906 lines
42 KiB
Plaintext
906 lines
42 KiB
Plaintext
Computer underground Digest Tue May 17, 1994 Volume 6 : Issue 42
|
|
ISSN 1004-042X
|
|
|
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|
Archivist: Brendan Kehoe
|
|
Retiring Shadow Archivist: Stanton McCandlish
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Covey Editors: D. Bannaducci & S. Jones
|
|
|
|
CONTENTS, #6.42 (May 17, 1994)
|
|
|
|
File 1--Hope Conference
|
|
File 2--The creeping evil of people with funny nameZ (REVIEW)
|
|
File 3--Contributions Wanted for Book on Internet Culture
|
|
File 4--Letter to NSF Internet Pricing (TAP Info Policy Note)
|
|
File 5--Fidonet Crackdown in Italy (update)
|
|
File 6--FEDGOVT> Congress On-Line (fwd)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send a one-line message: SUB CUDIGEST your name
|
|
Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
|
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
UNITED STATES: etext.archive.umich.edu (141.211.164.18) in /pub/CuD/
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
----------------------------------------------------------------------
|
|
|
|
Date: Sun, 15 May 1994 15:00:48 -0700
|
|
From: Emmanuel Goldstein <emmanuel@WELL.SF.CA.US>
|
|
Subject: File 1--Hope Conference
|
|
|
|
H A C K E R S O N P L A N E T E A R T H !
|
|
====================================================================
|
|
* T h e F i r s t U. S. H a c k e r C o n g r e s s *
|
|
|
|
|
|
Come together in the summer of 1994 to celebrate the hacker world
|
|
and the tenth anniversary of 2600 Magazine. We will have speakers and
|
|
demonstrations from around the globe, a collection of films and rare
|
|
videos on hacking, and our very own network between all of us
|
|
and the outside world!
|
|
|
|
This is an opportunity to feel the real magic of hacking instead of
|
|
hearing about how we're about to destroy the world in some cheap tabloid
|
|
or on the news during sweeps week. Government propaganda and corporate
|
|
doublespeak have finally met their match!
|
|
|
|
If you want to help put together this historic event, contact us
|
|
by telephone at (516) 751-2600, through the mail at H.O.P.E., PO Box 848,
|
|
Middle Island, NY 11953, on the Internet at 2600@well.sf.ca.us.
|
|
We need ideas, people, technology, and karma.
|
|
|
|
H.O.P.E. - August 13th and 14th at the Hotel Pennsylvania,
|
|
right in the middle of bustling New York City (Seventh Avenue and
|
|
34th Street, right across the street from Penn Station). We've rented out
|
|
the entire top floor (except for the mysterious NYNEX office).
|
|
Special rates of $99 a night are available from the hotel (double rooms,
|
|
four can probably fit easily). Cheaper places are also available as is
|
|
nearly anything else. This is New York City, after all.
|
|
|
|
Admission to the conference is $20 for the entire weekend if you
|
|
preregister, $25 at the door, regardless of whether you stay for two days
|
|
or five minutes. We encourage you to bring a computer so you can tie into
|
|
our giant Ethernet and add to the fun. We hope you try to hack root on
|
|
the system we'll be running - all attendees will get accounts with
|
|
prizes for the penetrators.
|
|
|
|
Dancing and merchandising in the halls
|
|
|
|
Cellular phone workshop
|
|
|
|
Celebration of the Clipper Chip (not)
|
|
|
|
Hacker videos from all over the world
|
|
|
|
Surveillance demos
|
|
|
|
Hacker legends from around the globe
|
|
|
|
It's not Woodstock - It's The Future
|
|
|
|
Many more details are on the way.
|
|
|
|
Information sources:
|
|
|
|
2600 Magazine
|
|
The Hacker Quarterly
|
|
Summer 1994 edition
|
|
|
|
Off The Hook
|
|
Wednesdays, 10:00 pm
|
|
WBAI 99.5 FM
|
|
New York City
|
|
|
|
2600 Voice BBS
|
|
516-473-2626
|
|
|
|
alt.2600
|
|
on the Internet
|
|
|
|
and random bits of text like this
|
|
|
|
------------------------------
|
|
|
|
Date: 16 May 94 16:40:30 EDT
|
|
From: Urnst Couch / Crypt Newsletter <70743.1711@COMPUSERVE.COM>
|
|
Subject: File 2--The creeping evil of people with funny nameZ (REVIEW)
|
|
|
|
"DR. SOLOMON'S PC ANTI-VIRUS BOOK" EXPOSES
|
|
THE CREEPING EVIL OF PEOPLE WITH FUNNY NAMES WHOM
|
|
YOU WILL NEVER MEET
|
|
|
|
Sometime at the dawn of the personal computer age, publishers reversed
|
|
the laws of good writing for the specialty niche of computer books.
|
|
In place, readers got anti-consumerism which mandated that, usually,
|
|
books about computers, computer issues, or software would be written
|
|
only by presidents or employees of computer manufacturers, consulting
|
|
firms peddling advice on computer issues defined by the same
|
|
consultants or software developers and their publicity stooges.
|
|
|
|
This means that if you actually buy such books, you're getting a pig
|
|
in a poke. Nowhere is this more obvious than the "DOS For Dummies"
|
|
series, a line of pamphlets so easy to sell competitors have rushed
|
|
out mimics written for "Idiots" and/or "Morons."
