Copy Link
Add to Bookmark
Report

Computer Undergroud Digest Vol. 03 Issue 07

  



****************************************************************************
>C O M P U T E R U N D E R G R O U N D<
>D I G E S T<
*** Volume 3, Issue #3.07 (March 2, 1991) **
****************************************************************************

MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet)
ARCHIVISTS: Bob Krause / Alex Smith / Bob Kusumoto
RESURRECTED SYSCZAR: Brendan Kehoe

USENET readers can currently receive CuD as alt.society.cu-digest. Back
issues are also available on Compuserve (in: DL0 of the IBMBBS sig),
PC-EXEC BBS (414-789-4210), and at 1:100/345 for those on FIDOnet.
Anonymous ftp sites: (1) ftp.cs.widener.edu (back up and running) and
(2) cudarch@chsun1.uchicago.edu
E-mail server: archive-server@chsun1.uchicago.edu.

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted as long as the source is
cited. Some authors, however, do copyright their material, and those
authors should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles relating to
the Computer Underground. Articles are preferred to short responses.
Please avoid quoting previous posts unless absolutely necessary.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
DISCLAIMER: The views represented herein do not necessarily represent the
views of the moderators. Contributors assume all responsibility
for assuring that articles submitted do not violate copyright
protections.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

CONTENTS THIS ISSUE:
File 1: Moderators' Corner
File 2: From the Mailbag
File 3: CuD Index, Volume Two (2.00 - 2.19)
File 4: Electronic Frontier Foundation Job Announcement
File 5: Bad Moveez mark II
File 6: The CU in the News

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

----------------------------------------------------------------------

********************************************************************
*** CuD #3.07, File 1 of 6: Moderator's corner ***
********************************************************************

From: Moderators
Subject: Moderators' Corner
Date: March 2, 1991

++++++++++++
Apology to a valuable contributor
++++++++++++

Sometimes letters are published that were not so-intended by the authors to be
published. We indicate in the header that we assume notes may be published,
and as a rule, even though we assume letters may be published, we double check
"just in case." When we ask for a copy of an article or note that someone has
written, we generally assume, whatever wording we use, that it's understood
that it is for publication. Even if a note has been posted publicly on the
nets and an author sends us a copy, we still try to check. Unfortunately,
signals are sometimes crossed and an article slips into publication which an
author prefered to not to be. We regret when this occurs, but it is the result
of legitimate misunderstandings and not the result of any attempt to bypass
author prerogative. Given the amount of mail we receive and weekly schedule, in
addition to net-lag that may delay a response until *after* a post has been
published, miscommunication can arise. We regret such occurances and apologize
to a recent valuable contributor to whom this happened.

+++++++++++++
Corrected NIA Address
+++++++++++++

In the last issue of CuD, the wrong nuchat address for NIA was listed by
mistake. The *CORRECT* address for NIA submissions and correspondence is:
ELISEM@NUCHAT.SCCSI.COM
We regret any inconvenience caused to those on the mistakenly
listed account.

+++++++++++++
Intertek: The CyberPunk Journal
+++++++++++++

The latest INTERTEK (Winter, 1991, Vol 3,1) is out, and features
"Reflections on Hackers" by Katie Hafner and interviews with John Perry
Barlow and Eric Bloodaxe. For those who have not seen it, Intertek is a
hard-copy magazine (the current issue is 28 pages) with articles,
commentary, interviews, book reviews, research summaries, and other
cutting-edge hi-tek information. Single issues are $2.50, or a one year
subscription is $7. The editor, Steve Steinberg, can be contacted at: 325
Ellwood Bech, #3, Goleta, CA (93117) or internet at steve@cs.ucsb.edu.

+++++++++++++++++
Call for Articles
+++++++++++++++++

For the next few issues, we are especially looking for articles from
readers on: (1) State of the CU (p/h and pirate) BBS community; (2) Views
on such issues sysop liability on BBSs, e-mail privacy on BBS and mainframe
(university or employer) systems,; and (3) Surveillance of BBSs by local,
state or federal LE agents.

