Computer underground Digest Tue Mar 17, 1992 Volume 4 : Issue 13 Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) Associate Editor: Etaion Shrdlu CONTENTS, #4.13 (Mar 17, 1992) File 1--Some questions for the more informed.... File 2--Letters from Prison-Len Rose's final installment File 3--Standing Up to Stop the Bells File 4--Whistleblowers computer bulletin board extremely successful Issues of CuD can be found in the Usenet alt.society.cu-digest news group, on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL0 and DL12 of TELECOM, on Genie, on the PC-EXEC BBS at (414) 789-4210, and by anonymous ftp from ftp.eff.org (192.88.144.4), chsun1.spc.uchicago.edu, and ftp.ee.mu.oz.au. To use the U. of Chicago email server, send mail with the subject "help" (without the quotes) to archive-server@chsun1.spc.uchicago.edu. European distributor: ComNet in Luxembourg BBS (++352) 466893. COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted as long as the source is cited. Some authors do copyright their material, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ---------------------------------------------------------------------- Date: Fri, 13 Mar 1992 17:31 EDT From: "Led Go, You are hurding by node - The Elephants Child"@UNKNOWN.DOMAIN Subject: File 1--Some questions for the more informed.... I've just finished reading Shockwave Rider, and am currently starting to read Hackers. Does anyone have a single favorite reference, or suggestion, I'm somewhat curious about the comment of borrowing from the old hippies, in Shockwave Rider. There obviously may be some socio-psychological type references that may be there somewhere. Does anybody have any idea what Brunner was refering to there? It is an obscure mention towards the very end of the book, where the discussion of the far reaching web of the Precipice population, and its models for survival. I myself, was growing up during the last years of the so called hippie decade, so don't have much grasp on the time period. Second: After reading the rules of the Hacker Ethic, as outlined by Levy in 'Hackers', I have the following comment; I agree that information should be freely available, but feel somewhat that if I dig up the information, that anyone who wants it from me should be willing to freely pay what I freely ask for in exchange. They also have the right to not buy the information from me, but to look for another broker. I also have that same right when I'm looking for information. I'm strongly into capitolism, and thus am not at all sure I like the Hacker Ethic as described by Levy about the info should be free rule. Replies, comments, accusations, etc. may be sent to Atkinson@gems.vcu.edu. ------------------------------ Date: Wed Mar 4 18:17:21 1992 From: lenrose@ouddahere.com Subject: File 2--Letters from Prison-Len Rose's final installment ((Moderators' note: Len Rose was incarcerated for unauthorized possession of UNIX sourcecode, and has nearly completed his term in federal prison in North Carolina. For those interested in the background to this case, in which Len was considered by many to be a victim of over-zealous prosecution and sentencing, a complete history, including usenet posts, news articles, search and seizure warrant, indictment, and other information is available in the Len.Rose file in the CuD ftp archives. Len will return to Chicago on March 23, and would appreciate any employment leads. Those wishing to contact him may do so through CuD until he has a permanent address)). ++++++++++++ Greetings from Prison! It has been a long time coming, but it looks like I will be leaving here March 23, 1992. I never thought I would make it. I owe my survival to a few people out there on the Net, and I will never forget what they have done for me and my family. I have been able to keep myself informed, reading CuD and occasional articles from the Net that have been sent to me. I am looking forward to working again, and perhaps with a lot of hard work and diligence, I can once again own a home and work for myself. I have been assigned to a halfway house in Chicago, and hope to obtain some employment in the city (at least for 2 months). If I do not or cannot otain work, they may not let me leave the halfway house on weekends (to be with my family). So, if I have to, I will work at McDonalds or clean floors. I have no equipment left, so one of my first priorities will be obtaining some. Hopefully, I will be able to purchase a used Unix system and a decent modem. I will then be able to write code and work on projects for clients. I have a lot to do and very little time to accomplish it. I also have much to be thankful for, and have a very good attitude now. When I was going through the worst of it,I felt like it was the end of the world, but now I know that it's only a temporary setback. I have so much to be grateful for, and, thanks to the people who have stood by me, I will be able to end up just as if it never happened. Nowadays, I am bouncing off the walls in anticipation of seeing my wife and kids again. I haven't been able to see them while incarcerated, because they couldn't afford to visit North Carolina