****************************************************************************
                  >C O M P U T E R   U N D E R G R O U N D<
                                >D I G E S T<
               ***  Volume 1, Issue #1.05 (April 22, 1990)   **
  ****************************************************************************

MODERATORS:   Jim Thomas / Gordon Meyer
REPLY TO:     TK0JUT2@NIU.bitnet

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.
--------------------------------------------------------------------
DISCLAIMER: The views represented herein do not necessarily represent the
            views of the moderators. Contributors assume all responsibility
            for assuring that articles submitted do not violate copyright
            protections.
--------------------------------------------------------------------


In This Issue:

File 1:  Moderators' Corner (news and notes)
File 2:  From the Mailbag
File 3:  Freedom of Information / FBI Surveillance of BBSs
File 4:  An Awkward conversation with S.P.A
File 5:  "ERRATA" (Go placidly amongst the BBS world....hi-camp!)
--------------------------------------------------------------------


***************************************************************
***  Computer Underground Digest Issue #1.05 / File 1 of 5  ***
***************************************************************

In this file:
 -- Mail problems
 -- Archives
 -- Legion of Doom Update
 -- Policy on Anonymous postings
 -- Call for articles
--------------------------------------------------------------

**MAIL PROBLEMS:**

We are not getting thru all the gateways, so if you know of anybody who has
requested back issues but hasn't heard from us, let us know, or have them
send several addresses we can try. Do not rely on the header has an address,
because it doesn't always work.  "@ORION" has been a special problem.
--------------------------------------------------------------------

**ARCHIVES**:

We're still trying to work out a site to make archives of text files
available. Our own system software can't provide one. A few volunteers have
come forth, but if anybody else can set something up, it might speed things
up.

Current holdings are still sparce. They include:
  a) PHRACK, PIRATE, ATI, LoD/H, P/Hun, and several hundred
     miscellaneous small files.
  b) A Master's thesis and several academic papers
  c) A variety of news clippings, most of which are probably
     copyright protected and cannot be published

WE *STRONGLY* urge anybody who comes across any research papers, news
articles, or other "hard copy" info related to computer underground activity
to send it along so we can build the archives.

We have found it difficult to honor all requests for arhives at once. So, to
get copies of something, for example ATIs, just send periodic requests and
we'll send a few out at a time, and keep sending requests until you have
what you originally wanted.

--------------------------------------------------------------------

**LEGION OF DOOM UPDATE (Indictment news)**:


Many have asked how the LoD/Phrack E911 case(s) is coming.  Well,
unfortunately very little news has reached us regarding the status of the
charges against The Prophet.  Anyone with factual news in this regard is
welcome to submit it... The case against Knight Lightning has a pre-trial
motion pending in the next week or so (late April, '90).  The defense has
asked that the indictment be withdrawn and re-submitted in a form that
eliminates the prejudicial and un-proven allegations presented as fact that
it presently contains.

The actual trial date was once set for early June, but the Government asked
that the pre-trail motion be rescheduled from it's original date of a couple
of weeks ago so I would assume the trial date will also be pushed back
accordingly.

As more facts become known and appropriate to share, we will keep you
updated.

GRM

--------------------------------------------------------------------

**ANONYMOUS POSTING POLICY**:

We have been asked our policy on anonymous postings. We have previously
defended the use of pseudonyms as necessary, and are willing to post
questions, general information, or articles of a reasonable nature either
with a handle or anonymously.  However, we cannot reproduce flames or
articles for which attribution might be required. Our rationale for allowing
anonymous postings is based on the respect for privacy of those who feel
they have something to say, but who may be afraid of repercussions from
employers or colleagues for speaking in public.  Not everybody realizes that
we still have a first amendment, and speaking in public is not always wise
if one values their job.  Unfortunately, the "chilling effect" has real
sources. Just ask Steve Jackson.

--------------------------------------------------------------------

**CALL FOR ARTICLES:**

We need some people to contribute a few more stories, comments, or articles.
We can try to keep news coming, but were hoping for some lively debate and a
bit more news from various regions.  We know that lots of subscribers are
down on computer underground activity, and we don't want this to be a
one-sided forum. The purpose here is to break down barriers so the two sides
have a better appreciation of the other.

