Skip to main content
EFFecting Change Livestream Series: How to Protest with Privacy in Mind

EFFector - Volume 2, Issue 12 - Mitchell Kapor to Chair Governor’s Computer Crime Commission

EFFECTOR

EFFector - Volume 2, Issue 12 - Mitchell Kapor to Chair Governor’s Computer Crime Commission

########## ########## ########## | KAPOR CHAIRS MASS. COMPUTER CRIME |
########## ########## ########## |COMMISSION, SEEKS MEMBERS COMMENTS |
####       ####       ####       |                                   |
########   ########   ########   |       Howard Rheingold on         |
########   ########   ########   |     VIRTUAL COMMUNITIES, 1992     |
####       ####       ####       |      (Second of three parts)      |
########## ####       ####       |                                   |
########## ####       ####       |FREE SPEECH ONLINE: Berman on GEnie|
=====================================================================|
EFFector Online             July 1, 1992                   Issue 2.12|
         A Publication of the Electronic Frontier Foundation         |
                           ISSN 1062-9424                            |
=====================================================================|


     MITCHELL KAPOR TO CHAIR GOVERNOR'S COMPUTER CRIME COMMISSION

Governor William Weld of Massachusetts has appointed EFF President
Mitchell Kapor to Chair the Massachusetts Commission on Computer Crime.
This group, a direct result EFF's efforts to defeat a poorly written
computer crime bill in Massachusetts early last year, will develop
recommendations for dealing with computer crime and proposing legislation
to implement them.  Last year's bill contained a number of fundamental
flaws, not the least of which was the assumption that a bill that
broadly criminalized whole ranges of computer-related activities
was even called for in the first place.

Staff Counsel Mike Godwin will be assisting Kapor with the committee,
which will consist of twenty-one other experts, ranging from industry
leaders, to district attorneys, to civil libertarians, to a representative
>from the local AFL-CIO chapter.

Some of the concerns they will be addressing include:

* Computer systems security and data protection
* Privacy and the protection of personal information
* Copyrights and intellectual property issues
* Deliberate contamination of information
* Use of computers in fraud
* Theft of services
* Viruses, worms, time bombs, and other forms of computer vandalism
* Security and privacy concerns vs. law enforcement needs
* Government intrusion into hardware and software design
* Protection of 1st and 4th amendment rights
* Need to establish a cooperative exchange between law enforcement
  agencies and the information technology industry.
    
It is the hope of EFF that the resulting legislation  will balance
property rights with civil liberties and serve as a model for other
states grappling with the same issues.

EFF members in Massachusetts and elsewhere are invited to comment
on the work of this commission. We'd like to know what you think
the central issues before the commission are and what its focus
should be. Please write directly to Mitchell at mkapor@eff.org.

                   -==--==--==-<>-==--==--==-

                     FREE SPEECH ONLINE:
   Excerpts from a Real-time GEnie Conference with Jerry Berman
   which took place in the Public Forum*NonProfit Connection, 5/31/92

G.STOVER:      In our current Information Revolution, like in the
               Industrial Revolution, rights and other legal issues
               are being juggled and rearranged. A lot of freedoms
               and privileges are at stake. Are you optimistic
               about the outcome?

JERRY BERMAN   A big issue in the electronic age is insuring
               that the public network carries all speech and does
               not censor. Like telephone calls. It is not clear
               that this is the current regime... I am optimistic
               if we can join together to make sure rights are
               guaranteed and extended in cyberspace or the
               electronic age.

H.HAINES:      What would probably be your biggest concern
               regarding current electronic freedom, or the biggest
               threat you are aware of?

JERRY BERMAN   We need to insure that this telephone network that
               GEnie is on MUST carry all speech, and not be able
               to discriminate on the basis of content. Telephone
               companies are not carrying certain political "900"
               number accounts because they think they don't have
               to carry all services just like telephone calls.
               This could come to serve as a precedent for not
               carrying a controversial BBS service. These rules
               need to be worked out in law now before the Jesse
               Helms' of the world get into this technology when
               it is easier and see what's going on...

H.HAINES:      I hear a lot of reports that *P* (Tom PF knows this
               term I'm sure) is very restrictive about what can be
               said by its users. Would that be part of the problem
               you describe?

JERRY BERMAN   Good question. Prodigy is a private service. It is
               not big enough to be regulated like a public
               institution. So they can discriminate and make
               editorial decisions not to carry speech. We think
               this is a misguided policy and have told Prodigy so
               publicly and privately. However, we want Prodigy
               to have rights. We think the best answer is to make
               the telephone network better so there can be many
               Prodigy's and similar services and make it easier
               for everyone to use a GEnie or some other provider
               that has a more open policy. We need to make the
               telephone network digital now. We can do this well
               before we get to fiber optics and other 21st century
               technologies. But it will require political action.
               It is EFF's highest priority now.

G.STOVER:      Are BBS operators currently held responsible for the
               information on their BBSes? Should they be held
               responsible?

JERRY BERMAN   It depends. There is very little case law. But if a
               BBS has a forum like this one open to all, it should
               not be liable if, for example, I libel one of you or
               commit a crime on line... But today, we are not sure
               what responsibilities BBSs have. Some case law
               suggests that it is limited and that a BBS is like a
               newsstand, and newsstand operators don't have to
               know everything in every magazine or book on the stand.

VASSILOPOULO:  How large is the movement in Washington to legislate
               morality in general and specifically in electronic
               media, and who spearheads that movement?

JERRY BERMAN   Today, all sides--but especially the right--want to
               legislate one kind of morality or another. Our job
               is to make sure it is not inconsistent with the
               constitution when electronic technology is involved.
               We have had Congress several years ago try to outlaw
               certain gay BBS systems because of possible child
               pornography. Such bills will come up again when this
               technology is more widely used. You can be sure that
               the morality gang in Congress will try to regulate
               adult, political BBSs when they are really in a
               majority of American homes. And as you know, this is
               not far off. We need to establish the rules now
               before we have Congress looking at very
               controversial situations with no rules in mind, or
               a precedent.

GRAFFITI:      It may be too fine a distinction, but all online
               systems are actually store & forward messaging
               systems (voice mail & pager systems, too), instead
               of direct communications channels like the phone
               lines. That seems to make the BBS or online service
               a publisher, by re-broadcasting (or narrowcasting,
               to one person) the messages as if it had originated
               the message, even though system operators had
               nothing to do with the content. That seems to be
               where confusion over liability for defamation and
               criminal conduct occurs. Any comment?

JERRY BERMAN   Yes. Analogies break down but the store and forward
               does not always mean the ability to edit or know of
               the contents in such a way as to be liable. For
               example, under current law, a service that offers
               E-mail to its users violates the law if it reads a
               stored message (email) before it is forwarded or
               while it is stored. In fact the FBI has to get a
               warrant from a court to get such a message. This is
               one of the issues in Steve Jackson case. Did they
               have a warrant for all the email in Jackson's
               system?

GRAFFITI:      They got it, didn't they? :) Seriously, then, online
               and BBS systems are not liable for the contents of
               email?

JERRY BERMAN   That is correct. Thus, one could shield a BBS from
               liability by encouraging anything controversial be
               carried as email between those who wanted to send
               and receive the messages.

G.STOVER:      Do you think the proposed (?) partial deregulation to
               allow the telcos to produce TV is a good idea? Could
               this produce abuses like those with the old railroad
               tycoons? Comments?

JERRY BERMAN   Good question. The issue is whether a carrier (like
               the telcos) can also publish content and not
               discriminate against other information providers.
               There is good reason to worry, but did you know that
               while the telcos can't do cable TV yet over their
               lines, they NOW can do information services and
               compete with others?

POLICE:        I just came in on this a short time ago so I may
               have missed this, but does an online service such as
               GEnie or Prodigy have a right to censor public
               messages on the BBSs?

JERRY BERMAN:  The answer is Yes. For example, if GEnie did not
               want a DAVID DUKE conference it could turn Duke
               down.  Or it could end the conference. GEnie is a
               private publisher and its BBS conferences are like
               letters to the editor in some respects. GEnie is not
               the government. We want GEnie to have the right to
               editorialize so that we all have similar rights to
               choose how we speak. We need a diversity of BBSs to
               cover political diversity. Does anyone disagree?

GRAFFITI:      Could you comment on the FBI's  "demand" to be given
               access to the plain text of the digital phone network?
               Why did they publish editorials and go on TV with this
               request to re-engineer modern phone & data equipment?

JERRY BERMAN:  Good question. The FBI is worried that fiber optic
               networks, services like Call-Forwarding, etc. will
               make it difficult for them to conduct lawful
               warrants. This is a real concern, but we do not
               believe the solution is to allow them backdoors to
               all networks or easy access to encryption keys.

SHERMAN:       You said something about these issues being settled
               in the courts or in Congress. Which would you
               prefer? Is working through EFF, CPSR, ACLU etc. the
               best way to influence the outcome?

JERRY BERMAN   I do not think we can solve large technology issues
               in the courts. It took the courts 40 years to figure
               out that wiretapping violated privacy. Bad cases,
               like national security threats, tend to make bad
               law... and this is not a liberal Supreme Court, is
               it? We need broader technology policy and that
               requires working out new relationships between
               converging technologies, like computers, telephones,
               cable, mass media.

                   -==--==--==-<>-==--==--==-

               A SLICE OF LIFE IN MY VIRTUAL COMMUNITY
                          (Part Two)
                  by Howard Rheingold  June 1992
                       (hlr@well.sf.ca.us)


[ Continued from EFFector Online 2.11 June 22, 1992. Available via
ftp.eff.org or by email from eff@eff.org]


    Social Contracts, Reciprocity, and Gift Economies in Cyberspace

    The network of communications that constitutes a virtual community
can include the exchange of information as a kind of commodity, and
the economic implications of this phenomenon are significant; the
ultimate social potential of the network, however, lies not solely in
its utility as an information market, but in the individual and group
relationships that can happen over time. When such a group accumulates
a sufficient number of friendships and rivalries, and witnesses the
births, marriages, and deaths that bond any other kind of community,
it takes on a definite and profound sense of place in people's minds.
Virtual communities usually have a geographically local focus, and
often have a connection to a much wider domain. The local focus of my
virtual community, the WELL, is the San Francisco Bay Area; the wider
locus consists of hundreds of thousands of other sites around the
world, and millions of other communitarians, linked via exchanges of
messages into a meta-community known as "the net."

    The existence of computer-linked communities was predicted twenty
years ago by J.C.R. Licklider and Robert Taylor, who as research
directors for the Department of Defense, set in motion the research
that resulted in the creation of the first such community, the
ARPAnet: "What will on-line interactive communities be like?"
Licklider and Taylor wrote, in 1968: "In most fields they will consist
of geographically separated members, sometimes grouped in small
clusters and sometimes working individually. They will be communities
not of common location, but of common interest..."

    My friends and I sometimes believe we are part of the future that
Licklider dreamed about, and we often can attest to the truth of his
prediction that "life will be happier for the on-line individual
because the people with whom one interacts most strongly will be
selected more by commonality of interests and goals than by accidents
of proximity." I still believe that, but I also know that life also
has turned out to be unhappy at times, intensely so in some
circumstances, because of words on a screen. Events in cyberspace can
have concrete effects in real life, of both the pleasant and less
pleasant varieties. Participating in a virtual community has not
solved all of life's problems for me, but it has served as an aid, a
comfort and an inspiration at times; at other times, it has been like
an endless, ugly, long-simmering family brawl.

    I visit the WELL both for the sheer pleasure of communicating with
my newfound friends, and for its value as a practical instrument
forgathering information on subjects that are of momentary or enduring
importance, from child care to neuroscience, technical questions on
telecommunications to arguments on philosophical, political, or
spiritual subjects. It's a bit like a neighborhood pub or coffee shop.
It's a little like a salon, where I can participate in a hundred
ongoing conversations with people who don't care what I look like or
sound like, but who do care how I think and communicate. There are
seminars and word fights in different corners. And it's all a little
like a groupmind, where questions are answered, support is given,
inspiration is provided, by people I may have never heard from before,
and whom I may never meet face to face.

    Because we cannot see one another, we are unable to form
prejudices about others before we read what they have to say: Race,
gender, age, national origin and physical appearance are not apparent
unless a person wants to make such characteristics public. People who
are thoughtful but who are not quick to formulate a reply often do
better in CMC than face to face or over the telephone. People whose
physical handicaps make it difficult to form new friendships find that
virtual communities treat them as they always wanted to be treated --
as thinkers and transmitters of ideas and feeling beings, not carnal
vessels with a certain appearance and way of walking and talking (or
not walking and not talking). Don't mistake this filtration of
appearances for dehumanization: Words on a screen are quite capable of
moving one to laughter or tears, of evoking anger or compassion, of
creating a community from a collection of strangers.

    How does anybody find friends? In the traditional community, we
search through our pool of neighbors and professional colleagues, of
acquaintances and acquaintances of acquaintances, in order to find
people who share our values and interests. We then exchange
information about one another, disclose and discuss our mutual
interests, and sometimes we become friends. In a virtual community we
can go directly to the place where our favorite subjects are being
discussed, then get acquainted with those who share our passions, or
who use words in a way we find attractive. In this sense, the topic is
the address: You can't simply pick up a phone and ask to be connected
with someone who wants to talk about Islamic art or California wine,
or someone with a three year old daughter or a 30 year old Hudson; you
can, however, join a computer conference on any of those topics, then
open a public or private correspondence with the previously-unknown
people you find in that conference. You will find that your chances of
making friends are magnified by orders of magnitude over the old
methods of finding a peer group.

    You can be fooled about people in cyberspace, behind the cloak of
words. But that can be said about telephones or face to face
communications, as well; computer-mediated communications provide new
ways to fool people, and the most obvious identity-swindles will die
out only when enough people learn to use the medium critically. Sara
Kiesler noted that the word "phony" is an artifact of the early years
of the telephone, when media-naive people were conned by slick talkers
in ways that wouldn't deceive an eight-year old with a cellular phone
today.

    There is both an intellectual and an emotional component to CMC.
Since so many members of virtual communities are the kind of
knowledge-based professionals whose professional standing can be
enhanced by what they know, virtual communities can be practical,
cold-blooded instruments. Virtual communities can help their members
cope with information overload. The problem with the information age,
especially for students and knowledge workers who spend their time
immersed in the info-flow, is that there is too much information
available and no effective filters for sifting the key data that are
useful and interesting to us as individuals. Programmers are trying to
design better and better "software agents" that can seek and sift,
filter and find, and save us from the awful feeling one gets when it
turns out that the specific knowledge one needs is buried in 15,000
pages of related information.

    The first software agents are now becoming available (e.g., WAIS,
Rosebud), but we already have far more sophisticated, if informal,
social contracts among groups of people that allow us to act as
software agents for one another. If, in my wanderings through
information space, I come across items that don't interest me but
which I know one of my worldwide loose-knit affinity group of online
friends would appreciate, I send the appropriate friend a pointer, or
simply forward the entire text (one of the new powers of CMC is the
ability to publish and converse with the same medium). In some cases,
I can put the information in exactly the right place for 10,000 people
I don't know, but who are intensely interested in that specific topic,
to find it when they need it. And sometimes, 10,000 people I don't
know do the same thing for me.

    This unwritten, unspoken social contract, a blend of strong-tie
and weak-tie relationships among people who have a mixture of motives,
requires one to give something, and enables one to receive something.
I have to keep my friends in mind and send them pointers instead of
throwing my informational discards into the virtual scrap-heap. It
doesn't take a great deal of energy to do that, since I have to sift
that information anyway in order to find the knowledge I seek for my
own purposes; it takes two keystrokes to delete the information, three
keystrokes to forward it to someone else. And with scores of other
people who have an eye out for my interests while they explore sectors
of the information space that I normally wouldn't frequent, I find
that the help I receive far outweighs the energy I expend helping
others: A marriage of altruism and self-interest.

    The first time I learned about that particular cyberspace power
was early in the history of the WELL, when I was invited to join a
panel of experts who advise the U.S. Congress Office of Technology
Assessment (OTA). The subject of the assessment was "Communication
Systems for an Information Age." I'm not an expert in
telecommunication technology or policy, but I do know where to find a
group of such experts, and how to get them to tell me what they know.
Before I went to Washington for my first panel meeting, I opened a
conference in the WELL and invited assorted information-freaks,
technophiles, and communication experts to help me come up with
something to say. An amazing collection of minds flocked to that
topic, and some of them created whole new communities when they
collided.

    By the time I sat down with the captains of industry, government
advisers, and academic experts at the panel table, I had over 200
pages of expert advice from my own panel. I wouldn't have been able to
integrate that much knowledge of my subject in an entire academic or
industrial career, and it only took me (and my virtual community) a
few minutes a day for six weeks. I have found the WELL to be an
outright magical resource, professionally. An editor or producer or
client can call and ask me if I know much about the Constitution, or
fiber optics, or intellectual property. "Let me get back to you in
twenty minutes," I say, reaching for the modem. In terms of the way I
learned to use the WELL to get the right piece of information at the
right time, I'd say that the hours I've spent putting information into
the WELL turned out to be the most lucrative professional investments
I've ever made.

    The same strategy of nurturing and making use of loose
information-sharing affiliations across the net can be applied to an
infinite domain of problem areas, from literary criticism to software
evaluation. It's a neat way for a sufficiently large, sufficiently
diverse group of people to multiply their individual degree of
expertise, and I think it could be done even if the people aren't
involved in a community other than their company or their research
specialty. I think it works better when the community's conceptual
model of itself is more like barn-raising than horse-trading, though.
Reciprocity is a key element of any market-based culture, but the
arrangement I'm describing feels to me more like a kind of gift
economy where people do things for one another out of a spirit of
building something between them, rather than a spreadsheet-calculated
quid pro quo. When that spirit exists, everybody gets a little extra
something, a little sparkle, from their more practical transactions;
different kinds of things become possible when this mindset pervades.
Conversely, people who have valuable things to add to the mix tend to
keep their heads down and their ideas to themselves when a mercenary
or hostile zeitgeist dominates an online community.

    If you give useful information freely, without demanding tightly-
coupled reciprocity, your requests for information are met more
swiftly, in greater detail, than they would have been otherwise. The
person  you help might never be in a position to help you, but someone
else might be. That's why it is hard to distinguish idle talk from
serious context-setting. In a virtual community, idle talk is context-
setting. Idle talk is where people learn what kind of person you are,
why you should be trusted or mistrusted, what interests you. An agora
is more than the site of transactions; it is also a place where people
meet and size up one another.

    A market depends on the quality of knowledge held by the
participants, the buyers and sellers, about price and availability and
a thousand other things that influence business; a market that has a
forum for informal and back-channel communications is a better-
informed market. The London Stock Exchange grew out of the informal
transactions in a coffee-house; when it became the London
International Stock Exchange a few years ago, and abolished the
trading-room floor, the enterprise lost something vital in the
transition from an old room where all the old boys met and cut their
deals to the screens of thousands of workstations scattered around the
world.

    The context of the informal community of knowledge sharers grew to
include years of both professional and personal relationships. It is
not news that the right network of people can serve as an inquiry
research system: You throw out the question, and somebody on the net
knows the answer. You can make a game out of it, where you gain
symbolic prestige among your virtual peers by knowing the answer. And
you can make a game out of it among a group of people who have dropped
out of their orthodox professional lives, where some of them sell
these information services for exorbitant rates, in order to
participate voluntarily in the virtual community game.

    Virtual communities have several drawbacks in comparison to face-
to-face communication, disadvantages that must be kept in mind if you
are to make use of the power of these computer-mediated discussion
groups. The filtration factor that prevents one from knowing the race
or age of another participant also prevents people from communicating
the facial expressions, body language, and tone of voice that
constitute the inaudible but vital component of most face to face
communications. Irony, sarcasm, compassion, and other subtle but all-
important nuances that aren't conveyed in words alone are lost when
all you can see of a person are words on a screen.

    It's amazing how the ambiguity of words in the absence of body
language inevitably leads to online misunderstandings. And since the
physical absence of other people also seems to loosen some of the
social bonds that prevent people from insulting one another in person,
misunderstandings can grow into truly nasty stuff before anybody has a
chance to untangle the original miscommunication. Heated diatribes and
interpersonal incivility that wouldn't crop up often in face to face
or even telephone discourse seem to appear with relative frequency in
computer conferences. The only presently available antidote to this
flaw of CMC as a human communication medium is widespread knowledge of
this flaw -- aka "Netiquette."

    Online civility and how to deal with breaches of it is a topic
unto itself, and has been much-argued on the WELL. Degrees of outright
incivility constitute entire universes such as alt.flame, the Usenet
newsgroup where people go specifically to spend their days hurling
vile imprecations at one another. I am beginning to suspect that the
most powerful and effective defense an online community has in the
face of those who are bent on disruption might be norms and agreements
about withdrawing attention from those who can't abide by even loose
rules of verbal behavior. "If you continue doing that," I remember
someone saying to a particularly persistent would-be disrupter, "we
will stop paying attention to you." This is technically easy to do on
Usenet, where putting the name of a person or topic header in a "kill
file" (aka "bozo filter") means you will never see future
contributions from that person or about that topic. You can simply
choose to not see any postings from Rich Rosen, or that feature the
word "abortion" in the title. A society in which people can remove one
another, or even entire topics of discussion, from visibility. The
WELL does not have a bozo filter, although the need for one is a topic
of frequent discussion.



Note: In 1988, _Whole Earth Review_ published my article, "Virtual
Communities." Four years later, I reread it and realized that I had
learned a few things, and that the world I was observing had changed.
So I rewrote it. The original version is available on the WELL as
/uh/72/hlr/virtual_communities88.

Portions of this will appear in "Globalizing Networks: Computers and
International Communication," edited by Linda Harasim and Jan Walls
for MIT press. Portions of this will appear in "Virtual Communities,"
by Howard Rheingold, Addison-Wesley. Portions of this may find their
way into Whole Earth Review.

This is a world-readable file, and I think these are important issues;
encourage distribution, but I do ask for fair use: Don't remove my
name from my words when you quote or reproduce them, don't change
them, and don't impair my ability to make a living with them.
                                            Howard Rheingold
                                            Editor, Whole Earth Review
                                            27 Gate Five Road
                                            Sausalito, CA 94965
                                            Tel: 415 332 1716
                                            Fax: 415 332 3110
                                            Internet: hlr@well.sf.ca.us

(The second of three parts. To be continued....)
                       -==--==--==-<>-==--==--==-

            MEMBERSHIP IN THE ELECTRONIC FRONTIER FOUNDATION

If you support our goals and our work, you can show that support by
becoming a member now. Members receive our quarterly newsletter,
EFFECTOR, our bi-weekly electronic newsletter, EFFector Online (if you
have an electronic address that can be reached through the Net), and
special releases and other notices on our activities.  But because we
believe that support should be freely given, you can receive these
things even if you do not elect to become a member.

Our memberships are $20.00 per year for students, $40.00 per year for
regular members.  You may, of course, donate more if you wish.

Our privacy policy: The Electronic Frontier Foundation will never, under
any circumstances, sell any part of its membership list.  We will, from
time to time, share this list with other non-profit organizations whose
work we determine to be in line with our goals.  But with us, member
privacy is the default. This means that you must actively grant us
permission to share your name with other groups. If you do not grant
explicit permission, we assume that you do not wish your membership
disclosed to any group for any reason.

---------------- EFF MEMBERSHIP FORM ---------------

Mail to: The Electronic Frontier Foundation, Inc.
         155 Second St. #212
         Cambridge, MA 02141

I wish to become a member of the EFF  I enclose:$__________
            $20.00 (student or low income membership)
            $40.00 (regular membership)
            $100.00(Corporate or company membership.
                    This allows any organization to
                    become a member of EFF. It allows
                    such an organization, if it wishes
                    to designate up to five individuals
                    within the organization as members.)

    |     I enclose an additional donation of $___________

Name:______________________________________________________

Organization:______________________________________________

Address: __________________________________________________

City or Town: _____________________________________________

State:_______ Zip:________ Phone:(    )_____________(optional)

FAX:(    )____________________(optional)

Email address: ______________________________

I enclose a check [  ]   .
Please charge my membership in the amount of $_____________
to my Mastercard [  ]     Visa [  ]      American Express [ ]

Number:____________________________________________________

Expiration date: ____________

Signature: ________________________________________________

Date:______________________

I hereby grant permission to the EFF to share my name with
other non-profit groups from time to time as it deems
appropriate   [  ]  .
                       Initials:___________________________

Your membership/donation is fully tax deductible.
=====================================================================|
                   EFFector Online is published by                   |
                  The Electronic Frontier Foundation                 |
                 155 Second Street, Cambridge MA 02141               |
                 Phone:(617)864-0665 FAX:(617)864-0866               |
                     Internet Address: eff@eff.org                   |
 Reproduction of this publication in electronic media is encouraged  |
               To reproduce signed articles individually,            |
          please contact the authors for their express permission.   |
=====================================================================|

  REMEMBER:Only *you* can prevent more postcards to Craig Shergold!

Back to top

JavaScript license information