Date:       Fri, 05 May 95 14:16:38 EST
Errors-To:  Comp-privacy Error Handler <owner-comp-privacy@uwm.edu>
From:       Computer Privacy Digest Moderator  <comp-privacy@uwm.edu>
To:         Comp-privacy@uwm.edu
Subject:    Computer Privacy Digest V6#043

Computer Privacy Digest Fri, 05 May 95              Volume 6 : Issue: 043

Today's Topics:			       Moderator: Leonard P. Levine

                            Re: ID Microchip
                            Re: ID Microchip
                            Re: ID Microchip
                            Re: ID Microchip
                            Re: ID Microchip
                          Privacy of Tax Files
                     Databases, Especially Medical
                            Fear of Surfing
              Just how secure *is* public key encryption?
                       Mr. Orwell Would be Proud
            Re: Could What You Post be Used to Profile You?
                 Re: California Digital Signature Bill
                  Bacard's Privacy Book, Kapor's Intro
                 Info on CPD [unchanged since 12/29/94]

----------------------------------------------------------------------

From: MVanAuken@UH.edu (Michael Van Auken)
Date: 03 May 1995 09:00:09 -0500
Subject: Re: ID Microchip
Organization: University of Houston, Information Services

    eg350aaf@csulb.edu (Sharlene MacKay) wrote: Recently, I heard about
    an identification microchip for pets.  The chip is implanted under
    the pet's skin and is used to identify lost animals.  Since it is
    in use for pets, I was wondering if anyone had thought about the
    idea of using a similar type chip for humans??

It has been thought of.  There are even designes that can be monitered
from significant distances.

One suggested use was for the prevention of gang activity.  The
transponders would be installed in "gang members".  If sensors detected
a gathering of the  implanted persons, police could be dispached to
prevent any trouble.

Another example of the technology is in traffic monitoring (and
automatic toll payment).  For this, a card containing the transponder
is placed in a vehical (on a volunteer basis).  Each card has a unique
signature.  Sensors placed along the freeways can detect individual
cards, and use the data to plot traffic patterns, etc.

The same card is used for automatic toll payment.  In this case,
accounts are maintained on a computer.  When a card is sensed passing
through a toll plaza, the appropriate ammount is deducted from the
account.

Examine: 

http://herman.tamu.edu/houston-real.html

for an example this system put to use.

--
Michael Van Auken     |     Einstein has overcome time and space.  Harvey
MVanAuken@UH.edu      |     has overcome not only time and space--but any
713/743-1502          |     objections.


------------------------------

From: Maryjo Bruce <sunshine@netcom.com>
Date: 03 May 1995 10:34:00 -0700 (PDT)
Subject: Re: ID Microchip

I have been hearing reports on the radio about the pet chips.  It has
been suggested that it would be good to put them in all American
children as a way to prevent abductions.

I remember when I was in library school taking a medical informatics
class...a hospital employee mentioned the chips and said implanting
them in the necks of the homeless and of prisoners had been discussed
in some medically related forum.  We did not pursue the discussion.

--
Mary Jo Bruce, M.S., M.L.S.
Paralegal


------------------------------

From: tye@metronet.com (Tye McQueen)
Date: 03 May 1995 15:56:47 -0500
Subject: Re: ID Microchip
Organization: Texas Metronet, Inc  (login info (214/705-2901 - 817/571-0400))

    eg350aaf@csulb.edu (Sharlene MacKay) writes: Recently, I heard
    about an identification microchip for pets.  The chip is implanted
    under the pet's skin and is used to identify lost animals.  Since
    it is in use for pets, I was wondering if anyone had thought about
    the idea of using a similar type chip for humans?? Any
    thoughts....

According to "the news", some "right-wing extremist groups" believe
that "the government" (of the USA) is already implanting exactly those
things into babies at hospitals so they can "take over".

By the way, I first heard of these being used to track Salmon.  I don't
think it is a "chip", but more like a short piece of wire magnetically
encoded with a serial number that can be read at a short distance.  The
technology allows fish to be individually identified when they pass
through a detector built into a "fish ladder" (which allows the Salmon
to head up stream despite the presence of a dam).  The device is very
easy to insert (about like getting a hypodermic injection).

