home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Wed Jan 26 1994 Volume 6 : Issue 10
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Archivist: Brendan Kehoe (Improving each day)
- Acting Archivist: Stanton McCandlish
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Coppice Editor: P. Bunyan
-
- CONTENTS, #6.10 (Jan 26 1994)
- File 1--Elementary Students Make New Friends with E-mail
- File 2--DEF CON ][ Initial Announcement
- File 3--Re: Cu Digest, #6.09/Lobby the Feds via PC
- File 4--Re: Clipp[er]ed again (fwd)
- File 5--GOV-ACCESS--Cal Leg online; Minn PubInfo Net; Cal Emg Serv
- File 6--What It Takes To Make It Happen: Key Issues For NII
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
- editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115.
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
- WHQ) (203) 832-8441 NUP:Conspiracy; RIPCO BBS (312) 528-5020
- CuD i also available via Fidonet File Request from 1:11/70; unlisted
- nodes and points welcome.
- EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
- In ITALY: Bits against the Empire BBS: +39-461-980493
-
- ANONYMOUS FTP SITES:
- AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
- EUROPE: ftp.funet.fi in pub/doc/cud. (Finland)
- UNITED STATES:
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud
- etext.archive.umich.edu (141.211.164.18) in /pub/CuD/cud
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD
- halcyon.com( 202.135.191.2) in mirror2/cud
- ftp.warwick.ac.uk in pub/cud (United Kingdom)
- KOREA: ftp: cair.kaist.ac.kr in /doc/eff/cud
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: Fri, 21 Jan 1994 14:08:17 EST
- From: EVFW91A@PRODIGY.COM(MR DAVID W BATTERSON)
- Subject: File 1--Elementary Students Make New Friends with E-mail
-
- Elementary Students Make New Friends with E-mail
- by David Batterson
-
- Elementary students lucky enough to have computers/modems at
- their school can exchange e-mail regularly with pals their own age in
- many states and other countries.
-
- Since they are use keyboards to write with, the young students
- call each other "keypals" rather than penpals. Unlike many adults who
- still find it difficult, these students usually compose their messages
- offline and then upload them.
-
- For example, third through sixth grade students in two Maryland
- elementary schools have been sending and receiving e-mail for over a
- year now. The kids call the METNET BBS, sponsored by the Maryland
- State Department of Education and Maryland Instructional Technology.
- METNET is, of course, linked with The Internet.
-
- Computer teacher Patricia A. Weeg is in charge of the e-mail
- program at the Maryland schools. Mrs. Weeg told me "my kids are doing
- super things with The Internet. My younger kids in grade two are part
- of an 'Infant Project' with students in Peru, Iceland, Tasmania,
- Hawaii and England. A fourth grader of mine has been messaging with a
- class in London."
-
- Another way Maryland students send and receive e-mail is on the
- MTEBBS (Maryland Technology Education Bulletin Board Service). They
- have their own conference called KIDTALK.
-
- Students can correspond in real time too, by taking part in the
- KIDLINK Internet Relay Chat (IRC). These IRC chats have included
- students from many states and countries.
-
- Students are learning about other countries by using e-mail.
- They exchange questions and answers on subjects like customs,
- holidays, housing, animals, the environment or careers. One fifth
- grader who is interested in engineering wrote to an electrical
- engineer in Guatemala to learn more about the field.
-
- In addition to improving students' writing and editing skills,
- the e-mail programs serve as an incentive. Students use e-mail as an
- extracurricular activity, and have to finish regular class work before
- they can take part.
-
- Many teachers use educational games and quizzes to make sure that
- time is spent wisely. Prior to 1982's November election, elementary
- students in Oregon, Michigan and Maryland were polled on their choice
- for President.
-
- Students, parents and educators who want to learn more about
- keypals can write Mrs. Patricia Weeg, Chapter 1 Computer Teacher,
- Delmar Elementary School, 700 S. Second St., Delmar, MD 21875. Her
- e-mail address is: pweeg@source.asset.com.
-
- David Batterson welcomes comments. MCI Mail: 273-7218 or
- evfw91a@prodigy.com.
