home *** CD-ROM | disk | FTP | other *** search
- Computer underground Digest Sun Aug 2, 1992 Volume 4 : Issue 34
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Copy Editor: Etaion Shrdlu, III
- Archivist: Brendan Kehoe
- Shadow-Archivist: Dan Carosone
-
- CONTENTS, #4.34 (Aug 2, 1992)
- File 1--Day (in court) of The Dead
- File 2--Re: 2600 and Bellcore flap
- File 3--Another View of Bellcore vs. 2600
- File 4--New 2600 and 2600 Meetings
- File 5--Is Bellcore Guilty of Stealing Copyright Information?
- File 6--Update on Len Rose
- File 7--Biblio resource: "Computer Crime" Handbook
- File 8--Dr Ripco Summarizes his Legal Status since Sun Devil
- File 9--Documents Available: Open Platform Overview, Life in Virtual
- File 10--CPSR Recommends NREN Privacy Principles
- File 11--Biblio resource: "Computer Crime" Handbook
- File 12--Updated CPSR Archive Listing
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost from tk0jut2@mvs.cso.niu.edu. The editors may be
- contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at:
- Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115.
- Issues of CuD can also be found in the Usenet alt.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL0 and DL12 of TELECOM; on Genie in the PF*NPC RT
- libraries; from America Online in the PC Telecom forum under
- "computing newsletters;" on the PC-EXEC BBS at (414) 789-4210; and by
- anonymous ftp from ftp.eff.org (192.88.144.4) and ftp.ee.mu.oz.au
- European distributor: ComNet in Luxembourg BBS (++352) 466893.
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted as long as the source
- is cited. Some authors do copyright their material, and they should
- be contacted for reprint permission. It is assumed that non-personal
- mail to the moderators may be reprinted unless otherwise specified.
- Readers are encouraged to submit reasoned articles relating to
- computer culture and communication. Articles are preferred to short
- responses. Please avoid quoting previous posts unless absolutely
- necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: Sun, 26 Jul 92 2:33:02 CDT
- From: bei@DOGFACE.AUSTIN.TX.US(Bob Izenberg)
- Subject: File 1--Day (in court) of The Dead
-
- >From:
- Bandit, Shylock and Trackshoes
- A Kinda Professional Corporation
-
- >To:
- Homo Sapiens
-
- Dear Infringing Species,
-
- It has come to our attention that you have been utilizing anatomical
- developments pioneered by several of our clients, the dinosaurs, in your
- everyday activities. This letter is to notify you that the dinosaurs
- consider these features to be an infringement of dinosaur development,
- which has been a documented fact in the scientific community for decades.
- Said features are proprietary to the dinosaurs, and their duplication
- represents a substantial harm to the saurian reputation and ability to
- survive and thrive in a challenging evolutionary climate.
- This letter is to formally advise you that the process of bipedal locomotion,
- hereafter called "walking", is an activity the dinosaurs are prepared to
- demonstrate that they have employed for thousands of years. Continued
- use of your legs for locomotion on land will be considered actionable. In
- addition, any evolutionary developments that you may have reason to believe
- were first present in the dinosaurs must no longer be used by your species.
- This includes all digestive and reproductive organs, and much of your
- circulatory system. The dinosaurs will vigorously defend their hard-won
- evolutionary developments by any and all means available to them, including
- but not limited to injunctive relief, monetary damages, and gobbling alive,
- against all members of your species and any evolutionary descendants.
- We trust that you fully understand the dinosaur position on this matter.
-
- Sincerely,
-
- BB/file
-
- Before you dismiss the imaginary letter above as completely without
- relevance, consider the Bellcore letter to the editor of 2600 magazine that
- was recently reprinted in these virtual pages. Also consider the early
- snarls from AT&T lawyers directed at the authors of the BSD NET2 software
- distribution. Those authors, you see, have written something much like the
- UNIX operating system that AT&T markets, and have made the source code for
- it available for one-tenth the cost of AT&T's version, and, in the case of
- one version written specifically for the Intel 80386 processor, for free.
- They have taken the first tentative bites out of the Thunder Lizard's food
- supply, and the mad, unreasoning blood-lust that overcomes the dinosaur
- at such moments cannot obscure the handwriting on the cave wall. Of course,
- the day of the dinosaurs was long gone by the time that our species first
- trod upon the Earth... but even in this day and age, a fossil living in a
- museum can still get a good lawyer. The Dead rise up, and are sworn in.
- It is a shame that the reputation for innovation that once was the
- hallmark of AT&T and Bellcore has come to be so dominated by lawyers thriving
- in at atmosphere of comparative technical innocence. The quest for product
- viability and excellence may not have been abandoned, but in some sectors
- it has been supplanted by a desire to seal the product up in a black box:
- A black box that can't be explained, examined, or improved upon... just
- paid for in perpetuity.
