F I D O N E W S -- Vol.12 No.21 (22-May-1995) +----------------------------+-----------------------------------------+ | A newsletter of the | ISSN 1198-4589 Published by: | | FidoNet BBS community | "FidoNews" BBS | | _ | +1-519-570-4176 | | / \ | | | /|oo \ | | | (_| /_) | | | _`@/_ \ _ | | | | | \ \\ | Editors: | | | (*) | \ )) | Sylvia Maxwell 1:221/194 | | |__U__| / \// | Donald Tees 1:221/192 | | _//|| _\ / | | | (_/(_|(____/ | | | (jm) | Newspapers should have no friends. | | | -- JOSEPH PULITZER | +----------------------------+-----------------------------------------+ | Submission address: editors 1:1/23 | +----------------------------------------------------------------------+ | MORE addresses: | | | | submissions=> editor@exlibris.tdkcs.waterloo.on.ca | | Don -- don@exlibris.tdkcs.waterloo.on.ca | | Sylvia max@exlibris.tdkcs.waterloo.on.ca | +----------------------------------------------------------------------+ | For information, copyrights, article submissions, | | obtaining copies of fidonews or the internet gateway faq | | please refer to the end of this file. | +----------------------------------------------------------------------+ ======================================================================== Table of Contents ======================================================================== 1. Editorial..................................................... 1 2. Articles...................................................... 2 Downpour of Media Cliches Threatens To Flood Nation......... 2 InfoWarCon '95.............................................. 4 Dear Madam Emilia,.......................................... 14 Message Trackers!........................................... 14 3. Fidonews Information.......................................... 15 ======================================================================== Editorial ======================================================================== FidoNews 12-21 Page: 2 22 May 1995 We seem to be into spring again, with the snooze being quite slim as a result. It must be that fact that the students in Fidonet all head off to summer jobs; we always have a dearth of articles at this time of year. Since there is little to fight about at the moment, here is the snooze. ;<) ======================================================================== Articles ======================================================================== This one's been around before but just incase you missed it... Downpour of Media Cliches Threatens To Flood Nation By Jeff Cohen and Norman Solomon Media Beat We interrupt this newspaper for a special bulletin! A media flood warning is now in effect for the entire United States. A torrential January storm continues to dump large quantities of media cliches on the American public. And the floodwaters are still rising. But there's nothing natural about the current downpour of political cliches. In recent years a lot of work has gone into seeding the clouds. The new speaker of the House, Newt Gingrich, has described his goal as "reshaping the entire nation through the news media." You can assume that the media climate is backing up the sewers when the same cliche appears on the covers of the country's two biggest news weeklies. That's what happened with the Jan. 9 editions of Time magazine ("Exclusive: How Gingrich plans to pull off his revolution") and Newsweek ("Gingrich's Revolution"). Which brings us to the most popular -- and possibly weirdest -- media cliche of the year so far: "Revolution" The news media can't seem to stop using the word "revolution" to describe the activities of Gingrich and fellow Republicans. Our Nexis computer search found that -- during the first 10 days of this year -- U.S. newspapers used "revolution" in over 270 articles while reporting on Gingrich. No longer able to utilize the worn-out description of Gingrich as a "bomb-throwing backbencher," the news media now insist that he is leading a "revolution." If the Republicans are igniting a "revolution," it must be the first one in world history aimed at giving the entrenched interests that run the country still more entrenched power. FidoNews 12-21 Page: 3 22 May 1995 Since when is it a "revolution" to make things even more cushy for the wealthy and powerful, while making the rest of us even more vulnerable to their prerogatives? "Big government" We keep being told that the Republicans are sworn foes of "big government," determined to downsize and eliminate federal bureaucracies. Our computerized search found references to Gingrich and "big