Date:       Mon, 24 Jun 96 12:55:36 EST
Errors-To:  Comp-privacy Error Handler <owner-comp-privacy@uwm.edu>
From:       Computer Privacy Digest Moderator  <comp-privacy@uwm.edu>
To:         Comp-privacy@uwm.edu
Subject:    Computer Privacy Digest V8#050

Computer Privacy Digest Mon, 24 Jun 96              Volume 8 : Issue: 050

Today's Topics:			       Moderator: Leonard P. Levine

                         The Problem With Spam
                       Re: The Problem With Spam
              Re: Privacy while Downloading from Newsgroup
              Re: Privacy while Downloading from Newsgroup
              Re: Air Force Sergeant Jailed in e-Mail Case
                          Privacy in Politics
                   NorthStar: ABCs of PGP Encryption
                 Info on CPD [unchanged since 11/22/95]

----------------------------------------------------------------------

From: chris@kosh.punk.net (Christopher Ambler)
Date: 19 Jun 96 16:36:49 PDT
Subject: The Problem With Spam

[moderator: this was taken without permission from a board used to
interchange messages between newsgroup moderators.]

This has just happened to me, and I'm steaming mad.

I received a spam to one of our for-sale groups that are moderated.
After rejecting it and getting a bounce (fake email), I called the
number on the spam and requested a fax using a ficticious name, one
that I've never used for any reason (Peter).

After getting the fax, I called the firm and gave them a 'verbal
rejection' of the post, and explained (quickly) why spam is a bad
thing. Yes, dumb thing to do. Why?

I'm now getting MLM and other spam-like faxes from companies that have
received "written requests" from "Peter" at my fax number for this
junk.

Just thought I'd make y'all aware of this. Stupid of me to have called
this guy, but damnit if he hasn't gone a little too far. They're in
Canada, too, so there's not much I can see to do.

--
Christopher "Askes for Trouble Often" Ambler
Small-Time moderator of regional groups


------------------------------

From: edhew@xenitec.on.ca (Ed Hew)
Date: 20 Jun 1996 02:21:49 EDT
Subject: Re: The Problem With Spam

[moderator: this was taken without permission from a board used to
interchange messages between newsgroup moderators.]

    Christopher Ambler <chris@kosh.punk.net scribes: This has just
    happened to me, and I'm steaming mad.  [...] I'm now getting MLM
    and other spam-like faxes from companies that have received
    "written requests" from "Peter" at my fax number for this junk.
    [...]

People that spam intentionally will only stop when they're convinced
that *they* are doing *themselves* more harm than good.

I'm sure someone will find fault with my attitude, but in situations
like this I'd be very happy to call them up, obtain *their* fax number
and send them back a hundred fax rejections with full quote of their
spam for each one inflicted initially.  It wouldn't be too hard for me
to find a modem line I can plug a fax into for a little while, then
have it revert to a non-fax modem.  [No smiley.]

--
Ed Hew <edhew@xenitec.on.ca>
XeniTec Consulting Services, Kitchener ON, Canada


------------------------------

From: acar@vcn.bc.ca (Al Acar)
Date: 20 Jun 1996 04:39:27 GMT
Subject: Re: Privacy while Downloading from Newsgroup
Organization: Vancouver Regional FreeNet
References: <comp-privacy8.49.9@cs.uwm.edu>


    beardawg@usa.pipeline.com () wrote; Let me admit right upfront -
    I'm a newbie. That said - Who, other than my ISP, has access to
    what I may be downloading from the newsgroups?

I can think of 3 possibilities (And I'm sure there're more...)

1- People hacking into your ISP from outside,
2- People who use the same ISP as you do and have found
   a way to access other user's account info (internal
   hackers, if you will)
3- Anyone who can use a newsgroup search engine- this will
   show only those newsgroups you've been active in.  But if
   follows that if you've been active in those groups, you're
   probably downloading them as well.

--
acar@vcn.bc.ca  <*>  al.acar@hortus.bc.ca


------------------------------

From: Ken Johnson <ken.johnson@phdelmac.tapestry.com>
Date: 23 Jun 1996 22:04:24 -0500
Subject: Re: Privacy while Downloading from Newsgroup
Organization: Tapestry Computing, Inc.
References: <comp-privacy8.49.9@cs.uwm.edu>

    beardawg@usa.pipeline.com wrote: Let me admit right upfront - I'm a
    newbie. That said - Who, other than my ISP, has access to what I
    may be downloading from the newsgroups? I know about "cookies" on
    the web, but I haven't read anything about downloading privacy. If
    indeed it is not private, then is there anonymous download software
    available?  Any info is appreciated.

Assuming that you ISP is also providing your news feed, then they
should be the only ones able to know who/what newsgroups you are
viewing.  If you are using your employers internet connection, or have
other computers between you and your ISP, then those people could also
determine what groups you are reading.

-- 
Ken Johnson -  Technical Consultant
Tapestry Computing, Inc. http://www.tapestry.com


------------------------------

From: smlaskos@cs.millersv.edu (Steven M. Laskoske)
Date: 21 Jun 1996 20:16:47 GMT
Subject: Re: Air Force Sergeant Jailed in e-Mail Case
Organization: East Stroudsburg University, Pennsylvania
References: <comp-privacy8.46.7@cs.uwm.edu> <comp-privacy8.47.6@cs.uwm.edu> <comp-privacy8.48.1@cs.uwm.edu>

    William R. Ward (hermit@cats.UCSC.EDU) wrote: Yes, I think that's
    [using a private email account] a good idea.  However even in that
    case, their phone would likely be a military phone, their housing a
    military barracks, and they would likely be using other military
    owned facilities and subject to other military regulations, even
    off-duty.  So where do you draw the line?  The military is
    definitely a different case than just some programmer sending dirty
    email on his/her work account.

I agree with the one major comment, the person should have used a
private e-mail account.  Of course, the military does have some
leniency (and reason for concern) regarding e-mail transmissions.  They
need to be careful of espionage.  Still, if this is not an instance of
a clear breech of military security, and not a case where the person
was on duty and supposed to be doing something else, then I can't see
the problem the military should have with it.  (I know that bandwidth
costs $$$ but that is hardly the issue here.)  If the material inside
the e-mail is unlawful, that's one thing.  If it's just dirty...who
cares.  The military men know where to get dirty magazines, see the
strip joints, etc.  They are all over the age of consent.

In summary:  should the military be keeping an eye on e-mail that goes
in and out of base?  Sure.  Should it worry about e-mail of an
obviously non-military nature.  Definitely not.

*************************************************************************
Steven Laskoske          *  Shakespeare's cry when he can't click an icon:
smlaskos@cs.millersv.edu *  "Mouse of virtue answer me!"
Eternal Student          *  (Twelfth Night, Act I, Scene 5)
*************************************************************************


------------------------------

From: softwa19@us.net (Charles R. Smith)
Date: 23 Jun 1996 20:46:00 GMT
Subject: Privacy in Politics

Privacy is now an issue.  Recent events at the White House have placed
personal privacy as a major concern before Congress and the people.
The current resident of 1600 Pennsylvania Avenue has made his political
success by claiming to be the friend of the common people.  However,
his claims fall far short of his actions.  In 1993 President Clinton
supported the Clipper chip which was no more than a government mandated
bug to monitor every phone, fax, and computer.  President Clinton
submitted now deleted parts of the 1995 Anti-Terrorist Act which would
have allowed the FBI to conduct wiretaps under Pre-Watergate rules.  No
court order or warrant required.  It would have also allowed the
submission of evidence obtained by illegal means such as break-ins and
computer hacking.  President Clinton supports the current Clipper III
proposal which would require American citizens to turn over their
computer encryption keys to a government Escrow Agency.  President
Clinton has supported legislation which would have allowed FBI access
to medical information, breaking centuries of legal and ethical privacy
between Doctors and patients.

Ironically, the same Bill Clinton has also cited his personal privacy
over meetings attended by his paid lawyer and lawyers paid by U.S. tax
dollars.  President Clinton has used encryption to scramble his White
Water testimony for personal privacy reasons.  No escrow key was ever
given to the FBI.  President Clinton has cited personal privacy over
his medical history.  Yet, the President has consistantly maintained an
aggressive legislative and administrative effort to accumulate
information on ordinary citizens.  In fact, FBI records show that the
White House made over 22,000 written information requests in 1993 and
1994.  In summary, actions speak louder than words.  It is clear that
the President's actions have shown very little respect for the privacy
of any individual other than himself.

--
Charles R. Smith
SOFTWAR  Richmond, VA  http://ally.ios.com/~softwa19


------------------------------

From: mthompson@asu.edu (M Thompson)
Date: 20 Jun 1996 08:05:09 GMT
Subject: NorthStar: ABCs of PGP Encryption
Organization: Arizona State University

Internet Users Consortium - ALERT!  Sunday 6/16/96
http://iuc.org/

***********************************************************
*  Internet Users Consortium has moved its website!!!!!!  *
*  http://iuc.org/                                        *
***********************************************************

SUBSCRIPTION REQUESTS for NorthStar:
To: northstar@iuc.org
(See bottom of Alert)

ALERT!

Notice: Special Issue of NorthStar

Issue #20 of NorthStar [coming next Sunday, June 23] will be something
special. The issue will conclude our five-part series on Encryption and
Privacy on the Internet by featuring *PGP JUMP START*, which is
guaranteed to get you up to speed with PGP [Pretty Good Privacy],  the
encryption program which Phil Zimmermann has given free of charge to
the Net.community.

Most everyone has heard of PGP, but how many of us actually use it? One
of the reasons why the Clinton Administration's infamous Clipper Chip
initiatives have failed is that the opponents of Clipper could argue
that so many people use PGP already - that strong encryption has
already slipped from the grasp of the Govt. Spook community and is
currently in everyday use in the Net.community.

Truly, the more of us who use PGP, the stronger will be our chances to
resist Govt. imposed encryption. Do not dream that the Govt. Spooks
will suddenly give up on their plans. Do not think that the Clinton
Administration will suddenly stop listening to the paranoids at
FBI/CIA/NSA/the ones we havent even found out about yet! [Remember that
the Govt. denied the existence of NSA as long as they could!]

Many of us have looked into using PGP, only to be dissuaded by the
user-UNfriendly nature of PGP. The learning curve involved with PGP
resembles the mountains of the Himalaya, especially if one is at all
unsure about DOS and its arcane command line.

*PGP JUMP START* to the Rescue!! This step-by-step document will hold
your hand all the way up and over the steep PGP learning curve. *PGP
JUMP START* does assume that you have some basic familiarity with DOS,
Windows and Unzipping.

If you hate reading manuals -- here is the easy way to get started with
PGP (Pretty Good Privacy). *PGP JUMP START* gets you up and running
fast with PGP, so that you can exchange encrypted e-mail messages with
your friends.

So dont miss out on this opportunity to learn to use PGP. If you follow
the 13 Steps laid out in *PGP JUMP START*, you will surely be fluent
with PGP in less than one hour! See for yourself why this document has
been called, *A Triumph in Technical Writing*.

Watch for NorthStar issue #20 next Sunday June 23rd. If you know
someone who would want to learn PGP tell them about this opportunity.

New NorthStar subscription info follows:

NorthStar, the Newsletter of the Internet Users Consortium, has moved
its archive to http://iuc.org/northstar.html The larger facility will
enhance our ability to communicate with our readers, distributors and
IUC Members. Your invited to drop by the Internet Users Consortium's
new URL at http://iuc.org/ to give us your ideas on how better to
express all of our opinions. Share our space with your thoughts about
the future of the Internet in a new project we are developing.

NorthStar keeps you informed and on the lookout for the invasive
legislation the government enforces. If you want to stay informed about
this and other key Internet issues, subscribe to NorthStar. NorthStar
is the bi-weekly e-zine of the Internet Users Consortium that gives you
the story from the perspectives of those who feel the full brunt of
government abuse. Corporate media devalues us in its pro-government
portrayal of every news tidbit. What's left out is how current
legislation effects you and me - The Internet Users.

SUBSCRIPTION REQUESTS for NorthStar:  To: northstar@iuc.org Subject:
leave blank Body of message: subscribe NorthStar your email (format)
*NorthStar comes in 3 formats. Note which format you wish to recieve:
"html", "ascii" or "ns mail" (thats Netscape Mail for those who use it
regularly) ***Now available in Netscape 2.0 and up Mail format. We will
deliver it to you ready to be viewed as incoming mail. Just write "ns
mail" in the body.

--
NorthStar Archives can be found at:
http://iuc.org/northstar.html


------------------------------

From: "Prof. L. P. Levine" <levine@blatz.cs.uwm.edu>
Date: 21 Jun 1996 15:42:52 -0500 (CDT)
Subject: Info on CPD [unchanged since 11/22/95]
Organization: University of Wisconsin-Milwaukee

The Computer Privacy Digest is a forum for discussion on the effect of
technology on privacy or vice versa.  The digest is moderated and
gatewayed into the USENET newsgroup comp.society.privacy (Moderated).
Submissions should be sent to comp-privacy@uwm.edu and administrative
requests to comp-privacy-request@uwm.edu.

This digest is a forum with information contributed via Internet
eMail.  Those who understand the technology also understand the ease of
forgery in this very free medium.  Statements, therefore, should be
taken with a grain of salt and it should be clear that the actual
contributor might not be the person whose email address is posted at
the top.  Any user who openly wishes to post anonymously should inform
the moderator at the beginning of the posting.  He will comply.

If you read this from the comp.society.privacy newsgroup and wish to
contribute a message, you should simply post your contribution.  As a
moderated newsgroup, attempts to post to the group are normally turned
into eMail to the submission address below.

On the other hand, if you read the digest eMailed to you, you generally
need only use the Reply feature of your mailer to contribute.  If you
do so, it is best to modify the "Subject:" line of your mailing.

Contributions to CPD should be submitted, with appropriate, substantive
SUBJECT: line, otherwise they may be ignored.  They must be relevant,
sound, in good taste, objective, cogent, coherent, concise, and
nonrepetitious.  Diversity is welcome, but not personal attacks.  Do
not include entire previous messages in responses to them.  Include
your name & legitimate Internet FROM: address, especially from
 .UUCP and .BITNET folks.  Anonymized mail is not accepted.  All
contributions considered as personal comments; usual disclaimers
apply.  All reuses of CPD material should respect stated copyright
notices, and should cite the sources explicitly; as a courtesy;
publications using CPD material should obtain permission from the
contributors.  

Contributions generally are acknowledged within 24 hours of
submission.  If selected, they are printed within two or three days.
The moderator reserves the right to delete extraneous quoted material.
He may change the Subject: line of an article in order to make it
easier for the reader to follow a discussion.  He will not, however,
alter or edit the text except for purely technical reasons.

A library of back issues is available on ftp.cs.uwm.edu [129.89.9.18].
Login as "ftp" with password identifying yourid@yoursite.  The archives
are in the directory "pub/comp-privacy".

People with gopher capability can most easily access the library at
gopher.cs.uwm.edu.

Web browsers will find it at gopher://gopher.cs.uwm.edu.

 ---------------------------------+-----------------------------------------
Leonard P. Levine                 | Moderator of:     Computer Privacy Digest
Professor of Computer Science     |                  and comp.society.privacy
University of Wisconsin-Milwaukee | Post:                comp-privacy@uwm.edu
Box 784, Milwaukee WI 53201       | Information: comp-privacy-request@uwm.edu
                                  | Gopher:                 gopher.cs.uwm.edu 
levine@cs.uwm.edu                 | Web:           gopher://gopher.cs.uwm.edu
 ---------------------------------+-----------------------------------------


------------------------------

End of Computer Privacy Digest V8 #050
******************************
.