Computer underground Digest    Sun  Mar 13, 1994   Volume 6 : Issue 24
                           ISSN  1004-042X

       Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
       Archivist: Brendan Kehoe (He's Baaaack)
       Acting Archivist: Stanton McCandlish
       Shadow-Archivists: Dan Carosone / Paul Southworth
                          Ralph Sims / Jyrki Kuoppala
                          Ian Dickinson
       Copita Editor:      Sheri O'Nothera

CONTENTS, #6.24 (Mar 13, 1994)
File 1--Clipping the Wings of Freedom (Reprint, by J.P. Barlow)
File 2--Leahy to hold hearings on Clipper Chip!
File 3--Survey: communication ethics on the net
File 4--Starring Tom Cruise as Kevin Poulsen?

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send a one-line message:  SUB CUDIGEST  your name
Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at:  Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on  internet);
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

EUROPE:   from the ComNet in LUXEMBOURG BBS (++352) 466893;
          In ITALY: Bits against the Empire BBS: +39-461-980493

FTP:   UNITED STATES:  etext.archive.umich.edu (141.211.164.18)  in /pub/CuD/
                       aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
  EUROPE:         nic.funet.fi in pub/doc/cud/ (Finland)
                  nic.funet.fi
                  ftp.warwick.ac.uk in pub/cud/ (United Kingdom)

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.  CuD material may  be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission.  It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified.  Readers are encouraged to submit reasoned articles
relating to computer culture and communication.  Articles are
preferred to short responses.  Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
            the views of the moderators. Digest contributors assume all
            responsibility for ensuring that articles submitted do not
            violate copyright protections.

----------------------------------------------------------------------

Date: Sun, 13 Mar 1994 11:30:17 -0500
From: John Perry Barlow <barlow@EFF.ORG>
Subject: File 1--Clipping the Wings of Freedom (Reprint, by J.P. Barlow)

                Clipping the Wings of Freedom           page 1

Jackboots on the Infobahn
by John Perry Barlow
<barlow@eff.org>

[Note: I wish to reserve to Wired Magazine first paper publication of
the following piece. However, given the fairly immediate nature of
this issue, I am net-casting it now. Feel free to pass it on
electronically as you see fit, but please do not turn it into any sort
of hard copy until Wired has done so. I also encourage you to buy the
April issue of Wired in which it will appear.]


On January 11, I managed to schmooze myself aboard Air Force 2. It was
flying out of LA, where its principal passenger had just outlined his
vision of the Information Superhighway to a suited mob of television,
show biz, and cable types who fervently hoped to own it one day...if
they could ever figure out what the hell it was.

>From the standpoint of the Electronic Frontier Foundation, the speech
had been wildly encouraging. The Vice President's announced program
incorporated many of the concepts of open competition, universal
access, and deregulated common carriage which we'd been pushing for
the previous year.

But he had said nothing about future of privacy, except to cite among
the bounties of the NII its ability to "help law enforcement agencies
thwart criminals and terrorists who might use advanced
telecommunications to commit crimes."

On the plane I asked him what this had meant regarding Administration
policy on cryptography. He became non-committal as a cigar store
indian.  "We'll be making some announcements... I can't tell you
anything more." He hurried back to the front of the plane, leaving me
to troubled speculation.


Despite its fundamental role in assuring privacy, transaction
security, and reliable identity within the NII, the Clinton/Gore
Administration policies regarding cryptography have not demonstrated
an enlightenment to match the rest of their digital visions.

The Clipper Chip...which bodes to be either the goofiest waste of
federal dollars since Gerald Ford's great Swine Flu program or, if
actually deployed, a surveillance technology of profound
malignancy...seemed at first an ugly legacy of Reagan/Bush. "This is
going to be our Bay of Pigs," one White House official told me at the
time Clipper was introduced, referring to the distastrous Cuban
invasion plan Kennedy inherited from Eisenhower.

