########## | Volume I August 24,1991 Number 10 | ########## | | ### | EFFECTOR ONLINE | ####### | eff.org | ####### | | ### | | ########## | The Electronic Newsletter of | ########## | The Electronic Frontier Foundation | | 155 Second Street, Cambridge MA 02141 | ########## | Phone:(617)864-0665 FAX:(617)864-0866 | ########## | | ### | Staff: | ####### | Gerard Van der Leun (van@eff.org) | ####### | Mike Godwin (mnemonic@eff.org) | ### | Mitchell Kapor (mkapor@eff.org) | ### | Managing Editors: | ### |Chris Davis (ckd@eff.org), Helen Rose (hrose@eff.org)| | | ########## | Reproduction of Effector Online via all | ########## | electronic media is encouraged.. | ### | To reproduce signed articles individually | ####### | please contact the authors for their express | ####### | permission. | ### | | ### | | ### | | effector: n, Computer Sci. A device for producing a desired change. -==--==--==-<>-==--==--==- STEVE JACKSON GAMES UPDATE: THE GOVERNMENT FILES ITS RESPONSE This week, after several delays, the EFF has at last received the government's response to the Steve Jackson Games lawsuit. Our attorneys are going over these documents carefully and we'll have more detailed comment on them soon. Sharon Beckman, of Silverglate and Good, one of the leading attorneys in the case said: "In general, this response contains no surprises for us. Indeed, it confirms that events in this case transpired very much as we thought that they did. We continue to have a very strong case. In addition, it becomes clearer as we go forward that the Steve Jackson Games case will be a watershed piece of litigation when it comes to extending constitutional guarantees to this medium." -==--==--==-<>-==--==--==- OTHER ITEMS IN THIS ISSUE: WHY THE BELLSOUTH E911 DOCUMENT COST $79,000 TO PRODUCE THE NATIONAL CONFERENCE ON COMPUTING AND VALUES HOW EFF MEMBERSHIPS ARE PUT TO WORK COMPUTERS & PRIVACY: EXCERPTS & STATISTICS FROM A GOVERNMENT REPORT WHO PAYS FOR FTP? THE MAVEN WRITING TO LEN ROSE THE WORST USER INTERFACE IN KNOWN SPACE HOW MANY PEOPLE READ THE EFF GROUPS? -==--==--==-<>-==--==--==- IN OVER THEIR HEADS --OR-- WHY THE 911 DOCUMENT COST $79,449 TO PRODUCE AT BELLSOUTH Over the months since it first came to light, many have wondered how BellSouth could spend the immense amount of money that it claimed it spent on producing the brochure known as the E911 document. Now it can be told! The following is BellSouth's actual estimate of its production costs as sent to Bill Cook in January of 1990. We were amazed that the company felt it necessary to add in the entire cost of a major computer system, printer and software. [Text of letter from K. Megahee to Bill Cook] BellSouth 1155 Peachtree Street. N E Atlanta, Georgia 30367 -6000 January 10, 1990 Bill Cook - Assistant United States Attorney United States Attorney's Office Chicago, Illinois Dear Mr. Cook: Per your request, I have attached a breakdown of the costs associated with the production of the BellSouth Standard Practice (BSP) numbered 660-225-104SV. That practice is BellSouth Proprietary Information and is not for disclosure outside BellSouth. Should you require more information or clarification, please contact my office at XXX-XXX-XXXX. FAX: XXX-XXX-XXXX Sincerely, Kimberly Megahee Staff Manager - Security, Southern Bell [Handwritten total] 17,099 37,850 24,500 ------ 79,449 [Attachment to letter itemizing expenses] DOCUMENTATION MANAGEMENT 1. Technical Writer To Write/Research Document -200 hrs x 35 = $7,000 (Contract Writer) -200 hrs x 31 = $6,200 (Paygrade 3 Project Mgr) 2. Formatting/Typing Time -Typing WS14 = 1 week = $721.00 -Formatting WS 14 = 1 week = $721.00 -Formatting Graphics WS16 = 1 week = $742.00 3. Editing Time -PG2 = 2 days x $24.46 = $367 4. Order Labels (Cost) = $5.00 5. Prepare Purchase Order -Blue Number Practice WS14 x 1 hr = $18.00 -Type PO WS10 x 1 hr = $17.00 -Get Signature (PG2 x 1 hr = $25.00) (PG3 x lhr = $31.00) (PG5 x 1 hr = $38.00) 6. Printing and Mailing Costs Printing= $313.00 Mailing WS10 x 50 hrs = $858.00 (Minimum of 50 locations/ 1 hr per location/ 115 copies 7. Place Document on Index -PG2 x 1 hr = $25.00 -WS14 x 1 hr = $18.00 Total Costs for involvement = $17,099. HARDWARE EXPENSES VT220 $850 Vaxstation II $31,000 Printer $6,000 Maintenance 10% of costs SOFTWARE EXPENSES Interleaf Software $22,000 VMS Software $2,500 Software Maintenance 10% of costs [End of Document] -==--==--==-<>-==--==--==- THE NATIONAL CONFERENCE ON COMPUTING