=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
+                               END THIS FILE                                +
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+===+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=



***************************************************************
***  Computer Underground Digest Issue #1.05 / File 2 of 5  ***
***************************************************************

------------------
FROM THE MAIL BAG:
------------------

Date: Tue, 3 Apr 90 20:33:07 GMT
From: Ed Ravin <cmcl2!dasys1!eravin@rutgers.edu>
Subject: Re: Legion of Doom Rebuttal to Moderator
Reply-to: Ed Ravin <cmcl2!dasys1!eravin@rutgers.edu>
Summary: overzealous law enforcement?

In article <5462@accuvax.nwu.edu> %of TELECOM DIGEST%
Gene Spafford <spaf@cs.purdue.edu> writes:

>Now maybe there are one or two people on the law enforcement side who
>are a little over-zealous (but not the few I talk with on a regular
>basis).  For someone to be indicted requires that sufficient evidence
>be collected to convince a grand jury -- [...] that the evidence shows
>a high probability that the crimes were committed.

Here in New York, and other places as well, grand juries are known for
being tools of prosecutors, in that the prosecutor is able to manipulate
the evidence presented before them as much as he or she likes in order to
convince the grand jury to indict or not indict as the prosecutor desires.
Every now and then some newspaper here calls for the abolishment of the
grand jury system entirely because it is merely an extension of the
prosecutor's will.  This isn't true everywhere -- things vary.  But in most
cases, a grand jury is not a check against an overzealous prosecutor.

>Search warrants require probable
>cause and the action of judges who will not sign imprecise and poorly
>targeted warrants.

2600 magazine a few years ago reprinted the courtroom transcripts for a
search warrant issued for a particular bulletin board system at a
particular phone number.  The local police testified that they hadn't
actually been able to verify that a BBS was at this number, because the
number was always busy.  They did not present any evidence that the BBS had
been involved in any illegal activity, except that its phone number had been
found on another BBS.  The judge signed the warrant anyway.

The legal system can be abused for anyone, including mafioso.  We should be
especially vigilant of possible abuse when it comes to these
computer-related cases, because not only is the legal system is still
sorting out what is a crime, but prosecutors, police and judges are still
learning what computers are, and the media exaggeration and
sensationalization of any computer-related case tends to make it difficult
for remote observers (like here in Telecom) to make informed opinions.


--
Ed Ravin                  | hombre!dasys1!eravin | "A mind is a terrible thing
(BigElectricCatPublicUNIX)| eravin@dasys1.UUCP   | to waste-- boycott TV!"
--------------------------+----------------------+-----------------------------
Reader bears responsibility for all opinions expressed in this article.

==============================================================================

-------------
"Pain Hertz" had a question we couldn't answer. Perhaps somebody
else can:
-------------


I recall seeing a text file about a BBS in Ca. whos sysop was the defendent
in a lawsuit involving LD access codes.  It seems that an 'automessage' was
posted with the codes and a PacBell employee logged on finding them.  This
was several years ago and stirred a debate over the liability of a BBS
sysop.  I would like to know how this was resolved.  I will try to find the
original text file.  If I recall correctly, this BBS was located in San
Diego.

%from Pain Hertz%


=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
+                               END THIS FILE                                +
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+===+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=

***************************************************************
***  Computer Underground Digest Issue #1.05 / File 3 of 5  ***
***************************************************************


THE SOFTWARE PUBLISHERS ASSOCIATION: DON'T CALL US, WE'LL CALL YOU.

NOTE!! Several attempts have been made to obtain information from the SPA
regarding their programs, charter, and membership information.  Despite
multiple promises I have not yet received any information that I have
requested.  Therefore what is stated about the organization, it's purpose,
and history is based on independent piece-meal research and has not been
supplied by the SPA.

The Software Publisher's Association is an industry organization composed
of small, medium, and large software publishing firms. One of their chief
activities in the past has been to wage a public relations battle against
"software piracy".  This campaign, largely through print ads in major
computer magazines, has emphasized the illegality of trading software
programs with coworkers and friends.  To my knowledge they have not
directed their attention to the CU realm of the pirate, and in fact, up
until recently, have largely avoided using the label "pirate" at all.

