910 lines
39 KiB
Plaintext
910 lines
39 KiB
Plaintext
|
||
|
||
Computer underground Digest Tue Mar 17, 1992 Volume 4 : Issue 13
|
||
|
||
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
||
Associate Editor: Etaion Shrdlu
|
||
|
||
CONTENTS, #4.13 (Mar 17, 1992)
|
||
File 1--Some questions for the more informed....
|
||
File 2--Letters from Prison-Len Rose's final installment
|
||
File 3--Standing Up to Stop the Bells
|
||
File 4--Whistleblowers computer bulletin board extremely successful
|
||
|
||
Issues of CuD can be found in the Usenet alt.society.cu-digest news
|
||
group, on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG,
|
||
and DL0 and DL12 of TELECOM, on Genie, on the PC-EXEC BBS at (414)
|
||
789-4210, and by anonymous ftp from ftp.eff.org (192.88.144.4),
|
||
chsun1.spc.uchicago.edu, and ftp.ee.mu.oz.au. To use the U. of
|
||
Chicago email server, send mail with the subject "help" (without the
|
||
quotes) to archive-server@chsun1.spc.uchicago.edu.
|
||
European distributor: ComNet in Luxembourg BBS (++352) 466893.
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted as long as the source
|
||
is cited. Some authors do copyright their material, and they should
|
||
be contacted for reprint permission. It is assumed that non-personal
|
||
mail to the moderators may be reprinted unless otherwise specified.
|
||
Readers are encouraged to submit reasoned articles relating to
|
||
computer culture and communication. Articles are preferred to short
|
||
responses. Please avoid quoting previous posts unless absolutely
|
||
necessary.
|
||
|
||
DISCLAIMER: The views represented herein do not necessarily represent
|
||
the views of the moderators. Digest contributors assume all
|
||
responsibility for ensuring that articles submitted do not
|
||
violate copyright protections.
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
Date: Fri, 13 Mar 1992 17:31 EDT
|
||
From: "Led Go, You are hurding by node - The Elephants Child"@UNKNOWN.DOMAIN
|
||
Subject: File 1--Some questions for the more informed....
|
||
|
||
I've just finished reading Shockwave Rider, and am currently starting
|
||
to read Hackers. Does anyone have a single favorite reference, or
|
||
suggestion, I'm somewhat curious about the comment of borrowing from
|
||
the old hippies, in Shockwave Rider. There obviously may be some
|
||
socio-psychological type references that may be there somewhere. Does
|
||
anybody have any idea what Brunner was refering to there? It is an
|
||
obscure mention towards the very end of the book, where the discussion
|
||
of the far reaching web of the Precipice population, and its models
|
||
for survival. I myself, was growing up during the last years of the so
|
||
called hippie decade, so don't have much grasp on the time period.
|
||
|
||
Second:
|
||
|
||
After reading the rules of the Hacker Ethic, as outlined by Levy in
|
||
'Hackers', I have the following comment;
|
||
|
||
I agree that information should be freely available, but feel
|
||
somewhat that if I dig up the information, that anyone who wants it
|
||
from me should be willing to freely pay what I freely ask for in
|
||
exchange. They also have the right to not buy the information from me,
|
||
but to look for another broker. I also have that same right when I'm
|
||
looking for information. I'm strongly into capitolism, and thus am not
|
||
at all sure I like the Hacker Ethic as described by Levy about the
|
||
info should be free rule.
|
||
|
||
Replies, comments, accusations, etc. may be sent to
|
||
Atkinson@gems.vcu.edu.
|
||
|
||
------------------------------
|
||
|
||
Date: Wed Mar 4 18:17:21 1992
|
||
From: lenrose@ouddahere.com
|
||
Subject: File 2--Letters from Prison-Len Rose's final installment
|
||
|
||
((Moderators' note: Len Rose was incarcerated for unauthorized
|
||
possession of UNIX sourcecode, and has nearly completed his term in
|
||
federal prison in North Carolina. For those interested in the
|
||
background to this case, in which Len was considered by many to be a
|
||
victim of over-zealous prosecution and sentencing, a complete history,
|
||
including usenet posts, news articles, search and seizure warrant,
|
||
indictment, and other information is available in the Len.Rose file in
|
||
the CuD ftp archives. Len will return to Chicago on March 23, and
|
||
would appreciate any employment leads. Those wishing to contact him
|
||
may do so through CuD until he has a permanent address)).
|
||
|
||
++++++++++++
|
||
|
||
Greetings from Prison!
|
||
|
||
It has been a long time coming, but it looks like I will be leaving
|
||
here March 23, 1992. I never thought I would make it. I owe my survival
|
||
to a few people out there on the Net, and I will never forget what
|
||
they have done for me and my family. I have been able to keep myself
|
||
informed, reading CuD and occasional articles from the Net that have been
|
||
sent to me.
|
||
|
||
I am looking forward to working again, and perhaps with a lot of hard
|
||
work and diligence, I can once again own a home and work for myself. I
|
||
have been assigned to a halfway house in Chicago, and hope to obtain
|
||
some employment in the city (at least for 2 months). If I do not or
|
||
cannot otain work, they may not let me leave the halfway house on
|
||
weekends (to be with my family). So, if I have to, I will work at
|
||
McDonalds or clean floors.
