Dec 192017
Computer Underground Digest #6.39.
File CUD639.ZIP from The Programmer’s Corner in
Category Various Text files
Computer Underground Digest #6.39.
File Name File Size Zip Size Zip Type
CUD639.TXT 51780 18321 deflated

Download File CUD639.ZIP Here

Contents of the CUD639.TXT file

Computer underground Digest Sun May 1, 1994 Volume 6 : Issue 39
ISSN 1004-042X

Editors: Jim Thomas and Gordon Meyer ([email protected])
Archivist: Brendan Kehoe
Retiring Shadow Archivist: Stanton McCandlish
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Suspercollater: Shrdlu Nooseman

CONTENTS, #6.39 (May 1, 1994)

File 1--Having Problems Receiving CuD on the Mailing List?
File 2--Clipper Petition Delivered to White House
File 3--"Child Abuse in Cyberspace" (Newsweek story)
File 4--New Electronic Privacy Group Formed
File 5--Call for Papersfor WORKSIMS '94
File 6--GovAccess.033-Congrss lists; NY & CA Legis; LWV; Rural Data
File 7--Researcher Requests Responses (Survey)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup:

Or, to subscribe, send a one-line message: SUB CUDIGEST your name
Send it to [email protected] or [email protected]
The editors may be contacted by voice (815-753-0303), fax (815-753-
6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU,
DeKalb, IL 60115, USA.

Issues of CuD can also be found in the Usenet
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
In ITALY: Bits against the Empire BBS: +39-461-980493

/pub/CuD/ ( in /pub/eff/cud/
EUROPE: in pub/doc/cud/ (Finland) in pub/cud/ (United Kingdom)
JAPAN: /mirror/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate
of diverse views. CuD material may be reprinted for non-profit as
long as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless
otherwise specified. Readers are encouraged to submit reasoned
articles relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily
represent the views of the moderators. Digest contributors
assume all responsibility for ensuring that articles submitted
do not violate copyright protections.


Date: Sat, 30 Apr, 1994 21:21:34 EDT
From: CuD Moderators
Subject: File 1--Having Problems Receiving CuD on the Mailing List?

If you've requested a mail subscription to CuD and have received
acknowledgement of the request but have received no CuDs since, it
means that the your address is part of a small distribution problem
affecting about 8 percent of the list.

To rectify the problem, drop a one-line note that says:

SEPARATE LIST in the subject header
and in the one-line message: SEPARATE LIST

We *STRONLY* prefer that readers obtain CuD from the Usenet group

The ftp sites (see addresses in the header) are also easy ways to
obtain CuD for those with ftp access.

The mailing list constitutes only about two percent of the readership,
but is sufficiently large (3,500) that maintaining the list is rather


Date: Fri, 29 Apr 1994 17:12:07 +0000
From: CPSR National Office
Subject: File 2--Clipper Petition Delivered to White House

Computer Professionals for Social Responsibility
P.O. Box 717
Palo Alto, CA 94301
415-322-3778 (voice)
415-322-4748 (fax)
[email protected]




Washington, DC -- A national public interest organization today
delivered to the White House a petition asking for withdrawal of the
controversial Clipper cryptography proposal. The Clipper plan would
provide government agents with copies of the keys used to encoded
electronic messages.

The petition was signed by more than 47,000 users of the nation's
data highway. The petition drive occurred entirely across the
Internet. It is the largest electronic petition to date.

Earlier this year, the White House announced support for the Clipper
proposal. But the plan has received almost unanimous criticism from
the public. A Time/CNN found that 80% of the American public opposed

Computer Professionals for Social Responsibility began the petition
drive in January. In the letter addressed to the President, the
organization said that if Clipper goes forward, "privacy protection
will be diminished, innovation will be slowed, government
accountability will be lessened, and the openness necessary to ensure
the successful development of the nation's communications
infrastructure will be threatened."

The petition asks for the withdrawal of Clipper. It is signed by many
of the nation's leading cryptographers including Whitfield Diffie,
Martin Hellman, and Ronald Rivest. Users from nearly 3,000 different
sites across the Internet are represented. Responses came from
more than 1300 companies including Microsoft, IBM, Apple, DEC, GE,
Cray, Tandem, Sun, SGI, Mead Data Central, AT&T, and Stratus.
Signatures also came from more than 850 colleges and universities
and 150 non-profit organizations. Many responses came from public
networks such as America Online and Compuserve. Nearly a thousand
came from government and military sites including NASA, the Army
and the Navy.

