY


Child pornography as some of you no doubt know is regularly posted to the
Usenet. Child pornography is also illegal - that is why we are regularly
passing evidence to Federal Authorities that we gather from the Usenet.

Who are the children who are used in the child pornography that is posted
to the Usenet? Do you know any? How could you find out? That is exactly
what our FACE UNIT is all about. Our volunteers spend time each week
finding child pornography posts on the Usenet, and cropping the picture so
that just the child's face is left. These faces - the faces of innocent
children who are the victims of abuse crimes by adults - are then passed
with the full header reference to our FACE UNIT Leader. The images are
then posted up to our website, in the hope that as thousands of people pass
through our website someone somewhere may recognize the face of someone in
our online database and then we can contact law enforcement and perhaps
bring someone to justice and rescue an abused child.

To help on this unit you need to have cropping ability - in other words the
ability to take a jpg image and cut out the child's face and make a new jpg
out of it.

NB For legal reasons the FACE UNIT accepts only volunteers 18 years old and
above. You may like to know that this work follows guidelines given to us
by Federal Authorities.

This is pioneering work! YOU can help us! Contact me if you are inspired
to assist us.

The FACE database will open at our main site at the beginning of January.

****************************************************************

---- Excerpt Ends ----

I feel such a database would be a case of "double victimization" --
that someone who was the victim of child pornography would not want
pictures of their faces openly distributed. No one I've spoken to
thinks this is a good idea.

In an exchange of e-mail, Gabriel Hatcher (gabriel@cyberangels.org) politely
disagreed, suggesting that their project would identify children
who are currently being abused and thus rescue/save them from
suffering. He's heard nothing but positive feedback, and is working
with various law enforcement officials to make sure the project is
done properly.

------------------------------

Date: Mon, 17 Feb 1997 17:48:03 -0600 (CST)
From: Jim Davis <jdav@mcs.com>
Subject: Fle 2--FYI: "Contributory copyright infringement"

-----
Date--Sun, 16 Feb 1997 00:15:27 -0600 (CST)
From--Netiva Caftori <uncaftor@uxa.ecn.bgu.edu>

This is a report David Loundy from CPSR Chicago prepares for a committee
which he chairs. fyi

Netiva Caftori, DA (CS dept) e-mail--n-caftori@neiu.edu /\/\/\/\/\
Northeastern Illinois Univ. http://www.neiu.edu/users/uncaftor/home.html

Date--Sat, 15 Feb 1997 14:42:14 -0500
From--"David J. Loundy" <David@loundy.com>

The Law Office of
David J. Loundy
465 Pleasant Avenue Phone: (847) 926-9744
Highland Park, Illinois Electronic Mail: David@Loundy.com
60035-4909 World Wide Web: http://www.Loundy.com/


ISBA INTELLECTUAL PROPERTY SECTION COUNCIL
INTERNET LAW SUBCOMMITTEE REPORT
February 13, 1997
Compiled by David Loundy

A final decision has been reached in the Sega v. MAPHIA case. The court
held that a BBS operator who ran a pirate bulletin board for the
distribution of video games was guilty of contributory copyright
infringement (though direct infringement was not proven), federal trademark
infringement, California trade name infringement, and state unfair
competition.

In Sega Enterprises Ltd v. Sabella, in the Northern District of California,
Sega was granted summary judgment on its claim of contributory copyright
infringement by a BBS operator. The defendant's BBS was used for the
uploading and downloading of pirated games on the BBS. Unlike in the Sega
v. MAPHIA case, the Court denied summary judgment on a trademark
infringement claim based on the system operator's claim that she was not
aware of, and did not authorize, the use of Sega's trademark on the pirated
games.

Hallmark cards received a "cease and desist" letter as a result of its use
of "E-Greetings," as a term for electronic cards marketed off its web site.
Hallmark has filed a challenge with the U.S. Trademark Office over Greet
Street's rights to use E-Greetings claiming the term "E-Greetings" or
anything else prefaced with "e-" is not suitable for trademark protection.

