Computer underground Digest Tue Nov 4, 1997 Volume 9 : Issue 80 ISSN 1004-042X Editor: Jim Thomas (cudigest@sun.soci.niu.edu) News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu) Archivist: Brendan Kehoe Shadow Master: Stanton McCandlish Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Field Agent Extraordinaire: David Smith Cu Digest Homepage: http://www.soci.niu.edu/~cudigest CONTENTS, #9.80 (Tue, Nov 4, 1997) File 1--WILL "HATE SPEECH" BECOME 5th HORSEMAN OF THE APOCALYPSE? File 2--Cu Digest Header Info (unchanged since 7 May, 1997) CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN THE CONCLUDING FILE AT THE END OF EACH ISSUE. --------------------------------------------------------------------- Date: Tue, 28 Oct 1997 23:58:55 -0500 From: Paul Kneisel Subject: File 1--WILL "HATE SPEECH" BECOME 5th HORSEMAN OF THE APOCALYPSE? WILL "HATE SPEECH" BECOME FIFTH HORSEMAN OF THE APOCALYPSE? The Tired Four Horsemen by tallpaul ROPER: So now you'd give the Devil benefit of law! MORE: Yes. What would you do? Cut a great road through the law to get after the Devil? ROPER: I'd cut down every law in England to do that! MORE: Oh? And when the last law was down, and the Devil turned round on you--where would you hide, Roper, the laws all being flat? This country's planted thick with laws from coast to coast--man's laws, not God's--and if you cut them down--and you're just the man to do it--d'you really think you could stand upright in the winds that would blow then? Yes, I'd give the Devil benefit of law, for my own safety's sake. --Robert Bolt "A Man For All Seasons" You haven't heard much from the Four Horsemen of the Apocalypse recently. The dreaded "hackers, terrorists, drug dealers and kiddie pornographers" of cyberspace who once caused Presidents and Prime Ministers to tremble and mothers to herd their children into their beds at sundown have been strangely quiet, if only measured by the absence of significant media reports to the contrary. Perhaps in these modern times the wages of sin are no longer death but just a really tired feeling, as comedienne Paula Poundstone comments. Yet the Four Horsemen once caused millions people off-the-net to call for all manner of controls on the Global Information Superhighway. Part I: The Tired Four Horsemen Concerned parents "cruising the net" to see what their children were exposed to found little evidence of drug dealing. There is a lot of spam for $50,000 a week pyramid schemes, but little advertising at web sites for Jack's House'O'Crack, Crack Attack, or Crack'n'Smack. Where are the "terrorists" on the Internet against whom we need increased government powers? (I use the term here as the government uses it, not as anti-hate or civil-libertarian forces might.) Even the most anti-Islamic forces do not charge that we can find web pages from "Crazy Abdul's" where you can buy AK-47 assault rifles and C4 plastic explosive at "prices so low they're INSANE!" The very phrase "terrorist" has a considerable political bias that makes the whole notion of supporting a cop crackdown on "hate crimes" exceedingly problematical. Black churches burn up in the South, abortion clinics blow up, and members of right-wing and fundamentalist Christian militias are convicted of crimes ranging from multiple murders down the list of lesser felonies. But not a single such right-wing individual is identified on the FBI's current "Ten Most Wanted" list.[1] Chillingly, *the* "major investigation" for today's FBI does not involve any of the bank robberies or murders for which right-wing hate-based forces are suspected.[2] It involves cemetery desecrations. It's easy to imagine that the investigation centers on those who spray paint swastikas and Nazi slogans in Jewish cemeteries since we read so many stories about this in the daily papers. But the imagination is wrong. Rather the *top-listed* investigation is of inferentially anti-hate activists for ostensibly desecrating cemeteries with the phrase ""H[awaii] P[olice] D[epartment] ignores hate crimes. Ignore this."[3] Nor is the international scene better. The State Department just released its own list of "international terrorist organizations."[4] Only three of the 31 organizations have a recognizable right-wing orientation. These are the archly anti-Semitic Aum Shinrikyo (AUM) cult in Japan and the two right-wing-Zionist groups Kach and Kahane Chai. Not surprisingly, the State Department was unable to find a single military-based death squad or neo-fascist group in the world to which it was willing to pin the "terrorist" designation. Nor, with the exception of those groups ostensibly based in Islam or AUM, is there a single recognizably-named political (as opposed to religious) anti-Semitic organization listed. "Kiddie porn" got a small boost in the past week or so when international police consortiums charged several people with trafficking and even got a conviction of one person in the U.S.[5] Even the power of a conviction to motivate people was offset by several factors. The first was that it occurred under existing laws and conditions without any special need for changes. The second was that the man convicted was already in prison when he used a prison-based computer to commit the new crime for which he was convicted, showing that convictions do not forever prevent the crime from occurring. The third was the release of Methodist minister Rev. Nathaniel T. Grady after serving ten years for rape, sodomy, and sexual abuse of six children between three and five years old.