government" in 61 newspaper articles during the first 10 days of January. But news reports on "big government" virtually ignore the most costly and wasteful federal bureaucracy -- the Defense Department -- spending $270 billion this year on the military (almost as much as the amount spent by the rest of the world combined). President Clinton has urged a hefty increase, and the new GOP majority in Congress wants to hike the department's budget even more. A rarely mentioned fact is that the Pentagon purchases two-thirds of the U.S. government's goods and services. And it issues 70 percent of all federal paychecks. But when was the last time you heard a media outlet mention the Pentagon in a discussion of deplorable "big government"? And when was the last time you saw a tough national news report on the F-22 fighter jet, which moves forward even though the General Accounting Office concluded that it is now unneeded and should be put off? The jets are to be assembled by Lockheed, adjacent to Gingrich's congressional district in Georgia. "Middle class" This one is an old standby, but it has gained renewed currency in recent weeks as the Republican and Democratic parties battle to don the mantle of champion for the "middle class." But who, precisely, is part of the "middle class"? To hear many politicians -- and journalists -- tell it, the "middle class" is just about anyone who isn't below the official poverty line and doesn't qualify as a millionaire. Reporting from Southern California in 1993, under the headline "GOP Blitz Against Budget Puts Democrats on Defensive", the New York Times explained on its front page that President Clinton was not offering much to "people earning more than $115,000, which is middle class in this high-cost region." Six figures a year, and part of the beleaguered middle class. "Reform" Of all the cosmetic buzzwords applied by American journalists and pundits, none is more opaque than "reform." It means, simply, a favorable gloss for any change of government policy in any direction -- FidoNews 12-21 Page: 4 22 May 1995 even if it involves the undoing of genuine reforms. Our forecast for this political season calls for continued rhetorical downpours, heavy at times, with only occasional periods of clarity. But don't despair -- and don't worry about carrying a rhetoric-proof umbrella. Once you decode the main cliches, the torrents of media blather will roll off you like water off a duck's back. -- if you want to destroy my sweater | Mason Loring Bliss pull this thread as i walk away | Mac System Extension Hacker watch me unravel, i'll soon be naked | mason@acheron.middleboro.ma.us lying on the floor, i've come undone | 1:109/370.6 @ FidoNet ---------------------------------------------------------------------- InfoWarCon '95 D I S T R I B U T E W I D E L Y Here is the latest information about our upcoming Information Warfare Conference; please redistribute this information widely: InfoWarCon '95 September 7-8, 1995 Stouffer Concourse Hotel Arlington, VA CONFERENCE OVERVIEW The Information Warfare Conference (InfoWarCon 95) is our third international conference dedicated to the exchange of ideas, policies, tactics, weapons, methodologies and defensive posture of Information Warfare on a local, national, and global basis. InfoWarCon will bring together international experts from a broad range of disciplines to discuss and integrate concepts in this rapidly evolving field. Attendees will intensely interact with the speakers and presenters as well as each other to increase each other's understanding of the interrelatedness of the topics. While there are many interpretations of Information Warfare by different groups, the current working definition we employ is: "Information Warfare is the use of information and information systems as weapons in a conflict where information and information systems are the targets". Information Warfare is broken down into three categories, and InfoWarCon speakers and attendees will interactively examine them all: Class I: Personal Privacy. "In CyberSpace, You Are Guilty Until Proven Innocent." The mass psychology of information. Privacy FidoNews 12-21 Page: 5 22 May 1995 versus stability and law enforcement. Class II: Industrial and Economic Espionage. Domestic and international ramifications and postures in a globally networked, competitive society. Class III: Global Information Warfare. Nation-state versus Nation-state as an alternative to conventional warfare, the military perspective and terrorism. THE SPONSORS National Computer Security Association Winn