An Oklahoma court has denied journalism professor Bill Loving's request for
an injunction against the University of Oklahoma. The University removed
access on its public news server to all of the "alt.sex" hierarchy of
usenet newsgroups after the group "Oklahomans for Children and Families"
complained that the newsgroups contained illegal content.

Legislation has been introduced in Maryland that would make it illegal to
send "annoying" or "embarrassing" e-mail. It is similar to a bill
currently working its way through the New York legislature.

Another suit was filed against the Communications Decency Act. The
webmaster of the "annoy.com" web site filed for a preliminary injunction
against Janet Reno on Jan. 30. The suit specifically targets the "with
intent to annoy" provision of the act, since that is what the web site is
intended to do. The creator's intent is to create an online service that
delivers scathing, anonymous postcards to public figures, as well as
provide controversial commentary on "hot button" issues. One of the
reasons behind the sites creation and accompanying lawsuit was the
creator's frustration that all of the press surrounding the CDA focused on
its attempts to protect minors, without addressing the impact on adult
speech.

Sen. Patrick Leahy introduced a bill that would repeal amendments to the
Communications Act made by the CDA. In the mean time, 22 members of
Congress filed an Amici Curiae brief with the Supreme Court in Reno v. ACLU
in support of the Communications Decency Act (the brief is available at
http://www.cdt.org/ciec/SC_appeal/970121_Cong_brief.html).

In New York, U.S. District Judge Kimba Wood has issued a temporary
restraining order against Richard Bucci, an anti-abortion activist who
registered the domain name "plannedparenthood.com." Mr. Bucci registered
the domain and set up a web site labeled as "Planned Parenthood's Home
Page" from which he sold an anti-abortion book. Planned Parenthood
Federation of America has sued Bucci alleging his use of the group's name
constitutes trademark infringement. A Feb. 20 hearing on a motion for a
preliminary injunction is scheduled.

A U.S. District Judge in North Carolina has denied Gateway2000's motion for
a preliminary injunction against gateway.com, Inc. for use of its domain
name. Gateway2000 claims that use of the domain name gateway.com
constitutes trademark infringement, trademark dilution, and predatory
business practices.

In Cardservice International, Inc. v. McGee, 1997 WL 16795 (E.D. Va. Jan.
17, 1996), Judge Clarke issued a permanent injunction against using
cardservice.com or csimall.com as a domain name-- stating that the use of
at least the cardservice.com name constitutes trademark infringement. It
is worth noting that csimall.com in no way resembles the plaintiff's
trademark, and was registered by the defendant to use to in "guerilla
warfare" against the plaintiff. For the first time in a domain name case
the judge also awarded attorneys' fees.

The Internet Ad-Hoc Committee has released its final report on how the
domain name system should be changed (available at http://www.iahc.org/).
The report recommends the creation of seven new top-level domains, plus the
creation of an international trademarks domain. It also advocates the
creation of a trademark domain under each individual country's top level
domain. The report also sets forth a plan that top level domain
administration will be shared by multiple registrars, including the .com
top level domain as soon as NSI's contract expires. The report calls for a
non-mandatory 60 day publication period on all registered domain names. It
also provides for a dispute resolution policy to be used for trademark
conflicts (which will probably be somewhat ineffectual).

In Heroes, Inc. v. Heroes Foundation, No. 96-1260, Judge Flannery found
that the defendants web page, along with a Washington Post ad, which
solicited charitable contributions from its location in New York
constituted sufficient minimum contacts to allow the court to exercise
jurisdiction in the trademark infringement action. The judge refused to
hold that the web page alone was enough to confer jurisdiction-- pointing
out some of the conflicting Internet jurisdiction cases.

Suit has been filed in the United States District Court for the Western
District of Pennsylvania by an Internet Service Provider against another
ISP and some of its staff. The claim is that the service provider spammed
the plaintiff and its users thereby violating Section 227(b)(1)(C) of the
Telephone Consumer Protection Act-- the "junk fax" law.

