Date:       Thu, 08 Jun 95 10:34:50 EST
Errors-To:  Comp-privacy Error Handler <owner-comp-privacy@uwm.edu>
From:       Computer Privacy Digest Moderator  <comp-privacy@uwm.edu>
To:         Comp-privacy@uwm.edu
Subject:    Computer Privacy Digest V6#052

Computer Privacy Digest Thu, 08 Jun 95              Volume 6 : Issue: 052

Today's Topics:			       Moderator: Leonard P. Levine

                      What's Going on in Industry
                   Re: Text Filter for the Very Good
          Protecting kids from porn on Web -- html enhancement
                       ATM/Debit Machine Privacy
               New Book on Privacy and Encryption Policy
                   Re: Credit Cards in Grocery Stores
                       A Seduction In Cyberspace
                 Info on CPD [unchanged since 12/29/94]

----------------------------------------------------------------------

From: Benton Foundation <benton@periplum.cdinet.com>
Date: 06 Jun 1995 18:39:23 -0400 (EDT)
Subject: What's Going on in Industry

June 6, 1995

Washington DC ---

We believe you will be interested in "What's Going on in Industry," the
latest report from the Benton Foundation's Communications Policy
Project.

"Promise and Performance: Industry's Vision for the Information
Superhighway" looks at what leaders in the telecommunications industry
are saying about the National Information Infrastructure, and how their
plans and claims will affect key public interest values. Benton
commissioned this report to serve as a starting point for discussion,
and welcomes your comments in our online forum.

Also new is a side-by-side analysis of pending telecommunications
legislation in Congress. Benton compares key provisions that may have
significant implications for noncommercial users and those interested
in the passage of policy that is truly in the public interest.

Both documents are in the "What's Going on" section of our World Wide
Web and Gopher servers (http://cdinet.com/benton/goingon)

To receive regular updates about new alerts, briefings, or other news
from the Communications Policy Project, sign up for our new Internet
mailing list by sending email to benton-request. In the body of the
message, write "subscribe benton-compolicy."

Those of you who have not visited the site in the last few weeks may
notice some other recent additions and changes:

Our new "Cyber pages" are an annotated guide of pointers to a variety
of useful resources on the Net. 

Our forum has been expanded so that you can post comments in our
ongoing conversation about policy issues and developments related to
the NII. The state of the information infrastructure and industry
action is the new topic of discussion.

An expanded home page for the Benton Foundation contains links to its
media and children's projects.

Getting around, How to use this Site, and About this Site have been
added to make it easier for our visitors to navigate, see what's new on
the site, and learn more about Benton Foundation and its other
projects.

Recently released publications include Briefing 4: Telecommuni- cations
and Democracy;Working Paper 4: Recovering Network Subsidies Without
Distortion; and Working Paper 8: Issues in Telecommunications and
Democracy.

We hope these changes will make it easier to exchange information about
communications policy as it develops. We look forward to hearing from
you in our ongoing dialogue about the nation's emerging information
infrastructure.

Regards,

--
Andrew Blau
Director
Communications Policy Project
Benton Foundation
1634 Eye Street, NW
Washington, DC 20006
Tel 202 638 5770
Fax 202 638 5771
Email: benton@benton.org


------------------------------

From: pbrennan@world.std.com (Patrick M Brennan)
Date: 06 Jun 1995 23:09:30 GMT
Subject: Re: Text Filter for the Very Good
Organization: The World Public Access UNIX, Brookline, MA

    Dick Mills (rj.mills@pti-us.com) wrote: The net is more anarchistic
    than a newspaper.  I presume you've heard of anonymous cancelbots.
    If the filter you propose was available, nearly everybody would be
    able to censor everyone else.  Conservatives would filter liberals
    and visa versa until we were left with thundering silence.

Dick, I think you clearly missed the point of the idea.  The idea was
to have software which could filter *incoming* text at the display
terminal of the weak-hearted (and -minded) person reading the words;
placing the filter at the tap, so to speak, instead of at the central
pump, as you seem to think it was suggested.  This places control in
the hands of the end-user, where it belongs.  I don't mind if some
dunderhead wants to filter out words from her local version of the
newsgroup posting (the one on her screen) -- its full unexpurgated text
is still available to anyone who can stand the sight of the "F-word".
Hey, maybe she thinks she's protecting her children.