-
- ------------------------------
-
- Date: 22 Jan 94 19:32:19 -0500
- From: Conal.Garrity@F8004.N282.Z1.FIDONET.ORG(Conal Garrity)
- Subject: File 2--DEF CON ][ Initial Announcement
-
- Updated Last : 1.16.1994
-
- xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx DEF CON ][ Convention Initial Announcement
-
- READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE
-
- =============================================================================
-
- What's this? This is the initial announcement and invitation to DEF
- CON ][, a convention for the "underground" elements of the computer
- culture. We try to target the (Fill in your favorite word here):
- Hackers, Phreaks, Hammies, Virii coders, programmers, crackers,
- Cyberpunk Wannabees, Civil Liberties Groups, CypherPunks, Futurists,
- Artists, Etc..
-
- WHO: You know who you are, you shady characters.
- WHAT: A convention for you to meet, party, and listen to some speeches
- that you would normally never hear.
- WHEN: July 22, 23, 24 - 1994
- WHERE: Las Vegas, Nevada @ The Sahara Hotel
-
- So you heard about DEF CON I, and want to hit part ][? You heard
- about the parties, the info discussed, the bizarre atmosphere of Las
- Vegas and want to check it out in person? Load up your laptop muffy,
- we're heading to Vegas!
-
- Here is what Three out of Three people said about last years
- convention:
-
- "DEF CON I, last week in Las Vegas, was both the strangest and the
- best computer event I have attended in years." -- Robert X. Cringely,
- Info World
-
- "Toto, I don't think we're at COMDEX anymore." -- Coderipper, Gray
- Areas
-
- "Soon we were at the hotel going through the spoils: fax sheets,
- catalogs, bits of torn paper, a few McDonald's Dino-Meals and lots of
- coffee grounds. The documents disappeared in seconds." -- Gillian
- Newson, New Media Magazine
-
- DESCRIPTION:
-
- Last year we held DEF CON I, which went over great, and this year we
- are planning on being bigger and better. We have expanded the number
- of speakers to included midnight tech talks and additional speaking on
- Sunday. We attempt to bring the underground into contact with
- "legitimate" speakers. Sure it's great to meet and party with fellow
- hackers, but besides that we try to provide information and speakers
- in a forum that can't be found at other conferences.
-
- While there is an initial concern that this is just another excuse for
- the evil hackers to party and wreak havok, it's just not the case.
- People come to DEF CON for information and for making contacts. We
- strive to distinguish this convention from others in that respect.
-
- WHAT'S NEW THIS YEAR:
-
- This year will be much larger and more organized than last year. We
- have a much larger meeting area, and have better name recognition.
- Because of this we will hve more speakers on broader topics. Expect
- speaking to run Saturday and Sunday, ending around 5 p.m. Some of the
- new things expected include:
-
- > An INet connection with sixteen ports will be there, _BUT_ will only
- provide serial connections because terminals are too hard to ship.
- So bring a laptop with communications software if you want to
- connect to the network. Thanks to cyberlink communications for the
- connection.
-
- > There will be door prizes, and someone has already donated a Cell
- Phone to give away.
-
- > Dr. Ludwig will present his virii creation awards on Sunday.
-
- > A bigger and better "Spot The Fed" contest, which means more shirts
- to give away.
-
- > More room, we should have tables set up for information
- distribution. If you have anything you want distributed, feel free
- to leave it on the designated tables. Yes, this year there will be
- a true 24 hour convention space.
-
- > A 24 hour movie / video suite where we will be playing all type of
- stuff. VHS Format. Mail me with suggested titles to show, or bring
- your own.
-
- > Midnight Tech Talks on Friday and Saturday night to cover the more
- technical topics and leave the days free for more general
- discussions.
-
-
- WHO IS SPEAKING:
-
- I was going to run a list of the current speakers we have lined up,
- but at this point things are still fluid. In a few months when the
- speakers list is more solidified I will release it. I'll name the
- people who have committed to attending in the next announcement.
- Trust me.
-
- WHERE THIS THING IS:
-
- It's in Las Vegas, the own that never sleeps. Really. There are no
- clocks anywhere in an attempt to lull you into believing the day never
- ends. Talk about virtual reality, this place fits the bill with no
- clunky hardware. If you have a buzz you may never know the
- difference. It will be at the Sahara Hotel. Intel as follows:
-
- The Sahara Hotel: 1.800.634.6078
- Room Rates: Single/Double $55, Triple $65, Suite $120
- (Usually $200) + 8% tax
- Transportation: Shuttles from the airport for cheap
-
- NOTE: Please make it clear you are registering for the DEF CON ][
- convention to get the room rates. Our convention space price is
- based on how many people register. Register under a false name if
- it makes you feel better, 'cuz the more that register the better for
- my pocket book. No one under 21 can rent a room by themselves, so
- get your buddy who is 21 to rent for you and crash out. Don't let
- the hotel people get their hands on your baggage, or there is a
- mandatory $3 group baggage fee. Vegas has killer unions.
-
-
- OTHER STUFF:
-
- If you check out Wired like 1.5 or 1.6 there was a blurb about the new
- Luxor hotel with it's total VR experience. It looks like the first
- true VR ride / experience for a group of people, it seats eight.
- Intense. A friend was just over there, and tested out the various
- rides. Not to be outdone the new MGM grand (Largest hotel in the
- world) has a ride called the R360 which is basically a gyroscope they
- trap you into with goggles. We should get a group together and make a
- mass trek over there and check it out. If enough people are
- interested I'll call and see if we can book a time to reserve space
- for a bunch of us. Both are within walking distance.
-
- I'll whip up a list of stuff that's cool to check out in town there so
- if for some reason you leave the awesome conference you can take in
- some unreal sites in the city of true capitalism.
-
- MEDIA:
-
- Some of the places you can look for information from last year
- include:
-
- New Media Magazine, September 1993
- InfoWorld, 7-12-1993 and also 7-19-1993 by Robert X. Cringely
- Gray Areas Magazine, Vol 2, #3 (Fall 1993)
- Unix World, ???
- Phrack #44
-
- COST:
-
- Cost is whatever you pay for a hotel room split however many ways,
- plus $15 if you preregister, or $30 at the door. This gets you a
- nifty 24 bit color name tag (We're gonna make it niftier this year)
- and your foot in the door. There are fast food places all over, and
- there is alcohol all over the place but the trick is to get it during
- a happy hour for maximum cheapness.
-
- ============================================================================
-
- UPDATE:
-
- I wanted to thank whoever sent in the anonymous fax to Wired that was
- printed in issue 1.5 Cool deal!
-
- Dan Farmer posted his paper on unix security on the net, and I've put
- a copy of it on the ftp site if you want to grab it and take a look.
- It's called "zen.txt"
-
- I've received more scanned images from last year, and they will be put
- on the ftp site.
-
- =============================================================================
-
- FOR MORE INFORMATION:
-
- For InterNet users, there is a DEF CON anonymous ftp site at
- cyberspace.com in /pub/defcon. There are digitized pictures,
- digitized speeches and text files with the latest up to date info
- available.
-
- For email users, you can email dtangent@defcon.org for more
- information.
-
- For non-net people call:
-
- The Alliance BBS [612] 251.8596 16.8k speed Dual Standard
- Open Access. 24 Hours. Users get full access on 1st call.
- iirg disto site, Syncro Net, text files galore.
- Sysop: Metal Head (The huge guy from last year)
- A DEF CON directory is maintained here
-
- For Snail Mail send to: DEF CON, 2709 E. Madison Street Suite #102,
- Seattle, WA, 98112
-
- For Voice Mail and maybe a human (me), 0-700-TANGENT on an AT&T phone.
-
- A DEF CON Mailing list is maintained, and the latest announcements are
- mailed automatically to you. If you wish to be added to the list just
- send email to dtangent@defcon.org. We also maintain a chat mailing
- list where people can talk to one another and plan rides, talk,
- whatever. If you request to be on this list your email address will
- be shown to everyone, just so you are aware.
-
- [Note: We need some good list-serv software for BSD, if anyone knows
- where to find some, please e-mail me.]
-
- STUFF TO SPEND YOUR MONEY ON:
-
- > Tapes of last years speakers (four 90 minute tapes) are available
- for $20
-
- > DEF CON I tee-shirts (white, large only) with large color logo on
- the front, and on the back the Fourth Amendment, past and present.
- This is shirt v 1.1 with no type-o's. These are $20, and
- sweatshirts are $25.
-
- > Pre-Register for next year in advance for $15 and save half.
-
- > Make all checks/money orders/etc. out to DEF CON, and mail to the
- address above.
-
- If you have any confidential info to send, use this PGP key to
- encrypt:
-
- -----BEGIN PGP PUBLIC KEY BLOCK-----
- Version: 2.3
-
- mQCrAiyI6OcAAAEE8Mh1YApQOOfCZ8YGQ9BxrRNMbK8rP8xpFCm4W7S6Nqu4Uhpo
- dLfIfb/kEWDyLreM6ers4eEP6odZALTRvFdsoBGeAx0LUrbFhImxqtRsejMufWNf
- uZ9PtGD1yEtxwqh4CxxC8glNA9AFXBpjgAZ7eFvtOREYjYO6TH9sOdZSa8ahW7YQ
- hXatVxhlQqve99fY2J83D5z35rGddDV5azd9AAUTtCZUaGUgRGFyayBUYW5nZW50
- IDxkdGFuZ2VudEBkZWZjb24ub3JnPg==
- =ko7s
- -----END PGP PUBLIC KEY BLOCK-----
-
- The next announcement will have more updated information. I'll hold off
- on naming the speakers unless they commit to attending. It looks to be
- a great line up.
-
- - The Dark Tangent
-
- ------------------------------
-
- Date: Tue, 25 Jan 1994 14:24:54 -0600 (CST)
- From: eab@MSC.EDU(Edward Bertsch)
- Subject: File 3--Re: Cu Digest, #6.09/Lobby the Feds via PC
-
- >Computer reporter/reviewer David Batterson looks forward to the day
- >when most federal, state, county and city officials are online, so we
- >can zap 'em with e-mail. [Will he live so long?] You may contact him
- >via The Internet: dbatterson@mcimail.com, or:
- >david.batterson@f290.n105.z1.fidonet.org.
- > * Evaluation copy of Silver Xpress. Day # 50
- > --- via Silver Xpress V4.00 [NR]
- > --
- >uucp: uunet!m2xenix!puddle!290!David.Batterson
- >Internet: David.Batterson@f290.n105.z1.fidonet.org
-
-
- You don't have to wait for them to be on-line. It is not realistic
- to expect politicians to do this in your or my lifetime.
-
- What you can do is get yourself a FAX modem and some print capture
- software. This is what I use. I put together a document in a
- Windoze word processor, then I say print (to the print capture
- software). A box comes up asking me who to send it to. I have
- the LOCAL phone numbers for my Congress- and Senate- critters,
- as well as Governor, Mayor, City Council, and state house and senate.
-
- I select an individual or multiple recipients, and the message
- is sent to them. If there is a busy number, it goes on to the
- next one on the list, and eventually gets through to all of
- them. My words are read as I wrote them (much different
- than what happens when you leave a verbal message) and are
- dealt with in a timely manner, since so much of their day to day
- business is conducted by FAX these days...
-
- You can get internal data/fax modems for $99 and less these days,
- and externals for little more. (even v.32bis/v.42bis/v.17 14400 data/14400 fax
- modems)
-
- The software to capture "printed" output to fax is usually included.
-
- I would assume similar prices and packages exist for the Macintosh.
-
- ------------------------------
-
- Date: Tue, 25 Jan 1994 10:17:19 +0200 (WET)
- From: anonymous <tk0jut2@mvs.cso.niu.edu>
- Subject: File 4--Re: Clipp[er]ed again (fwd)
-
-
- U.S. CODE AGENCY IS JOSTLING FOR CIVILIAN TURF
- New York Times, Monday, January 24, 1994
- By John Markoff
-
- The National Security agency is trying to establish a standard tor
- electronically scrambling computer communications, a move that would
- go far beyond the agency's usual military and intelligence domain to
- include civilian activities like electronic tax returns and
- computerized medical payments.
-
- The plan by the N.S.A., which may be announced as early as today,
- worries business executives, who fear a Government encroachment on
- privacy. And some officials in the Clinton Administration believe that
- the N.S.A. is overstepping its bounds.
-
- The N.S.A. is the Federal agency responsible for electronic
- surveillance of global communications, though usually not civilian
- communications, within the United States.
-
- ((The article explains in a few paragraphs how the
- government prefers a government and civilian standard
- approach to scrambling in order to crack codes authorized by
- court-approved wiretaps))
-
- Bidding Process
-
- The agency will seek bids from companies to produce circuit cards
- based on its technology, which would b used to scramble electronic
- messages for Government agencies and, eventually, private companies.
- Agency employees confirmed the plan late Friday, though no agency
- officials could be reached over the weekend for further details.
-
- ((A few paragraphs deleted))
-
- Many computer industry executives oppose the National Security
- Agency's effort, saying there is no way for industry experts and
- outsiders to determine the reliability and security of the underlying
- scrambling technology, which the agency intends to keep secret.
-
- Privacy-rights advocates, meanwhile, are wary of the system because
- of the electronic "back door" it contains, permitting Government
- eavesdropping. And some other Administration officials say the agency
- is going too far by pushing the standard into civilian computing
-
- "What these guys are trying to do is run ahead of the blocking," an
- Administration official who spoke on the condition of anonymity said.
- "Trying to sell this as the wave of the future is premature as
- Administration policy.
-
- The circuit card, which is designed to fit into a personal computer
- and which the agency calls Tessera, is based on technology similar to
- a device known as the Clipper Chip, a telephone voice-scrambling chip
- that provides a back-door means for letting law-enforcement officials
- eavesdrop.
-
- ((The article explains that the Clipper plan was developed by
- the NSA, NIST, and CDA, and has been strongly opposed by
- professionals and public policy groups))
-
- In a letter to be sent to President Clinton today, which was
- released on Friday to The New York Times, a group of 38 of the
- nation's leading computer scientists, computer-security specialists
- and privacy experts have urged that the Clipper program be stopped.
-
- "The current proposal was developed in secret by Federal agencies
- primarily concerned about electronic surveillance, not privacy
- protection," the letter states. "Critical aspects of the plan remain
- classified and thus beyond public review."
-
- ((The article notes that lots of influential crypto-pioneers
- signed the letter))
-
- Moreover, the Government could insure widespread use of the Clipper
- and Tessera technologies by insisting that they be used by businesses
- and individuals when communicating electronically with Federal
- agencies.
-
- Official Reasoning
-
- Law-enforcement officials say the technologies are intended to
- resolve a longstanding problem of the information age: how to preserve
- the right of businesses and citizens to use codes to protect all sorts
- of digital communications without letting criminals and terrorists
- conspire beyond the law's reach. Businesses and individuals who often
- communicate over computer networks already make use of a variety of
- scrambling systems-either of their own devising or those commercially
- available.
-
- Many of these scrambling systems are unbreakable by anyone who does
- not hold the electronic keys to the code, something generally known
- only by the sender and the recipient of scrambled messages.
-
- That is a problem for the National Security Agency, which routinely
- listens to many of the world's telephone and computer conversations -
- although it has no jurisdiction for monitoring non-Government
- conversations within the United States. The N.S.A.'s Tessera and
- Clipper systems would have an independent agency hold master keys to
- the codes, which could be obtained with a court's permission for
- surveillance by law-enforcement officials.
-
- ((For a few paragraphs, the article notes that the agency
- intends to purchase between 10,000-70,000Tessera cards and
- notes that the card can be used for civilian functions such
- as e-mail and cable tv scrambling))
-
-
- The National Security Agency's new standard-setting effort is being
- introduced a couple of weeks before the Clinton Administration
- completes a classified review of the Clipper proposal, and several
- industry executives said the announcement had been timed to apply
- pressure to the Administration's decision making.
-
- The proposal angers industry executives who believe that the agency
- is rushing to establish a de facto standard that will undercut efforts
- to adopt a competing commercial standard without a built-in back door.
- That standard, being developed by RSA Data Security, a Redwood City,
-
- ((A bunch of background information paragraphs deleted))
-
- Secret Formula
-
- These companies are particularly troubled by the National Security
- Agency's refusal to disclose the mathematical formula, or algorithm,
- on which-its scrambling technology is based.
-
- "The issue here is: Should a secret algorithm developed by the
- intelligence community be used for unclassified civilian uses?" said
- Stephen Walker, a computer security industry executive and a member of
- the Government's Computer System Security and Privacy Advisory Board.
- l think the answer is it should not.
-
- ((A bunch more deleted summarizing some of the conflict the
- agency has experienced regarding the surveillance issue.
- Marc Rotenberg of CPSR is quoted as saying that the
- proposals are going in the wrong direction))
-
-
- "These guys are fighting for job security," said William Ferguson,
- vice president of Semaphore Inc., a , Santa Clara, Calif., computer
- network security firm. "Now that the K.G.B. has gone commercial, the
- N.S.A. is trying to start its own initiatives that say, 'all we're
- trying to do i is keep up with the K.G.B.' "
-
- White House officials said the agency's actions would not
- necessarily force the Administration to authorize, an unpopular coding
- technology. One official said the Administration policy review was
- likely to establish a permanent working group that, would limit the
- National Security, Agency's role in policy making.