I don't think the range is very far so, for example, if "the
government" tagged us all in the feet, a set of floor censors could
probably identify anyone walking through a specific door (remember,
always enter government buildings walking on your hands!).

--
Tye McQueen                 tye@metronet.com  ||  tye@doober.usu.edu
             Nothing is obvious unless you are overlooking something


------------------------------

From: wjwinn@kocrsv01.delcoelect.com (Bill Winn)
Date: 04 May 1995 09:59:31 -0500
Subject: Re: ID Microchip

    eg350aaf@csulb.edu (Sharlene MacKay) stated/asked Recently, I heard
    about an identification microchip for pets.  The chip is implanted
    under the pet's skin and is used to identify lost animals.  Since
    it is in use for pets, I was wondering if anyone had thought about
    the idea of using a similar type chip for humans??

While an undergraduate at Purdue University in 1988 I took an ethics
course from Professor Eugene Spafford (Spaf).  During this course we
discussed the ability to place a microchip under the skin of people.
The chip could do much more than identify lost people, however...

One seemingly innocuous use for the chip would be to place the chip
under the skin of children.  This implanted chip would have a
transponder in it.  In the event that a child with a chip implant was
kidnapped, law enforcement could merely search for that chip's signal.
The abuse for this technology is obvious...

As a related aside, the media has reported that several far right-wing
groups fear that the new chicken pox vaccine actually a plot by the
U.S.  Government to implant transponder chips in children.  (NOTE:
These claims are unfounded.)  Reminds me of the John Birch Society's
stance on the addition of flouride to water (they thought it was for
mind control).

--
Bill Winn
Software Engineer - Analysts International Corporation


------------------------------

From: ahipc1j.dpeer01@eds.com (Don Peer)
Date: 04 May 1995 16:50:22 GMT
Subject: Re: ID Microchip
Organization: EDS

    Sharlene MacKay said...  Recently, I heard about an identification
    microchip for pets.  The chip is implanted under the pet's skin and
    is used to identify lost animals. Since it is in use for pets, I
    was wondering if anyone had thought about the idea of using a
    similar type chip for humans??

- Implant alzheimer's patients to aid runaway recovery/amnesia identification.

- Implant everyone for faster check cashing :)

- Merge with GPS (Global Positioning System) to track criminals on parole.

-- 
 --------------------------------------------------------------------------
| Still thinking up the perfect .sig            | Don Peer               |
|                                               | ahipc1j.dpeer01@eds.com|
|                                               | dpeer01@winternet.com  |
 --------------------------------------------------------------------------


------------------------------

From: Maryjo Bruce <sunshine@netcom.com>
Date: 03 May 1995 10:26:39 -0700 (PDT)
Subject: Privacy of Tax Files

The April 1995 (Volume 13, No. 8) issue of "Tax Savings Report"
published by the National Taxpayers Union deals with the subject of the
privacy of your tax records.

This, btw, is a monthly newsletter of 8 pages.

The cover article, "How private is your tax file?" by Ellen M. Katz,
says "authorized employees at more than 200 federal, state and local
government agencies, as well as certain foreign countries, are now
privy to some information given to the IRS..." "....IRS is expanding
its computer db to include even more financial information on citizens
in an attempt to improve compliance."

Info:  Tax Savings Report is pub. for members 10x annually.  NTU:  325
Pennsylvania Ave., S.E., Washington, D.C., 20003.  NTU's central
office: POB 747, Muscatine, IA 52761

--
Mary Jo Bruce, M.S., M.L.S.
Paralegal


------------------------------

From: rcktexas@aol.com (Rcktexas)
Date: 02 May 1995 16:54:38 -0400
Subject: Databases, Especially Medical
Organization: America Online, Inc. (1-800-827-6364)

DATABASES, ESP. MEDICAL

Where do I get started in this topic with regard to databases, in
particular medical databases:

Where do I get a list of medical databases?

How do I access them or get information about a client from them?

