Computer underground Digest Sun Dec 20, 1992 Volume 4 : Issue 67 ISSN 1067-672X Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) Archivist: Brendan Kehoe Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Copy Iditor: Etaion Shrdlu, Junior CONTENTS, #4.67 (Dec 20, 1992) File 1--Thanks to all and see ya Jan 9th File 2--Secret Service Raids Dorm File 3--Tales From the Crackdown File 4--SYSLAW (Review #1) File 5--SYSLAW (Review #2) File 6--Model BBS/User Contract (from SYSLAW) Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost from tk0jut2@mvs.cso.niu.edu. The editors may be contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115. Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL0 and DL12 of TELECOM; on Genie in the PF*NPC RT libraries; from America Online in the PC Telecom forum under "computing newsletters;" on the PC-EXEC BBS at (414) 789-4210; in Europe from the ComNet in Luxembourg BBS (++352) 466893; and using anonymous FTP on the Internet from ftp.eff.org (192.88.144.4) in /pub/cud, red.css.itd.umich.edu (141.211.182.91) in /cud, halcyon.com (192.135.191.2) in /pub/mirror/cud, and ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD. European readers can access the ftp site at: nic.funet.fi pub/doc/cud. Back issues also may be obtained from the mail server at mailserv@batpad.lgb.ca.us. COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Some authors do copyright their material, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ---------------------------------------------------------------------- Date: Sat, 19 Dec 92 23:18:21 CST From: Moderators Subject: File 1--Thanks to all and see ya Jan 9th CuD will be on vacation from 23 December through about 8 January. Issue #5.01 will be out about January 9. We will, however, continue to answer mail and take subs over break. A special year's end THANKS!!! goes out to the gang who have maintained the CuD ftp sites: DAN (beware of flaming sambuca snorters) CAROSONE, PAUL (even if he is from the "other" university in Michigan) SOUTHWORTH, RALPH (the quiet one) SIMS, JYRKI (who will never be accused of lurking) KUOPOLLA, and the guy who makes it all possible BRENDAN (the only Zen net-meister we now) KEHOE. And, special thanks to the mailserv meister at mailserv@batpad.lgb.ca.us. He's too young to mention his name, but he's done a fine job in keeping the mailserv going. As usal, the proof reeding and coyp editor, Etaion Shrdlu, Junior, has kept CuD texts error-free ofspelling and typo errors. And, of course, thanks to everybody who sent in articles (and to those who read them). The January issues will include several on the Software Publishers' Association (SPA), including interviews, commentary, and other stuff. So, see ya'll about a week after New Year's. Jim and Gordon ------------------------------ Date: Thu, 17 Dec 92 16:08:10 CST From: Joe.Abernathy@HOUSTON.CHRON.COM(Joe Abernathy) Subject: File 2--Secret Service Raids Dorm Federal Agents Raid Dorm, Seize Computer Equipment By JOE ABERNATHY Copyright 1992, Houston Chronicle The Secret Service has raided a dorm room at Texas Tech University, seizing the computers of two Houston-area students who allegedly used an international computer network to steal computer software. Agents refused to release the names of the two area men and a third from Austin, who were not arrested in the late-morning raid Monday at the university in Lubbock. Their cases will be presented to a grand jury in January. They are expected to be charged with computer crime, interstate transport of stolen property and copyright infringement. "The university detected it," said Resident Agent R. David Freriks of the Secret Service office in Dallas, which handled the case. He said that Texas Tech computer system operators contacted the Secret Service when personal credit information was found mixed with the software mysteriously filling up their fixed-disk data storage devices. The raid is the first to fall under a much broader felony definition of computer software piracy that could affect many Americans. This October revision to the copyright law was hotly debated by computer experts, who contended that it sets the felony threshold far too low. Agents allege that the three used a chat system hosted on the Internet computer network, which connects up to 15 million people in more than 40 nations, to make contacts with whom they could trade pirated software. The software was transferred over the network, into Texas Tech's computers, and eventually into their personal computers. The Secret Service seized those three personal computers and associated peripherals which an agent valued at roughly $5,000. The software Publishers Association, a software industry group chartered to fight piracy, contends that the industry lost $1.2 billion in sales in 1991 to pirates. Although these figures are widely questioned for their accuracy, piracy is widespread among Houston's 450-plus computer bulletin boards, and even more so on the global Internet. "There are a lot of underground sites on the Internet run by university system administrators, and they have tons of pirated software available to download -- gigabytes of software," said Scott Chasin, a former computer hacker who is now a computer security consultant. "There's no way that one agency or authority can go through and try to sweep all the bad software off the Internet, because the Internet's too big." The mission of the Secret Service does not normally include the pursuit of software piracy, but rather the use of "electronic access devices" such as passwords in the commission of a crime. This gives the service purview over many computer and telecommunications crimes, which often go hand-in-hand, with occasional bleedover into other areas. Freriks said that the investigation falls under a revision of the copyright laws that allows felony charges to be brought against anyone who trades more than 10 pieces of copyrighted software -- a threshold that would cover many millions of Americans who may trade copies of computer programs with their friends. "The ink is barely dry on the amendment, and you've already got law enforcement in there, guns blazing, because somebody's got a dozen copies of stolen software," said Marc Rotenberg, director of Computer Professionals for Social Responsibility, in Washington, D.C. "That was a bad provision when it was passed, and was considered bad for precisely this reason, giving a justification for over-reaching by law enforcement." Freriks noted that the raid also involved one of the first uses of an expanded right to use forfeiture against computer crime, although he was unable to state from where this authority evolved after a civil rights lawyer questioned his assertion that it was contained in the copyright law revision. "One of our complaints has always been that you catch 'em, slap 'em on the wrist, and then hand back the smoking gun," he said. "Now all that equipment belongs to the government." ------------------------------ Date: Thu, 17 Dec 92 16:32:11 CST From: Joe.Abernathy@HOUSTON.CHRON.COM(Joe Abernathy) Subject: File 3--Tales From the Crackdown Have you been accused, falsely or with cause, of a computer crime? Have you been the victim of a computer crime? Are you a law enforcement professional who would like to set the record straight? If you fit any of these, or if you're a knowledgeable, qualified observer, the Houston Chronicle would like to talk with you. We're doing a completely different kind of hacker story from the kind you're used to reading, but we need your help. We need to know about cases with which you've been involved, what went right and what went wrong. Don't be shy. We don't promise to edit reality, but you can count on us to get your story right, no matter which side of the aisle you tread, and to try to sympathize with your beliefs and objectives. More details will be forthcoming out of the glare of our competition's eyes :-) so let's talk: Joe Abernathy Joe.Abernathy@chron.com Special Projects P.O. Box 4260 The Houston Chronicle Houston, Texas 77210 (800) 735-3820 Ext 6845 (713) 220-6845 ------------------------------ Date: Wed, 11 Nov 92 14:13:30 CST From: Mike.Riddle@IVGATE.OMAHUG.ORG(Mike Riddle) Subject: File 4--SYSLAW (Review #1) SYSLAW (Second Edition). By Lance Rose and Jonathan Wallace. Winona (Minn.): PC Information Group, Inc. 306 pp. $34.95 (paper). The old truism that law follows technology comes as no surprise to readers of the Computer Underground Digest. Many, if not most, of the (horror) stories we hear about "evil hackers", or the (sometimes) excesses of various law enforcement agencies, can be understood much better when we realize the lack of computer knowledge within society at large. System operators, be they sysadmins at a large university or commercial site, or sysops of a PC-based bulletin board in a basement or closet, increasingly have questions about their legal rights and responsibilities. Can I delete that user? Should (or can I legally) censor or delete that message or file? How can I protect myself from civil or criminal liability? Can my equipment be seized because of something a user does? SYSLAW is an attempt to explore the gap between statutes and case law on the one side, and technological reality on the other. Since the law works slowly, many of the questions about the intersection of law and technology do not have textbook answers. But "the smallest journey begins with a step." Messrs. Rose and Wallace have made a substantial step down that path. While the courts have yet to rule on many of the questions posed by sysops, sysadmins, and others, we still have fundamental principles of constitutional and communications law to rely upon. Rose and Wallace begin by exploring Sysop rights within the traditional framework of Constitutional law, particularly the First Amendment. After discussing the Constitutional principles that apply to Sysops, they then go on to explore the contractual nature of computer communications. Contracts are legally enforceable agreements, and we find them everywhere in daily life. Sometimes we even realize that a contract is involved, and a small fraction of those contracts are important enough to be written down. Bulletin boards are the same way. Explicit or implied contracts are established when a user logs on to a bulletin board. Rose and Wallace suggest the wise sysop recognize this reality, and explicitly lay out a contract for use. They also include a sample as an appendix. Another area of concern is the law of intellectual property. Who owns the posts? Does a moderator (either usenet or Fido style) have any ownership in the overall newsgroup or echo? When can messages legally be copied? What about files and executable code? While the context may be new, many of the questions are old and have relatively well-established answers. What about "injurious materials" on a bulletin board? Is the sysop liable? What did _Cubby v. Compuserve_ really decide? What are the rules on search and seizure, and what has actually happened in the few cases we know about? Does the sysop have an obligation to search for and/or warn about viruses? What about sexually explicit material? Many of these areas do not have clear answers, and one of the strengths of SYSLAW is that the authors do not attempt to invent law where it doesn't exist. But in the places where the law is unsettled, they do a good job explaining the legal, social and sometimes moral considerations that a court would consider if the question arose. They sometimes tell you what they think the result might be, or what they think it should be. They caution at the start that until courts consider several cases, and/or until we get appellate decisions, the users and operators incur some degree of risk in engaging in certain activities. The reader is left with a better understanding of the issues involved, and reasonable actions sysops might take to insulate themselves from liability of one sort or another. SysLaw is available from PC Information Group, 800-321-8285 or 507-452-2824, and located at 1126 East Broadway, Winona, MN 55987. You may order by credit card or by mail. Price is $34.95 plus $3.00 shipping and (if applicable) sales tax. Price is subject to change after January 1, 1993. For additional information, please ------------------------------ Date: Sat, 28 Nov 92 10:19:54 CDT From: Jim Thomas Subject: File 5--SYSLAW (Review #2) The U.S. Secret Service's "crackdown" on hackers in the past two years has included seizures of computer hardware running BBSes. This raises significant questions for the legal obligations of both users and sysops. The "Phrack trial," Operation Sun Devil, and--more recently--the alleged USSS involvement in disrupting law-abiding 2600 meetings underscore the importance of establishing unequivocal Constitutional protections of BBSes. SYSLAW, a comprehensive summary of the legal liabilities and obligations of BBS sysops, is mistitled: It's not simply a legal handbook for sysops, but a helpful compendium of laws and practices relevant to BBS users as well. Although both Lance Rose and Jonathan Wallace (R&W) are attorneys, the volume is written clearly and without overwhelming legal jargon, and even the casual BBS user should derive sufficient information from the volume to understand the problems sysops confront in running a board. Rose and Wallace accomplish their stated goals (p. xxii) of familiarizing readers with the kinds of legal questions arising in a BBS context, providing sysops with a legal overview of laws bearing on BBS operations, and identifying the legal ambiguities in which the law appears to provide no clear guidelines for operation, yet may place a sysop at legal risk. Syslaw is divided into nine chapters and 10 hefty appendices. The core issues in the book are 1) First Amendment and speech, 2) privacy, 3) sysop liabilities to users, and 4) sysop/user relations. In the first chapter, the authors emphasize that the question of the relationship of a BBS to the First Amendment remains unsettled, and this relationship generates considerable discussion in BBS forums and on Usenet (eg, comp.org.eff.talk). While noting that BBSs create new challenges or Constitutional interpretation, R&W identify two reasons why BBSs deserve "the full protection from legal interference granted by the First Amendment under its express protections of "speech," "press," "peaceable assembly," and "petitioning the government" (p. 2). First, BBSs are focal points for creating, collecting and disseminating information, and as such, electronic speech is "perfectly analogous to printed materials which are universally acknowledge as protected under the First Amendment." Second, R&W argue that BBSs are analogous to physical printing presses and promote the growth of alternative publishers with diverse points of view. Just as technology has expanded rights from print media other media, such broadcast radio and television, BBSs also reflect an emergent technology that functions in much the same way as the older media: BBS's ((sic)) powerfully fulfill the goal of the First Amendment by enabling effective publishing and distribution of diverse points of view, many of which never before had a voice. Protecting BBS's should be one of the primary functions of the First Amendment today (p. 3). R&W argue that there are three main ways that the First Amendment protects BBSs: (1) it sharply limits the kinds of speech that can be considered illegal on BBS', (2) it assures that the overall legal burdens on sysops will be kept light enough that they can keep their BBS' running to distribute their own speech and others', and (3) it limits the government's ability to search or seize BBS' where it would interfere with BBS' ability to distribute speech. The authors identify three kinds of BBS operations that, for First Amendment purposes, qualify for various types and amounts of protection (p. 8-17): They are simultaneously publishers, distributors, and shared message networks. The authors emphasize that speech protections are an issue between the government and the citizens, not the sysops and their users. Sysops, they remind us, can--within the law--run their boards and censor as they wish. The danger, R&W suggest, is that over-cautious sysops may engage in unnecessary self-censorship in fear of government intervention. Their goal is to provide the BBS community with guidelines that help distinguish legal from illegal speech (and files). The remaining chapters address topics such as sysop liability when injurious activities or materials occur on a BBS, the sysops obligations when obviously illegal behavior is discovered, the "problem" of sexual explicit materials, and searches and seizures. Of special interest is the chapter on contractual obligations between sysop and users (chapter 2) in which they suggest that one way around many of the potential legal liabilities a sysop might face with users is to require a binding "caller contract" that explicitly delineates the rights and obligations of each party. They provide a sample contract (Appendix A) that, if implemented at the first-call in screen progression format (any unwillingness to agree to the terms of the contract prevents the caller from progressing into the system) that they judge to be legally binding if the caller completes the contract by agreeing to its terms. The Appendixes also include a number of federal statutes that provide a handy reference for readers. These include statues on child pornography, state computer crime laws, and federal computer fraud and abuse acts. My one, in fact my only, objection to the book was to a rather hyperbolic swipe at "pirate boards:" Only a tiny minority of BBS's operate as "pirate boards" for swapping stolen software, computer access codes, viruses etc. When these criminal boards are seized and shut down by the authorities everyone benefits (p. 6). This rather excessive and simplistic view of "piracy" seems to contradict both their intent to improve understanding of new technology and corresponding behaviors by avoiding such extreme words as "stolen software" and to clarify the nuances in various forms of behavior in ways that distinguish between, for example, casual swapping of copyright files and profiteering. This, however, is a minor quibble (and will be taken up in future issues of CuD focusing on piracy and the Software Publishers' Association). Syslaw should be required reading for all BBSers. Unfortunately, it is available *only* from PC Information group, Inc. Those wishing to obtain a copy can write the publisher at: 1125 East Broadway Winona, MN 55987 Voice: (800-321-8285 / 507-452-2824 Fax: 507-452-0037 If ordering directly, add $3.00 (US) to the $34.95 price for shipping. ------------------------------ Date: 01 Dec 92 10:33:25 EST From: Lance Rose <72230.2044@COMPUSERVE.COM> Subject: File 6--Model BBS/User Contract (from SYSLAW) Appendix A Sample Caller Contract (from SysLaw) The following sample contract provides some guidelines for a sysop's contract with his or her callers. Everyone's BBS and services are a little different, so it is not recommended that readers use this sample in "plain vanilla" form as their own contract. If possible, ask a lawyer comfortable with online activities to review the form and recommend any changes necessary for your particular BBS. BULLETIN BOARD SERVICES AGREEMENT A. Introduction We start every new caller relationship with a contract. It spells out what you can expect from us, and what we expect from you. We do not know each caller personally, so it is important to set out the ground rules clearly in advance. If you agree to what you read below, welcome to our system! An instruction screen at the end of the contract will show you how to sign up. If you have any questions about any part of the contract, please send us an e-mail about it! We will be glad to explain why these contract provisions are important for our system. We are willing to work with you on making changes if you can show us you have a better approach. Please remember - until you and we have an agreement in place, you will not receive full access to our system. B. Access and Services. (1) Access - We will give you full access to all file and message areas on our system. Currently, these include: Public message areas - reading and posting messages. We are also a member of Fidonet, which means you can join in public discussions with callers of other bulletin boards around the world. File transfer areas - uploading, downloading files and browsing files E-mail - sending and receiving messages (please see the section on privacy, below) Chat areas - real-time discussions with other callers who are online at the same time as you Gateways - permitting you to send e-mail to systems on other computer networks. Currently, we have an Internet gateway in place, and we operate as a Fidonet node. (2) Services - We offer a variety of services to our callers, and are adding more all the time. Our current services include: Daily electronic news from nationally syndicated news services. Free classified advertising for our callers, in an area subdivided into different product categories. Virus hotline - an area with frequently updated news on computer virus outbreaks, new forms of virus detected, new ways to protect your computer, and other matters of interest. QMail (TM) services, allowing you to upload and download all messages you are interested in batch form. If you would like to set up a private discussion area on our system for a group, we will be glad to do so for fees and terms to be discussed. (3) We may change or discontinue certain access or services on our system for time to time. We will try to let you know about such changes a month or more in advance. C. Price and Payment (1) We will charge you a monthly fee for using our system. For $15 per month, you can use our system each month for up to 40 hours of connect time, and you can send up to 200 electronic mail messages. For additional use, you will be required to pay additional charges of 50 cents an hour, and 10 cents per electronic mail message. (2) Certain services on our system require additional fees. Please review the complete price list in the Caller Information area before signing up for any such services. The price list will tell you which services are included in the standard monthly fee, and which are extra. (3) You may pay by check or by credit card. You will be given the opportunity to choose the payment method when you sign up. If you choose to pay by credit card, we will automatically bill the amount due to your credit card account at the end of every month. If you choose to pay by check, we will send you an invoice at the end of every month. Payment is due within twenty days after we send your invoice. (4) We can change the prices and fees at any time, except that our existing customers will receive two months notice of any change. All price changes will be announced in opening screen bulletins. D. System Rules Besides payment, the only thing we ask from you is that you follow the rules we set for use of the system. You will find our rules in two places: in the following list here in the contract, and in the bulletins posted at various points in the system. Here are some of the basic rules for our system: Respect other callers of the system. Feel free to express yourself, but do not do anything to injure or harm others. In particular, if you dislike someone else's ideas, you can attack the ideas, but not the person. We want people to speak freely on our system. But if you misuse that freedom to abuse others, we will take the liberty of cutting that discussion short. Do not use our system for anything that might be illegal. This system may not be used to encourage anything to do with illegal drugs, gambling, pornography, prostitution, child pornography, robbery, spreading computer viruses, cracking into private computer systems, software infringement, trafficking in credit card codes, or other crimes. People sometimes have trouble figuring out whether certain activities are illegal. It's usually not that hard. If it's illegal out there, it's illegal in here! Using a bulletin board system to commit a crime does not make it less of a crime. In fact, if you use a bulletin board system to commit a crime, you're exposing the operators of the system, and its other callers, to legal risks that should be yours alone. If you genuinely do not know whether something you'd like to do is legal or illegal, please discuss it with us before you proceed. And if we tell you we do not want you to pursue your plans on our system, please respect our decision. Respect the security of our system. Do not try to gain access to system areas private to ourselves, or to other callers. Some callers try to crack system security just to show it can be done. Don't try to demonstrate this on our system. E. Privacy We offer private electronic mail on our system as a service to our callers. We will endeavor to keep all of your e-mail private, viewable only by you and the person to whom you address it, except: We, as system operators, may need to look at your electronic mail if we believe it is necessary to protect ourselves or other callers from injury or damage. For example, if we have reason to believe a caller is involved in illegal activities, which creates a risk that our system could be seized by the authorities, we will review his or her electronic mail for our own protection. We will not, however, monitor electronic mail unless we believe it is being misused. We will not deliberately disclose electronic mail to other callers. If we believe certain electronic mail is connected with illegal activities, we may disclose it to the authorities to protect our system, ourselves and other callers. Remember that the person to whom you send electronic mail does not need to keep it secret. The sender or receiver of electronic mail has the right to make it public. If the authorities ever search or seize our system, they may gain access to your private electronic mail. In that case, we cannot assure they will not review it. Remember that you have personal rights of privacy that even the government cannot legally violate, though you may have to go to court to enforce those rights. F. Editorial Control We want our system to be a worthwhile place for all of our callers. This does not mean everyone can do whatever they choose on this system, regardless of its effect on others. It is our job to accommodate the common needs of all callers while striving to meet our own goals for the system. We will not monitor all messages and file transfers. We want to keep the message and file traffic moving quickly and smoothly - this goal would be defeated if we monitored everything on the system. However, if we see (or hear about) messages or other activities that violate the rules, threaten the order or security of the system, or use the system in ways we do not agree with, we will take appropriate action. Our editorial control includes normal housekeeping activities like changing subject headers and deleting profanities in public messages and selecting among uploaded files for those we wish to make available for download. It also goes beyond that. If a caller persists in posting messages or transferring files that we previously warned him should not be on the system, those messages will be deleted, and he or she may be locked out. If we discover any caller violating the rules, especially the prohibition against illegal activities, we will act firmly and swiftly. Depending on the circumstances, the caller involved will be warned, or simply locked out. If the caller has done anything to put us or other callers in jeopardy, we may contact the authorities. We do not plan on doing any of these things. If all callers act with respect and regard for us and for other callers, there will never be any problems. But if problems arise, we will assert control over our system against any caller who threatens it. And in this Agreement, you acknowledge that control. G. Ownership of Materials You shall retain all rights to all original messages you post and all original files you upload. Likewise, you must respect the ownership rights of others in their own messages and files. You may not post or upload any messages or files unless you own them, or you have full authority to transmit them to this system. We own certain things you will find on this system, including the "look and feel" of the system, the name of our system, and the collective work copyright in sequences of public messages on our system. You cannot reproduce any message thread from our system, either electronically or in print, without our permission and the permission of all participants in the thread. This is not a complete list - other things on the system are also our property. Before you copy anything from our system with plans of reproducing it or distributing it, contact us about it. H. Limitation of Liability and Indemnity. The great danger for us, and for all operators of bulletin board systems, is that we might be held accountable for the wrongful actions of our callers. If one caller libels another caller, the injured caller might blame us, even though the first caller was really at fault. If a caller uploads a program with a computer virus, and other callers' computers are damaged, we might be blamed even though the virus was left on our board by a caller. If a caller transfers illegal credit card information to another caller through private electronic mail, we might be blamed even though we did nothing more than unknowingly carry the message from one caller to another. We did not start this system to take the blame for others' actions, and we cannot afford to operate it if we must take that blame. Accordingly, we need all callers to accept responsibility for their own acts, and to accept that an act by another caller that damages them must not be blamed on us, but on the other caller. These needs are accomplished by the following paragraph: You agree that we will not be responsible to you for any indirect, consequential, special or punitive damages or losses you may incur in connection with our system or any of the data or other materials transmitted through or residing on our system, even if we have been advised of the possibility of such damage or loss. In addition, you agree to defend and indemnify us and hold us harmless from and against any and all claims, proceedings, damages, injuries, liabilities, losses, costs and expenses (including reasonable attorneys fees) relating to any acts by you or materials or information transmitted by you in connection with our system leading wholly or partially to claims against us or our system by other callers or third parties. I. Choice of Law Our bulletin board system can be reached by callers from all fifty states, and around the world. Each of these places has a different set of laws. Since we cannot keep track of all these laws and their requirements, you agree that the law of our own state, ________, will apply to all matters relating to this Agreement and to our bulletin board system. In addition, you agree and consent that if you ever take legal action against us, the courts of our own state, _______, will have exclusive jurisdiction over any such legal actions. J. General This agreement is the entire understanding between you and us regarding your relationship to our bulletin board system. If either you or we fail to notify the other of any violations of this agreement, this will not mean that you or we cannot notify the other of future violations of any part of this agreement. [Contract sign-up process] ------------------------------ End of Computer Underground Digest #4.67 ************************************