|
||
|
||
I have no equipment left, so one of my first priorities will be
|
||
obtaining some. Hopefully, I will be able to purchase a used Unix
|
||
system and a decent modem. I will then be able to write code and work
|
||
on projects for clients. I have a lot to do and very little time to
|
||
accomplish it.
|
||
|
||
I also have much to be thankful for, and have a very good attitude
|
||
now. When I was going through the worst of it,I felt like it was
|
||
the end of the world, but now I know that it's only a temporary
|
||
setback. I have so much to be grateful for, and, thanks to the people
|
||
who have stood by me, I will be able to end up just as if it never
|
||
happened.
|
||
|
||
Nowadays, I am bouncing off the walls in anticipation of seeing my
|
||
wife and kids again. I haven't been able to see them while
|
||
incarcerated, because they couldn't afford to visit North Carolina
|
||
from Chicago, and I was never able to obtain a transfer to a closer
|
||
prison. However, I guess it will make the reunion that much sweeter.
|
||
Anyone who says that absence makes the heart row fonder is crazy. It
|
||
is the worst torture that can be conceived.
|
||
|
||
My leg has mended well enough to permit me to work at just about
|
||
anything. I usually walk 3 to 4 miles a day here trying to strengthen
|
||
it. Although I have nothing else to do but read and perhaps tutor
|
||
people who cannot read, I have managed to pass the time. That has been
|
||
my worst enemy here lately--boredom. Loneliness for the people I love
|
||
has been a major enemy from the beginning.
|
||
|
||
I hope to obtain an account on a system that is on the Internet so I
|
||
can re-establish some contacts. Once I am able to buy some used Unix
|
||
equipment, I will re-establish netsys.com and become a network site
|
||
again. I have so many things to do.
|
||
|
||
Obviously my family will be my primary concern. They are currently
|
||
receiving some public assistance, and let me tell you, no one can
|
||
survive on welfare. If not for a few people who cared, they would be
|
||
living on the street. I am no longer bitter. I have learned that there
|
||
are some decent folk who care, and all of ou who've helped me are
|
||
really something special. I just wanted you to know that. Most of you
|
||
read CuD, so if I never have the chance to speak to you, please
|
||
consider this a sincere thank you for what you've done.
|
||
|
||
Let's hear it for 1992. I have been dreaming of this moment for so
|
||
long, and I am anxious to begin my life again. Although I have two
|
||
months in a halfway house and then a three year probation to get
|
||
through, I know that I will be unstoppable. If I am left alone, and
|
||
am able to show the powers-that-be that I only wish to live my life, I
|
||
now that I will again be a success. Family and happiness are the only
|
||
things that matter. (And Unix too ((sigh)).
|
||
|
||
Well, if anyone has a job that I can do, I'd be very grateful. I like
|
||
to work hard and will do it right. I have a lot of catching up to do,
|
||
but feel sure that I can do so in a prompt manner.
|
||
|
||
Oh well. I have rambled enough. I look forward to meeting you all
|
||
again on the Net. Who knows? Maybe I will become famous for something
|
||
other than this....I certainly hope so.
|
||
|
||
Len Rose
|
||
|
||
------------------------------
|
||
|
||
Date: Fri, 13 Mar 1992 13:31:44 -0500
|
||
From: Craig Neidorf <kl@stormking.com>
|
||
Subject: File 3--Standing Up to Stop the Bells
|
||
|
||
Did you hear about 1-800-54-Privacy? Did you decide to call? I did
|
||
and the following is the information I received a few weeks later. It
|
||
outlines some of the serious ramifications of what is going to happen
|
||
if we do not actively support Congressional bills S 2112 and HR 3515.
|
||
|
||
The information comes from the American Newspaper Publisher's
|
||
Association (ANPA). Keep in mind, they have a vested financial
|
||
interest in information services as do many others, and in many ways,
|
||
the newspaper industry can be and has been just as dishonest and
|
||
deceptive as the Regional Bell Operating Companies. However, in this
|
||
particular situation, the ANPA has the right idea and does a pretty
|
||
good job in explaining why we need to act now and act fast.
|
||
|
||
You know who I am, and what I've been through. My experiences have
|
||
given me a unique perspective and insight into the methods and goals
|
||
of the Regional Bell Operating Companies. They are inherently
|
||
deceptive and if given even the slightest chance, they will screw the
|
||
consumer and engage in anti-competitive market practices.
|
||
Additionally, their tactics threaten our personal privacy as well.
|
||
|
||
The RBOCs must be stopped before its too late.
|
||
|
||
Craig Neidorf
|
||
kl@stormking.com
|
||
|
||
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
|
||
|
||
1-800-54-Privacy
|
||
444 N. Michigan Avenue
|
||
Suite 900
|
||
Chicago, Illinois 60611
|
||
|
||
|
||
February 14, 1992
|
||
|
||
|
||
Dear Consumer:
|
||
|
||
If you're like many people, you may have been hesitant about leaving
|
||
your name and address on our 1-800-54-PRIVACY phone line.
|
||
|
||
Why?
|
||
|
||
Quite simply, no one wants to give out information about themselves
|
||
without knowing exactly how that information is going to be used.