[6] An appeals court ruled that Rev. Grady was falsely convicted in one of the sexual hysterias sweeping the country. The hysteria around "kiddie porn" on the net has its own prehistory beginning over a decade ago with the "missing children" scare that led to a significant increase in photos appearing on milk cartons. It then moved to the "Satanic molestations" at day care centers and "recovered memory therapy" that virtually guaranteed that you, too, could discover that you were a victim of childhood sexual molestation. The hysteria culminated with J. Quitter's article in _TIME_ magazine about an ostensible study of "kiddie porn" on the net via Marty Rimm and Carnegie Mellon University.[7] The cooler heads discovered that most missing children were only missing to one parent. The other parent, involved in a messy divorce, has snatched the child. The Satanic scare, reflected in cases like McMartin in California and Michaels in New Jersey, started to break down. Incredibly expensive trials led either to no convictions or convictions reversed on appeal as saner courts examined the ostensible evidence and saw none to examine. "Recovered memories" of sexual abuse cracked when therapists specializing in such ostensible therapy started losing big lawsuits to the innocent people they targeted as molesters. The Rimm study on the Internet soon came under enormous criticism.[7] Of course, all of the Four Horsemen (along with every other group in the world) are on the net. This includes "kiddie pornographers" or at least those accused of it. It is easy argue that even one convicted "kiddie porn" trafficker is one too many. The same can be said of cannibals like Jeffrey Dahmer. But does it justify the creation of a Kitchen Decency Act where warrentless searches are permitted for fear that we will have Hannibal Lecter as a dinner guest? The use of the Horseman to motivate a crackdown on civil liberties becomes even more problematical as people discover that the arguments are used to bolster a different politic. "Many of these companies are using the public's discomfort with new technologies and the hysteria of easy access to pornography on the Internet to further an anti-gay agenda," said Loren Javier, GLAAD's Interactive Media Director.[8] Even the infamous "hacker menace" has lost its ability to motivate attacks on the U.S. Bill of Rights. Part of this is due to increased public knowledge of computers and systems. Press coverage of _2600_ magazine's recent beyondHOPE hacker convention in New York City tended to be free from the hysteria that has marked such coverage in the past.[9] Another reason why the Four Horsemen lack motivational power for the crackdown is that the dire predictions made for the past 30 years have not come true. Leon Festinger, in his book _When Prophecy Fails_, showed how failed predictions often lead those who made them to cling to, rather abandon, the prediction. But such actions only pertain to those actually making the predictions, not the bulk of the citizenry who only heard the prediction made. Hackerdom has produced events like the Internet worm a few years ago but even this was not the disaster that the control-pundits warned about. Despite the horrible predictions, the average citizen has spent thirty years since Captain Crunch and the original phone phreaks waiting for the *first* massively destructive shoe to drop. No, these Horseman have not produced the Apocalypse from which forces hostile to the U.S. Bill of Rights want to protect us. The issue of quality encryption and anonymous remailers has also run into difficulties as a mass motivator for additional government control of cyberspace. When export controls on PGP were in place, the labyrinthine procedures necessary to get a copy were likely beyond the capability of most new users. Learning to use it was even more daunting, although considerably assisted by new books like those from O'Reilly and Associates.[10] Anonymous remailer systems introduce yet another level of complexity. By the end of the process, Steve Harris, the author of the "John Doe" front-end software for PGP and remailers, once estimated that only 500 people in the world were sophisticated enough to use the whole system.