-
- ------------------------------
-
- Date: Sat, 25 Jul 92 12:26:17 MDT
- From: Lazlo Nibble <lazlo@triton.unm.edu>
- Subject: File 2--Re: 2600 and Bellcore flap
-
- > ...Article details how, after following 4 steps, any line is suspectible
- > to secret monitoring. One document obtained by 2600 said: "There is no
- > proof the hacker community knows about the vulnerability."
-
- They may not have proof of it, but the first time I heard about Busy
- Line Verification was in '84 or '85 and there's at least one person I
- knew in the computer underground at the time who I had reason to
- believe when he said he'd used it. Its existance is certainly no
- secret to anyone who's messed around with the workings of the phone
- system -- the codes that activate BLV were (and probably still are) a
- sort of Holy Grail for telcom hackers.
-
- ------------------------------
-
- Date: Wed, 29 Jul 92 14:42 GMT
- From: "Thomas J. Klotzbach" <0003751365@MCIMAIL.COM>
- Subject: File 3--Another View of Bellcore vs. 2600
-
- To many, the crux of the controversy seems to be whether or not
- the internal Bellcore document was legally published in 2600 Magazine.
- To me, the issue is one far more basic.
-
- Mr. Goldstein states that he published the article because it was
- of "public importance". But were there other goals as well? To
- embarrass Bellcore? To protect the phone system from degradation
- caused by inappropriate use? Which goal or goals were the most
- important? In his response to Mr. Suchyta, he states that "...as
- journalists, we have a certain obligation that cannot be cast
- aside...". What is that obligation? Is "...readers, who have a keen
- interest in this subject matter..." enough of a justification? Or
- should there be any justification?
-
- I believe that Bellcore should be allowed to discover, document
- and correct the problem internally. If Bellcore was negligent/refused
- in correcting a known deficiency, that perhaps disclosure of the
- problem would bring pressure to bear on Bellcore to correct the
- deficiency. But this was not the case. Bellcore discovered,
- documented and took steps to correct the problem it would seem, in a
- timely manner. Also, the problem that Bellcore documents does not
- appear to be caused as the result of a deliberate, planned action to
- provide for a "trapdoor".
-
- I would ask Mr. Goldstein:
-
- - did you verify the source of the document?
-
- - did you ascertain how the document was obtained?
-
- - did the document contain any markings indicating that it was an
- internal Bellcore document?
-
- - did you weigh the needs of publishing the article versus not
- publishing the article?
-
- I tried to apply an ethical code or standard that would govern MY
- conduct if I was the person who published a similar article relating
- to my profession. I referred to the newly proposed revision to the
- ACM Code of Ethics and Professional Conduct (CACM May '92). I
- concluded after review with my attorney that a disclosure of a similar
- type by me would probably be in violation of the ACM Code sections 1.2
- (Avoid harm to others), 1.5 (Honor property rights including
- copyrights and patents - this also deals with unauthorized duplication
- of materials), 4.1 (Uphold and promote the principals of this Code)
- and possibly 2.3 (Know and respect existing laws pertaining to
- professional work).
-
- This issue is not solely about computers and technology. It is
- about "doing the right thing". It's about balancing the need for
- information versus how that the information is obtained and
- disseminated. It's about having an ethical standard that treats
- disclosure for the sake of disclosure and not ensuring that the
- information is obtained in a method consistent with high ethical
- standards as deserving of skepticism by the reader.
-
- There are those who liken this series of events to "Just one more
- case of Goliath tromping on those ill equipped to defend themselves".
- I would respond that if those who are "ill-equipped" to defend
- themselves publish a document which may have been obtained in an
- unethical manner and which may infringe on another party's rights,
- then they should be prepared to face a possible challenge. And as far
- as "the chilling effect of their (Bellcore's) letter threatening to
- trample on a free press as well", I would add that we not only need a
- free press, but a free and RESPONSIBLE press as well. The end does
- not always justify the means.
-
- The First Amendment provides for certain guarantees of freedoms as
- they relate to assembly, press and speech. It does not unfortunately
- guarantee common sense and a thorough review of all possible
- reactions/results of exercising that freedom. Many cloak themselves
- in the First Amendment words - fewer still cloak themselves in ethical
- standards that bring credibility to their work and to the causes that
- they advocate. The Computer Underground must win
- respect/understanding in all phases of society or it will relegated to
- a niche in that society.
-
- ------------------------------
-
- Date: Fri, 31 Jul 1992 17:58:48 -0700
- From: Emmanuel Goldstein <emmanuel@WELL.SF.CA.US>
- Subject: File 4--New 2600 and 2600 Meetings
-
- The summer issue of 2600 has been released. Subscribers should have it
- no later than the early part of next week. Included within is the
- latest on Bellcore's lawsuit threat against us, as well as a complete
- guide to the different kinds of telephone signalling systems used
- throughout the world (written by a real heavyweight in the phone
- phreak world), a review of the Dutch demon dialer, a tutorial on
- "portable hacking", tips on defeating call return (*69), a guide to
- voice mail hacking, plus letters, news updates, revelations of an
- interesting nature (more Bellcore stuff) plus a whole lot more.