One of the newest "weapons" the SPA has unleashed against software trading
is something called a "corporate audit".  My knowledge of this is hazy (see
above notation) but from what I can gather it is a process that
corporations submit to voluntarily.  The SPA will conduct an audit of
magnetic media (hard drives, etc) used on a corporation's computers to
assist them in complying with copyright laws and license agreements.  Again
the thrust of the program is directed to the corporate world, not the
Computer Underground.

However the SPA has taken some steps to curb the CU trading of "warez".
One of these techniques has been to open a toll-free "snitch line" where
people could call and report BBS systems that have copyrighted programs in
their download areas. This "snitch line" (my term, I don't know what they
call it...again, see above notation.) differs from an SPA program of a few
years ago when they offered a $100.00 dollar reward for turning in Pirate
bulletin board systems. At that time the caller had to supply a list of
downloadable files, the number of the board, the name and address of the
sysop, and a valid sign on and password to the board in question.  To the
best of my knowledge the current program does not offer a monetary reward,
and they extent of the information they are requesting may have changed.

I recently called the "snitch line" as a participant observational
experiment in turning in a Pirate bulletin board.  My intent was to
determine the information collected by the SPA and the conceptualization of
"piracy" and "warez" that was being used.  Below
is an account and  transcript of that conversation.
--------------
Software Publisher's Association  Monday 2/19/90

I dialed the SPA "turn in a pirate board" number that I had picked up
somewhere in my bbs travels. 1-800-388-PIRS...cute, but not cute enough to be
considered bagging the whole warez scene.

The phone was ringing... "Hello, Warren (or something that sounded
like Warren) Travel", a male voice said.

"Errrr, I think I've reached a wrong number, who is this?"

"Warren Travel, are you trying to get a hold of that software place?"

I told him that I was.

"They published our number by accident. Sorry."

I apologized to him and hung up. I should have asked him how many calls
he had been getting...would be some indication of how much activity a
snitch hotline could generate. I wonder if the SPA is paying for this
guys phone bill?  Toll free calls cost about fifty cents...

I then tried toll free information, and asked for the Software Publishers
Association.  No listing.  Hmmmm, have they given up the "report a pirate
line" idea?

I called information for the District of Columbia and got the office
number for the SPA.  After about 10 rings  (yes, ten..this was not at
lunch time) a guy answered...

"Software Publishers Association".

"Hi, I was wondering what kind of mechanisms you have in place for
people who want to report a pirate bulletin board."

"Give me the number." (curtly)

"That's it? That's your mechanism?"

(about 4 seconds of silence)
"What have you got?"

"A pirate bbs, 100 megs, pirated software for IBM, Atari, and Amiga."

(about 3 seconds of silence)

"Where did you get the number?"

"Off a list a bbs somewhere, I don't know for sure."

"What did it say?"

"The listing?  It's a list of BBS's...it said the name of the board and
gave the phone number."

"No, _this_ number." (sounding frustrated or hurried)

"Your number?  I called information and asked for the SPA!"

(silence)

"Can you give us a lot of information on this board? Who's the sysop?
What's his address?"

"I don't know that. All I have is the number and it's a pirate board.
First time callers get full access to all the downloads and you can see
the files right there."

"oh. Well, give me the phone number."

"Okay, 708/555-5555"  (I gave him the phone number for the local
Telenet port.)

(about 3 seconds of silence)
"We'll look into it."

"What are you going to do?"

(more silence)

"We'll look into it."

"I see, and what's your name please?"

(again, some silent hesitation)

"Ken"

"Okay, Ken. Bye."

>click<  (Ken hung up w/out saying anything else)

end of transcript. Total time for call, approx 3 minutes.
____________________________________

I believe the transcript portrays the uninterested, slightly rude manner in
which my call was taken.  The fact that Ken was suspicious of where I had
gotten the number to his office, and failed to  query me as to the
contents, location, etc of the board I was supposedly reporting indicates
to me that either I reached an individual that was not accustomed to
answering the phone for these calls (as may be indicated by the excessive
number of rings he took to answer, maybe the secretary was ill that day)
or, perhaps, a lack of seriousness on the part of the SPA in dealing with
this "crime".

