Copy Link
Add to Bookmark
Report

The Art of Technology Digest 1

eZine's profile picture
Published in 
The Art of Technology
 · 5 years ago

  

The Art of Technology Digest Wednesday, July 29th, 1992

%%AoT%%%%AoT%%%%AoT%%%%AoT%%%%AoT%%%%AoT%%%%AoT%%%%AoT%%%%AoT%%%%AoT%%%%AoT%%

Editor: Chris Cappuccio (ccappuc@caticsuf.cati.CSUFresno.EDU)
Archivist: David Mitchell, Sysop, Live Wire BBS +1 313 464 1470

[AoT Digest] Contents #1 (Wed, July 29, 1992)

Article 1: Welcome to AoT Digest!
Article 2: Are You a Hacker? (CuD #4.33 Reprint)
Article 3: New! 386BSD Release 0.1!
Article 4: Linux 96c.pl2 InfoSheet
Article 5: CyberCrime International Network
Article 6: Sysop Arrested For Selling Porno Files To Juveniles
Article 7: CPSR Recommends NREN Privacy Principles
Article 8: DNA databanking

The Art of Technology Digest is distributed in the following ways:
E-MAIL: Send e-mail to ccappuc@caticsuf.cati.CSUFresno.EDU and then
put in the letter, "Please add my E-Mail address to the mailing list."
and you MUST include the maximum number of lines/bytes your site will
accept in a single e-mail message. If you are not sure about this, ask
your system operator. You can also include any comments or anything else
you want, including an article submission.
BBS: Call +1 313 464 1470, Live Wire BBS. This system maintains a
complete collection of AoT Digest. Speeds are 12oo/24oo/HST-96oo/HST-14,4oo

The Art of Technology Digest is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. AoT-D material may be reprinted as long as the source
is cited. Some authors do copyright their material, and they should
be contacted for reprint permission. It is assumed that non-personal
mail at the moderators may be reprinted unless otherwise specified.
Readers are encouraged to submit reasoned articles relating to
computer culture and communication. Articles are preferred to short
responses. Please avoid quoting previous posts unless absolutely
necessary. All articles for submission should be sent to:

ccappuc@caticsuf.cati.CSUFresno.EDU

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.

Verbosity leads to unclear, inarticulate things.
-- Vice President Dan Quayle

---------------------------------------------------------------------------

Date: Tues, 28 Jul 92
From: AoT-D Editor, Chris Cappuccio <ccappuc@caticsuf.cati.CSUFresno.EDU>
Subject: Article 1--Welcome to AoT Digest!

Welcome to the first issue of Art of Technology Digest!!
AoT Digest is an open forum dedicated to sharing information among
computerists and to the presentation and debate of diverse views.
AoT-D material may be reprinted as long as the source is cited.
Some authors do copyright their material, and they should be contacted
for reprint permission. It is assumed that non-personal mail at the
moderators may be reprinted unless otherwise specified. Readers are
encouraged to submit reasoned articles relating to computer culture
and communication. Articles are preferred to short responses.
The idea (and the format and one of the articles) of AoT Digest
is from Cu-Digest. Anyways this newsletter is for discussion of
the computer underground. It is NOT a hack/phreak newsletter, just
a rip-off of CuD with different information. Make a new file base and you're
set. I want to make this a weekly newsletter but since it's very small now,
expect something each few weeks or so. Many of the things you should expect
to find are CPSR press releases and various other Usenet articles and responses
from our readers. Hmm.. I am also hoping to make a newsgroup for AoT Digest
but I can't find the FAQ response. "Frequently Asked Question: Where do I get
the response from the 'how to start a newsgroup' FAQ???". You may also be
wondering what I moderate. Well, I assemble the whole thing, take out any
high-ASCII and replace it with normal ASCII and put in references. Words
in the articles are not changed. We REALLY want responses, either posted
on Live Wire (See DISTRIBUTION in the beginning for the phone number) or
E-Mailed to me (ccappuc@caticsuf.cati.CSUFresno.EDU). If you have anything
to say, PLEASE respond!

