Computer underground Digest    Wed  Mar 22, 1995   Volume 7 : Issue 23
                           ISSN  1004-042X

       Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
       Archivist: Brendan Kehoe
       Semi-retiring Shadow Archivist: Stanton McCandlish
       Intelligent Agent:  David Smith
       Shadow-Archivists: Dan Carosone / Paul Southworth
                          Ralph Sims / Jyrki Kuoppala
                          Ian Dickinson
       Monster Editor:    Loch Nesshrdlu

CONTENTS, #7.23 (Wed, Mar 22, 1995)

File 1--Hong Kong's I-net Provider Raids, and Internet Digital Voice
File 2--Conference - First Amendment In Cyberspace
File 3--Gibson, Sterling Arrange MTV Donation To EFF-Austin (fwd)
File 4--     Re: Campaign to Defeat Communications Decency Act
File 5--(fwd) American Library Association Draft Computer Policy (fwd)
File 6--FTC Legislative Alert  (Telemarketing legislation)
File 7--Cu Digest Header Info (unchanged since 19 Mar, 1995)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

---------------------------------------------------------------------

Date: Fri, 17 Mar 1995 23:33:54 -0600 (CST)
From: David Smith <bladex@BGA.COM>
Subject: File 1--Hong Kong's I-net Provider Raids, and Internet Digital Voice


Forwarded from:

In, Around and Online- Issue 2.10 - Week Ending 3/10/95
=======================================================
 Copyright (C) 1995 Robert Seidman (robert@clark.net).  All rights
reserved.  May be reproduced in any medium for non-commercial purposes.

HONG KONG POLICE told Internet providers whose equipment was seized in
March 3rd raids that they could pick up their equipment.  The raid left
only one provider up and running in the British colony.  There is still
some confusion on why the police bothered to raid them over the lack of a
$96 (750 Hong Kong Dollars) license.  The operators of services shut down
in the raid have stated they will not put their services back online
until they have received their licenses.  The seven operators, mostly
newcomers to the exploding market had been engaged in a price war with
the one commercial service left operational after the March 3 raid, Hong
Kong SuperNet.  We have it easy in the states, SuperNet charges about
$25/hour for daytime use and about $12.50/hr. off-peak.  The grounded
competitors offered services at a cheaper prices ranging from about $6-$8/hr.

(Seidman's newsletter is free and ambitious in its overview of the
Internet and the online services.  Anyone who is interested in a
subscription should sending e-mail to  LISTSERV@CLARK.NET and -- in the
BODY of the message -- writing: Subscribe Online-L <YOUR FULL NAME>

Example: SUBSCRIBE ONLINE-L Robert Seidman.)

------------------------------

Date: Thu, 9 Mar 1995 11:33:47 -0600
From: Barad@MAIL.UTEXAS.EDU(Meredith Barad)
Subject: File 2--Conference - First Amendment In Cyberspace

                  THE FIRST AMENDMENT IN CYBERSPACE

        THE JOHN HENRY FAULK CONFERENCE ON THE FIRST AMENDMENT
             Sponsored by The Center for American History
                  The University of Texas at Austin

Tuesday, April 18,  1995
 1:00 - 5:00 p.m.
Joe C. Thompson Conference Center
26th St. and Red River

1:00-1:20       Introductions

1:20-1:30       The Legacy of John Henry Faulk, by Michael Burton

1:30-3:15        Panel I:  The First Amendment in Cyberspace

3:30-5:00        Panel II:  Who is Driving on the Information Superhighway?

5:00             Reception at the Center for American History.

"The First Amendment in Cyberspace" will explore the legal definition of
free speech on the information superhighway, censorship online, universal
access to the Internet,  and new directions for information technologies in
the 21st century.

Conference speakers
Introduction:
Michael Burton, author of John Henry Faulk: The Making of a Liberated Mind
and former journalist specializing in educational and media awareness
issues

Panel I:
Mike Godwin, online counsel for the Electronic Frontier Foundation

Katie Hafner, technology reporter for Newsweek and author of Cyberpunk:
Outlaws and Hackers on the Computer Frontier

Peter Lewis,The New York Times correspondent on cyberspace issues

John Seigenthaler, chair of the Freedom Forum First Amendment Center at
Vanderbilt University and former editorial director for USA Today

Eugene Volokh, professor of copyright and constitutional law at UCLA Law
School and author of "Cheap Speech and What it Will Do," forthcoming in The
Yale Law Journal

Frederick Williams, Mary Gibbs Jones Centennial Chair, UT College of
Communication, and author of The People's Right to Know: Media, Democracy
and the Information Highway (moderator)

Panel II:
Smoot Carl-Mitchell, managing Partner in Texas Internet Consulting and
president of Matrix Information and Directory Services and the Zilker
Internet Park

Gary Chapman, coordinator for the 21st Century Project at UT's LBJ School
of Public Affairs and former executive director of the Computer
Professionals for Social Responsibility

Jon Loehman, Southwestern Bell Telephone Company, focusing on regulation
and planning in the telecommunications industry

James Love, director of Economic Studies at the Center for the Study of
Responsive Law and the director of the Center's Taxpayer's Assets Project
in Washington D.C.

Yolanda Rivas, M.A. student, Communication and Technology Policy Program in
the Department of Radio-Television-Film at UT specializing in online access
issues for Latin America

Bruce Sterling, author of The Hacker Crackdown: Law and Disorder on the
Electronic Frontier, science fiction author, journalist, and editor
(moderator)

The Faulk Conference is presented in honor of Texas humorist John Henry
Faulk, a victim of the blacklist during the McCarthy years.  The Faulk
Conference is free and seating is on a first come, first serve basis.  The
conference brochure and conference summaries will be posted at
http://www.lib.utexas.edu/Libs/CAH/cah.html.  For more information contact
the Center for American History at (512) 495-4515 or e-mail
m.norkunas@mail.utexas.edu.

*********************************************
Martha Norkunas
Center for American History
SRH 2.101
University of Texas at Austin
Austin, TX  78712

Phone: 512-495-4515
FAX: 512-495-4542
internet address: m.norkunas@mail.utexas.edu

------------------------------

Date: Wed, 22 Mar 1995 00:10:56 -0600 (CST)
From: David Smith <bladex@BGA.COM>
Subject: File 3--Gibson, Sterling Arrange MTV Donation To EFF-Austin (fwd)
               ---------- Forwarded message ----------
Date: Tue, 21 Mar 1995 22:10:05 -0600 (CST)
From: Steve Jackson <sj@io.com>

PRESS RELEASE

MTV-EUROPE DONATES 500 POUNDS TO AUSTIN CYBERSPACE CIVIL RIGHTS GROUP

Austin, March 21, 1995

	EFF-Austin, an Austin, Texas civil rights group concerned with
electronic network access and free expression, gratefully acknowledges
a contribution of 500 pounds from the European branch of MTV Music
Television.  The donation came in response to an MTV publication
titled "Global Communication: Channel Your Experience," which was
released in conjunction with the 1994 First European Music Awards,
held at the Brandenburg Gate in Berlin.

	Cyberpunk science fiction writers William Gibson and Bruce Sterling
created an original collaborative artwork for the "Global
Communication" project. MTV-Europe then contributed a cheque for 500
pounds to the two authors' favorite charity -- EFF-Austin.

	"We've seen some oddities in our five years on the electronic
frontier," said EFF-Austin President David Smith, "but this one takes
the cake.  Not only are we so hip that we get contributions from
MTV-Europe, but now we can describe ourselves as 'William Gibson's
favorite charity.'"

For more information, contact Steve Jackson, EFF-Austin secretary
(sj@io.com)

** Steve Jackson - yes, of SJ Games - yes, we won the USSS case -
   fnord ** yes, INWO is out - http://io.com/sjgames/ - dinosaurs,
   Lego, Kahlua!

------------------------------

Date:         Sun, 19 Mar 1995 19:19:36 -0600
From:         Stephen Smith <libertas@COMP.UARK.EDU>
Subject: File 4--     Re: Campaign to Defeat Communications Decency Act


               ---------- Forwarded message ----------
Date: Sun, 19 Mar 1995 14:29:48 -0700 (MST)
From: Charles Levendosky <levendos@ed.trib.com>

If it will be helpful, you can distribute my column on this bill. It ran
on the NYT wire last week for two days, but many on the internet may not
have read it. Feel free to use it.

Charles Levendosky
Editorial Page Editor
Casper (Wyoming) Star-Tribune
email: levendos@trib.com
tel: 307-266-0619
----------

`DECENCY ACT' A FLASHER IN HIDING

  (EDITOR'S NOTE: Charles Levendosky, editorial page editor of the
Casper (Wyo.) Star-Tribune, has a national reputation for First
Amendment commentary. His columns recently won the American Bar
Association's Silver Gavel Award and The Baltimore Sun's H.L. Mencken
Award.)

By CHARLES LEVENDOSKY

c.1995 Casper (Wyo.) Star-Tribune

(Distributed by New York Times Special Features)

There's a nasty bill lurking in the Senate, like a flasher hiding in a
doorway waiting for the opportunity to throw open his trenchcoat and
show you his wares. When it's too late to turn away.

The bill, S. 314,  was introduced by Sen. J. James Exon, D-Neb., and
Sen. Slade Gorton, R-Wash. It's called the "Communications Decency Act
of 1995." Don't let that fool you, there's nothing decent about it.

The bill would amend the Communications Act of 1934 and the U.S. Code to
force those, who allow others access to the Information Superhighway, to
monitor their customers' communications. If the provisions of the bill
are violated, those who allow access to the information highway face
potential federal criminal prosecution that could lead to $100,000 fines
and/or two years in prison.

On the Information Superhighway, there is no way to monitor a moving
message. It's broken into digital packets that scoot over telephone
wires across the world. If you were to look at one packet, it would be
indecipherable. It's only a small bit of the information sent ---- not
unlike putting a normal letter into a shredder and then sending each
strip to the recipient in separate envelopes along with hundreds of
other envelopes each containing a strip from different pieces of mail.

Messages in transit on the information highway are impossible to
monitor.

That means the organization that provides access to Internet must
monitor the information flow from the source or at the receiver's end.
That is possible. But it makes the access provider a Big Brother agent
of the federal government who leans over your computer.

The bill doesn't define what would be legally "indecent." The vagueness
of this term could apply to lovers or married couples who are e-mailing
one another sweet murmurs about the night before.

It could apply to, by some subjective standards, to a photo of a child
lying bloody in a street, killed by a drive-by shooter.

It could apply to a photo rendition of one of Auguste Rodin's most
famous sculptures, "The Kiss." It could apply to many of Pierre Renoir's
paintings. Or any of the classical paintings of nudes that museums have
put on the Internet.

The bill can be characterized as a federal agent muscling a private
citizen. Agent Big Brother in your study or in your workplace, breathing
on your neck, reading over your shoulder. Leaning on you. Leaning over
the person with whom you are communicating.

Apparently, the intent of the bill is to protect children who might
stumble on something too adult for them on the information highway. It's
a wrong-headed approach --- the atom bomb solution --- it would blow
away the free flow of information. It would melt the promise of this
Electronic Gutenberg.

The information highway is an interactive medium. Consumers can control
their own access. Parents can control the access of their children.
America Online already gives parents control over what chat sessions are
available to their children. More can be done, and is being done, so
that parents can select and control their children's access to the vast
variety of information offered on the electronic highway.

As this indecent bill is written, it would apply to public and
university libraries that offer their patrons the use of online
computers, according to Daniel Weitzner, deputy director of the Center
of Democracy and Technology. Libraries could be fined; librarians
jailed. Think of it, a librarian imprisoned because some patron found
his way through Internet byways to the Penthouse calendar nude of the
month.

It's bad law. It places criminal liability, not on the actor, but on the
provider. A legal parallel would be to frame the law so that a gun
dealer who sold a legal weapon to a qualified citizen would be
prosecuted if that citizen later shot his neighbor.

And, worse, a broad range of content would be actionable under this
bill.

Less discussed by critics of this bill, are ramifications for newspapers
and news organizations who use the information highway.

Newspapers, like the Casper Star-Tribune, who go online with their
product, do not necessarily have their own access to the Internet. In
the Star-Tribune's case, the access provider is the University of
Wyoming. By this bill, the university could be liable for criminal
prosecution for something the Star-Tribune put on Internet; therefore,
it might want to monitor what news the Star-Tribune put online.

What happens to freedom of the press then? News decisions could be taken
away from the editor of the papers, or newspapers might elect to keep
their product off the information highway. Either way the public
suffers.

More and more newspapers are making portions of their dailies available
through the information highway. This intersection of the press with
telecommunications will cause headaches for First Amendment experts for
decades to come.

The electronic media has never enjoyed the liberties guaranteed by the
freedom of the press clause of the First Amendment.  Now there is a
convergence of the two and American must either opt for greater freedom
for the electronic media or less for the press.

Wrap up this bill in its soiled trenchcoat, lock it in a closet, and
toss away the key. This issue needs a great deal more thought than
either Sen. Exon or Sen. Gorton have given to it.

Keep liberty a priority. There are better ways to protect our children
than sacrificing the free exchange of information and ideas.

Copyright Casper Star-Tribune

March 5, 1995

------------------------------

Date: Mon, 20 Mar 1995 22:29:03 -0600 (CST)
From: David Smith <bladex@BGA.COM>
Subject: File 5--(fwd) American Library Association Draft Computer Policy (fwd)

Here is more evidence to support my thesis that librarians are just the
coolest.

David Smith	          *  Calendar of way cool e-things:
bladex@bga.com            *  Mar 15-17    SXSW Multimedia
President, EFF-Austin     *  Mon Mar 20th EFF-Austin General Meeting
Board of Directors, CTCLU *  April 1-2    Robofest

               ---------- Forwarded message ----------

 ============================================================

Date--        Mon, 20 Mar 1995 10:55:29 CST
From--Cyndi Robinson <U24803@UICVM.BITNET>
Subject--Draft Interpretation


Following is the draft Interpretation on Access to Information, Services and
Networks, drafted by the ALA Intellectual Freedom Committee.  The Committee
welcomes all comments on the draft.  Comments can be forwarded to
Judith.Krug@ala.org or by mail to the Office for Intellectual Freedom,
American Library Association, 50 E. Huron, Chicago, IL 60611.

Please feel free to distribute this draft widely.
=================================================


                         DRAFT DRAFT DRAFT DRAFT
                             Draft Version 1.1
                                  3/5/95

ACCESS TO ELECTRONIC INFORMATION, SERVICES, AND NETWORKS: AN
INTERPRETATION OF THE LIBRARY BILL OF RIGHTS

Freedom of expression is an inalienable human right and the
foundation for self-government.  Freedom of expression encompasses
the freedom of speech and the corollary right to receive
information.  These rights extend to children as well as adults.

Libraries and librarians exist to facilitate these rights by
providing access to, identifying, retrieving, organizing, and
preserving recorded expression regardless of the formats or
technologies in which that expression is recorded.

It is the nature of information that it flows freely across
boundaries and barriers despite attempts by individuals,
governments, and private entities to channel or control its flow.
Electronic technology has increased the speed and universality of
this flow.

Although we live in a global information village, many persons do
not have access to electronic information sources because of
economic circumstances, capabilities of technology, and
infrastructure disparity.  The degree of access to electronic
information divides people into groups of haves and have-
nots.  Librarians, entrusted as a profession with the stewardship
of the public good of free expression, are uniquely positioned to
address the issues raised by technological change.

Librarians address intellectual freedom from a strong ethical base
and an abiding commitment to the preservation of the individual's
rights.

The American Library Association has expressed these basic
principles of librarianship in its CODE OF ETHICS and in the
LIBRARY BILL OF RIGHTS and its Interpretations. These serve to
guide professional librarians and library governing bodies in
addressing issues of intellectual freedom and the rights of the
people they serve.

The constant emergence and change of issues arising from the
still-developing technology of  computer-mediated information
generation, distribution, and retrieval need to be approached by
librarians from a context of established policy and constitutional
principles so that fundamental and traditional tenets of
librarianship are not swept away.

In making decisions on how to offer access to electronic
information, each library should consider its mission, goals,
objectives, cooperative agreements, and the needs of all the
people it serves.  The library should address the rights of users,
the equity of access, and information resources and access issues.

                            THE RIGHTS OF USERS

All library system and network policies, procedures or regulations
relating to electronic resources and services should be
scrutinized for potential violation of user rights.

User policies should be developed according to the policies and
guidelines established by the American Library Association,
including GUIDELINES FOR THE DEVELOPMENT AND IMPLEMENTATION OF
POLICIES, REGULATIONS AND PROCEDURES AFFECTING ACCESS TO LIBRARY
MATERIALS, SERVICES AND FACILITIES.

Users have the right to be free of interference and unreasonable
limitations or conditions set by libraries, librarians, system
administrators, vendors, network service providers, or others.
This specifically includes contracts, agreements, and licenses
entered into by libraries on behalf of their users.

No user should be restricted or denied access for expressing or
receiving constitutionally protected speech.  No user's access
should be changed without due process, including, but not limited
to, notice and a means of appeal.

Users have a right to full descriptions of and access to the
documentation about all electronic  systems and programs they are
using, and the training and assistance necessary to operate the
hardware and software.

Users have the right of confidentiality in all of their activities
with electronic resources and services provided by the library,
and the library shall ensure that this confidentiality is
maintained.  The library should support, by policy, procedure, and
practice, the user's right to privacy.  Users should be advised,
however, that security is technically difficult to achieve and
that electronic communications and files are safest when they are
treated as if they were public.

The rights of users who are minors shall in no way be abridged.

                             EQUITY OF ACCESS

Electronic information, services, and networks provided directly
or indirectly by the library should be readily, equally, and
equitably accessible to all library users.  Once the decision is
made to use library funds to provide access to electronic
information, the user must not be required to pay to obtain the
information or use the service.  When resources are insufficient
to meet demand, rationing service may be necessary to provide
equitable access.  All library policies should be scrutinized in
light of ECONOMIC BARRIERS TO INFORMATION ACCESS: AN
INTERPRETATION OF THE LIBRARY BILL OF RIGHTS.


                  INFORMATION RESOURCES AND ACCESS ISSUES

Electronic resources provide unprecedented opportunities to expand
the scope of information available to users.  Libraries and
librarians should provide material and information presenting all
points of view.  This pertains to electronic resources, no less
than it does to the more traditional sources of information in
libraries. (See DIVERSITY IN COLLECTION DEVELOPMENT: AN
INTERPRETATION OF THE LIBRARY BILL OF RIGHTS.)

Libraries and librarians should not deny or limit access to
information available via electronic resources because of its
allegedly controversial content or because of the librarian's
personal beliefs or fear of confrontation.  Information retrieved
or utilized electronically should be considered constitutionally
protected unless determined otherwise by a court with appropriate
jurisdiction.

Providing access to electronic information, services, and networks
is not the same thing as selecting and purchasing material for a
library collection.  Libraries may discover that some material
accessed electronically may not meet a library's selection or
collection development policy.  It is, therefore, left to each
user to determine what is appropriate.  Parents who are concerned
about their children's use of electronic resources should provide
guidance to their own children. (See FREE ACCESS TO LIBRARIES FOR
MINORS: AN INTERPRETATION OF THE LIBRARY BILL OF RIGHTS; ACCESS TO
RESOURCES AND SERVICES IN THE SCHOOL LIBRARY MEDIA PROGRAM; and
ACCESS FOR CHILDREN AND YOUNG PEOPLE TO VIDEOTAPES AND OTHER
NONPRINT FORMATS)

Just as libraries do not endorse the viewpoints or vouch for the
accuracy or authenticity of traditional materials in the
collection, they do not do so for electronic information.

Libraries must support access to all materials on all subjects
that serve the needs or interests of all users regardless of the
user's age or the content of material.  Libraries and librarians
should not limit access to information on the grounds that it is
perceived to be frivolous or lacking value.

Libraries have a particular obligation to provide access to
government publications available only  in electronic format.

Libraries may need to expand their selection or collection
development policies to reflect the need to preserve materials
central to the library's mission as a retrievable copy in an
appropriate format to prevent loss of the information.

                                CONCLUSION


By applying traditional tenets of intellectual freedom to new
media, librarians provide vision and leadership in an arena where
it is so clearly needed.  Our services have never been more
important.

James Madison wrote, "A popular government, without popular
information, or the means of acquiring it, is but a Prologue to a
Farce or a Tragedy; or perhaps both.  Knowledge will forever
govern ignorance; and a people who mean to be their own Governors
must arm themselves with the power which knowledge gives."

------------------------------

From: Druff <71553.1102@COMPUSERVE.COM>
Subject: File 6--FTC Legislative Alert  (Telemarketing legislation)
Date: 20 Mar 1995 17:45:16 GMT

                          Legislative Alert!

New proposed Federal Trade Commission Rules on Telemarketing pose a
great threat

to businesses, sysops, list brokers, copywriters, printers, desktop
publishers, etc., and to freedom of  speech!

Your Immediate Attention Is Called To 16 CFR Part 310

Telemarketing Sales Rules

Note: Section 310. Definitions...includes...the use of facsimile
machines...computer modems, or any telephonic medium.

Your attention is called to "Assisting and Facilitating" Section
310.3[b] [1] {page 11} of the proposed rule sets forth a general
prohibition against assisting or facilitating deceptive telemarketing
acts or practices. Assistors who engage in these activities will
violate the rule if they know, or should know, that the person they
are assisting is engaged in an act or practice that violates the rule.

The five types of assisting and facilitating activities listed in the
proposed rule are as follows: first, providing lists of customer
contacts to a seller or telemarketer [e.g., serving as a list
broker]...and fifth, providing any script, advertising, brochure,
promotional material, or direct marketing piece to be used in
telemarketing.

Section 310.4[b] [pages 14 & 15] ...it is an abusive act or practice
and a violation of the rule to call a person's residence to offer,
offer for sale, or sell, on behalf of the same seller, the same or
similar goods or services more than once within any three month
period...

Page 25 - #7 - The proposed rule states that the term "telemarketing"
includes the use of a facsimile machine, computer modem, or any other
telephonic medium, as well as calls initiated by persons in response
to postcards, brochures, advertisements, or any other printed, audio,
video, cinematic or electronic communications by or on behalf of the
seller...

Page 25 - #8 - The proposed definition of "telemarketing" includes
within the rule's coverage On-Line information services which a person
accesses by computer modem.

Section 310.3 [a] [4] {page 11} would prohibit consumers from paying
by check over the phone without prior written authorization while
allowing credit card holders to do so without prior written
authorization.  This would discriminate against the 75 million
consumers who do not have a credit card, the millions of consumers who
have no usable credit on their credit card and the businesses, most of
them small or new, who cannot obtain credit card merchant status to
accept credit cards.  It would also further the monopoly of Visa and
MasterCard and the up to 21 percent interest they charge credit card
users.

Please read the proposed rules in their entirety to ascertain their
possible effect on your business, the telemarketing industry and the
growth of the Information Super Highway.

Since most businesses and individuals are totally unaware of these
proposed rules, it is important that this information is distributed
through every means possible so that interested parties have the
opportunity to comment and protect their interests.

Written comments must be submitted on or before March 31, 1995.  A
public workshop-conference will be held at the Chicago Hilton on April
18th through April 20th from 9am to 5pm.

Five paper copies of each written comment should be submitted to the

Office of the Secretary, Room 159, Federal Trade Commission,
Washington DC 20580.

To encourage prompt and efficient review and dissemination of the
comments to the public, all comments should be submitted, if possible,
in electronic form, on either a 5< or 3= inch computer disk, with a
label on the disk stating the name of the commenter and the name and
version of the word processing program used to create the document.
Submissions should be captioned: "Proposed Telemarketing Sales Rule"
FTC File NO. R411001.

The full 50 pages of the proposed rules can be downloaded from the
NYACC Bulletin Board, file name "FTC" -  phone 718-539-3338.

I would appreciate your feedback and a copy of any comments that you
intend to submit and I suggest that you disseminate this information
as widely as possible.

Ronald A. Stewart

126  13th Street

Brooklyn, NY 11215

Phone 718-768-6803

Fax 718-965-3400

 =========================================================

From--Druff <71553.1102@COMPUSERVE.COM>
Subject--FTC Alert (more info)
Date--20 Mar 1995 17:45:51 GMT

Proposed comments to FTC about  written authorization required for
checks by phone

Under Section 310.3 [a] [4] of the proposed rule, it is a prohibited
deceptive telemarketing act or practice for a seller or telemarketer
to obtain or submit for payment from a person's checking, savings,
share, or similar account, a check, draft, or other form of negotiable
paper without that person's express written authorization.  For
example, a telemarketer cannot submit an unsigned draft on a
consumer's bank account without that consumer's prior written
authorization.  This Section of the proposed rule would discriminate
against the 75 million Americans who do not have a credit card [1990
census] and the millions of credit card holders who want to make a
purchase by phone, fax, computer, computer bulletin board, etc., but
who have no usable credit on their card.

Would discriminate against the thousands of new and small businesses
who cannot obtain Credit Card Merchant Status to accept major credit
cards and reduce their sales by not being able to accept a customer's
check over the phone.

The rules would allow credit card payments over the phone, increasing
the monopoly of MasterCard and Visa with their up to 21 percent
charges to consumers.

Would effectively kill the rapidly growing "checks by phone" industry,
putting over 20 companies (and their employees) out of business and
costing countless less sales to the thousands of clients these
businesses are now servicing.

Fraud associated with checks by phone is less than with credit cards.
Any consumer can take a check to his or her bank and, since consumer's
signature is not on check, have the check kicked back to the bank it
was originally deposited in and have their account credited.  As with
credit card sales over the phone, it is the merchant that is at risk,
not the consumer.

The FTC must demonstrate why checks over the phone must require prior
written authorization from consumers [which would effectively negate
its usefulness] while allowing credit card purchases by phone without
prior written authorization.

In order for the Information Super Highway to continue to grow, checks
by phone will play a positive important role.  People will be shopping
from their personal computers, from their TV sets using their
interactive remote control device...on computer bulletin boards and on
the Internet and by fax machine.  Consumers will need ways to transmit
money over the phone and fax lines and businesses will need ways to
receive money by phone line and fax and by computer.  75 million
Americans do not have a credit card and thousands of legitimate
businesses cannot qualify for credit card merchant account status to
accept major credit cards.  To preclude checks by phone will cause
great economic loss to the American economy.

If banks received numerous complaints about checks by phone they would
stop paying them [checks without account holders signature].

Handicapped, the elderly, shut-ins, etc., would be further penalized
by being forced to address envelopes, purchase postage stamps, and
going to a mail box instead of being able to conveniently give a check
over the phone.

If future information and statistics demonstrate that checks by phone
produces more fraud and complaints than credit card fraud, the FTC can
revisit this issue in future rules.  No anecdotal evidence presently
exists that this is currently the case.

------------------------------

Date: Sun, 19 Mar 1995 22:51:01 CDT
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 7--Cu Digest Header Info (unchanged since 19 Mar, 1995)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send a one-line message:  SUB CUDIGEST  your name
Send it to  LISTSERV@VMD.CSO.UIUC.EDU
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at:  Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

To UNSUB, send a one-line message:   UNSUB <your name>
Send it to  LISTSERV@VMD.CSO.UIUC.EDU
(NOTE: The address you unsub must correspond to your From: line)

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on  internet);
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

EUROPE:  In BELGIUM: Virtual Access BBS:  +32-69-844-019 (ringdown)
         In ITALY: Bits against the Empire BBS:  +39-464-435189
         In LUXEMBOURG: ComNet BBS:  +352-466893

  UNITED STATES:  etext.archive.umich.edu (192.131.22.8)  in /pub/CuD/
                  ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
                  aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
                  world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
                  uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
                  wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
  EUROPE:         nic.funet.fi in pub/doc/cud/ (Finland)
                  ftp.warwick.ac.uk in pub/cud/ (United Kingdom)

  JAPAN:          ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD
                  ftp://www.rcac.tdi.co.jp/pub/mirror/CuD

The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
  URL: http://www.soci.niu.edu:80/~cudigest

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.  CuD material may  be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission.  It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified.  Readers are encouraged to submit reasoned articles
relating to computer culture and communication.  Articles are
preferred to short responses.  Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
            the views of the moderators. Digest contributors assume all
            responsibility for ensuring that articles submitted do not
            violate copyright protections.

------------------------------

End of Computer Underground Digest #7.23
************************************