Thanks for your assistance,

--
rcktexas@aol.com


------------------------------

From: "Mich Kabay [NCSA Sys_Op]" <75300.3232@compuserve.com>
Date: 04 May 95 06:30:35 EDT
Subject: Fear of Surfing

>From the Washington Post news wire via CompuServe's Executive News Service:

	WP   04/28       Advocates of Internet Fear Drive to Restrict ...

 	Advocates of Internet Fear Drive to Restrict Extremists' Access 
	By John Schwartz 
	Washington Post Staff Writer 

	It is still unclear whether Timothy James McVeigh or other 
	Oklahoma City bombing suspects even own a modem. Still, 
	lawmakers, law enforcement officials and the media have 
	sounded alarms in recent days about the increasing use of
	telecommunications technology such as the Internet to spread 
	messages of hate. 

	"We know the advantage of the information highway, but 
	there's the darker side, too, we need to be concerned about," 
	said Sen. Edward M. Kennedy (D-Mass.) at a Senate Judiciary 
	Committee hearing yesterday.
 
	Kennedy, holding a printout of what he called a "how-to manual 
	for the terrorist" that a staff member had found on-line, said 
	that so long as Congress was considering regulation of 
	pornography on the Internet, "we ought to stop terrorism too." 

Key points from the article:

o	Internet activists shocked by liberal's attack.

o	Some advocates of a hands-off stance by government argue that the 
	Internet, like any technology, can be used for good or ill.

o	"I wouldn't ask about terrorists using the Net any
	more than I'd ask if they use telephones, paper mail or 
	smoke signals," said Andrew Kantor of Internet World Magazine.

o	According to Jack Rickard of Boardwatch Magazine, no more than
	300 or so of about 65,000 BBSs are run by and for libertarian
	and paranoid groups.

o	Some political activists are attacking the Internet because of 
	"a rising tide of on-line hate."

o	The author suggests, "The Clinton administration has long 
	used the fear of terrorist attack to promote its proposals 
	to limit the spread of encryption software....

o	The Clinton administration and the director of the FBI are 
	opposed by many, including Jerry Berman of the Center For 
	Democracy:  "We believe that it is absolutely protected by 
	the First Amendment and is essential to the health of our 
	democracy.  We don't want to see the fact that people may 
	use the Internet for ill purposes used as an excuse for 
	limiting free speech." 

M.E.Kabay,Ph.D., Mgmt Consultant, LGS Group Inc. (Montreal, QC); 
Director of Education, Natl Computer Security Assn (Carlisle, PA)


------------------------------

From: "Christopher L. Barnard" <cbarnard@cs.uchicago.edu>
Date: 04 May 1995 13:11:26 -0500
Subject: Just how secure *is* public key encryption?

>From the Electronic Engineering Times, Mon Jan 16, 1995:

"Parties Meet In Zimmerman Crypto Case - Lawyers to U.S.: halt PGP probe".
(p1, cont. on p80) 

"In contrast, public keys allow the overt publication of an encryption
key, because decryption keys can only be derived through a mathematiclly
difficult process, such as large prime-number factoring. Contrary to
popular belief, the NSA can decrypt public keys of most practical key
sizes. However, the computer resources need to decrypt public-key-
encrypted messages make it difficult for the NSA to perform broadband
intercept and decryption if many end users use public-key encryption."

+-----------------------------------------------------------------------+
| Christopher L. Barnard         O     When I was a boy I was told that |
| cbarnard@cs.uchicago.edu      / \    anybody could become president.  |
| (312) 702-8850               O---O   Now I'm beginning to believe it. |
| http://cs-www.uchicago.edu/~cbarnard                --Clarence Darrow |
|               Cyber Rights Now:  Accept No Compromise.                |
+----------PGP public key available via finger or PGP keyserver---------+


------------------------------

From: "Christopher L. Barnard" <cbarnard@cs.uchicago.edu>
Date: 04 May 1995 13:12:49 -0500
Subject: Mr. Orwell Would be Proud

(Note- I received this part of this article from a friend of mine.  I
have not read the entire article...)

>From the Electronic Engineering Times, Mon April 17, 1995:

"Dataport:  Coming-out party for NRO" by Loring Wirbel
(p 104)

[...]

"The National Reconaissance Office, the multibillion-dollar spy-satellite
agency that has been the subject of numerous tirades in this column, is
coming out of the closet... On April 6, NRO director Jeffrey Harris gave
a sneak preview when he appeared as a surprise keynoter for the National
Space Foundation (NSF) annual conference and met with the press after his
speech. 

[...]

The communications intelligence that NRO performs for the National Security
Agency, however, is still a taboo subject, at least in the details of
systems currently deployed or on the drawing board. But Harris's general
comments on how NRO can provide near-real-time 3D imagery and full
communications intercept to any U.S. base on the planet gives some
clues as to the agency's capability."

[...]

Harris said that the commercial world's concepts of broadband
communcication, defined under the ATM/Sonet herirarchy, are a drop in
the bucket to the US intelligence community. NRO has to deal with
"Tbyte-miles per second" of information being relayed from satellites
to ground locations, he said.  This information must be filtered at
ground processing stations and deployed at tactical bases fast enough
to be useful to battle commanders. Since the decline of the Soviet Union,
NRO has shifted much of its attention from strategic information on one
adversayry to real-time monitoring of the entire planet, serving the
Pentagon's Tencap (Tactical Exploitation of National Capabilities) program.

The intelligence community is creating a secure equivalent of the
Internet, complete with hypertext-linked Web site equivalents capable of
handling large data file and isochronous information. Harris said that
NRO, NSA and its partners plan to the only ones capable of real-time
monitoring of the entire planet, since "information supremacy may well
define the US as a superpower in the 21st Century." So don't ever think
you're being overly paranoid - even if there's not enough analysts on
the planet to pore over the take, you are being watched, continuously."

+-----------------------------------------------------------------------+
| Christopher L. Barnard         O     When I was a boy I was told that |
| cbarnard@cs.uchicago.edu      / \    anybody could become president.  |
| (312) 702-8850               O---O   Now I'm beginning to believe it. |
| http://cs-www.uchicago.edu/~cbarnard                --Clarence Darrow |
|               Cyber Rights Now:  Accept No Compromise.                |
+----------PGP public key available via finger or PGP keyserver---------+


------------------------------

From: horowitz@nosc.mil (Alan M. Horowitz)
Date: 05 May 1995 01:47:59 GMT
Subject: Re: Could What You Post be Used to Profile You?
Organization: NCCOSC RDT&E Division, San Diego, CA

Profiling someone by their published statements. IT's a traditional
method of forensic journalsism and of military-political intelligence
organs.  It's older than the hills.


------------------------------

From: kec@stubbs.ucop.edu
Date: 03 May 95 17:21:07 PDT
Subject: Re: California Digital Signature Bill
Organization: University of California, Berkeley

    <rocque@eskimo.com> writes: For now, further explanation of the
    point as to "versions of the same bill" would be helpful.

The California bill was based on a model that is being worked on by a
national lawyer's group whose name I cannot find, but when I asked for
more info I was sent this by Michael Baum, who has been working on the
topic:

**NEW INFO. SECURITY BOOK ON PUBLIC KEY LAW & POLICY**

TITLE:   FEDERAL CERTIFICATION AUTHORITY LIABILITY AND POLICY --
 Law and Policy of Certificate-Based Public Key and Digital Signatures

AUTHOR:   MICHAEL S. BAUM, J.D., M.B.A.
	  Independent Monitoring

Report No. NIST-GCR-94-654

   U.S. DEPARTMENT OF COMMERCE National Institute of Standards and
   Technology

Produced in support of the Federal Government's public key
infrastructure study, this book identifies diverse technical, legal and
policy issues affecting a certificate-based public key cryptographic
infrastructure utilizing digital signatures supported by "trusted
entities." It examines potential legal implications, surveys existing
legal paradigms and the structures and roles of relevant governmental
agencies and presents various institutional approaches to controlling
liability. It considers the underpinnings of a legal and policy
framework which might serve as a foundation for security policies and
their implementation and concludes with a series of recommendations,
both general and specific concerning certificate-based public key. Both
public and private sector issues are addressed.