In Nevada, legislation has been introduced which would prohibit a sending
unsolicited e-mail to solicit a person to purchase real property, goods or
services unless the recipient has a pre-existing business relationship with
the message sender.

On February 3, 1997, Judge James L. Graham of the United States District
Court for the Southern District of Ohio preliminarily enjoined Cyber
Promotions, Inc. and its president, Sanford Wallace from e-mailing ads to
CompuServe subscribers. The Court argued that while making available an
e-mail account provides tacit approval to send e-mail to that account,
Cyber Promo's use of the CompuServe system exceeded any tacit approval and
therefore Cyber Promo's actions constitute a trespass to chattels.

Cyber Promotions, Inc. has settled with America Online, in part because of
having lost its fight against CompuServe. (In which the judge made some
comments about the applicability of his decision to the AOL case.)
According to a litigation attorney for AOL, Stanford Wallace (president of
Cyber Promo) "agreed to the entry of an injunction restricting him to use
only domains that could be blocked by AOL's Preferred Mail tool and which
requires him to provide a viable remove option for AOL members, he
dismissed all of his claims against AOL with prejudice and dismissed his
appeal of the state action/First Amendment decision which was pending in
the Third Circuit."

America Online has had another 5 class action suits filed against it
(bringing the total to 6) by customers who are unable to log on to the
service due to busy phone lines caused by increased usage after AOL
instituted a flat-rate pricing scheme. AOL settled with 36 state attorneys
general who became interested in AOL's problems by promising to offer
refunds, reduce advertising, hire more phone staff to handle cancellations,
put a notice on any advertising already in the works that there may be some
delays in logging on, and cap the subscriber base until its network
infrastructure has been improved.

A Florida mother is suing America Online, claiming it allowed a subscriber
to distribute pornographic pictures of her son and two other boys to
pedophiles. The suit alleges that AOL is breeding "a home shopping network
for pedophiles and child pornographers." Others claim that the suit is
analogous to suing New York for having pedophiles living in the city.

The Executive Committee of the New York State Bar Association has adopted
the bar association's opinion on the use of e-mail in attorney-client
communications. The opinion states that "merely because a communication
took place over e-mail, or by similar electronic means, it would not lose
its privileged nature." The opinion (at
http://www.nysba.org/committees/cplr/library/4547.html) does, however,
state that there are some communications that would be too sensitive to
trust to e-mail (such as communicating trade secrets or confessions).

The Consumer Internet Privacy Protection Act of 1997 (H.R. 97) has been
introduced in the House. The Act, among other things, provides that "an
interactive computer service shall not disclose to a third party any
personally identifiable information provided by a subscriber to such
service without the subscriber's prior informed written consent."

The 6th Circuit affirmed the dismissal of the indictment against Jake Baker
(by a 2-1 vote). Jake Baker is the former University of Michigan student
who posted a piece of "erotic fiction" on the Internet which described the
sexual torture and murder of a classmate, who was mentioned by name.

Jayne Hitchcock is suing the Woodside Literary Agency in New York federal
court alleging that people at or affiliated with the agency electronically
impersonated, harassed, and defamed her with what she describes as a
scorched-earth slander campaign in retaliation for her attempts to warn
others away from the agency. She received over 200 e-mail messages from a
forged address. Her literary agent received forged e-mail, reporting to be
from her, threatening to cancel her contract. Even a personal add was
forged stating "Female International Author, no limits to imagination and
fantasies, prefers group ma\cho/sadistic interaction including lovebites
and indiscriminate scratches. . . . Will take your calls day or night." was
posted to various places on the Internet-- listing Ms. Hitchcock's name,
address, and phone number. The suit seeks $10 million in damages.

An Internet scam has cost some Canadian victims up to $1,200 in phone
bills. Web surfers are offered the opportunity to download free nude
pictures from a web site, however, the people are told that they must
download a "special image viewer" first. The "viewing" software,
unbeknownst to most users, hangs up the modem from the user's local service
provider and quietly reconnects the call to a number in Moldavia. Canadian
police have ordered that all outgoing calls to the number in Moldavia be
blocked.


