From: Modify (modify[at]attrition.org)
To: "John Berryhill Ph.D. J.D." (john@johnberryhill.com)
Cc: Cancer Omega (comega[at]attrition.org),
    security curmudgeon (jericho[at]attrition.org)
Date: Mon, 18 Sep 2000 22:41:41 -0600 (MDT)
Subject: Re: Polite Request

: : Your pager information is made available via your website so thats shot to
: : hell eh?
: 
: The context is considerably different.

How can numbers be made out of context?
 
: : The only reason im coming off the way I am is because of your
: : initial email to us which was that of a bully.  I dont agree with harm
: : that becomes of individuals due to hackers...
: 
: Bullshit you don't.  The page was brought to my attention by a client of
: mine.

And this was 9 months after the fact...?  And I'll repeat this for the
third time.. I don't maintain the mirror or have access to the files
within the mirror and if you took two seconds to look at the mirror page
you will see the correct contacts in the matter.  Sound familiar?

: : Also, lashing out at me doesn't help you in any way, shape, or form..
: 
: I am informing you very directly that I will take legal action if my
: information is not removed from the site.  I don't consider that "lashing
: out" or a "childish game".  I am telling you quite plainly what I am going to

The way that you initially stated the matter was "Take down the web site
or im suing"  That doesn't sound as if your "lashing" out or being a
"bully"?  Which is quite a contradictory to your subject line of "Polite
Request" and if you don't see that then you are blind to the matter.

: do.  I'm sorry if you don't like that, or if you think there is something
: about asserting one's legal rights that makes one a "bully".  But you do not

No, I think the way you approached the situation was childish,
unprofessional, and hard headed.  If you were to have send a "Polite
Request" as stated in this subject this would have probably been a
more civil exchange but no, you had to go into turbo mode and threaten
lawsuits from the get go.

: have the right to perpetuate the harm sought to be done by the hacker.

The harm DONE BY THE HACKER is the key phrase.  If anybody wanted your
information be it your home address, pager number, place of business they
could have got it through any means on the internet.  It is readily
available for all to see.


[an error occurred while processing this directive]