Next week hearings will be held in Congress on the controversial
cryptography proposal, an initiative developed by the FBI and the
National Security Agency. Most of the witnesses are expected to
testify against the plan.

In a related development, the establishment of the Electronic Privacy
Information Center was announced today. EPIC is jointly sponsored
by CPSR and the Fund for Constitutional Government. It will focus on
emerging privacy issues surrounding the information data highway.
[see accompanying release].

CPSR is national membership organization, based in Palo Alto,
California. For more information about CPSR, contact CPSR, P.O. Box
717, Palo Alto, CA 94302. 415 322 3778 (tel) 415 322 4748 (fax)
[email protected] (email).


Date: Tue, 18 Apr 1994 22:01:33 CDT
From: CuD Moderators
Subject: File 3--"Child Abuse in Cyberspace" (Newsweek story)

((MODERATORS' NOTE: A recent Newsweek article dramatizing
Net-pedophile predators conflates pornography, pedophilia, and child
porn to create an over-dramatized fright piece. Readers of the full
article, of which we only summarize below, will note that it is short
on fact, long on inference)).

"Child Abuse in Cyberspace: Police target on-line pedophiles"
NEWSWEEK, April 18, 1994 (p. 40)
By Barbara Kantrowitz (with Patricia King and Debra Rosenberg)

The story begins with a description of a Chelmsford, Mass., BBS sysop,
John Rex, Jr, a 23 year-old engineering student. Police found two pet
pythons, 3,000 arms of ammunition, explosives, bomb manuals, and 43
videotapes, "many of them either pornographic or about child

Prosecutors charge that Rex used his network to recruit
teenagers who could help hm abduct a small boy.
Officials say Rex wanted to sexually abuse the
child--and possibilty kill and eat him. According to
chilling details recorded in court papers, a teenager
says that Rex told him that he almost grabbed a child
himself at a New Hampshire mall recently when he saw a
small boy going into a bathroom alone. Last week Rex
pleaded not guilty to various child-abuse and
pornography charges; he is being held on $2 million
surety bail.

Although the computer links to the above incident seem minimal,

the story quotes law enforcement officials who warn of
pedophiles on the nets. Without supporting evidence or anecdotes,
the story claims:

Many of the young victims are latchkey kids, home alone all
afternoon with only a computer screen for company.

The story continues with the case of Donald Deatherage, 27, of
Cupertino, Calif. Deatherage, known as "HeadShaver" on America
Online, was accused by police of using his computer to prey on a 14-
year old boy with whom he had struck up an on-line conversation.
Deatherage was accused of eventually meeting the youth,
handcuffing, shackling, and blindfolding him, and spanking him with a
leather belt (among other more serious acts). The story alludes to
"Operation Longarm," last year's US Custom's raid of 35 alleged U.S.
computer users who were downloading child pornography from
Sweden. The authors also allude to the ease by which youth can obtain
pornography, and claim that police are "technologically outgunned" in
the battle against electronic pedophiles.

Perhaps Net pedophiles are more common that we believe. But,
judging from actual instances, it's rare. Although we strongly
advocate alerting parents to on-line dangers that children face,
we oppose the hyperbole that passes for "news" in the major
media. The paucity and twisting of facts presented in the Newsweek
story and the linking of pedophiles and "pornography" reflect the
hysterical image-making that passes of "journalism" among much of
the media.

The authors do conclude with one final point that CuD has emphasized
in the past: Parents should be made aware of dangers of all kinds in
cyberspace and educate their children accordingly.


Date: Fri, 29 Apr 1994 17:02:33 +0000
From: Dave Banisar
Subject: File 4--New Electronic Privacy Group Formed

EPIC Press Release

Electronic Privacy Information Center
666 Pennsylvania Ave., SE, Suite 301
Washington, DC 20003
(202) 544-9240 (tel)
(202) 547-5482 (fax)
[email protected] (email)

April 29, 1994



WASHINGTON, DC -- A new organization was launched today to
address growing public concerns about privacy protection for the
national information infrastructure. The Electronic Privacy
Information Center (EPIC) will focus on emerging threats to personal

Among the threats are the government's controversial Clipper
computer encryption proposal, which has caused widespread protests
from companies and computer users around the world. Proposals for
an information superhighway and recent plans to reform the nation's
health care system also involve significant threats to personal

"We have established EPIC to focus public attention on these new
privacy issues -- the Clipper Chip, the Digital Telephony Proposal,
medical record privacy, and the sale of consumer data." said Marc
Rotenberg, director of EPIC.

A 1993 poll by the Lou Harris organization found 80 percent of
Americans concerned about threats to their privacy. More than two
thirds believe they have lost all control over personal information.
Still, 70 percent believe that privacy is a fundamental right
comparable to "life, liberty and the pursuit of happiness," and a
clear majority of Americans favor establishment of a privacy agency
within the government.

EPIC brings together an unprecedented group of experts from
computer science, information law, civil liberties, human rights, public
interest advocacy, library and research communities, as well as
privacy experts and scholars. Among the members of the EPIC
Advisory Board is former Congressman and Presidential candidate
John B. Anderson. Mr. Anderson said today at a Capitol Hill press
conference he was very pleased by the establishment of the new

"Privacy is one of the bedrock American values. EPIC will help ensure
that privacy is protected in the information age," said Mr. Anderson.

Simon Davies, the Director General of Privacy International, welcomed
the launch of EPIC. Speaking from London, England today he said,
"EPIC is an exciting initiative on the leading edge of privacy
protection. My hope is that EPIC will be the forerunner of many such
organizations around the world."

EPIC is a joint project of the Fund for Constitutional Government and
Computer Professionals for Social Responsibility. FCG is a non-profit
charitable organization established in 1974 to protect civil liberties
and constitutional rights. CPSR is a national membership organization
established in 1982 by professionals in the computing field concerned
about the social impact of computer technology.

For more information contact EPIC, 666 Pennsylvania Ave., SE Suite
301, Washington, DC 20003. 202 544 9240 (tel), 202 547 5482 (fax)
[email protected] (email). Current materials include a program description
and list of Frequently Asked Questions about EPIC.

Marc Rotenberg, EPIC Director
David L. Sobel, Legal Counsel
Dave Banisar, Policy Analyst


Date: Fri, 22 Apr 1994 14:32:31 +0700 (GMT+0700)
From: Shaunak Ashtaputre
Subject: File 5--Call for Papersfor WORKSIMS '94



International Workshop on
NOVEMBER 9 -11, 1994
Asian Institute of Technology
Bangkok, Thailand

International Advisory Committee:

Dr. Eiji Arai, Tokyo Metropolitan University, Tokyo, Japan
Dr.-Ing. M. Sc. Bernd-Dietmar Becker, IPA FhG, FRG
Prof. Robert D. Dryden, Virginia Tech, USA
Prof. Paul Fishwick, University Florida, USA
Dr. P.W. Udo Graefe, National research Council, Canada
Dr. Timothy J. Greene, Oklahoma State University, USA
Prof. L. Gerhardt, Rensselaer Polytechnic Institute, USA
Dr. Jan Goossenaerts, The University of Tokyo, Japan
Prof. Dr.-Ing. Bernd E. Hirsch, BIBA, FRG
Prof. Chin-Fu Ho, National Sun Yat-Sen University, Taiwan
Prof. Hyun, KAIST, Korea
Dr. Branko Katalinic, Wien, Austria
Prof. A. Kuhn, FhG, IML, FRG
Prof. Andrew Kusiak, University of Iowa, USA
Prof. Lennie Lim, GINTIC,NTU, Singapore
Dr.-Ing. Kai Mertins, IPK, FRG
Prof. Susumu Morito, Waseda University, Japan
Dr. D.P.N. Murty, University of Queensland, Australia
Dr. H. Paul, Waikato University, New Zealand
Dr. P. G. Ranky, University of East London, UK
Prof. Umeda, University of Tokyo, Japan
Prof. K. K. Wang, Cornell University, USA
Dr. G. B. Williams, University of Birmingham, UK

Organizing and Technical Program Committee:

Dr. D.N. Batanov, Asian Institute of Technology
Ir. Erik Bohez, Asian Institute of Technology
Prof. O. Fujiwara, Asian Institute of Technology
Dr.-Ing. Wolfgang Kuehn, Asian Institute of Technology
Dr. N.N. Nagarur, Asian Institute of Technology
Prof. H. Pastijn, Asian Institute of Technology
Prof. P.C. Pandey, Asian Institute of Technology
Prof. A. B. Sharma, Asian Institute of Technology
Prof. Kripa Shanker, Indian Institute of Technology, India
Prof. M.T. Tabucanon, Asian Institute of Technology

WORKSIMS '94, November 9-11, AIT, Bangkok

The International Workshop on Simulation in Manufacturing Systems
will be held in Bangkok from November 9 - 11, 1994. The workshop is
intended to provide a forum for academic researchers and
professionals in the fields of manufacturing to exchange and discuss
technical knowledge and experiences for further advances of the
field. The focus of the forum will thus be on applications and theory
in the field of manufacturing simulation.

Scope: Papers of original work in but not limited to the following
topics and research areas are invited:
- New modelling concepts and techniques
- Simulation and optimization
- Parallel simulation
- Artificial intelligence in simulation
- System integration
- Software tools
- Manufacturing applications and case studies
- Enterprise integration
- Case studies

Submission Guidelines:
The working language of the workshop is English. All correspondence
should be in English.

The abstracts submitted should be structured as follows:
- Title of the paper
- Author(s)
- Communication address, Fax, email, etc.
- Broad classification according to topic
- Upto five keywords
- References
A typical figure and/or some basic equations may also be

Papers should describe the work in detail. On acceptance of the paper
an autor kit will be sent for preparing the camera ready version of
the paper. The length of the paper must at the most be six pages.
Papers exceeding this limit will be charged $100 per page towards

Registration fee structure:
US$ 380 for participants and speakers registering latest by 30 Sept.
1994 US$ 450 for participants and speakers registering after 1

Participants will be required to register upon notification of
acceptance of their papers on or before the early registration date.
Papers will be published in the workshop proceedings only if at least
one of the authors is officially registered and personally presents the
paper at the workshop.

Exhibitions and demonstrations:
The program committee is inviting exhibition of the products related
to the theme of WORKSIMS'94. Information to interested parties will
be available on request.

Invited Sessions:
Proposals for invited sessions and tutorials focusing on the new
trends and developing technologies relevant to WORKSIMS'94 are
welcome. The proposals should be submitted in detail to the
chairpersons latest by May 15, 1994.

Important dates and deadlines:
15 May 1994 Receipt of abstracts
30 June 1994 Notification of acceptance
3 August 1994 Receipt of camera ready manuscripts
30 September 1994Early registration deadline

All communications should be directed to either chairperson:
Dr.-Ing. Wolfgang Kuehn Dr. Nagen N. Nagarur
Tel: (66-2) 524-5678 Tel: (66-2) 524-5683

Asian Institute of Technology, School of Advanced Technologies, IEM
P.O. Box 2754, Bangkok 10501, Thailand
Fax: (66-2) 524-5697; 516-2126; 516-5118
Email: [email protected]


Date: Sun, 17 Apr 1994 22:31:04 -0700
From: Jim Warren
Subject: File 6--GovAccess.033-Congrss lists; NY & CA Legis; LWV; Rural

Apr.17, 1994


When sending emailed support or opposition statements to state or
federal legislators, please be sure to make them reasonably formal
and be sure to include your name, title, organization-if-any, snailmail
address and voice-phone. Reasons:

Your statements - especially those sent to a bill-author indicating
your *support* - will typically be printed out and distributed in a
packet to other legislators and their staff who will next be
considering the bill in which you are interested.

In the case of statements *opposing* a bill ... hmmm, it'd be best to
send them to a legislator known to be opposing the bill. Less chance
for them to be, uh, misplaced, and a greater chance for them to be
circulated to other key legislators and staffers.


From [email protected] Thu Apr 7 16:38:33 1994
From: Char Roberts

Jim, I have a list of the members of the 103rd Congress, their states,
party affiliation, phone and fax numbers on my personal ftp site
which I have made available to other groups already. It is from the
Jan. 1993 US Congress Yellow Book but has been gradually updated as
people send in corrections for their own congresscritters. ...
Please feel free to advertise the location in the GovAccess newsletter.
Note that my ftp site is read-only, so anything which is put there has
to be e-mailed to me first. Also please note that I have LIMITED
storage so I am not embarrassed to be quite dictatorial about what
goes there! (I also remove stuff whenever it has become stale in my
own humble opinion!). I'm using my ftp site mostly for government-
reform related files. Usually the file names are self-explanatory. Feel
free to browse. The congresscritter list I have is called congfone.txt.

login: anonymous
password: your e-mail address
cd /users/ro/croberts
ls (or dir) to display list/directory of files
get [desired filename] [filename] [filename] [etc]

Note that file names are case sensitive so type carefully.


From [email protected] Thu Apr 7 09:04:09 1994
From: Steve Watkins

some of the items mentioned in past postings are also
already available via InfoSlug (the guide to retrieving legislative
information, for instance). The InfoSlug Gopher server is at for those who have access to their own Gopher
clients, but we also offer open access via Telnet to
using infoslug as the login. This might be an easier way for people to
get at some of these files rather than having to FTP them.

Steve Watkins
Science Library
University of California, Santa Cruz
[email protected]


From: Reg Neale
Date: Thu, 7 Apr 94 13:50:24 EDT

At the suggestion of another activist netter, I am writing to you to
alert you to new developments in our effort to get New York State's
public legislative information online. The NY legislature does collect,
organize and maintain computerized legislative information, including
text of bills, member's voting records etc. However, this information
is not freely available to the public. Instead, it is provided to a
captive commercial firm which sells it to special-interest groups, at
prices ordinary citizens cannot afford. A bill was just introduced in
the NY Assembly to make public information freely and timely
available, via "the most-accessible and least-cost public network"
i.e., the Internet. Bill A10035 was referred to the Assembly's
Governmental Operations Committee, where it is certain to die unless
there is a massive input from concerned citizens. Any New Yorkers
reading this should call or write their assemblyperson to urge
immediate action on this bill. It could also be helpful to contact these
two individuals:

Assemblyman Samuel Colman, Chairman
Governmental Operations Committee
Room 731 Legislative Office Building
Albany NY 12248
518-455-5118 voice
518-455-5119 fax

David W. Keiper, Commissioner
Legislative Bill Drafting Commission
Room 301 Capitol Building
Albany NY 12247
CIS 71075,2006
[Internet: [email protected]]

Voice your support for public access to legislative information. If you
know of anyone who should be involved in this effort, or if you know
of another appropriate place to post this message, please contact me.

Reginald Neale, Sec'y, Citizens for Open Access to Legislation (C.O.A.L.)
716-263-7864 day 716-924-7481 eve

[ Forwarded by Stanton McCandlish Fri Apr 8 13:00:47
1994, who added:
Don't just talk, DO SOMETHING. I'm aware of at least 2 civil-liberties-
favoring state bills that have failed just recently, in both cases due to
lack of public input. Activism got a bill very similar to this one passed
in CA last year, and it can work in NY too. See
/pub/EFF/Issues/Activism/* for more info on this type of thing. If the
legislation is available to us, it will be archived at
/pub/EFF/Legislation/Foreign_and_local/NY/, so check periodically.
Those in the NY area, please spread the work on ny.* newsgroups,
local BBSs, apropos mailing lists, etc. ]


From [email protected] Sun Apr 10 03:17:10 1994
From: Fran Packard

Jim, Thought you may be interested to know that the League of
Women Voters of California is conducting an online Election Services
project on CompuServe. It includes asking participants in our message
forum to submit questions for the statewide candidates. In keeping
with our traditional ways of providing information about candiates,
all those running for the same office will receive the same questions.
We're requesting that the candidates respond in writing and on disk.
Their answers will be posted in the League library (League/Voters CA)
in the California forum.

Fran Packard or <[email protected]>

[ This is a delightful first step. But it will *really* be valuable when
it's posted for free global access via the *bit* net - the Internet - in
one or several ftp sites, including permission to freely repost and re-
circulate. While only to CI$, its potential citizen-audience and user-
base is severely limited. Keep up the good work - and spread it
beyond the CI$ elite. 🙂 By the way, I understand that the state
President of the California LWV is Marlys Robertson,
[email protected] . --jim ]


From: [email protected]

Jim, I receive your Government Access Newsletter and am using your
info to try to start a similar movement here in SC. ...
Thanks for all you're doing to help restore openness in our
governments. You're making a difference. Keep up the good work.
Peace, Glenn Busbin


From [email protected] Fri Apr 8 09:58:11 1994
From: Kimberly Shaffer

Second Annual Conference on Rural Datafication
May 23-24, 1994
Hyatt Regency Minneapolis
Minneapolis, MN

Come for practical information you can put to work in your
community. Meet people who are learning how to solve the problems
of bringing the Internet to underserved areas. Share your successes
and horror stories!

This years Rural Datafication conference begins with a day of Internet
workshops designed to help you navigate your way on the
Information highway. The conference follows with a day and a half of
useful presentations and breakout sessions. [extensive program
details deleted --jim]

The conference fee is $99 if paid before April 30, 1994, $125 if paid
after April 30. The conference fee includes all Sunday workshops,
Monday and Tuesday conference sessions, lunch on Sunday and
Monday, and Sunday and Monday receptions and entertainment. ...

To register for the conference and workshops, contact CICNet, at
313-998-6103 or 800-947-4754 and ask for a copy of the registration
materials. Registration will not be accepted via email. Or send a
message to [email protected] or [email protected] .

The Rural Datafication project and conference are sponsored by:
PREPnet, WiscNet, and WVNET. And is supported by a grant from the
National Science Foundation.


From [email protected] Fri Apr 8 11:20:41 1994
Xxx asked me to send you a copy of a message I sent her. It's
self-explanatory. ...

>... I was talking with my congresscritter's office today ... and
>remembered what ... about the members of the HORs and
>Sinate using our tax money to buy info from LEGI-SLATE. I
>asked the staffer (a sysop or something) about that. She said
>that was correct, and that the services they use in that office
>are LEGIS (the in-house system) and the Roll Call AM and PM
>editions. The sinate uses, I think, LEGI-SLATE. She didn't know
>how much this costs or if there is any way you or I could track
>legislation without paying a third party. She told me to go to
>the library and read Congressional Quarterly each week.
>Phhhhtttt. LEGIS is not available for public use because, as
>she said, "someone might use it to get into a congressman's
>computer". Balderdash. I tried to explain to her that I
>appreciated the need for a secure system, but that didn't
>preclude the public's right to access info directly so that we
>can keep an eye on things without paying expensive thirds
>parties for what is OUR stuff. She stuck to her guns about
>security, but promised to look into the subject and call me
>next week to let me know what, if anything, can be done to
>allow us to track bills via computer. I'm writing her a letter
>telling her about the legislation introduced in CA and MN which
>opens these state governments to public access. I think I'll
>also send a couple of interesting addresses to her while I'm at
>it. NASA and the White Sands Missle Range ought to do it. They
>need security, but not so much that we can't get SOME info out
>of their computers. Do you have any addresses that would
>impress her? FBI or CIA or IRS? ...

[To which the recipient responded:]

... What a hoot! Some evil taxpayer might use LEGIS to hack
a congressman's computer! Yes, indeed, we must make the U.S.
government and every legislator SECURE from the constituents! I
wish I could give you a list of addresses which would singe
that staffer's eyebrows - how about the CIA World Fact Book?
Nah. There's a listserver for NATO data... Nah. There's
[email protected]... Hah! That's the one I got into a
flap with over the altered documents they put there. Not too
impressive. Actually, there is a lot of government information
all over the Internet but most of it seems to be in university
archives. The country's college political science and economics
departments don't seem too worried about "security."

... I'd like you to send [GovAccess] the story you
just sent me. I honestly don't know whether to laugh or cry! ...

[ As to addresses illustrating that perhaps Members of Congress
would remain safe even if the public had Internet access to the
public's Congressional information, how about
(the National Security Agency's public Internet host)? Or maybe even via which 16 House Members and two House committees
have public Internet addresses? --jim]


From [email protected] Wed Feb 23 10:27:15 1994
From: "Steven L Clift"

PUBPOL-L is an electronic forum for graduate students, professionals,
faculty, and staff in the fields of public policy, public administration,
planning, and other related areas. The topics covered in postings
include current public policy issues, events and conferences, research,
teaching, curriculum and courses, employment and career
opportunities, activities of public policy practitioners, and other
topics of interest.

PUBPOL-L encourages the electronic posting of newsletters,
conference notices, and other text normally distributed in paper form
by public policy schools and their centers or programs, government
agencies, or public-sector oriented organizations.

In the near future materials posted to PUBPOL-L will also be available
via Gopher at the Humphrey Institute of Public Affairs, University of
Minnesota. The gopher is located at - port: 3340.

NEW DISCUSSION LIST: PUBPOL-D is a forum dedicated to open, serious,
and substantial discussion of public policy issues and for extended
comment on items posted to PUBPOL-L.

To SUBSCRIBE address your message to:

[email protected] or [email protected]

In the text portion write:
Subscribe PUBPOL-L Your Name
For example: Subscribe PUBPOL-L Susan Smith

Subscribe PUBPOL-L Your Name
Subscribe PUBPOL-D Your Name
*::Steven:L.Clift::::::::::::::::::::::[email protected]::#
#::Moderator,:Public:Policy Network:(PUBPOL-L):::::::::::::::::::*
#::University:of:Minnesota, Minneapolis,:MN:55455::::::::::::::::*


Date: Fri, 29 Apr 1994 16:12:38 -0700
From: [email protected]
Subject: File 7--Researcher Requests Responses (Survey)

((MODERATORS' NOTE: We periodically run short surveys or other
requests for research material. In return, the posters agree to share
summaries of their findings with us))

Dear Colleague/Participant:

The following survey is part of a project I am conducting on
computer technology and its use. I would appreciate every computer
user who reads this message taking a few minutes to answer and
return the survey via e-mail and/or "snail mail".

All responses will remain strictly confidential.


Prof. Urs E. Gattiker, Centre for Technology Studies, Faculty of
Mgmt, The Univ. of Lethbridge, Lethbridge, AB T1K 3M4, CANADA; Tel:
(403) 320-6966 (Mountain-Standard-Time, every morning);
E-Mail: [email protected]
IF YOU WISH, you can forward this survey to other lists or fellow

If your online editor __wraps the lines around__ or if it will not
fill in blanks without moving copy around, please download to your
wordprocessor (takes about 1-5 min). Before uploading the survey
in ASCII/Dos format, please make sure that the file is in 10 Pitch
Courier. You can also ask for another copy from the address above.
Please return this completed survey to Urs E. Gattiker by:
May 28, 1994

#SU4CcDigestMLusaNAF___________ (for computer use


The following questions concern the type and extensiveness of
technology and software used. Answer on the basis of your personal
profile. There are no correct or incorrect answers.


[Please circle or mark one code # (e.g., _1_ or "1" or ~1~)or enter
an absolute value (e.g., # of years) for each question]

1. How many years have you worked/played with computers?
# ____ years

2. Do you have a personal computer at home?
No.....0 Yes.....1

3. Do you use a modem or network connection for computer
-mediated communication purposes such as remote log-in to
another computer, e-mail or accessing a bulletin board (BB)?
No.....0 Yes.....1

4. Have you had a close friend/colleague who experienced
software/hardware problems or damage due to a computer virus
within the last year?
No.....0 Yes.....1

5. Are you a subscriber/member of a bulletin board (BB) and/or
electronic discussion list/newsletter or listserver (EDL)?
No .....0 If yes, # ____ of years

6. Have you ever received information through an EDL or a BB whose
content you considered in bad taste within the last year?
No.....0 Yes.....1

7. Have you ever received information through an EDL or a BB whose
content you believed should be banned from the EDL/BB within
the last year? No.....0 Yes.....1
For the next 3 Situations, pretend that you are a bystander
directly observing each situation. When answering, please try to
think about how you would react, feel, and behave as a bystander in
each situation.


One of your friends is a technical whiz and has just developed a
new data encryption device (i.e. similar to a phone scrambler the
device helps to protect conversations against wiretapping) and
software. Your friend quickly demonstrates how the device works by
sending an encrypted message to you. Your subsequent decoding
efforts fail, illustrating that the encryption device does its job
very well. You and your friend then proceed to install this device
and software on both of your machines for utilisation when
communicating with each other.

[Please circle or mark one code # (e.g., _1_ or "1" or ~1~) or
enter an absolute value (e.g., # of years) or type your answer
in CAPITAL LETTERS for each question]

8a. What do you think about this situation (encrypting your data
sent/received with a privately developed device & software)?
Very wrong.... 2
A little wrong.....1
Perfectly okay.....0

8b. Is anyone hurt by what you did?
No.....0 Yes....1
If Yes,

8c. Imagine that you actually saw someone using an encryption
program he/she developed for data transfer from his/her PC.
Would you feel bothered.....0
not care.....1
think this is good.....2

8d. Should the person be stopped? No.....0 Yes....1

8e. Should the person be punished? No.....0 Yes....1

Suppose you learn about two different countries. In country A,
people using privately developed encryption devices for computers
are quite common, and in country B, one never uses privately
developed encryption devices.

8f. Which one of these customs [if either] is bad or wrong?
Both customs are wrong.....3
Country A's custom is wrong.....2
Country B's custom is wrong.....1
Neither one, both customs are okay.....0

One of your friends is a real computer nut and has just written a
new computer virus. Your friend then proceeds to post the virus
program onto a BB or an electronic newsletter/listserver (EDL).

9a. What do you think about this situation (posting a computer
virus one wrote onto a BB or EDL)?
Very wrong.....2
A little wrong.....1
Perfectly okay.....0

9b. Is anyone hurt by what your friend did?
No.....0 Yes....1
If Yes,

9c. Imagine that you actually saw someone posting a virus program
one wrote onto a BB or EDL. Would you
feel bothered.....0
not care.....1
think this is good.....2

9d. Should the person be stopped? No.....0 Yes....1

9e. Should the person be punished? No.....0 Yes....1

Suppose you learn about two different countries. In country A,
people posting design/programming characteristics of a computer
virus they wrote on a BB or EDL are quite common, and in country B,
one never shares such programming information about a virus one has
created with members of a BB or EDL.

