910 lines
39 KiB
Plaintext
910 lines
39 KiB
Plaintext
![]() |
|
|||
|
|
|||
|
Computer underground Digest Tue Mar 17, 1992 Volume 4 : Issue 13
|
|||
|
|
|||
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|||
|
Associate Editor: Etaion Shrdlu
|
|||
|
|
|||
|
CONTENTS, #4.13 (Mar 17, 1992)
|
|||
|
File 1--Some questions for the more informed....
|
|||
|
File 2--Letters from Prison-Len Rose's final installment
|
|||
|
File 3--Standing Up to Stop the Bells
|
|||
|
File 4--Whistleblowers computer bulletin board extremely successful
|
|||
|
|
|||
|
Issues of CuD can be found in the Usenet alt.society.cu-digest news
|
|||
|
group, on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG,
|
|||
|
and DL0 and DL12 of TELECOM, on Genie, on the PC-EXEC BBS at (414)
|
|||
|
789-4210, and by anonymous ftp from ftp.eff.org (192.88.144.4),
|
|||
|
chsun1.spc.uchicago.edu, and ftp.ee.mu.oz.au. To use the U. of
|
|||
|
Chicago email server, send mail with the subject "help" (without the
|
|||
|
quotes) to archive-server@chsun1.spc.uchicago.edu.
|
|||
|
European distributor: ComNet in Luxembourg BBS (++352) 466893.
|
|||
|
|
|||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|||
|
information among computerists and to the presentation and debate of
|
|||
|
diverse views. CuD material may be reprinted as long as the source
|
|||
|
is cited. Some authors do copyright their material, and they should
|
|||
|
be contacted for reprint permission. It is assumed that non-personal
|
|||
|
mail to the moderators may be reprinted unless otherwise specified.
|
|||
|
Readers are encouraged to submit reasoned articles relating to
|
|||
|
computer culture and communication. Articles are preferred to short
|
|||
|
responses. Please avoid quoting previous posts unless absolutely
|
|||
|
necessary.
|
|||
|
|
|||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|||
|
the views of the moderators. Digest contributors assume all
|
|||
|
responsibility for ensuring that articles submitted do not
|
|||
|
violate copyright protections.
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
Date: Fri, 13 Mar 1992 17:31 EDT
|
|||
|
From: "Led Go, You are hurding by node - The Elephants Child"@UNKNOWN.DOMAIN
|
|||
|
Subject: File 1--Some questions for the more informed....
|
|||
|
|
|||
|
I've just finished reading Shockwave Rider, and am currently starting
|
|||
|
to read Hackers. Does anyone have a single favorite reference, or
|
|||
|
suggestion, I'm somewhat curious about the comment of borrowing from
|
|||
|
the old hippies, in Shockwave Rider. There obviously may be some
|
|||
|
socio-psychological type references that may be there somewhere. Does
|
|||
|
anybody have any idea what Brunner was refering to there? It is an
|
|||
|
obscure mention towards the very end of the book, where the discussion
|
|||
|
of the far reaching web of the Precipice population, and its models
|
|||
|
for survival. I myself, was growing up during the last years of the so
|
|||
|
called hippie decade, so don't have much grasp on the time period.
|
|||
|
|
|||
|
Second:
|
|||
|
|
|||
|
After reading the rules of the Hacker Ethic, as outlined by Levy in
|
|||
|
'Hackers', I have the following comment;
|
|||
|
|
|||
|
I agree that information should be freely available, but feel
|
|||
|
somewhat that if I dig up the information, that anyone who wants it
|
|||
|
from me should be willing to freely pay what I freely ask for in
|
|||
|
exchange. They also have the right to not buy the information from me,
|
|||
|
but to look for another broker. I also have that same right when I'm
|
|||
|
looking for information. I'm strongly into capitolism, and thus am not
|
|||
|
at all sure I like the Hacker Ethic as described by Levy about the
|
|||
|
info should be free rule.
|
|||
|
|
|||
|
Replies, comments, accusations, etc. may be sent to
|
|||
|
Atkinson@gems.vcu.edu.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Wed Mar 4 18:17:21 1992
|
|||
|
From: lenrose@ouddahere.com
|
|||
|
Subject: File 2--Letters from Prison-Len Rose's final installment
|
|||
|
|
|||
|
((Moderators' note: Len Rose was incarcerated for unauthorized
|
|||
|
possession of UNIX sourcecode, and has nearly completed his term in
|
|||
|
federal prison in North Carolina. For those interested in the
|
|||
|
background to this case, in which Len was considered by many to be a
|
|||
|
victim of over-zealous prosecution and sentencing, a complete history,
|
|||
|
including usenet posts, news articles, search and seizure warrant,
|
|||
|
indictment, and other information is available in the Len.Rose file in
|
|||
|
the CuD ftp archives. Len will return to Chicago on March 23, and
|
|||
|
would appreciate any employment leads. Those wishing to contact him
|
|||
|
may do so through CuD until he has a permanent address)).
|
|||
|
|
|||
|
++++++++++++
|
|||
|
|
|||
|
Greetings from Prison!
|
|||
|
|
|||
|
It has been a long time coming, but it looks like I will be leaving
|
|||
|
here March 23, 1992. I never thought I would make it. I owe my survival
|
|||
|
to a few people out there on the Net, and I will never forget what
|
|||
|
they have done for me and my family. I have been able to keep myself
|
|||
|
informed, reading CuD and occasional articles from the Net that have been
|
|||
|
sent to me.
|
|||
|
|
|||
|
I am looking forward to working again, and perhaps with a lot of hard
|
|||
|
work and diligence, I can once again own a home and work for myself. I
|
|||
|
have been assigned to a halfway house in Chicago, and hope to obtain
|
|||
|
some employment in the city (at least for 2 months). If I do not or
|
|||
|
cannot otain work, they may not let me leave the halfway house on
|
|||
|
weekends (to be with my family). So, if I have to, I will work at
|
|||
|
McDonalds or clean floors.