|
|
|
|
And, in the true spirit of American mass marketing, you can now
|
|
purchase attractive yellow and black "DOS For Dummies" baseball caps,
|
|
suitable for wearing inside the house, restaurant, bowling alley or
|
|
local smart bar. In reality, the hats are a fiendishly clever IQ
|
|
test. If you buy one, you fail, signalling to the corporate office
|
|
that you are the kind of Pavlovian consumer ready to invest in a fax
|
|
subscription to weekly company press releases.
|
|
|
|
Which is a long way of bringing the reader to "Dr. Solomon's
|
|
Anti-Virus Book" (New-Tech/Reed Elsevier), which fits all the, uh,
|
|
_good_ characteristics of the _computer book_.
|
|
|
|
On the cover are always tip-offs. Look for concocted venal plaudits
|
|
and non-sequiturs. For instance, "The Anti-Virus Book" is "THE book
|
|
on how to eliminate computer viruses" ". . . from the foremost
|
|
anti-virus experts" and exposes "computer games and viruses - the
|
|
truth!" The publishing inference is that readers have somehow become
|
|
too stupid in 1994 to recognize something decent without a gratuitous
|
|
amount of pettifogging and boasting.
|
|
|
|
Alan Solomon and his co-author, Tim Kay, do realize the bogus nature
|
|
of computer literature. On page 26 they write, "If you hadn't the
|
|
money to start manufacturing, or the knowledge to program, you could
|
|
always aim at the book market . . . Anyone who could persuade a
|
|
publisher that he had an area of expertise and could write, which
|
|
wasn't that difficult, could get into print. One author was reputed
|
|
to be writing four or five books at once by using several different
|
|
typists in different rooms. The story went that he walked from room
|
|
to room dictating a sentence to each typist as he went. Looking at
|
|
some of the output, there is no reason to doubt this story."
|
|
|
|
That's a good tale. But rather ill-spirited when considering "The PC
|
|
Anti-Virus Book" is a higgledy-piggledy assembly of reprints from the
|
|
S&S International (Solomon's company) corporate organ Virus News
|
|
International, Solomon interviewing himself and bursts of writing
|
|
which make absolutely zero sense.
|
|
|
|
For example:
|
|
|
|
"It would be difficult to create more [virus] experts, because the
|
|
learning curve is very shallow. The first time you disassemble
|
|
something like Jerusalem virus, it takes a week. After you've done a
|
|
few hundred viruses, you could whip through something as simple as
|
|
Jerusalem in 15 minutes."
|
|
|
|
Or:
|
|
|
|
" . . . the DOS virus will become as irrelevant as CPM (an obsolete
|
|
operating system). Except that DOS will still be around 10 or 20
|
|
years from now, and viruses for the new operating system will start to
|
|
appear as soon as it is worth writing them."
|
|
|
|
And this favorite:
|
|
|
|
". . . take the game of virus consequences:
|
|
|
|
"In the game of Consequences, you start with a simple phrase, and
|
|
build up to a convoluted and amusing story. In the virus version of
|
|
consequences, you start off with a false alarm and build from there."
|
|
|
|
The computer underground also figures highly in Solomon's book as he
|
|
spent a great deal of time over the past couple years attempting to
|
|
track down and telephone American hackers from the United Kingdom.
|
|
|
|
Nowhere Man - the author of the Virus Creation Laboratory - is in the
|
|
book. Although VCL viruses never seemed to make it into the wild,
|
|
mentioning the software without pointing this out has always been in
|
|
vogue. Members of the hacking group phalcon/SKISM appear, as does
|
|
John Buchanan, a Virginia Beach resident, who sold his virus
|
|
collection to numerous takers, making about $6-7,000 in the process.
|
|
Solomon didn't have these numbers - they're mine. He also fails to
|
|
mention that at one point Buchanan contributed his virus collection to
|
|
S&S International and was nominated for membership in the
|
|
pan-professional Computer Anti-Virus Research Organization by Solomon,
|
|
one of its charter members.
|
|
|
|
Solomon's book wouldn't be complete if it didn't invoke the creeping
|
|
evil of virus exchange bulletin board systems. "The Hellpit" [sic]
|
|
near Chicago, is one.
|
|
|
|
And "Toward the end of 1992, the US Government started offering
|
|
viruses to people who called one of their BBS's . . . In 1993 the
|
|
Crypt newsletter blew the whistle on the US Government [AIS bulletin
|
|
board] system . . . " Solomon writes.
|
|
|
|
Since I edit the newsletter, this is a surprise to me and I'm sure,
|
|
Kim Clancy, the AIS system supervisor. But it's almost identical to
|
|
the nutty claim made by American computer security consultant Paul
|
|
Ferguson when the black-balling of AIS was featured news in Computer
|
|
underground Digest. As the story developed, Ferguson - egged on by
|
|
Solomon - planted complaints about AIS in RISKS Digest and, later, the
|
|
Washington Post. Solomon has been a reader of the Crypt Newsletter and
|
|
it must have seemed logical to embroider the story because a back
|
|
issue featured an interview with Clancy after she was profiled in
|
|
Computer underground Digest.
|
|
|
|
However, Clancy had been a target of CARO since opening her system to
|
|
hacker underground files. Finally, the negative publicity campaign
|
|
did that part of the AIS system in.
