F I D O  N E W S --                   Vol.10  No.15    (12-Apr-1993)
+----------------------------+-----------------------------------------+
|  A newsletter of the       |                                         |
|  FidoNet BBS community     |         Published by:                   |
|          _                 |                                         |
|         /  \               |      "FidoNews" BBS                     |
|        /|oo \              |       +1-519-570-4176     1:1/23        |
|       (_|  /_)             |                                         |
|        _`@/_ \    _        |       Editors:                          |
|       |     | \   \\       |         Sylvia Maxwell    1:221/194     |
|       | (*) |  \   ))      |         Donald Tees       1:221/192     |
|       |__U__| /  \//       |         Tim Pozar         1:125/555     |
|        _//|| _\   /        |                                         |
|       (_/(_|(____/         |                                         |
|             (jm)           |      Newspapers should have no friends. |
|                            |                     -- JOSEPH PULITZER  |
+----------------------------+-----------------------------------------+
|               Submission address: editors 1:1/23                     |
+----------------------------------------------------------------------+
|  Internet addresses:                                                 |
|                                                                      |
|    Sylvia -- max@exlibris.tdkcs.waterloo.on.ca                       |
|    Donald -- donald@exlibris.tdkcs.waterloo.on.ca                    |
|    Tim    -- pozar@kumr.lns.com                                      |
|    Both Don & Sylvia    (submission address)                         |
|              editor@exlibris.tdkcs.waterloo.on.ca                    |
+----------------------------------------------------------------------+
|       For  information,   copyrights,   article   submissions,       |
|       obtaining copies and other boring but important details,       |
|       please refer to the end of this file.                          |
+----------------------------------------------------------------------+
========================================================================
                          Table of Contents
========================================================================

1.  Editorial.....................................................  2
2.  Articles......................................................  2
      The Cynic's Sandbox, v2.1BetaTestDoNotDistribute............  2
      The SIP_SURVIVOR Echo.......................................  3
      LuxCon/EuroCon '93 announcement.............................  4
      Ethical approaches to Postmastering"........................  8
      Alert!...................................................... 19
      Caller ID Still Isn't Reliable.............................. 19
      New VW echo starting!!!..................................... 21
      School Music Echo........................................... 22
      FREQ PRIME.ZIP from 1:18/98, 1:18/99, or 6:700/26 for networ 22
3.  Fidonews Information.......................................... 23
FidoNews 10-15                 Page:  2                    12 Apr 1993


========================================================================
                              Editorial
========================================================================
  There is not much of an editorial this week; we have been busy
enjoying ourselves <S>.  My son and his other have been sleeping
on the living room floor en route from Vancouver to Moncton by
thumb [maybe 6,000 km].  We have spent lots of hours talking
about the road, and I don't think it has changed much since the
sixties.

   We have an extremely interesting article on mail privacy
reprinted by permission of the author.  It is a bit longish,
but fascinating reading.

   Thank goodness the policy articles seem to have burned
themselves out, 'though caller id lingers on with nothing much
new being said.  I would like to read an article that said "I
have caller id because I am a paranoid control freak ... "  then
another that said "I want to ban it because my users are
paranoid, and I want them to be comfortable ...".

    Anyway, on to the snooze .......................cacti!.

========================================================================
                               Articles
========================================================================
The Cynic's Sandbox, v2.1BetaTestDoNotDistribute
R. Cynic

Was it March showers bring April flamewars, or the other way around?

Caller*ID: For the man who has nothing to hide.

Ol' Bill "Baldy" Shatner had it right... Get a life!  Ever since
this nifty Caller*ID debate came up, people have gotten *SO*
serious.  All this talking about MY system and MY privacy and
MY right to know... Tch, tch.

We're getting Caller*ID soon where I live.  It should be kinda
funny.  I can't wait to be called a fake user 'cause I log on
from a friend's house to get something for him.  Ahhh... To be
dumped from a BBS after seeing a polite banner like...

HACKER! HACKER! HACKER! HACKER! HACKER! HACKER! HACKER! HACKER!

You though you could fool ME, didn't you?  You stupid hacker.
I hope you burn.  I have your phone number, now, and I'll be
calling the police 'cause I got the right to protect MY
computer.  Kiss off and die.

HACKER! HACKER! HACKER! HACKER! HACKER! HACKER! HACKER! HACKER!

...Or, in reverse, to get a message from a user...

FidoNews 10-15                 Page:  3                    12 Apr 1993

From:  MAD DEATH 666
To  :  Sysop
Subj:  CALLR ID

DEAR SYSOOP, I HOP THAT U R NOT U-ZING CALLR ID.  I THINK THAT
IT A VIOLASION OF MI PRIVASY.  DO U HAVE ANY WAREZ?

ALSO, CAN I GET ACESS TO ADULT SEXSHUN?

Of course, Caller*ID does show hope.  It's obvious that
computer types are getting serious about security.  I think
that the alternate validation methods sure to come into play
will help a lot.  I hear that Hayes is introducing a DNA
scanner that plugs right into any Optima modem and allows, for
the first time, TOTAL SYSTEM SECURITY.  I'll be looking forward
to that, but I'll probably buy the announced system from US
Robotics which plugs into any dual standard except a Sportster
and operates at twice the speed.  Pity they'll be incompatible.
Rockwell is working on a DNA chipset, which will allow low-end
modem vendors to integrate modem, fax, DNA scanning, and
manicure capabilities onto one low-cost board.  Should be fun.
It's good to see some security-minded people out there nowadays.

Next week:  The policy development kit.  Makes FidoNet policy
documents and is still sharp enough to slice through an
aluminum can!

Did I mention, "Fits easily in ANY tacklebox?"

----------------------------------------------------------------------

The SIP_SURVIVOR Echo

Rainbow Warrior
1:130/911.911

                       The SIP_SURVIVOR Echo

WaZOO ... another echo. Big deal. What interest could yet
another echo hold for me?

In this case, plenty.

SIP_SURVIVOR is an echomail forum dedicated to the discussion of
the issues of survivors of incest and other forms of sexual
abuse, and how to recover from the effects of that abuse using
the Twelve Step model originally outlined in the book
"Alcoholics Anonymous" by Bill W., Dr. Bob, and others.

Most people think of Twelve Step programs in terms of
addictions: alcohol, (Alcoholics Anonymous), other drugs
(Narcotics Anonymous, Cocaine Anonymous, Overeaters Anonymous
[food can be a drug]), and the like. But they don't realize
that the Steps can be applied to recovery from sexual abuse.
And in SIP_SURVIVOR, we discuss how.
FidoNews 10-15                 Page:  4                    12 Apr 1993


SIP_SURVIVOR is an "open meeting." Anyone who wishes to learn
how the Steps can be used to overcome the effects of incest or
sexual abuse is welcome to participate, even if they are not
themselves a survivor.

Moderator-generated disucssion generally focuses on three
programs: Survivors of Incest Anonymous (SIA), Incest Survivors
Anonymous (ISA), and Incest Victims Anonymous (IVA). If there
are any others, please send netmail and the moderator will be
happy to include 'em.

In compliance with the Sixth Tradition, SIP_SURVIVOR is not
approved by SIA, ISA, IVA, AA, or any other Twelve Step program.
No affiliation or endorsement with any Twelve Step program is
implied or should be inferred.

In compliance with the Eleventh Tradition, handles are
encouraged. You need never use your real name in SIP_SURVIVOR.

Feeds are currently private; we're seeking backbone
distribution. (Send netmail to your REC asking him to support
SIP_SURVIVOR!) If you'd like a feed, contact Barb Murphy at
1:130/911. EVERYONE is welcome to participate. Friends of Bill
will receive a special welcome.

Keep comin' back ...

The Warrior
1:130/911.911

----------------------------------------------------------------------

LuxCon/EuroCon '93 announcement

LUXEMBOURG --- APRIL 5, 1993

We would hereby like to announce LuxCon/EuroCon '93 which will take
place in Remich (just on the German border), Luxembourg between
Friday the 2nd of July and Sunday the 4th of July 1993.

ORGANIZERS

  Daniel Gulluni, 2:270/16@fidonet
  Joaquim Homrighausen, 2:270/17@fidonet (2:2/1993@fidonet)
  Andrew Milner, 2:270/18@fidonet
  Josy Minnemeister, 2:270/21@fidonet
  Francois Thunus, 2:270/25@fidonet

PLACE OF THE CONFERENCE

The four-star Hotel, HOTEL SAINT NICOLAS, situated on the Mosel
with a splendid view of the river and the many vineyards
surrounding it. SAINT NICOLAS is a Best Western Hotel with every-
thing that is to be expected of a four-star Hotel.
FidoNews 10-15                 Page:  5                    12 Apr 1993


LANGUAGE

English.

PRELIMINARY PROGRAM

   Friday 2/7/93
  ---------------
     1700-2000           Arrival and registration
     2000-2200           Friday night welcoming dinner

  Saturday 3/7/93
  ---------------
     0800-1000           Breakfast
     1000-1230           Product presentations and other sessions.
                         We intend to run political and technical
                         tracks comprising 30 to 60 minute
                         sessions.
     1230-1400           Lunch
     1400-1800           More political and technical sessions.
     2000-2200           Saturday evening dinner and raffle
                         ("lottery").

   Sunday 4/7/93
  ---------------
     0800-1000           Breakfast
     1000-1200           Checkout from the Hotel
     1200-1400           The annual harddisk throwing contest

SPEAKERS AND SPONSORS

> We are currently looking for speakers (political and technical)
> for the sessions and companies to sponsor the prices given away
> during the Saturday evening raffle ("lottery") and the harddisk
> throwing contest.

PROGRAM FOR ACCOMPANYING PERSONS

Several activities are available to those who do not wish to take
part in the sessions. These include a boat ride on the Mosel river,
wine tasting along the Mosel, or simply lying out in the sun
providing the weather is nice :-)

TRAVEL DIRECTIONS

> To be announced as we go along.. watch this space.

  Plane
  Train
  Car

PARTICIPATION FEE

The participation fee is LUF 5500.-, wich covers the sessions,
FidoNews 10-15                 Page:  6                    12 Apr 1993

conference literature, all meals from Friday evening to Sunday
morning (inclusive), an official LuxCon/EuroCon '93 t-shirt,
two nights in a double room (double occupancy) at the Hotel.

Payment can be made by transferring money to the bank or CCP
(postal giro) account listed below. Please make sure that you
transfer the correct amount (if your bank does not know what LUF
is, tell them to transfer BEF, which is Belgian Francs). You are
responsible for covering all transfer charges. Include your
name, voice telephone number, and FidoNet network address.
Transfers with an insufficient amount or information will not be
honored as a valid registration.

The rooms will be given on a first come, first serve basis (this
is decided upon the arrival of the money transfer should it come
to that). If there are no more rooms available, we will attempt
to find a room in a Hotel nearby, but cannot guarantee this (in
which case your money will, of course, be refunded).

For those who wish to take the economy alternative, there is a
camping ground in Remich (you must still register for the
conference as indicated on the registration form below). The
name of the responsible company is CAMPING EUROPE, telephone
+352 698 018.

REGISTRATION

Print and fill out the registration form and mail it to the below
address BEFORE the 1st of June 1993 (or include it in a NetMail
message to Joaquim Homrighausen on 2:270/17@fidonet). Payment will
be expected to arrive shortly after the registration form has been
received.

  Joaquim Homrighausen
  389, route d'Arlon
  L-8011 Strassen
  Luxembourg

Late registration, between June 1st and July 1st 1993, is possible
but carries an additional late-registration fee of LUF 750.- as
indicated below.

PAYMENT

  CCP (postal giro)
  -----------------
             Cheque Postaux
             L-1090 Luxembourg

  Account #: CCP 108637-94
             Joaquim Homrighausen

  Bank
  ----
             Banque Generale du Luxembourg
FidoNews 10-15                 Page:  7                    12 Apr 1993

             L-2951 Luxembourg
             SWIFT bgll lu ll
             Telex 3401 bgl lu

  Account #: BGL 30-511818-80-010
             Joaquim Homrighausen

REGISTRATION FORM ---- cut here ---- cut here ---- cut here ----

        Full name: ______________________________________________

   Postal address: __________________________________________

                   __________________________________________

                   __________________________________________

    Voice phone #: ___________________________

      Nationality: ___________________________

    eMail address: ___________________________

     Accompanying: ______________________________________________

                   ______________________________________________

   OPTIONS (check all that apply)                      COST (LUF)
   +---------+--------------------------------------------------+
   :         :                                                  :
   :   YES   :   Complete conference package        +    5500.- :
   :         :                                                  :
   +---------+--------------------------------------------------+
   :         :                                                  :
   :   ___   :   Sharing the room between 3 people  -     500.- :
   :         :                                                  :
   +---------+--------------------------------------------------+
   :         :                                                  :
   :   ___   :   Single occupancy of room           +    1000.- :
   :         :                                                  :
   +---------+--------------------------------------------------+
   :         :                                                  :
   :   ___   :   Conference but no meals or Hotel   -    3500.- :
   :         :   (includes Saturday lunch)                      :
   :         :                                                  :
   +---------+--------------------------------------------------+
   :         :                                                  :
   :   ___   :   Late registration                  +     750.- :
   :         :   (1/06/93 - 1/07/93)                            :
   :         :                                                  :
   +---------+--------------------------------------------------+
   :         :                                                  :
   :  TOTAL  :   LUF                                         .- :
   :         :                                                  :
   +---------+--------------------------------------------------+
FidoNews 10-15                 Page:  8                    12 Apr 1993


REGISTRATION FORM ---- cut here ---- cut here ---- cut here ----

This file is also file requestable as LUXCON from 2:270/17@fidonet
and 2:270/18@fidonet.

// end of "luxcon.ann"

----------------------------------------------------------------------

Ethical approaches to Postmastering"
Copyright 1990 Pat McGregor all rights reserved.
"Averting One's Eyes -- Ethical approaches to Postmastering"

Author Profile
        Pat McGregor
        Computing Systems Consultant II
        Network Systems Division of Information Technology Division
        5115 IST Bldg.
        2200 Bonisteel Blvd.
        Ann Arbor, MI 48109-2099
        (313) 764-9430
        Pat_McGregor@um.cc.umich.edu (Internet)
        UserW02V@umichum (BITNET)

Institutional Profile:
        Name: The University of Michigan
        Location: Ann Arbor, MI
        Size:
                Students:               36,338 (Fall, 1989 enrollment)
                Faculty:                  2,882.33 FTE
                Staff:                  17,573.28 FTE

 The Information Technology Division supports over 50,000 users. We
 have no way to know how many academics, administrators, and library
 users we support, because we have no way to monitor usage at our
 over 2000 public workstations. In addition, all the offices on
 campus (staff, faculty, and graduate student) and every dorm room
 and family housing unit have data ports, of which approximately 60%
 are turned on.

 ITD Network Systems employs 198 people, both full and part-time.

 Abstract

 Being an electronic postmaster requires diligence, knowledge of
 mailing systems on many mail networks and host operating systems,
 and the ability to sit in front of a workstation, trying to
 decipher bounced mail headers, for long hours every week.

 It also requires that the postmasters be scrupulously ethical about
 the confidentiality of the mail that passes in front of them,
 despite the fact that sometimes in order to clear up a mail problem
 the text of the message comes up on the screen.

FidoNews 10-15                 Page:  9                    12 Apr 1993

 This paper explores some strategies used by campus postmasters on
 several campuses, and discusses some relevant issues of security,
 ethics, and responsible behavior.

 TEXT

 When the best way to send information to a colleague was to type it
 up, stick it in an envelope and entrust it to a postal carrier, few
 people had worries that the contents of that envelope would be seen
 by anyone but the intended recipient. "Tampering with the mails"
 was a federal offense, and the FBI would come after an offender
 with sirens screaming.

 Now, when electronic messages containing secret research results,
 resumes, corporate business plans, and love letters are flying
 around the world, some users have valid concerns about the
 confidentiality of their messages. Are they really "confidential"?
 Can anything that passes over a phone line be considered secure?
 What happens if there is a machine problem, or an incorrect
 address, or any of a dozen known mail disasters? Who sees the mail?

 As postmasters at the University of Michigan, my colleagues and I
 see more than a hundred bounced messages a week. We have no
 technological mechanism to keep us from reading the text of these
 messages; only our personal ethical systems and a code of
 responsibility for postmasters at our site keeps us from reading
 the text of users' messages. The question of confidentiality, and
 what responsibility postmasters have to keep the contents of mail
 confidential, is one that arises in conversation between
 postmasters, and in inquiries from users, on a regular basis.

 I decided to poll a group of postmasters to see how they felt about
 the issue, what guidelines they used, and what responsibility they
 felt toward the users' text.

 Methodology

 Subjects: Sixty-nine people at academic, public, private, and
 commercial sites responded to a survey sent to 136 postmasters. I
 sent the survey to a list of postmasteres the University of
 Michigan postmasters have dealt with in the last year or two, or
 who were on a list of postmasters in Michigan. I recognize that
 this is by no means a majority of the available postmasters around
 the world, but I knew from dealing with most of them on and off
 through the past years that they were responsive to mail from other
 postmasters and from users. (This in itself may be anomalous, but I
 choose to hope not!) I hoped this meant I would get a large return
 of my surveys, and I am quite pleased with my 51% return.

 Distribution: The survey instrument was distributed and returned by
 electronic mail. In one or two instances respondents had questions
 about the survey, and these clarification conversations were also
 held electronically.

 Statistical method: We(1) analyzed the responses to the survey
FidoNews 10-15                 Page: 10                    12 Apr 1993

 statistically with the goal of identifying and describing various
 groups and perspectives among the postmasters who responded. The
 survey combined closed-ended and open-ended questions; the former
 were coded for data entry directly from the survey. I grouped the
 open-ended responses to each question into a smaller number of
 categories; these categories were then coded as a series of
 dichotomous variables. This procedure facilitated later analysis by
 accepting any number of responses to a question from each
 postmaster who responded. After the data were entered, SPSSx
 (Statistical Package for the Social Sciences) was used to generate
 frequency and crosstab distributions. SPSSx also includes a
 multiple response procedure to facilitate tabulation of responses
 when each respondent could make any number of responses. From the
 (voluminous) output of these procedures, I could ascertain which
 attitudes and behaviors were congruent with a self-description of
 "confidential" and which were considered a central focus of
 confidentiality less often; these findings are presented in more
 detail below.

 Who responded to this survey?

 The average postmaster who responded is twenty-nine, has worked as
 a postmaster for two years, and supports 1500 users. He (only four
 of my respondents were female) works on a VMS or Unix machine
 that's devoted primarily to academic work, and has a bachelor's
 degree.

 Postmasters from all sorts of systems responded, including several
 from foreign countries: Canada, Ireland, Australia, and Japan. They
 ranged in age from twenty-one to fifty-three, and used eighteen
 different kinds of machines and operating systems. Only one
 respondent had been dealing with electronic mail for over ten
 years, while the majority had been in their jobs less than three
 years. Eighty percent had at least a college degree, but sixteen
 percent had only a high-school education and further on-the-job
 training.

 Some served as few as ten users, while the highest number of users
 was fifty thousand. The systems represented were overwhelmingly
 academic: fifty-three academic systems, four commercial, two public
 access systems, and four which were research or private use only.

 Defining confidentiality

 Overwhelmingly, when asked if they had a responsibility to keep
 users' mail confidential, the postmasters said "Yes". 94% of those
 who responded considered this a prime responsibility. (The other
 six percent, who were all on public or commercial systems,
 indicated that their users were not supposed to be using the mails
 for private or confidential mail, and therefore the postmasters
 felt no responsibility to keep the mails confidential.) Some
 postmasters felt this was a professional responsibility. Said one,
 "Unprofessionalism is the only reason for not respecting user
 privacy." Others cited the Electronic Communications Privacy Act of
 1986, which requires that system owners keep confidential, under
FidoNews 10-15                 Page: 11                    12 Apr 1993

 penalty of law, the mail messages of users on that system. Some
 felt that responsibility for confidentiality went beyond the
 message text, and extended to traffic analysis as well. To quote
 one postmaster:

 Often traffic analysis is as revealing as actual message contents.
 One example of this from my own experience came from an affair
 between a faculty member and a secretary (both are married, not to
 each other). I was perusing the mail logs and noticed a lot of
 traffic between these two, and I thought it was a little unusual
 since these two would not normally have any job-related reasons for
 such extensive communication. About six months later the affair
 became common knowledge, and at that point I realized I was
 probably the first person to know about their affair.

 I have a medical background, and keeping such matters confidential
 is second nature to me. Other postmasters without such a background
 would do well to examine the medical profession for some lessons on
 how to handle confidential material that strays into their path.

 To look or not to look -- that is the question

 When I began this survey, I was working on the assumption that most
 postmasters work as my colleagues and I do: that the text (2) of
 the message was not to be read under any circumstances, and that
 should we happen to see the text, we forget it immediately and do
 not use any information we might gain from the text of the message.

 I quickly discovered that we are in the minority.

 Most of the postmasters who said mail was confidential also said
 there were legitimate reasons to look at the text of messages (48
 out of 69, or 78%). By far the most common reason cited was to help
 re-direct the message. 53% of the respondents said that they would
 read the users' message for clues to help send the message back to
 the original sender or on to the intended recipient.(3) Another
 common reason was to scan the messages for improper or
 inappropriate use of the mails -- 29% look for harassing messages,
 illegal transactions, attempts to break into the system, etc.
 (Interestingly enough, most of the postmasters who said that they
 regularly scan the mails say that they use something like an editor
 scan to do this, rather than reading the contents of all the mail
 messages themselves. Ten respondents, however, stated categorically
 that scanning the mail for any reason was improper.)

 Postmasters in this study leave some of the responsibility on the
 users, too. "Accidents happen", commented ten in their responses.
 One respondent put it succinctly:

 Electronic mail is not a secure medium. It's the senders'
 responsibility to ensure the privacy of their messages. If they're
 not sure of the address they're sending to, they shouldn't put
 anything confidential in the text. Anything they don't want seen,
 and read, should be encrypted.(4)

FidoNews 10-15                 Page: 12                    12 Apr 1993

 When reading through the postmasters' comments, it was clear that
 most of them strongly believe that they act in a manner consistent
 with their ethical systems, and that they have given a lot of
 thought to confidentiality in mail systems. Confidentiality, it
 seems, consists in not looking unless you have to, and if you have
 to, treating what you see with respect. Or, as one of our foreign
 postmasters said, "... a postmaster is in the same position as a
 doctor -- peeking at personal e-mail is rather akin to viewing
 inside somebody's underpants -- there MAY be sound reasons for
 examining the contents but going out of one's way to do so is a bit
 kinky :-)"(5)

 Moral Dilemmas

 Sometimes what a postmaster sees creates ethical problems. If a
 postmaster sees a message in which personal or secret information
 is revealed, a postmaster may keep the information confidential but
 be troubled by it. Some find themselves in possession of
 information which indicates that an illegal transaction or
 inappropriate use of the system is going on. Most (65%) of the
 postmasters said that if they found information indicating a system
 abuse, they would immediately act on it. Their highest
 responsibility is to protect the system, and they take that
 responsibility very seriously.

 Personal information, like the affair that was mentioned above, is
 a different matter. Some of the postmasters indicated in their
 commentary that they tried to forget such information. Some created
 technological barriers for themselves to prevent the viewing of
 such information. Most hoped that they never had to make a decision
 about dealing with personal information that came into their
 possession.(6)

 Another dilemma for postmasters comes when they have permission to
 read the contents of users' mailboxes by virtue of their position.
 Fifty-three of our postmasters (77%) have privileged access. (It
 was in asking this question that we discovered how many hats most
 postmasters wear. Twenty-nine of them mentioned that they are also
 system administrators, and have unlimited access to any system file
 by virtue of that position. The others have unlimited access merely
 to accomplish their postmaster responsibilities.) However, in
 comparing the folks who believed there were good reasons to look in
 users' mailboxes against those who had access, only eight
 postmasters (less than half of those who believe in regularly
 scanning mail) believed this access should be regularly used.

 Technical fixes

 Technical fixes were also not common for general prevention against
 seeing text. Less than one-quarter of the respondents considered
 themselves to have a technological barrier to seeing the users'
 text. Only 25% of those who had a technical fix had a hard fix
 (that is, one which they had to exert special privileges or change
 code in order to see the message text): 19% used a filter which
 kept the text out of reach, and 6% encrypted the message text,
FidoNews 10-15                 Page: 13                    12 Apr 1993

 leaving only the headers in the clear.

 The others who considered themselves to have a technological fix
 were split half and half on a honor system where they only looked
 at bounced messages which couldn't get back to the sender or on to
 the recipient(7), or only read spool or file headers.

 "I close my eyes"

 By far the largest number of postmasters did not feel they had a
 technological barrier to seeing mail. Of those folks (80% of the
 total respondents), the three most common methods mentioned(8) as
 ways they avoided looking at text were to look away (45%), adjust
 the windowing on their screens to exclude the text (or attention
 out before the text scrolled by) (17%), or to ask the user's
 permission if it was impossible to fix the problem without reading
 the text (9%). (Interestingly enough, of those folks who said they
 wanted the user's permission before they went poking around in a
 mailbox, only two would use that permission even if they had it.)

 It was in asking about methods postmasters used to keep themselves
 from seeing users' text that the strongest statements about
 confidentiality and ethical behavior came out. As one of postmaster
 said, when asked the method he used:

 Self-restraint. The same thing that keeps me from performing most
 other unethical acts. Given my level of technical expertise, I do
 not regard "security systems" as any sort of deterrent.

 It's worth noting here that a large percentage (68%) of the
 respondents mentioned that they were simply too swamped with work
 to bother reading other people's mail, even if they were inclined
 to do so.

 Harassment, obscenity, and other inappropriate mail

 Unfortunately, as the telephone companies have discovered, some
 people want to use this marvelous new medium as a playground, or as
 a method of inflicting pain on another person. Electronic mail is a
 perfect opportunity to send harassing, obscene, or otherwise
 inappropriate messages to another person.

 While postmasters generally have given a lot of thought to their
 philosophies concerning what to do about user text, they are less
 certain about incidences of inappropriate mail. Seventeen of our
 postmasters (25% of the total) believe that there has never been
 such an incident at their site. (I confess, I'm inclined to believe
 that they simply don't know about it. In our experience, users will
 wait a long time without reporting harassment or obscene mail
 unless it's widely known that they have a resource for this
 situation. When we began advertising that there was a special
 office for handling these problems, reporting went up.)

 Some of them don't handle cases of inappropriate mail (29%). Of
 those who don't handle it themselves, four pass cases along to
FidoNews 10-15                 Page: 14                    12 Apr 1993

 campus security or the local police, and twenty-two let some other
 administrator handle it.

 A clear division of philosophy showed in deciding what to do about
 abusive or inappropriate mail when it happened. When asked whether
 they would wait for complaints or pursue a situation if they
 stumbled across one, 59% said they would wait for complaints, 23%
 said they would pursue it, and 10% said they would have to make a
 case-by-case determination.

 By and large, the largest group were those who would wait for
 complaints. "One person's harassment is another's amusement" was a
 frequently expressed sentiment (41%). However, there were some
 cases where postmasters felt obliged to step in, as in this
 comment:

 Material of a libelous nature, for example, is permissible in a
 private communication... Certain material is not permissible ....
 Child pornography is a good example of this. The Supreme Court just
 ruled that private possession of such material is illegal (as
 opposed to distributing it, which has been illegal for quite some
 time). Although I have never encountered such material, if I
 happened to find some in the course of my duties as postmaster I
 would have to contact the person responsible and ask them to remove
 it from the system. Failure to do so would make me (and the
 institution I work for) liable in any subsequent prosecution of the
 people involved.

 Other reasons for pursuing a problem that dropped into one's lap
 were system abuses (such as chain letters, attempts to break into
 the system or propagate virii or worms) or mail that came from
 another system. Off-site mail would, generally, be referred back to
 a postmaster at the originating site.

 "Mail is mail"

 Mailing lists(9) and newsgroups constitute a large part of the
 traffic on the network. Except for the case of usenet news, which
 is read with a special program, mailing lists are indistinguishable
 from most other mail messages.

 Because of mailing lists' public nature, I wondered how postmasters
 at other site regarded mailing list messages in terms of
 confidentiality.

 When asked if they considered mailing list mail in the same class
 as "regular" electronic mail, 42% said no. Of those folks who gave
 reasons for this answer, sixteen said that mailing list messages
 were intended for public distribution and thus not intended to be
 confidential or private. Twelve folks compared public mailing lists
 to junk mail or newspapers.

 The 56% who said "yes" indicated that they considered mailing lists
 like any other mail in terms of a need for confidentiality and
 respect for users' privacy. Sixteen felt this way because some
FidoNews 10-15                 Page: 15                    12 Apr 1993

 lists have restricted access and fourteen commented on the
 politically or personally sensitive contents of some mailing list
 discussions. Eleven postmasters felt that the identities of people
 who subscribed to mailing lists should be kept confidential,
 because of the personality or interest profile that could be
 inferred from a complete compilation of the sorts of lists a user
 subscribed to. Postmasters were sensitive to this:

 Although ostensibly anyone can get access to the same info by
 joining the list, membership itself on some lists may be considered
 sensitive. For instance, there is a gay-oriented list which one of
 my faculty members subscribed to, and the messages all began
 bouncing to the postmaster when he incorrectly set a forwarding
 address. This person may or may not care who knows about his
 subscription, but I can see where he might consider it sensitive
 information.

 Written ethics guidelines As networking constitutes a greater part
 of our lives, more and more personal information is loose on the
 nets. Codes of postmaster behavior, once handed down from guru to
 guru, may now need to be more formalized. Access to personal
 material is more prevalent, and mail is particularly susceptible to
 invisible monitoring.

 As one postmaster said: No byte of information in any computer
 system is immune to the knowledgeable systems programmer. The point
 here is that you can tell if your letter from Grandma has been
 opened, but you cannot tell if your electronic mail message has.
 This makes snooping easier and more prevalent by default. 83% of
 the respondents said they didn't have a written code of ethics for
 postmasters. Reasons given for why there was no policy varied
 across the board: 23% felt they didn't need such a thing, either
 because they wouldn't hire someone as a postmaster/system employee
 who wouldn't behave ethically or because postmaster ethics were
 common knowledge. 6% had orientation sessions in which postmaster
 ethics were discussed. 4% felt written policies of any sort were A
 Bad Idea. However, 15% of the total respondents wished there was a
 written policy, to help orient and train new postmasters or to
 cover gray areas. One quarter of those who had written policies
 felt that their general systems or employee policies covered
 postmasters as well as users. Two postmasters (both from religious
 private schools) indicated that Christian ethics covered the
 situation, and that they relied upon the Bible as a written policy
 for all occasions.

 Several postmasters commented that since the passage of the ECPA
 (10) in 1986, their sites have modified their systems use policies
 to include specifically use and misuse of mail.

 Major exceptions

 It's worth noting that commercial systems and public access systems
 had substantially differing views of user privacy with respect to
 mail than did academic systems. Of those who responded, nearly 10%
 were commercial or public access. The public access hosts were
FidoNews 10-15                 Page: 16                    12 Apr 1993

 extremely sensitive to their liability should illicit activities
 take place on their hosts. One public access "sysop" explained his
 approach to confidentiality this way:

 The mail on [this system] is specifically disclaimed from ECPA
 privacy in light of the fact that I operate a BBS on the machine
 and have no wish to have the authorities come seize the machine if
 some user does something illegal. Even so, I tend to preserve the
 confidence of information gleaned from mail that has to be seen. I
 have an automatic process that scans the mail daily for particular
 keywords and phrases that would indicate that phreaks or crackers
 are communicating via my system. If there is a suspicious item, a
 copy is pulled for closer inspection. So far, I have only has to
 read mail to/from one pair of users and it turned out that they had
 misrepresented themselves and were kicked off the system

 Commercial systems were equally cautious. One postmaster who works
 for a company which reputedly screens its employees tightly for
 ethical and moral fiber had this to say:

 Attached you will find your mail survey. Some of the questions are
 rather interesting. [Our company] doesn't appear to have similar
 problems with ethics as do some of the universities. It probably
 has do with the fact that employees are screened before they are
 hired to ensure that their ethics fall in line with the companies.
 Unfortunately, universities don't have such luxury.

 In the questionnaire, I mention that there aren't any formal
 policies regarding email. I believe that email would be covered
 under the terms of employment, which also specify acceptable ethics
 behavior. If somebody was foolish enough to use a corporate asset
 to harass somebody, or cause harm or interruption of service due to
 "hacking", then they probably would be terminated.

 Demographic Differences

 I asked a number of demographic questions, intended to see if we
 could distinguish behaviors of philosophies based on age, gender,
 number of years as a postmaster, systems or software used, or
 number of users served. No major discrepancies in behavior turned
 up. It's possible that our statistical "universe" was too small to
 differentiate such behavior trends. It's also possible that
 postmasters all tend to behave in an ethically consistent manner,
 despite the demographic differences.

 "Satisfaction guaranteed"

 Processing this survey has been a learning experience, and not just
 because of learning to handle statistical analysis.

 My expectations of postmasters have been largely met -- I had hoped
 to discover that the electronic information transfer medium was
 watched over by folks who would respect my privacy within the
 constraints of the technology, and I have not been disappointed.

FidoNews 10-15                 Page: 17                    12 Apr 1993

 I was surprised to see that there was no appreciable difference in
 approaches to ethical behavior among systems: some operating
 systems, such as Unix (tm), have a reputation for attracting
 mavericks; and some mail networks, such as BITNET, have extremely
 tight codes for appropriate behaviors. I was pleased to see that
 postmasters across the board regarded privacy and confidentiality
 as important, and would work to protect the system and the users'
 privacy equally.

 I would have liked to have seen more women as postmasters. Here at
 The University of Michigan, 50% of the postmasters and a large
 minority of the mail programmers are women. I hope that my sample
 is not representative of the larger whole, and that more than 12%
 of postmasters are women. (It's possible that many of the people
 who didn't respond to the question about gender were women. I have
 no way to tell.)

 On the whole, I think our users can be generally reassured that the
 electronic postmasters in their lives are concerned about the
 integrity of the mail system, both in terms of system security and
 user privacy. As electronic mail becomes a more prevalent method of
 communications (for both convenience, economic, and ecological
 reasons), it's nice to know that the tradition of confidentiality
 that we have grown to expect from our paper mail postmasters has
 been carried over into the electronic world.
 ----------------------------------------------------------
 Footnotes

 (1) Erna-Lynne Bogue, a doctoral candidate in Social Work at the
 University of Michigan, and a SPSSx consultant, did all the SPSSx
 programming. She also taught me how to interpret the results,
 helped me pinpoint places to explore further, and encouraged me to
 learn a great deal about statistics while doing this project.

 (2) "Text" in this paper is defined to be the content of the
 message; the information that the user is transmitting.

 (3) Postmasters sometimes see messages in which the headers have
 been so thoroughly mangled that the origins are completely
 mysterious. For this reason, by the way, it's a good idea to
 include your name and electronic mail address at the end of your
 message, so that your recipient will know what you think your
 address is in case of problems.

 (4) Or, as another put it, "Users put the most astonishing things
 in electronic mail, and assume that nobody will ever see it. It
 never fails to amaze me the things that people say to each other
 over electronic mail that they probably don't say to each other in
 the bedroom."

 (5) For those of you who may be unfamiliar with the "smiley face"
 in electronic communications, turn the page sideways. The ) is a
 mouth.

 (6) One anecdote is particularly telling. To quote the respondent:
FidoNews 10-15                 Page: 18                    12 Apr 1993


 [The story starts with a description of a bug in a mailer that left
 a number of messages in the postmaster's queue. The respondent
 describes his usual practice of reading only the first 30 lines,
 since usually those 30 lines are only header material.]

 One of the dead items originated locally. Hence, it had
 comparatively few headers, and [the first 30 lines] took care of
 all the headers and showed me the body as well. It was from one of
 my co-workers, written to a friend with whom I also work
 professionally on the side from time to time. Although I didn't
 intend to read it, certain words caught my eye without really
 looking deliberately, and it became immediately obvious that my
 co-worker and this friend were having an affair.

 To say that this made me uncomfortable is to put the matter most
 mildly. My co-worker is married and the co-worker's spouse is also
 an acquaintance of mine. And I have a little (but not much)
 professional contact with the spouse as well. It was clear that the
 co-worker had not informed the spouse of the matter.

 The friend is also married and the friend's spouse was not aware,
 either. I have to work with my co-worker and frequently I am in a
 position where I can't really afford not to work with the friend.

 Now, whether two people want to carry on an affair with one another
 is mostly their own business. Whether I agree with it or not is
 almost entirely irrelevant, especially considering that my beliefs
 do not coincide with my friend's and my co-worker's anyway. But now
 I was in a position where a co-worker whom I trusted was violating
 the spouse's trust. And likewise for the friend and the friend's
 spouse. It became obvious to me in rather short order that it was
 going to be difficult to work with either of them, knowing the lack
 of trust being shown to their respective spouses.

 After some considerable internal warring against myself over what
 to do, I approached my co-worker, explained what I'd learned and
 the (innocent) circumstances by which I'd learned it, and said that
 I thought there were 3 things that could be done. The two of them
 could break off the relationship; they could tell their spouses
 about it and (I suppose) get the spouses' approval for them to
 continue; or I could resign. There wasn't really any way I could
 see myself continuing to work with people that I had to trust in
 order to get work done, while knowing this violation of trust was
 going on. And I don't think I really cared which way the matter
 went.

 As it happened, they broke off the relationship. Whether spouses
 were told about the matter, I can't say.

 I have since written a small tool which looks at this type of dead
 letter to show me JUST the headers.

 (7) One postmaster called these trapped messages "bounce-o-grams".

FidoNews 10-15                 Page: 19                    12 Apr 1993

 (8) Not all respondents made comments, of course, which is why
 sometimes the numbers in these sections dealing with commentary
 don't always add up.

 (9) "Mailing lists" are defined for the purposes of this paper to
 be public or semi-public lists or digests, such as Info-IBMPC,
 INTER-L, or other such public discussions. Private mailing lists,
 such as those created by individual users and which are not open
 for the public to join, are not included.

 (10) Electronic Communications Privacy Act.

----------------------------------------------------------------------

Alert!
By: Stanton McCandlish

Dear editor, please publish this little note prominently and
save people a lot of money!

NOTICE: 1:301/2 is NOT the support board for the Scrabble door,
and has not been for years! That guy moved. Stop wasting money
sending me netmail about it, eh. Within about a month I WILL
have this door abvailble by FREQ, since it is unlikely that
people will stop try to FREQ it for a few years. FREQ
SCRABBLE.ZIP.

Thanks!

----------------------------------------------------------------------

Caller ID Still Isn't Reliable
Jack Decker
Fidonet 1:154/8

CALLER ID STILL ISN'T RELIABLE

After reading the debate over Caller ID that has been raging in the
last few issues, I have to wonder if anyone stopped to notice the
point that Caller ID is NOT yet reliable.  Specifically, it is quite
possible for a call to come in indicating that the calling number has
been blocked by the caller, when in fact the caller has done no such
thing.  In my previous article on the subject, I pointed out how ALL
calls from certain exchanges in California were being shown as
"blocked" on displays in other states (Caller ID isn't being made
available in California itself), in what some feel is a blatent
attempt by Pac*Bell to get customers to complain to the California
Public Utilities Commission (when their calls to other states won't
go through), in the hope that the California PUC will drop their
insistance that unlisted calling numbers be blocked by default.  The
speculation here is that the erroneous display is intentional; that
is, that Pac*Bell knows that their CUSTOMER never intended to block
display of his number, but that Pac*Bell itself chooses to present
the "blocked" message in an attempt to gain political leverage with
the PUC.
FidoNews 10-15                 Page: 20                    12 Apr 1993


However, there is a saying that one should never attribute to malice
what can be adequately explained by stupidity... and thus we bring
you this report from New York, courtesy of a reader of the Internet
Telecom Digest (also known as the comp.dcom.telecom moderated
newsgroup):

Date: Sun, 4 Apr 1993 20:48:22 GMT
From: gleick@Panix.Com (James Gleick)
Newsgroups: comp.dcom.telecom
Subject: Re: Block-the-Blocker CallerID Feature
Message-ID: <telecom13.234.7@eecs.nwu.edu>
Organization: PANIX Public Access Unix, NYC
Sender: Telecom@eecs.nwu.edu

In <telecom13.216.10@eecs.nwu.edu> dan@quiensabe.az.stratus.com (Dan
Danz) writes:

> ... this little sucker (when enabled) will say "This party will not
> accept blocked calls" and disconnect.  It also records the fact that
> it received and blocked the call.

In New York, where Caller ID is being implemented, slowly, Nynex has
provided the following peculiarity.  If you get a call from an
exchange that will *soon* have Caller ID enabled, but doesn't yet, it
shows up as Blocked, not as Out of Area.

Explanation?  The switching equipment is now capable of passing the
CLID information along, but the caller has not yet had the
opportunity to select the blocking option.  So the phone company has
decided to mark *all* calls as blocked.

(Their explanation, not mine.)

If I had the equipment you describe, I wouldn't be receiving any
local calls for a while.

[End of forwarded message from the Telecom Digest]

By way of explanation, the device originally mentioned in the quoted
section of the above message apparently does for voice calls what
some Fidonet sysops want to do on data calls, that is, it prevents
calls from "blocked" numbers from ever getting through.  The point
that needs to be emphasized repeatedly is that Caller ID technology
IS NOT YET RELIABLE.  In some cases calls WILL show up indicating
that the caller has blocked transmission of his or her number, when
in fact the caller has done no such thing (and may not even be aware
of what Caller ID is!).

It seems that those who want to argue in favor of using Caller ID
exclusively for verification want to completely ignore this point.
It reminds me of the folks who will argue that cellular telephone
conversations are now secure (in the United States) because the law
says that folks can't legally listen to them, completely ignoring the
fact that there are still thousands of scanners out there capable of
FidoNews 10-15                 Page: 21                    12 Apr 1993

receiving the cellular frequencies.  You would think that folks who
work with a technology would want to be aware of the limitations of
that technology, but I guess it's more convenient to ignore flaws in
the system (at least until they adversely affect you personally).

Again, I am not saying that you shouldn't use Caller ID as ONE method
of verification.  All I am saying is that a call comes in as
"blocked", you might want to at least assume that it could be some
hapless soul calling who has no idea that the phone company is
telling you that he has blocked the display of his phone number, and
provide some alternate method of access.  Even a one-screen display
explaining the situation and inviting the person to call the sysop on
a voice line (or to send a letter of explanation) would be nicer than
just assuming it's some twit trying to be anonymous, or trying to
crash your system.

Sometimes sysops (and even programmers) just get too smart for their
own good (or at least their callers' good).  I recall when the
original Opus BBS software rejected any city name with less than four
characters, presumably under the theory that any real city name was
at least four characters long.  Of course, this caused nothing but
trouble for callers from Ada, Michigan (suburb of Grand Rapids and
home of the Amway Corporation).  It's bad enough to be discriminated
against by humans for no fault of your own, but when computers start
doing it, it can be really maddening.  Please use the new technology
wisely, and realize that it ain't perfect yet!

----------------------------------------------------------------------

New VW echo starting!!!
   Andy Heckel
   Fido 1:203/15

After hooking up to the Fido echo AUTOMOTIVE, I've started to see
others like myself interested in a specific manufacturer echo. Since
I am a VW nut, I figured I may as well jump on the bandwagon, take
the reins, and go for it, (kinda like jumping head first into an empty
pool). So, this is to announce the newest, (as of this moment), Fido
echo, VOLKS. If you would like to add this echo to your BBS, send me
netmail at 1:203/15, and I'll set you up. Hopefully, this may
eventually make it on to the backbone, if there is enough demand for
it. So help out and if you love your VW as much as I do, areafix it
today!!!
FidoNews 10-15                 Page: 22                    12 Apr 1993


School Music Echo

by Ian Levstein  1:249/121
Areatag:  ORCHESTRA

Although there are many FidoNet echoes dealing with music, there
is a serious lack of information concerning school music.  To that
end, several of us have put together an echo specifically dealing
with all aspects of school music - concert band, orchestra, choir,
marching band, and other such groupings.  We also discuss other
aspects of music such as: film scores, community and professional
orchestras, conductors, and the like.

This echo began a number of months ago and at present has about a
dozen nodes attached covering Southern Ontario to Texas and points
in between.  We would like to see this echo grow and hopefully
get backboned at some point in the future.

If you are interested in receiving this echo, please netmail any of
these persons - we deliver at v32b!

        Ian Levstein    1:249/121     (Kingston, Ontario)
        John Rappold    1:279/30      (Huntington, WV)
        Tony White      1:124/5117    (Dallas, TX)

As Nietzsche said: Life without music would be a mistake.


----------------------------------------------------------------------

The HOLY_BIBLE Echo and the PRIME Network
Steve Winter
FidoNet 1:18/98

            Please spread this info around.  Thanks!!

   ***************************************************************
   *  __________  __________  ___                      ________  *
   *  |        |  |        |   |    |\            /|   |         *
   *  |        |  |        |   |    |  \        /  |   |         *
   *  |________|  |________|   |    |    \    /    |   |______   *
   *  |           | \          |    |      \/      |   |         *
   *  |           |   \        |    |              |   |         *
   *  |           |     \      |    |              |   |         *
   *  |           |       \   _|_   |              |   |_______  *
   *                                                             *
   *       'The sun never sets on the PRIME network'             *
   ***************************************************************
   *       PreRapture(tm) International Message Exchange         *
   ***************************************************************
  With nodes in USA, CANADA, EUROPE, ASIA, and growing.

     PRIME is the Only True Christian worldwide network on earth.
    * Both Religious (Christian) and non-religious conferences. *
FidoNews 10-15                 Page: 23                    12 Apr 1993

     A wholesome, family oriented network with a strict policy
            against profanity, lewdness, obscenity etc..
        Features echos on educational and technical topics.
 * Elaborate Bible Discussion and Debate * False Preachers Exposed *
      919-286-3962 * 919-286-3606 * 919-286-3266 * 919-286-2100
    Using USRobotics Dual Standard Modems V.32bis-14,400 / HST-16800bps
FREQ PRIME.ZIP from 1:18/98, 1:18/99, or 6:700/26 for network kit *

           -={ HOLY_BIBLE Echo Conference }=-
        Available through the PRIME Network and
       on the FidoNet Zone 1 and Zone 2 Backbone
    * The only true Christian Conference in FidoNet *

                       ********
           Acts 2:38   *++++++*  John 3:5
                       *+ ** +*
          **************+ ** +*************
          *+++++++++++          ++++++++++*
          *+ *******  HOLY_BIBLE  ****** +*
          *+++++++++++          ++++++++++*
          **************+ ** +*************
                       *+ ** +*
             Gal 1:8   *+ ** +*  Mark 12:29
                       *+ ** +*
           I Tim 3:16  *+ ** +*   Acts 2:4
                       *+ ** +*
            Isa 45:21  *+ ** +*  Mark 16:16
                       *+ ** +*
           Acts 10:46  *++++++*   Acts 19:5
                       ********
        Hebrews 5:9   Acts 22:16   James 1:22

     HOLY_BIBLE (C)Copyright 1988-93 Steve Winter,
    All rights reserved worldwide (with contributers
     retaining all rights to their contributions)
  A very strict conference designed to expose fakes!

----------------------------------------------------------------------

========================================================================
                          Fidonews Information
========================================================================

------- FIDONEWS MASTHEAD AND CONTACT INFORMATION ----------------

Editors: Sylvia Maxwell, Donald Tees, Tim Pozar
Editors Emeritii: Thom Henderson, Dale Lovell, Vince Perriello,
                             Tom Jennings

IMPORTANT NOTE: The FidoNet address of the FidoNews BBS has been
changed!!! Please make a note of this.

"FidoNews" BBS
    FidoNet  1:1/23                     <---- NEW ADDRESS!!!!
    BBS  +1-519-570-4176,  300/1200/2400/14200/V.32bis/HST(DS)
FidoNews 10-15                 Page: 24                    12 Apr 1993

 Internet addresses:
    Don & Sylvia    (submission address)
              editor@exlibris.tdkcs.waterloo.on.ca

    Sylvia -- max@exlibris.tdkcs.waterloo.on.ca
    Donald -- donald@exlibris.tdkcs.waterloo.on.ca
    Tim    -- pozar@kumr.lns.com

(Postal Service mailing address) (have extreme patience)
    FidoNews
    172 Duke St. E.
    Kitchener, Ontario
    Canada
    N2H 1A7

Published weekly by and for the members of the FidoNet international
amateur electronic mail system. It is a compilation of individual
articles contributed by their authors or their authorized agents. The
contribution of articles to this compilation does not diminish the
rights of the authors. Opinions expressed in these articles are those
of the authors and not necessarily those of FidoNews.

Authors retain copyright on individual works; otherwise FidoNews is
copyright 1993 Sylvia Maxwell. All rights reserved.  Duplication and/or
distribution permitted for noncommercial purposes only. For use in
other circumstances, please contact the original authors, or FidoNews
(we're easy).


OBTAINING COPIES: The-most-recent-issue-ONLY of FidoNews in electronic
form may be obtained from the FidoNews BBS via manual download or
Wazoo FileRequest, or from various sites in the FidoNet and Internet.
PRINTED COPIES may be obtained from Fido Software for $10.00US each
PostPaid First Class within North America, or $13.00US elsewhere,
mailed Air Mail. (US funds drawn upon a US bank only.)

BACK ISSUES: Available from FidoNet nodes 1:102/138, 1:216/21,
1:125/1212, (and probably others), via filerequest or download
(consult a recent nodelist for phone numbers).

A very nice index to the Tables of Contents to all FidoNews volumes
can be filerequested from 1:396/1 or 1:216/21. The name(s) to request
are FNEWSxTC.ZIP, where 'x' is the volume number; 1=1984, 2=1985...
through 8=1991.

INTERNET USERS: FidoNews is available via FTP from ftp.ieee.org, in
directory ~ftp/pub/fidonet/fidonews. If you have questions regarding
FidoNet, please direct them to deitch@gisatl.fidonet.org, not the
FidoNews BBS. (Be kind and patient; David Deitch is generously
volunteering to handle FidoNet/Internet questions.)

SUBMISSIONS: You are encouraged to submit articles for publication in
FidoNews. Article submission requirements are contained in the file
ARTSPEC.DOC, available from the FidoNews BBS, or Wazoo filerequestable
from 1:1/23 as file "ARTSPEC.DOC". Please read it.
FidoNews 10-15                 Page: 25                    12 Apr 1993


"Fido", "FidoNet" and the dog-with-diskette are U.S. registered
trademarks of Tom Jennings, Box 77731, San Francisco CA 94107, USA and
are used with permission.

    Asked what he thought of Western civilization,
    M.K. Gandhi said, "I think it would be an excellent idea".
-- END
----------------------------------------------------------------------