|
|||
|
|
|||
|
I have no equipment left, so one of my first priorities will be
|
|||
|
obtaining some. Hopefully, I will be able to purchase a used Unix
|
|||
|
system and a decent modem. I will then be able to write code and work
|
|||
|
on projects for clients. I have a lot to do and very little time to
|
|||
|
accomplish it.
|
|||
|
|
|||
|
I also have much to be thankful for, and have a very good attitude
|
|||
|
now. When I was going through the worst of it,I felt like it was
|
|||
|
the end of the world, but now I know that it's only a temporary
|
|||
|
setback. I have so much to be grateful for, and, thanks to the people
|
|||
|
who have stood by me, I will be able to end up just as if it never
|
|||
|
happened.
|
|||
|
|
|||
|
Nowadays, I am bouncing off the walls in anticipation of seeing my
|
|||
|
wife and kids again. I haven't been able to see them while
|
|||
|
incarcerated, because they couldn't afford to visit North Carolina
|
|||
|
from Chicago, and I was never able to obtain a transfer to a closer
|
|||
|
prison. However, I guess it will make the reunion that much sweeter.
|
|||
|
Anyone who says that absence makes the heart row fonder is crazy. It
|
|||
|
is the worst torture that can be conceived.
|
|||
|
|
|||
|
My leg has mended well enough to permit me to work at just about
|
|||
|
anything. I usually walk 3 to 4 miles a day here trying to strengthen
|
|||
|
it. Although I have nothing else to do but read and perhaps tutor
|
|||
|
people who cannot read, I have managed to pass the time. That has been
|
|||
|
my worst enemy here lately--boredom. Loneliness for the people I love
|
|||
|
has been a major enemy from the beginning.
|
|||
|
|
|||
|
I hope to obtain an account on a system that is on the Internet so I
|
|||
|
can re-establish some contacts. Once I am able to buy some used Unix
|
|||
|
equipment, I will re-establish netsys.com and become a network site
|
|||
|
again. I have so many things to do.
|
|||
|
|
|||
|
Obviously my family will be my primary concern. They are currently
|
|||
|
receiving some public assistance, and let me tell you, no one can
|
|||
|
survive on welfare. If not for a few people who cared, they would be
|
|||
|
living on the street. I am no longer bitter. I have learned that there
|
|||
|
are some decent folk who care, and all of ou who've helped me are
|
|||
|
really something special. I just wanted you to know that. Most of you
|
|||
|
read CuD, so if I never have the chance to speak to you, please
|
|||
|
consider this a sincere thank you for what you've done.
|
|||
|
|
|||
|
Let's hear it for 1992. I have been dreaming of this moment for so
|
|||
|
long, and I am anxious to begin my life again. Although I have two
|
|||
|
months in a halfway house and then a three year probation to get
|
|||
|
through, I know that I will be unstoppable. If I am left alone, and
|
|||
|
am able to show the powers-that-be that I only wish to live my life, I
|
|||
|
now that I will again be a success. Family and happiness are the only
|
|||
|
things that matter. (And Unix too ((sigh)).
|
|||
|
|
|||
|
Well, if anyone has a job that I can do, I'd be very grateful. I like
|
|||
|
to work hard and will do it right. I have a lot of catching up to do,
|
|||
|
but feel sure that I can do so in a prompt manner.
|
|||
|
|
|||
|
Oh well. I have rambled enough. I look forward to meeting you all
|
|||
|
again on the Net. Who knows? Maybe I will become famous for something
|
|||
|
other than this....I certainly hope so.
|
|||
|
|
|||
|
Len Rose
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Fri, 13 Mar 1992 13:31:44 -0500
|
|||
|
From: Craig Neidorf <kl@stormking.com>
|
|||
|
Subject: File 3--Standing Up to Stop the Bells
|
|||
|
|
|||
|
Did you hear about 1-800-54-Privacy? Did you decide to call? I did
|
|||
|
and the following is the information I received a few weeks later. It
|
|||
|
outlines some of the serious ramifications of what is going to happen
|
|||
|
if we do not actively support Congressional bills S 2112 and HR 3515.
|
|||
|
|
|||
|
The information comes from the American Newspaper Publisher's
|
|||
|
Association (ANPA). Keep in mind, they have a vested financial
|
|||
|
interest in information services as do many others, and in many ways,
|
|||
|
the newspaper industry can be and has been just as dishonest and
|
|||
|
deceptive as the Regional Bell Operating Companies. However, in this
|
|||
|
particular situation, the ANPA has the right idea and does a pretty
|
|||
|
good job in explaining why we need to act now and act fast.
|
|||
|
|
|||
|
You know who I am, and what I've been through. My experiences have
|
|||
|
given me a unique perspective and insight into the methods and goals
|
|||
|
of the Regional Bell Operating Companies. They are inherently
|
|||
|
deceptive and if given even the slightest chance, they will screw the
|
|||
|
consumer and engage in anti-competitive market practices.
|
|||
|
Additionally, their tactics threaten our personal privacy as well.
|
|||
|
|
|||
|
The RBOCs must be stopped before its too late.
|
|||
|
|
|||
|
Craig Neidorf
|
|||
|
kl@stormking.com
|
|||
|
|
|||
|
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
|
|||
|
|
|||
|
1-800-54-Privacy
|
|||
|
444 N. Michigan Avenue
|
|||
|
Suite 900
|
|||
|
Chicago, Illinois 60611
|
|||
|
|
|||
|
|
|||
|
February 14, 1992
|
|||
|
|
|||
|
|
|||
|
Dear Consumer:
|
|||
|
|
|||
|
If you're like many people, you may have been hesitant about leaving
|
|||
|
your name and address on our 1-800-54-PRIVACY phone line.
|
|||
|
|
|||
|
Why?
|
|||
|
|
|||
|
Quite simply, no one wants to give out information about themselves
|
|||
|
without knowing exactly how that information is going to be used.