|
|
|
|
What a lot of people don't know is that other public systems have been
|
|
a target of the same people. About a year earlier, Hans Braun's
|
|
COM-SEC computer security BBS in San Francisco had been a target of a
|
|
similar smear campaign for carrying issues of 40Hex, a
|
|
phalcon/SKISM-edited virus-programming electronic magazine. In a
|
|
recent interview for the book "The Virus Creation Labs," Braun
|
|
mentioned security workers David Stang (who has by turns been involved
|
|
with or worked for the National Computer Security Association in
|
|
Carlisle, Pennsylvania; the International Computer Security
|
|
Association - now defunct - in Washington, DC; and Norman Data Defense
|
|
of Falls Church, Virginia) and Alan Solomon as responsible for the
|
|
pressure. Since COM-SEC wasn't politically sensitive like AIS, Braun
|
|
said the efforts to tar him were unsuccessful. COM-SEC still carries
|
|
40Hex magazine.
|
|
|
|
"The anti-virus software industry is going through a shake-out; not
|
|
everyone is successful anymore," said Braun. "It's my opinion, most
|
|
of these kinds of things are really attempts to keep access to
|
|
information from competitors."
|
|
|
|
"The Anti-Virus Book" also has annals of alleged virus-related
|
|
computer crime, which illustrates the same rush to seize everything
|
|
without leveling criminal charges as seen in the United States.
|
|
|
|
In the book there is the case of an unnamed man in the town of Rugby,
|
|
who had his door broken down by a sledgehammer and all his equipment
|
|
grabbed by New Scotland Yard officers in December of 1992 after taking
|
|
out an ad selling a virus collection in the English periodical Micro
|
|
Computer Mart. The charges were ethereal to non-existent.
|
|
|
|
About the same time, a hacker was arrested for stealing phone service
|
|
from his neighbor's line and his equipment confiscated, too. The
|
|
hacker turned out to be Apache Warrior, a member of the small United
|
|
Kingdom virus-writing group called ARCV (for Association of Really
|
|
Cruel Viruses).
|
|
|
|
Some background information not included in the book: Alan Solomon
|
|
was apparently able to convince New Scotland Yard's computer crime
|
|
unit that they should also try to prosecute Apache Warrior as a
|
|
virus-writer and that the rest of the group should be rounded up, too.
|
|
In conversation, Solomon has said Apache Warrior turned over the names
|
|
of other group members. Subsequently, New Scotland Yard and local
|
|
constabularies conducted raids at multiple sites in England, arresting
|
|
another man. Paradoxically, prior to the arrests, Solomon joked that
|
|
ARCV was better at cyber-publicity than virus programming and its
|
|
creations were little more than petty menaces. The book offers no
|
|
reported incidences of ARCV viruses on the computers of others,
|
|
although Virus News International, by extension S&S International,
|
|
solicited readers for such evidence in 1993.
|
|
|
|
Later in the year, Solomon telephoned John Buchanan to tell him he had
|
|
been implicated as a member of ARCV - he was not - and that Scotland
|
|
Yard might be interested in extraditing him for trial. It turned out
|
|
to be so much air.
|
|
|
|
Apache Warrior settled with the telephone company for the fraud and
|
|
the virus-writing prosecutions remain unresolved. Most of this is
|
|
left out of "The PC Anti-Virus Book" except parts about the necessity
|
|
of jailing virus programmers.
|
|
|
|
The final part of "The Anti-Virus Book" is devoted to around fifty
|
|
pages of leaden legal boilerplate addressing computer meddling
|
|
supplied by a lawyer named Wendy R. London. Only those required under
|
|
penalty of death or the mentally ill would be interested in paying
|
|
attention to it.
|
|
|
|
A computer book must also include poor reviews of the author's
|
|
competitors' products. "The Anti-Virus Book" toes the line in this
|
|
regard, criticizing McAfee Associates and Central Point Software.
|
|
|
|
Also included is a diskette containing an extravagant color
|
|
advertisement for S&S International and a poster-sized Virus Calendar
|
|
for 1994 and 1995.
|
|
|
|
The calendar was fun. I'm thinking of sending it to some middle
|
|
manager in computer services at a large, boring corporation (or an
|
|
editor at a computer magazine). Then they can vex their underlings
|
|
(or readers) every day with network e-mail like, "It's May 31. Be on
|
|
the lookout for Tormentor-Lixo-Nuke, VCL-Diogenes, AntiCad-COBOL,
|
|
Month 4-6, Ital Boy, and Kthulhu computer viruses."
|
|
|
|
Finally, it would be unfair not to mention "The Anti-Virus Book's"
|
|
GOOD parts. The technical analyses of well known PC computer viruses
|
|
were fascinating as was Solomon's description of how he developed
|
|
specialized virus identification programming for S&S International.
|
|
Solomon's development project, called Virtran, was capped when John
|
|
Buchanan - the same fellow who was denounced by him for selling
|
|
viruses in America - gave the programmer a copy of the NuKE Encryption
|
|
Device, or NED - a piece of code written by Nowhere Man and designed
|
|
to encrypt viruses in an esoteric manner. At the time Solomon
|
|
received it, the NED code wasn't actually in any viruses. It still
|
|
isn't, in fact, except for one called ITSHARD. And the story of the
|
|
development of Solomon's anti-virus software shows how the virus
|
|
underground and one developer in 1993 had each other in a weird
|
|
involuntary combination stranglehold and symbiosis.
|
|
|
|
". . . it does everything in a hundred different ways; it uses word
|
|
and byte registers, there are lots of noisy nonsense bytes, little
|
|
jumps . . . The NED looked like something out of a Salvador Dali
|
|
nightmare and I thought it was going to take a month of programming
|
|
[to detect ITSHARD]," writes Solomon.
