Date:       Mon, 27 Feb 95 22:26:01 EST
Errors-To:  Comp-privacy Error Handler <owner-comp-privacy@uwm.edu>
From:       Computer Privacy Digest Moderator  <comp-privacy@uwm.edu>
To:         Comp-privacy@uwm.edu
Subject:    Computer Privacy Digest V6#022

Computer Privacy Digest Mon, 27 Feb 95              Volume 6 : Issue: 022

Today's Topics:			       Moderator: Leonard P. Levine

                       Re: Cordless Phone Privacy
                       Re: Cordless Phone Privacy
                       Re: Cordless Phone Privacy
                         Electronic Footprints
                       Keeping Tabs on Taxpayers
                           Security Programs
                            Use of Mailboxes
                            Use of Mailboxes
                 Re: What Does City Hall Have about Me?
                      Jailed for Free-Net Message
                          SS Number at College
                         SS Number in Business
                        Braindead In Cyberspace
                         Investigative Catalog
            Re: The National Computer Security Organization
              Compuserve Sued for Delivering "Junk E-Mail"
                Re: New Hires SSN into National Database
          Proposed FTC Rules Could Reduce Telemarketing Abuses
                 Info on CPD [unchanged since 12/29/94]

----------------------------------------------------------------------

From: "BRENDZA, TOM" <BRENDZA@gould-tm.mhs.compuserve.com>
Date: 23 Feb 95 16:35:48 EST
Subject: Re: Cordless Phone Privacy

    Jim Clausing writes: "The other problem is that while technology
    exists (has for a long time) to make communication over the
    airwaves secure, it was LAW ENFORCEMENT and MONEY (from the
    cellular phone industry) that pressured the legislature into this
    "Emperor's new clothes" denial of reality."

Does this mean that cordless phone signals that are broadcast between
the handset and the base are not encrypted (and then de-encrypted for
the phone line)  because of some federal legislation against it?  If
so, is this so that law enforcement agencies can monitor the broadcast,
like a wire-tap without a warrant (a wireless tap?).  I always wondered
why AT&T or some other phone manufacturer never manufactured a
"scrambled signal" phone unit.  I guess I never really thought about
why no one did.  Is this why?  Does that mean it's illegal to install
your own encrypted broadcast scheme if you were inclined to?

Best,
Tom Brendza


------------------------------

From: rthomas007@aol.com (RThomas007)
Date: 26 Feb 1995 17:05:34 -0500
Subject: Re: Cordless Phone Privacy
Organization: America Online, Inc. (1-800-827-6364)

Talking on a cordless telephone is much like broadcasting your message
out on a weak radio signal. Prior to just a few months ago, anyone
would purchase a scanner that will pick up cordless telephones. There
are several ways to combat this. I use a Sony 900 MHz spread-spectrum
phone with voice scrambling. What this does is this: First, it
scrambles your voice from the headset to the base (while the signal is
in the air) so if anyone is listening they will not be in a postion to
hear what is beoing sead. Spread Spectrum gives you even more
protection as you are sending and recieving at two different
frequencies.

I am not in the know about the bill you just spoke of. However, up
until a year or so ago, the U.S. Supreme Court ruled that there is no
expectation of privacy on a cordless telephone. There is on a cellular.
However, both can be easily picked up. You hear about someone taking a
$99.00 scanner, placing a voice activated tape recorder to it,
programing the scanner to pick up voice in the frequency that the
subject's cordless telephone is on and hiding it just outside subject's
home. Come back the next day and you have recorded his or her tel
conversations. I hope this helps.

--
Ralph Thomas, Director
National Association Of Investigative Specialists 


------------------------------

From: Old Salt <old-salt@li.net>
Date: 22 Feb 1995 22:02:58 -0500 (EST)
Subject: Re: Cordless Phone Privacy

There is no secrets or so call teckniques to listen into cordless
phones.  You just punch in the Freqs for them into the scanner.   BTW,
they are:

	Base		Handset
	46.610		49.670
	46.630		49.845
	46.670		49.860
	46.710		49.770
	46.730		49.875
	46.770		49.830
	46.830		49.890
	46.870		49.930
	46.970		49.970

Also, yes I now belive it is agaist the law to listen in on them now.
But as most people in this hobby feel, it you are trasmiting a radio
freq into my house, I have a right to listen to it.  After all Congress
once stated that the air waves belong to all the people. Now that they
have changed there mind, a lot of us feel it is wrong to take that
right away from us.  Besides if some one is talking (trasminting) over
a radio (no matter if it looks like a phone) you should expect that
others are listening in.