----------------------------------------------------------------------

Date: Fri, 24 Jul 1992 11:19:47 PDT
From: Bob Bickford <rab@well.sf.ca.us>
Subject: Article 2--Are You a Hacker? (CuD #4.33 Reprint)

[[ED: I will try not to have CuD reprints but this was a good article]]

ARE YOU A HACKER?
by Robert Bickford

Are you a Hacker? How would you know? If all you know about the word
is what you've seen on the evening news, or read in a magazine, you're
probably feeling indignant at the very question! But do those
magazine-selling headlines really describe what a Hacker is?

Some time ago (MicroTimes, December 1986) I defined a Hacker as "Any
person who derives joy from discovering ways to circumvent
limitations." The definition has been widely quoted since that time,
but unfortunately has yet to make the evening news in the way that a
teenager who robs a bank with his telephone does.

Does that teenaged criminal fit my definition? Possibly. Does that
fact make all, or even most, Hackers criminals? (Does that fact make
all or most Hackers teenagers?) Of course not! So why is there such
widespread misinformation about Hackers? Very simply, it's because
the criminal hackers, or 'Crackers', have been making news, while the
rest of us are virtually invisible. For every irresponsible fool
writing a virus program, there are at least twenty software engineers
earning a living "...discovering ways to circumvent limitations."
When the much-publicized InterNet worm was released by an
irresponsible hacker, hundreds of other Hackers applied their
considerable talents to the control and eradication of the problem:
the brilliance and creativity brought to this task are typical of the
kind of people --- Hackers ---that my definition is meant to describe.

Working on the yearly Hackers Conferences has been a mixed experience:
on the one hand, helping to bring together 200 of the most brilliant
people alive today, and then interacting with them for an entire
weekend, is immensely rewarding. On the other hand, trying to explain
to others that the Hackers Conference is not a Gathering of Nefarious
Criminals out to Wreak Havoc upon Western Civilization does get a bit
wearing at times. Also, trying to convince a caller that repeatedly
crashing his school district's computer from a pay phone will not,
emphatically not, qualify him for an invitation to the conference can
be a bit annoying. None of this would be a problem if we hadn't let a
small minority --- the Crackers --- steal the show, and become
associated with the word 'Hacker' in the minds of the general public.
The attendees at the Hackers Conferences --- many of whom hold PhDs,
and/or are Presidents or other upper management of Fortune 500
companies --- are (quite understandably) very indignant at being
confused with these Crackers.

Taking myself as an example --- no, I don't have a PhD, my only degree
is from the School of Hard Knocks, and no, I'm not working in
management ---when this article was first published [1989] I was
writing software for a company that builds medical image processing
equipment. My code controls a product that can, and often does,
either improve the quality of medical care, reduce the cost, or both.
When I develop a piece of software that goes around some limit I feel
very happy, and can often find myself with a silly grin plastered
across my face. When some ignorant reporter writes a story that
equates the work I do with expensive but childish pranks committed by
someone calling himself a "Hacker", I see red.

Are you a Hacker? If you want to break rules just for the sake of
breaking rules, or if you just want to hurt or "take revenge" upon
somebody or some company, then forget it. But if you delight in your
work, almost to the point of being a workaholic, you just might be.
If finding the solution to a problem can be not just satisfying but
almost an ecstatic experience, you probably are. If you sometimes
take on problems just for the sake of finding the solution (and that
ecstatic experience that comes with it), then you almost certainly
are. Congratulations! You're in good company, with virtually every
inventor whose name appears in your high school history book, and with
the many thousands of brilliant people who have created the "computer
revolution."

What can we do about all that bad press? Meet it head on! Tell the
people you work with that you're a Hacker, and what that means. If
you know somebody whose work habits, style, or personality make them
pretty clearly a Hacker, tell them so and tell them what you mean by
that. Show them this article!

Meanwhile, have fun finding those solutions, circumventing those
limitations, and making this a better world thereby. You are an
Artist of Technology, a Rider of the Third Wave, and at least you can
enjoy the ride!

Bob Bickford is a software consultant who lives in Marin County, often
Hacking late into the night, and (usually) enjoying it immensely. His
wife, Greta, only tolerates this because she's an animation hacker and
sometimes does the same thing. Bob can be reached through InterNet at
rab@well.sf.ca.us

(An edited version of this article appeared in Microtimes in early
1989. Copyright (c) Robert Bickford, 1989, 1992)
+++
Robert Bickford "A Hacker is any person who derives joy from
rab@well.sf.ca.us discovering ways to circumvent limitations." rab'86
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
"I recognize that a class of criminals and juvenile delinquents has
taken to calling themselves 'hackers', but I consider them irrelevant
to the true meaning of the word; just as the Mafia calls themselves
'businessmen' but nobody pays that fact any attention." rab'90
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

------------------------------

Date: Tues, Jul 28, 1992
From: AoT-D Editor, Chris Cappuccio <ccappuc@caticsuf.cati.CSUFresno.EDU>
Subject: Article 3--New! 386BSD Release 0.1!