AND VALUES A Report by Brad Templeton via ClariNet (REPRINTED BY PERMISSION OF THE AUTHOR) NEW HAVEN, CONNECTICUT, U.S.A., 1991 AUG 20 (NB) -- The first National Conference on Computing and Values concluded last week on the campus of Southern Connecticut State University and was proclaimed a big success by its organizers. The NCCV attracted a multi-disciplinary audience, with attendees and luminaries from the fields of philosophy, computer security, privacy, law, academia and general computing. Mitch Kapor and John Perry Barlow, founders of the Electronic Frontier Foundation, described the EFF and updated the audience on their recent efforts to educate lawmakers on how to apply the law to the new world of electronic networking. The EFF has been instrumental in curbing what its members see as serious civil rights violations perpetrated by law enforcement officials who over-react to the danger of alleged computer criminals. Gary Chapman, founding Executive Director of Computer Professionals for Social Responsibility spoke on "The 21st Century Project," CPSR's new venture to deal with the technology related social problems they expect us to encounter as we enter the next century. Joseph Weizenbaum received the first award for Leadership and Excellence in Human Values and Computing. Accepting the award he addressed the conference about the necessity of technical professionals considering the consequences of their efforts. Richard Stallman, ideological leader of the Free Software Foundation (GNU Project) and League for Programming Freedom spoke and contributed to a lively panel of the nature of intellectual property. Stallman believes that all software should be free of copying and use restrictions. Another panelist, Helen Nissenbaum of Princeton, suggested the less drastic step of changing copyright law to permit "casual copying" (the non-commercial copying of originals for family and friends). Discussions on privacy issues ranged over the spectrum. Those examining the impact of computers on privacy had to grapple with fundamental issues such as the very nature of privacy before coming to conclusions about it. Richard Wright of the U. of Omaha proposed that individuals be granted ownership and control over the data about them, allowing them to charge royalties on its use, or block undesired use. Others feared such complex legislative changes, decrying what they viewed as a growing trend to say "there ought to be a law" when there is no need for one. Speculation is that there will be a division between the two main "computers and values" societies, with CPSR pushing for privacy protection legislation and EFF objecting to excessive government regulation of how computers may be used. Other addresses and panels covered Computer Security and Crime, Academia, and equal access to computers for the handicapped and the disadvantaged. "Equity" advocates warned that software designers are unaware that they are designing software and computer systems to be of interest primarily to "young, white, able-bodied men." Computers need to be made more accessible not just through funding and special tools to aid the handicapped, but through changes in their fundamental design, panelists argued. Providing more computers for a school often does little more than provide those already keen on computers with more toys, according to one panelist. The conference consisted both of panels and papers and six special working groups. Each morning conference attendees gathered in their six groups to debate particular issues of interest. Each group prepared a report delivered at the close of the conference with recommendations for the center for research into computing and values at SCSU and for the National Science Foundation, which helped fund the conference. Other speakers and panelists included former ACM President and CACM editor Peter Denning, and computer security expert Dorothy Denning, who spoke on the Hacker Ethic. Gene Spafford of Purdue University chaired the security panel and Peter Neumann, editor of the ACM RISKS forum gave the security address. Conference organizer Walter Maner of Bowling Green State University expressed great pleasure at the success of the conference and the large variety of material it addressed. Attendance was low, at around 200 participants, however this met Maner's expectations for an August conference. Plans are already under consideration for another conference in the future, though no date has been