Computer underground Digest Sun Oct 10 1993 Volume 5 : Issue 79
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
Archivist: Brendan Kehoe
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Copie Editor: Etaoin Shrdlu, III
CONTENTS, #5.79 (Oct 10 1993)
File 1--FOIA Releases 10-4-93
File 2--CPSR Key Escrow Comments
File 3--Sea Joins the Encryption Game
File 4--Re: ITAR and export regulations
File 5--Sexual harassment via computers (newspaper article).
File 6--The Net and Netizens (Paper)
File 7--E-mail Announcements From O'Reilly & Associates
File 8--A Few More CuD-Carrying BBSes
File 9--Survey: what harassment _is_ there on the Net?
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically from email@example.com. The
editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
WHQ) (203) 832-8441 NUP:Conspiracy; RIPCO BBS (312) 528-5020
CuD is also available via Fidonet File Request from 1:11/70; unlisted
nodes and points welcome.
EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
In ITALY: Bits against the Empire BBS: +39-461-980493
ANONYMOUS FTP SITES:
AUSTRALIA: ftp.ee.mu.oz.au (126.96.36.199) in /pub/text/CuD.
EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
aql.gatech.edu (188.8.131.52) in /pub/eff/cud
etext.archive.umich.edu (184.108.40.206) in /pub/CuD/cud
ftp.eff.org (220.127.116.11) in /pub/cud
halcyon.com( 18.104.22.168) in /pub/mirror/cud
ftp.warwick.ac.uk in pub/cud (United Kingdom)
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.
DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.
Date: Tue, 5 Oct 1993 15:58-0400
From: The White House <75300.3115@COMPUSERVE.COM>
Subject: File 1--FOIA Releases 10-4-93
Clinton Memorandum on Administration of Freedom of Information Act
Contact: The White House, Office of the Press Secretary,
Oct. 4, 1993
MEMORANDUM FOR HEADS OF DEPARTMENTS AND AGENCIES
SUBJECT: The Freedom of Information Act
I am writing to call your attention to a subject that is of great
importance to the American public and to all Federal departments and
agencies -- the administration of the Freedom of Information Act, as
amended (the "Act"). The Act is a vital part of the participatory
system of government. I am committed to enhancing its effectiveness
in my Administration.
For more than a quarter century now, the Freedom of Information
Act has played a unique role in strengthening our democratic form of
government. The statute was enacted based upon the fundamental
principle that an informed citizenry is essential to the democratic
process and that the more the American people know about their
government the better they will be governed. Openness in government
is essential to accountability and the Act has become an integral
part of that process.
The Freedom of Information Act, moreover, has been one of the
primary means by which members of the public inform themselves about
their government. As Vice President Gore made clear in the National
Performance Review, the American people are the Federal Government's
customers. Federal departments and agencies should handle requests
for information in a customer-friendly manner. The use of the Act by
ordinary citizens is not complicated, nor should it be. The
existence of unnecessary bureaucratic hurdles has no place in its
I therefore call upon all Federal departments and agencies to
renew their commitment to the Freedom of Information Act, to its
underlying principles of government openness, and to its sound
administration. This is an appropriate time for all agencies to take
a fresh look at their administration of the Act, to reduce backlogs
of Freedom of Information Act requests, and to conform agency
practice to the new litigation guidance issued by the Attorney
General, which is attached.
Further, I remind agencies that our commitment to openness
requires more than merely responding to requests from the public.
Each agency has a responsibility to distribute information on its own
initiative, and to enhance public access through the use of
electronic information systems. Taking these steps will ensure
compliance with both the letter and spirit of the Act.
(s) William J. Clinton
Oct. 4, 1993
MEMORANDUM FOR HEADS OF DEPARTMENTS AND AGENCIES
Subject--The Freedom of Information Act
President Clinton has asked each Federal department and agency to
take steps to ensure it is in compliance with both the letter and the
spirit of the Freedom of Information Act (FOIA), 5 U.S.C. 552. The
Department of Justice is fully committed to this directive and stands
ready to assist all agencies as we implement this new policy.
First and foremost, we must ensure that the principle of openness
in government is applied in each and every disclosure and
nondisclosure decision that is required under the Act. Therefore, I
hereby rescind the Department of Justice's 1981 guidelines for the
defense of agency action in Freedom of Information Act litigation.
