home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Sun Mar 13, 1994 Volume 6 : Issue 24
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Archivist: Brendan Kehoe (He's Baaaack)
- Acting Archivist: Stanton McCandlish
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Copita Editor: Sheri O'Nothera
-
- CONTENTS, #6.24 (Mar 13, 1994)
- File 1--Clipping the Wings of Freedom (Reprint, by J.P. Barlow)
- File 2--Leahy to hold hearings on Clipper Chip!
- File 3--Survey: communication ethics on the net
- File 4--Starring Tom Cruise as Kevin Poulsen?
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send a one-line message: SUB CUDIGEST your name
- Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
- In ITALY: Bits against the Empire BBS: +39-461-980493
-
- FTP: UNITED STATES: etext.archive.umich.edu (141.211.164.18) in /pub/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
- nic.funet.fi
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: Sun, 13 Mar 1994 11:30:17 -0500
- From: John Perry Barlow <barlow@EFF.ORG>
- Subject: File 1--Clipping the Wings of Freedom (Reprint, by J.P. Barlow)
-
- Clipping the Wings of Freedom page 1
-
- Jackboots on the Infobahn
- by John Perry Barlow
- <barlow@eff.org>
-
- [Note: I wish to reserve to Wired Magazine first paper publication of
- the following piece. However, given the fairly immediate nature of
- this issue, I am net-casting it now. Feel free to pass it on
- electronically as you see fit, but please do not turn it into any sort
- of hard copy until Wired has done so. I also encourage you to buy the
- April issue of Wired in which it will appear.]
-
-
- On January 11, I managed to schmooze myself aboard Air Force 2. It was
- flying out of LA, where its principal passenger had just outlined his
- vision of the Information Superhighway to a suited mob of television,
- show biz, and cable types who fervently hoped to own it one day...if
- they could ever figure out what the hell it was.
-
- >From the standpoint of the Electronic Frontier Foundation, the speech
- had been wildly encouraging. The Vice President's announced program
- incorporated many of the concepts of open competition, universal
- access, and deregulated common carriage which we'd been pushing for
- the previous year.
-
- But he had said nothing about future of privacy, except to cite among
- the bounties of the NII its ability to "help law enforcement agencies
- thwart criminals and terrorists who might use advanced
- telecommunications to commit crimes."
-
- On the plane I asked him what this had meant regarding Administration
- policy on cryptography. He became non-committal as a cigar store
- indian. "We'll be making some announcements... I can't tell you
- anything more." He hurried back to the front of the plane, leaving me
- to troubled speculation.
-
-
- Despite its fundamental role in assuring privacy, transaction
- security, and reliable identity within the NII, the Clinton/Gore
- Administration policies regarding cryptography have not demonstrated
- an enlightenment to match the rest of their digital visions.
-
- The Clipper Chip...which bodes to be either the goofiest waste of
- federal dollars since Gerald Ford's great Swine Flu program or, if
- actually deployed, a surveillance technology of profound
- malignancy...seemed at first an ugly legacy of Reagan/Bush. "This is
- going to be our Bay of Pigs," one White House official told me at the
- time Clipper was introduced, referring to the distastrous Cuban
- invasion plan Kennedy inherited from Eisenhower.
-
- (Clipper, in case you're just tuning in, is an encryption chip which
- the NSA and FBI hope will someday be in every phone and computer in
- America. It scrambles your communications, making them unintelligible
- to all but their intended recipient. All, that is, but the government,
- which would hold the "key" to your chip. The key would separated into
- two pieces, held in escrow, and joined with the appropriate "legal
- authority.")
-
- Of course, trusting the government with your privacy is trusting a
- peeping tom to install your window blinds. And, since the folks I've
- met in this White House seem extremely smart, conscious, and
- freedom-loving...hell, a lot of them are Deadheads...I was sure that
- after they felt fully moved in, they'd face down the NSA and FBI, let
- Clipper die a natural death, and lower the export embargo on reliable
- encryption products.
-
- Furthermore, NIST and the National Security Council have been studying
- both Clipper and export embargoes since April. Given that the volumes
- of expert testimony they collected opposed them both almost
- unanimously , I expected the final report to give the Administration
- all the support it needed to do the right thing.