set. Maner can be contacted as maner@andy.bgsu.edu or at 419-372-2337. (Brad Templeton/19910820) For futher information on ClariNet write to info@clarinet.com or phone 1-800-USE-NETS. -==--==--==-<>-==--==--==- How Your EFF Memberships and Donations Are Put to Work Now that we have become a membership organization, we'd like to outline for you the ways in which your money is used to advance the cause of free and open online communications. Essential Litigation: Memberships help with the costs of litigation in key cases such as the Steve Jackson Case, and others. Washington office: In order to better track and participate in legislation of critical interest to this new medium, we are beginning a Washington, D.C. branch of the EFF. As we learned last year with the events that led to the rewriting of Senate Bill 266, a strong Washington presence is necessary if we are to make sure that legislators have the input that only an informed and committed organization can provide. It is much better to have wise and fair laws from the outset than to try and correct bad laws through litigation later. The Open Road Project: This is the EFF's major initiative for 1992 and beyond. We see The Open Road Project as a broadly based plan encompassing both the social and technical realms of networking; an armature for the design and creation of a National Public Network. The goals of the Open Road are to ensure equal and fair network access to all, along with technological tools that make the NPN easy to use, and affordable. The EFF Node on the Internet: We have worked hard to make eff.org an important part of the Internet by providing access to our central files via ftp, an open forum for a wide range of view on the Usenet group eff.talk, and a home for other worthy newsgroups whose interests and commitments compliment ours, such as the Computers and Academic Freedom group. We will be expanding our online capability significantly in the last quarter of 1991 and on into 1992. To this end we have been creating an offline library of our extensive archives. This process is almost completed. The next step will be to move these files online via scanning technology. As you might expect this is a time-consuming and labor-intensive task, but an important one. Other activities on the system involve the creation and expansion of our email capabilities and the effort to bring all of our online text into WAIS for use across the Internet. WAIS is a powerful, though still experimental, information retrieval service that allows full-text searches of large document archives. We are also adding new online publications in various subject areas. Education: In addition to these projects, there are the numerous conferences that EFF staff and representative attend as commentators or main speakers; the costs associated with the publication of EFFECTOR, EFFector Online, and numerous brochures and flyers. As we have seen time and again, much of the trouble associated with online communications comes from ignorance or simple misunderstanding. One of the most effective programs of the past year has been the attendance of EFF staff members at various law enforcement conferences and conventions. That kind of simple, face-to-face work has proven to be one of the most helpful activities we can perform. Add to all the above the overhead at the main office and dozens of other activities from the marvelous to the mundane. and you have a snapshot of the way in which we try to make every penny of your membership or donation advance the goals of the EFF. Our aim is to keep the organizational overhead low so that the largest possible portion of your donation can go towards the goals of the EFF and our current and new programs. -==--==--==-<>-==--==--==- Feedback to EFFector #9 From: ccastmg@prism.gatech.EDU (Michael G. Goldsman) Newsgroups: comp.org.eff.talk Subject: Re: EFFector Online 1.09 In Effector Online #9 the editors write: > WE WUZ HACKED! > >As Monty Python has wisely noted, "NOBODY expects the Spanish >Inquisition!" In like manner, nobody expects people to crack their >system in quite the way that they *are* cracked. After all, if you >knew about an unlocked door in your system, you'd lock it. Right? As >soon as you could get around to it, of course.... > >"User 'mycroft' was logged on kropotkin.gnu.ai.mit.edu at the >time, and admits entering the machine, but denies 2, 3, 4, and 5." What,you fail to mention is the fact that the EFF then secured the services of the Secret Service who confiscated every computer at MIT along with every disk, manual, and power-outlet they could find. MIT, I believe has issued a request aimed at getting their equipment back, but as of yet, the Secret Service has declined citing "National Security Interests." A Secret Service spokesman was quoted as saying "MIT operates a huge network of computer criminals who are intent on bringing our free country to its knees. Their Techno-Terrorism cannot be tolerated!!! The EFF will be representing MIT in their case. -Mike -==--==--==-<>-==--==--==- "[I]f I `send' you a message I do not lose it myself but retain it in memory or in a duplicate copy. We have then shared it. Consequently, it is true to say that messages, unlike commodities, are not required to be lost to the `sender' when he communicates them to another. Indeed, the word `sender' is a misnomer; strictly, he cannot send messages as he can send goods or commodities, he must always share them ....Messages do not have the nature of commodities and cannot be property." -- Colin Cherry, THE AGE OF ACCESS, Published by Croom Helm,London, 1985 -==--==--==-<>-==--==--==- Who Pays for FTP? From: netspec@zeus.unomaha.edu (Dan Kenny, Network Specialist/ U of N-Omaha) In a previous article, tld@cosmos.bae.bellcore.com (Terry Davidson) writes: "One question: I've asked this before, and have received no response. Who pays for ftp? Some uploads/downloads can take a *VERY* large amount of time; and this has to cost someone some hard cash - but who? Is the login used to send bills to the company from where the call originated (some ftp may be anonymous, but modern UNIX systems darned well get the info anyway, including the actual line/port/phone of the originating machine). I'd like answers to these questions, simply because (1) I have approximately 5 MB of shareware (DOS) utilities to upload to an ftp site for propagation, and (2) there are some GIF files out on the ftp sites I would like to ftp in. Whether or not I actually do this depends on how ftp is billed. Terry, FTP (the file transfer protocol), NNTP (the protocol for the news service you are reading), TELNET (the remote login protocol), SMTP (the mail protocol you receive Internet mail through), and other protocol services in the TCP/IP specification are made available to you courtesy of the educational system in America. Individual colleges, military sites, organizations and commercial sites wire up their machines as a campus network. These networks join a consortium of regional networks (like MIDnet for the Midwest colleges, MILnet for the military, etc) for a fee and if they are an educational institution, also receive subsidization on the cost of connecting their campus networks to the regional network through the National Science Foundation. Additionally, the NSF foots the bill for the long-haul national network connecting the regional networks in one giant internetwork. This long-haul network is built upon the work of the military's Defense Advanced Research Projects Agency (ARPAnet) in the 1970's and 1980's. These resources are provided to the average Internet user virtually for free, and are done so in the spirit of research and cooperation. Not everyone in the world ascribes to the philosophy of the "bottom-line" business mentality, and they recognize the value of open access to educational resources in the quest for enhancing communication between educators, researchers, students, businesses, organizations, and the community. So to answer your question, we all pay - just like we all pay for open and public access to the nation's highways, the open and public access to community libraries, the open and public access to secondary schools, and the open and public access to the state universities. Individual sites on the Internet make services and resources available (like disk space for anonymous FTP or the ARCHIE database service) out of the spirit of this cooperation and belief that the greater benefit of increased communication outweighs the per-unit-cost of a megabyte of disk storage or a packet of network bandwidth. Usenet news feeds are traditionally provided as a courtesy between educational institutions in this spirit also. If you believe your 5 megs of utilities have educational value, by all means upload them to an appropriate FTP site. If you believe that files you find on an anonymous FTP will enhance your education, download them. Realize that the