**************************************************************************** >C O M P U T E R U N D E R G R O U N D< >D I G E S T< *** Volume 3, Issue #3.07 (March 2, 1991) ** **************************************************************************** MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet) ARCHIVISTS: Bob Krause / Alex Smith / Bob Kusumoto RESURRECTED SYSCZAR: Brendan Kehoe USENET readers can currently receive CuD as alt.society.cu-digest. Back issues are also available on Compuserve (in: DL0 of the IBMBBS sig), PC-EXEC BBS (414-789-4210), and at 1:100/345 for those on FIDOnet. Anonymous ftp sites: (1) ftp.cs.widener.edu (back up and running) and (2) cudarch@chsun1.uchicago.edu E-mail server: archive-server@chsun1.uchicago.edu. COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted as long as the source is cited. Some authors, however, do copyright their material, and those authors should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to the Computer Underground. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Contributors assume all responsibility for assuring that articles submitted do not violate copyright protections. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ CONTENTS THIS ISSUE: File 1: Moderators' Corner File 2: From the Mailbag File 3: CuD Index, Volume Two (2.00 - 2.19) File 4: Electronic Frontier Foundation Job Announcement File 5: Bad Moveez mark II File 6: The CU in the News ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ---------------------------------------------------------------------- ******************************************************************** *** CuD #3.07, File 1 of 6: Moderator's corner *** ******************************************************************** From: Moderators Subject: Moderators' Corner Date: March 2, 1991 ++++++++++++ Apology to a valuable contributor ++++++++++++ Sometimes letters are published that were not so-intended by the authors to be published. We indicate in the header that we assume notes may be published, and as a rule, even though we assume letters may be published, we double check "just in case." When we ask for a copy of an article or note that someone has written, we generally assume, whatever wording we use, that it's understood that it is for publication. Even if a note has been posted publicly on the nets and an author sends us a copy, we still try to check. Unfortunately, signals are sometimes crossed and an article slips into publication which an author prefered to not to be. We regret when this occurs, but it is the result of legitimate misunderstandings and not the result of any attempt to bypass author prerogative. Given the amount of mail we receive and weekly schedule, in addition to net-lag that may delay a response until *after* a post has been published, miscommunication can arise. We regret such occurances and apologize to a recent valuable contributor to whom this happened. +++++++++++++ Corrected NIA Address +++++++++++++ In the last issue of CuD, the wrong nuchat address for NIA was listed by mistake. The *CORRECT* address for NIA submissions and correspondence is: ELISEM@NUCHAT.SCCSI.COM We regret any inconvenience caused to those on the mistakenly listed account. +++++++++++++ Intertek: The CyberPunk Journal +++++++++++++ The latest INTERTEK (Winter, 1991, Vol 3,1) is out, and features "Reflections on Hackers" by Katie Hafner and interviews with John Perry Barlow and Eric Bloodaxe. For those who have not seen it, Intertek is a hard-copy magazine (the current issue is 28 pages) with articles, commentary, interviews, book reviews, research summaries, and other cutting-edge hi-tek information. Single issues are $2.50, or a one year subscription is $7. The editor, Steve Steinberg, can be contacted at: 325 Ellwood Bech, #3, Goleta, CA (93117) or internet at steve@cs.ucsb.edu. +++++++++++++++++ Call for Articles +++++++++++++++++ For the next few issues, we are especially looking for articles from readers on: (1) State of the CU (p/h and pirate) BBS community; (2) Views on such issues sysop liability on BBSs, e-mail privacy on BBS and mainframe (university or employer) systems,; and (3) Surveillance of BBSs by local, state or federal LE agents. ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ From: Assorted Subject: From the Mailbag Date: 4 March, 1991 ******************************************************************** *** CuD #3.07: File 2 of 6: From the Mailbag *** ******************************************************************** From: dgelbart@QUESTOR.WIMSEY.BC.CA(Dave Gelbart) Subject: Robert Miles - "computer wizard" Date: Sat, 23 Feb 91 23:08:00 PST *Very* interesting article "The FBI comes rapping...". But, on Robert Miles being a "computer wizard", well, in his own words: "...in a computer journal, called PC/Computing, a nationwide publication, out of Cambridge, Mass., there is an article by some lying idiot...in which he calls me a computer wizard, and states that I was a defendant in the Berg case in Denver. Sorry, about that old boy. I was never tried in Denver. The friends who were, will be amazed to learn that I was a co-defendant in that trial. And as for me being a 'computer wizard', wow, did that crack up Dotty... I can hardly fix the toaster. ... So, what you read in this article.... ha! ... Yesterday, ah couldn't spell one, now ah is one..... .....a real live Computer Wizard." "..." is where I have deleted irrelevant sections. "...." and "....." were in the original text. Not that this proves much, -- I trust Miles about as much as I trust the media -- but in the pictures I've seen of him, he certainly doesn't *look* like a techie type. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ From: <Anonymous> Subject: Civil Liberties and the Computer Underground Date: February 23, 1991 Has CuD been intentionally backing off their earlier defense of civil liberties? Recent issues lack the spark of earlier ones. What's happening with Len Rose? Why aren't there more articles on follow-ups to investigations, Ripco, Secret Service activities, searches, Steve Jackson Games, and all the issues that CuD started with? I enjoy the news and some of the articles, but I subscribed because of you guys seemed about the only ones willing to take a strong stand and speak out. Whatever happened with the informant thing? Another issue I'd like to see raised is all the anonymous posts in CuD and on the nets. In one issue you said you publish anonymously when people are afraid of reprisals. This reminds me of McCarthyism, where people were afraid to speak out for fear of being listed. Maybe the fear that the nets are monitored by vindictive types (and there are a few of these on comp.org.eff.talk) or law enforcement. Plus the fact that it's so easy to send hate mail and otherwise harass on the nets. If you're being pressured or if people are complaining about you being too pro-hacker or too radical, would you publish it, or would you just allow yourselves to be co-opted? I'd personally like to see more fire in between the other material. +++++++++++++++++++++++++++++++++++++ (Editors' response: No, we haven't been pressured or in any way or "encouraged" to change our position. Quite the opposite. Yes, we may have become less strident--although there would be a few who would claim otherwise. We have been advised to refrain from publishing anything substantive about on-going cases by those involved in them for fear of putting the principles at risk or of subverting legal strategies responding to what many see as abuses of authority. We're willing to publish articles that are both radical and conservative, and we generally have not had many articles from either extreme. However, we do have two special issues planned (tentatively 3.09 and 3.10) on government surveillance and what people in the CU can do about it. ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ From: Gordon Meyer Subject: CuD Index, Volume Two (2.00 - 2.19) Date: 25 February, 1991 ******************************************************************** *** CuD #3.07: File 3 of 6: CuD Index for Volume Two *** ******************************************************************** **************************************************************************** >C O M P U T E R U N D E R G R O U N D< >D I G E S T< *** Index to Volume Two *** *** Issues 2.00 - 2.19 *** **************************************************************************** Volume 1, Issue #2.00 (Aug 25, 1990) CONTENTS: File 1: Moderators' Corner File 2: EFF mailing #3: About the Electronic Frontier Foundation File 3: Len Rose's Search Warrant File 4: What to Read When the SS is at the Door File 5: CU in the News: More on the NY Raids ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 2, Issue #2.01 (Aug 31, 1990) CONTENTS: File 1: Moderators' Corner File 2: Proposed changees in Computer Abuse Act (S.2476) File 3: CPSR Seeks FBI data on Bulletin Board Monitoring File 4: Computers, Social Responsibility, and Political Action File 5: Another experience with the SS File 6: CU in the News ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 2, Issue #2.02 (September 9, 1990) CONTENTS: File 1: Moderators' Corner File 2: Musing over Operation Sun Devil File 3: IPCO BBS