Copy Link
Add to Bookmark
Report
Computer Undergroud Digest Vol. 04 Issue 34
Computer underground Digest Sun Aug 2, 1992 Volume 4 : Issue 34
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
Copy Editor: Etaion Shrdlu, III
Archivist: Brendan Kehoe
Shadow-Archivist: Dan Carosone
CONTENTS, #4.34 (Aug 2, 1992)
File 1--Day (in court) of The Dead
File 2--Re: 2600 and Bellcore flap
File 3--Another View of Bellcore vs. 2600
File 4--New 2600 and 2600 Meetings
File 5--Is Bellcore Guilty of Stealing Copyright Information?
File 6--Update on Len Rose
File 7--Biblio resource: "Computer Crime" Handbook
File 8--Dr Ripco Summarizes his Legal Status since Sun Devil
File 9--Documents Available: Open Platform Overview, Life in Virtual
File 10--CPSR Recommends NREN Privacy Principles
File 11--Biblio resource: "Computer Crime" Handbook
File 12--Updated CPSR Archive Listing
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost from tk0jut2@mvs.cso.niu.edu. The editors may be
contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at:
Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115.
Issues of CuD can also be found in the Usenet alt.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL0 and DL12 of TELECOM; on Genie in the PF*NPC RT
libraries; from America Online in the PC Telecom forum under
"computing newsletters;" on the PC-EXEC BBS at (414) 789-4210; and by
anonymous ftp from ftp.eff.org (192.88.144.4) and ftp.ee.mu.oz.au
European distributor: ComNet in Luxembourg BBS (++352) 466893.
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted as long as the source
is cited. Some authors do copyright their material, and they should
be contacted for reprint permission. It is assumed that non-personal
mail to the moderators may be reprinted unless otherwise specified.
Readers are encouraged to submit reasoned articles relating to
computer culture and communication. Articles are preferred to short
responses. Please avoid quoting previous posts unless absolutely
necessary.
DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.
----------------------------------------------------------------------
Date: Sun, 26 Jul 92 2:33:02 CDT
From: bei@DOGFACE.AUSTIN.TX.US(Bob Izenberg)
Subject: File 1--Day (in court) of The Dead
>From:
Bandit, Shylock and Trackshoes
A Kinda Professional Corporation
>To:
Homo Sapiens
Dear Infringing Species,
It has come to our attention that you have been utilizing anatomical
developments pioneered by several of our clients, the dinosaurs, in your
everyday activities. This letter is to notify you that the dinosaurs
consider these features to be an infringement of dinosaur development,
which has been a documented fact in the scientific community for decades.
Said features are proprietary to the dinosaurs, and their duplication
represents a substantial harm to the saurian reputation and ability to
survive and thrive in a challenging evolutionary climate.
This letter is to formally advise you that the process of bipedal locomotion,
hereafter called "walking", is an activity the dinosaurs are prepared to
demonstrate that they have employed for thousands of years. Continued
use of your legs for locomotion on land will be considered actionable. In
addition, any evolutionary developments that you may have reason to believe
were first present in the dinosaurs must no longer be used by your species.
This includes all digestive and reproductive organs, and much of your
circulatory system. The dinosaurs will vigorously defend their hard-won
evolutionary developments by any and all means available to them, including
but not limited to injunctive relief, monetary damages, and gobbling alive,
against all members of your species and any evolutionary descendants.
We trust that you fully understand the dinosaur position on this matter.
Sincerely,
BB/file
Before you dismiss the imaginary letter above as completely without
relevance, consider the Bellcore letter to the editor of 2600 magazine that
was recently reprinted in these virtual pages. Also consider the early
snarls from AT&T lawyers directed at the authors of the BSD NET2 software
distribution. Those authors, you see, have written something much like the
UNIX operating system that AT&T markets, and have made the source code for
it available for one-tenth the cost of AT&T's version, and, in the case of
one version written specifically for the Intel 80386 processor, for free.
They have taken the first tentative bites out of the Thunder Lizard's food
supply, and the mad, unreasoning blood-lust that overcomes the dinosaur
at such moments cannot obscure the handwriting on the cave wall. Of course,
the day of the dinosaurs was long gone by the time that our species first
trod upon the Earth... but even in this day and age, a fossil living in a
museum can still get a good lawyer. The Dead rise up, and are sworn in.
It is a shame that the reputation for innovation that once was the
hallmark of AT&T and Bellcore has come to be so dominated by lawyers thriving
in at atmosphere of comparative technical innocence. The quest for product
viability and excellence may not have been abandoned, but in some sectors
it has been supplanted by a desire to seal the product up in a black box:
A black box that can't be explained, examined, or improved upon... just
paid for in perpetuity.