The Software Publishers Association is a leading source of unverified (and
un-verifiable) information regarding the expense and extent of "piracy".
Here we have seen just how interested they appear to be when presented with
an opportunity to squelch what may have been, for all they knew, a "major
supplier of pirated software".

Postscript: I have since learned that the correct number for the "snitch
line" is 800/388-PIR8. As of yet I have not repeated my experiment.  Others
are welcome to do so and I'd appreciate hearing

GRM
72307.1502@compuserve.com

=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
+                               END THIS FILE                                +
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+===+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=


***************************************************************
***  Computer Underground Digest Issue #1.05 / File 4 of 5  ***
***************************************************************

Date: Sun, 8 Apr 90 12:13:27 -0700
From: <mrotenberg@cdp.uucp>
To: TK0JUT2
Subject: FBI BBS Surveillance (CPSR FOIA Request)

On August 18, 1989 CPSR submitted a Freedom of Information Act request to the
FBI asking for information about BBS surveillance.  After four follow-up
letters, a series of phone calls, and Congressional testimony that discussed
the CPSR request, the FBI has failed to respond to our request.  (The statutory
time limit for the FOIA is ten days).

If any one has information about possible FBI surveillance of bulletin boards
or networks, please send it to me. Specific dates, locations, BBSs are
important.  (You can send information to me
anonymously by land mail, if you need to protect your identity).

Thanks for your assistance,

Marc Rotenberg, Director
CPSR Washington Office
1025 Connecticut Ave., NW, Suite 1015
Washington, DC 20036
202/775-1588 (voice)
202/775-1941 (Data)
rotenberg@csli.stanford.edu or
cdp!mrotenberg@arisia.xerox.com

Contents:
1. CPSR FOIA Request to the FBI Regarding BBS Surveillance
2. CPSR letter to Congressman Don Edwards regarding FOIA request
3. Chronology of events


[CPSR FOIA Request to the FBI Regarding BBS Surveillance]


CPSR Washington Office
1025 Connecticut Avenue, NW
Suite 1015
Washington, DC  20036
202 775-1588
202 775-1941 (fax)

Director
Marc Rotenberg
                  August 18, 1989
FOIA Officer
FBI
9th St. & Penn. Ave., NW
Washington, DC  20535
Dear FOIA Officer,
   This is a request under the Freedom of Information Act, 5 U.S.C. 552.

Part I:
   I write to request a copy of all materials relating to the FBI's collection of
information from computer networks and bulletin boards, such as PeaceNet (San
Francisco CA) or The Well (Berkeley CA), that are used frequently by political
or advocacy organizations.  In particular, I would like any records which would
indicate whether the Bureau is intercepting, collecting, reviewing, or
"downloading" computer transmissions from any of the following networks and
conferences: Action Southern Africa, AIDS Coalition Network, The American Peace
Test, Amnesty International, Association for Progressive Communications, Beyond
Containment, Center for Innovative Diplomacy, Central America Resource Center,
Central America Resource Network (CARNet), The Christic Institute, Citizen
Diplomacy, Community Data Processing, EcoNet, Friends of the Earth, Friends
Committee on National Legislation, HandsNet, Institute for Peace and
International Security, Media Alliance, Meiklejohn Civil Liberties Institute,
National Execution Alert Network, Palo Alto Friends Peace and Social Action
Committee, PeaceNet. Quaker Electronic Project, Web, The Well.
   This request includes public communications that take place through a computer
bulletin board.  For example, this would include both transmissions that are
available for public perusal, a "conference" or "posting," as well as
transmissions that are directed from one party to one or more other specific
parties and intended as private, "electronic mail."

Part II:
   I also request any records that would indicate whether the FBI, or anyone
acting at the behest or direction of the FBI, has any computer accounts on any
computer bulletin boards operated by an advocacy or political organization,
and, if so, the names of the bulletin boards, and whether the Bureau has
indicated the actual organizational affiliation of the account holders to the
system operators.

Part III:
   I also request any records that would indicate whether the Bureau has ever
operated, is currently operating, is involved in the operation of, or is
planning to operate, a computer bulletin board that is intended for public
use.

