**************************************************************************** >C O M P U T E R U N D E R G R O U N D< >D I G E S T< *** Volume 3, Issue #3.05 (February 9, 1991) ** **************************************************************************** MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet) ARCHIVISTS: Bob Krause / Alex Smith / Bob Kusumoto RESIDENT SYSTEM CRASH VICTIM:: Brendan Kehoe USENET readers can currently receive CuD as alt.society.cu-digest. Back issues are also available on Compuserve (in: DL0 of the IBMBBS sig), PC-EXEC BBS (414-789-4210), and at 1:100/345 for those on FIDOnet. Anonymous ftp sites: (1) ftp.cs.widener.edu (temporarily down); (2) cudarch@chsun1.uchicago.edu E-mail server: archive-server@chsun1.uchicago.edu. COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted as long as the source is cited. Some authors, however, do copyright their material, and those authors should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to the Computer Underground. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Contributors assume all responsibility for assuring that articles submitted do not violate copyright protections. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ CONTENTS THIS ISSUE: File 1: Moderators' Corner File 2: From the Mailbag File 3: Arrest of Phiber Optik File 4: The Dictator: My thoughts File 5: Chaos Computer Club Congress File 6: The Feds (In this case the FCC) hits Ham Packet BBS Ops. File 7: FCC Citation of Packet BBSs for Store-and-Forward Msg File 8: Book Review--Exporting the First Amendment ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ---------------------------------------------------------------------- ******************************************************************** *** CuD #3.05, File 1 of 8: Moderator's corner *** ******************************************************************** From: Moderators Subject: Moderators' Corner Date: February 7, 1991 ++++++++++ In this file: 1. RETALIATION IS NOT THE ANSWER 2. CONFERENCE ON COMPUTER INVESTIGATION CONFERENCE ++++++++++ +++++++++++++++++++ Retaliation is *not* the Answer +++++++++++++++++++ We've heard "rumors" about plans for retaliation against informants and others who have added to the victim list of law enforcement zealousness. We have been, and continue to be, unequivocal in our opposition to such behavior! Informants are a symptom of the problem and not its cause. Victims are created by abuse of power, by ignorance of agents, by inadequate Constitutional protections in a time of rapidly changing technology, and by a cultural mentality that sees witches to be hunted in anything mysterious. We are not required to like paid informants, especially when they appear responsible for creating victims rather than protecting society. Sometimes, in serious cases, they are necessary, but should be used with caution. But, they should be used with caution. Informants, by definition, betray, and the ethical issue for law enforcement is one of maintaining a balance between necessity and unethical practice. It is this balance that seems to be out of kilter in the RIPCO informant incident, and we view the problem as one of restoring the balance AND NOT retaliating against the paid informant. Informants must live with their conscience and with the stigma they earn. From all accounts, law enforcement agents respect informants as little as the rest of us; they only find them useful. So, there is little need to retaliate: Loss of status and the corresponding condemnation is sufficient response. An anonymous poster shares similar thoughts in file #4, below. +++++++++++ Conference on Computer Investigation Conference +++++++++++ The Criminal Justice Statistics Association will be holding a conference on INVESTIGATION COMPUTER CRIME (March 18-20) in Washington D.C. The blurb reads: Audience: Law enforcement and prosecutorial personnel assigned to the computer crimes cases Objectives: To train personnel in the technical and legal aspects of computer crimes. Covers issues such as computer crime methods and detection, crime scene search procedures and computer evidence preservation, the application of existing laws, interaction with techincal experts, and prevention education. A registration fee is $100 per class day and classes will be held in the Computer Center's facility at 555 New Jersey Avenue, NW, Suite 860, Washington DC. For more information, contact person is: Jim Zepp, Director NCJS (Suite 860) 555 New Jersey Avenue, NW Washington, DC 20001 (202-638-4155) ******************************************************************** >> END OF THIS FILE << *************************************************************************** res;res on aca101;ct; uf file; ch'3.03' to'3.05';res