home *** CD-ROM | disk | FTP | other *** search
- The Art of Technology Digest Wednesday, July 29th, 1992
-
- %%AoT%%%%AoT%%%%AoT%%%%AoT%%%%AoT%%%%AoT%%%%AoT%%%%AoT%%%%AoT%%%%AoT%%%%AoT%%
-
- Editor: Chris Cappuccio (ccappuc@caticsuf.cati.CSUFresno.EDU)
- Archivist: David Mitchell, Sysop, Live Wire BBS +1 313 464 1470
-
- [AoT Digest] Contents #1 (Wed, July 29, 1992)
-
- Article 1: Welcome to AoT Digest!
- Article 2: Are You a Hacker? (CuD #4.33 Reprint)
- Article 3: New! 386BSD Release 0.1!
- Article 4: Linux 96c.pl2 InfoSheet
- Article 5: CyberCrime International Network
- Article 6: Sysop Arrested For Selling Porno Files To Juveniles
- Article 7: CPSR Recommends NREN Privacy Principles
- Article 8: DNA databanking
-
- The Art of Technology Digest is distributed in the following ways:
- E-MAIL: Send e-mail to ccappuc@caticsuf.cati.CSUFresno.EDU and then
- put in the letter, "Please add my E-Mail address to the mailing list."
- and you MUST include the maximum number of lines/bytes your site will
- accept in a single e-mail message. If you are not sure about this, ask
- your system operator. You can also include any comments or anything else
- you want, including an article submission.
- BBS: Call +1 313 464 1470, Live Wire BBS. This system maintains a
- complete collection of AoT Digest. Speeds are 12oo/24oo/HST-96oo/HST-14,4oo
-
- The Art of Technology Digest is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. AoT-D material may be reprinted as long as the source
- is cited. Some authors do copyright their material, and they should
- be contacted for reprint permission. It is assumed that non-personal
- mail at the moderators may be reprinted unless otherwise specified.
- Readers are encouraged to submit reasoned articles relating to
- computer culture and communication. Articles are preferred to short
- responses. Please avoid quoting previous posts unless absolutely
- necessary. All articles for submission should be sent to:
-
- ccappuc@caticsuf.cati.CSUFresno.EDU
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- Verbosity leads to unclear, inarticulate things.
- -- Vice President Dan Quayle
-
- ---------------------------------------------------------------------------
-
- Date: Tues, 28 Jul 92
- From: AoT-D Editor, Chris Cappuccio <ccappuc@caticsuf.cati.CSUFresno.EDU>
- Subject: Article 1--Welcome to AoT Digest!
-
- Welcome to the first issue of Art of Technology Digest!!
- AoT Digest is an open forum dedicated to sharing information among
- computerists and to the presentation and debate of diverse views.
- AoT-D material may be reprinted as long as the source is cited.
- Some authors do copyright their material, and they should be contacted
- for reprint permission. It is assumed that non-personal mail at the
- moderators may be reprinted unless otherwise specified. Readers are
- encouraged to submit reasoned articles relating to computer culture
- and communication. Articles are preferred to short responses.
- The idea (and the format and one of the articles) of AoT Digest
- is from Cu-Digest. Anyways this newsletter is for discussion of
- the computer underground. It is NOT a hack/phreak newsletter, just
- a rip-off of CuD with different information. Make a new file base and you're
- set. I want to make this a weekly newsletter but since it's very small now,
- expect something each few weeks or so. Many of the things you should expect
- to find are CPSR press releases and various other Usenet articles and responses
- from our readers. Hmm.. I am also hoping to make a newsgroup for AoT Digest
- but I can't find the FAQ response. "Frequently Asked Question: Where do I get
- the response from the 'how to start a newsgroup' FAQ???". You may also be
- wondering what I moderate. Well, I assemble the whole thing, take out any
- high-ASCII and replace it with normal ASCII and put in references. Words
- in the articles are not changed. We REALLY want responses, either posted
- on Live Wire (See DISTRIBUTION in the beginning for the phone number) or
- E-Mailed to me (ccappuc@caticsuf.cati.CSUFresno.EDU). If you have anything
- to say, PLEASE respond!
