1358 lines
62 KiB
Plaintext
1358 lines
62 KiB
Plaintext
![]() |
F I D O N E W S -- Vol.10 No.15 (12-Apr-1993)
|
|||
|
+----------------------------+-----------------------------------------+
|
|||
|
| A newsletter of the | |
|
|||
|
| FidoNet BBS community | Published by: |
|
|||
|
| _ | |
|
|||
|
| / \ | "FidoNews" BBS |
|
|||
|
| /|oo \ | +1-519-570-4176 1:1/23 |
|
|||
|
| (_| /_) | |
|
|||
|
| _`@/_ \ _ | Editors: |
|
|||
|
| | | \ \\ | Sylvia Maxwell 1:221/194 |
|
|||
|
| | (*) | \ )) | Donald Tees 1:221/192 |
|
|||
|
| |__U__| / \// | Tim Pozar 1:125/555 |
|
|||
|
| _//|| _\ / | |
|
|||
|
| (_/(_|(____/ | |
|
|||
|
| (jm) | Newspapers should have no friends. |
|
|||
|
| | -- JOSEPH PULITZER |
|
|||
|
+----------------------------+-----------------------------------------+
|
|||
|
| Submission address: editors 1:1/23 |
|
|||
|
+----------------------------------------------------------------------+
|
|||
|
| Internet addresses: |
|
|||
|
| |
|
|||
|
| Sylvia -- max@exlibris.tdkcs.waterloo.on.ca |
|
|||
|
| Donald -- donald@exlibris.tdkcs.waterloo.on.ca |
|
|||
|
| Tim -- pozar@kumr.lns.com |
|
|||
|
| Both Don & Sylvia (submission address) |
|
|||
|
| editor@exlibris.tdkcs.waterloo.on.ca |
|
|||
|
+----------------------------------------------------------------------+
|
|||
|
| For information, copyrights, article submissions, |
|
|||
|
| obtaining copies and other boring but important details, |
|
|||
|
| please refer to the end of this file. |
|
|||
|
+----------------------------------------------------------------------+
|
|||
|
========================================================================
|
|||
|
Table of Contents
|
|||
|
========================================================================
|
|||
|
|
|||
|
1. Editorial..................................................... 2
|
|||
|
2. Articles...................................................... 2
|
|||
|
The Cynic's Sandbox, v2.1BetaTestDoNotDistribute............ 2
|
|||
|
The SIP_SURVIVOR Echo....................................... 3
|
|||
|
LuxCon/EuroCon '93 announcement............................. 4
|
|||
|
Ethical approaches to Postmastering"........................ 8
|
|||
|
Alert!...................................................... 19
|
|||
|
Caller ID Still Isn't Reliable.............................. 19
|
|||
|
New VW echo starting!!!..................................... 21
|
|||
|
School Music Echo........................................... 22
|
|||
|
FREQ PRIME.ZIP from 1:18/98, 1:18/99, or 6:700/26 for networ 22
|
|||
|
3. Fidonews Information.......................................... 23
|
|||
|
FidoNews 10-15 Page: 2 12 Apr 1993
|
|||
|
|
|||
|
|
|||
|
========================================================================
|
|||
|
Editorial
|
|||
|
========================================================================
|
|||
|
There is not much of an editorial this week; we have been busy
|
|||
|
enjoying ourselves <S>. My son and his other have been sleeping
|
|||
|
on the living room floor en route from Vancouver to Moncton by
|
|||
|
thumb [maybe 6,000 km]. We have spent lots of hours talking
|
|||
|
about the road, and I don't think it has changed much since the
|
|||
|
sixties.
|
|||
|
|
|||
|
We have an extremely interesting article on mail privacy
|
|||
|
reprinted by permission of the author. It is a bit longish,
|
|||
|
but fascinating reading.
|
|||
|
|
|||
|
Thank goodness the policy articles seem to have burned
|
|||
|
themselves out, 'though caller id lingers on with nothing much
|
|||
|
new being said. I would like to read an article that said "I
|
|||
|
have caller id because I am a paranoid control freak ... " then
|
|||
|
another that said "I want to ban it because my users are
|
|||
|
paranoid, and I want them to be comfortable ...".
|
|||
|
|
|||
|
Anyway, on to the snooze .......................cacti!.
|
|||
|
|
|||
|
========================================================================
|
|||
|
Articles
|
|||
|
========================================================================
|
|||
|
The Cynic's Sandbox, v2.1BetaTestDoNotDistribute
|
|||
|
R. Cynic
|
|||
|
|
|||
|
Was it March showers bring April flamewars, or the other way around?
|
|||
|
|
|||
|
Caller*ID: For the man who has nothing to hide.
|
|||
|
|
|||
|
Ol' Bill "Baldy" Shatner had it right... Get a life! Ever since
|
|||
|
this nifty Caller*ID debate came up, people have gotten *SO*
|
|||
|
serious. All this talking about MY system and MY privacy and
|
|||
|
MY right to know... Tch, tch.
|
|||
|
|
|||
|
We're getting Caller*ID soon where I live. It should be kinda
|
|||
|
funny. I can't wait to be called a fake user 'cause I log on
|
|||
|
from a friend's house to get something for him. Ahhh... To be
|
|||
|
dumped from a BBS after seeing a polite banner like...
|
|||
|
|
|||
|
HACKER! HACKER! HACKER! HACKER! HACKER! HACKER! HACKER! HACKER!
|
|||
|
|
|||
|
You though you could fool ME, didn't you? You stupid hacker.
|
|||
|
I hope you burn. I have your phone number, now, and I'll be
|
|||
|
calling the police 'cause I got the right to protect MY
|
|||
|
computer. Kiss off and die.
|
|||
|
|
|||
|
HACKER! HACKER! HACKER! HACKER! HACKER! HACKER! HACKER! HACKER!
|
|||
|
|
|||
|
...Or, in reverse, to get a message from a user...
|
|||
|
|
|||
|
FidoNews 10-15 Page: 3 12 Apr 1993
|
|||
|
|
|||
|
From: MAD DEATH 666
|
|||
|
To : Sysop
|
|||
|
Subj: CALLR ID
|
|||
|
|
|||
|
DEAR SYSOOP, I HOP THAT U R NOT U-ZING CALLR ID. I THINK THAT
|
|||
|
IT A VIOLASION OF MI PRIVASY. DO U HAVE ANY WAREZ?
|
|||
|
|
|||
|
ALSO, CAN I GET ACESS TO ADULT SEXSHUN?
|
|||
|
|
|||
|
Of course, Caller*ID does show hope. It's obvious that
|
|||
|
computer types are getting serious about security. I think
|
|||
|
that the alternate validation methods sure to come into play
|
|||
|
will help a lot. I hear that Hayes is introducing a DNA
|
|||
|
scanner that plugs right into any Optima modem and allows, for
|
|||
|
the first time, TOTAL SYSTEM SECURITY. I'll be looking forward
|
|||
|
to that, but I'll probably buy the announced system from US
|
|||
|
Robotics which plugs into any dual standard except a Sportster
|
|||
|
and operates at twice the speed. Pity they'll be incompatible.
|
|||
|
Rockwell is working on a DNA chipset, which will allow low-end
|
|||
|
modem vendors to integrate modem, fax, DNA scanning, and
|
|||
|
manicure capabilities onto one low-cost board. Should be fun.
|
|||
|
It's good to see some security-minded people out there nowadays.
|
|||
|
|
|||
|
Next week: The policy development kit. Makes FidoNet policy
|
|||
|
documents and is still sharp enough to slice through an
|
|||
|
aluminum can!
|
|||
|
|
|||
|
Did I mention, "Fits easily in ANY tacklebox?"
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
The SIP_SURVIVOR Echo
|
|||
|
|
|||
|
Rainbow Warrior
|
|||
|
1:130/911.911
|
|||
|
|
|||
|
The SIP_SURVIVOR Echo
|
|||
|
|
|||
|
WaZOO ... another echo. Big deal. What interest could yet
|
|||
|
another echo hold for me?
|
|||
|
|
|||
|
In this case, plenty.
|
|||
|
|
|||
|
SIP_SURVIVOR is an echomail forum dedicated to the discussion of
|
|||
|
the issues of survivors of incest and other forms of sexual
|
|||
|
abuse, and how to recover from the effects of that abuse using
|
|||
|
the Twelve Step model originally outlined in the book
|
|||
|
"Alcoholics Anonymous" by Bill W., Dr. Bob, and others.
|
|||
|
|
|||
|
Most people think of Twelve Step programs in terms of
|
|||
|
addictions: alcohol, (Alcoholics Anonymous), other drugs
|
|||
|
(Narcotics Anonymous, Cocaine Anonymous, Overeaters Anonymous
|
|||
|
[food can be a drug]), and the like. But they don't realize
|
|||
|
that the Steps can be applied to recovery from sexual abuse.
|
|||
|
And in SIP_SURVIVOR, we discuss how.
