home *** CD-ROM | disk | FTP | other *** search
-
-
- Computer underground Digest Wed July 28 1993 Volume 5 : Issue 56
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Archivist: Brendan Kehoe
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Coop Eitidor: Etaoin Shrdlu, Senior
-
- CONTENTS, #5.56 (July 28 1993)
- File 1--Akron Anomaly BBS UpDate (Seizure Warrant)
- File 2--Call for Paper: Computer Network Use and Abuse Conference
- File 3--Credit Reports and National
- File 4--UPDATE #19-AB1624: PROGRAMMERS! START YOUR ENGINES!
- File 5--Community Network Survey Results Available
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
- editors may be contacted by voice (815-753-6430), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115.
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
- WHQ) (203) 832-8441 NUP:Conspiracy; RIPCO BBS (312) 528-5020
- CuD is also available via Fidonet File Request from 1:11/70; unlisted
- nodes and points welcome.
- EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
- In ITALY: Bits against the Empire BBS: +39-461-980493
-
- ANONYMOUS FTP SITES:
- UNITED STATES: ftp.eff.org (192.88.144.4) in /pub/cud
- uglymouse.css.itd.umich.edu (141.211.182.53) in /pub/CuD/cud
- halcyon.com( 202.135.191.2) in /pub/mirror/cud
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud
- AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
- EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
- ftp.warwick.ac.uk in pub/cud (United Kingdom)
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: 26 Jul 93 11:48:32 EDT
- From: David Lehrer <71756.2116@COMPUSERVE.COM>
- Subject: File 1--Akron Anomaly BBS UpDate (Seizure Warrant)
-
- ((MODERATORS' NOTE: The AKRON ANOMALY BBS was raided last summer
- because of allegedly "pornographic" files it possessed (for
- background, see CuD #5.23). Subsequent events indicated that the raid
- was an excessive exercise in local law enforcement zeal. Under
- pressure, the sysop pleaded guilty to a minor misdemeanor charge to
- avoid costly legal entanglements. But, the case continues to raise
- issues, and CuD will address some of these in a forthcoming issue. The
- following is an update on the case)).
-
- =-=-=-=-=-=-= Akron Anomaly =-=-=-=-=-=
- Newsgroups:
- akr.newsadmin,cle.general,oh.general,news.admin.policy,comp.org.e
-
- There have been some recent developments in the Akron Anomaly case.
- Briefly, some materials have been returned to Mark Lehrer, sysop of
- The Akron Anomaly BBS. These materials do not include any of the
- email that was on the system at the time it was seized
- approximately one year ago. The email is being held by the Ohio
- Bureau of Criminal Investigation.
-
- =-=-=-=-=
-
- This file contains:
- <1> Description of property to be searched and seized (from search
- warrant).
- <2> Excerpts from the transcript of court proceedings, related to
- the hardware to be forfeited.
- <3> List of seized material (from David Lehrer).
- <4> Notice from chief Stahl that returned software can be picked
- up.
- <5> List of actual items returned (from David Lehrer).
- <6> Letter from chief Stahl saying the Ohio Bureau of Criminal
- Investigation has everything else.
-
- =-=-=-=-=
-
- <1> Description of property to be searched and seized (from search
- warrant).
-
- Quote:
- PROPERTY TO BE SEARCHED AND SEIZED
- Computer(s) used to operate the Akron Anomaly Bulletin Board and
- data contained in them, computer disks and/or tapes containing data
- involved in the operation of the Akron Anomaly Bulletin Board,
- records of users of the Akron Anomaly Bulletin Board and the items
- they have uploaded to or downloaded from the Akron Anomaly Bulletin
- Board, financial records related to the operation of the Akron
- Anomaly Bulletin Board, and other associated items including but
- not limited to modems, disk drives, printers and software programs.
