873 lines
42 KiB
Plaintext
873 lines
42 KiB
Plaintext
|
|
|||
|
|
|||
|
Computer underground Digest Sun Mar 7 1993 Volume 5 : Issue 18
|
|||
|
ISSN 1004-042X
|
|||
|
|
|||
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|||
|
Archivist: Brendan Kehoe
|
|||
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|||
|
Ralph Sims / Jyrki Kuoppala
|
|||
|
Ian Dickinson
|
|||
|
Copy Editor: Etaion Shrdlu, Seniur
|
|||
|
|
|||
|
CONTENTS, #5.18 (Mar 7 1993)
|
|||
|
File 1--PKZIP Bankruptcy Rumor is a *HOAX*
|
|||
|
File 2--Hackers in the News (Orange County Register Reprint)
|
|||
|
File 3--GPO ACCESS - WINDO UPDATE
|
|||
|
File 4--London Times Educational Supplement Article
|
|||
|
File 5--FWD: The White House Communication Project
|
|||
|
|
|||
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|||
|
available at no cost from tk0jut2@mvs.cso.niu.edu. The editors may be
|
|||
|
contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at:
|
|||
|
Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115.
|
|||
|
|
|||
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|||
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|||
|
LAWSIG, and DL0 and DL12 of TELECOM; on GEnie in the PF*NPC RT
|
|||
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|||
|
the PC Telecom forum under "computing newsletters;"
|
|||
|
on the PC-EXEC BBS at (414) 789-4210;
|
|||
|
in Europe from the ComNet in Luxembourg BBS (++352) 466893;
|
|||
|
|
|||
|
ANONYMOUS FTP SITES:
|
|||
|
UNITED STATES: ftp.eff.org (192.88.144.4) in /pub/cud
|
|||
|
red.css.itd.umich.edu (141.211.182.91) in /cud
|
|||
|
halcyon.com( 192.135.191.2) in /pub/mirror/cud
|
|||
|
AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
|
|||
|
EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
|
|||
|
ftp.warwick.ac.uk in pub/cud (United Kingdom)
|
|||
|
|
|||
|
Back issues also may be obtained from the mail server at
|
|||
|
mailserv@batpad.lgb.ca.us.
|
|||
|
|
|||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|||
|
information among computerists and to the presentation and debate of
|
|||
|
diverse views. CuD material may be reprinted for non-profit as long
|
|||
|
as the source is cited. Some authors do copyright their material, and
|
|||
|
they should be contacted for reprint permission. It is assumed that
|
|||
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|||
|
specified. Readers are encouraged to submit reasoned articles
|
|||
|
relating to computer culture and communication. Articles are
|
|||
|
preferred to short responses. Please avoid quoting previous posts
|
|||
|
unless absolutely necessary.
|
|||
|
|
|||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|||
|
the views of the moderators. Digest contributors assume all
|
|||
|
responsibility for ensuring that articles submitted do not
|
|||
|
violate copyright protections.
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
Date: 03 Mar 1993 16:22:19
|
|||
|
From: Moderators <tk0jut2@mvs.cso.niu.edu>
|
|||
|
Subject: File 1--PKZIP Bankruptcy Rumor is a *HOAX*
|
|||
|
|
|||
|
A recent "press release" indicated that PKWARE, producers of PKZIP and
|
|||
|
other popular software has filed for bankruptcy under Chapter 11.
|
|||
|
|
|||
|
THE PRESS RELEASE IS A HOAX! PKWARE's Mike Stanton indicated that the
|
|||
|
PKWARE is in sound financial shape and that there is no basis
|
|||
|
whatsoever to the release. "It's probably somebody's idea of an early
|
|||
|
April Fool's joke," said Stanton.
|
|||
|
|
|||
|
The release contained a number of factual errors that prompted us call
|
|||
|
PKWARE, and they confirmed what we suspected.
|
|||
|
|
|||
|
The original press release read:
|
|||
|
|
|||
|
FYI
|
|||
|
FOR IMMEDIATE RELEASE
|
|||
|
FRIDAY, FEBRUARY 26, 1993 5:00PM CST
|
|||
|
===============================================================
|
|||
|
|
|||
|
PKware Inc., citing overwhelming advertising, administrative and
|
|||
|
development expenses with the recent problem-plagued release of
|
|||
|
their new PKZIP product, filed for chapter 11 bankruptcy today in
|
|||
|
the Milwaukie County District Court.
|
|||
|
|
|||
|
"PKWARE will continue to operate normally, and will provide, as
|
|||
|
always, the high-quality data compression products and services
|
|||
|
which have made us the leader in the data compression market,"
|
|||
|
Mark Gresbach, press-relations manager of PKWARE, said.
|
|||
|
|
|||
|
In business since 1987, PKWARE Inc. produces high-performance
|
|||
|
data compression software, which makes computer program and data
|
|||
|
files smaller, for faster transmission over telephone lines or to
|
|||
|
take up less disk space. Fortune 500 companies such as Borland
|
|||
|
Inc., of Scotts Valley, CA and government agencies such as the US
|
|||
|
Air Force are major customers of PKWARE.
|
|||
|
|
|||
|
Any questions or concerns may be directed to PKWARE at any of the
|
|||
|
following telephone numbers:
|
|||
|
|
|||
|
Phone (414) 354-8699
|
|||
|
FAX (414) 354-8599
|
|||
|
BBS (414) 356-8670.