-
- ((The article concludes by explaining that the NSA intended to
- announce its RFPs last week, but was delayed by a snow storm))
-
- ------------------------------
-
- Date: Sat, 22 Jan 1994 17:11:30 -0800
- From: Jim Warren <jwarren@WELL.SF.CA.US>
- Subject: File 5--GOV-ACCESS--Cal Leg online; Minn PubInfo Net; Cal Emg Serv
-
- Jan. 22, 1994
-
- On Friday, Jan. 21, 1994, the California Legislature began offering
- global online access to almost-all public information about
- legislation-in-process, all current state statutes, and the voluminous
- California Constitution.
-
- The state is prohibited from charging *anything* for access toor
- re-use of this electronic information.
-
- Access is by Internet ftp and ftpmail ["ftp" = file transfer
- protocol]. Note: ftpmail allows anyone with access to the Internet
- at least for email purposes to access these files (that are often
- large). ftpmail provides access for users of FidoNet, CompuServe,
- GEnie, Prodigy, etc., as well as offering Internet users an option to
- direct ftp .
-
- README and help files provide complete details.
-
-
- FOR A GOOD TIME, CALL ...
- To receive the help file, send the following email:
- To: ftpmail@leginfo.public.ca.gov
- subject: <optional, the system ignores the subject-line>
- Message lines: connect leginfo.public.ca.gov
- help
- quit
-
- To receive the two README files, send the following email:
- To: ftpmail@leginfo.public.ca.gov
- subject: <optional, the system ignores the subject-line>
- Message lines: connect leginfo.public.ca.gov
- get README_WELCOME
- cd pub
- get README_FIRST
- quit
-
- And await details of how you may finally participate in the process of
- your own governance.
- According to the National Conference of State Legislatures,
- California is the first state in the nation to offer almost all of its
- public legislative, statutory and constitutional information via the
- Internet, *especially* without charge by the state.
-
- ================================================================
-
- Subject--Cal.Emergency Svcs.online + Net-fax + MINN Pub Info Net
-
-
- Jan. 22, 1994
-
- CALIFORNIA OFFICE OF EMERGENCY SERVICES INFO AVAILABLE ONLINE
- <a recent exchange of messages>
- The state Emergency Digital Information Service is working fine
-
- Telnet to telnet oes1.oes.ca.gov 5501
- =====
- Is the OES system open/intended to permit public use?
- --jim
- =====
- It seems to be. No login at all is required. You telnet to that port
- and get a menu listing the last 20 or so press releases.
-
-
-
- SACRAMENTO INTERNET LOCALS: HOW 'BOUT LEGI-FAX ?
- <from a gov-access list-member>
- Are you familiar with the internet fax gateway service? You can send to an
- internet address and IF that telephone exchange is covered by a fax server,
- your mail will be delivered via fax. If it is not covered you get a bounce.
- For more details send mail to:
- tpc-faq@town.hall.org
-
- A very cool service! Maybe someone in Sacramento would like to put up a
- gateway that would transmit faxes to the legislators? :-)
-
- <Also, how about local faxes to Washingtoontown? And, of course, anyone can
- use this from and to anywhere. -JW>
-
-
-
- MINNESOTA DRAFT ONLINE-ACCESS PROPOSAL <source pointer>
- Date: Thursday, 20 January 1994 3:15pm CT
- To: net-people@nic.state.mn.us, metronet@vm1.nodak.edu, libnet@mr.net,
- net-people@mail.unet.umn.edu, tc-all@mail.unet.umn.edu, ednet@mr.net,
- mcowork@vm1.nodak.edu, STEVEN.CLIFT
- From: STEVEN.CLIFT@MNEMC2
- Subject--Draft Legislative Proposal - Minn Public Info Network
-
- This is a DRAFT proposal from the Electronic Access to Public Information
- Task Force of the Information Policy Office, Minnesota Department of
- Administration. This is probably the first time a draft proposal of this
- nature has been released electronically within government and to the public.