from Chicago, and I was never able to obtain a transfer to a closer prison. However, I guess it will make the reunion that much sweeter. Anyone who says that absence makes the heart row fonder is crazy. It is the worst torture that can be conceived. My leg has mended well enough to permit me to work at just about anything. I usually walk 3 to 4 miles a day here trying to strengthen it. Although I have nothing else to do but read and perhaps tutor people who cannot read, I have managed to pass the time. That has been my worst enemy here lately--boredom. Loneliness for the people I love has been a major enemy from the beginning. I hope to obtain an account on a system that is on the Internet so I can re-establish some contacts. Once I am able to buy some used Unix equipment, I will re-establish netsys.com and become a network site again. I have so many things to do. Obviously my family will be my primary concern. They are currently receiving some public assistance, and let me tell you, no one can survive on welfare. If not for a few people who cared, they would be living on the street. I am no longer bitter. I have learned that there are some decent folk who care, and all of ou who've helped me are really something special. I just wanted you to know that. Most of you read CuD, so if I never have the chance to speak to you, please consider this a sincere thank you for what you've done. Let's hear it for 1992. I have been dreaming of this moment for so long, and I am anxious to begin my life again. Although I have two months in a halfway house and then a three year probation to get through, I know that I will be unstoppable. If I am left alone, and am able to show the powers-that-be that I only wish to live my life, I now that I will again be a success. Family and happiness are the only things that matter. (And Unix too ((sigh)). Well, if anyone has a job that I can do, I'd be very grateful. I like to work hard and will do it right. I have a lot of catching up to do, but feel sure that I can do so in a prompt manner. Oh well. I have rambled enough. I look forward to meeting you all again on the Net. Who knows? Maybe I will become famous for something other than this....I certainly hope so. Len Rose ------------------------------ Date: Fri, 13 Mar 1992 13:31:44 -0500 From: Craig Neidorf <kl@stormking.com> Subject: File 3--Standing Up to Stop the Bells Did you hear about 1-800-54-Privacy? Did you decide to call? I did and the following is the information I received a few weeks later. It outlines some of the serious ramifications of what is going to happen if we do not actively support Congressional bills S 2112 and HR 3515. The information comes from the American Newspaper Publisher's Association (ANPA). Keep in mind, they have a vested financial interest in information services as do many others, and in many ways, the newspaper industry can be and has been just as dishonest and deceptive as the Regional Bell Operating Companies. However, in this particular situation, the ANPA has the right idea and does a pretty good job in explaining why we need to act now and act fast. You know who I am, and what I've been through. My experiences have given me a unique perspective and insight into the methods and goals of the Regional Bell Operating Companies. They are inherently deceptive and if given even the slightest chance, they will screw the consumer and engage in anti-competitive market practices. Additionally, their tactics threaten our personal privacy as well. The RBOCs must be stopped before its too late. Craig Neidorf kl@stormking.com + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + 1-800-54-Privacy 444 N. Michigan Avenue Suite 900 Chicago, Illinois 60611 February 14, 1992 Dear Consumer: If you're like many people, you may have been hesitant about leaving your name and address on our 1-800-54-PRIVACY phone line. Why? Quite simply, no one wants to give out information about themselves without knowing exactly how that information is going to be used. But the truth is, you reveal information about yourself EACH AND EVERY TIME YOU PICK UP THE PHONE. By tracking who you call, how often you call and how long each conversation lasts, the seven regional Bell telephone companies have the capability to learn and know more about you than even the IRS. In fact, with modern computer technology, there is practically no limit to what the Bells can learn about your personal life every time you pick up the phone. And there is virtually no limit -- only one's imagination -- to the ways they can take advantage of all the information they glean. Of course its one thing to have the capability to do this snooping. It's another thing to have the incentive to actually do it. Until October 7, 1991, the incentive just didn't exist for the Bells. Prior to this date, the vast electronic networks of the Bell monopolies were just neutral carriers of phone messages, data, and other companies' fax, audiotex, and videotex services. For example, when you last called a 1-900 or 1-800 line to get the latest stock quotes, sports scores, or headlines, your local phone company served simply as the pipeline