Seeking opinions of Mankato State University email
NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.
Computer underground Digest Wed Aug 21, 1996 Volume 8 : Issue 61
Editor: Jim Thomas (firstname.lastname@example.org)
News Editor: Gordon Meyer (email@example.com)
Archivist: Brendan Kehoe
Shadow Master: Stanton McCandlish
Field Agent Extraordinaire: David Smith
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
CONTENTS, #8.61 (Wed, Aug 21, 1996)
File 1--Seeking opinions of Mankato State University email policy
File 2--Commends requested on Mankato "email" policy
File 3--DOJ homepage hacked!!!
File 4--Re: USDOJ Hacked
File 5--Microsoft Acknowledges Flaw in Internet Browser
File 6--Re: Cu Digest, #8.60--Sun, 18 Aug 96
File 7--Cu Digest Header Info (unchanged since 7 Apr, 1996)
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
Date: Mon, 19 Aug 1996 10:30:32 -0500 (CDT)
From: "Robert A. Hayden" <firstname.lastname@example.org>
Subject: File 1--Seeking opinions of Mankato State University email policy
-----BEGIN PGP SIGNED MESSAGE-----
At the beginning of the year, Mankato State University adopted the
following "email policy". Being a member of the student senate, I
expressed my concerns to the student government about the policy
(particularily the prohibitions on "political" speech), but it wasn't
politically feasible to challenge the policy as the student government had
approved it prior to my election (ie, I don't really thing they knew what
it was they were signing/signing-away). When I did bring it up to the
administration of the university, it was basicly reduced to "well, the
Senate said it was ok, so stick it" (well, that's somewhat paraphrased
Anyways, I'd like some opinions about this, as, in light of the Princeton
case (and the ACLU's response), I think I would like to attack this
policy. I would just like a little better feeling about where this policy
stands than the general "yucky" feeling I get.
Thanks for your time.
Mankato State University
MANKATO STATE UNIVERSITY
ELECTRONIC MAIL TRANSMISSION REGULATION
Article I. Objective
To ensure that electronic mail transmissions between and among MSU
authorized "E-mail" users are consistent with state statutes limiting
the use of state services and equipment to state business purposes
only. This effort is consistent with existing practices governing
other forms of communication on campus including telephone calls,
bulletin board postings, the mass distribution of promotional flyers,
and the use of intra-campus mail services.
Minnesota Statutes Chapter 43A.38, Subd. 4 - Use of State Property
An employee shall not use or allow the use of state time, supplies
or state owned or leased property and equipment for the employee's
private interests or any other use not in the interest of the state,
except as provided by law.
Minnesota Statutes Chapter 43A.39, Subd. 2 - Noncompliance
Any employee who intentionally fails to comply with the provisions
of Chapter 43A shall be subject to disciplinary action and action
pursuant to Chapter 609. An appointing authority shall report in
writing to the legislative auditor when there is probable cause to
believe that a substantial violation has occurred. Any person
convicted of a crime based on violations of this chapter shall be
ineligible for appointment in the civil service for three years
Minnesota Statues Chapter 609.87 thru 609.8911 - Computer Crime
[Statute deals with definitions; destructive computer programs;
intentional damage to computers, computer systems, computer
networks, computer software, etc.; theft of services and equipment;
unauthorized computer access; gross misdemeanor and misdemeanor
criminal penalties; and reporting violations.]
University Facilities and Services - Restricted Use
Faculty and staff are to use University facilities and services for
University business only. [Mankato State's Employee Handbook -
General Policies Section]
Professional and Ethical Standards
University equipment shall not be used by employees for personal use
without notice to and the written consent of his/her employer . . .
. [State University System Regulations Article 2.4] Similar language
is contained in Articles 4 and 27 of the IFO Labor Agreement and
Article 20 Section C of the MSUAASF Agreement.
Students, who are not already on-campus part-time employees covered by
the above statute citations, shall adhere to all E-mail policies and
regulations contained herein. It is the intent of this E-mail
regulation to cover all E-mail users within the campus community.
Article II. Regulation
The electronic mailing privilege is provided to members of the
University community to enhance their ability to quickly and
conveniently send and receive written communications and documents for
the purpose of conducting University business. Use of the privileges
for personal gain and for non-University related business is
prohibited. (The University continues to invest significant amounts of
its budget in the maintenance and improvement of electronic
transmission capability, in addition to the enormous past outlays
which have been made for computer hardware, software, and cabling.)
SECTION 1. FOR PROFIT USE PROHIBITED : NONPROFIT USE REQUIRE PRIOR APPROVAL
For profit organizations are strictly prohibited from the use of
University electronic mail services. (University contract vendors like
Wallace's University Bookstore and the ARAMARK food service shall be
provided access to the University electronic mail system only upon
agreement to pay MSU for these state provided services.) Non-profit
organizations may be allowed access only if the transmission has been
approved in advance by the University Operations Vice President (or
designee). Authorization for such access by a non-profit organization
will hinge on how closely it relates to the "state business use"
standard and the organization's traditional or direct tie to the
University (e.g., Mankato State University Foundation, United Way,
SECTION 2. ACADEMIC FREEDOM PRINCIPLES APPLY
Commonly understood principles of academic freedom shall be applied to
the administration of information transmitted by E-mail.
SECTION 3. EXTERNAL TRANSMISSIONS TO MSU E-MAIL USERS
The ability of the University to monitor and regulate incoming
Internet transmissions is almost impossible. If unsolicited or
unwanted Internet transmissions are received, E-mail users may contact
their mail system manager so that an effort can be made to ensure that
such transmissions do not reoccur from the same source.
SECTION 4. POLITICAL USE OF E-MAIL PROHIBITED
Political transmissions are prohibited. This would include
transmissions which advocate the election of particular candidates for
public office at either the federal, state, or local level. Also
banned are those messages that advocate support of or opposition to
any particular referendum proposal that will be decided by the voters
during a general or special election affecting the public at large.
SECTION 5. COLLECTIVE BARGAINING UNITS, RECOGNIZED STUDENT GROUPS - E-MAIL
This regulation is not to be interpreted as prohibiting transmissions
protected by existing employee collective bargaining agreement
provisions dealing with mailing privileges nor shall it be used to
deny access to recognized student organizations and related student
service departments who wish to announce upcoming events that may be
of interest to members of the University community.
SECTION 6. GENERAL STANDARDS AND GUIDELINES
1. Personal uses of E-mail which are prohibited include, but are not
limited to: chain letters; recipes; "garage sale" announcements;
solicitation or requests for contributions (e.g.needy family,
special relief efforts, etc.); commercial advertisements; and
advertisements for events or items for sale or rent that result in
personal gain or revenue for non-University departments and
programs or unapproved organizations as prohibited by provisions
in Article II, Section 1 of this policy.
2. E-mail users are asked to take care in directing their messages to
large audiences and to avoid sending repeats of the same messages
as "reminders." Concerns also exist that many messages sent to all
MSU mail users could be better targeted to smaller groups of
3. E-mail transmissions shall not be used in any way which violate
Higher Education Board or University policies regarding
harassment. The University is not responsible for transmissions
which are libelous or defamatory.
4. A user's password is the key to the E-mail network and as such
users are advised that they are responsible for the security of
their respective password. There are major risks when a user's
password is known to others. Transmission made using that password
are assumed to be initiated by the password's user, though
managers of E-mail systems who investigate complaints shall not
automatically assume that the author of an offending transmission
is the password's user.
5. It is not the intent of this regulation to interfere with private
communications between individuals.
6. E-mail managers and network system administrators are expected to
treat the contents of electronic files as private and
confidential. Any inspection of electronic files, and any action
based upon such inspection, shall be governed by applicable
federal and state laws and by University policies.
Article III. Sanctions for Violations
Complaints by any user receiving electronic transmissions through Data
General, Microsoft Mail, and existing VAX services may be submitted to
any manager of a major E-mail system or directly to the University
Operations Vice President's Office. An E-mail manager will investigate
the complaint and make a determination on its validity. If a violation
did occur the E-mail manager shall inform the employee's immediate
supervisor and make a recommendation to implement one of the following
sanctions. Severity of the sanction is dependent on the nature of the
violation and history, if any, of past violations. The employee's
supervisor has five work days in which to approve, and or modify, the
E-mail system manager's recommendation. If no action occurs the E-mail
manager's recommendation is forwarded to the University Operations
Vice President for disposition.
SANCTIONS - DEPENDENT ON SEVERITY OF VIOLATION AND/OR HISTORY OF PAST
* Verbal warning.
* Discipline pursuant to appropriate collective bargaining or other
employment regulations; discipline pursuant to appropriate student
* Warning letter to the violator formally notifying of additional
sanctions if violations continue.
* Suspension of electronic mail privileges for five work days. The
user would continue to receive electronic mail but would not be
able to read it until after the suspension of privileges is lifted
and a new electronic mail password is issued by the appropriate
* Penalty consistent with federal or state law and/or employee
collective bargaining agreements. (Could involve referral of
matter to criminal authorities..)
Applicable appeal procedures may be implemented consistent with
employee bargaining unit contracts or student conduct codes.
Article IV. Electronic Mail Oversight Team
The "Electronic Mail Oversight Team" shall review e-mail practices,
procedures and policies and may make recommendations for improvement
to the Vice President for University Operations. The ten member
oversight team include the managers of these major e-mail systems:
* University Operations server (Microsoft Mail)
* P.E.T. server (Microsoft Mail)
* Student Develop. Prgms. & Activities server (Microsoft Mail)
* MSUS/PALS servers (Microsoft Mail)
* College of Science, Eng. & Tech. server (Microsoft Mail)
* Krypton server (Academic DEC with Unix Operating System)
* AS/400 server (Academic IBM System)
* MSMail 4,5,6,7,8, Computer Svcs., ACTS, Admin., MSU Academic, &
Memorial Library servers (Microsoft Mail)
* VAX1 server (MSU Academic VAX)
* Data General server
The team shall be convened at least twice annually and chaired by a
member elected by and from among the panel members.
Article V. Confidentiality and/or Privacy
Users are advised that the privacy of data stored or sent on the
system cannot be guaranteed; furthermore, there are a number of
circumstances in which data stored on the system will be accessed by
authorized individuals. Those circumstances include, but are not
limited, to the following:
* Performing administrative tasks, such as: identifying and pursuing
breaches of security mechanisms; maintaining the integrity or
operational state of the E-mail and related computer systems;
collecting aggregate data; etc. The individual authorizing any
search of a user's data must have reasonable grounds for
suspecting that the search will reveal evidence that the user has
violated a specific University, Higher Education Board policy,
state or federal law, or has committed work related misconduct.
The search of a user's data must be reasonably related in scope to
the suspicion which generated this search.
* Monitoring use of the E-mail and related computer systems to
determine whether the polices of the University, Higher Education
Board, and/or state or federal law have been broken.
* Monitoring use of the E-mail and related computer systems when it
is necessary so that the University can provide its services or
protect the rights or property of the University.
Meet and Confers Held
Date Proposal Submitted/Reviewed
IFO Faculty Association September 14, 1995 and October 12, 1995
MSUAASF Meet and Confer September 18, 1995 and October 16, 1995
Classified Employee Meet and Confer September 28, 1995
Student Association Meet and Confer October 12, 1995
Mankato State University President Date
Document signed by Richard R. Rush on 1/30/1996
Date: Tue, 20 Aug 1996 09:18:16 -0700 (PDT)
From: "Carl M. Kadie" <email@example.com>
Subject: File 2--Commends requested on Mankato "email" policy
I've never seen such a contradictory academic policy.
It says that "private" use is allowed, but that "personal" use is banned.
It says that academic freedom principles prevail, but that political
use is banned.
It says that searches must be based on "reasonable grounds for
suspecting that the search will reveal evidence that the user has
violated a specific [policy]", but also allows general suspensionless
"monitoring use of the E-mail [...] to determin whether the [polices]
have been broken.
[There must be a very interesting story about the creation of
a policy that contracts itself in alternating paragraphs.]
In any case, I believe the policy as it stands is illegal because:
It is unconstitutionally vague (and contradictory). There is no
way that a reasonable person could know if he or she was
violating the policy.
It applies employment rules to students. Students are not employees.
(As the U. of Wisconsin and U. of Michican found out in federal
It bans protected political speech. As the ACLU letter to Princeton
pointed out, political speech not on behalf of the university
can not be singled out censorship.