[[ED: This is edited notes from the installation docs and distribution list
Remember that 386BSD is a FREE operating system, if you have a 386/486
and 50 megs to spare, I strongly recommend that you get this. At the
end is the list of anonymous FTP sites to get 386BSD. Have fun!!]]

Welcome to 386BSD Release 0.1, the second edition of
the 386BSD operating system created by William and Lynne
Jolitz. Like its predecessor, 386BSD Release 0.0, Release
0.1 comprises an entire and complete UNIX-like operating
system for the 80386/80486-based AT Personal Computer.

386BSD Release 0.1 is an enhanced version of the origi-
nal release done by William F. Jolitz, the developer of
386BSD. 386BSD Release 0.0 was based on the Networking
Software, Release 2 from the University of California at
Berkeley EECS Department, and included much of the 386BSD
work done earlier by Bill and contributed by us to the
University. The latest release, 386BSD Release 0.1, con-
tains new work by the developer and many new items which
have been freely contributed by other software developers
for incorporation into 386BSD (see the file CONTRIB.LIST).
These contributions have increased the functionality and
made it more robust.

386BSD is intended for research, development, educa-
tion, and just plain exploration. Source, Binary, Installa-
tion, and Fix-It floppies are available at a large number of
sites. There are many user groups, support groups, computer
societies and individuals who are supplying and running
386BSD and they are good sources of information and support.

386BSD Release 0.1 is intended to be widely used by
those interested in "pushing the envelope" towards the for-
mation and development of innovative ideas in computer tech-
nology. As such, we have spent considerable time developing
a system which is simple to partition and install and
emphasizes stability and completeness.


Among the many new features of 386BSD (from release 0.0):


* New "Tiny 386BSD" System Installation Floppy

* Simplified installation procedures.

* 386BSD partitioning for use on an MS-DOS system.

* Compressed, multivolume CPIO dump format
binary/source/other distribution sets on MS-DOS flop-
pies.

* 387 emulation.

* SCSI support.

* CD-ROM support.

* NFS, TCP/IP and full networking.

* New 386BSD "Fix-It" System Maintenance Floppy.

* New "Additional User Software" MS-DOS floppy dump.


<< 386BSD RELEASE 0.1 -- DISTRIBUTION HOST SITES >>


agate.berkeley.edu 128.32.136.1
gatekeeper.dec.com 16.1.0.2
MATH.ORST.EDU 128.193.16.60
UTKUX1.UTK.EDU 128.169.200.67
terminator.cc.umich.edu 141.211.164.8
nic.funet.fi 128.214.6.100
dsuvax.dsu.edu 138.247.32.2
altair.cis.ksu.edu 129.130.10.84
hpcsos.col.hp.com 15.255.240.16 [ Internal HP sites only ]
math.niu.edu 131.156.3.4
sune.stacken.kth.se 130.237.234.42
raquel.doc.ic.ac.uk 146.169.11.3
rusmv1.rus.uni-stuttgart.de 129.69.1.12
HELIUM.CLUB.CC.CMU.EDU 128.2.55.10
banjo.concert.net 192.101.21.6
kirk.bu.oz.au 131.244.1.1
grand.central.org 192.54.226.100
pascal.math.fu-berlin.de 130.133.4.50
capella.eetech.mcgill.ca 132.206.1.17
ftp.ibr.cs.tu-bs.de 134.169.34.15
f.ms.uky.edu 128.163.128.6
azathoth.sura.net 128.167.254.184