-
- I was wrong about this. Instead, there would be no report. Apparently,
- they couldn't draft one which supported, on the evidence, what they
- had decided to do instead.
-
-
- THE OTHER SHOE DROPS
-
- On Friday, February 4, the other jack-boot dropped. A series of
- announcements from the Administration made it clear that cryptography
- would become their very own "Bosnia of telecommunications" (as one
- staffer put it). It wasn't just that the old Serbs in the NSA and the
- FBI were still making the calls. The alarming new reality was that the
- invertebrates in the White House were only too happy to abide by them.
- Anything to avoid appearing soft on drugs or terrorism.
-
- So, rather than ditching Clipper, they declared it a Federal Data
- Processing Standard, backing that up with an immediate government
- order for 50,000 Clipper devices. They appointed NIST and the
- Department of Treasury as the "trusted" third parties that would hold
- the Clipper key pairs. (Treasury, by the way, is also home to such
- trustworthy agencies as the Secret Service and the Bureau of Alcohol,
- Tobacco, and Firearms.)
-
- They re-affirmed the export embargo on robust encryption products,
- admitting for the first time that its purpose was to stifle
- competition to Clipper. And they outlined a very porous set of
- requirements under which the cops might get the keys to your chip.
- (They would not go into the procedure by which the NSA would get them,
- though they assured us it was sufficient.)
-
- They even signaled the impending return of the dread Digital
- Telephony, an FBI legislative initiative which would require
- fundamentally re-engineering the information infrastructure to make
- provision of wiretapping ability the paramount design priority.
-
-
- INVASION OF THE BODY SNATCHERS
-
- Actually, by the time the announcements thudded down, I wan't
- surprised by them. I had spent several days the previous week in and
- around the White House.
-
- I felt like I was in another re-make of The Invasion of the Body
- Snatchers. My friends in the Administration had been transformed.
- They'd been subsumed by the vast mind-field on the other side of the
- security clearance membrane, where dwell the monstrous bureaucratic
- organisms which feed themselves on fear. They'd adopted the
- institutionally paranoid National Security Weltanschauung.
-
- They used all the tell-tale phrases. Mike Nelson, the White House
- point man on NII, told me, "If only I could tell you what I know,
- you'd feel the same way I do." I told him I'd been inoculated against
- that argument during Vietnam. (And it does seem to me that if you're
- going to initiate a process which might end freedom in America, you
- probably need an argument that isn't classified.)
-
- Besides, how does he know what he knows? Where does he get his
- information? Why the NSA, of course. Which, given its strong interest
- in the outcome, seems hardly an unimpeachable source.
-
- However they reached it, Clinton and Gore have an astonishingly simple
- bottom line, against which even the future of American liberty and
- prosperity is secondary: They believe that it is their responsibility
- to eliminate, by whatever means, the possibility that some terrorist
- might get a nuke and use it on, say, the World Trade Center. They have
- been convinced that such plots are more likely to ripen to their
- hideous fruition behind a shield of encryption.
-
- The staffers I talked to were unmoved by the argument that anyone
- smart enough to steal and detonate a nuclear device is probably smart
- enough to use PGP or some other uncompromised crypto standard. And
- never mind that the last people who popped a hooter in the World Trade
- Center were able to put it there without using any cryptography and
- while under FBI surveillance.
-
- We are dealing with religion here. Though only 10 American lives were
- lost to terrorism in the last two years, the primacy of this threat
- has become as much an article of faith with these guys as the Catholic
- conviction that
- human life begins at conception or the Mormon belief that the Lost
- Tribe of Israel crossed the Atlantic in submarines.
-
- In the spirit of openness and compromise, they invited EFF to submit
- other solutions to the "problem" of the nuclear-enabled terrorist
- besides key escrow devices, but they would not admit into discussion
- the argument that such a threat might, in fact, be some kind of
- phantasm created by the spooks to ensure their lavish budgets into the
- Post-Cold War era.
-
- As to the possibility that good old-fashioned investigative techniques
- might be more valuable in preventing their show-case catastrophe (as
- it was after the fact in finding the alleged perpetrators of the last
- attack on the World Trade Center),they just hunkered down and said
- that when wire-taps were necessary, they were damned well necessary.