Part IV:
   I would also like any records which would indicate the circumstances under
which it would be appropriate for an agent or authorized representative, asset,
informant, or source of the Bureau to intercept, collect, review, or "download"
the contents of computer bulletin boards.

Part V:
   I would like any records relating to the FBI's development, research, or
assessment of computer systems for automated review of information stored in an
electronic format, obtained from a computer bulletin board or network.

Part VI:
   Finally, I request any records that would indicate whether the FBI has
developed, or is planning to develop, a system that could automatically review
the contents of a computer file, scan the file for key terms or phrases, and
then recommend the initiation of an investigation based upon this review.

   I ask that you check with your regional offices in San Francisco, San Jose,
Austin, Phoenix, Los Angeles, and New York, in addition to the files that are
available in Washington, DC.  I also ask that you consult with those agents
involved in the investigation of computer crime to determine whether they might
be aware of the existence of such records.  You should also check any documents
relating to John Maxfield, who was employed by the Bureau to investigate
computer bulletin boards.
   Under the Freedom of Information Act, you may withhold all properly exempted
materials.  However, you must disclose all non-exempt portions that are
reasonably segregable.  I reserve the right to appeal the withholding or
deletion of any information.
   Under the Freedom of Information Act, CPSR is entitled to a waiver of all fees
for this request because the "disclosure of this information is likely to
contribute significantly to the public understanding of the operations or
activities of the government and is not primarily in the commercial interest of
the requester."  CPSR is a non-profit, educational organization of computer
scientists. Our work has been cited in scholarly journals, trade publications,
and the national media. CPSR has particular expertise on the use of computer
technology by the FBI, having prepared an extensive report on the proposed
expansion of the NCIC at the request of Congressman Don Edwards.  For these
reasons, CPSR is entitled to a waiver of all fees.
   If you have any questions regarding this request, please telephone me at the
above number. I will make all reasonable efforts to narrow the request if you
determine that it has been too broadly framed.
   As provided in the Freedom of Information Act, I will expect to receive a
response within ten working days.

                  Sincerely yours,


                  Marc Rotenberg, Director
                  Washington Office,
                  Computer Professionals
                  for Social Responsibility


[CPSR letter to Congressman Don Edwards regarding FOIA request]

   1


                     February 27, 1990
Representative Don Edwards
Subcommittee on Civil and
   Constitutional Rights
House Judiciary Committee
806 House Annex 1
Washington, DC  20515

Dear Chairman Edwards:
   I am writing to you about a particular FOIA request that CPSR
has pursued since August of last year.  We asked the FBI for
information about the monitoring of computer networks and bulletin
boards.  We initiated this request because of the obvious civil
liberties interests -- speech, associational, and privacy -- that
would be endangered if the FBI's examination of the contents of
computer systems failed to satisfy appropriate procedural
safeguards.
   After six months of delay, five certified letters to the
Bureau's FOIA/Privacy Act office, and many phone calls with the
FBI's FOIA officers, we have not received even a partial response to
our request.
   On September 20, 1989 a FOIA officer at the FBI assured us
that information would be forthcoming "in a couple of weeks."  A
letter from the FBI FOIA/PA office on December 22 indicated that
information responsive to our request "has been located and will be
assigned for processing soon."  But when I spoke with a FBI FOIA
Officer on February 15, less than two weeks ago, I was told that
they "haven't even started" to process the request and that the FBI
couldn't say when we would receive a response.  (Please see
enclosed chronology and attachments).
   The need for this information is truly urgent.  Further delay
will constitute a denial.  Congress is now considering several
computer crime bills, such as H.R. 55 and H.R. 287, that could
broaden the authority of federal agents to examine the contents of
computer systems across the country.  There is a good chance that a
bill will pass before the end of this session.
   Before opening the door to new forms of criminal
investigation, Congress and the public should have a complete
picture of the FBI's current practices.  Computer communications are
particularly vulnerable to surveillance and routine monitoring.
Computer mail unrelated to a particularized investigation could be
swept up in the government's electronic dragnet if the law is not
carefully tailored to a well defined purpose.  Without a clear
understanding of the civil liberties problems associated with the
investigation of computer crime, Congress may be exacerbating a
problem it does not yet fully know about.
   CPSR's Freedom of Information Act request could provide
answers to these questions.  The FOIA establishes a presumption
that the activities of government should be open to public review
and that agency records should be disclosed upon request.  But the
Bureau failed to comply with the statutory requirements of the FOIA
and frustrated our effort to obtain information that should be
disclosed.  Without this information computer users, the public, and
the Congress, may be unable to assess whether the Bureau's current
activities conform to appropriate procedural safeguards.
   Computer crime is a serious problem in the United States.  One
auditing firm places the annual loss between $3 billion and $5
billion.  Nonetheless, it is necessary to ensure that new criminal
law does not undermine the civil liberties of computer users across
the country.  We requested information from the FBI under the FOIA
to help assess the adequacy of current safeguards.  The Bureau failed
to respond.  The result is that the public is left in the dark at a time
when significant legislation is pending.
   We would appreciate whatever assistance with this request
you might be able to provide.

                     Sincerely yours,



                     Marc Rotenberg, Director
                     CPSR Washington Office


Enclosure
   Chronology of CPSR's FOIA Request regarding
   FBI Monitoring of Computer Networks with attachments

cc:   Representative Charles Schumer
   Representative Wally Herger

   FBI FOIA/PA Office

[Chronology of events]

Chronology of events

   1


   CPSR FOIA Request

FBI Monitoring of Computer Networks

CHRONOLOGY


   Aug. 18, 1989

CPSR sends FOIA request to FBI seeking agency
records regarding the FBI's monitoring of computer
networks and computer bulletin boards used by
political and advocacy organizations.  The FOIA
request seeks information about:

%  the FBI's surveillance of computer bulletin
boards and networks used by political
organizations;

%  the FBI's creation of clandestine accounts on
computer bulletin boards and networks operated
by  political organizations;

%  the FBI's creation of secret accounts on public
bulletin boards;

%  the FBI's procedures regarding the downloading
of information contained on a computer bulletin
board;

%  the FBI's research on the automated review of
the contents of information contained on
computer bulletin board and networks; and

%  the FBI's research on the  automation of the
decision to initiate a criminal investigation,
based on the contents of a computer
communication.

      The letter requests a fee waiver based on the
public interest standard.  The letter  indicates that
CPSR has particular expertise in the evaluation of
the civil liberties implications of law enforcement
computer systems, having completed an extensive
report for the House Judiciary Committee on the
proposed expansion of the FBI's computer system,
the NCIC.  The letter further states that CPSR
would work with the FOIA/PA office to facilitate
the processing of the request.

   Aug. 31, 1989

FBI response #1.  FBI sends a letter to CPSR
acknowledging receipt of the FOIA request and
designating the request "FBI's Computer Networks
and Bulletin Board Collection," request no. 319512.

   Sept. 20, 1989

CPSR speaks with FOIA Officer Keith Gehle
regarding status of request.  Mr. Gehle states that
he can not send a response "until he receives
responses from various agencies."  It is "difficult
to go to computing indices."  He says that he
expects to have information "in a couple of
weeks,"and will have a response "by October 5, at
the latest."

   Oct. 16, 1990

CPSR Follow-up letter #1.  CPSR confirms
conversation with Mr. Gehle regarding  Oct. 5 target
date and asks FOIA Officer to call to indicate the
status of the FBI's response to the request.

   Oct. 26, 1989

CPSR speaks with Mr. Gehle.  He says, "we are
working on your request."  "We should have
something soon.  Hate to give a specific date, but
should have a letter for you within two weeks."

   Nov. 22, 1989

CPSR follow-up letter #2.  CPSR writes to Mr.
Gehle, notes that Mr. Gehle said he was working on
the request, and the that response should have been
sent by Nov. 9.  CPSR requests that FOIA officer
call CPSR by Dec. 1 to indicate the status of the
request.

   Dec. 22, 1989

FBI response #2.  FBI sends letter,
acknowledging receipt of Oct. 16 and Nov. 22
letters.  The letter states that "[i]nformation which
may be responsive to your request has been located
and will be assigned for processing soon." The
letter indicates that the FOIA/PA office receives a
large number of requests and that delays are likely.

