Date: Fri, 05 May 95 14:16:38 EST Errors-To: Comp-privacy Error Handler From: Computer Privacy Digest Moderator To: Comp-privacy@uwm.edu Subject: Computer Privacy Digest V6#043 Computer Privacy Digest Fri, 05 May 95 Volume 6 : Issue: 043 Today's Topics: Moderator: Leonard P. Levine Re: ID Microchip Re: ID Microchip Re: ID Microchip Re: ID Microchip Re: ID Microchip Privacy of Tax Files Databases, Especially Medical Fear of Surfing Just how secure *is* public key encryption? Mr. Orwell Would be Proud Re: Could What You Post be Used to Profile You? Re: California Digital Signature Bill Bacard's Privacy Book, Kapor's Intro Info on CPD [unchanged since 12/29/94] ---------------------------------------------------------------------- From: MVanAuken@UH.edu (Michael Van Auken) Date: 03 May 1995 09:00:09 -0500 Subject: Re: ID Microchip Organization: University of Houston, Information Services eg350aaf@csulb.edu (Sharlene MacKay) wrote: Recently, I heard about an identification microchip for pets. The chip is implanted under the pet's skin and is used to identify lost animals. Since it is in use for pets, I was wondering if anyone had thought about the idea of using a similar type chip for humans?? It has been thought of. There are even designes that can be monitered from significant distances. One suggested use was for the prevention of gang activity. The transponders would be installed in "gang members". If sensors detected a gathering of the implanted persons, police could be dispached to prevent any trouble. Another example of the technology is in traffic monitoring (and automatic toll payment). For this, a card containing the transponder is placed in a vehical (on a volunteer basis). Each card has a unique signature. Sensors placed along the freeways can detect individual cards, and use the data to plot traffic patterns, etc. The same card is used for automatic toll payment. In this case, accounts are maintained on a computer. When a card is sensed passing through a toll plaza, the appropriate ammount is deducted from the account. Examine: http://herman.tamu.edu/houston-real.html for an example this system put to use. -- Michael Van Auken | Einstein has overcome time and space. Harvey MVanAuken@UH.edu | has overcome not only time and space--but any 713/743-1502 | objections. ------------------------------ From: Maryjo Bruce Date: 03 May 1995 10:34:00 -0700 (PDT) Subject: Re: ID Microchip I have been hearing reports on the radio about the pet chips. It has been suggested that it would be good to put them in all American children as a way to prevent abductions. I remember when I was in library school taking a medical informatics class...a hospital employee mentioned the chips and said implanting them in the necks of the homeless and of prisoners had been discussed in some medically related forum. We did not pursue the discussion. -- Mary Jo Bruce, M.S., M.L.S. Paralegal ------------------------------ From: tye@metronet.com (Tye McQueen) Date: 03 May 1995 15:56:47 -0500 Subject: Re: ID Microchip Organization: Texas Metronet, Inc (login info (214/705-2901 - 817/571-0400)) eg350aaf@csulb.edu (Sharlene MacKay) writes: Recently, I heard about an identification microchip for pets. The chip is implanted under the pet's skin and is used to identify lost animals. Since it is in use for pets, I was wondering if anyone had thought about the idea of using a similar type chip for humans?? Any thoughts.... According to "the news", some "right-wing extremist groups" believe that "the government" (of the USA) is already implanting exactly those things into babies at hospitals so they can "take over". By the way, I first heard of these being used to track Salmon. I don't think it is a "chip", but more like a short piece of wire magnetically encoded with a serial number that can be read at a short distance. The technology allows fish to be individually identified when they pass through a detector built into a "fish ladder" (which allows the Salmon to head up stream despite the presence of a dam). The device is very easy to insert (about like getting a hypodermic injection). I don't think the range is very far so, for example, if "the government" tagged us all in the feet, a set of floor censors could probably identify anyone walking through a specific door (remember, always enter government buildings walking on your hands!). -- Tye McQueen tye@metronet.com || tye@doober.usu.edu Nothing is obvious unless you are overlooking something ------------------------------ From: wjwinn@kocrsv01.delcoelect.com (Bill Winn) Date: 04 May 1995 09:59:31 -0500 Subject: Re: ID Microchip eg350aaf@csulb.edu (Sharlene MacKay) stated/asked Recently, I heard about an identification microchip for pets. The chip is implanted under the pet's skin and is used to identify lost animals. Since it is in use for pets, I was wondering if anyone had thought about