********************************************************************
>> END OF THIS FILE <<
***************************************************************************

------------------------------

From: Assorted
Subject: From the Mailbag
Date: 4 March, 1991

********************************************************************
*** CuD #3.07: File 2 of 6: From the Mailbag ***
********************************************************************

From: dgelbart@QUESTOR.WIMSEY.BC.CA(Dave Gelbart)
Subject: Robert Miles - "computer wizard"
Date: Sat, 23 Feb 91 23:08:00 PST

*Very* interesting article "The FBI comes rapping...".
But, on Robert Miles being a "computer wizard", well, in his own words:

"...in a computer journal, called PC/Computing, a nationwide publication,
out of Cambridge, Mass., there is an article by some lying idiot...in which
he calls me a computer wizard, and states that I was a defendant in the Berg
case in Denver. Sorry, about that old boy. I was never tried in Denver. The
friends who were, will be amazed to learn that I was a co-defendant in that
trial. And as for me being a 'computer wizard', wow, did that crack up
Dotty... I can hardly fix the toaster. ... So, what you read in this
article.... ha! ... Yesterday, ah couldn't spell one, now ah is one.....
.....a real live Computer Wizard."

"..." is where I have deleted irrelevant sections. "...." and "....." were
in the original text.

Not that this proves much, -- I trust Miles about as much as I trust the
media -- but in the pictures I've seen of him, he certainly doesn't *look*
like a techie type.

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

From: <Anonymous>
Subject: Civil Liberties and the Computer Underground
Date: February 23, 1991

Has CuD been intentionally backing off their earlier defense of civil
liberties? Recent issues lack the spark of earlier ones. What's happening
with Len Rose? Why aren't there more articles on follow-ups to
investigations, Ripco, Secret Service activities, searches, Steve Jackson
Games, and all the issues that CuD started with? I enjoy the news and some
of the articles, but I subscribed because of you guys seemed about the only
ones willing to take a strong stand and speak out. Whatever happened with
the informant thing? Another issue I'd like to see raised is all the
anonymous posts in CuD and on the nets. In one issue you said you publish
anonymously when people are afraid of reprisals. This reminds me of
McCarthyism, where people were afraid to speak out for fear of being
listed. Maybe the fear that the nets are monitored by vindictive types
(and there are a few of these on comp.org.eff.talk) or law enforcement.
Plus the fact that it's so easy to send hate mail and otherwise harass on
the nets. If you're being pressured or if people are complaining about you
being too pro-hacker or too radical, would you publish it, or would you
just allow yourselves to be co-opted? I'd personally like to see more fire
in between the other material.

+++++++++++++++++++++++++++++++++++++
(Editors' response: No, we haven't been pressured or in any way or
"encouraged" to change our position. Quite the opposite. Yes, we may have
become less strident--although there would be a few who would claim
otherwise. We have been advised to refrain from publishing anything
substantive about on-going cases by those involved in them for fear of
putting the principles at risk or of subverting legal strategies responding
to what many see as abuses of authority. We're willing to publish articles
that are both radical and conservative, and we generally have not had many
articles from either extreme. However, we do have two special issues
planned (tentatively 3.09 and 3.10) on government surveillance and what
people in the CU can do about it.

********************************************************************
>> END OF THIS FILE <<
***************************************************************************

------------------------------

From: Gordon Meyer
Subject: CuD Index, Volume Two (2.00 - 2.19)
Date: 25 February, 1991

********************************************************************
*** CuD #3.07: File 3 of 6: CuD Index for Volume Two ***
********************************************************************

****************************************************************************
>C O M P U T E R U N D E R G R O U N D<
>D I G E S T<
*** Index to Volume Two ***
*** Issues 2.00 - 2.19 ***
****************************************************************************

Volume 1, Issue #2.00 (Aug 25, 1990)

CONTENTS:
File 1: Moderators' Corner
File 2: EFF mailing #3: About the Electronic Frontier Foundation
File 3: Len Rose's Search Warrant
File 4: What to Read When the SS is at the Door
File 5: CU in the News: More on the NY Raids

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Volume 2, Issue #2.01 (Aug 31, 1990)

CONTENTS:
File 1: Moderators' Corner
File 2: Proposed changees in Computer Abuse Act (S.2476)
File 3: CPSR Seeks FBI data on Bulletin Board Monitoring
File 4: Computers, Social Responsibility, and Political Action
File 5: Another experience with the SS
File 6: CU in the News

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Volume 2, Issue #2.02 (September 9, 1990)

CONTENTS:
File 1: Moderators' Corner
File 2: Musing over Operation Sun Devil
File 3: IPCO BBS Back on-Line
File 4: CuD Index, Volume 1 (Nos. 1.00 through 1.29, complete)
File 5: The CU in the News