Schwartau, Inter.Pact Robert Steele, OPEN SOURCE SOLUTIONS, Inc. THE CONFERENCE The conference is designed to be interactive - with a healthy dialog between all participants. The contents and discussions will all be considered open source. - What is Information Warfare? - What Are the Targets? - Protecting the Global Financial Infrastructure - Military Perspectives on InfoWar - InfoWar Vs. Non-Lethal Warfare - Defending the U.S. Infrastructure - The Intelligence Community and Information - Open Source Intelligence - The Psychology of Information - Privacy Balances - Information As the Competitive Edge - International Cooperation - Denial of Service - Cyber-Terrorism - Offensive Terrorism - Offensive InfoWar Techniques - Defensive InfoWar Postures - Education and Awareness Training - Corporate Policy - Government Policy - Global Policy - Espionage - Export Controls of Information Flow - The Legal Perspective - The New Information Warriors Plenary sessions will accommodate all attendees, while the three break-out session rooms will provide for more intimate presentations and interactivity on topics of specific interests. * * * * * * * Tentative Agenda * * * * * * * Preliminary Schedule (Rev. 4; May 14, 1995) FidoNews 12-21 Page: 6 22 May 1995 DAY I: Thursday, September 7, 1995 7:00 - 7:45 Continental Breakfast 7:45 - 8:00 Introductory Remarks: - Peter Tippett, NCSA - Robert Steele, OSS - Winn Schwartau, Interpact 8:00 - 8:30 Keynote Address (TBD) Morning Plenaries "What Is Information Warfare?" There is no consensus as to what Information Warfare means; everyone has a different definition and application which often suits specific agendas. The morning sessions are to provide attendees with a current review of what Information Warfare means to different people. 8:30 - 9:30 "The Government Perspective" How do the various military services see Information Warfare as fitting within their needs and mission? Moving information rapidly and efficiently to the modern soldier provides key battlefield advantage. How does lethal versus non-lethal warfare fit into their models? 9:30 - 10:30 "The Commercial View" The commercial sector sees Information Warfare from a different perspective. Business survival is top on the list. How do private sector leaders view Information Warfare from both a defensive and offensive standpoint? Government attendees will be especially interested in this session. 10:30 - 11:00 Morning Coffee Break 11:00 - 12:00 Breakout Sessions I Class I "Anti-Privacy Technology" This will be a hands-on demonstration of how to breach personal privacy, bug and eavesdrop on individuals and corporations. Attendees will see how easy it is to violate privacy, and how hard it is to detect such violations. Class II: "Industrial and Economic Espionage - An Update" What's new in the world or private spying? Front line experts will what's better and what's worse. Who's spying on whom? What are they looking for? What are their techniques and tools? What can you do to protect your organization from being a victim? FidoNews 12-21 Page: 7 22 May 1995 Moderator: Jim Settle Former head of Natl. Computer Crime Squad, FBI - Larry Watson, DECA, FBI Class III "Magnetic Weapon Systems: Risks and Defenses" The first half will present an overview of the risks of HERF Guns, EMP/T Bombs and Magnetic Pulse Cannons (MPC). The attendee will learn how easy they are to build, and why increasingly sophisticated magnetic weapons will become a choice weapon for terrorists. The second half will describe fundamental approaches to defensive postures against such Class 3 Denial of Service Assaults. - Winn Schwartau, Interpact, Inc. - Don White, EMC 12:00 - 13:30 Working Lunch Luncheon Speech 12:30 - 13:00 (TBD) 13:30 - 14:30 Breakout Sessions I Class I "Well Managed Propaganda" The media is a powerful filter by which citizens and the government collect most of their information. Was the media a puppet of the US in the Gulf War? Does aggressive PR makes media policy? How can the media be used, or protect itself from being used? What do journalists have to say about their apparent control over what people hear and see? Moderated by: Neil Munro, Senior Editor, Washington Technology Class II "Should the US Spy on the World?" The US has been the target of economic and indutrial espionage by military allies and 'friendly' competitors such as France, Japan, Korea, Israel, Germany, Taiwan among others. With an estimated intelligence budget of $30 Billion and arguably the most proliferate and advanced technologies, should we turn our spying 'eyes' on our global neighbors for the benefit of American economic security? Or, are Mom and Apple Pie Americans above that? Class III "Practicing Defensive Information Warfare" Military lessons for the private sector This exciting session will show 'real time' security testing with an active Internet connection. The military has developed an arsonal of tools for penetration and monitoring and alerting users about intrusions. Commercial attendees will learn what life is like without these mechanisms, and how much more secure they can be with them - with a low increase in overhead. What steps are required to build a defensive posture, and just how much defense is enough? 14:30 - 15:00 Afternoon Coffee Break FidoNews 12-21 Page: 8 22 May 1995 Afternoon Plenaries 15:00 - 15:30 "Denial of Service on Information Systems" Confidentiality Availability and Integrity, two of the three pinions of security have been technically solved with advanced encryption techniques. The third aspect, Availability remains unsolved because of daunting technical problems. What do DOS attacks look like? From the Civil-Cyber Disobedience to Accidental Acts God or Man, a failure of key system components can trigger a domino-like chain of collapses. This sessions examines the vulnerability of current US infrastructures and the application such techniques in offensive military applications. 15:30 - 16:00 "Terrorism and Counter-Terrorism" Terrorist attacks against the US are now occurring on our home ground. What can the modern terrorist do which will meet his goals of sowing fear and distrust? Key infrastructures such as power grids, communications and transportation systems are attractive targets for the terrorist minded Information Warrior. What are we doing in planned response? 16:00-17:00 "What Is the Role of Government in defending National Economies?" As evolving global conditions shift competitive value from military might to economic advantage, how should we redefine national security? The threats to the private sector increase and become more likely targets in information warfare of all three classes. What is, and what should the role of the military be in defending US interests both domestically and abroad? This session will provide plenty of time for audience involvement. 17:00 - 19:00 Cocktail Reception Most speakers will be available for more intimate groups chats,and authors will be available to sign books. Great opportunity to pursue those ideas with people from different disciplines. 19:00 - 21:00 Birds of a Feather Dinners "Dutch" dinners give attendees the chance to dig into more and more depth in areas of their particular interest. * * * * * DAY II: Friday, September 8, 1995 7:00 - 8:00 Continental Breakfast 8:00 - 8:30 Keynote II (TBD) 8:30 - 9:00 "Defending the Financial Infrastructure" FidoNews 12-21 Page: 9 22 May 1995 Not only the US is concerned. The world's financial infrastructure are inextricably linked. If one portion is hurt, the rippling effect is immediate. Trillions and trillions of dollars are trade every day. What can Information Warriors do to the global spider-web of electronic money, and what defenses are in place? 9:00 - 9:30 "PsyOps" The military and intelligence community have practiced Psychological Operations against adversaries for decades. How is this done, and how well does it work? Does PsyOps also have a place in commercial ventures? 9:30 - 10:00 "CORE WARS: Practicing Information Warfare in Cyberspace" The Core War was invented by A.K. Dewdney from the University of Western Ontario, Canada. As fought today on the Internet, Core Wars represent the purest intellectual tests of pure strategy, tactics and capability. Battalions of software programs must genetically breed themselves for combat knowing that they will go up against fierce competition. Video examples will be used to portray how Core Wars is a working model for Information Warriors on the front lines. Chair: Stuart Rosenberg, University of Cologne, Germany Jo Seiler, University of Cologne, Germany 10:00 - 10:30 "Security By Obscurity: Point-Counterpoint" Should the threats and details of potential vulnerabilities and actual events be guarded under the shrouds of official government secrecy or corporate policy of denial? Or is open disclosure the best route for education, awareness and defense? How can one defend against the unknown? Strong arguments exist for all views. 10:30 - 11:00 Morning Coffee Break 11:00 - 12:00 Breakout Sessions I Class I "An Electronic Bill of Rights" Defining Privacy In Cyberspace How do we as a nation balance the privacy rights of the individual against the legitimate needs of the state, and in sync with the policies of our global trading partners? The views from three differing positions will stimulate a healthy audience-panelist dialogue. Moderated by: Andrew Grosso, Former Asst. US Attorney Scott Charney, DOJ Computer Crime Unit Class II: "The 'Third Wave' Approach to Managing Information Warfare: Building a Commercial War Room" FidoNews 12-21 Page: 10 22 May 1995 Maximizing the flow and control of informations key to competitiveness- whether it be on the battlefield or in the marketplace. An innovative tool and approach to planning and managing information in these very intense, time-sensitive environment is the advent of "war rooms." These are dynamic facilities which are optimized to channel the collection, analysis and dissemination of information. 'War rooms' can be static or field-portable and vary in ergonomic layout and technical capability. This session will provide case studies on the use of war rooms in government and industry. State of the art automated war rooms will be described which feature the projection of computer-generated information. Tools and practices for knowledge discovery, processing and dissemination will help you understand how you go about planning and building a competitive intelligence War Room? Chair: Steve Shakar, KnowledgeBASE, Inc. Panel: Mark Gembecki, Technology and Security Oversight Consultant, US Dept of State Robert Beckman, Alta Analytics, Inc. Class III "International Cooperation" All countries have an interest in stability, but rising nationalism often transcends the greater good. While most countries are becoming militarily allied, we all remain competitively aggressive. 25% of the world's population control 75% of the wealth (The Haves) while nearly 4 billion people share the remaining 25% (The Have-Nots). Where is the balance, and at what point does Information Warfare become openly hostile? In an electronically border-less world, how do we collectively avoid getting to that point? 12:00 - 13:30 Working Lunch 12:30 - 13:00 Luncheon Speech What are the organizing principles for information security and the design basis of information systems and networks? The DII is mandated to provide information services to the war-fighter. The NII initiative is enhancing the economic posture of the US. The infrastructures are inter-related and the loss of either capability could have devastating effect on the economy and security of the United States. The GII will necessarily find similar challenges where all nations must develop a viable means of cooperation. This presentation outlines high level approaches to successful implementation. 13:30 - 14:30 Breakout Sessions Class I "The Legal Consequences: The Lawyers Are Coming, The Lawyers Are Coming." FidoNews 12-21 Page: 11 22 May 1995 What are the legal rights of Cyber-citizens in the US and how do those relate to the laws in other countries? What is the real criminal and civil recourse and remedies to combat industrial espionage? How do we legally handle non-physically violent attacks against the interest of the US on our own soil or overseas? Get the views of the experts. Moderated by: Daniel Kuehl, PhD, Professor National Defense University Scott Charney, DOJ Computer Crime Unit Class II "Defending Against the Internet" The chaotic ravages of the Internet constantly knock at the doors of anyone or any company is connected. What do you have to do to protect your information resources? What have others done? Is it enough and what does the future bode? Chair: Kermit Beseke, President, Secure Computing Corp. John Nagengast, NSA, Deputy Chief of Network Security Class III "The First Information War" The military is attempting to build a global network where intelligence information from the field is fed back to a War Room, analyzed, decisions made, and then instructions sent back to the theater: almost in real time. How well does this work, and how far from reality is the Pentagon's dream? Chair: Mich Kabay, Ph.D., NCSA Alan D. Campen, Col. USAF (Ret.) Author, "The First Information War." Former Director of Command and Control Policy to the Undersectrary of Defense. 14:30-15:00 Afternoon Coffee Break 15:00 - 15:30 "Who Are The Information Warriors?" Who are the bad guys? Who has the capability and the motivation to wage any of the Three Classes of Information Warfare? It's time to name names. 15:30 - 16:00 "Hackers: National Resources or Criminal Kids " DEBATE Germany uses professional hackers for their domestic industrial and economic advantage. What about the US? The kindest words ever uttered by Mich Kabay, Ph.D., about hackers is, "Amoral, sociopathic scum." Robert Steele, President of Open Source Solutions, Inc. sees them as national resources, to be cultivated as a tool for US economic security. Do they have a value in the protection of the US infrastructure, or can their specific expertise be found elsewhere? After short opening statements, the audience will be encourage to ask provocative questions. Robert Steele, President, OPEN SOURCE SOLUTIONS, Inc. Mich Kabay, Ph.D. NCSA Dir of Education FidoNews 12-21 Page: 12 22 May 1995 16:00 - 17:00 "The Future of Information Warfare" Where do we go from here? After two intensive days of interaction, learning and listening, what's the next step? What do industry and the government have to do to better understand each other? What steps can each take to improve individual, corporate and national defensive postures? Chair: National Defense University 17:00 - 17:15 Closing remarks - Peter Tippett - Robert Steele - Winn Schwartau 17:15 - 19:00 No host reception. -==========================- Hotel Information: Stouffer Concourse Hotel (Crystal City) 2399 Jefferson Davis Highway Arlington, VA 22202 703-418-6800 -============================- Conference Fees: $495.00/445.00 - NCSA Members/OSS Attendees $595.00/545.00 - All others ($50.00 discount available if payment is received by July 1, 1995) -============================- InfoWarCon '95 Registration Form: Name: ___________________________________________________________ Title: ___________________________________________________________ Org: ___________________________________________________________ Address: ___________________________________________________________ Address: ___________________________________________________________ City: ___________________________________________________________ State: _______________________________ Zip: _____________________ FidoNews 12-21 Page: 13 22 May 1995 Country: __________________________ Email: ________________________ Phone: __________________________ Fax: _________________________ FEES: Payment made BEFORE July 1, 1995: ( ) $445.00 NCSA Members/OSS Attendees ( ) $545.00 All others Payment made AFTER July 1, 1995: ( ) $495.00 NCSA Members/OSS Attendees ( ) $595.00 All others Make checks payable to NCSA, or Charge to: ( ) VISA ( ) MasterCard AMEX ( ) Number: ___________________________________________ Exp date: ___________________________ Signature: ___________________________________________ MAIL OR FAX REGISTRATION TO: National Computer Security Association 10 South Courthouse Avenue Carlisle, PA 17013 Phone 717-258-1816 or FAX 717-243-8642 EMAIL: 74774.1326@compuserve.com CompuServe: GO NCSAFORUM Winn Schwartau Interpact, Inc. Information Security & Warfare V:813.393.6600 F:813.393.6361 Email: Winn@Infowar.Com PGP Key(2.3a & 2.6) Available on key servers.Voice (AT&T) 0-700-TANGENT F CON mailing list, mail: majordomo@fc.net with "subscribe dc-announce" in the body. DEF CON FTP: ftp.fc.net /pub/defcon http://www.defcon.org FidoNews 12-21 Page: 14 22 May 1995 Dear Madam Emilia, i was wondering if the electronic medium will provide a similar boon to the power of the individual as did the printing press? For example, it is now possible to become relatively famous within electronic culture by merely having somethings noteworthy to say, and access to minimal hardware. In e-space, imagination is more influential than money. Grapevine culture has more tendrils than the old boys' network has bucks. ? . Would you vote for someone whom you have never seen on television or in conglommerate newspapers to be president/prime minister/prima donna? Yes. Is there already an agreed upon quasi-standard for the interactivity of web pages? It would be nice if that realm were more human. If there were such a standard then sysadmins would have fewer headaches, but what if it all becomes like a huge mail-order catalogue instead of cosy wonderplay? Humph. windoze for e-mail. [while being in a sad and frazzled state, one might mention that the Rev. Visage has completely disappeared, much to the alarm and anxiety of his addicted fans] ---------------------------------------------------------------------- Message Trackers! By Carl Morris (1:285/302) For more than the umpteenth time I have received mail marked "The following message was flagged as undeliverable at 1:260/1@fidonet. > 1:260/447 .... Address unknown". These messages are created by Message Trackers. In most cases Message Trackers are software by the same