Back on-Line File 4: CuD Index, Volume 1 (Nos. 1.00 through 1.29, complete) File 5: The CU in the News ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 2, Issue #2.03 (September 14, 1990) CONTENTS: File 1: Moderators' Corner File 2: Len Rose's experience with the Secret Service File 3: Tim Wolfson's address, cite list File 4: A comment on Zod's case ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 2, Issue #2.04 (September 23, 1990) CONTENTS: File 1: Moderators' Corner File 2: Re: Evidence (was Re: Musing on Constitutionality) File 3: Why the FBI should be concerned about the Secret Service File 4: California Computer Abuse Law revisited File 5: Candidate for state governor supports electronic freedom & privacy File 6: Review of Steven Levy's CLOAK AND DAGGER File 7: The CU in the News ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 2, Issue #2.05 (September 30, 1990) CONTENTS: File 1: Moderators' Corner File 2: Re: The CU in the News (Mail reading) File 3: Anarchist Times, Inc. (ATI)--background File 4: The status of the electronic forum (BBS) File 5: Another experience with the law File 6: Some views on what to do if questioned by LE agents File 7: The CU in the News ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 2, Issue #2.06 (October 6, 1990) CONTENTS: File 1: Moderators' Corner File 2: From the Mailbag File 3: MARS BBS Sting a Prank File 4: Another view of hacking File 5: The CU in the news ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 2, Issue #2.07 (October 15, 1990) CONTENTS: File 1: Moderators' Corner File 2: Re: IBM mainframe trojan repost <CHRISTMA EXEC> File 3: CPSR Annual Meeting (Oct. 20-21, 1990) File 4: Electronic Frontier Foundation Hires Staff Counsel File 5: 13th Annual National Computer Security Conference (Part 1) File 6: 13th Annual National Computer Security Conference (Part 2) File 7: Summary of COMPUTER ETHICS (book) File 8: Introduction to TOXIC SHOCK ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 2, Issue #2.08 (October 20, 1990) CONTENTS: File 1: Moderators' Corner File 2: From the Mailbag File 3: Prodigy, Problems, and Censorship File 4: Censorship on the Nets File 5: PC's & Political Action ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 2, Issue #2.09 (October 27, 1990) CONTENTS: File 1: Moderators' Corner File 2: Len Rose Arrest File 3: Mars was not "Censored" File 4: Response to Mars "Censoring" File 5: Steve Jackson Games (SJG) Update File 6: The Future of Hacking and the System Security Profession File 7: The Ultimate Interface: Hackers and the Private Sector File 8: CU in the News: "Hackers" and Bank Blackmail in England ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 2, Issue #2.10 (November 2, 1990) CONTENTS: File 1: Moderators' Corner File 2: Len Rose Funds--A Humanitarian Necessity File 3: EFF Seeks Executive Director (Job Announcement) File 4: Massachusetts Computer Crime Bill File 5: Re: C-u-D, #2.09 Censoring of gif's File 6: The Piratical Dilemma File 7: Obtaining Identification Cards File 8: Logisticon vs. Revlon File 9: In-House Security Problems ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 2, Issue #2.11 (November 13, 1990) *** SPECIAL ISSUE: SEARCH AFFIDAVIT FOR STEVE JACKSON GAMES *** ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 2, Issue #2.12 (November 17 1990) (mailed in two parts) CONTENTS: File 1: Moderators' Corner File 2: PhD Candidate Seeks information on the CU File 3: Riggs, Darden, and Grant Sentenced File 4: Prodigy Saga Continues File 5: Re: Response to Mars "Censoring" File 6: Response to SJG Affidavit (part 1) File 7: Warrants schmarrants! The SS is Crazy! File 8: More guidelines on what to do if busted File 9: CU in the News--England and Emma Nicholson; VOGON News ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 2, Issue #2.13 (November 25 1990) CONTENTS: File 1: Moderators' Corner File 2: EPIC (Effective Performance in Candidates) File 3: The Riggs Sentencing (reprint from Newsbytes) File 4: First Conference on Computers, Freedom & Privacy File 5: Hackers Break into DEA Lines ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 2, Issue #2.14 (November 30, 1990) CONTENTS: File 1: Moderators' Corner File 2: Len Rose Indicted File 3: CPSR's FOIA request from the FBI File 4: International Information Retrieval Guild File 5: A Note on Censorship File 6: Two Comments on Prodigy File 7: Don't Talk to Cops File 8: Response to DEA/PBX News Story ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 2, Issue #2.15 (December 5, 1990) CONTENTS: File 1: Moderators' Corner File 2: Len Rose Indictment in Illinois File 3: 2600 Magazine Response to Atlanta Sentencing File 4: List of Computer Underground Clippings File 5: Computer Crime Laws list File 6: Media and the CU File 7: The Hermetic Underground ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 2, Issue #2.16 (December 10, 1990) *> SPECIAL ISSUE: "ATLANTA THREE" SENTENCING MEMORANDUM <* ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 2, Issue #2.17 (December 16, 1990) CONTENTS: File 1: Moderators' Corner File 2: From the Mailbag File 3: EFF Response to Atlanta Sentencing Memorandum File 4: Some Thoughts on the Atlanta Sentencing File 5: Earning your Stripes File 6: Playgrounds of the Mind: Cyberspace File 7: The CU in the News ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 2, Issue #2.18 (December 28, 1990) CONTENTS: File 1: Moderators' Corner File 2: From the Mailbag File 3: Computers Under Attack File 4: CU Resources in Germany File 5: Trade Secrets; When are they Bad? ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 2, Issue #2.19 (December 31, 1990) CONTENTS: File 1: Moderators' Corner File 2: From the Mailbag File 3: Telecoms Ripping off BBSs? File 4: Michigan Bell vs BBSs File 5: Clarification of Gail Thackeray's Comment on Modem Licensing File 6: a.k.a. freedom of expression File 7: Z-modem Virus Alert ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ******************************************************************** ****** END OF CuD VOLUME TWO - INDEX ******** ******************************************************************** ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ From: Mike Godwin (EFF) Subject: Electronic Frontier Foundation Job Announcement Date: 28 February, 1991 ******************************************************************** *** CuD #3.07: File 4 of 6: EFF Job Announcement *** ******************************************************************** Electronic Frontier Foundation Job Announcement The Electronic Frontier Foundation is looking to hire a Boston-based Director of Communications (DoC) to become its second full-time employee. A key aspect of the EFF's mission is to educate the public about the opportunities and challenges posed to society by technological developments in computers and telecommunications. The Foundation has taken a leading role in the effort to make sure that civil liberties are protected in the exercise of communication through computer networks and electronic bulletin boards. The EFF's public education activities are carried out through a variety of media including computer conferencing systems, public speaking, writing articles for periodicals and newspapers, appearances at public and private forums, its own publications including online and print newsletters, and a variety of special projects and publications. EFF Board members, staff, volunteers, and legal counsel all participate in these activities. The DoC will serve as a dedicated resource in these areas in order to provide oversight and co-ordination, as well as to be a principal contributor to the activities. The ideal candidate will possess: % the ability to think clearly % the writing, editing, and speaking skills to convey ideas with impact. Needs to be able to deal with complex technical and legal issues by simplifying without trivializing. % an understanding of the theory and practice of "The Marketing of Ideas", in order to reach journalists, computer professionals, politicians, hackers, lawyers, and other groups % comfort with the world of online communications and its "savage user interfaces". % a strong idealistic streak, tempered by a knowledge of what is possible. % perseverance and patience. % knowing when to use volunteers and when to use experts. Has to be able to co-ordinate the two in order to maximize limited resources. Needs to know how to nudge. A facilitator, not a dictator. General legal knowledge is a plus. The position is available immediately. For further information, contact: Mitchell Kapor Electronic Frontier Foundation, Inc. 155 Second St. Cambridge, MA 02141 (617) 864-1550 (617) 864-0866 (fax) mkapor@eff.org Please post and circulate this announcement. ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ From: dogface!bei@CS.UTEXAS.EDU(Bob Izenberg) Subject: Bad Moveez mark II Date: Wed, 27 Feb 91 00:10:53 CST ******************************************************************** *** CuD #3.07: File 5 of 6: Computers in the Movies *** ******************************************************************** * CUD Goes To The Movies * Jim Thomas challenged some friends and I to come up with the worst "hacker" films that we'd seen. What follows is only a partial list, and you've probably got your own favorites, if that's the right word. They're in no particular order. I know that I'm leaving a gold-mine of bad plot ideas untouched by ignoring commercial television. There's been one awful Booker episode that weighed in at the Cargo Cult level of sophistication, for example. You probably can think of more. -- Bob ---------------------------------------------------------------- Eight Bad Bits: The Computer Underground Film Hall of Shame ---------------------------------------------------------------- [ 1 ] War Games. The first of the big "Swatch hacker" movies. It spawned a wave of original thinkers with "joshua" as their user id or password. Were NORAD computers ever this insecure? For about ten seconds back in the Dark Ages, maybe. [ 2 ] Malibu Express. High tech and low morals, courtesy of ex-ABC Sports producer Andy Sidaris. I could say that this is a tightly plotted adventure which treats today's computer embezzlement headlines as a starting point. If you'd stop staring at the bimbos for a minute, you might agree with me. The opening credits roll over some serious Nail Slicks risking death on an Atari keyboard. This sets the tone for the whole film. [ 3 ] Prime Risk. Komputer Kids with job and bank problems spoof their least favorite bank's ATM network, only to find someone doing it on a bigger scale, for money instead of curiosity and revenge. The understanding and empathetic Federal agent rescues them and thanks them for their vigilance. Uh huh. Note how Toni Hudson's character is scripted as a Renaissance nerd, as far above Gilda Radner's Lisa Lubner character as amoebas are above Dan Quayle. [ 4 ] Colossus: The Forbin Project. Jim Thomas voted for this one, in appreciation of a malevolent defense computer with no off switch. It's the system manager's fairy tale: it never crashes, never needs new parts, never has transmission problems. How long it takes us to reach this cybernetic state of grace is left to the viewer's imagination. [ 5 ] The Manhattan Project. There's a reason, you know, why electrical supply houses aren't found in high- dollar shopping malls. I'm sorry, but hipper-than-thou nerds are the stuff of Hollywood's Summer Slump cure. Not a computer in the picture except as props, but there's a bit of hacker curiosity and humor in the script. [ 6 ] Electric Dreams. Computer oversell proves truthful when digiphobe Lenny Van Dohlen competes with his "Pineapple" computer for his neighbor's affections. [ 7 ] The Running Man. Hahahahahahahahah. Arnold in Spandex yellow leotards. Mick Fleetwood and Dweezil Zappa running the Revolutionary Left. One hundred years from now, "Richard Bachman" will spin in his grave like a turbine whenever this is shown. The "Weiss" character plays video skittles for a minute to crack the Secret Network Code. Rick Moranis says it best in Spaceballs: "That's the combination an idiot would have on his luggage!" [ 8 ] Tron. A bitter triumph of Big Special Effects Bucks over story, guaranteed to make anyone who's ever heard of Mike Jittlov cry in anguish. Picture the scriptwriter's meeting: "You're not leaving this room until you've used every buzzword in this book!" Must material to show off that new videodisc player or 50" monitor, however. (No "bit player" jokes here, I gots too much class fer that.) ------------------------ Dishonorable Mention ------------------------ [ 0 ] Evilspeak. The Devil's in my disk drive! Military prep Clint Howard gets hazed by classmates, then seeks Satanic assistance from behind his keyboard. Carrie without tampons for the high-tech set. The Bad Sci-Fi numerologists hint that this (666) must be the sequel to The Andromeda Strain (601), digitwise. Jeez, experts. [ 0 ] The Computer Wore Tennis Shoes. Always consider the Classics. A kinda porky Kurt Russell gets a jolt and leaves Jockville behind for Braintown. Old Walt might have known as much about computers as he did about animal behavior, but he did cut an acceptable teen yarn. [ 0 ] Forbidden World. Show this and you'll disappoint computerists and sci-fi fans alike. Some gene-spliced oil slick expresses a difference of opinion about who's the Food Of The Future around here, anyway. Later, it grows teeth and is found to have bio-hacked the base computer. Type type, munch munch. Stay tuned for (or beware of) the scientist who cuts a softball-sized tumor out of his own stomach (sans anesthesia) and slam dunks it down the monster's throat. [ 0 ] Thrillkill. Bad bad bad. Even cable stations won't show this when decent folk are awake. [ 0 ] Ferris Bueller's Day Off. I know, it's a comedy, so I'll go easy. "I asked