Computer underground Digest Sun May 15, 1994 Volume 6 : Issue 41 ISSN 1004-042X Editors: J
Computer underground Digest Sun May 15, 1994 Volume 6 : Issue 41
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
Archivist: Brendan Kehoe
Retiring Shadow Archivist: Stanton McCandlish
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Covey Editors: D. Bannaducci & S. Jones
CONTENTS, #6.41 (May 15, 1994)
File 1--Further info on the Tony Davis affair.
File 2--Fidonet Crackdown in Italy
File 3--hacker crackdown takes place in Italy
File 4--German CDROM cracked
File 5--PGP 2.5 available from EFF ftp site
File 6--MTV SUES CURRY
File 7--AOL Chat Rooms (In re: CuD 6.40)
File 8--Re: "Child Abuse in Cyberspace"
File 9--Re: CuD 6.27 -- Response to E. Weykers (in re 2600 Mag)
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.
CuD is available as a Usenet newsgroup: comp.society.cu-digest
Or, to subscribe, send a one-line message: SUB CUDIGEST your name
Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.
EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
In ITALY: Bits against the Empire BBS: +39-461-980493
FTP: UNITED STATES: etext.archive.umich.edu (22.214.171.124) in /pub/CuD/
aql.gatech.edu (126.96.36.199) in /pub/eff/cud/
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.
DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.
Date: Sat, 14 May 94 18:05:00 -0600
Subject: File 1--Further info on the Tony Davis affair.
Have heard little mentioned on the net regarding this case recently.
Saw a recent AP report on it though. Below is a summarized version.
Jury Finds man guilty in computer porn case. (05-05-94)
Anthony Davis faces up to five years in prison after an Oklahoma jury
found him guilty of distributing obscene material on computer discs.
District Attorney Robert Macy praised the work of the Oklahoma City
Police Department's vice unit, which arrested Mr. Davis in July 1993
during a raid at his software publishing business in south Oklahoma
The jury found Mr. Davis guilty of two counts of distributing obscene
material, one count of possession of obscene material, one count of
trafficking in obscene pictures, and one count of illegal use of a
In addition to the prison sentence, Mr. Davis was fined about
$33,000 and forfeited nine modems, two CD-ROM changers, four CD-ROM
drives, two keyboards, two monitors, four power strips, two power
boards, and two computers. Prosecutors say he is appealing the
District Judge Richard Freedman considered dismissing the case because
of concern that computerized images were not specifically included in
the state's obscenity statutes.
He allowed the trial to continue after prosecuters argued the obscenity
statute cites "writings" and that CD-ROMs are writings contained in
computer code. The statute also includes the term "pictures" and the
images in question are computer reconstructions of pictures, the
Judge Freeman allowed Mr. Davis to remain free on bond pending formal
sentencing on June 17.
The article did not detail many of the pertinent facts regarding the
case such as the excessive overreaching of the OK PD in seizing so much
material when the warrant was *specifically* for CD-ROM disks only. The
fact that Mr. Davis is a publisher of legitimate computer software and
the CD-ROMs in question were from a third party supplier, Mr. Davis was
acting as a distributor only of those CD's. No information was given as
to the status of any suits Mr. Davis might have initiated against the
authorities in question, regarding violations of the ECPA or the PPA.
Date: Sun, 15 May 1994 11:37:04 -0700
From: Bernardo Parrella
Subject: File 2--Fidonet Crackdown in Italy
On May 10-12 1994, the first nationwide crackdown on telecom nets was
operated by Italian police.
Acting after a warrant issued by a Prosecutor in Pesaro, about 60
Bullentin Board Systems throughout the country have been visited and
searched by police officials.
Dozens of people were formally accused of "distribution of illegally
copied software and appropriation of secret passwords" under the law
approved by Italian Parliament in January this year.
In several cases police officials didn't know what to search for, thus
seizing computers, floppy disks, modems along with electric outlets,
answering machines, audiotapes, personal effects.
The raids also hit private houses and belongings, and in some places
sleeping people were abruptly woken up facing machine guns.
After searching probably around one third of the entire network - that
includes more than 300 BBSes - police officials closed several Fidonet
nodes, but no arrests were made.