(Clipper, in case you're just tuning in, is an encryption chip which
the NSA and FBI hope will someday be in every phone and computer in
America. It scrambles your communications, making them unintelligible
to all but their intended recipient. All, that is, but the government,
which would hold the "key" to your chip. The key would separated into
two pieces, held in escrow, and joined with the appropriate "legal
authority.")

Of course, trusting the government with your privacy is trusting a
peeping tom to install your window blinds. And, since the folks I've
met in this White House seem extremely smart, conscious, and
freedom-loving...hell, a lot of them are Deadheads...I was sure that
after they felt fully moved in, they'd face down the NSA and FBI, let
Clipper die a natural death, and lower the export embargo on reliable
encryption products.

Furthermore, NIST and the National Security Council have been studying
both Clipper and export embargoes since April. Given that the volumes
of expert testimony they collected opposed them both almost
unanimously , I expected the final report to give the Administration
all the support it needed to do the right thing.

I was wrong about this. Instead, there would be no report. Apparently,
they couldn't draft one which supported, on the evidence, what they
had decided to do instead.


THE OTHER SHOE DROPS

On Friday, February 4, the other jack-boot dropped. A series of
announcements from the Administration made it clear that cryptography
would become their very own "Bosnia of telecommunications" (as one
staffer put it). It wasn't just that the old Serbs in the NSA and the
FBI were still making the calls. The alarming new reality was that the
invertebrates in the White House were only too happy to abide by them.
Anything to avoid appearing soft on drugs or terrorism.

So, rather than ditching Clipper, they declared it a Federal Data
Processing Standard, backing that up with an immediate government
order for 50,000 Clipper devices. They appointed NIST and the
Department of Treasury as the "trusted" third parties that would hold
the Clipper key pairs.  (Treasury, by the way, is also home to such
trustworthy agencies as the Secret Service and the Bureau of Alcohol,
Tobacco, and Firearms.)

They re-affirmed the export embargo on robust encryption products,
admitting for the first time that its purpose was to stifle
competition to Clipper. And they outlined a very porous set of
requirements under which the cops might get the keys to your chip.
(They would not go into the procedure by which the NSA would get them,
though they assured us it was sufficient.)

They even signaled the impending return of the dread Digital
Telephony, an FBI legislative initiative which would require
fundamentally re-engineering the information infrastructure to make
provision of wiretapping ability the paramount design priority.


INVASION OF THE BODY SNATCHERS

Actually, by the time the announcements thudded down, I wan't
surprised by them. I had spent several days the previous week in and
around the White House.

I felt like I was in another re-make of The Invasion of the Body
Snatchers.  My friends in the Administration had been transformed.
They'd been subsumed by the vast mind-field on the other side of the
security clearance membrane, where dwell the monstrous bureaucratic
organisms which feed themselves on fear. They'd adopted the
institutionally paranoid National Security Weltanschauung.

They used all the tell-tale phrases. Mike Nelson, the White House
point man on NII, told me, "If only I could tell you what I know,
you'd feel the same way I do." I told him I'd been inoculated against
that argument during Vietnam. (And it does seem to me that if you're
going to initiate a process which might end freedom in America, you
probably need an argument that isn't classified.)

Besides, how does he know what he knows? Where does he get his
information?  Why the NSA, of course. Which, given its strong interest
in the outcome, seems hardly an unimpeachable source.

However they reached it, Clinton and Gore have an astonishingly simple
bottom line, against which even the future of American liberty and
prosperity is secondary: They believe that it is their responsibility
to eliminate, by whatever means, the possibility that some terrorist
might get a nuke and use it on, say, the World Trade Center. They have
been convinced that such plots are more likely to ripen to their
hideous fruition behind a shield of encryption.

The staffers I talked to were unmoved by the argument that anyone
smart enough to steal and detonate a nuclear device is probably smart
enough to use PGP or some other uncompromised crypto standard. And
never mind that the last people who popped a hooter in the World Trade
Center were able to put it there without using any cryptography and
while under FBI surveillance.

