844 lines
40 KiB
Plaintext
844 lines
40 KiB
Plaintext
|
||
|
||
Computer underground Digest Sun Aug 2, 1992 Volume 4 : Issue 34
|
||
|
||
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
||
Copy Editor: Etaion Shrdlu, III
|
||
Archivist: Brendan Kehoe
|
||
Shadow-Archivist: Dan Carosone
|
||
|
||
CONTENTS, #4.34 (Aug 2, 1992)
|
||
File 1--Day (in court) of The Dead
|
||
File 2--Re: 2600 and Bellcore flap
|
||
File 3--Another View of Bellcore vs. 2600
|
||
File 4--New 2600 and 2600 Meetings
|
||
File 5--Is Bellcore Guilty of Stealing Copyright Information?
|
||
File 6--Update on Len Rose
|
||
File 7--Biblio resource: "Computer Crime" Handbook
|
||
File 8--Dr Ripco Summarizes his Legal Status since Sun Devil
|
||
File 9--Documents Available: Open Platform Overview, Life in Virtual
|
||
File 10--CPSR Recommends NREN Privacy Principles
|
||
File 11--Biblio resource: "Computer Crime" Handbook
|
||
File 12--Updated CPSR Archive Listing
|
||
|
||
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
||
available at no cost from tk0jut2@mvs.cso.niu.edu. The editors may be
|
||
contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at:
|
||
Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115.
|
||
Issues of CuD can also be found in the Usenet alt.society.cu-digest
|
||
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
||
LAWSIG, and DL0 and DL12 of TELECOM; on Genie in the PF*NPC RT
|
||
libraries; from America Online in the PC Telecom forum under
|
||
"computing newsletters;" on the PC-EXEC BBS at (414) 789-4210; and by
|
||
anonymous ftp from ftp.eff.org (192.88.144.4) and ftp.ee.mu.oz.au
|
||
European distributor: ComNet in Luxembourg BBS (++352) 466893.
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted as long as the source
|
||
is cited. Some authors do copyright their material, and they should
|
||
be contacted for reprint permission. It is assumed that non-personal
|
||
mail to the moderators may be reprinted unless otherwise specified.
|
||
Readers are encouraged to submit reasoned articles relating to
|
||
computer culture and communication. Articles are preferred to short
|
||
responses. Please avoid quoting previous posts unless absolutely
|
||
necessary.
|
||
|
||
DISCLAIMER: The views represented herein do not necessarily represent
|
||
the views of the moderators. Digest contributors assume all
|
||
responsibility for ensuring that articles submitted do not
|
||
violate copyright protections.
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
Date: Sun, 26 Jul 92 2:33:02 CDT
|
||
From: bei@DOGFACE.AUSTIN.TX.US(Bob Izenberg)
|
||
Subject: File 1--Day (in court) of The Dead
|
||
|
||
>From:
|
||
Bandit, Shylock and Trackshoes
|
||
A Kinda Professional Corporation
|
||
|
||
>To:
|
||
Homo Sapiens
|
||
|
||
Dear Infringing Species,
|
||
|
||
It has come to our attention that you have been utilizing anatomical
|
||
developments pioneered by several of our clients, the dinosaurs, in your
|
||
everyday activities. This letter is to notify you that the dinosaurs
|
||
consider these features to be an infringement of dinosaur development,
|
||
which has been a documented fact in the scientific community for decades.
|
||
Said features are proprietary to the dinosaurs, and their duplication
|
||
represents a substantial harm to the saurian reputation and ability to
|
||
survive and thrive in a challenging evolutionary climate.
|
||
This letter is to formally advise you that the process of bipedal locomotion,
|
||
hereafter called "walking", is an activity the dinosaurs are prepared to
|
||
demonstrate that they have employed for thousands of years. Continued
|
||
use of your legs for locomotion on land will be considered actionable. In
|
||
addition, any evolutionary developments that you may have reason to believe
|
||
were first present in the dinosaurs must no longer be used by your species.
|
||
This includes all digestive and reproductive organs, and much of your
|
||
circulatory system. The dinosaurs will vigorously defend their hard-won
|
||
evolutionary developments by any and all means available to them, including
|
||
but not limited to injunctive relief, monetary damages, and gobbling alive,
|
||
against all members of your species and any evolutionary descendants.
|
||
We trust that you fully understand the dinosaur position on this matter.
|
||
|
||
Sincerely,
|
||
|
||
BB/file
|
||
|
||
Before you dismiss the imaginary letter above as completely without
|
||
relevance, consider the Bellcore letter to the editor of 2600 magazine that
|
||
was recently reprinted in these virtual pages. Also consider the early
|
||
snarls from AT&T lawyers directed at the authors of the BSD NET2 software
|
||
distribution. Those authors, you see, have written something much like the
|
||
UNIX operating system that AT&T markets, and have made the source code for
|
||
it available for one-tenth the cost of AT&T's version, and, in the case of
|
||
one version written specifically for the Intel 80386 processor, for free.
|
||
They have taken the first tentative bites out of the Thunder Lizard's food
|
||
supply, and the mad, unreasoning blood-lust that overcomes the dinosaur
|
||
at such moments cannot obscure the handwriting on the cave wall. Of course,
|
||
the day of the dinosaurs was long gone by the time that our species first
|
||
trod upon the Earth... but even in this day and age, a fossil living in a
|
||
museum can still get a good lawyer. The Dead rise up, and are sworn in.