INTERNATIONAL

The United Arab Emirates state-owned Emirates Telecommunications
Corporation (Etisalat) has put into place national proxy servers which will
route all Internet traffic and censor selected Internet sites which
conflict with local moral values and traditions.

Berlin prosecutors have filed charges against Angela Marquardt, a leader of
Germany's reform communist Party of Democratic Socialism (PDS), for placing
a link on her home page to the outlawed Radikal magazine. A Berlin
prosecutor's office spokesman is quoted by Reuters as saying that "It is
illegal in Germany to teach others how to commit a felony or to sanction a
felony."

Attorneys for the Australasian Mechanical Copyright Owners Society (AMCOS)
and the Australian Music Publishers Association Limited (AMPAL) forced have
shut down Internet archives of song lyrics and MIDI (Musical Instrument
Digital Interface) files located at two Australian Universities (Monash
University and the University of Western Sydney) to remove the material
from sites at those schools.



MISCELLANEOUS

WebTV and OnCommand, Inc. have teamed up to provide Internet access in
hotel rooms to business travellers. The companies claim that half of all
business travellers already subscribe to an on-line service.

UPS is making its database of digitized signatures available to anyone with
a computer, modem, and package tracking number. You can download the
software from the Internet and have your modem reconnect to an 800 number
for access to the database.

------------------------------

Date: Mon, 10 Feb 1997 19:51:22 -0800 (PST)
From: Daniel Brown <bidorn19@idt.net>
Subject: Fle 3--Re: "Hacking Chinatown"

> Re CuD - -"Hacking Chinatown"
>
> "Hacking Chinatown"
> by
> Richard Thieme

This article agitates the long-abused word 'hack'. As I call myself a
hacker, I wish to clean up this mess thoughoughly. I invite you to RTFM
-- try reading the Jargon File (http://www.ccil.org/jargon).

First of all, nothing I do which I call hacking is illegal, or frowned
upon by security people. Some who read, say, alt.2600, are in another
boat than I am. What do I call hacking? Here's an excerpt from the
Unofficial alt.hackers FAQ:

In short, hacking is about using available technology in a creative
way to solve a problem. It can be a stupid problem and an ugly
solution, as long as it is a new and creative solution. Hacking
extends to all forms of technology, not just computers--using the
thighbone of an antelope to bash in the head of another antelope was
an excellent hack.

As well, a 'hack' is often an object. A section of code could be an
example, if you 'hacked it up'. I have a home-made
headphone-to-"line in" converter (it's a headphone plug I put into my CD
player, and soldered to it are "line in" wires for left and right sound that
goes into my cassette/radio player), and I call that a mini hack.

Do you get the idea?

On a historical note, many crackers think the history of hacking begins
the same as all hackers know it ... that TMRC at MIT (late 1950s) was the
birthplace of curious techies who called themselves 'hackers', who found
the TX-0, and worked on this first of the minicomputers, and their
influence spread to places like the SAIL. Where the ideas diverge is
that crackers, quite possibly from Levy's book named "Hackers" (1984),
think that that culture died (quite possibly when MIT's ITS machine was
shut down) and now the current "breed" of hackers are those who crack
security.

Wrong. How that definition arrived was by journalistic misuse of the
work 'hackers', after some hackers who were curious about security got
into the habit of cracking BBSs. (The first word used to defend against
this misuse was to call people who did this 'worms'; this failed, and a
couple years later, the term 'cracker' got started.) The original
culture did not die per se; hackers still continued to thrive (there
were other ITS machines, most notably at SAIL; micros were another
interest). But this small minority of crackers within hackerdom got
media attention, and soon the public's definition of hackers turned and
took on approximately the same definition today. What do you get?
People who call them hackers but never saw a minicomputer in their life,
beleive IBM invented the PC, and think hacking is all about cracking.