-
- When I asked about the business that American companies lose to their
- inability to export good encryption products, one staffer essentially
- dismissed the market, saying that total world trade in crypto goods
- was still less than a billion dollars. (Well, right. Thanks more to
- the diligent efforts of the NSA than lack of sales potential.)
-
- I suggested that a more immediate and costly real-world effect of
- their policies would be reducing national security by isolating
- American commerce, owing to a lack of international confidence in the
- security of our data lines. I said that Bruce Sterling's fictional
- data-enclaves in places like the Turks and Caicos Islands were
- starting to look real world inevitable.
-
- They had a couple of answers to this, one unsatisfying and the other
- scary. Their first answer was that the international banking
- community could just go on using DES, which still seemed robust enough
- to them. [DES is the old federal Data Encryption Standard, thought by
- most cryptologists to be nearing the end of its credibility.]
-
- More troubling was their willingness to counter the data-enclave
- future with one in which no data channels anywhere would be secure
- from examination by some government or another. They pointed to
- unnamed other countries which were developing their own mandatory
- standards and restrictions regarding cryptography and have said to me
- on several occasions words to the effect that, "Hey, it's not like you
- can't outlaw the stuff. Look at France."
-
- Of course, they have also said repeatedly...and for now I believe
- them...that they have absolutely no plans to outlaw non-Clipper crypto
- in the U.S. But that doesn't mean that such plans couldn't develop in
- the presence of some pending "emergency." Then there is that White
- House briefing document, issued at the time Clipper was first
- announced, which asserts that no U.S. citizen "as a matter of right,
- is entitled to an unbreakable commercial encryption product."
-
- Now why, if it's an ability they have no intention of contesting, do
- they feel compelled to declare that it's not a right? Could it be that
- they are preparing us for the laws they'll pass after some bearded
- fanatic has gotten himself a surplus nuke and used something besides
- Clipper to conceal his plans for it?
-
- If they are thinking about such an eventuality, we should be doing so
- as well. How will we respond? I believe there is a strong, though
- currently untested, argument that outlawing unregulated crypto would
- violate the First Amendment, which surely protects the manner of our
- speech as clearly as it protects the content.
-
- But of course the First Amendment is, like the rest of the
- Constitution, only as good as the government's willingness of the to
- uphold it. And they are, as I say, in a mood to protect our safety
- over our liberty.
-
- This is not a mind-frame against which any argument is going to be
- very effective. And it appeared that they had already heard and
- rejected every argument I could possibly offer.
-
- In fact, when I drew what I thought was an original comparison between
- their stand against naturally proliferating crypto and the folly of
- King Canute (who placed his throne on the beach and commanded the tide
- to leave him dry), my opposition looked pained and said he had heard
- that one almost as often as jokes about road-kill on the Information
- Superhighway.
-
- I hate to go to war with them. War is always nastier among friends.
- Furthermore, unless they've decided to let the NSA design the rest of
- the National Information Infrastructure as well, we need to go on
- working closely with them on the whole range of issues like access,
- competition, workplace privacy, common carriage, intellectual
- property, and such. Besides, the proliferation of strong crypto will
- probably happen eventually no matter what they do.
-
- But then again, it might not. In which case we could shortly find
- ourselves under a government that would have the automated ability to
- log the time, origin and recipient of everycall we made, could track
- our physical whereabouts continuously, could keep better account of
- our financial transactions than we do, and all without a warrant. Talk
- about crime prevention!
-
- Worse, under some vaguely defined and surely mutable "legal
- authority," they also would be able to listen to our calls and read
- our e-mail without having to do any backyard rewiring. (And wouldn't
- even need that to monitor our overseas calls.)
-
- If there's going to be a fight, I'd far rather it be with this
- government than the one we'd likely face on that hard day.
-
- Hey, I've never been a paranoid before. It's always seemed to me that
- most governments are too incompetent to keep a good plot strung
- together all the way from coffee break to quitting time. But I am now
- very nervous about the government of the United States of America.
-
- Because Bill 'n' Al, whatever their other new paradigm virtues, have
- allowed the very old paradigm trogs of the Guardian Class to the
- define as their highest duty the defense of America against an enemy
- that exists primarily in the imagination and is therefore capable of
- anything.
