Date: Mon, 27 Feb 95 22:26:01 EST Errors-To: Comp-privacy Error Handler From: Computer Privacy Digest Moderator To: Comp-privacy@uwm.edu Subject: Computer Privacy Digest V6#022 Computer Privacy Digest Mon, 27 Feb 95 Volume 6 : Issue: 022 Today's Topics: Moderator: Leonard P. Levine Re: Cordless Phone Privacy Re: Cordless Phone Privacy Re: Cordless Phone Privacy Electronic Footprints Keeping Tabs on Taxpayers Security Programs Use of Mailboxes Use of Mailboxes Re: What Does City Hall Have about Me? Jailed for Free-Net Message SS Number at College SS Number in Business Braindead In Cyberspace Investigative Catalog Re: The National Computer Security Organization Compuserve Sued for Delivering "Junk E-Mail" Re: New Hires SSN into National Database Proposed FTC Rules Could Reduce Telemarketing Abuses Info on CPD [unchanged since 12/29/94] ---------------------------------------------------------------------- From: "BRENDZA, TOM" Date: 23 Feb 95 16:35:48 EST Subject: Re: Cordless Phone Privacy Jim Clausing writes: "The other problem is that while technology exists (has for a long time) to make communication over the airwaves secure, it was LAW ENFORCEMENT and MONEY (from the cellular phone industry) that pressured the legislature into this "Emperor's new clothes" denial of reality." Does this mean that cordless phone signals that are broadcast between the handset and the base are not encrypted (and then de-encrypted for the phone line) because of some federal legislation against it? If so, is this so that law enforcement agencies can monitor the broadcast, like a wire-tap without a warrant (a wireless tap?). I always wondered why AT&T or some other phone manufacturer never manufactured a "scrambled signal" phone unit. I guess I never really thought about why no one did. Is this why? Does that mean it's illegal to install your own encrypted broadcast scheme if you were inclined to? Best, Tom Brendza ------------------------------ From: rthomas007@aol.com (RThomas007) Date: 26 Feb 1995 17:05:34 -0500 Subject: Re: Cordless Phone Privacy Organization: America Online, Inc. (1-800-827-6364) Talking on a cordless telephone is much like broadcasting your message out on a weak radio signal. Prior to just a few months ago, anyone would purchase a scanner that will pick up cordless telephones. There are several ways to combat this. I use a Sony 900 MHz spread-spectrum phone with voice scrambling. What this does is this: First, it scrambles your voice from the headset to the base (while the signal is in the air) so if anyone is listening they will not be in a postion to hear what is beoing sead. Spread Spectrum gives you even more protection as you are sending and recieving at two different frequencies. I am not in the know about the bill you just spoke of. However, up until a year or so ago, the U.S. Supreme Court ruled that there is no expectation of privacy on a cordless telephone. There is on a cellular. However, both can be easily picked up. You hear about someone taking a $99.00 scanner, placing a voice activated tape recorder to it, programing the scanner to pick up voice in the frequency that the subject's cordless telephone is on and hiding it just outside subject's home. Come back the next day and you have recorded his or her tel conversations. I hope this helps. -- Ralph Thomas, Director National Association Of Investigative Specialists ------------------------------ From: Old Salt Date: 22 Feb 1995 22:02:58 -0500 (EST) Subject: Re: Cordless Phone Privacy There is no secrets or so call teckniques to listen into cordless phones. You just punch in the Freqs for them into the scanner. BTW, they are: Base Handset 46.610 49.670 46.630 49.845 46.670 49.860 46.710 49.770 46.730 49.875 46.770 49.830 46.830 49.890 46.870 49.930 46.970 49.970 Also, yes I now belive it is agaist the law to listen in on them now. But as most people in this hobby feel, it you are trasmiting a radio freq into my house, I have a right to listen to it. After all Congress once stated that the air waves belong to all the people. Now that they have changed there mind, a lot of us feel it is wrong to take that right away from us. Besides if some one is talking (trasminting) over a radio (no matter if it looks like a phone) you should expect that others are listening in. -------------------------------------------------------------------------- | Old Salt |But even if I am unskilled in speech,| | old-salt@li.net |I am not in knowledge.... 