This publication is the result of legal, business and security
management research, as well as interviews and analysis predominantly
with public- and private-sector lawyers, policy makers, managers and
management information system and security professionals in the United
States and abroad.

SUMMARY OF CONTENTS:

-       PREFACE -       ACKNOWLEDGMENTS -       TABLE OF CONTENTS
I.      INTRODUCTION II.     SCOPE III.    DEFINITIONS IV.
ASSUMPTIONS V.      SURVEY OF FCA ACTIVITIES CREATING LIABILITY
EXPOSURE VI.     LEGAL CONSIDERATIONS VII.    FCA INFRASTRUCTURE -
PROPOSALS AND PARADIGMS VIII.   SURVEY OF, AND APPROACHES TO, TRUSTED
ENTITY LIABILITY IX.     OTHER APPROACHES TO MITIGATE LIABILITY X.
CONCLUSIONS AND RECOMMENDATIONS XI.     APPENDICES XII.    GLOSSARY
XIII.   INDEX


OBTAINING COPIES:   Copies may be purchased through the National
Technical Information Service, Springfield, Virginia  22161, U.S.A.,
Phone +1 (703) 487-4650 or 1-800-553-6847.  Request NTIS Document No:
PB94-191-202.   [ISBN 1-886843-00-7] Cost: $61.00

ABOUT THE AUTHOR:  Michael S. Baum is Principal of Independent
Monitoring, a consultancy focused on electronic commerce and
information security law. He serves as a Delegate from the
International Chamber of Commerce (ICC) to the United Nations
Commission on International Trade Law (UNCITRAL); Chair of the EDI and
Information Technology Division, Section of Science and Technology,
American Bar Association (ABA) and its Information Security Committee;
and Chairman of the ICC Working Party on Legal Aspects of Electronic
Commerce.

Michael S. Baum Independent Monitoring Cambridge, Massachusetts  USA
Net:    baum@im.com


450+ pages, highly annotated; multiple appendices; indexed.
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=- =-=-=


------------------------------

From: murraypk@crl.com (Murray Peck)
Date: 05 May 1995 00:40:07 -0700
Subject: Bacard's Privacy Book, Kapor's Intro
Organization: CRL Dialup Internet Access	(415) 705-6060  [Login: guest]

Andre Bacard's "Computer Privacy Handbook" A Book Review Written by
Murray Peck

I highly recommend Andre Bacard's new book for anyone who cares about
privacy. Bacard argues that our "Information Age" has a flip side,
namely the "Surveillance Age." With both funny and scary examples,
Bacard illustrates how everyone is at risk because of "data sharks"
(people, corporations, and governments) who trade our personal secrets
for their gain. He devastates the knee jerk reaction "Whatsamatter,
I've got nothing to hide."

Bacard's earlier book, "Hunger for Power: Who Rules the World and How,"
prepared him for a fresh view of cyberspace. In "Computer Privacy
Handbook," Bacard tells how his meetings with John Markoff, John Perry
Barlow, Phil Zimmermann, Jim Warren, Mitchell Kapor and other
cyberspace leaders led him to see the connections between political
power and computer privacy. Very interesting story...

The book is divided into four main parts:

* An Overview of Surveillance * Cryptology * An Overview of PGP * A
User-friendly Manual for PGP * Pro-privacy Resources

"Computer Privacy Handbook" covers many topics, including Clipper Chip,
Digital Telephony, Pretty Good Privacy, Anonymous Remailers, and
DigiCash. Two of my favorite sections were Bacard's analysis of the
cash-free society and the psychology of privacy.

The book is clearly written with colorful anecdotes.

Bacard gives much praise to EFF (Electronic Frontier Foundation), EPIC
(Electronic Privacy Information Center), and CPSR (Computer
Professionals for Social Responsibility). These groups must be thrilled
by the "Computer Privacy Handbook".

As for my criticism... In the next edition, I hope Bacard will tell
American readers what we can learn from pro-privacy movements in other
countries. I'd also like him to speculate about future technologies.

Here is Mitchell Kapor's Introduction to "Computer Privacy Handbook."
Also I'm including a press release that Bacard <abacard@well.com> sent
me when I told him I was writing this review.