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Volume 2, Issue #2.03 (September 14, 1990)

CONTENTS:
File 1: Moderators' Corner
File 2: Len Rose's experience with the Secret Service
File 3: Tim Wolfson's address, cite list
File 4: A comment on Zod's case

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Volume 2, Issue #2.04 (September 23, 1990)

CONTENTS:
File 1: Moderators' Corner
File 2: Re: Evidence (was Re: Musing on Constitutionality)
File 3: Why the FBI should be concerned about the Secret Service
File 4: California Computer Abuse Law revisited
File 5: Candidate for state governor supports electronic freedom & privacy
File 6: Review of Steven Levy's CLOAK AND DAGGER
File 7: The CU in the News

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Volume 2, Issue #2.05 (September 30, 1990)

CONTENTS:
File 1: Moderators' Corner
File 2: Re: The CU in the News (Mail reading)
File 3: Anarchist Times, Inc. (ATI)--background
File 4: The status of the electronic forum (BBS)
File 5: Another experience with the law
File 6: Some views on what to do if questioned by LE agents
File 7: The CU in the News

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Volume 2, Issue #2.06 (October 6, 1990)

CONTENTS:
File 1: Moderators' Corner
File 2: From the Mailbag
File 3: MARS BBS Sting a Prank
File 4: Another view of hacking
File 5: The CU in the news

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Volume 2, Issue #2.07 (October 15, 1990)

CONTENTS:
File 1: Moderators' Corner
File 2: Re: IBM mainframe trojan repost <CHRISTMA EXEC>
File 3: CPSR Annual Meeting (Oct. 20-21, 1990)
File 4: Electronic Frontier Foundation Hires Staff Counsel
File 5: 13th Annual National Computer Security Conference (Part 1)
File 6: 13th Annual National Computer Security Conference (Part 2)
File 7: Summary of COMPUTER ETHICS (book)
File 8: Introduction to TOXIC SHOCK

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Volume 2, Issue #2.08 (October 20, 1990)

CONTENTS:
File 1: Moderators' Corner
File 2: From the Mailbag
File 3: Prodigy, Problems, and Censorship
File 4: Censorship on the Nets
File 5: PC's & Political Action

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Volume 2, Issue #2.09 (October 27, 1990)

CONTENTS:
File 1: Moderators' Corner
File 2: Len Rose Arrest
File 3: Mars was not "Censored"
File 4: Response to Mars "Censoring"
File 5: Steve Jackson Games (SJG) Update
File 6: The Future of Hacking and the System Security Profession
File 7: The Ultimate Interface: Hackers and the Private Sector
File 8: CU in the News: "Hackers" and Bank Blackmail in England

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Volume 2, Issue #2.10 (November 2, 1990)

CONTENTS:
File 1: Moderators' Corner
File 2: Len Rose Funds--A Humanitarian Necessity
File 3: EFF Seeks Executive Director (Job Announcement)
File 4: Massachusetts Computer Crime Bill
File 5: Re: C-u-D, #2.09 Censoring of gif's
File 6: The Piratical Dilemma
File 7: Obtaining Identification Cards
File 8: Logisticon vs. Revlon
File 9: In-House Security Problems

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++



Volume 2, Issue #2.11 (November 13, 1990)

*** SPECIAL ISSUE: SEARCH AFFIDAVIT FOR STEVE JACKSON GAMES ***

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Volume 2, Issue #2.12 (November 17 1990) (mailed in two parts)

CONTENTS:
File 1: Moderators' Corner
File 2: PhD Candidate Seeks information on the CU
File 3: Riggs, Darden, and Grant Sentenced
File 4: Prodigy Saga Continues
File 5: Re: Response to Mars "Censoring"
File 6: Response to SJG Affidavit (part 1)
File 7: Warrants schmarrants! The SS is Crazy!
File 8: More guidelines on what to do if busted
File 9: CU in the News--England and Emma Nicholson; VOGON News

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Volume 2, Issue #2.13 (November 25 1990)

CONTENTS:
File 1: Moderators' Corner
File 2: EPIC (Effective Performance in Candidates)
File 3: The Riggs Sentencing (reprint from Newsbytes)
File 4: First Conference on Computers, Freedom & Privacy
File 5: Hackers Break into DEA Lines

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++



Volume 2, Issue #2.14 (November 30, 1990)