-
- To assure absolute safety against such an enemy, there is no limit to
- the liberties we will eventually be asked to sacrifice. And, with a
- Clipper chip in every phone, there will certainly be no technical
- limit on their ability to enforce those sacrifices.
-
-
- WHAT YOU CAN DO
-
- GET CONGRESS TO LIFT THE CRYPTO EMBARGO
-
- The Administration is trying to impose Clipper on us by manipulating
- market forces. Purchasing massive numbers of Clipper devices, they
- intend to produce an economy of scale which will make them cheap while
- their export embargo renders all competition either expensive or
- non-existent.
-
- We have to use the market to fight back. While it's unlikely that
- they'll back down on Clipper deployment, the Electronic Frontier
- Foundation believes that with sufficient public involvement, we can
- get Congress to eliminate the export embargo.
-
- Rep. Maria Cantwell (D-WA) has a bill (H.R. 3627) before the Economic
- Policy, Trade, and Environment Science Subcommittee of the House
- Foreign Affairs Committee which would do exactly that. She will need a
- lot of help from the public. They may not care much about your privacy
- in DC, but they still care about your vote.
-
- Please signal your support of H.R. 3627, either by writing her
- directly or e-mailing her at cantwell@eff.org. Messages sent to that
- address will be printed out and delivered to her office. In the
- Subject header of your message, please include the words "support HR
- 3627." In the body of your message, express your reasons for
- supporting the bill. You may also express your sentiments to Rep. Lee
- Hamilton, the Foreign Relations Committee chairman, by e-mailing
- hamilton@eff.org.
-
- Furthermore, since there is nothing quite as powerful as a letter from
- a constituent, you should check the following list of subcommittee and
- committee members to see if your congressperson is among them. If so,
- please copy them your letter to Ms. Cantwell.
-
- Economic Policy, Trade, and Environment Science Subcommittee:
- Democrats: Sam Gejdenson (Chairman), James Oberstar, Cynthia McKinney,
- Maria Cantwell, Eric Fingerhut, Albert R. Wynn, Harry Johnston, Eliot
- Engel, Charles Schumer. Republicans: Toby Roth (ranking), Donald
- Manzullo, Doug Bereuter, Jan Meyers, Cass Ballenger, Dana Rohrabacher.
-
- Foreign Affairs Committee:
- Democrats: Lee Hamilton (Chairman), Tom Lantos, Robert Torricelli,
- Howard Berman, Gary Ackerman, Eni Faleomavaega, Matthew Martinez,
- Robert Borski, Donal Payne, Robert Andrews, Robert Menendez, Sherrod
- Brown, Alcee Hastings, Peter Deutsch, Don Edwards, Frank McCloskey,
- Thomas Sawyer, Luis Gutierrez. Republicans: Benjamin Gilman (ranking),
- William Goodling, Jim Leach, Olympia Snowe, Henry Hyde, Christopher
- Smith, Dan Burton, Elton Gallegly, Ileana Ros-Lehtinen, David Levy,
- Lincoln Diaz-Balart, Ed Royce.
-
-
- BOYCOTT CLIPPER DEVICES AND THE COMPANIES WHICH MAKE THEM.
-
- Don't buy anything with a Clipper chip in it. Don't buy any product
- from a company which manufactures devices with "Big Brother Inside."
- It is likely that the government will ask you to use Clipper for
- communications with the IRS or when doing business with Federal
- agencies. They cannot, as yet, require you to do so. Just say no.
-
-
- LEARN ABOUT ENCRYPTION AND EXPLAIN THE ISSUES TO YOUR UNWIRED FRIENDS
-
- The administration is banking on the likelihood that this stuff too
- technically obscure to agitate anyone but nerds like us. You prove
- them wrong by patiently explaining what's going on to all the people
- you know who have never touched a computer and glaze over at the
- mention of words like "cryptography."
-
- Maybe you glaze over yourself. Don't. It's not that hard. For some
- hands-on experience, download a copy of PGP, a shareware encryption
- engine which uses the robust RSA encryption algorithm. and learn to
- use it.
