From: Modify (modify[at]attrition.org) To: "John Berryhill Ph.D. J.D." (email@example.com) Cc: Cancer Omega (comega[at]attrition.org), security curmudgeon (jericho[at]attrition.org) Date: Mon, 18 Sep 2000 22:41:41 -0600 (MDT) Subject: Re: Polite Request : : Your pager information is made available via your website so thats shot to : : hell eh? : : The context is considerably different. How can numbers be made out of context? : : The only reason im coming off the way I am is because of your : : initial email to us which was that of a bully. I dont agree with harm : : that becomes of individuals due to hackers... : : Bullshit you don't. The page was brought to my attention by a client of : mine. And this was 9 months after the fact...? And I'll repeat this for the third time.. I don't maintain the mirror or have access to the files within the mirror and if you took two seconds to look at the mirror page you will see the correct contacts in the matter. Sound familiar? : : Also, lashing out at me doesn't help you in any way, shape, or form.. : : I am informing you very directly that I will take legal action if my : information is not removed from the site. I don't consider that "lashing : out" or a "childish game". I am telling you quite plainly what I am going to The way that you initially stated the matter was "Take down the web site or im suing" That doesn't sound as if your "lashing" out or being a "bully"? Which is quite a contradictory to your subject line of "Polite Request" and if you don't see that then you are blind to the matter. : do. I'm sorry if you don't like that, or if you think there is something : about asserting one's legal rights that makes one a "bully". But you do not No, I think the way you approached the situation was childish, unprofessional, and hard headed. If you were to have send a "Polite Request" as stated in this subject this would have probably been a more civil exchange but no, you had to go into turbo mode and threaten lawsuits from the get go. : have the right to perpetuate the harm sought to be done by the hacker. The harm DONE BY THE HACKER is the key phrase. If anybody wanted your information be it your home address, pager number, place of business they could have got it through any means on the internet. It is readily available for all to see.