-
- ----------------------------------------------------------------------
-
- Date: Fri, 24 Jul 1992 11:19:47 PDT
- From: Bob Bickford <rab@well.sf.ca.us>
- Subject: Article 2--Are You a Hacker? (CuD #4.33 Reprint)
-
- [[ED: I will try not to have CuD reprints but this was a good article]]
-
- ARE YOU A HACKER?
- by Robert Bickford
-
- Are you a Hacker? How would you know? If all you know about the word
- is what you've seen on the evening news, or read in a magazine, you're
- probably feeling indignant at the very question! But do those
- magazine-selling headlines really describe what a Hacker is?
-
- Some time ago (MicroTimes, December 1986) I defined a Hacker as "Any
- person who derives joy from discovering ways to circumvent
- limitations." The definition has been widely quoted since that time,
- but unfortunately has yet to make the evening news in the way that a
- teenager who robs a bank with his telephone does.
-
- Does that teenaged criminal fit my definition? Possibly. Does that
- fact make all, or even most, Hackers criminals? (Does that fact make
- all or most Hackers teenagers?) Of course not! So why is there such
- widespread misinformation about Hackers? Very simply, it's because
- the criminal hackers, or 'Crackers', have been making news, while the
- rest of us are virtually invisible. For every irresponsible fool
- writing a virus program, there are at least twenty software engineers
- earning a living "...discovering ways to circumvent limitations."
- When the much-publicized InterNet worm was released by an
- irresponsible hacker, hundreds of other Hackers applied their
- considerable talents to the control and eradication of the problem:
- the brilliance and creativity brought to this task are typical of the
- kind of people --- Hackers ---that my definition is meant to describe.
-
- Working on the yearly Hackers Conferences has been a mixed experience:
- on the one hand, helping to bring together 200 of the most brilliant
- people alive today, and then interacting with them for an entire
- weekend, is immensely rewarding. On the other hand, trying to explain
- to others that the Hackers Conference is not a Gathering of Nefarious
- Criminals out to Wreak Havoc upon Western Civilization does get a bit
- wearing at times. Also, trying to convince a caller that repeatedly
- crashing his school district's computer from a pay phone will not,
- emphatically not, qualify him for an invitation to the conference can
- be a bit annoying. None of this would be a problem if we hadn't let a
- small minority --- the Crackers --- steal the show, and become
- associated with the word 'Hacker' in the minds of the general public.
- The attendees at the Hackers Conferences --- many of whom hold PhDs,
- and/or are Presidents or other upper management of Fortune 500
- companies --- are (quite understandably) very indignant at being
- confused with these Crackers.
-
- Taking myself as an example --- no, I don't have a PhD, my only degree
- is from the School of Hard Knocks, and no, I'm not working in
- management ---when this article was first published [1989] I was
- writing software for a company that builds medical image processing
- equipment. My code controls a product that can, and often does,
- either improve the quality of medical care, reduce the cost, or both.
- When I develop a piece of software that goes around some limit I feel
- very happy, and can often find myself with a silly grin plastered
- across my face. When some ignorant reporter writes a story that
- equates the work I do with expensive but childish pranks committed by
- someone calling himself a "Hacker", I see red.
-
- Are you a Hacker? If you want to break rules just for the sake of
- breaking rules, or if you just want to hurt or "take revenge" upon
- somebody or some company, then forget it. But if you delight in your
- work, almost to the point of being a workaholic, you just might be.
- If finding the solution to a problem can be not just satisfying but
- almost an ecstatic experience, you probably are. If you sometimes
- take on problems just for the sake of finding the solution (and that
- ecstatic experience that comes with it), then you almost certainly
- are. Congratulations! You're in good company, with virtually every
- inventor whose name appears in your high school history book, and with
- the many thousands of brilliant people who have created the "computer
- revolution."