-
- %executed June 18, 1992%
-
- =-=-=-=-=
-
- IN THE COURT OF COMMON PLEAS
- COUNTY OF SUMMIT
-
-
- STATE OF OHIO, ) CASE NO. 92-07-1789
- )
- Plaintiff, ) Robert Incorvati
- ) Assistant Summit County
- vs. ) Prosecutor
- )
- MARK LEHRER, ) Donald S. Varian
- ) Attorney at Law
- Defendant. )
- - - -
-
- Visiting Judge Presiding: Lorain, Ohio--Robert J. Corts
-
-
-
- TRANSCRIPT OF PROCEEDINGS March 8, 1993 %excerpts%
-
-
- MR. INCORVATI: %prosecutor's explanation of reducing two 2nd degree
- felonies to a 1st degree misdemeanor%
- The State of Ohio is also in possession of Mr. Lehrer's
- >computer system. It's my understanding that is currently in
- >possession of BCI and according to Rule 11F negotiations will be
- forfeited to BCI in Columbus.
-
- THE COURT: Now, I'm not sure I understand the charges. Pandering
- obscenity?
-
- MR. INCORVATI: The original charge, that's correct.
-
- THE COURT: Was that done by means of computer, is that what I
- understand?
-
- MR. INCORVATI: Exactly, exactly. It was a computer, computer log-
- on network that was available, and at the time it appeared that
- information that may have been accessible to that or through some
- work been accessible to it may have involved minors.
- With respect to the State's case, there is indeed question
- as to whether in fact that is a provable point, whether the minors
- were involved on that.
-
- THE COURT: etc. . . .
- --Continued--
-
- THE COURT: Very well.
-
- MR.VARIAN: Thank you, Your Honor. I would only add, I think, we
- have agreed to the facts as have been presented other than I think
- >there are unrelated soft disks, floppy disks that would be
- >returned to the defendant that are unrelated to any sexual related
- >matter.
- > The hardware, I think, is what we agreed would go to the
- >Bureau of Criminal Identification.
- I think further that it's the prosecutor's position, and
- correct me if I'm wrong, that we would be entering a plea to a
- misdemeanor and they are not requesting any jail time or any
- probation.
- If that is the fact, at this time we are prepared to enter
- a plea of guilty to possession of criminal tools and -- attempt to
- possess criminal tools.
-
- MR. INCORVATI: Attorney Varian is correct.
-
- >THE COURT: So I understand, what needs to be forfeited
- >specifically?
-
- >>MR. INCORVATI: The hardware itself, if you will.
-
- >THE COURT: What is that?
-
- MR. INCORVATI: Specifically, I don't know. I can tell you that it
- is a computer system.
-
- THE COURT: Could you tell me?
-
- >MR. VARIAN: My client would know the very best, but it's
- >basically a computer, a disk drive, a -- is there a printer there
- >-- and a printer.
-
- >MR. INCORVATI: Also have the monitor and keyboard as well.
-
- MR. VARIAN: Correct.
-
- >>THE COURT: There is not going to be any difficulty with
- >>identifying --
-
- MR. VARIAN: They already have it.
-
- >MR. INCORVATI: In fact, we are in possession of it.
- In fact, also as attorney Varian states, we are in
- possession of some of the software associated with that, that is
- available for the defendant to pick up.
-
- THE COURT: %continuation of the plea% . . .
-
- =-=-=-=-=
-
- <3> List of seized material (from David Lehrer).
-
- MISSING ITEMS LIST:
-
- for reference:
- PROPERTY LISTED BY STEVE STAHL THAT HE TOOK FROM THE HOME OF DAVID
- LEHRER, 58 BERMONT AVE., MUNROE FALLS, OH, ON 6/18/1992 UNDER THE
- GUISE OF THE ABOVE SEARCH WARRANT--THIS LIST AS WRITTEN BY STAHL.
