767 lines
31 KiB
Plaintext
767 lines
31 KiB
Plaintext
|
||
|
||
Computer underground Digest Wed July 28 1993 Volume 5 : Issue 56
|
||
ISSN 1004-042X
|
||
|
||
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
||
Archivist: Brendan Kehoe
|
||
Shadow-Archivists: Dan Carosone / Paul Southworth
|
||
Ralph Sims / Jyrki Kuoppala
|
||
Ian Dickinson
|
||
Coop Eitidor: Etaoin Shrdlu, Senior
|
||
|
||
CONTENTS, #5.56 (July 28 1993)
|
||
File 1--Akron Anomaly BBS UpDate (Seizure Warrant)
|
||
File 2--Call for Paper: Computer Network Use and Abuse Conference
|
||
File 3--Credit Reports and National
|
||
File 4--UPDATE #19-AB1624: PROGRAMMERS! START YOUR ENGINES!
|
||
File 5--Community Network Survey Results Available
|
||
|
||
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
||
available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
|
||
editors may be contacted by voice (815-753-6430), fax (815-753-6302)
|
||
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
||
60115.
|
||
|
||
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
||
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
||
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
||
libraries and in the VIRUS/SECURITY library; from America Online in
|
||
the PC Telecom forum under "computing newsletters;"
|
||
On Delphi in the General Discussion database of the Internet SIG;
|
||
on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
|
||
WHQ) (203) 832-8441 NUP:Conspiracy; RIPCO BBS (312) 528-5020
|
||
CuD is also available via Fidonet File Request from 1:11/70; unlisted
|
||
nodes and points welcome.
|
||
EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
|
||
In ITALY: Bits against the Empire BBS: +39-461-980493
|
||
|
||
ANONYMOUS FTP SITES:
|
||
UNITED STATES: ftp.eff.org (192.88.144.4) in /pub/cud
|
||
uglymouse.css.itd.umich.edu (141.211.182.53) in /pub/CuD/cud
|
||
halcyon.com( 202.135.191.2) in /pub/mirror/cud
|
||
aql.gatech.edu (128.61.10.53) in /pub/eff/cud
|
||
AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
|
||
EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
|
||
ftp.warwick.ac.uk in pub/cud (United Kingdom)
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted for non-profit as long
|
||
as the source is cited. Authors hold a presumptive copyright, and
|
||
they should be contacted for reprint permission. It is assumed that
|
||
non-personal mail to the moderators may be reprinted unless otherwise
|
||
specified. Readers are encouraged to submit reasoned articles
|
||
relating to computer culture and communication. Articles are
|
||
preferred to short responses. Please avoid quoting previous posts
|
||
unless absolutely necessary.
|
||
|
||
DISCLAIMER: The views represented herein do not necessarily represent
|
||
the views of the moderators. Digest contributors assume all
|
||
responsibility for ensuring that articles submitted do not
|
||
violate copyright protections.
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
Date: 26 Jul 93 11:48:32 EDT
|
||
From: David Lehrer <71756.2116@COMPUSERVE.COM>
|
||
Subject: File 1--Akron Anomaly BBS UpDate (Seizure Warrant)
|
||
|
||
((MODERATORS' NOTE: The AKRON ANOMALY BBS was raided last summer
|
||
because of allegedly "pornographic" files it possessed (for
|
||
background, see CuD #5.23). Subsequent events indicated that the raid
|
||
was an excessive exercise in local law enforcement zeal. Under
|
||
pressure, the sysop pleaded guilty to a minor misdemeanor charge to
|
||
avoid costly legal entanglements. But, the case continues to raise
|
||
issues, and CuD will address some of these in a forthcoming issue. The
|
||
following is an update on the case)).
|
||
|
||
=-=-=-=-=-=-= Akron Anomaly =-=-=-=-=-=
|
||
Newsgroups:
|
||
akr.newsadmin,cle.general,oh.general,news.admin.policy,comp.org.e
|
||
|
||
There have been some recent developments in the Akron Anomaly case.
|
||
Briefly, some materials have been returned to Mark Lehrer, sysop of
|
||
The Akron Anomaly BBS. These materials do not include any of the
|
||
email that was on the system at the time it was seized
|
||
approximately one year ago. The email is being held by the Ohio
|
||
Bureau of Criminal Investigation.
|
||
|
||
=-=-=-=-=
|
||
|
||
This file contains:
|
||
<1> Description of property to be searched and seized (from search
|
||
warrant).
|
||
<2> Excerpts from the transcript of court proceedings, related to
|
||
the hardware to be forfeited.
|
||
<3> List of seized material (from David Lehrer).
|
||
<4> Notice from chief Stahl that returned software can be picked
|
||
up.
|
||
<5> List of actual items returned (from David Lehrer).
|
||
<6> Letter from chief Stahl saying the Ohio Bureau of Criminal
|
||
Investigation has everything else.
|
||
|
||
=-=-=-=-=
|
||
|
||
<1> Description of property to be searched and seized (from search
|
||
warrant).
|
||
|
||
Quote:
|
||
PROPERTY TO BE SEARCHED AND SEIZED
|
||
Computer(s) used to operate the Akron Anomaly Bulletin Board and
|
||
data contained in them, computer disks and/or tapes containing data
|
||
involved in the operation of the Akron Anomaly Bulletin Board,
|
||
records of users of the Akron Anomaly Bulletin Board and the items
|
||
they have uploaded to or downloaded from the Akron Anomaly Bulletin
|
||
Board, financial records related to the operation of the Akron
|
||
Anomaly Bulletin Board, and other associated items including but
|
||
not limited to modems, disk drives, printers and software programs.
|
||
|
||
%executed June 18, 1992%
|
||
|
||
=-=-=-=-=
|
||
|
||
IN THE COURT OF COMMON PLEAS
|
||
COUNTY OF SUMMIT
|
||
|
||
|
||
STATE OF OHIO, ) CASE NO. 92-07-1789
|
||
)
|
||
Plaintiff, ) Robert Incorvati
|
||
) Assistant Summit County
|
||
vs. ) Prosecutor
|
||
)
|
||
MARK LEHRER, ) Donald S. Varian
|
||
) Attorney at Law
|
||
Defendant. )
|
||
- - -
|
||
|
||
Visiting Judge Presiding: Lorain, Ohio--Robert J. Corts
|
||
|
||
|
||
|
||
TRANSCRIPT OF PROCEEDINGS March 8, 1993 %excerpts%
|
||
|
||
|
||
MR. INCORVATI: %prosecutor's explanation of reducing two 2nd degree
|
||
felonies to a 1st degree misdemeanor%
|
||
The State of Ohio is also in possession of Mr. Lehrer's
|
||
>computer system. It's my understanding that is currently in
|
||
>possession of BCI and according to Rule 11F negotiations will be
|
||
forfeited to BCI in Columbus.
|
||
|
||
THE COURT: Now, I'm not sure I understand the charges. Pandering
|
||
obscenity?
|
||
|
||
MR. INCORVATI: The original charge, that's correct.
|
||
|
||
THE COURT: Was that done by means of computer, is that what I
|
||
understand?
|
||
|
||
MR. INCORVATI: Exactly, exactly. It was a computer, computer log-
|
||
on network that was available, and at the time it appeared that
|
||
information that may have been accessible to that or through some
|
||
work been accessible to it may have involved minors.
|
||
With respect to the State's case, there is indeed question
|
||
as to whether in fact that is a provable point, whether the minors
|
||
were involved on that.
|
||
|
||
THE COURT: etc. . . .
|
||
--Continued--
|
||
|
||
THE COURT: Very well.
|
||
|
||
MR.VARIAN: Thank you, Your Honor. I would only add, I think, we
|
||
have agreed to the facts as have been presented other than I think
|
||
>there are unrelated soft disks, floppy disks that would be
|
||
>returned to the defendant that are unrelated to any sexual related
|
||
>matter.
|
||
> The hardware, I think, is what we agreed would go to the
|
||
>Bureau of Criminal Identification.
|
||
I think further that it's the prosecutor's position, and
|
||
correct me if I'm wrong, that we would be entering a plea to a
|
||
misdemeanor and they are not requesting any jail time or any
|
||
probation.
|
||
If that is the fact, at this time we are prepared to enter
|
||
a plea of guilty to possession of criminal tools and -- attempt to
|
||
possess criminal tools.
|
||
|
||
MR. INCORVATI: Attorney Varian is correct.
|
||
|
||
>THE COURT: So I understand, what needs to be forfeited
|
||
>specifically?