[11] This represents quite a comedown for a society reared on the dreaded "Red Menace" from the former Soviet Union or the hysteria of a millennia-old Satanic conspiracy sacrificing 50,000 children a year just in the U.S. The mere existence of highly secure encryption systems that potential criminals *might* use does not in itself create a global problem. Andy Oram, an editor at O'Reilly & Associates and the moderator of the discussion list for Computer Professionals for Social Responsibility, points out that commercial needs can severely limit the use of technology of anonymity. "Repressive forces have constantly argued that they need to control encryption and anonymous remailers in order to attack pornography. But the vast majority of distributors of pornography can't hide themselves, because they want payment. They have to advertise their presence! They're the last people to hide behind encryption and anonymity." Nor are the remailer systems all that secure against actions using existing laws and technologies (whether overt or covert.) in Finland, the oldest of the systems, shut down after the owner received a subpoena to deliver the name of a user. The others, as standard computer systems, are as vulnerable to individual attack as any other individual system. We saw a federal armored combat vehicle gradually demolish the fortified headquarters of the Branch Davidian compound in Waco, Texas. Is the notion of a cyber-siege so outlandish then, where government computer systems would launch simultaneous SYNC attacks against a rogue remailer system if the same government deemed it was actively being used by terrorists? The recent attack by forces supporting the anti-Basque policies of the Spanish government on the Institute For Global Communications (IGC) site indicates "no." Of course the anonymous remailers themselves are not anonymous. The owners and administrators are subject to the same system of social defense (or political attack) as all other individuals in society. A simple court injunction would likely shut them down or result in the arrest on contempt charges of any administrator who disobeyed. Any of the Four Horsemen can be used to whip up a short-term concern. Such hysterias are not difficult to create. Social psychologists can track the movement of local versions of mass hysteria across geographic areas as if they were weather fronts. A gruesome child kidnapping and murder can capture headlines until a Royal Celebrity dies. Bombing a public building calls for changes in laws until that story is swept away by news of a large drug raid, only to have that replaced by a tale of young hackers "reprogramming the orbits of space satellites." Even the well-known mass hysterias of the past were so often simply local upsurges that burned out in one area and then moved on to the next. Outbursts of the European Witch Craze might last for decades in different countries but took the form of waves of short-term hysteria sweeping through villages and counties. The Salem Witch Trials, probably the best known hysteria in the U.S., was obviously limited to the Salem area. Less well known is that by 1692 the major Salem jury, led by its foreman Thomas Fisk, had recovered and shame-faced, issued a written apology for their actions to their victims (or to the community and those victims still alive.)[12] In the language of today's Internet, the hanging jury confessed they were a group of "clueless newbies." None of the short-term "god ain't it horrible" stories about the net serve to create the type of mass sustained public concern necessary to rewrite or reinterpret citizen rights to give governments sweeping new powers to "protect" citizens. Government claims to protect citizens' privacy with new anti-encryption proposals are, at best, little more than the pious wishes of bureaucrats. This was clearly seen last month when a hacker group intercepted and published pager communications by White House functionaries. "We are publicizing this flaw in the hopes that it will finally be fixed," said Pamela Finkel, one of the organizers of the Hackers On Planet Earth (HOPE) conference and a lead spokesperson for the group. "It's an excellent example of why we need encryption to protect sensitive information. "I hope that this demonstration causes encryption to be added to the pager network," Finkel added. "This incident shows that the President's policy on encryption is so poorly crafted that it could have even compromised his own personal security."[13] The totality of pro-regulation arguments around the Four Horseman take on a separate four related characteristics. "First, the occasional conviction we get shows that criminal behavior is epidemic on the net. Second, without new laws we cannot get convictions. Third, encryption prevents us from getting convictions but the new encryption rules we propose will let us protect your privacy. Fourth, we cannot protect our own." Only the Tooth Fairy lets you have all four at the same price. This does not stop the forces opposed to civil liberties from pushing for new laws with new arguments. It does, however, make their past efforts increasingly problematical for them, with a character somewhere between the Orwellian and the humorous. One central problem -- given the existence of telephones and computers --is the *relative* unimportance of the Internet. The two pre-Internet technologies make the Internet little more that a set of protocols concerning data. One set, like TCP/IP, determines how data is transmitted over the phones via computer. The other, like the World Wide Web and the Usenet news groups, determines how pre-existing data is stored. The Internet could disappear tomorrow while phones plus computers would permit all of the Horseman to continue their ostensible gallop, either via direct modem-to-modem connections or via non-Internet private bulletin board systems. A more Orwellian view was recently expressed by Alan McDonald, "a senior executive with the FBI," who said "that 'extremist' positions on electronic encryption are a threat to normal law enforcement and are elitist and nondemocratic. Insisting that the United States had remained true to the Constitution and to a system of ordered liberties, McDonald says: 'When people don't know much about electronic surveillance, they are fearful of it. But when they know Congress passed laws and the Supreme Court reviewed them and that there are numerous constraints and procedures, then it makes sense to them. It seems rational and balanced'."