------------------------------
Date: Sat, 25 Jul 92 12:26:17 MDT
From: Lazlo Nibble <lazlo@triton.unm.edu>
Subject: File 2--Re: 2600 and Bellcore flap
> ...Article details how, after following 4 steps, any line is suspectible
> to secret monitoring. One document obtained by 2600 said: "There is no
> proof the hacker community knows about the vulnerability."
They may not have proof of it, but the first time I heard about Busy
Line Verification was in '84 or '85 and there's at least one person I
knew in the computer underground at the time who I had reason to
believe when he said he'd used it. Its existance is certainly no
secret to anyone who's messed around with the workings of the phone
system -- the codes that activate BLV were (and probably still are) a
sort of Holy Grail for telcom hackers.
------------------------------
Date: Wed, 29 Jul 92 14:42 GMT
From: "Thomas J. Klotzbach" <0003751365@MCIMAIL.COM>
Subject: File 3--Another View of Bellcore vs. 2600
To many, the crux of the controversy seems to be whether or not
the internal Bellcore document was legally published in 2600 Magazine.
To me, the issue is one far more basic.
Mr. Goldstein states that he published the article because it was
of "public importance". But were there other goals as well? To
embarrass Bellcore? To protect the phone system from degradation
caused by inappropriate use? Which goal or goals were the most
important? In his response to Mr. Suchyta, he states that "...as
journalists, we have a certain obligation that cannot be cast
aside...". What is that obligation? Is "...readers, who have a keen
interest in this subject matter..." enough of a justification? Or
should there be any justification?
I believe that Bellcore should be allowed to discover, document
and correct the problem internally. If Bellcore was negligent/refused
in correcting a known deficiency, that perhaps disclosure of the
problem would bring pressure to bear on Bellcore to correct the
deficiency. But this was not the case. Bellcore discovered,
documented and took steps to correct the problem it would seem, in a
timely manner. Also, the problem that Bellcore documents does not
appear to be caused as the result of a deliberate, planned action to
provide for a "trapdoor".
I would ask Mr. Goldstein:
- did you verify the source of the document?
- did you ascertain how the document was obtained?
- did the document contain any markings indicating that it was an
internal Bellcore document?
- did you weigh the needs of publishing the article versus not
publishing the article?
I tried to apply an ethical code or standard that would govern MY
conduct if I was the person who published a similar article relating
to my profession. I referred to the newly proposed revision to the
ACM Code of Ethics and Professional Conduct (CACM May '92). I
concluded after review with my attorney that a disclosure of a similar
type by me would probably be in violation of the ACM Code sections 1.2
(Avoid harm to others), 1.5 (Honor property rights including
copyrights and patents - this also deals with unauthorized duplication
of materials), 4.1 (Uphold and promote the principals of this Code)
and possibly 2.3 (Know and respect existing laws pertaining to
professional work).
This issue is not solely about computers and technology. It is
about "doing the right thing". It's about balancing the need for
information versus how that the information is obtained and
disseminated. It's about having an ethical standard that treats
disclosure for the sake of disclosure and not ensuring that the
information is obtained in a method consistent with high ethical
standards as deserving of skepticism by the reader.
There are those who liken this series of events to "Just one more
case of Goliath tromping on those ill equipped to defend themselves".
I would respond that if those who are "ill-equipped" to defend
themselves publish a document which may have been obtained in an
unethical manner and which may infringe on another party's rights,
then they should be prepared to face a possible challenge. And as far
as "the chilling effect of their (Bellcore's) letter threatening to
trample on a free press as well", I would add that we not only need a
free press, but a free and RESPONSIBLE press as well. The end does
not always justify the means.
The First Amendment provides for certain guarantees of freedoms as
they relate to assembly, press and speech. It does not unfortunately
guarantee common sense and a thorough review of all possible
reactions/results of exercising that freedom. Many cloak themselves
in the First Amendment words - fewer still cloak themselves in ethical
standards that bring credibility to their work and to the causes that
they advocate. The Computer Underground must win
respect/understanding in all phases of society or it will relegated to
a niche in that society.