The Department will no longer defend an agency's withholding of
information merely because there is a "substantial legal basis" for
doing so. Rather, in determining whether or not to defend a
nondisclosure decision, we will apply a presumption of disclosure.
To be sure, the Act accommodates, through its exemption structure,
the countervailing interests that can exist in both disclosure and
nondisclosure of government information. Yet while the Act's
exceptions are designed to guard against harm to governmental and
private interests, I firmly believe that these exemptions are best
applied with specific reference to such harm, and only after
consideration of the reasonably expected consequences of disclosure
in each particular case.
In short, it shall be the policy of the U.S. Department of Justice
to defend the assertion of a FOIA exemption only in those cases where
the agency reasonably foresees that disclosure would be harmful to an
interest protected by that exemption. Where an item of information
might technically or arguably fall within an exemption, it ought not
to be withheld from a FOIA requester unless it need be.
It is my belief that this change in policy serves the public
interest by achieving the Act's primary objective -- maximum
responsible disclosure of government information -- while preserving
essential confidentiality. Accordingly, I strongly encourage your
FOIA officers to make "discretionary disclosures" whenever possible
under the Act. Such disclosures are possible under a number of FOIA
exemptions, especially when only a governmental interest would be
affected. The exemptions and opportunities for "discretionary
disclosures" are discussed in the Discretionary Disclosure and Waiver
section of the "Justice Department Guide to the Freedom of
Information Act." As that discussion points out, agencies can make
discretionary FOIA disclosures as a matter of good public policy
without concern for future "waiver consequences" for similar
information. Such disclosures can also readily satisfy an agency's
"reasonable segregation" obligation under the Act in connection with
marginally exempt information, see 5 U.S.C. 552(b), and can lessen an
agency's administrative burden at all levels of the administrative
process and in litigation. I note that this policy is not intended
to create any substantive or procedural rights enforceable at law.
In connection with the repeal of the 1981 guidelines, I am
requesting that the Assistant Attorneys General for the Department's
Civil and Tax Divisions, as well as the United States Attorneys,
undertake a review of the merits of all pending FOIA cases handled by
them, according to the standards set forth above. The Department's
litigating attorneys will strive to work closely with your general
counsels and their litigation staffs to implement this new policy on
a case-by-case basis. The Department's office of Information and
Privacy can also be called upon for assistance in this process, as
well as for policy guidance to agency FOIA officers.
In addition, at the Department of Justice we are undertaking a
complete review and revision of our regulations implementing the
FOIA, all related regulations pertaining to the Privacy Act of 1974,
5 U.S.C. 552a, as well as the Department's disclosure policies
generally. We are also planning to conduct a Department-wide "FOIA
Form Review." Envisioned is a comprehensive review of all standard
FOIA forms and correspondence utilized by the Justice Department's
various components. These items will be reviewed for their
correctness, completeness, consistency and particularly for their use
of clear language. As we conduct this review, we will be especially
mindful that FOIA requesters are users of a government service,
participants in an administrative process, and constituents of our
democratic society. I encourage you to do likewise at your
departments and agencies.
Finally, I would like to take this opportunity to raise with you
the longstanding problem of administrative backlogs under the Freedom
of Information Act. Many Federal departments and agencies are often
unable to meet the Act's ten-day time limit for processing FOIA
requests, and some agencies -- especially those dealing with
high-volume demands for particularly sensitive records -- maintain
large FOIA backlogs greatly exceeding the mandated time period. The
reasons for this may vary, but principally it appears to be a problem
of too few resources in the face of too heavy a workload. This is a
serious problem -- one of growing concern and frustration to both
FOIA requesters and Congress, and to agency FOIA officers as well.
It is my hope that we can work constructively together, with
Congress and the FOIA-requester community, to reduce backlogs during
the coming year. To ensure that we have a clear and current
understanding of the situation, I am requesting that each of you send
to the Department's Office of Information and Privacy a copy of your
agency's Annual FOIA Report to Congress for 1992. Please include
with this report a letter describing the extent of any present FOIA
backlog, FOIA staffing difficulties and any other observations in
this regard that you believe would be helpful.