--
Patrick


------------------------------

From: "Prof. L. P. Levine" <levine@blatz.cs.uwm.edu>
Date: 07 Jun 1995 10:31:41 -0500 (CDT)
Subject: Protecting kids from porn on Web -- html enhancement
Organization: University of Wisconsin-Milwaukee

Taken from Computer underground Digest Tue Jun 6, 1995 Volume 7 :
Issue 45 ISSN  1004-042X (Tue, Jun 6, 1995)

    Date: 22 May 1995 15:53:32 GMT
    From: subhas@CS.WM.EDU
    Subject: Re: Protecting kids from porn on Web -- html enhancement

Source: comp-academic-freedom-talk@EFF.ORG

         Can the parents prevent their children from viewing
          --------------------------------------------------
                         unwanted Web pages?
                         -------------------

Yes. There is a simple solution.

The senate's Communication Decency Bill is ultimately harmful and
moreover it won't work because Internet does not know any country
boundaries. Nevertheless, the politicians are making impassioned
arguments that the children must be protected from the pornographic
materials and other unwanted materials (like how to make a bomb). Do
they have a valid point? Well, let me rephrase the question :

 If you have a simple way to prevent your kids from viewing some adult
materials or other unwanted stuff available on the Web, would you use
it to control their access? Particularly if that objective can be
accomplished without any censorship laws or any inconvenience? Also
free of cost too? I suppose most parents probably would.

Below the proposed solution is introduced in a question answer form.

Q1. Why is this fuss? I don't see any problem. Therefore no solution
    is necessary.

A. Actually, there is a problem. Do you want your 10-year old kid to
  read Hustler magazine? There are actually lots of adult materials on
  the Web (and there are going to be more in the future) which are even
  more unsuitable for young children. Concerned parents want to protect
  their kids from viewing such materials available on the Web. Also,
  adult page authors don't want any kids to view their stuff. Its apparent
  that the Internet is going to be so useful that kids should be
  encouraged to surf the Net.  Currently there is no good solution to
  this dilemma.

   If something is not done by the net-citizens themselves, the
  politicians can generate enough public support to curtail freedom of
  expression on the Net. Despite all the hype, only a small percentage
  of the general population are on the Net and thus netters are powerless
  to the law-makers majority of whom are not friends of the Net.

Q2.  Can anything be done?  How?

A. Yes. Concerned parents and educators can control access on Web. All
  it needs is a little cooperation from the Web browser designers (like
  people at Netscape and NCSA Mosaic) and also from the adult Web page
  authors.

  In the next version of the Web navigators, just introduce a new HTML
  tag <adult_only>. If a WWW browser encounters this tag enclosed inside
  the <head> </head> part of a HTML document, then the browser will
  simply refuse to load or render the document. The author of a Web page
  should put that tag in all of his pages containing materials that he
  does not want to be seen by young children.

  At the time of installing the browser, a password will be asked from
  the person (who is assumed to be an adult) installing the
  program. This password is for identification of the installer.  As a
  default, the <adult_only> checking is enabled.  To allow a parent (the
  adult installer) the freedom to view adult-only stuff, the browser can
  have a command line option "-unrestricted".  If that option is used,
  the program will ask for a password for identification (only at the
  beginning of the session).

  This way, a parent protects the kids from unwanted stuff on the
  Net. Also, the adult page authors are protected from unwanted
  attention from kids. It involves no cost, no laws or hassles.

Q3. What about gopher and FTP sites?

A.  This solution works for any HTML page which many come via HTTP,
  gopher or FTP protocols.  Besides, now the Web is the most popular
  part of the Net. However, external gif/jpeg files cannot be prevented
  because they are not in HTML. So, by this tag trick, all the unwanted stuff
  that is not in HTML cannot be barred.

Q4. Why would the purveyors of net pornography comply to use the
    <adult_only> HTML tag in their pages?