|
||
It is a shame that the reputation for innovation that once was the
|
||
hallmark of AT&T and Bellcore has come to be so dominated by lawyers thriving
|
||
in at atmosphere of comparative technical innocence. The quest for product
|
||
viability and excellence may not have been abandoned, but in some sectors
|
||
it has been supplanted by a desire to seal the product up in a black box:
|
||
A black box that can't be explained, examined, or improved upon... just
|
||
paid for in perpetuity.
|
||
|
||
------------------------------
|
||
|
||
Date: Sat, 25 Jul 92 12:26:17 MDT
|
||
From: Lazlo Nibble <lazlo@triton.unm.edu>
|
||
Subject: File 2--Re: 2600 and Bellcore flap
|
||
|
||
> ...Article details how, after following 4 steps, any line is suspectible
|
||
> to secret monitoring. One document obtained by 2600 said: "There is no
|
||
> proof the hacker community knows about the vulnerability."
|
||
|
||
They may not have proof of it, but the first time I heard about Busy
|
||
Line Verification was in '84 or '85 and there's at least one person I
|
||
knew in the computer underground at the time who I had reason to
|
||
believe when he said he'd used it. Its existance is certainly no
|
||
secret to anyone who's messed around with the workings of the phone
|
||
system -- the codes that activate BLV were (and probably still are) a
|
||
sort of Holy Grail for telcom hackers.
|
||
|
||
------------------------------
|
||
|
||
Date: Wed, 29 Jul 92 14:42 GMT
|
||
From: "Thomas J. Klotzbach" <0003751365@MCIMAIL.COM>
|
||
Subject: File 3--Another View of Bellcore vs. 2600
|
||
|
||
To many, the crux of the controversy seems to be whether or not
|
||
the internal Bellcore document was legally published in 2600 Magazine.
|
||
To me, the issue is one far more basic.
|
||
|
||
Mr. Goldstein states that he published the article because it was
|
||
of "public importance". But were there other goals as well? To
|
||
embarrass Bellcore? To protect the phone system from degradation
|
||
caused by inappropriate use? Which goal or goals were the most
|
||
important? In his response to Mr. Suchyta, he states that "...as
|
||
journalists, we have a certain obligation that cannot be cast
|
||
aside...". What is that obligation? Is "...readers, who have a keen
|
||
interest in this subject matter..." enough of a justification? Or
|
||
should there be any justification?
|
||
|
||
I believe that Bellcore should be allowed to discover, document
|
||
and correct the problem internally. If Bellcore was negligent/refused
|
||
in correcting a known deficiency, that perhaps disclosure of the
|
||
problem would bring pressure to bear on Bellcore to correct the
|
||
deficiency. But this was not the case. Bellcore discovered,
|
||
documented and took steps to correct the problem it would seem, in a
|
||
timely manner. Also, the problem that Bellcore documents does not
|
||
appear to be caused as the result of a deliberate, planned action to
|
||
provide for a "trapdoor".
|
||
|
||
I would ask Mr. Goldstein:
|
||
|
||
- did you verify the source of the document?
|
||
|
||
- did you ascertain how the document was obtained?
|
||
|
||
- did the document contain any markings indicating that it was an
|
||
internal Bellcore document?
|
||
|
||
- did you weigh the needs of publishing the article versus not
|
||
publishing the article?
|
||
|
||
I tried to apply an ethical code or standard that would govern MY
|
||
conduct if I was the person who published a similar article relating
|
||
to my profession. I referred to the newly proposed revision to the
|
||
ACM Code of Ethics and Professional Conduct (CACM May '92). I
|
||
concluded after review with my attorney that a disclosure of a similar
|
||
type by me would probably be in violation of the ACM Code sections 1.2
|
||
(Avoid harm to others), 1.5 (Honor property rights including
|
||
copyrights and patents - this also deals with unauthorized duplication
|
||
of materials), 4.1 (Uphold and promote the principals of this Code)
|
||
and possibly 2.3 (Know and respect existing laws pertaining to
|
||
professional work).
|
||
|
||
This issue is not solely about computers and technology. It is
|
||
about "doing the right thing". It's about balancing the need for
|
||
information versus how that the information is obtained and
|
||
disseminated. It's about having an ethical standard that treats
|
||
disclosure for the sake of disclosure and not ensuring that the
|
||
information is obtained in a method consistent with high ethical
|
||
standards as deserving of skepticism by the reader.
|
||
|
||
There are those who liken this series of events to "Just one more
|
||
case of Goliath tromping on those ill equipped to defend themselves".
|
||
I would respond that if those who are "ill-equipped" to defend
|
||
themselves publish a document which may have been obtained in an
|
||
unethical manner and which may infringe on another party's rights,
|
||
then they should be prepared to face a possible challenge. And as far
|
||
as "the chilling effect of their (Bellcore's) letter threatening to
|
||
trample on a free press as well", I would add that we not only need a
|
||
free press, but a free and RESPONSIBLE press as well. The end does
|
||
not always justify the means.
|
||
|
||
The First Amendment provides for certain guarantees of freedoms as
|
||
they relate to assembly, press and speech. It does not unfortunately
|
||
guarantee common sense and a thorough review of all possible
|
||
reactions/results of exercising that freedom. Many cloak themselves
|
||
in the First Amendment words - fewer still cloak themselves in ethical
|
||
standards that bring credibility to their work and to the causes that
|
||
they advocate. The Computer Underground must win
|
||
respect/understanding in all phases of society or it will relegated to
|
||
a niche in that society.