In closing, I want to reemphasize the importance of our
cooperative efforts in this area. The American public's
understanding of the workings of its government is a cornerstone of
our democracy. The Department of Justice stands prepared to assist
all federal agencies as we make government throughout the executive
branch more open, more responsive, and more accountable.
/s/ Janet Reno
From: David Sobel
Date: Tue, 5 Oct 1993 16:51:12 EST
Subject: File 2--CPSR Key Escrow Comments
CPSR Key Escrow Comments
September 27, 1993
Director, Computer Systems Laboratory
ATTN: Proposed FIPS for Escrowed Encryption Standard
Technology Building, Room B-154
National Institute of Standards and Technology
Gaithersburg, MD 20899
Re: Request for Comments; Docket No. 930659-3159
This letter constitutes the formal comments of Computer
Professionals for Social Responsibility (CPSR) on the proposed
Federal Information Processing Standard for an Escrowed Encryption
Standard (EES), as described in the Federal Register on July 30,
1993 (58 FR 40791). CPSR, a national organization of
professionals in the computing field, has a long-standing interest
in government policies concerning cryptography and computer
security. During the past several years we have pursued an
extensive study of cryptography policy in the United States. We
have organized several public conferences, conducted litigation
under the Freedom of Information Act, and appeared on a number of
panels to discuss the importance of cryptography for privacy
protection and the need to scrutinize carefully government
proposals designed to limit the use of this technology. While we
do not represent any particular computer company or trade
association, we do speak for a great many people in the computer
profession who value privacy and are concerned about the
government's key escrow initiative.
To properly evaluate the key escrow proposal, it is necessary
to consider the Computer Security Act of 1987, which made clear
Congress' intent that in the area of unclassified computing
systems NIST -- and not the National Security Agency (NSA) --
would be responsible for the development of technical standards.
The Act emphasizes public accountability and stresses open
In the spirit of the Act, NIST set out in 1989 to develop a
public key cryptography standard. According to documents obtained
by CPSR through the Freedom of Information Act (FOIA), NIST
recommended that the algorithm be "public, unclassified,
implementable in both hardware or software, usable by federal
Agencies and U.S. based multi-national corporations." However,
the key escrow proposal and the proposed Clipper and Capstone
configurations are quite different: the underlying Skipjack
algorithm is classified; public access to the reasons behind the
proposal is restricted; Skipjack can be implemented only in
tamper-proof hardware; the key escrow system is unlikely to be
used by multi-national corporations; and the security of the
algorithm remains unproved.
The key escrow proposal undermines the central purpose of the
Computer Security Act and conflicts with the goals NIST itself
articulated in 1989. The most significant deficiencies of the
proposal are set forth below.
* The potential risks of the proposal have not been assessed
and many questions about the implementation remain unanswered.
The Federal Register notice states that the current proposal "does
not include identification of key escrow agents who will hold the
keys for the key escrow microcircuits or the procedures for access
to the keys." In a recent briefing for Congressional staffers,
however, Justice Department representatives indicated that NIST
and a "non-law enforcement" component of the Treasury Department
will be designated as the escrow agents. Such an arrangement
would be cause for serious concern and would not constitute a true
"escrow" system. As described in the Federal Register notice,
To escrow something (e.g., a document, an encryption
key) means that it is "delivered to a third person to be
given to the grantee only upon the fulfillment of a
condition" (Webster's Seventh New Collegiate
Dictionary). A key escrow system is one that entrusts
components of a key used to encrypt telecommunications
to third persons, called key component escrow agents.
It is, we submit, disingenuous to apply the word "escrow" to
an arrangement whereby two components of the Executive branch
(NIST and Treasury) would be providing cryptographic keys to
another component of the Executive branch (a law enforcement
agency). By any stretch of the imagination, such a system would
lack the "third party" that is an integral part of any true escrow
Notwithstanding the identity of the escrow agents, the
proposed key escrow configuration may also create a dangerous
vulnerability in the nation's communications networks. The risks
of misuse of this feature greatly outweigh any perceived benefit.
* The Federal Register notice states that the escrow agents
will provide the key components to a government agency that
"properly demonstrates legal authorization to conduct electronic
surveillance of communications which are encrypted." The crucial
term "legal authorization" has not been defined. The vagueness of
the term leaves open the possibility that court-issued warrants
may not be required in some circumstances. Indeed, in NIST's
letter of invitation to the five experts who were selected to
evaluate the Skipjack algorithm (recently released to CPSR under
the FOIA), the agency describes the escrow system and states that
the key components will be made available "only to authorized
government officials under proper legal authorizations, usually a
court order." Network users cannot be expected to embrace a
communications security system that -- in the words of the agency
proposing the system -- will "usually" require a court order
before the privacy of a communication is compromised. Those
circumstances in which judicial warrants will not be required must
be precisely and unambiguously described before any meaningful
public debate of the proposal can proceed.
* The classification of the Skipjack algorithm as a "national
security" matter is inappropriate for technology that will be used
primarily in civilian and commercial applications. Classification
of such technical information limits the computing community's
ability to evaluate fully the proposal and the general public's
right to know about the activities of government in this vitally
important area. CPSR has initiated litigation in federal district
court challenging NSA's failure to disclose information relevant
to the key escrow system. CPSR v. NSA, et al., Civil Action No.
93-1074 (D.D.C.). NSA recently requested a one-year delay in
those judicial proceedings. We submit that complete and
meaningful public comment on the key escrow proposal is impossible
until all relevant documentation has been made available for
* The key escrow proposal was not developed in response to a
public concern or a request from industry. It was put forward by
the National Security Agency and the Federal Bureau of
Investigation so that those two agencies could more easily conduct
surveillance of electronic communications. It has not been
established that such surveillance is necessary for crime
prevention. The number of arrests resulting from wiretaps has
remained essentially unchanged since the federal wiretap law was
enacted in 1968. Likewise, it has not been demonstrated that the
use of encryption technology has in any way hampered the ability
of law enforcement agencies to execute court-ordered electronic
* Adoption of the proposed key escrow standard would have an
adverse impact upon the ability of U.S. manufacturers to market
cryptographic products abroad. It is unlikely that non-U.S. users
would purchase communication security products to which the U.S.
government holds keys. The key escrow proposal is the most recent
manifestation of the government's outdated and unrealistic attempt
to "control" the dissemination of emerging information
technologies, often to the detriment of American developers and
innovators. In a recent letter to the President, a bi-partisan
group of Congressmen (including Majority Leader Gephardt and
Minority Whip Gingrich) noted the folly of this course:
Encrypted mass market software has been subject
to ... outdated controls. Mass market software is
available from foreign manufacturers and distributors
and is easily transmitted using only a long distance
telephone line and a modem. Yet, the United States
continues to control this computer software as a
Munitions List item.
It is difficult to understand the utility of
controlling such equipment and technology when it is
so easily available to those from whom we are trying to
keep it. Yet, by imposing controls, we are limiting the
ability of American businesses to export some of their
most marketable items. As a result, we are losing our
competitive edge in these areas.
* * *
In summary, we believe the key escrow proposal is an ill-
conceived and futile attempt to control the development and wide
dissemination of effective, privacy-enhancing encryption
technology. The proposal was spawned by highly dubious and
unproven "law enforcement" assertions and, if adopted, would
create unacceptable vulnerabilities in our information infra-
structure. Network users have a right to secure and effective
means of communication, uninhibited by law enforcement and
intelligence agency attempts to monitor and control telecommuni-
cations systems. NIST should abandon the key escrow proposal and,
pursuant to its mandate under the Computer Security Act and the
Omnibus Trade and Competitiveness Act, encourage the development
and use of the strongest possible communications security
Marc Rotenberg David L. Sobel
Director, CPSR Washington Office CPSR Legal Counsel
Subject: File 3--Sea Joins the Encryption Game
Date: Sun, 3 Oct 1993 05:34:33 -0800 (PDT)
To: September 28, 1993
Director, Computer Systems Laboratory
ATTN: Proposed FIPS for Escrowed Encryption Standard
Technology Building, Room B-154
National Institute of Standards and Technology
Gaithersburg, MD 20899
The Society for Electronic Access
P.O. Box 3131
Church Street Station
New York, New York 10008-3131
Voice telephone: (212) 592-3801
Internet e-mail: Sea@Sea.org
The Society for Electronic Access's response to the call for Public
Comment contained in:
VOL. 58, No. 145
DEPARTMENT OF COMMERCE (DOC)
National Institute of Standards and Technology (NIST)
Docket No. 930659-3159
A Proposed Federal Information Processing Standard
for an Escrowed Encryption Standard (EES) 58 FR 40791
The Society for Electronic Access would like to register its concern
with the proposed implementation of the Clipper Chip/Skipjack
Algorithm key escrow scheme. These related protocols will be referred
to as a group as "Clipper" in the body of this letter. While we do not
object to classification of Federal Information Processing Standards
(FIPS) for encrypting information vital to national security, we
believe that a system for transferring sensitive but unclassified
information used by civilian Government offices, corporations and
private citizens should be open to public review.
NIST, by calling for public comment, would seem to be inviting just
such a review. However, NIST will not let the public examine either
the Clipper Chip or the Skipjack algorithm, has not commissioned
studies concerning either the cost or impact of the Clipper plan, and
will not let the public examine studies undertaken by the NSA on the
issue of escrow agency security. Furthermore, since an escrow scheme
requires a trusted third party while in the proposed scheme NIST
itself is one of the key holders, we feel that NIST will not be able
to review public comment as a disinterested party. Under these
circumstances we feel a call for public comment is hampered.
Our concerns with Clipper fall into four broad categories: it is
unnecessary; the present Administration has promoted its "voluntary"
use by the public without abjuring the possibility of outlawing
competing systems; the key escrow scheme is not a true escrow; and
attempts to gather information necessary for a public assessment of
Clipper have met obstacles raised by the Government. These concerns
are enumerated below.
1) Clipper is unnecessary.
Clipper is not a response to any public need. In a reply to questions
about Clipper from RSA, NIST states that "[the decisions made about
Clipper] offer a balance among the various needs of corporations and
citizens for improved security and privacy and of the law enforcement
community for continued legal access to the communications of
Corporations and citizens can already obtain "improved security and
privacy" from a wide variety of sources, as there are several
commercially available encryption standards currently on the market.
Since the public already has what NIST says it needs, it follows that
the only reason for Clipper to exist is the addition of the Law
Enforcement Access Field (LEAF), which allows the government to
decrypt all messages encrypted by Clipper. Furthermore, the phrase
"legal access to the communications of criminals" is particularly
chilling, as it demonstrates a lack of sensitivity to the rule of law.
Neither the FBI nor any other agency entrusted with surveillance
activities can determine in advance of a trial whether a citizen is a
criminal or not. We believe NIST's attitude belies a misunderstanding
of the rights of American citizens.
2) The Administration has promoted its "voluntary" use by the public
without abjuring the possibility of outlawing competing systems.
NIST has consistently maintained that outside Federal use, adoption of
Clipper by citizens and individuals will be strictly voluntary. When
pressed on this point by RSA, NIST responded "There are no current
plans to legislate the use of Clipper. Clipper will be a government
standard, which can be - and likely will be - used voluntarily by the
private sector. The option for legislation may be examined during the
policy review ordered by the President." We are concerned that asking
for public approval of Clipper as one of several encryption
possibilities open to the public while the possibility of outlawing
all other options still exists will prevent legitimate assessment of
Clipper's ultimate impact.
Furthermore, many organizations from small companies to multi-national
corporations have invested in alternative encryption schemes like RSA,
Diffie-Hellman and IDEA, many of them based solely on software and
therefore incompatible with Clipper even as a retro-fit. To outlaw
these schemes would cause them an enormous fiscal burden, as well as
mandating a US-only standard incompatible with the protocols chosen by
many international standard-setting organizations, thereby reducing
the competitiveness of US companies doing business in the
We feel that unless the present administration publicly abjures the
possibility of banning alternate methods of encryption, no true
analysis of Clipper is possible.
3) The escrow scheme does not use true escrow agencies.
This scheme has been publicly promoted as an escrow scheme, but the
core of any functioning escrow scheme is the presence of a trusted
third party (or in this case two trusted third parties.) We are
concerned with the idea that Governmental agencies will hold these
positions, as they are not truly third parties. In addition, we are
particularly concerned that the same agency is responsible for
reviewing Public Comment on the proposed encryption scheme and
occupying the position of one of the two key holders. We are not
convinced that NIST can fulfill both roles without conflict of
4) Attempts to gain information necessary for public review of Clipper
have met obstacles raised by the Government.