CONTENTS:
File 1: Moderators' Corner
File 2: Len Rose Indicted
File 3: CPSR's FOIA request from the FBI
File 4: International Information Retrieval Guild
File 5: A Note on Censorship
File 6: Two Comments on Prodigy
File 7: Don't Talk to Cops
File 8: Response to DEA/PBX News Story

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Volume 2, Issue #2.15 (December 5, 1990)

CONTENTS:
File 1: Moderators' Corner
File 2: Len Rose Indictment in Illinois
File 3: 2600 Magazine Response to Atlanta Sentencing
File 4: List of Computer Underground Clippings
File 5: Computer Crime Laws list
File 6: Media and the CU
File 7: The Hermetic Underground

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Volume 2, Issue #2.16 (December 10, 1990)

*> SPECIAL ISSUE: "ATLANTA THREE" SENTENCING MEMORANDUM <*

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++


Volume 2, Issue #2.17 (December 16, 1990)

CONTENTS:
File 1: Moderators' Corner
File 2: From the Mailbag
File 3: EFF Response to Atlanta Sentencing Memorandum
File 4: Some Thoughts on the Atlanta Sentencing
File 5: Earning your Stripes
File 6: Playgrounds of the Mind: Cyberspace
File 7: The CU in the News

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Volume 2, Issue #2.18 (December 28, 1990)

CONTENTS:
File 1: Moderators' Corner
File 2: From the Mailbag
File 3: Computers Under Attack
File 4: CU Resources in Germany
File 5: Trade Secrets; When are they Bad?

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Volume 2, Issue #2.19 (December 31, 1990)

CONTENTS:
File 1: Moderators' Corner
File 2: From the Mailbag
File 3: Telecoms Ripping off BBSs?
File 4: Michigan Bell vs BBSs
File 5: Clarification of Gail Thackeray's Comment on Modem Licensing
File 6: a.k.a. freedom of expression
File 7: Z-modem Virus Alert

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

********************************************************************
****** END OF CuD VOLUME TWO - INDEX ********
********************************************************************

********************************************************************
>> END OF THIS FILE <<
***************************************************************************

------------------------------

From: Mike Godwin (EFF)
Subject: Electronic Frontier Foundation Job Announcement
Date: 28 February, 1991

********************************************************************
*** CuD #3.07: File 4 of 6: EFF Job Announcement ***
********************************************************************

Electronic Frontier Foundation
Job Announcement

The Electronic Frontier Foundation is looking to hire a Boston-based Director
of Communications (DoC) to become its second full-time employee.

A key aspect of the EFF's mission is to educate the public about the
opportunities and challenges posed to society by technological developments
in computers and telecommunications. The Foundation has taken a leading
role in the effort to make sure that civil liberties are protected in the
exercise of communication through computer networks and electronic bulletin
boards.

The EFF's public education activities are carried out through a variety of
media including computer conferencing systems, public speaking, writing
articles for periodicals and newspapers, appearances at public and private
forums, its own publications including online and print newsletters, and a
variety of special projects and publications.

EFF Board members, staff, volunteers, and legal counsel all participate in
these activities. The DoC will serve as a dedicated resource in these areas
in order to provide oversight and co-ordination, as well as to be a
principal contributor to the activities.

The ideal candidate will possess:

% the ability to think clearly

% the writing, editing, and speaking skills to convey ideas with
impact. Needs to be able to deal with complex technical and legal issues by
simplifying without trivializing.

% an understanding of the theory and practice of "The Marketing of
Ideas", in order to reach journalists, computer professionals, politicians,
hackers, lawyers, and other groups

% comfort with the world of online communications and its "savage user
interfaces".

% a strong idealistic streak, tempered by a knowledge of what is
possible.

% perseverance and patience.

% knowing when to use volunteers and when to use experts. Has to be
able to co-ordinate the two in order to maximize limited resources. Needs to
know how to nudge. A facilitator, not a dictator.

General legal knowledge is a plus.

The position is available immediately. For further information, contact:
Mitchell Kapor
Electronic Frontier Foundation, Inc.
155 Second St.
Cambridge, MA 02141

(617) 864-1550
(617) 864-0866 (fax)

mkapor@eff.org

Please post and circulate this announcement.