|
|
|
|
According to the book, Solomon threw up his hands and decided to
|
|
revive a stalled project called the Ugly Duckling. The result was a
|
|
major revision of his software, the fruition of the proprietary
|
|
Virtran programming techniques used in it and a Queen's Award for
|
|
Technological Achievement in 1993. The one NED virus - ITSHARD -
|
|
still isn't in the wild almost two years after Nowhere Man wrote the
|
|
original encryption code.
|
|
|
|
These sections didn't suffer at the hands of the patchwork editors who
|
|
threw most of "The Anti-Virus Book" together. Unfortunately, they
|
|
comprise a small part of "The Anti-Virus Book" and were written so
|
|
that only someone already acquainted with the field - not your average
|
|
computer user - would get much from them. Just like most of the
|
|
dubious literature marketed by computer book publishers.
|
|
|
|
------------------------------
|
|
|
|
Date: 15 May 1994 04:18:11 GMT
|
|
From: dporter@LELAND.STANFORD.EDU(David Porter)
|
|
Subject: File 3--Contributions Wanted for Book on Internet Culture
|
|
|
|
I am looking for people who might be interested in contributing to a
|
|
new book on Internet Culture. The project is still in its early
|
|
planning stages, but I foresee an anthology gathering together a
|
|
collection of essays, stories and even poetry about life on the Net.
|
|
I'm particularly interested in the way the possibilities of
|
|
"cyberspace" get people thinking in new ways about things like
|
|
community, social interaction, authority, manners, sexuality,
|
|
education, story-telling, youth culture, the public sphere, and so on.
|
|
I don't have any set line on any of these things beyond my conviction
|
|
that things are changing out there in interesting ways, and ways that
|
|
are worth thinking and talking about.
|
|
|
|
At this stage I am not yet asking for contributions, but rather for
|
|
comments and initial expressions of interest from people who might
|
|
like to contribute something later. If you have an idea for a piece
|
|
you might like to do (or that you have already done), please send me a
|
|
brief description of what you're thinking about via e-mail
|
|
(dporter@leland.stanford.edu) within the next couple of weeks. Based
|
|
on the responses I receive, I'll decide if the project actually seems
|
|
feasible, and if so, try to form a better idea of the shape the book
|
|
might take. At that point I'll write back to all those who responded
|
|
to talk about how we might proceed.
|
|
|
|
I see my own role in all this primarily as that of an editor, though I
|
|
might also contribute a piece myself. My own background happens to be
|
|
academic (I'm a doctoral student in Comparative Literature at
|
|
Stanford), and though I would welcome scholarly contributions, I'm
|
|
hoping this collection will represent a wide range of styles and
|
|
approaches, and don't want to prescribe in advance the forms
|
|
submissions might take. I've edited a book before (Between Men and
|
|
Feminism, Routledge, 1992), and taught a couple of courses on the
|
|
social impact of computing, so I'm reasonably confident about my
|
|
ability to bring the project off.
|
|
|
|
Please write to let me know what you think, and what you might like to
|
|
contribute! Also, if you can suggest other newsgroups where this
|
|
message might find a favorable reception, I'll try to post it there
|
|
too.
|
|
|
|
Thanks,
|
|
|
|
David Porter
|
|
|
|
dporter@leland.stanford.edu
|
|
Dept. of Comparative Literature
|
|
Stanford University
|
|
Stanford, CA 94305-2087
|
|
|
|
------------------------------
|
|
|
|
Date: Sat, 7 May 1994 16:38:20 -0400
|
|
From: email list server <listserv@SNYSIDE.SUNNYSIDE.COM>
|
|
Subject: File 4--Letter to NSF Internet Pricing (TAP Info Policy Note)
|
|
|
|
This message is being forwarded to the cpsr-announce list as it is
|
|
very relevant to the issue of equal access to the NII- a principle
|
|
fundamental to CPSR's NII policy.
|
|
|
|
TAP postings are archived at cpsr.org:/taxpayer_assets.
|
|
Several other postings on the Internet are listed there.
|
|
|
|
*********************************************************************
|
|
|
|
Distributed to TAP-INFO, a free Internet Distribution List
|
|
(subscription requests to listserver@essential.org)
|
|
|
|
TAXPAYER ASSETS PROJECT - INFORMATION POLICY NOTE
|
|
May 7, 1994
|
|
|
|
- Request for signatures for a letter to NSF opposing metered
|
|
pricing of Internet usage
|
|
|
|
- Please repost this request freely
|
|
|
|
The letter will be sent to Steve Wolff, the Director of
|
|
Networking and Communications for NSF. The purpose of the letter
|
|
is to express a number of user concerns about the future of
|
|
Internet pricing. NSF recently announced that is awarding five
|
|
key contracts to telephone companies to operate four Internet
|
|
"Network Access Points" (NAPs), and an NSF funded very high speed
|
|
backbone (vBNS). There have been a number of indications that
|
|
the telephone companies operating the NAPs will seek permission
|
|
from NSF to price NAPs services according to some measure of
|
|
Internet usage. The vBNS is expected to act as a testbed for new
|
|
Internet pricing and accounting schemes. The letter expresses
|
|
the view that metered pricing of Internet usage should be
|
|
avoided, and that NSF should ensure that the free flow of
|
|
information through Internet listserves and file server sites is
|
|
preserved and enhanced.
