Computer underground Digest Wed Sep 22 1993 Volume 5 : Issue 74
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
Archivist: Brendan Kehoe
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Cookie Editor: Etaoin Shrdlu, III
CONTENTS, #5.74 (Sep 22 1993)
File 1--Phil Zimmerman Comments on Encryption Flap
File 2--NEW State Dept FLASH on Moby Clipper (Grady Ward)
File 3--"Secret Science"
File 4--Comment on Elansky BBS/Conn. Law
File 5--Fingerprinting Welfare Recipients
File 6--Gov't Computer Databases & Right to Privacy (Thesis Abst)
File 7--Revised WH E-mail FAQ
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically from email@example.com. The
editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
WHQ) (203) 832-8441 NUP:Conspiracy; RIPCO BBS (312) 528-5020
CuD is also available via Fidonet File Request from 1:11/70; unlisted
nodes and points welcome.
EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
In ITALY: Bits against the Empire BBS: +39-461-980493
ANONYMOUS FTP SITES:
halcyon.com( 22.214.171.124) in /pub/mirror/cud
aql.gatech.edu (126.96.36.199) in /pub/eff/cud
etext.archive.umich.edu (188.8.131.52) in /pub/CuD/cud
ftp.eff.org (184.108.40.206) in /pub/cud
AUSTRALIA: ftp.ee.mu.oz.au (220.127.116.11) in /pub/text/CuD.
EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
ftp.warwick.ac.uk in pub/cud (United Kingdom)
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.
DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.
Date: Tue, 21 Sep 1993 05:36:08 GMT
From: hugh@GARGOYLE.UCHICAGO.EDU(Hugh Miller)
Subject: File 1--Phil Zimmerman Comments on Encryption Flap
Phil asked me to forward this to the Digest. It points up the
problems of keeping _ANYTHING_ secret in the electronic world (unless,
of course, it is SECURELY encrypted \;-}).
It is more or less self-explanatory. Let me square his remark at
the end, though: whatever happens, Phil is facing some pretty vast
legal bills. Now is the time for all of us who favor crypto for the
masses to pony up and put our wallets where our mouths are. I pledge
$100 NOW, and challenge every one of you to match or exceed me. I'll
keep it up until Phil's out of the hole. ($100 on a regular basis is
a lot of money on an assistant professor's salary with 3 kids.)
Examine your conscience and write that check. Pronto.
Dept. of Philosophy
Loyola University Chicago
Date--Sun, 19 Sep 1993 13:38:44 -0500
Subject--Zimmermann statement on PGP investigation
Some of you may have received my Internet message of a couple of days
ago about the ongoing U.S. Customs investigation of the exportation
of PGP, which has now progressed to the level of Federal Grand Jury
subpoenas. This earlier message was intended by me for distribution
to a very small group of friends who previously communicated their
concern about me and the investigation and asked to be kept
informed. I did not send the message to anyone outside this group.
Unfortunately, I did not adequately assert my desire that the message
not be further disseminated. It appears that the message has gone
completely public. This was not my intention.
My lawyer, Phil Dubois, has been in touch with the Assistant U.S.
Attorney (William Keane) assigned to the investigation. We have no
reason to believe that Mr. Keane is anything other than a professional
and reasonable person. He made it clear that no decision has been
made regarding any prosecution of anyone for any offense in this
matter. Such decisions will not be made for some time, perhaps
several months. Mr. Keane also made clear his willingness to listen
to us (me and my lawyer) before making any decision. It appears that
both Mr. Keane's mind and the lines of communication are open.
My fear is that public dissemination of my message will close the
lines of communication and put Mr. Keane into an irretrievably
adversarial position. Such a result would not serve any of our
interests. My lawyer tells me that nothing irritates a prosecutor
more than being the subject of what he perceives to be an
orchestrated publicity campaign. He also tells me that his
nightmares involve FOAs (Friends Of the Accused), invariably people
with good intentions, doing things on their own. I understand that
the issues involved in this investigation are of the greatest
importance and transcend my personal interests. Even so, I would
rather not turn an investigation into a full-scale federal
prosecution. I ask that everyone keep in mind that the government's
resources are limitless and that mine are not.
