770 lines
34 KiB
Plaintext
770 lines
34 KiB
Plaintext
|
|
||
|
Computer underground Digest Sun Sep 14, 1997 Volume 9 : Issue 68
|
||
|
ISSN 1004-042X
|
||
|
|
||
|
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
|
||
|
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
|
||
|
Archivist: Brendan Kehoe
|
||
|
Shadow Master: Stanton McCandlish
|
||
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
||
|
Ralph Sims / Jyrki Kuoppala
|
||
|
Ian Dickinson
|
||
|
Field Agent Extraordinaire: David Smith
|
||
|
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
||
|
|
||
|
CONTENTS, #9.68 (Sun, Sep 14, 1997)
|
||
|
|
||
|
File 1--Mitnick Newsbytes Article (excerpt)
|
||
|
File 2--Cryptography Victory: Encryption Rules Unconstitutional (ACLU fwd)
|
||
|
File 3--Crypto Reform Bill Is Now a Changeling
|
||
|
File 4--USACM APPLAUDS CALIFORNIA LEGISLATURE
|
||
|
File 5--RSA Data Security Prevails in Federal Court
|
||
|
File 6--The Executioner's Motto
|
||
|
File 7--Cyber Rights Activists Convene in Austin, Texas
|
||
|
File 8--Cu Digest Header Info (unchanged since 7 May, 1997)
|
||
|
|
||
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
||
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
||
|
|
||
|
---------------------------------------------------------------------
|
||
|
|
||
|
Date: Tue, 09 Sep 1997 20:35:42 -0400
|
||
|
From: Evian Sim <evian@ESCAPE.COM>
|
||
|
Subject: File 1--Mitnick Newsbytes Article (excerpt)
|
||
|
|
||
|
Kevin Mitnick Appeals For Help
|
||
|
09/09/97 LOS ANGELES, CALIFORNIA, U.S.A., 1997 SEP 9 (NB) --
|
||
|
By Sami Menefee and Wendy Woods.
|
||
|
|
||
|
Notorious hacker Kevin Mitnick is still being held in a Los Angeles,
|
||
|
California prison, pending an early 1998 trial for 25 counts related to
|
||
|
alleged hacking activities. He is appealing for outside legal help to gain
|
||
|
additional access to the inmate law library in the prison where he has been
|
||
|
held since his arrest in February 1995.
|
||
|
|
||
|
<snip>
|
||
|
|
||
|
Mitnick's first prison term followed an intrusion into Digital Equipment
|
||
|
Corp.'s computer systems. He was accused of stealing electronically $1
|
||
|
million in secure software from Digital Equipment Corp., causing the
|
||
|
company to spend $160,000 to close up the gaps in its computer security.
|
||
|
Upon conviction in that case Mitnick was placed on supervisory probation in
|
||
|
1992. He disappeared later that year after he was charged with illegally
|
||
|
cracking into Pacific Bell's computers.
|
||
|
|
||
|
Between 1993 and 1995, Mitnick evaded authorities and allegedly stole
|
||
|
millions of dollars worth of corporate secrets, scrambled telephone
|
||
|
networks, and even broke into the nation's national defense warning system.
|
||
|
He made the FBI's Most Wanted List before he was caught, pulling off the
|
||
|
computer hack that finally did him in. He broke into the home computer
|
||
|
systems of Tsutomu Shimomutra, a leading computer security expert at the
|
||
|
San Diego Supercomputer Center. Shimomutra was so enraged that he helped
|
||
|
the FBI track Mitnick to an apartment complex in Raleigh, using a cell
|
||
|
phone direction finder connected to a laptop computer.
|
||
|
|
||
|
A statement forwarded to Newsbytes from Mitnick's counsel says Mitnick
|
||
|
needs additional legal assistance to file both a Writ of Habeas Corpus
|
||
|
challenging conditions of his detention, and a motion compelling federal
|
||
|
authorities to follow their own rules and regulations.
|
||
|
|
||
|
The attorney, Donald C. Randolph, says the firm is preparing a request for
|
||
|
Mitnick to be released on bail, since he has been in prison longer than his
|
||
|
sentence of 22 months. He has served time on two counts, probation
|
||
|
violation and possession of unauthorized access devices. He awaits trial on
|
||
|
the remaining 25 charges, the third trial in a series of separate
|
||
|
indictments.
|
||
|
|
||
|
<snip>
|
||
|
|
||
|
A spokesperson for the firm told Newsbytes: "We want Kevin to have access
|
||
|
to the prison law library, because he is his most interested advocate. He
|
||
|
is very good with research and spends all the time allowed in the law
|
||
|
library. Kevin's is a complex case that requires specialized knowledge.
|
||
|
With only the regular amount of library time allowed, Kevin doesn't have
|
||
|
the time he needs to assist in his own defense, and this extra time is
|
||
|
necessary, especially in court appointed cases. Because of the complex
|
||
|
nature of the case, he needs more time because of the ramifications of this
|
||
|
case are more severe."
|
||
|
|
||
|
<snip>
|
||
|
|
||
|
According to Mitnick's counsel, "The government has hyped this prosecution
|
||
|
by exaggerating the value of loss in the case, seeking unreasonably stiff
|
||
|
sentences, and by painting a portrait of Kevin which conjures the likeness
|
||
|
of a cyber-boogie man," adding that the prosecution seems motivated to use
|
||
|
Mitnick's case to send a message to other "would-be hackers."
|
||
|
|
||
|
The firm also stated that stronger penalties and longer sentencing for
|
||
|
Mitnick would strike "fear into the hearts of the public over the dangers
|
||
|
of computer hackers." Doing so, continued the spokesperson, "the government
|
||
|
hopes to divert scrutiny away from its own game-plan regarding the control
|
||
|
and regulation of the Internet and other telecommunications systems."
|
||
|
|
||
|
Anyone wishing to, can contact Kevin at the following address: Kevin
|
||
|
Mitnick, Reg. No. 89950-012, P.O. Box 1500, Los Angeles, CA 90053-1500
|
||
|
|
||
|
------------------
|
||
|
This story originally appeared at
|
||
|
http://www.newsbytes.com/pubNews/97/99591.html
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Tue, 2 Sep 1997 15:51:59 GMT
|
||
|
From: "ACLU Cyber-Liberties Update Owner"@newmedium.com
|
||
|
Subject: File 2--Cryptography Victory: Encryption Rules Unconstitutional (ACLU fwd)
|
||
|
|
||
|
Source - ACLU Cyber-Liberties Update, Tuesday, September 2, 1997
|
||
|
|
||
|
U.S. District Judge Marilyn Hall Patel on Thursday issued a stay
|
||
|
pending appeal of her August 25, 1997 ruling that new government
|
||
|
regulations barring the export of encryption software are an
|
||
|
unconstitutional violation of free speech. Judge Patel's ruling
|
||
|
in Bernstein v. U.S. State Department, struck down encryption
|
||
|
regulations and cited the recent Supreme Court decision in ACLU v.
|
||
|
Reno, stating, "The Internet is subject to the same exacting level
|
||
|
of First Amendment scrutiny as print media."
|
||
|
|
||
|
The decision was the second ruling in favor of Daniel Bernstein,
|
||
|
an Illinois math professor and expert on cryptography, who
|
||
|
attempted to publish his encryption codes on the Internet. Last
|
||
|
December, Judge Patel similarly found the government's previous
|
||
|
encryption export restrictions unconstitutional, but the Clinton
|
||
|
Administration released new rules shortly after the decision.
|
||
|
|
||
|
The Aug. 28 stay of injunctive relief is effective until September
|
||
|
8, at which time an injunction shall be reinstate to prevent
|
||
|
prosecution of Professor Bernstein. In the meantime, the stay
|
||
|
eliminates the protections under Patel's ruling against government
|
||
|
enforcement of encryption regulations to anyone other than
|
||
|
Bernstein.
|
||
|
|
||
|
The ACLU supported Bernstein's position and decried Clinton's new
|
||
|
rules as an irreparable infringement on First Amendment rights.
|
||
|
In response to the release of the new government rules, the ACLU
|
||
|
stated, "Export restrictions on cryptography are a prior restraint
|
||
|
on protected speech, and are a content based gag on
|
||
|
Constitutionally protected speech. Prior restraints on speech and
|
||
|
attempts to regulate speech based on content are anathema to the
|
||
|
Constitution, and thus we urge the removal of encryption products
|
||
|
from the export restrictions altogether."
|
||
|
|
||
|
Under the government rules, the Commerce Department was given
|
||
|
authority to license on a case-by-case basis the export of
|
||
|
encryption material over the internet. There was no requirement
|
||
|
that print material about encryption be licensed, thereby treating
|
||
|
electronic media differently than other media. The Court found
|
||
|
this distinction between electronic and print media undermined the
|
||
|
government's asserted need to regulate encryption export based on
|
||
|
national security concerns. The opinion called the rules "so
|
||
|
irrational and administratively unreliable that it may well serve
|
||
|
to only exacerbate the potential for self-censorship."
|
||
|
|
||
|
The Court also held that the government licensing procedure fails
|
||
|
to provide any limits on government discretion in its review of
|
||
|
encryption export applications.
|
||
|
|
||
|
Under Judge Patel's ruling of earlier this week, the government
|
||
|
would have been prohibited from using the encryption export
|
||
|
regulations and was warned by the court to refrain from
|
||
|
"threatening, detaining, prosecuting, discouraging, or otherwise
|
||
|
interfering with plaintiff or any other person described . . .
|
||
|
above in the exercise of their federal constitutional rights as
|
||
|
declared in this order."
|
||
|
|
||
|
According to Bernstein's attorney, Cindy Cohn, the government has
|
||
|
said that it may still challenge the stay of injunctive relief in
|
||
|
the 9th Circuit and Professor Bernstein may seek relief from the
|
||
|
stay as well.
|
||
|
|
||
|
Full text of this decision is available at the Electronic Frontier
|
||
|
Foundation site at <http://www.eff.org> and more news about the
|
||
|
status of the ruling can be found at <http://www.msnbc.com>
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Fri, 12 Sep 1997 09:20:20 -0800
|
||
|
From: "--Todd Lappin-->" <telstar@wired.com>
|
||
|
Subject: File 3--Crypto Reform Bill Is Now a Changeling
|
||
|
|
||
|
Source - fight-censorship@vorlon.mit.edu
|
||
|
|
||
|
From Wired News: http://www.wired.com/news/news/politics/story/6819.html
|
||
|
|
||
|
Crypto Reform Bill Is Now a Changeling
|
||
|
|
||
|
by Rebecca Vesely
|
||
|
|
||
|
6:18pm 11.Sep.97.PDT The House Intelligence Committee
|
||
|
on Thursday gutted a piece of legislation that both privacy
|
||
|
advocates and the software industry had looked to as their
|
||
|
best hope of seeing the government's tight rein on
|
||
|
encryption policy loosened.
|
||
|
|
||
|
With a series of amendments, the panel transformed the
|
||
|
Security and Freedom through Encryption Act into the
|
||
|
opposite of what author Bob Goodlatte, a Virginia
|
||
|
Republican, and 252 co-sponsors intended. Where the
|
||
|
original HR695 sought to prohibit a national key recovery
|
||
|
system that might allow law enforcement quick access to
|
||
|
scrambled data, the amended version now requires it.
|
||
|
Where the original sought to promote commerce and protect
|
||
|
privacy by encouraging manufacture and use of strong
|
||
|
encryption, the new-look bill makes use of such products
|
||
|
nearly impossible.
|
||
|
|
||
|
The panel approved the changeling bill by a voice vote in a
|
||
|
closed session. Details of the amendments were made
|
||
|
available by a Commerce Committee staffer who spoke on
|
||
|
condition of anonymity. In addition to mandating a national
|
||
|
key recovery system in the United States and banning the
|
||
|
manufacture or sale of code that could not be
|
||
|
instantaneously decrypted by the police, the amendments
|
||
|
also specify fines up to US$10,000 and jail terms as long
|
||
|
as five years for violators.
|
||
|
|
||
|
"It's a sad day that for the first time a congressional
|
||
|
committee would pass legislation so damaging to civil
|
||
|
liberties and to industry," said Jon Englund, vice president
|
||
|
of the Information Technology Association of America, a
|
||
|
trade group representing major software manufacturers.
|
||
|
|
||
|
Industry leaders also said the Intelligence amendments plan
|
||
|
would effectively bring the domestic crypto-software
|
||
|
industry to a halt. Privacy activists say it would strip
|
||
|
Americans of secure communications in the digital age.
|
||
|
|
||
|
Supporters of the Goodlatte bill noted that the committee
|
||
|
acted after a long, aggressive lobbying effort by law
|
||
|
enforcement and national security agencies.
|
||
|
|
||
|
"The administration says there is a long tradition of the FBI
|
||
|
being able to go their own on the Hill, although I thought
|
||
|
those days were over," said Jerry Berman, director of the
|
||
|
Center for Democracy and Technology. "The committees are
|
||
|
voting based on national security versus civil liberties, and
|
||
|
national security is winning."
|
||
|
|
||
|
The bill will next go to the Commerce Committee. Two
|
||
|
members of that panel stood ready Thursday with an
|
||
|
amendment that would ban the domestic manufacture, sale,
|
||
|
and use of encryption that does not allow law enforcement
|
||
|
immediate access. The amendment was to be offered by
|
||
|
Representatives Michael Oxley (R-Ohio), a former FBI
|
||
|
agent, and Tom Manton (D-New York), a former New York
|
||
|
City police officer.
|
||
|
|
||
|
"Louis Freeh's my guy," Oxley told reporters at the
|
||
|
meeting, referring to the current FBI director. "This
|
||
|
amendment is technically neutral. It strikes a balance
|
||
|
between law enforcement and the right to privacy."
|
||
|
|
||
|
But software lobbyists said the amendment means that they
|
||
|
would no longer be able to manufacture encryption products
|
||
|
in the United States. "I don't know of one encryption product
|
||
|
that would give immediate law enforcement access," said
|
||
|
Peter Harter, global public policy counsel for Netscape.
|
||
|
|
||
|
An amendment to the Oxley/Manton amendment was to be
|
||
|
introduced by Representatives Rick White (R-Washington)
|
||
|
and Ed Markey (D-Massachusetts) calling for a study
|
||
|
assessing the effectiveness of mandatory key recovery
|
||
|
systems.
|
||
|
|
||
|
All this legislative posturing is not moot.
|
||
|
|
||
|
The Commerce Committee, in conjunction with the four
|
||
|
other committees that have already voted on the Goodlatte
|
||
|
bill plan to meet with one another and interested parties to
|
||
|
work out a compromise bill. It is possible that the
|
||
|
committees on commerce, national security, and
|
||
|
intelligence will formulate a united substitute bill to
|
||
|
replace Goodlatte's proposal. The alternative bill would be
|
||
|
submitted to the Rules Committee, which would decide
|
||
|
which piece of legislation would go to the House floor.
|
||
|
Although 11 of 13 Rules Committee members are
|
||
|
co-sponsors of Goodlatte's bill, the chairman, Gerald
|
||
|
Solomon (R-New York), withdrew his support in April
|
||
|
because of national security concerns.
|
||
|
|
||
|
"We don't want a bill to leave this committee without
|
||
|
addressing law enforcement concerns," said Representative
|
||
|
Billy Tauzin (R-Louisiana), the Telecommunications,
|
||
|
Trade, and Consumer Protection subcommittee chairman
|
||
|
and member of the Commerce Committee. He said that
|
||
|
although he was a cosponsor of Goodlatte's bill, he would
|
||
|
support the Oxley/Manton amendment. "We'd like to do it in
|
||
|
a fashion that satisfies all committees and we can't do that
|
||
|
all today."
|
||
|
|
||
|
As for Goodlatte, he says he is willing to compromise on
|
||
|
some counts, although mandatory key recovery is not one of
|
||
|
them.
|
||
|
|
||
|
"I'm pleased," he said rather half-heartedly after the
|
||
|
Intelligence panel vote. "We may be able to work this out."
|
||
|
|
||
|
|
||
|
Copyright 1993-97 Wired Ventures Inc. and affiliated
|
||
|
companies.
|
||
|
All rights reserved.
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Wed, 10 Sep 1997 06:02:32 -0400
|
||
|
From: ACM US Public Policy Office <usacm_dc@ACM.ORG>
|
||
|
Subject: File 4--USACM APPLAUDS CALIFORNIA LEGISLATURE
|
||
|
|
||
|
PRESS RELEASE
|
||
|
|
||
|
Association for Computing
|
||
|
U.S. Public Policy Office
|
||
|
|
||
|
September 8, 1997
|
||
|
|
||
|
USACM APPLAUDS CALIFORNIA LEGISLATURE FOR UNANIMOUSLY
|
||
|
ENDORSING RELAXED EXPORT CONTROLS ON ENCRYPTION
|
||
|
|
||
|
|
||
|
As the Congress prepares to address the issue of computer
|
||
|
security and privacy, the California legislature has sent
|
||
|
a clear message that relaxing controls on cryptography is
|
||
|
a critical first step.
|
||
|
|
||
|
On September 5, the California legislature passed a
|
||
|
resolution that calls on the California members in
|
||
|
Congress to support legislation that would make it easier
|
||
|
for US companies to develop and market strong cryptography
|
||
|
products. The resolution was sponsored by Representative
|
||
|
Vasconcellos (D. San Jose) and passed without opposition.
|
||
|
|
||
|
Dr. Barbara Simons, chair of the policy committee for
|
||
|
the Association for Computing (USACM), said that the
|
||
|
California resolution makes clear that industry and
|
||
|
users are united in support of good cryptography.
|
||
|
|
||
|
"We believe that Congress should support the Security
|
||
|
and Freedom Act, sponsored by Representative Goodlatte.
|
||
|
The legislation will help protect security and privacy
|
||
|
on the internet. It will be a serious mistake for the
|
||
|
administration to oppose the development of this
|
||
|
technology," said Dr. Simons.
|
||
|
|
||
|
On August 26, USACM Chair Barbara Simons spoke in support
|
||
|
of the Vasconcellos resolution before a California Senate
|
||
|
committee. Also participating at the Committee hearing were
|
||
|
Dr. Whit Diffie from Sun, Kelly Blough from PGP, Jack Wilson of
|
||
|
ACL Datacom, Chuck Marson representing the California Internet
|
||
|
Industry Alliance (Netscape, Microsoft, AOL, CompuServe and
|
||
|
Netcom), and a representative of the Software Publishers
|
||
|
Association. Undersecretary of Commerce Reinsch wrote a
|
||
|
letter opposing the resolution.
|
||
|
|
||
|
The Association for Computing (ACM) is an international non-profit
|
||
|
educational and scientific society with 76,000 members worldwide,
|
||
|
60,000 of whom reside in the U.S. USACM, the Association for
|
||
|
Computing's U.S. Public Policy Office, serves as the focal point
|
||
|
for ACM's interaction with U.S. government organizations,
|
||
|
the computing community and the U.S. public in all matters of
|
||
|
U.S. public policy related to information technology. The USACM
|
||
|
web site is located at http://www.acm.org/usacm/
|
||
|
|
||
|
For more information, please contact USACM Chair Barbara Simons at
|
||
|
408/256-3661 or USACM Associate Director Lauren Gelman at 202/544-4859.
|
||
|
|
||
|
/\ /\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/
|
||
|
Association for Computing, + http://www.acm.org/usacm/
|
||
|
Office of U.S. Public Policy * +1 202 544 4859 (tel)
|
||
|
666 Pennsylvania Ave., SE Suite 302 B * +1 202 547 5482 (fax)
|
||
|
Washington, DC 20003 USA + gelman@acm.org
|
||
|
|
||
|
To subscribe to the ACM Washington Update, send e-mail to: listserv@acm.org
|
||
|
with "subscribe WASHINGTON-UPDATE name" (no quotes) in the body of the
|
||
|
message.
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Wed, 10 Sep 1997 08:47:45 -0400 (EDT)
|
||
|
From: mds@mds.prwire.com
|
||
|
Subject: File 5--RSA Data Security Prevails in Federal Court
|
||
|
|
||
|
|
||
|
RSA Data Security Prevails in Federal Court
|
||
|
|
||
|
Schlafly Allegations Ruled `Without Merit'
|
||
|
|
||
|
REDWOOD CITY, Calif., Sept. 10 /PRNewswire/ -- RSA Data Security, Inc., a
|
||
|
wholly owned subsidiary of Security Dynamics Technologies, Inc.
|
||
|
(Nasdaq: SDTI), today announced that it had prevailed in its defense against
|
||
|
all claims made by Roger Schlafly in a 1994 lawsuit. In the ruling dated
|
||
|
August 29, 1997, Judge Spenser Williams of the United States District Court
|
||
|
for the Northern District of California found against the antitrust, business
|
||
|
tort, unfair business practices and non-infringement claims that had been
|
||
|
brought by Schlafly. Prior Court action on August 22, had found against
|
||
|
Schlafly's other claim of invalidity of the MIT (RSA) patent.
|
||
|
Schlafly's suit made a wide range of allegations against RSA, including
|
||
|
(1) the invalidity of the MIT (RSA) patent, (2) libel (3) patent non-
|
||
|
infringement, (4) interference with contractual relationships, (5) fraud, (6)
|
||
|
unfair business practices, and (7) antitrust violations. The Court had
|
||
|
previously dismissed the fraud and libel claims. The resolved issues were
|
||
|
linked to RSA's disputes with Cylink. The settlement between Cylink and RSA
|
||
|
cleared the way for the Court to dismiss Schlafly's action.
|
||
|
In the August 29th ruling on the case, Judge Williams found Schlafly's
|
||
|
claims as untenable in stating, "Schlafly requests that the Court ... ignore
|
||
|
the logical interpretation of the RSA patent." As for antitrust, business
|
||
|
torts, and unfair business practices, the Court entered summary judgment in
|
||
|
favor of RSA on all matters. The Court reasoned that "Schlafly relies on
|
||
|
conclusory allegations" and "his own estimates, arguments and guesses to
|
||
|
support his claims rather than providing specific facts." As for unfair
|
||
|
licensing claims resulting from Schlafly's belief that he is entitled to a
|
||
|
free license, the Court said, "Schlafly's claims of unfair licensing policies
|
||
|
are also without merit."
|
||
|
Earlier in the same month, the Court had disposed of two notable issues in
|
||
|
the case: Schlafly's claims that the MIT patent was invalid and that RSA was
|
||
|
estopped from asserting the validity to the MIT patent because a former
|
||
|
partner, Cylink, had once challenged the validity of the patent. In the
|
||
|
Court's August 22 ruling, Judge Williams granted RSA's motion for summary
|
||
|
adjudication on the validity of the MIT patent, finding that the MIT patent
|
||
|
was valid and stating, "the RSA patent is entitled to patent protection." The
|
||
|
August 22 ruling also found that RSA cannot be precluded from "maintain[ing]
|
||
|
the position that it has held all along which is that the RSA patent is valid.
|
||
|
Further, Cylink's allegations are unproven" (Cylink's allegations had been
|
||
|
cited in part by Schlafly.) The Court stated that to give binding effect to
|
||
|
unproven allegations would be "nonsensical and inequitable."
|
||
|
|
||
|
RSA Data Security, Inc.
|
||
|
RSA Data Security, Inc., a wholly owned subsidiary of Security Dynamics
|
||
|
Technologies, Inc., is the world's brand name for cryptography, with more than
|
||
|
80 million copies of RSA encryption and authentication technologies installed
|
||
|
and in use worldwide. RSA technologies are part of existing and proposed
|
||
|
standards for the Internet and World Wide Web, CCITT, ISO, ANSI, IEEE, and
|
||
|
business, financial and electronic commerce networks around the globe. RSA
|
||
|
develops and markets platform-independent developer's kits and end-user
|
||
|
products and provides comprehensive cryptographic consulting services.
|
||
|
Founded in 1982 by the inventors of the RSA Public Key Cryptosystem, the
|
||
|
company is headquartered in Redwood City, Calif.
|
||
|
|
||
|
SOURCE RSA Data Security Inc.
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Tue, 9 Sep 1997 00:54:34 EDT
|
||
|
From: Steve Talbott <stevet@ora.com>
|
||
|
Subject: File 6--The Executioner's Motto
|
||
|
|
||
|
There's a slogan among artificial intelligence (AI) researchers
|
||
|
that runs this way:
|
||
|
|
||
|
If you take care of the syntax, the meaning will take care of
|
||
|
itself.
|
||
|
|
||
|
Dubbed the Formalist's Motto by philosopher John Haugeland, this
|
||
|
turns out to be a formula for erasing the human being.
|
||
|
|
||
|
Stated simply, the idea runs something like this: if you put the
|
||
|
computer through the motions of human behavior, it will in fact
|
||
|
mean and intend what *we* would mean and intend by such behavior.
|
||
|
So the AI programmer should concentrate on abstracting the formal
|
||
|
structure of our tasks in the world without worrying about the
|
||
|
inner qualities of consciousness, feeling, and will with which we
|
||
|
invest those tasks. After all, our subjective illusions
|
||
|
notwithstanding, nothing is really "there" in either man or
|
||
|
machine beside formal structure, or syntax. The meaningful, inner
|
||
|
content of our lives is a kind of syntactic epiphenomenon, the
|
||
|
mystery of which need not concern us.
|
||
|
|
||
|
On this premise the hope for true, human-like artificial
|
||
|
intelligence now rests.
|
||
|
|
||
|
You may never have heard of the Formalist's Motto, but I venture
|
||
|
to predict that it accurately circumscribes a substantial part of
|
||
|
your thought world, as it does the thought world of nearly
|
||
|
everyone in our culture. For the motto does not apply only to AI.
|
||
|
Here, for example, is what you might call the Physicist's Motto:
|
||
|
|
||
|
If you take care of the equations, their meaningful relation to
|
||
|
the world will take care of itself.
|
||
|
|
||
|
One might wonder about the truth of this at a time when the
|
||
|
equations have become almost mystically esoteric and remote from
|
||
|
the world of our experience. The wondering is justified, but we
|
||
|
also need to realize that the equations succeed remarkably well as
|
||
|
shorthand prescriptions for the effective manipulation of the
|
||
|
world (and especially of experimental apparatus). The problem
|
||
|
lies in how easily and dangerously we forget that manipulating
|
||
|
things is not the same as understanding them.
|
||
|
|
||
|
Then there is the Economist's Motto, blossoming from an unshakable
|
||
|
faith in the power of the Invisible Hand to smooth over our own
|
||
|
neglect of what really matters:
|
||
|
|
||
|
If you take care of the economic numbers, the value for society
|
||
|
will take care of itself.
|
||
|
|
||
|
Or, as Adam Smith originally put it in his *Wealth of Nations*
|
||
|
(1776), "By pursuing his own interest [the individual] frequently
|
||
|
promotes that of the society more effectually than when he really
|
||
|
intends to promote it." And "It is not from the benevolence of the
|
||
|
butcher, the brewer, or the baker, that we expect our dinner, but
|
||
|
from their regard to their own interest. We address ourselves,
|
||
|
not to their humanity, but to their self-love." So a quantitative
|
||
|
concern for the bottom line results automatically in a wider
|
||
|
social good, regardless of one's base intentions.
|
||
|
|
||
|
In this case, not only does the syntax of the formal (market)
|
||
|
mechanism take care of the meaning, it skillfully negates any
|
||
|
unsavory meanings that mere humans try to inject!
|
||
|
|
||
|
One could go on. Probably the most fundamental version of the
|
||
|
motto is that of communications theory, as it has seeped into the
|
||
|
popular consciousness:
|
||
|
|
||
|
If you take care of the transmission of bits, the meaning of
|
||
|
the text will take care of itself.
|
||
|
|
||
|
Nearly all misconceptions about the Information Age trace back to
|
||
|
this formula, including what we might call the Educationist's
|
||
|
Motto:
|
||
|
|
||
|
If you take care of the flow of information, the education will
|
||
|
take care of itself.
|
||
|
|
||
|
What's going on here? Clearly we're not just talking about
|
||
|
computers or education or information or business. We're talking
|
||
|
about *us*. What is at issue is the common style of thinking we
|
||
|
bring to these various areas. The most decisive fact about the
|
||
|
age of the computer is a fact about our own minds: we are,
|
||
|
without being fully aware of it, leaking meaning and content at an
|
||
|
alarming rate. And what is replacing them? Empty,
|
||
|
computationally manipulable abstractions.
|
||
|
|
||
|
Each of the mottos I have cited directs us toward a mathematical
|
||
|
or logical calculus that can easily be read from, or impressed
|
||
|
upon, a mechanism. We may have begun with meaning -- the meaning
|
||
|
of a proposition, the meaning of a business activity, the meaning
|
||
|
of an animal's behavior -- but we are driven by our predilections
|
||
|
toward empty form without content -- the p's and q's of the
|
||
|
logician, the cost analyses of the financial officer, the DNA
|
||
|
structure of the geneticist. For these can be arranged in a
|
||
|
sequence whose logic can drive an automaton.
|
||
|
|
||
|
Our exquisite ability to reduce content to usable abstraction is
|
||
|
one of our rightly prized achievements. But we cannot abstract
|
||
|
from the content of a thing unless we are given the thing in the
|
||
|
first place -- given it, that is, in all its qualitative and
|
||
|
meaningful presence. Otherwise there is simply nothing there.
|
||
|
You cannot arrive at the concrete object from its dimensions
|
||
|
alone, you cannot arrive at a product from a set of cost
|
||
|
specifications alone, and you cannot arrive at the organism from
|
||
|
its DNA alone.
|
||
|
|
||
|
We are powerfully one-directional in our intentions. We want to
|
||
|
abstract the mathematical law of things, but we do not know how to
|
||
|
get the things back once we have found ourselves holding nothing
|
||
|
but a set of pure abstractions. Once a business becomes a
|
||
|
smoothly humming calculator of the bottom line, its resistance as
|
||
|
an complex, integrated, and programmed *mechanism* to intrusive
|
||
|
questions like "What is the good of this product?" becomes almost
|
||
|
impossible to overcome.
|
||
|
|
||
|
The difference between the two directions of movement -- toward
|
||
|
abstraction and toward meaning -- can be painfully hard to grasp
|
||
|
amid the actual affairs of life. It is the difference between a
|
||
|
business that uses economic controls to discipline its pursuit of
|
||
|
ends independently judged to be worthy -- and a business that
|
||
|
pursues profit for its own sake, without regard for the human
|
||
|
worth of its products.
|
||
|
|
||
|
It is the difference between a science that began as a passionate
|
||
|
insistence upon observing the actual world instead of relying upon
|
||
|
the subtle cerebrations of the medieval schoolmen -- and a science
|
||
|
whose developing abstractions have encouraged it first to ignore
|
||
|
and then (as an inevitable consequence of the ignoring) to ride
|
||
|
roughshod over the natural environment.
|
||
|
|
||
|
It is the difference between an education that enables students to
|
||
|
inquire, "What does this mean?" -- and an education bent upon
|
||
|
shoveling inert facts into cranial "databases."
|
||
|
|
||
|
It's no use talking about the risks of technology without also
|
||
|
talking about our styles of thinking. If computerized technology
|
||
|
is pivotal for the modern era, it's not because of some wholly
|
||
|
inherent capacity, but rather because we have fashioned in the
|
||
|
computer a perfectly adapted tool for the expression of our
|
||
|
preferred modes of thought. Toss the machine without altering the
|
||
|
thought, and not much will change. Transform the thought, on the
|
||
|
other hand, and we just *might* be able to wrestle the machine
|
||
|
toward profoundly humane ends.
|
||
|
|
||
|
Unfortunately, there's not much in all this talk about "modes of
|
||
|
thought" that wired folks, including many social activists, care
|
||
|
to bother about. We all too instinctively want a *program* first.
|
||
|
Perhaps I do not stretch the matter too far when I offer the
|
||
|
Involved Citizen's Motto:
|
||
|
|
||
|
If you take care of the program of action, its meaning will
|
||
|
take care of itself.
|
||
|
|
||
|
But it's not true. Actions considered apart from their inner,
|
||
|
expressive gesture degenerate into empty formalisms (like
|
||
|
computer-orchestrated "grassroots" campaigns). Or else they carry
|
||
|
meanings we are simply unaware of.
|
||
|
|
||
|
We have no constructive choice except to consider what we
|
||
|
ourselves will become -- which is another of saying: except to
|
||
|
consider whether we will transcend our currently "executing"
|
||
|
syntax in a way that formal mechanisms never can. The various
|
||
|
mottos I have listed, after all, capture a historical movement of
|
||
|
just the past few hundred years. In becoming aware of that
|
||
|
movement, will we disown responsibility for it as if it were an
|
||
|
unalterable given, while at the same time embracing with
|
||
|
exhilarated anticipation the wondrous changes our *machines* are
|
||
|
bringing about?
|
||
|
|
||
|
In this way we would forget ourselves precisely at the moment when
|
||
|
the "spirit" of technology is making a nearly irresistible offer:
|
||
|
"You can drop out of the picture and I'll keep all the formal
|
||
|
mechanisms humming along just fine. Don't worry; everything else
|
||
|
will take care of itself."
|
||
|
|
||
|
It's a genuine offer -- and one we look too much like accepting.
|
||
|
|
||
|
-----------------------------------------------------------
|
||
|
Source: Net Future
|
||
|
Issue #55, Copyright 1997 Bridge Communications - September 9, 1997
|
||
|
----------------------------------------------------------
|
||
|
Editor: Stephen L. Talbott (stevet@oreilly.com)
|
||
|
|
||
|
On the Web:
|
||
|
http://www.oreilly.com/people/staff/stevet/netfuture/ You may
|
||
|
redistribute this newsletter for noncommercial purposes.
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Sat, 13 Sep 1997 19:28:35 -0700 (PDT)
|
||
|
From: jonl@well.com
|
||
|
Subject: File 7--Cyber Rights Activists Convene in Austin, Texas
|
||
|
|
||
|
FOR IMMEDIATE RELEASE:
|
||
|
|
||
|
*** Cyber Rights Activists Convene in Austin, Texas ***
|
||
|
|
||
|
Speakers from the Electronic Frontier Foundation and the American Civil
|
||
|
Liberties Union will join local activists and attorneys in a discussion
|
||
|
of online rights. Cyber Rights '97: The Post-CDA Landscape, will explore
|
||
|
the origin of the Communications Decency Act and the implications of a
|
||
|
recent Supreme Court decision declaring important points of the act
|
||
|
unconstitutional.
|
||
|
|
||
|
The free workshop will be held from 1-5PM Sunday, September 21st at the
|
||
|
Joe C. Thompson Conference Center at 26th and Red River in Austin, Texas.
|
||
|
|
||
|
Speakers:
|
||
|
|
||
|
Ann Beeson, attorney with the American Civil Liberties Union
|
||
|
Mike Godwin, attorney with the Electronic Frontier Foundation
|
||
|
Pete Kennedy, attorney with George, Donaldson, and Ford of Austin
|
||
|
Sharon Strover, director of the Texas Telecommunications Policy Institute
|
||
|
Ed Cavazos, senior vice-president and counsel for Interliant, Inc.
|
||
|
Gene Crick, president of the Texas Internet Service Providers' Association
|
||
|
David Smith, vice-president of EFF-Austin
|
||
|
Richard MacKinnon, UT researcher and moderator of the event
|
||
|
|
||
|
|
||
|
Probable subjects:
|
||
|
|
||
|
7 Internet rating and filtering systems
|
||
|
|
||
|
7 Public library use of filtering software, including a discussion of the
|
||
|
use of CyberPatrol by the Austin Public Library
|
||
|
|
||
|
7 State regulation of the Internet
|
||
|
|
||
|
7 _ACLU v. Reno_ (Supreme Court overturns Communications Decency Act)
|
||
|
|
||
|
7 Children and the Internet
|
||
|
|
||
|
7 Telecommunications infrastructure and the state's role in regulating
|
||
|
telecommunications systems computers and networks in schools
|
||
|
|
||
|
7 "Spam" (unsolicited commercial email)
|
||
|
|
||
|
7 Encryption and communications privacy, a particularly hot topic given
|
||
|
the battle currently raging over strong encryption.
|
||
|
|
||
|
Contact: Jon Lebkowsky, (512) 477-5566 ext 171 day or (512) 444-5175
|
||
|
evening <jonl@onr.com>
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Thu, 7 May 1997 22:51:01 CST
|
||
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
||
|
Subject: File 8--Cu Digest Header Info (unchanged since 7 May, 1997)
|
||
|
|
||
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
||
|
available at no cost electronically.
|
||
|
|
||
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
||
|
|
||
|
Or, to subscribe, send post with this in the "Subject:: line:
|
||
|
|
||
|
SUBSCRIBE CU-DIGEST
|
||
|
Send the message to: cu-digest-request@weber.ucsd.edu
|
||
|
|
||
|
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
|
||
|
|
||
|
The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
|
||
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
||
|
60115, USA.
|
||
|
|
||
|
To UNSUB, send a one-line message: UNSUB CU-DIGEST
|
||
|
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
|
||
|
(NOTE: The address you unsub must correspond to your From: line)
|
||
|
|
||
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
||
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
||
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
||
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
||
|
the PC Telecom forum under "computing newsletters;"
|
||
|
On Delphi in the General Discussion database of the Internet SIG;
|
||
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
||
|
CuD is also available via Fidonet File Request from
|
||
|
1:11/70; unlisted nodes and points welcome.
|
||
|
|
||
|
In ITALY: ZERO! BBS: +39-11-6507540
|
||
|
|
||
|
UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
|
||
|
Web-accessible from: http://www.etext.org/CuD/CuD/
|
||
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
||
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
||
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
||
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
||
|
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
|
||
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
||
|
|
||
|
|
||
|
The most recent issues of CuD can be obtained from the
|
||
|
Cu Digest WWW site at:
|
||
|
URL: http://www.soci.niu.edu/~cudigest/
|
||
|
|
||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
|
information among computerists and to the presentation and debate of
|
||
|
diverse views. CuD material may be reprinted for non-profit as long
|
||
|
as the source is cited. Authors hold a presumptive copyright, and
|
||
|
they should be contacted for reprint permission. It is assumed that
|
||
|
non-personal mail to the moderators may be reprinted unless otherwise
|
||
|
specified. Readers are encouraged to submit reasoned articles
|
||
|
relating to computer culture and communication. Articles are
|
||
|
preferred to short responses. Please avoid quoting previous posts
|
||
|
unless absolutely necessary.
|
||
|
|
||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
||
|
the views of the moderators. Digest contributors assume all
|
||
|
responsibility for ensuring that articles submitted do not
|
||
|
violate copyright protections.
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
End of Computer Underground Digest #9.68
|
||
|
************************************
|
||
|
|