Computer underground Digest    Sun  Feb 5, 1995   Volume 7 : Issue 09
                           ISSN  1004-042X

       Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
       Archivist: Brendan Kehoe
       Retiring Shadow Archivist: Stanton McCandlish
       Shadow-Archivists: Dan Carosone / Paul Southworth
                          Ralph Sims / Jyrki Kuoppala
                          Ian Dickinson
       Copy Icecreamer:    B. Robbins

CONTENTS, #7.09 (Sun, Feb 5, 1995)

File 1--Libel & Defamation in the Information Age (fwd)
File 2--CFP'95 Program/Registration Information
File 3--New Draft of Telcom Bill Out
File 4--NIST Mugshot ID database - thousands cataloged on CD
File 5--Update on "Ethics & Privacy on the Internet" Survey
File 6--Cu Digest Header Information (unchanged since 25 Nov 1994)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

----------------------------------------------------------------------

Date: Thu, 12 Jan 1995 22:23:45 -0600 (CST)
From: Avi Bass <te0azb1@corn.cso.niu.edu>
Subject: File 1--Libel & Defamation in the Information Age (fwd)

Reply to: Discussion List for Journalism Education <JOURNET@QUCDN.BITNET>
Date--Tue, 10 Jan 1995 09:55:09 EST
From--"Eric J. Eden" <R3EJE@AKRONVM.BITNET>

I thought this article might be interesting for some members on this list

Eric Eden
r3eje@vm1.cc.uakron.edu
EricEden@aol.com

  --------------------------------------------------------------
              Libel & Defamation in the Information Age
By Eric Eden


On the Internet, where abnormal behavior is the status quo, tempers
can flare in the heat of debate and word wars can last for days or
even weeks.  It's not uncommon for users to ridicule, harass or insult
those who disagree with them.

But if you damage someone's reputation by trying to embarrass them in
a public forum, you could be sued for libel or defamation.  After all,
there's no reason to assume that the messages you send through
cyberspace are immune from lawsuits.

"The Internet culture right now is for users to refute speech with
speech," says Dave Marburger, the attorney who represented Brock Meeks
in one of the first defamation lawsuits in the United States involving
the Internet.  "But as the Internet culture gets more diverse, users
will start refuting speech with lawsuits."

There have only been a handful of libel and defamation lawsuits filed
involving the Internet so far, but as the Net grows, the number of
lawsuits will probably increase.   If the few court battles that have
been decided involving libel and defamation on the Net are any
indication of how the law will be applied to the Internet in the
future, it's worth your time to learn what's libelous or defamatory on
the Internet and what's not.

Other users have the right to sue you for defamation if they can prove
you damaged their reputation or good name with false information.  You
can be sued for libel if another user can prove you have distributed
defamatory statements about them in a public area -- such as a news
group or mailing list.

In April of 1993 Gil Hardwick, an anthropologist in Australia, was
ordered by the Australian Supreme Court to pay David Rindos $40,000 in
damages because he defamed Rindos on an international mailing list.

After Rindos lost his job at the University of West Australia,
Hardwick posted a message on an international disscussion group that
suggested Rindos was fired because he was a bully and had sexually
molested a local boy.

Rindos filed a defamation lawsuit against Hardwick because he felt the
message had hurt his chances of finding a new job.  In a letter to
Rindos's attorney, Hardwick wrote "Let this matter be expedited and
done with....I can do nothing to prevent it, lacking any resources
whatsoever to defend myself."  Like most people, Hardwick didn't have
the money to hire a lawyer or finance an expensive legal battle.

"He (Rindos) suffered a great deal of personal hurt because of the
message," said Supreme Court Justice David Ipp in the West Australian.
"The damages award must compensate him and vindicate his reputation to
the public."

The Internet is an informal forum and people often write personal things
about other users, but you can be held accountable in court for making
libelous or defamatory remarks in public forums just like Hardwick was.

"We know that as the Internet grows, there will be more and more
lawsuits involving libel and defamation," says attorney David H.
Donaldson, editor of Legal Bytes, an electronic magazine that
discusses legal issues involving computers and networking.   "The only
question is if the number of cases will grow steadily or if there will be
an explosion of lawsuits all at once."

Anybody can sue you for libel or defamation if they think you damaged
their reputation, but if you can prove what you say is true, chances are
that you won't end up in court.