-
- Please send us your comments and suggestions by February 4, 1994 as indicated
- in the text of this document. As of January 20, this proposal has been
- presented to the full Electronic Access Task Force and the Information
- Policy Council. They are just beginning to review this proposal. The
- one thing that is guaranteed is that this proposal will change as it
- moves toward and through the legislature process. This draft proposal
- is more of a concept paper and much of this proposed activity does not
- require legislative action, but the overall concept and funding will
- need legislative support.
-
- While I have been researching and developing this proposal since early fall,
- (I have been on the Internet for two years and run a public policy (PUBPOL-L)
- electronic mail list at the Humphrey Institute of Public Affairs)
- the timing of its release is very good. It should be of interest to a
- number of people and gain some public attention. On a lighter note, I think
- government interest was illustrated by the good turnout we had at our
- Task Force meeting on January 18 when it was about -20F. I have a new
- theory about why Minnesota is known for having innovative government programs:
- we spend our cold winters thinking up good ideas for public services because
- there is little to distract us. If this is a relative theory inversely
- related to how cold it is, the Minnesota Public Information Network should
- be a great proposal. However, we need you feedback to ensure that it is
- developed with broad government and public support.
-
- Electronic Access to Public Information Task Force
- c/o Steven Clift
- Information Policy Office
- Minnesota Department of Administration
- 320 Centennial Office Building
- St. Paul, MN 55155 Telephone: (612)297-5561 Fax:(612)296-5800
- Electronic Mail: steven.clift@state.mn.us
- =====
- Send a request to Steven Clift if you wish the full document.
-
- ------------------------------
-
- Date: Wed, 26 Jan 1994 21:23:20 CST
- From: CuD Moderators <cudigest@mindvox.phantom.com>
- Subject: File 6--What It Takes To Make It Happen: Key Issues For NII
-
- ((MODERATORS' NOTE: The full text of the following paper summary can
- be obtained from the CuD ftp archives (see CuD header for addresses))
-
- What It Takes To Make It Happen: Key Issues For
- Applications Of The National Information Infrastructure
-
- Committee on Applications and Technology
- Information Infrastructure Task Force
-
- January 25, 1994
-
- This paper is intended for public comment and discussion. Your
- comments can be sent to any of the following addresses:
-
- Post: Committee on Applications and Technology
- National Institute of Standards and Technology
- Building 101, Room A1000
- Gaithersburg, MD 20899
- Phone: (301) 975-2667
- FAX: (301) 216-0529
- E-Mail: cat_exec@nist.gov
-
- THE COMMITTEE ON APPLICATIONS AND TECHNOLOGY
-
- This issue paper was prepared by the Committee on Applications and
- Technology of the Information Infrastructure Task Force (IITF) in
- support of the President's action plan for developing, in partnership
- with the private sector, an advanced information infrastructure for
- our country -- the National Information Infrastructure. The Committee
- is charged with coordinating Administration efforts:
-
- to develop, demonstrate, and promote applications of
- information technology in manufacturing, electronic
- commerce, education, health care, government services,
- libraries, and other areas, and to develop and recommend
- technology strategy and policy to accelerate the
- implementation of the NII..
-
- The Committee works with the Subcommittee on High-Performance
- Computing and Communications and Information Technology, which was
- established as part of the Federal Coordinating Council for Science,
- Engineering and Technology to coordinate the development of new
- information technologies. The Committee on Applications and Technology
- also is responsible for implementing many of the recommendations of
- the Vice President's National Performance Review that pertain to
- information technology.
-
- ((ACKNOWLEDGEMENTS DELETED))
-
- ABSTRACT
-
- This paper highlights important issues that need to be addressed in
- the development, demonstration, and promotion of applications for the
- National Information Infrastructure (NII). The paper is intended for
- three important audiences: the public, the committees and working
- groups of the Information Infrastructure Task Force (IITF), and other
- agencies and departments in our government. The goal is to identify
- and describe the issues so they can be considered and discussed by
- these audiences, leading to their eventual resolution. Some of these
- issues, such as privacy, intellectual property rights, information
- security and the scalability of projects are already being addressed
- by the committees and working groups of the IITF. Others, such as user
- acceptance and organizational learning, still need to be addressed by
- the IITF in order to allow the private/government partnership to
- evolve and to work together to build and shape the National
- Information Infrastructure.