Speaking of resources, many of you have offered help, and I am
grateful. Those wishing to contribute financially or otherwise
should contact either me or Philip L. Dubois, Esq., at firstname.lastname@example.org
or by phone at 303-444-3885 or by mail at 2305 Broadway, Boulder, CO,
80304. Mr. Dubois has just got on the Internet and is still learning
how to use it. Donated funds will be kept in a trust account, and all
contributions will be accounted for. If this whole thing somehow goes
away with money left in the account, the balance will be refunded to
contributors in proportion to the amounts of their contributions.
This message can be widely circulated on public forums.
Date: Tue, 21 Sep 1993 21:13:17 GMT
From: Grady Ward
Subject: File 2--NEW State Dept FLASH on Moby Clipper (Grady Ward)
(please edit follow-ups)
In a fresh (to me, stunning) development, the Austin Code Works
received a letter today (Tuesday 9/21/93) from the State Department,
Bureau of Politico Military Affairs, Office of Defense Trade Controls
advising them, in part, of their need to register as an International
Arms Trafficker *even if* their crypto material is intended solely for
*domestic* publication, regardless of whether they are selling
executables, source, descriptions, algorithms of any crypto (and
presumably viral detection) software or documentation, as defined by
This requirement literally implies that a Cereal manufacturer is
required to register as an arms trafficker if it wants to include a
secret de/coder ring in the box, has a cardboard outline of a de/coder
printed on the box, or even a description how to construct or use a
Complete text of the letter follows:
(State Department Seal)
United States Department of State
Bureau of Politico-Military Affairs
Office of Defense Trade Controls
Washington, D.C. 20522-0602
AUG 31 1993
Austin Code Works
11100 Leafwood Lane
Austin, TX 78750-3587
It has come to the attention of this office that your company is
making cryptographic source code and technical data available
for commercial export claiming a technical data exemption
from the International Traffic in Arms Regulations.
Cryptographic software, including source code, is a munitions
article as defined in 22 CFR # 120.1, category XIII(b). Further,
the exemptions listed in 22 CFR # 125.4 for technical data do
not apply to cryptographic software and source code. A valid
Department of State license is required to export cryptographic
source code. As such, it would be a violation of the
International Traffic in Arms Regulations to export
cryptographic source code without a valid Department of State
We take this opportunity of advise you that any company or
individual who engages in the United State in the business of
either manufacturing or exporting defense articles or
furnishing defense services is required to register for a fee
with the Office of Defense Trade Controls (DTC) pursuant to 22
U.S.C. # 2778(b)(1)(A) and 22 C.F.R. Part 122. Furthermore, the
export of such defense articles and related technical data must
be licensed by the Department of State in accordance with 22
U.S.C # 2778(b)(1)(B)(2) and 22 D.F.R. Parts 120-130
(International Traffic in Arms Regulations). A booklet entitled
"REGISTRATION: The First Step in Defense Trade" is enclosed.
If you are unsure whether an article is on the U.S. Munitions
List, you may send five (5) copies of descriptive literature
about the product and request a commodity jurisdiction
determination from this office according to 22 C.F.R # 120.5 of
If you have any questions regarding the matters discussed in
this letter, please do not hesitate to contact this office at (703)
(signed) Clyde G. Bryant, Jr., Chief
Compliance and Enforcement Branch
I guess this means that all FTP sites who implement the GET command
and have anything to do with crypto or viral detection, including
RFCs, overviews or discussions of specific techniques or algorithms,
etc. must be registered as International Arms Traffickers *even if*
they disallow all but domestic FTP connections.
What to do now.
My advice to this new twist of the NSA and State Department regulating
activities *within* the United States is twofold:
(1) GET and FAMILIARIZE yourself with PGP sources or other crypto
options NOW and upload it to your local BBS (if you deem it still
legal for you to do these things) and
(2) Consider supporting the Electronic Freedom Foundation.
Electronic Freedom Foundation
1001 G Street, NW
Suite 950 East
Washington, D.C. 20001
Date: 22 Sep 93 19:05:22 EDT
From: Urnst Kouch <70743.1711@COMPUSERVE.COM>
Subject: File 3--"Secret Science"
((MODERATORS' NOTE: Urnst Kouch is editor of Crypt Newsletter, a
periodic 'Zine of tech information and political satire and
"In 1989 the Pentagon classified as secret a set of
rocks -- Russian rocks gathered by Americans, with Moscow's
approval -- from below the surface of Soviet territory.
[According to the classification memorandum] '. . .Those
who want them must be government-certified to handle
secret rocks.' Soviet officials said they were ordinary
rocks . . ."
--from Herbert N. Foerstel's "Secret Science:
Federal Control of American Science and Technology,"
(1993, Praeger Publishers)
CuD readers following the National Security Agency's attack on Phil
Zimmerman and the cryptography algorithms involved in Pretty Good
Privacy might want to stroll over to their favorite library and browse
Herbert N. Foerstel's "Secret Science," an interesting book which
reviews the increasingly smothering and anti-democratic government
control over technology and science in the US. Foerstel is the head of
the University of Maryland's Engineering & Physical Sciences Library
and his book expends quite a bit of effort documenting the National
Security Agency's efforts to control and classify any technology -
usually cryptography - which falls within its sphere of interest.
Completely beyond public oversight, the NSA operates almost entirely
behind the curtain of "deep black" classification, despite, in recent
years, a cynical facade of public relations efforts and "friendly"
review of cryptography research.
Foerstel's book recounts the relentless campaign by the NSA to control
cryptographic research funding through the National Science Foundation
and efforts to wrest all independence from the scientific community
through the idea of voluntary prior restraint. What this translates
to, according to "Secret Science," is that all scientists engaged in
cryptographic research should be gentlemen and funnel all findings to
the NSA for oversight or the agency will use executive mandates to
intimidate and quash those in non-compliance.
Foerstel does not candy-coat the story, pointing out when he thinks it
appropriate, the self-serving agendas and illogic of government
For example, Foerstel writes:
"Many in business and government point out the impossibility of
controlling cryptographic software. Indeed, the U.S. has agreed to
let its allies decontrol mass market software with encryption
features, and foreign companies, unencumbered by munitions-type
restrictions are bringing encrypted software and related services to
the international market. The British have stated publicly that they
are permitting the uncontrolled export of such software, but US
software manufacturers are prevented from selling their products
Foerstel also compares the price of a brute force solution to the
current dumbed down NSA compliant DES key: $5,000 as opposed to _$200
septillion_ using the original IBM 128-bit key.
The conclusion he draws is simple and ugly: Our government is
determined to impede the development and dissemination of
sophisticated cryptographic tools in the private sector, mainly
because it wants to reserve the right to break the privacy of American
citizens when deemed necessary. The rationalization that national
sensitive technology must be kept from foreign hands is a sham.
It's hard to emphasize how good a read "Secret Science" is! In
addition to amusing stuff on the above passage dealing with "secret
rocks," the book covers the explosion of classification during the
Reagan administration, the drive to lock up general scientific
material in libraries thought to be sensitive even _after_ widespread
international publication and the FBI's continuing campaign to comb
public libraries for imagined revolutionaries, troublemakers,
foreigners or anyone with foreign-sounding names who accesses the
Date: Sat, 18 Sep 1993 18:05:26 -0400
From: Doug Luce
Subject: File 4--Comment on Elansky BBS/Conn. Law
> (a) A person is guilty of inciting injury to persons or property
> when ... he advocates, encourages, justifies, praises, incites or
> solicits ... any assault upon ... the police force of this or any
> other state ....
Public decentralized computer networks are an assault on what we call
the police force. These information systems furnish easily accessible
facts and opinions on drugs, criminal acts, criminal psychology,
police practices, and government policy. They are a new medium which
disseminates high-quality data currently unfettered by state or mass
media controls. They force close public examination of the power
constructs of the government of the United States.
There isn't a more acute or potentially destructive threat to law
enforcement agencies as they are today. It is to the advantage of the
police to round up and permanently detain the people responsible in
any way for the operation of the networks. Bad publicity generated by
this effort will be far outweighed by the benefit of nullifying this
Date: Mon, 20 Sep 93 19:09:57 EDT
From: joec@CFCSYS.LINET.ORG(Joseph Christie)
Subject: File 5--Fingerprinting Welfare Recipients
A further update. Last week the Suffolk County Legislature voted to
implement a fingerprinting system for welfare recipients. The plan is
being forwarded to NY State, who hasn't said that Suffolk can not do
this but they did authorize fingerprinting on a test basis in two
upstate counties and not in Suffolk. Suffolk County says they don't
need State approval and the State refuses to comment until they
formally receive and review the official policy statement from
Opponents claim that the county should go after provider fraud as this
is a big ticket item whereas recipient fraud is a small ticket item.
On another note, the Sept. 13th issue of Communications Week mentions
that ViaCrypt, a division of Lemcom of Phoenix, is preparing to market
a public key encryption program. They have obtained a sub-license from
PKP. According to ViaCrypt's president, "What we're going to do is
marry our family of encryption engines to selected parts of PGP code."
Further "(It) will be covered by the PKP patent license but from the
outside will look like PGP."
They expect to market the MS-DOS version in early Nov. Mac and UNIX
versions to follow. Cost $199.95 per user but will sell for half price
through the end of this year.
Date: Tue, 21 Sep 1993 12:31:54 CDT
From: CuD Moderators
Subject: File 6--Gov't Computer Databases & Right to Privacy (Thesis Abst)
Computerized Governmental Database Systems
Containing Personal Information
The Right to Privacy
Lewis William Oleinick, M.P.Af.
The University of Texas at Austin, 1993
SUPERVISORS: Chandler Stolp and Philip Doty
This report identifies and examines the potential threats to
individual privacy created by the collection, aggregation, and
dissemination of personal information by governmental agencies and the
role computer systems play in potentiating such threats. Computer
matching, computer profiling, the national criminal justice database,
and portfolio creation via data aggregation of personal information
are the governmental activities stipulated to be potentially
threatening to personal privacy. These four activities are forms of
"dataveillance." Dataveillance poses dangers to the security of civil
liberties in a free society.
To carry on an intelligible discussion about privacy and how the
collection, aggregation, and dissemination of personal information by
governmental agencies may threaten individual privacy it is necessary
to first define privacy and personal information. Independence,
autonomy, dignity, and respect create a conceptual framework upon
which privacy may be defined.
Privacy is a culturally defined norm. As such a discussion of
the American cultural tradition of privacy is necessary to understand
both how Americans have defined privacy over time and the roles
privacy has played in American society in 1) "starting over," 2) in
interpersonal relationships, and 3) in maintaining the "balance of
power" with the State. Privacy is held to be as important as the
unalienable rights of "life, liberty, and the pursuit of happiness" by
the majority of the American public. Americans have become more and
more concerned with their privacy as intrusive technologies have
evolved. Many Americans fear that computers allow the U.S. Government
too much power over the average citizen.
Privacy has been protected in the United States by
precedents set in court cases, by legislation and by executive act.
The breadth of cases pertaining to privacy precludes the examination
of all cases. Supreme Court cases provide a historical overview of
the evolution of the right to privacy as the questions presented to
the Court have become more complex with the introduction of new
technologies into the law enforcement process.
Congress has attempted to address the public's concerns of the
government's collection, aggregation, and dissemination of personal
information by passing legislation designed to protect individual
privacy. The four major pieces of legislation passed by Congress for
the protection of the citizen's right to privacy are the Freedom of
Information Act, the Privacy Act, the Computer Security Act of 1987,
and the Computer Matching and Privacy Protection Act of 1988. The
Office of Management and Budget has produced regulations designed to
enforce the intent of the legislation promulgated by Congress. These
regulations are contained in OMB Circular A-130 which details federal
This report concludes by suggesting the need for the
implementation of a Privacy Protection Board at the national level.
Such a board would be based on the model suggested by David Flaherty.
The primary conclusion that should be drawn from this report is
that society as a whole must re-evaluate the existing paradigm of who
should be in control of personal information; i.e., should it be the
agency who collects it or should the power of control remain with the
individual about whom the information was collected. This report
suggests that a certain modicum of control over the disclosure of
personal information should revert to the individual about whom the
information was collected.
Date: Sat, 4 Sep 1993 18:41:02 EST
From: Dave Banisar
Subject: File 7--Revised WH E-mail FAQ
Revised WH E-mail FAQ
WHITE HOUSE ELECTRONIC PUBLICATIONS AND PUBLIC ACCESS EMAIL
FREQUENTLY ASKED QUESTIONS
Updated August 30, 1993
Table Of Contents
I. Signing up for Daily Electronic Publications.
A. Widely Available Sources.
B. Notes on Widely Available Sources.
C. Direct Email Distribution
II. Searching and Retrieving White House documents.
- FedWorld BBS
III. Sending Email to the White House.
- Internet Direct
- Forwarding From Other Networks
I. HOW DO I SIGN UP FOR ELECTRONIC PUBLICATIONS BY THE WHITE HOUSE?
The White House Communications office is distributing press releases
over an experimental system developed during the campaign at the MIT
Artificial Intelligence Laboratory.
You can obtain copies of all the press releases from a wide variety of
on-line services or discussion groups devoted to either national
politics in general or President Clinton in particular. These are
listed in sections I and II.
Section Ic explains how you can sign up to receive press releases
directly from the experimental MIT system by using an automated email
server. The present system was not designed to handle high levels of
message traffic. A more powerful system will become available in due
course, and in the meantime, it would be appreciated if you used this
service sparingly. One appropriate current use is secondary
redistribution and archiving. If you use it, you will be carried
forward when the more powerful system that replaces it.
A. WIDELY AVAILABLE SOURCES
1. On USENET/NETNEWS, electronic publications are found on a variety
2. On CompuServe: GO WHITEHOUSE
3. On America Online: keyword WHITEHOUSE or THE WHITEHOUSE or CLINTON
4. On The WELL: type whitehouse
5. On MCI: type VIEW WHITE HOUSE
6. On Fidonet: See Echomail WHITEHOUSE
7. On Peacenet or Econet: See pol.govinfo.usa.
B. NOTES ON WIDELY AVAILABLE SOURCES
2. CompuServe's White House Forum (GO WHITEHOUSE) is devoted to
discussion of the Clinton administration's policies and
activities. The forum's library consists of news releases and
twice daily media briefings from the White House Office of
Media Affairs. CompuServe members can exchange information and
opinions with each other in the 17 sections in the forum's
message area. The message board spans a broad range of topics,
including international and United Nations activities,
defense, health care, the economy and the deficit, housing and
urban development, the environment, and education and national
3. On America Online the posts are sent to the White House Forum,
located in the News & Finance department of the service and
accessible via keywords "white house" and "clinton." The
White House Forum on America Online contains the press
releases from the White House, divided into the categories
"Press Briefings," "Meetings & Speeches," "Foreign Policy,"
"The Economy," "Technology," "Health Care," and
"Appointments." The area features a message board so you can
discuss the releases with other AOL members, and a searchable
database for easy retrieval of releases in the topic that
4. MCI Mail users can access daily information on the administration's
programs provided by the White House through MCI Mail bulletin
boards. The available boards are: WHITE HOUSE ECONOMIC, WHITE
HOUSE FOREIGN, WHITE HOUSE SOCIAL, WHITE HOUSE SPEECHES and
WHITE HOUSE NEWS. A listing of these boards can also be
obtained by simply typing VIEW WHITE HOUSE at the COMMAND
C. DIRECT EMAIL DISTRIBUTION
If you don't have access to the these accounts or if you would prefer
to receive the releases via email, then the next section details how
to sign up for this service. The server is not set up to answer
email letters, comments or requests for specific information. To
reach this MIT server, send email:
The server works by reading the subject line of the incoming message
and taking whatever action that line calls for. If you want to sign up
to automatically receive press releases, then your subject line would
begin with the word RECEIVE. You can then specify what kind of
information you are interested in receiving. The categories of
Get releases related to the economy such as budget
news, technology policy review, etc.