------------------------------
Date: Fri, 31 Jul 1992 17:58:48 -0700
From: Emmanuel Goldstein <emmanuel@WELL.SF.CA.US>
Subject: File 4--New 2600 and 2600 Meetings
The summer issue of 2600 has been released. Subscribers should have it
no later than the early part of next week. Included within is the
latest on Bellcore's lawsuit threat against us, as well as a complete
guide to the different kinds of telephone signalling systems used
throughout the world (written by a real heavyweight in the phone
phreak world), a review of the Dutch demon dialer, a tutorial on
"portable hacking", tips on defeating call return (*69), a guide to
voice mail hacking, plus letters, news updates, revelations of an
interesting nature (more Bellcore stuff) plus a whole lot more.
On Friday, August 7th, we'll be having meetings in six American
cities. We expect all of these meetings to continue on a monthly
basis. Please spread the word. NEW YORK: Citicorp Center (between
Lexington and 3rd) downstairs in the lobby by the payphones. Payphone
numbers: 212-223-9011, 212-223-8927, 212-308-8044, 212-308-8162.
WASHINGTON DC: Pentagon City mall. CHICAGO: Century Mall, 2828 Clark
St, lower level, by the payphones. Payphone numbers: 312-929-2695,
2875, 2685, 2994, 3287. ST. LOUIS: At the Galleria, Highway 40 and
Brentwood, lower level, food court area, by the theaters. LOS ANGELES:
At the Union Station, corner of Macy St. and Alameda. Inside main
entrance by bank of phones. Payphone numbers: 213-972-9358, 9388,
9506, 9519, 9520, 213-625-9923, 9924, 213-614-9849, 9872, 9918, 9926.
SAN FRANCISCO: 4 Embarcadero Plaza (inside). Payphone numbers:
415-398-9803,4,5,6.
There is no agenda at a 2600 meeting, no formalities of any kind, no
dress code (except maybe in St. Louis), and no constraints other than
common sense. People generally get together, trade information, meet
people, look for feds, and do whatever else comes to mind (all
legally, of course). Each meeting runs approximately from 5 pm to 8
pm local time on the first Friday of the month. Anyone wanting to
organize a meeting in another city should contact 2600 at our office:
(516) 751-2600.
Our voice mail system is now a voice bulletin board system every night
beginning at 11 pm Eastern time. You can reach it at 0700-751-2600
through AT&T. If you're using another long distance carrier, preface
that number with 10288. It costs 15 cents a minute and all of the
money goes to AT&T. Whoopee.
Permission is hereby granted to repost this message with the intention
of spreading news of the above.
((Moderators' note: 2600 can be contacted at:
directly at emmanuel@well.sf.ca.us or 2600@well.sf.ca.us
or sub for one year for $21 and mail it to:
2600 Magazine
PO Box 752
Middle Island, NY 11953
------------------------------
Date: Mon, 27 Jul 1991 10:19:51 PDT
From: kram@ull.edy.edu
Subject: File 5--Is Bellcore Guilty of Stealing Copyright Information?
I read about Bellcore's threat against 2600 and wondered why nobody
made the connection between Bellcore and the Secret Service raids in
1990. The letter that Bellcore sent to 2600 was in that same petty
spirit. Bellcore made some vague threats about an unidentified
article that may or may not have been a copyright violation. This is
consistent with what they did a few years ago.
Bellcore's attempt to intimidate 2600 into silence sounds a bit like
the goring ox roaring even before it itself is gored. Bell
Communications Research, known as Bellcore, employed Henry M.
Kluepfel as a security specialist and David Bauer, a R&D security
technoid. Both have testified in hacker trials. Kluepfel was involved
in the Sun Devil and earlier investigations. He was on The Phoenix
Project bbs, where he routinely logged posts and sent them to the
Secret Service. The posters held the copyright, and Kluepfel, a
private citizen, took them without authorization or permission. These
were proprietary, and Bellcore, through its agent Henry Kluepfel,
clearly engaged in a conspiratorial scheme to obtain proprietary
information. Release of the information and subsequent use out of
context may be a criminal copyright infringement under 17 USC 506. Who
can ever forget how those posts were used by the Secret Service to
show that the claim that kermit is a 7-bit protocol is obvious
evidence of a conspiracy? This led to the unjustified raid on Steve
Jackson Games. Given the pattern of Bellcore's paid accomplice to
systematically, willfully, and knowingly engage in acts of obtaining
proprietary information, the RICO Act (18 USC 1962) might be fun to
invoke against Bellcore.
If Bellcore considers Emmanuel Goldstein guilty of obtaining
proprietary information, then I strongly suggest that the users of The
Phoenix Project have an equally valid claim that Bellcore was
responsible for stealing copyright material from users. Maybe all
ex-Phoenix Project users should send Bellcore some letters. The
address listed on the letter to 2600 was
Leonard Charles Suchyta
LCC 2E-311
290 W. Mt. Pleasant Avenue
Livingston, NJ 07039
+++
((MODERATORS' COMMENT: The above poster refers to The Mentor's BBS,
known as The Phoenix Project. Logs and other information taken from
TPP were instrumental in justifying the raid on Steve Jackson games.