|
|||
|
FidoNews 10-15 Page: 4 12 Apr 1993
|
|||
|
|
|||
|
|
|||
|
SIP_SURVIVOR is an "open meeting." Anyone who wishes to learn
|
|||
|
how the Steps can be used to overcome the effects of incest or
|
|||
|
sexual abuse is welcome to participate, even if they are not
|
|||
|
themselves a survivor.
|
|||
|
|
|||
|
Moderator-generated disucssion generally focuses on three
|
|||
|
programs: Survivors of Incest Anonymous (SIA), Incest Survivors
|
|||
|
Anonymous (ISA), and Incest Victims Anonymous (IVA). If there
|
|||
|
are any others, please send netmail and the moderator will be
|
|||
|
happy to include 'em.
|
|||
|
|
|||
|
In compliance with the Sixth Tradition, SIP_SURVIVOR is not
|
|||
|
approved by SIA, ISA, IVA, AA, or any other Twelve Step program.
|
|||
|
No affiliation or endorsement with any Twelve Step program is
|
|||
|
implied or should be inferred.
|
|||
|
|
|||
|
In compliance with the Eleventh Tradition, handles are
|
|||
|
encouraged. You need never use your real name in SIP_SURVIVOR.
|
|||
|
|
|||
|
Feeds are currently private; we're seeking backbone
|
|||
|
distribution. (Send netmail to your REC asking him to support
|
|||
|
SIP_SURVIVOR!) If you'd like a feed, contact Barb Murphy at
|
|||
|
1:130/911. EVERYONE is welcome to participate. Friends of Bill
|
|||
|
will receive a special welcome.
|
|||
|
|
|||
|
Keep comin' back ...
|
|||
|
|
|||
|
The Warrior
|
|||
|
1:130/911.911
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
LuxCon/EuroCon '93 announcement
|
|||
|
|
|||
|
LUXEMBOURG --- APRIL 5, 1993
|
|||
|
|
|||
|
We would hereby like to announce LuxCon/EuroCon '93 which will take
|
|||
|
place in Remich (just on the German border), Luxembourg between
|
|||
|
Friday the 2nd of July and Sunday the 4th of July 1993.
|
|||
|
|
|||
|
ORGANIZERS
|
|||
|
|
|||
|
Daniel Gulluni, 2:270/16@fidonet
|
|||
|
Joaquim Homrighausen, 2:270/17@fidonet (2:2/1993@fidonet)
|
|||
|
Andrew Milner, 2:270/18@fidonet
|
|||
|
Josy Minnemeister, 2:270/21@fidonet
|
|||
|
Francois Thunus, 2:270/25@fidonet
|
|||
|
|
|||
|
PLACE OF THE CONFERENCE
|
|||
|
|
|||
|
The four-star Hotel, HOTEL SAINT NICOLAS, situated on the Mosel
|
|||
|
with a splendid view of the river and the many vineyards
|
|||
|
surrounding it. SAINT NICOLAS is a Best Western Hotel with every-
|
|||
|
thing that is to be expected of a four-star Hotel.
|
|||
|
FidoNews 10-15 Page: 5 12 Apr 1993
|
|||
|
|
|||
|
|
|||
|
LANGUAGE
|
|||
|
|
|||
|
English.
|
|||
|
|
|||
|
PRELIMINARY PROGRAM
|
|||
|
|
|||
|
Friday 2/7/93
|
|||
|
---------------
|
|||
|
1700-2000 Arrival and registration
|
|||
|
2000-2200 Friday night welcoming dinner
|
|||
|
|
|||
|
Saturday 3/7/93
|
|||
|
---------------
|
|||
|
0800-1000 Breakfast
|
|||
|
1000-1230 Product presentations and other sessions.
|
|||
|
We intend to run political and technical
|
|||
|
tracks comprising 30 to 60 minute
|
|||
|
sessions.
|
|||
|
1230-1400 Lunch
|
|||
|
1400-1800 More political and technical sessions.
|
|||
|
2000-2200 Saturday evening dinner and raffle
|
|||
|
("lottery").
|
|||
|
|
|||
|
Sunday 4/7/93
|
|||
|
---------------
|
|||
|
0800-1000 Breakfast
|
|||
|
1000-1200 Checkout from the Hotel
|
|||
|
1200-1400 The annual harddisk throwing contest
|
|||
|
|
|||
|
SPEAKERS AND SPONSORS
|
|||
|
|
|||
|
> We are currently looking for speakers (political and technical)
|
|||
|
> for the sessions and companies to sponsor the prices given away
|
|||
|
> during the Saturday evening raffle ("lottery") and the harddisk
|
|||
|
> throwing contest.
|
|||
|
|
|||
|
PROGRAM FOR ACCOMPANYING PERSONS
|
|||
|
|
|||
|
Several activities are available to those who do not wish to take
|
|||
|
part in the sessions. These include a boat ride on the Mosel river,
|
|||
|
wine tasting along the Mosel, or simply lying out in the sun
|
|||
|
providing the weather is nice :-)
|
|||
|
|
|||
|
TRAVEL DIRECTIONS
|
|||
|
|
|||
|
> To be announced as we go along.. watch this space.
|
|||
|
|
|||
|
Plane
|
|||
|
Train
|
|||
|
Car
|
|||
|
|
|||
|
PARTICIPATION FEE
|
|||
|
|
|||
|
The participation fee is LUF 5500.-, wich covers the sessions,
|
|||
|
FidoNews 10-15 Page: 6 12 Apr 1993
|
|||
|
|
|||
|
conference literature, all meals from Friday evening to Sunday
|
|||
|
morning (inclusive), an official LuxCon/EuroCon '93 t-shirt,
|
|||
|
two nights in a double room (double occupancy) at the Hotel.
|
|||
|
|
|||
|
Payment can be made by transferring money to the bank or CCP
|
|||
|
(postal giro) account listed below. Please make sure that you
|
|||
|
transfer the correct amount (if your bank does not know what LUF
|
|||
|
is, tell them to transfer BEF, which is Belgian Francs). You are
|
|||
|
responsible for covering all transfer charges. Include your
|
|||
|
name, voice telephone number, and FidoNet network address.
|
|||
|
Transfers with an insufficient amount or information will not be
|
|||
|
honored as a valid registration.
|
|||
|
|
|||
|
The rooms will be given on a first come, first serve basis (this
|
|||
|
is decided upon the arrival of the money transfer should it come
|
|||
|
to that). If there are no more rooms available, we will attempt
|
|||
|
to find a room in a Hotel nearby, but cannot guarantee this (in
|
|||
|
which case your money will, of course, be refunded).
|
|||
|
|
|||
|
For those who wish to take the economy alternative, there is a
|
|||
|
camping ground in Remich (you must still register for the
|
|||
|
conference as indicated on the registration form below). The
|
|||
|
name of the responsible company is CAMPING EUROPE, telephone
|
|||
|
+352 698 018.
|
|||
|
|
|||
|
REGISTRATION
|
|||
|
|
|||
|
Print and fill out the registration form and mail it to the below
|
|||
|
address BEFORE the 1st of June 1993 (or include it in a NetMail
|
|||
|
message to Joaquim Homrighausen on 2:270/17@fidonet). Payment will
|
|||
|
be expected to arrive shortly after the registration form has been
|
|||
|
received.
|
|||
|
|
|||
|
Joaquim Homrighausen
|
|||
|
389, route d'Arlon
|
|||
|
L-8011 Strassen
|
|||
|
Luxembourg
|
|||
|
|
|||
|
Late registration, between June 1st and July 1st 1993, is possible
|
|||
|
but carries an additional late-registration fee of LUF 750.- as
|
|||
|
indicated below.