2 Co 11:6 | |----------------------------------|-------------------------------------| |"Freedom's just another word for nothing left to lose" sung by J. Joplin| -------------------------------------------------------------------------- ------------------------------ From: Robert Ellis Smith <0005101719@mcimail.com> Date: 23 Feb 95 16:38 EST Subject: Electronic Footprints Taken from Privacy Journal, February 1995: ELECTRONIC FOOTPRINTS FOUND AT HARVARD Seven graduate students and 21 undergraduates using the computer system at Harvard were shocked last month to discover that the system permitted other users to see a list of names that showed they had downloaded pornography. "That's very embarrassing, I had no idea," said one student after the student newspaper, The Harvard Crimson, revealed the peculiarity of the system. "Oh my God," said another, who teaches a large class at the university. Apparently the transmission of electronic mail and the transfer of files from the Internet was regularly recorded in a public log in the system, which is used throughout the university by faculty and students. The system operator moved to close the access immediately. He said that the UNIX operating system for the university was never intended to provide secure transactions. ------------------------------ From: John Shaw Date: 24 Feb 1995 14:57:46 -0800 Subject: Keeping Tabs on Taxpayers Organization: Computer Users Information Exchange The following report appeared in a recent issue of Cybernautics Digest. ************************* Keeping Tabs on Taxpayers ************************* Uncle Sam is upgrading his computer to keep better tabs on you, according to Frank Greve in "IRS plans know-all database on you" (The Seattle Times, Jan. 20, 1995, pp. A1, A12). Greve, of Knight-Ridder Newspapers, reports that an $8 billion IRS computer and software upgrade will enable the agency to compile detailed financial reports on citizens by gathering electronic information from credit reports, news stories, tips from informants, commercial databases, and real-estate, motor-vehicle and child-support records. The upgrade, due to be completed in 2008, is designed to enable the IRS to catch more crooks and, someday, gather enough information to eliminate the need for most tax returns. Coleta Brueck, the IRS's top document-processing official explains in the article how the system would work: "If I know what you've made during the year," Brueck says, "if I know what your withholding is, if I know what your spending pattern is, I should be able to generate a tax return so that I only come to you and tell you, 'This is what I think you should file for the next year, and if you agree to that, then don't bother sending me a piece of paper.'" Greve reports that consumer advocates, not surprisingly, are appalled at the scope of the information to be gathered and fear the data collected may be misused by authorized and unauthorized personnel. --------------------------------------------------------------------- This story is republished with permission from the March 1995 Cybernautics Digest, a monthly summary of reports about converging information technologies. (Contact: Terry Hansen, Cybernautics Digest, c/o KFH Publications Inc., 3530 Bagley Ave. N., Seattle, WA 98103; 206-547-4950; Fax: 206-547-5355; E-mail: cybernbf@cuix.pscu.com. U.S. subscription rate: $24; $2 sample issue. Or visit us on the World Wide Web at http://www.pscu.com) -------------------------------------------------------------------- ------------------------------ From: Zachary Uram Date: 25 Feb 1995 00:28:21 -0500 (EST) Subject: Security Programs Hello! I have seen a lot of security programs/scripts that can be installed for account safety, but so far all of them require you to be root or su. Do you know of any programs that a regular user could install without going through sysadmin? anything? or can u point me to an ftp site? program names? thanx, Zach ------------------------------ From: wicklund@Intellistor.COM (Tom Wicklund) Date: 24 Feb 95 11:01:36 MST Subject: Use of Mailboxes Christopher Zguris <0004854540@mcimail.com> writes: I thought it was _illegal_ to put anything in someone's mailbox! Private delivery companies can't put magazines in private mailboxes because it's against the law and the post office will sue them into the stone age. How does a campus post office get away with fiddling with private mail? Probably the same way that companies can put internal mail in an employee's mail slot. The post office consider's the mail's address to be the university (or perhaps some building on campus). Any further sorting and distribution is internal to the campus, so doesn't fall under post office regulations. This also means that your campus mailbox isn't technically