It seems to authorize illegal searches.
Why all this trouble? I'm sure the University already has general
rules for speech via University resoures, media, forums. Don't
make email a second-class citizen, treat the same as traditional
(All these documents are available on-line. Access information follows.)
* Expression -- Academic - Political Speech
A letter from the ACLU to Princeton University explaining why a ban on
on-line political speech is unnecessary and perhaps illegal.
* Email -- Privacy
q: Can (should) my university monitor my email?
a: Ethically (and perhaps legally) email communications should have
* Email -- Policies
q: Do any universities treat email and computer files as private?
a: Yes, many universities treat email and computer files as private.
If you have gopher, you can browse the CAF archive with the command
These document(s) are also available by anonymous ftp (the preferred
method) and by email. To get the file(s) via ftp, do an anonymous ftp
to ftp.eff.org, and then:
To get the file(s) by email, send email to firstname.lastname@example.org
Include the line(s):
Date: Mon, 19 Aug 1996 05:29:19 -0700 (PDT)
From: Declan McCullagh <email@example.com>
Subject: File 3--DOJ homepage hacked!!!
((MODERATORS' NOTE: To see what the DoJ page looked like during
the "hack," point your browser to:
lynx http://www.doobie.com/~baby-x/usdoj ))
From--"L. G. Shirley" <firstname.lastname@example.org>
Date--17 Aug 1996 22:47:59 GMT
About 10PM last night I clicked on my bookmark for the Federal Gov't and
then selected, by random, the Dept of Justice.
SURPRISE!!!!!!!!!! Someone had made a few changes, For one it is
now called the Department of Injustice. You are immediately
greeted by the Nazi swastika all over your screen's background.
A flag w/the symbol is apparent. George Washington's picture is
captioned with his words, "Move my grave to a free country! This
rolling is making me an insomniac".
Janet Reno's portrait has been replaced by Hitler's. And a flag
now bears the Nazi symbol. She is now called Attorney General
There is plenty of nudity and the many links will take you to
places you may never have been before. I don't think we're in
Kansas anymore Toto!
I have no clues how it was done or when. My guess is someone
changed all the links to the DOJ page to another one, the one you
see when you click on the DOJ's homepage.
I worked today and when I came home and tried to get back to the
DOJ's page, no luck. Must be a major overload <grin> of people
trying to get to the link of women clad in, well, next to nothing
and tied with rope!
I don't think the author will make any brownie points w/women. He
hacked the homepage they have w/the DOJ on violence against
women. I'm not condoning such action and violence is a very
serious issue but whoever did the hack was also very serious.
He changed a Clinton speech on affirmative action and insulted
blacks with his choice of words. There is a lot of rambling about
the internet and the Gov't taking away our rights on it.
The author has a interesting slant on things. This should be
enough of a warning if you're easily offended by racism, hate,
foul language, porn on the net, and general crudeness. Don't go
I would like to know just how this was done, any ideas? Is it
that easy to hack someones homepage?
I wonder how long it'll be before this homepage link is removed
and can they find who did the evil deed? Two months on the Net
and just when I think I'd seen it all, wow.
Date: Mon, 19 Aug 1996 04:49:58 -0700 (PDT)
From: Declan McCullagh <email@example.com>
Subject: File 4--Re: USDOJ Hacked
....<intro deleted -- cud>
August 18, 1996
Hacker Vandalizes Web Site
Of U.S. Justice Department
By JOHN O'NEIL
The New York Times / National News
WASHINGTON -- A computer hacker vandalized the Internet home
page of the Department of Justice on Friday night, posting
obscenities and anti-government graffiti, a department official
The Justice Department's site on the World Wide Web was shut
down early Saturday after members of the public called to
report that the site had been altered, apprarently by a hacker
or hackers who posted nazi insignia, nude photographs and an
attack on the Communications Decency Act. A department
spokesman, Joe Krovisky, said that the site would remain off
line while the department's technical experts assess its
Krovisky said that the system the hacker broke into was
separate from the department's internal computer system, which
contains highly sensitive information about criminal cases and
investigations. "There's no way that the internal department
information could have been affected" by a hacker who gained
access to the information presented on the web site, he said.
"That would have been impossible."
The hacker replaced information on the home page with
obscenities, graffiti and anti-government statements, he said,
but declined to give details.
The Associated Press reported that the site's title had been
changed to "United States Department of Injustice," next to a
red, black and white flag bearing a swastika. The text of the
page was written over a background of gray swastikas, and at
the top declared in red letters: "This page is in violation of
the Communications Decency Act."
The page included color pictures of George Washington, Adolf
Hitler, who is identified as the attorney general, and a
topless Jennifer Aniston, one of the stars of NBC's "Friends,"
the Associated Press said. Other sexually explicit images were
Date: Sun, 18 Aug 1996 23:25:50 -0400 (EDT)
From: Noah <firstname.lastname@example.org>
Subject: File 5--Microsoft Acknowledges Flaw in Internet Browser
---------- Forwarded message ----------
Date--Sun, 18 Aug 1996 13:00:21 -0500
The Sun Herald
18 August 1996
MICROSOFT ACKNOWLEDGES FLAW IN INTERNET BROWSER
Redmond, Wash. - Microsoft Corp.'s Internet Explorer 3.0, its
much-promoted new software for browsing the Internet, has a flaw
that affects its performance on some World Wide Web sites, a company
The new version of the browser launched Monday to compete with
Netscape Communications Corp.'s Navigator, had been downloaded for
free by more than 100,000 people by Friday, said Bill Koszewski, a
Microsoft product manager.
The flaw is a bug in the software that will slow users trying
to access certain Web sites that require their name and a password,
-Commentary: Isn't this the same standard of slipshod performance
that the world expects form Microsoft ?!?!
Date: Mon, 19 Aug 1996 14:47:59 +0000
From: e.tan@UCL.AC.UK(Emerson Tan)
Subject: File 6--Re: Cu Digest, #8.60--Sun, 18 Aug 96
Re: CuD 8.60 File 6--UK ISPs Restrict cyberporn
>U.K. INTERNET PROVIDERS PLAN TO RESTRICT CYBERPORN
This issue seems to have finally pointed out to the public in the UK just
how difficult it is to stamp out internet pronography. It has also pointed
out a major deficency in the legal systems of the nations that are on the
net, namely that of cross border legisaltion. Without some kind of cross
border legislation it is impossible to control this kind of crime. It is up
to the governements and judical systems of the nation where these criminals
reside to adequately prosecute those that distribute illiegal porn. The
problem is that currently those in authority still veiw this a technical
problem for which there is an easy cheap technical fix.
Indeed there is a technical fix, but it runs counter to the entire idea of
the net and can be used for all manner of control purposes. This is to put
the entire nation behind a firewall as in the case of singapore. But still
the possiblity exists that illegal comunications links could spring up
using such things as satalites and dial up modems both legitimate
comunications technologies which are hard to regulate, without being
precieved as being excessive.
In short there is no other solution but to prosecute purveors of offensive
materials 'in real life' and the burden for this task falls on the
judicaries of the world. It also calls for unprecedented co-operation of
law enforcement agencies of the world, rather than increased pressure on
the internet service providers which will only serve to put in plave
legislation which could ultimately snuff out the cosmopolitain nature of
the net, replacing it with a bland set of corporate offerings.
Date: Thu, 21 Mar 1996 22:51:01 CST
From: CuD Moderators <email@example.com>
Subject: File 7--Cu Digest Header Info (unchanged since 7 Apr, 1996)
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.
CuD is available as a Usenet newsgroup: comp.society.cu-digest
Or, to subscribe, send post with this in the "Subject:: line:
Send the message to: firstname.lastname@example.org
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
To UNSUB, send a one-line message: UNSUB CU-DIGEST
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
(NOTE: The address you unsub must correspond to your From: line)
Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
Brussels: STRATOMIC BBS +32-2-5383119 2:email@example.com
In ITALY: ZERO! BBS: +39-11-6507540
In LUXEMBOURG: ComNet BBS: +352-466893
UNITED STATES: etext.archive.umich.edu (184.108.40.206) in /pub/CuD/CuD
ftp.eff.org (220.127.116.11) in /pub/Publications/CuD/
aql.gatech.edu (18.104.22.168) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.
DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.
End of Computer Underground Digest #8.61