The culture that was spawned in MIT has a direct link to the real hacker
culture of today. The interests have not really changed.. hackers still
create their own Operating System (Linux comes to mind), still optimize
code for speed, still find solutions to unique problems, .. you get the
idea. I mean to say that cracking isn't "the current generation of
hacking". The two are different, and I'm tired of one marring the
validity of the other (cracking on hacking).

Specific responses follow...

> Hacking means tracking -- and counter-tracking -- and
> covering your tracks -- in the virtual world. Hacking means
> knowing how to follow the flow of electrons to its source and
> understand on every level of abstraction -- from source code to
> switches and routers to high level words and images -- what is
> really happening.

You make understanding the idea of abstraction a wizardly concept, which
is bogus.

> Hackers are unwilling to do as little as possible. Hackers
> are need-to-know machines driven by a passion to connect
> disparate data into meaningful patterns. Hackers are the online
> detectives of the virtual world.
> You don't get to be a hacker overnight.

Actually, it's a lifestyle. You could develop hackish habits/
preoccupations (creating jargon, consuming curiosity, enjoying the
accomplishment of something unheard of, ...), but never know these same
qualities were common in a culture wich mades computers what they are
now. (I mean that. The person to invent the PC was a hacker who decided
to make a computer out of the Intel 4004, even though noone thought it
would be possible. Some Linux hackers look to the Nintendo 64 with a
similar inspiration -- a possible host for a Linux microkernel :)

You *could* "make" yourself into a hacker, though. If you drive yourself
crazy enough :-).

> The devil is in the details. Real hackers get good by
> endless trial and error, failing into success again and again.

Wrong. This is characteristic of crackers, and is primarily useful for
their art. (Should I dare call it so? Breaking into computers is *NOT*
beautiful). Real hackers avoid tedium, and read the manual(s) and devise
their hacks before making them. "Trial and error" is a facet of lacking
brilliance.

> Isn't it ironic that curiosity, the defining characteristic
> of an intelligent organism exploring its environment, has been
> prohibited by folk wisdom everywhere?

Cracking does not involve intelligence. At most, it involves 5%
cleverness spent on finding new exploits (that is, if the perpetrator has
nothing to exploit first), and 95% dogged determination (spent on
activities as garbaging). The mental capacity used for such skill aught
to be garbage collected for helpful activities. Graduate high school,
and go to a university where real hackers will teach you.

> The endless curiosity of hackers is regulated by a higher
> code that may not even have a name but which defines the human
> spirit at its best. The Hacker's Code is an affirmation of life
> itself, life that wants to know, and grow, and extend itself
> throughout the "space" of the universe. The hackers' refusal to
> accept conventional wisdom and boundaries is a way to align his
> energies with the life-giving passion of heretics everywhere. And
> these days, that's what needed to survive.

You mean the Hacker Ethic? I always freely distribute my software (by
either putting it in the Public Domain or giving it the GNU Copyleft). What
about you?

> We know we build on quicksand, but building is too much fun
> to give up. We know we leave tracks, but going is so much more

The Free Software Foundation is a collection of hackers that makes
excellect freeware in alternative to proprietary tools. Much of their
software is ancient in that it was created a long time ago (in computer
historical terms, at least), but is still around today because it is
always maintained. If you say "we build on quicksand", I don't doubt you
talk about cracking, and it proves cracking is backwards, hacking is
forwards.

> To say that when we engage with one another in cyberspace we
> are "Hacking Chinatown" is a way to say that asking questions is
> more important than finding answers. We do not expect to find
> final answers. But the questions must be asked. We refuse to do
> as little as possible because we want to KNOW.

You say that asking questions is more important than the answers. True,
you can't seek something if you don't wonder about it (this true to
hacking too), but real hacking delights in finding the answers (or the
answers, depending on the purpose of the hack).

I really tell you, cracker ideals are teenagerisms about technology.
Hackers don't say thing in w!3rd w4yz, because there is no joy in that.
It also goes against the logical use of the English language (you can't
really hack if you can't think logically). Also, doing something in
retaliation is illogical (ie, breaking into the IRS to find the auditing
selection code, because the IRS refuses to release it) -- it isn't the
Right Thing, which would be a) work out the problem, or b) forget it.