In the Secret Service search affidavit for Steve Jackson Games, Henry
Kluepfel was listed as a "source of information." A substantial portion
of this information was derived from 17 messages of logs from The
Phoenix Project written from Jan. 23 through Jan. 29, 1990. CuD #2.11
includes the complete affidavit and commentary.
The reference to a description of Kermit by The Mentor as evidence of
his participation in an encryption conspiracy read:
>Name: The Mentor #1
>Date: Fri Jan 26 10:11:23 1990
>
>Kermit is a 7-bit transfer protocol that is used to transfer
>files to/from machines. It is mostly found on mainframes (it's a
>standard command on VAX, for instance). Kermit has the added
>advantage of being able to work through an outdial (because it is
>7-bit).
>
>Mentor
We share the poster's concern with the action of Bellcore's Henry
Kluepfel. In that search affidavit, Timothy Foley wrote that Kluepfel
indicted that TPP's users' list contained the names of two "hackers"
from Illinois' Northern Federal District. To the best of our
knowledge (and to the knowledge of those familiar with the users' list
during this period), the only two names on it from the Northern
District (former US prosecutor William J. Cook's jurisdiction) were
the CuD moderators. Given the rather strange logic by which evidence
is fabricated by some prosecutors, perhaps Bellcore should first apply
to its own employees the same standards of integrity and honesty it
expects from others.
Because of his actions, Henry Kluepfel was named as a co-defendant in
a civil suit brought against him, Bill Cook, Timothy Foley, and
others, by Steve Jackson Games in 1991. The litigation, alleging civil
rights violations, is still pending.
------------------------------
Date: Sat, 1 Aug 92 23:58:14 PDT
From: infogroup@unixville.com
Subject: File 6--Update on Len Rose
Len Rose was released from the federal penitentiary in South
Carolina in March after serving 10 months of a one year sentence
for unauthorized possession of Unix sourcecode. He completed the
remaining two months in a community release center in Chicago.
He is now working in Silicon Valley, and involved in some innovative
work. He is working on a project that involves feeding Usenet news and
Internet mail onto a satellite which basically provides a full news
and mail feed anywhere in continental US.
His wife and kids are still living in Chicago, and will hopefully be
able to join him soon. He is also doing consulting work in California,
so it looks like his life may be back on track.
When I recently spoke with Len, he said "... with the exception of my
financial condition, I am probably happier than I have ever been .."
He also mentioned that he is trying to contact everyone who ever
helped him , to say "Thanks" personally, so feel free to send mail to
him at: "len@netsys.com" and he will get in touch with you.
Perhaps there are happy endings after all.
------------------------------
Date: Fri, 31 Jul 1991 22:15:54
From: Jim Thomas <cudigest@mindvox.phantom.com>
Subject: File 7--Biblio resource: "Computer Crime" Handbook
A panel on computer crime, sponsored by the Chicago Bar Association,
led to an edited collection of documents, including articles and
federal statutes, that provides a helpful resource for those interested
in a basic background on crime and computer technology. The volume,
in spiral/desktop publishing format, includes a set of "hypotheticals"
used for organizing the panel discussion. However, the responses of
the panelists (which included William C. Cook, Sheldon Zenner, Robert
Gustafson and Bernard P. Zajac, Jr.) were not included.
The strength of the work is the appenix, which includes a list of
potential violations (matched to their statutes) that may be
prosecuted under various federal statutes; Copies of most relevant
federal legislation governing recent "hacker" indictments; Comments on
selected federal statutes; and reprints of articles from the National
Institute of Justice and by John Perry Barlow, Buck BloomBecker, and
others. It also includes a David R. Johnson's testimony regarding
Senate Bill 2476, and a basic annotated bibliography of books,
articles, journals, and other resources as pointers to further
information on these issues.
The volume is about 150 pages (unpaginated, unindexed) and is
available at cost (about $20). For further information, contact
Joanna Alperin
Chicago Bar Association
321 South Plymouth Court
Chicago, IL 60604-3997
------------------------------
Date: Wed, 29 Jul 1991 17:34:18 CST
From: Moderators <tk0jut2@mvs.cso.niu.edu>
Subject: File 8--Dr Ripco Summarizes his Legal Status since Sun Devil
((Moderators' note: We asked Dr Ripco to give a detailed summary of
all that has changed in his legal status in the past 18 months.