|
||
|
||
But the truth is, you reveal information about yourself EACH AND EVERY
|
||
TIME YOU PICK UP THE PHONE. By tracking who you call, how often you
|
||
call and how long each conversation lasts, the seven regional Bell
|
||
telephone companies have the capability to learn and know more about
|
||
you than even the IRS.
|
||
|
||
In fact, with modern computer technology, there is practically no
|
||
limit to what the Bells can learn about your personal life every time
|
||
you pick up the phone. And there is virtually no limit -- only one's
|
||
imagination -- to the ways they can take advantage of all the
|
||
information they glean.
|
||
|
||
Of course its one thing to have the capability to do this snooping.
|
||
It's another thing to have the incentive to actually do it.
|
||
|
||
Until October 7, 1991, the incentive just didn't exist for the Bells.
|
||
Prior to this date, the vast electronic networks of the Bell
|
||
monopolies were just neutral carriers of phone messages, data, and
|
||
other companies' fax, audiotex, and videotex services.
|
||
|
||
For example, when you last called a 1-900 or 1-800 line to get the
|
||
latest stock quotes, sports scores, or headlines, your local phone
|
||
company served simply as the pipeline for moving the billions of
|
||
electrons in your call. The company that provided you with the
|
||
information over the phone line was not -- and by law, could not be --
|
||
the phone company.
|
||
|
||
And that's the way things had been since 1984, when U.S. District
|
||
Court Judge Harold Greene issued his now-famous decree breaking up the
|
||
AT&T monopoly and spinning off control of local phone service to seven
|
||
regional Bell companies.
|
||
|
||
In the decree, the Court expressly prohibited the individual Bells
|
||
from entering three businesses -- cable TV, telephone manufacturing,
|
||
and electronic information services.
|
||
|
||
Why?
|
||
|
||
After presiding over the lengthy AT&T anti-trust case and being
|
||
exposed to hundreds upon hundreds of monopolistic abuses by AT&T,
|
||
Judge Greene's Court was firmly convinced that, if allowed to enter
|
||
any of these three current areas, the Bells would undoubtedly engage
|
||
in the same monopolistic behavior that characterized their former
|
||
parent.
|
||
|
||
In other words, while cutting off the hydra-like AT&T head, Judge
|
||
Greene was fearful that, given too much leeway, AT&T's seven so-called
|
||
"Baby Bell" off-spring might become equal or worse monsters
|
||
themselves.
|
||
|
||
From day one, however, the Bells undertook a long-term, multi-million
|
||
dollar lobbying campaign to fight Judge Greene's ruling and try to
|
||
convince the Justice Department, the higher courts, and even the U.S.
|
||
Congress that they should be permitted to enter the content end of the
|
||
information service business.
|
||
|
||
And, so, on October 7, 1991, after years of heavy lobbying, a higher
|
||
court came through for the Bells and practically ordered Judge Greene
|
||
to overturn his 1984 decree and open up the information services
|
||
industry to the Bells.
|
||
|
||
In the 71-page ruling, a very reluctant Judge Greene devoted
|
||
two-thirds of his decision to explaining why allowing the Bells to
|
||
sell information services was bad for consumers and bad for America.
|
||
|
||
For example, he went to great length to discount the Bells' claim
|
||
that, once given the green light, they would be better able to serve
|
||
the public than the thousands of already existing electronic
|
||
information services. To quote from his decision.
|
||
|
||
"In the first place, the contention that it will take the
|
||
Regional Companies (the Bells) to provide better information
|
||
services to the American public can only be described as
|
||
preposterous."
|
||
|
||
Judge Green also wrote:
|
||
|
||
"Moreover, the Court considers the claim that the Regional
|
||
Companies' entry into information services would usher in an era
|
||
of sophisticated information services available to all as so much
|
||
hype."
|
||
|
||
His decision also contains a warning regarding the prices consumers will be
|
||
forced to pay for Bell-provided services:
|
||
|
||
"The Regional Companies would be able to raise price by increasing
|
||
their competitors' costs, and they could raise such costs by virtue
|
||
of the dependence of their rivals' information services on local
|
||
network access."
|
||
|
||
Finally, here's what Judge Greene had to say about his court's
|
||
decision and the public good:
|
||
|
||
"Were the Court free to exercise its own judgment, it would
|
||
conclude without hesitation that removal of the information
|
||
services restriction is incompatible with the decree and the
|
||
public interest."
|
||
|
||
If Judge Greene's warnings as well as his profound reluctance to issue
|
||
this ruling scare you, they should.
|
||
|
||
That's because the newly freed Bells now have the incentive, which
|
||
they never had before, to engage in the anti-competitive,
|
||
anti-consumer practices that Judge Greene feared.
|
||
|
||
Besides using your calling records to sell you information services
|
||
they think you're predisposed to buy, the Bell's may well try to
|
||
auction off your phone records to the highest bidder.
|
||
|
||
As a result, anyone who ever uses a phone could well be a potential
|
||
victim of the Bell's abuse.
|
||
|
||
Consider the simple act of making a telephone call to an auto repair
|
||
shop to schedule body work or a tune-up. By knowing that you made
|
||
that call, your phone company might conclude that you're in the market
|
||
for a new car and sell your name to local car dealers.