a mailbox under postal regulations, which may have other implications. ------------------------------ From: "Prof. L. P. Levine" Date: 26 Feb 1995 09:10:38 -0600 (CST) Subject: Use of Mailboxes Organization: University of Wisconsin-Milwaukee After reading the questions about University Dormatory Postoffices I checked with the managers of the University of Wisconsin-Milwaukee's Sandberg Hall dormatories and asked about how they handle mail. I was informed that they know about no applicable rules for mail handling, the US Post office considers Sandberg Hall to the destination address. The managers there assign a permanent mailbox number to a student who keeps that box number as long as s/he remains in a dorm room. Mail addressed to a box is deposited in the box only if the name matches the current owner otherwise it is moved to a bin for forwarding to a previous owner if possible. As a direct result of this students can not set up aliases within the box such as a normal postal user can; for example, I believe that all mail addressed to my home with any name reaches my mailbox. I discussed this with the managers. They knew about this problem and agreed that it was a weakness, but pointed out that this was the only control they exercized; all mail addressed to the user was delivered with no additional impositions. I also came to realize that the US Post Office also checks my incoming home mail stream. When my son left our home to take on his own life he could have given the US Post Office a change of address card that would have directed them to read envelopes directed to my home and forward those addressed to his name to his new address. These actions are identical to what the Campus Post Office does, except that the default is to post an unknown name in the case of the US Post Office and to reject an unknown name in the case of the Campus Post Office. -- Leonard P. Levine e-mail levine@cs.uwm.edu Professor, Computer Science Office 1-414-229-5170 University of Wisconsin-Milwaukee Fax 1-414-229-6958 Box 784, Milwaukee, WI 53201 PGP Public Key: finger llevine@blatz.cs.uwm.edu ------------------------------ From: rthomas007@aol.com (RThomas007) Date: 26 Feb 1995 17:06:28 -0500 Subject: Re: What Does City Hall Have about Me? Organization: America Online, Inc. (1-800-827-6364) You will just be shocked at what they do have. Actually the bulk of records on your will be found at the county courthouse level. Let us start with vital stastics (birth and death records). YOur name, DOB and parents. Next comes vehicle registration. Your name, address, type of car. Next comes marriage license. Who you married, when, you married you. If you have any civil records or criminal records these will also be found at courthouse. If you open a business, they have a record of that. If you purchase real property they have details on that. If you register to vote, they have those records. Hope this helps. You might want to obtain copies of books such as HOW TO FIND ANYONE ANYWHERE and CHECK HIM OUT. These are books that show you how to search such records. You can obtain a copy of 400 of these types of books by contacting Investigative Publications, POB 33244, Austin, texas, 78764. Phone 512-719-3595 Fax 512-719-3594. -- Ralph Thomas, Director National Association Of Investigative Specialists ------------------------------ From: Sarah Holland <70620.1425@compuserve.com> Date: 26 Feb 95 14:49:30 EST Subject: Jailed for Free-Net Message Interesting article appeared in the paper, thought it might be of interest to Privacy Digest & Risks Digest. >From the Prince George Citizen, February 20, 1995 - Free-Net message results in lock-up by Leonard Stern Ottawa Citizen When two police officers showed up Jan 24 at the car dealership where Ken Scott-Humphrey worked, the newly employed salesman had no idea they were coming for him. Later, because his colleauges were looking on, Scott-Humphrey, 49, thanked the officers for not using handcuffs when they took him away. "I must be the only person ever to have gone to jail for posting a notice on Free-Net," he says, still bewildered over an ordeal which included three weeks in jail and the loss of his job. A few days earlier, he had posted a question through National Capital Free-Net [snip]. Scott-Humphry e-mailed his message to a discussion group for antique gun collectors who don constumes on weekends and fire old-fashioned black powder weapons. His asked where to buy a particular kind of gun powder and bullets. The arresting officers told Scott-Humphry only that his parole had been suspended. Two years ago, the former bus driver was convicted