   Jan. 9 , 1990

CPSR follow-up letter #3.  CPSR writes to Mr.
Moschella, chief of the FOIA/PA office at the FBI,
acknowledges Dec. 22 letter and location of
responsive information.  Requests that records be
sent by Feb 18, 1990.

   Jan. 19, 1990

FBI response #3.  FBI sends letter stating that
the Bureau has allocated many agents to FOIA
processing, that a large number of requests are
received.  The letter further states that "a delay of
several months or more may be anticipated before
your request is handled in turn."

   Feb. 2, 1990

CPSR follow-up letter #4.  CPSR writes to Mr.
Moschella, acknowledges Jan. 19, expresses
concern about delay.  Letter notes that CPSR was
assured by a FOIA officer in the fall that "request
would be answered within 'a couple of weeks.'"

   Feb. 15, 1990

CPSR receives call from Mr. Boutwell.  According to
Mr. Boutwell, FBI can't say when request will be
processed. "Haven't even started.  Backlogs and lay-
offs during past year . . ."  CPSR: FOIA Officer
indicated information had been located. FBI: Too
optimistic. "Request not yet assigned to an analyst
. . .   working now on 1988 requests . . . Litigation is
taking up time . . .  analyst is taking time away
from document review for  litigation . . .  increased
requests, fewer personnel, lots of other factors.
Would expedite for life and death or due process,
pursuant to agency regulations." CPSR: so when do
we receive a response?  FBI: "Can't say."

 << END >>

=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
+                               END THIS FILE                                +
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+===+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=


***************************************************************
***  Computer Underground Digest Issue #1.05 / File 5 of 5  ***
***************************************************************

Modem Errata

GO PLACIDLY among the line noise and baud rates, and remember, what boredom
there was before BBSing. As far as possible, do not COVET your neighbors
HST. Answer your Email CLEARLY and with out typos, even to the NERDS that
PESTER you, for they have SOMETHING to say even if you can't FIGURE out
what it is.  Avoid FEMALE impersonators in CHAT, for they are DANGEROUS to
your ego. If you compare yourself with OTHERS, you may consider SUICIDE;
for there is always someone more PROFICIENT in ZMODEM than  yourself. Label
your disks.

Keep  interested in  your  own  CAREER, however  humble; even after
staying up ALL night  downloading. Exercise caution in  your BUSINESS
affairs; because YOU  need the  MONEY to  pay your compu-Serve bill. But
let this not BLIND you to what enjoyment there is on your  LOCAL bbs;many
persons  strive  for the MOST recent shareware and UPLOADS get you more
TIME on line.  Be yourself Especially, do not LIE  about your  AGE  or
LOOKS  when responding to "Sexlady".  Do not post messages in CAPS. Neither
be cynical about DONATIONS to  the SYSOP; for in  the face of all  REALITY,
he needs the MONEY for the PHONE lines. BEWARE of VIRUSES.  Take kindly the
councel of  Phil Katz  and Chuck Forsberg, gracefully  ADMITTING that they
KNOW more than you  will ever LEARN. Nuture  strength of  spirit to shield
you from SUDDEN hard disk crashs. But do not DISTRESS yourself with
NEEDLESS worry. Many  FEARS are born of  FATIQUE  from being connected  ALL
night to  ExecPC.  Register your  shareware.  You are a  CHILD of the
universe, you have a  RIGHT to buy a 9600 V-Series US ROBOTIC Modem. And
wether or not it is CLEAR to you, the communication  program IS
understandable. READ THE DOCS.  Therefore be at PEACE with the SYSOP, no
matter  what  a JERK he is, and what ever  your BBS  plans may be, take
your  WIFE  out to dinner occasionally.  With all its BAD documentation,
HIGH registration fees and  aborted  downloads, it is still  better  than
PAYING for commercial software. Be  CHEERFUL. Strive  to PAY your phone
bill.

                     Written by Tom Scott
             Published in telecomputing Magazine.
         Copied by John Wilson Sysop of SER/MAX!! BBS

                      Phone 602-938-0921


=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
+                           ** END CuD #1.05 **                              +
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+===+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=