 --------------------------------------------------------------------------
 |             Old Salt             |But even if I am unskilled in speech,|
 |          old-salt@li.net         |I am not in knowledge....  2 Co 11:6 |
 |----------------------------------|-------------------------------------|
 |"Freedom's just another word for nothing left to lose" sung by J. Joplin|
 --------------------------------------------------------------------------


------------------------------

From: Robert Ellis Smith <0005101719@mcimail.com>
Date: 23 Feb 95 16:38 EST
Subject: Electronic Footprints

Taken from Privacy Journal, February 1995:

ELECTRONIC FOOTPRINTS FOUND AT HARVARD Seven graduate students and 21
undergraduates using the computer system at Harvard were shocked last
month to discover that the system permitted other users to see a list
of names that showed they had downloaded pornography.

"That's very embarrassing, I had no idea," said one student after the
student newspaper, The Harvard Crimson, revealed the peculiarity of the
system.  "Oh my God," said another, who teaches a large class at the
university.  Apparently the transmission of electronic mail and the
transfer of files from the Internet was regularly recorded in a public
log in the system, which is used throughout the university by faculty
and students. The system operator moved to close the access
immediately.  He said that the UNIX operating system for the university
was never intended to provide secure transactions.


------------------------------

From: John Shaw <johnshaw@cuix.pscu.com>
Date: 24 Feb 1995 14:57:46 -0800
Subject: Keeping Tabs on Taxpayers
Organization: Computer Users Information Exchange

The following report appeared in a recent issue of Cybernautics
Digest.

*************************
Keeping Tabs on Taxpayers
*************************

Uncle Sam is upgrading his computer to keep better tabs on you,
according to Frank Greve in "IRS plans know-all database on you" (The
Seattle Times, Jan. 20, 1995, pp. A1, A12). Greve, of Knight-Ridder
Newspapers, reports that an $8 billion IRS computer and software
upgrade will enable the agency to compile detailed financial reports on
citizens by gathering electronic information from credit reports, news
stories, tips from informants, commercial databases, and real-estate,
motor-vehicle and child-support records.

The upgrade, due to be completed in 2008, is designed to enable the IRS
to catch more crooks and, someday, gather enough information to
eliminate the need for most tax returns. Coleta Brueck, the IRS's top
document-processing official explains in the article how the system
would work: "If I know what you've made during the year," Brueck says,
"if I know what your withholding is, if I know what your spending
pattern is, I should be able to generate a tax return so that I only
come to you and tell you, 'This is what I think you should file for the
next year, and if you agree to that, then don't bother sending me a
piece of paper.'"

Greve reports that consumer advocates, not surprisingly, are appalled
at the scope of the information to be gathered and fear the data
collected may be misused by authorized and unauthorized personnel.

 ---------------------------------------------------------------------
This story is republished with permission from the March 1995
Cybernautics Digest, a monthly summary of reports about converging
information technologies.

(Contact: Terry Hansen, Cybernautics Digest, c/o KFH Publications Inc.,
3530 Bagley Ave. N., Seattle, WA 98103; 206-547-4950; Fax:
206-547-5355; E-mail: cybernbf@cuix.pscu.com. U.S. subscription rate:
$24; $2 sample issue. Or visit us on the World Wide Web at
http://www.pscu.com)
 --------------------------------------------------------------------


------------------------------

From: Zachary Uram <zu22+@andrew.cmu.edu>
Date: 25 Feb 1995 00:28:21 -0500 (EST)
Subject: Security Programs

Hello!

I have seen a lot of security programs/scripts that can be installed
for account safety, but so far all of them require you to be root or
su. Do you know of any programs that a regular user could install
without going through sysadmin?  anything? or can u point me to an ftp
site? program names?

thanx,
Zach


------------------------------

From: wicklund@Intellistor.COM (Tom Wicklund)
Date: 24 Feb 95 11:01:36 MST
Subject: Use of Mailboxes

    Christopher Zguris <0004854540@mcimail.com> writes: I thought it
    was _illegal_ to put anything in someone's mailbox! Private
    delivery companies can't put magazines in private mailboxes because
    it's against the law and the post office will sue them into the
    stone age. How does a campus post office get away with fiddling
    with private mail?