We are dealing with religion here. Though only 10 American lives were
lost to terrorism in the last two years, the primacy of this threat
has become as much an article of faith with these guys as the Catholic
conviction that
human life begins at conception or the Mormon belief that the Lost
Tribe of Israel crossed the Atlantic in submarines.

In the spirit of openness and compromise, they invited EFF to submit
other solutions to the "problem" of the nuclear-enabled terrorist
besides key escrow devices, but they would not admit into discussion
the argument that such a threat might, in fact, be some kind of
phantasm created by the spooks to ensure their lavish budgets into the
Post-Cold War era.

As to the possibility that good old-fashioned investigative techniques
might be more valuable in preventing their show-case catastrophe (as
it was after the fact in finding the alleged perpetrators of the last
attack on the World Trade Center),they just hunkered down and said
that when wire-taps were necessary, they were damned well necessary.

When I asked about the business that American companies lose to their
inability to export good encryption products, one staffer essentially
dismissed the market, saying that total world trade in crypto goods
was still less than a billion dollars. (Well, right. Thanks more to
the diligent efforts of the  NSA than lack of sales potential.)

I suggested that a more immediate and costly real-world effect of
their policies would be reducing national security by isolating
American commerce, owing to a lack of international confidence in the
security of our data lines. I said that Bruce Sterling's fictional
data-enclaves in places like the Turks and Caicos Islands were
starting to look real world inevitable.

They had a couple of answers to this, one unsatisfying and the other
scary.  Their first answer was that the international banking
community could just go on using DES, which still seemed robust enough
to them. [DES is the old federal Data Encryption Standard, thought by
most cryptologists to be nearing the end of its credibility.]

More troubling was their willingness to counter the data-enclave
future with one in which no data channels anywhere would be secure
from examination by some government or another. They pointed to
unnamed other countries which were developing their own mandatory
standards and restrictions regarding cryptography and have said to me
on several occasions words to the effect that, "Hey, it's not like you
can't outlaw the stuff. Look at France."

Of course, they have also said repeatedly...and for now I believe
them...that they have absolutely no plans to outlaw non-Clipper crypto
in the U.S. But that doesn't mean that such plans couldn't develop in
the presence of some pending "emergency." Then there is that White
House briefing document, issued at the time Clipper was first
announced, which asserts that no U.S. citizen "as a matter of right,
is entitled to an unbreakable commercial encryption product."

Now why, if it's an ability they have no intention of contesting, do
they feel compelled to declare that it's not a right? Could it be that
they are preparing us for the laws they'll pass after some bearded
fanatic has gotten himself a surplus nuke and used something besides
Clipper to conceal his plans for it?

If they are thinking about such an eventuality, we should be doing so
as well. How will we respond? I believe there is a strong, though
currently untested, argument that outlawing unregulated crypto would
violate the First Amendment, which surely protects the manner of our
speech as clearly as it protects the content.

But of course the First Amendment is, like the rest of the
Constitution, only as good as the government's willingness of the to
uphold it. And they are, as I say, in a mood to protect our safety
over our liberty.

This is not a mind-frame against which any argument is going to be
very effective. And it appeared that they had already heard and
rejected every argument I could possibly offer.

In fact, when I drew what I thought was an original comparison between
their stand against naturally proliferating crypto and the folly of
King Canute (who placed his throne on the beach and commanded the tide
to leave him dry), my opposition looked pained and said he had heard
that one almost as often as jokes about road-kill on the Information
Superhighway.

I hate to go to war with them. War is always nastier among friends.
Furthermore, unless they've decided to let the NSA design the rest of
the National Information Infrastructure as well, we need to go on
working closely with them on the whole range of issues like access,
competition, workplace privacy, common carriage, intellectual
property, and such.  Besides, the proliferation of strong crypto will
probably happen eventually no matter what they do.

But then again, it might not. In which case we could shortly find
ourselves under a government that would have the automated ability to
log the time, origin and recipient of everycall we made, could track
our physical whereabouts continuously, could keep better account of
our financial transactions than we do, and all without a warrant. Talk
about crime prevention!