|
|
|
|
jamie love, Taxpayer Assets Project (love@essential.org; but
|
|
unable to answer mail until May 15). Until then, direct
|
|
inquires to Michael Ward.
|
|
|
|
If you are willing to sign the letter, send the following
|
|
information to Mike Ward of the Taxpayer Assets Project
|
|
(mike@essential.org, fax: 202/234-5176; voice: 202/387-8030;
|
|
P.O. Box 19367, Washington, DC 20036):
|
|
|
|
Names: ___________________________
|
|
Title: ___________________________ (Optional)
|
|
Affiliation: ____________________________________
|
|
(for purposes of identification only)
|
|
Address: ______________________________________
|
|
City; St, Zip ________________________________
|
|
Email Address: _____________________________________
|
|
Voice: __________________________________
|
|
for verification)
|
|
|
|
the letter follows:
|
|
|
|
Steve Wolff
|
|
Director
|
|
Division of Networking and Communications
|
|
National Science Foundation
|
|
1800 G Street
|
|
Washington, DC 20550
|
|
|
|
Dear Steve:
|
|
|
|
It is our understanding that the National Science Foundation
|
|
(NSF) and other federal agencies are developing a new
|
|
architecture for the Internet that will utilize four new Network
|
|
Access Points (NAPs), which have been described as the new
|
|
"cloverleaves" for the Internet. You have indicated that NSF is
|
|
awarding contracts for four NAPs, which will be operated by
|
|
telephone companies (Pac Bell, S.F.; Ameritech, Chicago; Sprint,
|
|
NY; and MFS, Washington, DC). We further understand that NSF has
|
|
selected MCI to operate its new very high speed backbone (vBNS)
|
|
facility.
|
|
|
|
There is broad public interest in the outcome of the negotiations
|
|
between NSF and the companies that will operate the NAPs and
|
|
vBNS. We are writing to ask that NSF consider the following
|
|
objectives in its negotiations with these five firms:
|
|
|
|
PRICING.
|
|
|
|
We are concerned about the future pricing systems for Internet
|
|
access and usage. Many users pay fixed rates for Internet
|
|
connections, often based upon the bandwidth of the connection,
|
|
and do not pay for network usage, such as the transfer of data
|
|
using email, ftp, Gopher or Mosaic. It has been widely reported
|
|
on certain Internet discussion groups, such as com-priv, that the
|
|
operators of the NAPs are contemplating a system of usage based
|
|
pricing.
|
|
|
|
We are very concerned about any movement toward usage based
|
|
pricing on the Internet, and we are particularly concerned about
|
|
the future of the Internet Listserves, which allow broad
|
|
democratic discourse on a wide range of issues. We believe that
|
|
the continued existence and enhancement of the Internet
|
|
discussion groups and distribution lists is so important that any
|
|
pricing scheme for the NAPs that would endanger or restrict their
|
|
use should be rejected by the NSF.
|
|
|
|
It is important for NSF to recognize that the Internet is more
|
|
than a network for scientific researchers or commercial
|
|
transactions. It represents the most important new effort to
|
|
expand democracy into a wide range of human endeavors. The open
|
|
communication and the free flow of information have make
|
|
government and private organizations more accountable, and
|
|
allowed citizens to organize and debate the widest range of
|
|
matters. Federal policy should be directed at expanding public
|
|
access to the Internet, and it should reject efforts to introduce
|
|
pricing schemes for Internet usage that would mimic commercial
|
|
telephone networks or expensive private network services such as
|
|
MCI mail.
|
|
|
|
To put this into perspective, NSF officials must consider how any
|
|
pricing mechanisms will change the economics of hosting an
|
|
Internet electronic mail discussion groups and distribution
|
|
lists. Many of these discussion groups and lists are very large,
|
|
such as Humanist, GIS-L, CNI-Copyright, PACS-L, CPSR-Announce or
|
|
Com-Priv. It is not unusual for a popular Internet discussion
|
|
group to have several thousand members, and send out more than
|
|
100,000 email messages per day. These discussion groups and
|
|
distribution lists are the backbones of democratic discourse on
|
|
the Internet, and it is doubtful that they would survive if
|
|
metered pricing of electronic mail is introduced on the Internet.
|
|
|
|
Usage based pricing would also introduce a wide range of problems
|
|
regarding the use of ftp, gopher and mosaic servers, since it
|
|
conceivable that the persons who provide "free" information on
|
|
servers would be asked to pay the costs of "sending" data to
|
|
persons who request data. This would vastly increase the costs
|
|
of operating a server site, and would likely eliminate many
|
|
sources of data now "published" for free.
|
|
|
|
We are also concerned about the types of accounting mechanisms
|
|
which may be developed or deployed to facilitate usage based
|
|
pricing schemes., which raise a number of concerns about personal
|
|
privacy. Few Internet users are anxious to see a new system of
|
|
"surveillance" that will allow the government or private data
|
|
vendors to monitor and track individual usage of Information
|
|
obtained from Internet listserves or fileserves.
|
|
|
|
ANTI-COMPETITIVE PRACTICES
|
|
|
|
We are also concerned about the potential for anti-
|
|
competitive behavior by the firms that operate the NAPs. Since
|
|
1991 there have been a number of criticisms of ANS pricing
|
|
practices, and concerns about issues such as price discrimination
|
|
or preferential treatment are likely to become more important as
|
|
the firms operating the NAPs become competitors of firms that
|
|
must connect to the NAPs. We are particularly concerned about
|
|
the announcements by PAC-Bell and Ameritech that they will enter
|
|
the retail market for Internet services, since both firms were
|
|
selected by NSF to operate NAPs. It is essential that the
|
|
contracts signed by NSF include the strongest possible measures
|
|
to insure that the operators of the NAPs do not unfairly
|
|
discriminate against unaffiliated companies.
|
|
|
|
Recommendations:
|
|
|
|
As the Internet moves from the realm of the research community to
|
|
a more vital part of the nation's information infrastructure, the
|
|
NSF must ensure that its decisions reflect the needs and values
|
|
of a much larger community.
|
|
|
|
1. The NSF contracts with the NAPs operators will include
|
|
clauses that determine how the NAP services will be priced.
|
|
It is important that NSF disclose and receive comment on all
|
|
pricing proposals before they become final. NSF should
|
|
create an online discussion list to facilitate public dialog
|
|
on the pricing proposals, and NSF should identify its
|
|
criteria for selecting a particular pricing mechanism,
|
|
addressing the issue of how the pricing system will impact
|
|
the Internet's role in facilitating democratic debate.
|
|
|
|
2. NSF should create a consumer advisory board which would
|
|
include a broad cross section of consumer interests,
|
|
including independent network service providers (NSPs),
|
|
publishers of Internet discussion groups and distribution
|
|
lists, academic networks, librarians, citizen groups and
|
|
individual users. This advisory board should review a
|
|
number of policy questions related to the operation of the
|
|
Internet, including questions such as the NAP pricing, NAP
|
|
operator disclosure of financial, technical and operational
|
|
data, systems of Internet accounting which are being tested
|
|
on the vBNS and other topics.
|
|
|
|
3. NSF should solicit public comment, though an online
|
|
discussion group, of the types of safeguards against
|
|
anticompetitive behavior by the NAPs which should be
|
|
addressed in the NSF/NAPs contracts, and on issues such as
|
|
NAPs pricing and Internet accounting systems.
|
|
|
|
+-----------------------------------------------------------------
|
|
TAP-INFO is an Internet Distribution List provided by the Taxpayer
|
|
Assets Project (TAP). TAP was founded by Ralph Nader to monitor the
|
|
management of government property, including information systems and
|
|
data, government funded R&D, spectrum allocation and other government
|
|
assets. TAP-INFO reports on TAP activities relating to federal
|
|
information policy. tap-info is archived at ftp.cpsr.org;
|
|
gopher.cpsr.org and wais.cpsr.org
|
|
|
|
Subscription requests to tap-info to listserver@essential.org with
|
|
the message: subscribe tap-info your name
|
|
+-----------------------------------------------------------------
|
|
Taxpayer Assets Project; P.O. Box 19367, Washington, DC 20036
|
|
v. 202/387-8030; f. 202/234-5176; internet: tap@essential.org
|
|
+-----------------------------------------------------------------
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 16 May 94 16:31:26 GMT
|
|
From: luc pac <LPACCAG@ITNCISTI.BITNET>
|
|
Subject: File 5--Fidonet Crackdown in Italy (update)
|
|
|
|
Updates will follow.
|
|
|
|
>From 'la Repubblica' , May 13th 1994, page 21
|
|
|
|
COMPUTER PIRATE HUNTING IN ITALY
|
|
(Caccia ai pirati dell'informatica)
|
|
|
|
by CLAUDIO GERINO
|
|
|
|
Translated by Fabio Rossetti. Translator's notes in square brackets. 'La
|
|
Repubblica' is currently the 2nd most important newspaper in Italy after
|
|
the 'Corriere della Sera'.
|
|
|
|
ROME - Crime association finalized to the spreading of illegaly
|
|
duplicated computer software; illegal passwords used to break into
|
|
government owned computers: the first maxi-operation against computer
|
|
piracy starts from the prosecutor's office in Pesaro, Italy, following
|
|
the passage of the new computer crime bill on January 14th. Dozens of
|
|
BBSes ('telematic data-banks') have been shut down; computers, floppy
|
|
disks and modem have been seized; a large number of sysops (system
|
|
operators) has been denounced all over Italy. Nonetheless, the actions
|
|
of Sostituto Procuratore [italian prosecutor] Gaetano Saverio Pedrocchi
|
|
have been questioned by the networks involved in the affair. Two very
|
|
well-known networks, Peacelink and Fidonet, have been indeed caught
|
|
under the eye of the judge from Pesaro.
|
|
|
|
The first network - Peacelink - offers news and services regarding
|
|
pacifist voluntary services in our country [Italy] and in the rest of
|
|
the world. This is the network which, in collaboration with radio
|
|
amateurs, has kept alive most of the communication with the people in
|
|
ex-Jugoslavia. In these days it had even indicted a national conference
|
|
on peace. The second network is instead the 'italian branch' of an
|
|
'international sysop network' and is considered the most up-to-date data
|
|
bank on telematics. Both network have iron clad rules regarding illegal
|
|
duplication of computer software and password exchange. Both networks
|
|
are based on the voluntary collaboration of system operators.
|
|
|
|
On the other hand, investigations seem to have ascertained severe
|
|
violations of the norms against computer piracy in Italy. It is not
|
|
unlikely - at least so the investigators seem to intend - that inside
|
|
those networks somebody has created a sort of secret sub-network,
|
|
perhaps hiding it to the system operator themselves. The operation
|
|
conducted by the 'Guardia di Finanza' [the italian customs office]
|
|
started the night beetween Wednesday and yesterday [May 11th/ May 12th
|
|
94]: it will now be extended to all the people who logged themselves to
|
|
the BBSes involved.
|
|
|
|
"While in the rest of the world BBSes are assuming an extremely
|
|
important role in the diffusion of information - explains Peacelink
|
|
spokesman Alessandro Marescotti - in Italy networks with inflexible
|
|
norms against piracy have been struck. All this has happened charging
|
|
system operators with every responsability regarding everything that
|
|
could possibly happen in a bulletin board. The truth of the matter is
|
|
the absence of laws protecting the rights to existance for these
|
|
networks. Indeed, many volunteers have already decided to stop their
|
|
activities, notably 'Net 10', a sort of 'telematic help line'. We
|
|
suspect these investigations to be - as a matter of fact - aimed to
|
|
favour the survival of commercial networks only."
|
|
|
|
+______________________________________________________
|
|
BITs Against The Empire Computer Underground
|
|
Fido 2:333/412 Research & Documentation
|
|
CyberNet 65:1400/1 Trento - Italy
|
|
|
|
------------------------------
|
|
|
|
Date: Fri, 13 May 1994 16:26:37 CDT
|
|
From: Carol Singer <csinger@NALUSDA.GOV>
|
|
Subject: File 6--FEDGOVT> Congress On-Line (fwd)
|
|
|
|
This was forwarded to the ACE mailing list
|
|
|
|
==========================================
|
|
|
|
UNITED STATES HOUSE OF REPRESENTATIVES
|
|
CONSTITUENT ELECTRONIC MAIL SYSTEM
|
|
|
|
We welcome your inquiry to the House of Representatives
|
|
Constituent Electronic Mail System. Currently, twentythree Members of the
|
|
U.S. House of Representatives have been assigned public electronic
|
|
mailboxes that may be accessed by their constituents. The results of the
|
|
six month public mail pilot have been very encouraging. The nature and
|
|
character of the incoming electronic mail has demonstrated that this
|
|
capability will be an invaluable source of information on constituent
|
|
opinion. We are now in the process of expanding the project to other
|
|
Members of Congress, as technical, budgetary and staffing constraints
|
|
allow.
|
|
|
|
A number of House committees have also been assigned public
|
|
electronic mailboxes. The names and electronic mailbox addresses of these
|
|
committees are listed below after the information about participating
|
|
Representatives.
|
|
|
|
Please review the list of participating Representatives below, and
|
|
if the Congressional District in which you reside is listed, follow the
|
|
instructions below to begin communicating by electronic mail with your
|
|
Representative. If your Representative is not yet on-line, please be
|
|
patient.
|
|
|
|
U.S. REPRESENTATIVES PARTICIPATING IN THE CONSTITUENT
|
|
ELECTRONIC MAIL SYSTEM.
|
|
|
|
Hon. Sherwood Boehlert 23rd Congressional District, New York Rm. 1127
|
|
Longworth House Office Building Washington, DC 20515 BOEHLERT@HR.HOUSE.GOV
|
|
|
|
Hon. Dave Camp 4th Congressional District, Michigan Rm. 137 Cannon House
|
|
Office Building Washington, DC 20515 DAVECAMP@HR.HOUSE.GOV
|
|
|
|
Hon. Maria Cantwell 1st Congressional District, Washington Rm. 1520
|
|
Longworth House Office Building Washington, DC 20515 CANTWELL@HR.HOUSE.GOV
|
|
|
|
Hon. John Conyers, Jr. 14th Congressional District, Michigan Rm. 2426
|
|
Rayburn House Office Building Washington, DC 20515 JCONYERS@HR.HOUSE.GOV
|
|
|
|
Hon. Sam Coppersmith 1st Congressional District, Arizona 1607 Longworth
|
|
House Office Building Washington, DC 20515 SAMAZ01@HR.HOUSE.GOV
|
|
|
|
Hon. Peter Deutsch 20th Congressional District, Florida Rm. 425 Cannon
|
|
House Office Building Washington, DC 20515 PDEUTSCH@HR.HOUSE.GOV
|
|
|
|
Hon. Jay Dickey 4th Congressional District, Arkansas Rm. 1338 Longworth
|
|
House Office Building Washington, DC 20515 JDICKEY@HR.HOUSE.GOV
|
|
|
|
Hon. Vernon Ehlers 3rd Congressional District, Michigan Rm. 1526 Longworth
|
|
House Office Building Washington, DC 20515 CONGEHLR@HR.HOUSE.GOV
|
|
|
|
Hon. Anna Eshoo 14th Congressional District, California Rm. 1505 Longworth
|
|
House Office Building Washington, DC 20515 ANNAGRAM@HR.HOUSE.GOV
|
|
|
|
Hon. Elizabeth Furse 1st Congressional District, Oregon Rm. 316 Cannon
|
|
House Office Building Washington, DC 20515 FURSEOR1@HR.HOUSE.GOV
|
|
|
|
Hon. Sam Gejdenson 2nd Congressional District, Connecticut Rm. 2416
|
|
Rayburn House Office Building Washington, DC 20515 BOZRAH@HR.HOUSE.GOV
|
|
|
|
Hon. Newton Gingrich 6th Congressional District, Georgia Rm. 2428 Rayburn
|
|
House Office Building Washington, DC 20515 GEORGIA6@HR.HOUSE.GOV
|
|
|
|
Hon. Dennis Hastert 14th Congressional District, Illinois Rm. 2453
|
|
Rayburn House Office Building Washington, DC 20515 DHASTERT@HR.HOUSE.GOV
|
|
|
|