-
-
- GET YOUR COMPANY TO THINK ABOUT EMBEDDING REAL CRYPTOGRAPHY IN ITS
- PRODUCTS
-
- If you work for a company which makes software, computer hardware, or
- any kind of communications device, work from within to get them to
- incorporate RSA or some other strong encryption scheme into their
- products. If they say that they are afraid to violate the export
- embargo, ask them to consider manufacturing such products overseas and
- importing them back into the United States. There appears to be no law
- against that. As yet.
-
- You might also lobby your company to join the Digital Privacy and
- Security Working Group, a coalition of companies and public interest
- groups that includes IBM, Apple, Sun, Microsoft (and, interestingly,
- Clipper phone manufacturer AT&T) that is working to get the embargo
- lifted.
-
-
- JOIN EFF, CPSR, OR BOTH
-
- Self-serving as it sounds coming from me, I think you can do a lot to
- help by becoming a member of one of these organizations. In addition
- to giving you access to the latest information on this subject, every
- additional member strengthens our credibility with Congress.
-
- Join the Electronic Frontier Foundation by writing membership@eff.org.
- Join Computer Professionals for Social Responsibility by writing
- [provide e-mail address here.]
-
- In his LA speech, Gore called the development of the NII "a
- revolution." And it is a revolutionary war we are engaged in here.
- Clipper is a last ditch attempt by the United States, the last great
- power from the Industrial Era, to establish imperial control over
- Cyberspace. If they win, the most liberating development in the
- history of humankind could become, instead, the surveillance system
- which will monitor our grandchildren's morality. We can be better
- ancestors than that.
-
-
- John Perry Barlow is co-founder and Vice-Chairman of the Electronic
- Frontier Foundation, a group which defends liberty, both in Cyberspace
- and the Physical World. He has three daughters.
-
- ------------------------------
-
- Date: Mon, 7 Mar 1994 21:12:57 -0500 (EST)
- From: Stanton McCandlish <mech@EFF.ORG>
- Subject: File 2--Leahy to hold hearings on Clipper Chip!
-
- Dear Friends on the Electronic Frontier:
-
- I have some good news to share with you. Senator Leahy just sent me a
- letter indicating that he *will* be scheduling hearings on the
- Administration's Clipper Chip proposal. I would like to thank all of
- you who sent us messages to forward to him urging hearings. I'm sure
- that stack of messages we printed out made a significant impact on the
- Senator -- the stack was over seven inches tall! (We look forward to
- the day when no trees will have to be sacrificed in the furtherance of
- democracy!)
-
- And if you haven't written a message to Rep. Cantwell yet about her
- proposed amendment to the Export Control Act, please do so and forward
- it to cantwell@eff.org. This is an address we set up to enable us to
- collect messages in support of her bill. We have been printing out
- messages and delivering them each week -- so far we've received over
- 4500 letters of support. For more information on the Cantwell bill,
- send a message to cantwell-info@eff.org.
-
- Thanks again. We'll let you know as soon as the Clipper hearing gets
- scheduled.
-
- Sincerely,
-
- Jerry Berman
- EFF Executive Director
-
- -.-.-.-.-.-.-. forward from Sen. Leahy -.-.-.-.-.-.-.-.-.-.
-
-
- United States Senate
- Committee on the Judiciary
- Washington, DC 20510
-
- March 1, 1994
-
- Mr. Jerry Berman
- Executive Director
- Electronic Frontier Foundation
- 1001 G Street, Suite 950 East
- Washington, DC 20001
-
- Dear Jerry,
-
- Thank you for forwarding to me the many thoughtful and informative messages
- you received over the Internet regarding the Administration's recent
- approval of an escrowed encryption standard, known as the Clipper Chip.
-
- Many of the messages urge Congress to hold hearings to review the
- Administration's Clipper Chip standard. In fact, I intend to hold a
- hearing before the Judiciary Subcommittee on Technology and the Law, which
- I chair, to consider the important issues raised by the Clipper Chip. I
- will let you know when a date for the hearing is scheduled.
-
- Thank you again.
-
- Sincerely,
-
- /s/ PATRICK J. LEAHY
- United States Senator
-
- PJL/jud
- -.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.
-
- JOIN EFF!!