|
|||
|
|
|||
|
But the truth is, you reveal information about yourself EACH AND EVERY
|
|||
|
TIME YOU PICK UP THE PHONE. By tracking who you call, how often you
|
|||
|
call and how long each conversation lasts, the seven regional Bell
|
|||
|
telephone companies have the capability to learn and know more about
|
|||
|
you than even the IRS.
|
|||
|
|
|||
|
In fact, with modern computer technology, there is practically no
|
|||
|
limit to what the Bells can learn about your personal life every time
|
|||
|
you pick up the phone. And there is virtually no limit -- only one's
|
|||
|
imagination -- to the ways they can take advantage of all the
|
|||
|
information they glean.
|
|||
|
|
|||
|
Of course its one thing to have the capability to do this snooping.
|
|||
|
It's another thing to have the incentive to actually do it.
|
|||
|
|
|||
|
Until October 7, 1991, the incentive just didn't exist for the Bells.
|
|||
|
Prior to this date, the vast electronic networks of the Bell
|
|||
|
monopolies were just neutral carriers of phone messages, data, and
|
|||
|
other companies' fax, audiotex, and videotex services.
|
|||
|
|
|||
|
For example, when you last called a 1-900 or 1-800 line to get the
|
|||
|
latest stock quotes, sports scores, or headlines, your local phone
|
|||
|
company served simply as the pipeline for moving the billions of
|
|||
|
electrons in your call. The company that provided you with the
|
|||
|
information over the phone line was not -- and by law, could not be --
|
|||
|
the phone company.
|
|||
|
|
|||
|
And that's the way things had been since 1984, when U.S. District
|
|||
|
Court Judge Harold Greene issued his now-famous decree breaking up the
|
|||
|
AT&T monopoly and spinning off control of local phone service to seven
|
|||
|
regional Bell companies.
|
|||
|
|
|||
|
In the decree, the Court expressly prohibited the individual Bells
|
|||
|
from entering three businesses -- cable TV, telephone manufacturing,
|
|||
|
and electronic information services.
|
|||
|
|
|||
|
Why?
|
|||
|
|
|||
|
After presiding over the lengthy AT&T anti-trust case and being
|
|||
|
exposed to hundreds upon hundreds of monopolistic abuses by AT&T,
|
|||
|
Judge Greene's Court was firmly convinced that, if allowed to enter
|
|||
|
any of these three current areas, the Bells would undoubtedly engage
|
|||
|
in the same monopolistic behavior that characterized their former
|
|||
|
parent.
|
|||
|
|
|||
|
In other words, while cutting off the hydra-like AT&T head, Judge
|
|||
|
Greene was fearful that, given too much leeway, AT&T's seven so-called
|
|||
|
"Baby Bell" off-spring might become equal or worse monsters
|
|||
|
themselves.
|
|||
|
|
|||
|
From day one, however, the Bells undertook a long-term, multi-million
|
|||
|
dollar lobbying campaign to fight Judge Greene's ruling and try to
|
|||
|
convince the Justice Department, the higher courts, and even the U.S.
|
|||
|
Congress that they should be permitted to enter the content end of the
|
|||
|
information service business.
|
|||
|
|
|||
|
And, so, on October 7, 1991, after years of heavy lobbying, a higher
|
|||
|
court came through for the Bells and practically ordered Judge Greene
|
|||
|
to overturn his 1984 decree and open up the information services
|
|||
|
industry to the Bells.
|
|||
|
|
|||
|
In the 71-page ruling, a very reluctant Judge Greene devoted
|
|||
|
two-thirds of his decision to explaining why allowing the Bells to
|
|||
|
sell information services was bad for consumers and bad for America.
|
|||
|
|
|||
|
For example, he went to great length to discount the Bells' claim
|
|||
|
that, once given the green light, they would be better able to serve
|
|||
|
the public than the thousands of already existing electronic
|
|||
|
information services. To quote from his decision.
|
|||
|
|
|||
|
"In the first place, the contention that it will take the
|
|||
|
Regional Companies (the Bells) to provide better information
|
|||
|
services to the American public can only be described as
|
|||
|
preposterous."
|
|||
|
|
|||
|
Judge Green also wrote:
|
|||
|
|
|||
|
"Moreover, the Court considers the claim that the Regional
|
|||
|
Companies' entry into information services would usher in an era
|
|||
|
of sophisticated information services available to all as so much
|
|||
|
hype."
|
|||
|
|
|||
|
His decision also contains a warning regarding the prices consumers will be
|
|||
|
forced to pay for Bell-provided services:
|
|||
|
|
|||
|
"The Regional Companies would be able to raise price by increasing
|
|||
|
their competitors' costs, and they could raise such costs by virtue
|
|||
|
of the dependence of their rivals' information services on local
|
|||
|
network access."
|
|||
|
|
|||
|
Finally, here's what Judge Greene had to say about his court's
|
|||
|
decision and the public good:
|
|||
|
|
|||
|
"Were the Court free to exercise its own judgment, it would
|
|||
|
conclude without hesitation that removal of the information
|
|||
|
services restriction is incompatible with the decree and the
|
|||
|
public interest."
|
|||
|
|
|||
|
If Judge Greene's warnings as well as his profound reluctance to issue
|
|||
|
this ruling scare you, they should.
|
|||
|
|
|||
|
That's because the newly freed Bells now have the incentive, which
|
|||
|
they never had before, to engage in the anti-competitive,
|
|||
|
anti-consumer practices that Judge Greene feared.
|
|||
|
|
|||
|
Besides using your calling records to sell you information services
|
|||
|
they think you're predisposed to buy, the Bell's may well try to
|
|||
|
auction off your phone records to the highest bidder.
|
|||
|
|
|||
|
As a result, anyone who ever uses a phone could well be a potential
|
|||
|
victim of the Bell's abuse.
|
|||
|
|
|||
|
Consider the simple act of making a telephone call to an auto repair
|
|||
|
shop to schedule body work or a tune-up. By knowing that you made
|
|||
|
that call, your phone company might conclude that you're in the market
|
|||
|
for a new car and sell your name to local car dealers.
|
|||
|
|
|||
|
Another example. Think about calling a real estate broker for
|
|||
|
information on mortgage rates. Knowing you must be in the market for
|
|||
|
a house, the Bells could sell your name to other brokers. Or they
|
|||
|
could try to sell you their own electronic mortgage rate service.
|
|||
|
|
|||
|
Now let's say you and your spouse are having some problems and one of
|
|||
|
you calls a marriage counselor. Tipped off by information purchased
|
|||
|
from the phone company, a divorce lawyer shows up on your doorstep the
|
|||
|
next morning.
|
|||
|
|
|||
|
Finally, think about calling your favorite weather service hotline --
|
|||
|
a competitor to the weather service operated by your local phone
|
|||
|
company. By keeping track of people who use its competitor's service,
|
|||
|
the phone company might just try to get you to buy its weather service
|
|||
|
instead.
|
|||
|
|
|||
|
Far-fetched? Not at all.
|
|||
|
|
|||
|
Nefarious? You bet.
|
|||
|
|
|||
|
That doesn't mean that, starting tomorrow, your phone company is going
|
|||
|
to start tracking who you call, how long your calls last, and who
|
|||
|
calls you. However, they could do it if that wanted to. And, based
|
|||
|
on past experience, some of them probably will do so at one point or
|
|||
|
another.
|
|||
|
|
|||
|
That's because the protest of gaining an unfair edge over the
|
|||
|
competition --companies that have no choice but to depend upon the
|
|||
|
Bells wires -- is just too tantalizing a temptation for the Bells to
|
|||
|
ignore.
|
|||
|
|
|||
|
As you might expect, the Bells claim that these fears are totally
|
|||
|
unfounded and that strict regulations are in place to prevent them
|
|||
|
from abusing your telephone privacy.
|
|||
|
|
|||
|
However, there simply aren't enough regulators in the world to control
|
|||
|
the monopolistic tendencies and practices of the Bells. Every single
|
|||
|
one of the seven Bells has already abused its position as a regulated
|
|||
|
monopoly. There is no reason to believe they won't in the future.
|
|||
|
|
|||
|
For example, the Georgia Public Service Commission recently found that
|
|||
|
BellSouth had abused its monopoly position in promoting its MemoryCall
|
|||
|
voice mail system. Apparently, operators would try to sell MemoryCall
|
|||
|
when customers called to arrange for hook-up to competitors'
|
|||
|
voice-mail services. Likewise, while on service calls, BellSouth
|
|||
|
repair personnel would try to sell MemoryCall to people using
|
|||
|
competitors' systems. BellSouth even used competitors' orders for
|
|||
|
network features as sales leads to steal customers.
|
|||
|
|
|||
|
In February 1991, US West admitted it had violated the law by
|
|||
|
providing prohibited information services, by designing and selling
|
|||
|
telecommunications equipment and by discriminating against a
|
|||
|
competitor. The Justice Department imposed a $10 million fine -- 10
|
|||
|
times larger than the largest fine imposed in any previous anti-trust
|
|||
|
division contempt case.
|
|||
|
|
|||
|
In February 1990, the Federal Communications Commission found that one
|
|||
|
of Nynex's subsidiaries systematically overcharged another Nynex
|
|||
|
company $118 million for goods and services and passed that extra cost
|
|||
|
on to ratepayers.
|
|||
|
|
|||
|
The abuses go on and on.
|
|||
|
|
|||
|
In this brave new world, however, it's just not consumers who will
|
|||
|
suffer. Besides invading your privacy, the Bells could abuse their
|
|||
|
position as monopolies to destroy the wide range of useful information
|
|||
|
services already available
|
|||
|
|
|||
|
Right now, there are some 12,000 information services providing
|
|||
|
valuable news, information, and entertainment to millions of
|
|||
|
consumers. Every one of these services depends on lines owned and
|
|||
|
controlled by Bell monopolies.
|
|||
|
|
|||
|
This makes fair competition with the Bells impossible.
|
|||
|
|
|||
|
It would be like saying that Domino's Pizzas could only be delivered
|
|||
|
by Pizza Hut.
|
|||
|
|
|||
|
It would be like asking a rival to deliver a love note to your
|
|||
|
sweetheart.
|
|||
|
|
|||
|
It would be a disaster.
|
|||
|
|
|||
|
If the Bells aren't stopped, they will make it difficult -- if not
|
|||
|
impossible -- for competitors to use Bell wires to enter your home.
|
|||
|
|
|||
|
They could deny competitors the latest technological advances and
|
|||
|
delay the introduction of new features. They could even undercut
|
|||
|
competitor's prices by inflating local phone bills to finance the cost
|
|||
|
of their own new information services.
|
|||
|
|
|||
|
In the end, the Bells could drive other information services out of
|
|||
|
business, thereby dictating every bit of information you receive and
|
|||
|
depriving the American public out of the diversity of information
|
|||
|
sources it deserves and that our form of government demands.
|
|||
|
|
|||
|
Can something be done to stop the Bells?
|
|||
|
|
|||
|
Yes, absolutely.
|
|||
|
|
|||
|
You can take several immediate steps to register your views on this
|
|||
|
issue. Those steps are described in the attached "Action Guidelines"
|
|||
|
sheet. Please act right away.
|
|||
|
|
|||
|
In the meantime on behalf of our growing coalition of consumer groups,
|
|||
|
information services providers, and newspapers, thank you for your
|
|||
|
interest in
|
|||
|
this important issue.
|
|||
|
|
|||
|
Sincerely,
|
|||
|
|
|||
|
Cathleen Black
|
|||
|
President and Chief Executive Officer
|
|||
|
American Newspaper Publishers Association
|
|||
|
|
|||
|
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
|
|||
|
|
|||
|
ACTION GUIDELINES
|
|||
|
|
|||
|
Something is very wrong when a monopoly is put into the position where
|
|||
|
it can abuse your privacy, drive competitors from the market, and even
|
|||
|
force you, the captive telephone ratepayer, to subsidize the costs of
|
|||
|
new information services ventures.