-
- On Friday, August 7th, we'll be having meetings in six American
- cities. We expect all of these meetings to continue on a monthly
- basis. Please spread the word. NEW YORK: Citicorp Center (between
- Lexington and 3rd) downstairs in the lobby by the payphones. Payphone
- numbers: 212-223-9011, 212-223-8927, 212-308-8044, 212-308-8162.
- WASHINGTON DC: Pentagon City mall. CHICAGO: Century Mall, 2828 Clark
- St, lower level, by the payphones. Payphone numbers: 312-929-2695,
- 2875, 2685, 2994, 3287. ST. LOUIS: At the Galleria, Highway 40 and
- Brentwood, lower level, food court area, by the theaters. LOS ANGELES:
- At the Union Station, corner of Macy St. and Alameda. Inside main
- entrance by bank of phones. Payphone numbers: 213-972-9358, 9388,
- 9506, 9519, 9520, 213-625-9923, 9924, 213-614-9849, 9872, 9918, 9926.
- SAN FRANCISCO: 4 Embarcadero Plaza (inside). Payphone numbers:
- 415-398-9803,4,5,6.
-
- There is no agenda at a 2600 meeting, no formalities of any kind, no
- dress code (except maybe in St. Louis), and no constraints other than
- common sense. People generally get together, trade information, meet
- people, look for feds, and do whatever else comes to mind (all
- legally, of course). Each meeting runs approximately from 5 pm to 8
- pm local time on the first Friday of the month. Anyone wanting to
- organize a meeting in another city should contact 2600 at our office:
- (516) 751-2600.
-
- Our voice mail system is now a voice bulletin board system every night
- beginning at 11 pm Eastern time. You can reach it at 0700-751-2600
- through AT&T. If you're using another long distance carrier, preface
- that number with 10288. It costs 15 cents a minute and all of the
- money goes to AT&T. Whoopee.
-
- Permission is hereby granted to repost this message with the intention
- of spreading news of the above.
-
- ((Moderators' note: 2600 can be contacted at:
- directly at emmanuel@well.sf.ca.us or 2600@well.sf.ca.us
- or sub for one year for $21 and mail it to:
-
- 2600 Magazine
- PO Box 752
- Middle Island, NY 11953
-
- ------------------------------
-
- Date: Mon, 27 Jul 1991 10:19:51 PDT
- From: kram@ull.edy.edu
- Subject: File 5--Is Bellcore Guilty of Stealing Copyright Information?
-
- I read about Bellcore's threat against 2600 and wondered why nobody
- made the connection between Bellcore and the Secret Service raids in
- 1990. The letter that Bellcore sent to 2600 was in that same petty
- spirit. Bellcore made some vague threats about an unidentified
- article that may or may not have been a copyright violation. This is
- consistent with what they did a few years ago.
-
- Bellcore's attempt to intimidate 2600 into silence sounds a bit like
- the goring ox roaring even before it itself is gored. Bell
- Communications Research, known as Bellcore, employed Henry M.
- Kluepfel as a security specialist and David Bauer, a R&D security
- technoid. Both have testified in hacker trials. Kluepfel was involved
- in the Sun Devil and earlier investigations. He was on The Phoenix
- Project bbs, where he routinely logged posts and sent them to the
- Secret Service. The posters held the copyright, and Kluepfel, a
- private citizen, took them without authorization or permission. These
- were proprietary, and Bellcore, through its agent Henry Kluepfel,
- clearly engaged in a conspiratorial scheme to obtain proprietary
- information. Release of the information and subsequent use out of
- context may be a criminal copyright infringement under 17 USC 506. Who
- can ever forget how those posts were used by the Secret Service to
- show that the claim that kermit is a 7-bit protocol is obvious
- evidence of a conspiracy? This led to the unjustified raid on Steve
- Jackson Games. Given the pattern of Bellcore's paid accomplice to
- systematically, willfully, and knowingly engage in acts of obtaining
- proprietary information, the RICO Act (18 USC 1962) might be fun to
- invoke against Bellcore.
-
- If Bellcore considers Emmanuel Goldstein guilty of obtaining
- proprietary information, then I strongly suggest that the users of The
- Phoenix Project have an equally valid claim that Bellcore was
- responsible for stealing copyright material from users. Maybe all
- ex-Phoenix Project users should send Bellcore some letters. The
- address listed on the letter to 2600 was
-
- Leonard Charles Suchyta
- LCC 2E-311
- 290 W. Mt. Pleasant Avenue
- Livingston, NJ 07039
-
- +++
-
- ((MODERATORS' COMMENT: The above poster refers to The Mentor's BBS,
- known as The Phoenix Project. Logs and other information taken from
- TPP were instrumental in justifying the raid on Steve Jackson games.