- ==========
-
- EFF's work as a civil liberties organization in Washington has been very
- successful, but the realization of our goals of freedom and privacy online
- can only come with the active and vocal participation of the entire online
- community. Now that you have personally experienced both the threat of the
- loss of your privacy and the power having won the first battle, won't you
- take that next step and become a member of EFF?
-
- By joining EFF, you will help us to expand our reach to educate and involve
- an even greater number of people in the shaping of these critical issues.
- Your tax-deductible donation will tie you into the EFF information network
- and support our public policy and legal work. As a member, you will be
- guaranteed timely the timely information and mechanism you need to respond
- on these issues. Our voices in unity *do* make a difference.
-
- -------- 8< ------- cut here ------- 8< --------
-
-
- MEMBERSHIP IN THE ELECTRONIC FRONTIER FOUNDATION
- ================================================
-
- Print out in monospaced (non-proportional) font and mail to:
-
- Membership Coordinator
- Electronic Frontier Foundation
- 1001 G Street, NW, Suite 950 East, Washington, DC 20001
-
-
- SIGN ME UP!
- -----------
-
- I wish to become a member of the Electronic Frontier Foundation. I enclose:
-
- ___ Regular membership -- $40
- ___ Student membership -- $20
-
-
- * Special Contribution
-
- I wish to make an additional tax-deductible donation in the amount of
- $__________ to further support the activities of EFF and to broaden
- participation in the organization.
-
-
- PAYMENT METHOD:
- ---------------
-
- ___ Enclosed is a check or money order payable to
- the Electronic Frontier Foundation.
-
- ___ Please charge my:
-
- ___ MasterCard ___ Visa ___ American Express
-
- Card Number: _____________________________________________
-
- Expiration Date: _________________________________________
-
- Signature: _______________________________________________
-
- NOTE: We do not recommend sending credit card information via email!
-
-
- YOUR CONTACT INFORMATION:
- -------------------------
-
- Name: __________________________________________________________
-
- Organization: __________________________________________________
-
- Address: _______________________________________________________
-
- _______________________________________________________
-
- Phone: _____________________
-
- FAX: _____________________
-
- BBS: _____________________ BBS Name: ____________________
-
- E-mail addresses: ______________________________________________
-
- ______________________________________________
-
- PREFERRED CONTACT
-
- ___ Electronic: Please contact me via the Internet address listed above.
- I would like to receive the following at that address:
-
- ___ EFFector Online - EFF's biweekly electronic newsletter
- (back issues available from ftp.eff.org,
- pub/EFF/Newsletters/EFFector).
-
- ___ Online Bulletins - bulletins on key developments
- affecting online communications.
-
- NOTE: Traffic may be high. You may wish to browse these
- publications in the Usenet newsgroup comp.org.eff.news (also
- available in FidoNet, as EFF-NEWS).
-
- ___ Paper: Please contact EFF through the US Mail at the street
- address listed above.
-
- NOTE: Paper documents available upon request.
- "Networks & Policy" Newsletter automatically sent via US Mail.
-
-
- PRIVACY POLICY
- --------------
-
- EFF occasionally shares our mailing list with other organizations promoting
- similar goals. However, we respect an individual's right to privacy and
- will not distribute your name without explicit permission.
-
- ___ I grant permission for the EFF to distribute my name and contact
- information to organizations sharing similar goals.
-
- [This form from eff.org 3/7/94 Cantwell--please leave this line on the form!]
-
- The Electronic Frontier Foundation is a nonprofit, 501(c)(3) organization
- supported by contributions from individual members, corporations and
- private foundations. Donations are tax-deductible.
-
- ------------------------------
-
- Date: Sun, 6 Mar 94 19:12:56 CST
- From: susan@UTAFLL.UTA.EDU(Susan Herring)
- Subject: File 3--Survey: communication ethics on the net
-
- The following survey is part of a project I am conducting on communication
- ethics on the net. I'd appreciate it if everyone who reads this message
- could take a few minutes to answer and return the survey. All responses
- will remain strictly confidential. A summary of the results will be made
- available to respondents upon request.
-
- =========================================================================
- NETIQUETTE SURVEY
-
- The following questions concern behavior on electronic discussion lists
- and/or newsgroups. Answer on the basis of your personal experience and
- reactions. Needless to say, there are no correct or incorrect answers.