|
||
|
||
------------------------------
|
||
|
||
Date: Fri, 31 Jul 1992 17:58:48 -0700
|
||
From: Emmanuel Goldstein <emmanuel@WELL.SF.CA.US>
|
||
Subject: File 4--New 2600 and 2600 Meetings
|
||
|
||
The summer issue of 2600 has been released. Subscribers should have it
|
||
no later than the early part of next week. Included within is the
|
||
latest on Bellcore's lawsuit threat against us, as well as a complete
|
||
guide to the different kinds of telephone signalling systems used
|
||
throughout the world (written by a real heavyweight in the phone
|
||
phreak world), a review of the Dutch demon dialer, a tutorial on
|
||
"portable hacking", tips on defeating call return (*69), a guide to
|
||
voice mail hacking, plus letters, news updates, revelations of an
|
||
interesting nature (more Bellcore stuff) plus a whole lot more.
|
||
|
||
On Friday, August 7th, we'll be having meetings in six American
|
||
cities. We expect all of these meetings to continue on a monthly
|
||
basis. Please spread the word. NEW YORK: Citicorp Center (between
|
||
Lexington and 3rd) downstairs in the lobby by the payphones. Payphone
|
||
numbers: 212-223-9011, 212-223-8927, 212-308-8044, 212-308-8162.
|
||
WASHINGTON DC: Pentagon City mall. CHICAGO: Century Mall, 2828 Clark
|
||
St, lower level, by the payphones. Payphone numbers: 312-929-2695,
|
||
2875, 2685, 2994, 3287. ST. LOUIS: At the Galleria, Highway 40 and
|
||
Brentwood, lower level, food court area, by the theaters. LOS ANGELES:
|
||
At the Union Station, corner of Macy St. and Alameda. Inside main
|
||
entrance by bank of phones. Payphone numbers: 213-972-9358, 9388,
|
||
9506, 9519, 9520, 213-625-9923, 9924, 213-614-9849, 9872, 9918, 9926.
|
||
SAN FRANCISCO: 4 Embarcadero Plaza (inside). Payphone numbers:
|
||
415-398-9803,4,5,6.
|
||
|
||
There is no agenda at a 2600 meeting, no formalities of any kind, no
|
||
dress code (except maybe in St. Louis), and no constraints other than
|
||
common sense. People generally get together, trade information, meet
|
||
people, look for feds, and do whatever else comes to mind (all
|
||
legally, of course). Each meeting runs approximately from 5 pm to 8
|
||
pm local time on the first Friday of the month. Anyone wanting to
|
||
organize a meeting in another city should contact 2600 at our office:
|
||
(516) 751-2600.
|
||
|
||
Our voice mail system is now a voice bulletin board system every night
|
||
beginning at 11 pm Eastern time. You can reach it at 0700-751-2600
|
||
through AT&T. If you're using another long distance carrier, preface
|
||
that number with 10288. It costs 15 cents a minute and all of the
|
||
money goes to AT&T. Whoopee.
|
||
|
||
Permission is hereby granted to repost this message with the intention
|
||
of spreading news of the above.
|
||
|
||
((Moderators' note: 2600 can be contacted at:
|
||
directly at emmanuel@well.sf.ca.us or 2600@well.sf.ca.us
|
||
or sub for one year for $21 and mail it to:
|
||
|
||
2600 Magazine
|
||
PO Box 752
|
||
Middle Island, NY 11953
|
||
|
||
------------------------------
|
||
|
||
Date: Mon, 27 Jul 1991 10:19:51 PDT
|
||
From: kram@ull.edy.edu
|
||
Subject: File 5--Is Bellcore Guilty of Stealing Copyright Information?
|
||
|
||
I read about Bellcore's threat against 2600 and wondered why nobody
|
||
made the connection between Bellcore and the Secret Service raids in
|
||
1990. The letter that Bellcore sent to 2600 was in that same petty
|
||
spirit. Bellcore made some vague threats about an unidentified
|
||
article that may or may not have been a copyright violation. This is
|
||
consistent with what they did a few years ago.
|
||
|
||
Bellcore's attempt to intimidate 2600 into silence sounds a bit like
|
||
the goring ox roaring even before it itself is gored. Bell
|
||
Communications Research, known as Bellcore, employed Henry M.
|
||
Kluepfel as a security specialist and David Bauer, a R&D security
|
||
technoid. Both have testified in hacker trials. Kluepfel was involved
|
||
in the Sun Devil and earlier investigations. He was on The Phoenix
|
||
Project bbs, where he routinely logged posts and sent them to the
|
||
Secret Service. The posters held the copyright, and Kluepfel, a
|
||
private citizen, took them without authorization or permission. These
|
||
were proprietary, and Bellcore, through its agent Henry Kluepfel,
|
||
clearly engaged in a conspiratorial scheme to obtain proprietary
|
||
information. Release of the information and subsequent use out of
|
||
context may be a criminal copyright infringement under 17 USC 506. Who
|
||
can ever forget how those posts were used by the Secret Service to
|
||
show that the claim that kermit is a 7-bit protocol is obvious
|
||
evidence of a conspiracy? This led to the unjustified raid on Steve
|
||
Jackson Games. Given the pattern of Bellcore's paid accomplice to
|
||
systematically, willfully, and knowingly engage in acts of obtaining
|
||
proprietary information, the RICO Act (18 USC 1962) might be fun to
|
||
invoke against Bellcore.