|
|||
|
|
|||
|
PAYMENT
|
|||
|
|
|||
|
CCP (postal giro)
|
|||
|
-----------------
|
|||
|
Cheque Postaux
|
|||
|
L-1090 Luxembourg
|
|||
|
|
|||
|
Account #: CCP 108637-94
|
|||
|
Joaquim Homrighausen
|
|||
|
|
|||
|
Bank
|
|||
|
----
|
|||
|
Banque Generale du Luxembourg
|
|||
|
FidoNews 10-15 Page: 7 12 Apr 1993
|
|||
|
|
|||
|
L-2951 Luxembourg
|
|||
|
SWIFT bgll lu ll
|
|||
|
Telex 3401 bgl lu
|
|||
|
|
|||
|
Account #: BGL 30-511818-80-010
|
|||
|
Joaquim Homrighausen
|
|||
|
|
|||
|
REGISTRATION FORM ---- cut here ---- cut here ---- cut here ----
|
|||
|
|
|||
|
Full name: ______________________________________________
|
|||
|
|
|||
|
Postal address: __________________________________________
|
|||
|
|
|||
|
__________________________________________
|
|||
|
|
|||
|
__________________________________________
|
|||
|
|
|||
|
Voice phone #: ___________________________
|
|||
|
|
|||
|
Nationality: ___________________________
|
|||
|
|
|||
|
eMail address: ___________________________
|
|||
|
|
|||
|
Accompanying: ______________________________________________
|
|||
|
|
|||
|
______________________________________________
|
|||
|
|
|||
|
OPTIONS (check all that apply) COST (LUF)
|
|||
|
+---------+--------------------------------------------------+
|
|||
|
: : :
|
|||
|
: YES : Complete conference package + 5500.- :
|
|||
|
: : :
|
|||
|
+---------+--------------------------------------------------+
|
|||
|
: : :
|
|||
|
: ___ : Sharing the room between 3 people - 500.- :
|
|||
|
: : :
|
|||
|
+---------+--------------------------------------------------+
|
|||
|
: : :
|
|||
|
: ___ : Single occupancy of room + 1000.- :
|
|||
|
: : :
|
|||
|
+---------+--------------------------------------------------+
|
|||
|
: : :
|
|||
|
: ___ : Conference but no meals or Hotel - 3500.- :
|
|||
|
: : (includes Saturday lunch) :
|
|||
|
: : :
|
|||
|
+---------+--------------------------------------------------+
|
|||
|
: : :
|
|||
|
: ___ : Late registration + 750.- :
|
|||
|
: : (1/06/93 - 1/07/93) :
|
|||
|
: : :
|
|||
|
+---------+--------------------------------------------------+
|
|||
|
: : :
|
|||
|
: TOTAL : LUF .- :
|
|||
|
: : :
|
|||
|
+---------+--------------------------------------------------+
|
|||
|
FidoNews 10-15 Page: 8 12 Apr 1993
|
|||
|
|
|||
|
|
|||
|
REGISTRATION FORM ---- cut here ---- cut here ---- cut here ----
|
|||
|
|
|||
|
This file is also file requestable as LUXCON from 2:270/17@fidonet
|
|||
|
and 2:270/18@fidonet.
|
|||
|
|
|||
|
// end of "luxcon.ann"
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
Ethical approaches to Postmastering"
|
|||
|
Copyright 1990 Pat McGregor all rights reserved.
|
|||
|
"Averting One's Eyes -- Ethical approaches to Postmastering"
|
|||
|
|
|||
|
Author Profile
|
|||
|
Pat McGregor
|
|||
|
Computing Systems Consultant II
|
|||
|
Network Systems Division of Information Technology Division
|
|||
|
5115 IST Bldg.
|
|||
|
2200 Bonisteel Blvd.
|
|||
|
Ann Arbor, MI 48109-2099
|
|||
|
(313) 764-9430
|
|||
|
Pat_McGregor@um.cc.umich.edu (Internet)
|
|||
|
UserW02V@umichum (BITNET)
|
|||
|
|
|||
|
Institutional Profile:
|
|||
|
Name: The University of Michigan
|
|||
|
Location: Ann Arbor, MI
|
|||
|
Size:
|
|||
|
Students: 36,338 (Fall, 1989 enrollment)
|
|||
|
Faculty: 2,882.33 FTE
|
|||
|
Staff: 17,573.28 FTE
|
|||
|
|
|||
|
The Information Technology Division supports over 50,000 users. We
|
|||
|
have no way to know how many academics, administrators, and library
|
|||
|
users we support, because we have no way to monitor usage at our
|
|||
|
over 2000 public workstations. In addition, all the offices on
|
|||
|
campus (staff, faculty, and graduate student) and every dorm room
|
|||
|
and family housing unit have data ports, of which approximately 60%
|
|||
|
are turned on.
|
|||
|
|
|||
|
ITD Network Systems employs 198 people, both full and part-time.
|
|||
|
|
|||
|
Abstract
|
|||
|
|
|||
|
Being an electronic postmaster requires diligence, knowledge of
|
|||
|
mailing systems on many mail networks and host operating systems,
|
|||
|
and the ability to sit in front of a workstation, trying to
|
|||
|
decipher bounced mail headers, for long hours every week.
|
|||
|
|
|||
|
It also requires that the postmasters be scrupulously ethical about
|
|||
|
the confidentiality of the mail that passes in front of them,
|
|||
|
despite the fact that sometimes in order to clear up a mail problem
|
|||
|
the text of the message comes up on the screen.
|
|||
|
|
|||
|
FidoNews 10-15 Page: 9 12 Apr 1993
|
|||
|
|
|||
|
This paper explores some strategies used by campus postmasters on
|
|||
|
several campuses, and discusses some relevant issues of security,
|
|||
|
ethics, and responsible behavior.
|
|||
|
|
|||
|
TEXT
|
|||
|
|
|||
|
When the best way to send information to a colleague was to type it
|
|||
|
up, stick it in an envelope and entrust it to a postal carrier, few
|
|||
|
people had worries that the contents of that envelope would be seen
|
|||
|
by anyone but the intended recipient. "Tampering with the mails"
|
|||
|
was a federal offense, and the FBI would come after an offender
|
|||
|
with sirens screaming.
|
|||
|
|
|||
|
Now, when electronic messages containing secret research results,
|
|||
|
resumes, corporate business plans, and love letters are flying
|
|||
|
around the world, some users have valid concerns about the
|
|||
|
confidentiality of their messages. Are they really "confidential"?
|
|||
|
Can anything that passes over a phone line be considered secure?
|
|||
|
What happens if there is a machine problem, or an incorrect
|
|||
|
address, or any of a dozen known mail disasters? Who sees the mail?
|
|||
|
|
|||
|
As postmasters at the University of Michigan, my colleagues and I
|
|||
|
see more than a hundred bounced messages a week. We have no
|
|||
|
technological mechanism to keep us from reading the text of these
|
|||
|
messages; only our personal ethical systems and a code of
|
|||
|
responsibility for postmasters at our site keeps us from reading
|
|||
|
the text of users' messages. The question of confidentiality, and
|
|||
|
what responsibility postmasters have to keep the contents of mail
|
|||
|
confidential, is one that arises in conversation between
|
|||
|
postmasters, and in inquiries from users, on a regular basis.
|
|||
|
|
|||
|
I decided to poll a group of postmasters to see how they felt about
|
|||
|
the issue, what guidelines they used, and what responsibility they
|
|||
|
felt toward the users' text.
|
|||
|
|
|||
|
Methodology
|
|||
|
|
|||
|
Subjects: Sixty-nine people at academic, public, private, and
|
|||
|
commercial sites responded to a survey sent to 136 postmasters. I
|
|||
|
sent the survey to a list of postmasteres the University of
|
|||
|
Michigan postmasters have dealt with in the last year or two, or
|
|||
|
who were on a list of postmasters in Michigan. I recognize that
|
|||
|
this is by no means a majority of the available postmasters around
|
|||
|
the world, but I knew from dealing with most of them on and off
|
|||
|
through the past years that they were responsive to mail from other
|
|||
|
postmasters and from users. (This in itself may be anomalous, but I
|
|||
|
choose to hope not!) I hoped this meant I would get a large return
|
|||
|
of my surveys, and I am quite pleased with my 51% return.
|
|||
|
|
|||
|
Distribution: The survey instrument was distributed and returned by
|
|||
|
electronic mail. In one or two instances respondents had questions
|
|||
|
about the survey, and these clarification conversations were also
|
|||
|
held electronically.
|
|||
|
|
|||
|
Statistical method: We(1) analyzed the responses to the survey
|
|||
|
FidoNews 10-15 Page: 10 12 Apr 1993
|
|||
|
|
|||
|
statistically with the goal of identifying and describing various
|
|||
|
groups and perspectives among the postmasters who responded. The
|
|||
|
survey combined closed-ended and open-ended questions; the former
|
|||
|
were coded for data entry directly from the survey. I grouped the
|
|||
|
open-ended responses to each question into a smaller number of
|
|||
|
categories; these categories were then coded as a series of
|
|||
|
dichotomous variables. This procedure facilitated later analysis by
|
|||
|
accepting any number of responses to a question from each
|
|||
|
postmaster who responded. After the data were entered, SPSSx
|
|||
|
(Statistical Package for the Social Sciences) was used to generate
|
|||
|
frequency and crosstab distributions. SPSSx also includes a
|
|||
|
multiple response procedure to facilitate tabulation of responses
|
|||
|
when each respondent could make any number of responses. From the
|
|||
|
(voluminous) output of these procedures, I could ascertain which
|
|||
|
attitudes and behaviors were congruent with a self-description of
|
|||
|
"confidential" and which were considered a central focus of
|
|||
|
confidentiality less often; these findings are presented in more
|
|||
|
detail below.
|
|||
|
|
|||
|
Who responded to this survey?
|
|||
|
|
|||
|
The average postmaster who responded is twenty-nine, has worked as
|
|||
|
a postmaster for two years, and supports 1500 users. He (only four
|
|||
|
of my respondents were female) works on a VMS or Unix machine
|
|||
|
that's devoted primarily to academic work, and has a bachelor's
|
|||
|
degree.
|
|||
|
|
|||
|
Postmasters from all sorts of systems responded, including several
|
|||
|
from foreign countries: Canada, Ireland, Australia, and Japan. They
|
|||
|
ranged in age from twenty-one to fifty-three, and used eighteen
|
|||
|
different kinds of machines and operating systems. Only one
|
|||
|
respondent had been dealing with electronic mail for over ten
|
|||
|
years, while the majority had been in their jobs less than three
|
|||
|
years. Eighty percent had at least a college degree, but sixteen
|
|||
|
percent had only a high-school education and further on-the-job
|
|||
|
training.