------------------------------

Date: 07/24/92
From: Linus Benedict Torvalds <torvalds@kruuna.Helsinki.FI>
Subject: Article 4--Linux 96c.pl2 InfoSheet

finger torvalds@kruuna.helsinki.fi

Free UNIX for the 386
The current version of linux is a 0.96c, released 92.07.04. There is a
0.96 rootdisk that should be used with the new versions: it fixes a lot
of things with the old rootdisks and contains more programs due to the
shared libraries. Patch 2 to 0.96c was released 92.07.18, and
implemented the msdos filesystem as well as correcting some problems
with the IRQ code.
0.96c supports X11r5 and the new gcc-2.1 (and newer) libraries with
multiple shared libs - as well as any old binaries (except the 0.12
version of gdb which used the older ptrace() interface). 0.96c also
contains support for debugging (core-dumping and attach/detach) as well
as profiling (use gcc-2.2.2 for the profiling code)
Linux can be gotten by anonymous ftp from 'nic.funet.fi' (128.214.6.100)
in the directory '/pub/OS/Linux'. This directory structure contains all
the linux OS- and library-sources, and enough binaries to get going. To
install linux you still need to know something about unices: it's
relatively straightforward to install, but the documentation sucks raw
eggs, and people with no previous unix experience are going to get very
confused.
There are now a lot of other sites keeping linux archives. Some of them
are:
tsx-11.mit.edu (18.172.1.2):
directory /pub/linux
banjo.concert.net (192.101.21.6):
directory /pub/Linux
yagi.ecei.tohoku.ac.jp (130.34.222.67)

(and many additional sites: there are now sites in the uk, japan etc
that carry linux, but I have lost count)
There is also a mailing list set up 'Linux-activists@niksula.hut.fi'.
To join, mail a request to 'Linux-activists-request@niksula.hut.fi'.
It's no use mailing me: I have no actual contact with the mailing-list
(other than being on it, naturally).
There is also a newsgroup that contain linux-related questions and
information: comp.os.linux.
Mail me for more info:
Linus Torvalds (torvalds@kruuna.Helsinki.FI)
Pietarinkatu 2 A 2
00140 Helsinki
Finland
0.96c.pl2 has these new features (relative to unpatched 0.96c)
- select() through the VFS routines
- faster and more general sleep/wakeup routines
- easily installable IRQ's
- bus-mouse driver
- msdos filesystem
0.96c has these new features (relative to 0.96b)
- alpha-testing code of the extended filesystem
- serial line changes (changeable irq's etc)
- pty/console fixes.

------------------------------

Date: 7/19/92
From: Midnight Sorrow
Subject: Article 5--CyberCrime International Network

+---------------------------------------------------+
| CYBERCRIME INTERNATIONAL NETWORK |
| CURRENTLY OFFERED SUBBOARDS: (Updated 07/19/92) |
+---------------------------------------------------+

+----------------------------------------------------------------------+
| COMPUTER-RELATED: | |
| | |
| INF-GRUP Groups | Elite Group Discussion |
| INF-BBS BBS Ads | ANSi System Advertisements |
| INF-PROG Programming | Turbo Pascal, Turbo C, Assembly |
| INF-BSFT BBS Software | BBS Software Discussion |
| INF-MTSK Multitasking | DESQview, Windows, OS/2, Unix |
| INF-TECH Technical Talk | High Technology Discussion |
| INF-PARS Paragon Support | Paragon/Revelation Support |
| INF-SBRD Sound Board Support | Adlib, Soundblaster, etc |
|----------------------------------------------------------------------|
| ART GROUP ECHOES: | |
| | |
| INF-ICE iCE | Insane Creator Enterprises |
| INF-LTD LTD | Licensed To Draw |
| *INF-TIA TiA | The Insane Artists |
| *INF-ACID ACiD | ANSi Creators in Demand |
| INF-DEAD DeAD | Damn Excellent Art Designers |
| INF-GRIM GRiM | Graphics Rendered in Magnificence |
| INF-MIRG MiRAGE | MiRAGE - Redefining Elite |
|----------------------------------------------------------------------|
| ILLEGAL ACTIVITIES: | |
| | |
|% INF-PYRO Explosives | Manufacturing Combustibles |
| INF-PHC Hack/Phreak #1 | Basic Hack/Phreak Discussion |
|% INF-HAK Hack/Phreak #2 | Advanced Hack/Phreak Discussion |
|% INF-VIRI Virus Discussion | Viral Programming and Defense |
| INF-NPD Software Releases | New Software Discussion |
|% INF-REVG The Art of Revenge | What Comes Around Goes Around |
|----------------------------------------------------------------------|
| INTELLIGENT DISCUSSIONS: | |
| | |
| INF-POEM Creativity | Poetry, Short Stories, Etc |
| INF-PARA The Occult | Paranormal/Parapsychology |
| INF-NEWS World Occurances | World News and Politics |
| INF-DRUG Controlled Substances | Drugs and Addictive Substances |
|----------------------------------------------------------------------|
| MUSIC: | |
| | |
| INF-METL Metal | Rock/Heavy Metal |
| INF-BASS Bass/Rap | The Quest For The Boom |
| *INF-MUSI Musicians | Musicians & General Music |
| INF-ALT Progressive | Alternative/Techno Tunes |
| INF-LYRC Music Lyrics | Assorted Music Lyrics Forum |
|----------------------------------------------------------------------|
| MISCELLANEOUS: | |
| | |
| INF-COMC Comics | Comic Book Discussion |
| INF-BUY For Sale | Classified Advertisements |
| INF-KING Stephen King | Stephen King and Other Horror |
| INF-BOOK Books & Reading | New Books and Stories |
| INF-MOVI Movies/Television | Visual Entertainment Discussion |
|! INF-GEN General Discussion | Miscellaneous Bullshit |
|----------------------------------------------------------------------|
| SYSOPS/CO-SYSOPS ONLY: | |
| | |
|! INF-SYS CyberCrime Sysops | Network Sysop Echo |
|! INF-TEST Test Message Echo | New Site Message Testing |
|! IMPERIAL Imperial Sysop Net | International SysOp Connection |
+----------------------------------------------------------------------+