for moving the billions of electrons in your call. The company that provided you with the information over the phone line was not -- and by law, could not be -- the phone company. And that's the way things had been since 1984, when U.S. District Court Judge Harold Greene issued his now-famous decree breaking up the AT&T monopoly and spinning off control of local phone service to seven regional Bell companies. In the decree, the Court expressly prohibited the individual Bells from entering three businesses -- cable TV, telephone manufacturing, and electronic information services. Why? After presiding over the lengthy AT&T anti-trust case and being exposed to hundreds upon hundreds of monopolistic abuses by AT&T, Judge Greene's Court was firmly convinced that, if allowed to enter any of these three current areas, the Bells would undoubtedly engage in the same monopolistic behavior that characterized their former parent. In other words, while cutting off the hydra-like AT&T head, Judge Greene was fearful that, given too much leeway, AT&T's seven so-called "Baby Bell" off-spring might become equal or worse monsters themselves. From day one, however, the Bells undertook a long-term, multi-million dollar lobbying campaign to fight Judge Greene's ruling and try to convince the Justice Department, the higher courts, and even the U.S. Congress that they should be permitted to enter the content end of the information service business. And, so, on October 7, 1991, after years of heavy lobbying, a higher court came through for the Bells and practically ordered Judge Greene to overturn his 1984 decree and open up the information services industry to the Bells. In the 71-page ruling, a very reluctant Judge Greene devoted two-thirds of his decision to explaining why allowing the Bells to sell information services was bad for consumers and bad for America. For example, he went to great length to discount the Bells' claim that, once given the green light, they would be better able to serve the public than the thousands of already existing electronic information services. To quote from his decision. "In the first place, the contention that it will take the Regional Companies (the Bells) to provide better information services to the American public can only be described as preposterous." Judge Green also wrote: "Moreover, the Court considers the claim that the Regional Companies' entry into information services would usher in an era of sophisticated information services available to all as so much hype." His decision also contains a warning regarding the prices consumers will be forced to pay for Bell-provided services: "The Regional Companies would be able to raise price by increasing their competitors' costs, and they could raise such costs by virtue of the dependence of their rivals' information services on local network access." Finally, here's what Judge Greene had to say about his court's decision and the public good: "Were the Court free to exercise its own judgment, it would conclude without hesitation that removal of the information services restriction is incompatible with the decree and the public interest." If Judge Greene's warnings as well as his profound reluctance to issue this ruling scare you, they should. That's because the newly freed Bells now have the incentive, which they never had before, to engage in the anti-competitive, anti-consumer practices that Judge Greene feared. Besides using your calling records to sell you information services they think you're predisposed to buy, the Bell's may well try to auction off your phone records to the highest bidder. As a result, anyone who ever uses a phone could well be a potential victim of the Bell's abuse. Consider the simple act of making a telephone call to an auto repair shop to schedule body work or a tune-up. By knowing that you made that call, your phone company might conclude that you're in the market for a new car and sell your name to local car dealers. Another example. Think about calling a real estate broker for information on mortgage rates. Knowing you must be in the market for a house, the Bells could sell your name to other brokers. Or they could try to sell you their own electronic mortgage rate service. Now let's say you and your spouse are having some problems and one of you calls a marriage counselor. Tipped off by information purchased from the phone company, a divorce lawyer shows up on your doorstep the next morning. Finally, think about calling your favorite weather service hotline -- a competitor to the weather service operated by your local phone company. By keeping track of people who use its competitor's service, the phone company might just try to get you to buy its weather service instead. Far-fetched? Not at all. Nefarious? You bet. That doesn't mean that, starting tomorrow, your phone company is going to start tracking who you call, how long your calls last, and who calls you. However, they could do it if that wanted to. And, based on past experience, some of them probably will do so at one point or another. That's because the protest of gaining an unfair edge over the competition --companies