There's a gulf of difference between hacking and the ecstatic feeling
that hackers get when they circumvent a limitation or apply something
brand new, and cracking which searches to satisfy a adolescent's
problem (I say this in psychological terms; all stages of life have their
problems to solve).

If you want to be a hacker, read my .sig. But if you don't, please
distinguish between the words 'hack' and 'crack'.

------------------------------

Date: Wed, 12 Feb 1997 20:41:26 -0500
From: Dave Banisar <banisar@EPIC.ORG>
Subject: Fle 4--Coalition Letter on Privacy and Airline Security

A HTML version of this is available at
http://www.epic.org/privacy/faa/airline_security_letter.html


February 11, 1997

Vice President Albert Gore, Jr.
The White House
1600 Pennsylvanpia Ave, NW
Washington, DC 20500

Dear Mr. Vice President,

We are writing to you to express our views on the serious civil
liberties issues raised by recent government activities in the name of
airline security. These include recent orders issued by the Federal
Aviation Administration, and also proposals recommended by the White House
Commission on Aviation Safety and Security and the FAA Advisory Aviation
Security Advisory Committee.

Many of these proposals were developed in the highly-charged
atmosphere following the still-unsolved crash of TWA Flight 800 and reflect
a misguided rationale that something had to be done, no matter how marginal
in value or violative of individual rights.

We all feel strongly that air travel must be safe - nobody wants to
feel that to set foot on an airplane or an airport is to take a substantial
safety risk. However, basic civil liberties protected by the Constitution
should not be sacrificed in the name of improving air safety, especially
where the potential benefits are questionable. At the airport ticket
counter, passengers check their luggage, not their constitutional rights.


Identification

One area of concern is a secret FAA order issued in August 1995 and
apparently revised in October 1995. The FAA order purportedly requires
airlines to demand government-issued photo identification from all
passengers before they can board an airplane. It remains unclear whether a
passenger must provide that identification and what discretion an airline
has to allow, or refuse, any passenger to board if they refuse to provide
identification or simply do not have any available.

Americans are not required to carry government-issued
identification documents. Any requirement that passengers show
identification raises substantial constitutional questions about
violations of the rights to privacy, travel, and due process of law. The
Supreme Court has consistently struck down laws that interfere with the
constitutional right to travel. The Court has also overturned laws in a
variety of circumstances that require an individual to provide
identification in the absence of any specific suspicion that a crime has
been committed. In addition, it is unclear that requiring passenger
boarding an aircraft to identify him or herself actually makes the people
with whom they travel any safer. A bomber with a fake ID is just as
effective as a bomber with no ID.

We urge the FAA to withdraw its directive and to notify airlines
that identification should not be requested for security reasons. At a
minimum, the FAA should require airlines to post notices telling passengers
that they cannot be denied boarding just because they fail or refuse to
identify themselves.


Computer Databases and Profiling

Another major concern involves the proposed increased utilization
of the practice of "profiling" passengers to determine whether they pose a
security risk and should thus be searched. This would require the
collection of personal information on passengers prior to their boarding a
plane. Information that may be collected includes a picture or other
biometric identifier, address, flying patterns with a particular airline,
bill paying at a particular address, criminal records, and other
information. This, and information gleaned from observing the persons with
whom the passenger was traveling, would be fed into a computer data base
that would be used to decide whether the passenger "fits the profile" and
should be subjected to heightened security measures. Under this proposal,
the checked luggage of people selected by the computer would be scanned by
new sophisticated scanning devices.

The risks to privacy are enormous and run not only to those who
"fit the profile." For this system to be useful, it must apply to every
person who might take a flight, i.e., to everybody. A new government
dossier on everyone would have to be created, computerized, and made
accessible to airline personnel.