********************************************************************
>> END OF THIS FILE <<
***************************************************************************

------------------------------

From: dogface!bei@CS.UTEXAS.EDU(Bob Izenberg)
Subject: Bad Moveez mark II
Date: Wed, 27 Feb 91 00:10:53 CST

********************************************************************
*** CuD #3.07: File 5 of 6: Computers in the Movies ***
********************************************************************

* CUD Goes To The Movies *

Jim Thomas challenged some friends and I to come up with the worst "hacker"
films that we'd seen. What follows is only a partial list, and you've
probably got your own favorites, if that's the right word. They're in no
particular order. I know that I'm leaving a gold-mine of bad plot ideas
untouched by ignoring commercial television. There's been one awful Booker
episode that weighed in at the Cargo Cult level of sophistication, for
example. You probably can think of more.

-- Bob

----------------------------------------------------------------
Eight Bad Bits: The Computer Underground Film Hall of Shame
----------------------------------------------------------------

[ 1 ] War Games. The first of the big "Swatch hacker"
movies. It spawned a wave of original thinkers with "joshua"
as their user id or password. Were NORAD computers ever
this insecure? For about ten seconds back in the Dark Ages,
maybe.
[ 2 ] Malibu Express. High tech and low morals,
courtesy of ex-ABC Sports producer Andy Sidaris. I could
say that this is a tightly plotted adventure which treats
today's computer embezzlement headlines as a starting point.
If you'd stop staring at the bimbos for a minute, you might
agree with me. The opening credits roll over some serious
Nail Slicks risking death on an Atari keyboard. This sets
the tone for the whole film.
[ 3 ] Prime Risk. Komputer Kids with job and bank
problems spoof their least favorite bank's ATM network, only
to find someone doing it on a bigger scale, for money
instead of curiosity and revenge. The understanding and
empathetic Federal agent rescues them and thanks them for
their vigilance. Uh huh. Note how Toni Hudson's character
is scripted as a Renaissance nerd, as far above Gilda
Radner's Lisa Lubner character as amoebas are above Dan
Quayle.
[ 4 ] Colossus: The Forbin Project. Jim Thomas voted
for this one, in appreciation of a malevolent defense
computer with no off switch. It's the system manager's
fairy tale: it never crashes, never needs new parts, never
has transmission problems. How long it takes us to reach
this cybernetic state of grace is left to the viewer's
imagination.
[ 5 ] The Manhattan Project. There's a reason, you
know, why electrical supply houses aren't found in high-
dollar shopping malls. I'm sorry, but hipper-than-thou
nerds are the stuff of Hollywood's Summer Slump cure. Not a
computer in the picture except as props, but there's a bit
of hacker curiosity and humor in the script.
[ 6 ] Electric Dreams. Computer oversell proves
truthful when digiphobe Lenny Van Dohlen competes with his
"Pineapple" computer for his neighbor's affections.
[ 7 ] The Running Man. Hahahahahahahahah. Arnold in
Spandex yellow leotards. Mick Fleetwood and Dweezil Zappa
running the Revolutionary Left. One hundred years from now,
"Richard Bachman" will spin in his grave like a turbine
whenever this is shown. The "Weiss" character plays video
skittles for a minute to crack the Secret Network Code. Rick
Moranis says it best in Spaceballs: "That's the combination
an idiot would have on his luggage!"
[ 8 ] Tron. A bitter triumph of Big Special Effects
Bucks over story, guaranteed to make anyone who's ever heard
of Mike Jittlov cry in anguish. Picture the scriptwriter's
meeting: "You're not leaving this room until you've used
every buzzword in this book!" Must material to show off
that new videodisc player or 50" monitor, however. (No
"bit player" jokes here, I gots too much class fer that.)