of conspiracy to import hashish. The RCMP, he was told the next day, saw his query about gun powder, and because the message mentioned a gun show in Syracuse, N.Y., mistakenly inferred that Scott-Humphry had visited the United States, a parole violation. [snip] Waiting for him when he got out of jail three weeks later was a letter of dismissal from his employer. [snip] {article goes on to mention that he posted the message for a friend, that the message was public rather than private) Sgt. Craig Hannaford of the RCMP technological crimes section said there's no program to systematically monitor electronic discussion groups, although the RCMP is aware of certain groups such as those that exchange information about how to commit crimes. [snip] Scott-Humphry's lawyer suggested Correctional Services was over-zealous. "They might have had another option, to speak with him first. Their decision to suspend his parole has had a dramatic effect on his life." [snip] And yes, [Scott-Humphry] will continue to cruse the information highway. So far, he's received eight responses to his question about gun powder. ------------------------------ From: Heathen Date: 27 Feb 1995 12:22:53 -0600 (CST) Subject: SS Number at College Here at Washburn University in Topeka, students must use their social security numbers for everything to enrolling, writing a check, applying for schoarships and jobs, to purchasing food in the union. I am a bit nervous about so many copies of my number floating around. Is there anything I can do about this? -- John fruit fruitjoh@acc.wuacc.edu ------------------------------ From: wmcclatc@gmu.edu (Bill McClatchie) Date: 24 Feb 1995 17:15:05 -0500 Subject: SS Number in Business Many states have laws regarding what merchants may or may not require for check acceptance. In Pennsylvania, merchants may require phone number, address, driver's license number or other forms of identification. They may also seek a major credit card and may record the name of card issuer and expiration date. Merchants aren't required to accept any personal check. They may not record a credit card number as a condition for accepting a personal check. In Virginia, and Maryland, a retailer can request any reasonable information to garraunttee that they will be able to collect if your check bounces. This includes things like your name, address, phone number, drivers license number, and possibly a credit card. They are also allowed to record this information on the check at the time of the transaction. A merchant can require a credit card as a form of identification before accepting a check. For credit cards, a valid card and signature only, according to Pennsylvania's new credit card law. All states allow for a second form of ID to be asked for to verify that the purchaser is really entitled to use the card. If it is not your card, the merchant can ask for proof that you do have the right to use it (say a parent loans a child the credit card). In most states if a credit card has been approved, and a verification number issued, then you only need to sign the credit slip. This is becuase payment has been gaurnateed to the merchant when the identification number was issued. However, in every state, if you use a credit card to pay for a good or service and the merchant is unable to get a verification number, some other information can be asked for - such as phone numbers, addresses, and drivers licences. Since there is no gaurantee of payment, the merchant needs to have some way to collect if the card turns out to be bad for some reason. -- Bill McClatchie wmcclatc@gmu.edu ------------------------------ From: Jim Silvania Date: 26 Feb 1995 15:11:47 -0500 (EST) Subject: Braindead In Cyberspace Brain Dead in Cyperspace By: Jim Silvania The demise of America's number one cyperthief, Kevin Mitnick, The Condor, has been widely reported. Discussions among Internet users regarding Mitnick's arrest have led to some interesting revelations. There appears to be a growing fear by Internet computer users that Mitnick (sometimes referred to as the "Hannibal Lector of hacking"), or other cyperpunks with modems, could somehow gain access to their private computer system and reek havoc by stealing their secrets or implanting an information consuming virus. The possibility exists but even more of a threat is someone surreptitiously entering your home or business and walking off with your hard drive and thereby rendering your business brain dead. Medical shows (such as ER and Chicago Hope) have once again become popular with TV viewers. Would I be revealing my age if I stated I can remember watching Ben Casey, M.D. and Dr. Kildare? In all of the previous mentioned medical shows one scene always portrayed is that of a patient lying in a hospital bed hooked up to a visual monitor. One soon learned that at some point during the show the lines on the monitor went flat causing the monitor to sound an alarm and thereby sending the staff into a controlled "Code Blue" panic. In the older television dramas, the doctor would rush to the rescue and save the dying patient. In the newer TV dramas, the viewers have learned that if the lines on the monitor remain flat, the patient dies. The patient is labeled "brain dead" and all bodily functions cease. I am now involved in an investigation of another theft or a lobotomy of a business entity. Again an uncommon thief has entered a business and removed or stolen the computer's hard drive. The hard drive contained the business' customer list. In one of the more recent cases, not only did the perpetrator steal the hard drive, he/she also stole the taped backup which was located next to the hard drive and, of course, plainly marked "backup". The thieves in these past instances did not gain access to the business' secrets via the use of a modem or the process of hacking. The acts of these criminal s were committed as easily as the professional shoplifter who steals from the neighborhood discount store. The investigation into the theft of a hard drive becomes a horse of a different color. The street cop who is dispatched to the business to take the theft report views the whole affair as just a minor theft of computer hardware that can be easily replaced by submitting an insurance claim. The investigating detective with a stack of 100 reports on his desk views the matter in the same light. What neither law enforcement officer realizes is that the actions of the perpetrators amount to more than just a theft. Their actions amount to murder. The lines on the monitor monitoring your business have gone flat. The alarm should be sounding a "Code Blue" because your company is now "brain dead". The motivations of such thievery can be inclusive of espionage, subversion, competitor intelligence or just a disgruntled employee seeking revenge. Here are some tips on preventing your business from becoming "brain dead": 1. Secure your hard drive, preferably with a lock and key. 2. Pass wording doesn't cut it. If your hard drive is stolen, it can be booted by a floppy disk or simply mounting your hard drive into a new computer. 3. Secure your backup. It belongs someplace else other than next to your computer. -- Jim Silvania silvania@ohionet.org Porter,Wright,Morris & Arthur Columbus, OH ------------------------------ From: rthomas007@aol.com (RThomas007) Date: 26 Feb 1995 17:08:20 -0500 Subject: Investigative Catalog Organization: America Online, Inc. (1-800-827-6364) Here is a little tidbit that will be of interest. A company in Austin, Texas publishes a catalog of over 400 books and manuals on subject such as hot to conduct background investigations, how to investigate by computer, physical surveillance, electronic surveillance, locating missing persons. The catalog also features spy gear and online information sources. They want $5.00 for a 50 page catalog. Contact is TIPI, PO Box 33244, Austin, Texas, 78764. Phone 512-719-3595 fax 512-719-3594. ------------------------------ From: reichard@mr.net (Kevin Reichard) Date: 26 Feb 1995 17:00:35 Subject: Re: The National Computer Security Organization Organization: Minnesota Regional Network "(NCSA) Bob Bales" <74774.1326@compuserve.com> writes: Thank you for your interest in the National Computer Security Association (NCSA). Isn't it really confusing to use the NCSA moniker in light of Mosaic? People will assume more legitimacy for this outfit than it deserves, since it sounds like a front for this guy's consulting firm. -- Kevin Reichard reichard@MR.net 1677 Laurel Av. Cserve: 73670,3422 St. Paul, MN 55104 ------------------------------ From: Privacy Rights Clearinghouse Date: 27 Feb 1995 17:03:16 -0800 (PST) Subject: Compuserve Sued for Delivering "Junk E-Mail" Robert Arkow, a Compuserve subscriber, is suing the service for delivering two unsolicited advertising e-mail messages to his mailbox on December 21, 1994. The suit, believed to be the first of its kind, challenges the right of advertisers to deliver so- called "Junk E-Mail" under the Telephone Consumer Privacy Protection Act of 1991 (TCPA). Arkow argues that the TCPA prohibits the automated calling of "any service for which the calling party is charged for the call." Also named in the suit is Compuserve Visa, the business responsible for the ads. The TCPA provisions are aimed at automated dialers, machines that call homes and deliver recorded sales pitches. The law also prohibits unsolicited fax advertisements. The question will be "How similar is junk E-Mail to recorded telemarketing calls or unsolicited fax ads?" -- Barry D. Fraser fraser@pwa.acusd.edu Online Legal Research Associate Privacy Rights Clearinghouse prc@pwa.acusd.edu Center for Public Interest Law telnet teetot.acusd.edu University of San Diego login: privacy Privacy Hotline: 619-298-3396 BBS: 619-260-4789 In California: 800-773-7748 host: teetot login: privacy ------------------------------ From: jwarren@well.sf.ca.us (Jim Warren) Date: 24 Feb 1995 00:03:08 +0800 Subject: Re: New Hires SSN into National Database Sen. Bill Bradley (D-NJ) said about S.456 which was introduced on 16-Feb-1995: "This bill requires information on every new hire to be filed in a national database, which States can regularly search for the names or Social Security numbers of parents who owe support to children in their States." The bill is "The Interstate Child Support Responsibility Act" I incorrectly alleged: This child-support pursuit was the same rationale used by California's then-state Senator Becky Morgan in mandating that SS numbers must be on drivers' licenses. Here's the *correct* dope: Chris Hibbert wrote: The SSN is required on CA DL applications. It does not appear on the card, or in the magnetic stripe on the back. There's enough unused space on the mag stripe that it would fit, but the DMV has no plans to add it. At the Senate Judiciary committee hearing we attending on the Privacy act of '93, the head of the committee told the head of the DMV (Zolin?) that the SSN would *never* be allowed to appear on the card. My apologies. I *knew* I'd be wrong about something someday. :-) However, I certainly wouldn't trust 'em to "never" do it. Sounds too much like their promise never to issue traffic citations merely for not wearing your seatbelt - which promise lasted for about a year after the passed the hotly-contested mandantory seatbelt law. -- jim ------------------------------ From: Privacy Rights Clearinghouse Date: 27 Feb 1995 16:54:10 -0800 (PST) Subject: Proposed FTC Rules Could Reduce Telemarketing Abuses The Federal Trade Commission (FTC) has proposed a set of rules which would ban many deceptive or abusive telemarketing sales practices. Although there has been very little publicity about this rulemaking, it could severely restrict telemarketing activity and substantially cut down on those annoying sales calls that always seem to come at the wrong time. It would also provide a strong deterrent to scam artists. The FTC is seeking public comment over the next several weeks on the proposed rules. A copy of the proposal can be obtained by calling 202.326.2222. The actual text is very long (120 pages), so interested persons might request a press release which explains the rules in some detail. I'm not aware of any online availability of these materials. Under the proposed rules, telemarketers would have to tell consumers at the beginning of each call that it is a sales call and provide the name of the seller. The rule would prohibit telemarketing calls before 8 a.m. or after 9 p.m. Telemarketers offering credit or loans, credit repair services, or assistance to consumers in recovering lost money from prior telemarketing schemes, would be prohibited from seeking payment until the services have been rendered. Additionally, telemarketers would be required to disclose all material information about any offer made to a consumer, and would be required to obtain signed acknowledgement of written disclosure regarding all prize-promotions and investment offerings before seeking any payment. These disclosures must include information about the retail price of all prizes, odds of winning, costs of obtaining any prize, and the "No purchase necessary to win" statement. The proposed rules also prohibit a variety of specific misrepresentations, including that a person was selected to receive a prize, that the telemarketer is affiliated with a government entity, or that the telemarketer can improve credit records or obtain loans for customers regardless of credit record. Also, telemarketers would be prohibited from calling consumers more than once every three months to sell the same thing, and calling consumers who have stated that they do not want to be called by the telemarketer. Violations of the proposed rule could result in civil penalties of up to $10,000 per violation. There will likely be strong resistance from the