the idea of using a similar type chip for humans?? While an undergraduate at Purdue University in 1988 I took an ethics course from Professor Eugene Spafford (Spaf). During this course we discussed the ability to place a microchip under the skin of people. The chip could do much more than identify lost people, however... One seemingly innocuous use for the chip would be to place the chip under the skin of children. This implanted chip would have a transponder in it. In the event that a child with a chip implant was kidnapped, law enforcement could merely search for that chip's signal. The abuse for this technology is obvious... As a related aside, the media has reported that several far right-wing groups fear that the new chicken pox vaccine actually a plot by the U.S. Government to implant transponder chips in children. (NOTE: These claims are unfounded.) Reminds me of the John Birch Society's stance on the addition of flouride to water (they thought it was for mind control). -- Bill Winn Software Engineer - Analysts International Corporation ------------------------------ From: ahipc1j.dpeer01@eds.com (Don Peer) Date: 04 May 1995 16:50:22 GMT Subject: Re: ID Microchip Organization: EDS Sharlene MacKay said... Recently, I heard about an identification microchip for pets. The chip is implanted under the pet's skin and is used to identify lost animals. Since it is in use for pets, I was wondering if anyone had thought about the idea of using a similar type chip for humans?? - Implant alzheimer's patients to aid runaway recovery/amnesia identification. - Implant everyone for faster check cashing :) - Merge with GPS (Global Positioning System) to track criminals on parole. -- -------------------------------------------------------------------------- | Still thinking up the perfect .sig | Don Peer | | | ahipc1j.dpeer01@eds.com| | | dpeer01@winternet.com | -------------------------------------------------------------------------- ------------------------------ From: Maryjo Bruce Date: 03 May 1995 10:26:39 -0700 (PDT) Subject: Privacy of Tax Files The April 1995 (Volume 13, No. 8) issue of "Tax Savings Report" published by the National Taxpayers Union deals with the subject of the privacy of your tax records. This, btw, is a monthly newsletter of 8 pages. The cover article, "How private is your tax file?" by Ellen M. Katz, says "authorized employees at more than 200 federal, state and local government agencies, as well as certain foreign countries, are now privy to some information given to the IRS..." "....IRS is expanding its computer db to include even more financial information on citizens in an attempt to improve compliance." Info: Tax Savings Report is pub. for members 10x annually. NTU: 325 Pennsylvania Ave., S.E., Washington, D.C., 20003. NTU's central office: POB 747, Muscatine, IA 52761 -- Mary Jo Bruce, M.S., M.L.S. Paralegal ------------------------------ From: rcktexas@aol.com (Rcktexas) Date: 02 May 1995 16:54:38 -0400 Subject: Databases, Especially Medical Organization: America Online, Inc. (1-800-827-6364) DATABASES, ESP. MEDICAL Where do I get started in this topic with regard to databases, in particular medical databases: Where do I get a list of medical databases? How do I access them or get information about a client from them? Thanks for your assistance, -- rcktexas@aol.com ------------------------------ From: "Mich Kabay [NCSA Sys_Op]" <75300.3232@compuserve.com> Date: 04 May 95 06:30:35 EDT Subject: Fear of Surfing >From the Washington Post news wire via CompuServe's Executive News Service: WP 04/28 Advocates of Internet Fear Drive to Restrict ... Advocates of Internet Fear Drive to Restrict Extremists' Access By John Schwartz Washington Post Staff Writer It is still unclear whether Timothy James McVeigh or other Oklahoma City bombing suspects even own a modem. Still, lawmakers, law enforcement officials and the media have sounded alarms in recent days about the increasing use of telecommunications technology such as the Internet to spread messages of hate. "We know the advantage of the information highway, but there's the darker side, too, we need to be concerned about," said Sen. Edward M. Kennedy (D-Mass.) at a Senate Judiciary Committee hearing yesterday. Kennedy, holding a printout of what he called a "how-to manual for the terrorist" that a staff member had found on-line, said that so long as Congress was considering regulation of pornography on the Internet, "we ought to stop terrorism too." Key points from the article: o Internet activists shocked by liberal's attack. o Some advocates of a hands-off stance by government argue that the Internet, like any technology, can be used for good or ill. o "I wouldn't ask about terrorists using the Net any more than I'd ask if they use telephones, paper mail or smoke signals," said Andrew Kantor of Internet World Magazine. o According to Jack Rickard of Boardwatch Magazine, no more than 300 or so of about 65,000 BBSs are run by and for libertarian and paranoid groups. o Some political activists are attacking the Internet because of "a rising tide of on-line hate." o The author suggests, "The Clinton administration has long used the fear of terrorist attack to promote its proposals to limit the spread of encryption software.... o The Clinton administration and the director of the FBI are opposed by many, including Jerry Berman of the Center For Democracy: "We believe that it is absolutely protected by the First Amendment and is essential to the health of our democracy. We don't want to see the fact that people may use the Internet for ill purposes used as an excuse for limiting free speech." M.E.Kabay,Ph.D., Mgmt Consultant, LGS Group Inc. (Montreal, QC); Director of Education, Natl Computer Security Assn (Carlisle, PA) ------------------------------ From: "Christopher L. Barnard" Date: 04 May 1995 13:11:26 -0500 Subject: Just how secure *is* public key encryption? >From the Electronic Engineering Times, Mon Jan 16, 1995: "Parties Meet In Zimmerman Crypto Case - Lawyers to U.S.: halt PGP probe". (p1, cont. on p80) "In contrast, public keys allow the overt publication of an encryption key, because decryption keys can only be derived through a mathematiclly difficult process, such as large prime-number factoring. Contrary to popular belief, the NSA can decrypt public keys of most practical key sizes. However, the computer resources need to decrypt public-key- encrypted messages make it difficult for the NSA to perform broadband intercept and decryption if many end users use public-key encryption." +-----------------------------------------------------------------------+ | Christopher L. Barnard O When I was a boy I was told that | | cbarnard@cs.uchicago.edu / \ anybody could become president. | | (312) 702-8850 O---O Now I'm beginning to believe it. | | http://cs-www.uchicago.edu/~cbarnard --Clarence Darrow | | Cyber Rights Now: Accept No Compromise. | +----------PGP public key available via finger or PGP keyserver---------+ ------------------------------ From: "Christopher L. Barnard" Date: 04 May 1995 13:12:49 -0500 Subject: Mr. Orwell Would be Proud (Note- I received this part of this article from a friend of mine. I have not read the entire article...) >From the Electronic Engineering Times, Mon April 17, 1995: "Dataport: Coming-out party for NRO" by Loring Wirbel (p 104) [...] "The National Reconaissance Office, the multibillion-dollar spy-satellite agency that has been the subject of numerous tirades in this column, is coming out of the closet... On April 6, NRO director Jeffrey Harris gave a sneak preview when he appeared as a surprise keynoter for the National Space Foundation (NSF) annual conference and met with the press after his speech. [...] The communications intelligence that NRO performs for the National Security Agency, however, is still a taboo subject, at least in the details of systems currently deployed or on the drawing board. But Harris's general comments on how NRO can provide near-real-time 3D imagery and full communications intercept to any U.S. base on the planet gives some clues as to the agency's capability." [...] Harris said that the commercial world's concepts of broadband communcication, defined under the ATM/Sonet herirarchy, are a drop in the bucket to the US intelligence community. NRO has to deal with "Tbyte-miles per second" of information being relayed from satellites to ground locations, he said. This information must be filtered at ground processing stations and deployed at tactical bases fast enough to be useful to battle commanders. Since the decline of the Soviet Union, NRO has shifted much of its attention from strategic information on one adversayry to real-time monitoring of the entire planet, serving the Pentagon's Tencap (Tactical Exploitation of National Capabilities) program. The intelligence community is creating a secure equivalent of the Internet, complete with hypertext-linked Web site equivalents capable of handling large data file and isochronous information. Harris said that NRO, NSA and its partners plan to the only ones capable of real-time monitoring of the entire planet, since "information supremacy may well define the US as a superpower in the 21st Century." So don't ever think you're being overly paranoid - even if there's not enough analysts on the planet to pore over the take, you are being watched, continuously." +-----------------------------------------------------------------------+ | Christopher L. Barnard O When I was a boy I was told that | | cbarnard@cs.uchicago.edu / \ anybody could become president. | | (312) 702-8850 O---O Now I'm beginning to believe it. | | http://cs-www.uchicago.edu/~cbarnard --Clarence Darrow | | Cyber Rights Now: Accept No Compromise. | +----------PGP