name that checks the current nodelist (at the site of the tracker mind you) and returns any mail for addresses not in the nodelist. While it may be usefull that the sender gets an acknowlegdement that the address doesn't exist, its just short of pissing me off! Appearently my Regional runs Message Tracker. Anything I send to knew nodes or ones about to die often gets returned with the above message. I do not feel it is the regional's responsibility. I usually am just beating the nodelist by a single day. In some instances I have started to wonder if the regional updated his nodelist .... I would stronger like messages to get clear to the host or hub of these questionable nodes before my message is returned. It might be nice to know when the posibility of not getting a reply is likely, but it many cases Message Trackers are just wasting the dime to send me back my message. In some instances, Nets and Regionals are using Message Trackers FidoNews 12-21 Page: 15 22 May 1995 to return Netmails that are to nodes in their location that are not on their CPR! Since when in hell has a node been required to take part in a CPR of an entire region to receive routed netmail! I will not stand for this. The regional or network host spent twice as much money to handle my message because he was so arrogant as to return it! Who do we have as regionals and network hosts!? As I can nolonger call LD, I must route EVERYTHING, even this submission has been routed (and probably returned ;). I noticed in the recent FIDOSTAT that someone has created some "REMOVE_??????" echoes. If these people are the same ones who are using Message trackers for CPR purposes, I strongly suggest they be thrown out and replacements elected. Until next time, they'll just continue to return my messages! Carl Morris ---------------------------------------------------------------------- ======================================================================== Fidonews Information ======================================================================== ------- FIDONEWS MASTHEAD AND CONTACT INFORMATION ---------------- Editors: Donald Tees, Sylvia Maxwell Editors Emeritii: Thom Henderson, Dale Lovell, Vince Perriello, Tim Pozar Tom Jennings "FidoNews" BBS FidoNet 1:1/23 BBS +1-519-570-4176, 300/1200/2400/14400/V.32bis/HST(DS) more addresses: Don -- 1:221/192, don@exlibris.tdkcs.waterloo.on.ca Sylvia- 1:221/194, max@exlibris.tdkcs.waterloo.on.ca (Postal Service mailing address) FidoNews 128 Church St. Kitchener, Ontario Canada N2H 2S4 voice: (519) 570-3137 Fidonews is published weekly by and for the members of the FIDONET INTERNATIONAL AMATEUR ELECTRONIC MAIL system. It is a compilation of individual articles contributed by their authors or their authorized agents. The contribution of articles to this compilation does not diminish the rights of the authors. Opinions expressed in these articles are those of the authors and not necessarily those of FidoNews. FidoNews 12-21 Page: 16 22 May 1995 Authors retain copyright on individual works; otherwise FidoNews is Copyright 1995 Donald Tees. All rights reserved. Duplication and/or distribution permitted for noncommercial purposes only. For use in other circumstances, please contact the original authors, or the eds. OBTAINING COPIES: The most recent issue of FidoNews in electronic form may be obtained from the FidoNews BBS via manual download or Wazoo FileRequest, or from various sites in the FidoNet and Internet. PRINTED COPIES may be obtained by sending SASE to the above paper-mail address. INTERNET USERS: FidoNews is available via FTP from ftp.fidonet.org, in directory ~ftp/pub/fidonet/fidonews. Anyone interested in getting a copy of the INTERNET GATEWAY FAQ may freq GISFAQ.ZIP from 1:133/411.0, or send an internet message to fidofaq@gisatl.fidonet.org. No message or text or subject is necessary. The address is a keyword that will trigger the automated response. People wishing to send inquiries directly to David Deitch should now mail to fidonet@gisatl.fidonet.org rather than the previously listed address. SUBMISSIONS: You are encouraged to submit articles for publication in FidoNews. Article submission requirements are contained in the file ARTSPEC.DOC, available from the FidoNews BBS, or Wazoo filerequestable from 1:1/23 as file "ARTSPEC.DOC". Please read it. "Fido", "FidoNet" and the dog-with-diskette are U.S. registered trademarks of Tom Jennings, and are used with permission. "the pulse of the cursor is the heartbeat of fidonet"... -- END ----------------------------------------------------------------------