924 lines
44 KiB
Plaintext
924 lines
44 KiB
Plaintext
|
Computer underground Digest Wed Mar 16, 1994 Volume 6 : Issue 25
|
||
|
ISSN 1004-042X
|
||
|
|
||
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
||
|
Archivist: Brendan Kehoe (He's Baaaack)
|
||
|
Acting Archivist: Stanton McCandlish
|
||
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
||
|
Ralph Sims / Jyrki Kuoppala
|
||
|
Ian Dickinson
|
||
|
Koppa Ediqor: Phirho Shrdlu
|
||
|
|
||
|
CONTENTS, #6.25 (Mar 16, 1994)
|
||
|
File 1--Documenting the Rigged & Deadly Cultural Context of Info Age
|
||
|
File 2--Privacy, Communications, and Cryptography
|
||
|
File 3--How Citizens can Pursue Net Grassroots Polit. Action
|
||
|
File 4--Gray Areas (Magazine) and The Computer underground
|
||
|
|
||
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
||
|
available at no cost electronically.
|
||
|
|
||
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
||
|
|
||
|
Or, to subscribe, send a one-line message: SUB CUDIGEST your name
|
||
|
Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
|
||
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
||
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
||
|
60115, USA.
|
||
|
|
||
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
||
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
||
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
||
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
||
|
the PC Telecom forum under "computing newsletters;"
|
||
|
On Delphi in the General Discussion database of the Internet SIG;
|
||
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
||
|
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
|
||
|
CuD is also available via Fidonet File Request from
|
||
|
1:11/70; unlisted nodes and points welcome.
|
||
|
|
||
|
EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
|
||
|
In ITALY: Bits against the Empire BBS: +39-461-980493
|
||
|
|
||
|
FTP: UNITED STATES: etext.archive.umich.edu (141.211.164.18) in /pub/CuD/
|
||
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
||
|
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
|
||
|
nic.funet.fi
|
||
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
||
|
|
||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
|
information among computerists and to the presentation and debate of
|
||
|
diverse views. CuD material may be reprinted for non-profit as long
|
||
|
as the source is cited. Authors hold a presumptive copyright, and
|
||
|
they should be contacted for reprint permission. It is assumed that
|
||
|
non-personal mail to the moderators may be reprinted unless otherwise
|
||
|
specified. Readers are encouraged to submit reasoned articles
|
||
|
relating to computer culture and communication. Articles are
|
||
|
preferred to short responses. Please avoid quoting previous posts
|
||
|
unless absolutely necessary.
|
||
|
|
||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
||
|
the views of the moderators. Digest contributors assume all
|
||
|
responsibility for ensuring that articles submitted do not
|
||
|
violate copyright protections.
|
||
|
|
||
|
----------------------------------------------------------------------
|
||
|
|
||
|
Date: Wed, 9 Mar 1994 23:44:29 CST
|
||
|
From: Vigdor Schreibman - FINS <fins@ACCESS.DIGEX.NET>
|
||
|
Subject: File 1--Documenting Rigged & Deadly Cultural Context of Info Age
|
||
|
|
||
|
|
||
|
FINS SPECIAL REPORT MARCH 7, 1994
|
||
|
================================================================
|
||
|
|
||
|
|
||
|
FINS INFORMATION AGE LIBRARY ADDITIONS
|
||
|
Documenting the Rigged & Deadly Cultural
|
||
|
Context of the Emerging Information Age
|
||
|
|
||
|
Washington, DC--Fins Information Age Lib will release, Mar 8, 1994, a new
|
||
|
online directory: Periodicals_and_Newspapers. This directory will contain
|
||
|
thoughtful, thorough, and provocative articles of special relevance to the
|
||
|
emerging Information Age. In this undertaking, Fins intends to track the
|
||
|
antidemocratic propaganda model of the mass media developed by American
|
||
|
business that has been discussed by writers during the last half of the
|
||
|
twentieth century (Arendt, 1950; Lindblom, 1977; Herman & Chomski, 1988).
|
||
|
Special emphasis will be placed on the technological imperative of the
|
||
|
Information Age now being pursued by the "one-eyed prophets" of the
|
||
|
Clinton-Gore Administration, which threaten totalitarian dangers of the
|
||
|
"Technopoly" described by communications critic Postman (1992). Finally,
|
||
|
articles that discuss alternative possibilities that can sustain and enhance
|
||
|
democracy will also be highlighted.
|
||
|
|
||
|
The articles now presented in the Periodicals_and_Newspapers directory
|
||
|
disclose the rigged and lopsided competition of core ideas, and deadly
|
||
|
cultural context of the emerging Information Age. In addition to several
|
||
|
articles previously released in electronic format there are two articles new
|
||
|
to the Internet. This includes a three-part series on "The Capital and
|
||
|
Capitol Hill," written by Vigdor Schreibman, which describes the core values
|
||
|
and systemic foundation for soaring youth homicide in the United States,
|
||
|
nested in an economic system with undue reliance placed upon the ethic of
|
||
|
profit maximization, guided by narrow individualism and the morality of the
|
||
|
marketplace. The directory also contains an original article by Schreibman
|
||
|
on, "Preservation of an American Heritage," which discusses the conflict
|
||
|
between technology and the preservation of America's cultural
|
||
|
heritage. The article was originally scheduled for publication by
|
||
|
Washington's HILL RAG, Mar 4, 1994, but was killed without
|
||
|
explanation. It is now included online in
|
||
|
Fins_Information_Age/Periodicals_and_Newspapers/Fins-PaN-05.
|
||
|
|
||
|
Now included in Periodicals_and_Newspapers are the following
|
||
|
selections:
|
||
|
|
||
|
Fins-PaN-01 Vigdor Schreibman, "The Politics of Cyberspace"
|
||
|
(Fins ed., Jan 1994) (Figures 1-3, of this work are included in
|
||
|
separate files, uuencode version: Fins-PaN-01a to 01c)
|
||
|
|
||
|
Fins-PaN-02 Richard E. Sclove, "Democratizing Technology," in
|
||
|
THE CHRONICLE OF HIGHER EDUCATION, Jan 12, 1994, pp. B1-B2
|
||
|
|
||
|
Fins-PaN-03 Patryk Silver, Bell Atlantic-TCI: Merger Mania,
|
||
|
and Edward S. Herman, Peter Pangloss Predicts, and Herbert I.
|
||
|
Schiller, The Corporate Pipeline Into Our Heads, in LIES OF OUR TIMES,
|
||
|
January-February 1994
|
||
|
|
||
|
Fins-PaN-041 Vigdor Schreibman, Part 1, "The Capital and
|
||
|
Capitol Hill: Propagating a counter-culture of madness" (Fins ed.,
|
||
|
Mar 1994) (Figure 1, of this work is included in a separate file,
|
||
|
uuencode version: Fins-PaN-04b)
|
||
|
|
||
|
Fins-PaN-042 Vigdor Schreibman, Part 2, "The Capital and
|
||
|
Capitol Hill: A setting for madness (Fins ed., Mar 1994) (Table 1, of
|
||
|
this work is included in a separate file, uuencode version:
|
||
|
Fins-PaN-04b)
|
||
|
|
||
|
Fins-PaN-043 Vigdor Schreibman, Part 3, "The Capital and
|
||
|
Capitol Hill: The triumph of Jeffersonian Democracy (Fins ed., Mar
|
||
|
1994)
|
||
|
|
||
|
Fins-PaN-05 Vigdor Schreibman, "Preservation of an American
|
||
|
Heritage" (Fins ed., Mar 1994)
|
||
|
|
||
|
|
||
|
Follow these directions to browse the Fins Information Age Lib:
|
||
|
|
||
|
If you have a Gopher client :
|
||
|
gopher to inform.umd.edu
|
||
|
and go to the directory
|
||
|
Educational_Resources/Computers_and_Society/Fins_Information_Age
|
||
|
|
||
|
If you have ftp :
|
||
|
ftp to inform.umd.edu
|
||
|
cd to inforM/Educational_Resources/Computers_and_Society/Fins_Information_Age
|
||
|
|
||
|
===========================================================================
|
||
|
BECOME A MEMBER OF FINS--COLLABORATE IN PROTECTING THE SPIRIT OF CYBERSPACE
|
||
|
+-------------------------------------------------------------------
|
||
|
Membership rate: $30.00 a year. United States and International members
|
||
|
receive 24 issues of Fins News Columns a year; plus networking, or print
|
||
|
reproduction rights in primary markets; plus Fins Information Age Library.
|
||
|
+-------------------------------------------------------------------
|
||
|
Federal Information News Syndicate, Vigdor Schreibman, Editor & Publisher,
|
||
|
18-9th St. NE #206, Washington, DC 20002. Internet: fins@access.digex.net.
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Thu, 3 Mar 1994 22:12:58 -0500 (EST)
|
||
|
From: "Shabbir J. Safdar" <shabbir@PANIX.COM>
|
||
|
Subject: File 2--Privacy, Communications, and Cryptography
|
||
|
|
||
|
Have you ever wondered why so many people get caught talking on
|
||
|
their cellular phones?
|
||
|
|
||
|
Or perhaps why people laugh when they talk about the security of
|
||
|
electronic mail?
|
||
|
|
||
|
The reason we cannot assure the privacy of our personal communications
|
||
|
is because the government places strict controls on the only
|
||
|
technology that protects our privacy: cryptography.
|
||
|
|
||
|
Cryptography can assure our privacy unlike anything else in history.
|
||
|
Let's say you are given a driver's license by the state of NY. If
|
||
|
you do something to annoy the state, you can lose your driver's
|
||
|
license.
|
||
|
|
||
|
Cryptographic privacy cannot be taken away. A tyrannical government
|
||
|
or a rogue police dept. cannot eavesdrop on your well-encrypted
|
||
|
conversations or read your well-encrypted email by stealing your
|
||
|
computer.
|
||
|
|
||
|
However cryptographic technology in recent years has been carefully
|
||
|
controlled by the government. Anyone who wanted to build a product
|
||
|
with real privacy built into it, such as an encrypting cellular
|
||
|
telephone, would be subjected to a litany of absurd government
|
||
|
regulations. Ultimately they would be limited to producing their
|
||
|
product for US use only. The legal fees just to get this far
|
||
|
may still be daunting enough to have discouraged most manufacturers
|
||
|
from putting cryptographic technology into their products. Their
|
||
|
markets would be automatically diminished to be US-only, perhaps
|
||
|
not enough to warrant developing the product for market.
|
||
|
|
||
|
The gov't. claims this is done in the interest of national
|
||
|
security. Can this be true? Many of these products are
|
||
|
available outside the US already. In fact many stronger products
|
||
|
are available outside the US both from vendors and on the Internet
|
||
|
anonymous ftp sites.
|
||
|
|
||
|
US companies are constrained by these regulations since they cannot
|
||
|
compete with other international companies in the global
|
||
|
marketplace. US citizens lose their privacy because their own
|
||
|
firms are unable to provide them with the products they need.
|
||
|
|
||
|
|
||
|
You can change this!
|
||
|
|
||
|
|
||
|
Rep. Maria Cantwell has introduced legislation (cryptographic export bill
|
||
|
HR 3627) that would fix the cryptographic export laws to allow
|
||
|
businesses to produce eqiupment with strong cryptography for sale
|
||
|
in the global marketplace.
|
||
|
|
||
|
This will mean more privacy-enhancing products for ordinary citizens
|
||
|
like you and me.
|
||
|
|
||
|
HR 3627 currently has five co-sponsors. The current co-sponsors are:
|
||
|
|
||
|
Shepherd - Utah
|
||
|
Wyden - Oregon
|
||
|
Orton - Utah
|
||
|
Manzulo - Illinois
|
||
|
Edwards - California
|
||
|
|
||
|
Can one person make a difference? Sure, just ask Colin Campbell
|
||
|
from Utah. He wrote Rep. Karen Shepherd and asked her to co-sponsor
|
||
|
Rep. Cantwell's bill. Rep. Shepherd's office had been thinking about
|
||
|
the bill, and between constituent support, her own good judgement,
|
||
|
and good advice from several software companies she decided to
|
||
|
co-sponsor the bill.
|
||
|
|
||
|
Would she have co-sponsored if Colin hadn't written his letter?
|
||
|
Perhaps not. In the last election (1992) Shepherd (who is now only a
|
||
|
freshman legislator) defeated her challenger, Enid Greene with only a
|
||
|
2% margin (52% vs. 48%). Had she thought that this might be a
|
||
|
sensitive issue with voters, she might have merely passed it up, like
|
||
|
so many other pieces of legislation that get filed every year and go
|
||
|
nowhere.
|
||
|
|
||
|
Help your legislator make this difference. Ask them to co-sponsor
|
||
|
or support HR 3627. It's very very easy. All you do is call, write,
|
||
|
or fax (you bought that fax modem for a reason, right?!) your
|
||
|
representative. Ask them to support HR 3627 because its good for
|
||
|
privacy and its good for business.
|
||
|
|
||
|
Once when working in another state, I asked a state legislator what sort of
|
||
|
mail they got. One said "five letters is a landslide". Although
|
||
|
US reps and Senators get significantly more, it shows how much of an
|
||
|
impact one group of individuals can have.
|
||
|
|
||
|
HERE'S WHAT TO DO
|
||
|
|
||
|
Act now! This bill will be in "mark-up" next week! The last step
|
||
|
before it is reported to the House floor!
|
||
|
|
||
|
1. Find out your legislator's name or number. You can do this by calling
|
||
|
the League of Women Voters in your area, or by calling the
|
||
|
City Board of Elections. If you're truly lazy, you can write to
|
||
|
me with your city and I'll find it for you. (If you recognize
|
||
|
your legislator's name or district, ftp the current list of
|
||
|
Reps and Senators from una.hh.lib.umich.edu in the directory
|
||
|
/socsci/poliscilaw/uslegi/congdir
|
||
|
|
||
|
2. Call/write/fax your representative and tell them you would like them
|
||
|
to support HR 3627. Colin Campbell's letter below is a good
|
||
|
example. (It's a success story!) Let me know what his/her
|
||
|
reaction is by dropping me a line at shabbir@panix.com.
|
||
|
|
||
|
3. Continue reading EFFector Online, Computer Underground Digest, and
|
||
|
other publications for progress announcements.
|
||
|
|
||
|
4. If you want to help coordinate the legislators in your state,
|
||
|
join the mailing list ad_hocracy@panix.com. It's dedicated to
|
||
|
passing HR 3627 and other similar legislation. Join and send
|
||
|
mail saying, "I'll make sure <state> gets taken care of!"
|
||
|
|
||
|
Attachments:
|
||
|
|
||
|
Colin Campbell's successful letter
|
||
|
A copy of HR 3627
|
||
|
|
||
|
|
||
|
============================================================================
|
||
|
|
||
|
[excerpt of email from Colin Cambpell]
|
||
|
|
||
|
I faxed a message to Rep. Karen Shepherd on Feb 16 (see below for
|
||
|
text). A member of her staff called me on the telephone a few days
|
||
|
later. I can't quote verbatim, but he said:
|
||
|
|
||
|
1) Rep. Shepherd hadn't been aware of the issue previously.
|
||
|
|
||
|
2) After receiving my letter, they did some research and
|
||
|
decided the Cantewll bill was a good idea. I got the
|
||
|
impression that they contacted some software industry
|
||
|
associations.
|
||
|
|
||
|
3) She will be co-sponsoring the bill.
|
||
|
|
||
|
A copy of what I faxed to her is attached. You may use my name and
|
||
|
city publicly, as well as any of the text of my letter.
|
||
|
|
||
|
Glad to help a worthy cause,
|
||
|
|
||
|
Colin Campbell
|
||
|
|
||
|
|
||
|
;;; text of Fax sent Feb 16, 1994
|
||
|
|
||
|
Rep. Karen Shepherd
|
||
|
U.S. House of Representatives
|
||
|
Washington, DC
|
||
|
|
||
|
Dear Rep. Shepherd:
|
||
|
|
||
|
I would like to register my strong support for H.R. 3627, Legislation
|
||
|
to Amend the Export Administration Act of 1979. The bill proposes to
|
||
|
end the ban on the export of privacy and data-security software from
|
||
|
the U.S.
|
||
|
|
||
|
As a longtime worker in the software industry, I can attest to the
|
||
|
senseless and counter-productive effects of the current export
|
||
|
restrictions on cryptographic software.
|
||
|
|
||
|
For me, the issue is simple:
|
||
|
|
||
|
1) The current ban is ineffective. There is no way to control
|
||
|
the availability of privacy software in other countries.
|
||
|
Software is not a commodity that is consumed and continually
|
||
|
reexported to replenish supply; it is information and technology.
|
||
|
The encryption technology in question is already fully available
|
||
|
wherever there are computers. Whether we like it or not,
|
||
|
the genie is out of the bottle and will not be put back.
|
||
|
|
||
|
2) The U.S. software industry is severely hampered by not
|
||
|
being able to export products with privacy
|
||
|
and data-security features. This is about jobs.
|
||
|
|
||
|
I think cryptography has a bit of an image problem. I think it is
|
||
|
inaccurately associated in popular thinking with secrecy, espionage
|
||
|
and even crime or terrorism. In fact, privacy software is just an
|
||
|
electronic "envelope." It is as common and unexotic as paper
|
||
|
envelopes or locking file cabinets.
|
||
|
|
||
|
I regularly send my mail sealed in envelopes made of opaque paper, and
|
||
|
no one would interpret this practice as evidence of criminal intent.
|
||
|
Similarly, I file my business documents in a locking file cabinet. In
|
||
|
the future, nearly all electronic communication will be enclosed in
|
||
|
secure, software "envelopes." This is proper, natural and in no way
|
||
|
suspect. And it is a growth industry for the U.S., if we are only
|
||
|
sensible enough to recognize and take advantage of the opportunity.
|
||
|
|
||
|
I believe that the arguments of national security offered by opponents
|
||
|
of the proposed legislation are not compelling. I suspect that many
|
||
|
in the law enforcement and national security communities, who pursued
|
||
|
the majority of their careers with the technology and politics of the
|
||
|
Cold War, regret the wide availability of electronic privacy;
|
||
|
undeniably, it does make their job harder. However, whether or not we
|
||
|
allow privacy software to be exported will not change this.
|
||
|
|
||
|
Classifying privacy software as a "munition" makes about as much sense
|
||
|
as classifying personal computers and photocopy machines as implements
|
||
|
of war. Are we willing to forbid the export of personal computers and
|
||
|
photocopy machines for national security reasons as well?
|
||
|
|
||
|
Now is an opportunity for progressive, forward-thinking approaches to
|
||
|
electronic communications and the software industry. Our national
|
||
|
policy should reflect the realities of the technology and the public
|
||
|
interest. Needlessly crippling one of our most vital industries with
|
||
|
a policy which is ineffective at meeting its stated goals is not in
|
||
|
that interest. I urge you to support and even co-sponsor H.R. 3627. As
|
||
|
you know, Utah is one of the country's major centers of software
|
||
|
development. This is an issue that is very important to the software
|
||
|
community.
|
||
|
|
||
|
If there is any way I can help you in your effort pass HR 3627,
|
||
|
please let me know.
|
||
|
|
||
|
Thank you for your consideration.
|
||
|
|
||
|
Sincerely yours,
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
Colin Campbell
|
||
|
|
||
|
============================================================================
|
||
|
|
||
|
Below is a copy of the Cantwell bill. It and much more valuable
|
||
|
information about pending legislation is also available at ftp.eff.org
|
||
|
in /pub/Policy/Legislation.
|
||
|
|
||
|
|
||
|
|
||
|
103D CONGRESS H.R. 3627
|
||
|
1ST SESSION
|
||
|
|
||
|
---------------------------------------
|
||
|
|
||
|
IN THE HOUSE OF REPRESENTATIVES
|
||
|
|
||
|
MS. CANTWELL (for herself and ___) introduced the following bill which
|
||
|
was referred to the Committee on __________.
|
||
|
|
||
|
|
||
|
---------------------------------------
|
||
|
|
||
|
A BILL
|
||
|
|
||
|
To amend the Export Administration Act of 1979 with
|
||
|
respect to the control of computers and related equipment.
|
||
|
|
||
|
|
||
|
Be it enacted by the Senate and House of Representa-
|
||
|
tives of the United States of America in Congress Assembled,
|
||
|
SECTION 1. GENERALLY AVAILABLE SOFTWARE
|
||
|
Section 17 of the Export Administration Act of 1979
|
||
|
(50 U.S.C. App. 2416) is amended by adding at the end
|
||
|
thereof the following new subsection:
|
||
|
``(g) COMPUTERS AND RELATED EQUIPMENT.---
|
||
|
``(1) GENERAL RULE.---Subject to paragraphs
|
||
|
(2) and (3), the Secretary shall have exclusive au-
|
||
|
thority to control exports of all computer hardware,
|
||
|
software and technology for information security
|
||
|
(including encryption), except that which is specifi-
|
||
|
cally designed or modified for military use, including
|
||
|
command, control and intelligence applications.
|
||
|
``(2) ITEMS NOT REQUIRING LICENSES.---
|
||
|
No validated license may be required, except pursuant
|
||
|
to the Trading With The Enemy Act or the Inter-
|
||
|
national Emergency Economic Powers Act (but only
|
||
|
to the extent that the authority of such act is not
|
||
|
exercised to extend controls imposed under this act),
|
||
|
for the export or reexport of---
|
||
|
``(A) any software, including software with
|
||
|
encryption capabilities, that is---
|
||
|
``(i) generally available, as is, and is
|
||
|
designed for installation by the purchaser; or
|
||
|
``(ii) in the public domain or publicly
|
||
|
available because it is generally accessible
|
||
|
to the interested public in any form; or
|
||
|
``(B) any computing device soley because
|
||
|
it incorporates or employs in any form software
|
||
|
(including software with encryption capabilities)
|
||
|
exempted from any requirement for a validated
|
||
|
license under subparagraph (A).
|
||
|
``(3) SOFTWARE WITH ENCRYPTION CAPABILITIES.
|
||
|
--- The Secretary shall authorize the export or
|
||
|
reexport of software with encryption capabilities for
|
||
|
nonmilitary end-uses in any country to which ex-
|
||
|
ports of software of similar capability are permitted
|
||
|
for use by financial institutions not controlled in fact
|
||
|
by United States persons, unless there is substantial
|
||
|
evidence that such software will be---
|
||
|
``(A) diverted to a military end-use or an
|
||
|
end-use supporting international terrorism;
|
||
|
``(B) modified for military or terrorist end-
|
||
|
use; or
|
||
|
``(C) reexported without requisite United
|
||
|
States authorization.
|
||
|
``(4) DEFINITIONS.---As used in this subsection---
|
||
|
``(A) the term `generally available' means,
|
||
|
in the case of software (including software with
|
||
|
encryption capabilities), software that is offered
|
||
|
for sale, license, or transfer to any person with-
|
||
|
out restriction through any commercial means,
|
||
|
including, but not limited to, over-the-counter
|
||
|
retail sales, mail order transactions, phone
|
||
|
order transactions, electronic distribution, or
|
||
|
sale on approval;
|
||
|
``(B) the term `as is' means, in the case of
|
||
|
software (including software with encryption ca-
|
||
|
pabilities), a software program that is not de-
|
||
|
signed, developed, or tailored by the software
|
||
|
company for specific purchasers, except that
|
||
|
such purchasers may supply certain installation
|
||
|
parameters needed by the software program to
|
||
|
function properly with the purchaser's system
|
||
|
and may customize the software program by
|
||
|
choosing among options contained in the soft-
|
||
|
ware program;
|
||
|
``(C) the term `is designed for installation
|
||
|
by the purchaser' means, in the case of soft-
|
||
|
ware (including software with encryption capa-
|
||
|
bilities)---
|
||
|
``(i) the software company intends for
|
||
|
the purchaser (including any licensee or
|
||
|
transferee), who may not be the actual
|
||
|
program user, to install the software pro-
|
||
|
gram on a computing device and has sup-
|
||
|
plied the necessary instructions to do so,
|
||
|
except that the company may also provide
|
||
|
telephone help line services for software in-
|
||
|
stallation, electronic transmission, or basic
|
||
|
operations; and---
|
||
|
``(ii) that the software program is de-
|
||
|
signed for installation by the purchaser
|
||
|
without further substantial support by the
|
||
|
supplier;
|
||
|
``(D) the term `computing device' means a
|
||
|
device which incorporates one or more
|
||
|
microprocessor-based central processing units
|
||
|
that can accept, store, process or provide out-
|
||
|
put of data; and
|
||
|
``(E) the term `computer hardware', when
|
||
|
used in conjunction with information security,
|
||
|
includes, but is not limited to, computer sys-
|
||
|
tems, equipment, application-specific assem-
|
||
|
blies, modules and integrated circuits.''
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Mon, 14 Mar 1994 14:31:04 -0800
|
||
|
From: Jim Warren <jwarren@WELL.SF.CA.US>
|
||
|
Subject: File 3--How Citizens can Pursue Net Grassroots Polit. Action
|
||
|
|
||
|
Mar.14, 1994
|
||
|
|
||
|
((This is a slightly-modified version of will appear in my "Access to
|
||
|
Government" column in the April, 1994, issue of BOARDWATCH magazine,
|
||
|
the oldest rag for bulletin-board sysops and users; 8500 W. Bowles Ave
|
||
|
#210, Littleton CO 80123; 800-933-6038;
|
||
|
email/subscriptions@boardwatch.com . ]
|
||
|
|
||
|
HOW CITIZENS CAN PURSUE PRACTICAL, POTENT, GRASSROOTS POLITICAL
|
||
|
ACTION - NET-BASED, COMPUTER-AIDED
|
||
|
|
||
|
by Jim Warren
|
||
|
|
||
|
(c) 1994. May be copied-in-full at any time after Apr.15, 1994, in any form,
|
||
|
provided this notice is included and no fee is charged for the specific copy
|
||
|
nor for a paper publication of which it is a part.
|
||
|
|
||
|
|
||
|
This details how individuals can personally pursue powerful, effective
|
||
|
political action. I am convinced that its use will explode in the '96
|
||
|
presidential elections and will mature by 1999.
|
||
|
Delightfully, this only works for positions that have broad public support,
|
||
|
though usually among disorganized and geographically scattered citizens. It's
|
||
|
useless for covert special interests; in fact, it can overpower their
|
||
|
insiders' clout.
|
||
|
|
||
|
Let me not understate this:
|
||
|
*I believe that the mature version of this approach will dominate
|
||
|
irresistable citizen-based political action in the 21st Century.*
|
||
|
|
||
|
There are two reasons for wanting access to government:
|
||
|
* A docile serf's interest and fear concerning what benefit and harm his or
|
||
|
her Master has decided to impose.
|
||
|
* A free[wo]man's interest in participating in the process of his own
|
||
|
governance - exercising citizen control over government power.
|
||
|
The latter requires the power to act - to effectively participate in shaping
|
||
|
one's own destiny, the difference between a slave and a freeman - as well as
|
||
|
timely access to information on which to base informed action.
|
||
|
|
||
|
I stumbled into developing parts of this while pursuing last year's effort to
|
||
|
mandate free online access to Californica's [sic] legislative and statutory
|
||
|
information, outlined in my December, 1993, *BoardWatch* column.
|
||
|
However, this adds *major* features and enormously expands its empowerment
|
||
|
of individual citizens.
|
||
|
|
||
|
As time permits, I expect to personally use it this year to:
|
||
|
(1) help make state political disclosures and other public records freely and
|
||
|
timely available, electronically,
|
||
|
(2) redress the Clinton/Gore administration's bizarre anti-privacy efforts to
|
||
|
prohibit peep-proof personal and business communications, and
|
||
|
(3) reverse the Patent Office's zeal to grant 20-year monopoly-patents for
|
||
|
every iota of software innovation - but only to those with enough wealth and
|
||
|
lawyers to obtain them and defend them.
|
||
|
[If interested, send me email.]
|
||
|
However, this political-action system is presented here, in general terms.
|
||
|
|
||
|
TYPES OF APPLICATIONS
|
||
|
Typical citizen uses include:
|
||
|
* Persuade one decision-maker - an elected official, appointed commissioner,
|
||
|
public administrator, President, etc.
|
||
|
* Persuade a controlling percentage of a small legislative or policy-making
|
||
|
group - typically a majority of a state or Congressional legislative committee
|
||
|
or Commission or Board.
|
||
|
* Persuade a controlling percentage of a larger group - usually the upper or
|
||
|
lower house of a state legislature or Congress.
|
||
|
|
||
|
|
||
|
The following first outlines some political fundamentals, then offers nuts-
|
||
|
'n'-bolts details of how to apply networked computers to those fundamentals to
|
||
|
achieve citizen-based control over government.
|
||
|
|
||
|
|
||
|
FUNDAMENTAL ASSUMPTION
|
||
|
The body politic - when given (1) adequate information on which to base
|
||
|
informed decisions, (2) adequate time in which to fully consider the
|
||
|
information, and (3) the belief that its actions *can* make a difference -
|
||
|
*will* act for the common good, better than any single overseer or governing
|
||
|
body. The only alternative is a Master Class ruling subservient citizen-
|
||
|
serfs.
|
||
|
|
||
|
POLITICAL PLATITUDES
|
||
|
Government is force. (George Washington said it.)
|
||
|
Politics is persuasion. (I said it, though surely thousands have said it
|
||
|
before me.) Thus, political power is the power of persuasion - the power to
|
||
|
motivate others to do as you wish - company politics, community politics,
|
||
|
sexual politics, etc. This concerns governmental politics - using persuasion
|
||
|
to control government force.
|
||
|
|
||
|
Given that government imposes its will upon us all, it is absolutely justified
|
||
|
for any citizen - hoping to control his or her own destiny - to pursue maximum
|
||
|
political action, seeking to persuade as many others as possible to join
|
||
|
together in directing government.
|
||
|
It's also absolutely inescapable.
|
||
|
Politics is about persuading government decision-makers - singularly and in
|
||
|
globs - to use government force as it "should" be used, which of course, is
|
||
|
determined by the eye of the beholder.
|
||
|
It particularly concerns persuading constituents to direct their
|
||
|
representatives, and voters to replace unresponsive elected officials with
|
||
|
candidates who appear like they *will* be responsive, or - in the case of
|
||
|
ballot initiatives - to vote as they "should" vote on such measures.
|
||
|
|
||
|
MATH PREREQUISITE
|
||
|
Politics had its own "modern math" - memorized by every successful
|
||
|
politician. Example:
|
||
|
Most of the House of Representative's 535 Congressional Districts have
|
||
|
perhaps 560,000 population. But only about half of the population is
|
||
|
registered to vote - maybe 280,000 per District. And only about half to two-
|
||
|
thirds of those who are registered typically vote - 140,000 to about 180,000,
|
||
|
often identifiable by how recently they registered and the number and types of
|
||
|
recent elections in which they voted.
|
||
|
Naive potential activists might then think they need to persuade at least
|
||
|
half of about 160,000 voters to support their views - and promptly give up,
|
||
|
wheezing, "You can't fight city hall." Not so!
|
||
|
Most contested elections (with *numerous* exceptions) are won by a 5% to 10%
|
||
|
margin, or less - perhaps 7,000 to 18,000 of the typical number of actual
|
||
|
voters in a typical House race. And that's the backbone-dissolving hidden
|
||
|
horror haunting professional politicians:
|
||
|
*A single individual who can swing 35,000 to 9,000 voters from one side to
|
||
|
the opposite side can often control an election!*
|
||
|
Furthermore, the most-persuasive advocacy is by non-partisan citizens
|
||
|
contacting other citizens - for elections - or by groups of them to their
|
||
|
elected representative(s) - for government action. Politicians *know* how
|
||
|
powerful any single persuasive, tenacious citizen can be.
|
||
|
|
||
|
FURTHER POLITICAL PRAGMATICS
|
||
|
Elected officials enter and remain in the meat-grinder of public office for
|
||
|
some shifting combination of three rewards: ego to feel good, power to do
|
||
|
good, and salary+percs as compensation for difficult work - just like most
|
||
|
folks who hold jobs that they like. Ego, however, tends to play a *much*
|
||
|
bigger part than in most other jobs. Thus stroking it and flailing it can be
|
||
|
more persuasive in politics than in most other environs.
|
||
|
Excluding physical force, there are three approaches that are irresistibly
|
||
|
persuasive to elected officials:
|
||
|
* Praise and/or other rewards for desirable action,
|
||
|
* Criticism and/or other penalties for undesired action, and
|
||
|
* *Apparent* ability to *potentially* impact their ability to remain in the
|
||
|
elective offices from which all their rewards flow.
|
||
|
And the *belief* by an elected official that a citizen can deliver
|
||
|
significant support for or opposition to their re-election completely
|
||
|
overshadows the power of the first two rewards - including financial "rewards"
|
||
|
from lobbyists and special interests.
|
||
|
|
||
|
To emphasize: *The potential ability to sway only a few-thousand voters for
|
||
|
or against an elected official is the most persuasive tool in this nation's
|
||
|
real-world politics.*
|
||
|
And our interconnected thinkertoys massively-enhance citizens' personal
|
||
|
political power - as individuals, ignoring wealth (but requiring tenacity).
|
||
|
Here's tomorrow's grassroots political-action system, available now:
|
||
|
|
||
|
SYSTEM REQUIREMENTS
|
||
|
A user must have at least the following equipment:
|
||
|
* Desktop computer with a diskette or "large" hard disk (size hints, later),
|
||
|
* Modem, 2400-baud or higher and basic datacomm software, connected to a
|
||
|
residential-quality dial-up telephone or better (a fax-modem increases the
|
||
|
system's political power),
|
||
|
* Plain-paper, solid-character printer with a typewriter-style monofont;
|
||
|
laser-printer optional but preferred (color printer may be useful; dot-matrix
|
||
|
printers are harmful), and
|
||
|
* For state or federal action, a personal account on an Internet host is
|
||
|
essential, typically costing under $30/month.
|
||
|
That's all.
|
||
|
|
||
|
Caveat: Such equipment and connections should belong to an individual
|
||
|
citizen-activist and be used on their own time - protected by the First
|
||
|
Amendment's speech and assembly freedoms - or be owned and operated by a
|
||
|
registered political organization.
|
||
|
They'd best not belong to a school, nonprofit organization, business or
|
||
|
corporation nor operated during work-hours. Otherwise, they become "in-kind"
|
||
|
political contributions that may be prohibited or require disclosure in formal
|
||
|
campaign filings. (Incidentally, the same holds true for telephones, copying
|
||
|
machines, etc., used for political action - Beware!)
|
||
|
|
||
|
DATA REQUIREMENTS
|
||
|
The body politic must be able to communicate with itself; i.e., it must be
|
||
|
able to identify and locate its decision-makers - its voters.
|
||
|
A soapbox in Hyde Park is no longer sufficient for effective political
|
||
|
action. *Modern* activism, if it is to be significant, *requires* access to
|
||
|
voter-registration data in machine-readable form - at least names and mailing
|
||
|
addresses for the action's targeted area(s). These are almost-universally
|
||
|
available, usually at very low cost, though often only on 9-track dinosaur-
|
||
|
compatible magtape. (Beware! Some incumbent politicians and political
|
||
|
machines, that already have well-developed voter lists, want to severely
|
||
|
restrict such citizen access to the nation's most-powerful decision-makers,
|
||
|
the voters, in the name of privacy.)
|
||
|
It is *preferable* but not essential to also have computerized names,
|
||
|
addresses and fax numbers of broadcast and print news-media and reporters, and
|
||
|
of radio talk-show hosts, and for community organizations and businesses and
|
||
|
their leaders, and of elected officials and senior public administrators -
|
||
|
helpful but not essential.
|
||
|
|
||
|
OPERATOR SKILLS
|
||
|
Colonial times and the radio era required oratorical skills to be
|
||
|
politically effective; that excludes many of us. In the TV era, a pretty face
|
||
|
and svelte body are perhaps the most important political prerequisite; which
|
||
|
excludes most of us. In contrast, this citizen-action system is based on
|
||
|
content; not slick voice nor trite facade. Our computers are our Great
|
||
|
Equalizers. But we *do* need ability:
|
||
|
1. At least one person must be skilled in writing persuasive communications -
|
||
|
just as was essential in the times of Patrick Henry's electrifying pamphlets
|
||
|
and the anonymously-authored Federalist Papers.
|
||
|
2. Someone must have working knowledge of how the targeted real-world
|
||
|
political environment actually operates - local, state, federal, legislative,
|
||
|
executive, administrative, elective or regulatory, and so on.
|
||
|
3. One or several people need to be able to build and maintain simple
|
||
|
datafiles - most being rather small except for an area's voter-reg files,
|
||
|
which can still fit easily on a micro. E.g., something less than 800,000
|
||
|
voter-reg records for Silicon Valley's Santa Clara County take less than 275
|
||
|
megabytes in uncompressed fixed-field format.
|
||
|
3.5. Desktop-computer graphic-arts skills sufficient to create 8-1/2" x 11"
|
||
|
leaflet-copy about the advocacy subject may be useful.
|
||
|
|
||
|
There's one final prerequisite - *always* required for effective political
|
||
|
action: A monumental amount of time and personal tenacity. But, for this
|
||
|
system, it's only needed by one or a very few organizers or coordinators.
|
||
|
|
||
|
*NOT* REQUIRED
|
||
|
No powerful boss or dictatorial director is needed.
|
||
|
No traditional political organization is needed.
|
||
|
No large or established operation is needed.
|
||
|
No fatcats or big political bankrolls are needed. In fact, no one needs to
|
||
|
receive, have or control loot beyond pocket change - just enough to cover the
|
||
|
cost of net-connections and the above-noted equipment and data-files and their
|
||
|
use, as follows.
|
||
|
|
||
|
TUTORIAL FOR NEW USERS
|
||
|
Let's say the Awful Bill (e.g., the administration's anti-privacy/anti-
|
||
|
crypto bill) has been introduced in Congress, is to be heard by the Committee
|
||
|
on Stuff, and Rep. Gladhand is a key member of that committee - and you don't
|
||
|
live in Gladhand's District. So how can you - as a mere peon citizen - impact
|
||
|
Gladhand's vote or the committee's decision?
|
||
|
"Important" people have greatest sway over Gladhand's vote - especially
|
||
|
hustlers inside the Washington Beltway. Excluding them, individualized
|
||
|
letters and faxes might help (though only one of Gladhand's minor staff will
|
||
|
see 'em), phone calls are counted, and form letters and form postcards might
|
||
|
be better than nothing. So write Gladhand a one-page personal letter and make
|
||
|
sure it arrives no earlier than about a week before the hearing.
|
||
|
But a dribble of communications from outside of an elected official's
|
||
|
district is often ignored. Some legislators even instruct their staff to
|
||
|
discard anything from well-beyond their district.
|
||
|
So what else can you do to participate in *your* governance?
|
||
|
|
||
|
CITIZEN-TO-CITIZEN ADVOCACY
|
||
|
Throughout history and including today's mass-market Herding Era, citizen-
|
||
|
to-citizen personal advocacy has *always* been, by far, the most persuasive.
|
||
|
Even between strangers. Therefore:
|
||
|
Get the names and addresses of as many voters in Gladhand's district as you
|
||
|
are willing to contact by mail. Write to them as a concerned citizen, writing
|
||
|
to a fellow citizen who "should" be concerned. Seek to escalate their concern
|
||
|
to a level where *they* will contact *their* Representative, Gladhand - who
|
||
|
*will* be attentive to those voters' comments. Limit the letter to one page,
|
||
|
apparently-*typed*, addressed to the individual voter - possibly enclosing
|
||
|
several additional pages of supplementary information and references. *Don't*
|
||
|
use fancy fonts and graphics.
|
||
|
Unlike semi-useless form-letters to Gladhand directly, letters to voters in
|
||
|
Gladhand's turf can be fixed form, individualized only in their address and
|
||
|
personal signature (with ink that is clearly different from the printer's
|
||
|
black color).
|
||
|
Well-crafted letters to Gladhand's voters can prompt them to draft their own
|
||
|
individualized letters to their representative. Even though most addressees
|
||
|
won't actually contact their legislator, their awareness of the issue will be
|
||
|
escalated - and that's infectious. Gladhand *will* hear about it.
|
||
|
|
||
|
MAGNIFYING YOUR IMPACT
|
||
|
How can you further seek to shape your governance? Urge others to do as you
|
||
|
have done - everywhere; not just in Gladhand's district. The net's perfect
|
||
|
for it.
|
||
|
Offer copies of your form letter(s), supplementary information, and letter-
|
||
|
printing scripts for popular word-processors, by anonymous ftp [file transfer
|
||
|
protocol]. Encourage others to customize everything to their own style,
|
||
|
perspectives and concerns.
|
||
|
Use the nets to help coordinate this grassroots action: Obtain the full
|
||
|
voter-reg list for Gladhand's district. Offer to provide any desired quantity
|
||
|
of names and addresses of Gladhand's voters to those who are willing to
|
||
|
similarly-send some quantity of letters. When providing names, do nth-name
|
||
|
selection so as to spread the individual sender's letters widely across the
|
||
|
District.
|
||
|
Note that volunteers *always* do what they want to do, rather than what you
|
||
|
want them to do. Those who are cooperating in the action need to know what's
|
||
|
actually being sent and when it's really arriving. Therefore, include at
|
||
|
least one "seed"-name in each voter-list sent to a letter-emitting volunteer,
|
||
|
fully disclosing what you are doing and why. This will require having at
|
||
|
least one and preferably several cooperating addressees in the target District
|
||
|
who can feed back what they receive from whom, when.
|
||
|
Almost all of this can and should be fully disclosed - the best kind of
|
||
|
political action, an open grassroots effort.
|
||
|
|
||
|
PENETRATING COMMUNITIES
|
||
|
As you connect with supporters in or near Gladhand's district, also offer
|
||
|
them digital copies of handbills and door-stuffers that they can print on
|
||
|
their own laserprinters and post on local bulletin boards or distribute to
|
||
|
friends' and neighbors' message boxes (with the caution that stuffing U.S.
|
||
|
Snail Service boxes is ill-eagle).
|
||
|
Newspaper surveys typically report that the Letters-to-the-Editor column is
|
||
|
*the* most-widely read section of a newspaper! Suggest the topics, but not
|
||
|
the wording, for "Letters to the Editor" to local newspapers, along with lists
|
||
|
of their addresses and names of their Editorial-Page Editors. Even if the
|
||
|
letters aren't printed, a floodlette of them can stampede media interest among
|
||
|
herds of reporters and editors.
|
||
|
Do the same regarding radio talkshow hosts in Gladhand's turf.
|
||
|
If the issue is likely to be of interest to community organizations, offer
|
||
|
the same kinds of information organizations and their chair-creatures. Ditto
|
||
|
for local business leaders if the issue impacts business.
|
||
|
|
||
|
Back to Congress, these same techniques can be equally applied to all the
|
||
|
members of the Committee on Stuff - especially those who are leaning in the
|
||
|
"wrong" direction. (Voters are much more-likely to complain about their rep's
|
||
|
wrong-headedness, than to write letters supporting desired action.) And, by
|
||
|
the time the issue comes to a floor vote, you will have built a potent net-
|
||
|
based, computer-aided grassroots political-action volunteer-mob with which to
|
||
|
flog 50%+one of the legislative body.
|
||
|
Effective community action is never easy, but you no longer have to be
|
||
|
handsome, wear a tie, walk a precinct, nor subvert yourself to the dictates of
|
||
|
an established political organization in order to have a *potent* impact.
|
||
|
*Make waves!* Net-surf for Freedom!
|
||
|
|
||
|
JUST LIKE THE OL' DAYS
|
||
|
Neat, huh? This is akin to the last time a rag-tag minority of malcontents
|
||
|
revolted against "established leaders and proper authority."
|
||
|
Patrick's descendants will again draft inflammatory rhetoric, provoking the
|
||
|
disorganized but discontented colonists to act. Ben's descendants will again
|
||
|
crank up their household printing presses, leafleting friends and strangers
|
||
|
around the colonies. George's descendants will map their plans on digital
|
||
|
foolscap and coordinate volunteer MinutePersons with electronic carrier-
|
||
|
pigeons. And Paul's fleet-fingered descendants will again race around the
|
||
|
bumpy electronic roads, disturbing the peace with shouted warnings about the
|
||
|
royal efforts to resist the irresistable - *citizens*, once again voluntarily
|
||
|
acting in concert to regain control of their own destinies.
|
||
|
Mount up, folks. We have a heritage to honor.
|
||
|
|
||
|
|
||
|
|
||
|
"SELF-INFLATING PUFF-PIECE"
|
||
|
Warren [345 Swett Rd., Woodside CA 94062; (415)851-7075;
|
||
|
jwarren@well.sf.ca.us] led the 1993 citizen effort to make state legislation
|
||
|
and statutes freely available online, is now pushing for similar access to
|
||
|
campaign-finance disclosures, received the Electronic Frontier Foundation
|
||
|
first-year Pioneer Award and the Society of Professional Journalists-Northern
|
||
|
California James Madison Freedom-of-Information Award (1994). He founded
|
||
|
*InfoWorld*, was founding host of PBS' television's "Computer Chronicles,"
|
||
|
founding Editor of *Dr. Dobb's Journal* and has chaired various computer
|
||
|
organizations.
|
||
|
He began working as a programmer in 1968 after ten years teaching
|
||
|
mathematics, holds three graduate degrees and has taught computing at various
|
||
|
universities including Stanford.
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Wed, 16 Mar 1994 16:34:51 EST
|
||
|
From: CuD Moderators <cudigest@mindvox.phantom.com>
|
||
|
Subject: File 4--Gray Areas (Magazine) and The Computer underground
|
||
|
|
||
|
We've often recommended GRAY AREAS Magazine as a source of information
|
||
|
about the computer culture, "underground" and otherwise. The
|
||
|
magizine's eclecticism in the laters (Spring, 1994) issue includes
|
||
|
articles on Dead-heads and the law, an interview with an S&M
|
||
|
dominatrix, info on "smart drugs," and a section on U.S. prisons. But,
|
||
|
what caught our attention were a series of articles covering several
|
||
|
"underground" topics:
|
||
|
|
||
|
1) "Can Virus Writing become a Crime," by Paul G. Melka: Melka breaks
|
||
|
down virus writing into several parts and argues that ill-considered
|
||
|
laws against virus writing could severely undermine existing
|
||
|
individual freedom.
|
||
|
|
||
|
2) "Inside Today's Hacking Mind," by "Clacker:" The author dispairs
|
||
|
for the future of "hacking." No-brainer "hacking" software tools, the
|
||
|
retirement of older "hackers" and the delcine in competence of new
|
||
|
ones, over-developed egos, and tougher laws are changing the scene.
|
||
|
|
||
|
3) A "phone phreak" interview provides a description of one PP's
|
||
|
expriences and perspective.
|
||
|
|
||
|
4) Two reviews, one of PumpCon II, the other of HoHoCon '93, by Netta
|
||
|
Gilboa: Nice summary of both.
|
||
|
|
||
|
5) The most interesting of the batch of pieces is two separate
|
||
|
interviews with two "hackers" who cracked into The Well's system last
|
||
|
fall.
|
||
|
|
||
|
All in all, an excellent issue for those into "gray" cultures or
|
||
|
those who just want to know what's happening in them.
|
||
|
|
||
|
Gray Areas is on-line at: grayarea@well.sf.ca.us
|
||
|
|
||
|
Various subscription packages are available, all reasonably priced.
|
||
|
The cheapest is $18 for a four-issue one-year sub and $200 for a
|
||
|
lifetime sub. Contact:
|
||
|
|
||
|
Gray Areas, Inc.
|
||
|
Po Box 808
|
||
|
Broomall, PA 19008-0808
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
End of Computer Underground Digest #6.25
|
||
|
************************************
|
||
|
|