|
|||
|
|
|||
|
Can something be done to stop this potential abuse?
|
|||
|
|
|||
|
Absolutely.
|
|||
|
|
|||
|
WHAT YOU CAN DO. The first step is to call or write your local
|
|||
|
telephone company to assert your right to privacy.
|
|||
|
|
|||
|
The second step is to write your U.S. Representative and U.S. Senators
|
|||
|
and urge them to support House bill 3515 and Senate bill 2112.
|
|||
|
|
|||
|
Since the purpose of both HR 3515 and S 2112 is to prevent the Bells
|
|||
|
from abusing their monopoly position, not to prevent legitimate
|
|||
|
competition, the Bells would be free to sell information services in
|
|||
|
any area of the country where they do not have a monopoly -- in other
|
|||
|
words, 6/7 of the country.
|
|||
|
|
|||
|
However, the bills would delay entry of the Bell companies into the
|
|||
|
information services industry in their own regions until they no
|
|||
|
longer held a monopoly over local phone service. As soon as consumers
|
|||
|
were offered a real choice in local phone service -- whether it be
|
|||
|
cellular phones, satellite communications, or other new technology --
|
|||
|
the Bells would be free to offer any information services they wanted.
|
|||
|
|
|||
|
Both bills are fair to everyone. They protect consumer privacy and
|
|||
|
ensure that the thriving information services industry will remain
|
|||
|
competitive.
|
|||
|
|
|||
|
Quick action is need to pass these bills. A hand-written letter
|
|||
|
stating your views is the most effective way of reaching elected
|
|||
|
officials. It is proof positive that you are deeply concerned about
|
|||
|
the issue.
|
|||
|
|
|||
|
|
|||
|
POINTS TO MAKE IN YOUR LETTER
|
|||
|
|
|||
|
You may wish to use some or all of the following points:
|
|||
|
|
|||
|
A phone call should be a personal and private thing -- not a
|
|||
|
sales marketing tool for the phone company.
|
|||
|
|
|||
|
The Bells should not be allowed to take unfair advantage of
|
|||
|
information they can obtain about you by virtue of owning and
|
|||
|
controlling the wires that come into homes.
|
|||
|
|
|||
|
The Bells must not be allowed to abuse their position as
|
|||
|
monopolies to drive existing information services out of
|
|||
|
business.
|
|||
|
|
|||
|
The Bells should not be permitted to engage in activities that
|
|||
|
would deprive Americans of the information diversity they deserve
|
|||
|
and that our form of government demands.
|
|||
|
|
|||
|
The Bells should not be permitted to finance information services
|
|||
|
ventures by inflating the phone bills of captive telephone
|
|||
|
ratepayers.
|
|||
|
|
|||
|
|
|||
|
AFTER YOU'VE WRITTEN YOUR LETTER
|
|||
|
|
|||
|
After you've written your letter or made your phone call, please send
|
|||
|
us a letter and tell us. By sending us your name and address, you'll
|
|||
|
receive occasional updates on the massive effort underway to prevent
|
|||
|
the Bells from invading your privacy and turning into the monopolistic
|
|||
|
monsters that Judge Greene warned about.
|
|||
|
|
|||
|
There's one more thing you can do. Please ask your friends,
|
|||
|
relatives, neighbors, and co-workers to urge their U.S.
|
|||
|
Representatives and Senators to support HR 3515 and S 2112. We need
|
|||
|
everyone's help if we're going to stop the Bells.
|
|||
|
|
|||
|
1-800-54-PRIVACY
|
|||
|
444 N. Michigan Avenue
|
|||
|
Suite #900
|
|||
|
Chicago, Illinois 60611
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Fri, 6 Mar 92 15:29 GMT
|
|||
|
From: Jean-Bernard Condat <0005013469@MCIMAIL.COM>
|
|||
|
Subject: File 4--Whistleblowers computer bulletin board extremely successful
|
|||
|
|
|||
|
|
|||
|
Whistleblowers computer bulletin board extremely successful
|
|||
|
|
|||
|
Whistle-blowers may now anonymously report government fraud, waste,
|
|||
|
and abuse via computer to the House Government Operations subcommittee
|
|||
|
on Government Information, Justice, and Agriculture. The number for
|
|||
|
the computer system, which will accept files and messages, is (202)
|
|||
|
225-5527. Aliases are permitted.
|
|||
|
|
|||
|
The Truelson' PhD published in 1986, draws upon the theoretical
|
|||
|
framework of systemic corruption--an organized conspiracy to suppress
|
|||
|
revelation of corrupt practices--to propose a retaliation model to
|
|||
|
account for organizational retaliation against whistleblowers with
|
|||
|
legitimate protests. This study is one basis of this uncredible
|
|||
|
bulletin board.
|
|||
|
|
|||
|
House Government Information Subcommittee's whistleblower computer
|
|||
|
BBS has been "tremendously successful" and has generated about "50
|
|||
|
substantive leads" in its two months of operation, Subcommittee Chief
|
|||
|
Counsel Robert Gellman said. Board has received 700-800 calls, many
|
|||
|
from curious browsers who want to see what's available and others who
|
|||
|
want to discuss policy
|
|||
|
matters.
|
|||
|
|
|||
|
But Gellman said board was designed solely to allow whistle-blowers to
|
|||
|
post private notes to alert Subcommittee to instances of waste, fraud and
|
|||
|
abuse, so there isn't much for anyone else to see. There are no files
|
|||
|
available to download or bulletin to read, as there are on most bulletin
|
|||
|
boards. Gellman said message senders often don't use their real names,
|
|||
|
and Subcommittee staff has used electronic mail feature to send message
|
|||
|
back asking for more information.
|
|||
|
|
|||
|
|
|||
|
REFERENCES
|
|||
|
|
|||
|
1. Food Chemical News, December 16, 1991, ISSN 0015-6337;
|
|||
|
|
|||
|
2. Judith Anne Truelson, "Blowing the Whistle on systemic Corruption,"
|
|||
|
University of Southern California (Los Angeles, CA), 1986;
|
|||
|
|
|||
|
3. Communications Daily, February 13, 1992, ISSN 0277-0679.
|
|||
|
|
|||
|
++++ (A SAMPLE) ++++
|
|||
|
|
|||
|
ON-LINE SEARCHING
|
|||
|
|
|||
|
Welcome to
|
|||
|
|
|||
|
THE FEDERAL WHISTLEBLOWER BBS
|
|||
|
|
|||
|
This bulletin board exists to help the United States Congress identify
|
|||
|
waste, fraud, and abuse in the federal government. You are invited to
|
|||
|
leave messages or upload files that relate to this purpose. There are no
|
|||
|
public files or public messages on this board.
|
|||
|
|
|||
|
Your SYSOP is Congressman Bob Wise from West Virginia.
|
|||
|
|
|||
|
The CONTENTS of all communications are confidential and not accessible to
|
|||
|
other users. However, the name you use to sign on may be visible to
|
|||
|
other users. If this is a concern, please use a pseudonym to protect
|
|||
|
your identity.
|
|||
|
|
|||
|
|
|||
|
What is your FIRST name (pseudonyms okay)? JONES JOHN
|
|||
|
|
|||
|
Checking Users...
|
|||
|
User not found
|
|||
|
Are you 'JONES JOHN' ([Y],N)? Y
|
|||
|
What is your STATE (any entry acceptable)? LYON IN FRANCE
|
|||
|
Welcome to the FEDERAL WHISTLEBLOWER BULLETIN BOARD.
|
|||
|
|
|||
|
This Board is operated by an investigative subcommittee in the U.S. House
|
|||
|
of Representatives.
|
|||
|
|
|||
|
Your SYSOP is Congressman Bob Wise from West Virginia.
|
|||
|
|
|||
|
GROUND RULES:
|
|||
|
|
|||
|
1. There are NO public files and NO public messages on this board.
|
|||
|
If you are looking for downloads, games, etc., you won't find them here.
|
|||
|
|
|||
|
2. If you have a concern about protecting your identity, please use
|
|||
|
a pseudonym. Because of software limitations, the name you use to sign
|
|||
|
on with may become known to others. You may leave your real name in the
|
|||
|
contents of a message, but this is not required. THE CONTENTS OF
|
|||
|
MESSAGES CAN ONLY BE READ BY THE SYSOP. Messages cannot be read by any
|
|||
|
other user. Use the Comment command to leave messages to the Sysop.
|
|||
|
|
|||
|
JONES JOHN from LYON IN FRANCE
|
|||
|
C)hange FIRST name (pseudonyms okay)/LAST name (pseudonyms okay)/STATE (any
|
|||
|
ent
|
|||
|
ry acceptable), D)isconnect, [R]egister? R
|
|||
|
Enter PASSWORD you'll use to logon again (dots echo)? ....
|
|||
|
Re-Enter password for Verification (dots echo)? ....
|
|||
|
Please REMEMBER your password
|
|||
|
Welcome to RBBS-PC, Condat. You have 60 mins for this session.
|
|||
|
Logging JONES JOHN
|
|||
|
RBBS-PC 17.3C Node 1, operating at 1200 BAUD,N,8,1
|
|||
|
|
|||
|
+--------------------------------------------------+
|
|||
|
| Welcome to the FEDERAL WHISTLEBLOWER BBS |
|
|||
|
+--------------------------------------------------+
|
|||
|
Your SYSOP is Congressman Bob Wise
|
|||
|
BBS Phone: (202) 225-5527
|
|||
|
|
|||
|
REMINDERS:
|
|||
|
|
|||
|
1) Remember your password. If you forget it, you can't read
|
|||
|
your mail and we can't contact you.
|
|||
|
|
|||
|
2) Use mixed case in messages. ALL UPPER CASE IS HARD TO READ.
|
|||
|
|
|||
|
3) If you upload a file, please leave a message so we know who
|
|||
|
provided it. If you don't, the upload will not be acknowledged.
|
|||
|
This is NOT a requirement. Anonymous uploads are acceptable.
|
|||
|
|
|||
|
4) Callers may be deleted after 30 days. If this happens to you,
|
|||
|
just register again. It only takes a second.
|
|||
|
|
|||
|
Checking messages in MAIN..
|
|||
|
Sorry, JONES, No NEW mail for you
|
|||
|
|
|||
|
RBBS-PC 17.3C Node 1
|
|||
|
|
|||
|
Caller # 1279 # active msgs: 74 Next msg # 539
|
|||
|
|
|||
|
------*>>> RBBS-PC MAIN MENU <<<*------
|
|||
|
----- MAIL ---------- SYSTEM ---------- UTILITIES ------ ELSEWHERE ---
|
|||
|
|
|||
|
[R]ead Mail to Me [B]ulletins [H]elp (or ?) [F]iles
|
|||
|
[C]omment to SYSOP [I]nitial Welcome [X]pert on/off [G]oodbye
|
|||
|
[Q]uit
|
|||
|
[U]tilities
|
|||
|
|
|||
|
*----------------------------------------------------------------
|
|||
|
Current time: 09:38 AM Minutes remaining: 58 Security: 5
|
|||
|
*----------------------------------------------------------------
|
|||
|
MAIN: 58 min left
|
|||
|
MAIN command <?,B,C,F,G,H,I,K,Q,R,U,X>? B
|
|||
|
|
|||
|
* Ctrl-K(^K) / ^X aborts. ^S suspends ^Q resumes *
|
|||
|
======[ WHISTLEBLOWER BBS Bulletin Menu ]=======
|
|||
|
|
|||
|
Bulletin Description
|
|||
|
*----- -------------------------------------
|
|||
|
1 Description and Purpose of this Board
|
|||
|
2 Upload and Download Policies (NO DOWNLOADS!)
|
|||
|
3 Operating Policies
|
|||
|
4 How to Blow the Whistle
|
|||
|
|
|||
|
Read what bulletin(s), L)ist, S)ince, N)ews ([ENTER] = none)? 3
|
|||
|
|
|||
|
* Ctrl-K(^K) / ^X aborts. ^S suspends ^Q resumes *
|
|||
|
THE WHISTLEBLOWER BBS: OPERATING POLICIES
|
|||
|
|
|||
|
1. The highest priority on this bulletin board is protecting the
|
|||
|
confidentiality of callers. A caller concerned about confidentiality
|
|||
|
should use a pseudonym.
|
|||
|
|
|||
|
2. There is no Caller-ID service on the bulletin board's incoming
|
|||
|
line. Incoming calls are not traced. Each caller must consider the
|
|||
|
possibility that a call to this board is being recorded or traced at the
|
|||
|
source of the call.
|
|||
|
|
|||
|
3. The Whistleblower BBS is operated by an investigative subcommittee
|
|||
|
in the United States House of Representatives. The purpose of the board is
|
|||
|
to assist the Congress in identifying waste, fraud, and abuse in federal
|
|||
|
agencies, programs, contracts, and grants. No action will be taken on any
|
|||
|
information that does not further this purpose.
|
|||
|
|
|||
|
4. A higher priority will be assigned to matters that involve large
|
|||
|
amounts of federal funds or that affect health or safety. Other matters
|
|||
|
may be pursued to the extent permitted by available resources.
|
|||
|
|
|||
|
5. We cannot provide any type of general assistance to callers. The
|
|||
|
board should not be used for any political purpose or to lobby Congress on
|
|||
|
legislative or policy matters.
|
|||
|
|
|||
|
6. Messages that relate to the purpose of the board will be
|
|||
|
acknowledged. A caller who provides an investigative lead is encouraged to
|
|||
|
call back in the event more information is required. Messages that do not
|
|||
|
relate to the purpose of the board may not be acknowledged. Most messages
|
|||
|
will be erased after they are read.
|
|||
|
|
|||
|
7. General information about investigations that result from
|
|||
|
activities on the Whistleblower BBS may be made public, although no
|
|||
|
information specifically identifying an individual caller will be released.
|
|||
|
Publicity for the board will help to accomplish its purpose. However, a
|
|||
|
caller will not necessarily be informed about the details of any
|
|||
|
investigation that results from his or her message.
|
|||
|
|
|||
|
8. Information obtained on the Whistleblower BBS may be shared with
|
|||
|
other congressional investigators, agency Inspectors General, and the
|
|||
|
General Accounting Office (the audit arm of Congress). INFORMATION THAT
|
|||
|
SPECIFICALLY IDENTIFIES CALLERS WILL NOT BE SHARED. Callers should
|
|||
|
identify any special confidentiality concerns or expressly state if they
|
|||
|
need to place any specific restrictions on the use of the information that
|
|||
|
they provide. Information will not be shared if a caller specifically
|
|||
|
requests.
|
|||
|
|
|||
|
9. Casual visitors to the board may be deleted from the user base at
|
|||
|
any time. If you call a second time and find that you are not recognized,
|
|||
|
just re-register. It only takes a few seconds. Users not engaged in
|
|||
|
current discussions may also be deleted as a security precaution.
|
|||
|
|
|||
|
10. Text files may be uploaded, preferably in ASCII format. Word
|
|||
|
Perfect format is a second choice. Files may be compressed using standard
|
|||
|
compression programs. Files other than text files will be immediately
|
|||
|
deleted.
|
|||
|
|
|||
|
11. If you attempt to use a common pseudonym (e.g., John Doe), you may
|
|||
|
find that it is already in use. When you first enter a name not in use,
|
|||
|
you will receive a message about the board. If you enter a name that is
|
|||
|
known to the board, you will be asked for a password. If this happens, you
|
|||
|
must hang up, call again, and use a different name. Anyone reading this
|
|||
|
has already solved the problem. This paragraph is included as an
|
|||
|
explanation.
|
|||
|
* Ctrl-K(^K) / ^X aborts. ^S suspends ^Q resumes *
|
|||
|
======[ WHISTLEBLOWER BBS Bulletin Menu ]=======
|
|||
|
|
|||
|
Bulletin Description
|
|||
|
*----- -------------------------------------
|
|||
|
1 Description and Purpose of this Board
|
|||
|
2 Upload and Download Policies (NO DOWNLOADS!)
|
|||
|
3 Operating Policies
|
|||
|
4 How to Blow the Whistle
|
|||
|
|
|||
|
Read what bulletin(s), L)ist, S)ince, N)ews ([ENTER] = none)? 4
|
|||
|
|
|||
|
* Ctrl-K(^K) / ^X aborts. ^S suspends ^Q resumes *
|
|||
|
THE WHISTLEBLOWER BBS
|
|||
|
|
|||
|
How to Blow the Whistle on Fraud, Waste, and Abuse
|
|||
|
|
|||
|
1. You do NOT have to give your name or identify yourself in any way.
|
|||
|
But you should call again after you have left a message. Use the same name
|
|||
|
you used the first time and see if there is an answer for you. Use the
|
|||
|
READ MAIL TO ME command. This permits continuing communications so that we
|
|||
|
can ask you for more information or clarification. Allow a few days for
|
|||
|
your message to be read.
|
|||
|
|
|||
|
2. Remember that we are more interested in conduct involving
|
|||
|
SIGNIFICANT amounts of federal funds or MAJOR instances of wrongdoing. We
|
|||
|
have limited resources, and we are less likely to investigate minor
|
|||
|
matters. When in doubt, we encourage you to report the matter and let us
|
|||
|
decide.
|
|||
|
|
|||
|
3. Provide enough information so we can find and investigate the
|
|||
|
objectionable activity. Whenever possible, tell us WHO, WHAT, WHERE, WHEN,
|
|||
|
WHY, and HOW. Be as specific as possible.