Get releases related to foreign policy such as
statements on Bosnian airdrop, Haitian refugee status,
Get releases related to social issues like National
Service (Student Loan) program, abortion, welfare
All speeches made by the President and important
speeches made by other Administration officials.
Transcripts of press conferences released by the White
House Communications office, as well as the
President's remarks in photo ops and other Q&A
ALL All of the above
So, if you wanted to sign up to get releases related to the economy
your email message would look like this:
When you send a signup message to the clinton-info server, it sends
you back a status message letting you know what distribution streams
you are signed up for. If you ever want to check on what groups you
are signed up for send the following message:
You can stop receiving email releases by sending a REMOVE message to
the clinton-info server. The word REMOVE would be followed by whatever
distribution stream you wanted to drop. If you wanted to stop
receiving message about the ECONOMY then your mail would look like
To: Clinton-Info@Campaign92.Org Subject--REMOVE ECONOMY
You could substitute SOCIAL, FOREIGN, SPEECHES, NEWS or ALL for
ECONOMY in the above message and you would be dropped from that
distribution list. If you send the subject line REMOVE ALL, then you
will be taken off the email distribution system all together and will
not receive further releases of any kind.
You can also ask for help from the automated server. Send an email
query as follows:
The server will respond by sending you a detailed form that will guide
you through the process of signing up for the various distribution
streams. As you will quickly discover, there is a automatic form
processing interface that parallel the quick and easy subject line
commands discussed here. More detailed help is available by sending
an email query as follows:
Finally, if you want to search and retrieve documents, but you do not
have access to the retrieval methods discussed in section II, you can
do this via email through the MIT server. You can obtain the WAIS
query form by sending an email query as follows:
Once you have identified the documents that you want, be careful not
to request them all at once, because you may be sent a message
containing all the documents and this message may be too big for some
mail delivery systems between the email server and you.
II. HOW DO I RETRIEVE WHITE HOUSE PUBLICATIONS FROM INTERNET ARCHIVES?
Various sites are archiving the press releases distributed . What follows
incomplete list of some of the sites containing the documents that
have been released to date. This FAQ will be updated to reflect new
sites as they become known.
2. FTP.CCO.CALTECH.EDU /PUB/BJMCCALL
3. FTP MARISTB.MARIST.EDU
4. CPSR.ORG /CPSR/CLINTON
5. FedWorld Online System 703-321-8020 8-N-1 or:
Notes: The following are notes on how to log in and get
information from the above sites.
1. Office FOR Information Technology at University of
North Carolina Maintains the full collection of White
House electronic release available for search with WAIS and
also accessible via Gopher and FTP.
:database-name "/home3/wais/White-House-Papers" :ip-
:description "Server created with WAIS release 8 b5 on
Feb 27 15:16:16 1993 by email@example.com These are the
White House Press Briefings and other postings dealing with
William Jefferson Clinton and Albert Gore as well as members
of the President's Cabinet and the first lady Hillary Rodham
Clinton, Chelsea, Socks and others in Washington DC. Dee Dee
Meyers and George Stephanopoulos. Other good words:
United States of America, Bill Al Tipper Democrats USA
US These files are also available via anonymous ftp
from sunsite.unc.edu The files of type filename used in
the index were:
Folks without WAIS clients or gophers that act as WAIS
clients may telnet to sunsite.unc.edu and login as swais
to access this information via WAIS.
1.b GOPHER is a distributed menuing system for information access on
Internet developed at the University of Minnesota. gophers are
client-server implementations and various gopher clients are
available for nearly any computing platform. You may now use
gopher clients to access the White House Papers and other
political information on SunSITE.unc.edu's new gopher server.
You may also add links from your local gopher server to
SunSITE for access to the White House Papers.
For gopher server keepers and adventurous clients to access
SunSITE you need only know that we use the standard gopher
port 70 and that our internet address is SunSITE.unc.edu
(18.104.22.168). Point there and you'll see the references to
the Politics areas.
For folks without gopher clients can telnet to sunsite.unc.edu
to try out gopher access. You need to have access to internet
The rest is very straight forward. Browsing options end with a
directory mark (/), searching options end with an question mark (?).
There's plenty of on-line help available.
2. No special instructions.
3. The CLINTON@MARIST log files which contain all the official
administration releases distributed through the MIT servers
are available via anonymous FTP. These logs contain in
addition to the official releases, the posts that comprise the
ongoing discussion conducted by the list subscribers.
To obtain the logs:
FTP MARISTB.MARIST.EDU - the logs are in the CLINTON directory
and are named CLINTON LOG9208 thru CLINTON LOGyymm where yymm
stands for the current year and month. Problems should be
directed to my attention: URLS@MARISTC.BITNET or
Posted by Lee Sakkas - owner, CLINTON@MARIST
4. Computer Professionals for Social Responsibility is
providing all Clinton documents on technology and privacy
at the CPSR Internet Library, available via
FTP/WAIS/Gopher at cpsr.org /cpsr/clinton (and in other
folders as relevant). For email access, send a message
with the word "help" at the 1st line of text to
5. The FedWorld Computer System, operated by the National Technical
Information Service, archives White House papers in a
traditional BBS type file library. Connect to FedWorld by
calling (703) 321-8020. No parity, eight data bits and one stop
bit (N-8-1). FedWorld accommodates baud speeds of up to 9,600.
It is also possible to Telnet to FedWorld at FedWorld.doc.gov.
White House papers are located in the W-House library of files.
To access this library from the main FedWorld menu,
enter . Files are named with the first four digits
being the release month and day (e.g. 0323XXX.txt). Some
standard abbreviations after the date include:
rem - Remarks by the President
pc - Press Conference transcript
pr - Press Release
AM - AM Press Briefing
PM - PM Press Briefing
sch - The President's public schedule
spch- Text of major speeches.
These files are saved in ASCII format. Files can be viewed
online by requesting to download a file and then selecting
(L)ist as the download protocol. This will display the file a
screen at a time. White House papers are kept in the above
format for up to two months. Papers more than two months old
are compressed using Pkzip into a single file that contains all
of the files for that month (e.g. 0193.zip contains all papers
released during January 1993). In addition to White Documents,
FedWorld also provides a gateway to more than 100 government
funded BBSs and computer systems.
III. HOW DO I SEND EMAIL TO THE WHITE HOUSE?
We are pleased to introduce this new form of communication into the
White House for the first time in history. As we work to reinvent
government and streamline our processes, this electronic mail experiment
will help put us on the leading edge of progress. Please remember,
though, this is still very much an experiment.
The White House email system is under construction. This is a new
project and suffers from all of the problems common to a startup
operation. The Communications office is currently working on defining
what this system will do, as well as trying to come up with equipment
and staffing to make sure that it works.
Nobody wants this new venture to work more than the staff that has
devoted so many hours to getting it up and running. But much time and
effort will be required before the system is truly interactive. In the
mean time, they will need a little patience from the electronic
When you send to the White House you will receive an immediate
acknowledge that your message has been received. Email messages are
currently being printed out and responses are being sent out via US
Mail, so if you send a message to the White House, please include a US
Post office address for replies.
You can send email to the following addresses:
Internet Direct: President@WhiteHouse.GOV
Please send corrections, deletion and additions to this FAQ to:
End of Computer Underground Digest #5.74