public key available via finger or PGP keyserver---------+ ------------------------------ From: horowitz@nosc.mil (Alan M. Horowitz) Date: 05 May 1995 01:47:59 GMT Subject: Re: Could What You Post be Used to Profile You? Organization: NCCOSC RDT&E Division, San Diego, CA Profiling someone by their published statements. IT's a traditional method of forensic journalsism and of military-political intelligence organs. It's older than the hills. ------------------------------ From: kec@stubbs.ucop.edu Date: 03 May 95 17:21:07 PDT Subject: Re: California Digital Signature Bill Organization: University of California, Berkeley writes: For now, further explanation of the point as to "versions of the same bill" would be helpful. The California bill was based on a model that is being worked on by a national lawyer's group whose name I cannot find, but when I asked for more info I was sent this by Michael Baum, who has been working on the topic: **NEW INFO. SECURITY BOOK ON PUBLIC KEY LAW & POLICY** TITLE: FEDERAL CERTIFICATION AUTHORITY LIABILITY AND POLICY -- Law and Policy of Certificate-Based Public Key and Digital Signatures AUTHOR: MICHAEL S. BAUM, J.D., M.B.A. Independent Monitoring Report No. NIST-GCR-94-654 U.S. DEPARTMENT OF COMMERCE National Institute of Standards and Technology Produced in support of the Federal Government's public key infrastructure study, this book identifies diverse technical, legal and policy issues affecting a certificate-based public key cryptographic infrastructure utilizing digital signatures supported by "trusted entities." It examines potential legal implications, surveys existing legal paradigms and the structures and roles of relevant governmental agencies and presents various institutional approaches to controlling liability. It considers the underpinnings of a legal and policy framework which might serve as a foundation for security policies and their implementation and concludes with a series of recommendations, both general and specific concerning certificate-based public key. Both public and private sector issues are addressed. This publication is the result of legal, business and security management research, as well as interviews and analysis predominantly with public- and private-sector lawyers, policy makers, managers and management information system and security professionals in the United States and abroad. SUMMARY OF CONTENTS: - PREFACE - ACKNOWLEDGMENTS - TABLE OF CONTENTS I. INTRODUCTION II. SCOPE III. DEFINITIONS IV. ASSUMPTIONS V. SURVEY OF FCA ACTIVITIES CREATING LIABILITY EXPOSURE VI. LEGAL CONSIDERATIONS VII. FCA INFRASTRUCTURE - PROPOSALS AND PARADIGMS VIII. SURVEY OF, AND APPROACHES TO, TRUSTED ENTITY LIABILITY IX. OTHER APPROACHES TO MITIGATE LIABILITY X. CONCLUSIONS AND RECOMMENDATIONS XI. APPENDICES XII. GLOSSARY XIII. INDEX OBTAINING COPIES: Copies may be purchased through the National Technical Information Service, Springfield, Virginia 22161, U.S.A., Phone +1 (703) 487-4650 or 1-800-553-6847. Request NTIS Document No: PB94-191-202. [ISBN 1-886843-00-7] Cost: $61.00 ABOUT THE AUTHOR: Michael S. Baum is Principal of Independent Monitoring, a consultancy focused on electronic commerce and information security law. He serves as a Delegate from the International Chamber of Commerce (ICC) to the United Nations Commission on International Trade Law (UNCITRAL); Chair of the EDI and Information Technology Division, Section of Science and Technology, American Bar Association (ABA) and its Information Security Committee; and Chairman of the ICC Working Party on Legal Aspects of Electronic Commerce. Michael S. Baum Independent Monitoring Cambridge, Massachusetts USA Net: baum@im.com 450+ pages, highly annotated; multiple appendices; indexed. =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=- =-=-= ------------------------------ From: murraypk@crl.com (Murray Peck) Date: 05 May 1995 00:40:07 -0700 Subject: Bacard's Privacy Book, Kapor's Intro Organization: CRL Dialup Internet Access (415) 705-6060 [Login: guest] Andre Bacard's "Computer Privacy Handbook" A Book Review Written by Murray Peck I highly recommend Andre Bacard's new book for anyone who cares about privacy. Bacard argues that our "Information Age" has a flip side, namely the "Surveillance Age." With both funny and scary examples, Bacard illustrates how everyone is at risk because of "data sharks" (people, corporations, and governments) who trade our personal secrets for their gain. He devastates the knee jerk reaction "Whatsamatter, I've got nothing to hide." Bacard's earlier book, "Hunger for Power: Who Rules the World and How," prepared him for a fresh view of cyberspace. In "Computer Privacy Handbook," Bacard tells how his meetings with John Markoff, John Perry Barlow, Phil Zimmermann, Jim Warren, Mitchell Kapor and other cyberspace leaders led him to see the connections between political power and computer privacy. Very interesting story... The book is divided into four main parts: * An Overview of Surveillance * Cryptology * An Overview of PGP * A User-friendly Manual for PGP * Pro-privacy Resources "Computer Privacy Handbook" covers many topics, including Clipper Chip, Digital Telephony, Pretty Good Privacy, Anonymous Remailers, and DigiCash. Two of my favorite sections were Bacard's analysis of the cash-free society and the psychology of privacy. The book is clearly written with colorful anecdotes. Bacard gives much praise to EFF (Electronic Frontier Foundation), EPIC (Electronic Privacy Information Center), and CPSR (Computer Professionals for Social Responsibility). These groups must be thrilled by the "Computer Privacy Handbook". As for my criticism... In the next edition, I hope Bacard will tell American readers what we can learn from pro-privacy movements in other countries. I'd also like him to speculate about future technologies. Here is Mitchell Kapor's Introduction to "Computer Privacy Handbook." Also I'm including a press release that Bacard sent me when I told him I was writing this review. Introduction to "Computer Privacy Handbook" by Mitchell Kapor Co-Founder, Electronic Frontier Foundation Creator of Lotus 1-2-3 Issues of privacy are very much on the minds of those migrating to the wild new regions of the domain we call Cyberspace. What many of us seek in picking up stakes and heading for the electronic frontier is greater overall self-determination in life. This is impossible without being able to control information by and about us. This is the heart of privacy. Privacy is both a matter of right and of practice. It is a fundamental premise of this country's founding that rights of life, liberty, and the pursuit of happiness are inalienable. The Electronic Frontier Foundation, of which I am a founder, is deeply involved in Washington in the fight to make sure rights such as privacy, as well as freedom of expression, are not abridged in Cyberspace. I am deeply troubled by the profound resistance of certain agencies of the U.S. government to see this matter through to its proper conclusion. This does not mean we give up the fight to make public policy which increases our privacy and our freedom. Far from it. It only makes us redouble our efforts. At the same time, it does remind us that we have to look beyond Washington to solve our problems. Mere talk is not enough. When government is unable to respect the rights of individuals and stands in the way of those rights, direct action is required. Fortunately, powerful, readily available new tools like PGP have been created to put control of privacy much more directly in the hands of the citizens of Cyberspace themselves. Andre Bacard's "Computer Privacy Handbook" is an invaluable guide to both the whole subject of privacy on the net, the politics of privacy, and, most important, to the practical steps one can take right now. ********** Begin Press Release ********** Peachpit Press Print Media Contact: 2414 Sixth Street Trish Booth Berkeley, CA 94710 Gary-Paul Prince Phone (800) 283-9444 or (510) 548-4393 Broadcast Media Contact: Fax (510) 548-5991 Hannah Onstad THE SCARIEST COMPUTER BOOK OF THE YEAR "Andre Bacard's "Computer Privacy Handbook" is an invaluable guide to both the whole subject of privacy on the net, the politics of privacy, and, most important, to the practical steps one can take right now." Mitchell Kapor, Creator of Lotus-1-2-3, Co-founder of the Electronic Frontier Foundation "Bacard's ruthlessly realistic but optimistic book explains the privacy dangers that YOU face and what YOU can do to protect yourself!" Jim Warren, Founder of "InfoWorld", Founder of Computer, Freedom and Privacy Conferences March 1995, Berkeley, CA. Criminals, competitors (anyone, in fact) can buy a person's IRS forms for $500. An individual's medical records are available to complete strangers. TV star Rebecca Schaffer was shot to death by a computer stalker. These are just some of the horrifying examples of invasions of privacy that author Andre Bacard points out in his new book, "The Computer Privacy Handbook: A Practical Guide to E-Mail Encryption, Data Protection, and PGP Privacy Software." We live in the Age of Electronic Surveillance, Bacard says, and snooping happens. Given that millions of e-mail messages are exchanged daily, and the Internet buzzes with zillions of bites of online discussions each day, it's easy to see how this could be. But just as computers are part of the problem, they are also part of the solution. Bacard details how individuals can safeguard their electronic privacy using good encryption, proper data protection, and the right software. "Computer Privacy Handbook" shows how computers threaten YOUR personal security, and it gives YOU the practical tools to reassert YOUR privacy! In this book, find out: * Who is Selling Your Secrets * How Computers Help Snoops * The Dangers of a Cash-Free Society * How Big Brother Wants to Monitor ALL Telecommunications * Why E-Mail Can Be Terribly Unsafe * What to do with Your Social Security Number * The Advantages of Anonymous Remailers * How to Protect Yourself with Encryption * The Best Usenet News Groups for You to Visit * Where to Find Expert Privacy Activists "Computer Privacy Handbook" also contains a user-friendly manual for PGP software. PGP ("Pretty Good Privacy") is a top-rate program to protect your personal and business data files and e-mail from snoops! PGP is the de facto world standard for e-mail privacy. Author Andre Bacard, who also wrote "Hunger for Power: Who Rules the World and How," has a wide-angle view of society. He has written about technology and society for numerous publications. A guest on hundreds of radio talk shows, he was judged one of the best public speakers in America by the International Platform Association. ============================ Price $24.95 Size 274 pages; 7"x 9" ISBN 1-56609-171-3 Software covered. PGP. Levels: beginner through advanced. Availability: through bookstores, computer dealers, catalogs, and user groups; or directly for Peachpit Press. Satisfaction cheerfully guaranteed. ************* End Press Release ************* ------------------------------ From: "Prof. L. P. Levine" Date: 29 Dec 1994 10:50:22 -0600 (CST) Subject: Info on CPD [unchanged since 12/29/94] Organization: University of Wisconsin-Milwaukee The Computer Privacy Digest is a forum for discussion on the effect of technology on privacy or vice versa. The digest is moderated and gatewayed into the USENET newsgroup comp.society.privacy (Moderated). Submissions should be sent to comp-privacy@uwm.edu and administrative requests to comp-privacy-request@uwm.edu. This digest is a forum with information contributed via Internet eMail. Those who understand the technology also understand the ease of forgery in this very free medium. Statements, therefore, should be taken with a grain of salt and it should be clear that the actual contributor might not be the person whose email address is posted at the top. Any user who openly wishes to post anonymously should inform the moderator at the beginning of the posting. He will comply. If you read this from the comp.society.privacy newsgroup and wish to contribute a message, you should simply post your contribution. As a moderated newsgroup, attempts to post to the group are normally turned into eMail to the submission address below. On the other hand, if you read the digest eMailed to you, you generally need only use the Reply feature of your mailer to contribute. If you do so, it is best to modify the "Subject:" line of your mailing. Contributions to CPD should be submitted, with appropriate, substantive SUBJECT: line, otherwise they may be ignored. They must be relevant, sound, in good taste, objective, cogent, coherent, concise, and nonrepetitious. Diversity is welcome, but not personal attacks. Do not include entire previous messages in responses to them. Include your name & legitimate Internet FROM: address, especially from .UUCP and .BITNET folks. Anonymized mail is not accepted. All contributions considered as personal comments; usual disclaimers apply. All reuses of CPD material should respect stated copyright notices, and should cite the sources explicitly; as a courtesy; publications using CPD material should obtain permission from the contributors. Contributions generally are acknowledged within 24 hours of submission. If selected, they are printed within two or three days. The moderator reserves the right to delete extraneous quoted material. He may change the SUBJECT: line of an article in order to make it easier for the reader to follow a discussion. He will not, however, alter or edit or append to the text except for purely technical reasons. A library of back issues is available on ftp.cs.uwm.edu [129.89.9.18]. Login as "ftp" with password identifying yourid@yoursite. The archives are in the directory "pub/comp-privacy". People with gopher capability can most easily access the library at gopher.cs.uwm.edu. Mosaic users will find it at gopher://gopher.cs.uwm.edu. Older archives are also held at ftp.pica.army.mil [129.139.160.133]. ---------------------------------+----------------------------------------- Leonard P. Levine | Moderator of: Computer Privacy Digest Professor of Computer Science | and comp.society.privacy University of Wisconsin-Milwaukee | Post: comp-privacy@uwm.edu Box 784, Milwaukee WI 53201 | Information: comp-privacy-request@uwm.edu | Gopher: gopher.cs.uwm.edu levine@cs.uwm.edu | Mosaic: gopher://gopher.cs.uwm.edu ---------------------------------+----------------------------------------- ------------------------------ End of Computer Privacy Digest V6 #043 ****************************** .