-
- 1. What behaviors bother you most on the net?
-
- 2. What net behaviors do you most appreciate when you encounter them?
-
- 3. In an ideal world, what one change would you most like to see in
- the way people participate on the net?
-
-
- SPECIFIC BEHAVIORS
- For each behavior listed below, place an X under the number that indicates
- how common the behavior is in your experience on the net, and your typical
- reaction when you encounter it. (If the behavior reminds you of a particular
- list or group, feel free to mention the group or otherwise comment.)
-
- rare common like dislike
- 1. Participants post very 1 2 3 4 5 1 2 3 4 5
- long messages
-
- 2. Participants post short 1 2 3 4 5 1 2 3 4 5
- messages
-
- 3. The same participant(s) 1 2 3 4 5 1 2 3 4 5
- post frequently
-
- 4. Requests are posted for 1 2 3 4 5 1 2 3 4 5
- obvious or easily-
- obtained information
-
- 5. Requests are posted on 1 2 3 4 5 1 2 3 4 5
- FAQs or topic previously
- discussed
- rare common like dislike
- 6. Messages don't contain 1 2 3 4 5 1 2 3 4 5
- explicit subject headers
-
- 7. Messages contain typos 1 2 3 4 5 1 2 3 4 5
- or spelling errors
-
- 8. Messages are unclearly 1 2 3 4 5 1 2 3 4 5
- worded or otherwise obscure
-
- 9. Messages posted on topics 1 2 3 4 5 1 2 3 4 5
- not directly related to
- focus of list/newsgroup
-
- 10. Same msg. posted more than 1 2 3 4 5 1 2 3 4 5
- once to same list/newsgroup
- rare common like dislike
- 11. Message cross-posted to 1 2 3 4 5 1 2 3 4 5
- multiple lists/newsgroups
-
- 12. Messages sent publicly 1 2 3 4 5 1 2 3 4 5
- instead of to listserv or
- to a private individual
-
- 13. Messages quote all of 1 2 3 4 5 1 2 3 4 5
- message being responded to
-
- 14. Elaborate signature files 1 2 3 4 5 1 2 3 4 5
-
- 15. Messages contain personal 1 2 3 4 5 1 2 3 4 5
- or intimate information
- about sender
- rare common like dislike
- 16. Messages compliment or 1 2 3 4 5 1 2 3 4 5
- thank others for their
- messages
-
- 17. Messages agree with the 1 2 3 4 5 1 2 3 4 5
- content of previous msgs.
-
- 18. Messages challenge the 1 2 3 4 5 1 2 3 4 5
- content of previous msgs.
-
- 19. Messages have humorous 1 2 3 4 5 1 2 3 4 5
- content
-
- 20. Messages are ironic or 1 2 3 4 5 1 2 3 4 5
- sarcastic in tone
- rare common like dislike
- 21. Messages contain insider 1 2 3 4 5 1 2 3 4 5
- references understandable
- only to members of that group
-
- 22. Messages give advice to 1 2 3 4 5 1 2 3 4 5
- other participants
-
- 23. Messages sympathize with 1 2 3 4 5 1 2 3 4 5
- other participants
-
- 24. Messages are tentative or 1 2 3 4 5 1 2 3 4 5
- overly polite
-
- 25. Messages forcefully 1 2 3 4 5 1 2 3 4 5
- assert sender's views
- rare common like dislike
- 26. Participants boast of own 1 2 3 4 5 1 2 3 4 5
- achievements/importance
-
- 27. Messages contain profanity 1 2 3 4 5 1 2 3 4 5
-
- 28. Messages have racist 1 2 3 4 5 1 2 3 4 5
- content
-
- 29. Messages have sexist 1 2 3 4 5 1 2 3 4 5
- content
-
- 30. Participants "flame" or 1 2 3 4 5 1 2 3 4 5
- express strong negative
- emotion
-
-
- OTHER
- 1. How many screens does a message have to be before you consider it
- "too long" (i.e. consider deleting it or skipping to the next message)?
-
- 2. Would you favor limits on length and/or frequency of posting to public
- lists/newsgroups? If so, what limits would you propose?