|
||
|
||
Another example. Think about calling a real estate broker for
|
||
information on mortgage rates. Knowing you must be in the market for
|
||
a house, the Bells could sell your name to other brokers. Or they
|
||
could try to sell you their own electronic mortgage rate service.
|
||
|
||
Now let's say you and your spouse are having some problems and one of
|
||
you calls a marriage counselor. Tipped off by information purchased
|
||
from the phone company, a divorce lawyer shows up on your doorstep the
|
||
next morning.
|
||
|
||
Finally, think about calling your favorite weather service hotline --
|
||
a competitor to the weather service operated by your local phone
|
||
company. By keeping track of people who use its competitor's service,
|
||
the phone company might just try to get you to buy its weather service
|
||
instead.
|
||
|
||
Far-fetched? Not at all.
|
||
|
||
Nefarious? You bet.
|
||
|
||
That doesn't mean that, starting tomorrow, your phone company is going
|
||
to start tracking who you call, how long your calls last, and who
|
||
calls you. However, they could do it if that wanted to. And, based
|
||
on past experience, some of them probably will do so at one point or
|
||
another.
|
||
|
||
That's because the protest of gaining an unfair edge over the
|
||
competition --companies that have no choice but to depend upon the
|
||
Bells wires -- is just too tantalizing a temptation for the Bells to
|
||
ignore.
|
||
|
||
As you might expect, the Bells claim that these fears are totally
|
||
unfounded and that strict regulations are in place to prevent them
|
||
from abusing your telephone privacy.
|
||
|
||
However, there simply aren't enough regulators in the world to control
|
||
the monopolistic tendencies and practices of the Bells. Every single
|
||
one of the seven Bells has already abused its position as a regulated
|
||
monopoly. There is no reason to believe they won't in the future.
|
||
|
||
For example, the Georgia Public Service Commission recently found that
|
||
BellSouth had abused its monopoly position in promoting its MemoryCall
|
||
voice mail system. Apparently, operators would try to sell MemoryCall
|
||
when customers called to arrange for hook-up to competitors'
|
||
voice-mail services. Likewise, while on service calls, BellSouth
|
||
repair personnel would try to sell MemoryCall to people using
|
||
competitors' systems. BellSouth even used competitors' orders for
|
||
network features as sales leads to steal customers.
|
||
|
||
In February 1991, US West admitted it had violated the law by
|
||
providing prohibited information services, by designing and selling
|
||
telecommunications equipment and by discriminating against a
|
||
competitor. The Justice Department imposed a $10 million fine -- 10
|
||
times larger than the largest fine imposed in any previous anti-trust
|
||
division contempt case.
|
||
|
||
In February 1990, the Federal Communications Commission found that one
|
||
of Nynex's subsidiaries systematically overcharged another Nynex
|
||
company $118 million for goods and services and passed that extra cost
|
||
on to ratepayers.
|
||
|
||
The abuses go on and on.
|
||
|
||
In this brave new world, however, it's just not consumers who will
|
||
suffer. Besides invading your privacy, the Bells could abuse their
|
||
position as monopolies to destroy the wide range of useful information
|
||
services already available
|
||
|
||
Right now, there are some 12,000 information services providing
|
||
valuable news, information, and entertainment to millions of
|
||
consumers. Every one of these services depends on lines owned and
|
||
controlled by Bell monopolies.
|
||
|
||
This makes fair competition with the Bells impossible.
|
||
|
||
It would be like saying that Domino's Pizzas could only be delivered
|
||
by Pizza Hut.
|
||
|
||
It would be like asking a rival to deliver a love note to your
|
||
sweetheart.
|
||
|
||
It would be a disaster.
|
||
|
||
If the Bells aren't stopped, they will make it difficult -- if not
|
||
impossible -- for competitors to use Bell wires to enter your home.
|
||
|
||
They could deny competitors the latest technological advances and
|
||
delay the introduction of new features. They could even undercut
|
||
competitor's prices by inflating local phone bills to finance the cost
|
||
of their own new information services.
|
||
|
||
In the end, the Bells could drive other information services out of
|
||
business, thereby dictating every bit of information you receive and
|
||
depriving the American public out of the diversity of information
|
||
sources it deserves and that our form of government demands.
|
||
|
||
Can something be done to stop the Bells?
|
||
|
||
Yes, absolutely.
|
||
|
||
You can take several immediate steps to register your views on this
|
||
issue. Those steps are described in the attached "Action Guidelines"
|
||
sheet. Please act right away.
|
||
|
||
In the meantime on behalf of our growing coalition of consumer groups,
|
||
information services providers, and newspapers, thank you for your
|
||
interest in
|
||
this important issue.
|
||
|
||
Sincerely,
|
||
|
||
Cathleen Black
|
||
President and Chief Executive Officer
|
||
American Newspaper Publishers Association
|
||
|
||
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
|
||
|
||
ACTION GUIDELINES
|
||
|
||
Something is very wrong when a monopoly is put into the position where
|
||
it can abuse your privacy, drive competitors from the market, and even
|
||
force you, the captive telephone ratepayer, to subsidize the costs of
|
||
new information services ventures.