[14] Perhaps the greatest sense of Orwellian doublethink from FBI pundits here is over the notion of judicial review. The courts have indeed reviewed cases brought before it by McDonald's "privacy extremists" and struck down the laws. The Zimmerman case involving the export of PGP encryption technology was dropped. The Communications Decency Act was declared unconstitutional. Recent state attempts to control the Internet by New York and Georgia have similarly been struck down.[15] Measured even from the standpoint of the U.S. judiciary, the positions the FBI denounces as "extremist," elitist, and undemocratic far better define the actions of the FBI and other branches of the U.S. executive branch of government than its opponents. Yet the same executive branch of government funds its own extremism in these areas with $US 250 million a year. This is a sizeable chunk of change, but, according to the President's Commission on Critical Infrastructure Protection, is not sufficient to even "jump start" the battle against "physical and cyber threats." A dollar just doesn't go as far these days as it did when J. Edgar Hoover headed the FBI and Richard Nixon called for Law And Order. Now the Clinton government wants an additional $US 250 million for 1999 "and $100 million each succeeding year until they reach $1 billion in 2004."[16] Some find this effort far more chilling to the well-being of the citizenry than the mythology of the Four Horsemen themselves. Something else is required to motivate an increasingly tax-shy electorate to pop for a billion a year as the Horsemen increasingly fail to provide sufficient motivation. Then ... however ... there is the new issue of "hate speech." FOOTNOTES [1] Federal Bureau of Investigation: "the FBI's TEN MOST WANTED fugitives," via: , accessed 13 Oct 97. [2] Federal Bureau of Investigation: "Major Investigations." via: , accessed 13 Oct 97. [3] Federal Bureau of Investigation: "Cemetery Desecration," via: , accessed 13 Oct 97. [4] Office of the Co-ordinator for Counterterrorism of the U.S. State Department, "Foreign Terrorist Organizations," via: , accessed 13 Oct 97. [5] _New York Times_, 5 Sep 97. no author listed in summary via EduPage , "Minnesota Child Molester Convicted of Cyber Porn," 7 Sep 97. [6] David Stout, "Conviction for Child Abuse Overturned 10 Years Later," _New York Times,_, 30 Sep 97, p. B3. no on-net source found to cite. [7] See "The Rimm/Carnegie Mellon University/TIME Cyberporn 'study' Debate (NIU Sociology 476 - Ethics of Fieldwork Segment)," via: . accessed 5 Sep 1997. [8] "Disturbing Anti-gay Trend Continues in Cyberspace," "GLAADLines" electronic news post, 25 Aug 97, Gay & Lesbian Alliance Against Defamation and via: . [9] For examples of the press coverage of "beyondHOPE," see for example The Cheshire Catalyst's web age via: [10] Simson Garfinkel, _PGP: Pretty Good Privacy_, (O'Reilly & Associates, Sebastopol, CA: 1995). [11] Steve Harris, via: [12] Thomas Fisk, Thomas Pearly senior, William Fish, et al. "We confess that we ourselves were not capable to understand...." quoted by Kurt Seligman, _The History of Magic and the Occult_ (Harmony Books, New York: 1983) p. 191. [13] Pamela Finkel, "Media Advisory: Hackers Expose Vulnerability in White House Security," 16 Sep 97, via: [14] no author, "FBI says privacy 'extremists' are 'elitist'," TechWire, 25 Sep 97. summary republished in electronic form by EduPage, 28 Sep 97 via Edupage Editors . [15] no author listed, "Internet restrictions overturned in New York [and] Georgia," _WiredNews_, 20 Jun 97. summary republished in electronic form by EduPage, 23 Jun 97. "In the New York case, a law similar to the federal Communications Decency Act was declared unconstitutional because it sought to regulate transactions occurring outside the state's borders, thereby violating the Constitution's interstate commerce clause. 'The judge was waiting to hear the Supreme Court's decision on the CDA, but decided that in any event it doesn't matter because under this commerce law, it is too burdensome for people to speak at all in this medium,' says an American Civil Liberties Union attorney. In Georgia, a federal judge issued a preliminary injunction against a law that made it illegal to use a name that "falsely identifies" the sender of an electronic message, such as a pseudonym or an anonymous e-mail address." republished by EduPage, 23 Jun 97. [16] no author listed, "Cyber threats of concern to presidential commission," _Washington Post_, 6 Sep 97. republished as summary in electronic form by EduPage, 7 Sep 97. ++++ PART II ++++ Unlike the chimera of "kiddie porn," drug dealers, international terrorists, or nefarious hacker plots worthy of "the Mind of Fu Manchu," an enormous amount of hate-based propaganda exists on the net, as do the organizations publishing it.[17] The terrorists, drug dealers, and "kiddie pornographers" may not have a very public net presence[18]; the neo-Nazi, K.K.K., and other openly fascist groups do.[17] The leaders of the Colombian cocaine cartels do not have personal web pages but you can view web pages like that of noted Holocaust-Revisionist Arthur Butz. You won't find an enormous number of documents extolling the positive social virtues of pedophilia but you can find a veritable _Cliff's Notes_ of homophobia.[19] Unlike the myth of the international hacker menace that has to be periodically created, Auschwitz was real. So are the people on the net who denied that it happened. So are the people on the net who want it to happen again. Other forms of propaganda against the Romis (Gypsies), illegal immigrants, physically handicapped, and other targets of Nazi mass extermination are routine occurrences on the web and in the Usenet news groups.[20] The question of how to handle net-based and action-oriented hate propaganda is increasingly asked. One group argues "nothing." But these people are not the target of pro-government[21] arguments for intervention against the "Four Horsemen." Nor is the group composed of many potential victims of hate-action. There are a variety of ways in which action concerning the net can be considered. The first is the individual/collective dichotomy. Collective action, in turn, can be directed to produce anti-hate intervention by corporate ISPs, government, or by grassroots users. Some urge corporate action against hate on the net. Late in 1995 the Simon Wiesenthal Center (SWC) called for ISPs to deny fascists web sites. This did not produce any diminution of the fascist presence. It did, however, bring strong criticisms against the SWC and defenses of "free speech for Nazis." Other actions were taken against the K.K.K. on America Online and similar attacks against hate-based forces on . One problem with such campaigns is that they result in the mantle of martyrdom falling, not on the victims and survivors of Auschwitz, but on those defending the very fascist criminals who produced Auschwitz. The rush to mirror Zundel's web site illustrated this. Similar public campaigns to pressure ISPs to remove web pages do nothing to reduce or eliminate other forms of hate-based net behavior contained in e-mail or on discussion groups. The corporate-based anti-hate strategy will always fail. There are tens of thousands of ISPs on the net, and hate-forces will always be able to locate a home-base on at least one of them. Even when an ISP is successfully pressured, the offending forces relocate to another provider. In a reversal of off-the-net common sense, the net provides a strange equality among ISPs regardless of size, capitalization, advertising, or "prestige." The Plaza Hotel at the corner of New York's Central Park can provide luxury accommodations; the Bed'n'Bite Trailer Motel on Tobacco Road cannot. Once on the net, however, provides web services essentially identical to . In cyberspace every ISP is as geographically close to the user as every other ISP; new web sites are just an URL away. Different ISPs' web-oriented services may be marginally different in upload or download time but from the end-user's perspective they are functionally identical because the hardware, software, and operating protocols are effectively the same. This also holds for such things as e-mail and ancillary services like mailing list 'bots. In a reversal of the normal economy of scale, the smaller provider may even provide better services via things like user-to-modem ratios or technical support than the biggest carriers. Successful pressures on ISPs cannot even substantially increase costs of the hate-based forces. Market mechanisms have reduced basic "all-you-can-eat" net access to the $US 15-25/month rate. The next strategy for "kicking hate off the net" relies on the police/military might of the various states. This must occur on an international level if it is to be successful. The cyberpunk slogan that "National borders are just speedbumps on the global information superhighway" is especially important here. In abstract terms, the net is post-internationalist. It has moved to a globalism that no longer recognizes the very nation states around which one must be internationalist. For many on the net, such nations are little more than the "dot two-letter" suffixes on e-mail addresses and even these disappear as the large ISPs go multinational. In concrete terms, Dilbert no longer bothers or even thinks about whether is located in the U.S. or in Elbonia. Attacks by one government on E. Zundel's Holocaust Revisionist site resulted in the site being mirrored in other countries. Cyberpunks took but a few hours to publish "workarounds" for German users when CompuServe cut some news groups in its German feed. In short, calling on national governments to fight internationalized hate only works if all of the governments participate equally in the crackdown.[22] In Thomas More's words, we can no longer tear down the laws of England to get to the devil; we must tear down the laws of every country to get to the same English devil. When I leave my house to fight off-the-net actions against fascist-based hate speech I know I am far more likely to be physically assaulted by the police protecting the fascists than I am by the fascists themselves. Working with the 1960's civil rights movement exposed me to the actions of both the K.K.K. and the cops. One central difference was that the cop wore a badge and gun outside his uniform; the Klansman often wore the same badge and carried the same gun beneath his white sheet. Unfortunately this process did not end with the 1960s. As I write this the national newspapers still cover the case of Abner Louima, the Haitian man assaulted in a NY police station. Police decided to "teach him respect" for the law by sodomizing him with a bathroom plunger doing severe injuries to his colon and other internal organs, according to widespread press reports. Then they rammed the same plunger down his throat, doing even more injury to his mouth and throat. This excellent example of how police protect us from hate occurred in liberal NY. One wonders what cases have gone unreported elsewhere in the world in geographic locations less interested in "handcuffing" the police. Let us not forget other actions by armed state representatives, as when elite-trained U.S. soldiers stationed further South recently murdered a black couple. Nor was the old Southern judiciary necessarily better that the local sheriff's office. Too often one sensed from legal decisions not to punish those convicted of hate crimes that we faced not the metaphorical "hanging judge" but a literal extra-legal lynching one. In this sense, the Devil and the law were one and the same. The judicial black robes of More's Law might have constrained the devil; relying on the same black-robed figure for protection from the devil only damned the victims of hate-action that More's Law was to protect. Hoover's FBI provided the evidence to convict a few hate-activists during the late civil rights period, largely through paying KKK informants. But the wrath of Hoover, through programs like COINTELPRO, was directed at the same forces the Klan targeted. The FBI did not fight hatred on a broad front; rather it spent money and used its agents to whip up the very hatred it condemned. Hoover branded Dr. M.L. King as the "most notorious liar in America" while bugging his phones, sending him anonymous blackmailing letters designed to have him commit suicide, and spending covert money to create the image of another leader of the "Negro struggle." Similar efforts were directed against the anti-war movement. Even more sustained efforts were directed against groups like the Black Panther Party. Many Party members who were convicted under the hate-oriented atmosphere remain in jail today. In some cases, their unjustified convictions are only today being overturned as is seen in the case of geronimo ji Jaga (Elmer "Geronimo" Pratt).[23] Perhaps the best known case -- Mumia Abu-Jamal -- is still under a death sentence while his case is being appealed.[24] Hoover and the official COINTELPRO program were a long time ago. It may be comforting to repeat "that was then; this is now" as if the words are some crucifix waved in front of the 1960s Devil of Hate in order to convince ourselves that cop-based hatred vanished when Richard Nixon finally died. While comforting, it is not true. Nor is the constant repetition of hate-based action among the cops and military a matter of a single Devil. Dracula may die at the end of every vampire film only to rise again at the beginning of the sequel. But Dracula is only one entity while the forces of hate are countless; their name is Legion. The Tennessee-based hate-filled "Good Old Boys Roundups" were attended by 120-200 Treasury agents and some 45 agents from the Department of Justice.[25] These estimates include people from only two federal agencies and none from the military. Estimates from those agencies are lacking. Missing also are attendance figures from any of the country's local police departments. The story could have broken several years earlier had any cop wanted to act. But there is a massive and continuous differentiation in the police mentality between wrongdoing by citizens and the *identical* wrongdoing by the cops themselves. This difference is illustrated by two stories in the 24 September _New York Times_. Serpico, NY's famed "honest cop" played by actor Al Pacino in the 1973 movie of the same name, just showed up to testify at a City Council meeting on police corruption.[26] Today, 26 years after Serpico revealed massive corruption among NY cops, police hostility to him has not vanished. "... plainclothes officers guarding the entrance to City Hall gave him looks that could have cooled burning coals. For sure, they were polite, those men, some of whom were little boys when Frank Serpico blew the whistle. But they glared in unvarnished hostility...."[26] The issue is far more than merely cop-hate-(whistle-blowing)cop. The same issue of the paper reported retaliatory attacks on the nurse who first reported the Louima police-brutality case to the police Internal Affairs Bureau.[27] The Bureau failed to log the complaint. Dealing with the Devil of Hate, once ensconced among the cops, is far more difficult than merely calling The Exorcist. In the "Butler" case, Canadian courts, following the lead of "radical" feminists A. Dworkin and C. MacKinnon, created strong legal sanctions against printed matter like "pornography" deemed to disparage women and other "minorities."[28] Almost immediately in the political ROTFLMAO event of the decade, Butler was used to ban several of Dworkin's works as pornographic. Butler was then used by Canadian customs as precedent for a general crackdown on gay and lesbian bookstores in that country. [29] One wonders what percentage of lesbians routinely oppress women and how many homosexual men are convicted of heterosexual rape. But such questions did not appear to bother Customs as its agents found the ostensibly anti-hate law useful to act on their own homophobic impulses. Elsewhere in Canada, other laws designed to bolster law enforcement in today's new electronic climate brought charges that police misused the laws against citizens concerning both wiretapping[30] and more general issues of privacy.[31] Internationally, we repeatedly see the dominant role of the cops and military in leading the very violent hate-based action many want them to stop. Have we so soon forgotten the revelations of how the "death squads" in Latin and South America killed tens to hundreds of thousands of "dissidents?" If our collective memory does not extend back into the late 1980s what of the reports this year of how forces in the S. African police killed anti-apartheid leader Steve Biko? Yet the utmost charity is extended to *this* form of hatred, with pardons and general amnesties for cops and Generals pronounced in the spirit of "reconciliation" and "forgiveness." Even under the abstractly best of conditions, reliance on state agencies to fight fascism is exceedingly dangerous. Fascism has little power under good conditions; it develops only when conditions are bad and the very state on which one relies is itself threatened. History repeatedly shows that at such times fascist supporters in the cops and military increase significantly. Relying on the state during such times is like buying insurance against kangaroo bites that is cancelled as soon as one moves to Australia. Germany today has passed strong laws to deal with things like "child pornography and neo-Nazi behavior." But these laws have been used to ban the "Radikal" net site and charge *anti*-fascists with illegal activity.[32] The same police mandated by German law to prosecute neo-Nazi activity assist the same fascists to avoid arrest and prosecution under these laws. A covert intelligence operation conducted by the Simon Wiesenthal Center[33] into European fascist activity documented how such police-assisted fascism organizing occurs and the exact hate-oriented groups and individuals who benefit from it. Overt pro-fascist actions are also increasing in the German military paralleling other German attacks on Turkish immigrants and Romis. "Germany Alert" wrote "German soldiers were involved in some 120 reported incidents involving pro-Nazi, anti-Semitic or anti-foreigner hate over the past year, the Defense ministry revealed. Incidents have more than doubled since last year, the government admitted, as concern about extreme right wing nationalism in the military mounted."[34] The same does not unfold in the opposite direction, for the Devil, once ennobled with the sanctity of law, becomes forever angelic and protected. Nowhere has this been more clearly observed than the case of Erich Mielke. Listed as the "number two man in East Germany for three decades,"[35] he was convicted in 1993 for the murder of two cops. The facts of the case were simple yet astounding. Mielke was a young Communist in Germany during the 1930s, assigned to the defense of the German Communist Party's headquarters. Two high-ranking Storm Troopers in the Berlin police were assigned by the Nazi Party to use their police rank to physically attack Communists working at the HQ. When protests against this went unanswered by the police, Mielke did what many anti-fascists throughout the political spectrum did a few years later. He went out. He killed both cops. Then he went underground. For this action in 1931, he was convicted by a German court 62 years later. Between cops hating Serpico and cops hating Mielke, it's enough to make even Saint Thomas More turn in his halo. FOOTNOTES [17] see, for example, HateWatch via: , accessed 3 Sep 97. "HateWatch is a web based organization that monitors the growing and evolving threat of hate group activity on the Internet. Started in 1996, HateWatch provides an online resource for concerned individuals, academics, activists and the media to keep abreast of and to combat online bigotry. Because the Internet has eliminated geographical and monetary boundaries that once existed for hate groups, we must be vigilant in monitoring these sometimes violent people and their activities in cyberspace." [18] This is not to say that groups listed by the State Department as "terrorist" have no web pages; some do. But they are outnumbered by the neo-fascists and other related groups. [19] see, for example: Jeff Vos, "The Homosexual Threat" via: , accessed 3 Sep 1997. Earlier, Vos was a leading member of the CyberNaziGroup. see, for example, his articles "The Manifesto of the CyberNaziGroup: Let Your Life Be a Lightening Bolt!" and "The CNG: An Idea for On-Line Organizations." available as files FD005.TXT and FD008.TXT via: . [20] Another detailed list of anti-hate/anti-fascist web sites is available from what started as a project at the University of Michigan's School of Information, via: . These sites frequently contain URLs to the hate-oriented web pages. [21] The phrase "pro-government" here does not refer just to the current U.S. government. The "Four Horsemen" arguments are used, in one form or another, by an enormous number of different governments and political systems from Iran to Singapore, and from the People's Republic of China to the Republic of Korea. [22] Some forces are organizing to this end, if not for *all* governments at least for a significant number. See, for example, Clive Parker, "E[uropean] U[nion] sends in the Internet police," _The Times [of London]_, 24 Sep 1997. Barker summarized a speech by EU Commissioner Martin Bangemann, speaking at the Telecom Interactive 97 conference in Geneva, "a call for an international charter to establish worldwide standards for policing the Internet and the broadcasting and multimedia industries." For a *partial* list of U.S. local to global censorship attempts, see the Electronic Frontier Foundation's "Action Alerts" site via: [23] no author, via Associated Press, "Black Panther Geronimo Pratt granted new trial after 25 years," 29 May 97. see also, Edward J. Boyer, "For Pratt Legal Wheels Grind Slowly," _Los Angeles Times_ 3 Jun 97. reprinted in the _ANTIFA INFO-BULLETIN," 3 Jun 97, via: . [24] for details on the controversy, the background of the Mumia case, and the current status of the death-row appeals, see: [25] see _New York Times_, 3 Apr 1996, p. D20:4. [26] Clyde Haberman, "Serpico Steps Out of the Shadows to Testify," _NY Times_, 24 Sep 1997, p. B1. [27] John Kifner, "Nurse Tells of Retaliation For Effort in Louima Case," _NY Times_, 24 Sep 1997, p. B4. [28] Adrienne Weller and Andrea Bauer, "Catharine MacKinnon: Crusader for a Rightwing Women's Movement," _Freedom Socialist_, Vol. 15, No. 1. available on-line as file "FN002.TXT" via: . Edward H. Hurley, "Pornography Makes For Strange Bedfellows: The feminist/right-wing union against pornography," _Ethical Spectacle_ Nov 95, via: , accessed 13 Oct 97. [29] Wendy McElroy and Catherine Siemann, "Right now Little Sisters Bookstore in Vancouver is in court...." no date, press release, reposted to Usenet news group by Jeffrey Shallit, . 18 Aug 94, via: . accessed 13 Oct 97. [30] no author, "Wiretapping probe urged," _The Toronto Star_, Oct 1997, on-line through the Electronic Frontiers Canada via: . accessed 11 Oct 97. [31] Campbell Clark, "Quebec breaking own privacy rules: watchdog," _The Montreal Gazette_, 8 Oct 1997, on-line through he Electronic Frontiers Canada via: . accessed 11 Oct 97. [32] no author listed, "German court to try woman for guerrilla hyperlinks," _New York Times_, 6 Jun 97, summary republished by EduPage, 8 Jun 97. no author listed, "New German law restricting cyberspace," _New York Times_, 5 Jul 97, summary republished by EduCom, 6 Jul 97. [33] no author [Simon Wiesenthal Center], "SWC Operations Report: Part IV--Findings," posted in file dated 24 Dec 96, via: , accessed 21 Sep 97. [34] no author ["Germany Alert", "German Military Hate Incidents Double," 26 Oct 97. via: , accessed 27 Oct 97. [35] Larry Thorson, "Another Attempt in Court to Punish East German Leaders," Associated Press via _The News-Times_. via: accessed 28 Sep 1997. ------------------------------ Date: Thu, 7 May 1997 22:51:01 CST From: CuD Moderators Subject: File 2--Cu Digest Header Info (unchanged since 7 Oct, 1997) Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically. CuD is available as a Usenet newsgroup: comp.society.cu-digest Or, to subscribe, send post with this in the "Subject:: line: SUBSCRIBE CU-DIGEST Send the message to: cu-digest-request@weber.ucsd.edu DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS. The editors may be contacted by voice (815-753-6436), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115, USA. To UNSUB, send a one-line message: UNSUB CU-DIGEST Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU (NOTE: The address you unsub must correspond to your From: line) Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" On Delphi in the General Discussion database of the Internet SIG; on RIPCO BBS (312) 528-5020 (and via Ripco on internet); CuD is also available via Fidonet File Request from 1:11/70; unlisted nodes and points welcome. In ITALY: ZERO! BBS: +39-11-6507540 UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD Web-accessible from: http://www.etext.org/CuD/CuD/ ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/ aql.gatech.edu (128.61.10.53) in /pub/eff/cud/ world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/ wuarchive.wustl.edu in /doc/EFF/Publications/CuD/ EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland) ftp.warwick.ac.uk in pub/cud/ (United Kingdom) The most recent issues of CuD can be obtained from the Cu Digest WWW site at: URL: http://www.soci.niu.edu/~cudigest/ COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ------------------------------ End of Computer Underground Digest #9.80 ************************************