|
||
|
||
If Bellcore considers Emmanuel Goldstein guilty of obtaining
|
||
proprietary information, then I strongly suggest that the users of The
|
||
Phoenix Project have an equally valid claim that Bellcore was
|
||
responsible for stealing copyright material from users. Maybe all
|
||
ex-Phoenix Project users should send Bellcore some letters. The
|
||
address listed on the letter to 2600 was
|
||
|
||
Leonard Charles Suchyta
|
||
LCC 2E-311
|
||
290 W. Mt. Pleasant Avenue
|
||
Livingston, NJ 07039
|
||
|
||
+++
|
||
|
||
((MODERATORS' COMMENT: The above poster refers to The Mentor's BBS,
|
||
known as The Phoenix Project. Logs and other information taken from
|
||
TPP were instrumental in justifying the raid on Steve Jackson games.
|
||
|
||
In the Secret Service search affidavit for Steve Jackson Games, Henry
|
||
Kluepfel was listed as a "source of information." A substantial portion
|
||
of this information was derived from 17 messages of logs from The
|
||
Phoenix Project written from Jan. 23 through Jan. 29, 1990. CuD #2.11
|
||
includes the complete affidavit and commentary.
|
||
|
||
The reference to a description of Kermit by The Mentor as evidence of
|
||
his participation in an encryption conspiracy read:
|
||
|
||
>Name: The Mentor #1
|
||
>Date: Fri Jan 26 10:11:23 1990
|
||
>
|
||
>Kermit is a 7-bit transfer protocol that is used to transfer
|
||
>files to/from machines. It is mostly found on mainframes (it's a
|
||
>standard command on VAX, for instance). Kermit has the added
|
||
>advantage of being able to work through an outdial (because it is
|
||
>7-bit).
|
||
>
|
||
>Mentor
|
||
|
||
We share the poster's concern with the action of Bellcore's Henry
|
||
Kluepfel. In that search affidavit, Timothy Foley wrote that Kluepfel
|
||
indicted that TPP's users' list contained the names of two "hackers"
|
||
from Illinois' Northern Federal District. To the best of our
|
||
knowledge (and to the knowledge of those familiar with the users' list
|
||
during this period), the only two names on it from the Northern
|
||
District (former US prosecutor William J. Cook's jurisdiction) were
|
||
the CuD moderators. Given the rather strange logic by which evidence
|
||
is fabricated by some prosecutors, perhaps Bellcore should first apply
|
||
to its own employees the same standards of integrity and honesty it
|
||
expects from others.
|
||
|
||
Because of his actions, Henry Kluepfel was named as a co-defendant in
|
||
a civil suit brought against him, Bill Cook, Timothy Foley, and
|
||
others, by Steve Jackson Games in 1991. The litigation, alleging civil
|
||
rights violations, is still pending.
|
||
|
||
------------------------------
|
||
|
||
Date: Sat, 1 Aug 92 23:58:14 PDT
|
||
From: infogroup@unixville.com
|
||
Subject: File 6--Update on Len Rose
|
||
|
||
Len Rose was released from the federal penitentiary in South
|
||
Carolina in March after serving 10 months of a one year sentence
|
||
for unauthorized possession of Unix sourcecode. He completed the
|
||
remaining two months in a community release center in Chicago.
|
||
He is now working in Silicon Valley, and involved in some innovative
|
||
work. He is working on a project that involves feeding Usenet news and
|
||
Internet mail onto a satellite which basically provides a full news
|
||
and mail feed anywhere in continental US.
|
||
|
||
His wife and kids are still living in Chicago, and will hopefully be
|
||
able to join him soon. He is also doing consulting work in California,
|
||
so it looks like his life may be back on track.
|
||
|
||
When I recently spoke with Len, he said "... with the exception of my
|
||
financial condition, I am probably happier than I have ever been .."
|
||
|
||
He also mentioned that he is trying to contact everyone who ever
|
||
helped him , to say "Thanks" personally, so feel free to send mail to
|
||
him at: "len@netsys.com" and he will get in touch with you.
|
||
|
||
Perhaps there are happy endings after all.
|
||
|
||
------------------------------
|
||
|
||
Date: Fri, 31 Jul 1991 22:15:54
|
||
From: Jim Thomas <cudigest@mindvox.phantom.com>
|
||
Subject: File 7--Biblio resource: "Computer Crime" Handbook
|
||
|
||
A panel on computer crime, sponsored by the Chicago Bar Association,
|
||
led to an edited collection of documents, including articles and
|
||
federal statutes, that provides a helpful resource for those interested
|
||
in a basic background on crime and computer technology. The volume,
|
||
in spiral/desktop publishing format, includes a set of "hypotheticals"
|
||
used for organizing the panel discussion. However, the responses of
|
||
the panelists (which included William C. Cook, Sheldon Zenner, Robert
|
||
Gustafson and Bernard P. Zajac, Jr.) were not included.
|
||
|
||
The strength of the work is the appenix, which includes a list of
|
||
potential violations (matched to their statutes) that may be
|
||
prosecuted under various federal statutes; Copies of most relevant
|
||
federal legislation governing recent "hacker" indictments; Comments on
|
||
selected federal statutes; and reprints of articles from the National
|
||
Institute of Justice and by John Perry Barlow, Buck BloomBecker, and
|
||
others. It also includes a David R. Johnson's testimony regarding
|
||
Senate Bill 2476, and a basic annotated bibliography of books,
|
||
articles, journals, and other resources as pointers to further
|
||
information on these issues.
|
||
|
||
The volume is about 150 pages (unpaginated, unindexed) and is
|
||
available at cost (about $20). For further information, contact
|
||
Joanna Alperin
|
||
Chicago Bar Association
|
||
321 South Plymouth Court
|
||
Chicago, IL 60604-3997
|
||
|
||
------------------------------
|
||
|
||
Date: Wed, 29 Jul 1991 17:34:18 CST
|
||
From: Moderators <tk0jut2@mvs.cso.niu.edu>
|
||
Subject: File 8--Dr Ripco Summarizes his Legal Status since Sun Devil
|
||
|
||
((Moderators' note: We asked Dr Ripco to give a detailed summary of
|
||
all that has changed in his legal status in the past 18 months.
|
||
Following is his summary of what's changed)).
|
||
|
||
Dear Jim:
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Sincerely,
|
||
|
||
Dr Ripco
|
||
|
||
+++
|
||
|
||
((MODERATORS' NOTE: Dr Ripco's status on 1 August 1992 is identical to
|
||
his status on May 8, 1990, the morning of the raid by the secret
|
||
service and others. Although never charged, and although there is to
|
||
date no evidence that he was involved in any criminal behavior, none
|
||
of his equipment has been returned, he has not been contacted by law
|
||
enforcement agents in over two years, he has not heard from attorneys
|
||
he believed were helping him in the return of his equipment, and he
|
||
has received no information about when, if ever, he can reclaim his
|
||
equipment. In short, he has no idea, nor has he been able to learn,
|
||
what's happening. Kafka's The Trial should be required reading for
|
||
everybody.
|
||
|
||
------------------------------
|
||
|
||
Date: Mon, 20 Jul 1992 13:15:21 -0400
|
||
From: Christopher Davis <ckd@EFF.ORG>
|
||
Subject: File 9--Documents Available: Open Platform Overview, Life in Virtual
|
||
|
||
+======+==================================================+===============+
|
||
| FYI | Newsnote from the Electronic Frontier Foundation | July 20, 1992 |
|
||
+======+==================================================+===============+
|
||
|
||
ELECTRONIC FRONTIER FOUNDATION'S
|
||
OPEN PLATFORM PROPOSAL AVAILABLE VIA FTP
|
||
|
||
The full text of the EFF's Open Platform Proposal is available in
|
||
its current draft via anonymous ftp from ftp.eff.org as
|
||
pub/EFF/papers/open-platform-proposal.
|
||
|
||
To retrieve this document via email (if you can't use ftp), send mail to
|
||
archive-server@eff.org, containing (in the body of the message) the
|
||
command 'send eff papers/open-platform-proposal'. This is the proposal
|
||
in its 4th draft and is up-to-date as of July 2.
|
||
|
||
HOWARD RHINEGOLD'S "VIRTUAL COMMUNITIES, 1992" AVAILABLE VIA FTP
|
||
|
||
This is the full text of Howard Rhinegold's illuminating essay "A Slice
|
||
of Life In My Virtual Community" that was serialized in EFFector Online.
|
||
You can retrieve this document via anonymous ftp from ftp.eff.org as
|
||
pub/EFF/papers/cyber/life-in-virtual-community. To retrieve it via
|
||
email (if you can't use ftp), send mail to archive-server@eff.org,
|
||
containing (in the body of the message) the command 'send eff
|
||
papers/cyber/life-in-virtual-community'.
|
||
|
||
+=====+=====================================================+=============+
|
||
| EFF | 155 Second Street, Cambridge MA 02141 (617)864-0665 | eff@eff.org |
|
||
+=====+=====================================================+=============+
|
||
|
||
------------------------------
|
||
|
||
Date: Wed, 29 Jul 1992 15:27:38 EDT
|
||
From: Paul Hyland <PHYLAND@GWUVM.BITNET>
|
||
Subject: File 10--CPSR Recommends NREN Privacy Principles
|
||
|
||
PRESS RELEASE
|
||
July 24, 1992
|
||
|
||
CPSR Recommends NREN Privacy Principles
|
||
|
||
WASHINGTON, DC -- Computer Professionals for Social Responsibility
|
||
(CPSR), a national public interest organization, has recommended
|
||
privacy guidelines for the nation's computer network.
|
||
|
||
At a hearing this week before the National Commission on Library and
|
||
Information Science, CPSR recommended a privacy policy for the
|
||
National Research and Education Network or "NREN." Marc Rotenberg,
|
||
Washington Director of CPSR, said "We hope this proposal will get the
|
||
ball rolling. The failure to develop a good policy for the computer
|
||
network could be very costly in the long term."
|
||
|
||
The National Commission is currently reviewing comments for a report
|
||
to the Office of Science and Technology Policy on the future of the
|
||
NREN.
|
||
|
||
Mr. Rotenberg said there are several reasons that the Commission
|
||
should address the privacy issue. "First, the move toward
|
||
commercialization of the network is certain to exacerbate privacy
|
||
concerns. Second, current law does not do a very good job of
|
||
protecting computer messages. Third, technology won't solve all the
|
||
problems."
|
||
|
||
The CPSR principles are (1) protect confidentiality, (2) identify
|
||
privacy implications in new services, (3) limit collection of personal
|
||
data, (4) restrict transfer of personal information,(5) do not charge
|
||
for routine privacy protection, (6) incorporate technical safeguards,
|
||
(7) develop appropriate security policies, and (8) create an
|
||
enforcement mechanism.
|
||
|
||
Professor David Flaherty, an expert in telecommunications privacy law,
|
||
said "The CPSR principles fit squarely in the middle of similar
|
||
efforts in other countries to promote network services. This looks
|
||
like a good approach."
|
||
|
||
Evan Hendricks, the chair of the United States Privacy Council and
|
||
editor of Privacy Times, said that the United States is "behind the
|
||
curve" on privacy and needs to catch up with other countries who are
|
||
already developing privacy guidelines. "The Europeans are racing
|
||
forward, and we've been left with dust on our face."