A still inaccurate figure of people were charged with software piracy, and
dozens of computers and related devices were seized - along with
thousands of floppy disks, CD-Roms, W.O.R.M.S.
Moving after a suspected software piracy ring run by people involved
in a Fidonet node, the crackdown started in the night between May 10
and 11 in Milano, targeting in the two following days BBSes in Pesaro,
Modena, Bologna, Ancona, Pisa and other cities.
Fidonet Italia, member of the worldwide Fidonet network, is a
non-profit organization devoted to distribution of shareware and
freeware programs as well as to electronic forums on topics ranging
from technological to social issues.
An essential communication tool for several groups and individuals
throughout the country, Fidonet Italia became an active multi-cultural
vessel and distributor of several different nodes dedicated to
specific issues: Peacelink (solidarity, human rights), Cybernet
(cyberpunk), Ludonet (games), Scoutnet, Amynet, and others.
For thousands of Italian people, Fidonet BBSes today are invaluable
tools of information-exchange, social activism and professional
The network policy strictly prohibits any distribution of illegally
copied software and fraudulent appropriation of secret passwords.
Also, Fidonet is one of the few International organizations which has
always stated and pursued a clear position against unauthorized
At the moment, the raids seems to be motivated by accusations against
two people involved in a Pesaro-based BBS who were using Fidonet
contacts to allegedly distribute illegal copies of computer programs.
However, there are no reasons for such a vast law enforcement
operation. Most likely the prosecutor acted simply on the basis of
the Fidonet telephone numbers list (publicly available) owned by the
two suspected of software piracy.
The vast majority of the people searched don't have any kind of
relationship with the suspected, and many of the search warrants
stated a generic "conspiracy with unknown" for the crime of software
Particularly, the random and arbitrary seizures of floppy disks and
personal computers are completely unmotivated, because every BBS is a
completely independent structure and each sysop is running his/her own
hardware and software.
The seizures will resolve in a great economic loss for these people
and their professional activities will be surely affected from
negative publicity. Some of them own small computer-related companies
while others are physicians, hobbyists, students who risk personal
savings to run their services.
Because police officials also seized electronic and paper archives
containing data and numbers of the people who logged onto Fidonet
nodes, it is evident that investigations are going even further - thus
violating the constitutional right to privacy.
The first result of this crackdown is that many Fidonet operators
decided to shut down immediately their systems all over the country,
fearing heavier police intrusions in both their public activities and
While the Italian Parliament recently approved specific laws about
copyright and piracy of computer software, there are still no rules to
protect personal privacy in the electronic medium.
This legislative void inevitably makes the sysop the only responsible
person about anything happens onto and around his/her own BBS.
Fidonet operators do not want and can not be the target of
undiscriminated raids that, forcing them to closing down their
activities, cause serious damages to themselves as well as to the
In an article published Friday 13 by the newspaper "La Repubblica",
Alessandro Marescotti, Peacelink spokesperson, said: "Just when the
worldwide BBS scene is gaining general respect for its important role
at the community level, in Italy the law hits those networks that have
always been strongly against software piracy. Charging dozens of
honest operators with unmotivated accusations, the main goal of this
crackdown is directed against the social activities of small community
nets - thus clearing the space for commercial networking."
While terms and figures of the entire operation should still be
clarified, on Sunday 15 Fidonet Italia operators will meet in Bologna
to study any possible legal counter-action.
Date: Fri, 13 May 1994 12:09:50 -0500 (CDT)
From: David Smith
Subject: File 3--hacker crackdown takes place in Italy
---------- Forwarded message ----------
Date--Fri, 13 May 94 11:23:02 EET
things are getting really bad here...
On Wednesday, 11th of May, at 3:30 pm, the italian Feds came into my
house while I was out of town for a consulting business. They went
into my bedroom and seized all my equipment, diskettes, tapes. This
action was part of a nationwide raid against software piracy that hit
some other 40+ FIDONET sites (yes, they seem to have used a Fido
nodelist to find out about sites to investigate). Needless to say, I
didn't even had DOS on my disk drives, let alone any copyrighted
software. Anyway, they have now all my work of the latest 5 (five)
years, including all backup copies of UniBoard and related stuff..
and I don't know if I will be ever able to have all my stuff back. I
have also lost my nervous.com email address, but I can be reached here
as ; I will try to keep you informed about this (very
bad) story. Please, forward this to the alt.bbs.* groups, since I do
not have news access here, and am also missing all the email addresses
of my customers and friends..
Wish me luck,
Riccardo Pizzi, SysAdmin Tel-- +39 71 204046
I.T.A. Informatica e Fax-- +39 71 2073033
Tecnologie Avanzate s.r.l. E-Mailemail@example.com
Date: Sun, 8 May 94 22:25:00 UTC
Subject: File 4--German CDROM cracked
The Fairytale of Data-Encryption
How to Crack a CD ROM full of Commercial Software
by HOWARD FUHS firstname.lastname@example.org
((MODERATORS' NOTE: The following article details the events of a
CD-ROM "software sampler" that was promptly cracked by some German
programmers. We've edited the article slightly, but for the most part
have left it as it was submitted. Please note that English is not the
first language of the author.))
Once upon a time a company decided that the world might be ready and
so they tried to invent a new way of distribution for commercial
software. It was a few weeks before the CeBit Computer Fair in
Hannover and the company sent out merry men to talk to the giants of
the software industry. The software giants listened well and thought
it might be a very good idea. They accepted and so they started to
distribute their good and expensive software in an encrypted form on a
The encryption software was especially programmed for the inventive
distributor and he believed that the encryption was so secure that
even a evil hacker can't get access to the software. According to an
official statement of the company, the encryption method is similar to
DES and as secure as DES.
His project has to become a success so he gave away the CD ROM for a
fee of 10 DM ( $ 6.-) and the Ziff Verlag (German office of the Ziff
Publishers with own magazines in the german language) distributed the
CD ROM for free as an inlet in one of their magazines. And, really,
the CD ROM was a success. But that's not enough. To complete the total
success of the project, the CD ROM was given away on the CeBIT
Computer Fair. What a success! About 300 000 CD ROMs were produced.
Most of them were given away. The distributing company claimed in
some public statements that this might be the future way to distribute
commercial software and they will lead the pack.
The content of the CD ROM was the "Who is Who" of the software giants.
Novell, Microsoft, Lotus, Borland and so on. The software giants
claimed that the total value of the software is more than 100 000 DM
(70 000 $) and they all were pretty sure that this concept will be
The future concept was to generate a checksum with a program which
was also the content of the CD ROM. This checksum was calculated
especially for that program the daring user wanted to buy. The user
just had to call a hotline number of the distributing company and tell
the operator the software package he wanted to purchase. The operator
asked for the generated checksum and the credit card number. After
verification the operator gave away the golden key to decrypt the
For using the golden key the user had to start the decryption
program which was also stored on the CD ROM. The decryption program
asked for the key, and voila, the decrypted commercial software can be
stored on diskettes ready for installation. Life can be so easy.
What a challenge for a really bad, mean and intelligent hacker. First
of all, he checked the content of the CD ROM - and found a strange DLL
file. After a close look at the DLL file the Gentleman started his
debugger and checked the whole decryption program. And after a few
days of work he was able to write a program to calculate the
decryption codes. He still refuses to tell the public in which way he
was able to crack the encryption of the software.
Members from the Chaos Computer Club in Hamburg claim that the intend
was to show how easy it is to crack the encryption and not to get
access to the commercial software. The fact was told to the
distribution company and the Ziff Verlag during the CeBIT and was
demonstrated in front of an audience. Both companies stopped the
distribution of the CD ROM immediately.
The results of the crack:
Everybody is looking for the CD ROM. People are willing to pay more
than 100.- DM for the CD ROM and are looking for crack codes or the
crack program. The first crack codes are appearing in the FIDO Net.
And a lot of cracks are working almost fine. Two persons tried to sell
faked crack programs for 200.- DM each.
The giants of the software industry are checking the possibility to
charge the distribution company for the amount of more than 3 Billion
US$. In an official statement the giants are claiming that they will
lose more than 3 Billion US$. If it is necessary they will bring the
case to court.
There is no official statement from the distribution company.
Each and every newspaper or news service was selling the story all
over Germany. Even if they have not the faintest idea what they are
Depending on the point of view, the CD ROM and the distribution
concept were very successful.
Date: Wed, 11 May 1994 16:46:49 -0400 (EDT)
From: Stanton McCandlish
Subject: File 5--PGP 2.5 available from EFF ftp site
With the early May announcement of the availability of the new version
of PGP (Pretty Good Privacy) a free encryption program for email and
other files, EFF has decided to provide PGP and other cryptographic
material to users of the Internet. EFF applauds and congratulates the
PGP development team, MIT (who initially made PGP 2.5 available), and
RSA Data Security (patent holders of the RSA and RSAREF encryption
code) for coming to an agreement and providing this new version of the
most popular email encryption program in the world - a free version
that is finally legal in the US.
Previous versions of PGP arguably violated US patent law, with the
exception of ViaCrypt's commercial PGP 2.4, but the new 2.5 is built
upon the free RSAREF encryption functions, rather than the previous
RSA functions which required a special licensing arrangement for use
in applications like PGP.
Despite the patent & licensing issues being resolved, PGP is still not
legally exportable from the United States (except to Canada), due to
ITAR export restrictions which categorize cryptographic materials as
weapons of war. Thus, EFF can only make PGP and other crypto tools
and source code available to US and Canadian nationals currently
residing in the US or Canada and connecting to EFF's site from a US or
PGP and similar material is available from EFF's ftp site in a hidden
directory, and only to Americans and Canadians. Access to this
directory can be obtained by reading and following the instructions in
PGP can only be obtained from EFF via ftp currently. Gopher and WWW
access to the material itself is not supported at this time.
Only the DOS and Unix versions of PGP 2.5 have been released so far.
The Unix version is in source code form, and so can be readily ported to
VMS, NeXT and many other operating systems. A Macintosh version has yet to
If you would like to see US export restrictions on cryptography removed,
please send a message supporting Rep. Cantwell's export reform act (bill
HR3627) to email@example.com, ask your Representatives to co-sponsor this
bill, and ask your Senators to co-sponsor Sen. Murray's companion bill
(S1846) in the US Senate. Congress contact information is available from
Date: 10 May 1994 03:44:36 -0400
From: curryco@PANIX.COM(Adam Curry)
Subject: File 6--MTV SUES CURRY
[IMAGE] MTV SUES CURRY
Last update: May 10 1994
_New Jersey, May 10 1994_
I had planned to keep the following quiet until more information was
available, but since several journalists have already caught wind of
it, I decided to get it out into the open so my side of the story is
heard as well.
The domain I maintain and operate on the Internet, mtv.com was founded
approximately one year ago. At that time I registered mtv.com with the
InterNIC, purely because it was a cool address to have, and it was
available. What a great "vanity plate"!
The site quickly became a frequently accessed "hangout" on the net,
with an average of 35000 accesses daily from Mosaic clients alone.
During the start up months I had many conversations with executives at
MTV Networks about my endeavors, which btw, were all financed out of
my own pocket, and vps from MTV Programming as well as Viacom New
Media were aware of what I was doing on the internet, and although
they stated "MTV has no interest in the internet" they gave me their
blessing and supported my efforts.
This was enforced when I set up several email accounts on mtv.com for
use in MTV's on-air programming. Ever since the summer of '93,
firstname.lastname@example.org was used for trivia quiz questions, that were then
aired on MTV's "Most Wanted" a program I hosted at the time.
Solicitations were made on the air, and the address was shown on the
screen. For MTV's annual Valentines video dedications, viewers were
offered the choice of calling in their dedications, or sending them
via email to email@example.com.
I never charged MTV Networks for this service, I purely saw it as a
cool feature to introduce to MTV's programming, spreading the
"gospel", so to speak.
Then I started to get a lot of press about mtv.com, and some people
started to wake up at 1515 Broadway (MTV's HQ in New York City). And I
was served with a "Cease and desist" on the use of mtv.com. MTV's
attorneys claimed that there could be "confusion" for users of the
internet, when connecting to *anything* that had the letters mtv in
the address, and then receiving music and entertainment information. I
was obviously hurt by this move, but did see what point they were
driving at, an asked if we could settle this matter amicably.
The situation cooled down for a couple of months, but when I resigned
on-air from my job as a VJ, which MTV chose not to air btw, things
started to get ugly.
Long story short, MTV Networks has filed a lawsuit against me, for
copyright infringement of their "trademark", that being their "MTV"
call letters, as well as having information online that was MTVN
"property". In this case they are referring to several press releases
I put up on mtv.com, such a an announcement about Beavis and
Butthead's "experience" cd release. Understand that MTVN sent me these
releases over their own internal computer network for this very
purpose! Again, I was only doing this to promote the channel, not for
my own personal gain..after all...mtv.com is free access for all, no
Throughout all of this I have offered to maintain the site
specifically for mtv, but again they said "we're not interested".
Of course I have no problem whatsoever removing all references to MTV
Networks and it's projects from mtv.com, no that I don't work there
anymore gives me even more reason to want to do this, but the kicker
is they are moving for an injunction to make me stop using the
internet address mtv.com!
This is ofcourse totally unacceptable, I registered the domain name,
and I don't plan on giving it up. Sure MTV and their parent company
Viacom have a vast legal team, but david also nailed goliath, so I
have faith. In the long run, everyone knows that the only *true*
winners will be the lawyers.
There are many different viewpoints on this situation, but I feel that
the use of mtv in an addressing scheme can't be seen as an
infringement of intellectual property laws, and a search of the
InterNIC database shows at least 15 domain names registered with mtv
in the address. Irony is that I incorporated a company called ON RAMP,
Inc (tm) and onramp.com was already registered to someone else, but
I'm not suing them :)
It appears to me that MTV has their mind set on the address mtv.com,
maybe not for now, but possibly for future use, and I feel extremely
used, in that I built up quite an audience for that address, and they
are basically saying "thank you very much, you may go".
A pre-motion hearing is scheduled for this thursday morning at 11am,
wit the honourable Judge McKenna presiding, in an attempt to get an
injunction to make me stop using the address mtv.com. I will update
the situation as it unfolds.
Adam Curry, firstname.lastname@example.org
Date: 9 May 94 17:48:36 GMT
From: dbatterson@ATTMAIL.COM(David Batterson)
Subject: File 7--AOL Chat Rooms (In re: CuD 6.40)
This is a followup to Howard Rheingold's article, "Why Censoring
Cyberspace Is Futile," Cud #6.40.
Young Gay Chat Rooms on America Online
by David Batterson
America Online (AOL) took some heavy media hits over the widely
reported story involving a 14-year-old boy and an adult male he met
through the online service. As a result, AOL's TOS (Terms Of
Service) dept.--also known as TOSAdvisor--began a crackdown on
certain Member Rooms.
As a clarification, chat rooms on AOL consist of three types:
Public, Member and Private. Public Rooms are as described, and
explicit language of a sexual, "vulgar" or "bashing" nature is now
allowed under TOS guidelines. AOL has volunteers called Guides who
help keep order.
Member Rooms are created by AOL users who want to meet others,
generally for "dating" and sexual reasons. More explicit language is
tolerated in such rooms, since users specifically go looking for
these rooms. Examples of Member Rooms are "Married but not dead,"
"Yng Men 4 Older Women," "Men 4 Men," "Bi F 4 Bi F," "Men's Locker
Room," "Fantasies and Dreams" and so forth.
Guides can enter Member Rooms, but don't do so as much as they
do Public Rooms. When AOL users want total privacy, they can create
a Private Room where even Guides and TOS representatives cannot
Because AOL came under pressure, TOS started removing rooms from
the Member Rooms list with names such as "Yng M 4 Yng M." Such rooms
are frequented by gay and bisexual teens and young adults, although
older adults may also access the rooms too.
After complaints against TOS by a number of users--and a
petition campaign launched by a teen AOL subscriber, and a request
from me to TOS for an explanation, I received the following e-mail:
"To avoid giving the impression that we allow solicitation of
minors online, we are very cautious in allowing room names
referencing youth. Anything that could possibly be construed as
sexual is usually made private. 'Yng M 4 Yng M falls under this
category. It is ambiguous in that 'M' could mean 'male', hence
You may create the room 'Yng Men 4 Yng Men', which specifically
states that the occupants seek to meet adults. I hope this clears up
our position on this." The letter was signed by Pete, Terms of
Service Advisor, America Online, Inc.