"Make it clear when you are stating your opinion," says  Donaldson,
"Always state the facts that your opinions are based on just to be safe.
You probably won't lose a libel or defamation lawsuit if you can back up
what you write with solid facts."

For example, Brock Meeks, a full-time journalist who also distributes his
own electronic magazine, avoided losing a defamation lawsuit largely
because he could prove an article that he sent over the Net was true.

Meeks was sued by Suarez Corporation Industries in April of 1994 for
writing an investigative story about the company and its services in his
electronic newsletter -- the CyberWire Dispatch.  Meeks had no libel
insurance, no publishing company backing him up and a lot of legal
fees to cover.  (His lawyer charged him $200 an hour.)  The only thing
Meeks had was his house -- and he didn't want to sell it to pay off a
lawsuit.

Meeks defended his article in numerous posts on the Net, "All of my
facts were rock solid.  Although the article was delivered with a fair
amount of attitude, I don't believe that I'm in dangerous waters," he
wrote.

Benjamin Suarez, owner of Suarez Corp., filed the suit because he felt
that Meeks had damaged his reputation and hurt his business by
saying he was "infamous for his questionable direct marketing scams,"
and saying "he (Suarez) has a mean streak."  To back up his opinion,
Meeks cited accusations made by the Washington state attorney
general's office concerning Suarez's direct marketing practices.

In August of 1994 Suarez Corp. made Meeks an offer he couldn't
refuse.  They agreed to settle the case for $64 -- to cover
administrative court costs.   The company refused to comment on why
they agreed to settle the lawsuit.

If the case had gone to trial, Meeks's lawyer thinks Meeks would have
been able to win anyway.  "The defendants in libel or defamation suits
involving the Internet have enhanced First Amendment rights," says
Marburger.  "The plaintiff has to prove actual malice.  In other words,
the plaintiff has to show that the defendant made false statements or
was negligent."  Marburger's only regret is that they didn't get to set
that precedent in court.

Although the Meeks case doesn't really mean anything in the law
books, it does show that if you're responsible and can prove what you
write on the Net is true, people will be less likely to take you to court.  If
you just make something up and your sources aren't reliable, you could
lose big like Hardwick did.

"You have to follow the same rules that journalists do if your going to
write and distribute controversial material about other people," says
Donaldson.

The increasingly common phenomenon of online forums creates the
possibility for you to reach large audiences, but it also creates the
ability for you to commit defamation or libel -- something that an
ordinary citizen didn't have to worry about in the past.  Before the
growth of online communication, people who didn't work in the media
usually didn't have to worry about libel or defamation. "Libel laws apply
to the Internet the same way they do to newspapers and TV stations,"
explains former Federal Communications Commissioner Nicholas
Johnson, a professor at the Iowa University school of law. "The same
technology that gives you the power to share your opinion with
thousands of people also qualifies you to be a defendant in a lawsuit."

Like a newspaper or TV station, you are responsible for making sure
the material you distribute -- or broadcast -- over the Internet is not
libelous or defamatory.  Lani Teshia-Miller never meant to defame
anyone, but when she took over the distribution of a tattoo FAQ she
almost ended up in court.  The rec.arts.bodyart FAQ she inherited
contained a lot of generalizations based on contributions from
unattributed sources.  Although she listed her name on the FAQ, she
didn't edit out several defamatory statements.  One review of a San
Francisco tattoo artist in the FAQ said, "He's getting old and having
problems with his eyesight.  His quality is really bad and he hurts
people."

After the artist hired a lawyer and threatened to sue, Teshia- Miller
changed the FAQ's wording to reflect a more factually-based and
less-hysterical view.   The review now says, "His eyesight is not what it
used to be."

After the FAQ was changed and Teshia-Miller apologized, the artist
dropped the lawsuit.  "It turned out to be a good experience for me,"
said Teshia- Miller.  "I'm  a lot more careful about what I allow on the
artist list, and I now have a very long disclaimer at the beginning of the
FAQ."

Every person you write something negative about won't sue you for
defamation or libel, they might flame you or just try to set the record
straight by replying to the message.  But if you post false information
about another user and disgrace them in public, they have the right to
take you to court -- and they could win a big settlement if they can
prove you were negligent.

Medphone, a Fortune 500 company that manufactures medical
instruments, has filed a $200 million lawsuit against Prodigy user Peter
DeNigis.  Medphone filed a "systematic program for defamation and
trade disparagement" lawsuit against DeNigis after a stockholder
reported that he was making several negative posts about Medphone a
day on Prodigy's Money Talk Forum. DeNigis, a former Medphone
stockholder, lost more than $9,000 last year by selling off his
investment in the company. In one post DeNigis wrote, "My research
indicated the company is really having a difficult time.  No case, no
sales, no profits and terrible management. This company appears to be
a fraud.  Probably will cease operations soon."

Although the accusation that Medphone is a "fraud" is very serious --
and potentially defamatory -- DeNigis might be able to win the lawsuit if
he can prove what he wrote is true in court.

"The Medphone case is a clear indication that libel and defamation is
something for Internet users to think about," says Johnson.

There are court cases in progress right now that will decide if access
providers such as Prodigy, America Online and Compuserve are
responsible for defamatory remarks broadcast over their services, but
there is no legal ambiguity about whether individual users can be sued
for making defamatory or libelous statements. Individual users are
responsible for making sure the information they distribute is not
libelous or defamatory.

The Internet has made world wide, instantaneous communication easy.
The average user now has the power to be heard by hundreds or even
thousands of other users, but in terms of libel and defamation, the Net
is not a new world of freedom. The reality is that libel and defamation
laws are enforceable in the virtual world just like they are in the real
world.

                         # # #


You may distribute this article freely for non-profit purposes.  Otherwise
contact the author (Eric Eden -- R3eje@vm1.cc.uakron.edu) for reprint
permission.

                    ------------------------------

Date:    Tue, 10 Jan 1995 10:47:24 -0600
From:    Henry Itkin <Henry.Itkin@UNI.EDU>
Subject--Re: Libel & Defamation in the Information Age

Several clarifications are needed and will, I think, ease people's minds a bit.


Eric Eden  r3eje@vm1.cc.uakron.edu  wrote, in part:

> Libel & Defamation in the Information Age
> By Eric Eden
>
> Other users have the right to sue you for defamation if they can prove
> you damaged their reputation or good name with false information.

Absolutely right.  It is the _plaintiff_ who must prove that a wrong has been
done.  See further mention below.

> You can be sued for libel if another user can prove you have distributed
> defamatory statements about them in a public area -- such as a news
> group or mailing list.

Partially right.  The post need _not_ be in a "public" area, however.  You can
libel someone through private e-mail.  If even _one person_ (beyond the
defendant and the plaintiff) is exposed to the defamatory statement, a libel
may have occurred.

> Anybody can sue you for libel or defamation if they think you damaged
> their reputation, but if you can prove what you say is true, chances are
> that you won't end up in court.

...

> For example, Brock Meeks, a full-time journalist who also distributes his
> own electronic magazine, avoided losing a defamation lawsuit largely
> because he could prove an article that he sent over the Net was true.

As noted above, this is technically incorrect.  The defendant does _not_ have
to prove that the statement was true.  Instead the plaintiff must prove it was
_false_.  There's a big difference.  For one thing, if a lawsuit is truly
groundless, then the defendant isn't required to say anything in court.
Lacking proof of falsity, the lawsuit is dismissed.


> "The defendants in libel or defamation suits
> involving the Internet have enhanced First Amendment rights," says
> Marburger.  "The plaintiff has to prove actual malice.  In other words,
> the plaintiff has to show that the defendant made false statements or
> was negligent."

This really muddies an already-difficult concept.  For now, let's just say
that how much "fault" the plaintiff has to show on the part of the defendant
depends on how "public" a figure the plaintiff is
determined (by the court) to be.  If plaintiff is ruled a "public" person, then
in most states, the defendant will have a somewhat easier time of it.

Best to all.