that have no choice but to depend upon the Bells wires -- is just too tantalizing a temptation for the Bells to ignore. As you might expect, the Bells claim that these fears are totally unfounded and that strict regulations are in place to prevent them from abusing your telephone privacy. However, there simply aren't enough regulators in the world to control the monopolistic tendencies and practices of the Bells. Every single one of the seven Bells has already abused its position as a regulated monopoly. There is no reason to believe they won't in the future. For example, the Georgia Public Service Commission recently found that BellSouth had abused its monopoly position in promoting its MemoryCall voice mail system. Apparently, operators would try to sell MemoryCall when customers called to arrange for hook-up to competitors' voice-mail services. Likewise, while on service calls, BellSouth repair personnel would try to sell MemoryCall to people using competitors' systems. BellSouth even used competitors' orders for network features as sales leads to steal customers. In February 1991, US West admitted it had violated the law by providing prohibited information services, by designing and selling telecommunications equipment and by discriminating against a competitor. The Justice Department imposed a $10 million fine -- 10 times larger than the largest fine imposed in any previous anti-trust division contempt case. In February 1990, the Federal Communications Commission found that one of Nynex's subsidiaries systematically overcharged another Nynex company $118 million for goods and services and passed that extra cost on to ratepayers. The abuses go on and on. In this brave new world, however, it's just not consumers who will suffer. Besides invading your privacy, the Bells could abuse their position as monopolies to destroy the wide range of useful information services already available Right now, there are some 12,000 information services providing valuable news, information, and entertainment to millions of consumers. Every one of these services depends on lines owned and controlled by Bell monopolies. This makes fair competition with the Bells impossible. It would be like saying that Domino's Pizzas could only be delivered by Pizza Hut. It would be like asking a rival to deliver a love note to your sweetheart. It would be a disaster. If the Bells aren't stopped, they will make it difficult -- if not impossible -- for competitors to use Bell wires to enter your home. They could deny competitors the latest technological advances and delay the introduction of new features. They could even undercut competitor's prices by inflating local phone bills to finance the cost of their own new information services. In the end, the Bells could drive other information services out of business, thereby dictating every bit of information you receive and depriving the American public out of the diversity of information sources it deserves and that our form of government demands. Can something be done to stop the Bells? Yes, absolutely. You can take several immediate steps to register your views on this issue. Those steps are described in the attached "Action Guidelines" sheet. Please act right away. In the meantime on behalf of our growing coalition of consumer groups, information services providers, and newspapers, thank you for your interest in this important issue. Sincerely, Cathleen Black President and Chief Executive Officer American Newspaper Publishers Association + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + ACTION GUIDELINES Something is very wrong when a monopoly is put into the position where it can abuse your privacy, drive competitors from the market, and even force you, the captive telephone ratepayer, to subsidize the costs of new information services ventures. Can something be done to stop this potential abuse? Absolutely. WHAT YOU CAN DO. The first step is to call or write your local telephone company to assert your right to privacy. The second step is to write your U.S. Representative and U.S. Senators and urge them to support House bill 3515 and Senate bill 2112. Since the purpose of both HR 3515 and S 2112 is to prevent the Bells from abusing their monopoly position, not to prevent legitimate competition, the Bells would be free to sell information services in any area of the country where they do not have a monopoly -- in other words, 6/7 of the country. However, the bills would delay entry of the Bell companies into the information services industry in their own regions until they no longer held a monopoly over local phone service. As soon as consumers were offered a real choice in local phone service -- whether it be cellular phones, satellite communications, or other new technology -- the Bells would be free to offer any information services they wanted. Both bills are fair to everyone. They protect consumer privacy and ensure that the thriving information services industry will remain competitive. Quick action is need to pass these bills. A hand-written letter stating your views is the most effective way of reaching elected officials. It is