|
|||
|
+++
|
|||
|
|
|||
|
The errors include:
|
|||
|
|
|||
|
1) Inaccurate phone numbers
|
|||
|
2) A non-existent spokesperson position at PKWARE
|
|||
|
3) An improper court of jurisdiction: There is no "Milwaukee County
|
|||
|
*District* Court; Chapter 11 is filed under federal statutes, not
|
|||
|
"County"/State statutes
|
|||
|
4) Unusual wording
|
|||
|
|
|||
|
PKWARE's latest release of PKZip (2.04g) has been released and has
|
|||
|
been so well received that the Katz folk are barely able to keep up
|
|||
|
with the orders. It is faster, tighter, and provides more options than
|
|||
|
earlier releases.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: 04 Mar 1993 11:29:00 -0800
|
|||
|
From: lynn.dimick@PCB.BATPAD.LGB.CA.US(Lynn Dimick)
|
|||
|
Subject: File 2--Hackers in the News (Orange County Register Reprint)
|
|||
|
|
|||
|
I have received permission from Catherine A, Boesche of the Orange
|
|||
|
County register to reprint this story ONE TIME. They would like to
|
|||
|
receive the following credit:
|
|||
|
|
|||
|
Reprinted with permission of The Orange County Register, copyright 1993.
|
|||
|
|
|||
|
This originally appeared on February 17, 1993
|
|||
|
|
|||
|
Jeffrey Cushing knew his teenage son was a "computer freak,"
|
|||
|
spending hours hunched over a bedroom keyboard playing games and
|
|||
|
tapping out messages to friends.
|
|||
|
|
|||
|
It seemed like wholesome, hightech fun -- until Cushing was sued
|
|||
|
last April by a Garden Grove telephone company that accused his son of
|
|||
|
hacking into the firms' long distance lines.
|
|||
|
|
|||
|
The tab: $80,000
|
|||
|
|
|||
|
"I was in shock," said Cushing, 51, an advertising executive from
|
|||
|
Huntington Beach. "all of a sudden this guy knocks on the door at 9
|
|||
|
p.m. and serves me with this humungous suit."
|
|||
|
|
|||
|
The war against hackers who steal long-distance telephone time
|
|||
|
has left a trail of slack-jawed parents throughout the state. Hit with
|
|||
|
lawsuits throughout the state. Hit with lawsuits, search warrants and
|
|||
|
demands for damages many parents are gulping hard and paying the toll
|
|||
|
for telephone fraud.
|
|||
|
|
|||
|
Although no record is kept, some industry analysts estimate that
|
|||
|
telephone fraud drains as much as $5 billion a year from companies
|
|||
|
nationwide.
|
|||
|
|
|||
|
"Fraud on the (telephone) network is still one of the most
|
|||
|
devastating things to long-distance companies, especially the smaller
|
|||
|
ones," said Jim smith, vice president of the 34-member California
|
|||
|
Association of Long Distance Telephone Companies.
|
|||
|
|
|||
|
The culprits often are juveniles, whose parents know little about
|
|||
|
computers and less about what their children are doing with them.
|
|||
|
|
|||
|
At the forefront in pursuing the dial-tone desperadoes is Garden
|
|||
|
Grove's Thrifty Tel Inc. -- which in 1990 became the first telephone
|
|||
|
company to impose a tariff on hackers.
|
|||
|
|
|||
|
The idea was copied by several other small phone companies in
|
|||
|
California, although Thrifty's tariff remains the highest at $2,880
|
|||
|
per day, per line.
|
|||
|
|
|||
|
As part of every settlement, Thrifty also confiscates the
|
|||
|
offending computer.
|
|||
|
|
|||
|
"This is designed to spank 'em hard. It can (financially) wipe
|
|||
|
out a family," said Dale L. Herring, Thrifty's director of security.
|
|||
|
"I sympathize, to some extent, but why should our company absorb the
|
|||
|
loss? Giving their kids a computer and a modem is like giving them a
|
|||
|
loaded gun."
|
|||
|
|
|||
|
Thrifty estimates its hacker losses at $22,000 a month.
|
|||
|
|
|||
|
Over the past three years the company has recovered nearly $1
|
|||
|
million and has nabbed 125 alleged hackers -- the vast majority of
|
|||
|
them juveniles. About 24 cases were prosecuted, with nearly all the
|
|||
|
defendants pleading guilty.
|
|||
|
|
|||
|
Early the month, Thrifty said, it busted, a 10-member ring of
|
|||
|
teenage hackers stretching from La Habra to Mission Viejo.
|
|||
|
|
|||
|
Criminal charges are pending against one of the suspects, a 19
|
|||
|
year-old Irvine man who allegedly called Thrifty's computer system
|
|||
|
6,435 times in 24 days. More than 1,000 calls came on Christmas.
|
|||
|
|
|||
|
The bill from Thrifty: $75,000.
|
|||
|
|
|||
|
The teen-ager allegedly used a simple scam employed by dozens of
|
|||
|
hackers to break into long-distance carriers:
|
|||
|
|
|||
|
Using a modem and a home computer programed for hacking the thief
|
|||
|
telephones the company's switching system. From there, the hacker's
|
|||
|
computer generates ran-dom digits until it hits the access codes
|
|||
|
--similar to calling-card numbers - - given to customers.
|
|||
|
|
|||
|
Those special codes are then used by the hacker to make
|
|||
|
long-distance calls that will be billed to unsuspecting customers.
|
|||
|
Many times, egotistical hackers post the codes on computer bulletin
|
|||
|
boards for others to use, much like a victorious matador throwing a
|
|||
|
rose to a pretty lady.
|
|||
|
|
|||
|
It can take several hours -- and several hundred calls to the
|
|||
|
phone company -- to identify a handful of codes. But the hackers
|
|||
|
simply set their computers to run night and day, calling three to four
|
|||
|
times a minute.
|
|||
|
|
|||
|
For the novice, hacking programs with names such as "Code Thief
|
|||
|
Deluxe" are widely available and can be downloaded without charge from
|
|||
|
computer bulletin boards.
|
|||
|
|
|||
|
"It's becoming a subculture. Just as kids were sucked into
|
|||
|
%Dungeons and Dragons,' they're being sucked into hacking," said
|
|||
|
Thrifty's Herring.
|
|||
|
|
|||
|
Often teen-age hackers are highly intelligent loners, addicted to
|
|||
|
the worldwide computer bulletin boards that allow them to communicate
|
|||
|
with others of their ilk.
|
|||
|
|
|||
|
"But they run up $300 to $400 in monthly phone bills, their
|
|||
|
parents go ballistic, so they turn to hacking," Herring said.