Following is his summary of what's changed)).
Dear Jim:
Sincerely,
Dr Ripco
+++
((MODERATORS' NOTE: Dr Ripco's status on 1 August 1992 is identical to
his status on May 8, 1990, the morning of the raid by the secret
service and others. Although never charged, and although there is to
date no evidence that he was involved in any criminal behavior, none
of his equipment has been returned, he has not been contacted by law
enforcement agents in over two years, he has not heard from attorneys
he believed were helping him in the return of his equipment, and he
has received no information about when, if ever, he can reclaim his
equipment. In short, he has no idea, nor has he been able to learn,
what's happening. Kafka's The Trial should be required reading for
everybody.
------------------------------
Date: Mon, 20 Jul 1992 13:15:21 -0400
From: Christopher Davis <ckd@EFF.ORG>
Subject: File 9--Documents Available: Open Platform Overview, Life in Virtual
+======+==================================================+===============+
| FYI | Newsnote from the Electronic Frontier Foundation | July 20, 1992 |
+======+==================================================+===============+
ELECTRONIC FRONTIER FOUNDATION'S
OPEN PLATFORM PROPOSAL AVAILABLE VIA FTP
The full text of the EFF's Open Platform Proposal is available in
its current draft via anonymous ftp from ftp.eff.org as
pub/EFF/papers/open-platform-proposal.
To retrieve this document via email (if you can't use ftp), send mail to
archive-server@eff.org, containing (in the body of the message) the
command 'send eff papers/open-platform-proposal'. This is the proposal
in its 4th draft and is up-to-date as of July 2.
HOWARD RHINEGOLD'S "VIRTUAL COMMUNITIES, 1992" AVAILABLE VIA FTP
This is the full text of Howard Rhinegold's illuminating essay "A Slice
of Life In My Virtual Community" that was serialized in EFFector Online.
You can retrieve this document via anonymous ftp from ftp.eff.org as
pub/EFF/papers/cyber/life-in-virtual-community. To retrieve it via
email (if you can't use ftp), send mail to archive-server@eff.org,
containing (in the body of the message) the command 'send eff
papers/cyber/life-in-virtual-community'.
+=====+=====================================================+=============+
| EFF | 155 Second Street, Cambridge MA 02141 (617)864-0665 | eff@eff.org |
+=====+=====================================================+=============+
------------------------------
Date: Wed, 29 Jul 1992 15:27:38 EDT
From: Paul Hyland <PHYLAND@GWUVM.BITNET>
Subject: File 10--CPSR Recommends NREN Privacy Principles
PRESS RELEASE
July 24, 1992
CPSR Recommends NREN Privacy Principles
WASHINGTON, DC -- Computer Professionals for Social Responsibility
(CPSR), a national public interest organization, has recommended
privacy guidelines for the nation's computer network.
At a hearing this week before the National Commission on Library and
Information Science, CPSR recommended a privacy policy for the
National Research and Education Network or "NREN." Marc Rotenberg,
Washington Director of CPSR, said "We hope this proposal will get the
ball rolling. The failure to develop a good policy for the computer
network could be very costly in the long term."
The National Commission is currently reviewing comments for a report
to the Office of Science and Technology Policy on the future of the
NREN.
Mr. Rotenberg said there are several reasons that the Commission
should address the privacy issue. "First, the move toward
commercialization of the network is certain to exacerbate privacy
concerns. Second, current law does not do a very good job of
protecting computer messages. Third, technology won't solve all the
problems."
The CPSR principles are (1) protect confidentiality, (2) identify
privacy implications in new services, (3) limit collection of personal
data, (4) restrict transfer of personal information,(5) do not charge
for routine privacy protection, (6) incorporate technical safeguards,
(7) develop appropriate security policies, and (8) create an
enforcement mechanism.
Professor David Flaherty, an expert in telecommunications privacy law,
said "The CPSR principles fit squarely in the middle of similar
efforts in other countries to promote network services. This looks
like a good approach."
Evan Hendricks, the chair of the United States Privacy Council and
editor of Privacy Times, said that the United States is "behind the
curve" on privacy and needs to catch up with other countries who are
already developing privacy guidelines. "The Europeans are racing
forward, and we've been left with dust on our face."
The CPSR privacy guidelines are similar to a set of principles
developed almost 20 years ago called The Code of Fair Information
practices. The Code was developed by a government task force that
included policy makers, privacy experts, and computer scientists. The
Code later became the basis of the United States Privacy Act.
Dr. Ronni Rosenberg, who has studied the role of computer scientists
in public policy, said that "Computer professionals have an important
role to play in privacy policy. The CPSR privacy guidelines are
another example of how scientists can contribute to public policy."
For more information about the Privacy Polices and how to join CPSR,
contact CPSR, P.O. Box 717, Palo Alto CA 94302. 415/322-3778 (tel)
and 415/322-3798 (fax). Email at cpsr@csli.stanford.edu.
++++++++++++
[Moderator's note: The full text of the referenced NREN Privacy
Principles is available from the CPSR Listserv file server. Send
the command:
GET NREN PRIVACY
to listserv@gwuvm.gwu.edu, as the text of an e-mail message. -peh]
------------------------------
Date: Fri, 31 Jul 1991 22:15:54 EDT
From: Jim Thomas <cudigest@mindvox.phantom.com>
Subject: File 11--Biblio resource: "Computer Crime" Handbook
A panel on computer crime, sponsored by the Chicago Bar Association,
led to an edited collection of documents, including articles and
federal statutes, that provides a helpful resource for those interested
in a basic background on crime and computer technology. The volume,
in spiral/desktop publishing format, includes a set of "hypotheticals"
used for organizing the panel discussion. However, the responses of
the panelists (which included William C. Cook, Sheldon Zenner, Robert
Gustafson and Bernard P. Zajac, Jr.) were not included.
The strength of the work is the appenix, which includes a list of
potential violations (matched to their statutes) that may be
prosecuted under various federal statutes; Copies of most relevant
federal legislation governing recent "hacker" indictments; Comments on
selected federal statutes; and reprints of articles from the National
Institute of Justice and by John Perry Barlow, Buck BloomBecker, and
others. It also includes a David R. Johnson's testimony regarding
Senate Bill 2476, and a basic annotated bibliography of books,
articles, journals, and other resources as pointers to further
information on these issues.
The volume is about 150 pages (unpaginated, unindexed) and is
available at cost (about $20). For further information, contact
Joanna Alperin
Chicago Bar Association
321 South Plymouth Court
Chicago, IL 60604-3997
------------------------------
Date: Mon, 20 Jul 1992 14:48:39 EDT
From: Paul Hyland <PHYLAND@GWUVM.BITNET>
Subject: File 12--Updated CPSR Archive Listing
Following is an updated version of the file CPSR ARCHIVE, which lists
the files stored on our Listserv archive. This is the last time that
this entire file will be distributed to the list. From now on, I will
periodically send mail containing only the updates (add/change/delete).
Users can also subscribe to any of our files, and receive either notice
or the file itself when it is changed. For information on this and other
Listserv File Server features, send the command:
INFO LISTFILE
The command INFO GENINTRO will provide an introduction to Listserv in general.
Questions, comments, or complaints should be directed to phyland@gwuvm.gwu.edu
Paul Hyland
Owner, CPSR List
******************************************************************************
This file contains a list of files available on the CPSR LISTSERV file server.
To request a copy of any file, send mail to the list server:
LISTSERV@GWUVM.GWU.EDU (Internet) or LISTSERV@GWUVM (Bitnet)
In your mail, send one line per request, using this command for each request:
GET <FILENAME> <FILETYPE>
The options for <FILENAME> and <FILETYPE> are listed below. For example:
GET CPSR BROCHURE
Note that LISTSERV is case-insensitive for command and file names.
If you have problems with this list, send mail to the administrator,
Paul Hyland (phyland@gwuvm.gwu.edu or phyland@gwuvm).
===============================================================================
CPSR INFORMATION
Filename Filetype Lines Description
-------- -------- ----- -----------
CPSR ARCHIVE 213 This file
CPSR BROCHURE 300 CPSR overview and membership form ** UPDATED **
CPSR MEMBFORM 53 CPSR membership form (also in brochure)
CPSR BOOKS 129 List of CPSR publications and order form
CPSR ALIASES 75 CPSR E-mail Aliases @csli.stanford.edu
CPSR TEN-YEAR 219 Ten-year history of CPSR, thru spring '91
CPSR PAPERS AND PROJECT DESCRIPT,SCRIPT='SPELL'IONS
Filename Filetype Lines Description
-------- -------- ----- -----------
21STCENT PROJECT 287 21st Century Project description -
To redirect U.S. Science & Technology Policy
toward peaceful and productive uses.
PRIVACY PAPER 1550 "Privacy in the Computer Age" by Ronni Rosenberg
SUNDEVIL RULING 283 Text of ruling on CPSR FOIA lawsuit seeking
Operation Sun Devil search warrant materials
CONFERENCE MATERIALS
Filename Filetype Lines Description
-------- -------- ----- -----------
PDC-92 CALL4PAP 103 Participatory Design Conference
Cambridge, MA -- November 6-7, 1992
CRYPTO INTRO 109 2nd CPSR Cryptography and Privacy Conference --
Introduction from conference materials
CFP-2 REPORT 808 Report from 2nd Conference on Computers, Freedom
and Privacy (CFP-2) -- March, 1992
CFP-2 RADIO 34 CFP-2 radio program available in late JJune
CFP-93 CALL4PAP 176 3rd Conference on Computers, Freedom, and Privacy
San Francisco, CA -- March 9-12, 1993
DIAC-92 REPORT 219 Report from Directions and Implications of
Advanced Computing (DIAC-92) -- May, 1992
CFP2 ANNOUNCE - DELETED
CFP2 SHORT - DELETED
DIAC-92 ANNOUNCE - DELETED
DIAC-92 PROGRAM - DELETED
CHI-92 REPORT 79 From ACM SIGCHI (Computer-Human Interaction)
CHI '92 session on Social Impact - May, 1992
SIGCSE REPORT 100 From ACM SIGCSE (Computer Science Education)
Debate on state licencing of programmers
IFAC CALL4PAP 199 International Federation for Automatic Control
Symposium on Automated Systems Based on
Human Skill (and Intelligence)
September 23-25, 1992, Madison, WI
MULTIMED CALL4PAP 75 _Journal of Educational Multimadia and Hypermedia_
Special Issue on Multimedia and Hypermedia
Learning Environments - Deadline: Sept 15, 1992
SAUDI CALL4PAP 57 13th National Computer Conference and Exposition
Topic: Information Technology Transfer
Riyadh, Saudi Arabia - Nov. 21-26, 1992
TECHSTUD CALL4PAP 351 _Technology Studies_ Special Issue on Technology
and Ethics - Deadline: January 15, 1993
EMC-93 CALL4PAP 161 Society for Computer Simulation - International
Emergency Management and Engineering Conference,
Arlington, VA -- March 29 - April 1, 1993
IFIP CALL4PAP 33 International Federation for Info. Processing
Working Gp 9.2 (Social Accountability of Computers)
Working conference - %Facing the Challenge of Risk
and Vulnerability in an Information Society'
May 20-22, 1993, Namur, Belgium
ED-MEDIA CALL4PAP 353 World Conference on Educational Multimedia and
Hypermedia, Orlando FL, June 23-26, 1993
EASTWEST ANNOUNCE - DELETED
COLLAB92 ANNOUNCE - DELETED
CPSR ON-LINE NEWSLETTERS
Filename Filetype Lines Description
-------- -------- ----- -----------
CPSRBERK 2Q92 425 CPSR/Berkeley Electronic Newsletter
Second Quarter - 1992
CPSR-PDX VOL5-N02 258 CPSR/Portland Electronic Newsletter *new name*
Volume 5, #02, April 1, 1992
CPSR-PDX VOL5-N03 488 CPSR/Portland Electronic Newsletter *new name*
Volume 5, #03, May 26, 1992
CPSR-PDX VOL5-N04 531 CPSR/Portland Electronic Newsletter *new name*
Volume 5, #04, June 8, 1992
CPSR-PDX VOL5-N05 819 CPSR/Portland Electronic Newsletter
Volume 5, #05, June 23, 1992
CPSR-PDX VOL5-N06 612 CPSR/Portland Electronic Newsletter
Volume 5, #06, July 13, 1992
E-MAIL DIRECTRY 625 CPSR/PDX E-mail Directory of CPSR addresses and
other interesting lists - August 22, 1991
*renamed and updated*
LEGISLATIVE MATERIALS
Filename Filetype Lines Description
-------- -------- ----- -----------
BOS-CNID SHORT 122 Testimony by CPSR/Boston on Calling Number ID
before Mass. DPU - Oral version
BOS-CNID LONG 396 Testimony by CPSR/Boston on Calling Number ID
before Mass. DPU - Written version
CAL-CNID HEARING 299 Testimony by CPSR/Palo Alto and description of
hearing before California State Assembly on CNID
FBITAP PROPOSAL 445 Updated (and renamed) FBI Digital Telephony
Proposal, to force telco's to enable FBI
taps of the evolving digital network
(with an introduction by Dave Banisar of CPSR)
FBITAP LETTER 127 Letter from CPSR and others to Senator Leahy
urging a public hearing of this FBI proposal
FBITAP COMPWRLD 130 Article on FBI Proposal in Computerworld 6/8/92