NOTE: Following is an excerpt of e-mail from the person who
circulated the petition on AOL. It speaks for itself. He wishes to
remain anonymous, for obvious reasons.
Subj: Re: TOSAdvisor hysteria
Date: 94-05-07 21:45:46 EDT
From: KC 16M
Posted on: America Online
I hope you find relevant remarks contained herein for anything you
wish to write. Feel free to forward it as an example of how not
everyone's writing skills have been damaged by the American
Educational System. :-)
In making any statement of position, I strongly believe that I echo
the views of teenagers, both gay, bi, and straight.
WHO I AM
I am soon to be a 17 year old male. I'm from down-state New York. I
am a president of a prominent nationwide youth group and a former
vice-president of an honor student's organization. I have a number
of years experience in dealing with peer counseling and in active
I have never been a gay rights activist. I am a teen activist and am
involved currently with 3 organizations. I don't have time for a
typical social life, because I am dedicated to my interests. While
this has a number of low points (I can only be on AOL at midnight,
and sometimes fall asleep while typing), it has many very lofty
rewards that I enjoy. I have received certificates, awards, and many
thank you cards in the last 3 years.
I am an honors student, and have a particular interest in education
techniques, cognitive and behavioral psychology, and human
sexuality. I have audited college classes on those topics for 2
years (at night!).
WHY I'M GETTING INVOLVED IN A PETITION
As a high school student, I am well aware of the discrimination that
affects my generation. I have many gay friends online as a result of
my own exploration of sexual identity and have not settled on any
singularity of attraction yet.
While I don't limit my online friends to any particular group, I
identify with the struggle that fellow teens have in keeping a room
open for discussion and FUN of relevant issues. If an issue so
immediate as sexuality can be considered a relevant issue, then rooms
should be available for it.
To state it simply: If it can be available for adults, why should
there be a limit in what is available for teens? Don't even bother
with the law, as it cannot be enforced in a domain where people won't
give out more than their screen names to strangers.
What about the dumb kids who give out personal information? Well,
don't worry about them; they are just as likely to drown in a bowl of
A petition will demonstrate to AOL that there is an interest in it,
by teens FOR TEENS. We are not stockholders. We are customers. AOL
provides a computer and networking system....we use it. AOL gives
ground rules for using it....we follow them. AOL requires
payment...we pay. Customers want something done....business doesn't
Notice the problem? :-)
There are many admirable aspects of the system. What we want is the
huge corporate entity to respond to its customers, as any other
company must. All of us who use AOL have money at our disposal, and
we use it freely.
HOW WE INTERPRET AOL's POSITION ON TEEN ROOMS:
It seems highly hypocritical for an organization, for-profit
especially, to discriminate against gay teenage males simply for
their age. Notice, we are not discussing the issue of homosexuality,
per se, because it is obvious that AOL is a gay-friendly employer and
It is hypocritical for a few reasons:
1) There already exists "teen chat" rooms. If the policy of AOL
was to protect minors from untoward sexual advances from
perverts/adults in those rooms, they would not exist.
2) There already exists "gay adult" rooms. There are "adult chat"
areas. Now that we've established that there are teen rooms, adult
rooms, and adult gay rooms, the question we should think about is,
"Why aren't there gay teen rooms?"
3) Screen names make it impossible for adults and teens to tell
each other apart. One method we use is discussion of relevant issues
(including sex); those who are unable to relate to the discussion are
"Pervs" who we know to avoid.
4) There are procedures for dealing with perverts, which most
teens (in contrast with most of the adults we've encountered) are
familiar with. Flooding e-mail boxes of annoying perverts,
IGNORE'ing them in chat rooms, and shutting off our Instant
Message'ing are all very effective methods. In addition, there
already exists many corporate techniques of handling jerks,
such as "GuidePager" and TOS.
5) We are not defenseless, nor innocent. Most, though not all, o
the teenage users of AOL have extensive "modeming/BBSing" experience.
We are neither ignorant of the protection that AOL provides through
screen names, or of how to handle an annoying person.
In essence, the issue is one of age discrimination for teenagers who
do not need protection. Another user on AOL wrote: "a request has
already been made to the GLCF (Gay Lesbian Community Forum) on AOL to
have an adult-monitored teen room for outreach, networking and
I don't wish to sound arrogant or resentful, but that is an
adult-centered approach. It doesn't recognize the fact that most
teenagers, sexually explorative or not, are uncomfortable by any
adult presence. If teens know that an adult is present, we will IM
(Instant Message) each other, and go to a private room.
Further, to assume that perverted adults will not enter that room i s
to dismiss that they are just as capable of creating phony profiles
as anyone else...a foolish assumption by any person.
Some of what is written below is repetitive, but may serve to further
clarify our position. Because QUIRK [GLCF Forum Host] took the time
to write out specific logistical questions, I'll repeat them with
answers that I hope you both can use (IN KEEPING WITH THE SPIRIT OF
QUIRK'S NAME, MY ANSWERS ARE IN CAPS):
* How can AOL insure that such a space will not become a magnet for
THEY CAN'T. NOR, FROM A LEGAL PERSPECTIVE, EVEN TRY. ONCE AN
ORGANIZATION TAKES A POSITION WHEREBY IT SEEKS TO "PROTECT" ITS
CUSTOMERS, IT BECOMES LIABLE FOR INFRACTIONS. THE SMARTEST APPROACH
WOULD BE TO ACKNOWLEDGE THAT AOL IS A DATABASE AND NETWORKING SYSTEM,
NOT A SOCIAL AGENCY. IN DOING THAT THEY DISCLAIM AND INDEMNIFY
THEMSELVES FROM ANY LIABILITY RESULTING FROM ABUSES OF THAT NETWORK,
WHERE USE OF THE NETWORK CONSTITUTES A VIOLATION OF LAW.
* What restrictions/rules are teens willing to generate and adhere to
that will keep adult predators out of the area?
A FEW BASIC ONES. PRIMARILY, WE WOULD AGREE TO LIMIT EXPLICIT
SEXUAL DISCUSSIONS TO INSTANT MESSAGES AND PRIVATE ROOMS. WE WOULD
AGREE THAT THE "TOS" RULES WILL REMAIN IN EFFECT FOR PUBLIC CHATTING.
WE WOULD AGREE THAT AN ADULT'S PRESENCE, AS DEFINED BY THE ROLE
OF "GUIDES", IS TOLERABLE. IN PRACTICE AND THEORY, GUIDES ARE
NOTIFIED ONLY WHEN THERE IS JUSTIFIABLE NEED, THOUGH THEY ARE SOCIAL
CREATURES WHO LIKE TO POP INTO "TEEN ROOMS" ANYWAY. HOWEVER, WE
WOULD NO MORE APPRECIATE A CONTINUOUS PRESENCE THAN ANYONE OF ANY
OTHER GROUP WOULD.
* How will you verify the age of the teens using such a space?
WE CAN'T, NOR SHOULD. AOL SHOULD DISCLAIM ITSELF OF ANY ABILITY
TO VERIFY AGE. WE ARE ALL CUSTOMERS OF AOL FOR 3 COMMON REASONS: 1)
CONVENIENCE/ACCESSIBILITY, 2) AFFORDABILITY, 3) ANONYMITY.
* Who will monitor the area to make sure the it remains "youth only"
OFFHAND RESPONSE: THE THOUGHT POLICE.
REAL RESPONSE: WE WILL. IT IS WITHIN OUR ABILITY TO IGNORE
MAIL, IGNORE PEOPLE IN CHAT ROOMS, AND IGNORE INSTANT MESSAGES. AOL
IS NO MORE DANGEROUS THAN SPITTING OFF A BRIDGE. THE TIME IS NOW TO
SHOW AOL THAT WE DON'T WANT, OR NEED, TO BE PROTECTED FROM OURSELVES.
Date: Mon, 9 May 1994 23:47:52 -0700
From: jonpugh@NETCOM.COM(Jon Pugh)
Subject: File 8--Re: "Child Abuse in Cyberspace"
>The story continues with the case of Donald Deatherage, 27, of
>Cupertino, Calif. Deatherage, known as "HeadShaver" on America Online,
>was accused by police of using his computer to prey on a 14-year old
>boy with whom he had struck up an on-line conversation. Deatherage was
>accused of eventually meeting the youth, handcuffing, shackling, and
>blindfolding him, and spanking him with a leather belt (among other
>more serious acts).
I'm not really sure what to say here, but I know Matt Deatherage from work.
I used to work for Apple in the same group as Matt (that's his middle name
and the one he goes by). I haven't spoken with him since his arrest, but I
have talked with his boss who has spoken with him and I know a few more
details than are represented in the above excerpt.
My wife asked me if Matt was "normal". I can't really say. So few of us
in the computer business qualify in the strictest sense. He's a big guy
who kept his hair really short, like some athletes do. That must be where
he got his login name from. He's been into computers since the early Apple
II and was doing Macintosh technical support until his 6 week sabbatical
during which he was arrested. I don't really know him very well, but he
has helped me on a number of complicated technical problems and was always
willing to assist. I always liked him for that.
Matt has been in jail on a half million dollars bail since his arrest. He
has pleaded no contest to the charges and is currently awaiting sentencing.
A number of the people that he has helped over the years have gathered an
online petition asking the judge to show leniency.
According to reports I have read and heard, Matt did not abduct the 14 year
old boy he was charged with molesting. The kid told his parents he was
going to a party in Santa Cruz and then met Matt instead. The only way
this was even discovered was when the boy's father read through his email
at some later date.
Now, I'm certainly not advocating, endorsing or even justifying Matt's
actions, but I definitely think that there is a difference between
voluntary and involuntary actions. There is no indication that Matt forced
this boy into anything. In that regard, I support the request for leniency
for Matt. I don't really believe that he is dangerous or a threat. I'm
just afraid that given a beginning as outrageous as $500,000 bail, Matt is
finding out about the harsh side of the law.
Date: Thu, 12 May 1994 18:00:34 -0400 (ADT)
From: The Advocate
Subject: File 9--Re: CuD 6.27 -- Response to E. Weykers (in re 2600 Mag)
Dennis Weyker here responding to Emmanuel Goldstein:
>. . . This puts us at direct odds with many organizations, who believe
>that everything they do is "proprietary" and that the public has no
>right to know how the public networks work. In July of 1992 we were
>threatened with legal action by Bellcore (the research arm of the
>Regional Bell Operating Companies) for revealing security weaknesses
>inherent in Busy Line Verification (BLV) trunks. The information had
>been leaked to us and we did not feel compelled to join Bellcore's
>conspiracy of silence.
!See my earlier comments about publishing security holes or sharing
!them with hackers before letting the sysadmins have adequate warning
!and time to fix the hole. Instant publication of holes is not socially
No more "Ir-responsible" then the producer of a commercial product
producing something that is defective. 2600 has no fiduciary duty
to customers, while the manufacturers do. The fact is most vendors
take a fiddle while rome burns approach to product quality.
WHy don't you remind them to get their acts together first.
!Also, publishing one company's private data can in some cases create a
!competitive disadvantage relative to that company's competitors with
!real economic effects. If Phrack runs a long series of articles about
!"how to hack the new Fujitsu switches", the communications engineer at
!BellAtlantic deciding what brand of switch to buy may decide to buy
!some other brand of switch besides Fujitsu. And he might be doing this
!solely of the publication of those articles makes him think (rightly
!or wrongly) that the Fujitsu's switch is more likely to get hacked
!into than, say, Northern Telecom's. Phrack has just transferred wealth
!from Fujitsu to Northern Telecom and possibly influenced the telco
!into buying the less competitive switch (which could wind up
!increasing telco operating costs and users' rates) out of fear of
!Moral: not all arguments about the social and commercial value of
!keeping proprietary information secret are bogus.
Spoken words of wisdom from a man who has obviously never been involved in
a procurement decision. 90% of the product reviews i saw in trade rags
were utter and complete Horse Feces. I saw one review signed by
a person in my chain of command that gave glowing remarks to
a development product. Our internal review had so scathed it, that
it was removed from the system so we could get real work done.
If 2600 points out the truth for once, it is the continuation of
Diogenes trek with the lantern looking for one honest man, or in
this case, one honest vendor.
The rest of weykers comments aren't even worth responding to.
End of Computer Underground Digest #6.41
E-Mail Fredric L. Rice / The Skeptic Tank