A. It seems that the people who are posting adult materials on their
  Web pages would like to prevent the young children from accessing the
  pages. That's why they build such lame "adult access shield" which
  asks "don't click here if you are under eighteen".  So, we can hope
  that an author of a Web page containing adult stuff will be glad to
  put this HTML tag at the beginning of the all Web pages containing
  adult materials. One can send an e-mail to remind the author in case such
  a page is not properly tagged.

Q5. Why should Netscape people or Mosaic people support the tag?

A. Because implementing the tag is very easy and all protective
  parents and educators would be glad to have the support for such a
  tag. Such a tag should become a part of the standard HTML.

Q6. But browsers are freely available and a kid can download his own
    copy of a browser himself. Also, a smart kid can hack something to get
    around the efforts of access control. What about that?

A. Yes, this could be a problem. But automated software techniques
  (using some operating system support) can be used to ensure that
  no secretly installed browser exists in the system.

  A determined smart kid cannot not prevented from accessing anything he
  wants. He can possibly write his own browser and other tools. Heck, he
  can buy his own PC, have his own Internet connection and set up a
  Web server with his own home page containing adult materials! So, let
  us be concerned about the no-so-determined kids.

Q7. Can't we use SurfWatch software or other such tools?

A. SurfWatch (http://www.surfwatch.com) is a newly announced tool that
  seem to allow the concerned parents to prepare a list of offending
  sites.  Any site in the list will be denied access to the browsers
  used by the children of the customer of SurfWatch.

  However there are serious problems.

   - Nobody can maintain an up-to-date and exhaustive list of
  sites. There are many obscure sites all over the world. New Web pages
  are appearing and disappearing dynamically everyday. You may block the
  Penthouse site, but your kid may possibly be viewing far more unwanted
  stuff from some obscure site in Netherlands if that site is not
  included in your list.

   - SurfWatch will maintain a list of unwanted sites for you (if you
   pay extra monthly fee). Then you will need to trust SurfWatch to
   decide what is good or bad for your kids.

   - You will have to pay for the blocking software as well as a
  optional list of sites maintained by SurfWatch company.

   - The browser will need to check a list of possibly thousand sites
  for every single Web access just to make sure it is not one of
  those. Won't it be slow?

   - A WWW site can host thousands of separate Web pages only a few of
  which probably contain adult materials and the rest are possibly
  harmless or useful. So blocking access to a site is not a good
  idea. If SurfWatch starts maintaining a list of offending Web pages,
  the list will be in very very long indeed. It is a hopeless idea to
  maintain a list of unwanted sites or unwanted URLs.

Q8. The tag seems to be a good idea. Can it be used for other
    purposes?

A.  This tag idea can be generalized to classify Web documents in
  variety of ways and it will greatly facilitate cataloging the Web
  documents. Web desperately needs such categorization so that your
  browser can select and reject Web materials of all sorts based on your
  priorities. This will cut down noise as well as litigation.


------------------------------

From: bo774@freenet.carleton.ca (Kelly Bert Manning)
Date: 08 Jun 1995 00:09:27 GMT
Subject: ATM/Debit Machine Privacy
Organization: The National Capital FreeNet, Ottawa, Ontario, Canada

    Steve Arlow (yorick@msen.com) writes: PIN entry is one of the few
    cases where you *don't* want audible feedback, just tactile (and
    maybe visual if the display is private enough).  But it seems that
    the companies who are building these systems haven't really given
    it much thought.  As for teller machines, I was once stung by an
    ATMs which, without warning, displayed my full name and the current
    balance of my account on a large CRT.  I'd like to get my hands
    around the neck of the fellow who programmed that one!

I agree that they often havn't given these much thought. At least the
Royal Bank passbook updating machines ask whether you want to display
or print your balance when making a balance inquiry.

They seem to have a way to go in making the service reliable though. At
one point when it asked me what the last balance printed in my book was
it told me that it was wrong and to ssee a bank employee. When I called
in one told me that they'd had a hardware problem and lost part of
their records. The recommended solution was to get a new bank book and
start over.