|
||
|
||
Can something be done to stop this potential abuse?
|
||
|
||
Absolutely.
|
||
|
||
WHAT YOU CAN DO. The first step is to call or write your local
|
||
telephone company to assert your right to privacy.
|
||
|
||
The second step is to write your U.S. Representative and U.S. Senators
|
||
and urge them to support House bill 3515 and Senate bill 2112.
|
||
|
||
Since the purpose of both HR 3515 and S 2112 is to prevent the Bells
|
||
from abusing their monopoly position, not to prevent legitimate
|
||
competition, the Bells would be free to sell information services in
|
||
any area of the country where they do not have a monopoly -- in other
|
||
words, 6/7 of the country.
|
||
|
||
However, the bills would delay entry of the Bell companies into the
|
||
information services industry in their own regions until they no
|
||
longer held a monopoly over local phone service. As soon as consumers
|
||
were offered a real choice in local phone service -- whether it be
|
||
cellular phones, satellite communications, or other new technology --
|
||
the Bells would be free to offer any information services they wanted.
|
||
|
||
Both bills are fair to everyone. They protect consumer privacy and
|
||
ensure that the thriving information services industry will remain
|
||
competitive.
|
||
|
||
Quick action is need to pass these bills. A hand-written letter
|
||
stating your views is the most effective way of reaching elected
|
||
officials. It is proof positive that you are deeply concerned about
|
||
the issue.
|
||
|
||
|
||
POINTS TO MAKE IN YOUR LETTER
|
||
|
||
You may wish to use some or all of the following points:
|
||
|
||
A phone call should be a personal and private thing -- not a
|
||
sales marketing tool for the phone company.
|
||
|
||
The Bells should not be allowed to take unfair advantage of
|
||
information they can obtain about you by virtue of owning and
|
||
controlling the wires that come into homes.
|
||
|
||
The Bells must not be allowed to abuse their position as
|
||
monopolies to drive existing information services out of
|
||
business.
|
||
|
||
The Bells should not be permitted to engage in activities that
|
||
would deprive Americans of the information diversity they deserve
|
||
and that our form of government demands.
|
||
|
||
The Bells should not be permitted to finance information services
|
||
ventures by inflating the phone bills of captive telephone
|
||
ratepayers.
|
||
|
||
|
||
AFTER YOU'VE WRITTEN YOUR LETTER
|
||
|
||
After you've written your letter or made your phone call, please send
|
||
us a letter and tell us. By sending us your name and address, you'll
|
||
receive occasional updates on the massive effort underway to prevent
|
||
the Bells from invading your privacy and turning into the monopolistic
|
||
monsters that Judge Greene warned about.
|
||
|
||
There's one more thing you can do. Please ask your friends,
|
||
relatives, neighbors, and co-workers to urge their U.S.
|
||
Representatives and Senators to support HR 3515 and S 2112. We need
|
||
everyone's help if we're going to stop the Bells.
|
||
|
||
1-800-54-PRIVACY
|
||
444 N. Michigan Avenue
|
||
Suite #900
|
||
Chicago, Illinois 60611
|
||
|
||
------------------------------
|
||
|
||
Date: Fri, 6 Mar 92 15:29 GMT
|
||
From: Jean-Bernard Condat <0005013469@MCIMAIL.COM>
|
||
Subject: File 4--Whistleblowers computer bulletin board extremely successful
|
||
|
||
|
||
Whistleblowers computer bulletin board extremely successful
|
||
|
||
Whistle-blowers may now anonymously report government fraud, waste,
|
||
and abuse via computer to the House Government Operations subcommittee
|
||
on Government Information, Justice, and Agriculture. The number for
|
||
the computer system, which will accept files and messages, is (202)
|
||
225-5527. Aliases are permitted.
|
||
|
||
The Truelson' PhD published in 1986, draws upon the theoretical
|
||
framework of systemic corruption--an organized conspiracy to suppress
|
||
revelation of corrupt practices--to propose a retaliation model to
|
||
account for organizational retaliation against whistleblowers with
|
||
legitimate protests. This study is one basis of this uncredible
|
||
bulletin board.
|
||
|
||
House Government Information Subcommittee's whistleblower computer
|
||
BBS has been "tremendously successful" and has generated about "50
|
||
substantive leads" in its two months of operation, Subcommittee Chief
|
||
Counsel Robert Gellman said. Board has received 700-800 calls, many
|
||
from curious browsers who want to see what's available and others who
|
||
want to discuss policy
|
||
matters.
|
||
|
||
But Gellman said board was designed solely to allow whistle-blowers to
|
||
post private notes to alert Subcommittee to instances of waste, fraud and
|
||
abuse, so there isn't much for anyone else to see. There are no files
|
||
available to download or bulletin to read, as there are on most bulletin
|
||
boards. Gellman said message senders often don't use their real names,
|
||
and Subcommittee staff has used electronic mail feature to send message
|
||
back asking for more information.