|
||
|
||
>>MR. INCORVATI: The hardware itself, if you will.
|
||
|
||
>THE COURT: What is that?
|
||
|
||
MR. INCORVATI: Specifically, I don't know. I can tell you that it
|
||
is a computer system.
|
||
|
||
THE COURT: Could you tell me?
|
||
|
||
>MR. VARIAN: My client would know the very best, but it's
|
||
>basically a computer, a disk drive, a -- is there a printer there
|
||
>-- and a printer.
|
||
|
||
>MR. INCORVATI: Also have the monitor and keyboard as well.
|
||
|
||
MR. VARIAN: Correct.
|
||
|
||
>>THE COURT: There is not going to be any difficulty with
|
||
>>identifying --
|
||
|
||
MR. VARIAN: They already have it.
|
||
|
||
>MR. INCORVATI: In fact, we are in possession of it.
|
||
In fact, also as attorney Varian states, we are in
|
||
possession of some of the software associated with that, that is
|
||
available for the defendant to pick up.
|
||
|
||
THE COURT: %continuation of the plea% . . .
|
||
|
||
=-=-=-=-=
|
||
|
||
<3> List of seized material (from David Lehrer).
|
||
|
||
MISSING ITEMS LIST:
|
||
|
||
for reference:
|
||
PROPERTY LISTED BY STEVE STAHL THAT HE TOOK FROM THE HOME OF DAVID
|
||
LEHRER, 58 BERMONT AVE., MUNROE FALLS, OH, ON 6/18/1992 UNDER THE
|
||
GUISE OF THE ABOVE SEARCH WARRANT--THIS LIST AS WRITTEN BY STAHL.
|
||
----------------------------------------------------------
|
||
Page 1-
|
||
ITEM # Quantity Description of property taken
|
||
|
||
1 1 US Robotics Modem
|
||
2 1 Home Built Computer
|
||
3 1 Loop Monitor
|
||
4 1 IBM Keyboard
|
||
5 1pk of 10 3.5 DD Diskettes
|
||
|
||
6 1 Epson Printer
|
||
7 1 Leaquer Int Corp (mouse)
|
||
8 1 Archive Corp Drive (cartridge tape)
|
||
----------------------------------------------------------
|
||
Page 2-
|
||
Item #
|
||
|
||
9 Misc. Wires
|
||
10 1- 5 1/4 Disc w/viruses
|
||
11 3- 3M DC 600A Data Cartridge Tapes
|
||
12 1- Letter w/check (fee)
|
||
13 1- OS2 IBM Operating System
|
||
14 1- Notebook w/documentation
|
||
15 1 pkg w/198 3 1/2 discs
|
||
|
||
16 1 pkg w/3 cases 210 5 1/4 discs
|
||
17 1 case w/59 5 1/4 discs
|
||
18 1 case w/89 5 1/4 discs
|
||
19 1 bag w/misc. records
|
||
----------------------------------------------------------
|
||
LIST OF ITEMS THAT SHOULD HAVE BEEN RETURNED:
|
||
|
||
PART A: Itemized List
|
||
1. Line Item 10: "1- 5 1/4 Disc w/ viruses"
|
||
These are anti-viral programs Mark uses in his normal work
|
||
activities. Stahl wouldn't recognize a 'virus' program if it
|
||
bit him.
|
||
|
||
2. Line Item 11: "3- 3M DC 600A Data Cartridge Tapes"
|
||
These had NO 'sexually related' matter of any kind on them.
|
||
|
||
3. Line Item 12: "Letter w/check (fee)"
|
||
This is NOT 'sexually related' matter.
|
||
|
||
4. Line Item 13: "OS2 IBM Operating System"
|
||
This is Mark's REGISTERED copy of IBM OS/2 Operating System.
|
||
Mark is an IBM-approved beta test site for IBM's OS/2
|
||
software. 'They' returned Mark's BACKUP discs of OS/2.
|
||
IBM takes a very dim view of use of mis-appropriated
|
||
REGISTERED software. (and this case is posted all over their
|
||
own internal network--at their request)
|
||
|
||
5. Line Item 14: "1- Notebook w/documentation"
|
||
This is NOT 'sexually related' matter.
|
||
|
||
6. Line Item 19: "1 bag w/misc. records"
|
||
This is NOT 'sexually related' matter.