* = New To CyberCrime
! = Required For ALL CyberCrime Systems
% = H/P Restricted - Available Only To Qualified Systems and Users

CyberCrime International Network is seeking new nodes to add to its
rosters. CyberCrime International Network is a high activity, elite-
oriented, large-growth-potential, intelligent-discussion-based network.

If you are running a Fidonet-compatible system then please continue
reading. (ie: LSD, Telegard, TAG, WWiV, Remote Access, Omega, QBBS,
Paragon, Infinity, Revelation, Cypher, PCBoard, Prodoor, and versions of
Celerity, Prism, and other Forum Hacks possibly supporting FidoNet.)

One of the most unique aspects of CyberCrime (over most OTHER
networks) is that you don't need to have ALL of these subboards on your
system. Select ONLY the ones you or your users are interested in.
Aside from the three required subs (see ! above), that's all you need to
carry, and you can always add in more subs in the future.

If you're interested, call Infinite Darkness. 3O5-525-4722, all
baud rates supported. You may either apply as a NEW user, or login as
handle = CYBERCRIME and password = DEATH. Follow the instructions,
and fill out the CyberCrime Node Application. Once you are through,
create a new, validated account on your system, as handle = MIDNIGHT
SORROW, password = INK and phone = xxx-xxx-9435. Midnight Sorrow will
eventually call your board (it MUST be a full-time system!), login, and
upload everything you need to join. Setup is easy, and extensive help
is available should you need it. CONSIDER IT!

Later,

Midnight Sorrow.

------------------------------

Date: Thu Jul 23 00:27:24 1992
From: aa381@cleveland.Freenet.Edu
Subject: Article 6--Sysop Arrested For Selling Porno Files To Juveniles

**SYSOP ARRESTED FOR PORNO FILES TO JUVENILES**
Mark Lehrer, sysop of AKRON ANOMALY BBS


MUNROE FALLS OH, July 21, 1992. Munroe Falls Police Chief
Steve Stahl knows computers are big with kids these days, but he
never thought he'd see the day when a healthy 15-year-old boy would
choose a floppy disk over a Playboy centerfold.

But now that Stahl's seen some of the floppy disks popular
with local youths, he understands the fascination.

"Give me any kid, I know what he's going to download," Stahl
said.

In May, Munroe Falls Police received a complaint from a
resident who feared that a local computerized community BBS
containing sexually explicit material might be accessible to
children.

Stahl said the resident showed him files called "Alison" and
"amber," both of which featured naked women. He told the concerned
resident, "Oh, well, I can see how that would be upsetting."

For the past two months, police conducted an investigation and
sting using a local 15-year-old boy. After the youth was able to
hook into the BBS, police arrested Mark Lehrer, 22, owner and
operator of AKRON ANOMALY, a 1000 member BBS. POLICE ALSO SEIZED
ALL OF LEHRER'S COMPUTER EQUIPMENT.