|
||
|
||
The CPSR privacy guidelines are similar to a set of principles
|
||
developed almost 20 years ago called The Code of Fair Information
|
||
practices. The Code was developed by a government task force that
|
||
included policy makers, privacy experts, and computer scientists. The
|
||
Code later became the basis of the United States Privacy Act.
|
||
|
||
Dr. Ronni Rosenberg, who has studied the role of computer scientists
|
||
in public policy, said that "Computer professionals have an important
|
||
role to play in privacy policy. The CPSR privacy guidelines are
|
||
another example of how scientists can contribute to public policy."
|
||
|
||
For more information about the Privacy Polices and how to join CPSR,
|
||
contact CPSR, P.O. Box 717, Palo Alto CA 94302. 415/322-3778 (tel)
|
||
and 415/322-3798 (fax). Email at cpsr@csli.stanford.edu.
|
||
|
||
++++++++++++
|
||
[Moderator's note: The full text of the referenced NREN Privacy
|
||
Principles is available from the CPSR Listserv file server. Send
|
||
the command:
|
||
GET NREN PRIVACY
|
||
to listserv@gwuvm.gwu.edu, as the text of an e-mail message. -peh]
|
||
|
||
------------------------------
|
||
|
||
Date: Fri, 31 Jul 1991 22:15:54 EDT
|
||
From: Jim Thomas <cudigest@mindvox.phantom.com>
|
||
Subject: File 11--Biblio resource: "Computer Crime" Handbook
|
||
|
||
A panel on computer crime, sponsored by the Chicago Bar Association,
|
||
led to an edited collection of documents, including articles and
|
||
federal statutes, that provides a helpful resource for those interested
|
||
in a basic background on crime and computer technology. The volume,
|
||
in spiral/desktop publishing format, includes a set of "hypotheticals"
|
||
used for organizing the panel discussion. However, the responses of
|
||
the panelists (which included William C. Cook, Sheldon Zenner, Robert
|
||
Gustafson and Bernard P. Zajac, Jr.) were not included.
|
||
|
||
The strength of the work is the appenix, which includes a list of
|
||
potential violations (matched to their statutes) that may be
|
||
prosecuted under various federal statutes; Copies of most relevant
|
||
federal legislation governing recent "hacker" indictments; Comments on
|
||
selected federal statutes; and reprints of articles from the National
|
||
Institute of Justice and by John Perry Barlow, Buck BloomBecker, and
|
||
others. It also includes a David R. Johnson's testimony regarding
|
||
Senate Bill 2476, and a basic annotated bibliography of books,
|
||
articles, journals, and other resources as pointers to further
|
||
information on these issues.
|
||
|
||
The volume is about 150 pages (unpaginated, unindexed) and is
|
||
available at cost (about $20). For further information, contact
|
||
Joanna Alperin
|
||
Chicago Bar Association
|
||
321 South Plymouth Court
|
||
Chicago, IL 60604-3997
|
||
|
||
------------------------------
|
||
|
||
Date: Mon, 20 Jul 1992 14:48:39 EDT
|
||
From: Paul Hyland <PHYLAND@GWUVM.BITNET>
|
||
Subject: File 12--Updated CPSR Archive Listing
|
||
|
||
Following is an updated version of the file CPSR ARCHIVE, which lists
|
||
the files stored on our Listserv archive. This is the last time that
|
||
this entire file will be distributed to the list. From now on, I will
|
||
periodically send mail containing only the updates (add/change/delete).
|
||
|
||
Users can also subscribe to any of our files, and receive either notice
|
||
or the file itself when it is changed. For information on this and other
|
||
Listserv File Server features, send the command:
|
||
|
||
INFO LISTFILE
|
||
|
||
The command INFO GENINTRO will provide an introduction to Listserv in general.
|
||
|
||
Questions, comments, or complaints should be directed to phyland@gwuvm.gwu.edu
|
||
|
||
Paul Hyland
|
||
Owner, CPSR List
|
||
******************************************************************************
|
||
|
||
This file contains a list of files available on the CPSR LISTSERV file server.
|
||
|
||
To request a copy of any file, send mail to the list server:
|
||
|
||
LISTSERV@GWUVM.GWU.EDU (Internet) or LISTSERV@GWUVM (Bitnet)
|
||
|
||
In your mail, send one line per request, using this command for each request:
|
||
|
||
GET <FILENAME> <FILETYPE>
|
||
|
||
The options for <FILENAME> and <FILETYPE> are listed below. For example:
|
||
|
||
GET CPSR BROCHURE
|
||
|
||
Note that LISTSERV is case-insensitive for command and file names.
|
||
|
||
If you have problems with this list, send mail to the administrator,
|
||
Paul Hyland (phyland@gwuvm.gwu.edu or phyland@gwuvm).
|
||
===============================================================================
|
||
CPSR INFORMATION
|
||
|
||
Filename Filetype Lines Description
|
||
-------- -------- ----- -----------
|
||
CPSR ARCHIVE 213 This file
|
||
CPSR BROCHURE 300 CPSR overview and membership form ** UPDATED **
|
||
CPSR MEMBFORM 53 CPSR membership form (also in brochure)
|
||
CPSR BOOKS 129 List of CPSR publications and order form
|
||
CPSR ALIASES 75 CPSR E-mail Aliases @csli.stanford.edu
|
||
CPSR TEN-YEAR 219 Ten-year history of CPSR, thru spring '91
|
||
|
||
CPSR PAPERS AND PROJECT DESCRIPT,SCRIPT='SPELL'IONS
|
||
|
||
Filename Filetype Lines Description
|
||
-------- -------- ----- -----------
|
||
|
||
21STCENT PROJECT 287 21st Century Project description -
|
||
To redirect U.S. Science & Technology Policy
|
||
toward peaceful and productive uses.
