F I D O  N E W S --                   Vol.12  No.21    (22-May-1995)
+----------------------------+-----------------------------------------+
|  A newsletter of the       |   ISSN 1198-4589 Published by:          |
|  FidoNet BBS community     |   "FidoNews" BBS                        |
|          _                 |       +1-519-570-4176                   |
|         /  \               |                                         |
|        /|oo \              |                                         |
|       (_|  /_)             |                                         |
|        _`@/_ \    _        |                                         |
|       |     | \   \\       |   Editors:                              |
|       | (*) |  \   ))      |        Sylvia Maxwell   1:221/194       |
|       |__U__| /  \//       |        Donald Tees      1:221/192       |
|        _//|| _\   /        |                                         |
|       (_/(_|(____/         |                                         |
|             (jm)           |     Newspapers should have no friends.  |
|                            |                    -- JOSEPH PULITZER   |
+----------------------------+-----------------------------------------+
|               Submission address: editors 1:1/23                     |
+----------------------------------------------------------------------+
|  MORE addresses:                                                     |
|                                                                      |
|    submissions=> [email protected]                |
|    Don -- [email protected]                          |
|    Sylvia [email protected]                          |
+----------------------------------------------------------------------+
|    For  information,   copyrights,   article   submissions,          |
|    obtaining copies of fidonews or the internet gateway faq          |
|    please refer to the end of this file.                             |
+----------------------------------------------------------------------+
========================================================================
                         Table of Contents
========================================================================

1.  Editorial.....................................................  1
2.  Articles......................................................  2
     Downpour of Media Cliches Threatens To Flood Nation.........  2
     InfoWarCon '95..............................................  4
     Dear Madam Emilia,.......................................... 14
     Message Trackers!........................................... 14
3.  Fidonews Information.......................................... 15
========================================================================
                             Editorial
========================================================================
FidoNews 12-21                 Page:  2                    22 May 1995


  We seem to be into spring again, with the snooze being quite
slim as a result.  It must be that fact that the students in
Fidonet all head off to summer jobs; we always have a dearth
of articles at this time of year.

  Since there is little to fight about at the moment, here is
the snooze.  ;<)


========================================================================
                              Articles
========================================================================
  This one's been around before but just incase you missed it...

Downpour of Media Cliches Threatens To Flood Nation
By Jeff Cohen and Norman Solomon
Media Beat

We interrupt this newspaper for a special bulletin! A media flood
warning is now in effect for the entire United States.

A torrential January storm continues to dump large quantities of media
cliches on the American public. And the floodwaters are still rising.

But there's nothing natural about the current downpour of political
cliches. In recent years a lot of work has gone into seeding the
clouds. The new speaker of the House, Newt Gingrich, has described his
goal as "reshaping the entire nation through the news media."

You can assume that the media climate is backing up the sewers when the
same cliche appears on the covers of the country's two biggest news
weeklies. That's what happened with the Jan. 9 editions of Time
magazine ("Exclusive: How Gingrich plans to pull off his revolution")
and Newsweek ("Gingrich's Revolution").

Which brings us to the most popular -- and possibly weirdest -- media
cliche of the year so far:

"Revolution"

The news media can't seem to stop using the word "revolution" to
describe the activities of Gingrich and fellow Republicans. Our Nexis
computer search found that -- during the first 10 days of this year --
U.S. newspapers used "revolution" in over 270 articles while reporting
on Gingrich.

No longer able to utilize the worn-out description of Gingrich as a
"bomb-throwing backbencher," the news media now insist that he is
leading a "revolution."

If the Republicans are igniting a "revolution," it must be the first
one in world history aimed at giving the entrenched interests that run
the country still more entrenched power.

FidoNews 12-21                 Page:  3                    22 May 1995

Since when is it a "revolution" to make things even more cushy for the
wealthy and powerful, while making the rest of us even more vulnerable
to their prerogatives?

"Big government"

We keep being told that the Republicans are sworn foes of "big
government,"  determined  to  downsize  and  eliminate  federal
bureaucracies. Our computerized search found references to Gingrich and
"big government" in 61 newspaper articles during the first 10 days of
January.

But news reports on "big government" virtually ignore the most costly
and wasteful federal bureaucracy -- the Defense Department -- spending
$270 billion this year on the military (almost as much as the amount
spent by the rest of the world combined). President Clinton has urged a
hefty increase, and the new GOP majority in Congress wants to hike the
department's budget even more.

A rarely mentioned fact is that the Pentagon purchases two-thirds of
the U.S. government's goods and services. And it issues 70 percent of
all federal paychecks.

But when was the last time you heard a media outlet mention the
Pentagon in a discussion of deplorable "big government"?

And when was the last time you saw a tough national news report on the
F-22  fighter jet, which moves forward even though the General
Accounting Office concluded that it is now unneeded and should be put
off? The jets are to be assembled by Lockheed, adjacent to Gingrich's
congressional district in Georgia.

"Middle class"

This one is an old standby, but it has gained renewed currency in
recent weeks as the Republican and Democratic parties battle to don the
mantle of champion for the "middle class." But who, precisely, is part
of the "middle class"?

To hear many politicians -- and journalists -- tell it, the "middle
class" is just about anyone who isn't below the official poverty line
and doesn't qualify as a millionaire.

Reporting from Southern California in 1993, under the headline "GOP
Blitz Against Budget Puts Democrats on Defensive", the New York Times
explained on its front page that President Clinton was not offering
much to "people earning more than $115,000, which is middle class in
this high-cost region." Six figures a year, and part of the beleaguered
middle class.

"Reform"

Of all the cosmetic buzzwords applied by American journalists and
pundits, none is more opaque than "reform." It means, simply, a
favorable gloss for any change of government policy in any direction --
FidoNews 12-21                 Page:  4                    22 May 1995

even if it involves the undoing of genuine reforms.

Our forecast for this political season calls for continued rhetorical
downpours, heavy at times, with only occasional periods of clarity.

But don't despair -- and don't worry about carrying a rhetoric-proof
umbrella. Once you decode the main cliches, the torrents of media
blather will roll off you like water off a duck's back.

--
 if you want to destroy my sweater | Mason Loring Bliss
  pull this thread as i walk away | Mac System Extension Hacker
watch me unravel, i'll soon be naked | [email protected]
lying on the floor, i've come undone | 1:109/370.6 @ FidoNet

----------------------------------------------------------------------

InfoWarCon '95

            D I S T R I B U T E   W I D E L Y

Here is the latest information about our upcoming Information Warfare
Conference;
please redistribute this information widely:

                 InfoWarCon '95
              September 7-8, 1995
            Stouffer Concourse Hotel
                 Arlington, VA

CONFERENCE OVERVIEW

The Information Warfare Conference (InfoWarCon 95) is our third
international conference dedicated to the exchange of ideas,
policies, tactics, weapons, methodologies and defensive posture
of Information Warfare on a local, national, and global basis.

InfoWarCon will bring together international experts from a broad
range of disciplines to discuss and integrate concepts in this
rapidly evolving field.  Attendees will intensely interact with
the speakers and presenters as well as each other to increase each
other's understanding of the interrelatedness of the topics.

While there are many interpretations of Information Warfare by
different groups, the current working definition we employ is:

"Information Warfare is the use of information and information systems
as weapons in a conflict where information and information systems
are the targets".

Information Warfare is broken down into three categories, and
InfoWarCon speakers and attendees will interactively examine them all:

Class I:  Personal Privacy.  "In CyberSpace, You Are Guilty Until
Proven Innocent." The mass psychology of information.  Privacy
FidoNews 12-21                 Page:  5                    22 May 1995

versus stability and law enforcement.

Class II: Industrial and Economic Espionage.  Domestic and international
ramifications and postures in a globally networked, competitive society.

Class III: Global Information Warfare.  Nation-state versus Nation-state
as an alternative to conventional warfare, the military perspective and
terrorism.

THE SPONSORS

           National Computer Security Association
                  Winn Schwartau, Inter.Pact
            Robert Steele, OPEN SOURCE SOLUTIONS, Inc.

THE CONFERENCE

The conference is designed to be interactive - with a healthy dialog
between all participants.  The contents and discussions will all be
considered open source.

       - What is Information Warfare?
       - What Are the Targets?
       - Protecting the Global Financial Infrastructure
       - Military Perspectives on InfoWar
       - InfoWar Vs. Non-Lethal Warfare
       - Defending the U.S. Infrastructure
       - The Intelligence Community and Information
       - Open Source Intelligence
       - The Psychology of Information
       - Privacy Balances
       - Information As the Competitive Edge
       - International Cooperation
       - Denial of Service
       - Cyber-Terrorism
       - Offensive Terrorism
       - Offensive InfoWar Techniques
       - Defensive InfoWar Postures
       - Education and Awareness Training
       - Corporate Policy
       - Government Policy
       - Global Policy
       - Espionage
       - Export Controls of Information Flow
       - The Legal Perspective
       - The New Information Warriors

Plenary sessions will accommodate all attendees, while the three
break-out session rooms will provide for more intimate presentations
and interactivity on topics of specific interests.

    * * * * * * * Tentative Agenda * * * * * * *

Preliminary Schedule (Rev. 4; May 14, 1995)

FidoNews 12-21                 Page:  6                    22 May 1995

DAY I: Thursday, September 7, 1995

7:00 - 7:45    Continental Breakfast

7:45 - 8:00    Introductory Remarks:
                - Peter Tippett, NCSA
                - Robert Steele, OSS
                - Winn Schwartau, Interpact

8:00 - 8:30    Keynote Address (TBD)

               Morning Plenaries

"What Is Information Warfare?"

There is no consensus as to what Information Warfare means; everyone
has  a different definition and application which often suits specific
agendas.   The morning sessions are to provide attendees with a current
review of what Information Warfare means to different people.

8:30 - 9:30    "The Government Perspective"

How do the various military services see Information Warfare as
fitting within their needs and mission?  Moving information rapidly
and efficiently to the modern soldier provides key battlefield
advantage. How does lethal versus non-lethal warfare fit into their
models?

9:30 - 10:30   "The Commercial View"

The commercial sector sees Information Warfare from a different
perspective.  Business survival is top on the list.  How do private
sector leaders view Information Warfare from both a defensive and
offensive standpoint?  Government attendees will be especially
interested  in this session.

10:30 - 11:00   Morning Coffee Break

11:00 - 12:00   Breakout Sessions I

       Class I  "Anti-Privacy Technology"

This will be a hands-on demonstration of how to breach personal privacy,

bug and eavesdrop on individuals and corporations.  Attendees will see
how easy it is to violate privacy, and how hard it is to detect such
violations.

       Class II: "Industrial and Economic Espionage - An Update"

What's new in the world or private spying?  Front line experts will
what's better and what's worse.  Who's spying on whom?  What are they
looking for?  What are their techniques and tools?  What can you do
to protect your organization from being a victim?

FidoNews 12-21                 Page:  7                    22 May 1995

          Moderator: Jim Settle
                       Former head of Natl. Computer Crime Squad, FBI

                    - Larry Watson, DECA, FBI

       Class III  "Magnetic Weapon Systems: Risks and Defenses"

The first half will present an overview of the risks of HERF Guns,
EMP/T  Bombs and Magnetic Pulse Cannons (MPC).  The attendee will
learn how easy  they are to build, and why increasingly sophisticated
magnetic weapons  will become a choice weapon for terrorists.  The
second half will describe fundamental approaches to defensive postures
against such Class  3 Denial of Service Assaults.
       - Winn Schwartau, Interpact, Inc.
       - Don White, EMC

12:00 - 13:30   Working Lunch

       Luncheon Speech 12:30 - 13:00  (TBD)

13:30 - 14:30 Breakout Sessions I

        Class I   "Well Managed Propaganda"

The media is a powerful filter by which citizens and the government
collect most of their information.  Was the media a puppet of the US
in the Gulf War?  Does aggressive PR makes media policy?  How can the
media  be used, or protect itself from being used?  What do journalists
have to say about their apparent control over what people hear and see?

       Moderated by:  Neil Munro, Senior Editor, Washington Technology

Class II     "Should the US Spy on the World?"

The US has been the target of economic and indutrial espionage by
military allies and 'friendly' competitors such as France, Japan,
Korea, Israel, Germany, Taiwan among others.  With an estimated
intelligence budget of $30 Billion and arguably the most proliferate
and advanced technologies, should we turn our spying 'eyes' on our
global neighbors for the benefit of American economic security?  Or,
are Mom and Apple Pie Americans above that?

Class III    "Practicing Defensive Information Warfare"
              Military lessons for the private sector

This exciting session will show 'real time' security testing with an
active Internet connection.  The military has developed an arsonal of
tools for penetration and monitoring and alerting users about
intrusions. Commercial attendees will learn what life is like without
these mechanisms, and how much more secure they can be with them -
with a low increase in overhead.  What steps are required to build a
defensive posture, and just how much defense is enough?

14:30 - 15:00  Afternoon Coffee Break

FidoNews 12-21                 Page:  8                    22 May 1995

      Afternoon Plenaries

15:00 - 15:30    "Denial of Service on Information Systems"

Confidentiality Availability and Integrity, two of the three
pinions of security have been technically solved with advanced
encryption techniques.  The third aspect, Availability remains
unsolved because of daunting technical problems.  What do DOS
attacks look like? From the  Civil-Cyber Disobedience to Accidental
Acts God or Man, a failure of key  system components can trigger a
domino-like chain of collapses.  This  sessions examines the
vulnerability of current US infrastructures and the  application
such techniques in offensive military applications.

15:30 - 16:00   "Terrorism and Counter-Terrorism"

Terrorist attacks against the US are now occurring on our home ground.
What can the modern terrorist do which will meet his goals of sowing
fear and distrust?  Key infrastructures such as power grids,
communications and transportation systems are attractive targets for
the terrorist minded Information Warrior. What are we doing in planned
response?

16:00-17:00     "What Is the Role of Government in defending  National

                   Economies?"

As evolving global conditions shift competitive value from military
might to economic advantage, how should we redefine national security?
The threats to the private sector increase and become more likely
targets in information warfare of all three classes.  What is, and what
should the  role of the military be in defending US interests both
domestically and abroad?  This session will provide plenty of time for
audience  involvement.

17:00 - 19:00    Cocktail Reception

Most speakers will be available for more intimate groups chats,and
authors will be available to sign books.  Great opportunity to pursue
those ideas with people from different disciplines.

19:00 - 21:00    Birds of a Feather Dinners

"Dutch" dinners give attendees the chance to dig into more and more
depth  in areas of their particular interest.

 * * * * *

   DAY II: Friday, September 8, 1995

7:00 - 8:00   Continental Breakfast

8:00 - 8:30    Keynote II (TBD)

8:30 - 9:00      "Defending the Financial Infrastructure"
FidoNews 12-21                 Page:  9                    22 May 1995


Not only the US is concerned.  The world's financial infrastructure are
inextricably linked.  If one portion is hurt, the rippling effect is
immediate.  Trillions and trillions of dollars are trade every day.
What can Information Warriors do to the global spider-web of electronic
money, and what defenses are in place?

9:00 - 9:30      "PsyOps"

The military and intelligence community have practiced Psychological
Operations against adversaries for decades.  How is this done, and how
well does it work?  Does PsyOps also have a place in commercial
ventures?

9:30 - 10:00     "CORE WARS:
                 Practicing Information Warfare in Cyberspace"

The Core War was invented by A.K. Dewdney from the University of
Western  Ontario, Canada.  As fought today on the Internet, Core Wars
represent  the purest intellectual tests of pure strategy, tactics and
capability.   Battalions of software programs must genetically breed
themselves for combat knowing that they will go up against fierce
competition.  Video examples will be used to portray how Core Wars is
a working model for Information Warriors on the front lines.
       Chair:
                Stuart Rosenberg, University of Cologne, Germany
                       Jo Seiler, University of Cologne, Germany

10:00 - 10:30    "Security By Obscurity: Point-Counterpoint"

Should the threats and details of potential vulnerabilities and actual
events be guarded under the shrouds of official government secrecy or
corporate policy of denial?  Or is open disclosure the best route for
education, awareness and defense?  How can one defend against the
unknown?  Strong arguments exist for all views.

10:30 - 11:00  Morning Coffee Break

11:00 - 12:00    Breakout Sessions I

       Class I    "An Electronic Bill of Rights"
                   Defining Privacy In Cyberspace

How do we as a nation balance the privacy rights of the individual
against the legitimate needs of the state, and in sync with the
policies  of our global trading partners?  The views from three
differing positions  will stimulate a healthy audience-panelist
dialogue.

         Moderated by:   Andrew Grosso, Former Asst. US Attorney
                         Scott Charney, DOJ Computer Crime Unit

       Class II:  "The 'Third Wave' Approach to Managing
                    Information Warfare: Building a Commercial War
                     Room"
FidoNews 12-21                 Page: 10                    22 May 1995


Maximizing the flow and control of informations key to competitiveness-

whether it be on the battlefield or in the marketplace.  An innovative
tool and approach to planning and managing information in these very
intense, time-sensitive environment is the advent of "war rooms."
These are dynamic facilities which are optimized to channel the
collection, analysis and dissemination of information.  'War rooms'
can be static or field-portable and vary in ergonomic layout and
technical capability.

This session will provide case studies on the use of war rooms in
government and industry.  State of the art automated war rooms will be
described which feature the projection of computer-generated
information.

Tools and practices for knowledge discovery, processing and
dissemination will help you understand how you go about planning and
building a competitive intelligence War Room?
       Chair: Steve Shakar, KnowledgeBASE, Inc.
       Panel: Mark Gembecki, Technology and Security Oversight
                             Consultant, US Dept of State
              Robert Beckman, Alta Analytics, Inc.

       Class III "International Cooperation"

All countries have an interest in stability, but rising nationalism
often transcends the greater good.  While most countries are becoming
militarily allied, we all remain competitively aggressive.  25% of
the world's population control 75% of the wealth (The Haves) while
nearly 4 billion people share the remaining 25% (The Have-Nots). Where
is the balance, and at what point does Information Warfare become
openly hostile?  In an electronically border-less world, how do we
collectively avoid getting to that point?

12:00 - 13:30  Working Lunch

12:30 - 13:00    Luncheon Speech

What are the organizing principles for information security and the
design basis of information systems and networks?  The DII is
mandated to  provide information services to the war-fighter.  The
NII initiative is  enhancing the economic posture of the US.  The
infrastructures are  inter-related and the loss of either
capability  could have devastating  effect on the economy and
security of the United States. The GII will  necessarily find
similar challenges where all nations must develop a  viable means
of cooperation.  This presentation outlines high level  approaches
to successful implementation.

13:30 - 14:30    Breakout Sessions

       Class I  "The Legal Consequences:
                 The Lawyers Are Coming, The Lawyers Are Coming."

FidoNews 12-21                 Page: 11                    22 May 1995

What are the legal rights of Cyber-citizens in the US and how do those
relate to the laws in other countries?  What is the real criminal and
civil recourse and remedies to combat industrial espionage?  How do we
legally handle non-physically violent attacks against the interest of
the US on our own soil or overseas?  Get the views of the experts.

             Moderated by:   Daniel Kuehl, PhD, Professor
                             National Defense University
                             Scott Charney, DOJ Computer Crime Unit

       Class II  "Defending Against the Internet"

The chaotic ravages of the Internet constantly knock at the doors of
anyone or any company is connected.  What do you have to do to protect
your information resources?  What have others done?  Is it enough and
what does the future bode?
       Chair: Kermit Beseke,  President, Secure Computing Corp.
              John Nagengast, NSA, Deputy Chief of Network Security

       Class III "The First Information War"

The military is attempting to build a global network where intelligence
information from the field is fed back to a War Room, analyzed,
decisions made, and then instructions sent back to the theater: almost
in real time.  How well does this work, and how far from reality is the
Pentagon's dream?
       Chair:    Mich Kabay, Ph.D., NCSA
                 Alan D. Campen, Col. USAF (Ret.)
                     Author, "The First Information War."
                      Former Director of Command and Control Policy
                         to the Undersectrary of Defense.

14:30-15:00       Afternoon Coffee Break

15:00 - 15:30     "Who Are The Information Warriors?"

Who are the bad guys?  Who has the capability and the motivation to
wage  any of the Three Classes of Information Warfare?  It's time to
name names.

15:30 - 16:00    "Hackers: National Resources or Criminal Kids "
                                   DEBATE

Germany uses professional hackers for their domestic industrial and
economic advantage.  What about the US?  The kindest words ever uttered
by Mich Kabay, Ph.D., about hackers is, "Amoral, sociopathic scum."
Robert Steele, President of Open Source Solutions, Inc. sees them as
national
resources, to be cultivated as a tool for US economic security. Do they
have a value in the protection of the US infrastructure, or can their
specific expertise be found elsewhere?  After short opening statements,
the audience will be encourage to ask provocative questions.

           Robert Steele, President, OPEN SOURCE SOLUTIONS, Inc.
           Mich Kabay, Ph.D. NCSA Dir of Education
FidoNews 12-21                 Page: 12                    22 May 1995


16:00 - 17:00     "The Future of Information Warfare"

Where do we go from here?  After two intensive days of interaction,
learning and listening, what's the next step?  What do industry and
the government have to do to better understand each other?  What steps
can each take to improve individual, corporate and national defensive
postures?

            Chair:   National Defense University

17:00 - 17:15  Closing remarks
               - Peter Tippett
               - Robert Steele
               - Winn Schwartau

17:15 - 19:00  No host reception.

-==========================-

Hotel Information:

 Stouffer Concourse Hotel (Crystal City)
 2399 Jefferson Davis Highway
 Arlington, VA  22202

 703-418-6800

-============================-

Conference Fees:

 $495.00/445.00  -  NCSA Members/OSS Attendees

 $595.00/545.00  -  All others

($50.00 discount available if payment is received by July 1, 1995)

 -============================-

      InfoWarCon '95 Registration Form:

    Name:    ___________________________________________________________

    Title:   ___________________________________________________________

    Org:     ___________________________________________________________

    Address: ___________________________________________________________

    Address: ___________________________________________________________

    City:    ___________________________________________________________

    State:   _______________________________  Zip: _____________________
FidoNews 12-21                 Page: 13                    22 May 1995


    Country: __________________________  Email: ________________________

    Phone:   __________________________  Fax:  _________________________

FEES:

       Payment made BEFORE July 1, 1995:

               (   )  $445.00     NCSA Members/OSS Attendees
               (   )  $545.00     All others

       Payment made AFTER July 1, 1995:

               (   )  $495.00     NCSA Members/OSS Attendees
               (   )  $595.00     All others

 Make checks payable to NCSA, or

    Charge to:  (  ) VISA      (  )   MasterCard       AMEX (  )

      Number:     ___________________________________________

      Exp date:   ___________________________

      Signature:  ___________________________________________

MAIL OR FAX REGISTRATION TO:

                National Computer Security Association
                10 South Courthouse Avenue
                Carlisle, PA 17013
                Phone 717-258-1816 or FAX 717-243-8642

                EMAIL:       [email protected]
                CompuServe:  GO NCSAFORUM

               Winn Schwartau Interpact, Inc.
               Information Security & Warfare
               V:813.393.6600 F:813.393.6361
                  Email: [email protected]

PGP Key(2.3a & 2.6) Available on key servers.Voice (AT&T) 0-700-TANGENT
F CON mailing list, mail: [email protected] with "subscribe dc-announce"
in the body. DEF CON FTP: ftp.fc.net /pub/defcon http://www.defcon.org
FidoNews 12-21                 Page: 14                    22 May 1995


Dear Madam Emilia,

i was wondering if the electronic medium will provide a similar boon
to the power of the individual as did the printing press?  For
example, it is now possible to become relatively famous within
electronic culture by merely having somethings noteworthy to say,
and access to minimal hardware.  In e-space, imagination is more
influential than money.  Grapevine culture has more tendrils than
the old boys' network has bucks.  ?  .  Would you vote for someone
whom you have never seen on television or in conglommerate
newspapers to be president/prime minister/prima donna?

Yes.

Is there already an agreed upon quasi-standard for the interactivity
of web pages?  It would be nice if that realm were more human.  If
there were such a standard then sysadmins would have fewer headaches,
but what if it all becomes like a huge mail-order catalogue instead
of cosy wonderplay?

Humph.  windoze for e-mail.

 [while being in a sad and frazzled state, one might mention
 that the Rev. Visage has completely disappeared, much to the
 alarm and anxiety of his addicted fans]

----------------------------------------------------------------------

Message Trackers!
By Carl Morris (1:285/302)

For more than the umpteenth time I have received mail marked
"The  following  message  was flagged as undeliverable at
1:260/1@fidonet. > 1:260/447 .... Address unknown".  These
messages are created by Message Trackers. In most cases Message
Trackers are software by the same name that checks the current
nodelist (at the site of the tracker mind you) and returns any
mail for addresses not in the nodelist.

While it may be usefull that the sender gets an acknowlegdement
that the address doesn't exist, its just short of pissing me
off! Appearently my Regional runs Message Tracker. Anything I
send to knew nodes or ones about to die often gets returned with
the above message.  I do not feel it is the regional's
responsibility.  I usually am just beating the nodelist by a
single day. In some instances I have started to wonder if the
regional updated his nodelist ....  I would stronger like
messages to get clear to the host or hub of these questionable
nodes before my message is returned. It might be nice to know
when the posibility of not getting a reply is likely, but it
many cases Message Trackers are just wasting the dime to send me
back my message.

In some instances, Nets and Regionals are using Message Trackers
FidoNews 12-21                 Page: 15                    22 May 1995

to return Netmails that are to nodes in their location that are
not on their CPR! Since when in hell has a node been required
to take part in a CPR of an entire region to receive routed
netmail! I will not stand for this. The regional or network
host spent twice as much money to handle my message because he
was so arrogant as to return it! Who do we have as regionals
and network hosts!?

As I can nolonger call LD, I must route EVERYTHING, even this
submission has been routed (and probably returned ;).

I noticed in the recent FIDOSTAT that someone has created some
"REMOVE_??????" echoes.  If these people are the same ones who
are using Message trackers for CPR purposes, I strongly suggest
they be thrown out and replacements elected.

Until next time, they'll just continue to return my messages!
Carl Morris

----------------------------------------------------------------------

========================================================================
                         Fidonews Information
========================================================================

------- FIDONEWS MASTHEAD AND CONTACT INFORMATION ----------------

Editors: Donald Tees, Sylvia Maxwell
Editors Emeritii: Thom Henderson, Dale Lovell,
                 Vince Perriello, Tim Pozar
                 Tom Jennings
"FidoNews" BBS
   FidoNet  1:1/23
   BBS  +1-519-570-4176,  300/1200/2400/14400/V.32bis/HST(DS)

more addresses:
   Don  -- 1:221/192, [email protected]
   Sylvia- 1:221/194, [email protected]

(Postal Service mailing address)
   FidoNews
   128 Church St.
   Kitchener, Ontario
   Canada
   N2H 2S4

voice:  (519) 570-3137

Fidonews is published weekly by and for the members of the FIDONET
INTERNATIONAL AMATEUR ELECTRONIC MAIL system. It is a compilation
of individual articles contributed by their authors or their
authorized agents. The contribution of articles to this compilation
does not diminish the rights of the authors. Opinions expressed in
these articles are those of the authors and not necessarily those of
FidoNews.
FidoNews 12-21                 Page: 16                    22 May 1995


Authors retain copyright on individual works; otherwise FidoNews is
Copyright 1995 Donald Tees. All rights reserved.  Duplication
and/or distribution permitted for noncommercial purposes only. For use
in other circumstances, please contact the original authors, or the eds.

OBTAINING COPIES: The most recent issue of FidoNews in electronic
form may be obtained from the FidoNews BBS via manual download or
Wazoo FileRequest, or from various sites in the FidoNet and Internet.
PRINTED COPIES may be obtained by sending SASE to the above paper-mail
address.

INTERNET USERS: FidoNews is available via FTP from ftp.fidonet.org,
in directory ~ftp/pub/fidonet/fidonews.

Anyone interested in getting a copy of the INTERNET GATEWAY FAQ may
freq GISFAQ.ZIP from 1:133/411.0, or send an internet message to
[email protected].  No message or text or subject is
necessary.  The address is a keyword that will trigger the automated
response.  People wishing to send inquiries directly to David Deitch
should now mail to [email protected] rather than the
previously listed address.

SUBMISSIONS: You are encouraged to submit articles for publication in
FidoNews. Article submission requirements are contained in the file
ARTSPEC.DOC, available from the FidoNews BBS, or Wazoo filerequestable
from 1:1/23 as file "ARTSPEC.DOC". Please read it.

"Fido", "FidoNet" and the dog-with-diskette are U.S. registered
trademarks of Tom Jennings, and are used with permission.

    "the pulse of the cursor is the heartbeat of fidonet"...
-- END
----------------------------------------------------------------------