	   Introduction to "Computer Privacy Handbook"
			       by Mitchell Kapor
	   Co-Founder, Electronic Frontier Foundation
		     Creator of Lotus 1-2-3

Issues of privacy are very much on the minds of those migrating to the
wild new regions of the domain we call Cyberspace. What many of us seek
in picking up stakes and heading for the electronic frontier is greater
overall self-determination in life. This is impossible without being
able to control information by and about us. This is the heart of
privacy.

Privacy is both a matter of right and of practice. It is a fundamental
premise of this country's founding that rights of life, liberty, and
the pursuit of happiness are inalienable.  The Electronic Frontier
Foundation, of which I am a founder, is deeply involved in Washington
in the fight to make sure rights such as privacy, as well as freedom of
expression, are not abridged in Cyberspace. I am deeply troubled by the
profound resistance of certain agencies of the U.S. government to see
this matter through to its proper conclusion.

This does not mean we give up the fight to make public policy which
increases our privacy and our freedom. Far from it. It only makes us
redouble our efforts.

At the same time, it does remind us that we have to look beyond
Washington to solve our problems. Mere talk is not enough. When
government is unable to respect the rights of individuals and stands in
the way of those rights, direct action is required.

Fortunately, powerful, readily available new tools like PGP have been
created to put control of privacy much more directly in the hands of
the citizens of Cyberspace themselves. Andre Bacard's "Computer Privacy
Handbook" is an invaluable guide to both the whole subject of privacy
on the net, the politics of privacy, and, most important, to the
practical steps one can take right now.


	    ********** Begin Press Release **********

Peachpit Press                Print Media Contact:  2414 Sixth
Street             Trish Booth <trish@peachpit.com> Berkeley, CA
94710            Gary-Paul Prince <gary@peachpit.com> Phone (800)
283-9444 or
      (510) 548-4393          Broadcast Media Contact:  Fax   (510)
548-5991          Hannah Onstad <hannah@peachpit.com>


	     THE SCARIEST COMPUTER BOOK OF THE YEAR

"Andre Bacard's "Computer Privacy Handbook" is an invaluable guide to
both the whole subject of privacy on the net, the politics of privacy,
and, most important, to the practical steps one can take right now."
     Mitchell Kapor, Creator of Lotus-1-2-3, Co-founder of the
     Electronic Frontier Foundation "Bacard's ruthlessly realistic but
optimistic book explains the privacy dangers that YOU face and what YOU
can do to protect yourself!"
     Jim Warren, Founder of "InfoWorld", Founder of Computer, Freedom
     and Privacy Conferences


March 1995, Berkeley, CA. Criminals, competitors (anyone, in fact) can
buy a person's IRS forms for $500. An individual's medical records are
available to complete strangers. TV star Rebecca Schaffer was shot to
death by a computer stalker. These are just some of the horrifying
examples of invasions of privacy that author Andre Bacard points out in
his new book, "The Computer Privacy Handbook: A Practical Guide to
E-Mail Encryption, Data Protection, and PGP Privacy Software."

We live in the Age of Electronic Surveillance, Bacard says, and
snooping happens. Given that millions of e-mail messages are exchanged
daily, and the Internet buzzes with zillions of bites of online
discussions each day, it's easy to see how this could be.  But just as
computers are part of the problem, they are also part of the solution.
Bacard details how individuals can safeguard their electronic privacy
using good encryption, proper data protection, and the right software.

"Computer Privacy Handbook" shows how computers threaten YOUR personal
security, and it gives YOU the practical tools to reassert YOUR
privacy! In this book, find out:

* Who is Selling Your Secrets * How Computers Help Snoops * The Dangers
of a Cash-Free Society * How Big Brother Wants to Monitor ALL
Telecommunications * Why E-Mail Can Be Terribly Unsafe * What to do
with Your Social Security Number * The Advantages of Anonymous
Remailers * How to Protect Yourself with Encryption * The Best Usenet
News Groups for You to Visit * Where to Find Expert Privacy Activists

"Computer Privacy Handbook" also contains a user-friendly manual for
PGP software. PGP ("Pretty Good Privacy") is a top-rate program to
protect your personal and business data files and e-mail from snoops!
PGP is the de facto world standard for e-mail privacy.

Author Andre Bacard, who also wrote "Hunger for Power: Who Rules the
World and How," has a wide-angle view of society. He has written about
technology and society for numerous publications. A guest on hundreds
of radio talk shows, he was judged one of the best public speakers in
America by the International Platform Association.
============================ Price $24.95 Size 274 pages; 7"x 9" ISBN
1-56609-171-3 Software covered. PGP.  Levels: beginner through
advanced.  Availability: through bookstores, computer dealers,
catalogs, and
     user groups; or directly for Peachpit Press. Satisfaction
     cheerfully guaranteed.

	  ************* End Press Release *************



------------------------------

From: "Prof. L. P. Levine" <levine@blatz.cs.uwm.edu>
Date: 29 Dec 1994 10:50:22 -0600 (CST)
Subject: Info on CPD [unchanged since 12/29/94]
Organization: University of Wisconsin-Milwaukee

The Computer Privacy Digest is a forum for discussion on the effect of
technology on privacy or vice versa.  The digest is moderated and
gatewayed into the USENET newsgroup comp.society.privacy (Moderated).
Submissions should be sent to comp-privacy@uwm.edu and administrative
requests to comp-privacy-request@uwm.edu.  

This digest is a forum with information contributed via Internet
eMail.  Those who understand the technology also understand the ease of
forgery in this very free medium.  Statements, therefore, should be
taken with a grain of salt and it should be clear that the actual
contributor might not be the person whose email address is posted at
the top.  Any user who openly wishes to post anonymously should inform
the moderator at the beginning of the posting.  He will comply.

If you read this from the comp.society.privacy newsgroup and wish to
contribute a message, you should simply post your contribution.  As a
moderated newsgroup, attempts to post to the group are normally turned
into eMail to the submission address below.

On the other hand, if you read the digest eMailed to you, you generally
need only use the Reply feature of your mailer to contribute.  If you
do so, it is best to modify the "Subject:" line of your mailing.

Contributions to CPD should be submitted, with appropriate, substantive
SUBJECT: line, otherwise they may be ignored.  They must be relevant,
sound, in good taste, objective, cogent, coherent, concise, and
nonrepetitious.  Diversity is welcome, but not personal attacks.  Do
not include entire previous messages in responses to them.  Include
your name & legitimate Internet FROM: address, especially from
 .UUCP and .BITNET folks.  Anonymized mail is not accepted.  All
contributions considered as personal comments; usual disclaimers
apply.  All reuses of CPD material should respect stated copyright
notices, and should cite the sources explicitly; as a courtesy;
publications using CPD material should obtain permission from the
contributors.  

Contributions generally are acknowledged within 24 hours of
submission.  If selected, they are printed within two or three days.
The moderator reserves the right to delete extraneous quoted material.
He may change the SUBJECT: line of an article in order to make it
easier for the reader to follow a discussion.  He will not, however,
alter or edit or append to the text except for purely technical
reasons.

A library of back issues is available on ftp.cs.uwm.edu [129.89.9.18].
Login as "ftp" with password identifying yourid@yoursite.  The archives
are in the directory "pub/comp-privacy".

People with gopher capability can most easily access the library at
gopher.cs.uwm.edu.

Mosaic users will find it at gopher://gopher.cs.uwm.edu.

Older archives are also held at ftp.pica.army.mil [129.139.160.133].

 ---------------------------------+-----------------------------------------
Leonard P. Levine                 | Moderator of:     Computer Privacy Digest
Professor of Computer Science     |                  and comp.society.privacy
University of Wisconsin-Milwaukee | Post:                comp-privacy@uwm.edu
Box 784, Milwaukee WI 53201       | Information: comp-privacy-request@uwm.edu
                                  | Gopher:                 gopher.cs.uwm.edu 
levine@cs.uwm.edu                 | Mosaic:        gopher://gopher.cs.uwm.edu
 ---------------------------------+-----------------------------------------


------------------------------

End of Computer Privacy Digest V6 #043
******************************
.