I said no thank you, went to one of the updaters that evening and
worked my way backwards from the last balance printed till I found the
one that it liked, then inserted my book on a blank page. I then sent
them a fax about this and asked whether this was an example of the
limited recoverability of a CICS TP system using VSAM as the data
access method and not doing any journalling. They didn't reply.


------------------------------

From: "Lance J. Hoffman" <hoffman@seas.gwu.edu>
Date: 08 Jun 1995 01:28:52 -0400 (EDT)
Subject: New Book on Privacy and Encryption Policy

BUILDING IN BIG BROTHER: The Cryptographic Policy Debate

a collection of readings with commentary by Prof. Lance J. Hoffman
of The George Washington University

has now been published by Springer Verlag.

>From a publisher's blurb:

"...This book presents the best readings on cryptographic
policy and current cryptography trends.  ... Detailed technological
descriptions of promising new software schemes are included as well
as analysis of the constitutional issues by legal scholars.  Important
government cost analyses appear here for the first time in any book.
Other highlights include the text of the new US digital telephony law
and the pending encryption regulation bill and a list of hundreds of
cryptographic products available around the world.  There is even a
paper on how to commit the perfect crime electronically, using
public key encryption.

Much more detailed information and a table of contents is available
by pointing your Web browser to

http://www.seas.gwu.edu/seas/instctsp/docs/book
*******************

There you will also find endorsements by
   Marc Rotenberg, Electronic Privacy Information Center
  Stewart Baker, Steptoe & Johnson (former NSA general counsel)
  Phil Zimmermann, author of PGP
  Peter Neumann, moderator of RISKS Forum
  Michael Froomkin, law professor

560 pages, 19 illustrations, softcover $29.95
ISBN 0-387-94441-9

The book is available at Computer LIteracy bookstores and in at least
some Borders stores as well as Barnes and Noble.  One can also call
1-800-SPRINGER to order, email orders to orders@springer-ny.com

-- 
Professor Lance J. Hoffman
Dept of Elec Eng and Comp Sci, The Geo Washington U, 801 22nd St NW
Wash DC 20052   (202) 994-4955   Fax: (202) 994-0227  hoffman@seas.gwu.edu
See also:  http://www.seas.gwu.edu/seas/instctsp/ictsp.html               


------------------------------

From: Christian.Reiser@aut.alcatel.at (Christian Reiser)
Date: 08 Jun 95 09:23:25 +0200
Subject: Re: Credit Cards in Grocery Stores

    Bill McClatchie (wmcclatc@internext.com) wrote: I have seen
    something new added to my credit cards slips when purching goods at
    a couple of Washington DC area grocers.  They are adding the card
    holders name to the slips.  Wouldn't this make it easier for
    someone to pick up one of these slips (which many peole just toss
    in the trash) and use them?

You never seem to have used credit cards the old way, where the front
side of the card is mechanically printed on some forms, which you sign.
On these forms you can also find all data including name, cc-number and
expiration date.

Whenever you have all these data, which now also seem to appear on your
computer printed slips, you can order per phone. The only mean of
security is, that some companies only deliver to the cardholder's
address.

--
Christian Reiser              e-mail: Christian.Reiser@aut.alcatel.at
Ofc: +431 277 22 / 3657         priv: C.Reiser@ieee.org
Fax: +431 277 22 / 3955         http://www.egi.co.at/egi/reiser.htm
For PGP-Key (private purpose) send e-mail with Subject: Query PGP Key


------------------------------

From: "Prof. L. P. Levine" <levine@blatz.cs.uwm.edu>
Date: 07 Jun 1995 10:33:27 -0500 (CDT)
Subject: A Seduction In Cyberspace
Organization: University of Wisconsin-Milwaukee

Taken from Computer underground Digest Tue Jun 6, 1995 Volume 7 :
Issue 45 ISSN  1004-042X (Tue, Jun 6, 1995)

    Date: 03 Jun 95 04:03:33 EDT
    From: Walter Scott <74276.3616@compuserve.com>
    Subject: A Seduction In Cyberspace?

On May 18th, Daniel Montgomery left Seattle for an as yet unknown
location. His departure has caused, in its wake, a frenzy of media
coverage. And that magic word -- "INTERNET" -- is attached to this
story.