mere act of communicating with someone on the Internet and exploring available services has educational value. Speaking as a student majoring in one of those science/technical and engineering fields (Computer Science) that people keep worrying about due to growing lack of interest from our youth, I can assure you that the educational benefit I have received through the cooperation of the Internet community has been tremendous. Innovation is not dead in America, at least not yet. We just need to properly recognize the value of long-term investment and commitment to cooperation (whether that be in basic research & development, educating ourselves, or in laying fiber to every household like Japan is doing), regardless of short-term cost (or lack of profit). Remember the technological fallout from the Apollo Moon program? We -all- foot the bill for it, and we -all- (consumers, industry, education, military, and our general competitiveness in the world) benefited from the cooperation and technology-sharing of that national project. Think of the Internet in the same fashion. I do. Just my opinions, Dan Kenny, Network Specialist : University of Nebraska-Omaha netspec@zeus.unomaha.edu -==--==--==-<>-==--==--==- We Know What You Are Doing and We Know Where You Live From: spaf@cs.purdue.EDU (Gene Spafford) Subject: Re: where do I find out my Longitude and Latitude? In article <3048@maserati.qsp.UUCP> scotts@qsp.COM (Scott Simpers) writes: "Why do you want your position that accurately for UUCP registration? " Why, so the net.police can target the missiles if your site posts any articles that: 1) offer anything for sale 2) tell the string joke, or Paddy O'Furniture jokes 3) suggests new groups dealing with aquaria 4) request postcards be sent to Craig Shergold 5) predict the death of the net 6) threaten to disclose the plans of the secret backbone cabal that really control the Usenet Provide elevation and room number, too -- the net.police just got a great deal on a bunch of smart weapons. -- Gene Spafford -==--==--==-<>-==--==--==- COMPUTERS & PRIVACY -- EXCERPTS & STATISTICS FROM A GOVERNMENT REPORT From:(allen h. lutins) I just got an interesting report, "Computers & Privacy: How the Government Obtains, Verifies, Uses, and Protects Personal Data" {GAO/IMTEC-90-70BR, Aug. 1990} available free from the U.S. General Accounting Office {P.O. Box 6015, Gaithersburg, MD 20877; (202)275-6241}. Among the tidbits revealed, the report notes: "(N)ew applications have made it easier for agencies to access, share, and process information and to carry out their missions effectively and efficiently. However, they have also increased opportunities for inappropriate or unauthorized use of personal information and have made it more difficult to oversee agencies' information management practices and to safeguard individuals' rights." {p. 7} "AGENCIES CONDUCT COMPUTER PROFILING TO IDENTIFY BEHAVIORS OF INTEREST -- Computer profiling involves using inductive logic to determine the characteristics of individuals most likely to engage in behaviors or interest -- for example, illegal activities...Computer profiling raises privacy and constitutional concerns because individuals may be singled out for scrutiny or different treatment... "Thirty seven agencies [of the 178 who responded to a GAO inquiry] reported that they conducted computer profiling...In developing profiles, agencies use social security, health, educational, financial, tax, law enforcement, property, and housing and public assistance information." {p. 32} "Agencies use profiles for many purposes, including program analyses, planning, investigation, screening, scientific research, and surveillance. Two examples of agencies' computer profiling descriptions are the Social Security Administration's profiles on people most likely to have unreported changes in income, resources, and/or living arrangements; and the U.S. Secret Service's profiles of individuals most likely to commit aggressive action against a public figure." {p. 33} Of 910 computer systems at 178 federal agencies: o 16 agencies reported using profiling for occupational and/or regulatory purposes o 12 agencies reported using profiling for "investigations" o 10 agencies reported using profiling for "screening" o 6 agencies reported using profiling for law enforcement purposes o 2 agencies reported using profiling for surveillance o Law enforcement records were used for profiling on 81 systems o Credit history