telemarketing industry to these regulations, and attempts to weaken the proposed rules. Written comments in support of the rules may be submitted to the FTC, Office of the Secretary, Room 159, Washington D.C. 20580, and should be captioned "Proposed Telemarketing Sales Rule." The FTC requests that the comments also be submitted on disk, preferably in a DOS word processer format, or as a text file. BTW, the Privacy Rights Clearinghouse has a free publication entitled "Telemarketing: Whatever Happened to a Quiet Evening at Home?" that provides tips on cutting down on sales calls. The document is available via gopher at gopher.acusd.edu; ftp at teetot.acusd.edu cd pub/privacy; WWW at http://www.manymedia.com/prc/; or e-mail this address for a copy. -- Barry D. Fraser fraser@pwa.acusd.edu Online Legal Research Associate Privacy Rights Clearinghouse prc@pwa.acusd.edu Center for Public Interest Law telnet teetot.acusd.edu University of San Diego login: privacy Privacy Hotline: 619-298-3396 BBS: 619-260-4789 In California: 800-773-7748 host: teetot login: privacy ------------------------------ From: "Prof. L. P. Levine" Date: 29 Dec 1994 10:50:22 -0600 (CST) Subject: Info on CPD [unchanged since 12/29/94] Organization: University of Wisconsin-Milwaukee The Computer Privacy Digest is a forum for discussion on the effect of technology on privacy or vice versa. The digest is moderated and gatewayed into the USENET newsgroup comp.society.privacy (Moderated). Submissions should be sent to comp-privacy@uwm.edu and administrative requests to comp-privacy-request@uwm.edu. This digest is a forum with information contributed via Internet eMail. Those who understand the technology also understand the ease of forgery in this very free medium. Statements, therefore, should be taken with a grain of salt and it should be clear that the actual contributor might not be the person whose email address is posted at the top. Any user who openly wishes to post anonymously should inform the moderator at the beginning of the posting. He will comply. If you read this from the comp.society.privacy newsgroup and wish to contribute a message, you should simply post your contribution. As a moderated newsgroup, attempts to post to the group are normally turned into eMail to the submission address below. On the other hand, if you read the digest eMailed to you, you generally need only use the Reply feature of your mailer to contribute. If you do so, it is best to modify the "Subject:" line of your mailing. Contributions to CPD should be submitted, with appropriate, substantive SUBJECT: line, otherwise they may be ignored. They must be relevant, sound, in good taste, objective, cogent, coherent, concise, and nonrepetitious. Diversity is welcome, but not personal attacks. Do not include entire previous messages in responses to them. Include your name & legitimate Internet FROM: address, especially from .UUCP and .BITNET folks. Anonymized mail is not accepted. All contributions considered as personal comments; usual disclaimers apply. All reuses of CPD material should respect stated copyright notices, and should cite the sources explicitly; as a courtesy; publications using CPD material should obtain permission from the contributors. Contributions generally are acknowledged within 24 hours of submission. If selected, they are printed within two or three days. The moderator reserves the right to delete extraneous quoted material. He may change the SUBJECT: line of an article in order to make it easier for the reader to follow a discussion. He will not, however, alter or edit or append to the text except for purely technical reasons. A library of back issues is available on ftp.cs.uwm.edu [129.89.9.18]. Login as "ftp" with password identifying yourid@yoursite. The archives are in the directory "pub/comp-privacy". People with gopher capability can most easily access the library at gopher.cs.uwm.edu. Mosaic users will find it at gopher://gopher.cs.uwm.edu. Older archives are also held at ftp.pica.army.mil [129.139.160.133]. ---------------------------------+----------------------------------------- Leonard P. Levine | Moderator of: Computer Privacy Digest Professor of Computer Science | and comp.society.privacy University of Wisconsin-Milwaukee | Post: comp-privacy@uwm.edu Box 784, Milwaukee WI 53201 | Information: comp-privacy-request@uwm.edu | Gopher: gopher.cs.uwm.edu levine@cs.uwm.edu | Mosaic: gopher://gopher.cs.uwm.edu ---------------------------------+----------------------------------------- ------------------------------ End of Computer Privacy Digest V6 #022 ****************************** .