|
||
PRIVACY PAPER 1550 "Privacy in the Computer Age" by Ronni Rosenberg
|
||
SUNDEVIL RULING 283 Text of ruling on CPSR FOIA lawsuit seeking
|
||
Operation Sun Devil search warrant materials
|
||
|
||
CONFERENCE MATERIALS
|
||
|
||
Filename Filetype Lines Description
|
||
-------- -------- ----- -----------
|
||
PDC-92 CALL4PAP 103 Participatory Design Conference
|
||
Cambridge, MA -- November 6-7, 1992
|
||
CRYPTO INTRO 109 2nd CPSR Cryptography and Privacy Conference --
|
||
Introduction from conference materials
|
||
CFP-2 REPORT 808 Report from 2nd Conference on Computers, Freedom
|
||
and Privacy (CFP-2) -- March, 1992
|
||
CFP-2 RADIO 34 CFP-2 radio program available in late JJune
|
||
CFP-93 CALL4PAP 176 3rd Conference on Computers, Freedom, and Privacy
|
||
San Francisco, CA -- March 9-12, 1993
|
||
DIAC-92 REPORT 219 Report from Directions and Implications of
|
||
Advanced Computing (DIAC-92) -- May, 1992
|
||
CFP2 ANNOUNCE - DELETED
|
||
CFP2 SHORT - DELETED
|
||
DIAC-92 ANNOUNCE - DELETED
|
||
DIAC-92 PROGRAM - DELETED
|
||
CHI-92 REPORT 79 From ACM SIGCHI (Computer-Human Interaction)
|
||
CHI '92 session on Social Impact - May, 1992
|
||
SIGCSE REPORT 100 From ACM SIGCSE (Computer Science Education)
|
||
Debate on state licencing of programmers
|
||
IFAC CALL4PAP 199 International Federation for Automatic Control
|
||
Symposium on Automated Systems Based on
|
||
Human Skill (and Intelligence)
|
||
September 23-25, 1992, Madison, WI
|
||
MULTIMED CALL4PAP 75 _Journal of Educational Multimadia and Hypermedia_
|
||
Special Issue on Multimedia and Hypermedia
|
||
Learning Environments - Deadline: Sept 15, 1992
|
||
SAUDI CALL4PAP 57 13th National Computer Conference and Exposition
|
||
Topic: Information Technology Transfer
|
||
Riyadh, Saudi Arabia - Nov. 21-26, 1992
|
||
TECHSTUD CALL4PAP 351 _Technology Studies_ Special Issue on Technology
|
||
and Ethics - Deadline: January 15, 1993
|
||
EMC-93 CALL4PAP 161 Society for Computer Simulation - International
|
||
Emergency Management and Engineering Conference,
|
||
Arlington, VA -- March 29 - April 1, 1993
|
||
IFIP CALL4PAP 33 International Federation for Info. Processing
|
||
Working Gp 9.2 (Social Accountability of Computers)
|
||
Working conference - %Facing the Challenge of Risk
|
||
and Vulnerability in an Information Society'
|
||
May 20-22, 1993, Namur, Belgium
|
||
ED-MEDIA CALL4PAP 353 World Conference on Educational Multimedia and
|
||
Hypermedia, Orlando FL, June 23-26, 1993
|
||
EASTWEST ANNOUNCE - DELETED
|
||
COLLAB92 ANNOUNCE - DELETED
|
||
|
||
|
||
CPSR ON-LINE NEWSLETTERS
|
||
|
||
Filename Filetype Lines Description
|
||
-------- -------- ----- -----------
|
||
CPSRBERK 2Q92 425 CPSR/Berkeley Electronic Newsletter
|
||
Second Quarter - 1992
|
||
CPSR-PDX VOL5-N02 258 CPSR/Portland Electronic Newsletter *new name*
|
||
Volume 5, #02, April 1, 1992
|
||
CPSR-PDX VOL5-N03 488 CPSR/Portland Electronic Newsletter *new name*
|
||
Volume 5, #03, May 26, 1992
|
||
CPSR-PDX VOL5-N04 531 CPSR/Portland Electronic Newsletter *new name*
|
||
Volume 5, #04, June 8, 1992
|
||
CPSR-PDX VOL5-N05 819 CPSR/Portland Electronic Newsletter
|
||
Volume 5, #05, June 23, 1992
|
||
CPSR-PDX VOL5-N06 612 CPSR/Portland Electronic Newsletter
|
||
Volume 5, #06, July 13, 1992
|
||
E-MAIL DIRECTRY 625 CPSR/PDX E-mail Directory of CPSR addresses and
|
||
other interesting lists - August 22, 1991
|
||
*renamed and updated*
|
||
|
||
LEGISLATIVE MATERIALS
|
||
|
||
Filename Filetype Lines Description
|
||
-------- -------- ----- -----------
|
||
BOS-CNID SHORT 122 Testimony by CPSR/Boston on Calling Number ID
|
||
before Mass. DPU - Oral version
|
||
BOS-CNID LONG 396 Testimony by CPSR/Boston on Calling Number ID
|
||
before Mass. DPU - Written version
|
||
CAL-CNID HEARING 299 Testimony by CPSR/Palo Alto and description of
|
||
hearing before California State Assembly on CNID
|
||
FBITAP PROPOSAL 445 Updated (and renamed) FBI Digital Telephony
|
||
Proposal, to force telco's to enable FBI
|
||
taps of the evolving digital network
|
||
(with an introduction by Dave Banisar of CPSR)
|
||
FBITAP LETTER 127 Letter from CPSR and others to Senator Leahy
|
||
urging a public hearing of this FBI proposal
|
||
FBITAP COMPWRLD 130 Article on FBI Proposal in Computerworld 6/8/92
|
||
