905 lines
42 KiB
Plaintext
905 lines
42 KiB
Plaintext
|
|
|||
|
|
|||
|
****************************************************************************
|
|||
|
>C O M P U T E R U N D E R G R O U N D<
|
|||
|
>D I G E S T<
|
|||
|
*** Volume 3, Issue #3.04 (January 28, 1991) **
|
|||
|
****************************************************************************
|
|||
|
|
|||
|
MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet)
|
|||
|
ARCHIVISTS: Bob Krause / Alex Smith / Bob Kusumoto
|
|||
|
RESIDENT SYSTEM CRASH VICTIM:: Brendan Kehoe
|
|||
|
|
|||
|
USENET readers can currently receive CuD as alt.society.cu-digest. Back
|
|||
|
issues are also available on Compuserve (in: DL0 of the IBMBBS sig),
|
|||
|
PC-EXEC BBS (414-789-4210), and at 1:100/345 for those on FIDOnet.
|
|||
|
Anonymous ftp sites: (1) ftp.cs.widener.edu (2) cudarch@chsun1.uchicago.edu
|
|||
|
E-mail server: archive-server@chsun1.uchicago.edu.
|
|||
|
|
|||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|||
|
information among computerists and to the presentation and debate of
|
|||
|
diverse views. CuD material may be reprinted as long as the source is
|
|||
|
cited. Some authors, however, do copyright their material, and those
|
|||
|
authors should be contacted for reprint permission. It is assumed that
|
|||
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|||
|
specified. Readers are encouraged to submit reasoned articles relating to
|
|||
|
the Computer Underground. Articles are preferred to short responses.
|
|||
|
Please avoid quoting previous posts unless absolutely necessary.
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
DISCLAIMER: The views represented herein do not necessarily represent the
|
|||
|
views of the moderators. Contributors assume all responsibility
|
|||
|
for assuring that articles submitted do not violate copyright
|
|||
|
protections.
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
CONTENTS THIS ISSUE:
|
|||
|
File 1: Moderators' Corner
|
|||
|
File 2: From the Mailbag
|
|||
|
File 3: BMUG's ECPA Commentary (reprinted with permission from BMUG
|
|||
|
File 4: The CU in the News
|
|||
|
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
********************************************************************
|
|||
|
*** CuD #3.04, File 1 of 4: Moderator's corner ***
|
|||
|
********************************************************************
|
|||
|
|
|||
|
From: Moderators
|
|||
|
Subject: Moderators' Corner
|
|||
|
Date: January 28, 1991
|
|||
|
|
|||
|
++++++++++
|
|||
|
In this file:
|
|||
|
1. LEN ROSE UPDATE
|
|||
|
2. FIRST CONFERENCE ON COMPUTERS, FREEDOM AND PRIVACY
|
|||
|
3. FTP INFO AND WIDENER CRASH
|
|||
|
++++++++++
|
|||
|
|
|||
|
+++++++++++++++++++
|
|||
|
Len Rose Update
|
|||
|
+++++++++++++++++++
|
|||
|
|
|||
|
Len Rose's trial, originally scheduled for January 28, has been pushed back to
|
|||
|
April 1 because of a superceding indictment related to the same facts. Len is
|
|||
|
currently represented by Catterton, Kemp, and Mason of Rockville, Md.
|
|||
|
The EFF's amicus brief in the case is available from the CuD archives or
|
|||
|
directly from EFF.
|
|||
|
|
|||
|
+++++++++++++++++++++++
|
|||
|
First Conference on Computers, Freedom and Privacy
|
|||
|
+++++++++++++++++++++++++
|
|||
|
|
|||
|
Don't forget The First Conference On Computers, Freedom and Privacy coming
|
|||
|
up on March 25-28. The conference will be held at the Airport SFO Marriott
|
|||
|
Hotel in Burlingame (that's the San Francisco Airport about 15 minutes
|
|||
|
south of the city for out-of-towners). All are invited, but participation
|
|||
|
is limited to the first 600 registering. For more information, contact
|
|||
|
JWARREN@WELL.SF.CA.US or WELL!JWARREN@APPLE.COM
|
|||
|
|
|||
|
++++++++++++++++++++++++++++++
|
|||
|
FTP Info and Widener Crash
|
|||
|
+++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
The Widener ftp site is experiencing some problems and is down for awhile.
|
|||
|
But, the others are currently working. Back issues of cuds on Compuserve
|
|||
|
are in: DL0 of the IBMBBS sig. Added to the archives: A dozen more state
|
|||
|
computer statutes, NIA #69 (which came out last month), Phantasy #4, and a
|
|||
|
few other things. An anonymous contributor also deposited about a dozen or
|
|||
|
more university computer policies/regulations in the "legal" directory
|
|||
|
which are well worth reading. Thanks to the donor! Brian Peretti also send
|
|||
|
over his "Computer Publication and the First Amendment," which we also
|
|||
|
recommend.
|
|||
|
|
|||
|
********************************************************************
|
|||
|
>> END OF THIS FILE <<
|
|||
|
***************************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
From: Assorted
|
|||
|
Subject: From the Mailbag
|
|||
|
Date: January 29, 1990
|
|||
|
|
|||
|
********************************************************************
|
|||
|
*** CuD #3.04, File 2 of 4: From the Mailbag ***
|
|||
|
********************************************************************
|
|||
|
|
|||
|
Subject: New address for ATI.
|
|||
|
From: Ground Zero <gzero@TRONSBOX.XEI.COM>
|
|||
|
Date: Tue, 22 Jan 91 18:07:55 EST
|
|||
|
|
|||
|
Dear ATI Readers:
|
|||
|
|
|||
|
Hello!! Those of you who attempted to send mail to us may have noticed
|
|||
|
that it bounced back or didn't make it here. Due to some changes in our
|
|||
|
home site, ATI now has a new address. Our new address is:
|
|||
|
|
|||
|
gzero@tronsbox.xei.com
|
|||
|
|
|||
|
As always, do send all correspondence to the above address and NOT the
|
|||
|
address this message is comeing from (the one beginning with "zero-list").
|
|||
|
|
|||
|
Due to changes in our home site, the release of ATI54 has been delayed.
|
|||
|
However, we're working on it, and you should expect to see ATI54
|
|||
|
within a few days.
|
|||
|
See ya then!
|
|||
|
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
From: Nigel Allen <chinacat!uunet!contact!ndallen@CS.UTEXAS.EDU>
|
|||
|
Subject: Algorithm: A Newsletter for People Who Enjoy Programming
|
|||
|
Date: Thu, 24 Jan 91 04:23 EST
|
|||
|
|
|||
|
Algorithm: A Newsletter for People Who Enjoy Programming
|
|||
|
|
|||
|
For one year now, A.K. Dewdney (author of Scientific American's popular
|
|||
|
Computer Recreations column) has been publishing a newsletter (or is it a
|
|||
|
magazine?) called Algorithm. Appearing bi-monthly, Algorithm features a
|
|||
|
wide range of topics in each issue, mostly centered around fascinating
|
|||
|
programming projects of the kind we used to see in Computer Recreations.
|
|||
|
Besides Dewdney, Clifford Pickover (JBM's graphic genius), Michael Ecker
|
|||
|
(formerly of Creative Computing) and Dennis Shasta (creator of the Dr. Ecco
|
|||
|
puzzles) also write columns for Algorithm. Each issue features Algoletters
|
|||
|
from vendors with projects and ideas to share, the four programming columns
|
|||
|
just mentioned, stimulating articles and reviews of weird and wonderful
|
|||
|
programs written by individuals and small companies.
|
|||
|
|
|||
|
The basic vehicle of Algorithm is algorithms. By specifying program ideas
|
|||
|
in pseudocode, the publication makes them available in a
|
|||
|
language-independent form. The emphasis in mainly recreational and (dare I
|
|||
|
say it?) educational. Topics range from fractals and chaos to cellular
|
|||
|
automata, scientific simulation and computer games. The scope is wide open
|
|||
|
and engaging.
|
|||
|
|
|||
|
Anyone wishing a free inspection copy of Algorithm should drop a line to
|
|||
|
Algorithm, P.O. Box 29237, Westmount Postal Outlet, 785 Wonderland Road,
|
|||
|
London, Ontario, CANADA N6K 1M6. Alternatively, they can send me e-mail
|
|||
|
(ndallen@contact.uucp) or reply to this message, and I'll forward the
|
|||
|
request to Algorithm.
|
|||
|
|
|||
|
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
From: sjackson@TIC.COM(Steve Jackson)
|
|||
|
Subject: More on What to Say when the Warrant Comes
|
|||
|
Date: Sun, 2 Dec 90 12:54:28 cst
|
|||
|
|
|||
|
(1) Regarding "Don't Talk To The Police" in CuD 2.14: I question the
|
|||
|
statement that
|
|||
|
|
|||
|
>He cannot legally place you under arrest or enter your home without a
|
|||
|
>warrant signed by a judge. If he indicates that he has such a warrant,
|
|||
|
>ask to see it. A person under arrest, or located on premises to be
|
|||
|
>searched, generally must be shown a warrant if he requests it and must be
|
|||
|
>given a chance to read it.
|
|||
|
|
|||
|
It is important to be VERY POLITE AND CAREFUL when refusing to cooperate
|
|||
|
with police, unless you are locally powerful and have lots of witnesses.
|
|||
|
And even then, politeness and care are worthwhile. Your "rights" can
|
|||
|
evaporate instantly if you antagonize an officer, especially if there are
|
|||
|
no disinterested witnesses. Your friends and family are not disinterested
|
|||
|
enough to worry a hostile officer; he may arrest them, too.
|
|||
|
|
|||
|
Regarding "place you under arrest" - If, in the process of refusing entry
|
|||
|
to a police officer, you demonstrate a "bad attitude," the officer may be
|
|||
|
motivated to FIND a reason to arrest you. Any display of a weapon, any
|
|||
|
possibly-illegal item or situation visible from where the officer stands,
|
|||
|
any threat against the officer's person, or (depending on local law) any
|
|||
|
behavior the officer can characterize as indicative of drunkenness or drug
|
|||
|
use . . . BANG, you're under arrest. And, in some situations, the officers
|
|||
|
can now search your home because they arrested you. If, for instance, they
|
|||
|
observed an illegal weapon, they can now reasonably suspect that there are
|
|||
|
more. In the process of searching for more weapons, they will naturally
|
|||
|
keep their eyes open for the original object of the search.
|
|||
|
|
|||
|
Regarding "signed warrant" - The general lay public believes, as I did
|
|||
|
before March 1, that no search may be conducted if the police cannot show
|
|||
|
you a signed search warrant. But *this does not appear to be true.* When my
|
|||
|
office was invaded, the agents did *not* show a signed search warrant; they
|
|||
|
showed a photocopy with many spaces, including the space for a judge's
|
|||
|
signature, STILL BLANK.
|
|||
|
|
|||
|
Nevertheless, no resistance was made to their search. And it seems that
|
|||
|
this is just as well. Later that day, when I asked my attorney what would
|
|||
|
have happened if we had objected to the lack of a signature, I was told
|
|||
|
"Everybody who resisted the search would have been handcuffed and taken
|
|||
|
downtown for obstructing officers in the performance of their duties."
|
|||
|
|
|||
|
It appears - and I have been trying, to no avail, to get an authoritative
|
|||
|
statement on this - that if officers HAVE a signed search warrant - or if
|
|||
|
they believe that a judge has signed a copy of their warrant, even if they
|
|||
|
themselves don't have a signed copy - then they can conduct a legal search.
|
|||
|
In the latter case, they obviously can't show a signed warrant; they don't
|
|||
|
have one!
|
|||
|
|
|||
|
My point is that the common belief that "they have to show you a SIGNED
|
|||
|
warrant" may be a misconception that can get a citizen into serious trouble.
|
|||
|
We really need to get an authoritative clarification on this.
|
|||
|
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
From: "Ofer Inbar" <cos@CHAOS.CS.BRANDEIS.EDU>
|
|||
|
Date: Wed, 23 Jan 91 13:02:55 est
|
|||
|
Subject: Discussion of Dark Adept's articles (con't)
|
|||
|
|
|||
|
In CuD #3.03, file 2, David Daniel wrote a critique of Dark Adept's latest
|
|||
|
essay. Although much of David's essay was well thought out, there are
|
|||
|
points which I think he should reconsider.
|
|||
|
|
|||
|
>manufacture and/or market it. Mr. Adept expressed his belief that a user
|
|||
|
>interface was generic. I'm sure we could find many hard working programmers
|
|||
|
>who would heartily disagree as well as corporate executives who have
|
|||
|
>overseen the expenditure of many thousands or man-hours and dollars in the
|
|||
|
>development of a unique software product. Don't they deserve a return on
|
|||
|
>their investment? Mr. Adept denies the existence of license agreements when
|
|||
|
|
|||
|
It's quite likely that the interface had already been developed by someone
|
|||
|
else. If it were not protected by some other company's legal department,
|
|||
|
the corporation in question would never have had to spend thousands of
|
|||
|
dollars on developing it in the first place.
|
|||
|
|
|||
|
If everyone has to spend money reinventing the wheel, it's only fair to
|
|||
|
entitle them to some return on their investment. But wouldn't it be nice
|
|||
|
if the wheel was free to begin with?
|
|||
|
|
|||
|
If someone comes up with some interface that is truly new, they deserve
|
|||
|
some protection for a limited time. If their invention is really
|
|||
|
wonderful, they will get back far more than they spent. This is in fact
|
|||
|
the reasoning behind patents. However, patents have a life of seven years
|
|||
|
(I think), which in most markets is a limited time but in the computer
|
|||
|
world translates to eternity, since anything new is bound to be obsolete
|
|||
|
long before seven years are over.
|
|||
|
|
|||
|
>their investment? Mr. Adept denies the existence of license agreements when
|
|||
|
>he asserts that an inefficient company can tie up a good interface by tying
|
|||
|
>it to a bad program. He also denies the idea of a joint marketing venture
|
|||
|
>by two or more companies which combine their strongest products.
|
|||
|
|
|||
|
Mr. Adept does not deny the existence of these possibilities. Nor, in
|
|||
|
fact, does he deny the possiblity of the developer putting it's interface
|
|||
|
in the public domain. His complaint was about giving the developer the
|
|||
|
power to tie things up. Not every company has such enlightened attitudes.
|
|||
|
Some, like Adobe, choose to charge exorbitant license fees; PostScript
|
|||
|
could have been a unifying standard, but instead we are now seeing a
|
|||
|
rebellion against Adobe which will result in several standards confusing
|
|||
|
everyone. Others, like Lotus, choose not to allow anyone to use their
|
|||
|
interface, and sue everyone who tries. Others, like Apple, appropriate
|
|||
|
someone else's interface, and then take the same attitude as Lotus does.
|
|||
|
|
|||
|
>Mr. Adept wrote about the danger of protecting algorithms since they are
|
|||
|
>merely mathematical models. Should we consider DOS and BIOS in the same
|
|||
|
>category? Should these proprietary packages be freely circulated without
|
|||
|
>compensation? It might be an attractive utopian concept but not workable
|
|||
|
>within our present system.
|
|||
|
|
|||
|
Why is it not workable? DOS and BIOS are far from just algorithms. On the
|
|||
|
other hand, shell sort is a clever algorithm, and I'm certainly glad
|
|||
|
someone didn't try to patent it and charge license fees from every
|
|||
|
programmer who used it. Remember the scare when it seemed Unisys was going
|
|||
|
to enforce their perceived rights to LZW compression? Would it be good if
|
|||
|
Unisys had the right to outright prohibit a programmer from using LZW
|
|||
|
compression without prior written permission from them?
|
|||
|
|
|||
|
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++=
|
|||
|
|
|||
|
|
|||
|
Subject: Dark Adept's Response to posts
|
|||
|
From: Dark Adept <deleted@thenets.edu>
|
|||
|
Date: Tue, 22 Jan 91 23:57:25 CST
|
|||
|
|
|||
|
First, I would like to thank everyone who had a comment, criticism, or
|
|||
|
suggestion about my previous articles. I take all such comments to heart,
|
|||
|
and try to improve my thinking and writing processes with them.
|
|||
|
|
|||
|
Second, I feel some of the criticisms have been my fault. I will try to
|
|||
|
briefly clear these areas up:
|
|||
|
|
|||
|
1) When refering to IBM's "release" of their operating system, I was
|
|||
|
talking about BIOS, not DOS. DOS is, of course, the property of Microsoft
|
|||
|
and/or IBM depending on whether it is MS or PC. I apologize for this
|
|||
|
misunderstanding. BIOS is IBM's own product. I did not mean to
|
|||
|
misrepresent anyone.
|
|||
|
|
|||
|
2) My use of the masculine pronouns is intended to be generic. This usage
|
|||
|
comes from how I was taught English. I stand by it. I have yet to see an
|
|||
|
English grammar manual that states this is an incorrect usage. I try to
|
|||
|
write in standard formal English, and this is how I was taught.
|
|||
|
|
|||
|
3) "his [first] wife's maiden name" is actually a line from the Hacker's
|
|||
|
Anthem by the Cheshire Catalyst. It was meant as an inside joke. Still, I
|
|||
|
have not met a female system operator -- yet. I hold no malice toward any
|
|||
|
women in the computer field, and I apologize.
|
|||
|
|
|||
|
4) I thank David Daniel for representing the corporate voice re patents and
|
|||
|
copyrights. However, I never stated DOS and BIOS were algorithms and
|
|||
|
should be free. Yet the way they interface programs should be in the public
|
|||
|
domain (DoubleDos and 4DOS come to mind?). Also, certainly, proprietary
|
|||
|
source and object code should be protected. I was attempting to say the
|
|||
|
output generated (i.e., the interface) and the algorithm that creates it
|
|||
|
should not be protected. I do not know whether this changes his position
|
|||
|
or not, but I feel that my position should be clear.
|
|||
|
|
|||
|
Again, thank all of you for your comments and articles that have responded
|
|||
|
to mine. The more opinions all of us receive, the more all of us can
|
|||
|
learn. This was my goal, and it appears that I have succeeded.
|
|||
|
|
|||
|
The Dark Adept
|
|||
|
|
|||
|
********************************************************************
|
|||
|
>> END OF THIS FILE <<
|
|||
|
***************************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
From: Reprint from BMUG (Berkeley MacIntosh Users' Group)
|
|||
|
Subject: BMUG's ECPA Commentary (reprinted with permission from BMUG
|
|||
|
Date: January, 1991
|
|||
|
|
|||
|
********************************************************************
|
|||
|
*** CuD #3.04, File 3 of 4: The Politics of the ECPA of 1986 ***
|
|||
|
********************************************************************
|
|||
|
|
|||
|
The Politics of the Electronic Communications Privacy Act of 1986
|
|||
|
|
|||
|
Copyright (C) 1990, Bernard Aboba. All rights reserved.
|
|||
|
|
|||
|
The Electronic Communications Privacy Act (ECPA) of 1986 was a landmark
|
|||
|
piece of legislation which is likely to affect online services and hobbyist
|
|||
|
bulletin boards for many years to come. Since the ECPA is a complex and
|
|||
|
often arcane piece of legislation, it is very hard to understand without
|
|||
|
looking at the history of how it came to be. In understanding the
|
|||
|
politics of ECPA, this article relies heavily on the transcripts of the
|
|||
|
House Judiciary Committee Hearings on H.R. 3378, which eventually became
|
|||
|
the Electronic Communications Privacy Act.
|
|||
|
|
|||
|
During the hearings on ECPA in 1985-86 only one member of the online
|
|||
|
service industry, The Source (subsequently acquired by Compuserve)
|
|||
|
submitted an opinion. Though endorsing the bill, the assessment hinted
|
|||
|
at possible long term costs imposed by the lack of preemption of state
|
|||
|
standards. However, this one page assessment hardly made an impression on
|
|||
|
the hearings compared with the impressive lineup of spokesmen from the
|
|||
|
ACLU, cellular communications firms, Regional Bell Operating Companies
|
|||
|
(RBOC's), broadcasting groups, credit and banking firms, and computer and
|
|||
|
telecommunications industry associations, all lined up in support of the
|
|||
|
bill.
|
|||
|
|
|||
|
Only the U.S. Department of Justice, manufacturers of scanning equipment,
|
|||
|
and amateur radio associations expressed strong reservations about the
|
|||
|
bill. However, since the passage of ECPA, the long term costs of the
|
|||
|
legislation and its effects on commercial and hobbyist conferencing systems
|
|||
|
have become apparent. Ironically, none of these effects were anticipated
|
|||
|
at the hearings.
|
|||
|
|
|||
|
Outline of ECPA
|
|||
|
|
|||
|
Broadened Protection of Communications
|
|||
|
|
|||
|
The ECPA amended the Omnibus Crime Control and Safe Streets Act of 1968
|
|||
|
(which covered wire tapping of common carriers) to prohibit monitoring of
|
|||
|
all electronic communications systems not designed to be accessible by the
|
|||
|
public. This includes voice, data, and video on non-public systems, and
|
|||
|
applies to communications regardless of the mode of transmission.
|
|||
|
|
|||
|
Search and Seizure
|
|||
|
|
|||
|
To obtain access to communications such as electronic mail, the government
|
|||
|
is required to obtain a warrant on probable cause. Law enforcement must
|
|||
|
also obtain a court order based on reasonable suspicion before obtaining
|
|||
|
toll records of telephone calls.or gaining access to records of an
|
|||
|
electronic communications system which concern specific communications.
|
|||
|
|
|||
|
Criminal Penalties
|
|||
|
|
|||
|
Criminal penalties can result from unauthorized access to computers if
|
|||
|
messages are obtained or altered. Felony charges can be brought if the
|
|||
|
violation was commited maliciously or for commercial gain, in which case
|
|||
|
the act is punishable by up to one year imprisonment and a $250,000 fine.
|
|||
|
In other cases, a term of imprisonment of six months and a maximum fine of
|
|||
|
$5,000 is applicable.
|
|||
|
|
|||
|
Civil Penalties
|
|||
|
|
|||
|
Civil damages may be pursued for violation of the rights contained in the
|
|||
|
act.
|
|||
|
|
|||
|
Disclosure
|
|||
|
|
|||
|
Electronic communications systems operators may not disclose electronic
|
|||
|
messages without authorization except in special circumstances. The
|
|||
|
Politics of ECPA
|
|||
|
|
|||
|
The ECPA was supported by the cellular phone, telephone, packet switching,
|
|||
|
paging, and broadcasting industries; private firms owning large
|
|||
|
communications networks, miscellaneous computer and communications trade
|
|||
|
associations, the ACLU and Consumer's Union, and credit bureaus. Law
|
|||
|
enforcement agencies were supportive, but skeptical. The only vigorous
|
|||
|
opposition came from amateur radio associations, and manufacturers of
|
|||
|
scanning equipment which, while protesting loudly, saw few of their
|
|||
|
recommended modifications enacted into law.
|
|||
|
|
|||
|
Also playing a role were sponsoring legislators, such as Senator Patrick
|
|||
|
Leahy of Vermont, and Charles Mathias of Maryland, as well as
|
|||
|
Representatives Robert Kastenmeier and Carlos Moorhead. Senator Leahy, in
|
|||
|
his opening remarks at the hearings on the bill, set the stage for the
|
|||
|
legislation:
|
|||
|
|
|||
|
"At this moment phones are ringing, and when they are answered, the message
|
|||
|
that comes out is a stream of sounds denoting ones and zeros.... What is
|
|||
|
remarkable is the fact that none of these transmissions are protected from
|
|||
|
illegal wiretaps, because our primary law, passed back in 1968, failed to
|
|||
|
cover data communications, of which computer to computer transmission are a
|
|||
|
good example. When Congress enacted that law,Title III of the Omnibus
|
|||
|
Crime Control and Safe Streets Act of 1968, it had in mind a particular
|
|||
|
kind of communication - voice - and a particular way of transmitting that
|
|||
|
communication - via a common carrier analog telephone network. Congress
|
|||
|
chose to cover only the "aural acquisition" of the contents of a common
|
|||
|
carrier wire communication. The Supreme Court has interpreted that
|
|||
|
language to mean that to be covered by Title III, a communication must be
|
|||
|
capable of being overheard. The statue simply fails to cover the
|
|||
|
unauthorized interception of data transmissions." Senator Leahy also had
|
|||
|
more practical reasons for supporting the bill. The rapidly growing U.S.
|
|||
|
cellular communications industry had become alarmed by the ease with which
|
|||
|
cellular communications could be monitored. Television sets built during
|
|||
|
the period 1966-1982 were capable of picking up cellular conversations on
|
|||
|
UHF channels 80-83. This was possible because cellular communications used
|
|||
|
the same frequency modulation techniques utilized in transmitting
|
|||
|
television sound. In addition, scanning equipment which for several
|
|||
|
hundred dollars was capable of receiving cellular communications in the 800
|
|||
|
Mhz band. During 1985, several incidents threatened to make the
|
|||
|
vulnerability of cellular communications into front page news. For
|
|||
|
example, private conversations of state legislators in Austin were
|
|||
|
intercepted and made available in the public press, with embarrassing
|
|||
|
consequences.
|
|||
|
|
|||
|
This ease of reception threatened the viability of the cellular industry.
|
|||
|
In response, according to Richard Colgan of the Association of North
|
|||
|
American Radio Clubs, "cellular firms resorted to pervasive
|
|||
|
misrepresentation of the actual interception vulnerability of cellular. "
|
|||
|
In fairness to the cellular industry, cellular communications does provide
|
|||
|
certain inherent protections against interception. For example, since each
|
|||
|
half of the conversation is transmitted on different frequencies, usually
|
|||
|
it is only possible to listen in on one side of a conversation. In
|
|||
|
addition, while it is easy to pick up some conversation, it is difficult to
|
|||
|
pick up a particular conversation of interest. Also, the frequencies will
|
|||
|
shift during passage from one cell to another. However, given the
|
|||
|
relatively large cell size, frequencies are likely to be stable over the
|
|||
|
average life of a call. In his remarks, Senator Leahy stated that the
|
|||
|
ECPA was needed to help the cellular industry get off the ground, and that
|
|||
|
the American people and American business wanted the ECPA. A more
|
|||
|
emotional defense was made by John Stanton, Executive VP of McCaw
|
|||
|
Communications, who stated "The inhibition of the growth of cellular
|
|||
|
technology and paging technology, forced by the lack of privacy, is
|
|||
|
unfair."
|
|||
|
|
|||
|
Law enforcement interests and businesses were also in favor of the bill.
|
|||
|
In 1986, the nation was just becoming aware of the threat posed by computer
|
|||
|
crime, and the need for laws allowing prosecution of perpetrators. The
|
|||
|
ECPA was therefore viewed by elements of law enforcement and business as a
|
|||
|
vehicle for criminalizing the act of breaking into computers. Businesses
|
|||
|
such as GTE Telenet, EDS, and Chase Manhattan thus supported the ECPA as a
|
|||
|
computer crime bill. Telephone companies such as AT&T even attempted to
|
|||
|
tack on additional computer crime provisions covering breaking into to
|
|||
|
their switching equipment.
|
|||
|
|
|||
|
In retrospect, the preoccupation with computer crime distorted evaluations
|
|||
|
of the ECPA. Computer crime was more effectively addressed by state penal
|
|||
|
code revisions such as California Penal Code Section 502 - Computer Crime,
|
|||
|
and Section 499c - Trade Secrets. The purpose of ECPA was to insure
|
|||
|
privacy rather than to define the criminal uses of computers.
|
|||
|
|
|||
|
The cellular industry had no such illusions. Mr. Philip Quigley, CEO of
|
|||
|
pacTel Mobil Co. described the economic benefits of ECPA by noting that
|
|||
|
without legislation, "defending the right (to privacy) could take years of
|
|||
|
litigation." "Individuals can use scanning devices today... (it is our
|
|||
|
intent) to merely excise out... the capability that exists today to zone in
|
|||
|
on the channels and the frequencies that are associated with cellular
|
|||
|
telephony." Without the ECPA, the industry would have faced incorporation
|
|||
|
of expensive encryption technology into their systems. For example, John
|
|||
|
Stanton of McCaw testified that "Encryption devices make it difficult to
|
|||
|
roam from system to system," generated scratchy sound, and required 30%
|
|||
|
more investment for the base unit, and 100% for the phone. Mr. Colgan's
|
|||
|
estimated high grade commercial encryption as costing $40 for the
|
|||
|
encryption chip (quantity one), plus associated circuitry . In either
|
|||
|
case, the net cost for several million subscribers was estimated in the
|
|||
|
tens if not hundreds of millions of dollars.
|
|||
|
|
|||
|
Industry associations such as ADAPSO pointed out the trade benefits of the
|
|||
|
legislation, since Asia had not developed privacy protection, although
|
|||
|
Europe had done so. John Stanton of McCaw commented that if the U.S.
|
|||
|
passed the ECPA, then it would enjoy superior communications privacy to
|
|||
|
that available in Europe.
|
|||
|
|
|||
|
Representatives of the nation's amateur radio enthusiasts were among the
|
|||
|
staunchest opponents of the bill. Richard Colgan of the Association of
|
|||
|
North American Radio Clubs represented their position. "While we have no
|
|||
|
animosity towards cellular, we cannot sit idly by while they use their
|
|||
|
influence to make dubious changes in public policy, largely to benefit
|
|||
|
their bottom lines..." In response to the concerns of amateur radio
|
|||
|
enthusiasts, and scanner manufacturers, the interception standard was
|
|||
|
changed from "willful" to "intentional," so as to allow for "inadvertent"
|
|||
|
interceptions.
|
|||
|
|
|||
|
Manufacturers of scanning equipment were vigorously opposed to ECPA since
|
|||
|
the use of their devices was restricted by the act. Richard Brown of
|
|||
|
Regency Electronics, a manufacturer of radio band scanners, argued
|
|||
|
cellular radio licensees have never had any expectation of privacy, that
|
|||
|
cellular operators, not the public, should bear the burden of securing
|
|||
|
cellular communications, and that protecting specific radio frequencies was
|
|||
|
imprudent.
|
|||
|
|
|||
|
This last point deserves elaboration. Under ECPA, monitoring of cordless
|
|||
|
phone frequencies is not prohibited, although it is hard to argue that the
|
|||
|
average individual's "expectation of privacy" is any different for a
|
|||
|
cordless phone than it would be for a cellular phone. In fact, an
|
|||
|
educated individual might even expect less privacy for a cellular call,
|
|||
|
argued Richard Colgan, because the range of cellular communications is so
|
|||
|
much larger than for cordless phones, thus making interception easier.
|
|||
|
|
|||
|
Among the most careful analyst of the ECPA was the U.S. Department of
|
|||
|
Justice, as represented by James Knapp, deputy assistant attorney general
|
|||
|
of the criminal division. Knapp concurred with the Amateur Radio
|
|||
|
enthusiasts that cellular and cordless phone technology, as well as tone
|
|||
|
and voice pagers, were easily intercepted, and therefore could not presume
|
|||
|
an "expectation of privacy." Knapp also expressed skepticism about the
|
|||
|
wisdom of criminalizing hobbyist behavior. Knapp was however in favor of
|
|||
|
extending coverage to electronic mail. Finally, he argued for extension of
|
|||
|
the crimes for which wire tapping could be authorized, beyond those
|
|||
|
enumerated in Title III. This suggested modification to the act was
|
|||
|
subsequently incorporated.
|
|||
|
|
|||
|
In contrast to the detailed arguments submitted by the parties discussed
|
|||
|
above, the one page letter submitted by The Source had a minor impact at
|
|||
|
best, suggesting that the ECPA, by not preempting state statutes, could
|
|||
|
expose the online service industry to an entangling web of federal and
|
|||
|
state statutes.
|
|||
|
|
|||
|
Analysis of the Economic Effects of ECPA
|
|||
|
|
|||
|
The parts of ECPA which have ramifications for online services and hobbyist
|
|||
|
bulletin boards mostly have to do with access to stored messages. While
|
|||
|
access to services are often offered via a packet switching network, or
|
|||
|
could even be achieved via use of cellular modems or other radio
|
|||
|
transmissions, worries about the privacy of such access are not likely to
|
|||
|
be major concerns of customers.
|
|||
|
|
|||
|
An important aspect of ECPA is the presence of both criminal and civil
|
|||
|
penalties. This provides an important incentive for aggrieved parties to
|
|||
|
pursue litigation through contingency fee arrangements. The implications
|
|||
|
of this for the online service business are serious. For example, the fee
|
|||
|
for sending an EasyPlex message on Compuserve is on the order of a few
|
|||
|
dollars, depending on the time spent in composing the message. For that
|
|||
|
fee, Compuserve takes on the responsibility of not disclosing the message,
|
|||
|
which could conceivably be worth millions to the sender and intended
|
|||
|
recipient.
|
|||
|
|
|||
|
|
|||
|
Firms Submitting Opinions on H.R. 3378
|
|||
|
|
|||
|
|
|||
|
Phone Companies
|
|||
|
|
|||
|
Southwestern Bell
|
|||
|
AT&T
|
|||
|
Ameritech
|
|||
|
Pacific Telesis
|
|||
|
Bell South
|
|||
|
Northwestern Bell
|
|||
|
United States
|
|||
|
Telephone Assoc.
|
|||
|
|
|||
|
Radio
|
|||
|
|
|||
|
Association of North American Radio Clubs
|
|||
|
American Radio Relay League
|
|||
|
National Association of Business & Educational Radio
|
|||
|
|
|||
|
Cellular
|
|||
|
|
|||
|
PacTel Mobile
|
|||
|
McCaw Communications
|
|||
|
Motorola
|
|||
|
Centel
|
|||
|
|
|||
|
Hobbyists
|
|||
|
|
|||
|
|
|||
|
Communications
|
|||
|
|
|||
|
Packet Switching
|
|||
|
|
|||
|
GTE Telenet
|
|||
|
|
|||
|
Misc. Associations
|
|||
|
|
|||
|
Electronic Mail Association
|
|||
|
ADAPSO
|
|||
|
National Assoc. of Manufacturers
|
|||
|
Assoc. of American Railroads
|
|||
|
IEEE
|
|||
|
|
|||
|
Paging
|
|||
|
|
|||
|
Telocator Network
|
|||
|
|
|||
|
Computers
|
|||
|
|
|||
|
Tandy
|
|||
|
|
|||
|
Law Enforcement
|
|||
|
|
|||
|
U.S. Dept. of Justice
|
|||
|
|
|||
|
Online Services
|
|||
|
|
|||
|
The Source
|
|||
|
|
|||
|
Citizen's Groups
|
|||
|
|
|||
|
ACLU
|
|||
|
Consumer's Union
|
|||
|
|
|||
|
|
|||
|
Firms with Private Networks
|
|||
|
|
|||
|
Chase Manhattan
|
|||
|
EDS
|
|||
|
|
|||
|
Scanner Manufacturers
|
|||
|
|
|||
|
Dynascan
|
|||
|
Regency Electronics
|
|||
|
Uniden
|
|||
|
|
|||
|
Credit Bureaus
|
|||
|
|
|||
|
American Credit Services
|
|||
|
|
|||
|
Broadcasters
|
|||
|
|
|||
|
National Assoc. of Broadcasters
|
|||
|
Radio-TV News Directors Association
|
|||
|
Satellite TV Industry Association
|
|||
|
CBS
|
|||
|
|
|||
|
|
|||
|
Source: Hearings, Committee on the Judiciary, House of
|
|||
|
Representatives, H.R. 3378, ECPA, 99th Congress, No. 50, 1986.
|
|||
|
|
|||
|
Of course, this burden is not theirs alone. Operators of corporate
|
|||
|
communications systems (who were big supporters of ECPA) are also
|
|||
|
likely targets. Indeed, several ECPA suits against employers and
|
|||
|
municipalities have recently been filed. The potential for
|
|||
|
litigation also exists for hobbyist systems such as computer
|
|||
|
bulletin boards.
|
|||
|
|
|||
|
Government regulations fit into two categories: economic
|
|||
|
regulation, and social regulation. In the economic category are
|
|||
|
price controls on crude oil, and tarriffs. Equal opportunity
|
|||
|
legislation is a regulation of the social type. The cost of a
|
|||
|
social regulation can be broken down into two parts. One is the
|
|||
|
cost of complying with the regulation, either by modification of
|
|||
|
business practices, or payment of imposed penalties; another is
|
|||
|
the cost of resolving ambiguities in the legislation through
|
|||
|
establishment of case law. In the case of ECPA, reflection
|
|||
|
discloses that the establishment of precedent is likely to be the
|
|||
|
more expensive than compliance. For example, for a service to
|
|||
|
modify sysop access privileges, and to introduce encryption of
|
|||
|
private mail and passwords would probably entail an expenditure on
|
|||
|
the order of a few million dollars for software development and
|
|||
|
testing. In contrast, were only 0.01% of Compuserve's
|
|||
|
subscribers to file an ECPA lawsuit, given 500,000 subscribers, and
|
|||
|
average legal fees and penalties per case of $100,000, the bill
|
|||
|
would come to over $10 million.
|
|||
|
|
|||
|
Due to its concentration on cellular industry concerns, the ECPA
|
|||
|
concentrates more on insuring privacy for users than on limiting
|
|||
|
the responsibilities of providers. Due to differences between
|
|||
|
messages in transit and stored messages, cellular firms end up
|
|||
|
forcing the costs of privacy onto hobbyists and outsiders, while
|
|||
|
providers of online services are forced to bear these costs
|
|||
|
themselves. In view of the potentially horrendous litigation
|
|||
|
burdens, there is a strong incentive to limit the ability of
|
|||
|
system administrators to read or disclose private mail.
|
|||
|
|
|||
|
The key to complying with the act is the notion of "expectations of
|
|||
|
privacy." This notion governs both the legal aspects of ECPA, and
|
|||
|
determinants of end user satisfaction. Under the ECPA, privacy is
|
|||
|
only enforced for systems in which users were lead to "expect
|
|||
|
privacy." Thus a sysop has two alternatives: to explicitly address
|
|||
|
those expectations via an education campaign, or to play a game
|
|||
|
similar to the cellular industry, in denying that privacy is a
|
|||
|
significant issue. One of the concerns voiced by the cellular
|
|||
|
industry in backing ECPA was that their budding industry could ill
|
|||
|
afford the cost of solidifying the right to privacy via litigation
|
|||
|
or adoption of encryption technology. Yet that is precisely the
|
|||
|
course that the ECPA has forced on the online service industry.
|
|||
|
Nor were the concerns of a budding industry entirely genuine.
|
|||
|
Within the next two years, the revenues of cellular communication
|
|||
|
firms will exceed those of all the participants in the information
|
|||
|
services industry.
|
|||
|
|
|||
|
Bibliography
|
|||
|
|
|||
|
1. Electronic Communications Privacy Act of 1986, Public Law
|
|||
|
99-508, 99th Congress, 2nd session.
|
|||
|
|
|||
|
2. Hearings of the Committee on the Judiciary, House of
|
|||
|
Representatives, H.R. 3378, Electronic Communications Privacy Act,
|
|||
|
99th Congress, No. 50, 1986.
|
|||
|
|
|||
|
3. California Penal Code, Section 502, Computer Crime, 502.7
|
|||
|
Obtaining telephone or telegraph services by fraud, 499c, trade
|
|||
|
secrets.
|
|||
|
|
|||
|
4. Wallace, Jonathan, and Lance Rose, SYSLAW, L.L.M Press, New
|
|||
|
York City, 1990
|
|||
|
|
|||
|
********************************************************************
|
|||
|
>> END OF THIS FILE <<
|
|||
|
***************************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
From: Various
|
|||
|
Subject: The CU in the News
|
|||
|
Date: January, 1991
|
|||
|
|
|||
|
********************************************************************
|
|||
|
*** CuD #3.04, File 4 of 4: The CU in the News ***
|
|||
|
********************************************************************
|
|||
|
|
|||
|
Subject: Lotus Drops Suit
|
|||
|
From: Anonymous
|
|||
|
Date: Sun, 24 Jan 91 01:21:00 EST
|
|||
|
|
|||
|
From: New York Times, January 24, 1991, p. C3 (By Lawrence M. Fisher)
|
|||
|
|
|||
|
SAN FRANCISCO, Jan. 23 - The Lotus Development Corporation and Equifax Inc.
|
|||
|
said today that they had canceled plans to sell a database of names,
|
|||
|
addresses and marketing information on 120 million United States consumers.
|
|||
|
|
|||
|
The companies said their decision came after they had received 30,000 calls
|
|||
|
and letters from individuals wishing to have their names and personal
|
|||
|
information deleted from the database. The companies said they believed the
|
|||
|
public misunderstood the product and that the costs of addressing privacy
|
|||
|
concerns had made Marketplace:Households no longer viable.
|
|||
|
|
|||
|
Lotus will also discontinue Market-lace:Business, a similar product with
|
|||
|
information on seven million United States businesses, which began shipment
|
|||
|
in October. Mr. Manzi said the business product was not viable without the
|
|||
|
revenues from the consumer version."
|
|||
|
|
|||
|
+++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
From: cdp!mrotenberg@labrea.stanford.edu
|
|||
|
Subject: CPSR FOIA Suits Seeks Gov't Computer Policy
|
|||
|
Date: Sun, 13 Jan 91 19:20:35 PST
|
|||
|
|
|||
|
PRESS RELEASE
|
|||
|
Release: Friday, 1/4/91
|
|||
|
|
|||
|
CPSR Washington Office, 1025 Connecticut Ave., NW, Washington
|
|||
|
DC 20036
|
|||
|
|
|||
|
For more information:
|
|||
|
|
|||
|
David Sobel
|
|||
|
Marc Rotenberg 202/775-1588
|
|||
|
|
|||
|
LAWSUIT SEEKS BUSH DIRECTIVE ON COMPUTER SECURITY
|
|||
|
|
|||
|
WASHINGTON - Computer Professionals for Social Responsibility ("CPSR") filed
|
|||
|
a lawsuit in Federal District Court today to obtain a classified government
|
|||
|
directive on computer security.
|
|||
|
|
|||
|
The document at issue was signed by President Bush on July 5, 1990. It is
|
|||
|
intended to replace a controversial security policy signed by President
|
|||
|
Reagan in 1984. The Reagan policy, designated "NSDD 145," put the
|
|||
|
super-secret National Security Agency ("NSA") in charge of computer
|
|||
|
security, raising concerns about government secrecy. Congress sought to
|
|||
|
limit NSA's role through passage of the Computer Security Act of 1987, which
|
|||
|
transferred responsibility for federal computer security to the National
|
|||
|
Institute for Standards and Technology, a civilian agency.
|
|||
|
|
|||
|
The administration contends that the revised directive complies with the
|
|||
|
Computer Security Act, but so far has released to the public only an
|
|||
|
unclassified summary of the new directive. According to Marc Rotenberg,
|
|||
|
Director of CPSR's Washington Office, "Computer security policy should not
|
|||
|
be made behind closed doors or through the issuance of classified
|
|||
|
directives. At a time when computer technology touches every aspect of our
|
|||
|
lives, it is essential that the public be fully informed about our
|
|||
|
government's policy."
|
|||
|
|
|||
|
CPSR first requested a copy of the revised directive from the Defense
|
|||
|
Department under the Freedom of Information Act last August. The
|
|||
|
organization also sought a copy from the National Security Council the
|
|||
|
following month. To date, neither agency has responded to CPSR's requests.
|
|||
|
|
|||
|
The Freedom of Information Act provides a legal right for individuals to
|
|||
|
obtain records held by government agencies. According to CPSR Legal Counsel
|
|||
|
David Sobel, "Agencies are required to respond to requests within ten
|
|||
|
working days. When agencies fail to respond within a reasonable period of
|
|||
|
time, requesters often begin legal proceedings to obtain the information."
|
|||
|
|
|||
|
CPSR is a national membership organization of computer scientists. Its
|
|||
|
membership includes a Nobel Laureate and four recipients of the Turing
|
|||
|
Award, the highest honor in computer science. CPSR has prepared reports and
|
|||
|
presented testimony on computer technology issues, including NSDD 145, at
|
|||
|
the request of Congressional committees.
|
|||
|
|
|||
|
The case is CPSR v. National Security Council, et al., Civil Action No.
|
|||
|
91-_____, U.S. District Court for the District of Columbia, January 4, 1991.
|
|||
|
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
From: well!mercury@APPLE.COM(Michael Edward Marotta)
|
|||
|
Subject: Thoughts on the Bill of Rights
|
|||
|
Date: Tue, 22 Jan 91 21:52:34 pst
|
|||
|
|
|||
|
GRID News. vol 2 nu 2. January 23, 1991.
|
|||
|
World GRID Association, P. O. Box 15061, Lansing, MI 48901 USA
|
|||
|
--------------------------------------------------------------------
|
|||
|
"The Bill of Rights" by Michael E. Marotta. (54 lines)
|
|||
|
|
|||
|
When agents of the US Secret Service raided publishers in 1990 while chasing
|
|||
|
The Legion of Doom, they demonstrated that the paradigms of cyberspace are
|
|||
|
not well understood. Therefore, identifiers must be used to show that this
|
|||
|
activity is protected by the Bill of Rights.
|
|||
|
|
|||
|
Copyright notices are one identifier. A copyright is earned whenever an
|
|||
|
idea achieves physical expression or "realization". Two copies of the
|
|||
|
publication (or two photographs of a work of art) are send to the Library of
|
|||
|
Congress along with a registration fee. Books, sound recordings, and films
|
|||
|
may be copyrighted. A copyright can be given to the mass production of a
|
|||
|
work in the public domain, such as the Bible. You could write out by hand
|
|||
|
an original poem, send two xeroxes to the Library of Congress (along with
|
|||
|
the registration fee) and earn a copyright on your work.
|
|||
|
|
|||
|
When the United States joined the Berne Convention in December of 1988
|
|||
|
(effective March 1, 1989), life became easier --- perhaps too easy. By
|
|||
|
default, every realization is automatically copyrighted to the creator,
|
|||
|
whether or not copies are sent to the Library of Congress. A copyright
|
|||
|
notice on the login screen announces that the BBS contains works of
|
|||
|
non-fiction, fiction, art or other production that are protected by the
|
|||
|
First Amendment.
|
|||
|
|
|||
|
The First Amendment also promises that the People have the right to
|
|||
|
PEACEABLY ASSEMBLE to seek redress of grievances against the government. A
|
|||
|
BBS is an assembly and can host assemblies. The Supreme Court has often and
|
|||
|
consistently shown that this right to peaceably assemble is also the right
|
|||
|
to association.
|
|||
|
|
|||
|
Most BBSes support message bases. Discussions on religion are specially
|
|||
|
protected by the First Amendment.
|
|||
|
|
|||
|
The Bill of Rights contains two purposely broad articles, the Ninth and
|
|||
|
Tenth. The Ninth Amendment says that there are more rights than the ones
|
|||
|
listed in the Bill of Rights. The Tenth Amendment limits the federal
|
|||
|
government to its enumerated powers and gives all other powers to the States
|
|||
|
(except where prohibited) or to the People (apparently without special
|
|||
|
reservation or stipulation). For instance, without stretching the meaning
|
|||
|
of "religion" or requiring that we photograph blackboards, it is strongly
|
|||
|
argued that there is a Right to Scientific Inquiry. This strongly
|
|||
|
assertable right protects experiments with encryption algorithms.
|
|||
|
|
|||
|
There may be a Right to Travel. This would extend to the lawful use of
|
|||
|
communication systems to "visit" a computer, whether or not you actually
|
|||
|
"enter" the computer. (Internet syntax tolerates users who chat though not
|
|||
|
logged in.)
|
|||
|
|
|||
|
To the extent that a computer is a weapon, its ownership is protected under
|
|||
|
the Second Amendment. Indeed, when Saddam Hussein's storm troopers rolled
|
|||
|
into Kuwait, "Hack Iraq" messages appeared on some systems.
|
|||
|
|
|||
|
The Bill of Rights is your Best Friend. Sleep with it.
|
|||
|
|
|||
|
********************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
**END OF CuD #3.04**
|
|||
|
********************************************************************
|
|||
|
|
|||
|
|
|||
|
|