- ----------------------------------------------------------
- Page 1-
- ITEM # Quantity Description of property taken
-
- 1 1 US Robotics Modem
- 2 1 Home Built Computer
- 3 1 Loop Monitor
- 4 1 IBM Keyboard
- 5 1pk of 10 3.5 DD Diskettes
-
- 6 1 Epson Printer
- 7 1 Leaquer Int Corp (mouse)
- 8 1 Archive Corp Drive (cartridge tape)
- ----------------------------------------------------------
- Page 2-
- Item #
-
- 9 Misc. Wires
- 10 1- 5 1/4 Disc w/viruses
- 11 3- 3M DC 600A Data Cartridge Tapes
- 12 1- Letter w/check (fee)
- 13 1- OS2 IBM Operating System
- 14 1- Notebook w/documentation
- 15 1 pkg w/198 3 1/2 discs
-
- 16 1 pkg w/3 cases 210 5 1/4 discs
- 17 1 case w/59 5 1/4 discs
- 18 1 case w/89 5 1/4 discs
- 19 1 bag w/misc. records
- ----------------------------------------------------------
- LIST OF ITEMS THAT SHOULD HAVE BEEN RETURNED:
-
- PART A: Itemized List
- 1. Line Item 10: "1- 5 1/4 Disc w/ viruses"
- These are anti-viral programs Mark uses in his normal work
- activities. Stahl wouldn't recognize a 'virus' program if it
- bit him.
-
- 2. Line Item 11: "3- 3M DC 600A Data Cartridge Tapes"
- These had NO 'sexually related' matter of any kind on them.
-
- 3. Line Item 12: "Letter w/check (fee)"
- This is NOT 'sexually related' matter.
-
- 4. Line Item 13: "OS2 IBM Operating System"
- This is Mark's REGISTERED copy of IBM OS/2 Operating System.
- Mark is an IBM-approved beta test site for IBM's OS/2
- software. 'They' returned Mark's BACKUP discs of OS/2.
- IBM takes a very dim view of use of mis-appropriated
- REGISTERED software. (and this case is posted all over their
- own internal network--at their request)
-
- 5. Line Item 14: "1- Notebook w/documentation"
- This is NOT 'sexually related' matter.
-
- 6. Line Item 19: "1 bag w/misc. records"
- This is NOT 'sexually related' matter.
-
- 7. Line Items 15-18:
- a) 5 diskette storage cases.
- b) Approximately 300 of the more than 560 diskettes taken
- contained NO 'sexually related' matter whatsoever.
- They DID contain an enormous library of entirely 'shareware'
- programs.
-
- PART B: Things Taken But Not Documented List
- IMPORTANT: --we want four items returned that Stahl took, but did
- NOT DOCUMENT on his seizure inventory list:
-
- 1) ALL E-mail of the several hundred Akron Anomaly users
- improperly and (my opinion) illegally taken, examined and kept
- by Steve Stahl. Also all FidoNet E-mail in automatic transfer
- and/or storage when Stahl 'pulled the plug'.
-
- 2) All copies made of data from the Akron Anomaly. Disclosure
- of all existent copied data and its location prior to its
- return.
-
- 3) The listing file from the hard disk of all users of the Akron
- Anomaly.
-
- 4) The detailed library file from the hard disk that identifies
- each of the diskettes taken by Stahl. i.e. precisely those
- that are shareware library and those that are input area
- backups.
-
- Backup copies of this missing data probably exist, either in
- Stahl's department or OBCI (or BOTH). I can't imagine them not
- making copies when checking out software that could have an auto-
- destruct feature.
-
- =-=-=-=-=
-
- <4> Notice from Chief Stahl that returned software can be picked
- up.
-
- Quote:
- May 5, 1993
-
- "Bureau of Criminal Identification and Investigation has
- returned to us certain software that they have determined is to be
- returned to you. You need to come to the police station Monday -
- Friday, 7:30AM - 3:30PM to pick up and sign for this property."
- [signed: Steve Stahl]
- =-=-=-=-=
-
- <5> List of items actually returned (from David Lehrer).
-
- The items 'returned' by OBCI were picked up and signed for at the
- Munroe Falls police station on Friday, June 18, 1993 by Mark Lehrer
- and his father David, with an attorney accompanying to oversee this
- activity.
-
- Items received Friday June 18th were:
-
- 53 diskettes
- 27 unopened/blank
- 16 with a commercial label i.e. DeScribe, Sierra
- 10 of OS/2 software backups
-
- 1 coaster for cold drinks
-
- Period.
-
- NO E-mail was returned.
-
- =-=-=-=-=
-
- <6> Letter from Chief Stahl saying the Ohio Bureau of Criminal
- Investigation has everything else.
-
- Quote:
- June 21, 1993
-
- Mr. Mark Lehrer
- 58 Bermont Ave.
- Munroe Falls, Ohio 44262
-
- Dear Mr. Lehrer,
-
- I appreciate you coming in to pick up your property
- on June 18, 1993. I did want to advise you that we have
- no more of the equipment that was seized. The rest of it
- was turned over to BCI. Based on your notation, it appears you
- feel you are entitled to other materials. We were
- told by the prosecutor's office that we would receive a
- list of items you felt you were entitled to upon completion of the
- case. The case was disposed of on March 8, 1993.
- To date we have received no list. On May 4, 1993 any re-
- maining equipment we had in our evidence was turned over to BCI
- pursuant to the court ordered disposition.
-
- If you feel additional items need to be returned, I
- suggest you contact them at P.O. Box 365 London, Ohio 43140, Attn:
- Investigations Supervisor.
-
- Sincerely,
-
- signed
- Steve Stahl
-
- COMMENT: Not even attorney Varian had heard of any such
- arrangements as this. The individual referred to at OBCI is John
- Lenhart, Superintendent. Note also Stahl's first letter is dated
- May 5th, one day after his 'contact' with OBCI to turn over his
- 'evidence'. David Lehrer
-
- ------------------------------
-
- Date: Mon, 26 Jul 93 11:31:40 EDT
- From: Paul Higgins <VALUES@GWUVM.BITNET>
- Subject: File 2--Call for Paper: Computer Network Use and Abuse Conference
-
-
- CALL FOR PAPERS
-
- The National Conference of Lawyers and Scientists (NCLS) invites
- proposals for original papers to be presented at a two-and-a-half-day
- invitational conference on "Legal, Ethical, and Technological Aspects
- of Computer and Network Use and Abuse." The conference, which will
- include 40 participants representing a diverse set of perspectives and
- areas of expertise, will be held in Irvine, California on December
- 17-19, 1993. Up to three successful applicants will receive travel
- expenses and room and board at the conference. Papers will be
- included in the conference proceedings and may be published
- subsequently in a book or journal symposium.
-
- The conference will focus on the ways in which the law, ethics, and
- technology can contribute to influencing and enforcing the bounds of
- acceptable behavior and fostering the development of positive human
- values in a shared computer environment. Primary attention will be on
- unwanted intrusions into computer software or networks, including
- unauthorized entry and dissemination of viruses through networks or
- shared disks. Discussions will deal with such issues as access to
- information, privacy, security, and equity; the role of computer
- users, academic institutions, industry, professional societies,
- government, and the law in defining and maintaining legal and ethical
- standards for the use of computer networks; and a policy agenda for
- implementing these standards.
-
- Papers are invited on any aspect of the conference theme. Especially
- welcome would be papers reporting on empirical research, surveys of
- computer users, and case studies (other than those that are already
- well-known). Interested persons should submit a summary or outline of
- no more than 500 words, together with a brief (one-page) resum% and a
- statement (also brief) of how one's expertise or perspective might
- contribute to the meeting. Proposals will be reviewed by an advisory
- committee convened by NCLS and successful applicants will be asked to
- prepare papers for the meeting. Papers must be the original work of
- the author, not previously published, in good academic form, and
- between about 5,000 and 8,000 words (25-30 double-spaced pages) in
- length.
-
- Deadline for receipt of proposals is 5 p.m. Eastern Time, September
- 15, 1993. Applicants who are selected to prepare papers will be
- informed by October 1, 1993. Draft papers will be due December 3,
- 1993. Final versions of the papers, revised in light of conference
- discussions, will be due approximately two months after the
- conference.
-
- NCLS is an organization sponsored jointly by the American Association
- for the Advancement of Science and the American Bar Association,
- dedicated to improving communication between members of the legal and
- scientific/technical professions and exploring issues at the
- intersection of law, science, and technology. Funding for this
- meeting has been provided by the Program on Ethics and Values Studies
- of the National Science Foundation. For further information please
- contact Deborah Runkle, Directorate for Science & Policy Programs,
- American Association for the Advancement of Science, 1333 H Street,
- NW, Washington, DC 20005. Phone: 202-326-6600. Fax: 202-289-4950.
- E-mail: values@gwuvm.gwu.edu.
-
- ------------------------------
-
- Date: Sat, 24 Jul 1993 14:13:08 EST
- From: Dave Banisar <banisar@WASHOFC.CPSR.ORG>
- Subject: File 3--Credit Reports and National
-
- Credit Reports and National Security
-
- Last week, the Senate Intelligence Committee approved a provision
- that allows for FBI access to credit reports using only a letter
- instead of a judical warrant in cases that they say involved national
- security. There is concern that this will be subject to abuse and that
- the necessity has not been proven. Several privacy and consumer
- groups sent this letter opposing the provision.
-
- I was unable to easily find the actual text but will get it after I come
- back from vacation.
-
- Dave Banisar
- CPSR Washington Office
-
-
-
-
- July 12, 1993
-
-
- The Honorable Dennis Deconcini
- Chairman
- Senate Select Committee on Intelligence
- United States Senate
- SH-211 Hart Senate Office Building
- Washington, DC 20510-6475
-
- Dear Chairman DeConcini;
-
- We are writing to voice our strong opposition to the
- Administration's legislative proposal to amend the Fair Credit
- Reporting Act (FCRA) to allow the Federal Bureau of Investigation
- (FBI) to obtain consumer credit reports in foreign
- counterintelligence cases.
-
- The FBI seeks a national security letter exemption to the
- FCRA to obtain personal information from consumer reporting
- agencies without a subpoena or court order. A national security
- letter gives the FBI the authority to obtain records without
- judicial approval and without providing notice to the individual
- that his or her records have been obtained by the Bureau.
- Similar FBI proposals were rejected in previous years after
- Congressional leaders expressed concern over the civil liberties
- issues raised.
-
- Although the current draft proposal is more comprehensive
- than those circulated in previous years, the changes and
- additions do not alter significantly the central character of the
- proposal. The Administration's 1993 proposal includes explicit
- limits to dissemination of obtained information within the
- government, penalties for violations including punitive damages,
- and reporting requirements. These provisions are positive
- changes from the legislation put forward in previous years, but
- they do not save the proposal from its intrinsic flaws.
-
- Therefore, the reasons for our fundamental opposition to the
- current proposal remain the same: 1) the FBI has not demonstrated
- a compelling need for access to consumer credit reports; and 2)
- legislation that implicates civil liberties should be addressed
- separately and not as part of the authorization process.
-
- There are only two instances in which Congress has
- authorized the FBI, in counterintelligence investigations, to
- obtain information about individuals pursuant to a national
- security letter but without a subpoena, search warrant or court
- order. First, the Electronic Communications Privacy Act (ECPA)
- of 1986 included a provision requiring common carriers to
- disclose subscriber information and long distance toll records to
- the FBI in response to a national security letter. Second,
- congress included in the 1987 Intelligence Authorization Act an
- amendment to the Right to Financial Privacy Act (RFPA) that
- requires banks to provide customer records to the FBI in response
- to a similar letter. In that case, the FBI presented to Congress
- its case for obtaining financial records in foreign counter-
- intelligence cases and the difficulty of obtaining those records
- without a court order.
-
- in both instances when congress has previously authorized
- the national security letter, Congress recognized that the
- procedure departs dramatically from the procedure necessary to
- obtain a court order.
-
- The FBI's current proposal seeks similar access to
- individuals' credit records held by consumer reporting companies.
- The FBI has yet to adequately justify its need to add such highly
- personal, sensitive information to the narrow category of records
- subject to the national security letter exemption.
- The Bureau claims obtaining credit reports will allow it to
- more easily determine where a subject of an investigation banks
- -- information the FBI claims will help them effectuate their
- ability to access bank records under the RFPA. We opposed the
- national security letter exemption in the RFPA and do not endorse
- the FBI's slippery slope approach to ensuring that they can more
- easily obtain financial information in foreign
- counterintelligence cases. This information can be and is
- routinely gained without credit reports. We do not believe
- convenience is a sufficient justification for this significant
- exception to the law.
- The FBI further argues that obtaining banking information
- through a credit report is preferred because it is actually less
- intrusive than those investigative methods that would otherwise
- be used. While we too are frustrated that other information-
- gathering techniques are frequently too intrusive, our objections
- to the other techniques do not lead us to endorse yet another
- technique that is also intrusive and that weakens existing
- privacy law.
- Finally, we object to using the authorization process as the
- vehicle for pursuing this change. The national security latter
- exemption, because it diminishes the due process and privacy
- protections for individuals, must be given the most careful
- consideration. The FBI's proposal should be introduced as
- separate legislation on which public hearings can be held. only
- in this way can the Committee test thoroughly the FBI's case for
- the exemption and hear from witnesses who object to the change.
-
-
- We urge you to reject the FBI's proposal in its current
- form. We are available to work with you on this issue.
-
- Sincerely,
-
-
-
- Janiori Goldman Michelle Meier
- Privacy and Technology Project Consumers Union
- American civil Liberties Union
-
-
- Marc Rotenberg Evan Hendricks
- Computer Professionals for U.S. Privacy Council
- Social Responsibility
-
-
-
-
-
-
- cc: Members, Senate Select Committee on Intelligence
-
- The Honorable George J. Mitchell
- Senate Majority Leader
-
- The Honorable Donald W. Riegle, Jr., Chairman
- Senate Committee on Banking, Housing and Urban Affairs
-
- The Honorable Patrick J. Leahy, Chairman
- Subcommittee on Technology and the Law
-
- ------------------------------
-
- Date: Thu, 22 Jul 1993 10:42:07 -0700
- From: Jim Warren <jwarren@WELL.SF.CA.US>
- Subject: File 4--UPDATE #19-AB1624: PROGRAMMERS! START YOUR ENGINES!
-
- July 20, 1993
-
- Okay, all you programmers who volunteered to create readers, indexers,
- print utilities, etc., for California's legislative data --HERE'S YOUR
- FIRST CHANCE.
-
- GAIN FAME AND GLORY (if not wealth :-) ! Be the FIRST to create
- legislative data-handling utilities and share the source-code with the
- world. Do it fast, and you/it can amaze and impress legislators at
- the Aug. 18th Senate Rules Committee hearing on AB1624.
-
- The Legislative Data Center (LDC) has provided bill-author Bowen's
- office with six diskettes full of sample legislative data in the
- various forms in which it exists internally, at the LDC and/or the
- Office of State Printing (OSP).
-
- They also provided documentation-files in electronic form.
-
- With some kindly Sacramento assistance, Tim Pozar now has all of these
- files available across the Internet in the anonymous ftp directory
- (file transfer protocol) on kumr.lns.com.
-
- To obtain copies of the files, use the command "ftp kumr.lns.com".
- Login as "anonymous" and use your mailing address as a password.
-
- Be sure to use the command "binary" to transfer the files intact.
- Use the command "cd pub/ldc" to change to the proper directory.
- Then the command "mget *" to get all of the files. After all of the
- files are retrieved, type the command "quit" to end the ftp session
- and log out of kumr.kns.com.
-
- If you have ftp problems, contact Tim:
- Internet: pozar@kumr.lns.com FidoNet: Tim Pozar @ 1:125/555
- Snail: Tim Pozar, KKSF, 77 Maiden Lane, San Francisco CA 94108
- POTS: +1 415 788 2022 Radio: KC6GNJ / KAE6247
-
- According to LCD notes that accompanied the diskettes, the files include:
- cgml.sou - California Generic Markup Language (CGML) parser table
- codes.fmt - documentation of CGML (the LDC formatting language, that does
- *not* give the page- or line-numbers by which amendments are defined)
- measures.fmt - documentation of Page II (the OSP typesetting input, which is
- the only source of the page- and line-numbers of printed bills)
- *cg.ina - introduced bill, in the Assembly, coded in CGML
- *cg.ams - amended bill, in the Senate, coded in CGML
- *.cg - Constitution part, state code or uncodified statute, coded in CGML
- ab????.ina - bill introduced in the Assembly, coded in Page II
- ab????.ams - Assembly bill amended in the Senate, coded in Page II
- *.pg2 - Page II tables for introduced, amended, enrolled and chaptered bills
- *ca - committee analysis
- *fa - floor analysis
- *cf - committee vote
- *fv - floor vote
- *s - bill status
- *h - bill history
- *ve - Governor's veto message
- 063093.boo files apparently concern the Assembly and Senate Daily Files.
- If you have questions AFTER you have diligently diddled these files and
- become totally frustrated, send specific questions to me and I'll try to
- scrounge up some answers. [No guarantees, though. :-) ]
-
- Let me know if/when you think you have some code working, and we'll figure
- out how best to gloriously - and *timely* - flaunt it in Sacramento. :-)
- [Note: I will be at the Telluride Tele-Community conference and mostly offline
- 7/22-7/26.]
-
- ------------------------------
-
- Date: Fri, 16 Jul 1993 16:34:17 EDT
- From: Doug Schuler <douglas@GRACE.RT.CS.BOEING.COM>
- Subject: File 5--Community Network Survey Results Available
-
- Community Networkers,
-
- A few months ago I distributed a community network survey to several
- electronic forums. I stated that I'd make the survey results available
- electronically and I've received quite a few requests for the results.
- I've *finally* moved them to a site suitable for anonymous ftp.
-
- ftp to atlas.ce.washington.edu
- login = anonymous
- password = e-mail-address
- cd to pub/seattle-community-network/community-networks/surveys
-
- The completed surveys, explanatory information and blank surveys
- are also in the directory. I hope to maintain up-to-date information
- so completed surveys on systems not previously described or completed
- surveys that reflect major changes in status are welcome. I'd prefer
- that these be mailed to me. My address is dschuler@cs.washington.edu.
-
- I've received nearly 30 completed surveys so far.
-
- I hope that this information is useful. Thanks to everybody that's
- participated!
-
- -- Doug
-
-
- P.S. I've purposefully kept the survey short. I'm interested in
- comments on improving the survey.
-
-
-
- Completed (or nearly completed) Surveys
- ---------------------------------------
-
- CIAO-trail-freenet Vancouver, B.C., Canada
- IGC San Francisco, CA
- SPACECON Merritt Island, FL
- african-studies-bbs Madison, WI
- akron-regional-freenet Akron, OH
- boston-peace-and-justice-hotline Brighton, MA
- chippewa-valley-freenet Eau Claire, WI
- columbia-online-information-network Columbia, MO
- cruzio Santa Cruz, CA
- denver-freenet Denver, CO
- ecoline Burlington, VT
- eugene-community-network Eugene, OR
- FACTS Fayetteville, NC [nearly ready]
- heartland-freenet Peoria, IL
- mt-view-community-network Mountain View, CA
- national-capital-freenet Ottawa, Ontario, Canada
- new-mexico-network Albuquerque, NM
- rtk Washington, DC
- santa-cruz-county-wan Santa Cruz, CA
- seattle-community-network Seattle, WA [nearly ready]
- slo-county San Luis Obispo, CA
- suncoast-freenet Tampa, FL
- sustainable-development-info-network Cambridge, MA
- toronto-freenet Toronto, Ontario, Canada
- triangle-freenet Triangle Park, NC
- youngstown-freenet Youngstown, OH
-
-
- ++++++++++++
- Thanks to David Barts and Coralee Whitcomb for help with this.
-
- ------------------------------
-
- End of Computer Underground Digest #5.56
- ************************************
-
- Downloaded From P-80 International Information Systems 304-744-2253
-