|
|||
|
|
|||
|
Some served as few as ten users, while the highest number of users
|
|||
|
was fifty thousand. The systems represented were overwhelmingly
|
|||
|
academic: fifty-three academic systems, four commercial, two public
|
|||
|
access systems, and four which were research or private use only.
|
|||
|
|
|||
|
Defining confidentiality
|
|||
|
|
|||
|
Overwhelmingly, when asked if they had a responsibility to keep
|
|||
|
users' mail confidential, the postmasters said "Yes". 94% of those
|
|||
|
who responded considered this a prime responsibility. (The other
|
|||
|
six percent, who were all on public or commercial systems,
|
|||
|
indicated that their users were not supposed to be using the mails
|
|||
|
for private or confidential mail, and therefore the postmasters
|
|||
|
felt no responsibility to keep the mails confidential.) Some
|
|||
|
postmasters felt this was a professional responsibility. Said one,
|
|||
|
"Unprofessionalism is the only reason for not respecting user
|
|||
|
privacy." Others cited the Electronic Communications Privacy Act of
|
|||
|
1986, which requires that system owners keep confidential, under
|
|||
|
FidoNews 10-15 Page: 11 12 Apr 1993
|
|||
|
|
|||
|
penalty of law, the mail messages of users on that system. Some
|
|||
|
felt that responsibility for confidentiality went beyond the
|
|||
|
message text, and extended to traffic analysis as well. To quote
|
|||
|
one postmaster:
|
|||
|
|
|||
|
Often traffic analysis is as revealing as actual message contents.
|
|||
|
One example of this from my own experience came from an affair
|
|||
|
between a faculty member and a secretary (both are married, not to
|
|||
|
each other). I was perusing the mail logs and noticed a lot of
|
|||
|
traffic between these two, and I thought it was a little unusual
|
|||
|
since these two would not normally have any job-related reasons for
|
|||
|
such extensive communication. About six months later the affair
|
|||
|
became common knowledge, and at that point I realized I was
|
|||
|
probably the first person to know about their affair.
|
|||
|
|
|||
|
I have a medical background, and keeping such matters confidential
|
|||
|
is second nature to me. Other postmasters without such a background
|
|||
|
would do well to examine the medical profession for some lessons on
|
|||
|
how to handle confidential material that strays into their path.
|
|||
|
|
|||
|
To look or not to look -- that is the question
|
|||
|
|
|||
|
When I began this survey, I was working on the assumption that most
|
|||
|
postmasters work as my colleagues and I do: that the text (2) of
|
|||
|
the message was not to be read under any circumstances, and that
|
|||
|
should we happen to see the text, we forget it immediately and do
|
|||
|
not use any information we might gain from the text of the message.
|
|||
|
|
|||
|
I quickly discovered that we are in the minority.
|
|||
|
|
|||
|
Most of the postmasters who said mail was confidential also said
|
|||
|
there were legitimate reasons to look at the text of messages (48
|
|||
|
out of 69, or 78%). By far the most common reason cited was to help
|
|||
|
re-direct the message. 53% of the respondents said that they would
|
|||
|
read the users' message for clues to help send the message back to
|
|||
|
the original sender or on to the intended recipient.(3) Another
|
|||
|
common reason was to scan the messages for improper or
|
|||
|
inappropriate use of the mails -- 29% look for harassing messages,
|
|||
|
illegal transactions, attempts to break into the system, etc.
|
|||
|
(Interestingly enough, most of the postmasters who said that they
|
|||
|
regularly scan the mails say that they use something like an editor
|
|||
|
scan to do this, rather than reading the contents of all the mail
|
|||
|
messages themselves. Ten respondents, however, stated categorically
|
|||
|
that scanning the mail for any reason was improper.)
|
|||
|
|
|||
|
Postmasters in this study leave some of the responsibility on the
|
|||
|
users, too. "Accidents happen", commented ten in their responses.
|
|||
|
One respondent put it succinctly:
|
|||
|
|
|||
|
Electronic mail is not a secure medium. It's the senders'
|
|||
|
responsibility to ensure the privacy of their messages. If they're
|
|||
|
not sure of the address they're sending to, they shouldn't put
|
|||
|
anything confidential in the text. Anything they don't want seen,
|
|||
|
and read, should be encrypted.(4)
|
|||
|
|
|||
|
FidoNews 10-15 Page: 12 12 Apr 1993
|
|||
|
|
|||
|
When reading through the postmasters' comments, it was clear that
|
|||
|
most of them strongly believe that they act in a manner consistent
|
|||
|
with their ethical systems, and that they have given a lot of
|
|||
|
thought to confidentiality in mail systems. Confidentiality, it
|
|||
|
seems, consists in not looking unless you have to, and if you have
|
|||
|
to, treating what you see with respect. Or, as one of our foreign
|
|||
|
postmasters said, "... a postmaster is in the same position as a
|
|||
|
doctor -- peeking at personal e-mail is rather akin to viewing
|
|||
|
inside somebody's underpants -- there MAY be sound reasons for
|
|||
|
examining the contents but going out of one's way to do so is a bit
|
|||
|
kinky :-)"(5)
|
|||
|
|
|||
|
Moral Dilemmas
|
|||
|
|
|||
|
Sometimes what a postmaster sees creates ethical problems. If a
|
|||
|
postmaster sees a message in which personal or secret information
|
|||
|
is revealed, a postmaster may keep the information confidential but
|
|||
|
be troubled by it. Some find themselves in possession of
|
|||
|
information which indicates that an illegal transaction or
|
|||
|
inappropriate use of the system is going on. Most (65%) of the
|
|||
|
postmasters said that if they found information indicating a system
|
|||
|
abuse, they would immediately act on it. Their highest
|
|||
|
responsibility is to protect the system, and they take that
|
|||
|
responsibility very seriously.
|
|||
|
|
|||
|
Personal information, like the affair that was mentioned above, is
|
|||
|
a different matter. Some of the postmasters indicated in their
|
|||
|
commentary that they tried to forget such information. Some created
|
|||
|
technological barriers for themselves to prevent the viewing of
|
|||
|
such information. Most hoped that they never had to make a decision
|
|||
|
about dealing with personal information that came into their
|
|||
|
possession.(6)
|
|||
|
|
|||
|
Another dilemma for postmasters comes when they have permission to
|
|||
|
read the contents of users' mailboxes by virtue of their position.
|
|||
|
Fifty-three of our postmasters (77%) have privileged access. (It
|
|||
|
was in asking this question that we discovered how many hats most
|
|||
|
postmasters wear. Twenty-nine of them mentioned that they are also
|
|||
|
system administrators, and have unlimited access to any system file
|
|||
|
by virtue of that position. The others have unlimited access merely
|
|||
|
to accomplish their postmaster responsibilities.) However, in
|
|||
|
comparing the folks who believed there were good reasons to look in
|
|||
|
users' mailboxes against those who had access, only eight
|
|||
|
postmasters (less than half of those who believe in regularly
|
|||
|
scanning mail) believed this access should be regularly used.
|
|||
|
|
|||
|
Technical fixes
|
|||
|
|
|||
|
Technical fixes were also not common for general prevention against
|
|||
|
seeing text. Less than one-quarter of the respondents considered
|
|||
|
themselves to have a technological barrier to seeing the users'
|
|||
|
text. Only 25% of those who had a technical fix had a hard fix
|
|||
|
(that is, one which they had to exert special privileges or change
|
|||
|
code in order to see the message text): 19% used a filter which
|
|||
|
kept the text out of reach, and 6% encrypted the message text,
|
|||
|
FidoNews 10-15 Page: 13 12 Apr 1993
|
|||
|
|
|||
|
leaving only the headers in the clear.
|
|||
|
|
|||
|
The others who considered themselves to have a technological fix
|
|||
|
were split half and half on a honor system where they only looked
|
|||
|
at bounced messages which couldn't get back to the sender or on to
|
|||
|
the recipient(7), or only read spool or file headers.
|
|||
|
|
|||
|
"I close my eyes"
|
|||
|
|
|||
|
By far the largest number of postmasters did not feel they had a
|
|||
|
technological barrier to seeing mail. Of those folks (80% of the
|
|||
|
total respondents), the three most common methods mentioned(8) as
|
|||
|
ways they avoided looking at text were to look away (45%), adjust
|
|||
|
the windowing on their screens to exclude the text (or attention
|
|||
|
out before the text scrolled by) (17%), or to ask the user's
|
|||
|
permission if it was impossible to fix the problem without reading
|
|||
|
the text (9%). (Interestingly enough, of those folks who said they
|
|||
|
wanted the user's permission before they went poking around in a
|
|||
|
mailbox, only two would use that permission even if they had it.)