Lehrer is accused of distributing graphic sexual material via
a computer modem from the Munroe Falls home of his parents, David and
Susan Lehrer. His father, also a computer professional, is chairman of
the Village's Charter Review Commission. Mark has been charged in
Cuyahoga Falls Municipal Court with one count each of disseminating
matter harmful to juveniles and possession of criminal tools - in this
case, his computer and graphic files.

A preliminary hearing is scheduled for July 21, 1992. The
case will probably be turned over to a Summit County Grand Jury,
which means potential indictment for a felony and, if convicted,
over a year in state prison.

Chief Stahl said this will be the first case in northeast Ohio
and one of the first in the state, in which an adult is accused of
distributing graphic sexual materials *to juveniles* via a
computer.

"There's not a whole lot of case law on this kind of this," he
said, adding that most material comes from books, magazines or
movies.

According to Stahl, members of AKRON ANOMALY paid $15 to $30
a year to call the board, giving access to games like chess,
basketball, euchre, programming instructions and *.GIF files -
(G)raphic (I)nterface (F)iles, that feature pictures from James
Bond to Capt. Kirk to Scooby-Doo.

Some are labeled specifically for adults and are not supposed
to be accessible to those under 18, while many others are contained
in a general directory. However, when police seized Lehrer's
records, they found that even the "clean" files contained images
"not entirely wholesome."

"One was Bugs Bunny eating a carrot, one was Bart Simpson
riding a skateboard, and one was called (a slang term for oral sex)
and that was in the 'clean' file," Stahl said.

Stahl said many files not listed in the "adult" category
contained pictures of naked women and of naked women engaging in
sexual acts. One file allegedly shows a nude image of Christina
Applegate, who plays "Kelly" on the TV show "Married with Chil-
dren."

"Parents are happy their kids are upstairs using their
computers. The one parent we talked to was thrilled they weren't
finding PLAYBOY magazine. Well, I've got news for you, this is a
rude awakening," Stahl said.

In addition to the "graphic still images," juveniles were able
to access adult movies, which are shown on computer monitors.
"It's like watching cable TV. It's a very clear picture," Stahl
said.

Stahl said computer experts with the Ohio Bureau of Criminal
Identification and Investigation are reviewing the hundreds of
computer files seized from Lehrer's home. Stahl said it's possible
that some of the games and movies are being accessed in violation
of copyright laws.

"I'm not saying it's obscene because I'm not getting into that
battle, but it's certainly not appropriate for kids, especially
without parental permission," Stahl said.

============================================
Adapted by Jeff Gerber, lawyer/sysop aa381@cleveland.freenet.edu
from The Cleveland Plain Dealer, July 21, 1992, story by Deborah A.
Winston, PD Reporter.

Anyone with further data on this or similar cases is invited to
post it here.

--
Jeff Gerber, lawyer/sysop aa381@Cleveland.freenet.edu

PLEASE NOTE: The information contained on this system is not
intended to supplant individual professional consultation,
but is offered as a community education service. Advice on
individual problems should be obtained directly from a professional.

------------------------------

Date: Wed, 29 Jul 1992 15:27:38 EDT
From: Paul Hyland <PHYLAND%GWUVM.BitNet@pucc.PRINCETON.EDU>
Subject: Article 7--CPSR Recommends NREN Privacy Principles

PRESS RELEASE

July 24, 1992

CPSR Recommends NREN Privacy Principles


WASHINGTON, DC -- Computer Professionals for Social Responsibility
(CPSR), a national public interest organization, has recommended
privacy guidelines for the nation's computer network.

At a hearing this week before the National Commission on Library and
Information Science, CPSR recommended a privacy policy for the National
Research and Education Network or "NREN." Marc Rotenberg, Washington
Director of CPSR, said "We hope this proposal will get the ball rolling.
The failure to develop a good policy for the computer network could be
very costly in the long term."

The National Commission is currently reviewing comments for a report to
the Office of Science and Technology Policy on the future of the NREN.

Mr. Rotenberg said there are several reasons that the Commission should
address the privacy issue. "First, the move toward commercialization of
the network is certain to exacerbate privacy concerns. Second, current
law does not do a very good job of protecting computer messages. Third,
technology won't solve all the problems."

The CPSR principles are (1) protect confidentiality, (2) identify
privacy implications in new services, (3) limit collection of personal
data, (4) restrict transfer of personal information,(5) do not charge
for routine privacy protection, (6) incorporate technical safeguards,
(7) develop appropriate security policies, and (8) create an
enforcement mechanism.

Professor David Flaherty, an expert in telecommunications privacy law,
said "The CPSR principles fit squarely in the middle of similar efforts
in other countries to promote network services. This looks like a good
approach."

Evan Hendricks, the chair of the United States Privacy Council and
editor of Privacy Times, said that the United States is "behind the
curve" on privacy and needs to catch up with other countries who are
already developing privacy guidelines. "The Europeans are racing
forward, and we've been left with dust on our face."

The CPSR privacy guidelines are similar to a set of principles developed
almost 20 years ago called The Code of Fair Information practices.
The Code was developed by a government task force that included policy
makers, privacy experts, and computer scientists. The Code later became
the basis of the United States Privacy Act.

Dr. Ronni Rosenberg, who has studied the role of computer scientists in
public policy, said that "Computer professionals have an important role
to play in privacy policy. The CPSR privacy guidelines are another
example of how scientists can contribute to public policy."

For more information about the Privacy Polices and how to join CPSR,
contact CPSR, P.O. Box 717, Palo Alto CA 94302. 415/322-3778 (tel) and
415/322-3798 (fax). Email at cpsr@csli.stanford.edu.

[Moderator's note: The full text of the referenced NREN Privacy
Principles is available from the CPSR Listserv file server. Send
the command:

GET NREN PRIVACY

to listserv@gwuvm.gwu.edu, as the text of an e-mail message. -peh]

------------------------------

Date: Wed, 29 Jul 1992 15:31:25 EDT
From: Gary Chapman <chapman@silver.lcs.mit.edu>
Subject: Article 8--DNA databanking

Today (7/28) the Wall Street Journal features an article (page B1) on
DNA databanking, the FBI's computer database of DNA data, and the
concerns of critics. The article reports that fifteen states now have
DNA databanking programs, and it is estimated that double that number
will have such programs in place by 1995. There have been 600 trials
using DNA as evidence since 1988. Next year the FBI is scheduled to
link state programs in a nation-wide computer network.

The article describes the first "cold search" of DNA databanks, in a
Minnesota case in which a defendant was arrested for the rape and murder
of a Minneapolis woman on the basis of a DNA match appearing in the
state's computerized system. The crime-scene DNA was acquired from a
sperm sample and it matched a sample collected from a convicted sex
offender when he was a prisoner.

Last week the Massachusetts Supreme Judicial Court, the highest court in
the state, ruled that DNA matching may not be used as conclusive
prosecutorial evidence in a criminal trial, although the lack of a match
can be used as a defense. Massachusetts is the only state in the
country that has produced such a court ruling -- all of the other 40
appellate court rulings have been in favor of using DNA evidence in
support of the prosecution's case. The Massachusetts court said that
there is insufficient scientific consensus on the validity of DNA
matching. The court cited a recent report by the National Research
Council, which said that the state of the art leaves the technology open
to doubt. But this could change in the future, and the Massachusetts
ruling does not rule out DNA evidence if the technology generates a
tighter scientific consensus.

Nachama Wilker, executive director of the Council for Responsible
Genetics in Cambridge, Massachusetts, says that the collection of DNA
samples from all prisoners is a slippery slope that will affect the use
of DNA in non-criminal social transactions, such as eligibility for
insurance, employment opportunity, and other forms of discrimination.
She says in The Wall Street Journal that there are no guarantees that
DNA data collected from prisoners will be used exclusively for criminal
justice procedures, and she argues that DNA evidence should only be used
for serious crimes with demonstrated patterns of repeated offenses.
Some states have passed legislation protecting the confidentiality of
DNA data, such as Wisconsin, which prohibits DNA data from being used
for insurance eligibility or employment evaluation. Only five states
have such laws on the books, however. Some public interest advocates
are supporting a DNA Identification Bill in the Congress, already passed
by the House, that would enforce confidentiality, limit the use of DNA
data, and impose federal standards on state laboratories. The NRC
report also called for laboratory accreditation by federal agencies.


------------------------------

**********************************
End of Art of Technology Digest #1

next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT