From: Rick Busdiecker <rfb@lehman.com>
To: Tom Edwards <tedwards@access.digex.net>
Message Hash: 711879997ba8a5a6c3d91c3648ee2bc080cd399870a146f7f1fc66efddc1c98d
Message ID: <9510141649.AA20952@cfdevx1.lehman.com>
Reply To: <Pine.SUN.3.91.951013183116.11492A@access5.digex.net>
UTC Datetime: 1995-10-14 16:50:10 UTC
Raw Date: Sat, 14 Oct 95 09:50:10 PDT
From: Rick Busdiecker <rfb@lehman.com>
Date: Sat, 14 Oct 95 09:50:10 PDT
To: Tom Edwards <tedwards@access.digex.net>
Subject: Re: Yes, indeed the PA law is for real!
In-Reply-To: <Pine.SUN.3.91.951013183116.11492A@access5.digex.net>
Message-ID: <9510141649.AA20952@cfdevx1.lehman.com>
MIME-Version: 1.0
Content-Type: text/plain
-----BEGIN PGP SIGNED MESSAGE-----
Date: Fri, 13 Oct 1995 18:42:35 -0400 (EDT)
From: Tom Edwards <tedwards@access.digex.net>
Well folks, you can go view the new PA law yourselves at URL
http://moose.erie.net/~italo/rssb655.html
PA Senate Bill 655 was signed into law on June 13, 1995, and it does
appear to make non-logged anonymous remailers illegal.
I'm guessing that you're referring to this part of the law:
(1) [makes or possesses any instrument, apparatus, equipment or]
makes, distributes, possesses, uses or assembles an unlawful
telecommunication device or modifies, alters, programs or reprograms
a telecommunication device designed, adapted or which can be used:
. . .
(ii) to conceal or to assist another to conceal from any [supplier
of telecommunications] telecommunicationservice provider or from any
lawful authority the existence or place of origin or of destination
of any telecommunication; or
IANAL, but this sure sounds like one could make the case that an ISP
that allowed users to send mail to arbitrary addresses,
e. g. xxx@anon.penet.fi, would be `guilty' of assisting another to
conceal the place of origin and/or destination of a telecommunication.
I'd imagine that the authorities would be a bit more likely to go
after anonymous-remailer@xxx.net however.
In fact, I wonder if the fact that mail to rfb@cmu.edu is forwarded to
rfb@lehman.com couldn't be construed as `assistance' if I happened to
receive mail at that address through penet. Sigh . . . .
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
iQCVAwUBMH/p8JNR+/jb2ZlNAQHnTgP/eycb4eJaVDVw9UTmb82ErzR29dnGSrvT
cdaGq8HoUYV1fjwzfD6aW3B8tiPkM9tcpbV5ck3LnNU7Ylgq3S8T8Zg/JNkdf0jE
J8+KO8HhONNjBgA4hRcEkrnZrHwu3S6BknxgQ+ERCASj7XRybk62pkWGciuoUZyp
FfFtv6FAS1E=
=vIYn
-----END PGP SIGNATURE-----
--
Rick Busdiecker Please do not send electronic junk mail!
net: rfb@lehman.com or rfb@cmu.edu PGP Public Key: 0xDBD9994D
www: http://www.cs.cmu.edu/afs/cs.cmu.edu/user/rfb/http/home.html
send mail, subject "send index" for mailbot info, "send pgp key" gets my key
A `hacker' is one who writes code. Breaking into systems is `cracking'.
Return to October 1995
Return to “Tom Edwards <tedwards@access.digex.net>”