The National Security Agency has asked for an increased period of time
to respond to FOIA requests for information about Clipper, from 10
business days to one year. Ten business days falls within the Public
Comment period. One year does not. We feel that if NSA requires this
period of time to comply with requests for information that the period
for public analysis and comment should also be extended for an equal
period of time.
Based on these concerns, the Society for Electronic Access feels that
NIST should not implement the Clipper plan without commissioning
studies on the cost and impact of implementing Clipper, without
providing real assurances that Clipper is not a prelude to outlawing
other encryption schemes, without an implementation of an escrow
scheme in which NIST does not both review and participate in the proposal,
and without NSA complying with FOIA requests outstanding from before
September 28, 1993.
Society for Electronic Access
Date: Mon, 4 Oct 93 04:29:19 PDT
From: Fredrick B. Cohen
Subject: File 4--Re: ITAR and export regulations
Your discussion seems very strange to me. I seem to think I have
heard it all before - about 3 years ago - when I got permission from
the government to export an RSA cryptosystem with no restriction on
key length or anything else.
It took a few weeks (6-8 as I recall), but all I did was submit the
software to the government (in 12 copies or so), and request a ruling.
After a few call-backs, I got permission.
I'm not an authorized arms dealer, and of course I can't reimport what
I have exported, but then I rarely have a reason to do so.
By the way, my understanding is that it is not the concept of modular
exponentiation that is covered by the RSA, but rather their particular
algorithm for key generation. Am I mistaken? I do key generation
with a slightly different algorithm - more efficient at some things,
less efficient at others.
All of this is not to say that I think it is reasonable to prevent us
from doing as we please in this area, and I certainly wish I didn't
have to wait so long before distributing new versions overseas, but
why not just apply for export and see what happens? Maybe you'll get
permission and it will all be no problem.
IBM has been exporting DES for quite a few years according to sources
I have in EC who have seen IBM chips with DES on them in EC computers.
I believe they simply asked for permission and got it.
I applaud the EFF for helping defend people in this area, but maybe if
they tried to work within the law in the first place, they would have
found it was easier to obey the law than break it. Maybe if they
apply now, they will end up with a no-case (assuming they get
permission). The court is generally pretty lenient under these
circumstances, and who would want to prosecute you once they find out
that there was no damage caused?
Date: Fri, 8 Oct 1993 05:43:44 GMT
From: emr@EE.MU.OZ.AU(Elizabeth Reid)
Subject: File 5--Sexual harassment via computers (newspaper article).
This article appeared on Page 8 of the Australian newspaper _The Age_
on Tuesday 5 October 1993. Permission has been granted by the author
and the newspaper for the article's reproduction in the Computer
Underground Digest and the Computers and Academic Freedom electronic
digests and Usenet newsgroups.
UNI TO LOOK INTO SEXUAL HARASSMENT VIA COMPUTER
By JOANNE PAINTER
Computers have been blamed for many social ills but sexual misconduct
was never one of them. Now, however, the University of Melbourne is
investigating the link between computers and sexual harassment on
A five-member group was formed last month to investigate the extent of
sexual harassment occurring via the university's computer networks and
electronic mail systems. It follows several cases in which people
received sexually explicit and harassing letters. Some of the
instances occurred after hackers got into the system.
The existence of sexually explicit material in networks and personal
attacks carried out through the networks are also believed to have
The university's sexual harassment adviser, Dr Murray Seiffert, said
that the university was aware of such sexual harassment. But he said
the group was formed to "nip the problem in the bud" rather than
respond to an existing pattern of harassment. "We know there has been
the odd case come up and in a place like ours that does take place,"
he said. "We have said we have a problem and (we) want to find out
how big it is."
The director of the Advanced Computer Graphics Centre at the Royal
Melbourne Institute of Technology, Mr Mike Gigante, said the exchange
of sexually explicit and harassing material was common on electronic
mail systems. He said it was difficult to monitor and police the
exchange of such material.
"People tend to be far more abusive on bulletin boards or EMAIL than
they would face to face.. Some of the exchanges I have seen on these
news groups have been outrageous. If they said it face to face, the
person saying it would be in court with libel and slander suits."
Dr Seiffert said electronic-based sexual harassment was almost
inevitable in an organisation with 25,000 staff and students,
thousands of computers that was [sic] linked into the global Internet
He acknowledged the difficulty of preventing harassment but he said
offenders would face disciplinary proceedings, including expulsion.
"Potentially it's a fairly big problem here because of the place
having a large number of computers," he said. The group will report
back to the university's equal opportunity committee next month.
Date: Sun, Oct 4 1993 21:32:32 CDT
From: Michael Hauben
Subject: File 6--The Net and Netizens (Paper)
((Moderators' Note: The following excerpt is from Michael Hauben's
substantial and useful paper: "The Net and Netizen's: The Impact the
Net has on People's Lives." The full text, about 80 K, can be obtained
from the CuD ftp sites)).
The world of the Netizen was envisioned some twenty five years ago by
J.C.R. Licklider and Robert Taylor in "The Computer as a Communication
Device" (Science and Technology, April 1968). Licklider brought to his
leadership of the Department of Defense's ARPANET a vision of "the
intergalatic computer network." Whenever he would speak of ARPANET, he
would mention this vision. J.C.R. Licklider was a prophet of the Net. In
his paper, "The Computer as a Communication Device", Licklider establishes
several helpful principles as to make the computer play a helpful role in
human communication. Licklider clarified his definition of communication as
a creative process by writing:
"But to communicate is more than to send and to receive. Do two
tape recorders communicate when they play to each other and record from
each other? Not really - not in our sense. We believe that
communicators have to do something nontrivial with the information they
send and receive. And to interact with the richness of living
information -- not merely in the passive way that we have become
accustomed to using books and libraries, but as active participants in
an ongoing process, bringing something to it through our interaction
with it, and not simply receiving from it by our connection to it...We
want to emphasize something beyond its one-way transfer: the increasing
significance of the jointly constructive, the mutually reinforcing
aspect of communication - the part that transcends 'now we both know a
fact that only one of us knew before.' When minds interact, new ideas
emerge. We want to talk about the creative aspect of communication."
Licklider defines four principles for computers to make a
contribution towards human communication. They are:
1) Communication is defined as an interactive creative process.
2) Response times needs to be short to make the "conversation"
free and easy.
3) The larger network would form out of smaller regional networks.
4) Communities would form out of affinity and common interests.
In this paper I will explore the uses Netizens have discovered for
the Net. Licklider's understandings from his 1968 paper have stood the test
of time, and do represent the Net today. In a later paper he co-wrote with
Albert Vezza, "Applications of Information Networks" (Proceedings of
IEEE, Vol 66, No 11, Nov 1978) Licklider explores possible business
applications of information networks. Licklider's survey of business
applications in 1978 come short of the possibilities he outlaid in his
earlier paper, and represent but a tiny fraction of the resources the Net
Date: Fri, 20 Aug 1993 13:19:32 -0700
From: Richard Budrevich
Subject: File 7--E-mail Announcements From O'Reilly & Associates
SUBSCRIBING TO ORA-NEWS
If you would like to receive this service, we now have an easy
automated way for you to subscribe to our "ora-news" mailing list.
To subscribe, address an e-mail message to:
Put the following information on the first line of your message
(not in the Subject:, because commands there are ignored):
subscribe ora-news "Your Name" of "Your Company"
subscribe ora-news Jane Doe of Bland University
Within the next day or so (usually much sooner), you should get a
reply message welcoming you to the list. If you don't get a reply,
or you have other problems or questions, please send mail to:
firstname.lastname@example.org -- tell us when you sent your message
and include your telephone number.
(If you have more than one computer account or read e-mail on several
different services, be sure to send your subscription request from the
place where you want to read "ora-news." Our system automatically
reads your e-mail address from your message and registers you at that
Date: Sun, 10 Oct 1993 16:35:06 CDT
From: CuD Moderators
Subject: File 8--A Few More CuD-Carrying BBSes
Here are a few more BBSes carrying CuDs, PHRACKs, and other
'Zines. One of these days, perhaps an ambitious reader could
compile a substantial BBS directory, organized by area code, of
BSSes specializing in text files.
Date--Mon, 13 Sep 1993 23:14:43 -0400 (EDT)
LIGHTNING STRIKE BBS carries CuDs as well.
Lightning Strikes Here 14.4 down to 1200.
I have all CuD with the Index. Packed up with PKZIP 2 format.
More Info is in the Sig.
\ Austin C. Phelps \ Internet:email@example.com
/ Lightning Strikes Here / UUCP: ucf-cs!vicstoy!aphelps
\ FutureNet #44 (407) 297-7288 FutureNet: #1@#44 or #2@#10 or #59@#1
/ Apple II Forever / \ FidoNet: Austin Phelps@1:363/18
Date--Thu, 09 Sep 93 20:54:35 EDT
The Decode BBS in Columbia, Maryland, carries both
comp.society.cu-digest and back issues under /public/cud-arch.
It also offers a complete set of Phrack issues in
/public/phrack. There are also various computer underground
documents and programs in the files section.
Decode BBS is reachable at +1 410 730 6734. I am available
system@decode.UUCP (System Operator)
Cryptography, Security, Privacy +1 410 730 6734 Data/FAX
RABBS is officially going to be open 5 October 1993. The number is
612.251.8596 and will (crossing fingers%) be online Internet within a
month (er two). RABBS has changed names to "the Alliance BBS"...but
will hopefully use RABBS.whatever for mailing.
Date: 10 Oct 1993 17:51:14 +0100
From: mch@DOC.IC.AC.UK(Mike C Holderness)
Subject: File 9--Survey: what harassment _is_ there on the Net?
((MODERATORS' NOTE: Mike Holderness's past writings, including some
some published in CuD, the Times Higher Education Supplement, and
elsewhere, demonstrate that he is competent, non-sensationalistic, and
incisive. We trust that he will share some of his findings with CuD
readers when the story is finished. The following is reprinted from
Carl Kadie's alt.comp.acad-freedom.talk, a Usenet group devoted to
issues of net policy and events related to academic freedom)).
The Times Higher Education Supplement wants me to do a piece on
harassment on the Net. No, I am not about to go all sensationalist.
Neither am I about to abstain from the phone system, let alone call
for it to be monitored or shut down; in my lifetime I have received
one nearly-obscene call, one bomb threat and dozens of silent
harassers through that technology, but I find it, like the Net, rather
useful. Neither am I at all interested right now in pictures, except
for specific reports of their being used to harass an individual.
I want to look at this phenomenon as a form of harassment, not as a
nasty mysterious technological thang. And I want to look at the
_debate_ around it. I hope readers will see this attempt to communicte
calmly with largely non-Net-connected academics as a useful use of
I'm hoping for answers to the following. I don't expect any one person
to answer them all.
* How would you say that email harassment is different from other
forms of harassment -- by mail, by phone, in person?
* Would you comment on a _guess_ I make about the phenomenon,
which is this:
To senders, a harassing message takes place in the
"privacy" of their computer environment and/or may seem
impersonal; whereas to recipients the harassing message is as
deeply personal as a phone call, is addressed to them
individually, and is harder to "put down" than a phone.
* Have you experienced any form of harassment on the Net? Are you
prepared to (can you bear to?) describe the incident?
Do you personally know anyone else who has/can?
* Do you know of any statistics and where I can get them?
* What do you think is the best way of dealing with harassment?
With Net harassment specifically? Is there an appropriate
institutional response (e.g. from a harasser's system
* Why do you think the issue generates such excitement on the Net?
* Ironically, in dealing with the some of the preconceptions
which I know many Net users to have about journalists dealing
with this and similar issues, I have had to set out a pretty
thorough pre-agenda for the piece rather than asking open
questions. Do you have a comment on this?
Please indicate how you would prefer your comments to be used.
[ ] With full attribution including where you work
[ ] With name and occupation/post only
[ ] Anonymously
[ ] This is background. It never happened.
(Please check one in response and give any relevant info).
I look forward to hearing from you! Please reply by email. I will
summarise. Replies before Wednesday October 13 are more likely to be used.
The THES is _the_ weekly publication for people working in higher
education in the UK. I also write for New Scientist and (right to
left) the Daily Telegraph, the Independent and the Guardian.
I tried to post this on Monday Oct 5, but it never got back to
my site. Apologies for any multiple-posting to individual groups.
End of Computer Underground Digest #5.79