|
|||
|
|
|||
|
It was in asking about methods postmasters used to keep themselves
|
|||
|
from seeing users' text that the strongest statements about
|
|||
|
confidentiality and ethical behavior came out. As one of postmaster
|
|||
|
said, when asked the method he used:
|
|||
|
|
|||
|
Self-restraint. The same thing that keeps me from performing most
|
|||
|
other unethical acts. Given my level of technical expertise, I do
|
|||
|
not regard "security systems" as any sort of deterrent.
|
|||
|
|
|||
|
It's worth noting here that a large percentage (68%) of the
|
|||
|
respondents mentioned that they were simply too swamped with work
|
|||
|
to bother reading other people's mail, even if they were inclined
|
|||
|
to do so.
|
|||
|
|
|||
|
Harassment, obscenity, and other inappropriate mail
|
|||
|
|
|||
|
Unfortunately, as the telephone companies have discovered, some
|
|||
|
people want to use this marvelous new medium as a playground, or as
|
|||
|
a method of inflicting pain on another person. Electronic mail is a
|
|||
|
perfect opportunity to send harassing, obscene, or otherwise
|
|||
|
inappropriate messages to another person.
|
|||
|
|
|||
|
While postmasters generally have given a lot of thought to their
|
|||
|
philosophies concerning what to do about user text, they are less
|
|||
|
certain about incidences of inappropriate mail. Seventeen of our
|
|||
|
postmasters (25% of the total) believe that there has never been
|
|||
|
such an incident at their site. (I confess, I'm inclined to believe
|
|||
|
that they simply don't know about it. In our experience, users will
|
|||
|
wait a long time without reporting harassment or obscene mail
|
|||
|
unless it's widely known that they have a resource for this
|
|||
|
situation. When we began advertising that there was a special
|
|||
|
office for handling these problems, reporting went up.)
|
|||
|
|
|||
|
Some of them don't handle cases of inappropriate mail (29%). Of
|
|||
|
those who don't handle it themselves, four pass cases along to
|
|||
|
FidoNews 10-15 Page: 14 12 Apr 1993
|
|||
|
|
|||
|
campus security or the local police, and twenty-two let some other
|
|||
|
administrator handle it.
|
|||
|
|
|||
|
A clear division of philosophy showed in deciding what to do about
|
|||
|
abusive or inappropriate mail when it happened. When asked whether
|
|||
|
they would wait for complaints or pursue a situation if they
|
|||
|
stumbled across one, 59% said they would wait for complaints, 23%
|
|||
|
said they would pursue it, and 10% said they would have to make a
|
|||
|
case-by-case determination.
|
|||
|
|
|||
|
By and large, the largest group were those who would wait for
|
|||
|
complaints. "One person's harassment is another's amusement" was a
|
|||
|
frequently expressed sentiment (41%). However, there were some
|
|||
|
cases where postmasters felt obliged to step in, as in this
|
|||
|
comment:
|
|||
|
|
|||
|
Material of a libelous nature, for example, is permissible in a
|
|||
|
private communication... Certain material is not permissible ....
|
|||
|
Child pornography is a good example of this. The Supreme Court just
|
|||
|
ruled that private possession of such material is illegal (as
|
|||
|
opposed to distributing it, which has been illegal for quite some
|
|||
|
time). Although I have never encountered such material, if I
|
|||
|
happened to find some in the course of my duties as postmaster I
|
|||
|
would have to contact the person responsible and ask them to remove
|
|||
|
it from the system. Failure to do so would make me (and the
|
|||
|
institution I work for) liable in any subsequent prosecution of the
|
|||
|
people involved.
|
|||
|
|
|||
|
Other reasons for pursuing a problem that dropped into one's lap
|
|||
|
were system abuses (such as chain letters, attempts to break into
|
|||
|
the system or propagate virii or worms) or mail that came from
|
|||
|
another system. Off-site mail would, generally, be referred back to
|
|||
|
a postmaster at the originating site.
|
|||
|
|
|||
|
"Mail is mail"
|
|||
|
|
|||
|
Mailing lists(9) and newsgroups constitute a large part of the
|
|||
|
traffic on the network. Except for the case of usenet news, which
|
|||
|
is read with a special program, mailing lists are indistinguishable
|
|||
|
from most other mail messages.
|
|||
|
|
|||
|
Because of mailing lists' public nature, I wondered how postmasters
|
|||
|
at other site regarded mailing list messages in terms of
|
|||
|
confidentiality.
|
|||
|
|
|||
|
When asked if they considered mailing list mail in the same class
|
|||
|
as "regular" electronic mail, 42% said no. Of those folks who gave
|
|||
|
reasons for this answer, sixteen said that mailing list messages
|
|||
|
were intended for public distribution and thus not intended to be
|
|||
|
confidential or private. Twelve folks compared public mailing lists
|
|||
|
to junk mail or newspapers.
|
|||
|
|
|||
|
The 56% who said "yes" indicated that they considered mailing lists
|
|||
|
like any other mail in terms of a need for confidentiality and
|
|||
|
respect for users' privacy. Sixteen felt this way because some
|
|||
|
FidoNews 10-15 Page: 15 12 Apr 1993
|
|||
|
|
|||
|
lists have restricted access and fourteen commented on the
|
|||
|
politically or personally sensitive contents of some mailing list
|
|||
|
discussions. Eleven postmasters felt that the identities of people
|
|||
|
who subscribed to mailing lists should be kept confidential,
|
|||
|
because of the personality or interest profile that could be
|
|||
|
inferred from a complete compilation of the sorts of lists a user
|
|||
|
subscribed to. Postmasters were sensitive to this:
|
|||
|
|
|||
|
Although ostensibly anyone can get access to the same info by
|
|||
|
joining the list, membership itself on some lists may be considered
|
|||
|
sensitive. For instance, there is a gay-oriented list which one of
|
|||
|
my faculty members subscribed to, and the messages all began
|
|||
|
bouncing to the postmaster when he incorrectly set a forwarding
|
|||
|
address. This person may or may not care who knows about his
|
|||
|
subscription, but I can see where he might consider it sensitive
|
|||
|
information.
|
|||
|
|
|||
|
Written ethics guidelines As networking constitutes a greater part
|
|||
|
of our lives, more and more personal information is loose on the
|
|||
|
nets. Codes of postmaster behavior, once handed down from guru to
|
|||
|
guru, may now need to be more formalized. Access to personal
|
|||
|
material is more prevalent, and mail is particularly susceptible to
|
|||
|
invisible monitoring.
|
|||
|
|
|||
|
As one postmaster said: No byte of information in any computer
|
|||
|
system is immune to the knowledgeable systems programmer. The point
|
|||
|
here is that you can tell if your letter from Grandma has been
|
|||
|
opened, but you cannot tell if your electronic mail message has.
|
|||
|
This makes snooping easier and more prevalent by default. 83% of
|
|||
|
the respondents said they didn't have a written code of ethics for
|
|||
|
postmasters. Reasons given for why there was no policy varied
|
|||
|
across the board: 23% felt they didn't need such a thing, either
|
|||
|
because they wouldn't hire someone as a postmaster/system employee
|
|||
|
who wouldn't behave ethically or because postmaster ethics were
|
|||
|
common knowledge. 6% had orientation sessions in which postmaster
|
|||
|
ethics were discussed. 4% felt written policies of any sort were A
|
|||
|
Bad Idea. However, 15% of the total respondents wished there was a
|
|||
|
written policy, to help orient and train new postmasters or to
|
|||
|
cover gray areas. One quarter of those who had written policies
|
|||
|
felt that their general systems or employee policies covered
|
|||
|
postmasters as well as users. Two postmasters (both from religious
|
|||
|
private schools) indicated that Christian ethics covered the
|
|||
|
situation, and that they relied upon the Bible as a written policy
|
|||
|
for all occasions.
|
|||
|
|
|||
|
Several postmasters commented that since the passage of the ECPA
|
|||
|
(10) in 1986, their sites have modified their systems use policies
|
|||
|
to include specifically use and misuse of mail.
|
|||
|
|
|||
|
Major exceptions
|
|||
|
|
|||
|
It's worth noting that commercial systems and public access systems
|
|||
|
had substantially differing views of user privacy with respect to
|
|||
|
mail than did academic systems. Of those who responded, nearly 10%
|
|||
|
were commercial or public access. The public access hosts were
|
|||
|
FidoNews 10-15 Page: 16 12 Apr 1993
|
|||
|
|
|||
|
extremely sensitive to their liability should illicit activities
|
|||
|
take place on their hosts. One public access "sysop" explained his
|
|||
|
approach to confidentiality this way:
|
|||
|
|
|||
|
The mail on [this system] is specifically disclaimed from ECPA
|
|||
|
privacy in light of the fact that I operate a BBS on the machine
|
|||
|
and have no wish to have the authorities come seize the machine if
|
|||
|
some user does something illegal. Even so, I tend to preserve the
|
|||
|
confidence of information gleaned from mail that has to be seen. I
|
|||
|
have an automatic process that scans the mail daily for particular
|
|||
|
keywords and phrases that would indicate that phreaks or crackers
|
|||
|
are communicating via my system. If there is a suspicious item, a
|
|||
|
copy is pulled for closer inspection. So far, I have only has to
|
|||
|
read mail to/from one pair of users and it turned out that they had
|
|||
|
misrepresented themselves and were kicked off the system
|
|||
|
|
|||
|
Commercial systems were equally cautious. One postmaster who works
|
|||
|
for a company which reputedly screens its employees tightly for
|
|||
|
ethical and moral fiber had this to say:
|
|||
|
|
|||
|
Attached you will find your mail survey. Some of the questions are
|
|||
|
rather interesting. [Our company] doesn't appear to have similar
|
|||
|
problems with ethics as do some of the universities. It probably
|
|||
|
has do with the fact that employees are screened before they are
|
|||
|
hired to ensure that their ethics fall in line with the companies.
|
|||
|
Unfortunately, universities don't have such luxury.
|
|||
|
|
|||
|
In the questionnaire, I mention that there aren't any formal
|
|||
|
policies regarding email. I believe that email would be covered
|
|||
|
under the terms of employment, which also specify acceptable ethics
|
|||
|
behavior. If somebody was foolish enough to use a corporate asset
|
|||
|
to harass somebody, or cause harm or interruption of service due to
|
|||
|
"hacking", then they probably would be terminated.
|
|||
|
|
|||
|
Demographic Differences
|
|||
|
|
|||
|
I asked a number of demographic questions, intended to see if we
|
|||
|
could distinguish behaviors of philosophies based on age, gender,
|
|||
|
number of years as a postmaster, systems or software used, or
|
|||
|
number of users served. No major discrepancies in behavior turned
|
|||
|
up. It's possible that our statistical "universe" was too small to
|
|||
|
differentiate such behavior trends. It's also possible that
|
|||
|
postmasters all tend to behave in an ethically consistent manner,
|
|||
|
despite the demographic differences.
|
|||
|
|
|||
|
"Satisfaction guaranteed"
|
|||
|
|
|||
|
Processing this survey has been a learning experience, and not just
|
|||
|
because of learning to handle statistical analysis.
|
|||
|
|
|||
|
My expectations of postmasters have been largely met -- I had hoped
|
|||
|
to discover that the electronic information transfer medium was
|
|||
|
watched over by folks who would respect my privacy within the
|
|||
|
constraints of the technology, and I have not been disappointed.
|
|||
|
|
|||
|
FidoNews 10-15 Page: 17 12 Apr 1993
|
|||
|
|
|||
|
I was surprised to see that there was no appreciable difference in
|
|||
|
approaches to ethical behavior among systems: some operating
|
|||
|
systems, such as Unix (tm), have a reputation for attracting
|
|||
|
mavericks; and some mail networks, such as BITNET, have extremely
|
|||
|
tight codes for appropriate behaviors. I was pleased to see that
|
|||
|
postmasters across the board regarded privacy and confidentiality
|
|||
|
as important, and would work to protect the system and the users'
|
|||
|
privacy equally.
|
|||
|
|
|||
|
I would have liked to have seen more women as postmasters. Here at
|
|||
|
The University of Michigan, 50% of the postmasters and a large
|
|||
|
minority of the mail programmers are women. I hope that my sample
|
|||
|
is not representative of the larger whole, and that more than 12%
|
|||
|
of postmasters are women. (It's possible that many of the people
|
|||
|
who didn't respond to the question about gender were women. I have
|
|||
|
no way to tell.)
|
|||
|
|
|||
|
On the whole, I think our users can be generally reassured that the
|
|||
|
electronic postmasters in their lives are concerned about the
|
|||
|
integrity of the mail system, both in terms of system security and
|
|||
|
user privacy. As electronic mail becomes a more prevalent method of
|
|||
|
communications (for both convenience, economic, and ecological
|
|||
|
reasons), it's nice to know that the tradition of confidentiality
|
|||
|
that we have grown to expect from our paper mail postmasters has
|
|||
|
been carried over into the electronic world.
|
|||
|
----------------------------------------------------------
|
|||
|
Footnotes
|
|||
|
|
|||
|
(1) Erna-Lynne Bogue, a doctoral candidate in Social Work at the
|
|||
|
University of Michigan, and a SPSSx consultant, did all the SPSSx
|
|||
|
programming. She also taught me how to interpret the results,
|
|||
|
helped me pinpoint places to explore further, and encouraged me to
|
|||
|
learn a great deal about statistics while doing this project.
|
|||
|
|
|||
|
(2) "Text" in this paper is defined to be the content of the
|
|||
|
message; the information that the user is transmitting.
|
|||
|
|
|||
|
(3) Postmasters sometimes see messages in which the headers have
|
|||
|
been so thoroughly mangled that the origins are completely
|
|||
|
mysterious. For this reason, by the way, it's a good idea to
|
|||
|
include your name and electronic mail address at the end of your
|
|||
|
message, so that your recipient will know what you think your
|
|||
|
address is in case of problems.
|
|||
|
|
|||
|
(4) Or, as another put it, "Users put the most astonishing things
|
|||
|
in electronic mail, and assume that nobody will ever see it. It
|
|||
|
never fails to amaze me the things that people say to each other
|
|||
|
over electronic mail that they probably don't say to each other in
|
|||
|
the bedroom."
|
|||
|
|
|||
|
(5) For those of you who may be unfamiliar with the "smiley face"
|
|||
|
in electronic communications, turn the page sideways. The ) is a
|
|||
|
mouth.
|
|||
|
|
|||
|
(6) One anecdote is particularly telling. To quote the respondent:
|
|||
|
FidoNews 10-15 Page: 18 12 Apr 1993
|
|||
|
|
|||
|
|
|||
|
[The story starts with a description of a bug in a mailer that left
|
|||
|
a number of messages in the postmaster's queue. The respondent
|
|||
|
describes his usual practice of reading only the first 30 lines,
|
|||
|
since usually those 30 lines are only header material.]
|
|||
|
|
|||
|
One of the dead items originated locally. Hence, it had
|
|||
|
comparatively few headers, and [the first 30 lines] took care of
|
|||
|
all the headers and showed me the body as well. It was from one of
|
|||
|
my co-workers, written to a friend with whom I also work
|
|||
|
professionally on the side from time to time. Although I didn't
|
|||
|
intend to read it, certain words caught my eye without really
|
|||
|
looking deliberately, and it became immediately obvious that my
|
|||
|
co-worker and this friend were having an affair.
|
|||
|
|
|||
|
To say that this made me uncomfortable is to put the matter most
|
|||
|
mildly. My co-worker is married and the co-worker's spouse is also
|
|||
|
an acquaintance of mine. And I have a little (but not much)
|
|||
|
professional contact with the spouse as well. It was clear that the
|
|||
|
co-worker had not informed the spouse of the matter.
|
|||
|
|
|||
|
The friend is also married and the friend's spouse was not aware,
|
|||
|
either. I have to work with my co-worker and frequently I am in a
|
|||
|
position where I can't really afford not to work with the friend.
|
|||
|
|
|||
|
Now, whether two people want to carry on an affair with one another
|
|||
|
is mostly their own business. Whether I agree with it or not is
|
|||
|
almost entirely irrelevant, especially considering that my beliefs
|
|||
|
do not coincide with my friend's and my co-worker's anyway. But now
|
|||
|
I was in a position where a co-worker whom I trusted was violating
|
|||
|
the spouse's trust. And likewise for the friend and the friend's
|
|||
|
spouse. It became obvious to me in rather short order that it was
|
|||
|
going to be difficult to work with either of them, knowing the lack
|
|||
|
of trust being shown to their respective spouses.
|
|||
|
|
|||
|
After some considerable internal warring against myself over what
|
|||
|
to do, I approached my co-worker, explained what I'd learned and
|
|||
|
the (innocent) circumstances by which I'd learned it, and said that
|
|||
|
I thought there were 3 things that could be done. The two of them
|
|||
|
could break off the relationship; they could tell their spouses
|
|||
|
about it and (I suppose) get the spouses' approval for them to
|
|||
|
continue; or I could resign. There wasn't really any way I could
|
|||
|
see myself continuing to work with people that I had to trust in
|
|||
|
order to get work done, while knowing this violation of trust was
|
|||
|
going on. And I don't think I really cared which way the matter
|
|||
|
went.
|
|||
|
|
|||
|
As it happened, they broke off the relationship. Whether spouses
|
|||
|
were told about the matter, I can't say.
|
|||
|
|
|||
|
I have since written a small tool which looks at this type of dead
|
|||
|
letter to show me JUST the headers.
|
|||
|
|
|||
|
(7) One postmaster called these trapped messages "bounce-o-grams".
|
|||
|
|
|||
|
FidoNews 10-15 Page: 19 12 Apr 1993
|
|||
|
|
|||
|
(8) Not all respondents made comments, of course, which is why
|
|||
|
sometimes the numbers in these sections dealing with commentary
|
|||
|
don't always add up.
|
|||
|
|
|||
|
(9) "Mailing lists" are defined for the purposes of this paper to
|
|||
|
be public or semi-public lists or digests, such as Info-IBMPC,
|
|||
|
INTER-L, or other such public discussions. Private mailing lists,
|
|||
|
such as those created by individual users and which are not open
|
|||
|
for the public to join, are not included.
|
|||
|
|
|||
|
(10) Electronic Communications Privacy Act.
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
Alert!
|
|||
|
By: Stanton McCandlish
|
|||
|
|
|||
|
Dear editor, please publish this little note prominently and
|
|||
|
save people a lot of money!
|
|||
|
|
|||
|
NOTICE: 1:301/2 is NOT the support board for the Scrabble door,
|
|||
|
and has not been for years! That guy moved. Stop wasting money
|
|||
|
sending me netmail about it, eh. Within about a month I WILL
|
|||
|
have this door abvailble by FREQ, since it is unlikely that
|
|||
|
people will stop try to FREQ it for a few years. FREQ
|
|||
|
SCRABBLE.ZIP.
|
|||
|
|
|||
|
Thanks!
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
Caller ID Still Isn't Reliable
|
|||
|
Jack Decker
|
|||
|
Fidonet 1:154/8
|
|||
|
|
|||
|
CALLER ID STILL ISN'T RELIABLE
|
|||
|
|
|||
|
After reading the debate over Caller ID that has been raging in the
|
|||
|
last few issues, I have to wonder if anyone stopped to notice the
|
|||
|
point that Caller ID is NOT yet reliable. Specifically, it is quite
|
|||
|
possible for a call to come in indicating that the calling number has
|
|||
|
been blocked by the caller, when in fact the caller has done no such
|
|||
|
thing. In my previous article on the subject, I pointed out how ALL
|
|||
|
calls from certain exchanges in California were being shown as
|
|||
|
"blocked" on displays in other states (Caller ID isn't being made
|
|||
|
available in California itself), in what some feel is a blatent
|
|||
|
attempt by Pac*Bell to get customers to complain to the California
|
|||
|
Public Utilities Commission (when their calls to other states won't
|
|||
|
go through), in the hope that the California PUC will drop their
|
|||
|
insistance that unlisted calling numbers be blocked by default. The
|
|||
|
speculation here is that the erroneous display is intentional; that
|
|||
|
is, that Pac*Bell knows that their CUSTOMER never intended to block
|
|||
|
display of his number, but that Pac*Bell itself chooses to present
|
|||
|
the "blocked" message in an attempt to gain political leverage with
|
|||
|
the PUC.
|
|||
|
FidoNews 10-15 Page: 20 12 Apr 1993
|
|||
|
|
|||
|
|
|||
|
However, there is a saying that one should never attribute to malice
|
|||
|
what can be adequately explained by stupidity... and thus we bring
|
|||
|
you this report from New York, courtesy of a reader of the Internet
|
|||
|
Telecom Digest (also known as the comp.dcom.telecom moderated
|
|||
|
newsgroup):
|
|||
|
|
|||
|
Date: Sun, 4 Apr 1993 20:48:22 GMT
|
|||
|
From: gleick@Panix.Com (James Gleick)
|
|||
|
Newsgroups: comp.dcom.telecom
|
|||
|
Subject: Re: Block-the-Blocker CallerID Feature
|
|||
|
Message-ID: <telecom13.234.7@eecs.nwu.edu>
|
|||
|
Organization: PANIX Public Access Unix, NYC
|
|||
|
Sender: Telecom@eecs.nwu.edu
|
|||
|
|
|||
|
In <telecom13.216.10@eecs.nwu.edu> dan@quiensabe.az.stratus.com (Dan
|
|||
|
Danz) writes:
|
|||
|
|
|||
|
> ... this little sucker (when enabled) will say "This party will not
|
|||
|
> accept blocked calls" and disconnect. It also records the fact that
|
|||
|
> it received and blocked the call.
|
|||
|
|
|||
|
In New York, where Caller ID is being implemented, slowly, Nynex has
|
|||
|
provided the following peculiarity. If you get a call from an
|
|||
|
exchange that will *soon* have Caller ID enabled, but doesn't yet, it
|
|||
|
shows up as Blocked, not as Out of Area.
|
|||
|
|
|||
|
Explanation? The switching equipment is now capable of passing the
|
|||
|
CLID information along, but the caller has not yet had the
|
|||
|
opportunity to select the blocking option. So the phone company has
|
|||
|
decided to mark *all* calls as blocked.
|
|||
|
|
|||
|
(Their explanation, not mine.)
|
|||
|
|
|||
|
If I had the equipment you describe, I wouldn't be receiving any
|
|||
|
local calls for a while.
|
|||
|
|
|||
|
[End of forwarded message from the Telecom Digest]
|
|||
|
|
|||
|
By way of explanation, the device originally mentioned in the quoted
|
|||
|
section of the above message apparently does for voice calls what
|
|||
|
some Fidonet sysops want to do on data calls, that is, it prevents
|
|||
|
calls from "blocked" numbers from ever getting through. The point
|
|||
|
that needs to be emphasized repeatedly is that Caller ID technology
|
|||
|
IS NOT YET RELIABLE. In some cases calls WILL show up indicating
|
|||
|
that the caller has blocked transmission of his or her number, when
|
|||
|
in fact the caller has done no such thing (and may not even be aware
|
|||
|
of what Caller ID is!).
|
|||
|
|
|||
|
It seems that those who want to argue in favor of using Caller ID
|
|||
|
exclusively for verification want to completely ignore this point.
|
|||
|
It reminds me of the folks who will argue that cellular telephone
|
|||
|
conversations are now secure (in the United States) because the law
|
|||
|
says that folks can't legally listen to them, completely ignoring the
|
|||
|
fact that there are still thousands of scanners out there capable of
|
|||
|
FidoNews 10-15 Page: 21 12 Apr 1993
|
|||
|
|
|||
|
receiving the cellular frequencies. You would think that folks who
|
|||
|
work with a technology would want to be aware of the limitations of
|
|||
|
that technology, but I guess it's more convenient to ignore flaws in
|
|||
|
the system (at least until they adversely affect you personally).
|
|||
|
|
|||
|
Again, I am not saying that you shouldn't use Caller ID as ONE method
|
|||
|
of verification. All I am saying is that a call comes in as
|
|||
|
"blocked", you might want to at least assume that it could be some
|
|||
|
hapless soul calling who has no idea that the phone company is
|
|||
|
telling you that he has blocked the display of his phone number, and
|
|||
|
provide some alternate method of access. Even a one-screen display
|
|||
|
explaining the situation and inviting the person to call the sysop on
|
|||
|
a voice line (or to send a letter of explanation) would be nicer than
|
|||
|
just assuming it's some twit trying to be anonymous, or trying to
|
|||
|
crash your system.
|
|||
|
|
|||
|
Sometimes sysops (and even programmers) just get too smart for their
|
|||
|
own good (or at least their callers' good). I recall when the
|
|||
|
original Opus BBS software rejected any city name with less than four
|
|||
|
characters, presumably under the theory that any real city name was
|
|||
|
at least four characters long. Of course, this caused nothing but
|
|||
|
trouble for callers from Ada, Michigan (suburb of Grand Rapids and
|
|||
|
home of the Amway Corporation). It's bad enough to be discriminated
|
|||
|
against by humans for no fault of your own, but when computers start
|
|||
|
doing it, it can be really maddening. Please use the new technology
|
|||
|
wisely, and realize that it ain't perfect yet!
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
New VW echo starting!!!
|
|||
|
Andy Heckel
|
|||
|
Fido 1:203/15
|
|||
|
|
|||
|
After hooking up to the Fido echo AUTOMOTIVE, I've started to see
|
|||
|
others like myself interested in a specific manufacturer echo. Since
|
|||
|
I am a VW nut, I figured I may as well jump on the bandwagon, take
|
|||
|
the reins, and go for it, (kinda like jumping head first into an empty
|
|||
|
pool). So, this is to announce the newest, (as of this moment), Fido
|
|||
|
echo, VOLKS. If you would like to add this echo to your BBS, send me
|
|||
|
netmail at 1:203/15, and I'll set you up. Hopefully, this may
|
|||
|
eventually make it on to the backbone, if there is enough demand for
|
|||
|
it. So help out and if you love your VW as much as I do, areafix it
|
|||
|
today!!!
|
|||
|
FidoNews 10-15 Page: 22 12 Apr 1993
|
|||
|
|
|||
|
|
|||
|
School Music Echo
|
|||
|
|
|||
|
by Ian Levstein 1:249/121
|
|||
|
Areatag: ORCHESTRA
|
|||
|
|
|||
|
Although there are many FidoNet echoes dealing with music, there
|
|||
|
is a serious lack of information concerning school music. To that
|
|||
|
end, several of us have put together an echo specifically dealing
|
|||
|
with all aspects of school music - concert band, orchestra, choir,
|
|||
|
marching band, and other such groupings. We also discuss other
|
|||
|
aspects of music such as: film scores, community and professional
|
|||
|
orchestras, conductors, and the like.
|
|||
|
|
|||
|
This echo began a number of months ago and at present has about a
|
|||
|
dozen nodes attached covering Southern Ontario to Texas and points
|
|||
|
in between. We would like to see this echo grow and hopefully
|
|||
|
get backboned at some point in the future.
|
|||
|
|
|||
|
If you are interested in receiving this echo, please netmail any of
|
|||
|
these persons - we deliver at v32b!
|
|||
|
|
|||
|
Ian Levstein 1:249/121 (Kingston, Ontario)
|
|||
|
John Rappold 1:279/30 (Huntington, WV)
|
|||
|
Tony White 1:124/5117 (Dallas, TX)
|
|||
|
|
|||
|
As Nietzsche said: Life without music would be a mistake.
|
|||
|
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
The HOLY_BIBLE Echo and the PRIME Network
|
|||
|
Steve Winter
|
|||
|
FidoNet 1:18/98
|
|||
|
|
|||
|
Please spread this info around. Thanks!!
|
|||
|
|
|||
|
***************************************************************
|
|||
|
* __________ __________ ___ ________ *
|
|||
|
* | | | | | |\ /| | *
|
|||
|
* | | | | | | \ / | | *
|
|||
|
* |________| |________| | | \ / | |______ *
|
|||
|
* | | \ | | \/ | | *
|
|||
|
* | | \ | | | | *
|
|||
|
* | | \ | | | | *
|
|||
|
* | | \ _|_ | | |_______ *
|
|||
|
* *
|
|||
|
* 'The sun never sets on the PRIME network' *
|
|||
|
***************************************************************
|
|||
|
* PreRapture(tm) International Message Exchange *
|
|||
|
***************************************************************
|
|||
|
With nodes in USA, CANADA, EUROPE, ASIA, and growing.
|
|||
|
|
|||
|
PRIME is the Only True Christian worldwide network on earth.
|
|||
|
* Both Religious (Christian) and non-religious conferences. *
|
|||
|
FidoNews 10-15 Page: 23 12 Apr 1993
|
|||
|
|
|||
|
A wholesome, family oriented network with a strict policy
|
|||
|
against profanity, lewdness, obscenity etc..
|
|||
|
Features echos on educational and technical topics.
|
|||
|
* Elaborate Bible Discussion and Debate * False Preachers Exposed *
|
|||
|
919-286-3962 * 919-286-3606 * 919-286-3266 * 919-286-2100
|
|||
|
Using USRobotics Dual Standard Modems V.32bis-14,400 / HST-16800bps
|
|||
|
FREQ PRIME.ZIP from 1:18/98, 1:18/99, or 6:700/26 for network kit *
|
|||
|
|
|||
|
-={ HOLY_BIBLE Echo Conference }=-
|
|||
|
Available through the PRIME Network and
|
|||
|
on the FidoNet Zone 1 and Zone 2 Backbone
|
|||
|
* The only true Christian Conference in FidoNet *
|
|||
|
|
|||
|
********
|
|||
|
Acts 2:38 *++++++* John 3:5
|
|||
|
*+ ** +*
|
|||
|
**************+ ** +*************
|
|||
|
*+++++++++++ ++++++++++*
|
|||
|
*+ ******* HOLY_BIBLE ****** +*
|
|||
|
*+++++++++++ ++++++++++*
|
|||
|
**************+ ** +*************
|
|||
|
*+ ** +*
|
|||
|
Gal 1:8 *+ ** +* Mark 12:29
|
|||
|
*+ ** +*
|
|||
|
I Tim 3:16 *+ ** +* Acts 2:4
|
|||
|
*+ ** +*
|
|||
|
Isa 45:21 *+ ** +* Mark 16:16
|
|||
|
*+ ** +*
|
|||
|
Acts 10:46 *++++++* Acts 19:5
|
|||
|
********
|
|||
|
Hebrews 5:9 Acts 22:16 James 1:22
|
|||
|
|
|||
|
HOLY_BIBLE (C)Copyright 1988-93 Steve Winter,
|
|||
|
All rights reserved worldwide (with contributers
|
|||
|
retaining all rights to their contributions)
|
|||
|
A very strict conference designed to expose fakes!
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
========================================================================
|
|||
|
Fidonews Information
|
|||
|
========================================================================
|
|||
|
|
|||
|
------- FIDONEWS MASTHEAD AND CONTACT INFORMATION ----------------
|
|||
|
|
|||
|
Editors: Sylvia Maxwell, Donald Tees, Tim Pozar
|
|||
|
Editors Emeritii: Thom Henderson, Dale Lovell, Vince Perriello,
|
|||
|
Tom Jennings
|
|||
|
|
|||
|
IMPORTANT NOTE: The FidoNet address of the FidoNews BBS has been
|
|||
|
changed!!! Please make a note of this.
|
|||
|
|
|||
|
"FidoNews" BBS
|
|||
|
FidoNet 1:1/23 <---- NEW ADDRESS!!!!
|
|||
|
BBS +1-519-570-4176, 300/1200/2400/14200/V.32bis/HST(DS)
|
|||
|
FidoNews 10-15 Page: 24 12 Apr 1993
|
|||
|
|
|||
|
Internet addresses:
|
|||
|
Don & Sylvia (submission address)
|
|||
|
editor@exlibris.tdkcs.waterloo.on.ca
|
|||
|
|
|||
|
Sylvia -- max@exlibris.tdkcs.waterloo.on.ca
|
|||
|
Donald -- donald@exlibris.tdkcs.waterloo.on.ca
|
|||
|
Tim -- pozar@kumr.lns.com
|
|||
|
|
|||
|
(Postal Service mailing address) (have extreme patience)
|
|||
|
FidoNews
|
|||
|
172 Duke St. E.
|
|||
|
Kitchener, Ontario
|
|||
|
Canada
|
|||
|
N2H 1A7
|
|||
|
|
|||
|
Published weekly by and for the members of the FidoNet international
|
|||
|
amateur electronic mail system. It is a compilation of individual
|
|||
|
articles contributed by their authors or their authorized agents. The
|
|||
|
contribution of articles to this compilation does not diminish the
|
|||
|
rights of the authors. Opinions expressed in these articles are those
|
|||
|
of the authors and not necessarily those of FidoNews.
|
|||
|
|
|||
|
Authors retain copyright on individual works; otherwise FidoNews is
|
|||
|
copyright 1993 Sylvia Maxwell. All rights reserved. Duplication and/or
|
|||
|
distribution permitted for noncommercial purposes only. For use in
|
|||
|
other circumstances, please contact the original authors, or FidoNews
|
|||
|
(we're easy).
|
|||
|
|
|||
|
|
|||
|
OBTAINING COPIES: The-most-recent-issue-ONLY of FidoNews in electronic
|
|||
|
form may be obtained from the FidoNews BBS via manual download or
|
|||
|
Wazoo FileRequest, or from various sites in the FidoNet and Internet.
|
|||
|
PRINTED COPIES may be obtained from Fido Software for $10.00US each
|
|||
|
PostPaid First Class within North America, or $13.00US elsewhere,
|
|||
|
mailed Air Mail. (US funds drawn upon a US bank only.)
|
|||
|
|
|||
|
BACK ISSUES: Available from FidoNet nodes 1:102/138, 1:216/21,
|
|||
|
1:125/1212, (and probably others), via filerequest or download
|
|||
|
(consult a recent nodelist for phone numbers).
|
|||
|
|
|||
|
A very nice index to the Tables of Contents to all FidoNews volumes
|
|||
|
can be filerequested from 1:396/1 or 1:216/21. The name(s) to request
|
|||
|
are FNEWSxTC.ZIP, where 'x' is the volume number; 1=1984, 2=1985...
|
|||
|
through 8=1991.
|
|||
|
|
|||
|
INTERNET USERS: FidoNews is available via FTP from ftp.ieee.org, in
|
|||
|
directory ~ftp/pub/fidonet/fidonews. If you have questions regarding
|
|||
|
FidoNet, please direct them to deitch@gisatl.fidonet.org, not the
|
|||
|
FidoNews BBS. (Be kind and patient; David Deitch is generously
|
|||
|
volunteering to handle FidoNet/Internet questions.)
|
|||
|
|
|||
|
SUBMISSIONS: You are encouraged to submit articles for publication in
|
|||
|
FidoNews. Article submission requirements are contained in the file
|
|||
|
ARTSPEC.DOC, available from the FidoNews BBS, or Wazoo filerequestable
|
|||
|
from 1:1/23 as file "ARTSPEC.DOC". Please read it.
|
|||
|
FidoNews 10-15 Page: 25 12 Apr 1993
|
|||
|
|
|||
|
|
|||
|
"Fido", "FidoNet" and the dog-with-diskette are U.S. registered
|
|||
|
trademarks of Tom Jennings, Box 77731, San Francisco CA 94107, USA and
|
|||
|
are used with permission.
|
|||
|
|
|||
|
Asked what he thought of Western civilization,
|
|||
|
M.K. Gandhi said, "I think it would be an excellent idea".
|
|||
|
-- END
|
|||
|
----------------------------------------------------------------------
|
|||
|
|