|
||
|
||
|
||
REFERENCES
|
||
|
||
1. Food Chemical News, December 16, 1991, ISSN 0015-6337;
|
||
|
||
2. Judith Anne Truelson, "Blowing the Whistle on systemic Corruption,"
|
||
University of Southern California (Los Angeles, CA), 1986;
|
||
|
||
3. Communications Daily, February 13, 1992, ISSN 0277-0679.
|
||
|
||
++++ (A SAMPLE) ++++
|
||
|
||
ON-LINE SEARCHING
|
||
|
||
Welcome to
|
||
|
||
THE FEDERAL WHISTLEBLOWER BBS
|
||
|
||
This bulletin board exists to help the United States Congress identify
|
||
waste, fraud, and abuse in the federal government. You are invited to
|
||
leave messages or upload files that relate to this purpose. There are no
|
||
public files or public messages on this board.
|
||
|
||
Your SYSOP is Congressman Bob Wise from West Virginia.
|
||
|
||
The CONTENTS of all communications are confidential and not accessible to
|
||
other users. However, the name you use to sign on may be visible to
|
||
other users. If this is a concern, please use a pseudonym to protect
|
||
your identity.
|
||
|
||
|
||
What is your FIRST name (pseudonyms okay)? JONES JOHN
|
||
|
||
Checking Users...
|
||
User not found
|
||
Are you 'JONES JOHN' ([Y],N)? Y
|
||
What is your STATE (any entry acceptable)? LYON IN FRANCE
|
||
Welcome to the FEDERAL WHISTLEBLOWER BULLETIN BOARD.
|
||
|
||
This Board is operated by an investigative subcommittee in the U.S. House
|
||
of Representatives.
|
||
|
||
Your SYSOP is Congressman Bob Wise from West Virginia.
|
||
|
||
GROUND RULES:
|
||
|
||
1. There are NO public files and NO public messages on this board.
|
||
If you are looking for downloads, games, etc., you won't find them here.
|
||
|
||
2. If you have a concern about protecting your identity, please use
|
||
a pseudonym. Because of software limitations, the name you use to sign
|
||
on with may become known to others. You may leave your real name in the
|
||
contents of a message, but this is not required. THE CONTENTS OF
|
||
MESSAGES CAN ONLY BE READ BY THE SYSOP. Messages cannot be read by any
|
||
other user. Use the Comment command to leave messages to the Sysop.
|
||
|
||
JONES JOHN from LYON IN FRANCE
|
||
C)hange FIRST name (pseudonyms okay)/LAST name (pseudonyms okay)/STATE (any
|
||
ent
|
||
ry acceptable), D)isconnect, [R]egister? R
|
||
Enter PASSWORD you'll use to logon again (dots echo)? ....
|
||
Re-Enter password for Verification (dots echo)? ....
|
||
Please REMEMBER your password
|
||
Welcome to RBBS-PC, Condat. You have 60 mins for this session.
|
||
Logging JONES JOHN
|
||
RBBS-PC 17.3C Node 1, operating at 1200 BAUD,N,8,1
|
||
|
||
+--------------------------------------------------+
|
||
| Welcome to the FEDERAL WHISTLEBLOWER BBS |
|
||
+--------------------------------------------------+
|
||
Your SYSOP is Congressman Bob Wise
|
||
BBS Phone: (202) 225-5527
|
||
|
||
REMINDERS:
|
||
|
||
1) Remember your password. If you forget it, you can't read
|
||
your mail and we can't contact you.
|
||
|
||
2) Use mixed case in messages. ALL UPPER CASE IS HARD TO READ.
|
||
|
||
3) If you upload a file, please leave a message so we know who
|
||
provided it. If you don't, the upload will not be acknowledged.
|
||
This is NOT a requirement. Anonymous uploads are acceptable.
|
||
|
||
4) Callers may be deleted after 30 days. If this happens to you,
|
||
just register again. It only takes a second.
|
||
|
||
Checking messages in MAIN..
|
||
Sorry, JONES, No NEW mail for you
|
||
|
||
RBBS-PC 17.3C Node 1
|
||
|
||
Caller # 1279 # active msgs: 74 Next msg # 539
|
||
|
||
------*>>> RBBS-PC MAIN MENU <<<*------
|
||
----- MAIL ---------- SYSTEM ---------- UTILITIES ------ ELSEWHERE ---
|
||
|
||
[R]ead Mail to Me [B]ulletins [H]elp (or ?) [F]iles
|
||
[C]omment to SYSOP [I]nitial Welcome [X]pert on/off [G]oodbye
|
||
[Q]uit
|
||
[U]tilities
|
||
|
||
*----------------------------------------------------------------
|
||
Current time: 09:38 AM Minutes remaining: 58 Security: 5
|
||
*----------------------------------------------------------------
|
||
MAIN: 58 min left
|
||
MAIN command <?,B,C,F,G,H,I,K,Q,R,U,X>? B
|
||
|
||
* Ctrl-K(^K) / ^X aborts. ^S suspends ^Q resumes *
|
||
======[ WHISTLEBLOWER BBS Bulletin Menu ]=======
|
||
|
||
Bulletin Description
|
||
*----- -------------------------------------
|
||
1 Description and Purpose of this Board
|
||
2 Upload and Download Policies (NO DOWNLOADS!)
|
||
3 Operating Policies
|
||
4 How to Blow the Whistle
|
||
|
||
Read what bulletin(s), L)ist, S)ince, N)ews ([ENTER] = none)? 3
|
||
|
||
* Ctrl-K(^K) / ^X aborts. ^S suspends ^Q resumes *
|
||
THE WHISTLEBLOWER BBS: OPERATING POLICIES
|
||
|
||
1. The highest priority on this bulletin board is protecting the
|
||
confidentiality of callers. A caller concerned about confidentiality
|
||
should use a pseudonym.
