F I D O  N E W S --                   Vol.11  No.21    (23-May-1994)
+----------------------------+-----------------------------------------+
|  A newsletter of the       |       ISSN 1198-4589                    |
|  FidoNet BBS community     |         Published by:                   |
|          _                 |                                         |
|         /  \               |      "FidoNews" BBS                     |
|        /|oo \              |       +1-519-570-4176     1:1/23        |
|       (_|  /_)             |                                         |
|        _`@/_ \    _        |       Editors:                          |
|       |     | \   \\       |         Sylvia Maxwell    1:221/194     |
|       | (*) |  \   ))      |         Donald Tees       1:221/192     |
|       |__U__| /  \//       |         Tim Pozar         1:125/555     |
|        _//|| _\   /        |                                         |
|       (_/(_|(____/         |                                         |
|             (jm)           |      Newspapers should have no friends. |
|                            |                     -- JOSEPH PULITZER  |
+----------------------------+-----------------------------------------+
|               Submission address: editors 1:1/23                     |
+----------------------------------------------------------------------+
|  Internet addresses:                                                 |
|                                                                      |
|    Sylvia -- [email protected]                       |
|    Donald -- [email protected]                    |
|    Tim    -- [email protected]                                      |
|    Both Don & Sylvia    (submission address)                         |
|              [email protected]                    |
+----------------------------------------------------------------------+
|       For  information,   copyrights,   article   submissions,       |
|       obtaining copies and other boring but important details,       |
|       please refer to the end of this file.                          |
+----------------------------------------------------------------------+
========================================================================
                         Table of Contents
========================================================================

1.  Editorial.....................................................  2
2.  Articles......................................................  2
     Dear Madam Emilia...........................................  2
     Subject: The Italian Crackdown?? (fwd)......................  4
     FidoNet Crackdown in Italy..................................  5
     BBS-PR Set for Rewrite......................................  7
     The Power Freaks are at it AGAIN!...........................  8
     On the Subject of Fluff.....................................  9
     Dear Net Citizen:........................................... 21
     Ever Feel Like You're Being Watched?........................ 25
     Nodelist Size (again)....................................... 28
     INTERGREEK: An echo about Greek things and people........... 29
3.  Fidonews Information.......................................... 30
FidoNews 11-21                 Page:  2                    23 May 1994


========================================================================
                             Editorial
========================================================================
I spent all day in the garden, re-arranging weeds.  I dug things
up in one place, and poured water on them in another.  I'm not
sure yet, if this experiment will work.  If everything keeps
growing, with more room around it an in a manner conducive to it
being itself, then it will work.

We received a lot of somewhat duplicated news about problems
Fidonet is having in Italy.  Apparently none of the Fidonet
nodes in Italy exist anymore.  This is distressing.

It's interesting, to read the headers and trailers on all of
the relevent messages.  Same topic, utterly diverse geographical
sources.  The world is getting very small.
========================================================================
                              Articles
========================================================================
Dear Madam Emilia

Q:  Dear Emilia, please help me.  I feel left out and nerdish,
because all my friends on the Internet belong to clans, and I do
not even know what clans are.  My friends are laughing at me
because I do not know how to belong with them.

A:  Darling silly one, you are a member of Fidonet, and are
beautifully innocent in your ignorance.  Clans appear to be
prestigious and important, and they are.  This is not as
appealing as it seems.  Consider the meaning of the term,
"old boys' network", and how bigotry and mindless exclusivity
have historically been perpetuated by such organizations.
Fortunately, our home-grown Fidonet is relatively free of
such pompous nonsense.

Q:  But Emilia, prestigious clans are the movers and shakers
of the electronic-super-duper!  I want to be able to help build
our new e-world.  I don't want to sit in a lonely corner all by
myself, twitching.

A:  If all you want to do is help build the e-world, then simply
correspond with people you like, and say what you really mean,
and help protect everyone's ability to do the same.  Always help
anyone who wants to learn how to BBS with any spare time
available to you.  "Rebels" who form groups and give themselves
titles primarily to distinguish themselves from other people are
wannabe terrorists, or inefficient fashion mongers.  Real rebels
are mere honest humans who enjoy other humans, while finding funny
hats and secret decoder rings to be unnecessary.

Q:  Oh, Emilia.. I have been reading "Stranger in a Strange
Land" by Heinlein, and .. um.. um.. I have a crush on Mike the
Martian.  I am enamoured by his reverence for inter-personal
relations and his honesty and his utter failure to understand
FidoNews 11-21                 Page:  3                    23 May 1994

the nastier aspects of human culture.  What should I do?  I'm
DESPERATE!

A:  Of course you are in love with Mike, dear.  He is the only
character in Heinlein's book who does not objectify all women as
bubble-heads capable only of preparing and being meals.  Mike
groks anyone who grocks, regardless of gender.

Q:  but...dear Emilia, several of the female characters in the
book are brilliant.  How can you suggest that Heinlein's writing
is sexist?  You are desecrating my second favorite hero!

A:  Sure some female characterrs are portrayed as having enough
brains to do what they are told to do.  If they are so smart,
why are *all* authority figures in the book male?  Heinlein is
just a tad dated, that's all.  For example, the main authority
figure refers to "homosexual" males as "misguided".  Use of this
term, "misguided", is very strange.  It presumes that everyone
should be guided.

Q:  I think you're hung up on ra-ra feminismism so you don't
grok the POINT of the book, which is epitomized by Mike.  BTW, I
find the last cover of WIRED bears an uncanny resemblance to
Mike.  Have you met Mike?

A:  No.  He's fictional.

Q:  Stop being blasphemous!  "Politeness" (you're an etiquette
expert, right?) requires tolerance and sensitivity towards other
peoples' idols.  Or lack of idols.  So, will you please gimme a break?

A:  Sure, dear.  You can talk to me all you like.  I can always
press a page down key.  But if you are truly writing from your
heart I probably won't.  Everything else is boring, including
your namby-pamby "oh poor little me, I want to please you"
schtik.

Q;  Do you think it is wrong of me to enjoy a book which
propogates a few totally misguided presumptions about gender
issues?

A:  Yes.  But, so what?  Edit the nasty parts from your mind if
you don't like them.
FidoNews 11-21                 Page:  4                    23 May 1994


Subject: The Italian Crackdown?? (fwd)

From: Stanton McCandlish <[email protected]>
Message-Id: <[email protected]>
Subject: The Italian Crackdown?? (fwd)
To: [email protected], [email protected] (eff.talk)
Date: Mon, 16 May 1994 13:03:15 -0400 (EDT)
Cc: [email protected] (alt.society.resistance),
Cc:

[notes in brackets are mine. - [email protected]]

Forwarded message:
Date: Mon, 16 May 1994 12:29:14 +0200 (MET DST)
From: Fabrizio Sala <[email protected]>
Subject: The Italian Crackdown??
To: [email protected]
Cc: [email protected]

Hello. I'm the Sysop of one of the BBSs in Italy.

I'm writing this message in this list to  inform  you,  the  BBS
community, of what is going on in Italy.

Some days ago,starting from Pesaro (Italy), our Police started a
large perquisition through [inquisition against] many  Amatorial
[amateur]  BBSs,  mostly connected to the main networks (One for
all: Fidonet... but also PeaceNet and many others)

They're getting everything they can find:  computers,  monitors,
drives,   hard   disks,   floppy,   cdrom,  streamer  tapes  ...
everything, without looking if  they  are  or  not  in  any  way
"illegal" ...

Generally,  every  network  in Italy is now full of holes... and
many of us lost everything "in the name of the anti-piracy"...

Nobody of us is doing anything in any way illegal, but they  are
still getting everything...

They got more than 50 BBS and Police's work is still going on...

I  hope  that  everyone  diffuses this message ... or in any way
tells everybody what's going on ...

..and if you have any way to help us...please do it!
We made our best to make  the  italian  telecommunication  scene
working... they are killing us!

See you later... if they don't get me!

_  end fwd _

Stanton  McCandlish  * [email protected] * Electronic Frontier Found.
FidoNews 11-21                 Page:  5                    23 May 1994

OnlineActivist "In a Time/CNN poll of 1,000 Americans  conducted
last  week  by Yankelovich Partners, two-thirds said it was more
important to protect the privacy of phone calls than to preserve
the  ability  of police to conduct wiretaps. When informed about
the  Clipper  Chip,  80%  said  they  opposed  it."   -   Philip
Elmer-Dewitt, "Who Should Keep the Keys", TIME, Mar. 14 1994

----------------------------------------------------------------------

FidoNet Crackdown in Italy

forwarded by Nigel Allen, 1:250/438

Here is a message that was posted to the misc.activism.progressive
newsgroup on Usenet. It should be of concern to sysops everywhere.
Contact the original poster, Cesare Dieni ([email protected]),
if you need more information.

/* Written  7:03 PM  May 18, 1994 by gn:cesare in igc:gn.announcemen */
/* ---------- "Fidonet Crackdown in Italy" ---------- */
From: Cesare Dieni <[email protected]>
Subject: Fidonet Crackdown in Italy

For your information I report what's happening in Italy at the moment
(N.B. after the last election a fascist governement succeded)....

Fidonet Crackdown in Italy

On May 10-12 1994, the first nationwide crackdown on telecom nets was
operated by Italian police.

Acting  after  a  warrant  issued by a Prosecutor in Pesaro, about 60
Bullentin Board Systems throughout the country have been visited  and
searched by police officials.

Dozens  of people were formally accused of "distribution of illegally
copied software and appropriation of secret passwords" under the  law
approved by Italian Parliament in January this year.

In  several  cases  police  officials didn't know what to search for,
thus seizing computers, floppy  disks,  modems  along  with  electric
outlets, answering machines, audiotapes, personal effects.

The  raids also hit private houses and belongings, and in some places
sleeping people were abruptly woken up facing machine guns.

After searching probably around one third of  the  entire  network  -
that  includes  more than 300 BBSes - police officials closed several
Fidonet nodes, but no arrests were made.

A still inaccurate  figure  of  people  were  charged  with  software
piracy,  and  dozens  of  computers and related devices were seized -
along with thousands of floppy disks, CD-Roms, W.O.R.M.S.

Moving after a suspected software piracy ring run by people  involved
FidoNews 11-21                 Page:  6                    23 May 1994

in  a Fidonet node, the crackdown started in the night between May 10
and 11 in Milano, targeting  in  the  two  following  days  BBSes  in
Pesaro, Modena, Bologna, Ancona, Pisa and other cities.

Fidonet  Italia,  member  of  the  worldwide  Fidonet  network,  is a
non-profit organization devoted  to  distribution  of  shareware  and
freeware  programs  as well as to electronic forums on topics ranging
from technological to social issues. An essential communication  tool
for  several  groups  and individuals throughout the country, Fidonet
Italia became an active  multi-cultural  vessel  and  distributor  of
several  different  nodes  dedicated  to  specific  issues: Peacelink
(solidarity, human rights), Cybernet  (cyberpunk),  Ludonet  (games),
Scoutnet,  Amynet,  and  others.  For  thousands  of  Italian people,
Fidonet BBSes today are  invaluable  tools  of  information-exchange,
social activism and professional activities.

The  network  policy strictly prohibits any distribution of illegally
copied software and fraudulent  appropriation  of  secret  passwords.
Also, Fidonet is one of the few International organizations which has
always stated and  pursued  a  clear  position  against  unauthorized
copying software.

At the moment, the raids seems to be motivated by accusations against
two people involved in a Pesaro-based  BBS  who  were  using  Fidonet
contacts to allegedly distribute illegal copies of computer programs.

However,  there  are  no  reasons  for  such  a  vast law enforcement
operation. Most likely the prosecutor acted simply on  the  basis  of
the  Fidonet telephone numbers list (publicly available) owned by the
two suspected of software piracy. The vast  majority  of  the  people
searched  don't have any kind of relationship with the suspected, and
many of  the  search  warrants  stated  a  generic  "conspiracy  with
unknown" for the crime of software piracy.

Particularly,  the  random and arbitrary seizures of floppy disks and
personal computers are completely unmotivated, because every BBS is a
completely  independent  structure  and each sysop is running his/her
own hardware and software.

The seizures will resolve in a great economic loss for  these  people
and  their  professional  activities  will  be  surely  affected from
negative publicity. Some of them own small computer-related companies
while  others  are  physicians, hobbyists, students who risk personal
savings to run their services.

Because police officials also seized electronic  and  paper  archives
containing  data  and  numbers  of the people who logged onto Fidonet
nodes, it is evident that investigations are  going  even  further  -
thus violating the constitutional right to privacy.

The  first  result  of  this crackdown is that many Fidonet operators
decided to shut down immediately their systems all over the  country,
fearing heavier police intrusions in both their public activities and
private lives.

FidoNews 11-21                 Page:  7                    23 May 1994

While the Italian Parliament recently approved  specific  laws  about
copyright  and  piracy of computer software, there are still no rules
to  protect  personal  privacy  in  the   electronic   medium.   This
legislative  void  inevitably  makes  the  sysop the only responsible
person about anything happens onto and around his/her own BBS.

Fidonet  operators  do  not  want  and  can  not  be  the  target  of
undiscriminated  raids  that,  forcing  them  to  closing  down their
activities, cause serious damages to themselves as  well  as  to  the
entire community.

In  an  article published Friday 13 by the newspaper "La Repubblica",
Alessandro Marescotti, Peacelink spokesperson, said: "Just  when  the
worldwide BBS scene is gaining general respect for its important role
at the community level, in Italy the law  hits  those  networks  that
have always been strongly against software piracy. Charging dozens of
honest operators with unmotivated accusations, the main goal of  this
crackdown   is  directed  against  the  social  activities  of  small
community nets - thus clearing the space for commercial networking."

While terms and figures of  the  entire  operation  should  still  be
clarified, on Sunday 15 Fidonet Italia operators will meet in Bologna
to study any possible  legal  counter-action.
--  End  of  forwarded message -------

--
Cesare
-- End of text from cdp:headlines --

--------------------------------------------------------------------
This material came from PeaceNet, a non-profit progressive networking
service.  For more information, send a message to
[email protected]
--------------------------------------------------------------------

----------------------------------------------------------------------

X-Genie-From: R.Parson
BBS-PR Set for Rewrite

The next version of the Computer Bulletin Board Guide to Public
Relations is scheduled to be released 7-1-94. Author Robert Parson
says he is solicting comments and suggestions. "Several Sysops have
asked questions and have made suggestions since its first public
release. It's time for some adjustments."

Robert wrote the Guide to assist Sysops in dealing with the Media.
News Releases, Finding Media Outlets, and Why Sysops should have
Business Cards and Stationary are among the topics covered.

The next version will include more information on Crisis Management,
more News Releases that can actually be used by Sysops, and a new
section on Market Research.

The current version is BBS-PR15.ZIP, available at Paradox of Arkansas
FidoNews 11-21                 Page:  8                    23 May 1994

BBS 501 484 0944 (Fred Ayers, Sysop), and has also been distributed
on SDN. It is supported in the BBS Public Relations Conference on
Paradox.

Robert Parson is a Broadcast Journalist with over 15 years of
experience, and has been an active particpant in his local BBS
Community for over five years.

Robert can be reached at:
GEnie  R.Parson
Internet [email protected]
Fido   1:3822/1
voice  501 646 9332
mail   2501 Phoenix
    Fort Smith, AR 72901

----------------------------------------------------------------------

The Power Freaks are at it AGAIN!
Steve Winter
FidoNet 1:18/98

         ALL MODERATORS BEWARE!!! They're at it AGAIN!!!

I hope that everyone can look beyond the initial  appearance  of  the
recent  BOP.   It's  the  same  old thing.  The RECs (or a handful of
power freaks that are influencing them) want  to  declare  themselves
the owners of the backbone they are merely supposed to coordinate the
distribution of.  The Postmasters want to be the  editor-n-chiefs  of
the  magazines  they  help  distribute (and hardly even that now with
Planet Connect on the scene).

Item 3 in the BOP 105 for "removing" an echo from the backbone reads:

3) There are no  longer  three  RBCs  requesting  that  the  Backbone
   distribute the conference to their regions.

A  bit  presumptious  since  Planet  Connect  is now distributing the
backbone.  An echo could have a tremendous amount of traffic  and  be
invisible  to  the "RBC"s.  Just think of the absolute ownership that
this would give to the  technically  obsolete  REC's.   This  handful
would  then  have  absolute  ownership  of  hundreds  of  echos  that
moderators built up (some like myself with years of  work  and  great
expense).

Then,  we  have  the  real  cute one, where a handful of people could
(instead of voting with their feet, or starting their own echo,  like
I  DID), they could mount a letter writing campaign and just trash an
echo until it generated enough complaints that: BINGO: We  find  item
#5 for removing an echo:

5)  When  such an excessive number of complaints about the conference
   or its Moderator are received by the RBCs that a majority of them
   vote to remove the conference from the Backbone.

FidoNews 11-21                 Page:  9                    23 May 1994

THE  POSTMASTERS  of  FidoNet  DO  NOT have any authority to remove a
valid echo with a valid moderator just because its controversial  and
a certain portion of SysOps don't like it.

IF  you don't like an echo, DON'T CARRY IT, but don't force the issue
into a Federal court room by playing a few games  and  thinking  that
new  BOP  is going to transfer ownership of echos from the moderators
to the "ZBC" or whatever.

I've watched as a handful of false christians tried to steal my echo,
then  when  they couldn't do that, they stole their echo name from my
echo description, they even sleazed it onto the backbone, but I think
they  found  out that building an echo is a bit more work and expense
than they had *ever* imagined.

No "BBC" club has the right to remove an  established  backbone  echo
regardless  of  how  many  whiners they can get for an ongoing letter
writing campaign.

This sham is the SAME OLD WINE and not even hardly a brand new bottle.

The RECs are technically obsolete as is the ZEC in many respects.  To
think  that  they  can  grab  absolete ownership of the backbone by a
quick "BOP"... IT'S THE SAME old trip that has been tried  and  tried
before.

The Postmasters want to be editor-n-chiefs!!!!

Don't  FALL  FOR IT!!  No group in FidoNet has the right to just vote
some moderator's echo  off  of  the  backbone.   I  can't  imagine  a
moderator  worth  his salt that would not take action if that were to
happen.  It could be the end of FidoNet as a practical entity.

The MODERATORs are the owners of the echos, they  always  have  been;
NOT  the  stars  (now  obsolete)  or  the coordinators (just about as
obsolete).

A handful of people, yet again, want to steal the  ownership  of  the
FidoNet  backbone  echos from the moderators that built them from the
ground up.

Don't fall for it!!

     Steve Winter PreRapture BBS 919-286-3606 USR-H16/V.32T
      Moderator/founder HOLY_BIBLE (The Wholly Bible Echo)

----------------------------------------------------------------------

On the Subject of Fluff
by Rick Castle, 1:352/23

    "Our inventions are wont to be pretty toys, which distract our
attention from serious things.  They are but improved means to an
unimproved end, an end which it was already but too easy to arrive at;
as railroads lead to Boston or New York.  We are in great haste to
FidoNews 11-21                 Page: 10                    23 May 1994

construct a magnetic telegraph from Maine to Texas; but Maine and Texas,
it may be, have nothing important to communicate.  Either is in such a
predicament as the man who was earnest to be introduced to a
distinguished deaf woman, but when he was presented, and one end of her
ear trumpet was put in his hand, had nothing to say.  As if the main
object were to talk fast and not to talk sensibly.  We are eager to
tunnel under the Atlantic and bring the Old World some weeks nearer to
the New; but perchance the first news that will leak through into the
broad, flapping American ear will be that Princess Adelaide has the
whooping cough.  After all, the man whose horse trots a mile in a minute
does not carry the most important messages; he is not an evangelist, nor
does he come round eating locusts and wild honey."

               --  Henry David Thoreau, from Walden, published 1854

The Problem of Fluff
--------------------

In the middle of the 19th Century, the telegraph became a very important
communication medium.  As wires were stretched across North America,
information began to flow instantaneously.  Telegraph offices became a
place where even isolated towns and villages could receive news as to
what was going on in the rest of the world.

It is hard to imagine a time when news and information sometimes took
days or weeks to arrive at its destination.  We have telephones, fax
machines, television, radio and online computer services all linked
together with arrays of wires, fiber optics and satellites.  The
quantity of the information is staggering.

Thoreau, when he wrote his journals at Walden Pond, was concerned not so
much as to whether Maine and Texas could communicate, but whether they
had anything useful to communicate.  This became evident after the
invention of the telephone, when people would sit for hours talking to
someone about nothing in general.

The trend continues even on today's online services and bulletin boards.
There is so much idle chit-chat, users complain about the fact they read
a hundred messages, but only one or two messages, if any, have anything
of interest to them.  This is actually quite good for the pay services.
They can bill more time to the user.

The problem which affects these services and networks is most of the
communication flow is fluff.  Fluff is a message (or a portion of a
message) with information which isn't relevant to anything in the
conference.  The person posting the message and the intended recipient
probably it doesn't care if it's relevant, either.  It's just filler to
keep a conversation going.  It is safe to assume that nearly 80% of
network message content contains fluff.

You've seen messages which contain fluff.  They are present in just
about every conference on every online service and network.  Its
presence is epidemic in proportion. Just ask any moderator of any
conference who has problems keeping discussions on topic.  Generally all
topics degenerate into some kind of fluff over time.
FidoNews 11-21                 Page: 11                    23 May 1994


Fluff comes in many forms.  Theory indicates the number of varieties may
be infinite.  This is due to the dynamic nature of humankind and their
relationships to each other.  When one person works to build something
of value, someone else will gunk it up with fluff.  Whether this is
intentional or accidental is irrelevant.  Everyone would like to think
they have something important to say.  But those who have given a great
deal of thought to how we communicate with each other, knows this is a
fallacy.  The greatest offenders in our current society are lawyers,
news media and government agencies.

Now with the electronic services providing a forum for anyone who can
get to a computer with a modem, the problem is growing exponentially.
Almost anyone can log on to an online service and voice their opinion.
They speak their mind with whatever authority they feel they have.  They
sit back and wait for the recognition they feel they deserve.  Sometimes
they are surprised to find out most don't really care about what they
said, and those who do will start feeding back some fluff.

We will discuss the more common varieties.  Let's begin now starting
with the most common form.

Flame Fluff
-----------

I was always taught, "If you don't have something nice to say, don't say
it at all." It is important to keep your temper to at least a low boil
when dealing with someone who's opinions don't mix with yours.  Most
folks do just fine with keeping their cool. Some go off so fast, you
don't know what's happened until you realize you're covered with manure.

Any discussion has the potential to escalate into a flame war.  It is
difficult to understand why some debates go on for weeks with nary a
harsh word, while other crash, explode and burn with just a few
messages.  (This is common among the participants of the WELDING
conference.  For example, "Grab your rods, Roy, and let's go get the
#$$*@&%!")

Flame messages are fluff, pure and simple.  They are the most common
form of it and normally don't contain any useful information.  (An
exception is when one of the participant's sister's mating habits is
mentioned, which can be quite useful, especially when a phone number is
included.)

Some forms of flame fluff are illegal in some states.  In fact, flame
fluff tends feed in itself until it grows out of control, sucking other
people into the conflict.  Many of these new participants are merely
trying to put out the flames, eventually getting so deep they begin
spouting their own expletives.  This is called Two-Alarm Flame Fluff.

Eventually, the conference moderator jumps in.  He tries every possible
way to find a peaceful solution to the problem.  Sometimes, the
moderator becomes involved in the "discussion".  He threatens the
offending parties with loss of access to the conference.  This will
either stop the problem or begin a new phase of messages where the
FidoNews 11-21                 Page: 12                    23 May 1994

moderator is called names such as Net-Nazi or Control Freak.  This is
when the fluff has degenerated to Three-Alarm Flame Fluff.

By this time, it is quite possible the discussion has become noticed in
other conferences.  Quite possibly one of the offending parties has gone
to one of these areas to rally support for his cause.  Pretty soon there
are several moderators involved. Participants begin to lose their
access.  Threats of legal action are thrown around.  Law enforcement
becomes interested because of death threats.  The discussion is now a
full fledged war spanning several conferences.  People who had nothing
to do with the original disagreement are now having their own
disagreements.  The messages are now at the Four-Alarm Flame Fluff
stage.

Now we come to the final stage.  Five-Alarm Flame Fluff really is no
longer a form of fluff directly related to the subject which caused the
disagreements.  All offending parties have lost access to the
conferences they were posting in.  Five-Alarm Fluff comes in the form of
short notices and newspaper articles about the lawsuits, no-contact
orders and drive-by shootings which resulted from the electronic verbal
conflagration.

At this point, government agencies begin think about regulating
electronic communications.  The proposals for modem licensing appear.
The legislation restricting our communications begin to flow through
congress and state legislatures.

It is best to avoid all forms Flame Fluff.  Some networks provide
special conferences where people can vent their frustrations, keeping
other conferences clear of unnecessary clutter.

Intellectual Fluff
------------------

Intellectual fluff is generally produced by people who are trying to
intelligently participate in a discussion, but who fail miserably.
These discussions generally involve subjects such as politics, religion
or economics, where a participant must have at least a rudimentary
knowledge of what it being discussed.

All of us would like to think of ourselves as intelligent.  We want to
be looked upon as competent.  We want to project ourselves in our
communications as people who can answer questions with authority.  At
least this is our view.

In reality, many people look like complete idiots (see Idiot Fluff
below).  They convey their ideas using poor spelling and bad grammar.
Their logic is usually flawed, ending up being torn to shreds with a
single sentence by someone who knows what they are talking about.
Needless to say, the participant who gets the short end of the stick in
these exchanges usually resorts to flame fluff.

How do we keep things from escalating to this point?  Keep the
discussions succinct and to the point.  If you want to discuss the finer
point of Nietzsche, go to the NIETZSCHE conference.  If you want to
FidoNews 11-21                 Page: 13                    23 May 1994

discuss the aesthetics of welded furniture, go to the WELDING
conference.  If you want to start flaming, go to a flame conference and
beat yourselves to death.  If you want to be involved in highly
intellectual exchanges, but can't deal with the demands of thinking,
just don't say anything.

Small Talk Fluff
----------------

Small talk fluff is tiny little messages sent between two people.  These
messages usually contain no quotations of the previous message, so
keeping dialogue continuity can be difficult.  A typical conversation
using this kind of fluff is best depicted using an example.

USER 1: Did you go to the movies?
USER 2: Yes.
USER 1: What did you see?
USER 2: Jurassic Park.
USER 1: Did you like it?
USER 2: It was great.  I liked the special effects.
USER 1: They were great.
USER 2: I wonder how they did it.
USER 1: I think they used computers.
USER 2: I wish I had a computer like that.
USER 1: I might get a new computer.
USER 2: What kind of computer?
USER 1: I don't know.  What's a good one?
USER 2: Well, I would only get one which would run Windows.
USER 1: Is that good?
USER 2: It means you will have a machine which can run about anything.
USER 1: What's so good about Windows?
USER 2: It makes the computer easier to use.
USER 1: Oh.  Are you going to another movie, soon?
USER 2: Yes.  I'll tell you about it when I do.
USER 1: That will be great.

This entire exchange was passed around a few thousand systems, all
around the world, over a period of several weeks, with the subject line
of Cannibals of the East Indies, and was posted in the WELDING
conference.  Obviously, the moderator was either napping or, perhaps,
visiting the East Indies.

Liars' Fluff
------------

We now have a very curious form of fluff.  Liars' fluff is used by
individuals with hidden agendas.  It is basically just plain lies.  The
motivation could be political, financial or for just plain fun.

Think about it.  You can drop a hot piece of inside information
(Economic Fluff) about a company in a stocks conference.  Or how about a
juicy tidbit (Electoral Fluff) about someone running for a political
office?  Or even better, how about some information (Promiscuity
Fluff) about someone's sister?  Like the person who just flamed you in
the WELDING conference.
FidoNews 11-21                 Page: 14                    23 May 1994


Sometimes two individuals will begin a cooperative effort to create the
appearance they are having a disagreement.  This form of Liars' Fluff is
called Pseudo-flame Fluff.  In reality, there is no disagreement, but a
carefully choreographed discussion.  This is usually done to give one or
both of the parties an appearance of a position on an issue when the
opposite is really true.

Most forms of Liars' Fluff is generally posted using an alias name so
the real person can deny they did it.

Appointment Fluff
-----------------

This is a very curious kind of fluff and very difficult to understand.
So let's get a picture of what is happening.

Two people are having a discussion.  One of the parties decides it would
be great if they met for lunch sometime.  The other agrees.  So the
first party sends a message to second party at 10:00 AM to meet for
lunch at 12:00 noon.  Now, the first party goes to the designated
location and waits for the second party.

That evening, the second party gets the message, and states they just
received the message.  The first party is quite upset because they were
stood up and begins to apply liberal helpings of flame fluff.

And so it goes on and on.

Why can't these people just pick up the phone and set the lunch date?
The technology we use is quite sophisticated and enjoyable to use, but
some things are better communicated through more traditional means,
like, for example, the telephone.  It is a far better approach than
announcing to the whole world you're doing lunch.

Technical Fluff
---------------

Generally, most technical discussions are kept inside their own
conference.  This is so the technical people (who populate every corner
of a computer network or online service) can discuss their obsession
with odd words and acronyms without fear of being laughed at.  (Rumor
has they don't even use English but programming languages to convey
ideas.)

Problems arise when some of these discussions originate in conferences
where large gathering of non-technical people are sending messages
containing intellectual, appointment or small talk fluff.  Most of these
users stay away from anything which contains an acronym.  This is wise.
But what about those bold few who dare to display their technical
prowess without the slightest idea what they are talking about?

The result is technical fluff.  Take the following exchange as an
example:

FidoNews 11-21                 Page: 15                    23 May 1994

TECH:    Okay, to solve your modem problem, you will want to reset it
        with the ATZ command from your term program.  You should then
        type ATS0=0 so it will not automatically answer the phone.  You
        can then issue the AT&W command to save the settings.
USER 1:  Okay, thanks.  My mom was getting quite upset when she heard
        the noise when the modem answered the phone.  Thanks again.
USER 2:  Um, I am having a problem with my modem.  I would like to fix
        it but I can't find the problem.
TECH:    What is the problem?
USER 2:  Well, it's making a kind of scraping sound.
TECH:    I don't think you have a problem with your modem.  It doesn't
        have any parts which could make a scraping sound.
USER 2:  It's got to be the modem.  Whenever I log in, and try to
        download a file, I get an error message.
TECH:    What kind of error message?
USER 2:  I don't know.  Just an error message.  I think it is the way
        the modem is hooked into the disk.  I read about it somewhere
        in a library book.  I think it was from Time-Life.  There was a
        little line in a picture which went from the modem to this
        little square marked CPU and back to the disk.  I think that is
        where the problem is. I would recommend the book to anyone.  I
        learned a lot from it.

The tech who managed to get entangled with this person is probably
kicking himself for even responding.  He is probably thinking about
distributing some flame fluff. Most likely he won't even respond to any
more messages from this person.  Technical people are like that.

A good rule of thumb is to never try and prove your technical abilities,
unless you have an unusual ability to use odd words and acronyms.  Even
if you do have some technical knowledge, keep in mind there will always
be someone out there to prove you wrong.  Technical people are elitists
by nature.  They don't like having to explain themselves to people who
think they know what they are talking about.

Avoid the use of intellectual fluff when working with these people.
They don't like wasting time debating philosophy.  Most technical people
have a difficult time with these kinds of subjects and will probably
ignore you.

Plagiarism Fluff
----------------

This is perhaps one of the most insidious forms of fluff.  No, the
person entering the message hasn't stolen his message from someone else.
There's too much danger in getting caught.  They post messages quoting
every line of a previous message.  They then enter their response with a
one-liner comment.

The most common form of abuse is when someone else has entered an
emotional retort to a message with abundant quantities of foul language.
Someone takes offense, quotes the entire message, to the letter, and
says that they are offended.  They may as well go out and preempt
television and radio broadcasts to make sure everyone knew someone said
a bad word.  This does draw attention, but usually to the one taking
FidoNews 11-21                 Page: 16                    23 May 1994

offense which results in Flame Fluff being generated.

There also is the situation where someone has entered a multiple message
post. The respondent quotes, in full, all of the messages and cheerfully
adds at the very end of the very last message, "I agree".

Snort.

First Amendment Fluff
---------------------

When a person who takes pride in his views and presents them in a
precise way, they are generally regarded favorable light by most of the
people reading them.  Any debates with this individual are generally
interesting, thought-provoking and a joy to participate in whether all
parties agree or not.  These individuals will use their real names
because even though they may be controversial, they are willing to stand
up for what they believe in an open, honest and accountable way.

On the other hand, there are those who stir up controversy for the sake
of stirring it up.  They usually hide behind an alias name and deny any
association between the "other" and the real person.  When they are
attacked, they begin to quote constitutional law.  This is known as
First Amendment Fluff.

First Amendment Fluff is a hybrid between Flame Fluff, Liars Fluff and
Intellectual Fluff, because it almost always involves a malicious
attack, usually contains false information and attempts unsuccessfully
to intellectually justify its existence.  It is usually always
intermixed with Flame Fluff.  The person using this form of fluff has a
stalker mentality, finding a particular person to attack.  Sometimes
these attacks can last for years, unless intervention occurs from law
enforcement.

In all sincerity, I don't believe the founding fathers of the United
States had the intention of allowing freedom of speech to include
freedom to spout innuendo and lies.  Its intent was to keep people from
being persecuted by the government for voicing their opinions.  Ethical
principles are important when discussing controversial views.  Those who
spout First Amendment Fluff tend to be in short supply of any form of
ethics.

Idiot Fluff
-----------

At one point or another, one comes across a message which makes no sense
whatsoever.  No matter how you look at it, no matter how you read it, no
matter how you rescramble the words, it is virtually impossible to get
the meaning of what was said.  This is called Idiot Fluff because the
person doing the posting was obviously an idiot. Here is an example:

    Date: 22 Sep 93  14:06:04
    From: John Doe
      To: All
    Subj: Hello
FidoNews 11-21                 Page: 17                    23 May 1994

    --------------------------------------------------------------
    i just got this computer have trouble log on and the messages
    don't work right i am cannot find a job is there anybody who
    knows why i will work for food thanks

The first question which arises is why does someone who is unemployed,
illiterate, hungry and not technically inclined posting a message
proving his unemployability, illiteracy, hunger and technical ignorance?
The answer is simply because he is an idiot.  And what do idiots post?
They post Idiot Fluff.

Okay, I don't want to come across as someone who is insensitive to
people who have lost their jobs for economic reasons.  Unemployed people
are not all idiots.  It's just in today's competitive economy, more
idiots are being flushed out of their jobs.  Just look at the last
election and all those in Congress who didn't return.

The major sub-type of Idiot Fluff is Illiteracy Fluff.  Have you ever
noticed in most English based conferences, messages from Europe are far
better spelled and have better sentence structure than messages coming
from America?  For most of these people, English is a second language.
It simply doesn't make sense.  America is the number one supplier of
Illiteracy Fluff.

Now, Illiteracy Fluff is a sub-type of Idiot Fluff.  Americans post the
most Illiteracy Fluff.  When we put these facts together, the conclusion
is obvious.

Americans look like a bunch of idiots to the rest of the world.

Argument Fluff
--------------

The purpose of most electronic conferences is to have the ability to
discuss various points on a subject.  Most conferences have a subject or
theme which keeps the discussion to a particular area of interest (i.e.,
religion, computer programming welding, etc.).  Sometimes, a debate will
stray from the central issue.  Usually the person who is losing the
battle will sidetrack a discussion on a minor point, mostly to avoid the
embarrassment of losing the debate on the main point.  This is called
Argument Fluff.

Argument Fluff is sometimes difficult to detect because of its
similarity to other types of fluff.  Flame Fluff, Liars' Fluff and
Intellectual Fluff are particularly prone to be disguised as Argument
Fluff.  An alert participant in a debate will be able to see this ruse
and reverse the move.

Most of these diversions are performed by making claims which could not
possibly be proved or disproved.  For example, with the sub-type of
Deity Fluff the comment such as "My God's better than your God" may be
made.  There is no way for either party to positively prove this fact,
because it is a remark based on faith.  It is hoped by the losing side
in the debate that this will cause the other party to drop his argument
and take the offensive with this as a new argument.  A shrewd person
FidoNews 11-21                 Page: 18                    23 May 1994

would not be baited by this tactic.  They would ignore it and continue.

One-Liner Fluff is a hybrid of Argument Fluff and Small Talk Fluff. Here
a person "defends" their position with comments such as "No, it doesn't"
or "On a cold day in hell".  It is important to note the person posting
this kind of fluff will most likely be ignored.  Eventually, they will
be frustrated to the point where they will post Flame Fluff in order to
get the attention they feel they deserve.

Political Fluff is a hybrid of Argument Fluff and Liars' Fluff.  This is
prevalent in conferences where a lot of political debating is going on.
It is also common in election campaigns.  There are a lot of promises
made, with no intent on keeping them.

Treatment for Fluff
-------------------

Fluff is best described as the conference version of the stuff that
grows under your bed.  It will always appear and, eventually, you will
have clean it up.

Now that we have some categories of fluff defined, we can now look at
how we deal with it.  We must be careful, however.  In treating fluff,
we can wipe out a conference. Once you remove it from these areas, there
is usually nothing left.  So it is safe to say, a little fluff is good
for a conference.  It adds something to an otherwise void and sterile
environment.

We also need to be careful that the treatment doesn't end up being
legislated by the government.  We all know it is difficult to get good
ethical policy from elected officials.  We need to find a way which will
minimize government involvement.

Generally, conference content is policed by the moderator, if there is
one. Sometimes, several people will declare they are the rightful
moderator for a conference, and there will be a lot of flame fluff
generated.  This is especially true in the WELDING conference, where the
moderator of the UNION conference and the moderator of the SCAB
conference are constantly fighting for control.

Once a moderator has been established, they must be careful to not be
too restrictive or flame fluff will generate.  If they are too passive,
then all kinds of fluff will form spontaneously.  Balance is key to
moderating a conference.

Some moderators can only create fluff.  They sit quietly behind their
keyboards waiting to pounce on any indiscretion.  When they find one,
they post messages which ask the offending parties to end the topic.
Some even go as far as sending private fluff e-mail to the originator.

These moderators are called fluffballs.  (This name is not popular with
the moderators of the WELDING conference.)  This conjures up an image of
someone soft and warm.  This is a gross error for some fluffballs have
been known to carry semi-automatic weapons.

FidoNews 11-21                 Page: 19                    23 May 1994

One treatment for fluff involves removing these fluffballs, replacing
them with someone less fluffy.  This does cause confusion for users of a
conference because the rules can sometimes change without notice.  This
kind of extreme action needs to be avoided at all costs.

Another treatment involves the use of automated message packet scanners.
These kinds of programs have been in use for many years, primarily to
render flame fluff benign.  A much more sophisticated scanner is needed
to detect and properly correct messages for other types.

Now, free speech advocates will probably dislike what is about to be
discussed (generating a large amount of First Amendment Fluff).  Please
finish reading this discourse before jumping to conclusions.  What I am
proposing is a fast and efficient way to automatically deal with the
problem of fluff.

The Fluff Finder
----------------

The Fluff Finder is software used to scan message packets and message
areas for fluff.  At this time, its existence is purely theoretical.
Its development will involve many man-years of programming effort, so it
will be a few years before it can become a reality.

The heart of the program is the Fluff Engine.  It's basically a library
of programs designed to support the scanning of messages for fluff
content.  The rules of good taste and conferencing etiquette are its
main features.  Who's good taste and etiquette it will support depends
on who develops the final product.

The Fluff Engine is designed to be transportable between platforms.  A
shell is all that needs to be programmed if you were to move it from,
say, an MS-DOS platform to a MacIntosh or VAX.  The core program will
remain uniform and consistent.

The engine is built using artificial intelligence techniques and so it
is more sophisticated than the traditional search and replace message
scanners.  It can literally understand what you have entered, either
removing superfluous content or change it something less fluffy.

The program can scan for particular kinds of messages.  In the case of
Small Talk and Appointment Fluff, it is very easy to scan messages for
brevity or lunch times.  The engine can very easily transform the
statement "I'll meet you for lunch at noon on Wednesday" to "Call me so
we can do lunch."  This saves other users from having to worry if anyone
actually showed up.  Everyone is confident there will be no flame fluff
generated.

Advanced versions of the software can also transform actual meanings of
ideas within messages.  This involves a lot of complex programming and a
database, called the Fluff Finder Fact File.  Using this, the program
can search for meanings of common phrases and concepts.  With recent
breakthroughs in artificial intelligence technology, and the continuing
drop in the cost of computer hardware, this feature will be well within
the reach of everyone very soon.
FidoNews 11-21                 Page: 20                    23 May 1994


Intellectual and Liars Fluff will be able to be handled by placing all
the works of humanity in the facts database.  No point can be presented
without the Fluff Finder being able to check its validity.  If the topic
is about someone's sister, which would probably not be in the database,
then the Fluff Finder calls the person's sister for verification.  This
information is then stored in the database and used to modify or remove
the message.

Technical Fluff would be handled in a similar way.  Because the Fluff
Finder is created by technicians, the software itself would be allowed
to generate an appropriate response.  This leaves technical people time
to come up with new and improved software designs.

Idiot Fluff can only be deleted.  It doesn't make sense, except for
maybe the person posting the message.  But that makes no difference.  It
gives them something to do while in the unemployment line.

A major feature of the Fluff Finder is where Flame Fluff would be
converted to something more helpful and positive.  This can disarm many
potential conflicts.  Let's illustrate this with an example.  The
following message was a result of an unmonitored dialogue between two
users which got out of control.  (NOTE:  Offensive words and phrases
have been replaced with asterisks, using a crude word scanner, as to not
offend sensitive readers.)

    Date: 22 Sep 93  14:06:04
    From: John Doe on 1:352/23  Dimension 23 in Olympia WA
      To: David Smith on 1:352/23.1  Point 23 in Olympia WA
    Subj: Your sister
    -------------------------------------------------------------------
    Hello, David!

    I think you are probably one of the most arrogant ******** that I
    have ever seen.  You obviously can't comprehend the advanced
    concepts discussed in this area recently.  A lobotomy would do you
    no good what you need is a good *** ******* with a rasp file and a
    stick of dynamite.

    What this all means is, *** ****** you ****** ****** ******* *** **
    * *****!

Obviously, this contains a liberal amount of flame fluff.  This message
would appear as depicted above when only using a simple message scanner.
(The original text will not be made available.)

Now, we will see what happens when this message is scanned by the Fluff
Finder.

    Date: 22 Sep 93  14:06:04
    From: John Doe on 1:352/23  Dimension 23 in Olympia WA
      To: David Smith on 1:352/23.1  Point 23 in Olympia WA
    Subj: Your sister
    -------------------------------------------------------------------
    Hello, David!
FidoNews 11-21                 Page: 21                    23 May 1994


    In all my past experiences, you have proven to me that your
    intellect is only surpassed by your rectal qualities.  Your
    inexperience has severely impaired your ability in debating the
    concepts recently discussed. Perhaps you should get a rasp file and
    dynamite enema because a lobotomy would quite probably be
    ineffective.

    As the offspring of a female dog with Oedipus syndrome, maybe you
    should go seek a sexual encounter!

See how much more fluid and cheerful this message is?  And there is not
one offensive word.  It changes a very destructive and potentially
harmful flame fluff message into a very friendly, helpful and positive
statement with lots of good advice.  You can see the smile on David's
face right now, can't you?

The Fluff Finder technology promises to make the nearly impossible task
of monitoring all conversation a reality.  Online services and networks
will rest easier knowing that any potentially problematic conversation
will be dealt with a minimum of human effort.

The Future
----------

In summary, the solution to this problem is two-fold.  First, in order
to properly define what is needed to help solve the problem of fluff, it
needs to be defined.  This document is merely a beginning to that end.
Only a few types have been discussed and illustrated here.  Many more
still exist.

Once all the varieties of fluff are defined, then a specification for
the Fluff Finder can be compiled.  It will be the task of dedicated
programmers to build it.  The best way to accomplish this is through
financing via government program.  The project could be overseen by a
citizen committee of people with good ethical standing.  The end product
would be in the public domain, free to be used in a variety of software
products without cost to software developers.

With the Fluff Finder in hand, we can go into the future, confident the
rules of good taste will be taken care of for us. Only then can we
conference with our friends around the world, in a way Henry David
Thoreau would have been proud.  Our communications will be concise, have
meaning, be without error, and, best of all, without offense!

(...sysop now removes tongue from cheek...)


----------------------------------------------------------------------

"Brock Meeks really is an A#1 type person. The LIttle Garden is
going to send some money."   -Tom Jennings

Dear Net Citizen:

FidoNews 11-21                 Page: 22                    23 May 1994

How do you put a price on free and open dialogue on the Net?

How much are you willing to spend to preserve the concept of roboust
and open debate that have become a part of the Internet's culture?
$100? $50?  $20?

What if the cost of helping to preserve an open and robust Net was
no more than $1.29?  That's right, less than the cost of a fast
food hamburger.  Freedom on the Internet for only $1.29... cheap
at twice the price.

A joke?  Hardly.  The free and open speech, indeed the First Amendment
rights of the Internet -- rights we've all enjoyed for decades -- are
now being challenged in court.

CyberWire Dispatch, the well-respected online newswire written and
developed for the Internet community by journalist Brock Meeks, is
the subject of a libel suit.  CyberWire Dispatch has been at the
forefront of bringing the Net community timely and insightful
articles.

This suit was highlighted in a _Wall St. Journal_ article (April
22, page B1).  The subject of a Dispatch investigation is suing
Meeks for simply doing what journalists in the traditional print
medium have done since the founding of newspapers:  Print the
facts and let the public decide the outcome.

Brock and the Cyperwire Dispatch are examples of the "bottom up"
journalism that charachterizes the Net, where anyone with a modem can
compete with the traditional press.  Of course, most of us don't come
to the Net with a lawyer in tow, or the resources to defend a legal
action taken against us in courts located hundreds of miles from our
homes.

This libel action is one of the earliest cases of libel involving
alleged defamatory statements published over a computer network.
It raises the extremely important legal and policy issues.  It's impact
may well determine how and to what extent anyone feels free to express
strong opinions on the Net, wihtout being put at risk of legal action.

It is crucial that Brock have a strong defense and that the principles
that  come out of this case provide the maximum protection to the
exercise of free and open speech as possible.

CyberWire Dispatch is unique because it's distributed solely in
electronic form.  A service for the Net community at large.  And
all CyberWire Dispatch articles are free.  Meeks neither charges
anyone for receiving them;  he gets paid nothing to write them.

For all these efforts, he's being sued.  And being sued by a
company with a large financial backing.  Meeks, on the other hand,
has no such resources.  His attorney, Bruce Sanford of Baker &
Hostetler is arguably the finest First Amendment lawyer in the
U.S.

FidoNews 11-21                 Page: 23                    23 May 1994

And although he has agreed to represent Meeks at a reduced rate,
the cost of defending against this unmerited suit will not be
cheap.

We have formed this committee to lend our support in helping him
raise money for his legal defense.  And all we're asking you to
send is $1.29.  That's it.  Why that price?  The math is easy: $1
in an envelope with a 29 cent stamp applied.

Who can't afford $1.29 to help save the great freedoms we all
enjoy here today?

Can you send more?  Of course.  Any contributions will be
welcomed and accepted.  Tax deductible donations also are
possible by following the instructions below.

All money sent for Meeks' legal defense fund will be go to that
purpose.  All the administrative services for administering the
fund are being donated;  100% of your money goes to defer the
legal costs of this case.

You are encouraged to repost this message.  But please, we urge
you to keep proper Net protocol in mind when reposting or cross
posting this message.

Thanks for your time.  On behalf of Brock and for future
generations of electronic journalists, we appreciate your
contributions and support.

Sincerely,

Samuel A. Simon
President, Issue Dynmics, Inc.*
[email protected]

Mitch Kapor
Chair, Electronic Frontier Foundation*
[email protected]

David Farber
The Alfred Fitler Moore Professor of Telecommunications Systems
University of Pennsylvania*
[email protected]

Philip Elmer-DeWitt
Senior Writer
TIME Magazine*
[email protected]

Marc Rotenberg
Electronic Infomation Privacy Center*
[email protected]

Nicholas Johnson
Former FCC Commissoner*
FidoNews 11-21                 Page: 24                    23 May 1994

[email protected]

Jerry Berman
Electronic Frontier Foundation*
[email protected]

Mike Godwin
Electronic Frontier Foundation*
[email protected]

*AFFILIATION IS FOR INDENTIFICATION PURPOSE ONLY

For Tax Deductible Donations:

Make Checks out to "Point Foundation" and clearly annotate on the check:
"For Legal Defense Fund."

Send those checks to:

Meeks Defense Fund
c/o Point Foundation
27 Gate Five Road
Sausalito, CA 94965

For those who don't care about the tax deductible status, send
contributions to:

Meeks Defense Fund

c/o IDI
901 15th St. NW
Suite 230
Washington, DC 20005

####################################################################
#      Meeks Defense Fund      |   Internet:   [email protected]       #
# ---------------------------------------------------------------- #
#  c/o  IDI                    c/o Point Foundation               #
#  901 15th St. NW             27 Gate Five Road                  #
#  Suite 230                   Sausalito, CA  9465                #
#  Washington, DC  20005                                           #
####################################################################

--------------------------------------------------------------------
Samuel A. Simon
IDI (Issue Dynamics Inc)       |   Internet:   [email protected]
901 15th St. NW Suite 230
Washington, DC 20005
(202)408-1400 (v/tdd)
(202)408-1134 (fax)
(202)408-1163 (BBS)
---------------------------------------------------------------------
FidoNews 11-21                 Page: 25                    23 May 1994


Ever Feel Like You're Being Watched?
You Will...

Digital Media has learned that the Clinton administration is debating
not  if,  but  how, to create a card that every American will need in
order to interact with any federal government agency.  Combined  with
two  potential  executive  orders and the Postal Service's designs on
putting its stamp on personal and business  electronic  transactions,
the card could open a window on every nuance of American personal and
business life.

The wrangling among the administration, the U.S. Postal Service,  the
Internal  Revenue Service and Department of Defense, emerged into the
public  eye  at  this  April's  CardTech/SecureTech  Conference.  The
gathering  of  security  experts was convened to discuss applications
for smart card and PCMCIA memory card technologies  in  business  and
government.  The  Postal  Service,  at  the  conference  presented  a
proposal for a  "general  purpose  U.S.  services  smartcard,"  which
individuals  and companies would use to authenticate their identities
when sending and receiving electronic mail,  transferring  funds  and
interacting  with  government  agencies, such as the I.R.S., Veterans
Administration and the Department of Health and Human Services.

President Clinton is also considering signing  two  executive  orders
that  would  greatly  expand  the  government's  access  to  personal
records, including an order that would allow the  I.R.S.  to  monitor
individual bank accounts and automatically collect taxes based on the
results, said sources  close  to  the  White  House.  The  collection
service  will be presented as a convenient way to avoid filling out a
tax return. The White House did not respond to requests for  comments
about this report.

The  Post  Office: We deliver for you. The Postal Service's U.S. Card
would be designed to use either smart cards (plastic  cards  with  an
embedded  microprocessor carrying a unique number that can be read by
a electromagnetic scanner and linked to computerized  records  stored
on  a  network)  or  PCMCIA  cards,  which  can  contain megabytes of
personal information. (You've probably seen this type card in  AT&T's
"You Will" ad campaign, which shows a doctor inserting a woman's card
in a reader in order to access a recording of a sonogram). The Postal
Service  said  it is considering AT&T and other companies' smart card
technologies.

In a slide presentation  at  the  conference,  Postal  representative
Chuck  Chamberlain  outlined  how  an individual's U.S. Card would be
automatically connected with  the  Department  of  Health  and  Human
Services,  the  U.S.  Treasury, the I.R.S., the banking system, and a
central database of digital  signatures  for  use  in  authenticating
electronic  mail  and transactions. The U.S. Card is only a proposal,
Chamberlain insists. Yet the Postal Service is prepared to  put  more
than  a  hundred  million  of  the  cards in citizens' pockets within
months of administration approval, he said.

"We've been trying to convince people [in the different agencies]  to
FidoNews 11-21                 Page: 26                    23 May 1994

do  just one card, otherwise, we're going to end up with two or three
cards," said Chamberlain. He said in addition to the healthcare  card
proposed  by President Clinton last year, various government agencies
are forwarding plans for a personal records card and  a  transactions
(or  "e-purse")  card.  Chamberlain  said  the I.R.S in particular is
pursuing plans for an identity card for taxpayers.

Don't leave home without it. Though he did not name the U.S. Card  at
the  time, Postmaster General Marvin Runyon suggested that the Postal
Service offer electronic mail certification services during testimony
before  the  Senate  Governmental  Affairs Subcommittee in March. The
proposal is clearly intended as a way to sustain the Postal Service's
national  role in the information age, since it would give the agency
a role in virtually every legally-binding electronic transaction made
by U.S. citizens.  For instance:

* When sending or receiving electronic mail, U.S. Card users would be
able to check the authenticity of a digital signature to  screen  out
impostors.
* Banking transactions (notably credit card purchases) that depend on
authentication of the participants identities  and  an  audit  trail,
would be registered in Postal Service systems.
*   Veterans,  or  for  that  matter  college  students  and  welfare
recipients,  could   check   their   federal   benefits   using   the
identification data on their U.S. Cards.
*  Visitors to an emergency room would have instant access to medical
records at  other  hospitals,  as  well  as  their  health  insurance
information.

These  examples  may  seem  benign  separately, but collectively they
paint a picture of a citizen's or business's existence that could  be
meddlesome at best and downright totalitarian at worst. Will buying a
book at a gay bookstore with a credit  card  that  authenticates  the
transaction  through  the  Postal  Service open a Naval officer up to
court marshal? If you have lunch  with  a  business  associate  on  a
Saturday  at  a  family  restaurant,  will  the  IRS rule the expense
non-deductible before you can even claim it?

"There won't be anything you do in business that won't  be  collected
and  analyzed by the government," said William Murray, an information
system  security  consultant  to  Deloitte   and   Touche   who   saw
Chamberlain's     presentation.     "This    [National    Information
Infrastructure] is a better surveillance mechanism than Orwell or the
government  could have imagined. This goddamned thing is so pervasive
and  the  propensity  to  connect  to  it  is  so  great  that   it's
unstoppable."

Deep  Roots;  Deep Pockets; Long History. Chamberlain said the Postal
Service has been working for "a  couple  years"  on  the  information
system to back up the U.S. Card. He said the project was initiated by
the Department of Defense, which wanted a civilian agency to create a
national electronic communications certification authority that could
be connected to its Defense Messaging System.  Chamberlain  said  the
Postal  Service has also consulted with the National Security Agency,
proponents of the Clipper encryption chip which hides the contents of
FidoNews 11-21                 Page: 27                    23 May 1994

messages  from all but government agencies, like law enforcement. The
National  Aeronautics  and  Space  Administration's   Ames   Research
Laboratories  in  Mountain  View, Calif. carried out the research and
development work for Clipper.

"We're designing a national framework for supporting business-quality
authentication,"  said  John  Yin,  the  engineer heading up the U.S.
Card-  related  research   for   NASA   Ames'   advanced   networking
applications  group.  "This  is not specifically with just the Postal
Service.  We'll  be  offering  services  to  other  agencies  and  to
third-party commercial companies that want to build other services on
the card." For example, VISA or American  Express  could  link  their
credit services to the U.S. Card.

Yin,  who  works  on Defense Messaging Systems applications, said his
group has collaborated with "elements of Department of  Defense"  for
the  past  year,  but  would  not  confirm  the  participation of the
National Security Agency, a Department of Defense agency. The NSA  is
specifically  prohibited  from  creating public encryption systems by
the Computer Security Act of 1987. Yin also would not comment on  the
budget  for the project, which other sources said was quite large and
has spanned more than two years.

A false sense of security? According to Yin, the  cards  would  allow
individuals  or businesses to choose any encryption technology. "It's
not our approach to say, 'Here's the standard, take it our leave  it,
'" he said.

"We're not trying to create a monopoly, rather it's an infrastructure
for interoperability on which a whole  variety  of  services  can  be
built." Yet, NASA, which is a participant in the CommerceNet electric
marketplace consortium will "suggest" to its partners that they adopt
the U.S. Card certification infrastructure, he said.

The  reality is that government agencies' buying power usually drives
the market to adopt a particular technology -- not unlike the way the
Texas  Board  of Education, the largest single purchaser of textbooks
in the U.S., sets the standard for the content of American  classroom
curricula.  Since,  the  administration  has  already mandated use of
Clipper and its data-oriented sibling, the Tesserae chip, in  federal
systems  it's  fairly certain that the law enforcement-endorsed chips
will find their way into most, if not all, U.S. Cards.  Even  in  the
unlikely event that one government agency should weather the pressure
and pass on the Clipper  chip,  it's  still  possible  to  trace  the
source,  destination,  duration  and  time  of transactions conducted
between Clippered and non-Clippered devices.

"Most of this shift [in privacy policy] is apparently being  done  by
executive  order  at  the  initiative of bureaucracy, and without any
Congressional oversight or Congressional concurrence, " Murray  said.
"They are not likely to fail. You know, Orwell said that bureaucrats,
simply doing what bureaucrats do, without motivation or intent,  will
use technology to enslave the people."

EDITOR'S  NOTE:  Digital Media has filed a Freedom of Information Act
FidoNews 11-21                 Page: 28                    23 May 1994

request for Clinton and Bush  Administration,  Postal  Service,  NSA,
Department  of  Defense,  NASA, I.R.S. and other documents related to
the creation of the U.S. Card proposal.

-- Mitch Ratcliffe

Copyright 1994 by Mitch Ratcliffe and Seybold Publications.

Mitch Ratcliffe
Editor in Chief
Digital Media: A Seybold Report
444 De Haro St., Ste. 128
San Francisco, Calif. 94107
415.575.3775 office
[email protected]

----------------------------------------------------------------------

Nodelist Size (again)

by Jim Tinlin, 1:212/0
-= Cutting the Fat =-

I agree with Gary Gilmore (FNEWS1118) concerning reducing excess items
in the nodelist.  I am a fledgling NC (NET212 has only been on the
books for about 2 months now) and learning the ropes quickly and with
lots of mistakes.

One item I've always had a difficult time warming up to is the
nodelist, it's inhumane size and unwieldly stature makes it a real pain
to work with.  I have gone to great lengths to make sure "our" net
nodelist is devoid of some of the fluff that exists rampant in the full
nodelist.

To parallel some items previously discussed, I offer the following
thoughts:

HOLDS - do away with them.  Why do we need a HOLD flag located in the
       nodelist for more than a week?  I submit the NC (who's
       responsible for the net-nodelist anyway) should remove any
       nodes that exceed this time period.  It's just as easy to get
       back into the nodelist anyway.

FLAGS - get rid of the redundancy.  I think most of them are a waste
       and hold over from "older" modems.  If the redundancy is
       necessary in specific cases, leave it in...if not, drop the
       V42B if the modem is V32B.

       I also think there should be a move afoot to update the flags
       to today's standards, since 9600 is a bit "slow" by most
       people's systems.  Not that it makes a *lot* of difference in
       the nodelist, but it's nice to have accurate information about
       a node that you're calling.  I know it would sway me one way or
       the other on some connections (say FREQ'ing a file) if I knew
       the real story about how long I'd be paying LD phone bills to
FidoNews 11-21                 Page: 29                    23 May 1994

       get that important file.

LISTINGS - I know multiple listings are considered by some to be a
       status symbol or pure waste, but I can see a few situations
       where the additional listing is important.  In our net we have
       3 major "hubs" and a Planet Connect location (presently it just
       happens to *be* one of the hubs).  This makes our system very
       flexible since a change in ownership of a hub (or the Planet
       Connect node) doesn't require everyone in the net to re-work
       their route files.  We just change the nodelist to reflect the
       new person acting as the hub and things keep moving.

       And why do people put "BBS" after the name of the BBS, isn't it
       kinda obvious that it's a BBS???  Well, if it's MO or non-CM
       maybe not, but think of all the bytes that can be saved just by
       shaving off those 3 letters (18,000 times!!!).  OK, so this is
       going a bit overboard...and I'm starting to sound like Andy
       Rooney   ;^)

Why did I write this article???  Maybe it's just ego (gee, how many
people are going to read this article...better yet, how many people
really care?) or activism...my little piece of bush beating.  I don't
intend to convince *everyone* but maybe this article (and many more)
will instill the idea that FidoNet has to work together to keep itself
strong or it will fall upon itself, a crumbling mass of overweight
structure.

Thanks for taking the time to read this...

----------------------------------------------------------------------

INTERGREEK: An echo about Greek things and people

INTERGREEK announcement
by Alejandros Diamandidis, 2:410/9.9, [email protected]

Hello people of Fidonet everywhere! I'd like to inform you of a new
echo, INTERGREEK. This echo was made so that greek people away from
Greece (and they are quite a few!) would be able to chat about their
country, but of course it attracted people who are not of greek origin
but are interested in matters concerning Greece. We now have regular
conversations about greek culture and politics with people outside
Greece.

The echo was created by Nasos Liagos, 2:410/113, who is the moderator
(not that a lot of moderation is required, but just in case!). The echo
currently goes to zones 1, 2, 3 and 5, and about 50 messages are posted
per week. The nodes to contact about a feed in the U.S. are Steve Laris
in Astoria, NY (1:278/514), who feeds the echo to Pennsylvania and
Toronto (Ontario), or Karen Mintzias in Redondo Beach, CA (1:102/125)
who passes it on to Vancouver (British Columbia). Karen also feeds the
echo to Chris Keladis (3:712/416) who passes it on to the zone 3
backbone. In zone 5 you can contact 5:7101/3. Finaly, in
zone 2, besides being carried by most of the nodes in R41 the echo
is also carried by 244/3310, 301/813, 310/3 and others throughout
FidoNews 11-21                 Page: 30                    23 May 1994

Europe.

We'd like more people, both Greek and not, to participate. If you
know someone who may be interested, please tell them about INTERGREEK!
If you'd like more information, you can contact the moderator or
Basilis Tsapas, 2:410/13, who is also the R41C. Thanks for reading
this announcement!


----------------------------------------------------------------------

========================================================================
                         Fidonews Information
========================================================================

------- FIDONEWS MASTHEAD AND CONTACT INFORMATION ----------------

Editors: Sylvia Maxwell, Donald Tees
Editors Emeritii: Thom Henderson, Dale Lovell,
                 Vince Perriello, Tim Pozar
                 Tom Jennings
"FidoNews" BBS
   FidoNet  1:1/23
   BBS  +1-519-570-4176,  300/1200/2400/14400/V.32bis/HST(DS)
Internet addresses:
   Don & Sylvia    (submission address)
             [email protected]
   Sylvia -- [email protected]
   Donald -- [email protected]
   Tim    -- [email protected]

(Postal Service mailing address)
   FidoNews
   128 Church St.
   Kitchener, Ontario
   Canada
   N2H 2S4

Published weekly by and for the members of the FidoNet international
amateur electronic mail system. It is a compilation of individual
articles contributed by their authors or their authorized agents. The
contribution of articles to this compilation does not diminish the
rights of the authors. Opinions expressed in these articles are those
of the authors and not necessarily those of FidoNews.

Authors retain copyright on individual works; otherwise FidoNews is
Copyright 1994 Sylvia Maxwell. All rights reserved.  Duplication and/or
distribution permitted for noncommercial purposes only. For use in
other circumstances, please contact the original authors, or FidoNews
(we're easy).

OBTAINING COPIES: The-most-recent-issue-ONLY of FidoNews in electronic
form may be obtained from the FidoNews BBS via manual download or
Wazoo FileRequest, or from various sites in the FidoNet and Internet.
PRINTED COPIES may be obtained from Fido Software for $10.00US each
FidoNews 11-21                 Page: 31                    23 May 1994

PostPaid First Class within North America, or $13.00US elsewhere,
mailed Air Mail. (US funds drawn upon a US bank only.)

INTERNET USERS: FidoNews is available via FTP from ftp.fidonet.org,
in directory ~ftp/pub/fidonet/fidonews.  If you would like a FAQ, or
have questions regarding FidoNet, or UUCP<==>FidoNet gateways, please
direct them to David Deitch (1:133/411@fidonet) at
[email protected].

SUBMISSIONS: You are encouraged to submit articles for publication in
FidoNews. Article submission requirements are contained in the file
ARTSPEC.DOC, available from the FidoNews BBS, or Wazoo filerequestable
from 1:1/23 as file "ARTSPEC.DOC". Please read it.

"Fido", "FidoNet" and the dog-with-diskette are U.S. registered
trademarks of Tom Jennings, and are used with permission.

   Asked what he thought of Western civilization,
   M.K. Gandhi said, "I think it would be an excellent idea".
-- END
----------------------------------------------------------------------