Hank Itkin  (itkin@uni.edu)
University of Northern Iowa

                    ------------------------------

Date:    Wed, 11 Jan 1995 10:41:11 EST
From:    Eric Eden <R3EJE@AKRONVM.BITNET>
Subject--Re: Libel & Defamation in the Information Age

On Tue, 10 Jan 1995 10:47:24 -0600 Henry Itkin said:

>> Libel & Defamation in the Information Age
>> By Eric Eden
>>
>> Other users have the right to sue you for defamation if they can prove
>> you damaged their reputation or good name with false information.
>
>Absolutely right.  It is the _plaintiff_ who must prove that a wrong has been
>done.  See further mention below.
>
>> You can be sued for libel if another user can prove you have distributed
>> defamatory statements about them in a public area -- such as a news
>> group or mailing list.
>
>Partially right.  The post need _not_ be in a "public" area, however.  You can
>libel someone through private e-mail.  If even _one person_ (beyond the
>defendant and the plaintiff) is exposed to the defamatory statement, a libel
>may have occurred.

Yes.  Libel could occur through private e-mail but the fact that it is
Private makes it a weaker case.  Most of the cases to date revolve around
messages that have been posted in public forums on Compuserve and Prodigy or
on mailing lists.


>> Anybody can sue you for libel or defamation if they think you damaged
>> their reputation, but if you can prove what you say is true, chances are
>> that you won't end up in court.
>
>...
>
>> For example, Brock Meeks, a full-time journalist who also distributes his
>> own electronic magazine, avoided losing a defamation lawsuit largely
>> because he could prove an article that he sent over the Net was true.
>
>As noted above, this is technically incorrect.  The defendant does _not_ have
>to prove that the statement was true.  Instead the plaintiff must prove it was
>_false_.  There's a big difference.  For one thing, if a lawsuit is truly
>groundless, then the defendant isn't required to say anything in court.
>Lacking proof of falsity, the lawsuit is dismissed.

The legal experts I interviewed for this story felt that even though the burden
of proof is on the plaintiff's shoulder, defendants are less likely to lose
in court if they can prove what they said is true.  Especially if the plaintiff
does have some evidence.  If a plaintiff knows the defendant can prove what he
or she wrote was true they will probably settle or drop the case.

My personal opinion is that you should be able to prove -- beyond a reasonable
doubt -- that what you write is true.   If you can't prove it, you should do
some more research or ommit the statement.  Not only for ethical reasons but
also because when your giving information to a large audience you should be
sure what you are writing is true.  However, technically you are correct.

>> "The defendants in libel or defamation suits
>> involving the Internet have enhanced First Amendment rights," says
>> Marburger.  "The plaintiff has to prove actual malice.  In other words,
>> the plaintiff has to show that the defendant made false statements or
>> was negligent."
>
>This really muddies an already-difficult concept.  For now, let's just say
>that how much "fault" the plaintiff has to show on the part of the defendant
>depends on how "public" a figure the plaintiff is
>in most states, the defendant will have a somewhat easier time of it.

The public figure issue is very complex and that's why I decided not
to tackle it in this story.  However, I do believe that Marburger's
statement is correct.

Thanks for your honest critique,

Eric Eden
r3eje@vm1.cc.uakron.edu
EricEden@AOL.COM

------------------------------

From: Carey Heckman <ceh@LELAND.STANFORD.EDU>
Subject: File 2--CFP'95 Program/Registration Information
Date: Sun, 5 Feb 1995 09:11:31 -0800 (PST)

        The Fifth Conference on Computers, Freedom and Privacy

Sponsored by:          * ACM SIGCOMM, SIGCAS, SIGSAC, and
                       * Stanford Law School

28 - 31 March 1995
San Francisco Airport Marriott Hotel
Burlingame, California

CONNECT WITH OTHERS WHO ARE DETERMINING HOW COMPUTERS AND TELECOMMUNICATIONS
WILL AFFECT YOUR FREEDOM AND PRIVACY...

JOIN US AT CFP'95.

We have reached the crossroads of the Information Age.

No longer is the electronic frontier inhabited solely by a small band of
technical pioneers sharing a common code of conduct. Computer and
telecommunications technologies have become part of mainstream living,
conversation, and politics. These changes compel us to reexamine the
definition of our rights and the processes by which those rights are being
defined.

The Fifth Conference on Computers, Freedom and Privacy will assemble experts,
advocates and interested people from a broad spectrum of disciplines and
backgrounds in a balanced public forum to explore and better understand the
definition of our rights at this crossroads.

Participants will include people from the fields of computer science, law,
business, research, information, library science, health, public policy,
government, law enforcement, public advocacy, and many others.

