Computer underground Digest Wed Jan 26 1994

 From: owner-cudigest

To: Multiple recipients of list CUDIGEST

Subject: Cu Digest, #6.10

Date: Thursday, January 27, 1994 12:15AM


Computer underground Digest    Wed  Jan 26 1994   Volume 6 : Issue 10

                           ISSN  1004-042X


       Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)

       Archivist: Brendan Kehoe (Improving each day)

       Acting Archivist: Stanton McCandlish

       Shadow-Archivists: Dan Carosone / Paul Southworth

                          Ralph Sims / Jyrki Kuoppala

                          Ian Dickinson

       Coppice Editor:    P. Bunyan


CONTENTS, #6.10 (Jan 26 1994)

File 1--Elementary Students Make New Friends with E-mail

File 2--DEF CON ][ Initial Announcement

File 3--Re: Cu Digest, #6.09/Lobby the Feds via PC

File 4--Re: Clipp[er]ed again (fwd)

File 5--GOV-ACCESS--Cal Leg online; Minn PubInfo Net; Cal Emg Serv

File 6--What It Takes To Make It Happen: Key Issues For NII


Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are

available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The

editors may be contacted by voice (815-753-0303), fax (815-753-6302)

or U.S. mail at:  Jim Thomas, Department of Sociology, NIU, DeKalb, IL

60115.


Issues of CuD can also be found in the Usenet comp.society.cu-digest

news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of

LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT

libraries and in the VIRUS/SECURITY library; from America Online in

the PC Telecom forum under "computing newsletters;"

On Delphi in the General Discussion database of the Internet SIG;

on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG

WHQ) (203) 832-8441 NUP:Conspiracy; RIPCO BBS (312) 528-5020

CuD is also available via Fidonet File Request from 1:11/70; unlisted

nodes and points welcome.

EUROPE:   from the ComNet in LUXEMBOURG BBS (++352) 466893;

          In ITALY: Bits against the Empire BBS: +39-461-980493


ANONYMOUS FTP SITES:

  AUSTRALIA:      ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.

  EUROPE:         ftp.funet.fi in pub/doc/cud. (Finland)

  UNITED STATES:

                  aql.gatech.edu (128.61.10.53) in /pub/eff/cud

                  etext.archive.umich.edu (141.211.164.18)  in /pub/CuD/cud

                  ftp.eff.org (192.88.144.4) in /pub/Publications/CuD

                  halcyon.com( 202.135.191.2) in mirror2/cud

                  ftp.warwick.ac.uk in pub/cud (United Kingdom)

  KOREA:          ftp: cair.kaist.ac.kr in /doc/eff/cud


COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing

information among computerists and to the presentation and debate of

diverse views.  CuD material may  be reprinted for non-profit as long

as the source is cited. Authors hold a presumptive copyright, and

they should be contacted for reprint permission.  It is assumed that

non-personal mail to the moderators may be reprinted unless otherwise

specified.  Readers are encouraged to submit reasoned articles

relating to computer culture and communication.  Articles are

preferred to short responses.  Please avoid quoting previous posts

unless absolutely necessary.


DISCLAIMER: The views represented herein do not necessarily represent

            the views of the moderators. Digest contributors assume all

            responsibility for ensuring that articles submitted do not

            violate copyright protections.


----------------------------------------------------------------------


Date: Fri, 21 Jan 1994 14:08:17 EST

From: EVFW91A@PRODIGY.COM(MR DAVID W BATTERSON)

Subject: File 1--Elementary Students Make New Friends with E-mail


               Elementary Students Make New Friends with E-mail

                              by David Batterson


     Elementary students lucky enough to have computers/modems at

their school can exchange e-mail regularly with pals their own age in

many states and other countries.


     Since they are use keyboards to write with, the young students

call each other "keypals" rather than penpals.  Unlike many adults who

still find it difficult, these students usually compose their messages

offline and then upload them.


     For example, third through sixth grade students in two Maryland

elementary schools have been sending and receiving e-mail for over a

year now.  The kids call the METNET BBS, sponsored by the Maryland

State Department of Education and Maryland Instructional Technology.

METNET is, of course, linked with The Internet.


     Computer teacher Patricia A. Weeg is in charge of the e-mail

program at the Maryland schools.  Mrs. Weeg told me "my kids are doing

super things with The Internet.  My younger kids in grade two are part

of an 'Infant Project' with students in Peru, Iceland, Tasmania,

Hawaii and England.  A fourth grader of mine has been messaging with a

class in London."


     Another way Maryland students send and receive e-mail is on the

MTEBBS (Maryland Technology Education Bulletin Board Service).  They

have their own conference called KIDTALK.


     Students can correspond in real time too, by taking part in the

KIDLINK Internet Relay Chat (IRC).  These IRC chats have included

students from many states and countries.


     Students are learning about other countries by using e-mail.

They exchange questions and answers on subjects like customs,

holidays, housing, animals, the environment or careers.  One fifth

grader who is interested in engineering wrote to an electrical

engineer in Guatemala to learn more about the field.


     In addition to improving students' writing and editing skills,

the e-mail programs serve as an incentive.  Students use e-mail as an

extracurricular activity, and have to finish regular class work before

they can take part.


     Many teachers use educational games and quizzes to make sure that

time is spent wisely.  Prior to 1982's November election, elementary

students in Oregon, Michigan and Maryland were polled on their choice

for President.


     Students, parents and educators who want to learn more about

keypals can write Mrs. Patricia Weeg, Chapter 1 Computer Teacher,

Delmar Elementary School, 700 S. Second St., Delmar, MD  21875.  Her

e-mail address is:  pweeg@source.asset.com.


David Batterson welcomes comments. MCI Mail: 273-7218 or

evfw91a@prodigy.com.


------------------------------


Date: 22 Jan 94 19:32:19 -0500

From: Conal.Garrity@F8004.N282.Z1.FIDONET.ORG(Conal Garrity)

Subject: File 2--DEF CON ][ Initial Announcement


Updated Last : 1.16.1994


xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx DEF CON ][ Convention Initial Announcement


READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE


=============================================================================


What's this?  This is the initial announcement and invitation to DEF

CON ][, a convention for the "underground" elements of the computer

culture.  We try to target the (Fill in your favorite word here):

Hackers, Phreaks, Hammies, Virii coders, programmers, crackers,

Cyberpunk Wannabees, Civil Liberties Groups, CypherPunks, Futurists,

Artists, Etc..


WHO:   You know who you are, you shady characters.

WHAT:  A convention for you to meet, party, and listen to some speeches

       that you would normally never hear.

WHEN:  July 22, 23, 24 - 1994

WHERE: Las Vegas, Nevada @ The Sahara Hotel


So you heard about DEF CON I, and want to hit part ][?  You heard

about the parties, the info discussed, the bizarre atmosphere of Las

Vegas and want to check it out in person?  Load up your laptop muffy,

we're heading to Vegas!


Here is what Three out of Three people said about last years

convention:


"DEF CON I, last week in Las Vegas, was both the strangest and the

best computer event I have attended in years." -- Robert X. Cringely,

Info World


"Toto, I don't think we're at COMDEX anymore." -- Coderipper, Gray

Areas


"Soon we were at the hotel going through the spoils: fax sheets,

catalogs, bits of torn paper, a few McDonald's Dino-Meals and lots of

coffee grounds.  The documents disappeared in seconds."  -- Gillian

Newson, New Media Magazine


DESCRIPTION:


Last year we held DEF CON I, which went over great, and this year we

are planning on being bigger and better.  We have expanded the number

of speakers to included midnight tech talks and additional speaking on

Sunday.  We attempt to bring the underground into contact with

"legitimate" speakers.  Sure it's great to meet and party with fellow

hackers, but besides that we try to provide information and speakers

in a forum that can't be found at other conferences.


While there is an initial concern that this is just another excuse for

the evil hackers to party and wreak havok, it's just not the case.

People come to DEF CON for information and for making contacts.  We

strive to distinguish this convention from others in that respect.


WHAT'S NEW THIS YEAR:


This year will be much larger and more organized than last year.  We

have a much larger meeting area, and have better name recognition.

Because of this we will have more speakers on broader topics.  Expect

speaking to run Saturday and Sunday, ending around 5 p.m.  Some of the

new things expected include:


> An INet connection with sixteen ports will be there, _BUT_ will only

  provide serial connections because terminals are too hard to ship.

  So bring a laptop with communications software if you want to

  connect to the network.  Thanks to cyberlink communications for the

  connection.


> There will be door prizes, and someone has already donated a Cell

  Phone to give away.


> Dr. Ludwig will present his virii creation awards on Sunday.


> A bigger and better "Spot The Fed" contest, which means more shirts

  to give away.


> More room, we should have tables set up for information

  distribution.  If you have anything you want distributed, feel free

  to leave it on the designated tables.  Yes, this year there will be

  a true 24 hour convention space.


> A 24 hour movie / video suite where we will be playing all type of

  stuff.  VHS Format.  Mail me with suggested titles to show, or bring

  your own.


> Midnight Tech Talks on Friday and Saturday night to cover the more

  technical topics and leave the days free for more general

  discussions.



WHO IS SPEAKING:


I was going to run a list of the current speakers we have lined up,

but at this point things are still fluid.  In a few months when the

speakers list is more solidified I will release it.  I'll name the

people who have committed to attending in the next announcement.

Trust me.


WHERE THIS THING IS:


It's in Las Vegas, the town that never sleeps.  Really. There are no

clocks anywhere in an attempt to lull you into believing the day never

ends.  Talk about virtual reality, this place fits the bill with no

clunky hardware.  If you have a buzz you may never know the

difference.  It will be at the Sahara Hotel.  Intel as follows:


        The Sahara Hotel: 1.800.634.6078

        Room Rates: Single/Double $55, Triple $65, Suite $120

                    (Usually $200) + 8% tax

        Transportation: Shuttles from the airport for cheap


   NOTE:  Please make it clear you are registering for the DEF CON ][

   convention to get the room rates.  Our convention space price is

   based on how many people register.  Register under a false name if

   it makes you feel better, 'cuz the more that register the better for

   my pocket book.  No one under 21 can rent a room by themselves, so

   get your buddy who is 21 to rent for you and crash out.  Don't let

   the hotel people get their hands on your baggage, or there is a

   mandatory $3 group baggage fee.  Vegas has killer unions.



OTHER STUFF:


If you check out Wired like 1.5 or 1.6 there was a blurb about the new

Luxor hotel with it's total VR experience.  It looks like the first

true VR ride / experience for a group of people, it seats eight.

Intense.  A friend was just over there, and tested out the various

rides.  Not to be outdone the new MGM grand (Largest hotel in the

world) has a ride called the R360 which is basically a gyroscope they

trap you into with goggles.  We should get a group together and make a

mass trek over there and check it out.  If enough people are

interested I'll call and see if we can book a time to reserve space

for a bunch of us.  Both are within walking distance.


I'll whip up a list of stuff that's cool to check out in town there so

if for some reason you leave the awesome conference you can take in

some unreal sites in the city of true capitalism.


MEDIA:


Some of the places you can look for information from last year

include:


New Media Magazine, September 1993

InfoWorld, 7-12-1993 and also 7-19-1993 by Robert X. Cringely

Gray Areas Magazine, Vol 2, #3 (Fall 1993)

Unix World, ???

Phrack #44


COST:


Cost is whatever you pay for a hotel room split however many ways,

plus $15 if you preregister, or $30 at the door.  This gets you a

nifty 24 bit color name tag (We're gonna make it niftier this year)

and your foot in the door.  There are fast food places all over, and

there is alcohol all over the place but the trick is to get it during

a happy hour for maximum cheapness.


============================================================================


UPDATE:


I wanted to thank whoever sent in the anonymous fax to Wired that was

printed in issue 1.5  Cool deal!


Dan Farmer posted his paper on unix security on the net, and I've put

a copy of it on the ftp site if you want to grab it and take a look.

It's called "zen.txt"


I've received more scanned images from last year, and they will be put

on the ftp site.


=============================================================================


FOR MORE INFORMATION:


For InterNet users, there is a DEF CON anonymous ftp site at

cyberspace.com in /pub/defcon.  There are digitized pictures,

digitized speeches and text files with the latest up to date info

available.


For email users, you can email dtangent@defcon.org for more

information.


For non-net people call:


        The Alliance BBS [612] 251.8596 16.8k speed Dual Standard

        Open Access.  24 Hours.  Users get full access on 1st call.

        iirg disto site, Syncro Net, text files galore.

        Sysop: Metal Head (The huge guy from last year)

        A DEF CON directory is maintained here


For Snail Mail send to: DEF CON, 2709 E. Madison Street Suite #102,

                        Seattle, WA, 98112


For Voice Mail and maybe a human (me), 0-700-TANGENT on an AT&T phone.


A DEF CON Mailing list is maintained, and the latest announcements are

mailed automatically to you.  If you wish to be added to the list just

send email to dtangent@defcon.org.  We also maintain a chat mailing

list where people can talk to one another and plan rides, talk,

whatever.  If you request to be on this list your email address will

be shown to everyone, just so you are aware.


[Note: We need some good list-serv software for BSD, if anyone knows

where to find some, please e-mail me.]


STUFF TO SPEND YOUR MONEY ON:


> Tapes of last years speakers (four 90 minute tapes) are available

for $20


> DEF CON I tee-shirts (white, large only) with large color logo on

  the front, and on the back the Fourth Amendment, past and present.

  This is shirt v 1.1 with no type-o's.  These are $20, and

  sweatshirts are $25.


> Pre-Register for next year in advance for $15 and save half.


> Make all checks/money orders/etc. out to DEF CON, and mail to the

  address above.


If you have any confidential info to send, use this PGP key to

encrypt:


-----BEGIN PGP PUBLIC KEY BLOCK-----

Version: 2.3


mQCrAiyI6OcAAAEE8Mh1YApQOOfCZ8YGQ9BxrRNMbK8rP8xpFCm4W7S6Nqu4Uhpo

dLfIfb/kEWDyLreM6ers4eEP6odZALTRvFdsoBGeAx0LUrbFhImxqtRsejMufWNf

uZ9PtGD1yEtxwqh4CxxC8glNA9AFXBpjgAZ7eFvtOREYjYO6TH9sOdZSa8ahW7YQ

hXatVxhlQqve99fY2J83D5z35rGddDV5azd9AAUTtCZUaGUgRGFyayBUYW5nZW50

IDxkdGFuZ2VudEBkZWZjb24ub3JnPg==

=ko7s

-----END PGP PUBLIC KEY BLOCK-----


The next announcement will have more updated information.  I'll hold off

on naming the speakers unless they commit to attending.  It looks to be

a great line up.


- The Dark Tangent


------------------------------


Date: Tue, 25 Jan 1994 14:24:54 -0600 (CST)

From: eab@MSC.EDU(Edward Bertsch)

Subject: File 3--Re: Cu Digest, #6.09/Lobby the Feds via PC


>Computer reporter/reviewer David Batterson looks forward to the day

>when most federal, state, county and city officials are online, so we

>can zap 'em with e-mail.  [Will he live so long?]  You may contact him

>via The Internet:  dbatterson@mcimail.com, or:

>david.batterson@f290.n105.z1.fidonet.org.

> * Evaluation copy of Silver Xpress. Day # 50

> --- via Silver Xpress V4.00 [NR]

> --

>uucp: uunet!m2xenix!puddle!290!David.Batterson

>Internet: David.Batterson@f290.n105.z1.fidonet.org



You don't have to wait for them to be on-line.  It is not realistic

to expect politicians to do this in your or my lifetime.


What you can do is get yourself a FAX modem and some print capture

software.  This is what I use.  I put together a document in a

Windoze word processor, then I say print (to the print capture

software).  A box comes up asking me who to send it to.  I have

the LOCAL phone numbers for my Congress- and Senate- critters,

as well as Governor, Mayor, City Council, and state house and senate.


I select an individual or multiple recipients, and the message

is sent to them.  If there is a busy number, it goes on to the

next one on the list, and eventually gets through to all of

them.  My words are read as I wrote them (much different

than what happens when you leave a verbal message) and are

dealt with in a timely manner, since so much of their day to day

business is conducted by FAX these days...


You can get internal data/fax modems for $99 and less these days,

and externals for little more.  (even v.32bis/v.42bis/v.17 14400 data/14400

fax

modems)


The software to capture "printed" output to fax is usually included.


I would assume similar prices and packages exist for the Macintosh.


------------------------------


Date: Tue, 25 Jan 1994 10:17:19 +0200 (WET)

From: anonymous <tk0jut2@mvs.cso.niu.edu>

Subject: File 4--Re: Clipp[er]ed again (fwd)



            U.S. CODE AGENCY IS JOSTLING FOR CIVILIAN TURF

               New York Times, Monday, January 24, 1994

                           By John Markoff


  The National Security agency is trying to establish a standard tor

electronically scrambling computer communications, a move that would

go far beyond the agency's usual military and intelligence domain to

include civilian activities like electronic tax returns and

computerized medical payments.


The plan by the N.S.A., which may be announced as early as today,

worries business executives, who fear a Government encroachment on

privacy. And some officials in the Clinton Administration believe that

the N.S.A. is overstepping its bounds.


  The N.S.A. is the Federal agency responsible for electronic

surveillance of global communications, though usually not civilian

communications, within the United States.


     ((The article explains in a few paragraphs how the

     government prefers a government and civilian standard

     approach to scrambling in order to crack codes authorized by

     court-approved wiretaps))


Bidding Process


  The agency will seek bids from companies to produce circuit cards

based on its technology, which would be used to scramble electronic

messages for Government agencies and, eventually, private companies.

Agency employees confirmed the plan late Friday, though no agency

officials could be reached over the weekend for further details.


   ((A few paragraphs deleted))


Many computer industry executives oppose the National Security

Agency's effort, saying there is no way for industry experts and

outsiders to determine the reliability and security of the underlying

scrambling technology, which the agency intends to keep secret.


  Privacy-rights advocates, meanwhile, are wary of the system because

of the electronic "back door" it contains, permitting Government

eavesdropping. And some other Administration officials say the agency

is going too far by pushing the standard into civilian computing


  "What these guys are trying to do is run ahead of the blocking," an

Administration official who spoke on the condition of anonymity said.

"Trying to sell this as the wave of the future is premature as

Administration policy.


The circuit card, which is designed to fit into a personal computer

and which the agency calls Tessera, is based on technology similar to

a device known as the Clipper Chip, a telephone voice-scrambling chip

that provides a back-door means for letting law-enforcement officials

eavesdrop.


     ((The article explains that the Clipper plan was developed by

     the NSA, NIST, and CDA, and has been strongly opposed by

     professionals and public policy groups))


  In a letter to be sent to President Clinton today, which was

released on Friday to The New York Times, a group of 38 of the

nation's leading computer scientists, computer-security specialists

and privacy experts have urged that the Clipper program be stopped.


  "The current proposal was developed in secret by Federal agencies

primarily concerned about electronic surveillance, not privacy

protection," the letter states. "Critical aspects of the plan remain

classified and thus beyond public review."


    ((The article notes that lots of influential crypto-pioneers

    signed the letter))


  Moreover, the Government could insure widespread use of the Clipper

and Tessera technologies by insisting that they be used by businesses

and individuals when communicating electronically with Federal

agencies.


Official Reasoning


  Law-enforcement officials say the technologies are intended to

resolve a longstanding problem of the information age: how to preserve

the right of businesses and citizens to use codes to protect all sorts

of digital communications without letting criminals and terrorists

conspire beyond the law's reach. Businesses and individuals who often

communicate over computer networks already make use of a variety of

scrambling systems-either of their own devising or those commercially

available.


  Many of these scrambling systems are unbreakable by anyone who does

not hold the electronic keys to the code, something generally known

only by the sender and the recipient of scrambled messages.


  That is a problem for the National Security Agency, which routinely

listens to many of the world's telephone and computer conversations -

although it has no jurisdiction for monitoring non-Government

conversations within the United States. The N.S.A.'s Tessera and

Clipper systems would have an independent agency hold master keys to

the codes, which could be obtained with a court's permission for

surveillance by law-enforcement officials.


     ((For a few paragraphs, the article notes that the agency

     intends to purchase between 10,000-70,000Tessera cards and

     notes that the card can be used for civilian functions such

     as e-mail and cable tv scrambling))



The National Security Agency's new standard-setting effort is being

introduced a couple of weeks before the Clinton Administration

completes a classified review of the Clipper proposal, and several

industry executives said the announcement had been timed to apply

pressure to the Administration's decision making.


  The proposal angers industry executives who believe that the agency

is rushing to establish a de facto standard that will undercut efforts

to adopt a competing commercial standard without a built-in back door.

That standard, being developed by RSA Data Security, a Redwood City,


     ((A bunch of background information paragraphs deleted))


Secret Formula


  These companies are particularly troubled by the National Security

Agency's refusal to disclose the mathematical formula, or algorithm,

on which-its scrambling technology is based.


  "The issue here is: Should a secret algorithm developed by the

intelligence community be used for unclassified civilian uses?" said

Stephen Walker, a computer security industry executive and a member of

the Government's Computer System Security and Privacy Advisory Board.

l think the answer is it should not.


     ((A bunch more deleted summarizing some of the conflict the

     agency has experienced regarding the surveillance issue.

     Marc Rotenberg of CPSR is quoted as saying that the

     proposals are going in the wrong direction))



  "These guys are fighting for job security," said William Ferguson,

vice president of Semaphore Inc., a , Santa Clara, Calif., computer

network security firm. "Now that the K.G.B. has gone commercial, the

N.S.A. is trying to start its own initiatives that say, 'all we're

trying to do i is keep up with the K.G.B.' "


  White House officials said the agency's actions would not

necessarily force the Administration to authorize, an unpopular coding

technology.  One official said the Administration policy review was

likely to establish a permanent working group that, would limit the

National Security, Agency's role in policy making.


((The article concludes by explaining that the NSA intended to

announce its RFPs last week, but was delayed by a snow storm))


------------------------------


Date: Sat, 22 Jan 1994 17:11:30 -0800

From: Jim Warren <jwarren@WELL.SF.CA.US>

Subject: File 5--GOV-ACCESS--Cal Leg online; Minn PubInfo Net; Cal Emg Serv


Jan. 22, 1994


On Friday, Jan. 21, 1994, the California Legislature began offering

global online access to almost-all public information about

legislation-in-process, all current state statutes, and the voluminous

California Constitution.


The state is prohibited from charging *anything* for access to or

re-use of this electronic information.


Access is by Internet  ftp  and  ftpmail  ["ftp" = file transfer

protocol].  Note:  ftpmail  allows anyone with access to the Internet

at least for email purposes to access these files (that are often

large).  ftpmail  provides access for users of FidoNet, CompuServe,

GEnie, Prodigy, etc., as well as offering Internet users an option to

direct  ftp .


README  and  help  files provide complete details.



FOR A GOOD TIME, CALL ...

  To receive the  help  file, send the following email:

To:               ftpmail@leginfo.public.ca.gov

subject:          <optional, the system ignores the subject-line>

Message lines:    connect leginfo.public.ca.gov

                  help

                  quit


  To receive the two README files, send the following email:

To:               ftpmail@leginfo.public.ca.gov

subject:          <optional, the system ignores the subject-line>

Message lines:    connect leginfo.public.ca.gov

                  get README_WELCOME

                  cd pub

                  get README_FIRST

                  quit


And await details of how you may finally participate in the process of

your own governance.

  According to the National Conference of State Legislatures,

California is the first state in the nation to offer almost all of its

public legislative, statutory and constitutional information via the

Internet, *especially* without charge by the state.


================================================================


Subject--Cal.Emergency Svcs.online + Net-fax + MINN Pub Info Net



Jan. 22, 1994


CALIFORNIA OFFICE OF EMERGENCY SERVICES INFO AVAILABLE ONLINE

  <a recent exchange of messages>

The state Emergency Digital Information Service is working fine


  Telnet to telnet oes1.oes.ca.gov 5501

=====

Is the OES system open/intended to permit public use?

--jim

=====

     It seems to be. No login at all is required.  You telnet to that port

and get a menu listing the last 20 or so press releases.




SACRAMENTO INTERNET LOCALS: HOW 'BOUT LEGI-FAX ?

  <from a gov-access list-member>

Are you familiar with the internet fax gateway service? You can send to an

internet address and IF that telephone exchange is covered by a fax server,

your mail will be delivered via fax. If it is not covered you get a bounce.

For more details send mail to:

tpc-faq@town.hall.org


A very cool service! Maybe someone in Sacramento would like to put up a

gateway that would transmit faxes to the legislators? :-)


<Also, how about local faxes to Washingtoontown?  And, of course, anyone can

use this from and to anywhere.  -JW>




MINNESOTA DRAFT ONLINE-ACCESS PROPOSAL <source pointer>

Date: Thursday, 20 January 1994 3:15pm CT

To: net-people@nic.state.mn.us, metronet@vm1.nodak.edu, libnet@mr.net,

    net-people@mail.unet.umn.edu, tc-all@mail.unet.umn.edu, ednet@mr.net,

    mcowork@vm1.nodak.edu, STEVEN.CLIFT

From: STEVEN.CLIFT@MNEMC2

Subject--Draft Legislative Proposal - Minn Public Info Network


This is a DRAFT proposal from the Electronic Access to Public Information

Task Force of the Information Policy Office, Minnesota Department of

Administration.  This is probably the first time a draft proposal of this

nature has been released electronically within government and to the public.


Please send us your comments and suggestions by February 4, 1994 as indicated

in the text of this document.  As of January 20, this proposal has been

presented to the full Electronic Access Task Force and the Information

Policy Council.  They are just beginning to review this proposal.  The

one thing that is guaranteed is that this proposal will change as it

moves toward and through the legislature process.  This draft proposal

is more of a concept paper and much of this proposed activity does not

require legislative action, but the overall concept and funding will

need legislative support.


While I have been researching and developing this proposal since early fall,

(I have been on the Internet for two years and run a public policy (PUBPOL-L)

electronic mail list at the Humphrey Institute of Public Affairs)

the timing of its release is very good. It should be of interest to a

number of people and gain some public attention.  On a lighter note, I think

government interest was illustrated by the good turnout we had at our

Task Force meeting on January 18 when it was about -20F.  I have a new

theory about why Minnesota is known for having innovative government programs:

we spend our cold winters thinking up good ideas for public services because

there is little to distract us.  If this is a relative theory inversely

related to how cold it is, the Minnesota Public Information Network should

be a great proposal.  However, we need you feedback to ensure that it is

developed with broad government and public support.


Electronic Access to Public Information Task Force

c/o Steven Clift

Information Policy Office

Minnesota Department of Administration

320 Centennial Office Building

St. Paul, MN 55155           Telephone: (612)297-5561      Fax:(612)296-5800

Electronic Mail: steven.clift@state.mn.us

=====

Send a request to Steven Clift if you wish the full document.


------------------------------


Date: Wed, 26 Jan 1994 21:23:20 CST

From: CuD Moderators <cudigest@mindvox.phantom.com>

Subject: File 6--What It Takes To Make It Happen: Key Issues For NII


((MODERATORS' NOTE: The full text of the following paper summary can

be obtained from the CuD ftp archives (see CuD header for addresses))


           What It Takes To Make It Happen: Key Issues For

       Applications Of The National Information Infrastructure


               Committee on Applications and Technology

                Information Infrastructure Task Force


                           January 25, 1994


This paper is intended for public comment and discussion. Your

comments can be sent to any of the following addresses:


Post:     Committee on Applications and Technology

     National Institute of Standards and Technology

     Building 101, Room A1000

     Gaithersburg, MD 20899

Phone:    (301) 975-2667

FAX:      (301) 216-0529

E-Mail:   cat_exec@nist.gov


             THE COMMITTEE ON APPLICATIONS AND TECHNOLOGY


This issue paper was prepared by the Committee on Applications and

Technology of the Information Infrastructure Task Force (IITF) in

support of the President's action plan for developing, in partnership

with the private sector, an advanced information infrastructure for

our country -- the National Information Infrastructure. The Committee

is charged with coordinating Administration efforts:


     to develop, demonstrate, and promote applications of

     information technology in manufacturing, electronic

     commerce, education, health care, government services,

     libraries, and other areas, and to develop and recommend

     technology strategy and policy to accelerate the

     implementation of the NII..


The Committee works with the Subcommittee on High-Performance

Computing and Communications and Information Technology, which was

established as part of the Federal Coordinating Council for Science,

Engineering and Technology to coordinate the development of new

information technologies. The Committee on Applications and Technology

also is responsible for implementing many of the recommendations of

the Vice President's National Performance Review that pertain to

information technology.


((ACKNOWLEDGEMENTS DELETED))


                               ABSTRACT


This paper highlights important issues that need to be addressed in

the development, demonstration, and promotion of applications for the

National Information Infrastructure (NII).  The paper is intended for

three important audiences: the public, the committees and working

groups of the Information Infrastructure Task Force (IITF), and other

agencies and departments in our government.  The goal is to identify

and describe the issues so they can be considered and discussed by

these audiences, leading to their eventual resolution. Some of these

issues, such as privacy, intellectual property rights, information

security and the scalability of projects are already being addressed

by the committees and working groups of the IITF. Others, such as user

acceptance and organizational learning, still need to be addressed by

the IITF in order to allow the private/government partnership to

evolve and to work together to build and shape the National

Information Infrastructure.


                   KEY ISSUES FOR NII APPLICATIONS


The publication of the Agenda for Action on the National Information

Infrastructure (NII)1 in September 1993 greatly heightened the level

of public debate on information technology and social change.


That and other white papers, studies, and commentaries dramatically

sketched a vision of the near future, in which a web of advanced

communications networks and computers would bring vast amounts of

information and greatly improved services to the homes of virtually

every citizen - if we as a nation properly manage the technology.


With this paper, the Committee on Applications and Technology of the

President's Information Infrastructure Task Force proposes a basic set

of critical issues which our nation will face as the NII evolves. Our

perspective in selecting these issues is that of applications that

will use the NII.  The reasons for taking this perspective - indeed,

for creating this Committee - are grounded in the unique role the

Federal government plays in the development of the NII.  The National

Information Infrastructure is not a cliff which suddenly confronts us,

but rather a slope - and one society has been climbing since postal

services and semaphore networks were established. An information

infrastructure has been with us for a long time, continuously evolving

with each new advance in communications technology. Why the sudden

debate?  Change is coming much faster, and more thoroughly, than ever

before. In our lifetimes we will see information technology bring more

changes to more aspects of our daily lives than have been witnessed in

the preceding century. Digital technology is merging the functions of

television sets, telephones, and computers.  Fundamental changes are

in store for us in the ways we work, learn, shop, communicate,

entertain ourselves, and get health care and public services. And

those are just the applications we can foresee.


Private industry will be responsible for virtually every major facet

of the NII and the information marketplace it   creates. Private

industry will build and manage the networks, provide the information

tools and much of the information that travels the networks, and

develop the many of the applications that use the networks.

But government remains a major participant in the NII. One

reason is obvious - government policies are a major force in the

information infrastructure. One of the principal goals of the

Information Infrastructure Task Force is to develop and foster

informed government policy that promotes our societal goals for

the NII without unnecessarily hampering industry.

As Vice President Gore has observed, "Our goal is not to

design the [information] market of the future. It is to provide

the principles that shape that market. And it is to provide the

rules governing this difficult transition to an open market for

information. We are committed in that transition to protecting

the availability, affordability and diversity of information and

information technology as market forces replace regulations and

judicial models that are simply no longer appropriate."2

Less obvious, however, is the fact that government plays a

major role in the development of NII applications:


     As one of the nation's biggest users of information

technology, the government develops NII applications to speed and

improve the delivery of its services. Examples include making


((600 LINES OF TEXT DELETED))


                    NEXT STEPS AND FOLLOW THROUGH


For the IITF to follow through on the remainder of the issues

identified in this paper requires at least two steps.  First, the IITF

committees and interested individuals and groups from the private

sector should review this paper and the issues we have presented to

broaden our understanding and perspective. We welcome comments.


Next, the IITF should review the issues reported here, the framework

for assessing the issues, and the comments from the private sector and

the other committees to decide if its organization is adequately

structured to address the key issues.  For example, if the

categorization of issues outlined here - according to the components

of the infrastructure:  people, information, processes (software,

especially applications), hardware and networks - is useful, we should

consider whether our current IITF structure covering information,

telecommunications, and applications and technology adequately

addresses people and hardware.


Some steps are already being taken in this direction. A working group

of the Committee on Applications and Technology has been formed to

address technology policy issues, and the Committee has instituted a

public issues discussion program as part of its regular meetings to

facilitate a dialog on the issues outlined in this paper.


In closing, we would like to repeat and emphasize the point made

earlier. In presenting this issues paper, the Committee on

Applications and Technology intends only to describe an initial

catalog of critical issues that must be addressed and resolved in the

development of the NII. We see this is a starting point for

discussion, and not a document to close off discussion of other

issues.


Your comments on this paper can be sent to any of the following

addresses:


Post:     Committee on Applications and Technology

     National Institute of Standards and Technology

     Building 101, Room A1000

     Gaithersburg, MD 20899

Phone:    (301) 975-2667

FAX:      (301) 216-0529

E-Mail: cat_exec@nist.gov


------------------------------



------------------------------


End of Computer Underground Digest #6.10

************************************


Comments

Popular posts from this blog

BOTTOM LIVE script

Evidence supporting quantum information processing in animals

ARMIES OF CHAOS