💾 Archived View for gemini.spam.works › mirrors › textfiles › magazines › CUD › cud0681.txt captured on 2022-06-12 at 10:56:22.
-=-=-=-=-=-=-
Computer underground Digest Wed Sep 14, 1994 Volume 6 : Issue 81 ISSN 1004-042X Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) Archivist: Brendan Kehoe Retiring Shadow Archivist: Stanton McCandlish Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Urban Legend Editor: E. Greg Shrdlugold CONTENTS, #6.81 (Wed, Sep 14, 1994) File 1--Re: Exon Amendment -- text of existing laws File 2--"Computer Related Crime" (Book Review) File 3--First French book on Internet (Book Review) File 4--Clipper T-shirts File 5--Five "Hackers" Indicted for Credit Card/Computer Fraud File 6--Wiretap Bill Update File 7--Women's Work and Informatics -- Call for Contributions File 8--GovAccess.048: SF ElEx free candidate info & net hosts/GNPs File 9--Cu Digest Header Information (last changed 11 Sep '94) CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN THE CONCLUDING FILE AT THE END OF EACH ISSUE. ---------------------------------------------------------------------- Date: Tue, 13 Sep 1994 13:08:09 -0400 (EDT) From: Steve Barber <sbarber@panix.com> Subject: File 1--Re: Exon Amendment - text of existing laws OK, so now that we've put the Exon amendment text out there (see CuD 6.79), it occurred to me that it isn't all that useful if you don't have the text of what it proposes to amend! So here is Section 223 of the Communications Act as it exists today, and the text of the "safe-harbor" regulation that implements part of it. -Steve Barber ============================ FCC RESTRICTIONS ON OBSCENE AND INDECENT TELEPHONE TRANSMISSIONS A. STATUTE - Title 47, Section 223 of the United States Code (rev. 1989) @ 223. Obscene or harassing telephone calls in the District of Columbia or in interstate or foreign communications (a) Whoever-- (1) in the District of Columbia or in interstate or foreign communication by means of telephone-- (A) makes any comment, request, suggestion or proposal which is obscene, lewd, lascivious, filthy, or indecent; (B) makes a telephone call, whether or not conversation ensues, without disclosing his identity and with intent to annoy, abuse, threaten, or harass any person at the called number; (C) makes or causes the telephone of another repeatedly or continuously to ring, with intent to harass any person at the called number; or (D) makes repeated telephone calls, during which conversation ensues, solely to harass any person at the called number; or (2) knowingly permits any telephone facility under his control to be used for any purpose prohibited by this section, shall be fined not more than $ 50,000 or imprisoned not more than six months, or both. (b)(1) Whoever knowingly-- (A) within the United States, by means of telephone, makes (directly or by recording device) any obscene communication for commercial purposes to any person, regardless of whether the maker of such communication placed the call; or (B) permits any telephone facility under such person's control to be used for an activity prohibited by subparagraph (A), shall be fined in accordance with title 18, United States Code, or imprisoned not more than two years, or both. (2) Whoever knowingly-- (A) within the United States, by means of telephone, makes (directly or by recording device) any indecent communication for commercial purposes which is available to any person under 18 years of age or to any other person without that person's consent, regardless of whether the maker of such communication placed the call; or (B) permits any telephone facility under such person's control to be used for an activity prohibited by subparagraph (A), shall be fined not more than $ 50,000 or imprisoned not more than six months, or both. (3) It is a defense to prosecution under paragraph (2) of this subsection that the defendant restrict access to the prohibited communication to persons 18 years of age or older in accordance with subsection (c) of this section and with such procedures as the Commission may prescribe by regulation. (4) In addition to the penalties under paragraph (1), whoever, within the United States, intentionally violates paragraph (1) or (2) shall be subject to a fine of not more than $ 50,000 for each violation. For purposes of this paragraph, each day of violation shall constitute a separate violation. (5)(A) In addition to the penalties under paragraphs (1), (2), and (5), whoever, within the United States, violates paragraph (1) or (2) shall be subject to a civil fine of not more than $ 50,000 for each violation. For purposes of this paragraph, each day of violation shall constitute a separate violation. (B) A fine under this paragraph may be assessed either-- (i) by a court, pursuant to civil action by the Commission or any attorney employed by the Commission who is designated by the Commission for such purposes, or (ii) by the Commission after appropriate administrative proceedings. (6) The Attorney General may bring a suit in the appropriate district court of the United States to enjoin any act or practice which violates paragraph (1) or (2). An injunction may be granted in accordance with the Federal Rules of Civil Procedure. (c)(1) A common carrier within the District of Columbia or within any State, or in interstate or foreign commerce, shall not, to the extent technically feasible, provide access to a communication specified in subsection (b) from the telephone of any subscriber who has not previously requested in writing the carrier to provide access to such communication if the carrier collects from subscribers an identifiable charge for such communication that the carrier remits, in whole or in part, to the provider of such communication. (2) Except as provided in paragraph (3), no cause of action may be brought in any court or administrative agency against any common carrier, or any of its affiliates, including their officers, directors, employees, agents, or authorized representatives on account of-- (A) any action which the carrier demonstrates was taken in good faith to restrict access pursuant to paragraph (1) of this subsection; or (B) any access permitted-- (i) in good faith reliance upon the lack of any representation by a provider of communications that communications provided by that provider are communications specified in subsection (b), or (ii) because a specific representation by the provider did not allow the carrier, acting in good faith, a sufficient period to restrict access to communications described in subsection (b). (3) Notwithstanding paragraph (2) of this subsection, a provider of communications services to which subscribers are denied access pursuant to paragraph (1) of this subsection may bring an action for a declaratory judgment or similar action in a court. Any such action shall be limited to the question of whether the communications which the provider seeks to provide fall within the category of communications to which the carrier will provide access only to subscribers who have previously requested such access. B. FCC REGULATION - Title 47, Section 64.201 of the Code of Federal Regulations Restrictions on obscene or indecent telephone message services. 47 CFR 64.201 It is a defense to prosecution under section 223(b) of the Communications Act of 1934, as amended, 47 U.S.C. 223(b), that the defendant has taken one of the actions set forth in paragraph (a), (b), or (c) of this section to restrict access to prohibited communications to persons eighteen years of age or older, and has additionally complied with paragraph (d) of this section, where applicable: (a) Requires payment by credit card before transmission of the message; or (b) Requires an authorized access or identification code before transmission of the message, and where the defendant has: (1) Issued the code by mailing it to the applicant after reasonably ascertaining through receipt of a written application that the applicant is not under eighteen years of age; and (2) Established a procedure to cancel immediately the code of any person upon written, telephonic or other notice to the defendant's business office that such code has been lost, stolen, or used by a person or persons under the age of eighteen, or that such code is no longer desired; or (c) Scrambles the message using frequency inversion techniques so that it is unintelligible and incomprehensible to the calling party without use of a descrambler by the calling party; and (d) Where the defendant is a message sponsor or subscriber to mass announcement services tariffed at this Commission and such defendant prior to the transmission of the message has requested in writing to the carrier providing the public announcement service that calls to his message service be subject to billing notification as an adult telephone message service. ------------------------------ Date: Mon, 05 Sep 1994 15:11:36 -0600 (MDT) From: "Rob Slade, Ed. DECrypt & ComNet, VARUG rep, 604-984-4067" Subject: File 2--"Computer Related Crime" (Book Review) BKCMRLCR.RVW 940622 Loompanics Unlimited P.O. Box 1197 Port Townsend, WA 98368 loompanx@pt.olympus.net "Computer Related Crime", 1-55950-027-1, U$10.00 This purports to be Field Circular 19-146 of the US Army Military Policy School. Supposedly intended for US Army Criminal Investigation (Defence?) Command Special Agents only, it appears to be an unauthorized photocopy of a typed government document. No date is included in any of the supposed government material: the Loompanics copyright date is 1990. It doesn't really matter if this is an official government document or not. The material is fairly pedestrian: after a reasonably detailed set of instructions on how to exercise a search warrant for computer equipment (although not how to analyze the equipment, once you have it), the bulk of the book defines various types of computer crimes. Much of this would have serious data security types going, "Well, maybe ...," but, at the same time, it isn't bad enough as to indicate that American military policy are being misinformed in what is, after all, a specialized topic. A possibly interesting bit of arcana for the well-stocked data security library. copyright Robert M. Slade, 1994 BKCMRLCR.RVW 940622 ====================== DECUS Canada Communications, Desktop, Education and Security group newsletters Editor and/or reviewer ROBERTS@decus.ca, RSlade@sfu.ca, Rob Slade at 1:153/733 Author "Robert Slade's Guide to Computer Viruses" (Sept. '94) Springer-Verlag ------------------------------ Date: 06 Sep 1994 12:47:08 GMT From: JeanBernard_Condat@EMAIL.FRANCENET.FR(JeanBernard Condat) Subject: File 3--First French book on Internet (Book Review) New Book in Franch Language: INTERNET Internet is now available from Editions JCI, Inc. (2700 Joliette #201, Montreal, Quebec, H1W 3G9, Canada) The *Internet* book goes beyond all business school case studies and descriptions of Internet tools, teaching French readers how to effectively use the Internet to boost sales and cut costs. Through real world examples and expert advice, you'll learn how to use the Internet to build European/international market share, track down business leads, communicate with colleagues, search online databases, provide cost- effective customer support and access time-critical information. You'll also explore the many business opportunities now available on the Internet and get tips on shopping for the best deal on Internet access and cybel-mail space. Just as importantly you'll learn about the culture of the Internet, find out what type of advertising is acceptable and can generate a positive response, and which forms are verboten and can provoke community hostility (the famous 'nethiquette'). The *Internet* also contain detailed descriptions of the author's first- hand and experienced experience in doing business on the Internet. Co- author Jean-Bernard Condat is a veteran information science writer and publisher of electronic newsletter that tracks trends and developments in electronic newspaper and magazine publishing. Co-author Nicolas Pioch is the conceptor of WebLouvre--Paris, the first consulted WWW in Europe (http://www.enst.fr/~pioch). Here's the basic information: Jean-Bernard Condat & Nicolas Pioch, "Internet", J.C.I. Inc., Oct. 1994, 224 pages, 195 FF (CAN$29.95), ISBN 2-921599-06-6. Table des Matieres: 1. Preface; 2. Premieres notions; 3. Documentation Internet; 4. Le courrier electronique; 5. Smileys (emoticons); 6. telnet; 7. Formats de fichiers; 8. FTP; 9. Archie; 10. Prospero; 11. Usenet/newsgroups; 12. Netiquette; 13. WAIS; 14. Gopher; 15. WWW; 16. cryptographie; 17. Adresses utiles; 18. MacTCP/PPP; Index. Note that you can receive more information on this publication by ordering it direct from: - Diffulivres, Canada: +1 514 738 2911, fax: +1 514 738 8512; - Distique, France: +33 37 34 84 84, fax: +33 37 30 78 65; - Context SA, Belgium: +32 41 40 19 82, fax: +32 41 490 19 82; - Micro-Distribution, Switzerland: +41 227843482, fax +41 227840945. Don't hesitate to contact us for more information on Internet... in France. Jean-Bernard Condat, 47 rue des Rosiers, 93404 St-Ouen Cedex, France Tel: +33147874083, Fax: +33149450129, Alphapage: +3336605050 code 0030006 Email: JeanBernard_Condat@Email.FranceNet.FR *or* an113309@anon.penet.fi ------------------------------ Date: 7 Sep 1994 20:40:52 -0700 From: normh@CRL.COM(Norman J Harman) Subject: File 4--Clipper T-shirts Information and opposition to the Clipper proposal is strong on the Internet. But it is far too unknown to the 'outside' community. Everyone concerned by this issue should inform all the people they know of its implications. One way to increase awareness and show your opinion is to wear it:). I would like to offer an anti Clipper/Skipjack T-shirt. They would be white with black printing and cost approximately $5.00 plus $2.90 shipping to US locations. That is the cost to produce one shirt. I am trying to spread awareness not make money. I need to know if people are interested in this idea and what should the shirts say? Two quick ideas are: "Skip Skipjack" or "Just Say No to Clipper" Please send comments, suggestions, and questions to normh@crl.com. If more than a few people are interested I will go ahead and have the shirts made and post how to get one. A worthy cause is better if it benefits another good cause so the shirts will be silk-screened by Zerolith, part of a non-profit organization that employs, shelters, and assists homeless youth. If you would like to talk with Zerolith or donate money directly here is how to contact them. Zerolith 3075 21st Street San Francisco, CA 94110-2626 415.641.1014 voice 415.641.1474 fax -- Norman J. Harman Jr. o o Smiley Systems normh@crl.com \__/ San Francisco, CA ------------------------------ Date: Tue, 13 Sep 1994 11:19:22 (CDT) From: CuD Moderators <cudigest@mindvox.phantom.com> Subject: File 5--Five "Hackers" Indicted for Credit Card/Computer Fraud (AP WIRE - Thurs, Sept. 8, 1994) NEW ORLEANS (AP) -- "Dr. Demonicus," "Renegade" and four other hackers used computers to steal credit card numbers and used them to buy $210,000 in gold coins and high-tech hardware, federal prosecutors said Wednesday (Sept 8, '94). The nine-count indictment unsealed Wednesday charged five men from Louisana and one from New York with conspiracy, computer fraud, access device fraud and wire fraud, U.S. Attorney Eddie Jordan Jr. said. Some fo their hacker nicknames were included. They were identified as Dwayne "Dr. Demonicus" Comeger, 22; Brian Ursin, 21; John Christopher "Renegade" Montegut, 24; Timothy "Revelation" Thompson, 21; James McGee, 25; and Raymone "Wiseguy" Savage, 25, of Richmond Hills, N.Y. ------------------------------ From: email list server <listserv@SUNNYSIDE.COM> Date: Mon, 12 Sep 1994 09:29:49 -0700 Subject: File 6--Wiretap Bill Update Wiretap Bill Update The Electronic Privacy Information Center (EPIC) and Voters Telecomm Watch (VTW) are urging concerned individuals and organizations to help stop the FBI Wiretap Bill. Congress is now back in session and your support is critical. The attached alert from VTW provides contact info for the relevant Congressional representatives. EPIC is a project of the Fund for Constitutional Government and Computer Professionals for Social Responsibility. For additional information, send e-mail to <info@epic.org>. ========================================================= Subject--ACTION--Fight US bills--SB 2375 & HR 4922 From--shabbir@panix.com (Shabbir J. Safdar) Date--11 Sep 1994 23:44:50 -0400