Featured speakers include:

John P. Morgridge, Chairman, Cisco Systems
Esther Dyson, Release 1.0/EDVenture Holdings, Inc.
Roger W. Wilkins, Professor of History and American Culture at George
	Mason University and commentator, National Public Radio
Margaret Jane Radin, Professor of Law, Stanford University
Willis H. Ware, RAND

Some of the topics in the CFP'95 program include:

FREEDOM AND RESPONSIBILITY OF ELECTRONIC SPEECH -- Exploring recent
controversies in online free speech, including a Socratic forum
that will ask whether the Constitution can indeed be viewed through a
technologically transparent lens.

HIS MASTER'S VOICE... -- Probing the future for "net propaganda" from
governments, government officials, and politicians, and who will pay
so whose message will get to whom.

STUDENT DATABASES: FOR EDUCATION AND FOR LIFE? -- Looking at how gaining the
benefits of nationwide information about K-12 students could also spell
serious privacy problems.

CAN THE NET SURVIVE COPYRIGHT? CAN COPYRIGHT SURVIVE THE NET? -- Delving
into the controversies surrounding copyright protection that throttles
freedoms and copyright protection that protects just rewards for creativity.

INTELLIGENT TRANSPORTATION SYSTEMS: PAVING OVER PRIVACY -- Examining the
privacy implications of tracking and surveillance technologies now being
planned for vehicles and roadways nationwide.

"IT OUGHTA BE A CRIME..." -- Debating with law enforcement representatives
about who should set the rules for governing the net and when should bad
manners become a crime.

WHEN DO THEY NEED TO KNOW 'WHODUNNIT'? -- Discussing the right time and
places for identified, anonymous, and pseudonymous transactions.

TRANSACTION RECORDS IN INTERACTIVE SERVICES: WHO WATCHES THE SERVERS? --
Looking at the issues raised by the collection of personal information
as part of the new interactive home entertainment, telecommunications,
and online services.

DEFINING ACCESS PARADIGMS: LIBRARIES, RURAL AREAS, AND INTERNATIONAL
ASPECTS -- Evaluating the differing models of "open access" to Internet and
computer-mediated communications in the library, rural, and lesser-developed
country contexts.

THE CASE AGAINST COMPUTERS: A SYSTEMIC CRITIQUE -- Daring to discuss whether
computers may be doing our world more harm than good.

A NET FOR ALL: WHERE ARE THE MINORITIES? -- Examining how and to what degree
minority groups participate on the net and asking whether social class is
relevant to net participation or non-participation.

WHO OWNS THE LAW? -- Reviewing the debate over legal citation form and online
databases, and what it means to all of us.

CAN WE TALK LONG-DISTANCE? REMOVING IMPEDIMENTS TO SECURE INTERNATIONAL
COMMUNICATIONS -- Covering export and import controls, outright prohibitions,
and other technical and policy obstacles to secure international
communications.

The Fifth Conference on Computers, Freedom, and Privacy will also offer a
number of in-depth tutorials on subjects including:

   *	Inside Washington: The New Congress and Secrets of Advocacy
   *	National ID Card Initiatives
   *	The Law of Fundamental Rights for Non-Lawyers
   *	Everything You Need to Know to Argue About Cryptography
   *	Digital Activism
   *	Inside the World of Law Enforcement
   *	Intellectual Property for the Information Age

FOR MORE INFORMATION ABOUT CFP'95:

Web:	http://www-techlaw.stanford.edu/CFP95.html
Gopher:	gopher://www-techlaw.stanford.edu/CFP95
FTP:	ftp://www-techlaw.stanford.edu/CFP95
Email:	Info.CFP95@forsythe.stanford.edu
Fax: 	(415) 548-0840
Call: 	(415) 548-9673


                                REGISTRATION


Please register for the conference by returning the conference
registration form along with the appropriate payment by any
method listed below. The registration fee includes conference
materials, three luncheons (Wednesday, Thursday, and Friday), two
banquets (Wednesday and Thursday) and evening receptions
(Tuesday, Wednesday, and Thursday).

Registration Fees are:

If mailed by:     February 24    March 14    after 14 March

Conference Fees      $335          $395          $445
Tutorial Fees:       $155          $185          $220

Registration is limited to 550 participants, so register early
and save!

By Mail:                                      By Fax:
(with Check or Credit Card)            (with Credit Card only)
CFP'95 Registration                    Send Registration Form
P.O. Box 6657                              (415) 548-0840
San Mateo, CA 94403                     Available 24 hours

By Phone:                            By Email (at your own risk*):
(with Credit Card only)                (with Credit Card only)
(415) 548-0840                  Register.CFP95@forsythe.stanford.edu
9 am to 5 pm Pacific Time

   *	Information for sending a PGP-encrypted registration available at
	http://www-techlaw.stanford.edu/CFP95.html and
	ftp://www-techlaw.stanford.edu/CFP95.

CFP'95 Scholarships:
The Fifth Conference on Computers, Freedom and Privacy will provide a limited
number of full registration scholarships for students and other interested
individuals. These scholarships will cover the full costs of registration,
including three luncheons, two banquets, and all conference materials.
Scholarship recipients will be responsible for their own lodging and travel
expenses. Persons wishing to apply for one of these fully-paid registrations
should contact CFP'95 Student Paper and Scholarship Chair, Gary Marx at:
Gary.Marx@colorado.edu or call (303) 492-1697.

Hotel Accommodations:
The Fifth Conference on Computers, Freedom and Privacy will be held at the San
Francisco Airport Marriott Hotel in Burlingame, CA. This  facility is spacious
and comfortable, and is easily accessible from the airport and surrounding
cities. Because of the intensive nature of the conference, we encourage our
attendees to secure their lodging at the  conference facility. Special
conference rates of $99/night, single or multiple occupancy, are available.

*************************************************************************
* Our room block is limited and these conference rates are guaranteed   *
* only until February 17,1995, so we urge you to make your reservations *
* as early as possible.                                                 *
*************************************************************************

After February 17 but before March 15, the special conference rate will be
$110/night, single or multiple occupancy. When calling for reservations,
please be sure to identify the conference to obtain the conference rate.
Hotel Reservations: (415) 692-9100 or (800) 228-9290 or fax (415) 692-8016.

Official Airlines:
Special convention airfare discounts have been arranged on American and United
Airlines. Bungey Travel, (800) 286-4391 or (415) 325-5686 or fax (415) 321-
5309, will be happy to assist you in any manner. Please identify yourself as
attending the Computers, Freedom, and Privacy Conference and you will
automatically receive a 5% discount off nonrefundable discounted US tickets or
10% off of all unrestricted US coach fares.

------------------------------

Date:         Fri, 3 Feb 1995 18:21:28 CST
From:         Vigdor Schreibman - FINS <fins@ACCESS.DIGEX.NET>
Subject: File 3--New Draft of Telcom Bill Out

 =================================================================
FINS SPECIAL REPORT                                     February 1, 1995
 ==================================================================

NEW DRAFT OF TELCOM BILL OUT
No "Steamroller" In Sight But the "Monster Model" is Alive

Washington, DC--The new draft of telecommunications legislation, the
"Telecommunications Competition and Deregulation Act of 1995," was
released at a press conference by this morning (Feb 1, 1995), by Sen.
Larry Pressler (R-SD), chairman of the Senate Committee on Commerce,
Science, and Transportation.  It may come as a non-surprise to some...
the draft bill does not have a steamroller attached in any fashion,
contrary to the prediction from telco whiz kid Dave Farber, which went
surfing around the Net--without any confirmed source of information last
month.  The Vice President and democratic members of Congress have been
informed of the draft and are expected to make additions and suggestions,
according to the chairman.

*  There is a "universal service" provision, which the chairman
reluctantly conceded, "the people want."

*  There are procompetitive provisions that byte hard on the RBOCs if they
try to freeze out competitors with their monopoly power.  This includes:

        *  a fine of $1,000,000 for each and every "willful failure to
        comply with the terms of an interconnection agreement;

        *  a fine of up to $500,000,000 against any Bell operating
        company that "willfully, knowingly, and without reasonable cause
        fails to implement the interconnection requirements ... more than
        3 years after enactment of the [act];

        * a fine of $250,000,000 for each offense arising in "any pattern of
        willful noncompliance with those [interconnection] requirements as
        demonstrated by the failure to meet those requirements in any
        successive 3-month period beginning more than 3 years after
        [enactment].

* There will be a gold mine in "cream skimming" filling the treasuries of
corporate centers of power, at the expense of local ratepayers, moving
tens of billions of dollars annually from the latter to the former and
further exacerbating the obscene wealth of the top 100,000 families that
already own most of the private wealth in the United States.

* There will be a "monster model" of telecommunications combining conduit
and content, with all the worst possible consequences for diversity of
information sources as the trillion dollar financial reach of the telco's
gobble up or beat into oblivion everyone in sight.

* There is no attention to the needs of society disregarded by the
marketplace and the predator telco industry.

* There is no attention to the needs of handicapped people, although the
chairman said this was more the result of timing, and provisions will be
added later.

        What this proposal will do, according to chairman Presser is:

        *  Provide "freedom of choice" among competing firms [who are
           [allowed to stay in business by the grace of the lords of
           cyberspace]

        *  Provide "freedom of choice" among cable services, including
           phone companies in competition with traditional cable firms
           [if they choose to compete with each other.  In fact, Bell
           Atlantic has already announced its intention to lease the
           cable company lines to avoid both the investment and the
           competition ] [Wired, Feb 1995]

        *  Provide "freedom of choice" among electric utility firms to
           provide telephone, cable or other telecommunications
           services [an idea floating around somewhere somehow]


Speaker Newt Gingrich and the democrats have yet to add their full
measure of "telco feudalism," to this legislative package.

------------------------------

Date: Thu, 2 Feb 1995 21:25:58 -0500 (EST)
From: Stanton McCandlish <mech@EFF.ORG>
Subject: File 4--NIST Mugshot ID database - thousands cataloged on CD

[This is just an informational forward, and does not represent
official EFF positions or statements in any way.  NOTE: I'm not the
original author of this so please look at the original headers
carefully if you mean to reply to him/her.]

Date--Wed, 1 Feb 95 13:39:32 EST
From--Craig Watson <craig@magi.ncsl.nist.gov>
Subject--Mugshot Identification Database

                 National Institute of Standards and Technology
                           announces the release of
                           NIST Special Database 18
                    Mugshot Identification Database (MID)


NIST Special Database 18 is being distributed for use in development and
testing of automated mugshot identification systems. The database consists
of three CD-ROMs, containing a total of 3248 images of variable size,
compressed with lossless compression. Each CD-ROM requires approximately
530 megabytes of storage compressed and 1.2 gigabytes uncompressed
(2.2 : 1 average compression ratio). There are images of 1573 individuals
(cases), 1495 male and 78 female. The database contains both front and
side (profile) views when available. Separating front views and profiles,
there are 131 cases with two or more front views and 1418 with only one
front view. Profiles have 89 cases with two or more profiles and 1268 with
only one profile. Cases with both fronts and profiles have 89 cases with
two or more of both fronts and profiles, 27 with two or more fronts and
one profile, and 1217 with only one front and one profile. Decompression
software, which was written in C on a SUN workstation [1], is included
with the database.


NIST Special Database 18 has the following features:

	+  3248 segmented 8-bit gray scale mugshot images (varying sizes)
           of 1573 individuals
	+  1333 cases with both front and profile views (see statistics above)
	+  131 cases with two or more front views and 89 cases with two or
           more profiles
	+  images scanned at 19.7 pixels per mm
	+  image format documentation and example software is included


Suitable for automated mugshot identification research, the database can be used
 for:

	+  algorithm development
	+  system training and testing


The system requirements are a CD-ROM drive with software to read ISO-9660
format and the ability to compile the C source code written on a SUN
workstation [1].

Cost of the database: $750.00.

For ordering information contact:

                            Standard Reference Data
                National Institute of Standards and Technology
                            Building 221, Room A323
                            Gaithersburg, MD 20899
                             Voice: (301) 975-2208
                             FAX:   (301) 926-0416
                          email: srdata@enh.nist.gov

All other questions contact:
                            Craig Watson
		       craig@magi.ncsl.nist.gov
			    (301)975-4402


[1]  The SUN workstation is identified in order to adequately specify or
     describe the subject matter of this announcement. In no case does
     such identification imply recommendation or endorsement by the
     National Institute of Standards and Technology, nor does it imply
     that the equipment is necessarily the best available for the purpose.

------------------------------

Date: Fri, 03 Feb 1995 10:12:26 -0700
From: Urs Gattiker <GATTIKER@CETUS.MNGT.ULETH.CA>
Subject: File 5--Update on "Ethics & Privacy on the Internet" Survey

Dear Netter

About 8 months ago a survey on ETHICS AND PRIVACY ON THE INTERNET was
mailed through this NetWork to you and many others.  The data we have
gathered has been analyzed and one of the reports materialising from
it is mentioned below.  If you are interested in a complete copy,
please feel free to drop me a line and again, thanks for your
cooperation and help.

The program on ETHICS AND PRIVACY ON THE INTERNET is continuing and a
new survey assessing additional issues as well as regulation,
cryptography and cyberspace is in the final stages of the development.


Cordially

Urs E. Gattiker

                        MORALITY AND TECHNOLOGY, OR

           IS IT WRONG TO USE A SELF-MADE ENCRYPTION DEVICE, AND

                   CREATE OR LET LOOSE A COMPUTER VIRUS?


                              Urs E. Gattiker
                               Helen Kelley
                      Centre for Technology Studies,
                   The University of Lethbridge, CANADA





                                 Abstract


Stories about computer-related actions (e.g., placing a document about
how a computer virus works on an electronic network/bulletin board)
were presented to users.  Data indicate that women end-users compared
to men have a less libertarian sense of what is right and wrong; as
well, younger respondents are more libertarian than their older
compatriots.  Data also indicate that participants are less likely to
endorse civil liberties and more concerned about the harm and
violations of social norms when the scenario describes a context-
specific situation.  How users act, feel and respond toward computer-
mediated behaviours and actions raise questions for researchers and
policy makers.  For example, how do researchers and policy makers
maintain and protect the privacy of individuals, and at the same time
ensure moral conduct by end-users who enjoy using the electronic
highway.  Suggestions are made for developing theoretical models of
moral judgment in the cyberspace domain as well as policy (e.g., U.S.
Clipper chip debate).


Published reports of some of our findings can be found in:

Gattiker, U. E., & Kelley, H.  (1994).  Techno-crime and terror
     against tomorrow's organisation:  What about cyberpunks.  E.
     Raubold and K. Brunnstein (Eds)., Proceedings of the 13 World
     Computer Congress -- IFIP Congress '94, Hamburg (pp. 233-240).
     Amsterdam:  Elsevier Science Publishers.

Gattiker, U. E., & Kelley, H.  (1995).  Morality and Technology, or is
     it wrong to create and let loose a computer virus.  In J. F.
     Nunamaker, Jr. & R. H. Sprague (Eds.), Proceedings of the 28th
     Annual Hawaii International Conference on System Sciences 1995,
     Hamburg (pp. 563-572).  Las Alamitos, CA:  IEEE Computer Society
     Press.

Additional papers are currently being written.

------------------------------


------------------------------

Date: Thu, 23 Oct 1994 22:51:01 CDT
From: CuD Moderators <tk0jut2@mvs.cso.niu.edu>
Subject: File 6--Cu Digest Header Information (unchanged since 25 Nov 1994)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send a one-line message:  SUB CUDIGEST  your name
Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at:  Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on  internet);
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

EUROPE:  In BELGIUM: Virtual Access BBS:  +32-69-844-019 (ringdown)
         In ITALY: Bits against the Empire BBS:  +39-461-980493
         In LUXEMBOURG: ComNet BBS:  +352-466893

  UNITED STATES:  etext.archive.umich.edu (192.131.22.8)  in /pub/CuD/
                  ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
                  aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
                  world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
                  uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
                  wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
  EUROPE:         nic.funet.fi in pub/doc/cud/ (Finland)
                  ftp.warwick.ac.uk in pub/cud/ (United Kingdom)

  JAPAN:          ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD
                  ftp://www.rcac.tdi.co.jp/pub/mirror/CuD

The most recent issues of CuD can be obtained from the NIU
Sociology gopher at:
  URL: gopher://corn.cso.niu.edu:70/00/acad_dept/col_of_las/dept_soci

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.  CuD material may  be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission.  It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified.  Readers are encouraged to submit reasoned articles
relating to computer culture and communication.  Articles are
preferred to short responses.  Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
            the views of the moderators. Digest contributors assume all
            responsibility for ensuring that articles submitted do not
            violate copyright protections.

------------------------------

End of Computer Underground Digest #7.09
************************************