-
- 3. Put an X next to the statement that best applies:
- In my experience on the net, participants behave politely and
- appropriately
- a) almost all the time
- b) most of the time, with some exceptions
- c) about half of the time
- d) not very often
- e) almost never
-
-
- RESPONDENT BACKGROUND INFORMATION (important)
- 1. Age: under 25; 25-35; 36-45; 46-55; 56-65; over 65
-
- 2. Sex: M F
-
- 3. Ethnicity: White (non-Hispanic); Asian; African-American;
- Hispanic; Native American; other
-
- 4. Native language if other than English:
-
- 5. Academic position: Prof; Assoc. Prof; Assist. Prof; Instructor
- (non tenure-track); Grad student; Undergrad; academic staff;
- researcher; not associated with academia
-
- 6. Field of specialization:
-
- 7. Number of years using computer networks:
-
- 8. Number of electronic discussion lists you currently subscribe to:
-
- 9. How often, on the average, do you contribute to these lists?
-
- 10. Number of newsgroups you read (regularly or occasionally):
-
- 11. How often, on the average, do you contribute to these newsgroups?
-
-
- =====================================================================
- Thank you for responding. Please send surveys and requests for
- summary of survey results to susan@utafll.uta.edu or (snail mail):
- Prof. Susan Herring, Program in Linguistics, University of Texas,
- Arlington, TX 76019 USA.
-
- ------------------------------
-
- Date: Sun, 6 Mar 94 02:21:40 PST
- From: raustin@pro-palmtree.socal.com (Ronald Austin)
- Subject: File 4--Starring Tom Cruise as Kevin Poulsen?
-
- ((The following is reprinted from Telecom Digest (V 14: #115))
-
- Daily Variety
- March 3, 1994 Thursday
-
- SECTION: NEWS; Pg.1
- BYLINE: MICHAEL FLEMING
-
- PAR'S HACK ATTACK: Though the minds of Paramount execs have surely
- been on potential whackings, computer hacking was the chief focus of
- execs Bob Jaffe and John Goldwyn last week. The execs got Par to pay a
- low six-figure fee against mid-six figures to Jonathan Littman for the
- rights to make a movie from his Sept. 12 {L.A. Times Magazine} article
- "The Last Hacker," and major names are lining up to be involved. It's
- the story of Kevin Lee Poulson, a skilled computer hacker who was so
- inventive he once disabled the phone system of KIIS-FM so he could be
- the 102nd caller and win the $50,000 Porsche giveaway.
-
- More seriously, he's been charged with using his expertise to breach
- national security by accessing top secret files and selling the
- information. He's even suspected of disabling the phone systems of
- "Unsolved Mysteries" after he was profiled, so that callers couldn't
- furnish clues to his whereabouts. Poulson was caught and has been in
- jail for the last three years, facing more than 100 years in prison.
-
- ICM agent Kris Dahl got Littman to turn the article into a book for
- Little, Brown, and ICM's Irene Webb racked up yet another sale for the
- screen rights to the hacker story. It was a vigorous tug of war
- between Touchstone, which was trying to purchase it for "City
- Slickers" director Ron Underwood, and Paramount, chasing it for
- producer Oren Koules.
-
- Littman chose Koules, and now, Dish hears, Underwood wants to join
- Koules to direct. Littman, meanwhile, has remained tight with the
- underground community of hackers as he researches his book. That takes
- its toll. Among other things, the mischief meisters have already
- changed his voice mail greeting to render an obscene proposal.
-
- ---------------------
-
- UUCP: hatch!pro-palmtree!raustin The Palmtree BBS
- Inet: raustin@pro-palmtree.socal.com 310-453-8726 v.32
-
-
- [TELECOM Digest Editor's Note: Thanks for passing this along. For
- readers who do not remember/know of Poulsen, we have a file about him
- in the Telecom Archives. As the article above points out, he will
- probably be in jail for a long time to come. Articles about other
- hackerphreaks who have been arrested and their exploits are in the
- same sub-directory in the Archives. You can reach the Archives using
- anonymous ftp lcs.mit.edu. PAT]
-
- ------------------------------
-
- End of Computer Underground Digest #6.24
- ************************************
-
-
-