In addition, for the system to be useful, it would have to be
linked to other data bases and constantly updated. Each time a person
changes their address or takes another flight, or does anything related to
the characteristics about them deemed significant by the profiling system,
the government would track it. All of our experience with the creation and
updating of such ever-changing data bases teaches us that the likelihood of
inaccuracy at any given moment is high. The FBI, for instance, recognizes
that data in its computer system of criminal records has an inaccuracy
rate of 33 percent. Such inaccuracy would lead to both a breach of safety
and to violations of the rights of innocent people. This proposal is a
quick fix that won't fix anything.

The proposal also violates a central principle of the Code of Fair
Information Practices and the Privacy Act (5 U.S.C =A7 552a): information
given to the government for one purpose ought not be used for other
purposes without the consent of the person to whom it pertains. The use of
criminal records in such a data base, particularly where those records
include arrests that do not result in convictions, is particularly
troubling.

Profiling also frequently leads to discriminatory practices.
Already, we have received numerous reports of discrimination against
individuals and families with children who have been refused entry onto
aircraft because their names appeared to be of Middle-Eastern origin. In
the well publicized example of security guard Richard Jewel, reports
indicated that the FBI profile led the police to unfairly target Mr. Jewel
for the incident, even in the absence of other evidence. This incident
vividly shows the limitations of basing a law enforcement decision on a
profile.

We urge the FAA and airlines to discontinue the use of passenger
profiling.

X-Ray Cameras

We also view with concern proposals to install in airports new
cameras which can depict highly detailed images of individuals' bodies
under their clothes. Existing scanners, the development of which was
partially funded by the FAA, already show a revealing and invasive picture
of a naked body in high detail and the technology is likely to improve.
This is clearly a search under the Fourth Amendment and is far more
intrusive than a standard metal screening device. Passengers should not be
subject to an "electronic strip search" in order to board an aircraft. To
expose travelers' anatomies to the general public or even to selected (not
by the victim of the unreasonably intrusive search) strangers is extremely
embarrassing and shocking to the conscience.

We urge the FAA to reject proposals to use body scanners capable of
projecting an image of a person's naked body.

Secrecy

Much of the key decision-making surrounding these proposals has
been shrouded by secrecy. The FAA has claimed that it is exempt from open
government laws and has refused to release its directives on profiling and
identification. Relevant meetings have been closed to the public or limited
to participants who can afford to pay expensive fees.

We urge the FAA to publish its directives and open all further
decision making open to public scrutiny.

Conclusion

In conclusion, we believe that these proposals raise grave
constitutional issues and are likely to produce only minimally beneficial
results to improve airline safety. We urge the FAA and the advisory
commissions to focus their efforts on improving security in a balanced and
rational manner that is open to public scrutiny and consistent with
constitutional rights.


Sincerely,


Houeida Saad
American-Arab Anti-Discrimination Committee

Greg Nojeim
American Civil Liberties Union

Maher Hanania
American Federation of Palestine

James Lucier, Jr., Director of Economic Research
Americans for Tax Reform

Aki Namioka, President
Computer Professionals for Social Responsibility

Lori Fena, Executive Director
Electronic Frontier Foundation

David Banisar, Staff Counsel
Electronic Privacy Information Center

Ned Stone
Friends Committee on National Legislation

Judy Clarke, President
National Association of Criminal Defense Lawyers

Kit Gage, Washington Representative
National Committee Against Repressive Legislation

Audrie Krause, Executive Director
NetAction

Sharisa Alkhateeb
North American Council of Muslim Womem

Simon Davies, Director General
Privacy International

Robert Ellis Smith, Publisher
Privacy Journal

Evan Hendricks, Chairman
US Privacy Council and Publisher, The Privacy Times

Enver Masud
Executive Director
The Wisdom Fund

John Gilmore
Civil Libertarian and co-founder, The Electronic Frontier Foundation


-------
David Banisar (Banisar@epic.org) * 202-544-9240 (tel)
Electronic Privacy Information Center * 202-547-5482 (fax)
666 Pennsylvania Ave, SE, Suite 301 * HTTP://www.epic.org
Washington, DC 20003 * PGP Key
http://www.epic.org/staff/banisar/key.html =20