-
- What can we do about all that bad press? Meet it head on! Tell the
- people you work with that you're a Hacker, and what that means. If
- you know somebody whose work habits, style, or personality make them
- pretty clearly a Hacker, tell them so and tell them what you mean by
- that. Show them this article!
-
- Meanwhile, have fun finding those solutions, circumventing those
- limitations, and making this a better world thereby. You are an
- Artist of Technology, a Rider of the Third Wave, and at least you can
- enjoy the ride!
-
- Bob Bickford is a software consultant who lives in Marin County, often
- Hacking late into the night, and (usually) enjoying it immensely. His
- wife, Greta, only tolerates this because she's an animation hacker and
- sometimes does the same thing. Bob can be reached through InterNet at
- rab@well.sf.ca.us
-
- (An edited version of this article appeared in Microtimes in early
- 1989. Copyright (c) Robert Bickford, 1989, 1992)
- +++
- Robert Bickford "A Hacker is any person who derives joy from
- rab@well.sf.ca.us discovering ways to circumvent limitations." rab'86
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
- "I recognize that a class of criminals and juvenile delinquents has
- taken to calling themselves 'hackers', but I consider them irrelevant
- to the true meaning of the word; just as the Mafia calls themselves
- 'businessmen' but nobody pays that fact any attention." rab'90
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
-
- ------------------------------
-
- Date: Tues, Jul 28, 1992
- From: AoT-D Editor, Chris Cappuccio <ccappuc@caticsuf.cati.CSUFresno.EDU>
- Subject: Article 3--New! 386BSD Release 0.1!
-
- [[ED: This is edited notes from the installation docs and distribution list
- Remember that 386BSD is a FREE operating system, if you have a 386/486
- and 50 megs to spare, I strongly recommend that you get this. At the
- end is the list of anonymous FTP sites to get 386BSD. Have fun!!]]
-
- Welcome to 386BSD Release 0.1, the second edition of
- the 386BSD operating system created by William and Lynne
- Jolitz. Like its predecessor, 386BSD Release 0.0, Release
- 0.1 comprises an entire and complete UNIX-like operating
- system for the 80386/80486-based AT Personal Computer.
-
- 386BSD Release 0.1 is an enhanced version of the origi-
- nal release done by William F. Jolitz, the developer of
- 386BSD. 386BSD Release 0.0 was based on the Networking
- Software, Release 2 from the University of California at
- Berkeley EECS Department, and included much of the 386BSD
- work done earlier by Bill and contributed by us to the
- University. The latest release, 386BSD Release 0.1, con-
- tains new work by the developer and many new items which
- have been freely contributed by other software developers
- for incorporation into 386BSD (see the file CONTRIB.LIST).
- These contributions have increased the functionality and
- made it more robust.
-
- 386BSD is intended for research, development, educa-
- tion, and just plain exploration. Source, Binary, Installa-
- tion, and Fix-It floppies are available at a large number of
- sites. There are many user groups, support groups, computer
- societies and individuals who are supplying and running
- 386BSD and they are good sources of information and support.
-
- 386BSD Release 0.1 is intended to be widely used by
- those interested in "pushing the envelope" towards the for-
- mation and development of innovative ideas in computer tech-
- nology. As such, we have spent considerable time developing
- a system which is simple to partition and install and
- emphasizes stability and completeness.
-
-
- Among the many new features of 386BSD (from release 0.0):
-
-
- * New "Tiny 386BSD" System Installation Floppy
-
- * Simplified installation procedures.
-
- * 386BSD partitioning for use on an MS-DOS system.
-
- * Compressed, multivolume CPIO dump format
- binary/source/other distribution sets on MS-DOS flop-
- pies.
-
- * 387 emulation.
-
- * SCSI support.
-
- * CD-ROM support.
-
- * NFS, TCP/IP and full networking.
-
- * New 386BSD "Fix-It" System Maintenance Floppy.
-
- * New "Additional User Software" MS-DOS floppy dump.
-
-
- << 386BSD RELEASE 0.1 -- DISTRIBUTION HOST SITES >>
-
-
- agate.berkeley.edu 128.32.136.1
- gatekeeper.dec.com 16.1.0.2
- MATH.ORST.EDU 128.193.16.60
- UTKUX1.UTK.EDU 128.169.200.67
- terminator.cc.umich.edu 141.211.164.8
- nic.funet.fi 128.214.6.100
- dsuvax.dsu.edu 138.247.32.2
- altair.cis.ksu.edu 129.130.10.84
- hpcsos.col.hp.com 15.255.240.16 [ Internal HP sites only ]
- math.niu.edu 131.156.3.4
- sune.stacken.kth.se 130.237.234.42
- raquel.doc.ic.ac.uk 146.169.11.3
- rusmv1.rus.uni-stuttgart.de 129.69.1.12
- HELIUM.CLUB.CC.CMU.EDU 128.2.55.10
- banjo.concert.net 192.101.21.6
- kirk.bu.oz.au 131.244.1.1
- grand.central.org 192.54.226.100
- pascal.math.fu-berlin.de 130.133.4.50
- capella.eetech.mcgill.ca 132.206.1.17
- ftp.ibr.cs.tu-bs.de 134.169.34.15
- f.ms.uky.edu 128.163.128.6
- azathoth.sura.net 128.167.254.184
-
- ------------------------------
-
- Date: 07/24/92
- From: Linus Benedict Torvalds <torvalds@kruuna.Helsinki.FI>
- Subject: Article 4--Linux 96c.pl2 InfoSheet
-
- finger torvalds@kruuna.helsinki.fi
-
- Free UNIX for the 386
- The current version of linux is a 0.96c, released 92.07.04. There is a
- 0.96 rootdisk that should be used with the new versions: it fixes a lot
- of things with the old rootdisks and contains more programs due to the
- shared libraries. Patch 2 to 0.96c was released 92.07.18, and
- implemented the msdos filesystem as well as correcting some problems
- with the IRQ code.
- 0.96c supports X11r5 and the new gcc-2.1 (and newer) libraries with
- multiple shared libs - as well as any old binaries (except the 0.12
- version of gdb which used the older ptrace() interface). 0.96c also
- contains support for debugging (core-dumping and attach/detach) as well
- as profiling (use gcc-2.2.2 for the profiling code)
- Linux can be gotten by anonymous ftp from 'nic.funet.fi' (128.214.6.100)
- in the directory '/pub/OS/Linux'. This directory structure contains all
- the linux OS- and library-sources, and enough binaries to get going. To
- install linux you still need to know something about unices: it's
- relatively straightforward to install, but the documentation sucks raw
- eggs, and people with no previous unix experience are going to get very
- confused.
- There are now a lot of other sites keeping linux archives. Some of them
- are:
- tsx-11.mit.edu (18.172.1.2):
- directory /pub/linux
- banjo.concert.net (192.101.21.6):
- directory /pub/Linux
- yagi.ecei.tohoku.ac.jp (130.34.222.67)
-
- (and many additional sites: there are now sites in the uk, japan etc
- that carry linux, but I have lost count)
- There is also a mailing list set up 'Linux-activists@niksula.hut.fi'.
- To join, mail a request to 'Linux-activists-request@niksula.hut.fi'.
- It's no use mailing me: I have no actual contact with the mailing-list
- (other than being on it, naturally).
- There is also a newsgroup that contain linux-related questions and
- information: comp.os.linux.
- Mail me for more info:
- Linus Torvalds (torvalds@kruuna.Helsinki.FI)
- Pietarinkatu 2 A 2
- 00140 Helsinki
- Finland
- 0.96c.pl2 has these new features (relative to unpatched 0.96c)
- - select() through the VFS routines
- - faster and more general sleep/wakeup routines
- - easily installable IRQ's
- - bus-mouse driver
- - msdos filesystem
- 0.96c has these new features (relative to 0.96b)
- - alpha-testing code of the extended filesystem
- - serial line changes (changeable irq's etc)
- - pty/console fixes.
-
- ------------------------------
-
- Date: 7/19/92
- From: Midnight Sorrow
- Subject: Article 5--CyberCrime International Network
-
- +---------------------------------------------------+
- | CYBERCRIME INTERNATIONAL NETWORK |
- | CURRENTLY OFFERED SUBBOARDS: (Updated 07/19/92) |
- +---------------------------------------------------+
-
- +----------------------------------------------------------------------+
- | COMPUTER-RELATED: | |
- | | |
- | INF-GRUP Groups | Elite Group Discussion |
- | INF-BBS BBS Ads | ANSi System Advertisements |
- | INF-PROG Programming | Turbo Pascal, Turbo C, Assembly |
- | INF-BSFT BBS Software | BBS Software Discussion |
- | INF-MTSK Multitasking | DESQview, Windows, OS/2, Unix |
- | INF-TECH Technical Talk | High Technology Discussion |
- | INF-PARS Paragon Support | Paragon/Revelation Support |
- | INF-SBRD Sound Board Support | Adlib, Soundblaster, etc |
- |----------------------------------------------------------------------|
- | ART GROUP ECHOES: | |
- | | |
- | INF-ICE iCE | Insane Creator Enterprises |
- | INF-LTD LTD | Licensed To Draw |
- | *INF-TIA TiA | The Insane Artists |
- | *INF-ACID ACiD | ANSi Creators in Demand |
- | INF-DEAD DeAD | Damn Excellent Art Designers |
- | INF-GRIM GRiM | Graphics Rendered in Magnificence |
- | INF-MIRG MiRAGE | MiRAGE - Redefining Elite |
- |----------------------------------------------------------------------|
- | ILLEGAL ACTIVITIES: | |
- | | |
- |% INF-PYRO Explosives | Manufacturing Combustibles |
- | INF-PHC Hack/Phreak #1 | Basic Hack/Phreak Discussion |
- |% INF-HAK Hack/Phreak #2 | Advanced Hack/Phreak Discussion |
- |% INF-VIRI Virus Discussion | Viral Programming and Defense |
- | INF-NPD Software Releases | New Software Discussion |
- |% INF-REVG The Art of Revenge | What Comes Around Goes Around |
- |----------------------------------------------------------------------|
- | INTELLIGENT DISCUSSIONS: | |
- | | |
- | INF-POEM Creativity | Poetry, Short Stories, Etc |
- | INF-PARA The Occult | Paranormal/Parapsychology |
- | INF-NEWS World Occurances | World News and Politics |
- | INF-DRUG Controlled Substances | Drugs and Addictive Substances |
- |----------------------------------------------------------------------|
- | MUSIC: | |
- | | |
- | INF-METL Metal | Rock/Heavy Metal |
- | INF-BASS Bass/Rap | The Quest For The Boom |
- | *INF-MUSI Musicians | Musicians & General Music |
- | INF-ALT Progressive | Alternative/Techno Tunes |
- | INF-LYRC Music Lyrics | Assorted Music Lyrics Forum |
- |----------------------------------------------------------------------|
- | MISCELLANEOUS: | |
- | | |
- | INF-COMC Comics | Comic Book Discussion |
- | INF-BUY For Sale | Classified Advertisements |
- | INF-KING Stephen King | Stephen King and Other Horror |
- | INF-BOOK Books & Reading | New Books and Stories |
- | INF-MOVI Movies/Television | Visual Entertainment Discussion |
- |! INF-GEN General Discussion | Miscellaneous Bullshit |
- |----------------------------------------------------------------------|
- | SYSOPS/CO-SYSOPS ONLY: | |
- | | |
- |! INF-SYS CyberCrime Sysops | Network Sysop Echo |
- |! INF-TEST Test Message Echo | New Site Message Testing |
- |! IMPERIAL Imperial Sysop Net | International SysOp Connection |
- +----------------------------------------------------------------------+
-
- * = New To CyberCrime
- ! = Required For ALL CyberCrime Systems
- % = H/P Restricted - Available Only To Qualified Systems and Users
-
- CyberCrime International Network is seeking new nodes to add to its
- rosters. CyberCrime International Network is a high activity, elite-
- oriented, large-growth-potential, intelligent-discussion-based network.
-
- If you are running a Fidonet-compatible system then please continue
- reading. (ie: LSD, Telegard, TAG, WWiV, Remote Access, Omega, QBBS,
- Paragon, Infinity, Revelation, Cypher, PCBoard, Prodoor, and versions of
- Celerity, Prism, and other Forum Hacks possibly supporting FidoNet.)
-
- One of the most unique aspects of CyberCrime (over most OTHER
- networks) is that you don't need to have ALL of these subboards on your
- system. Select ONLY the ones you or your users are interested in.
- Aside from the three required subs (see ! above), that's all you need to
- carry, and you can always add in more subs in the future.
-
- If you're interested, call Infinite Darkness. 3O5-525-4722, all
- baud rates supported. You may either apply as a NEW user, or login as
- handle = CYBERCRIME and password = DEATH. Follow the instructions,
- and fill out the CyberCrime Node Application. Once you are through,
- create a new, validated account on your system, as handle = MIDNIGHT
- SORROW, password = INK and phone = xxx-xxx-9435. Midnight Sorrow will
- eventually call your board (it MUST be a full-time system!), login, and
- upload everything you need to join. Setup is easy, and extensive help
- is available should you need it. CONSIDER IT!
-
- Later,
-
- Midnight Sorrow.
-
- ------------------------------
-
- Date: Thu Jul 23 00:27:24 1992
- From: aa381@cleveland.Freenet.Edu
- Subject: Article 6--Sysop Arrested For Selling Porno Files To Juveniles
-
- **SYSOP ARRESTED FOR PORNO FILES TO JUVENILES**
- Mark Lehrer, sysop of AKRON ANOMALY BBS
-
-
- MUNROE FALLS OH, July 21, 1992. Munroe Falls Police Chief
- Steve Stahl knows computers are big with kids these days, but he
- never thought he'd see the day when a healthy 15-year-old boy would
- choose a floppy disk over a Playboy centerfold.
-
- But now that Stahl's seen some of the floppy disks popular
- with local youths, he understands the fascination.
-
- "Give me any kid, I know what he's going to download," Stahl
- said.
-
- In May, Munroe Falls Police received a complaint from a
- resident who feared that a local computerized community BBS
- containing sexually explicit material might be accessible to
- children.
-
- Stahl said the resident showed him files called "Alison" and
- "amber," both of which featured naked women. He told the concerned
- resident, "Oh, well, I can see how that would be upsetting."
-
- For the past two months, police conducted an investigation and
- sting using a local 15-year-old boy. After the youth was able to
- hook into the BBS, police arrested Mark Lehrer, 22, owner and
- operator of AKRON ANOMALY, a 1000 member BBS. POLICE ALSO SEIZED
- ALL OF LEHRER'S COMPUTER EQUIPMENT.
-
- Lehrer is accused of distributing graphic sexual material via
- a computer modem from the Munroe Falls home of his parents, David and
- Susan Lehrer. His father, also a computer professional, is chairman of
- the Village's Charter Review Commission. Mark has been charged in
- Cuyahoga Falls Municipal Court with one count each of disseminating
- matter harmful to juveniles and possession of criminal tools - in this
- case, his computer and graphic files.
-
- A preliminary hearing is scheduled for July 21, 1992. The
- case will probably be turned over to a Summit County Grand Jury,
- which means potential indictment for a felony and, if convicted,
- over a year in state prison.
-
- Chief Stahl said this will be the first case in northeast Ohio
- and one of the first in the state, in which an adult is accused of
- distributing graphic sexual materials *to juveniles* via a
- computer.
-
- "There's not a whole lot of case law on this kind of this," he
- said, adding that most material comes from books, magazines or
- movies.
-
- According to Stahl, members of AKRON ANOMALY paid $15 to $30
- a year to call the board, giving access to games like chess,
- basketball, euchre, programming instructions and *.GIF files -
- (G)raphic (I)nterface (F)iles, that feature pictures from James
- Bond to Capt. Kirk to Scooby-Doo.
-
- Some are labeled specifically for adults and are not supposed
- to be accessible to those under 18, while many others are contained
- in a general directory. However, when police seized Lehrer's
- records, they found that even the "clean" files contained images
- "not entirely wholesome."
-
- "One was Bugs Bunny eating a carrot, one was Bart Simpson
- riding a skateboard, and one was called (a slang term for oral sex)
- and that was in the 'clean' file," Stahl said.
-
- Stahl said many files not listed in the "adult" category
- contained pictures of naked women and of naked women engaging in
- sexual acts. One file allegedly shows a nude image of Christina
- Applegate, who plays "Kelly" on the TV show "Married with Chil-
- dren."
-
- "Parents are happy their kids are upstairs using their
- computers. The one parent we talked to was thrilled they weren't
- finding PLAYBOY magazine. Well, I've got news for you, this is a
- rude awakening," Stahl said.
-
- In addition to the "graphic still images," juveniles were able
- to access adult movies, which are shown on computer monitors.
- "It's like watching cable TV. It's a very clear picture," Stahl
- said.
-
- Stahl said computer experts with the Ohio Bureau of Criminal
- Identification and Investigation are reviewing the hundreds of
- computer files seized from Lehrer's home. Stahl said it's possible
- that some of the games and movies are being accessed in violation
- of copyright laws.
-
- "I'm not saying it's obscene because I'm not getting into that
- battle, but it's certainly not appropriate for kids, especially
- without parental permission," Stahl said.
-
- ============================================
- Adapted by Jeff Gerber, lawyer/sysop aa381@cleveland.freenet.edu
- from The Cleveland Plain Dealer, July 21, 1992, story by Deborah A.
- Winston, PD Reporter.
-
- Anyone with further data on this or similar cases is invited to
- post it here.
-
- --
- Jeff Gerber, lawyer/sysop aa381@Cleveland.freenet.edu
-
- PLEASE NOTE: The information contained on this system is not
- intended to supplant individual professional consultation,
- but is offered as a community education service. Advice on
- individual problems should be obtained directly from a professional.
-
- ------------------------------
-
- Date: Wed, 29 Jul 1992 15:27:38 EDT
- From: Paul Hyland <PHYLAND%GWUVM.BitNet@pucc.PRINCETON.EDU>
- Subject: Article 7--CPSR Recommends NREN Privacy Principles
-
- PRESS RELEASE
-
- July 24, 1992
-
- CPSR Recommends NREN Privacy Principles
-
-
- WASHINGTON, DC -- Computer Professionals for Social Responsibility
- (CPSR), a national public interest organization, has recommended
- privacy guidelines for the nation's computer network.
-
- At a hearing this week before the National Commission on Library and
- Information Science, CPSR recommended a privacy policy for the National
- Research and Education Network or "NREN." Marc Rotenberg, Washington
- Director of CPSR, said "We hope this proposal will get the ball rolling.
- The failure to develop a good policy for the computer network could be
- very costly in the long term."
-
- The National Commission is currently reviewing comments for a report to
- the Office of Science and Technology Policy on the future of the NREN.
-
- Mr. Rotenberg said there are several reasons that the Commission should
- address the privacy issue. "First, the move toward commercialization of
- the network is certain to exacerbate privacy concerns. Second, current
- law does not do a very good job of protecting computer messages. Third,
- technology won't solve all the problems."
-
- The CPSR principles are (1) protect confidentiality, (2) identify
- privacy implications in new services, (3) limit collection of personal
- data, (4) restrict transfer of personal information,(5) do not charge
- for routine privacy protection, (6) incorporate technical safeguards,
- (7) develop appropriate security policies, and (8) create an
- enforcement mechanism.
-
- Professor David Flaherty, an expert in telecommunications privacy law,
- said "The CPSR principles fit squarely in the middle of similar efforts
- in other countries to promote network services. This looks like a good
- approach."
-
- Evan Hendricks, the chair of the United States Privacy Council and
- editor of Privacy Times, said that the United States is "behind the
- curve" on privacy and needs to catch up with other countries who are
- already developing privacy guidelines. "The Europeans are racing
- forward, and we've been left with dust on our face."
-
- The CPSR privacy guidelines are similar to a set of principles developed
- almost 20 years ago called The Code of Fair Information practices.
- The Code was developed by a government task force that included policy
- makers, privacy experts, and computer scientists. The Code later became
- the basis of the United States Privacy Act.
-
- Dr. Ronni Rosenberg, who has studied the role of computer scientists in
- public policy, said that "Computer professionals have an important role
- to play in privacy policy. The CPSR privacy guidelines are another
- example of how scientists can contribute to public policy."
-
- For more information about the Privacy Polices and how to join CPSR,
- contact CPSR, P.O. Box 717, Palo Alto CA 94302. 415/322-3778 (tel) and
- 415/322-3798 (fax). Email at cpsr@csli.stanford.edu.
-
- [Moderator's note: The full text of the referenced NREN Privacy
- Principles is available from the CPSR Listserv file server. Send
- the command:
-
- GET NREN PRIVACY
-
- to listserv@gwuvm.gwu.edu, as the text of an e-mail message. -peh]
-
- ------------------------------
-
- Date: Wed, 29 Jul 1992 15:31:25 EDT
- From: Gary Chapman <chapman@silver.lcs.mit.edu>
- Subject: Article 8--DNA databanking
-
- Today (7/28) the Wall Street Journal features an article (page B1) on
- DNA databanking, the FBI's computer database of DNA data, and the
- concerns of critics. The article reports that fifteen states now have
- DNA databanking programs, and it is estimated that double that number
- will have such programs in place by 1995. There have been 600 trials
- using DNA as evidence since 1988. Next year the FBI is scheduled to
- link state programs in a nation-wide computer network.
-
- The article describes the first "cold search" of DNA databanks, in a
- Minnesota case in which a defendant was arrested for the rape and murder
- of a Minneapolis woman on the basis of a DNA match appearing in the
- state's computerized system. The crime-scene DNA was acquired from a
- sperm sample and it matched a sample collected from a convicted sex
- offender when he was a prisoner.
-
- Last week the Massachusetts Supreme Judicial Court, the highest court in
- the state, ruled that DNA matching may not be used as conclusive
- prosecutorial evidence in a criminal trial, although the lack of a match
- can be used as a defense. Massachusetts is the only state in the
- country that has produced such a court ruling -- all of the other 40
- appellate court rulings have been in favor of using DNA evidence in
- support of the prosecution's case. The Massachusetts court said that
- there is insufficient scientific consensus on the validity of DNA
- matching. The court cited a recent report by the National Research
- Council, which said that the state of the art leaves the technology open
- to doubt. But this could change in the future, and the Massachusetts
- ruling does not rule out DNA evidence if the technology generates a
- tighter scientific consensus.
-
- Nachama Wilker, executive director of the Council for Responsible
- Genetics in Cambridge, Massachusetts, says that the collection of DNA
- samples from all prisoners is a slippery slope that will affect the use
- of DNA in non-criminal social transactions, such as eligibility for
- insurance, employment opportunity, and other forms of discrimination.
- She says in The Wall Street Journal that there are no guarantees that
- DNA data collected from prisoners will be used exclusively for criminal
- justice procedures, and she argues that DNA evidence should only be used
- for serious crimes with demonstrated patterns of repeated offenses.
- Some states have passed legislation protecting the confidentiality of
- DNA data, such as Wisconsin, which prohibits DNA data from being used
- for insurance eligibility or employment evaluation. Only five states
- have such laws on the books, however. Some public interest advocates
- are supporting a DNA Identification Bill in the Congress, already passed
- by the House, that would enforce confidentiality, limit the use of DNA
- data, and impose federal standards on state laboratories. The NRC
- report also called for laboratory accreditation by federal agencies.
-
-
- ------------------------------
-
- **********************************
- End of Art of Technology Digest #1
-