SEMATECH ENVIRO 118 Press Release from Campaign for Responsible
Technology on environmental funding in
SEMATECH reauthorization legislation
SEMATECH AMENDMNT 222 Press Release from Campaign for Responsible
Technology on proposed amendment to SEMATECH
authorization to address environmental,
community and labor concerns
SB1447 BILL 1 California Senate Bill 1447 - Privacy Act of 1992
(obsolete version deleted - revision expected)
HR2772 BILL 85 GPO Wide Information Access Network for Data
Online Act of 1991 (GPO WINDO Bill)
HR2772 FACTS 95 Taxpayer Assets Project Fact Sheet on GPO WINDO
S2813 BILL 151 GPO Gateway to Government Act of 1992
(Senate version of WINDO)
HR3459 BILL 136 Improvement of Information Access Act of 1991
(Owens Bill)
HR3459 FACTS 65 Taxpayer Assets Project Fact Sheet on Owens Bill
OMB-A130 COMMENTS 178 Taxpayer Assets Project Note on the Proposed
Revisions to OMB Circular A-130 concerning
Management of Federal Information Resources
with info on how to obtain the document and
provide comments electronically (due 8/27/92)
EDGAR RELEASE 323 Taxpayer Assets Project Press Release on letter
to the Securities and Exchange Commission (SEC)
asking that they broaden access and improve
control over the Electronic Data Gathering,
Analysis and Retrieval System (EDGAR)
S1940 BILL 145 Electronic Freedom of Information Improvement
Act of 1991
HPC ACT 636 High Performance Computing Act of 1991
Signed December 9, 1991
CRYPTO ARTICLE 217 Article on Government attempts to control spread
of cryptographic technology into the telephone
network -- Joe Abernathy, Houston Chronicle
NSA PAPERS 439 Response from NSA to Joe Abernathy questions on
their attempts to control or hinder civilian
cryptographic technology
HR5615 BILL 144 Prescription Drug Records Privacy
Protection Act of 1992
CANADIAN PRINCIPL 90 Canadian Telecommunication Privacy Principles
ONLINE RESOURCES AND OTHER MATERIALS
Filename Filetype Lines Description
-------- -------- ----- -----------
RTK-NET SRCHFORM 136 RTK NET -- the Right-to-Know Computer Network --
Introduction and on-line search request form
PRIVACY LISTS 152 Information on two new privacy-related lists
RISKS SAMPLE 541 Sample Issue of RISKS Digest - Volume 13, # 59
CUD SAMPLE 995 Sample Issue of Computer underground Digest -
Volume 4, # 26
EFFECTOR SAMPLE 597 Sample Issue of EFFector Online - Volume 2, # 01
EMAILPRV BIBLIO 136 Bibliography of materials on E-mail Privacy
PRIVACY PROJECT 44 Tapes from the Privacy Project radio series
Available from Pacifica Programming Service
TEACHING VALUES 28 Describes "Teaching Social and Ethical
Implications of Computing: A Starter Kit"
from the Research Center on Computing and
Society at Southern Connecticut State Univ.
and Educational Media Resources, Inc.
VIRTREAL GENIE 472 Genie On-Line Conference on Virtual Reality
Howard Rheingold (Whole Earth Review) - 5/3/92
(from the Public Forum * Non-profit Connection)
CYBEPUNK GENIE 480 Genie On-Line Conference on Networks and Hackers
Katie Hafner (co-author, CYBERPUNK) - 5/24/92
DHIGHWAY GENIE 722 Genie On-Line Conference on Data Highways
Steve Cisler (Aplle Computer) - 5/17/92
MAIL MANNERS 150 Describes proper e-mail etiquette
NSF JOBS 64 Two jobs with NSF Information Tech. Programs
MONTHLY ARCHIVES OF CPSR LIST SUBMISSIONS
Filename Filetype Lines Description
-------- -------- ----- -----------
CPSR LOG9110 158 From list start-up through 10/91
CPSR LOG9111 674 From prior log through 11/91
CPSR LOG9201 1619 From prior log through 1/92
CPSR LOG9202 305 From prior log through 2/92
CPSR LOG9203 1539 From prior log through 3/92
CPSR LOG9204 866 From prior log through 4/92
CPSR LOG9205 91 From prior log through 5/92
CPSR LOG9206 2192 From prior log through 6/92
CPSR LOG9207 96 From prior log through 6/92
------------------------------
End of Computer Underground Digest #4.34
************************************