-
- In the Secret Service search affidavit for Steve Jackson Games, Henry
- Kluepfel was listed as a "source of information." A substantial portion
- of this information was derived from 17 messages of logs from The
- Phoenix Project written from Jan. 23 through Jan. 29, 1990. CuD #2.11
- includes the complete affidavit and commentary.
-
- The reference to a description of Kermit by The Mentor as evidence of
- his participation in an encryption conspiracy read:
-
- >Name: The Mentor #1
- >Date: Fri Jan 26 10:11:23 1990
- >
- >Kermit is a 7-bit transfer protocol that is used to transfer
- >files to/from machines. It is mostly found on mainframes (it's a
- >standard command on VAX, for instance). Kermit has the added
- >advantage of being able to work through an outdial (because it is
- >7-bit).
- >
- >Mentor
-
- We share the poster's concern with the action of Bellcore's Henry
- Kluepfel. In that search affidavit, Timothy Foley wrote that Kluepfel
- indicted that TPP's users' list contained the names of two "hackers"
- from Illinois' Northern Federal District. To the best of our
- knowledge (and to the knowledge of those familiar with the users' list
- during this period), the only two names on it from the Northern
- District (former US prosecutor William J. Cook's jurisdiction) were
- the CuD moderators. Given the rather strange logic by which evidence
- is fabricated by some prosecutors, perhaps Bellcore should first apply
- to its own employees the same standards of integrity and honesty it
- expects from others.
-
- Because of his actions, Henry Kluepfel was named as a co-defendant in
- a civil suit brought against him, Bill Cook, Timothy Foley, and
- others, by Steve Jackson Games in 1991. The litigation, alleging civil
- rights violations, is still pending.
-
- ------------------------------
-
- Date: Sat, 1 Aug 92 23:58:14 PDT
- From: infogroup@unixville.com
- Subject: File 6--Update on Len Rose
-
- Len Rose was released from the federal penitentiary in South
- Carolina in March after serving 10 months of a one year sentence
- for unauthorized possession of Unix sourcecode. He completed the
- remaining two months in a community release center in Chicago.
- He is now working in Silicon Valley, and involved in some innovative
- work. He is working on a project that involves feeding Usenet news and
- Internet mail onto a satellite which basically provides a full news
- and mail feed anywhere in continental US.
-
- His wife and kids are still living in Chicago, and will hopefully be
- able to join him soon. He is also doing consulting work in California,
- so it looks like his life may be back on track.
-
- When I recently spoke with Len, he said "... with the exception of my
- financial condition, I am probably happier than I have ever been .."
-
- He also mentioned that he is trying to contact everyone who ever
- helped him , to say "Thanks" personally, so feel free to send mail to
- him at: "len@netsys.com" and he will get in touch with you.
-
- Perhaps there are happy endings after all.
-
- ------------------------------
-
- Date: Fri, 31 Jul 1991 22:15:54
- From: Jim Thomas <cudigest@mindvox.phantom.com>
- Subject: File 7--Biblio resource: "Computer Crime" Handbook
-
- A panel on computer crime, sponsored by the Chicago Bar Association,
- led to an edited collection of documents, including articles and
- federal statutes, that provides a helpful resource for those interested
- in a basic background on crime and computer technology. The volume,
- in spiral/desktop publishing format, includes a set of "hypotheticals"
- used for organizing the panel discussion. However, the responses of
- the panelists (which included William C. Cook, Sheldon Zenner, Robert
- Gustafson and Bernard P. Zajac, Jr.) were not included.
-
- The strength of the work is the appenix, which includes a list of
- potential violations (matched to their statutes) that may be
- prosecuted under various federal statutes; Copies of most relevant
- federal legislation governing recent "hacker" indictments; Comments on
- selected federal statutes; and reprints of articles from the National
- Institute of Justice and by John Perry Barlow, Buck BloomBecker, and
- others. It also includes a David R. Johnson's testimony regarding
- Senate Bill 2476, and a basic annotated bibliography of books,
- articles, journals, and other resources as pointers to further
- information on these issues.
-
- The volume is about 150 pages (unpaginated, unindexed) and is
- available at cost (about $20). For further information, contact
- Joanna Alperin
- Chicago Bar Association
- 321 South Plymouth Court
- Chicago, IL 60604-3997
-
- ------------------------------
-
- Date: Wed, 29 Jul 1991 17:34:18 CST
- From: Moderators <tk0jut2@mvs.cso.niu.edu>
- Subject: File 8--Dr Ripco Summarizes his Legal Status since Sun Devil
-
- ((Moderators' note: We asked Dr Ripco to give a detailed summary of
- all that has changed in his legal status in the past 18 months.
- Following is his summary of what's changed)).
-
- Dear Jim:
-
-
-
-
-
-
-
-
- Sincerely,
-
- Dr Ripco
-
- +++
-
- ((MODERATORS' NOTE: Dr Ripco's status on 1 August 1992 is identical to
- his status on May 8, 1990, the morning of the raid by the secret
- service and others. Although never charged, and although there is to
- date no evidence that he was involved in any criminal behavior, none
- of his equipment has been returned, he has not been contacted by law
- enforcement agents in over two years, he has not heard from attorneys
- he believed were helping him in the return of his equipment, and he
- has received no information about when, if ever, he can reclaim his
- equipment. In short, he has no idea, nor has he been able to learn,
- what's happening. Kafka's The Trial should be required reading for
- everybody.
-
- ------------------------------
-
- Date: Mon, 20 Jul 1992 13:15:21 -0400
- From: Christopher Davis <ckd@EFF.ORG>
- Subject: File 9--Documents Available: Open Platform Overview, Life in Virtual
-
- +======+==================================================+===============+
- | FYI | Newsnote from the Electronic Frontier Foundation | July 20, 1992 |
- +======+==================================================+===============+
-
- ELECTRONIC FRONTIER FOUNDATION'S
- OPEN PLATFORM PROPOSAL AVAILABLE VIA FTP
-
- The full text of the EFF's Open Platform Proposal is available in
- its current draft via anonymous ftp from ftp.eff.org as
- pub/EFF/papers/open-platform-proposal.
-
- To retrieve this document via email (if you can't use ftp), send mail to
- archive-server@eff.org, containing (in the body of the message) the
- command 'send eff papers/open-platform-proposal'. This is the proposal
- in its 4th draft and is up-to-date as of July 2.
-
- HOWARD RHINEGOLD'S "VIRTUAL COMMUNITIES, 1992" AVAILABLE VIA FTP
-
- This is the full text of Howard Rhinegold's illuminating essay "A Slice
- of Life In My Virtual Community" that was serialized in EFFector Online.
- You can retrieve this document via anonymous ftp from ftp.eff.org as
- pub/EFF/papers/cyber/life-in-virtual-community. To retrieve it via
- email (if you can't use ftp), send mail to archive-server@eff.org,
- containing (in the body of the message) the command 'send eff
- papers/cyber/life-in-virtual-community'.
-
- +=====+=====================================================+=============+
- | EFF | 155 Second Street, Cambridge MA 02141 (617)864-0665 | eff@eff.org |
- +=====+=====================================================+=============+
-
- ------------------------------
-
- Date: Wed, 29 Jul 1992 15:27:38 EDT
- From: Paul Hyland <PHYLAND@GWUVM.BITNET>
- Subject: File 10--CPSR Recommends NREN Privacy Principles
-
- PRESS RELEASE
- July 24, 1992
-
- CPSR Recommends NREN Privacy Principles
-
- WASHINGTON, DC -- Computer Professionals for Social Responsibility
- (CPSR), a national public interest organization, has recommended
- privacy guidelines for the nation's computer network.
-
- At a hearing this week before the National Commission on Library and
- Information Science, CPSR recommended a privacy policy for the
- National Research and Education Network or "NREN." Marc Rotenberg,
- Washington Director of CPSR, said "We hope this proposal will get the
- ball rolling. The failure to develop a good policy for the computer
- network could be very costly in the long term."
-
- The National Commission is currently reviewing comments for a report
- to the Office of Science and Technology Policy on the future of the
- NREN.
-
- Mr. Rotenberg said there are several reasons that the Commission
- should address the privacy issue. "First, the move toward
- commercialization of the network is certain to exacerbate privacy
- concerns. Second, current law does not do a very good job of
- protecting computer messages. Third, technology won't solve all the
- problems."
-
- The CPSR principles are (1) protect confidentiality, (2) identify
- privacy implications in new services, (3) limit collection of personal
- data, (4) restrict transfer of personal information,(5) do not charge
- for routine privacy protection, (6) incorporate technical safeguards,
- (7) develop appropriate security policies, and (8) create an
- enforcement mechanism.
-
- Professor David Flaherty, an expert in telecommunications privacy law,
- said "The CPSR principles fit squarely in the middle of similar
- efforts in other countries to promote network services. This looks
- like a good approach."
-
- Evan Hendricks, the chair of the United States Privacy Council and
- editor of Privacy Times, said that the United States is "behind the
- curve" on privacy and needs to catch up with other countries who are
- already developing privacy guidelines. "The Europeans are racing
- forward, and we've been left with dust on our face."
-
- The CPSR privacy guidelines are similar to a set of principles
- developed almost 20 years ago called The Code of Fair Information
- practices. The Code was developed by a government task force that
- included policy makers, privacy experts, and computer scientists. The
- Code later became the basis of the United States Privacy Act.