Worse, under some vaguely defined and surely mutable "legal
authority," they also would be able to listen to our calls and read
our e-mail without having to do any backyard rewiring. (And wouldn't
even need that to monitor our overseas calls.)

If there's going to be a fight, I'd far rather it be with this
government than the one we'd likely face on that hard day.

Hey, I've never been a paranoid before. It's always seemed to me that
most governments are too incompetent to keep a good plot strung
together all the way from coffee break to quitting time. But I am now
very nervous about the government of the United States of America.

Because Bill 'n' Al, whatever their other new paradigm virtues, have
allowed the very old paradigm trogs of the Guardian Class to the
define as their highest duty the defense of America against an enemy
that exists primarily in the imagination and is therefore capable of
anything.

To assure absolute safety against such an enemy, there is no limit to
the liberties we will eventually be asked to sacrifice. And, with a
Clipper chip in every phone, there will certainly be no technical
limit on their ability to enforce those sacrifices.


WHAT YOU CAN DO

GET CONGRESS TO LIFT THE CRYPTO EMBARGO

The Administration is trying to impose Clipper on us by manipulating
market forces. Purchasing massive numbers of Clipper devices, they
intend to produce an economy of scale which will make them cheap while
their export embargo renders all competition either expensive or
non-existent.

We have to use the market to fight back. While it's unlikely that
they'll back down on Clipper deployment, the Electronic Frontier
Foundation believes that with sufficient public involvement, we can
get Congress to eliminate the export embargo.

Rep. Maria Cantwell (D-WA) has a bill (H.R. 3627) before the Economic
Policy, Trade, and Environment Science Subcommittee of the House
Foreign Affairs Committee which would do exactly that. She will need a
lot of help from the public. They may not care much about your privacy
in DC, but they still care about your vote.

Please signal your support of H.R. 3627, either by writing her
directly or e-mailing her at cantwell@eff.org. Messages sent to that
address will be printed out and delivered to her office. In the
Subject header of your message, please include the words "support HR
3627." In the body of your message, express your reasons for
supporting the bill. You may also express your sentiments to Rep. Lee
Hamilton, the Foreign Relations Committee chairman, by e-mailing
hamilton@eff.org.

Furthermore, since there is nothing quite as powerful as a letter from
a constituent, you should check the following list of subcommittee and
committee members to see if your congressperson is among them. If so,
please copy them your letter to Ms. Cantwell.

Economic Policy, Trade, and Environment Science Subcommittee:
Democrats: Sam Gejdenson (Chairman), James Oberstar, Cynthia McKinney,
Maria Cantwell, Eric Fingerhut, Albert R. Wynn, Harry Johnston, Eliot
Engel, Charles Schumer. Republicans: Toby Roth (ranking), Donald
Manzullo, Doug Bereuter, Jan Meyers, Cass Ballenger, Dana Rohrabacher.

Foreign Affairs Committee:
Democrats: Lee Hamilton (Chairman), Tom Lantos, Robert Torricelli,
Howard Berman, Gary Ackerman, Eni Faleomavaega, Matthew Martinez,
Robert Borski, Donal Payne, Robert Andrews, Robert Menendez, Sherrod
Brown, Alcee Hastings, Peter Deutsch, Don Edwards, Frank McCloskey,
Thomas Sawyer, Luis Gutierrez. Republicans: Benjamin Gilman (ranking),
William Goodling, Jim Leach, Olympia Snowe, Henry Hyde, Christopher
Smith, Dan Burton, Elton Gallegly, Ileana Ros-Lehtinen, David Levy,
Lincoln Diaz-Balart, Ed Royce.


BOYCOTT CLIPPER DEVICES AND THE COMPANIES WHICH MAKE THEM.

Don't buy anything with a Clipper chip in it. Don't buy any product
from a company which manufactures devices with "Big Brother Inside."
It is likely that the government will ask you to use Clipper for
communications with the IRS or when doing business with Federal
agencies. They cannot, as yet, require you to do so. Just say no.


LEARN ABOUT ENCRYPTION AND EXPLAIN THE ISSUES TO YOUR UNWIRED FRIENDS

The administration is banking on the likelihood that this stuff too
technically obscure to agitate anyone but nerds like us. You prove
them wrong by patiently explaining what's going on to all the people
you know who have never touched a computer and glaze over at the
mention of words like "cryptography."

Maybe you glaze over yourself. Don't. It's not that hard. For some
hands-on experience, download a copy of PGP, a shareware encryption
engine which uses the robust RSA encryption algorithm. and learn to
use it.


GET YOUR COMPANY TO THINK ABOUT EMBEDDING REAL CRYPTOGRAPHY IN ITS
PRODUCTS

If you work for a company which makes software, computer hardware, or
any kind of communications device, work from within to get them to
incorporate RSA or some other strong encryption scheme into their
products. If they say that they are afraid to violate the export
embargo, ask them to consider manufacturing such products overseas and
importing them back into the United States. There appears to be no law
against that. As yet.

You might also lobby your company to join the Digital Privacy and
Security Working Group, a coalition of companies and public interest
groups that includes IBM, Apple, Sun, Microsoft (and, interestingly,
Clipper phone manufacturer AT&T) that is working to get the embargo
lifted.


JOIN EFF, CPSR, OR BOTH

Self-serving as it sounds coming from me, I think you can do a lot to
help by becoming a member of one of these organizations. In addition
to giving you access to the latest information on this subject, every
additional member strengthens our credibility with Congress.

Join the Electronic Frontier Foundation by writing membership@eff.org.
Join Computer Professionals for Social Responsibility by writing
[provide e-mail address here.]

In his LA speech, Gore called the development of the NII "a
revolution." And it is a revolutionary war we are engaged in here.
Clipper is a last ditch attempt by the United States, the last great
power from the Industrial Era, to establish imperial control over
Cyberspace. If they win, the most liberating development in the
history of humankind could become, instead, the surveillance system
which will monitor our grandchildren's morality. We can be better
ancestors than that.


John Perry Barlow is co-founder and Vice-Chairman of the Electronic
Frontier Foundation, a group which defends liberty, both in Cyberspace
and the Physical World. He has three daughters.

------------------------------

Date: Mon, 7 Mar 1994 21:12:57 -0500 (EST)
From: Stanton McCandlish <mech@EFF.ORG>
Subject: File 2--Leahy to hold hearings on Clipper Chip!

Dear Friends on the Electronic Frontier:

I have some good news to share with you.  Senator Leahy just sent me a
letter indicating that he *will* be scheduling hearings on the
Administration's Clipper Chip proposal.  I would like to thank all of
you who sent us messages to forward to him urging hearings.  I'm sure
that stack of messages we printed out made a significant impact on the
Senator -- the stack was over seven inches tall!  (We look forward to
the day when no trees will have to be sacrificed in the furtherance of
democracy!)

And if you haven't written a message to Rep. Cantwell yet about her
proposed amendment to the Export Control Act, please do so and forward
it to cantwell@eff.org.  This is an address we set up to enable us to
collect messages in support of her bill.  We have been printing out
messages and delivering them each week -- so far we've received over
4500 letters of support.  For more information on the Cantwell bill,
send a message to cantwell-info@eff.org.

Thanks again.  We'll let you know as soon as the Clipper hearing gets
scheduled.

Sincerely,

Jerry Berman
EFF Executive Director

-.-.-.-.-.-.-. forward from Sen. Leahy -.-.-.-.-.-.-.-.-.-.


United States Senate
Committee on the Judiciary
Washington, DC  20510

March 1, 1994

Mr. Jerry Berman
Executive Director
Electronic Frontier Foundation
1001 G Street, Suite 950 East
Washington, DC  20001

Dear Jerry,

Thank you for forwarding to me the many thoughtful and informative messages
you received over the Internet regarding the Administration's recent
approval of an escrowed encryption standard, known as the Clipper Chip.

Many of the messages urge Congress to hold hearings to review the
Administration's Clipper Chip standard.  In fact, I intend to hold a
hearing before the Judiciary Subcommittee on Technology and the Law, which
I chair, to consider the important issues raised by the Clipper Chip.  I
will let you know when a date for the hearing is scheduled.

Thank you again.

Sincerely,

/s/ PATRICK J. LEAHY
United States Senator

PJL/jud
-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.

JOIN EFF!!
==========

EFF's work as a civil liberties organization in Washington has been very
successful, but the realization of our goals of freedom and privacy online
can only come with the active and vocal participation of the entire online
community.  Now that you have personally experienced both the threat of the
loss of your privacy and the power having won the first battle, won't you
take that next step and become a member of EFF?

By joining EFF, you will help us to expand our reach to educate and involve
an even greater number of people in the shaping of these critical issues.
Your tax-deductible donation will tie you into the EFF information network
and support our public policy and legal work.  As a member, you will be
guaranteed timely the timely information and mechanism you need to respond
on these issues.  Our voices in unity *do* make a difference.

-------- 8< ------- cut here ------- 8< --------


MEMBERSHIP IN THE ELECTRONIC FRONTIER FOUNDATION
================================================

Print out in monospaced (non-proportional) font and mail to:

  Membership Coordinator
  Electronic Frontier Foundation
  1001 G Street, NW, Suite 950 East, Washington, DC  20001


SIGN ME UP!
-----------

I wish to become a member of the Electronic Frontier Foundation. I enclose:

  ___ Regular membership -- $40
  ___ Student membership -- $20


* Special Contribution

  I wish to make an additional tax-deductible donation in the amount of
  $__________ to further support the activities of EFF and to broaden
  participation in the organization.


PAYMENT METHOD:
---------------

  ___ Enclosed is a check or money order payable to
    the Electronic Frontier Foundation.

  ___ Please charge my:

     ___ MasterCard        ___ Visa        ___ American Express

     Card Number: _____________________________________________

     Expiration Date: _________________________________________

     Signature: _______________________________________________

     NOTE:  We do not recommend sending credit card information via email!


YOUR CONTACT INFORMATION:
-------------------------

Name: __________________________________________________________

Organization: __________________________________________________

Address: _______________________________________________________

         _______________________________________________________

Phone: _____________________

FAX:   _____________________

BBS:   _____________________    BBS Name:   ____________________

E-mail addresses: ______________________________________________

                  ______________________________________________

PREFERRED CONTACT

  ___ Electronic:  Please contact me via the Internet address listed above.
                 I would like to receive the following at that address:

    ___ EFFector Online - EFF's biweekly electronic newsletter
                          (back issues available from ftp.eff.org,
                          pub/EFF/Newsletters/EFFector).

    ___ Online Bulletins - bulletins on key developments
                           affecting online communications.

        NOTE:  Traffic may be high.  You may wish to browse these
        publications in the Usenet newsgroup comp.org.eff.news (also
        available in FidoNet, as EFF-NEWS).

  ___ Paper:  Please contact EFF through the US Mail at the street
            address listed above.

        NOTE:  Paper documents available upon request.
        "Networks & Policy" Newsletter automatically sent via US Mail.


PRIVACY POLICY
--------------

EFF occasionally shares our mailing list with other organizations promoting
similar goals. However, we respect an individual's right to privacy and
will not distribute your name without explicit permission.

  ___  I grant permission for the EFF to distribute my name and contact
     information to organizations sharing similar goals.

[This form from eff.org 3/7/94 Cantwell--please leave this line on the form!]

The Electronic Frontier Foundation is a nonprofit, 501(c)(3) organization
supported by contributions from individual members, corporations and
private foundations. Donations are tax-deductible.

------------------------------

Date: Sun, 6 Mar 94 19:12:56 CST
From: susan@UTAFLL.UTA.EDU(Susan Herring)
Subject: File 3--Survey: communication ethics on the net

The following survey is part of a project I am conducting on communication
ethics on the net.  I'd appreciate it if everyone who reads this message
could take a few minutes to answer and return the survey.  All responses
will remain strictly confidential.  A summary of the results will be made
available to respondents upon request.

=========================================================================
                        NETIQUETTE SURVEY

The following questions concern behavior on electronic discussion lists
and/or newsgroups.  Answer on the basis of your personal experience and
reactions.  Needless to say, there are no correct or incorrect answers.

1.  What behaviors bother you most on the net?

2.  What net behaviors do you most appreciate when you encounter them?

3.  In an ideal world, what one change would you most like to see in
the way people participate on the net?


SPECIFIC BEHAVIORS
For each behavior listed below, place an X under the number that indicates
how common the behavior is in your experience on the net, and your typical
reaction when you encounter it.  (If the behavior reminds you of a particular
list or group, feel free to mention the group or otherwise comment.)

                              rare        common  like       dislike
1.  Participants post very      1  2  3  4  5       1  2  3  4  5
    long messages

2.  Participants post short     1  2  3  4  5       1  2  3  4  5
    messages

3.  The same participant(s)     1  2  3  4  5       1  2  3  4  5
    post frequently

4.  Requests are posted for     1  2  3  4  5       1  2  3  4  5
    obvious or easily-
    obtained information

5.  Requests are posted on      1  2  3  4  5       1  2  3  4  5
    FAQs or topic previously
    discussed
                              rare        common  like       dislike
6.  Messages don't contain      1  2  3  4  5       1  2  3  4  5
    explicit subject headers

7.  Messages contain typos      1  2  3  4  5       1  2  3  4  5
    or spelling errors

8.  Messages are unclearly      1  2  3  4  5       1  2  3  4  5
    worded or otherwise obscure

9.  Messages posted on topics   1  2  3  4  5       1  2  3  4  5
    not directly related to
    focus of list/newsgroup

10. Same msg. posted more than  1  2  3  4  5       1  2  3  4  5
    once to same list/newsgroup
                              rare        common  like       dislike
11. Message cross-posted to     1  2  3  4  5       1  2  3  4  5
    multiple lists/newsgroups

12. Messages sent publicly      1  2  3  4  5       1  2  3  4  5
    instead of to listserv or
    to a private individual

13. Messages quote all of       1  2  3  4  5       1  2  3  4  5
    message being responded to

14. Elaborate signature files   1  2  3  4  5       1  2  3  4  5

15. Messages contain personal   1  2  3  4  5       1  2  3  4  5
    or intimate information
    about sender
                              rare        common  like       dislike
16. Messages compliment or      1  2  3  4  5       1  2  3  4  5
    thank others for their
    messages

17. Messages agree with the     1  2  3  4  5       1  2  3  4  5
    content of previous msgs.

18. Messages challenge the      1  2  3  4  5       1  2  3  4  5
    content of previous msgs.

19. Messages have humorous      1  2  3  4  5       1  2  3  4  5
    content

20. Messages are ironic or      1  2  3  4  5       1  2  3  4  5
    sarcastic in tone
                              rare        common  like       dislike
21. Messages contain insider    1  2  3  4  5       1  2  3  4  5
    references understandable
    only to members of that group

22. Messages give advice to     1  2  3  4  5       1  2  3  4  5
    other participants

23. Messages sympathize with    1  2  3  4  5       1  2  3  4  5
    other participants

24. Messages are tentative or   1  2  3  4  5       1  2  3  4  5
    overly polite

25. Messages forcefully         1  2  3  4  5       1  2  3  4  5
    assert sender's views
                              rare        common  like       dislike
26. Participants boast of own   1  2  3  4  5       1  2  3  4  5
    achievements/importance

27. Messages contain profanity  1  2  3  4  5       1  2  3  4  5

28. Messages have racist        1  2  3  4  5       1  2  3  4  5
    content

29. Messages have sexist        1  2  3  4  5       1  2  3  4  5
    content

30. Participants "flame" or     1  2  3  4  5       1  2  3  4  5
    express strong negative
    emotion


OTHER
1.  How many screens does a message have to be before you consider it
"too long" (i.e. consider deleting it or skipping to the next message)?

2.  Would you favor limits on length and/or frequency of posting to public
lists/newsgroups?  If so, what limits would you propose?

3.  Put an X next to the statement that best applies:
        In my experience on the net, participants behave politely and
        appropriately
          a)  almost all the time
          b)  most of the time, with some exceptions
          c)  about half of the time
          d)  not very often
          e)  almost never


RESPONDENT BACKGROUND INFORMATION (important)
1.  Age:  under 25; 25-35; 36-45; 46-55; 56-65; over 65

2.  Sex:  M   F

3.  Ethnicity:  White (non-Hispanic); Asian; African-American;
        Hispanic; Native American; other

4.  Native language if other than English:

5.  Academic position:  Prof; Assoc. Prof; Assist. Prof; Instructor
        (non tenure-track); Grad student; Undergrad; academic staff;
        researcher; not associated with academia

6.  Field of specialization:

7.  Number of years using computer networks:

8.  Number of electronic discussion lists you currently subscribe to:

9.  How often, on the average, do you contribute to these lists?

10. Number of newsgroups you read (regularly or occasionally):

11. How often, on the average, do you contribute to these newsgroups?


=====================================================================
Thank you for responding.  Please send surveys and requests for
summary of survey results to susan@utafll.uta.edu or (snail mail):
Prof. Susan Herring, Program in Linguistics, University of Texas,
Arlington, TX 76019 USA.

------------------------------

Date: Sun,  6 Mar 94 02:21:40 PST
From: raustin@pro-palmtree.socal.com (Ronald Austin)
Subject: File 4--Starring Tom Cruise as Kevin Poulsen?

((The following is reprinted from Telecom Digest (V 14: #115))

                                Daily Variety
                           March 3, 1994 Thursday

SECTION: NEWS; Pg.1
BYLINE: MICHAEL FLEMING

PAR'S HACK ATTACK: Though the minds of Paramount execs have surely
been on potential whackings, computer hacking was the chief focus of
execs Bob Jaffe and John Goldwyn last week. The execs got Par to pay a
low six-figure fee against mid-six figures to Jonathan Littman for the
rights to make a movie from his Sept. 12 {L.A. Times Magazine} article
"The Last Hacker," and major names are lining up to be involved. It's
the story of Kevin Lee Poulson, a skilled computer hacker who was so
inventive he once disabled the phone system of KIIS-FM so he could be
the 102nd caller and win the $50,000 Porsche giveaway.

More seriously, he's been charged with using his expertise to breach
national security by accessing top secret files and selling the
information.  He's even suspected of disabling the phone systems of
"Unsolved Mysteries" after he was profiled, so that callers couldn't
furnish clues to his whereabouts. Poulson was caught and has been in
jail for the last three years, facing more than 100 years in prison.

ICM agent Kris Dahl got Littman to turn the article into a book for
Little, Brown, and ICM's Irene Webb racked up yet another sale for the
screen rights to the hacker story. It was a vigorous tug of war
between Touchstone, which was trying to purchase it for "City
Slickers" director Ron Underwood, and Paramount, chasing it for
producer Oren Koules.

Littman chose Koules, and now, Dish hears, Underwood wants to join
Koules to direct. Littman, meanwhile, has remained tight with the
underground community of hackers as he researches his book. That takes
its toll. Among other things, the mischief meisters have already
changed his voice mail greeting to render an obscene proposal.

                  ---------------------

UUCP: hatch!pro-palmtree!raustin           The Palmtree BBS
Inet: raustin@pro-palmtree.socal.com       310-453-8726 v.32


[TELECOM Digest Editor's Note: Thanks for passing this along. For
readers who do not remember/know of Poulsen, we have a file about him
in the Telecom Archives. As the article above points out, he will
probably be in jail for a long time to come. Articles about other
hackerphreaks who have been arrested and their exploits are in the
same sub-directory in the Archives. You can reach the Archives using
anonymous ftp lcs.mit.edu.    PAT]

------------------------------

End of Computer Underground Digest #6.24
************************************