proof positive that you are deeply concerned about the issue. POINTS TO MAKE IN YOUR LETTER You may wish to use some or all of the following points: A phone call should be a personal and private thing -- not a sales marketing tool for the phone company. The Bells should not be allowed to take unfair advantage of information they can obtain about you by virtue of owning and controlling the wires that come into homes. The Bells must not be allowed to abuse their position as monopolies to drive existing information services out of business. The Bells should not be permitted to engage in activities that would deprive Americans of the information diversity they deserve and that our form of government demands. The Bells should not be permitted to finance information services ventures by inflating the phone bills of captive telephone ratepayers. AFTER YOU'VE WRITTEN YOUR LETTER After you've written your letter or made your phone call, please send us a letter and tell us. By sending us your name and address, you'll receive occasional updates on the massive effort underway to prevent the Bells from invading your privacy and turning into the monopolistic monsters that Judge Greene warned about. There's one more thing you can do. Please ask your friends, relatives, neighbors, and co-workers to urge their U.S. Representatives and Senators to support HR 3515 and S 2112. We need everyone's help if we're going to stop the Bells. 1-800-54-PRIVACY 444 N. Michigan Avenue Suite #900 Chicago, Illinois 60611 ------------------------------ Date: Fri, 6 Mar 92 15:29 GMT From: Jean-Bernard Condat <0005013469@MCIMAIL.COM> Subject: File 4--Whistleblowers computer bulletin board extremely successful Whistleblowers computer bulletin board extremely successful Whistle-blowers may now anonymously report government fraud, waste, and abuse via computer to the House Government Operations subcommittee on Government Information, Justice, and Agriculture. The number for the computer system, which will accept files and messages, is (202) 225-5527. Aliases are permitted. The Truelson' PhD published in 1986, draws upon the theoretical framework of systemic corruption--an organized conspiracy to suppress revelation of corrupt practices--to propose a retaliation model to account for organizational retaliation against whistleblowers with legitimate protests. This study is one basis of this uncredible bulletin board. House Government Information Subcommittee's whistleblower computer BBS has been "tremendously successful" and has generated about "50 substantive leads" in its two months of operation, Subcommittee Chief Counsel Robert Gellman said. Board has received 700-800 calls, many from curious browsers who want to see what's available and others who want to discuss policy matters. But Gellman said board was designed solely to allow whistle-blowers to post private notes to alert Subcommittee to instances of waste, fraud and abuse, so there isn't much for anyone else to see. There are no files available to download or bulletin to read, as there are on most bulletin boards. Gellman said message senders often don't use their real names, and Subcommittee staff has used electronic mail feature to send message back asking for more information. REFERENCES 1. Food Chemical News, December 16, 1991, ISSN 0015-6337; 2. Judith Anne Truelson, "Blowing the Whistle on systemic Corruption," University of Southern California (Los Angeles, CA), 1986; 3. Communications Daily, February 13, 1992, ISSN 0277-0679. ++++ (A SAMPLE) ++++ ON-LINE SEARCHING Welcome to THE FEDERAL WHISTLEBLOWER BBS This bulletin board exists to help the United States Congress identify waste, fraud, and abuse in the federal government. You are invited to leave messages or upload files that relate to this purpose. There are no public files or public messages on this board. Your SYSOP is Congressman Bob Wise from West Virginia. The CONTENTS of all communications are confidential and not accessible to other users. However, the name you use to sign on may be visible to other users. If this is a concern, please use a pseudonym to protect your identity. What is your FIRST name (pseudonyms okay)? JONES JOHN Checking Users... User not found Are you 'JONES JOHN' ([Y],N)? Y What is your STATE (any entry acceptable)? LYON IN FRANCE Welcome to the FEDERAL WHISTLEBLOWER BULLETIN BOARD. This Board is operated by an investigative subcommittee in the U.S. House of Representatives. Your SYSOP is Congressman Bob Wise from West Virginia. GROUND RULES: 1. There are NO public files and NO public messages on this board. If you are looking for downloads, games, etc., you won't find them here. 2. If you have a concern about protecting your identity, please use a pseudonym. Because of software limitations, the name you use to sign on with may become known to others. You may leave your real name in the contents of a message, but this is not required. THE CONTENTS OF MESSAGES CAN ONLY BE READ BY THE SYSOP. Messages cannot be read by any other user. Use the Comment command to leave messages to the Sysop. JONES JOHN from LYON IN FRANCE C)hange FIRST name (pseudonyms okay)/LAST name (pseudonyms okay)/STATE (any ent ry acceptable), D)isconnect, [R]egister? R Enter PASSWORD you'll use to logon again (dots echo)? .... Re-Enter password for Verification (dots echo)? .... Please REMEMBER your password Welcome to RBBS-PC, Condat. You have 60 mins for this session. Logging JONES JOHN RBBS-PC 17.3C Node 1, operating at 1200 BAUD,N,8,1 +--------------------------------------------------+ | Welcome to the FEDERAL WHISTLEBLOWER BBS | +--------------------------------------------------+ Your SYSOP is Congressman Bob Wise BBS Phone: (202) 225-5527 REMINDERS: 1) Remember your password. If you forget it, you can't read your mail and we can't contact you. 2) Use mixed case in messages. ALL UPPER CASE IS HARD TO READ. 3) If you upload a file, please leave a message so we know who provided it. If you don't, the upload will not be acknowledged. This is NOT a requirement. Anonymous uploads are acceptable. 4) Callers may be deleted after 30 days. If this happens to you, just register again. It only takes a second. Checking messages in MAIN.. Sorry, JONES, No NEW mail for you RBBS-PC 17.3C Node 1 Caller # 1279 # active msgs: 74 Next msg # 539 ------*>>> RBBS-PC MAIN MENU <<<*------ ----- MAIL ---------- SYSTEM ---------- UTILITIES ------ ELSEWHERE --- [R]ead Mail to Me [B]ulletins [H]elp (or ?) [F]iles [C]omment to SYSOP [I]nitial Welcome [X]pert on/off [G]oodbye [Q]uit [U]tilities *---------------------------------------------------------------- Current time: 09:38 AM Minutes remaining: 58 Security: 5 *---------------------------------------------------------------- MAIN: 58 min left MAIN command <?,B,C,F,G,H,I,K,Q,R,U,X>? B * Ctrl-K(^K) / ^X aborts. ^S suspends ^Q resumes * ======[ WHISTLEBLOWER BBS Bulletin Menu ]======= Bulletin Description *----- ------------------------------------- 1 Description and Purpose of this Board 2 Upload and Download Policies (NO DOWNLOADS!) 3 Operating Policies 4 How to Blow the Whistle Read what bulletin(s), L)ist, S)ince, N)ews ([ENTER] = none)? 3 * Ctrl-K(^K) / ^X aborts. ^S suspends ^Q resumes * THE WHISTLEBLOWER BBS: OPERATING POLICIES 1. The highest priority on this bulletin board is protecting the confidentiality of callers. A caller concerned about confidentiality should use a pseudonym. 2. There is no Caller-ID service on the bulletin board's incoming line. Incoming calls are not traced. Each caller must consider the possibility that a call to this board is being recorded or traced at the source of the call. 3. The Whistleblower BBS is operated by an investigative subcommittee in the United States House of Representatives. The purpose of the board is to assist the Congress in identifying waste, fraud, and abuse in federal agencies, programs, contracts, and grants. No action will be taken on any information that does not further this purpose. 4. A higher priority will be assigned to matters that involve large amounts of federal funds or that affect health or safety. Other matters may be pursued to the extent permitted by available resources. 5. We cannot provide any type of general assistance to callers. The board should not be used for any political purpose or to lobby Congress on legislative or policy matters. 6. Messages that relate to the purpose of the board will be acknowledged. A caller who provides an investigative lead is encouraged to call back in the event more information is required. Messages that do not relate to the purpose of the board may not be acknowledged. Most messages will be erased after they are read. 7. General information about investigations that result from activities on the Whistleblower BBS may be made public, although no information specifically identifying an individual caller will be released. Publicity for the board will help to accomplish its purpose. However, a caller will not necessarily be informed about the details of any investigation that results from his or her message. 8. Information obtained on the Whistleblower BBS may be shared with other congressional investigators, agency Inspectors General, and the General Accounting Office (the audit arm of Congress). INFORMATION THAT SPECIFICALLY IDENTIFIES CALLERS WILL NOT BE SHARED. Callers should identify any special confidentiality concerns or expressly state if they need to place any specific restrictions on the use of the information that they provide. Information will not be shared if a caller specifically requests. 9. Casual visitors to the board may be deleted from the user base at any time. If you call a second time and find that you are not recognized, just re-register. It only takes a few seconds. Users not engaged in current discussions may also be deleted as a security precaution. 10. Text files may be uploaded, preferably in ASCII format. Word Perfect format is a second choice. Files may be compressed using standard compression programs. Files other than text files will be immediately deleted. 11. If you attempt to use a common pseudonym (e.g., John Doe), you may find that it is already in use. When you first enter a name not in use, you will receive a message about the board. If you enter a name that is known to the board, you will be asked for a password. If this happens, you must hang up, call again, and use a different name. Anyone reading this has already solved the problem. This paragraph is included as an explanation. * Ctrl-K(^K) / ^X aborts. ^S suspends ^Q resumes * ======[ WHISTLEBLOWER BBS Bulletin Menu ]======= Bulletin Description *----- ------------------------------------- 1 Description and Purpose of this Board 2 Upload and Download Policies (NO DOWNLOADS!) 3 Operating Policies 4 How to Blow the Whistle Read what bulletin(s), L)ist, S)ince, N)ews ([ENTER] = none)? 4 * Ctrl-K(^K) / ^X aborts. ^S suspends ^Q resumes * THE WHISTLEBLOWER BBS How to Blow the Whistle on Fraud, Waste, and Abuse 1. You do NOT have to give your name or identify yourself in any way. But you should call again after you have left a message. Use the same name you used the first time and see if there is an answer for you. Use the READ MAIL TO ME command. This permits continuing communications so that we can ask you for more information or clarification. Allow a few days for your message to be read. 2. Remember that we are more interested in conduct involving SIGNIFICANT amounts of federal funds or MAJOR instances of wrongdoing. We have limited resources, and we are less likely to investigate minor matters. When in doubt, we encourage you to report the matter and let us decide. 3. Provide enough information so we can find and investigate the objectionable activity. Whenever possible, tell us WHO, WHAT, WHERE, WHEN, WHY, and HOW. Be as specific as possible. 4. WHO: Identify the agency, office, program, contract, or grant: Vague: ABC Department Okay: ABC Department, Z Bureau Good: ABC Department, Z Bureau, Denver Office Better: ABC Department, Z Bureau, Denver Office, Contract Number 123-456 dated 2/1/89 5. WHAT: Describe the conduct: Vague: Wasted Money Okay: Bought unnecessary computers Good: Bought 200 Personal Computers to use funds at the end of the fiscal year Better: John Smith authorized the purchase of 200 unneeded PCs under contract 123-456 on 9/30/91 to avoid returning excess funds to the Treasury 6. WHERE: State where the activity occurred: Vague: Unnecessary travel Okay: Trips to Los Angeles Good: Trips from Headquarters to Los Angeles Better: John Smith authorized travel for himself from Chicago to Los Angeles every Friday before the UCLA football team played a game at home so he could watch the game 7. WHEN: Provide all relevant dates: Vague: Last year Okay: 1990 Good: Starting in May 1990 Better: Began on May 5, 1990, continued every other week until December 14, 1991 8. WHY and HOW: Explain the conduct involved: Vague: Broke the law Okay: Did not follow procurement rules Good: Failed to obtain sole-source contracting authority Better: Procured 1000 buses from ABC Corp. under contract number 123-456, on 5/1/90, under a sole source contract that was not approved by the contracting officer. * Ctrl-K(^K) / ^X aborts. ^S suspends ^Q resumes * ======[ WHISTLEBLOWER BBS Bulletin Menu ]======= Bulletin Description *----- ------------------------------------- 1 Description and Purpose of this Board 2 Upload and Download Policies (NO DOWNLOADS!) 3 Operating Policies 4 How to Blow the Whistle Read what bulletin(s), L)ist, S)ince, N)ews ([ENTER] = none)? ------*>>> RBBS-PC MAIN MENU <<<*------ *-- MAIL ---------- SYSTEM ---------- UTILITIES ------ ELSEWHERE --- [R]ead Mail to Me [B]ulletins [H]elp (or ?) [F]iles [C]omment to SYSOP [I]nitial Welcome [X]pert on/off [G]oodbye [Q]uit [U]tilities *------------------------------------------------------------------ Current time: 09:41 AM Minutes remaining: 55 Security: 5 *------------------------------------------------------------------ MAIN: 55 min left MAIN command <?,B,C,F,G,H,I,K,Q,R,U,X>? C Type comment 60 lines max (Press [ENTER] to quit) [----------------------------------------------------------------------] 1: Hallo! 2: I am a French journalist and will be very please to receive a press 3: information on this curious BBS. 4: My e-mail address is MCI Mail #501-3469 or DialMail #24064 5: Don't hesitate to contact me. 6: Jean-Bernard Condat 7: CCCF, B.P. 8005, 69351 Lyon Cedex 08, France (Fax.: +33 1 47877070) 8: A)bort, C)ontinue adding, D)elete lines, E)dit a line I)nsert lines, L)ist, M)argin change, R)evise subj, S)ave msg, ?)help Edit Sub-function <A,C,D,E,I,L,M,R,S,?>? s Adding new msg # 539. Receiver will be notified of new mail ------*>>> RBBS-PC MAIN MENU <<<*------ *-- MAIL ---------- SYSTEM ---------- UTILITIES ------ ELSEWHERE --- [R]ead Mail to Me [B]ulletins [H]elp (or ?) [F]iles [C]omment to SYSOP [I]nitial Welcome [X]pert on/off [G]oodbye [Q]uit [U]tilities *---------------------------------------------------------------- Current time: 09:43 AM Minutes remaining: 53 Security: 5 *----------------------------------------------------------------- MAIN: 53 min left MAIN command <?,B,C,F,G,H,I,K,Q,R,U,X>? g Log off (Y,[N])? y Now: 03-06-1992 at 09:43:54 On for 7 mins, 5 secs 60 min left for next call today JONES, Thanks and please call again! ------------------------------ End of Computer Underground Digest #4.13 ************************************