-
- KEY ISSUES FOR NII APPLICATIONS
-
- The publication of the Agenda for Action on the National Information
- Infrastructure (NII)1 in September 1993 greatly heightened the level
- of public debate on information technology and social change.
-
- That and other white papers, studies, and commentaries dramatically
- sketched a vision of the near future, in which a web of advanced
- communications networks and computers would bring vast amounts of
- information and greatly improved services to the homes of virtually
- every citizen - if we as a nation properly manage the technology.
-
- With this paper, the Committee on Applications and Technology of the
- President's Information Infrastructure Task Force proposes a basic set
- of critical issues which our nation will face as the NII evolves. Our
- perspective in selecting these issues is that of applications that
- will use the NII. The reasons for taking this perspective - indeed,
- for creating this Committee - are grounded in the unique role the
- Federal government plays in the development of the NII. The National
- Information Infrastructure is not a cliff which suddenly confronts us,
- but rather a slope - and one society has been climbing since postal
- services and semaphore networks were established. An information
- infrastructure has been with us for a long time, continuously evolving
- with each new advance in communications technology. Why the sudden
- debate? Change is coming much faster, and more thoroughly, than ever
- before. In our lifetimes we will see information technology bring more
- changes to more aspects of our daily lives than have been witnessed in
- the preceding century. Digital technology is merging the functions of
- television sets, telephones, and computers. Fundamental changes are
- in store for us in the ways we work, learn, shop, communicate,
- entertain ourselves, and get health care and public services. And
- those are just the applications we can foresee.
-
- Private industry will be responsible for virtually every major facet
- of the NII and the information marketplace it creates. Private
- industry will build and manage the networks, provide the information
- tools and much of the information that travels the networks, and
- develop the many of the applications that use the networks.
- But government remains a major participant in the NII. One
- reason is obvious - government policies are a major force in the
- information infrastructure. One of the principal goals of the
- Information Infrastructure Task Force is to develop and foster
- informed government policy that promotes our societal goals for
- the NII without unnecessarily hampering industry.
- As Vice President Gore has observed, "Our goal is not to
- design the [information] market of the future. It is to provide
- the principles that shape that market. And it is to provide the
- rules governing this difficult transition to an open market for
- information. We are committed in that transition to protecting
- the availability, affordability and diversity of information and
- information technology as market forces replace regulations and
- judicial models that are simply no longer appropriate."2
- Less obvious, however, is the fact that government plays a
- major role in the development of NII applications:
-
- As one of the nation's biggest users of information
- technology, the government develops NII applications to speed and
- improve the delivery of its services. Examples include making
-
- ((600 LINES OF TEXT DELETED))
-
- NEXT STEPS AND FOLLOW THROUGH
-
- For the IITF to follow through on the remainder of the issues
- identified in this paper requires at least two steps. First, the IITF
- committees and interested individuals and groups from the private
- sector should review this paper and the issues we have presented to
- broaden our understanding and perspective. We welcome comments.
-
- Next, the IITF should review the issues reported here, the framework
- for assessing the issues, and the comments from the private sector and
- the other committees to decide if its organization is adequately
- structured to address the key issues. For example, if the
- categorization of issues outlined here - according to the components
- of the infrastructure: people, information, processes (software,
- especially applications), hardware and networks - is useful, we should
- consider whether our current IITF structure covering information,
- telecommunications, and applications and technology adequately
- addresses people and hardware.
-
- Some steps are already being taken in this direction. A working group
- of the Committee on Applications and Technology has been formed to
- address technology policy issues, and the Committee has instituted a
- public issues discussion program as part of its regular meetings to
- facilitate a dialog on the issues outlined in this paper.
-
- In closing, we would like to repeat and emphasize the point made
- earlier. In presenting this issues paper, the Committee on
- Applications and Technology intends only to describe an initial
- catalog of critical issues that must be addressed and resolved in the
- development of the NII. We see this is a starting point for
- discussion, and not a document to close off discussion of other
- issues.
-
- Your comments on this paper can be sent to any of the following
- addresses:
-
- Post: Committee on Applications and Technology
- National Institute of Standards and Technology
- Building 101, Room A1000
- Gaithersburg, MD 20899
- Phone: (301) 975-2667
- FAX: (301) 216-0529
- E-Mail: cat_exec@nist.gov
-
- ------------------------------
-
-
- ------------------------------
-
- End of Computer Underground Digest #6.10
- ************************************
-
-
-