|
|||
|
|
|||
|
4. WHO: Identify the agency, office, program, contract, or grant:
|
|||
|
|
|||
|
Vague: ABC Department
|
|||
|
Okay: ABC Department, Z Bureau
|
|||
|
Good: ABC Department, Z Bureau, Denver Office
|
|||
|
Better: ABC Department, Z Bureau, Denver Office, Contract
|
|||
|
Number 123-456 dated 2/1/89
|
|||
|
|
|||
|
5. WHAT: Describe the conduct:
|
|||
|
|
|||
|
Vague: Wasted Money
|
|||
|
Okay: Bought unnecessary computers
|
|||
|
Good: Bought 200 Personal Computers to use funds at the
|
|||
|
end of the fiscal year
|
|||
|
Better: John Smith authorized the purchase of 200 unneeded
|
|||
|
PCs under contract 123-456 on 9/30/91 to avoid
|
|||
|
returning excess funds to the Treasury
|
|||
|
|
|||
|
6. WHERE: State where the activity occurred:
|
|||
|
|
|||
|
Vague: Unnecessary travel
|
|||
|
Okay: Trips to Los Angeles
|
|||
|
Good: Trips from Headquarters to Los Angeles
|
|||
|
Better: John Smith authorized travel for himself from
|
|||
|
Chicago to Los Angeles every Friday before the
|
|||
|
UCLA football team played a game at home so he
|
|||
|
could watch the game
|
|||
|
|
|||
|
7. WHEN: Provide all relevant dates:
|
|||
|
|
|||
|
Vague: Last year
|
|||
|
Okay: 1990
|
|||
|
Good: Starting in May 1990
|
|||
|
Better: Began on May 5, 1990, continued every other week
|
|||
|
until December 14, 1991
|
|||
|
|
|||
|
8. WHY and HOW: Explain the conduct involved:
|
|||
|
|
|||
|
Vague: Broke the law
|
|||
|
Okay: Did not follow procurement rules
|
|||
|
Good: Failed to obtain sole-source contracting authority
|
|||
|
Better: Procured 1000 buses from ABC Corp. under contract
|
|||
|
number 123-456, on 5/1/90, under a sole source
|
|||
|
contract that was not approved by the contracting
|
|||
|
officer.
|
|||
|
|
|||
|
* Ctrl-K(^K) / ^X aborts. ^S suspends ^Q resumes *
|
|||
|
======[ WHISTLEBLOWER BBS Bulletin Menu ]=======
|
|||
|
|
|||
|
Bulletin Description
|
|||
|
*----- -------------------------------------
|
|||
|
1 Description and Purpose of this Board
|
|||
|
2 Upload and Download Policies (NO DOWNLOADS!)
|
|||
|
3 Operating Policies
|
|||
|
4 How to Blow the Whistle
|
|||
|
|
|||
|
Read what bulletin(s), L)ist, S)ince, N)ews ([ENTER] = none)?
|
|||
|
|
|||
|
------*>>> RBBS-PC MAIN MENU <<<*------
|
|||
|
*-- MAIL ---------- SYSTEM ---------- UTILITIES ------ ELSEWHERE ---
|
|||
|
|
|||
|
[R]ead Mail to Me [B]ulletins [H]elp (or ?) [F]iles
|
|||
|
[C]omment to SYSOP [I]nitial Welcome [X]pert on/off [G]oodbye
|
|||
|
[Q]uit
|
|||
|
[U]tilities
|
|||
|
|
|||
|
*------------------------------------------------------------------
|
|||
|
Current time: 09:41 AM Minutes remaining: 55 Security: 5
|
|||
|
*------------------------------------------------------------------
|
|||
|
MAIN: 55 min left
|
|||
|
MAIN command <?,B,C,F,G,H,I,K,Q,R,U,X>? C
|
|||
|
|
|||
|
Type comment 60 lines max (Press [ENTER] to quit)
|
|||
|
|
|||
|
[----------------------------------------------------------------------]
|
|||
|
1: Hallo!
|
|||
|
2: I am a French journalist and will be very please to receive a press
|
|||
|
3: information on this curious BBS.
|
|||
|
4: My e-mail address is MCI Mail #501-3469 or DialMail #24064
|
|||
|
5: Don't hesitate to contact me.
|
|||
|
6: Jean-Bernard Condat
|
|||
|
7: CCCF, B.P. 8005, 69351 Lyon Cedex 08, France (Fax.: +33 1 47877070)
|
|||
|
8:
|
|||
|
|
|||
|
A)bort, C)ontinue adding, D)elete lines, E)dit a line
|
|||
|
I)nsert lines, L)ist, M)argin change, R)evise subj, S)ave msg, ?)help
|
|||
|
Edit Sub-function <A,C,D,E,I,L,M,R,S,?>? s
|
|||
|
Adding new msg # 539.
|
|||
|
Receiver will be notified of new mail
|
|||
|
|
|||
|
------*>>> RBBS-PC MAIN MENU <<<*------
|
|||
|
*-- MAIL ---------- SYSTEM ---------- UTILITIES ------ ELSEWHERE ---
|
|||
|
|
|||
|
[R]ead Mail to Me [B]ulletins [H]elp (or ?) [F]iles
|
|||
|
[C]omment to SYSOP [I]nitial Welcome [X]pert on/off [G]oodbye
|
|||
|
[Q]uit
|
|||
|
[U]tilities
|
|||
|
|
|||
|
*----------------------------------------------------------------
|
|||
|
Current time: 09:43 AM Minutes remaining: 53 Security: 5
|
|||
|
*-----------------------------------------------------------------
|
|||
|
MAIN: 53 min left
|
|||
|
MAIN command <?,B,C,F,G,H,I,K,Q,R,U,X>? g
|
|||
|
Log off (Y,[N])? y
|
|||
|
|
|||
|
Now: 03-06-1992 at 09:43:54
|
|||
|
On for 7 mins, 5 secs
|
|||
|
60 min left for next call today
|
|||
|
JONES, Thanks and please call again!
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
End of Computer Underground Digest #4.13
|
|||
|
************************************
|
|||
|
|
|||
|
|
|||
|
|