|
|||
|
|
|||
|
Unknown to the young hackers, some calls can be traced. Digging
|
|||
|
through stacks of computer printouts. Herring and other experts at
|
|||
|
Thrifty have followed the electronic trail over the past three years
|
|||
|
to:
|
|||
|
|
|||
|
* An Escondido boy whose parents were ordered by an Orange Count
|
|||
|
judge recently to pay Thrifty $33,000 in damages.
|
|||
|
|
|||
|
* A Foothill High School student in Santa Ana who was blamed for
|
|||
|
more than $250,000 in losses to Thrifty and two other long-distance
|
|||
|
companies in 1991. The boy pleaded guilty to telephone fraud.
|
|||
|
|
|||
|
* A six-member ring of San Diego high school students who raided
|
|||
|
system in March. Their families are paying more than $100,000 in
|
|||
|
damages.
|
|||
|
|
|||
|
Herring said the response from parents is always the same.
|
|||
|
|
|||
|
"Their first reaction is they want to kill their kids. Then, 24
|
|||
|
hours later, they want to kill us," Herring said.
|
|||
|
|
|||
|
Last year, a 63-year-old father from San Diego responded to
|
|||
|
Thrifty's demands for $16,000 by filing a harassment suit. The man
|
|||
|
contended that he suffered from a nervous condition and had warned by
|
|||
|
his doctor to avoid emotional shock.
|
|||
|
|
|||
|
And what could be more shocking then being hit with Thrifty's
|
|||
|
$2,880-a-day tariff, approved by the Public Utilities Commission in
|
|||
|
1990?
|
|||
|
|
|||
|
The tariff is meant to recover the costs of investigation hacker
|
|||
|
paying attorneys and losing customers who've been victimized.
|
|||
|
|
|||
|
While the fee has been upheld in court, some parents complain th
|
|||
|
it is unfair and inflated. The actual cost of the pirated phone call
|
|||
|
amounts to only a small part of the huge damages sought by Thrifty.
|
|||
|
|
|||
|
Part of Thrifty's aggression in civil court comes from its growiin
|
|||
|
inability to get the hackers into criminal court.
|
|||
|
|
|||
|
Thrifty has had a tough time persuading law authorities to spend
|
|||
|
their limited resources on telephone hacking.
|
|||
|
|
|||
|
Garden Grove police recently notified Thrifty that the department
|
|||
|
will no longer investigate hacking calls that do not originate in th
|
|||
|
city. Since then, Herring said, the company keeps getting passed fro
|
|||
|
one police agency to another, each claiming not to have jurisdiction
|
|||
|
|
|||
|
"I have to fight tooth and nail to get them interested," said
|
|||
|
Herring, who last month persuaded the Orange County District Attorney
|
|||
|
Office to prosecute at least one alleged member of the recently bus
|
|||
|
Orange County hacking ring.
|
|||
|
|
|||
|
Garden Grove Lt. Bill Dalton said his department couldn't keep u
|
|||
|
with the expense of investigating Thrifty's hacker problem. Dalton a
|
|||
|
that Thrifty could make its telephone system more secure by putting
|
|||
|
digits in the access codes, making them harder to discover.
|
|||
|
|
|||
|
That strategy literally saved Com-Systems of Westlake Village, w
|
|||
|
was losing $250,000 a month to hackers before it overhauled its security
|
|||
|
system in 1990. The move cost $1 million.
|
|||
|
|
|||
|
"Now we don't lose $250,000 in a whole year," said senior
|
|||
|
investigator John Elerick. "We were getting killed."
|
|||
|
|
|||
|
About 15 of the small long-distance carriers in California have
|
|||
|
reconfigured their access codes. But Thrifty has resisted, because t
|
|||
|
change would inconvenience customers by making them wait a few seconds
|
|||
|
more for their calls to go through, Herring said.
|
|||
|
|
|||
|
While Thrifty wrestles with its security dilemma, Huntington Be
|
|||
|
dad Cushing found and easy way to protect himself from ever again be
|
|||
|
sued for hacking: He disconnected the phone line in his son's bedroom.
|
|||
|
|
|||
|
"Now, he can only games, do homework, and that's about it."
|
|||
|
|
|||
|
++++++End of article++++++
|
|||
|
|
|||
|
* RM 1.0 B0008 * lynn.dimick@pcb.batpad.lgb.ca.us (Lynn Dimick)
|
|||
|
|
|||
|
////// This article originated at The Batchelor Pad PCBoard BBS ///////
|
|||
|
/ Long Beach, CA ///// 1200-14,400 V.32bis+HST ///// +1 310 494 8084 //
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Wed, 3 Mar 1993 14:26:58 EDT
|
|||
|
From: LOVE@TEMPLEVM.BITNET
|
|||
|
Subject: File 3--GPO ACCESS - WINDO UPDATE
|
|||
|
|
|||
|
Taxpayer Assets Project
|
|||
|
Information Policy Note
|
|||
|
February 28, 1993
|
|||
|
|
|||
|
UPDATE ON WINDO/GATEWAY LEGISLATION
|
|||
|
|
|||
|
Note: the WINDO/GATEWAY bills from last Congress (HR 2772;
|
|||
|
S. 2813) would have provided one-stop-shopping online access
|
|||
|
to federal databases and information systems through the
|
|||
|
Government Printing Office (GPO), priced at the incremental
|
|||
|
cost of dissemination for use in homes and offices, and free
|
|||
|
to 1,400 federal depository libraries).
|
|||
|
|
|||
|
Both the House and Senate are soon expected to introduce legislation
|
|||
|
that would replace the GPO WINDO/GATEWAY bills that were considered in
|
|||
|
the last Congress. According to Congressional staff members, the bill
|
|||
|
will be called "GPO Access." The new name (which may change again)
|
|||
|
was only one of many substantive and symbolic changes to the
|
|||
|
legislation.
|
|||
|
|
|||
|
Since the bill is still undergoing revisions, may be possible (in the
|
|||
|
next day or so) to provide comments to members of Congress before the
|
|||
|
legislation is introduced.
|
|||
|
|
|||
|
The most important changes to the legislation concern the scope and
|
|||
|
ambition of the program. While we had expected Congressional
|
|||
|
democrats to ask for an even broader public access bill than were
|
|||
|
represented by the WINDO (hr 2772) and Gateway (S. 2813) bills, the
|
|||
|
opposite has happened. Despite the fact that the legislation is no
|
|||
|
longer facing the threat of a Bush veto or an end of session
|
|||
|
filibuster (which killed the bills last year), key supporters have
|
|||
|
decided to opt for a decidedly scaled down bill, based upon last
|
|||
|
year's HR 5983, which was largely written by the House republican
|
|||
|
minority (with considerable input from the commercial data vendors,
|
|||
|
through the Information Industry Association (IIA)).
|
|||
|
|
|||
|
The politics of the bill are complex and surprising. The decision to
|
|||
|
go with the scaled down version of the bill was cemented early this
|
|||
|
year when representatives of the Washington Office of the American
|
|||
|
Library Association (including ALA lobbyist Tom Sussman) meet with
|
|||
|
Senator Ford and Representative Rose's staff to express their support
|
|||
|
for a strategy based upon last year's HR 5983, the republican
|
|||
|
minority's version of the bill that passed the House (but died in the
|
|||
|
Senate) at the end of last year's session. ALA's actions, which were
|
|||
|
taken without consultation with other citizen groups supporting the
|
|||
|
WINDO/GATEWAY legislation, immediately set a low standard for the
|
|||
|
scope of this year's bill.
|
|||
|
|
|||
|
We were totally surprised by ALA's actions, as were many other groups,
|
|||
|
since ALA had been a vigorous and effective proponent of the original
|
|||
|
WINDO/GATEWAY bills. ALA representatives are privately telling people
|
|||
|
that while they still hope for broader access legislation, they are
|
|||
|
backing the "compromise bill," which was publicly backed (but
|
|||
|
privately opposed) last year by IIA, as necessary, to avoid a more
|
|||
|
lengthy fight over the legislation. If the negotiations with the
|
|||
|
House and Senate republicans hold up, the new bill will be backed by
|
|||
|
ranking Republicans on the Senate Rules and House Administration
|
|||
|
Committees, and passed by Congress on fast track consent calendars.
|
|||
|
|
|||
|
We only obtained a draft of the legislation last week, and it is still
|
|||
|
a "work in progress." All changes must be approved by key Republican
|
|||
|
members of Senate Rules and House Administration.
|
|||
|
|
|||
|
Gone from the WINDO/GATEWAY versions of the bill were any funding (S.
|
|||
|
2813 would have provided $13 million over two years) to implement the
|
|||
|
legislation, and any findings which set out the Congressional intent
|
|||
|
regarding the need to provide citizens with broad access to most
|
|||
|
federal information systems. Also missing are any references to
|
|||
|
making the online system available through the Internet or the NREN.
|
|||
|
|
|||
|
WHAT THE GPO ACCESS BILL WILL DO (subject to further changes)
|
|||
|
|
|||
|
1. Require the Government Printing Office (GPO) to provide
|
|||
|
public online access to:
|
|||
|
|
|||
|
- the Federal Register
|
|||
|
- the Congressional Record
|
|||
|
- an electronic directory of Federal public information
|
|||
|
stored electronically,
|
|||
|
- other appropriate publications distributed by the
|
|||
|
Superintendent of Documents, and
|
|||
|
- information under the control of other federal
|
|||
|
departments or agencies, when requested by the
|
|||
|
department or agency.
|
|||
|
|
|||
|
2. Most users will pay user fees equal to the "incremental cost of
|
|||
|
dissemination of the information." This is a very important
|
|||
|
feature that was included in the WINDO/GATEWAY legislation. At
|
|||
|
present many federal agencies, including the National Technical
|
|||
|
Information Services (NTIS), make profits on electronic
|
|||
|
information products and services. Given the current federal
|
|||
|
government fiscal crisis, this strong limit on online prices is
|
|||
|
very welcome.
|
|||
|
|
|||
|
3. The 1,400 member federal Depository Library Program will have
|
|||
|
free access to the system, just as they presently have free
|
|||
|
access to thousands of federal publications in paper and
|
|||
|
microfiche formats. Issues to be resolved later are who will pay
|
|||
|
for Depository Library Program telecommunications costs, and
|
|||
|
whether or not GPO will use the online system to replace
|
|||
|
information products now provided in paper or microfiche formats.
|
|||
|
|
|||
|
|
|||
|
WHAT THE GPO ACCESS BILL DOESN'T DO
|
|||
|
|
|||
|
- Provide any start-up or operational funding
|
|||
|
|
|||
|
- Require GPO to provide online access through the Internet
|
|||
|
|
|||
|
- The Gateway/WINDO bills would have given GPO broad authority to
|
|||
|
publish federal information online, but the new bill would
|
|||
|
restrict such authority to documents published by the
|
|||
|
Superintendent of Documents (A small subset of federal
|
|||
|
information stored electronically), or situations where the
|
|||
|
agency itself asked GPO to disseminate information stored in
|
|||
|
electronic formats. This change gives agencies more discretion
|
|||
|
in deciding whether or not to allow GPO to provide online access
|
|||
|
to their databases, including those cases where agencies want to
|
|||
|
maintain control over databases for financial reasons (to make
|
|||
|
profits).
|
|||
|
|
|||
|
- Language that would have explicitly allowed GPO to reimburse
|
|||
|
agencies for their costs in providing public access was
|
|||
|
eliminated in the new bill. This is a potentially important
|
|||
|
issue, since many federal agencies will not work with GPO to
|
|||
|
provide public access to their own information systems, unless
|
|||
|
they are reimbursed for costs that they incur.
|
|||
|
|
|||
|
- S. 2813 and HR 2772 would have required GPO to publish an annual
|
|||
|
report on the operation of the Gateway/WINDO and accept and
|
|||
|
consider *annual* comments from users on a wide range of issues.
|
|||
|
The new bill only makes a general requirement that GPO "consult"
|
|||
|
with users and data vendors. The annual notice requirement that
|
|||
|
was eliminated was designed to give citizens more say in how the
|
|||
|
service evolves, by creating a dynamic public record of citizen
|
|||
|
views on topics such as the product line, prices, standards and
|
|||
|
the quality of the service. Given the poor record of many
|
|||
|
federal agencies in dealing with rapidly changing technologies
|
|||
|
and addressing user concerns, this is an important omission.
|
|||
|
|
|||
|
- The WINDO/GATEWAY bills would have required GPO to address
|
|||
|
standards issues, in order to simplify public access. The new
|
|||
|
bill doesn't raise the issue of standards.
|
|||
|
|
|||
|
OTHER POLITICAL CONSIDERATIONS
|
|||
|
|
|||
|
Supporters of a quick passage of the scaled down GPO Access
|
|||
|
legislation are concerned about a number of budget, turf and
|
|||
|
organizational issues. Examples are:
|
|||
|
|
|||
|
- Congress is considering the elimination of the Joint Committee on
|
|||
|
Printing, which now has oversight of GPO.
|
|||
|
|
|||
|
- There are proposals to break-up GPO or to transfer the entire
|
|||
|
agency to the Executive Branch, which would slow down action on
|
|||
|
the online program, and may reduce the federal support for the
|
|||
|
Federal Depository Library Program, or lead to a different (and
|
|||
|
higher) pricing policy.
|
|||
|
|
|||
|
- The National Technical Information Service (NTIS) opposes an
|
|||
|
important role by GPO in the delivery of online services, since
|
|||
|
NTIS wants to provide these services at unconstrained prices.
|
|||
|
|
|||
|
It does not appear as though the Clinton/Gore Administration has had
|
|||
|
much input on the GPO Access legislation, which is surprising since
|
|||
|
Vice President Gore was the prime sponsor of the GPO Gateway to
|
|||
|
Government (S. 2813) bill last year. (Michael Nelson will reportedly
|
|||
|
be moving from the Senate Commerce Committee to the White House to be
|
|||
|
working on these and related information policy issues.)
|
|||
|
|
|||
|
Even the scaled down GPO Access bill will face opposition. According
|
|||
|
to House republicans, despite IIA's low key public pronouncements, the
|
|||
|
vendor trade group "hates" the bill. Opposition from NTIS is also
|
|||
|
anticipated.
|
|||
|
|
|||
|
|
|||
|
TAXPAYER ASSETS PROJECT VIEW
|
|||
|
|
|||
|
We were baffled and disappointed the decision of ALA and Congress to
|
|||
|
proceed with a scaled down version of last year's bills. We had hoped
|
|||
|
that the election of the Clinton/Gore administration and the growing
|
|||
|
grass roots awareness of public access issues would lead to a
|
|||
|
stronger, rather than a weaker, bill. In our view, public
|
|||
|
expectations are rapidly rising, and the burden is now on Congress and
|
|||
|
the Administration to break with the past and take public access
|
|||
|
seriously. The GPO Access legislation provides incremental benefits
|
|||
|
over the status quo, but less than might seem.
|
|||
|
|
|||
|
- The statutory mandate to provide online services is useful, but
|
|||
|
public access proponents have always argued that GPO already has
|
|||
|
the authority to create the WINDO/GATEWAY under the current
|
|||
|
statutes. In fact, GPO now offers hundreds of CD-ROM titles and
|
|||
|
the online GPO Federal Bulletin Board, a service that could (and
|
|||
|
should) be greatly expanded.
|
|||
|
|
|||
|
- The three products that the GPO Access bill refers to are already
|
|||
|
online or under development GPO. GPO is now working on the
|
|||
|
development of a locator system and an online version of the
|
|||
|
Federal Register, and the Congressional Record is already online
|
|||
|
in the Congressional LEGIS system -- a system that is presently
|
|||
|
closed to the public, and which is not mentioned in the GPO
|
|||
|
Access bill.
|
|||
|
|
|||
|
- The "incremental cost of dissemination" provision of the new bill
|
|||
|
is welcome, but GPO is already limited to prices that are 150
|
|||
|
percent of dissemination costs.
|
|||
|
|
|||
|
Several suggestions to strengthen last year's bills were ignored.
|
|||
|
Among them:
|
|||
|
|
|||
|
- Expand the initial core products to include other online
|
|||
|
information systems that are already under the control of
|
|||
|
congress, such as the Federal Elections Commission (FEC) online
|
|||
|
database of campaign contributions, the House LEGIS system which
|
|||
|
provides online access to the full text of all bills before
|
|||
|
Congress, or the Library of Congress Scorpio system.
|
|||
|
|
|||
|
- Create a special office of electronic dissemination in GPO. At
|
|||
|
present, GPO's electronic products and services are managed by
|
|||
|
Judy Russell, who is capable, but who is also responsible for
|
|||
|
managing the primarily paper and microfiche based federal
|
|||
|
Depository Library Program, a time consuming and complicated job.
|
|||
|
We believe that GPO's electronic dissemination program is
|
|||
|
important enough to warrant its own director, whose career would
|
|||
|
depend upon the success of the electronic dissemination program.
|
|||
|
|
|||
|
The GPO Access bills will be considered by the following
|
|||
|
Congressional Committees:
|
|||
|
|
|||
|
Senate Committee on Rules and Administration 202/224-6352
|
|||
|
Chair, Senator Wendell Ford
|
|||
|
Ranking Minority, Senator Ted Stevens
|
|||
|
|
|||
|
House Committee on House Administration 202/225-225-2061
|
|||
|
Chair, Representative Charlie Rose
|
|||
|
Ranking Minority, Representative Bill Thomas
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Tue, 2 Mar 1993 20:26:36 EST
|
|||
|
From: Arnie Kahn <FAC_ASKAHN@VAX1.ACS.JMU.EDU>
|
|||
|
Subject: File 4--London Times Educational Supplement Article
|
|||
|
|
|||
|
****
|
|||
|
Originally from:
|
|||
|
From--Mike C Holderness <mch@doc.ic.ac.uk>
|
|||
|
Subject--Invisible (internet) college
|
|||
|
|
|||
|
Greetings everyone --Here, belatedly, is the article for the Times
|
|||
|
Higher Education Supplement in which you expressed an interest. The
|
|||
|
published article was very little different, apart from some errors of
|
|||
|
punctuation which they introduced... A conspiracy of silent
|
|||
|
communication
|
|||
|
|
|||
|
"In the high-tech world, if you're not on the net, you're not in the
|
|||
|
know." Thus the Economist included the Internet in its festive guide
|
|||
|
to networks -- alongside the Freemasons, the Trilateral Commission,
|
|||
|
and others which only the best-informed conspiracy theorists can fret
|
|||
|
about. More seriously, Lynne Brindley, head of the British Library of
|
|||
|
Political and Economic Science, asks how, as a young researcher, "you
|
|||
|
break in to a discipline if you haven't source journals to look at".
|
|||
|
Increasingly, research is being discussed on the Internet rather than
|
|||
|
on paper: by "those in the know, in these invisible colleges who can
|
|||
|
safely whizz their way round draft documents and papers," as Brindley
|
|||
|
puts it.
|
|||
|
|
|||
|
Research has always involved "invisible colleges", whether they meet
|
|||
|
at conferences or exchange ideas in the post -- what the electronic
|
|||
|
community refers to as "snail mail". Does the age of electronic
|
|||
|
communication herald newer, more invisible and more exclusive
|
|||
|
colleges?
|
|||
|
|
|||
|
"Despite the normative description of science as an arena of
|
|||
|
fully-open communication, the new communication technologies
|
|||
|
exacerbate the practical problem of some groups of people having more
|
|||
|
access to information than other people." That's the conclusion of
|
|||
|
Bruce Lewenstein, of the departments of communication and Science &
|
|||
|
Technology Studies at Cornell University in Ithaca, New York state.
|
|||
|
|
|||
|
The first thing about an exclusive network is that many people don't
|
|||
|
even know about it. So some history is in order. The Internet grew out
|
|||
|
of a project by the US Department of Defense to build a communication
|
|||
|
system which would function after a nuclear attack. In the 1970s,
|
|||
|
programmers working for the DoD got themselves connected, and started
|
|||
|
sending electronic messages containing working notes, queries and
|
|||
|
--crucially -- gossip.
|
|||
|
|
|||
|
The technology was taken up by the US National Science Foundation to
|
|||
|
make super-computer resources available to universities across the
|
|||
|
country. More and more local university networks joined. The British
|
|||
|
Joint Academic Network (JANET) gained a high-speed connection to the
|
|||
|
US, shared with NASA.
|
|||
|
|
|||
|
The Internet is deeply decentralized: an institution "joining" it need
|
|||
|
only be connected to a few "neighbours", which forward messages on to
|
|||
|
their neighbours, by whatever route is available, until they reach
|
|||
|
their destination. So no-one knows quite how large it is. One recent
|
|||
|
estimate is that about 7 million people --somewhere between 3.5
|
|||
|
million and 14 million -- have full access through their university or
|
|||
|
employer.
|
|||
|
|
|||
|
What's the Internet good for? You could, with permission, sit at a
|
|||
|
kitchen table on the isle of Jura and run a programme on a
|
|||
|
super-computer in Cambridge -- or, equally easily, in Cambridge,
|
|||
|
Massachusetts, or both at once. But most researchers deal more in text
|
|||
|
than number-crunching.
|
|||
|
|
|||
|
If you want to exchange text with colleagues around the world, you
|
|||
|
first need an "account" on a computer, or a local network, with an
|
|||
|
Internet connection. You compose your message in a word-processor and
|
|||
|
convert it to unadulterated plain text (ASCII in the jargon). You
|
|||
|
locate the account name for the person you want to write to -- more on
|
|||
|
that later. Type the command "mail jones@history.winnesota.edu" and
|
|||
|
attach the text; a few minutes or hours later jones looks at her
|
|||
|
computer in the notorious University of Winnesota and discovers your
|
|||
|
message waiting for her.
|
|||
|
|
|||
|
Immediately, you can see the possibility of collaborative writing with
|
|||
|
anyone, anywhere. You can form a group, too. A "mailing list"
|
|||
|
re-distributes all the messages it receives to all its subscribers.
|
|||
|
And you can have public discussions: a message sent to one of the more
|
|||
|
than 2000 "news-groups" is visible to anyone who cares to look, and
|
|||
|
possibly to reply.
|
|||
|
|
|||
|
It's not, of course, quite as easy as that.
|
|||
|
|
|||
|
Assume, for the moment, that you can type, in English. Assume that you
|
|||
|
have access to the necessary equipment. Assume that you're able and
|
|||
|
prepared to learn the sometimes baroque commands needed to access the
|
|||
|
system. Assume that you're tolerant of the fact that when you make a
|
|||
|
mistake, as you will, the system may fail to notify you at all, or may
|
|||
|
throw screeds of gobbledegook at you.
|
|||
|
|
|||
|
For these assumptions to be true, you're quite likely either to be a
|
|||
|
member of an academic institution in a Western industrialised country,
|
|||
|
or very well-to-do in world terms. You're also likely to be male. And
|
|||
|
the public area of the news system bears this out. An high proportion
|
|||
|
of messages -- over 90% in an unrepresentative sample of discussions
|
|||
|
of physics -- comes from the USA. An even higher proportion (of those
|
|||
|
with identifiable senders) comes from men.
|
|||
|
|
|||
|
"Women in science worry that these 'private' network exchanges of
|
|||
|
research results serve to reinforce the 'Old Boy Network' in
|
|||
|
scientific research circles, especially given the overwhelmingly male
|
|||
|
demographics of e-mail and news-group users," says Ruth Ginzberg,
|
|||
|
Assistant Professor of Philosophy at Wesleyan University in the US.
|
|||
|
|
|||
|
Why should there be this preponderance of men? Sarah Plumeridge is
|
|||
|
research assistant on a project to study women's use of computers at
|
|||
|
the University of East London. She comments that "A lot of research
|
|||
|
suggests that women prefer computing when it's for use, as a tool,
|
|||
|
when it's not taught as an abstract science." It's clear from the tone
|
|||
|
of messages in the public news-groups that the boys see them as a
|
|||
|
playground.
|
|||
|
|
|||
|
Newcomers are often mercilessly attacked for stylistic solecisms.
|
|||
|
Kerri Lindo, who teaches philosophy at Middlesex University, saw the
|
|||
|
Internet for the first time when interviewed for this piece. She
|
|||
|
immediately related it to her work on the French philosopher Bourdieu
|
|||
|
and remarked: "it's what I'd call a social Freemasonry -- you can't
|
|||
|
join a club unless know in advance what the rules are. Someone who
|
|||
|
learns the rules and then plays the game won't play it as successfully
|
|||
|
as someone who never explicitly learnt them -- just as people who
|
|||
|
learn middle-class manners or second languages always get caught out,
|
|||
|
however fluent they become."
|
|||
|
|
|||
|
And Josh Hayes, a post-doctorate studying community ecology at the
|
|||
|
University of Washington, may have hit on a sensible social reason for
|
|||
|
avoiding electronic communication: "For the moment, those of us who
|
|||
|
use the net a lot are probably considered to be, well, a little bit
|
|||
|
geeky. Real ecologists would be out in the field, don't you know."
|
|||
|
|
|||
|
There are more serious issues too. Cheris Kramerae of the Department
|
|||
|
of Speech Communication at the University of Illinois at Urbana is,
|
|||
|
working on the issue of sexual harassment on "the net". This happens
|
|||
|
in very specific ways -- men sending abusive messages to women, often
|
|||
|
having obtained their electronic addresses from the electronic
|
|||
|
"personals column". There is also the problem of socially retarded
|
|||
|
students abusing the system to distribute digitised pornographic
|
|||
|
images: the direct equivalent of the calendar on the workshop wall.
|
|||
|
Kramerae concludes, however, that "Obviously it is not the technology
|
|||
|
but the policies which are presenting particular problems for women."
|
|||
|
|
|||
|
Arnie Kahn runs a private mailing list for about 45 feminist
|
|||
|
psychologists from James Madison University in Virginia. "A few years
|
|||
|
ago I was sending electronic mail to a few friends who, like myself,
|
|||
|
were feminist psychologists doing research on gender.... I announced
|
|||
|
to my friends that if they had a question, they could just send the
|
|||
|
message to me and I would forward it to the rest of the group."
|
|||
|
|
|||
|
Kahn's list is, then, exactly an invisible college. Given the vast
|
|||
|
space occupied by anti-feminist men in the open news-groups which are
|
|||
|
supposed to discuss feminism, it can only operate if it remains
|
|||
|
private and by invitation.
|
|||
|
|
|||
|
Are there, though, fields in which access to the Internet is
|
|||
|
essential, rather than helpful, to making progress? It seems so. Jim
|
|||
|
Horne, an Associate Research Scientist in high-energy physics at Yale
|
|||
|
University in the US, states that "a number of people in high energy
|
|||
|
(only those with tenure though) have even stopped sending their papers
|
|||
|
to journals. They only send their papers to the preprint bulletin
|
|||
|
boards." Paper publication is quite simply too slow to bother with.
|
|||
|
|
|||
|
These collections of preprints are public, if you have net access and
|
|||
|
if you've been told where to find them. Stephen Selipsky, a physics
|
|||
|
post-doctorate at Boston University, points out that, since the
|
|||
|
preprints were made available in this way, "in the circles I move in,
|
|||
|
'private' mailing lists play very little role... There is very little
|
|||
|
point keeping results secret in theoretical work, and large career
|
|||
|
rewards from disseminating results... in contrast to areas like
|
|||
|
biochemistry, where people [want] to stay in the lead on a hot topic."
|
|||
|
|
|||
|
Computer science is naturally another field where work is exchanged
|
|||
|
exclusively on the net. A researcher at Edinburgh --who preferred not
|
|||
|
to be named "from shyness" -- says that "you tend not to chase up the
|
|||
|
actual publication (which can be months later). I have seen someone
|
|||
|
appealing for information about where some papers were eventually
|
|||
|
published, because you can't (yet) put 'archive@ohio-state.edu' in a
|
|||
|
bibliography entry." Here, too, there is at least one mailing list
|
|||
|
which is private -- "in order to keep down the traffic and free it
|
|||
|
from the 'can anyone tell me what a neural network is?' questions."
|
|||
|
|
|||
|
In some fields, electronic distribution is the only practical method.
|
|||
|
If you've ever watched someone laboriously typing DNA sequences out of
|
|||
|
a journal into a computer -- "ACG ACT AAG TAG" and thus for pages
|
|||
|
--you'll see why this is the case for molecular biology.
|
|||
|
|
|||
|
There are some ways in which electronic communications can break down
|
|||
|
boundaries. "Speaking as someone at a relatively small and remote
|
|||
|
institution," says Steve Carlip at the physics department of the
|
|||
|
University of California Davis, "the biggest handicap is not private
|
|||
|
electronic distribution, but rather the fact that so much happens at
|
|||
|
seminars and in conversations."
|
|||
|
|
|||
|
Robert Gutschera finished his PhD last year and is now an Assistant
|
|||
|
Professor of mathematics at Wellesley College in the USA. "The
|
|||
|
heaviest users of electronic mail seem to be younger researchers," he
|
|||
|
says. "Getting into a field is always hard, but I think e-mail makes
|
|||
|
it better rather than worse."
|
|||
|
|
|||
|
Some are positively evangelical. Lewenstein quotes Tom Droege, who is
|
|||
|
looking for "anomalous" heat production from palladium electrodes in
|
|||
|
heavy water -- the notorious cold fusion experiment -- in his basement
|
|||
|
laboratory. Droege communicates and discusses all his results publicly
|
|||
|
on the Internet -- finding negative interest from his work colleagues
|
|||
|
at Fermilab. "...the real experiment I am trying to do is e-mail
|
|||
|
science. The 'anomalous heat' project is just an excuse. I think this
|
|||
|
is the media of the future."
|
|||
|
|
|||
|
You may notice that most of the people quoted here work in the USA.
|
|||
|
This is, as you might guess, because their comments were obtained on
|
|||
|
the Internet -- neatly demonstrating the bias it introduces. On the
|
|||
|
one hand, the research for this article might have been impossibly
|
|||
|
expensive without it. On the other, people with net connections are
|
|||
|
tempted to talk only to the connected.
|
|||
|
|
|||
|
Kerri Lindo, as a total newcomer, was immediately struck by the
|
|||
|
possibility of finding others working on Bourdieu -- until she saw the
|
|||
|
content of the one public philosophy news-group: "It's a real shame,
|
|||
|
isn't it..." She composed and sent a message anyway -- and was able to
|
|||
|
predict what the programme would do next, which suggests that the
|
|||
|
computer software for sending messages isn't as awful as it's often
|
|||
|
made out to be, at least for post-graduate philosophers. She got just
|
|||
|
one response, from a group with an estimated 23,000 readers, and this
|
|||
|
could be summarised as "who he?".
|
|||
|
|
|||
|
Some of those ten or thirty thousand occasional readers of the
|
|||
|
philosophy news-group could probably be useful collaborators for
|
|||
|
Lindo. But how to find them? The sheer volume of public tittle-tattle
|
|||
|
-- known on the net as "the noise-to-signal ratio" --means that only
|
|||
|
those with time to kill will pay attention. The Internet has no
|
|||
|
equivalent to a phone book. If you know that you want to contact a
|
|||
|
particular person, you know what institution they work at, and you can
|
|||
|
guess or find out that institution's electronic address, there are
|
|||
|
tools which may locate them -- but they're cranky and unreliable.
|
|||
|
|
|||
|
Often the easiest way to find someone's electronic address is a phone
|
|||
|
call, which may involve explaining exactly what electronic mail is to
|
|||
|
three or four departmental secretaries. On the other hand, once you've
|
|||
|
made contact, the computer screen is a great leveller. If you can work
|
|||
|
out how to de-gender your personal name, then all the information the
|
|||
|
reader has about you is what you choose to put into your text. (Or
|
|||
|
maybe not: Lindo recalls an small experiment in which she could tell
|
|||
|
the gender of pseudonymous essayists with 93% accuracy, though this
|
|||
|
was from hand-written scripts.) An intelligent and literate amateur
|
|||
|
could still conceivably enter into collaboration with a professor...
|
|||
|
|
|||
|
If you work in the humanities, you can probably put off coming to
|
|||
|
grips with the technology for a few years. You might want, however, to
|
|||
|
consider the rich seam of research on how this medium affects the
|
|||
|
nature of the messages. Lindo is not the only person to speculate that
|
|||
|
"It's possible that [the net] will influence the whole structure and
|
|||
|
nature of knowledge as much as the printing press did." Consider, too,
|
|||
|
that if Cyril Burt's twin studies had been published electronically,
|
|||
|
some awkward person --very possibly an amateur -- would have run his
|
|||
|
figures through a statistics programme and spotted something funny,
|
|||
|
probably within 24 hours.
|
|||
|
|
|||
|
If you work in some fields -- certainly high-energy physics and
|
|||
|
molecular biology, and probably mathematics -- you'd better get
|
|||
|
connected, get retrained, or get a highly computer-literate graduate
|
|||
|
assistant ("a nerd", in the jargon) to do it for you. Lewenstein
|
|||
|
concludes that though electronic communication "will not replace
|
|||
|
traditional face-to-face interaction... researchers with access to
|
|||
|
these forms of communication [are] making progress while other
|
|||
|
researchers, still awaiting information through more traditional
|
|||
|
slower channels, have not yet begun to work." For them, the ability to
|
|||
|
use computer communication is an essential part of literacy.
|
|||
|
|
|||
|
Dorothy Denning works on computer security, and teaches computer
|
|||
|
literacy, at Georgetown University in Washington DC. She "doubt that
|
|||
|
the electronic research communities will be any harder to break into
|
|||
|
than non-electronic ones. Based on my own experience, I expect they
|
|||
|
will be much easier to join (assuming you have the resources). Her
|
|||
|
qualification is vital -- funders, take note.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Tue, 2 Mar 1993 22:51:14 EDT
|
|||
|
From: Susan_L._Irwin.Henr801C@XEROX.COM
|
|||
|
Subject: File 5--FWD: The White House Communication Project
|
|||
|
|
|||
|
I am currently involved in a research project that is trying to aid
|
|||
|
the Clinton Administration in making effective use of
|
|||
|
computer-mediated communication to stay "in touch" with the public.
|
|||
|
Our coordinator has gotten in touch with Jack Gill, Director of
|
|||
|
Electronic Publishing and Public Access Electronic Mail for the
|
|||
|
Clinton Administration, and he (Gill) has embraced the efforts of the
|
|||
|
research group to lend a helping hand to this task. Some questions he
|
|||
|
has posed to the researchers include the following:
|
|||
|
|
|||
|
(1) When you get thousands of messages a day, how do you
|
|||
|
respond effectively?
|
|||
|
(2) How do you make a public e-mail system inclusive
|
|||
|
and accessible?
|
|||
|
(3) What would happen if e-mail became the primary
|
|||
|
mode of(mediated) access to government?
|
|||
|
|
|||
|
We would appreciate any insights and suggestions of possible solutions to
|
|||
|
these questions.
|
|||
|
|
|||
|
Shellie Emmons sme46782@uxa.cso.uiuc.edu
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
End of Computer Underground Digest #5.18
|
|||
|
************************************
|
|||
|
|
|||
|
|