Hon. Martin Hoke 2nd Congressional District, Ohio Rm. 212 Cannon House
|
|
Office Building Washington, DC 20515 HOKEMAIL@HR.HOUSE.GOV
|
|
|
|
Hon. Sam Johnson 3rd Congressional District, Texas Rm. 1030 Longworth
|
|
House Office Building Washington, DC 20515 SAMTX03@HR.HOUSE.GOV
|
|
|
|
Hon. Mike Kreidler 9th Congressional District, Washington Rm. 1535
|
|
Longworth House Office Building Washington, DC 20515 KREIDLER@HR.HOUSE.GOV
|
|
|
|
Hon. George Miller 7th Congressional District, California Rm. 2205 Rayburn
|
|
House Office Building Washington, DC 20515 GEORGEM@HR.HOUSE.GOV
|
|
|
|
Hon. Earl Pomeroy North Dakota, At Large Rm. 318 Cannon House Office
|
|
Building Washington, DC 20515 EPOMEROY@HR.HOUSE.GOV
|
|
|
|
Hon. Charlie Rose 7th Congressional District, North Carolina Rm. 2230
|
|
Rayburn House Office Building Washington, DC 20515 CROSE@HR.HOUSE.GOV
|
|
|
|
Hon. Karen Shepherd 2nd Congressional District, Utah Rm. 414 Cannon House
|
|
Office Building Washington, DC 20515 SHEPHERD@HR.HOUSE.GOV
|
|
|
|
Hon. 'Pete' Stark 13th Congressional District, California Rm. 239 Cannon
|
|
House Office Building Washington, DC 20515 PETEMAIL@HR.HOUSE.GOV
|
|
|
|
Hon. Charles Taylor 11th Congressional District, North Carolina Rm. 516
|
|
Cannon House Office Building Washington, DC 20515 CHTAYLOR@HR.HOUSE.GOV
|
|
|
|
Hon. Mel Watt 12th Congressional District, North Carolina Rm. 1232
|
|
Longworth House Office Building Washington, DC 20515 MELMAIL@HR.HOUSE.GOV
|
|
|
|
INSTRUCTIONS FOR CONSTITUENTS
|
|
|
|
The list above includes the electronic mail addresses of members who
|
|
are participating in the program. However, if your Representative is
|
|
taking part in the project, we request that you send a letter or postcard
|
|
by U.S. Mail to that Representative at the address listed above with your
|
|
name and internet address, followed by your postal (geographical) address.
|
|
The primary goal of this program is to allow Members to better serve their
|
|
CONSTITUENTS, and this postal contact is the only sure method currently
|
|
available of verifying that a user is a resident of a particular
|
|
congressional district.
|
|
|
|
In addition, constituents who communicate with their
|
|
Representative by electronic mail should be aware that Members will
|
|
sometimes respond to their messages by way of the U.S. Postal Service.
|
|
This method of reply will help to ensure confidentiality, a concern that
|
|
is of upmost importance to the House of Representatives.
|
|
|
|
COMMITTEES OF THE U.S. HOUSE OF REPRESENTATIVES PARTICIPATING
|
|
IN THE ELECTRONIC MAIL SYSTEM.
|
|
|
|
Committee on Natural Resources 1324 Longworth House Office Building
|
|
Washington, DC 20515 NATRES@HR.HOUSE.GOV
|
|
|
|
Committee on Science, Space, and Technology 2320 Rayburn House Office
|
|
Building Washington, DC 20515 HOUSESST@HR.HOUSE.GOV
|
|
|
|
COMMENTS AND SUGGESTIONS
|
|
|
|
Please feel free to send electronic mail comments about our new
|
|
service to the Congressional Comment Desk, at
|
|
|
|
COMMENTS@HR.HOUSE.GOV
|
|
|
|
We will make every effort to integrate suggestions into
|
|
forthcoming updates of our system.
|
|
|
|
Thank you again for contacting the House of Representatives'
|
|
Constituent Electronic Mail System. We are excited about the
|
|
possibilities that e-mail has to offer, and will be working hard to bring
|
|
more Members on-line and to expand our services.
|
|
|
|
This message will be updated as necessary.
|
|
|
|
Honorable Charlie Rose (D-NC)
|
|
Chairman
|
|
Committee on House Administration
|
|
|
|
|
|
[Submitted by: Administration Account (admin@envirolink.org)
|
|
Sun May 8 19:17:48 1994] This message has been
|
|
automatically posted to the EnviroLink Network 4551 Forbes Ave.,
|
|
Pittsburgh, PA 15213 412-681-8300 <admin@envirolink.org> The EnviroLink
|
|
Network assumes no liability for any of the information contained within.
|
|
|
|
-----------------------------------------------------------This message
|
|
has been posted from the EnviroNews Service, a project of the EnviroLink
|
|
Network. If you would like to subscribe to or unsubscribe from this
|
|
environmental news service, please send mail to: listproc@envirolink.org
|
|
with the word HELP in the body of the message.
|
|
|
|
Send all contributions to: environews@envirolink.org
|
|
|
|
If you would like more information on the EnviroLink Network, please
|
|
telnet or gopher to: envirolink.org and follow the directions. If you
|
|
have any questions or comments, please call (412) 268-7187.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #6.42
|
|
************************************
|
|
|