was used for profiling on 58 systems o Information on 15 systems was made available to state agencies for surveillance purposes o Information on 13 systems was made available to local agencies for surveillance purposes o Information on 3 systems was made available to the "private sector" for surveillance purposes o 13 systems had no operational controls to protect against alteration and unauthorized access o Security measures and training were not available for personnel working on 65 systems o Incidents of unauthorized access or exceeding authorized access to personal information were reported six agencies; eight agencies did not know whether there were security breaches o Breaches of security numbered 13 in 1988; there were 21 such incidents in 1989 -==--==--==-<>-==--==--==- The Maven Once upon a weekend weary, while I pondered, beat and bleary, Over many a faintly printed hexadecimal dump of core -- While I nodded, nearly napping, suddenly there came a tapping, As of some Source user chatting, chatting of some Mavenlore. "Just a power glitch," I muttered, "printing out an underscore -- Just a glitch and nothing more." Ah, distinctly I remember that old Teletype ASR, And the paper tape dispenser left its chad upon the floor. Eagerly I thought, "Tomorrow, maybe I will go and borrow From my friend an Apple micro -- micro with a monitor -- So that I can chat at leisure, and then throw away my paper -- Lying all across the floor. And the repetitious tapping which had nearly caught me napping Woke me -- and convinced me that it could not be an underscore; Appearances can be deceiving, so I sat there, still believing; "My terminal must be receiving more express mail from the Source -- That's it -- my terminal's receiving new express mail from the Source; Posted mail and nothing more." But my curiosity grew stronger; hesitating then no longer, I stood up and crossed the room to see what waited there in store. Sticking up from the terminal were three inches or so of paper; Carefully my trembling hand tore off the scrap, and then I swore -- "What is this?", I cried in anger -- here I threw it to the floor; Blankness there and nothing more. Deep into its workings peering, long I stood there wondering, fearing, What could cause the thing to stutter, dropping twenty lines or more? But the ribbon was unbroken, and the "HERE IS" gave no token, I thought the Teletype was broken, so I typed the number "4"! This I typed, and then the modem echoed back the number "4" -- Merely this and nothing more. Back then to my work returning, with my temper slowly burning, Soon again I heard a tapping something louder than before. "Surely," said I, "surely that is just another RESET message; With my luck, there's probably expensive data to restore!" -- As it chattered, still I sat there, trying to complete my chore. "'Tis the Source and nothing more." Such a simple program, really -- just to fill 1K of memory With the Fibonacci series, but when it reached 144, It had failed to set the high bit -- suddenly, I thought I had it! But, just as I found the bug, my train of thought derailed once more -- And the Teletype's loud bell rang, then it sat just like before -- Rang, and sat, and nothing more. Suddenly, I couldn't stand it -- Just as if someone had planned it, Now the paper, like a bandit, rolled its way across the floor! As I put it back, I spied two words: CHAT TCX122 -- Which I knew must be the Maven, chatting from the Eastern shore. Presently the terminal received and printed one word more -- Quoth the Maven, "#4?" Such a message I was having difficulty understanding, For his letters little meaning -- little relevancy bore; Though I must admit believing that no living human being Ever could remember seeing evidence of Mavenlore -- Tell me now, what kind of Maven of the saintly days of yore Could have written "#4?" But the Maven, waiting for me to reply, transmitted only That one word, as if his soul in that one word he did outpour. Nothing farther then he ventured; silently the Teletype purred -- Till I scarcely more than murmured: "Stars and garters, what a bore!" -- Whereupon the terminal abruptly started with a roar; Then it typed out, "#4?!" Startled at the stillness broken by reply so tersely spoken "Doubtless," said I, "what we have here could not be a line error. Failure to communicate, perhaps -- it's late and getting later -- But I've never seen a greater unsolved mystery to explore." Then I knew I'd never rest until I solved his semaphore ... "Who am I, the Prisoner?" But the Maven didn't answer; no more data did he transfer, So I wheeled my Herman Miller office chair across the floor; Then upon the plastic sinking, I betook myself to linking Logic unto logic, thinking what this ominous bard of yore -- What this unknown, unseen, unsung, unrepentant bard of yore Meant in typing "#4?!" This I sat engaged in guessing, but no syllable expressing To the dour and cryptic Maven now whose words I puzzled o'er; This and more I sat divining, with my head at ease reclining On the seat back's plastic lining that the lamp-light fluoresced o'er, But whose flattened plastic lining with the lamp fluorescing o'er Shall compress, ah, little more! All at once my thoughts grew clearer -- as if looking in a mirror, Now at last I understood where I had sent the number 4! "Look," I typed, "I was just testing -- did you think that I was jesting? Why was it so interesting that I typed the number 4? Did you think that you were chatting to some foolish sophomore?" Quoth the Maven, "... #4?" "Maven!" said I, "Great defender! Venerable comprehender! Whether you began this chat, or were a victim of error, Mystified, and yet undaunted, by this quandary confronted," -- (Could my terminal be haunted?) -- "tell me truly, I implore -- Can you understand my message? -- tell me, tell me, I implore!" Quoth the Maven, "#4!" "Maven!" said I, "Great pretender! Ancient Jewish moneylender! By the Source that now connects us -- by the holy Oath you swore -- Tell me in your obscure wisdom if, within your distant modem, You receive my words unbroken by backspace or underscore -- Tell me why my Teletype prints nothing but the number 4!" Quoth the Maven, "#4?" "Be that word our sign of parting,bard or friend!"I typed,upstarting "Get back to your aimless chatter and obnoxious Mavenlore! Leave no token of your intent -- send no message that you repent! Leave my terminal quiescent! -- Quit the chat hereinbefore! Type control-P (or escape), and quit this chat forevermore!" Quoth the Maven, "#4..." And the Maven, notwithstanding,still is chatting,still is chatting Over my misunderstanding of his cryptic "#4?"; And I calmly pull the cover and remove a certain lever From the 33ASR, which I never shall restore; And a certain ASCII number that lies broken on the floor Shall be printed -- nevermore! (with no apologies whatsoever to anyone) .the Dragon -==--==--==-<>-==--==--==- HOW TO WRITE TO LEN ROSE I recently spoke with Len Rose. He asked that I post his address for anyone who would care to write: LEN ROSE, FPC 27154-037, Seymour Johnson AFB, Caller Box 8004, PMB 187 Goldsboro, NC, 27531-5000 Michael Kosmin root@lsicom2.UUCP -==--==--==-<>-==--==--==- THE WORST USER INTERFACE IN KNOWN SPACE From: smith@sctc.com (Rick Smith) mathew@mantis.co.uk (Industrial Poet) writes: >There's something I've been meaning to ask. Has anyone ever made a >concerted effort to develop the *worst* user-interface? I think I saw a manual describing The Worst User Interface once in a previous job. I think it's called "TACFIRE" and it's a computer based system the Army uses (or used to use) for fire control in artillery batallions. You're faced with about 16 lines of text, each at least 60 characters long. This display is filled with dozens of little mnemonics, each followed by a colon and then a (usually numeric) value. The displayed data represents various things like where a target is, who's shooting at it, what you need to do to shoot at it yourself, ammo inventory, ammo to use, amount of powder to use, etc, etc, etc. Different users of different kinds (observers, planners, gun crews, etc) would be able to modify different fields according to their role and situation; the results were all sent to some central site and then used to update other screens. The system is decades old, so it's "evolved" into something that borders on unusable. An ex artillery officer told me that they hated to let well trained TACFIRE people go on extended vacations (more than a week or so) because they'd forget how to make it work by the time they got back. -==--==--==-<>-==--==--==- How Many People Read the EFF Groups? From: reid@decwrl.DEC.COM (Brian Reid) Newsgroups: news.lists Subject: USENET Readership report for Jun 91 This is [not] the full set of data from the USENET readership report for Jun 91. Explanations of the figures are in a companion posting [in news.lists]. +-- Estimated total number of people who read the group, worldwide. | +-- Actual number of readers in sampled population | | +-- Propagation: how many sites receive this group at all | | | +-- Recent traffic (messages per month) | | | | +-- Recent traffic (kilobytes per month) | | | | | +-- Crossposting percentage | | | | | | +-- Cost ratio: $US/month/reader | | | | | | | +-- Share: % of newsrders | | | | | | | | who read this group. V V V V V V V V 331 24000 390 79% 448 968.9 5% 0.04 1.5% comp.org.eff.talk 615 12000 195 77% 2 26.2 100% 0.00 0.7% comp.org.eff.news 691 9400 153 46% 169 376.3 1% 0.03 0.6% alt.comp.acad-freedom .talk -==--==--==-<>-==--==--==- NOTES FROM THE SUN The final version of "Building the Open Road: The NREN as a Testbed for the National Public Network" by Mitchell Kapor is available by anonymous ftp from eff.org as pub/docs/open.road. We are also working on an FTP service that will allow file transfer via email. More on this soon. In other news, this September's Scientific American is devoted almost entirely to computer-based communications. Among many wonderful articles is Mitchell Kapor's "Civil Liberties in Cyberspace." This is an issue worth reading from cover to cover We are trying to get a large number of copies to give to our members. -==--==--==-<>-==--==--==- MEMBERSHIP IN THE ELECTRONIC FRONTIER FOUNDATION In order to continue the work already begun and to expand our efforts and activities into other realms of the electronic frontier, we need the financial support of individuals and organizations. If you support our goals and our work, you can show that support by becoming a member now. Members receive our quarterly newsletter, EFFECTOR, our bi-weekly electronic newsletter, EFFector Online (if you have an electronic address that can be reached through the Net), and special releases and other notices on our activities. But because we believe that support should be freely given, you can receive these things even if you do not elect to become a member. Your membership/donation is fully tax deductible. Our memberships are $20.00 per year for students, $40.00 per year for regular members. You may, of course, donate more if you wish. Our privacy policy: The Electronic Frontier Foundation will never, under any circumstances, sell any part of its membership list. We will, from time to time, share this list with other non-profit organizations whose work we determine to be in line with our goals. But with us, member privacy is the default. This means that you must actively grant us permission to share your name with other groups. If you do not grant explicit permission, we assume that you do not wish your membership disclosed to any group for any reason. >>>---------------- EFF@eff.org MEMBERSHIP FORM ---------------<<< Mail to: The Electronic Frontier Foundation, Inc. 155 Second St. #10 Cambridge, MA 02141 I wish to become a member of the EFF I enclose:$__________ $20.00 (student or low income membership) $40.00 (regular membership) [ ] I enclose an additional donation of $___________ Name:______________________________________________________ Organization:______________________________________________ Address: __________________________________________________ City or Town: _____________________________________________ State:_______ Zip:________ Phone:( )_____________(optional) FAX:( )____________________(optional) Email address: ______________________________ I enclose a check [ ]. Please charge my membership in the amount of $_____________ to my Mastercard [ ] Visa [ ] American Express [ ] Number:____________________________________________________ Expiration date: ____________ Signature: ________________________________________________ Date:______________________ I hereby grant permission to the EFF to share my name with other non-profit groups from time to time as it deems appropriate [ ]. Initials:___________________________ ------------------------------------------------------------ ************************************************************ The EFF is a non-profit, 501c3 organization. Donations to the EFF are tax-deductible. Godwin's Rule of Nazi Analogies: As a Usenet discussion grows longer, the probability of a comparison involving Nazis or Hitler approaches one. Sircar's Corollary: If the Usenet discussion touches on homosexuality or Heinlein, Nazis or Hitler are mentioned within three days. [Your propagation may vary.] Downloaded From P-80 International Information Systems 304-744-2253