Probably the same way that companies can put internal mail in an
employee's mail slot.

The post office consider's the mail's address to be the university (or
perhaps some building on campus).  Any further sorting and distribution
is internal to the campus, so doesn't fall under post office
regulations.

This also means that your campus mailbox isn't technically a mailbox
under postal regulations, which may have other implications.


------------------------------

From: "Prof. L. P. Levine" <levine@blatz.cs.uwm.edu>
Date: 26 Feb 1995 09:10:38 -0600 (CST)
Subject: Use of Mailboxes
Organization: University of Wisconsin-Milwaukee

After reading the questions about University Dormatory Postoffices I
checked with the managers of the University of Wisconsin-Milwaukee's
Sandberg Hall dormatories and asked about how they handle mail.

I was informed that they know about no applicable rules for mail
handling, the US Post office considers Sandberg Hall to the
destination address.  The managers there assign a permanent mailbox
number to a student who keeps that box number as long as s/he remains
in a dorm room.  Mail addressed to a box is deposited in the box only
if the name matches the current owner otherwise it is moved to a bin
for forwarding to a previous owner if possible.

As a direct result of this students can not set up aliases within the
box such as a normal postal user can; for example, I believe that all
mail addressed to my home with any name reaches my mailbox.

I discussed this with the managers.  They knew about this problem and
agreed that it was a weakness, but pointed out that this was the only
control they exercized; all mail addressed to the user was delivered
with no additional impositions.

I also came to realize that the US Post Office also checks my incoming
home mail stream.  When my son left our home to take on his own life he
could have given the US Post Office a change of address card that would
have directed them to read envelopes directed to my home and forward
those addressed to his name to his new address.  These actions are
identical to what the Campus Post Office does, except that the default
is to post an unknown name in the case of the US Post Office and to
reject an unknown name in the case of the Campus Post Office.

--
Leonard P. Levine               e-mail levine@cs.uwm.edu
Professor, Computer Science        Office 1-414-229-5170
University of Wisconsin-Milwaukee  Fax    1-414-229-6958
Box 784, Milwaukee, WI 53201     
         PGP Public Key: finger llevine@blatz.cs.uwm.edu


------------------------------

From: rthomas007@aol.com (RThomas007)
Date: 26 Feb 1995 17:06:28 -0500
Subject: Re: What Does City Hall Have about Me?
Organization: America Online, Inc. (1-800-827-6364)

You will just be shocked at what they do have. Actually the bulk of
records on your will be found at the county courthouse level. Let us
start with vital stastics (birth and death records). YOur name, DOB and
parents.  Next comes vehicle registration. Your name, address, type of
car. Next comes marriage license. Who you married, when, you married
you. If you have any civil records or criminal records these will also
be found at courthouse. If you open a business, they have a record of
that. If you purchase real property they have details on that. If you
register to vote, they have those records. Hope this helps.

You might want to obtain copies of books such as HOW TO FIND ANYONE
ANYWHERE and CHECK HIM OUT. These are books that show you how to search
such records. You can obtain a copy of 400 of these types of books by
contacting Investigative Publications, POB 33244, Austin, texas,
78764.  Phone 512-719-3595 Fax 512-719-3594.

--
Ralph Thomas, Director
National Association Of Investigative Specialists


------------------------------

From: Sarah Holland <70620.1425@compuserve.com>
Date: 26 Feb 95 14:49:30 EST
Subject: Jailed for Free-Net Message

Interesting article appeared in the paper, thought it might be of
interest to Privacy Digest & Risks Digest.

>From the Prince George Citizen, February 20, 1995 -

Free-Net message results in lock-up
by Leonard Stern
Ottawa Citizen

When two police officers showed up Jan 24 at the car dealership where
Ken Scott-Humphrey worked, the newly employed salesman had no idea they
were coming for him. Later, because his colleauges were looking on,
Scott-Humphrey, 49, thanked the officers for not using handcuffs when
they took him away.

"I must be the only person ever to have gone to jail for posting a
notice on Free-Net," he says, still bewildered over an ordeal which
included three weeks in jail and the loss of his job.

A few days earlier, he had posted a question through National Capital
Free-Net [snip]. Scott-Humphry e-mailed his message to a discussion
group for antique gun collectors who don constumes on weekends and fire
old-fashioned black powder weapons. His asked where to buy a particular
kind of gun powder and bullets.

The arresting officers told Scott-Humphry only that his parole had been
suspended. Two years ago, the former bus driver was convicted of
conspiracy to import hashish.

The RCMP, he was told the next day, saw his query about gun powder, and
because the message mentioned a gun show in Syracuse, N.Y., mistakenly
inferred that Scott-Humphry had visited the United States, a parole
violation.

[snip] Waiting for him when he got out of jail three weeks later was a
letter of dismissal from his employer.

[snip] {article goes on to mention that he posted the message for a
friend, that the message was public rather than private)

Sgt. Craig Hannaford of the RCMP technological crimes section said
there's no program to systematically monitor electronic discussion
groups, although the RCMP is aware of certain groups such as those that
exchange information about how to commit crimes. [snip]

Scott-Humphry's lawyer suggested Correctional Services was
over-zealous. "They might have had another option, to speak with him
first. Their decision to suspend his parole has had a dramatic effect
on his life." [snip]

And yes, [Scott-Humphry] will continue to cruse the information
highway. So far, he's received eight responses to his question about
gun powder.


------------------------------

From: Heathen <fruitjoh@acc.wuacc.edu>
Date: 27 Feb 1995 12:22:53 -0600 (CST)
Subject: SS Number at College

Here at Washburn University in Topeka, students must use their social
security numbers for everything to enrolling, writing a check, applying
for schoarships and jobs, to purchasing food in the union.  I am a bit
nervous about so many copies of my number floating around.

Is there anything I can do about this?

--
John fruit
fruitjoh@acc.wuacc.edu


------------------------------

From: wmcclatc@gmu.edu (Bill McClatchie)
Date: 24 Feb 1995 17:15:05 -0500
Subject: SS Number in Business

    Many states have laws regarding what merchants may or may not
    require for check acceptance. In Pennsylvania, merchants may
    require phone number, address, driver's license number or other
    forms of identification. They may also seek a major credit card and
    may record the name of card issuer and expiration date.  Merchants
    aren't required to accept any personal check. They may not record a
    credit card number as a condition for accepting a personal check.

In Virginia, and Maryland, a retailer can request any reasonable
information to garraunttee that they will be able to collect if your
check bounces.  This includes things like your name, address, phone
number, drivers license number, and possibly a credit card.  They are
also allowed to record this information on the check at the time of the
transaction.  A merchant can require a credit card as a form of
identification before accepting a check.

    For credit cards, a valid card and signature only, according to
    Pennsylvania's new credit card law.

All states allow for a second form of ID to be asked for to verify that
the purchaser is really entitled to use the card.  If it is not your
card, the merchant can ask for proof that you do have the right to use
it (say a parent loans a child the credit card).

In most states if a credit card has been approved, and a verification
number issued, then you only need to sign the credit slip.  This is
becuase payment has been gaurnateed to the merchant when the
identification number was issued.

However, in every state, if you use a credit card to pay for a good or
service and the merchant is unable to get a verification number, some
other information can be asked for - such as phone numbers, addresses,
and drivers licences.  Since there is no gaurantee of payment, the
merchant needs to have some way to collect if the card turns out to be
bad for some reason.

--
Bill McClatchie
wmcclatc@gmu.edu


------------------------------

From: Jim Silvania <silvania@ohionet.org>
Date: 26 Feb 1995 15:11:47 -0500 (EST)
Subject: Braindead In Cyberspace

Brain Dead in Cyperspace
       By: Jim Silvania

The demise of  America's number one cyperthief, Kevin Mitnick, The
Condor, has been widely reported.  Discussions among Internet users
regarding Mitnick's arrest have led to some interesting revelations.
There appears to be a growing fear by Internet computer users  that
Mitnick (sometimes referred to as the "Hannibal Lector of hacking"), or
other cyperpunks with modems, could somehow gain access to their
private computer system and reek havoc by stealing their secrets or
implanting an information consuming virus.  The possibility exists but
even more of a threat is someone surreptitiously entering your home or
business and walking off with your hard drive and thereby rendering
your business brain dead.

Medical shows (such as ER and Chicago Hope) have once again become
popular with TV viewers.  Would I be revealing my age if  I stated I
can remember watching Ben Casey, M.D. and Dr. Kildare?  In all of the
previous mentioned medical shows one scene always portrayed is that of
a patient lying in a hospital bed hooked up to a visual monitor.  One
soon learned that at some point during the show the lines on the
monitor went flat causing the monitor to sound an alarm and thereby
sending the staff into a controlled "Code Blue" panic.  In the older
television dramas, the doctor would rush to the rescue and save the
dying patient.  In the newer TV dramas, the viewers have learned that
if the lines on the monitor remain flat, the patient dies.  The patient
is labeled "brain dead" and all bodily functions cease.

I  am now involved in an investigation of another theft or a lobotomy
of a business entity.  Again an uncommon thief  has entered a business
and removed  or stolen the computer's hard drive. The hard drive
contained the business' customer list.  In one of the more recent
cases, not only did the perpetrator steal the hard drive, he/she also
stole the taped backup which was located next to the hard drive and, of
course, plainly marked "backup".

The thieves in these past instances did not gain access to the
business' secrets via the use of a modem or  the process of hacking.
The acts of these criminal s were committed as easily  as the
professional shoplifter who steals from the neighborhood discount
store.

The  investigation into the theft of a hard drive becomes a horse of a
different color.  The street cop who is dispatched to the business to
take the theft report views the whole affair as just a minor theft of
computer hardware that can be easily replaced by submitting an
insurance claim.  The investigating detective with a stack of 100
reports on his desk views the matter in the same light. What neither
law enforcement officer realizes is that the actions of the
perpetrators amount to more than just a theft.  Their actions amount to
murder. The lines on the monitor monitoring your business have gone
flat. The alarm should be sounding a "Code Blue" because your  company
is now "brain dead".

The motivations of such thievery can be inclusive of espionage,
subversion, competitor intelligence or just a disgruntled employee
seeking revenge.  Here are some tips on preventing your business from
becoming "brain dead":

1.   Secure your hard drive, preferably with a lock and key.

2.   Pass wording doesn't cut it. If your hard drive is stolen, it can
be booted by a floppy disk or simply mounting your hard drive into a
new computer.

3.   Secure your backup.   It belongs someplace else other than next to
your computer.

--
Jim Silvania    silvania@ohionet.org
Porter,Wright,Morris & Arthur
Columbus, OH 


------------------------------

From: rthomas007@aol.com (RThomas007)
Date: 26 Feb 1995 17:08:20 -0500
Subject: Investigative Catalog
Organization: America Online, Inc. (1-800-827-6364)

Here is a little tidbit that will be of interest. A company in Austin,
Texas publishes a catalog of over 400 books and manuals on subject such
as hot to conduct background investigations, how to investigate by
computer, physical surveillance, electronic surveillance, locating
missing persons.  The catalog also features spy gear and online
information sources. They want $5.00 for a 50 page catalog. Contact is
TIPI, PO Box 33244, Austin, Texas, 78764. Phone 512-719-3595 fax
512-719-3594.


------------------------------

From: reichard@mr.net (Kevin Reichard)
Date: 26 Feb 1995 17:00:35
Subject: Re: The National Computer Security Organization
Organization: Minnesota Regional Network

    "(NCSA) Bob Bales" <74774.1326@compuserve.com> writes: Thank you
    for your interest in the National Computer Security Association
    (NCSA).

Isn't it really confusing to use the NCSA moniker in light of Mosaic?
People will assume more legitimacy for this outfit than it deserves,
since it sounds like a front for this guy's consulting firm.

--
Kevin Reichard         reichard@MR.net
1677 Laurel Av.        Cserve: 73670,3422
St. Paul, MN 55104


------------------------------

From: Privacy Rights Clearinghouse <prc@pwa.acusd.edu>
Date: 27 Feb 1995 17:03:16 -0800 (PST)
Subject: Compuserve Sued for Delivering "Junk E-Mail"

Robert Arkow, a Compuserve subscriber, is suing the service for
delivering two unsolicited advertising e-mail messages to his mailbox
on December 21, 1994.  The suit, believed to be the first of its kind,
challenges the right of advertisers to deliver so- called "Junk E-Mail"
under the Telephone Consumer Privacy Protection Act of 1991 (TCPA).
Arkow argues that the TCPA prohibits the automated calling of "any
service for which the calling party is charged for the call."  Also
named in the suit is Compuserve Visa, the business responsible for the
ads.

The TCPA provisions are aimed at automated dialers, machines that call
homes and deliver recorded sales pitches.  The law also prohibits
unsolicited fax advertisements.  The question will be "How similar is
junk E-Mail to recorded telemarketing calls or unsolicited fax ads?"

--
Barry D. Fraser                      fraser@pwa.acusd.edu
Online Legal Research Associate

Privacy Rights Clearinghouse         prc@pwa.acusd.edu
Center for Public Interest Law       telnet teetot.acusd.edu
University of San Diego                   login:  privacy
Privacy Hotline: 619-298-3396        BBS: 619-260-4789
In California:   800-773-7748             host: teetot
                                             login:  privacy


------------------------------

From: jwarren@well.sf.ca.us (Jim Warren)
Date: 24 Feb 1995 00:03:08 +0800
Subject: Re: New Hires SSN into National Database

    Sen. Bill Bradley (D-NJ) said about S.456 which was introduced on
    16-Feb-1995: "This bill requires information on every new hire to
    be filed in a national database, which States can regularly search
    for the names or Social Security numbers of parents who owe support
    to children in their States." The bill is "The Interstate Child
    Support Responsibility Act"

I incorrectly alleged:
This child-support pursuit was the same rationale used by California's
then-state Senator Becky Morgan in mandating that SS numbers must be on
drivers' licenses.

Here's the *correct* dope:

    Chris Hibbert <hibbert@netcom.com> wrote: The SSN is required on CA
    DL applications.  It does not appear on the card, or in the
    magnetic stripe on the back.  There's enough unused space on the
    mag stripe that it would fit, but the DMV has no plans to add it.
    At the Senate Judiciary committee hearing we attending on the
    Privacy act of '93, the head of the committee told the head of the
    DMV (Zolin?) that the SSN would *never* be allowed to appear on the
    card.

My apologies.  I *knew* I'd be wrong about something someday.  :-)

However, I certainly wouldn't trust 'em to "never" do it.  Sounds too
much like their promise never to issue traffic citations merely for not
wearing your seatbelt - which promise lasted for about a year after the
passed the hotly-contested mandantory seatbelt law.

--
jim


------------------------------

From: Privacy Rights Clearinghouse <prc@pwa.acusd.edu>
Date: 27 Feb 1995 16:54:10 -0800 (PST)
Subject: Proposed FTC Rules Could Reduce Telemarketing Abuses

The Federal Trade Commission (FTC) has proposed a set of rules which
would ban many deceptive or abusive telemarketing sales practices.
Although there has been very little publicity about this rulemaking, it
could severely restrict telemarketing activity and substantially cut
down on those annoying sales calls that always seem to come at the
wrong time.  It would also provide a strong deterrent to scam artists.

The FTC is seeking public comment over the next several weeks on the
proposed rules.  A copy of the proposal can be obtained by calling
202.326.2222.  The actual text is very long (120 pages), so interested
persons might request a press release which explains the rules in some
detail.  I'm not aware of any online availability of these materials.

Under the proposed rules, telemarketers would have to tell consumers at
the beginning of each call that it is a sales call and provide the name
of the seller.  The rule would prohibit telemarketing calls before 8
a.m. or after 9 p.m.  Telemarketers offering credit or loans, credit
repair services, or assistance to consumers in recovering lost money
from prior telemarketing schemes, would be prohibited from seeking
payment until the services have been rendered.

Additionally, telemarketers would be required to disclose all material
information about any offer made to a consumer, and would be required
to obtain signed acknowledgement of written disclosure regarding all
prize-promotions and investment offerings before seeking any payment.
These disclosures must include information about the retail price of
all prizes, odds of winning, costs of obtaining any prize, and the "No
purchase necessary to win" statement.

The proposed rules also prohibit a variety of specific
misrepresentations, including that a person was selected to receive a
prize, that the telemarketer is affiliated with a government entity, or
that the telemarketer can improve credit records or obtain loans for
customers regardless of credit record.

Also, telemarketers would be prohibited from calling consumers more
than once every three months to sell the same thing, and calling
consumers who have stated that they do not want to be called by the
telemarketer.  Violations of the proposed rule could result in civil
penalties of up to $10,000 per violation.

There will likely be strong resistance from the telemarketing industry
to these regulations, and attempts to weaken the proposed rules.
Written comments in support of the rules may be submitted to the FTC,
Office of the Secretary, Room 159, Washington D.C. 20580, and should be
captioned "Proposed Telemarketing Sales Rule."  The FTC requests that
the comments also be submitted on disk, preferably in a DOS word
processer format, or as a text file.

BTW, the Privacy Rights Clearinghouse has a free publication entitled
"Telemarketing: Whatever Happened to a Quiet Evening at Home?" that
provides tips on cutting down on sales calls.  The document is
available via gopher at gopher.acusd.edu; ftp at teetot.acusd.edu  cd
pub/privacy; WWW at http://www.manymedia.com/prc/; or e-mail this
address for a copy.

--
Barry D. Fraser                      fraser@pwa.acusd.edu
Online Legal Research Associate

Privacy Rights Clearinghouse         prc@pwa.acusd.edu
Center for Public Interest Law       telnet teetot.acusd.edu
University of San Diego                   login:  privacy
Privacy Hotline: 619-298-3396        BBS: 619-260-4789
In California:   800-773-7748             host: teetot
                                          login:  privacy


------------------------------

From: "Prof. L. P. Levine" <levine@blatz.cs.uwm.edu>
Date: 29 Dec 1994 10:50:22 -0600 (CST)
Subject: Info on CPD [unchanged since 12/29/94]
Organization: University of Wisconsin-Milwaukee

The Computer Privacy Digest is a forum for discussion on the effect of
technology on privacy or vice versa.  The digest is moderated and
gatewayed into the USENET newsgroup comp.society.privacy (Moderated).
Submissions should be sent to comp-privacy@uwm.edu and administrative
requests to comp-privacy-request@uwm.edu.  

This digest is a forum with information contributed via Internet
eMail.  Those who understand the technology also understand the ease of
forgery in this very free medium.  Statements, therefore, should be
taken with a grain of salt and it should be clear that the actual
contributor might not be the person whose email address is posted at
the top.  Any user who openly wishes to post anonymously should inform
the moderator at the beginning of the posting.  He will comply.

If you read this from the comp.society.privacy newsgroup and wish to
contribute a message, you should simply post your contribution.  As a
moderated newsgroup, attempts to post to the group are normally turned
into eMail to the submission address below.

On the other hand, if you read the digest eMailed to you, you generally
need only use the Reply feature of your mailer to contribute.  If you
do so, it is best to modify the "Subject:" line of your mailing.

Contributions to CPD should be submitted, with appropriate, substantive
SUBJECT: line, otherwise they may be ignored.  They must be relevant,
sound, in good taste, objective, cogent, coherent, concise, and
nonrepetitious.  Diversity is welcome, but not personal attacks.  Do
not include entire previous messages in responses to them.  Include
your name & legitimate Internet FROM: address, especially from
 .UUCP and .BITNET folks.  Anonymized mail is not accepted.  All
contributions considered as personal comments; usual disclaimers
apply.  All reuses of CPD material should respect stated copyright
notices, and should cite the sources explicitly; as a courtesy;
publications using CPD material should obtain permission from the
contributors.  

Contributions generally are acknowledged within 24 hours
of submission.  If selected, they are printed within two or three days.
The moderator reserves the right to delete extraneous quoted material.
He may change the SUBJECT: line of an article in order to make it easier
for the reader to follow a discussion.  He will not, however, alter or
edit or append to the text except for purely technical reasons.

A library of back issues is available on ftp.cs.uwm.edu [129.89.9.18].
Login as "ftp" with password identifying yourid@yoursite.  The archives
are in the directory "pub/comp-privacy".

People with gopher capability can most easily access the library at
gopher.cs.uwm.edu.

Mosaic users will find it at gopher://gopher.cs.uwm.edu.

Older archives are also held at ftp.pica.army.mil [129.139.160.133].

 ---------------------------------+-----------------------------------------
Leonard P. Levine                 | Moderator of:     Computer Privacy Digest
Professor of Computer Science     |                  and comp.society.privacy
University of Wisconsin-Milwaukee | Post:                comp-privacy@uwm.edu
Box 784, Milwaukee WI 53201       | Information: comp-privacy-request@uwm.edu
                                  | Gopher:                 gopher.cs.uwm.edu 
levine@cs.uwm.edu                 | Mosaic:        gopher://gopher.cs.uwm.edu
 ---------------------------------+-----------------------------------------


------------------------------

End of Computer Privacy Digest V6 #022
******************************
.