------------------------------

Date: Mon, 3 Feb 1997 16:50:24 -0500 (EST)
From: "noah@enabled.com" <noah@enabled.com>
Subject: Fle 5--BELLSOUTH CHALLENGES AT&T ACCESS CHARGE PROPOSAL (fwd)

From -Noah

---------- Forwarded message ----------
Date--Mon, 27 Jan 1997 14:35:29 -0500 (EST)
From--BellSouth <press@www.bellsouth.com>

BellSouth ............................................January 24, 1997

BELLSOUTH CHALLENGES AT&T ACCESS CHARGE PROPOSAL

Background: AT&T told reporters Thursday that they will ask the Federal
Communications Commission to slash the price they pay to local telephone
companies for use of the local lines to deliver calls to businesses and
home customers.

The following response may be attributed to David J. Markey, BellSouth
vice president governmental affairs.

"As usual, AT&T is looking for a federally enforced free ride.

"The Commission should ignore their rhetoric and the Congress should
monitor this process closely.

"At risk is the ability of the local telephone industry to maintain and
improve the public telephone network.

"AT&T wants the FCC to ignore our real costs. The AT&T analysis of what
they think our costs ought to be is based on the so-called Hatfield model
which has not been accepted by most state commissions. TELRIC prices an
imaginary network and has been discredited by the noted economist, Alfred
Kahn who points out that the TELRIC approach doesn't take into
consideration the costs of maintaining the network or the costs of
universal service.

"Congress was told by the FCC that the so-called trilogy of proceedings
interconnection, universal service and access charges) would result in a
balanced implementation of the Telecommunications Act of 1996. We're
still looking for that balance.

"First the Commission ordered us to allow companies like AT&T to buy our
service at half price through the "unbundled elements" scheme. Then they
proposed a universal service regime that requires us to provide more
services, like wiring inside school buildings for which we are not fully
paid and now AT&T thinks we should give them another half-price ride on
our network.

"It's pretty clear that long distance oligopolists, offered the choice of
leasing our service below cost or spending money to build their own local
facilities, are choosing the cheap approach. At that rate, no one will
build their own networks. So, the improvements Congress envisioned and
the people were promised won't come. AT&T won't build it and we won't
have the money to and we may not even have the money to maintain the
network to the same high level customers have come to expect.

Some potential facilities based competitors, like cable companies, have
looked at the new and proposed rules and decided there's no way to pay for
network improvements if AT&T can cream-skim all the business by just
re-selling our service.

"The commission needs to ignore AT&T's posturing and provide the balance
they promised Congress."


(A copy of Dr. Kahn's letter can be found at
http://www.bellsouthcorp.com/headlines/bell_releases/97/jan/kahnltr.html)

####

BellSouth is a $19 billion communications services company. It provides
telecommunications, wireless communications, directory advertising and
publishing, video and information services to more than 25 million
customers in 17 countries worldwide.


##

Internet users: For more information about BellSouth Corporation visit the
BellSouth Webpage http://www.bellsouth.com

BellSouth Corporation news releases dating back one year are available by
fax at no charge by calling 1-800-758-5804, Ext. 095650.


For information: Bill McCloskey 202-463-4129

------------------------------

Date: Thu, 15 Dec 1996 22:51:01 CST
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: Fle 6--Cu Digest Header Info (unchanged since 13 Dec, 1996)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send post with this in the "Subject:: line:

SUBSCRIBE CU-DIGEST
Send the message to: cu-digest-request@weber.ucsd.edu

DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.

The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

To UNSUB, send a one-line message: UNSUB CU-DIGEST
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
(NOTE: The address you unsub must correspond to your From: line)

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
In ITALY: ZERO! BBS: +39-11-6507540
In LUXEMBOURG: ComNet BBS: +352-466893

UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)


The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
URL: http://www.soci.niu.edu/~cudigest/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.

------------------------------

End of Computer Underground Digest #9.09
************************************

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT