1993-02-19 - Re: toad.com mailing list postings from possible virus authors

Header Data

From: geoffw@nexsys.net (Geoff White)
To: w8sdz@TACOM-EMH1.Army.Mil
Message Hash: e3c6ecdb61e121c23e3604ba4db000c1bd5e4ab47a959a3612da8fa45731acc7
Message ID: <9302191709.AA02257@nexsys.nexsys.net>
Reply To: N/A
UTC Datetime: 1993-02-19 17:17:43 UTC
Raw Date: Fri, 19 Feb 93 09:17:43 PST

Raw message

From: geoffw@nexsys.net (Geoff White)
Date: Fri, 19 Feb 93 09:17:43 PST
To: w8sdz@TACOM-EMH1.Army.Mil
Subject: Re: toad.com mailing list postings from possible virus authors
Message-ID: <9302191709.AA02257@nexsys.nexsys.net>
MIME-Version: 1.0
Content-Type: text/plain


> Subject: Re: toad.com mailing list postings from possible virus authors
> From: w8sdz@TACOM-EMH1.Army.Mil (Keith Petersen - MACA WSMR)
> Content-Type> : > text> 
> Content-Length: 2643
> X-Lines: 59
> Status: RO
> 
> John, by quoting and reposting without my permission, my private
> message to you to a public mailing list you have violated the Federal
> Communications Privacy Act of 1986. 
> 
>                PUBLIC LAW 99-508--OCT. 21, 1986   
>      
>         TITLE II--STORED WIRE AND ELECTRONIC COMMUNICA-
>             TIONS AND TRANSACTIONAL RECORDS ACCESS
>      
> ss. 2702. Disclosure of contents
>      
>      "(a) Prohibitions.--Except as provided in subsection (b)--
>           "(1) a person or entity providing an electronic
>      communication service to the public shall not knowingly
>      divulge to any person or entity the contents of a
>      communication while in electronic storage by that service;
>      and
>           "(2) a person or entity providing remote computing
>      service to the public shall not knowingly divulge to any
>      person or entity the contents of any communication which
>      is carried or maintained on that service--
>                "(A) on behalf of, and received by means of
>           electronic transmission from (or created by means of
>           computer processing of communications received by
>           means of electronic transmission from), a subscriber
>           or customer of such service; and
>           "(B) solely for the purposed of providing storage or
>           computer processing services to such subscriber or
>           customer, if the provider is not authorized to access
>           the contents of any such communications for purposes
>           of providing any services other than storage or
>           computer processing.

Keith,
	Maybe you should read more carefully...


>      "(b) Exceptions.-- A person or entity may divulge the
> contents of a communication--
>           "(1) to an addressee or intended recipient of such
>      communication or an agent of such addressee or intended
>      recipient;
>           "(2) as otherwise authorized in section 2516,
>      2511(2)(1) , or 2703 of this title;
>           "(3) with the lawful consent of the originator or an
>      addressee or intended recipient of such communication, or
>      the subscriber in the case of remote computing service;

I think John is the "intended recipient of such communication"
as I am also an "intended recipient" of this communication 
from you, which I will post to cypherpunks so others can see
what kind of person you are.  If your intention is to "threaten"
with this kind of foolishness, then I must warn you, I consider
this type of behavior harassment due to the confrontive nature of 
your post.  Let it go on record that I don't expect to be harassed,
intimidated or "threatened" and I think the Internet rules are
VERY clear about this type of behavior. 

				Geoff White (GW67)
				geoffw@nexsys.net





Thread