From: dwomack@runner.utsa.edu (David L Womack)
To: cypherpunks@toad.com
Message Hash: 85dff1ac1ddb1a2d6ce240c691a1302f37c1bbe762677b5a53793fff94858df3
Message ID: <9405261716.AA28738@runner.utsa.edu>
Reply To: N/A
UTC Datetime: 1994-05-26 17:16:55 UTC
Raw Date: Thu, 26 May 94 10:16:55 PDT
From: dwomack@runner.utsa.edu (David L Womack)
Date: Thu, 26 May 94 10:16:55 PDT
To: cypherpunks@toad.com
Subject: Unicorn vs....
Message-ID: <9405261716.AA28738@runner.utsa.edu>
MIME-Version: 1.0
Content-Type: text/plain
I have to support Black Unicorn's use of the courts.
Really, what choices were available?
a) Do nothing. Eat the losses. Suffer destruction
of his reputation. Does anyone really advocate
this? Even the religiously inclined don't advocate
turning the other cheek ad inifinitum...
b) Mail bombs or other amusements. Not only does one
join the target in the same figurative gutter, there
are real questions of efficacy and legality. Simply
because one side foreswears the legal system, there
is no guarantee both sides will. And, there is
absolutely no guarantee that a sys. admin. won't seek
criminal prosecution under a tampering with the computer
theory.
c) Hire some fool(s) to break the target's hands. Not only
do you risk prosecution, ala T. Harding, but I rather
doubt we want to enter this still lower gutter.
d) Pursue a criminal indictment. Nice in that it really
gets the target's attention, but it can be difficult to
do. And if people object to civil litigaton, I suppose
criminal charges would be even more objectionable.
e) Sue the guy. It's legal, it's easy, and it get's people's
attention.
So, I, for one, think Black Unicorn took the best and most
reasonable approach. I'd be very interested in which course
(or some other undefined course I didn't think of) that
the anarchists feel would be reasonable...
Regards,
Dave
Return to May 1994
Return to “Sandy Sandfort <sandfort@crl.com>”