|
||
|
||
2. There is no Caller-ID service on the bulletin board's incoming
|
||
line. Incoming calls are not traced. Each caller must consider the
|
||
possibility that a call to this board is being recorded or traced at the
|
||
source of the call.
|
||
|
||
3. The Whistleblower BBS is operated by an investigative subcommittee
|
||
in the United States House of Representatives. The purpose of the board is
|
||
to assist the Congress in identifying waste, fraud, and abuse in federal
|
||
agencies, programs, contracts, and grants. No action will be taken on any
|
||
information that does not further this purpose.
|
||
|
||
4. A higher priority will be assigned to matters that involve large
|
||
amounts of federal funds or that affect health or safety. Other matters
|
||
may be pursued to the extent permitted by available resources.
|
||
|
||
5. We cannot provide any type of general assistance to callers. The
|
||
board should not be used for any political purpose or to lobby Congress on
|
||
legislative or policy matters.
|
||
|
||
6. Messages that relate to the purpose of the board will be
|
||
acknowledged. A caller who provides an investigative lead is encouraged to
|
||
call back in the event more information is required. Messages that do not
|
||
relate to the purpose of the board may not be acknowledged. Most messages
|
||
will be erased after they are read.
|
||
|
||
7. General information about investigations that result from
|
||
activities on the Whistleblower BBS may be made public, although no
|
||
information specifically identifying an individual caller will be released.
|
||
Publicity for the board will help to accomplish its purpose. However, a
|
||
caller will not necessarily be informed about the details of any
|
||
investigation that results from his or her message.
|
||
|
||
8. Information obtained on the Whistleblower BBS may be shared with
|
||
other congressional investigators, agency Inspectors General, and the
|
||
General Accounting Office (the audit arm of Congress). INFORMATION THAT
|
||
SPECIFICALLY IDENTIFIES CALLERS WILL NOT BE SHARED. Callers should
|
||
identify any special confidentiality concerns or expressly state if they
|
||
need to place any specific restrictions on the use of the information that
|
||
they provide. Information will not be shared if a caller specifically
|
||
requests.
|
||
|
||
9. Casual visitors to the board may be deleted from the user base at
|
||
any time. If you call a second time and find that you are not recognized,
|
||
just re-register. It only takes a few seconds. Users not engaged in
|
||
current discussions may also be deleted as a security precaution.
|
||
|
||
10. Text files may be uploaded, preferably in ASCII format. Word
|
||
Perfect format is a second choice. Files may be compressed using standard
|
||
compression programs. Files other than text files will be immediately
|
||
deleted.
|
||
|
||
11. If you attempt to use a common pseudonym (e.g., John Doe), you may
|
||
find that it is already in use. When you first enter a name not in use,
|
||
you will receive a message about the board. If you enter a name that is
|
||
known to the board, you will be asked for a password. If this happens, you
|
||
must hang up, call again, and use a different name. Anyone reading this
|
||
has already solved the problem. This paragraph is included as an
|
||
explanation.
|
||
* Ctrl-K(^K) / ^X aborts. ^S suspends ^Q resumes *
|
||
======[ WHISTLEBLOWER BBS Bulletin Menu ]=======
|
||
|
||
Bulletin Description
|
||
*----- -------------------------------------
|
||
1 Description and Purpose of this Board
|
||
2 Upload and Download Policies (NO DOWNLOADS!)
|
||
3 Operating Policies
|
||
4 How to Blow the Whistle
|
||
|
||
Read what bulletin(s), L)ist, S)ince, N)ews ([ENTER] = none)? 4
|
||
|
||
* Ctrl-K(^K) / ^X aborts. ^S suspends ^Q resumes *
|
||
THE WHISTLEBLOWER BBS
|
||
|
||
How to Blow the Whistle on Fraud, Waste, and Abuse
|
||
|
||
1. You do NOT have to give your name or identify yourself in any way.
|
||
But you should call again after you have left a message. Use the same name
|
||
you used the first time and see if there is an answer for you. Use the
|
||
READ MAIL TO ME command. This permits continuing communications so that we
|
||
can ask you for more information or clarification. Allow a few days for
|
||
your message to be read.
|
||
|
||
2. Remember that we are more interested in conduct involving
|
||
SIGNIFICANT amounts of federal funds or MAJOR instances of wrongdoing. We
|
||
have limited resources, and we are less likely to investigate minor
|
||
matters. When in doubt, we encourage you to report the matter and let us
|
||
decide.
|
||
|
||
3. Provide enough information so we can find and investigate the
|
||
objectionable activity. Whenever possible, tell us WHO, WHAT, WHERE, WHEN,
|
||
WHY, and HOW. Be as specific as possible.
|
||
|
||
4. WHO: Identify the agency, office, program, contract, or grant:
|
||
|
||
Vague: ABC Department
|
||
Okay: ABC Department, Z Bureau
|
||
Good: ABC Department, Z Bureau, Denver Office
|
||
Better: ABC Department, Z Bureau, Denver Office, Contract
|
||
Number 123-456 dated 2/1/89
|
||
|
||
5. WHAT: Describe the conduct:
|
||
|
||
Vague: Wasted Money
|
||
Okay: Bought unnecessary computers
|
||
Good: Bought 200 Personal Computers to use funds at the
|
||
end of the fiscal year
|
||
Better: John Smith authorized the purchase of 200 unneeded
|
||
PCs under contract 123-456 on 9/30/91 to avoid
|
||
returning excess funds to the Treasury
|
||
|
||
6. WHERE: State where the activity occurred:
|
||
|
||
Vague: Unnecessary travel
|
||
Okay: Trips to Los Angeles
|
||
Good: Trips from Headquarters to Los Angeles
|
||
Better: John Smith authorized travel for himself from
|
||
Chicago to Los Angeles every Friday before the
|
||
UCLA football team played a game at home so he
|
||
could watch the game
|
||
|
||
7. WHEN: Provide all relevant dates:
|
||
|
||
Vague: Last year
|
||
Okay: 1990
|
||
Good: Starting in May 1990
|
||
Better: Began on May 5, 1990, continued every other week
|
||
until December 14, 1991
|
||
|
||
8. WHY and HOW: Explain the conduct involved:
|
||
|
||
Vague: Broke the law
|
||
Okay: Did not follow procurement rules
|
||
Good: Failed to obtain sole-source contracting authority
|
||
Better: Procured 1000 buses from ABC Corp. under contract
|
||
number 123-456, on 5/1/90, under a sole source
|
||
contract that was not approved by the contracting
|
||
officer.
|
||
|
||
* Ctrl-K(^K) / ^X aborts. ^S suspends ^Q resumes *
|
||
======[ WHISTLEBLOWER BBS Bulletin Menu ]=======
|
||
|
||
Bulletin Description
|
||
*----- -------------------------------------
|
||
1 Description and Purpose of this Board
|
||
2 Upload and Download Policies (NO DOWNLOADS!)
|
||
3 Operating Policies
|
||
4 How to Blow the Whistle
|
||
|
||
Read what bulletin(s), L)ist, S)ince, N)ews ([ENTER] = none)?
|
||
|
||
------*>>> RBBS-PC MAIN MENU <<<*------
|
||
*-- MAIL ---------- SYSTEM ---------- UTILITIES ------ ELSEWHERE ---
|
||
|
||
[R]ead Mail to Me [B]ulletins [H]elp (or ?) [F]iles
|
||
[C]omment to SYSOP [I]nitial Welcome [X]pert on/off [G]oodbye
|
||
[Q]uit
|
||
[U]tilities
|
||
|
||
*------------------------------------------------------------------
|
||
Current time: 09:41 AM Minutes remaining: 55 Security: 5
|
||
*------------------------------------------------------------------
|
||
MAIN: 55 min left
|
||
MAIN command <?,B,C,F,G,H,I,K,Q,R,U,X>? C
|
||
|
||
Type comment 60 lines max (Press [ENTER] to quit)
|
||
|
||
[----------------------------------------------------------------------]
|
||
1: Hallo!
|
||
2: I am a French journalist and will be very please to receive a press
|
||
3: information on this curious BBS.
|
||
4: My e-mail address is MCI Mail #501-3469 or DialMail #24064
|
||
5: Don't hesitate to contact me.
|
||
6: Jean-Bernard Condat
|
||
7: CCCF, B.P. 8005, 69351 Lyon Cedex 08, France (Fax.: +33 1 47877070)
|
||
8:
|
||
|
||
A)bort, C)ontinue adding, D)elete lines, E)dit a line
|
||
I)nsert lines, L)ist, M)argin change, R)evise subj, S)ave msg, ?)help
|
||
Edit Sub-function <A,C,D,E,I,L,M,R,S,?>? s
|
||
Adding new msg # 539.
|
||
Receiver will be notified of new mail
|
||
|
||
------*>>> RBBS-PC MAIN MENU <<<*------
|
||
*-- MAIL ---------- SYSTEM ---------- UTILITIES ------ ELSEWHERE ---
|
||
|
||
[R]ead Mail to Me [B]ulletins [H]elp (or ?) [F]iles
|
||
[C]omment to SYSOP [I]nitial Welcome [X]pert on/off [G]oodbye
|
||
[Q]uit
|
||
[U]tilities
|
||
|
||
*----------------------------------------------------------------
|
||
Current time: 09:43 AM Minutes remaining: 53 Security: 5
|
||
*-----------------------------------------------------------------
|
||
MAIN: 53 min left
|
||
MAIN command <?,B,C,F,G,H,I,K,Q,R,U,X>? g
|
||
Log off (Y,[N])? y
|
||
|
||
Now: 03-06-1992 at 09:43:54
|
||
On for 7 mins, 5 secs
|
||
60 min left for next call today
|
||
JONES, Thanks and please call again!
|
||
|
||
------------------------------
|
||
|
||
End of Computer Underground Digest #4.13
|
||
************************************
|
||
|
||
|
||
|