-
- Dr. Ronni Rosenberg, who has studied the role of computer scientists
- in public policy, said that "Computer professionals have an important
- role to play in privacy policy. The CPSR privacy guidelines are
- another example of how scientists can contribute to public policy."
-
- For more information about the Privacy Polices and how to join CPSR,
- contact CPSR, P.O. Box 717, Palo Alto CA 94302. 415/322-3778 (tel)
- and 415/322-3798 (fax). Email at cpsr@csli.stanford.edu.
-
- ++++++++++++
- [Moderator's note: The full text of the referenced NREN Privacy
- Principles is available from the CPSR Listserv file server. Send
- the command:
- GET NREN PRIVACY
- to listserv@gwuvm.gwu.edu, as the text of an e-mail message. -peh]
-
- ------------------------------
-
- Date: Fri, 31 Jul 1991 22:15:54 EDT
- From: Jim Thomas <cudigest@mindvox.phantom.com>
- Subject: File 11--Biblio resource: "Computer Crime" Handbook
-
- A panel on computer crime, sponsored by the Chicago Bar Association,
- led to an edited collection of documents, including articles and
- federal statutes, that provides a helpful resource for those interested
- in a basic background on crime and computer technology. The volume,
- in spiral/desktop publishing format, includes a set of "hypotheticals"
- used for organizing the panel discussion. However, the responses of
- the panelists (which included William C. Cook, Sheldon Zenner, Robert
- Gustafson and Bernard P. Zajac, Jr.) were not included.
-
- The strength of the work is the appenix, which includes a list of
- potential violations (matched to their statutes) that may be
- prosecuted under various federal statutes; Copies of most relevant
- federal legislation governing recent "hacker" indictments; Comments on
- selected federal statutes; and reprints of articles from the National
- Institute of Justice and by John Perry Barlow, Buck BloomBecker, and
- others. It also includes a David R. Johnson's testimony regarding
- Senate Bill 2476, and a basic annotated bibliography of books,
- articles, journals, and other resources as pointers to further
- information on these issues.
-
- The volume is about 150 pages (unpaginated, unindexed) and is
- available at cost (about $20). For further information, contact
- Joanna Alperin
- Chicago Bar Association
- 321 South Plymouth Court
- Chicago, IL 60604-3997
-
- ------------------------------
-
- Date: Mon, 20 Jul 1992 14:48:39 EDT
- From: Paul Hyland <PHYLAND@GWUVM.BITNET>
- Subject: File 12--Updated CPSR Archive Listing
-
- Following is an updated version of the file CPSR ARCHIVE, which lists
- the files stored on our Listserv archive. This is the last time that
- this entire file will be distributed to the list. From now on, I will
- periodically send mail containing only the updates (add/change/delete).
-
- Users can also subscribe to any of our files, and receive either notice
- or the file itself when it is changed. For information on this and other
- Listserv File Server features, send the command:
-
- INFO LISTFILE
-
- The command INFO GENINTRO will provide an introduction to Listserv in general.
-
- Questions, comments, or complaints should be directed to phyland@gwuvm.gwu.edu
-
- Paul Hyland
- Owner, CPSR List
- ******************************************************************************
-
- This file contains a list of files available on the CPSR LISTSERV file server.
-
- To request a copy of any file, send mail to the list server:
-
- LISTSERV@GWUVM.GWU.EDU (Internet) or LISTSERV@GWUVM (Bitnet)
-
- In your mail, send one line per request, using this command for each request:
-
- GET <FILENAME> <FILETYPE>
-
- The options for <FILENAME> and <FILETYPE> are listed below. For example:
-
- GET CPSR BROCHURE
-
- Note that LISTSERV is case-insensitive for command and file names.
-
- If you have problems with this list, send mail to the administrator,
- Paul Hyland (phyland@gwuvm.gwu.edu or phyland@gwuvm).
- ===============================================================================
- CPSR INFORMATION
-
- Filename Filetype Lines Description
- -------- -------- ----- -----------
- CPSR ARCHIVE 213 This file
- CPSR BROCHURE 300 CPSR overview and membership form ** UPDATED **
- CPSR MEMBFORM 53 CPSR membership form (also in brochure)
- CPSR BOOKS 129 List of CPSR publications and order form
- CPSR ALIASES 75 CPSR E-mail Aliases @csli.stanford.edu
- CPSR TEN-YEAR 219 Ten-year history of CPSR, thru spring '91
-
- CPSR PAPERS AND PROJECT DESCRIPT,SCRIPT='SPELL'IONS
-
- Filename Filetype Lines Description
- -------- -------- ----- -----------
-
- 21STCENT PROJECT 287 21st Century Project description -
- To redirect U.S. Science & Technology Policy
- toward peaceful and productive uses.
- PRIVACY PAPER 1550 "Privacy in the Computer Age" by Ronni Rosenberg
- SUNDEVIL RULING 283 Text of ruling on CPSR FOIA lawsuit seeking
- Operation Sun Devil search warrant materials
-
- CONFERENCE MATERIALS
-
- Filename Filetype Lines Description
- -------- -------- ----- -----------
- PDC-92 CALL4PAP 103 Participatory Design Conference
- Cambridge, MA -- November 6-7, 1992
- CRYPTO INTRO 109 2nd CPSR Cryptography and Privacy Conference --
- Introduction from conference materials
- CFP-2 REPORT 808 Report from 2nd Conference on Computers, Freedom
- and Privacy (CFP-2) -- March, 1992
- CFP-2 RADIO 34 CFP-2 radio program available in late JJune
- CFP-93 CALL4PAP 176 3rd Conference on Computers, Freedom, and Privacy
- San Francisco, CA -- March 9-12, 1993
- DIAC-92 REPORT 219 Report from Directions and Implications of
- Advanced Computing (DIAC-92) -- May, 1992
- CFP2 ANNOUNCE - DELETED
- CFP2 SHORT - DELETED
- DIAC-92 ANNOUNCE - DELETED
- DIAC-92 PROGRAM - DELETED
- CHI-92 REPORT 79 From ACM SIGCHI (Computer-Human Interaction)
- CHI '92 session on Social Impact - May, 1992
- SIGCSE REPORT 100 From ACM SIGCSE (Computer Science Education)
- Debate on state licencing of programmers
- IFAC CALL4PAP 199 International Federation for Automatic Control
- Symposium on Automated Systems Based on
- Human Skill (and Intelligence)
- September 23-25, 1992, Madison, WI
- MULTIMED CALL4PAP 75 _Journal of Educational Multimadia and Hypermedia_
- Special Issue on Multimedia and Hypermedia
- Learning Environments - Deadline: Sept 15, 1992
- SAUDI CALL4PAP 57 13th National Computer Conference and Exposition
- Topic: Information Technology Transfer
- Riyadh, Saudi Arabia - Nov. 21-26, 1992
- TECHSTUD CALL4PAP 351 _Technology Studies_ Special Issue on Technology
- and Ethics - Deadline: January 15, 1993
- EMC-93 CALL4PAP 161 Society for Computer Simulation - International
- Emergency Management and Engineering Conference,
- Arlington, VA -- March 29 - April 1, 1993
- IFIP CALL4PAP 33 International Federation for Info. Processing
- Working Gp 9.2 (Social Accountability of Computers)
- Working conference - `Facing the Challenge of Risk
- and Vulnerability in an Information Society'
- May 20-22, 1993, Namur, Belgium
- ED-MEDIA CALL4PAP 353 World Conference on Educational Multimedia and
- Hypermedia, Orlando FL, June 23-26, 1993
- EASTWEST ANNOUNCE - DELETED
- COLLAB92 ANNOUNCE - DELETED
-
-
- CPSR ON-LINE NEWSLETTERS
-
- Filename Filetype Lines Description
- -------- -------- ----- -----------
- CPSRBERK 2Q92 425 CPSR/Berkeley Electronic Newsletter
- Second Quarter - 1992
- CPSR-PDX VOL5-N02 258 CPSR/Portland Electronic Newsletter *new name*
- Volume 5, #02, April 1, 1992
- CPSR-PDX VOL5-N03 488 CPSR/Portland Electronic Newsletter *new name*
- Volume 5, #03, May 26, 1992
- CPSR-PDX VOL5-N04 531 CPSR/Portland Electronic Newsletter *new name*
- Volume 5, #04, June 8, 1992
- CPSR-PDX VOL5-N05 819 CPSR/Portland Electronic Newsletter
- Volume 5, #05, June 23, 1992
- CPSR-PDX VOL5-N06 612 CPSR/Portland Electronic Newsletter
- Volume 5, #06, July 13, 1992
- E-MAIL DIRECTRY 625 CPSR/PDX E-mail Directory of CPSR addresses and
- other interesting lists - August 22, 1991
- *renamed and updated*
-
- LEGISLATIVE MATERIALS
-
- Filename Filetype Lines Description
- -------- -------- ----- -----------
- BOS-CNID SHORT 122 Testimony by CPSR/Boston on Calling Number ID
- before Mass. DPU - Oral version
- BOS-CNID LONG 396 Testimony by CPSR/Boston on Calling Number ID
- before Mass. DPU - Written version
- CAL-CNID HEARING 299 Testimony by CPSR/Palo Alto and description of
- hearing before California State Assembly on CNID
- FBITAP PROPOSAL 445 Updated (and renamed) FBI Digital Telephony
- Proposal, to force telco's to enable FBI
- taps of the evolving digital network
- (with an introduction by Dave Banisar of CPSR)
- FBITAP LETTER 127 Letter from CPSR and others to Senator Leahy
- urging a public hearing of this FBI proposal
- FBITAP COMPWRLD 130 Article on FBI Proposal in Computerworld 6/8/92
- SEMATECH ENVIRO 118 Press Release from Campaign for Responsible
- Technology on environmental funding in
- SEMATECH reauthorization legislation
- SEMATECH AMENDMNT 222 Press Release from Campaign for Responsible
- Technology on proposed amendment to SEMATECH
- authorization to address environmental,
- community and labor concerns
- SB1447 BILL 1 California Senate Bill 1447 - Privacy Act of 1992
- (obsolete version deleted - revision expected)
- HR2772 BILL 85 GPO Wide Information Access Network for Data
- Online Act of 1991 (GPO WINDO Bill)
- HR2772 FACTS 95 Taxpayer Assets Project Fact Sheet on GPO WINDO
- S2813 BILL 151 GPO Gateway to Government Act of 1992
- (Senate version of WINDO)
- HR3459 BILL 136 Improvement of Information Access Act of 1991
- (Owens Bill)
- HR3459 FACTS 65 Taxpayer Assets Project Fact Sheet on Owens Bill
- OMB-A130 COMMENTS 178 Taxpayer Assets Project Note on the Proposed
- Revisions to OMB Circular A-130 concerning
- Management of Federal Information Resources
- with info on how to obtain the document and
- provide comments electronically (due 8/27/92)
- EDGAR RELEASE 323 Taxpayer Assets Project Press Release on letter
- to the Securities and Exchange Commission (SEC)
- asking that they broaden access and improve
- control over the Electronic Data Gathering,
- Analysis and Retrieval System (EDGAR)
- S1940 BILL 145 Electronic Freedom of Information Improvement
- Act of 1991
- HPC ACT 636 High Performance Computing Act of 1991
- Signed December 9, 1991
- CRYPTO ARTICLE 217 Article on Government attempts to control spread
- of cryptographic technology into the telephone
- network -- Joe Abernathy, Houston Chronicle
- NSA PAPERS 439 Response from NSA to Joe Abernathy questions on
- their attempts to control or hinder civilian
- cryptographic technology
- HR5615 BILL 144 Prescription Drug Records Privacy
- Protection Act of 1992
- CANADIAN PRINCIPL 90 Canadian Telecommunication Privacy Principles
-
- ONLINE RESOURCES AND OTHER MATERIALS
-
- Filename Filetype Lines Description
- -------- -------- ----- -----------
- RTK-NET SRCHFORM 136 RTK NET -- the Right-to-Know Computer Network --
- Introduction and on-line search request form
- PRIVACY LISTS 152 Information on two new privacy-related lists
- RISKS SAMPLE 541 Sample Issue of RISKS Digest - Volume 13, # 59
- CUD SAMPLE 995 Sample Issue of Computer underground Digest -
- Volume 4, # 26
- EFFECTOR SAMPLE 597 Sample Issue of EFFector Online - Volume 2, # 01
- EMAILPRV BIBLIO 136 Bibliography of materials on E-mail Privacy
- PRIVACY PROJECT 44 Tapes from the Privacy Project radio series
- Available from Pacifica Programming Service
- TEACHING VALUES 28 Describes "Teaching Social and Ethical
- Implications of Computing: A Starter Kit"
- from the Research Center on Computing and
- Society at Southern Connecticut State Univ.
- and Educational Media Resources, Inc.
- VIRTREAL GENIE 472 Genie On-Line Conference on Virtual Reality
- Howard Rheingold (Whole Earth Review) - 5/3/92
- (from the Public Forum * Non-profit Connection)
- CYBEPUNK GENIE 480 Genie On-Line Conference on Networks and Hackers
- Katie Hafner (co-author, CYBERPUNK) - 5/24/92
- DHIGHWAY GENIE 722 Genie On-Line Conference on Data Highways
- Steve Cisler (Aplle Computer) - 5/17/92
- MAIL MANNERS 150 Describes proper e-mail etiquette
- NSF JOBS 64 Two jobs with NSF Information Tech. Programs
-
- MONTHLY ARCHIVES OF CPSR LIST SUBMISSIONS
-
- Filename Filetype Lines Description
- -------- -------- ----- -----------
- CPSR LOG9110 158 From list start-up through 10/91
- CPSR LOG9111 674 From prior log through 11/91
- CPSR LOG9201 1619 From prior log through 1/92
- CPSR LOG9202 305 From prior log through 2/92
- CPSR LOG9203 1539 From prior log through 3/92
- CPSR LOG9204 866 From prior log through 4/92
- CPSR LOG9205 91 From prior log through 5/92
- CPSR LOG9206 2192 From prior log through 6/92
- CPSR LOG9207 96 From prior log through 6/92
-
- ------------------------------
-
- End of Computer Underground Digest #4.34
- ************************************
-