|
||
|
||
7. Line Items 15-18:
|
||
a) 5 diskette storage cases.
|
||
b) Approximately 300 of the more than 560 diskettes taken
|
||
contained NO 'sexually related' matter whatsoever.
|
||
They DID contain an enormous library of entirely 'shareware'
|
||
programs.
|
||
|
||
PART B: Things Taken But Not Documented List
|
||
IMPORTANT: --we want four items returned that Stahl took, but did
|
||
NOT DOCUMENT on his seizure inventory list:
|
||
|
||
1) ALL E-mail of the several hundred Akron Anomaly users
|
||
improperly and (my opinion) illegally taken, examined and kept
|
||
by Steve Stahl. Also all FidoNet E-mail in automatic transfer
|
||
and/or storage when Stahl 'pulled the plug'.
|
||
|
||
2) All copies made of data from the Akron Anomaly. Disclosure
|
||
of all existent copied data and its location prior to its
|
||
return.
|
||
|
||
3) The listing file from the hard disk of all users of the Akron
|
||
Anomaly.
|
||
|
||
4) The detailed library file from the hard disk that identifies
|
||
each of the diskettes taken by Stahl. i.e. precisely those
|
||
that are shareware library and those that are input area
|
||
backups.
|
||
|
||
Backup copies of this missing data probably exist, either in
|
||
Stahl's department or OBCI (or BOTH). I can't imagine them not
|
||
making copies when checking out software that could have an auto-
|
||
destruct feature.
|
||
|
||
=-=-=-=-=
|
||
|
||
<4> Notice from Chief Stahl that returned software can be picked
|
||
up.
|
||
|
||
Quote:
|
||
May 5, 1993
|
||
|
||
"Bureau of Criminal Identification and Investigation has
|
||
returned to us certain software that they have determined is to be
|
||
returned to you. You need to come to the police station Monday -
|
||
Friday, 7:30AM - 3:30PM to pick up and sign for this property."
|
||
[signed: Steve Stahl]
|
||
=-=-=-=-=
|
||
|
||
<5> List of items actually returned (from David Lehrer).
|
||
|
||
The items 'returned' by OBCI were picked up and signed for at the
|
||
Munroe Falls police station on Friday, June 18, 1993 by Mark Lehrer
|
||
and his father David, with an attorney accompanying to oversee this
|
||
activity.
|
||
|
||
Items received Friday June 18th were:
|
||
|
||
53 diskettes
|
||
27 unopened/blank
|
||
16 with a commercial label i.e. DeScribe, Sierra
|
||
10 of OS/2 software backups
|
||
|
||
1 coaster for cold drinks
|
||
|
||
Period.
|
||
|
||
NO E-mail was returned.
|
||
|
||
=-=-=-=-=
|
||
|
||
<6> Letter from Chief Stahl saying the Ohio Bureau of Criminal
|
||
Investigation has everything else.
|
||
|
||
Quote:
|
||
June 21, 1993
|
||
|
||
Mr. Mark Lehrer
|
||
58 Bermont Ave.
|
||
Munroe Falls, Ohio 44262
|
||
|
||
Dear Mr. Lehrer,
|
||
|
||
I appreciate you coming in to pick up your property
|
||
on June 18, 1993. I did want to advise you that we have
|
||
no more of the equipment that was seized. The rest of it
|
||
was turned over to BCI. Based on your notation, it appears you
|
||
feel you are entitled to other materials. We were
|
||
told by the prosecutor's office that we would receive a
|
||
list of items you felt you were entitled to upon completion of the
|
||
case. The case was disposed of on March 8, 1993.
|
||
To date we have received no list. On May 4, 1993 any re-
|
||
maining equipment we had in our evidence was turned over to BCI
|
||
pursuant to the court ordered disposition.
|
||
|
||
If you feel additional items need to be returned, I
|
||
suggest you contact them at P.O. Box 365 London, Ohio 43140, Attn:
|
||
Investigations Supervisor.
|
||
|
||
Sincerely,
|
||
|
||
signed
|
||
Steve Stahl
|
||
|
||
COMMENT: Not even attorney Varian had heard of any such
|
||
arrangements as this. The individual referred to at OBCI is John
|
||
Lenhart, Superintendent. Note also Stahl's first letter is dated
|
||
May 5th, one day after his 'contact' with OBCI to turn over his
|
||
'evidence'. David Lehrer
|
||
|
||
------------------------------
|
||
|
||
Date: Mon, 26 Jul 93 11:31:40 EDT
|
||
From: Paul Higgins <VALUES@GWUVM.BITNET>
|
||
Subject: File 2--Call for Paper: Computer Network Use and Abuse Conference
|
||
|
||
|
||
CALL FOR PAPERS
|
||
|
||
The National Conference of Lawyers and Scientists (NCLS) invites
|
||
proposals for original papers to be presented at a two-and-a-half-day
|
||
invitational conference on "Legal, Ethical, and Technological Aspects
|
||
of Computer and Network Use and Abuse." The conference, which will
|
||
include 40 participants representing a diverse set of perspectives and
|
||
areas of expertise, will be held in Irvine, California on December
|
||
17-19, 1993. Up to three successful applicants will receive travel
|
||
expenses and room and board at the conference. Papers will be
|
||
included in the conference proceedings and may be published
|
||
subsequently in a book or journal symposium.
|
||
|
||
The conference will focus on the ways in which the law, ethics, and
|
||
technology can contribute to influencing and enforcing the bounds of
|
||
acceptable behavior and fostering the development of positive human
|
||
values in a shared computer environment. Primary attention will be on
|
||
unwanted intrusions into computer software or networks, including
|
||
unauthorized entry and dissemination of viruses through networks or
|
||
shared disks. Discussions will deal with such issues as access to
|
||
information, privacy, security, and equity; the role of computer
|
||
users, academic institutions, industry, professional societies,
|
||
government, and the law in defining and maintaining legal and ethical
|
||
standards for the use of computer networks; and a policy agenda for
|
||
implementing these standards.
|
||
|
||
Papers are invited on any aspect of the conference theme. Especially
|
||
welcome would be papers reporting on empirical research, surveys of
|
||
computer users, and case studies (other than those that are already
|
||
well-known). Interested persons should submit a summary or outline of
|
||
no more than 500 words, together with a brief (one-page) resum% and a
|
||
statement (also brief) of how one's expertise or perspective might
|
||
contribute to the meeting. Proposals will be reviewed by an advisory
|
||
committee convened by NCLS and successful applicants will be asked to
|
||
prepare papers for the meeting. Papers must be the original work of
|
||
the author, not previously published, in good academic form, and
|
||
between about 5,000 and 8,000 words (25-30 double-spaced pages) in
|
||
length.
|
||
|
||
Deadline for receipt of proposals is 5 p.m. Eastern Time, September
|
||
15, 1993. Applicants who are selected to prepare papers will be
|
||
informed by October 1, 1993. Draft papers will be due December 3,
|
||
1993. Final versions of the papers, revised in light of conference
|
||
discussions, will be due approximately two months after the
|
||
conference.
|
||
|
||
NCLS is an organization sponsored jointly by the American Association
|
||
for the Advancement of Science and the American Bar Association,
|
||
dedicated to improving communication between members of the legal and
|
||
scientific/technical professions and exploring issues at the
|
||
intersection of law, science, and technology. Funding for this
|
||
meeting has been provided by the Program on Ethics and Values Studies
|
||
of the National Science Foundation. For further information please
|
||
contact Deborah Runkle, Directorate for Science & Policy Programs,
|
||
American Association for the Advancement of Science, 1333 H Street,
|
||
NW, Washington, DC 20005. Phone: 202-326-6600. Fax: 202-289-4950.
|
||
E-mail: values@gwuvm.gwu.edu.
|
||
|
||
------------------------------
|
||
|
||
Date: Sat, 24 Jul 1993 14:13:08 EST
|
||
From: Dave Banisar <banisar@WASHOFC.CPSR.ORG>
|
||
Subject: File 3--Credit Reports and National
|
||
|
||
Credit Reports and National Security
|
||
|
||
Last week, the Senate Intelligence Committee approved a provision
|
||
that allows for FBI access to credit reports using only a letter
|
||
instead of a judical warrant in cases that they say involved national
|
||
security. There is concern that this will be subject to abuse and that
|
||
the necessity has not been proven. Several privacy and consumer
|
||
groups sent this letter opposing the provision.
|
||
|
||
I was unable to easily find the actual text but will get it after I come
|
||
back from vacation.