------------------------
Dishonorable Mention
------------------------

[ 0 ] Evilspeak. The Devil's in my disk drive! Military
prep Clint Howard gets hazed by classmates, then seeks
Satanic assistance from behind his keyboard. Carrie without
tampons for the high-tech set. The Bad Sci-Fi numerologists
hint that this (666) must be the sequel to The Andromeda
Strain (601), digitwise. Jeez, experts.
[ 0 ] The Computer Wore Tennis Shoes. Always consider
the Classics. A kinda porky Kurt Russell gets a jolt and
leaves Jockville behind for Braintown. Old Walt might have
known as much about computers as he did about animal
behavior, but he did cut an acceptable teen yarn.
[ 0 ] Forbidden World. Show this and you'll disappoint
computerists and sci-fi fans alike. Some gene-spliced oil
slick expresses a difference of opinion about who's the Food Of
The Future around here, anyway. Later, it grows teeth and
is found to have bio-hacked the base computer. Type type, munch
munch. Stay tuned for (or beware of) the scientist who cuts
a softball-sized tumor out of his own stomach (sans anesthesia)
and slam dunks it down the monster's throat.
[ 0 ] Thrillkill. Bad bad bad. Even cable stations
won't show this when decent folk are awake.
[ 0 ] Ferris Bueller's Day Off. I know, it's a comedy,
so I'll go easy. "I asked for a car; I got a computer."
Maybe I'm way off base in doubting whether a conniving rich
kid would ever get beyond a stock ticker, technology-wise.
That thirty-second scene, and the synth in the bedroom,
branded it forever thus: "Ferris Bueller (Matthew Broderick)
plays high-tech hooky in the big city." Cliff's Notes are too
complex for some people, apparently.
[ 0 ] Chopping Mall. Sorry, but I had to slip one more
slash flick in here. It's nice to see Paul and Mary Bland again
(after Eating Raoul.) Also, there's something about security robots
running amuck that might strike a familiar chord in readers of
this august publication.

-----------------------------------------
From The Land of The Forgotten Titles
-----------------------------------------

[ ? ] A bunch of fantasy gamers find some plugged-in
Ayatollah using a time-sharing network to aim his terrorists
here in the U.S. of A. They sneak in and aim them at
useless targets. Dialogue by Craftsman and U.S. Plywood.

********************************************************************
>> END OF THIS FILE <<
***************************************************************************

------------------------------

From: Various
Subject: The CU in the News
Date: March 3, 1991

********************************************************************
*** CuD #3.07: File 6 of 6: The CU in the News ***
********************************************************************

Date: Wed, 20 Feb 91 14:34:11 PST
From: Visualize Whirled Peas <brewer@ACE.ENET.DEC.COM>
Subject: Sounds good... court ruling on BBS in SW Bell

From: Jim.Bellotte@f2.n106.z1.fidonet.org (Jim Bellotte)
Newsgroups: alt.cosuard
Subject: settlement
Date: 19 Feb 91 12:15:38 GMT

On January 9, 1991, the Texas Public Utilities Commission, on a vote of
3 to 0 approved a negotiated settlement in Texas PUC docket 8387. This
is the case of Reginald A. Hirsch, et. al. vs Southwestern Bell
Telephone Company. This case grew from Southwestern Bell's attempt to
assess business rates to all known BBSs.

The negotiated settlement provides for the following provision to be
added to the Southwestern Bell tariffs:

-------------Begin quotation from proposed stipulation---------------

2. Southwestern Bell agrees to amend Section 23,
Paragraph 3.1 of its General Exchange Tariff defining business
service to include the following footnote:

As a result of a Stipulation in Docket No. 8387 approved by the
Commission on ______, Southwestern Bell agrees that all Bulletin Board
Systems ("BBS") that are located at residence locations that do not
solicit, require, or receive monetary compensation and that use three or
fewer local exchange access lines shall be permitted to subscribe to
local exchange access service at the approved residential rates. BBSs
that are eligible to subscribe to local exchange access service at
residential rates may publish their name, telephone number and technical
information in a listing of BBSs by location or subject matter. Such
listings must be purely informational to advise readers of the BBS's
name, telephone number, location, subject matter, hours, baud rates, and
other technical information. BBSs that do not meet these conditions
will be considered businesses, and approved business rates will apply
for all local exchange access lines used by such BBS.

-----------------------------End Quotation--------------------------

The stipulation also provides that Southwestern Bell will provide a
single point of contact for BBS operators and that for a period of 90
days after the PUC decision, they will waive service charges on orders
to change service from one class of service to another in order to
comply with settlement.

This has been a long fight. The settlement is not what any of the
parties would consider perfect. It does give BBS operators in Texas a
firm set of guidelines in which to operate. They no longer have to play
"Russian Roulette", hoping that they reach a SWBT business office that
understands the rules.

Ed Hopper
President - COSUARD

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

From: "Michael E. Marotta" <MERCURY@LCC.EDU>
Subject: New Telecom Laws Proposed
Date: Fri, 22 Feb 91 08:23 EST

GRID News. ISSN 1054-9315. vol 2 nu 6. February 22, 1991.
World GRID Association, P. O. Box 15061, Lansing, MI 48901 USA
----------------------------------------------------------------
Michigan to Overhaul Telecom Rules by Michael E. Marotta

On February 19 and 20, companion bills were introduced into the
state house and state senate of Michigan. "The Michigan
Telecommunications Act" is House Bill 4343 and Senate Bill 124.
The two versions are identical. HB4343 was introduced by Alma G.
Stallworth (D-Detroit), chair of the House Public Utilities
committee. SB124 was introduced by Mat J. Dunaskiss (R-Lake
Orion), chair of the newly-created Senate Technology and Energy
Committee. If passed by October 1, 1991, the bills become law on
that date and have sunset limits of four years, expiring on
September 30, 1995.

The Michigan Telecommunications Act would, if passed into law,
accomplish the following:
(*) establish a new regulator, the Michigan Telecommunications
Commission, removing telephone from the Public Service
Commission and bringing cable television under the new
agency's scope.
(*) de-regulate local exchange providers, allowing them
monopoly status and the right to sell other services,
including long distance, cable television and information.
(*) freeze local rates at the current level, allowing no
increase beyond the maximum rate as of Nov. 1, 1990.
(*) require 911 service to be provided to any county that
wants it. In fact, there are 48 separate provisions for
911 service, significantly more than any other section of
the act. (Mandatory service for the hearing impaired runs
a mere 42 lines.)
(*) Outlaw unsolicited advertising via fax. (This provision,
like many of the 911 rules, is already in place. It was
created in 1990 as an amendment to the Telephone Act of
1913 and is being carried over.)

The Michigan Telecommunications Act specifically seeks to overturn
the "Modified Final Judgement." Its goal is to allow Michigan
telecom providers the freedom to develop products and services.
Whether and to what extent it meets those goals will be determined
in part by what happens to the bills in committees and on the
floors.

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

From: John / Barbara McMullen (Reprint from Newsbytes)
Subject: 2600 banned from Texas Prisons
Date: March 4, 1991

MIDDLE ISLAND, NEW YORK, U.S.A., 1991 MAR 4(NB) --
Emmanuel Goldstein, editor and publisher of 2600: The Hacker Quarterly, has
told Newsbytes that The Texas Department of Criminal Justice has prohibited
delivery delivery of the fall 1990 issue of 2600 to a subscriber
incarcerated in a Texas prison.

The official "Publication Denial Notification" form, dated January 9, 1991,
was received by Goldstein and published in the Winter 1990-91 issue that
was released on March 1st. The form indicates that the denial was
instituted because "Publication contains material on the setting up and
operation of criminal schemes or how to avoid detection of criminal schemes
by lawful authority charged with the responsibility for detected such
illegal activity."

The specific reasons for determining the basis for the ruling are listed as
"Pages 18, 19, 20, 21, 29, 42 and 43 contain information on misusing
telephone equipment to make telephone calls illegally and to obtain cash
and credit cards illegally."

Goldstein, commenting on the ban to Newsbytes, said "Inside of prison,
there is not much freedom so I guess it's not surprising that they do
things like this. What is surprising is that the article which they were
most concerned with was written by the Fraud Division of the U.S. Secret
Service and was clearly indicated to have been so authored."

Newsbytes examined the Fall issue of 2600 and found that the Secret Service
technical synopsis is contained on pages 18-21 while page 29 is part of the
letters from readers section and contains a letter from a prisoner in an
unnamed prison explaining how he or she makes unpaid telephone calls. Pages
42 and 43 contain an article by "Crazed Luddite & Murdering Thug", "An
Algorithm For Credit Cards", which explains the checksum verification of
credit card numbers.

Also contained in the same issue is an interview with security expert Dr.
Dorothy Denning, an explanation of caller-id and an article by Goldstein on
alleged BellSouth plans for monitoring telephone lines.

A supervisor at the Texas Department of Criminal Justice, Institutional
Division told Newsbytes that "Inmates may subscribe to any publication they
choose but they understand that the magazines are subject to review for
appropriateness. If they contain any material that does not meet or
standards, either the articles in question or the entire magazine will be
rejected." The supervisor, who could not speak for attribution, explained
that, if the objectionable passages were 5 pages or less, they would have
been removed and the remainder of the magazine delivered. She also said
that both the inmate and the publication have the right to appeal the
decision.

(Barbara E. McMullen & John F. McMullen/19910304)

********************************************************************

------------------------------

**END OF CuD #3.07**
********************************************************************



← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT