[CONTACT]

[ABOUT]

[POLICY]

Three Personal THE SUNDEVIL FOIA AR

Found at: gopher.meulie.net:70/EFFector/effector2.04

########## ########## ########## |       THE NET: WHAT'S IT GOOD FOR?|
########## ########## ########## |        Three Personal Perspectives|
####       ####       ####       |                                   |
########   ########   ########   |             THE SUNDEVIL DOCUMENTS|
########   ########   ########   |                CPSR'S FOIA Release|
####       ####       ####       |                                   |
########## ####       ####       |          ARE YOU AN INTERNET NERD?|
########## ####       ####       |       Test Reveals Terrible Truth!|
                                                                     |
                    EFF OPENS WASHINGTON OFFICE                      |
                                                                     |
=====================================================================|
EFFector Online           January 18, 1992        Volume 2, Number 4 |
=====================================================================|

                 PIONEER AWARD NOMINATIONS DEADLINE

for the First Annual EFF/Pioneer Awards will be February 15.

The Pioneer Awards will be made on Thursday, March 19,1992 at the
L'Enfant Plaza Hotel in Washington, DC, during the Second Computers,
Freedom and Privacy Conference.


Anyone may be nominated for an award, except for EFF Staff members.
A nomination form can be found at the end of this issue of EFFector
Online. We have already received many nominations, but we need to hear
from you.

The EFF is looking for the real pioneers. Help us find them.

                   -==--==--==-<>-==--==--==-

                          In this issue:
         "WHY WOULD ANYONE WANT TO USE A COMPUTER IN A LIBRARY?"
                      LIBERATION TECHNOLOGY
                    THE NET:WHAT'S IT WORTH?
                  SUN DEVIL DOCUMENTS RELEASED
                WARNING - MICHELANGELO VIRUS (PC)
             BERMAN TO HEAD NEW EFF WASHINGTON OFFICE
                  UPDATE ON EFF ACTIVITIES
                  ARE YOU AN INTERNET NERD?

                   -==--==--==-<>-==--==--==-

                            NET WORK:
        Three Personal Perspectives on the Uses of the Net

[As the creation of the Net goes forward, and many issues of a
technical, legal or political nature surface, its easy to forget that
the Net is made to be used by people in ways that are neither technical
nor political.  In various groups over the past few weeks, the question
of what the Net is "good for" has arisen in several guises. In this
edition of EFFector Online, we present three "answers".  The first is
from a librarian, the second from a college professor, and the third
from an EFF staff member.  Every so often, it helps to step back from
the wiring, planning, programming, and social engineering and reflect
on the ways in which humanity actually uses the tools it creates.]

                   -==--==--==-<>-==--==--==-

         "WHY WOULD ANYONE WANT TO USE A COMPUTER IN A LIBRARY?"
                           by Jean Polly
                          (polly@LPL.ORG)

How does the INTERNET relate to the little guy?

[The previous posters] remarks remind me very much of the response
acquiring a computer for public use at my public library.

"Why would ANYONE want to use a computer in a public library-- what on
earth would they use it for???" was the universal attitude, usually
accompanied by a guffaw or two.

Undaunted, I pressed ahead and by October of 1981 we had a 48K Apple II+
out where the Masses could touch it. (Now my kid has 48K on his watch...)

Ten years later, over 1,500 hours per month are reserved on the seven

Our clients use the computers and laser printers for everything from
learn to use databases, practice languages, print mailing labels.

Last year we got an Apple Library of Tomorrow grant, which brought
nteractive videodisc technology to our small village library. We have
Congress' American Memory Project. This CD-ROM and videodisc archive
contains some 25,000 turn of the Century postcard views of American
landmarks, rare film footage from the 1901 Pan-American Exposition,
audio archives of great American speeches and their text, with photos of
the speakers, plus much more. Subsequent volumes will include Civil War
oral histories from around the U.S. Everything in the collection is

And yes, we hope to offer INTERNET connectivity in our lab sometime in
the first half of 1992.

FCC and other government regulations strive to protect public interest
n, and access to, cable TV, radio, amateur radio and other
communications highways; likewise should we advocate public uses of
computer technology, and telecommunications.

Haven't you noticed that your colleagues and friends are quickly being
talking to "connected" colleagues a lot more frequently than your offline
friends? This is Not a Good Thing. Institutionally. Nationally. Globally.

lives, from Moscow to Mexico City, Cupertino to Halifax. People finding
out about their similarities rather than focusing on what divides them.
All possible on the net.

Gee, you don't need the NREN for just Email, I can hear you say. Right.
Not for text. What about when it includes video, color photos,
multimedia?

Gigabits you say. I don't know how much bandwidth I need to my house. In

You know Warhol's "everyone's famous for 15 minutes?" Once you are into
computers you are only satisfied with what you've got for 15 minutes!
("Faster, higher, stronger", the Olympic motto, could be appropriated by

So, to cut to the chase, yes. The little guy not only needs to be
nformed about What's Going on Out There, but he needs some way to Be Out
There. I guess you can either be a signpost, or a roadblock, or line
noise.

Jean Armour Polly                             "Don't postpone joy!"
Assistant Director,Public Services         Liverpool Public Library
                                            INTERNET: polly@LPL.ORG
                   -==--==--==-<>-==--==--==-

                      LIBERATION TECHNOLOGY
             Equal Access Via Computer Communication

                        by Norman Coombs
                   (NRCGSH@RITVAX.ISC.RIT.EDU)

use a computer with a speech synthesizer,and regularly teach a class of
no physical handicap. Some, however, are hearing impaired, and others
totally deaf. I have team-taught another course at the New School for
Social Research, some 350 miles away, with a teacher who is blind and
confined to a wheelchair. On the computer screen, our handicaps of
blindness and mobility make no difference.

One of the courses I teach online is African American history. In that
class, some students are White, some Black, others Asian, and still
others Native American. Obviously, some of the class members are male and
others female. All of these differences, like those of the handicaps
these characteristics disappear; participants share their identities,
views and feelings freely. However, these differences no longer block
communication and community. In fact, conference members often feel free
to make such differences one of the topics for discussion. A student in
my Black history course said that what he liked about conducting a class
male, female, Black, White, Red, Yellow, blind or deaf. His comments were
accepted for their own worth and not judged by some prior stereotype.

One myth about the computer is that it is cold, depersonalizing and
ntimidating. When I began using the computer to communicate with
teaching. First, it liberated me, a blind teacher, from my dependence on
other people. I now have all my assignments submitted through electronic
mail including take-home exams,and have little need for human readers.
Because of this I have become a member of a pilot study using computer
conferencing to replace classroom discussion for students in continuing
education. Students with a personal computer and modem could work from
and also let them set their own schedule.The conference facilitates
at the same time. In addition, I find it easy to send frequent personal
notes to individual students, giving me more contact with individual

continuing education students who no longer have to commute. Second,
those who had been taking television or correspondence courses.  The
online experience gives them a means of exchanging information between
themselves and their teacher. The third group turns out to be regular day

Although computer conferencing had obvious benefits for me, I had failed
to grasp its significance for disabled students in general. Only when a
conversed with one of her teachers without using an intermediary. She
also remarked that mine had been her most valuable college course because

Computer conferencing can also benefit people with mobility impairments.
They can go to school while they stay at home. The distance involved
could be anything from a few miles to all the way across the continent or
across an ocean. Students with motor impairments can also use this
mpaired persons use a computer even though they cannot handle a
keyboard.

But conferencing liberates more people than the physically disabled. All
any initial computer phobia, many found it easier to participate. Where
there is no stage then there is no stage fright.

While some educators prefer to keep the teaching process academic and
objective, others are convinced that students learn more profoundly when
they become emotionally engaged in the process. My class underlined this
aspect of conferencing. In a discussion on welfare, one woman in her
twenties confessed to being on welfare and described her feelings about
t. In a Black history course, students described personal experiences as
victims of racism. White students admitted to having been taught to be
that they had prejudices about various shades of color within their own
community. As a teacher, I often felt that I was treading on privileged
of my teaching career.

Computer communications is infamous for people making thoughtless and
rresponsible attacks on one another, something known as "flaming". In my
experience, happily, there has been almost none of this. First, the
teacher has the opportunity to set ground rules and establish a
electronic mail. Once a mass mailing has been sent, it is irretrievable,
to see. Most students seemed intuitively aware of the potential for
misunderstanding and, before criticizing someone, they frequently asked
questions to be sure that they understood what had be meant by the
t was read by most of the class. Usually, I prefer to leave
controversial material on the conference and utilize it as a group
learning experience.

Computer communication has other important implications for both the
already be accessed from a personal computer and a modem. Soon, growing
numbers of reference works will be available on-line . While the
copyright problems are complex, it seems inevitable that large amounts of
text material from periodicals and books will also be accessible on a
computer network. I still have vivid memories of the first time I
connected my computer to a library catalog and found my book was really
there. It was only a year ago that I had my first personal, unassisted,
access to an encyclopedia. Not only is this technology liberating to
those of us who have physical impairments, but in turn, it will help to
make us more productive members of society.

Not all handicapped persons rush to join the computer world. Indeed, many
s frightening, and handicapped students may need special assistance to
the contrary, such technology will leave the underclass further behind.

Visually impaired computer users, at present, have one growing worry.
They fear that graphic interfaces and touch screens may take away all
that the computer has promised to them. Recently passed federal
legislation has tried to guarantee that future computer hardware and
cooperation by computer providers is a far better approach to the
community for software access, and it is having an important impact on
voluntary compliance. Others believe that adaptive software and hardware
can be produced which can adequately interpret graphic interfaces for the
visually impaired.

create a tremendous sense of powerlessness. Computer communication,
at one's fingertips. Not only can this empowerment liberate the
changes how one feels about oneself.

Finally, I am personally excited about the ability of computer networking
to provide more equal access to education and information for many
conduct an experiment involving two courses: one taught from Rochester
and the other from Washington, DC. Students from both campuses will be
enrolled in both classes. While some use will be made of videos and
movies, class discussions and meetings between a student and a teacher
connecting link. Some students will be hearing impaired, and one teacher

Norman Coombs
Rochester Institute of Technology
One Lomb Memorial Dr.
Rochester NY 14623
Email: NRCGSH@RITVAX.ISC.RIT.EDU

                   -==--==--==-<>-==--==--==-

                    THE NET:WHAT'S IT WORTH?
                         by Mike Godwin
                        (mnemonic@eff.org)

>There is a lot of interesting talk about national data networks, ISDN,
>federally funded networks, etc., but I was wondering how people felt
>about its over-all importance in society. What are the practical
>purposes of a national network (a terminal in every home) when people
>are having a tough enough time keeping up with their mortgage payments?
>With millions out of work, millions in fact, illiterate-- aren't there
>economic and educational problems that have to be combatted before a
>national data network can be seriously considered?

There are a lot of answers to this question, and I can allude to only a
few of them here.

One answer has to do with the implied premise that there are either moral
or practical reasons to address our most pressing social problems first,
before we deal with public-policy issues that seem less pressing. Is this
t does not follow that establishing national public networks entails
*not* responding to the nation's economic problems. Surely we can do
both.

Secondly, there is a lot more consensus (even with all the debate one
network infrastructure in this country than there is about such issues as
nfrastructure tend to be over minor matters, relatively speaking.)

Third, getting people online may actually *help* solve the other
contributions of ideas. It should be noted that networked online
communications are unusual among communications media in that they follow
a "many-to-many" model (everyone on the "Net" can talk to everyone else,
model (e.g., newspapers, broadcasting, cable) or the "one-to-one" model
(telephones). What's more, discussions in this medium can be more
constraints to compose or reply to arguments, and since one cannot be
nterrupted. One of the reasons the First Amendment exists is to promote
nfrastructure that allows for the greatest exercise of First Amendment

Fourth, if we don't consider the policy issues now, it's not the case
that these issues will wait until we get around to them. They're being
made with public input or not.

There are other arguments for addressing network policy now, even though
them. But I have not the least moral qualm in giving attention to network
and online-communication policy issues now, since I believe
other problems.

                   -==--==--==-<>-==--==--==-

                  SUN DEVIL DOCUMENTS RELEASED

The Secret Service's response to CPSR's Freedom of Information Act (FOIA)
Devil investigation. The documents disclosed to CPSR reveal that the
Secret Service monitored communications sent across the Internet. The
materials released through the FOIA include copies of many electronic
newsletters, digests, and Usenet groups including "comp.org.eff.talk,"
"comp.sys.att," "Computer Underground Digest" (alt.cud.cu-digest),
"Effector Online," "Legion of Doom Technical Journals," "Phrack
Newsletter," and "Telecom Digest (comp.dcom.telecom)". Currently, there
s no clear policy for the monitoring of network communications by law
enforcement agents. A 1982 memorandum prepared for the FBI by the
Department of Justice indicated that the FBI would consider monitoring on
a case by case basis. That document was released as a result of a

Additionally, CPSR has found papers that show Bell Labs in New Jersey

The material (approximately 2500 pages) also suggests that the Secret
Service's seizure of computer bulletin boards and other systems during
Operation Sun Devil may have violated the Electronic Communications

Two sets of logs from a computer bulletin board in Virginia show that the
Secret Service obtained messages in the Spring of 1989 by use of the
obtained system administrator access. It is possible that the Secret
Service accessed this system without authorization. The more likely
explanation is that the agency obtained the cooperation of the system
administrator. Another possibility is that this may have been a bulletin
board set up by the Secret Service for a sting operation. Such a bulletin
board was established for an undercover investigation involving

The documents we received also include references to the video taping of
SummerCon, a computer hackers conference that took place in St. Louis in
and placed hidden cameras to tape the participants. The documents also
track of suspected computer hackers. This database contains records of
names, aliases, addresses, phone numbers, known associates, a list of
activities, and various articles associated with each individual.

CPSR is continuing its efforts to obtain government documentation
concerning computer crime investigations conducted by the Secret Service.
These efforts include the litigation of several FOIA lawsuits and
attempts to locate individuals targeted by federal agencies in the course
of such investigations.

Contact sobel@washofc.cpsr.org (David Sobel)

                   -==--==--==-<>-==--==--==-

             BERMAN TO HEAD NEW EFF WASHINGTON OFFICE

The Electronic Frontier Foundation  today announced the opening of
a permanent office  in Washington D.C. and named Jerry Berman,
former head of the ACLU Information Technology Project, to direct
ts operations.

creation of the Washington office and the appointment of Jerry
Berman demonstrates our commitment to build a national
organization.  It will give the EFF the ability to effectively
advocate policies that will reflect the public's interest in the
creation of new computer and communications technologies."

Jerry Berman, incoming Director of the EFF Washington Office,
on these issues, and to help create policies that will maximize
both civil liberties and competitiveness in the new social
environments created by digital media."

"The EFF," Berman continued, "is hard at work developing
nitiatives that will ensure that all present and future
'electronic highways', from the telephone network to the National
Research and Education Network, enhance First and Fourth Amendment
accessible to all segments of society."

Jerry Berman was until December 1991 director of the ACLU
Legislative Counsel in Washington, D.C. 

During his career, Mr. Berman has played a major role in the
Act of 1978 (warrants for national security wiretapping); the
Electronic Communications Privacy Act of 1986 (warrant
communications); and the Video Privacy Protection Act of 1988. 
Over the last two years, he has spearheaded efforts to establish

For more information contact:
Jerry Berman, Director                   Gerard Van der Leun
Electronic Frontier Foundation                           EFF
Washington, DC 20003                     Cambridge, MA 02141
Telephone: (202) 544-9237               Phone:(617) 864-0665
FAX: (202) 547-5481                      FAX: (617) 864-0866
Email: jberman@eff.org                    Email: van@eff.org

              UPDATE ON EFF ACTIVITIES

The EFF, through its headquarters in Cambridge and its newly
opened office in Washington, is currently advocating that:
     *Congress establish an "open telecommunications platform"
      featuring "Personal ISDN" ;
     *the open platform be created with legislative safeguards
      that ensure a level playing field for all those competing
      in the information services market;
     *the NREN serve as a "testbed" for new voice, data, and video
      services that will eventually be offered over our National
      Public Network;
     *electronic bulletin boards be afforded the same First
      Amendment protections enjoyed by other media;
     *citizens who use computers for communications purposes be
      afforded the full protection of the Fourth Amendment; 
     *an Electronic Freedom of Information Act be passed that will
      grant citizens access to the electronic version of public
      information consistent with the public's right to know; and
      that
     *technical means be mandated to insure the privacy of
      personal communications carried over cellular and other
      radio-based communications systems.

The Electronic Frontier Foundation is also a co-sponsor (along
s designed to explore the means for achieving the communications
OMB Watch to the NAACP participate in forum activities.  The
Communications Policy Forum is funded by foundations as well as a

                   -==--==--==-<>-==--==--==-

                WARNING - MICHELANGELO VIRUS (PC)
   Original-Sender: Virus Alert List 
     From: "A. Padgett Peterson" 


>From all reports this destructive virus is spreading world- wide very
become "common" in just ten months following detection. I have
encountered three cases locally in just the last few weeks.

Three factors make this virus particularly dangerous:

currently reported. Since the virus infects only the Master Boot Record
on hard disks and the boot record of floppy disks, viral detection
techniques that rely on alteration of DOS executable files will not
MBR may only provide users with a single warning that, if execution is

consequently many virus scanners in use today will not pick up the virus
unless more recent updates have been obtained.

the past) which are more annoying than dangerous, the Michelangelo virus
of the hard disk rendering it unreadable by DOS. Further, since the FATs
(file allocation tables) may be damaged , unless backups are available

Fortunately, the Michelangelo virus is also very easy to detect: when
(IBM), and DR-DOS (Digital Research) {all names are registered by their
owners}) program will return a "total bytes memory" value 2048 bytes
lower than normal. This means that a 640k PC which normally returns
not necessarily mean that Michelangelo or any other virus is present, the

the boot record (executable area found on all floppy disks including


                   -==--==--==-<>-==--==--==-

                    ARE YOU AN INTERNET NERD?

This quiz is dedicated to all of those people who find themselves
constantly roaming the net.  Do you leave yourself logged in
twenty-four hours a day, even when you're not home?  Is your
things at distances greater than 2 feet?  Yes, YOU.  You know who
you are.

Ok... shall we begin?  Yes?   5 points... (you could've backed out.)

Unless otherwise stated, point values are as follows: 2 for (a), 4 for
(b), 6 for (c), and 10 for (d).
--------------------------------------------------------------------

     Multiple machines at the same site do not count.

____Internet      ____UUCP       ____Other public access   ____Other

____Bitnet        ____Freenet    ____Internet BBS          ____All seven

                                   (2 points each)

     a)  Huh?
     b)  More than one
     c)  More than five
     d)  I'm still looking for a really funky quote

     a)  Nobody sends me any mail... snif
     b)  Three, but they're all from Lester in the next cubicle
           over, because he has nothing better to do
     c)  I can't count that high, I failed calculus
     d)  Don't ask me now, I'm too busy.  Send me e-mail.

     see what the heck those perverts were talking about?
     a)  Yes, and I'm so ashamed
     b)  Yes, and I'm so embarrassed
     c)  Yes, and would you please explain a few things to me...
     d)  No, never.    (10 points.  You're lying.)

     via a computer network?
     a)  No
     b)  Yes, through a newsgroup we both posted on
     c)  Yes, by chatting randomly over the Internet (shame!)
     d)  Yes, by chatting over RELAY

     of your time doing?
     a)  Going through the library system and putting books on reserve
     b)  Reading _Alice in Wonderland_ in the online bookshelf
     c)  Reading the monthly postings on rec.humor.funny
     d)  Writing up stupid quizzes because you've done everything else

     day, what would be the percent chance that your phone would
     be busy?

     a)  Zero... I've got call waiting
     b)  25%.... I only dial in from work  (Uh, hi, boss)
     c)  75%.... Duh, so that's why nobody ever calls me
     d)  Zero... My modem has a separate phone line

     a)  The comp. groups... because they're so informative
     b)  The soc. groups.... because they're so multicultural
     c)  The rec. groups.... because they're so diverting
     d)  The alt. groups.... because I don't know what half those
                             words mean

     a)  I have to pay $5/month for it
     b)  The damn sysadmins won't give me enough quota to hold
         all my .GIF's
     c)  All those programmers keep tying up the modem lines
     d)  I have to stay in school to keep it

     a)  10 am... coffee break
     b)  3 pm.... General Hospital's on
     c)  12 am... one last login before I hit the sack
     d)  4 am.... Oh my God, I've got a test tomorrow

ALRIGHT, FOLKS.  SCORING TIME!

             next year.
             telnet over to 128.6.4.8 and play around with the Quartz
             BBS for a while.
             this week, it'll do you some good.
             computer, go out in the woods for a few days, and relax.
             Lay back and listen to the birds singing.  Clear your mind.
             And don't forget to unsubscribe yourself from all those
             lists before you leave.


--written by slewis@magnus.acs.ohio-state.edu (Sarah Lewis) in a moment
  of extreme boredom.  Disclaimer:  OSU doesn't know I wrote this, and
  it's probably better that way.  Sigh.  Time to hit the books....

                   -==--==--==-<>-==--==--==-

    THE ELECTRONIC FRONTIER FOUNDATION'S FIRST ANNUAL PIONEER AWARDS
                        CALL FOR NOMINATIONS
      (Attention: Please feel free to repost to all systems worldwide.)

knowledge,freedom,efficiency and utility. Along the electronic frontier,
this is especially true. To recognize this,the Electronic Frontier
Foundation has established the Pioneer Awards.  The first annual Pioneer
Awards will be given at the Second Annual Computers, Freedom, and Privacy
Conference in Washington, D.C. in March of 1992.

All valid nominations will be reviewed by a panel of outside judges
chosen for their knowledge of computer-based communications and the technical,
legal, and social issues involved in networking.

There are no specific categories for the Pioneer Awards, but the
following guidelines apply:
   1) The nominees must have made a substantial contribution to the
communications.
   2) The contribution may be technical, social, economic or cultural.
   3) Nominations may be of individuals, systems, or organizations in the
   4) Nominations are open to all, and you may nominate more than one
   5) All nominations, to be valid, must contain your reasons, however
brief, on why you are nominating the individual or organization, along
anonymous nominations will be allowed.
   5) Every person or organization, with the single exception of EFF

You may nominate as many as you wish, but please use one form per
nomination. You may return the forms to us via email at:
             pioneer@eff.org.
You may mail them to us at:
             Pioneer Awards, EFF,
             155 Second Street
             Cambridge MA 02141.
You may FAX them to us at:
             (617) 864-0866.

Just tell us the name of the nominee, the phone number or email address
at which the nominee can be reached, and, most important, why you feel
the nominee deserves the award.  You can attach supporting documentation.

We're looking for the Pioneers of the Electronic Frontier that have made
and are making a difference. Thanks for helping us find them,

The Electronic Frontier Foundation

              -------EFF Pioneer Awards Nomination Form------

          pioneer@eff.org
or via surface mail to EFF 155 Second Street, Cambridge,MA 02141 USA;
or via FAX to USA (617)864-0866.


Nominee:

Title:

Company/Organization:

Contact number or email address:

Reason for nomination:


Your name and contact number:

Extra documentation attached:

              -------EFF Pioneer Awards Nomination Form------

                   -==--==--==-<>-==--==--==-

              MEMBERSHIP IN THE ELECTRONIC FRONTIER FOUNDATION

and activities into other realms of the electronic frontier, we need the
financial support of individuals and organizations.

becoming a member now. Members receive our quarterly newsletter,
EFFECTOR, our bi-weekly electronic newsletter, EFFector Online (if you
believe that support should be freely given, you can receive these
things even if you do not elect to become a member.

Your membership/donation is fully tax deductible.

Our memberships are $20.00 per year for students, $40.00 per year for

Our privacy policy: The Electronic Frontier Foundation will never, under
any circumstances, sell any part of its membership list.  We will, from
time to time, share this list with other non-profit organizations whose
explicit permission, we assume that you do not wish your membership

---------------- EFF@eff.org MEMBERSHIP FORM ---------------<<<

Mail to: The Electronic Frontier Foundation, Inc.
         155 Second St. #22
         Cambridge, MA 02141

            $20.00 (student or low income membership)
            $40.00 (regular membership)
            $100.00(Corporate or company membership.
                    This allows any organization to
                    become a member of EFF. It allows
                    such an organization, if it wishes
                    to designate up to five individuals
                    within the organization as members.)

    [  ] I enclose an additional donation of $            

Name:
Organization:
Address:
City or Town:
State:       Zip:      Phone:(    )             (optional)
FAX:(    )              (optional)
Email address:                   

to my Mastercard [  ]  Visa [  ]  American Express [  ]

Number:                     

Expiration date:            

Signature: ________________________________________________

Date:                                                     

other non-profit groups from time to time as it deems
appropriate   [ ].
                       Initials:___________________________

|====================================================================|
|                   EFFector Online is published by                  |
|                  The Electronic Frontier Foundation                |
|                 155 Second Street, Cambridge MA 02141              |
|                 Phone:(617)864-0665 FAX:(617)864-0866              |
|                     Internet Address: eff@eff.org                  |
| Reproduction of this publication in electronic media is encouraged |
|               To reproduce signed articles individually,           |
|          please contact the authors for their express permission.  |
|====================================================================|





AD: