Relay-Version: version B 2.10 5/3/83; site utzoo.UUCP
Posting-Version: version B 2.10.1 6/24/83; site decwrl.UUCP
Path: utzoo!watmath!clyde!burl!ulysses!gamma!exodus!mhtsa!mh3bs!eagle!harpo!decvax!decwrl!daemon
From: daemon@decwrl.UUCP
Newsgroups: net.general
Subject: Computer Sightseers
Message-ID: <5525@decwrl.UUCP>
Date: Wed, 8-Feb-84 09:46:45 EST
Article-I.D.: decwrl.5525
Posted: Wed Feb  8 09:46:45 1984
Date-Received: Fri, 10-Feb-84 02:33:33 EST
Sender: daemon@decwrl.UUCP
Organization: DEC Western Research Lab, Los Altos, CA
Lines: 24

From: castor::covert  (John Covert)
		Computer Sightseers Philosophy
 
The act of dialing into a computer system is no different than walking
up to the front door of a business and asking for a tour.
 
If the computer system dialed into allows tourists, that is, it allows
use of its resources if the caller is either not required to enter any
identification or is allowed to identify himself as "Guest", "Tourist",
"User", "Demo" or some such generic name, then the caller should feel
welcome to use the resources, to take a tour of the machine.
 
However, if the caller resorts to fraudulent methods in identifying
himself, that is, attempts to gain access to the system by claiming
to be someone he is not, this is improper.  This is like walking up
to a business with a false ID badge in order to gain entrance.
 
Searching for computer systems by dialing numbers in sequence is also
no different than walking down the public streets of a town knocking
on doors or dialing telephone numbers in sequence taking a poll or
selling a product.
 
Unless there are clearly proven attempts by the caller to commit fraud,
this activity is no crime.