Date: Mon, 24 Jun 96 12:55:36 EST Errors-To: Comp-privacy Error Handler From: Computer Privacy Digest Moderator To: Comp-privacy@uwm.edu Subject: Computer Privacy Digest V8#050 Computer Privacy Digest Mon, 24 Jun 96 Volume 8 : Issue: 050 Today's Topics: Moderator: Leonard P. Levine The Problem With Spam Re: The Problem With Spam Re: Privacy while Downloading from Newsgroup Re: Privacy while Downloading from Newsgroup Re: Air Force Sergeant Jailed in e-Mail Case Privacy in Politics NorthStar: ABCs of PGP Encryption Info on CPD [unchanged since 11/22/95] ---------------------------------------------------------------------- From: chris@kosh.punk.net (Christopher Ambler) Date: 19 Jun 96 16:36:49 PDT Subject: The Problem With Spam [moderator: this was taken without permission from a board used to interchange messages between newsgroup moderators.] This has just happened to me, and I'm steaming mad. I received a spam to one of our for-sale groups that are moderated. After rejecting it and getting a bounce (fake email), I called the number on the spam and requested a fax using a ficticious name, one that I've never used for any reason (Peter). After getting the fax, I called the firm and gave them a 'verbal rejection' of the post, and explained (quickly) why spam is a bad thing. Yes, dumb thing to do. Why? I'm now getting MLM and other spam-like faxes from companies that have received "written requests" from "Peter" at my fax number for this junk. Just thought I'd make y'all aware of this. Stupid of me to have called this guy, but damnit if he hasn't gone a little too far. They're in Canada, too, so there's not much I can see to do. -- Christopher "Askes for Trouble Often" Ambler Small-Time moderator of regional groups ------------------------------ From: edhew@xenitec.on.ca (Ed Hew) Date: 20 Jun 1996 02:21:49 EDT Subject: Re: The Problem With Spam [moderator: this was taken without permission from a board used to interchange messages between newsgroup moderators.] Christopher Ambler XeniTec Consulting Services, Kitchener ON, Canada ------------------------------ From: acar@vcn.bc.ca (Al Acar) Date: 20 Jun 1996 04:39:27 GMT Subject: Re: Privacy while Downloading from Newsgroup Organization: Vancouver Regional FreeNet References: beardawg@usa.pipeline.com () wrote; Let me admit right upfront - I'm a newbie. That said - Who, other than my ISP, has access to what I may be downloading from the newsgroups? I can think of 3 possibilities (And I'm sure there're more...) 1- People hacking into your ISP from outside, 2- People who use the same ISP as you do and have found a way to access other user's account info (internal hackers, if you will) 3- Anyone who can use a newsgroup search engine- this will show only those newsgroups you've been active in. But if follows that if you've been active in those groups, you're probably downloading them as well. -- acar@vcn.bc.ca <*> al.acar@hortus.bc.ca ------------------------------ From: Ken Johnson Date: 23 Jun 1996 22:04:24 -0500 Subject: Re: Privacy while Downloading from Newsgroup Organization: Tapestry Computing, Inc. References: beardawg@usa.pipeline.com wrote: Let me admit right upfront - I'm a newbie. That said - Who, other than my ISP, has access to what I may be downloading from the newsgroups? I know about "cookies" on the web, but I haven't read anything about downloading privacy. If indeed it is not private, then is there anonymous download software available? Any info is appreciated. Assuming that you ISP is also providing your news feed, then they should be the only ones able to know who/what newsgroups you are viewing. If you are using your employers internet connection, or have other computers between you and your ISP, then those people could also determine what groups you are reading. -- Ken Johnson - Technical Consultant Tapestry Computing, Inc. http://www.tapestry.com ------------------------------ From: smlaskos@cs.millersv.edu (Steven M. Laskoske) Date: 21 Jun 1996 20:16:47 GMT Subject: Re: Air Force Sergeant Jailed in e-Mail Case Organization: East Stroudsburg University, Pennsylvania References: William R. Ward (hermit@cats.UCSC.EDU) wrote: Yes, I think that's [using a private email account] a good idea. However even in that case, their phone would likely be a military phone, their housing a military barracks, and they would likely be using other military owned facilities and subject to other military regulations, even off-duty. So where do you draw the line? The military is definitely a different case than just some programmer sending dirty email on his/her work account. I agree with the one major comment, the person should have used a private e-mail account. Of course, the military does have some leniency (and reason for concern) regarding e-mail transmissions. They need to be careful of espionage. Still, if this is not an instance of a clear breech of military security, and not a case where the person was on duty and supposed to be doing something else, then I can't see the problem the military should have with it. (I know that bandwidth costs $$$ but that is hardly the issue here.) If the material inside the e-mail is unlawful, that's one thing. If it's just dirty...who cares. The military men know where to get dirty magazines, see the strip joints, etc. They are all over the age of consent. In summary: should the military be keeping an eye on e-mail that goes in and out of base? Sure. Should it worry about e-mail of an obviously non-military nature. Definitely not. ************************************************************************* Steven Laskoske * Shakespeare's cry when he can't click an icon: smlaskos@cs.millersv.edu * "Mouse of virtue answer me!" Eternal Student * (Twelfth Night, Act I, Scene 5) ************************************************************************* ------------------------------ From: softwa19@us.net (Charles R. Smith) Date: 23 Jun 1996 20:46:00 GMT Subject: Privacy in Politics Privacy is now an issue. Recent events at the White House have placed personal privacy as a major concern before Congress and the people. The current resident of 1600 Pennsylvania Avenue has made his political success by claiming to be the friend of the common people. However, his claims fall far short of his actions. In 1993 President Clinton supported the Clipper chip which was no more than a government mandated bug to monitor every phone, fax, and computer. President Clinton submitted now deleted parts of the 1995 Anti-Terrorist Act which would have allowed the FBI to conduct wiretaps under Pre-Watergate rules. No court order or warrant required. It would have also allowed the submission of evidence obtained by illegal means such as break-ins and computer hacking. President Clinton supports the current Clipper III proposal which would require American citizens to turn over their computer encryption keys to a government Escrow Agency. President Clinton has supported legislation which would have allowed FBI access to medical information, breaking centuries of legal and ethical privacy between Doctors and patients. Ironically, the same Bill Clinton has also cited his personal privacy over meetings attended by his paid lawyer and lawyers paid by U.S. tax dollars. President Clinton has used encryption to scramble his White Water testimony for personal privacy reasons. No escrow key was ever given to the FBI. President Clinton has cited personal privacy over his medical history. Yet, the President has consistantly maintained an aggressive legislative and administrative effort to accumulate information on ordinary citizens. In fact, FBI records show that the White House made over 22,000 written information requests in 1993 and 1994. In summary, actions speak louder than words. It is clear that the President's actions have shown very little respect for the privacy of any individual other than himself. -- Charles R. Smith SOFTWAR Richmond, VA http://ally.ios.com/~softwa19 ------------------------------ From: mthompson@asu.edu (M Thompson) Date: 20 Jun 1996 08:05:09 GMT Subject: NorthStar: ABCs of PGP Encryption Organization: Arizona State University Internet Users Consortium - ALERT! Sunday 6/16/96 http://iuc.org/ *********************************************************** * Internet Users Consortium has moved its website!!!!!! * * http://iuc.org/ * *********************************************************** SUBSCRIPTION REQUESTS for NorthStar: To: northstar@iuc.org (See bottom of Alert) ALERT! Notice: Special Issue of NorthStar Issue #20 of NorthStar [coming next Sunday, June 23] will be something special. The issue will conclude our five-part series on Encryption and Privacy on the Internet by featuring *PGP JUMP START*, which is guaranteed to get you up to speed with PGP [Pretty Good Privacy], the encryption program which Phil Zimmermann has given free of charge to the Net.community. Most everyone has heard of PGP, but how many of us actually use it? One of the reasons why the Clinton Administration's infamous Clipper Chip initiatives have failed is that the opponents of Clipper could argue that so many people use PGP already - that strong encryption has already slipped from the grasp of the Govt. Spook community and is currently in everyday use in the Net.community. Truly, the more of us who use PGP, the stronger will be our chances to resist Govt. imposed encryption. Do not dream that the Govt. Spooks will suddenly give up on their plans. Do not think that the Clinton Administration will suddenly stop listening to the paranoids at FBI/CIA/NSA/the ones we havent even found out about yet! [Remember that the Govt. denied the existence of NSA as long as they could!] Many of us have looked into using PGP, only to be dissuaded by the user-UNfriendly nature of PGP. The learning curve involved with PGP resembles the mountains of the Himalaya, especially if one is at all unsure about DOS and its arcane command line. *PGP JUMP START* to the Rescue!! This step-by-step document will hold your hand all the way up and over the steep PGP learning curve. *PGP JUMP START* does assume that you have some basic familiarity with DOS, Windows and Unzipping. If you hate reading manuals -- here is the easy way to get started with PGP (Pretty Good Privacy). *PGP JUMP START* gets you up and running fast with PGP, so that you can exchange encrypted e-mail messages with your friends. So dont miss out on this opportunity to learn to use PGP. If you follow the 13 Steps laid out in *PGP JUMP START*, you will surely be fluent with PGP in less than one hour! See for yourself why this document has been called, *A Triumph in Technical Writing*. Watch for NorthStar issue #20 next Sunday June 23rd. If you know someone who would want to learn PGP tell them about this opportunity. New NorthStar subscription info follows: NorthStar, the Newsletter of the Internet Users Consortium, has moved its archive to http://iuc.org/northstar.html The larger facility will enhance our ability to communicate with our readers, distributors and IUC Members. Your invited to drop by the Internet Users Consortium's new URL at http://iuc.org/ to give us your ideas on how better to express all of our opinions. Share our space with your thoughts about the future of the Internet in a new project we are developing. NorthStar keeps you informed and on the lookout for the invasive legislation the government enforces. If you want to stay informed about this and other key Internet issues, subscribe to NorthStar. NorthStar is the bi-weekly e-zine of the Internet Users Consortium that gives you the story from the perspectives of those who feel the full brunt of government abuse. Corporate media devalues us in its pro-government portrayal of every news tidbit. What's left out is how current legislation effects you and me - The Internet Users. SUBSCRIPTION REQUESTS for NorthStar: To: northstar@iuc.org Subject: leave blank Body of message: subscribe NorthStar your email (format) *NorthStar comes in 3 formats. Note which format you wish to recieve: "html", "ascii" or "ns mail" (thats Netscape Mail for those who use it regularly) ***Now available in Netscape 2.0 and up Mail format. We will deliver it to you ready to be viewed as incoming mail. Just write "ns mail" in the body. -- NorthStar Archives can be found at: http://iuc.org/northstar.html ------------------------------ From: "Prof. L. P. Levine" Date: 21 Jun 1996 15:42:52 -0500 (CDT) Subject: Info on CPD [unchanged since 11/22/95] Organization: University of Wisconsin-Milwaukee The Computer Privacy Digest is a forum for discussion on the effect of technology on privacy or vice versa. The digest is moderated and gatewayed into the USENET newsgroup comp.society.privacy (Moderated). Submissions should be sent to comp-privacy@uwm.edu and administrative requests to comp-privacy-request@uwm.edu. This digest is a forum with information contributed via Internet eMail. Those who understand the technology also understand the ease of forgery in this very free medium. Statements, therefore, should be taken with a grain of salt and it should be clear that the actual contributor might not be the person whose email address is posted at the top. Any user who openly wishes to post anonymously should inform the moderator at the beginning of the posting. He will comply. If you read this from the comp.society.privacy newsgroup and wish to contribute a message, you should simply post your contribution. As a moderated newsgroup, attempts to post to the group are normally turned into eMail to the submission address below. On the other hand, if you read the digest eMailed to you, you generally need only use the Reply feature of your mailer to contribute. If you do so, it is best to modify the "Subject:" line of your mailing. Contributions to CPD should be submitted, with appropriate, substantive SUBJECT: line, otherwise they may be ignored. They must be relevant, sound, in good taste, objective, cogent, coherent, concise, and nonrepetitious. Diversity is welcome, but not personal attacks. Do not include entire previous messages in responses to them. Include your name & legitimate Internet FROM: address, especially from .UUCP and .BITNET folks. Anonymized mail is not accepted. All contributions considered as personal comments; usual disclaimers apply. All reuses of CPD material should respect stated copyright notices, and should cite the sources explicitly; as a courtesy; publications using CPD material should obtain permission from the contributors. Contributions generally are acknowledged within 24 hours of submission. If selected, they are printed within two or three days. The moderator reserves the right to delete extraneous quoted material. He may change the Subject: line of an article in order to make it easier for the reader to follow a discussion. He will not, however, alter or edit the text except for purely technical reasons. A library of back issues is available on ftp.cs.uwm.edu [129.89.9.18]. Login as "ftp" with password identifying yourid@yoursite. The archives are in the directory "pub/comp-privacy". People with gopher capability can most easily access the library at gopher.cs.uwm.edu. Web browsers will find it at gopher://gopher.cs.uwm.edu. ---------------------------------+----------------------------------------- Leonard P. Levine | Moderator of: Computer Privacy Digest Professor of Computer Science | and comp.society.privacy University of Wisconsin-Milwaukee | Post: comp-privacy@uwm.edu Box 784, Milwaukee WI 53201 | Information: comp-privacy-request@uwm.edu | Gopher: gopher.cs.uwm.edu levine@cs.uwm.edu | Web: gopher://gopher.cs.uwm.edu ---------------------------------+----------------------------------------- ------------------------------ End of Computer Privacy Digest V8 #050 ****************************** .