     Daniel Montgomery is 15 years-old and potentially gay. Until May
of this year, he was what Tahoma High School Assistant Principal Rob
Morrow would call a "nice young man." More than being a "nice young
man," Daniel Montgomery was a teenager exploring cyberspace via
America Online. Through a chat room on America Online, Daniel met
someone calling himself "Damien Starr." Eventually, Starr may have
enticed Daniel to leave his Maple Valley home.

      According to a published report in the 6-2-95 edition of the
Seattle Post Intelligencer, Starr's user profile on America Online
indicates Starr is 18 years-old, gay, and resides somewhere on Nob
Hill in San Fransisco. Starr and Daniel Montgomery apparently
communicated, for a period of time, on America Online and by way of a
password-protected 1-800 phone number. According to the Seattle Post
Intelligencer and Bill Montgomery -- Daniel's father -- Starr had
suggested that, if Daniel was discovering he is gay, and revealed such
to his parents, they probably would kick him out of his home. Bill
Montgomery believes this may have played a role in why Daniel
Montgomery left -- ostensibly because Daniel had not discussed his
sexual orientation with his parents, and Daniel's mother had stated
negative feelings about gays in the past. Thus, Bill Montgomery
asserts Daniel may have been particularly open to another suggestion --
that Daniel come join Starr.

       When Daniel left, he apparently did so after receiving a bus
ticket in the mail from Starr. Since then, Daniel has sent 2 E-Mail
messages to his father stating that he's doing OK while making more
money than his parents, according to reports from several broadcast
news organizations here in Seattle. Bill Montgomery doesn't KNOW if
this is true but states that, if what Daniel had claimed is true, at
least part of it is temporary. Soundbites aired on TV news (KOMO-TV
and KING-TV - 6-2-95) illustrate Bill Montgomery suspects his son is
being groomed for sex. According to the Seattle Post Intelligencer,
that assessment may, in part, be drawn from Daniel's sister. She lives
in Southern California and has informed Bill Montgomery of reports
she's seen on TV about groups that seduce young gay males by offering
protection from parents who might not be supportive of a homosexual
orientation in their children. The Seattle Post Intelligencer
summarizes Montgomery's description of the "group's" method of
operation as enticement to run away followed by provision of food and
money for a short time, and then culminating in requests for sexual
favors in return. The Seattle Post Intelligencer, and broadcast news
organizations in Seattle, are not, however, reporting confirmation of
this notion.

       Starr has contacted the Montgomery family four times, again,
according to the Seattle Post Intelligencer, to assure them Daniel is
not in any danger. As stated previously, Montgomery doesn't doubt this
for the time being. But, Montgomery also told the Seattle Post
Intelligencer that Starr is probably a recruiter who might have been
recruited into the "group" not so long ago.

       Bill Montgomery is not saying whether he will ask America
Online to provide Starr's real name and/or other information on Starr
retained by America Online. The Seattle Post Intelligencer, though,
reports that the FBI won't deny they are interested in asking America
Online to reveal information on Starr. And "sources" are stated by the
Seattle Post Intelligencer as indicating that the FBI continues to
investigate the case.

        There are several interesting factors in this turn of events.
Some of those factors can be appreciated more easily by people who
live in Washington state and in the Puget Sound in particular.

          1. Washington state's Legislature just finished a regular
             session and special session -- back-to-back. Those sessions
             provided high political drama -- even for the online
             community. Until late last month, we were faced with a
             "harmful to minors" bill addressing, among other things,
             availability of sexual material to minors via online
             services. The bill easily passed the Legislature but was
             vetoed by Governor Lowry. A veto-override attempt did not
             fall so short that people here -- who were and are opposed
             to the legislation -- can breathe a sigh of relief; the
             issue WILL come back another day -- possibly quite soon.

          2. The Legislature also passed legislation which would
             change Washington state's laws dealing with run-aways.
             This legislation was partially vetoed. The result is a
             firestorm of resentment among a significant number of
             parents. They feel as though long-awaited relief has been
             stolen by a Governor who doesn't appreciate parenting
             issues in this state. For example: Laws existing through
             this Spring required that a child at the age of 13 could
             legally run away from home. Parents were powerless to do
             anything about such behavior unless the child was acting
             under the coercion of others in very strict
             circumstances. The new law is only slightly more
             restrictive on whether minors can run away -- certainly NOT
             restrictive enough to make Daniel Montgomery's act of
             running away an illegal act. Such laws, as those existing
             prior to the most recent regular session of the Washington
             state Legislature, have been in place for several years
             to provide abused children with the means to escape parental
             abuse if running away would accomplish that goal.

          3. A local TV station (KIRO) recently ran a series of
             reports called "Net Sex." Those reports were
             sensationally promoted with language that implied
             children can and do access sexually explicit sections of
             the INTERNET -- something which might be a threat to
             children if unsuspecting parents aren't watching what
             their kids are doing online. The actual reports, however,
             were reasonably balanced. But, the reports left Seattle
             sensitized to the existence of sexually explicit materials
             on the INTERNET.

          4. We have the copious and invalid use of the word
             "INTERNET" in broadcast reporting of the Montgomery
             run-away. We also have a case in which a 15-year-old
             ran away to circumstances the father of that 15-year-old
             asserts are probably sexual in nature. All four of the
             factors listed here may eventually come together as a
             dangerous brew is or will be created.

     In the current social and political climate, the Montgomery
run-away; the Baker case; the incidents where children download
instructions on how to make pipe bombs and then construct them; an
incident where a young girl seduces an adult male into a sexual
encounter after online meetings; incidents where online pedophiles do
there thing, and so much more seem to draw us headlong toward events
we may regret some years from now. I wonder if there is no other way
to see what is out there to be seen.

      Politicians revel in such events as those referred to above. I
believe it is no strange coincidence that Senator Exon's legislation
(Communications Decency Act) moved into the fast lane of Congressional
action at around the same time as news broke on the Baker case. It is
not novel for politicians to orchestrate their policies and agendas
around politically favorable current events. I expect more instances
of perceived or actual online abuse, and for politicians to take
advantage in the ways only politicians can.

      Whether it's Washington state, New York state, Alabama or
Washington, DC, I'm finding it more and more difficult to believe
there is any room left to assume reason will necessarily prevail over
emotion built to a fever-pitch. I see emotion more places than I
don't, and rancorous emotion at that. I also see associated and
ever-growing polarization. It actually frightens me because I think I
know what all that HIGH emotion will promulgate.

               ===========   UPDATE  ==================

     On Sunday [6-4-95] Seattle area teenager Daniel Montgomery -- who
had run away from home in mid-May at the possible coaxing of an AOL
subscriber -- met with his parents at a San Francisco airport.
According to various Seattle news media reports, Montgomery told his
parents, at that time, he was doing ok and had not been harmed.
Subsequently, reports from local media have exhibited an amazing
cacophony of inaccurate or incomplete information. For example: Even
on the day that Daniel Montgomery met with his parents, the Seattle
Post Intelligencer reported that Montgomery had been seen by a Seattle
Metro bus driver. According the the Seattle Post Intelligencer,
Montgomery had told the bus driver he was on his way out of town, and
Montgomery had shown the bus driver what the bus driver thought to be
a bus ticket to Florida.

      Once it was clear that Montgomery had met with his parents in
San Francisco, local news media issued conflicting stories as to
whether Montgomery would stay with his parents or grandparents. More
than one news organization implied a strained relationship between
Montgomery and his parents

      In the past two days, some news media organizations have stated
AOL was under some pressure to reveal information on a subscriber
using the alias "Damien Starr." However, other news media
organizations were stating that AOL was resolute in its policy not to
reveal information about subscribers. Even so, today, [6-6-95] several
broadcast organizations (KING-TV, KIRO-TV, KIRO radio, and KOMO radio)
now report that AOL has terminated the person who used the Damien
Starr alias. KOMO radio broadcast the following in a news program this
morning.