for a car; I got a computer." Maybe I'm way off base in doubting whether a conniving rich kid would ever get beyond a stock ticker, technology-wise. That thirty-second scene, and the synth in the bedroom, branded it forever thus: "Ferris Bueller (Matthew Broderick) plays high-tech hooky in the big city." Cliff's Notes are too complex for some people, apparently. [ 0 ] Chopping Mall. Sorry, but I had to slip one more slash flick in here. It's nice to see Paul and Mary Bland again (after Eating Raoul.) Also, there's something about security robots running amuck that might strike a familiar chord in readers of this august publication. ----------------------------------------- From The Land of The Forgotten Titles ----------------------------------------- [ ? ] A bunch of fantasy gamers find some plugged-in Ayatollah using a time-sharing network to aim his terrorists here in the U.S. of A. They sneak in and aim them at useless targets. Dialogue by Craftsman and U.S. Plywood. ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ From: Various Subject: The CU in the News Date: March 3, 1991 ******************************************************************** *** CuD #3.07: File 6 of 6: The CU in the News *** ******************************************************************** Date: Wed, 20 Feb 91 14:34:11 PST From: Visualize Whirled Peas <brewer@ACE.ENET.DEC.COM> Subject: Sounds good... court ruling on BBS in SW Bell From: Jim.Bellotte@f2.n106.z1.fidonet.org (Jim Bellotte) Newsgroups: alt.cosuard Subject: settlement Date: 19 Feb 91 12:15:38 GMT On January 9, 1991, the Texas Public Utilities Commission, on a vote of 3 to 0 approved a negotiated settlement in Texas PUC docket 8387. This is the case of Reginald A. Hirsch, et. al. vs Southwestern Bell Telephone Company. This case grew from Southwestern Bell's attempt to assess business rates to all known BBSs. The negotiated settlement provides for the following provision to be added to the Southwestern Bell tariffs: -------------Begin quotation from proposed stipulation--------------- 2. Southwestern Bell agrees to amend Section 23, Paragraph 3.1 of its General Exchange Tariff defining business service to include the following footnote: As a result of a Stipulation in Docket No. 8387 approved by the Commission on ______, Southwestern Bell agrees that all Bulletin Board Systems ("BBS") that are located at residence locations that do not solicit, require, or receive monetary compensation and that use three or fewer local exchange access lines shall be permitted to subscribe to local exchange access service at the approved residential rates. BBSs that are eligible to subscribe to local exchange access service at residential rates may publish their name, telephone number and technical information in a listing of BBSs by location or subject matter. Such listings must be purely informational to advise readers of the BBS's name, telephone number, location, subject matter, hours, baud rates, and other technical information. BBSs that do not meet these conditions will be considered businesses, and approved business rates will apply for all local exchange access lines used by such BBS. -----------------------------End Quotation-------------------------- The stipulation also provides that Southwestern Bell will provide a single point of contact for BBS operators and that for a period of 90 days after the PUC decision, they will waive service charges on orders to change service from one class of service to another in order to comply with settlement. This has been a long fight. The settlement is not what any of the parties would consider perfect. It does give BBS operators in Texas a firm set of guidelines in which to operate. They no longer have to play "Russian Roulette", hoping that they reach a SWBT business office that understands the rules. Ed Hopper President - COSUARD ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ From: "Michael E. Marotta" <MERCURY@LCC.EDU> Subject: New Telecom Laws Proposed Date: Fri, 22 Feb 91 08:23 EST GRID News. ISSN 1054-9315. vol 2 nu 6. February 22, 1991. World GRID Association, P. O. Box 15061, Lansing, MI 48901 USA ---------------------------------------------------------------- Michigan to Overhaul Telecom Rules by Michael E. Marotta On February 19 and 20, companion bills were introduced into the state house and state senate of Michigan. "The Michigan Telecommunications Act" is House Bill 4343 and Senate Bill 124. The two versions are identical. HB4343 was introduced by Alma G. Stallworth (D-Detroit), chair of the House Public Utilities committee. SB124 was introduced by Mat J. Dunaskiss (R-Lake Orion), chair of the newly-created Senate Technology and Energy Committee. If passed by October 1, 1991, the bills become law on that date and have sunset limits of four years, expiring on September 30, 1995. The Michigan Telecommunications Act would, if passed into law, accomplish the following: (*) establish a new regulator, the Michigan Telecommunications Commission, removing telephone from the Public Service Commission and bringing cable television under the new agency's scope. (*) de-regulate local exchange providers, allowing them monopoly status and the right to sell other services, including long distance, cable television and information. (*) freeze local rates at the current level, allowing no increase beyond the maximum rate as of Nov. 1, 1990. (*) require 911 service to be provided to any county that wants it. In fact, there are 48 separate provisions for 911 service, significantly more than any other section of the act. (Mandatory service for the hearing impaired runs a mere 42 lines.) (*) Outlaw unsolicited advertising via fax. (This provision, like many of the 911 rules, is already in place. It was created in 1990 as an amendment to the Telephone Act of 1913 and is being carried over.) The Michigan Telecommunications Act specifically seeks to overturn the "Modified Final Judgement." Its goal is to allow Michigan telecom providers the freedom to develop products and services. Whether and to what extent it meets those goals will be determined in part by what happens to the bills in committees and on the floors. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ From: John / Barbara McMullen (Reprint from Newsbytes) Subject: 2600 banned from Texas Prisons Date: March 4, 1991 MIDDLE ISLAND, NEW YORK, U.S.A., 1991 MAR 4(NB) -- Emmanuel Goldstein, editor and publisher of 2600: The Hacker Quarterly, has told Newsbytes that The Texas Department of Criminal Justice has prohibited delivery delivery of the fall 1990 issue of 2600 to a subscriber incarcerated in a Texas prison. The official "Publication Denial Notification" form, dated January 9, 1991, was received by Goldstein and published in the Winter 1990-91 issue that was released on March 1st. The form indicates that the denial was instituted because "Publication contains material on the setting up and operation of criminal schemes or how to avoid detection of criminal schemes by lawful authority charged with the responsibility for detected such illegal activity." The specific reasons for determining the basis for the ruling are listed as "Pages 18, 19, 20, 21, 29, 42 and 43 contain information on misusing telephone equipment to make telephone calls illegally and to obtain cash and credit cards illegally." Goldstein, commenting on the ban to Newsbytes, said "Inside of prison, there is not much freedom so I guess it's not surprising that they do things like this. What is surprising is that the article which they were most concerned with was written by the Fraud Division of the U.S. Secret Service and was clearly indicated to have been so authored." Newsbytes examined the Fall issue of 2600 and found that the Secret Service technical synopsis is contained on pages 18-21 while page 29 is part of the letters from readers section and contains a letter from a prisoner in an unnamed prison explaining how he or she makes unpaid telephone calls. Pages 42 and 43 contain an article by "Crazed Luddite & Murdering Thug", "An Algorithm For Credit Cards", which explains the checksum verification of credit card numbers. Also contained in the same issue is an interview with security expert Dr. Dorothy Denning, an explanation of caller-id and an article by Goldstein on alleged BellSouth plans for monitoring telephone lines. A supervisor at the Texas Department of Criminal Justice, Institutional Division told Newsbytes that "Inmates may subscribe to any publication they choose but they understand that the magazines are subject to review for appropriateness. If they contain any material that does not meet or standards, either the articles in question or the entire magazine will be rejected." The supervisor, who could not speak for attribution, explained that, if the objectionable passages were 5 pages or less, they would have been removed and the remainder of the magazine delivered. She also said that both the inmate and the publication have the right to appeal the decision. (Barbara E. McMullen & John F. McMullen/19910304) ******************************************************************** ------------------------------ **END OF CuD #3.07** ********************************************************************