SEMATECH ENVIRO 118 Press Release from Campaign for Responsible
|
||
Technology on environmental funding in
|
||
SEMATECH reauthorization legislation
|
||
SEMATECH AMENDMNT 222 Press Release from Campaign for Responsible
|
||
Technology on proposed amendment to SEMATECH
|
||
authorization to address environmental,
|
||
community and labor concerns
|
||
SB1447 BILL 1 California Senate Bill 1447 - Privacy Act of 1992
|
||
(obsolete version deleted - revision expected)
|
||
HR2772 BILL 85 GPO Wide Information Access Network for Data
|
||
Online Act of 1991 (GPO WINDO Bill)
|
||
HR2772 FACTS 95 Taxpayer Assets Project Fact Sheet on GPO WINDO
|
||
S2813 BILL 151 GPO Gateway to Government Act of 1992
|
||
(Senate version of WINDO)
|
||
HR3459 BILL 136 Improvement of Information Access Act of 1991
|
||
(Owens Bill)
|
||
HR3459 FACTS 65 Taxpayer Assets Project Fact Sheet on Owens Bill
|
||
OMB-A130 COMMENTS 178 Taxpayer Assets Project Note on the Proposed
|
||
Revisions to OMB Circular A-130 concerning
|
||
Management of Federal Information Resources
|
||
with info on how to obtain the document and
|
||
provide comments electronically (due 8/27/92)
|
||
EDGAR RELEASE 323 Taxpayer Assets Project Press Release on letter
|
||
to the Securities and Exchange Commission (SEC)
|
||
asking that they broaden access and improve
|
||
control over the Electronic Data Gathering,
|
||
Analysis and Retrieval System (EDGAR)
|
||
S1940 BILL 145 Electronic Freedom of Information Improvement
|
||
Act of 1991
|
||
HPC ACT 636 High Performance Computing Act of 1991
|
||
Signed December 9, 1991
|
||
CRYPTO ARTICLE 217 Article on Government attempts to control spread
|
||
of cryptographic technology into the telephone
|
||
network -- Joe Abernathy, Houston Chronicle
|
||
NSA PAPERS 439 Response from NSA to Joe Abernathy questions on
|
||
their attempts to control or hinder civilian
|
||
cryptographic technology
|
||
HR5615 BILL 144 Prescription Drug Records Privacy
|
||
Protection Act of 1992
|
||
CANADIAN PRINCIPL 90 Canadian Telecommunication Privacy Principles
|
||
|
||
ONLINE RESOURCES AND OTHER MATERIALS
|
||
|
||
Filename Filetype Lines Description
|
||
-------- -------- ----- -----------
|
||
RTK-NET SRCHFORM 136 RTK NET -- the Right-to-Know Computer Network --
|
||
Introduction and on-line search request form
|
||
PRIVACY LISTS 152 Information on two new privacy-related lists
|
||
RISKS SAMPLE 541 Sample Issue of RISKS Digest - Volume 13, # 59
|
||
CUD SAMPLE 995 Sample Issue of Computer underground Digest -
|
||
Volume 4, # 26
|
||
EFFECTOR SAMPLE 597 Sample Issue of EFFector Online - Volume 2, # 01
|
||
EMAILPRV BIBLIO 136 Bibliography of materials on E-mail Privacy
|
||
PRIVACY PROJECT 44 Tapes from the Privacy Project radio series
|
||
Available from Pacifica Programming Service
|
||
TEACHING VALUES 28 Describes "Teaching Social and Ethical
|
||
Implications of Computing: A Starter Kit"
|
||
from the Research Center on Computing and
|
||
Society at Southern Connecticut State Univ.
|
||
and Educational Media Resources, Inc.
|
||
VIRTREAL GENIE 472 Genie On-Line Conference on Virtual Reality
|
||
Howard Rheingold (Whole Earth Review) - 5/3/92
|
||
(from the Public Forum * Non-profit Connection)
|
||
CYBEPUNK GENIE 480 Genie On-Line Conference on Networks and Hackers
|
||
Katie Hafner (co-author, CYBERPUNK) - 5/24/92
|
||
DHIGHWAY GENIE 722 Genie On-Line Conference on Data Highways
|
||
Steve Cisler (Aplle Computer) - 5/17/92
|
||
MAIL MANNERS 150 Describes proper e-mail etiquette
|
||
NSF JOBS 64 Two jobs with NSF Information Tech. Programs
|
||
|
||
MONTHLY ARCHIVES OF CPSR LIST SUBMISSIONS
|
||
|
||
Filename Filetype Lines Description
|
||
-------- -------- ----- -----------
|
||
CPSR LOG9110 158 From list start-up through 10/91
|
||
CPSR LOG9111 674 From prior log through 11/91
|
||
CPSR LOG9201 1619 From prior log through 1/92
|
||
CPSR LOG9202 305 From prior log through 2/92
|
||
CPSR LOG9203 1539 From prior log through 3/92
|
||
CPSR LOG9204 866 From prior log through 4/92
|
||
CPSR LOG9205 91 From prior log through 5/92
|
||
CPSR LOG9206 2192 From prior log through 6/92
|
||
CPSR LOG9207 96 From prior log through 6/92
|
||
|
||
------------------------------
|
||
|
||
End of Computer Underground Digest #4.34
|
||
************************************
|
||
|
||
|
||
|