                    America Online says it's complying with a subpoena
                    and giving investigators information about the
                    account of Damien Starr. That's the name used by a
                    man suspected of luring a teenaged boy to San Francisco.
                    The computer service has also terminated the man's
                    account. The boy's now back with his family in
                    Maple Valley. [Maple Valley is a small community
                    in the Seattle area]

     KING-TV takes us a step further with a report that Damien Starr
is under investigation by the FBI for a possible violation of the Man
Act. KIRO-TV states that AOL terminated Damien Starr because Starr
allegedly solicited a minor in violation of AOL's policies.

      It's rather difficult to know what is truth, what is perception,
and what is true at one moment and not in the next moment, hour, or day in
this case. What seems certain, though, is that events pertaining to
the running away and/or seduction of Daniel Montgomery are not
finished.


------------------------------

From: "Prof. L. P. Levine" <levine@blatz.cs.uwm.edu>
Date: 29 Dec 1994 10:50:22 -0600 (CST)
Subject: Info on CPD [unchanged since 12/29/94]
Organization: University of Wisconsin-Milwaukee

The Computer Privacy Digest is a forum for discussion on the effect of
technology on privacy or vice versa.  The digest is moderated and
gatewayed into the USENET newsgroup comp.society.privacy (Moderated).
Submissions should be sent to comp-privacy@uwm.edu and administrative
requests to comp-privacy-request@uwm.edu.  

This digest is a forum with information contributed via Internet
eMail.  Those who understand the technology also understand the ease of
forgery in this very free medium.  Statements, therefore, should be
taken with a grain of salt and it should be clear that the actual
contributor might not be the person whose email address is posted at
the top.  Any user who openly wishes to post anonymously should inform
the moderator at the beginning of the posting.  He will comply.

If you read this from the comp.society.privacy newsgroup and wish to
contribute a message, you should simply post your contribution.  As a
moderated newsgroup, attempts to post to the group are normally turned
into eMail to the submission address below.

On the other hand, if you read the digest eMailed to you, you generally
need only use the Reply feature of your mailer to contribute.  If you
do so, it is best to modify the "Subject:" line of your mailing.

Contributions to CPD should be submitted, with appropriate, substantive
SUBJECT: line, otherwise they may be ignored.  They must be relevant,
sound, in good taste, objective, cogent, coherent, concise, and
nonrepetitious.  Diversity is welcome, but not personal attacks.  Do
not include entire previous messages in responses to them.  Include
your name & legitimate Internet FROM: address, especially from
 .UUCP and .BITNET folks.  Anonymized mail is not accepted.  All
contributions considered as personal comments; usual disclaimers
apply.  All reuses of CPD material should respect stated copyright
notices, and should cite the sources explicitly; as a courtesy;
publications using CPD material should obtain permission from the
contributors.  

Contributions generally are acknowledged within 24 hours of
submission.  If selected, they are printed within two or three days.
The moderator reserves the right to delete extraneous quoted material.
He may change the SUBJECT: line of an article in order to make it
easier for the reader to follow a discussion.  He will not, however,
alter or edit or append to the text except for purely technical
reasons.

A library of back issues is available on ftp.cs.uwm.edu [129.89.9.18].
Login as "ftp" with password identifying yourid@yoursite.  The archives
are in the directory "pub/comp-privacy".

People with gopher capability can most easily access the library at
gopher.cs.uwm.edu.

Mosaic users will find it at gopher://gopher.cs.uwm.edu.

Older archives are also held at ftp.pica.army.mil [129.139.160.133].

 ---------------------------------+-----------------------------------------
Leonard P. Levine                 | Moderator of:     Computer Privacy Digest
Professor of Computer Science     |                  and comp.society.privacy
University of Wisconsin-Milwaukee | Post:                comp-privacy@uwm.edu
Box 784, Milwaukee WI 53201       | Information: comp-privacy-request@uwm.edu
                                  | Gopher:                 gopher.cs.uwm.edu 
levine@cs.uwm.edu                 | Mosaic:        gopher://gopher.cs.uwm.edu
 ---------------------------------+-----------------------------------------


------------------------------

End of Computer Privacy Digest V6 #052
******************************
.