|
||
|
||
Dave Banisar
|
||
CPSR Washington Office
|
||
|
||
|
||
|
||
|
||
July 12, 1993
|
||
|
||
|
||
The Honorable Dennis Deconcini
|
||
Chairman
|
||
Senate Select Committee on Intelligence
|
||
United States Senate
|
||
SH-211 Hart Senate Office Building
|
||
Washington, DC 20510-6475
|
||
|
||
Dear Chairman DeConcini;
|
||
|
||
We are writing to voice our strong opposition to the
|
||
Administration's legislative proposal to amend the Fair Credit
|
||
Reporting Act (FCRA) to allow the Federal Bureau of Investigation
|
||
(FBI) to obtain consumer credit reports in foreign
|
||
counterintelligence cases.
|
||
|
||
The FBI seeks a national security letter exemption to the
|
||
FCRA to obtain personal information from consumer reporting
|
||
agencies without a subpoena or court order. A national security
|
||
letter gives the FBI the authority to obtain records without
|
||
judicial approval and without providing notice to the individual
|
||
that his or her records have been obtained by the Bureau.
|
||
Similar FBI proposals were rejected in previous years after
|
||
Congressional leaders expressed concern over the civil liberties
|
||
issues raised.
|
||
|
||
Although the current draft proposal is more comprehensive
|
||
than those circulated in previous years, the changes and
|
||
additions do not alter significantly the central character of the
|
||
proposal. The Administration's 1993 proposal includes explicit
|
||
limits to dissemination of obtained information within the
|
||
government, penalties for violations including punitive damages,
|
||
and reporting requirements. These provisions are positive
|
||
changes from the legislation put forward in previous years, but
|
||
they do not save the proposal from its intrinsic flaws.
|
||
|
||
Therefore, the reasons for our fundamental opposition to the
|
||
current proposal remain the same: 1) the FBI has not demonstrated
|
||
a compelling need for access to consumer credit reports; and 2)
|
||
legislation that implicates civil liberties should be addressed
|
||
separately and not as part of the authorization process.
|
||
|
||
There are only two instances in which Congress has
|
||
authorized the FBI, in counterintelligence investigations, to
|
||
obtain information about individuals pursuant to a national
|
||
security letter but without a subpoena, search warrant or court
|
||
order. First, the Electronic Communications Privacy Act (ECPA)
|
||
of 1986 included a provision requiring common carriers to
|
||
disclose subscriber information and long distance toll records to
|
||
the FBI in response to a national security letter. Second,
|
||
congress included in the 1987 Intelligence Authorization Act an
|
||
amendment to the Right to Financial Privacy Act (RFPA) that
|
||
requires banks to provide customer records to the FBI in response
|
||
to a similar letter. In that case, the FBI presented to Congress
|
||
its case for obtaining financial records in foreign counter-
|
||
intelligence cases and the difficulty of obtaining those records
|
||
without a court order.
|
||
|
||
in both instances when congress has previously authorized
|
||
the national security letter, Congress recognized that the
|
||
procedure departs dramatically from the procedure necessary to
|
||
obtain a court order.
|
||
|
||
The FBI's current proposal seeks similar access to
|
||
individuals' credit records held by consumer reporting companies.
|
||
The FBI has yet to adequately justify its need to add such highly
|
||
personal, sensitive information to the narrow category of records
|
||
subject to the national security letter exemption.
|
||
The Bureau claims obtaining credit reports will allow it to
|
||
more easily determine where a subject of an investigation banks
|
||
-- information the FBI claims will help them effectuate their
|
||
ability to access bank records under the RFPA. We opposed the
|
||
national security letter exemption in the RFPA and do not endorse
|
||
the FBI's slippery slope approach to ensuring that they can more
|
||
easily obtain financial information in foreign
|
||
counterintelligence cases. This information can be and is
|
||
routinely gained without credit reports. We do not believe
|
||
convenience is a sufficient justification for this significant
|
||
exception to the law.
|
||
The FBI further argues that obtaining banking information
|
||
through a credit report is preferred because it is actually less
|
||
intrusive than those investigative methods that would otherwise
|
||
be used. While we too are frustrated that other information-
|
||
gathering techniques are frequently too intrusive, our objections
|
||
to the other techniques do not lead us to endorse yet another
|
||
technique that is also intrusive and that weakens existing
|
||
privacy law.
|
||
Finally, we object to using the authorization process as the
|
||
vehicle for pursuing this change. The national security latter
|
||
exemption, because it diminishes the due process and privacy
|
||
protections for individuals, must be given the most careful
|
||
consideration. The FBI's proposal should be introduced as
|
||
separate legislation on which public hearings can be held. only
|
||
in this way can the Committee test thoroughly the FBI's case for
|
||
the exemption and hear from witnesses who object to the change.
|
||
|
||
|
||
We urge you to reject the FBI's proposal in its current
|
||
form. We are available to work with you on this issue.
|
||
|
||
Sincerely,
|
||
|
||
|
||
|
||
Janiori Goldman Michelle Meier
|
||
Privacy and Technology Project Consumers Union
|
||
American civil Liberties Union
|
||
|
||
|
||
Marc Rotenberg Evan Hendricks
|
||
Computer Professionals for U.S. Privacy Council
|
||
Social Responsibility
|
||
|
||
|
||
|
||
|
||
|
||
|
||
cc: Members, Senate Select Committee on Intelligence
|
||
|
||
The Honorable George J. Mitchell
|
||
Senate Majority Leader
|
||
|
||
The Honorable Donald W. Riegle, Jr., Chairman
|
||
Senate Committee on Banking, Housing and Urban Affairs
|
||
|
||
The Honorable Patrick J. Leahy, Chairman
|
||
Subcommittee on Technology and the Law
|
||
|
||
------------------------------
|
||
|
||
Date: Thu, 22 Jul 1993 10:42:07 -0700
|
||
From: Jim Warren <jwarren@WELL.SF.CA.US>
|
||
Subject: File 4--UPDATE #19-AB1624: PROGRAMMERS! START YOUR ENGINES!
|
||
|
||
July 20, 1993
|
||
|
||
Okay, all you programmers who volunteered to create readers, indexers,
|
||
print utilities, etc., for California's legislative data --HERE'S YOUR
|
||
FIRST CHANCE.
|
||
|
||
GAIN FAME AND GLORY (if not wealth :-) ! Be the FIRST to create
|
||
legislative data-handling utilities and share the source-code with the
|
||
world. Do it fast, and you/it can amaze and impress legislators at
|
||
the Aug. 18th Senate Rules Committee hearing on AB1624.
|
||
|
||
The Legislative Data Center (LDC) has provided bill-author Bowen's
|
||
office with six diskettes full of sample legislative data in the
|
||
various forms in which it exists internally, at the LDC and/or the
|
||
Office of State Printing (OSP).
|
||
|
||
They also provided documentation-files in electronic form.
|
||
|
||
With some kindly Sacramento assistance, Tim Pozar now has all of these
|
||
files available across the Internet in the anonymous ftp directory
|
||
(file transfer protocol) on kumr.lns.com.
|
||
|
||
To obtain copies of the files, use the command "ftp kumr.lns.com".
|
||
Login as "anonymous" and use your mailing address as a password.
|
||
|
||
Be sure to use the command "binary" to transfer the files intact.
|
||
Use the command "cd pub/ldc" to change to the proper directory.
|
||
Then the command "mget *" to get all of the files. After all of the
|
||
files are retrieved, type the command "quit" to end the ftp session
|
||
and log out of kumr.kns.com.
|
||
|
||
If you have ftp problems, contact Tim:
|
||
Internet: pozar@kumr.lns.com FidoNet: Tim Pozar @ 1:125/555
|
||
Snail: Tim Pozar, KKSF, 77 Maiden Lane, San Francisco CA 94108
|
||
POTS: +1 415 788 2022 Radio: KC6GNJ / KAE6247
|
||
|
||
According to LCD notes that accompanied the diskettes, the files include:
|
||
cgml.sou - California Generic Markup Language (CGML) parser table
|
||
codes.fmt - documentation of CGML (the LDC formatting language, that does
|
||
*not* give the page- or line-numbers by which amendments are defined)
|
||
measures.fmt - documentation of Page II (the OSP typesetting input, which is
|
||
the only source of the page- and line-numbers of printed bills)
|
||
*cg.ina - introduced bill, in the Assembly, coded in CGML
|
||
*cg.ams - amended bill, in the Senate, coded in CGML
|
||
*.cg - Constitution part, state code or uncodified statute, coded in CGML
|
||
ab????.ina - bill introduced in the Assembly, coded in Page II
|
||
ab????.ams - Assembly bill amended in the Senate, coded in Page II
|
||
*.pg2 - Page II tables for introduced, amended, enrolled and chaptered bills
|
||
*ca - committee analysis
|
||
*fa - floor analysis
|
||
*cf - committee vote
|
||
*fv - floor vote
|
||
*s - bill status
|
||
*h - bill history
|
||
*ve - Governor's veto message
|
||
063093.boo files apparently concern the Assembly and Senate Daily Files.
|
||
If you have questions AFTER you have diligently diddled these files and
|
||
become totally frustrated, send specific questions to me and I'll try to
|
||
scrounge up some answers. [No guarantees, though. :-) ]
|
||
|
||
Let me know if/when you think you have some code working, and we'll figure
|
||
out how best to gloriously - and *timely* - flaunt it in Sacramento. :-)
|
||
[Note: I will be at the Telluride Tele-Community conference and mostly offline
|
||
7/22-7/26.]
|
||
|
||
------------------------------
|
||
|
||
Date: Fri, 16 Jul 1993 16:34:17 EDT
|
||
From: Doug Schuler <douglas@GRACE.RT.CS.BOEING.COM>
|
||
Subject: File 5--Community Network Survey Results Available
|
||
|
||
Community Networkers,
|
||
|
||
A few months ago I distributed a community network survey to several
|
||
electronic forums. I stated that I'd make the survey results available
|
||
electronically and I've received quite a few requests for the results.
|
||
I've *finally* moved them to a site suitable for anonymous ftp.
|
||
|
||
ftp to atlas.ce.washington.edu
|
||
login = anonymous
|
||
password = e-mail-address
|
||
cd to pub/seattle-community-network/community-networks/surveys
|
||
|
||
The completed surveys, explanatory information and blank surveys
|
||
are also in the directory. I hope to maintain up-to-date information
|
||
so completed surveys on systems not previously described or completed
|
||
surveys that reflect major changes in status are welcome. I'd prefer
|
||
that these be mailed to me. My address is dschuler@cs.washington.edu.
|
||
|
||
I've received nearly 30 completed surveys so far.
|
||
|
||
I hope that this information is useful. Thanks to everybody that's
|
||
participated!
|
||
|
||
-- Doug
|
||
|
||
|
||
P.S. I've purposefully kept the survey short. I'm interested in
|
||
comments on improving the survey.
|
||
|
||
|
||
|
||
Completed (or nearly completed) Surveys
|
||
---------------------------------------
|
||
|
||
CIAO-trail-freenet Vancouver, B.C., Canada
|
||
IGC San Francisco, CA
|
||
SPACECON Merritt Island, FL
|
||
african-studies-bbs Madison, WI
|
||
akron-regional-freenet Akron, OH
|
||
boston-peace-and-justice-hotline Brighton, MA
|
||
chippewa-valley-freenet Eau Claire, WI
|
||
columbia-online-information-network Columbia, MO
|
||
cruzio Santa Cruz, CA
|
||
denver-freenet Denver, CO
|
||
ecoline Burlington, VT
|
||
eugene-community-network Eugene, OR
|
||
FACTS Fayetteville, NC [nearly ready]
|
||
heartland-freenet Peoria, IL
|
||
mt-view-community-network Mountain View, CA
|
||
national-capital-freenet Ottawa, Ontario, Canada
|
||
new-mexico-network Albuquerque, NM
|
||
rtk Washington, DC
|
||
santa-cruz-county-wan Santa Cruz, CA
|
||
seattle-community-network Seattle, WA [nearly ready]
|
||
slo-county San Luis Obispo, CA
|
||
suncoast-freenet Tampa, FL
|
||
sustainable-development-info-network Cambridge, MA
|
||
toronto-freenet Toronto, Ontario, Canada
|
||
triangle-freenet Triangle Park, NC
|
||
youngstown-freenet Youngstown, OH
|
||
|
||
|
||
++++++++++++
|
||
Thanks to David Barts and Coralee Whitcomb for help with this.
|
||
|
||
------------------------------
|
||
|
||
End of Computer Underground Digest #5.56
|
||
************************************
|
||
|
||
|