close this bookVolume 4: No. 29
View the documentPolitics and funding
View the documentPrivacy and security
View the documentCopyright law
View the documentSoftware patents
View the documentInformation collections
View the documentJob opportunities
View the documentInternet resources
View the documentJournals and e-journals
View the documentDiscussion groups
View the documentEducation
View the documentLiterature and music
View the documentMathematics and optimization
View the documentBiology and robotics
View the documentComputists' news

ACM has released a 50-page panel report on the Clipper Chip controversy, "Codes, Keys and Conflicts: Issues in U.S. Crypto Policy." http://Info.acm.org/reports/acm_crypto_study.html, ftp://Info.acm.org/reports/acm_crypto_study/, or gopher://gopher.acm.org/11[the_files.reports.acm_crypto_study]. [Barbara Simons (simons@vnet.ibm.com), net-hap, 7/13/94.]

This can't be verified, but someone claiming to be within NSA said in an anonymous message that NSA is able to trace 70% of US anonymous postings by correlating them with outbound US message traffic. [Mike (stora@oak.circa.ufl.edu), a.s.movies, 7/1/94. Bill Park.]

Computer Professionals for Social Responsibility (CPSR) has added 60 pages of hypertext to their WWW home page. Topics include NII, civil liberties, workplace computing, technology policy, gender and minority issues, risks, and community networking. http://www.cpsr.org/home. [cpsr-info@cpsr.org, cpsr-announce, 7/12/94. net-hap.]

Federal pretrial discovery rules introduced in 12/93 require companies to hand over a list of all available [and relevant?] electronic data and to refrain from deleting any. "Anything you put in a computer can and will be used against you in a court of law." Companies should limit the number of saved email messages, and should warn employees about forwarding to outsiders (or even to other employees). [Leslie Helm, LA Times, 6/16/94. Chaos Corner, 6/22/94.] (That goes against the grain, doesn't it?)