9f. Which one of these customs [if either] is bad or wrong?
Both customs are wrong.....3
Country A's custom is wrong.....2
Country B's custom is wrong.....1
Neither one, both customs are okay.....0

Your friend has just received a new computer game through an EDL
located abroad. The game is banned in this country because of its
violence, sexual and racist content. Your friend tests the game.
Although he/she finds it somewhat disgusting, your friend sends a
copy to another friend abroad, where no regulations exists for
banning the game. Your friend does not keep a copy of the game.

10a. What do you think about this situation (send a locally banned
game to another user abroad where the game is not banned?
Very wrong.....2
A little wrong.....1
Perfectly okay.....0

10b. Is anyone hurt by what your friend did?
No.....0 Yes....1
If yes,

10c. Imagine that you actually saw someone send a game banned in
your country to another user abroad where no such ban exists.
Would you
feel bothered.....0
not care.....1
think this is good.....2

10d. Should the person be stopped? No.....0 Yes....1

10e. Should the person be punished? No.....0 Yes....1

Suppose you learn about two different countries. In country A,
people sending copies of banned games received through an EDL to
their friends abroad where no such regulation exists are quite
common; in country B, one never passes on locally banned games
received from an EDL to friends abroad where no such regulation

10f. Which one of these customs [if either] is bad or wrong?
Both customs are wrong.....3
Country A's custom is wrong.....2
Country B's custom is wrong.....1
Neither one, both customs are okay.....0
The questions below again ask you to state your opinions and
beliefs about computer-related issues. Please remember, there are
no right or wrong answers.
1.... strongly disagree
2.... disagree
3.... disagree somewhat
4.... undecided
5.... agree somewhat
6.... agree
7.... strongly agree

[Please circle or put a CAPITAL X directly on the line under your
strongly strongly
disagree agree
11. To get ahead in life one has to do
some things which may not be right 1 2 3 4 5 6 7

12. Regulating the content of information distributed on BBs and
EDLs by the government is appropriate 1 2 3 4 5 6 7

13. It is all right to skirt the fringes of the law when using
computers if you can get away with it
1 2 3 4 5 6 7

14. I respect my best friend's opinions about what one should and
should not do with computer technology
1 2 3 4 5 6 7

15. Your close friends have done some things with computer viruses
that might be considered inappropriate by some people
1 2 3 4 5 6 7

16. I feel it is more important to protect a person's privacy then
the ability of police to "wiretap" one's electronic mail or
data communication 1 2 3 4 5 6 7

17. It is all right to skirt the fringes of the law by downloading
banned instructions/information about how to do something ....
from a BB located abroad, where possession of such information
is legal 1 2 3 4 5 6 7

18. It is all right to skirt the fringes of the law by keeping
banned information about how to do something.... received from
an EDL located abroad, where possession of such information is
legal 1 2 3 4 5 6 7

19. It is all right to skirt the fringes of the law by copying a
software package from a friend to use it for about 3 months,
before deleting it from one's PC's hard-drive
1 2 3 4 5 6 7

20. Inappropriate information on BBs' and EDLs', such as violent
games, should be censored by government regulators
1 2 3 4 5 6 7

21. The use of a self-made encryption device and software for
computer-communication purposes is perfectly okay
1 2 3 4 5 6 7

[Please circle or mark one code # (e.g., _1_ or "1" or ~1~) or
enter an absolute value (e.g., # of years) or else type your
answer in CAPITAL LETTERS for each question].

22. Are you working? not currently employed.....0

23. What is your current occupation?
__________________(please specify)

24. Are you male.....1

25. As far as material wealth is concerned, when you consider the
economic and social situation of the country where you grew up
(age-span 1-18 years), would one consider your family (i.e.,
yourself, siblings and parents) as having
been: poor.....0
below average.....1
above average.....3

26. How old are you? #______ of years

27. How many years did you attend school (e.g., community
college/vocational diploma = 12-14 years, undergraduate
university degree = 16 years)? #______ of years

28. In which country do you currently reside?
Name of Country:__________ # of years:___

29. In which country have you spent most of your life?
Name of Country:__________ # of years:___

30. In your community, in how many voluntary/charity organizations
do you regularly (i.e. at least once a month) participate
(e.g., church, sport groups, big brother/big sister, scouts or
Red Cross)? # _____ of groups

31. How did you receive this survey? e-mail from Gattiker.....0
e-mail from a friend/colleague.....1
listserver/electronic discussion list,
please specify: .....2
electronic journal/newsletter, specify: .....3
other, please specify: .....4

mark here ___ with an X or else provide your address to
Urs E. Gattiker. A short summary of the results will
appear in a future CU-Digest!



End of Computer Underground Digest #6.39

 December 19, 2017  Add comments

 Leave a Reply

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>