957 lines
49 KiB
Plaintext
957 lines
49 KiB
Plaintext
![]() |
########## ########## ########## | RAPID GROWTH OF ONLINE SERVICES
|
||
|
########## ########## ########## | ONE BBSCON /EFF LIBRARY/ USENET
|
||
|
#### #### #### |
|
||
|
######## ######## ######## | JOHN PERRY BARLOW ON
|
||
|
######## ######## ######## | THE NSA, THE FBI, ENCRYPTION,
|
||
|
#### #### #### | AND WIRE-TAPPING
|
||
|
########## #### #### |
|
||
|
########## #### #### | THE TAO TE CHIP
|
||
|
=====================================================================
|
||
|
EFFector Online JULY 29, 1992 Issue 3.1 / Part 1
|
||
|
A Publication of the Electronic Frontier Foundation
|
||
|
ISSN 1062-9424
|
||
|
=====================================================================
|
||
|
|
||
|
ONLINE SERVICES EXPERIENCE SOLID GROWTH OVER PAST 5 YEARS
|
||
|
WITH MORE FORECAST FOR THE NEAR FUTURE
|
||
|
|
||
|
A new study released by SIMBA Information, a research group based in
|
||
|
Wilton, Connecticut, says sales by online services increased by 61.1
|
||
|
percent in the last five years. The trend will continue over the next five
|
||
|
years, says SIMBA, with a projected increase of 48%.
|
||
|
|
||
|
By 1996, the online information market should be worth about $14.2 billion
|
||
|
annually. Business uses will consume the lion's share of this market by a
|
||
|
factor of 24 to 1. Regardless of this, the services used by consumers were
|
||
|
the fastest growing segment of the market in the 1990-1991 period. This
|
||
|
growth in consumer use is expected to increase by 145 percent over the next
|
||
|
five years.
|
||
|
|
||
|
The report, "Online Services: 1992 Review, Trends, and Forecast" was
|
||
|
written for SIMBA by analyst Chris Elwell.
|
||
|
|
||
|
Other items in the report of interest: Subscribers to online services
|
||
|
numbered 5.4 million at the end of 1991, an increase of 18% over 1990.
|
||
|
Leading online services (CompuServe, Genie, Prodigy, etc.) reported an
|
||
|
aggregate sales growth of nearly 7% in 1991 from 1990 levels.
|
||
|
|
||
|
Some of the more notable conclusions of this report are:
|
||
|
#North American-based online services account for 57% of
|
||
|
worldwide sales,with rapid growth in the near term.
|
||
|
#More than half of the growth in online subscribers in 1991
|
||
|
was accounted for by Prodigy.
|
||
|
#One out of every five home computers has a modem.
|
||
|
#As the Regional Bell companies enter the online services
|
||
|
arena, the initial focal point of their efforts will be
|
||
|
online directory publishing.
|
||
|
#Even though the report gives detailed profiles of 35 major
|
||
|
players, it notes that most online services and database
|
||
|
publishers are relatively small operations.
|
||
|
|
||
|
-==--==--==-<>-==--==--==-
|
||
|
|
||
|
EFF to Crash The ONE BBSCON
|
||
|
|
||
|
August 13-16, Stouffer Concourse Hotel, Denver Colorado.
|
||
|
|
||
|
The ONE BBSCON is the major BBS conference of the year, hosting seminars in
|
||
|
such topics as How to make your BBS profitable; What is Internet?; FidoNet,
|
||
|
RelayNet, INet, et. al.; Graphics over a Modem; Learn from the Winners; as
|
||
|
well hosting an exhibition attended by vendors of BBS-related products.
|
||
|
|
||
|
And EFF will be there with a booth as well. We'll be doing the usual
|
||
|
booth-related activities such as handing out literature and selling
|
||
|
t-shirts; however, we're more interested in talking with the members of the
|
||
|
BBS community and learning what it needs from EFF. Along with seminars on
|
||
|
BBSs and the Law, EFF staff counsel Shari Steele will be presenting a talk
|
||
|
on the EFF at which we will be looking for feedback. If you'll be
|
||
|
attending, do stop by either the booth or the seminar and tell us what you
|
||
|
think.
|
||
|
|
||
|
For more information on ONE BBSCON, contact
|
||
|
ONE, Inc.
|
||
|
4255 S. Buckley Road
|
||
|
Suite 308
|
||
|
Aurora, Colorado 80013
|
||
|
(303)693-5252
|
||
|
Note: There is no email address. Leaves room for improvement.
|
||
|
|
||
|
-==--==--==-<>-==--==--==-
|
||
|
|
||
|
UPDATE ON THE EFF LIBRARY
|
||
|
|
||
|
The EFF Library was set up over a year ago when it became clear that,
|
||
|
regardless of the digital revolution, we were being overwhelmed by a wave
|
||
|
of hard copy. At that time, we had a backlog of around 1,000 documents,
|
||
|
books and magazines concerning issues relevant to the Electronic Frontier.
|
||
|
We engaged a professional librarian, Hae Young Wang, to bring order to
|
||
|
chaos, and to provide us with a method that would enable us to file and
|
||
|
retrieve material necessary to the work of the foundation.
|
||
|
|
||
|
Today, the EFF library in Cambridge houses over 2,300 items. The holdings
|
||
|
cover journal articles, newspaper articles, conference proceedings, court
|
||
|
documents, legislation, magazines, books, and brochures. The subject areas
|
||
|
include such things as information infrastructure, computers and civil
|
||
|
liberties, intellectual property and copyrights, and EFF archives.
|
||
|
|
||
|
The Library also maintains over 130 subscriptions to magazines and
|
||
|
newsletters.
|
||
|
|
||
|
In addition, the EFF library maintains, classifies and indexes EFF's
|
||
|
anonymous ftp archive files. These files, which are accessible to everyone
|
||
|
with Internet access, have recently been re-organized into what we hope is a
|
||
|
more user-friendly and informative manner. In the EFF ftp directory, you
|
||
|
can find documents about the EFF, back issues of its online newsletter,
|
||
|
notes on eff-issues, historical items, legal issues, current legislation,
|
||
|
local chapters, and a host of other material germane to the Electronic
|
||
|
Frontier.
|
||
|
|
||
|
While the ftp files are open to all, the EFF Library can now serve only the
|
||
|
staff here and in Washington. We hope to be able to provide service to EFF
|
||
|
members and the general public in the future, as funding and staffing
|
||
|
allow.
|
||
|
|
||
|
In the meantime, we have recently acquired new scanning software which we
|
||
|
hope will reduce the work involved in moving hard-copy information into
|
||
|
digital form. With this in place we will be adding items to the anonymous
|
||
|
ftp archive at an increased rate throughout the rest of the summer.
|
||
|
|
||
|
Recent additions to the EFF ftp files are:
|
||
|
The EFF Open Platform Proposal. This is the full text of the
|
||
|
EFF's plan to create a national public network through the
|
||
|
deployment of ISDN technology.
|
||
|
(pub/EFF/papers/open-platform-proposal)
|
||
|
|
||
|
Howard Rhinegold's "A Slice of Life in My Virtual Community".
|
||
|
This meditation on what it means to be online in 1992 was
|
||
|
first serialized in EFFector Online.
|
||
|
(pub/EFF/papers/cyber/life-in-virtual-community)
|
||
|
|
||
|
Senator Al Gore's High-Tech Bill (S.2937) as introduced on July
|
||
|
1, 1992. This bill provides funding to both NSF and NASA to
|
||
|
develop technology for "digital libraries", huge data bases
|
||
|
that store text, imagery, video, and sound and are accessible
|
||
|
over computer networks like NSFNET. The bill also funds
|
||
|
development of prototype "digital libraries" around the
|
||
|
country. This is the full-text of this bill along with the
|
||
|
press release from Gore's office announcing the bill.
|
||
|
(pub/EFF/legislation/gore-bill-1992)
|
||
|
|
||
|
An information packet on the GPO/WINDO legislation before congress
|
||
|
as S.2813/H.R. 2772. This discusses the function of the proposed
|
||
|
"gateway" for online public access to government databases. From
|
||
|
the Taxpayers Assets Project.
|
||
|
(pub/EFF/legislation/gpo-windo-info)
|
||
|
|
||
|
These files are also available through WAIS as eff-documents.src. WAIS
|
||
|
clients are available for the Mac, PC, NeXT, X11, and GNU Emacs
|
||
|
environments via anonymous ftp from think.com. A "guest" WAIS client is
|
||
|
available by telnetting to quake.think.com and logging in as 'wais'.
|
||
|
|
||
|
To retrieve these files via email, send mail to archive-server@eff.org,
|
||
|
containing (in the body of the message) the command
|
||
|
|
||
|
send eff <path from pub/EFF>
|
||
|
|
||
|
So to get the Gore bill, you would send
|
||
|
|
||
|
send eff legislation/gore-bill-1992
|
||
|
|
||
|
If you have any trouble obtaining these documents, send email to
|
||
|
ftphelp@eff.org.
|
||
|
|
||
|
-==--==--==-<>-==--==--==-
|
||
|
|
||
|
UNCLEAR ON USENET INTERNET?
|
||
|
|
||
|
Veteran members of the Internet know, through osmosis, the difference
|
||
|
between Internet and Usenet. Still, newcomers are often confused since the
|
||
|
two seem to be, at times, used interchangeably. To provide for an ultimate
|
||
|
answer, we turned to Chris Davis (ckd), star sysadmin at eff.org. He said:
|
||
|
|
||
|
"The definitive answer is long and mostly uninteresting except to
|
||
|
pedants like me :).
|
||
|
|
||
|
"The Internet is that collection of connected TCP/IP networks. Roughly
|
||
|
speaking, if you can connect directly to 'nic.ddn.mil' with telnet, you're
|
||
|
on the Internet. You may be able to get Internet mail without being on the
|
||
|
Internet proper (say, if you're on America Online).
|
||
|
|
||
|
"USENET is that set of machines and people who interchange USENET
|
||
|
messages. A large number of USENET sites are on the Internet, and many
|
||
|
Internet sites get USENET. Many USENET sites are NOT on the Internet,
|
||
|
however, getting their news via dialup lines, satellite receivers, magnetic
|
||
|
tape shipments (no kidding), and the like. Roughly speaking, you're on
|
||
|
USENET if you get the 'news.announce.important' newsgroup.
|
||
|
|
||
|
"They are related in that they are partially congruent and often
|
||
|
confused with each other :) but they are not the same network."
|
||
|
|
||
|
-==--==--==-<>-==--==--==-
|
||
|
|
||
|
Decrypting the Puzzle Palace
|
||
|
by
|
||
|
John Perry Barlow
|
||
|
barlow@eff.org
|
||
|
|
||
|
"A little sunlight is the best disinfectant."
|
||
|
--Justice Louis Brandeis
|
||
|
|
||
|
Over a year ago, in a condition of giddier innocence than I enjoy today, I
|
||
|
wrote the following about the discovery of Cyberspace:
|
||
|
|
||
|
"Imagine discovering a continent so vast that it may have no other side.
|
||
|
Imagine a new world with more resources than all our future greed might
|
||
|
exhaust, more opportunities than there will ever be entrepreneurs enough to
|
||
|
exploit, and a peculiar kind of real estate which expands with
|
||
|
development."
|
||
|
|
||
|
One less felicitous feature of this terrain which I hadn't noticed then is
|
||
|
what seems to be a long-encamped and immense army of occupation.
|
||
|
|
||
|
This army represents interests which are difficult to define, guards the
|
||
|
area against unidentified enemies, meticulously observes almost every
|
||
|
activity undertaken there, and continuously prevents most who inhabit its
|
||
|
domain from drawing any blinds against such observation.
|
||
|
|
||
|
It marshals at least 40,000 troops, owns the most advanced computing
|
||
|
resources in the world, and uses funds the dispersal of which does not fall
|
||
|
under any democratic review.
|
||
|
|
||
|
Imagining this force won't require from you the inventive powers of a
|
||
|
William Gibson. The American Occupation Army of Cyberspace exists. Its
|
||
|
name is the National Security Agency.
|
||
|
|
||
|
It may be argued that this peculiar institution inhibits free trade, has
|
||
|
directly damaged American competitiveness, and poses a threat to liberty
|
||
|
anywhere people communicate with electrons. It's principal function, as
|
||
|
miff colleague John Gilmore puts it, is "wire-tapping the world," which it
|
||
|
is free to do without a warrant from any judge.
|
||
|
|
||
|
It is legally constrained from domestic surveillance, but precious few
|
||
|
people are in a good position to watch what, how, or whom the NSA watches.
|
||
|
And those who are tend to be temperamentally sympathetic to its objectives
|
||
|
and methods. They like power, and power understands the importance of
|
||
|
keeping it own secrets and learning everyone else's.
|
||
|
|
||
|
Whether it is meticulously ignoring every American byte or not, the NSA is
|
||
|
certainly pursuing policies which will render our domestic affairs
|
||
|
transparent to anyone who can afford big digital hardware. Such policies
|
||
|
could have profound consequences on our liberty and privacy.
|
||
|
|
||
|
More to point, the role of the NSA in the area of domestic privacy needs to
|
||
|
be assessed in the light of other recent federal initiatives which seem
|
||
|
directly aimed at permanently denying privacy to the inhabitants of
|
||
|
Cyberspace, whether foreign or American.
|
||
|
|
||
|
Finally it seems a highly opportune time, directly following our
|
||
|
disorienting victory in the Cold War, to ask if the threats from which the
|
||
|
NSA purportedly protects us from are as significant as the hazards its
|
||
|
activities present.
|
||
|
|
||
|
Like most Americans I'd never given much thought to the NSA until recently.
|
||
|
(Indeed its very existence was a secret for much of my life. Beltway types
|
||
|
used to joke that NSA stood for "No Such Agency.")
|
||
|
|
||
|
I vaguely knew that it was another of the 12 or so shadowy federal spook
|
||
|
houses which were erected shortly after the Iron Curtain with the purpose
|
||
|
of stopping its further advance. It derives entirely from a memorandum sent
|
||
|
by Harry Truman on October 24, 1952 to Secretary of State Dean Acheson and
|
||
|
Defense Secretary Robert Lovatt. This memo, the official secrecy of which
|
||
|
remained unpenetrated for almost 40 years, created the NSA, placed it under
|
||
|
the authority of the Secretary of Defense, and charged it with monitoring
|
||
|
and decoding any signal transmission relevant to the security of the United
|
||
|
States.
|
||
|
|
||
|
Even after I started noticing the NSA, my natural immunity to paranoia
|
||
|
combined with a general belief in the incompetence of all bureaucracies...
|
||
|
especially those whose inefficiencies are unmolested by public scrutiny...
|
||
|
to mute any sense of alarm. But this was before I began to understand the
|
||
|
subterranean battles raging over data encryption and the NSA's role in
|
||
|
them. Lately, I'm less sanguine.
|
||
|
|
||
|
Encryption may be the only reliable method for conveying privacy to the
|
||
|
inherently public domain of Cyberspace. I certainly trust it more than
|
||
|
privacy protection laws. Relying on government to protect your privacy is
|
||
|
like asking a peeping tom to install your window blinds.
|
||
|
|
||
|
In fact, we already have a strong-sounding federal law protecting our
|
||
|
electronic privacy, the Electronic Communications Privacy Act or ECPA. But
|
||
|
this law has not particular effective in those areas were electronic
|
||
|
eavesdropping is technically easy. This is especially true in the area of
|
||
|
cellular phone conversations, which, under the current analog transmission
|
||
|
standard, are easily accessible to anyone from the FBI to you.
|
||
|
|
||
|
The degree of law enforcement apprehension over secure cellular encryption
|
||
|
provides mute evidence of how seriously they've been taking ECPA. They are
|
||
|
moving on a variety of fronts to see that robust electronic privacy
|
||
|
protection systems don't become generally available to the public. Indeed,
|
||
|
the current administration may be so determined to achieve this end that
|
||
|
they may be willing to paralyze progress in America's most promising
|
||
|
technologies rather than yield on it.
|
||
|
|
||
|
Push is coming to shove in two areas of communications technology: digital
|
||
|
transmission of heretofore analog signals and the encryption of transmitted
|
||
|
data.
|
||
|
|
||
|
As the communications service providers move to packet switching, fiber
|
||
|
optic transmission lines, digital wireless, ISDN and other advanced
|
||
|
techniques, what have been discrete channels of continuous electrical
|
||
|
impulses, voices audible to anyone with alligator clips on the right wires,
|
||
|
are now becoming chaotic blasts of data packets, readily intelligible only
|
||
|
to the sender and receiver. This development effectively forecloses
|
||
|
traditional wire-tapping techniques, even as it provides new and different
|
||
|
opportunities for electronic surveillance.
|
||
|
|
||
|
It is in the latter area where the NSA knows its stuff. A fair percentage
|
||
|
of the digital signals dispatched on planet Earth must pass at some point
|
||
|
through the NSA's big sieve in Fort Meade, Maryland, 12 underground acres
|
||
|
of the heaviest hardware in the computing world. There, unless these
|
||
|
packets are also encrypted with a particularly knotty algorithm, sorting
|
||
|
them back into their original continuity is not so difficult.
|
||
|
|
||
|
Last spring, alarmed at a future in which it would have to sort through an
|
||
|
endless fruit salad of encrypted bits, the FBI persuaded Senator Joseph
|
||
|
Biden to include language in Senate Bill 266 which would have directed
|
||
|
providers of electronic communications services and devices (such as
|
||
|
digital cellular phone systems or other multiplexed communications
|
||
|
channels) to implement only such encryption methods as would assure
|
||
|
governmental ability to extract from the data stream the plain text of any
|
||
|
voice or data communications in which it took a legal interest. It was if
|
||
|
the government had responded to a technological leap in lock design by
|
||
|
requiring building contractors to supply it with skeleton keys to every
|
||
|
door in America.
|
||
|
|
||
|
The provision raised wide-spread concern in the computer community, which
|
||
|
was better equipped to understand its implications than the general public,
|
||
|
and in August of last year, the Electronic Frontier Foundation, in
|
||
|
cooperation with Computer Professionals for Social Responsibility and other
|
||
|
industry groups, successfully lobbied to have it removed from the bill.
|
||
|
|
||
|
Our celebration was restrained. We knew we hadn't seen the last of it. For
|
||
|
one thing, the movement to digital communications does create some serious
|
||
|
obstacles to traditional wire-tapping procedures. I fully expected that law
|
||
|
enforcement would be back with new proposals, which I hoped might be ones
|
||
|
we could support. But what I didn't understand then, and am only now
|
||
|
beginning to appreciate, was the extent to which this issue had already
|
||
|
been engaged by the NSA in the obscure area of export controls over data
|
||
|
encryption algorithms.
|
||
|
|
||
|
Encryption algorithms, despite their purely defensive characteristics, have
|
||
|
been regarded by the government of this country as weapons of war for many
|
||
|
years. If they are to be employed for privacy (as opposed to
|
||
|
authentication) and they are any good at all, their export is licensed
|
||
|
under State Department's International Traffic in Arms Regulations or ITAR.
|
||
|
|
||
|
The encryption watchdog is the NSA. It has been enforcing a policy, neither
|
||
|
debated nor even admitted to, which holds that if a device or program
|
||
|
contains an encryption scheme which the NSA can't break fairly easily, it
|
||
|
will not be licensed for international sale.
|
||
|
|
||
|
Aside for marveling at the silliness of trying to embargo algorithms, a
|
||
|
practice about as practicable as restricting the export of wind, I didn't
|
||
|
pay much attention to the implications of NSA encryption policies until
|
||
|
February of this year. It was then that I learned about the deliberations
|
||
|
of an obscure group of cellular industry representatives called the Ad Hoc
|
||
|
Authentication Task Force, TR45.3 and of the influence which the NSA has
|
||
|
apparently exercised over their findings.
|
||
|
|
||
|
In the stately fashion characteristic of standard-setting bodies, this
|
||
|
group has been working for several years on a standard for digital cellular
|
||
|
transmission, authentication, and privacy protection to be known by the
|
||
|
characteristically whimsical telco moniker IS-54B.
|
||
|
|
||
|
In February they met near Giants Stadium in East Rutherford, NJ. At that
|
||
|
meeting, they recommended, and agreed not to publish, an encryption scheme
|
||
|
for American-made digital cellular systems which many sophisticated
|
||
|
observers believe to be intentionally vulnerable. It was further thought
|
||
|
by many observers that this "dumbing down" had been done indirect
|
||
|
cooperation with the NSA.
|
||
|
|
||
|
Given the secret nature of the new algorithm, its actual merits were
|
||
|
difficult to assess. But many cryptologists believe there is enough in the
|
||
|
published portions of the standard to confirm that it isn't any good.
|
||
|
|
||
|
One cryptographic expert, one of two I spoke with who asked not to be
|
||
|
identified lest the NSA take reprisals against his company, said:
|
||
|
|
||
|
"The voice privacy scheme, as opposed to the authentication scheme, is
|
||
|
pitifully easy to break. It involves the generation of two "voice privacy
|
||
|
masks" each 260 bits long. They are generated as a byproduct of the
|
||
|
authentication algorithm and remain fixed for the duration of a call. The
|
||
|
voice privacy masks are exclusive_ORed with each frame of data from the
|
||
|
vocoder at the transmitter. The receiver XORs the same mask with the
|
||
|
incoming data frame to recover the original plain text. Anyone familiar
|
||
|
with the fundamentals of cryptanalysis can easily see how weak this scheme
|
||
|
is."
|
||
|
|
||
|
And indeed, Whitfield Diffie, co-inventor of Public Key cryptography and
|
||
|
arguably the dean of this obscure field, told me this about the fixed
|
||
|
masks:
|
||
|
|
||
|
"Given that description of the encryption process, there is no need for the
|
||
|
opponents to know how the masks were generated. Routine cryptanalytic
|
||
|
operations will quickly determine the masks and remove them.''
|
||
|
|
||
|
Some on committee claimed that possible NSA refusal of export licensing had
|
||
|
no bearing on the algorithm they chose. But their decision not to publish
|
||
|
the entire method and expose it to cryptanalytical abuse (not to mention
|
||
|
ANSI certification) was accompanied by the following convoluted
|
||
|
justification:
|
||
|
|
||
|
"It is the belief of the majority of the Ad Hoc Group, based on our current
|
||
|
understanding of the export requirements, that a published algorithm would
|
||
|
facilitate the cracking of the algorithm to the extent that its fundamental
|
||
|
purpose is defeated or compromised."(Italics added.)
|
||
|
|
||
|
Now this is a weird paragraph any way you parse it, but its most singular
|
||
|
quality is the sudden, incongruous appearance of export requirements in a
|
||
|
paragraph otherwise devoted to algorithmic integrity. In fact, this
|
||
|
paragraph is itself code, the plain text of which goes something like this:
|
||
|
"We're adopting this algorithm because, if we don't, the NSA will slam an
|
||
|
export embargo on all domestically manufactured digital cellular phones."
|
||
|
|
||
|
Obviously, the cellular phone systems manufacturers and providers are not
|
||
|
going to produce one model for overseas sale and another for domestic
|
||
|
production. Thus, a primary effect of NSA-driven efforts to deny some
|
||
|
unnamed foreign enemy secure cellular communications is on domestic
|
||
|
security. The wireless channels available to private Americans will be
|
||
|
cloaked in a mathematical veil so thin that, as one crypto-expert put it,
|
||
|
"Any county sheriff with the right PC-based black box will be able to
|
||
|
monitor your cellular conversations."
|
||
|
|
||
|
When I heard him say that, it suddenly became clear to me that, whether
|
||
|
consciously undertaken with that goal or not, the most important result of
|
||
|
the NSA's encryption embargoes has been the future convenience of domestic
|
||
|
law enforcement. Thanks to NSA export policies, they will be assured that,
|
||
|
as more Americans protect their privacy with encryption, it will be of a
|
||
|
sort easily penetrated by authority.
|
||
|
|
||
|
I find it increasingly hard to imagine this is not their real objective as
|
||
|
well. Surely, they must be aware of how ineffectual their efforts have been
|
||
|
in keeping good encryption out of inimical military possession. An
|
||
|
algorithm is somewhat less easily stopped at the border than, say, a
|
||
|
nuclear reactor. As William Neukom, head of Microsoft Legal puts it, "The
|
||
|
notion that you can control this technology is comical."
|
||
|
|
||
|
I became further persuaded that this was the case upon hearing, from a
|
||
|
couple of sources, that the Russians have been using the possibly
|
||
|
uncrackable (and American) RSA algorithm in their missile launch codes for
|
||
|
the last ten years and that, for as little as five bucks, one can get a
|
||
|
software package called Crypto II on the streets of Saint Petersburg which
|
||
|
includes both RSA and DES encryption systems.
|
||
|
|
||
|
Nevertheless, the NSA has been willing to cost American business a lot of
|
||
|
revenue rather than allow domestic products with strong encryption into the
|
||
|
global market.
|
||
|
|
||
|
While it's impossible to set a credible figure on what that loss might add
|
||
|
up to, it's high. Jim Bidzos, whose RSA Data Security licenses RSA, points
|
||
|
to one major Swiss bid in which a hundred million dollar contract for
|
||
|
financial computer terminals went to a European vendor after American
|
||
|
companies were prohibited by the NSA from exporting a truly secure network.
|
||
|
|
||
|
The list of export software containing intentionally broken encryption is
|
||
|
also long. Lotus Notes ships in two versions. Don't count on much
|
||
|
protection from the encryption in the export version. Both Microsoft and
|
||
|
Novell have been thwarted in their efforts to include RSA in their
|
||
|
international networking software, despite frequent publication of the
|
||
|
entire RSA algorithm in technical publications all over the world.
|
||
|
|
||
|
With hardware, the job has been easier. NSA levied against the inclusion of
|
||
|
a DES chip in the AS/390 series IBM mainframes in late 1990 despite the
|
||
|
fact that, by this time, DES was in widespread use around the world,
|
||
|
including semi-official adoption by our official enemy, the USSR.
|
||
|
|
||
|
I now realize that Soviets have not been the NSA's main concern at any time
|
||
|
lately. Naively hoping that, with the collapse of the Evil Empire, the NSA
|
||
|
might be out of work, I then learned that, given their own vigorous crypto
|
||
|
systems and their long use of some embargoed products, the Russians could
|
||
|
not have been the threat from whom this forbidden knowledge was to be kept.
|
||
|
Who has the enemy been then? I started to ask around.
|
||
|
|
||
|
Cited again and again as the real object of the embargoes were Third-World
|
||
|
countries. terrorists and... criminals. Criminals, most generally
|
||
|
drug-flavored, kept coming up, and nobody seemed terribly concerned that
|
||
|
some of their operations might be located in areas supposedly off-limits to
|
||
|
NSA scrutiny.
|
||
|
|
||
|
Presumably the NSA is restricted from conducting American surveillance by
|
||
|
both the Foreign Intelligence Surveillance Act of 1978 (FISA) and a series
|
||
|
of presidential directives, beginning with one issued by President Ford
|
||
|
following Richard Nixon's bold misuse of the NSA, in which he explicitly
|
||
|
directed the NSA to conduct widespread domestic surveillance of political
|
||
|
dissidents and drug users.
|
||
|
|
||
|
But whether or not FISA has actually limited the NSA's abilities to conduct
|
||
|
domestic surveillance seemed less relevant the more I thought about it. A
|
||
|
better question to ask was, "Who is best served by the NSA's encryption
|
||
|
export policies?" The answer is clear: domestic law enforcement. Was this
|
||
|
the result of some spook plot between NSA and, say, the Department of
|
||
|
Justice? Not necessarily.
|
||
|
|
||
|
Certainly in the case of the digital cellular standard, cultural congruity
|
||
|
between foreign intelligence, domestic law enforcement, and what somebody
|
||
|
referred to as "spook wannabes on the TR45.3 committee" might have a lot
|
||
|
more to do with the its eventual flavor than any actual whisperings along
|
||
|
the Potomac.
|
||
|
|
||
|
[continued in Effector Online 3.1 Part 2]
|
||
|
|
||
|
EFFector Online JULY 22, 1992 Issue 3.1 / end of Part 1
|
||
|
=====================================================================
|
||
|
EFFector Online JULY 29, 1992 Issue 3.1 / Part 2
|
||
|
A Publication of the Electronic Frontier Foundation
|
||
|
ISSN 1062-9424
|
||
|
=====================================================================
|
||
|
|
||
|
[Decrypting the Puzzle Palace by John Perry Barlow - continued - ]
|
||
|
|
||
|
Unable to get anyone presently employed by the NSA to comment on this or
|
||
|
any other matter and with little opportunity to assess the NSA's
|
||
|
congeniality toward domestic law enforcement from the inside, I
|
||
|
approached a couple of old hands for a highly distilled sample of
|
||
|
intelligence culture.
|
||
|
|
||
|
I called Admirals Stansfield Turner and Bobby Ray Inman. Not only had their
|
||
|
Carter administration positions as, respectively, CIA and NSA Directors,
|
||
|
endowed them with considerable experience in such matters, both are
|
||
|
generally regarded to be somewhat more sensitive to the limits of
|
||
|
democratic power than their successors. None of whom seemed likely to
|
||
|
return my calls anyway.
|
||
|
|
||
|
My phone conversations with Turner and Inman were amiable enough, but they
|
||
|
didn't ease my gathering sense that the NSA takes an active interest in
|
||
|
areas which are supposedly beyond its authorized field of scrutiny.
|
||
|
|
||
|
Turner started out by saying he was in no position to confirm or deny any
|
||
|
suspicions about direct NSA-FBI cooperation on encryption, but he didn't
|
||
|
think I was being exactly irrational in raising the question. In fact, he
|
||
|
genially encouraged me to investigate the matter further.
|
||
|
|
||
|
He also said that while a sub rosa arrangement between the NSA and the
|
||
|
Department of Justice to compromise domestic encryption would be
|
||
|
"injudicious," he could think of no law, including FISA (which he helped
|
||
|
design), which would prevent it.
|
||
|
|
||
|
Most alarmingly, this gentleman who has written eloquently on the hazards
|
||
|
of surveillance in a democracy did not seem terribly concerned that our
|
||
|
digital shelters are being rendered permanently translucent by and to the
|
||
|
government.
|
||
|
|
||
|
He said, "A threat could develop...terrorism, narcotics, whatever...where
|
||
|
the public would be pleased that all electronic traffic was open to
|
||
|
decryption. You can't legislate something which forecloses the possibility
|
||
|
of meeting that kind of emergency."
|
||
|
|
||
|
Admiral Inman had even more enthusiasm for assertive governmental
|
||
|
supervision. Although he admitted no real knowledge of the events behind
|
||
|
the new cellular encryption standard, he wasn't the least disturbed to hear
|
||
|
that it might be flawed.
|
||
|
|
||
|
And, despite the fact that his responsibilities as NSA Director had been
|
||
|
restricted to foreign intelligence, he seemed a lot more comfortable
|
||
|
talking about threats on the home front.
|
||
|
|
||
|
"The Department of Justice," he began, "has a very legitimate worry. The
|
||
|
major weapon against white collar crime has been the court-ordered wiretap.
|
||
|
If the criminal elements go to using a high quality cipher, the principal
|
||
|
defense against narcotics traffic is gone." This didn't sound like a guy
|
||
|
who, were he still head of NSA, would rebuff FBI attempts to get a little
|
||
|
help from his agency.
|
||
|
|
||
|
He brushed off my concerns about the weakness of the cellular encryption
|
||
|
standard. "If all you're seeking is personal privacy, you can get that with
|
||
|
a very minimal amount of encipherment."
|
||
|
|
||
|
Well, I wondered, Privacy from whom?
|
||
|
|
||
|
And he seemed to regard real, virile encryption to be something rather like
|
||
|
a Saturday Night Special. "My answer," he said, "would be legislation
|
||
|
which would make it a criminal offense to use encrypted communication to
|
||
|
conceal criminal activity."
|
||
|
|
||
|
Wouldn't that render all encrypted traffic automatically suspect? I asked.
|
||
|
|
||
|
"Well, he said, "you could have a registry of institutions which can
|
||
|
legally use ciphers. If you get somebody using one who isn't registered,
|
||
|
then you go after him."
|
||
|
|
||
|
You can have my encryption algorithm, I thought to myself, when you pry my
|
||
|
cold dead fingers from its private key.
|
||
|
|
||
|
It wasn't a big sample, but it was enough to gain a better appreciation of
|
||
|
the cultural climate of the intelligence community. And these guys are the
|
||
|
liberals. What legal efficiencies might their Republican successors be
|
||
|
willing to employ to protect the American Way?
|
||
|
|
||
|
Without the comfortably familiar presence of the Soviets to hate and fear,
|
||
|
we can expect to see a sharp increase in over-rated bogeymen and virtual
|
||
|
states of emergency. This is already well under way. I think we can expect
|
||
|
our drifting and confused hardliners to burn the Reichstag repeatedly until
|
||
|
they have managed to extract from our induced alarm the sort of government
|
||
|
which makes them feel safe.
|
||
|
|
||
|
This process has been under way for some time. One sees it in the war on
|
||
|
terrorism, against which pursuit "no liberty is absolute," as Admiral
|
||
|
Turner put it. This, despite the fact that, during last year for which I
|
||
|
have a solid figure, 1987, only 7 Americans succumbed to terrorism.
|
||
|
|
||
|
You can also see it clearly under way in the War on Some Drugs. The Fourth
|
||
|
Amendment to the Constitution has largely disappeared in this civil war.
|
||
|
And among the people I spoke with, it seemed a common canon that drugs (by
|
||
|
which one does not mean Jim Beam, Marlboros, Folger's, or Halcion) were a
|
||
|
sufficient evil to merit the government's holding any more keys it felt the
|
||
|
need for.
|
||
|
|
||
|
One individual close to the committee said that at least some of the
|
||
|
aforementioned "spook wannabes" on the committee were "interested in weak
|
||
|
cellular encryption because they considered warrants not to be "practical"
|
||
|
when it came to pursuing drug dealers and other criminals using cellular
|
||
|
phones."
|
||
|
|
||
|
In a miscellaneously fearful America, where the people cry for shorter
|
||
|
chains and smaller cages, such privileges as secure personal communications
|
||
|
are increasingly regarded as expendable luxuries. As Whitfield Diffie put
|
||
|
it, "From the consistent way in which Americans seem to put security ahead
|
||
|
of freedom, I rather fear that most of them would prefer that all
|
||
|
electronic traffic was open to government decryption right now if they had
|
||
|
given it any thought."
|
||
|
|
||
|
In any event, while I found no proof of an NSA-FBI conspiracy to gut the
|
||
|
American cellular phone encryption standard, it seemed clear to me that
|
||
|
none was needed. The same results can be delivered by a cultural
|
||
|
"auto-conspiracy" between like-minded hardliners and cellular companies who
|
||
|
will care about privacy only when their customers do.
|
||
|
|
||
|
You don't have to be a hand-wringing libertarian like me to worry about the
|
||
|
domestic consequences of the NSA's encryption embargoes. They are also, as
|
||
|
stated previously, bad for business, unless, of course, the business of
|
||
|
America is no longer business but, as sometimes seems the case these days,
|
||
|
crime control.
|
||
|
|
||
|
As Ron Rivest (the "R" in RSA) said to me, "We have the largest information
|
||
|
based economy in the world. We have lots of reasons for wanting to protect
|
||
|
information, and weakening our encryption systems for the convenience of
|
||
|
law enforcement doesn't serve the national interest."
|
||
|
|
||
|
But by early March, it had become clear that this supposedly business-
|
||
|
oriented administration had made a clear choice to favor cops over commerce
|
||
|
even if the costs to the American economy were to become extremely high.
|
||
|
|
||
|
A sense of White House seriousness in this regard could be taken from their
|
||
|
response to the first serious effort by Congress to bring the NSA to task
|
||
|
for its encryption embargoes. Rep. Mel Levine (D-Calif.) proposed an
|
||
|
amendment to the Export Administration Act to transfer mass market software
|
||
|
controls to the Commerce Department, which would relax the rules. The
|
||
|
administration responded by saying that they would veto the entire bill if
|
||
|
the Levine amendment remained attached to it.
|
||
|
|
||
|
Even though it appeared the NSA had little to fear from Congress, the
|
||
|
Levine amendment may have been part of what placed the agency in a
|
||
|
bargaining mood for the first time. They entered into discussions with the
|
||
|
Software Publishers Association who, acting primarily on behalf of
|
||
|
Microsoft and Lotus, got to them to agree "in principle" to a streamlined
|
||
|
process for export licensing of encryption which might provide for more
|
||
|
robust standards than have been allowed previously.
|
||
|
|
||
|
But the negotiations between the NSA and the SPA were being conducted
|
||
|
behind closed doors, with the NSA-imposed understanding that any agreement
|
||
|
they reached would be set forth only in a "confidential" letter to
|
||
|
Congress. As in the case of the digital cellular standard, this would
|
||
|
eliminate the public scrutiny by cryptography researchers which anneals
|
||
|
genuinely hardened encryption.
|
||
|
|
||
|
Furthermore, some cryptographers worried that the encryption key lengths to
|
||
|
which the SPA appeared willing to restrict its member publishers might be
|
||
|
too short to provide much defense against the sorts of brute-force
|
||
|
decryption assaults which advances in processor technology will yield in
|
||
|
the fairly near future. And brute force has always been the NSA's strong
|
||
|
suit.
|
||
|
|
||
|
Whether accurate or not, the impression engendered by the style of the
|
||
|
NSA-SPA negotiations was not one of unassailable confidence. The lack of it
|
||
|
will operate to the continued advantage of foreign manufacturers in an era
|
||
|
when more and more institutions are going to be concerned about the privacy
|
||
|
of their digital communications.
|
||
|
|
||
|
But the economic damage which the NSA-SPA agreement might cause would be
|
||
|
minor compared to what would result from a startling new federal
|
||
|
initiative, the Department of Justice's proposed legislation on digital
|
||
|
telephony. If you're wondering what happened to the snooping provisions
|
||
|
which were in Senate Bill 266, look no further. They're back. And they're
|
||
|
bigger and bolder than ever.
|
||
|
|
||
|
They are contained in a sweeping proposal which have been made by the
|
||
|
Justice Department to the Senate Commerce Committee for legislation which
|
||
|
would "require providers of electronic communications services and private
|
||
|
branch exchanges to ensure that the Government's ability to lawfully
|
||
|
intercept communications is unimpeded by the introduction of advanced
|
||
|
digital telecommunications technology or any other telecommunications
|
||
|
technology."
|
||
|
|
||
|
Amazingly enough, this really means what it says: before any advance in
|
||
|
telecommunications technology can be deployed, the service providers and
|
||
|
manufacturers must assure the cops that they can tap into it. In other
|
||
|
words, development in digital communications technology must come to a
|
||
|
screeching halt until Justice can be assured that it will be able to grab
|
||
|
and examine data packets with the same facility they have long enjoyed with
|
||
|
analog wire-tapping.
|
||
|
|
||
|
It gets worse. The initiative also provides that, if requested by the
|
||
|
Attorney General, "any Commission proceeding concerning regulations,
|
||
|
standards or registrations issued or to be issued under authority of this
|
||
|
section shall be closed to the public." This essentially places the
|
||
|
Attorney General in a position to shut down any telecommunications advance
|
||
|
without benefit of public hearing.
|
||
|
|
||
|
When I first heard of the digital telephony proposal, I assumed it was a
|
||
|
kind of bargaining chip. I couldn't imagine it was serious. But it now
|
||
|
appears they are going to the mattresses on this one.
|
||
|
|
||
|
Taken together with NSA's continued assertion of its authority over
|
||
|
encryption, a pattern becomes clear. The government of the United States is
|
||
|
so determined to maintain law enforcement's traditional wire-tapping
|
||
|
abilities in the digital age that it is willing to fundamentally cripple
|
||
|
the American economy to do so. This may sound hyperbolic, but I believe it
|
||
|
is not.
|
||
|
|
||
|
The greatest technology advantage this country presently enjoys is in the
|
||
|
areas of software and telecommunications. Furthermore, thanks in large part
|
||
|
to the Internet, much of America is already wired for bytes, as significant
|
||
|
an economic edge in the Information Age as the existence of a railroad
|
||
|
system was for England one hundred fifty years ago.
|
||
|
|
||
|
If we continue to permit the NSA to cripple our software and further convey
|
||
|
to the Department of Justice the right to stop development the Net without
|
||
|
public input, we are sacrificing both our economic future and our
|
||
|
liberties. And all in the name of combating terrorism and drugs.
|
||
|
|
||
|
This has now gone far enough. I have always been inclined to view the
|
||
|
American government as pretty benign as such creatures go. I am generally
|
||
|
the least paranoid person I know, but there is something scary about a
|
||
|
government which cares more about putting its nose in your business than it
|
||
|
does about keeping that business healthy.
|
||
|
|
||
|
As I write this, a new ad hoc working group on digital privacy, coordinated
|
||
|
by the Electronic Frontier Foundation, is scrambling to meet the challenge.
|
||
|
The group includes representatives from organizations like AT&T, the
|
||
|
Regional Bells, IBM, Microsoft, the Electronic Mail Association and about
|
||
|
thirty other companies and public interest groups.
|
||
|
|
||
|
Under the direction of Jerry Berman, EFF's Washington office director, and
|
||
|
John Podesta, a capable lobbyist and privacy specialist who helped draft
|
||
|
the ECPA, this group intends to stop the provisions in digital telephony
|
||
|
proposal from entering the statute books.
|
||
|
|
||
|
We also intend to work with federal law enforcement officials to address
|
||
|
their legitimate concerns. We don't dispute their need to conduct some
|
||
|
electronic surveillance, but we believe this can be assured by more
|
||
|
restrained methods than they're proposing.
|
||
|
|
||
|
We are also preparing a thorough examination of the NSA's encryption export
|
||
|
policies and looking into the constitutional implications of those
|
||
|
policies. Rather than negotiating behind closed doors, as the SPA has been
|
||
|
attempting to do, America's digital industries have a strong self-interest
|
||
|
in banding together to bring the NSA's procedures and objectives into the
|
||
|
sunlight of public discussion.
|
||
|
|
||
|
Finally, we are hoping to open a dialog with the NSA. We need to develop a
|
||
|
better understanding of their perception of the world and its threats. Who
|
||
|
are they guarding us against and how does encryption fit into that
|
||
|
endeavor? Despite our opposition to their policies on encryption export, we
|
||
|
assume that NSA operations have some merit. But we would like to be able to
|
||
|
rationally balance the merits against the costs.
|
||
|
|
||
|
We strongly encourage any organization which might have a stake in the
|
||
|
future of digital communication to become involved. Letters expressing your
|
||
|
concern may be addressed to: Sen. Ernest Hollings, Chairman, Senate
|
||
|
Commerce Committee, U.S. Senate, Washington, DC and to Don Edwards,
|
||
|
Chairman, Subcommitee on Constitutional Rights, House Judiciary Committee.
|
||
|
(I would appreciate hearing those concerns myself. Feel free to copy me
|
||
|
with those letters at my physical address, c/o P.O. Box 1009, Pinedale, WY
|
||
|
82941 or in Cyberspace, barlow@eff.org.)
|
||
|
|
||
|
If your organization is interested in becoming part of the digital privacy
|
||
|
working group, please contact EFF's Washington office at: 666 Pennsylvania
|
||
|
Avenue SE, Suite 303, Washington, DC 20003, 202/544- 9237, FAX:
|
||
|
202/547-5481. EFF also encourages individuals interested in these issues to
|
||
|
join the organization. Contact us at: Electronic Frontier Foundation, 155
|
||
|
Second Street, Cambridge, MA 02141,617/864- 0665, eff-request@eff.org.
|
||
|
|
||
|
The legal right to express oneself is meaningless if there is no secure
|
||
|
medium through which that expression may travel. By the same token, the
|
||
|
right to hold certain unpopular opinions is forfeit unless one can discuss
|
||
|
those opinions with others of like mind without the government listening in.
|
||
|
|
||
|
Even if you trust the current American government, as I am still largely
|
||
|
inclined to, there is a kind of corrupting power in the ability to create
|
||
|
public policy in secret while assuring that the public will have little
|
||
|
secrecy of its own.
|
||
|
|
||
|
In its secrecy and technological might, the NSA already occupies a very
|
||
|
powerful position. And conveying to the Department of Justice what amounts
|
||
|
to licensing authority for all communications technology would give it a
|
||
|
control of information distribution rarely asserted over English-speaking
|
||
|
people since Oliver Cromwell's Star Chamber Proceedings.
|
||
|
|
||
|
Are there threats, foreign or domestic, which are sufficiently grave to
|
||
|
merit the conveyance of such vast legal and technological might? And even
|
||
|
if the NSA and FBI may be trusted with such power today, will they always
|
||
|
be trustworthy? Will we be able to do anything about it if they aren't?
|
||
|
|
||
|
Senator Frank Church said of NSA technology in 1975 words which are more
|
||
|
urgent today:
|
||
|
|
||
|
"That capability at any time could be turned around on the American people
|
||
|
and no American would have any privacy left. There would be no place to
|
||
|
hide. If this government ever became a tyranny, the technological capacity
|
||
|
that the intelligence community has given the government could enable it to
|
||
|
impose total tyranny. There would be no way to fight back, because the most
|
||
|
careful effort to combine together in resistance to the government, no
|
||
|
matter how privately it was done, is within the reach of the government to
|
||
|
know. Such is the capacity of this technology."
|
||
|
|
||
|
San Francisco, California
|
||
|
May, 1992
|
||
|
|
||
|
Reprinted from Communications of the ACM, June 1992
|
||
|
by permission of the author
|
||
|
|
||
|
-==--==--==-<>-==--==--==-
|
||
|
|
||
|
from THE TAO TE CHIP
|
||
|
by Jeffrey Sorrenson
|
||
|
sorensen@ecse.rpi.edu
|
||
|
(with help from Steven Mitchell and Lao Tzu)
|
||
|
|
||
|
2
|
||
|
|
||
|
When users see one GUI as beautiful,
|
||
|
other user interfaces become ugly.
|
||
|
When users see some programs as winners,
|
||
|
other programs become lossage.
|
||
|
|
||
|
Pointers and NULLs reference each other.
|
||
|
High level and assembler depend on each other.
|
||
|
Double and float cast to each other.
|
||
|
High-endian and low-endian define each other.
|
||
|
While and until follow each other.
|
||
|
|
||
|
Therefore the Guru
|
||
|
programs without doing anything
|
||
|
and teaches without saying anything.
|
||
|
Warnings arise and he lets them come;
|
||
|
processes are swapped and he lets them go.
|
||
|
He has but doesn't possess,
|
||
|
acts but doesn't expect.
|
||
|
When his work is done, he deletes it.
|
||
|
That is why it lasts forever.
|
||
|
|
||
|
80
|
||
|
|
||
|
If a system is administered wisely,
|
||
|
its users will be content.
|
||
|
They enjoy hacking their code
|
||
|
and don't waste time implementing
|
||
|
labor-saving shell scripts.
|
||
|
Since they dearly love their accounts,
|
||
|
they aren't interested in other machines.
|
||
|
There may be telnet, rlogin, and ftp,
|
||
|
but these don't access any hosts.
|
||
|
There may be an arsenal of cracks and malware,
|
||
|
but nobody ever uses them.
|
||
|
People enjoy reading their mail,
|
||
|
take pleasure in being with their newsgroups,
|
||
|
spend weekends working at their terminals,
|
||
|
delight in the doings at the site.
|
||
|
And even though the next system is so close
|
||
|
that users can hear its key clicks and biff beeps,
|
||
|
they are content to die of old age
|
||
|
without ever having gone to see it.
|
||
|
|
||
|
-==--==--==-<>-==--==--==-
|
||
|
|
||
|
MEMBERSHIP IN THE ELECTRONIC FRONTIER FOUNDATION
|
||
|
If you support our goals and our work, you can show that support by
|
||
|
becoming a member now. Members receive our quarterly newsletter,
|
||
|
EFFECTOR, our bi-weekly electronic newsletter, EFFector Online (if you
|
||
|
have an electronic address that can be reached through the Net), and
|
||
|
special releases and other notices on our activities. But because we
|
||
|
believe that support should be freely given, you can receive these
|
||
|
things even if you do not elect to become a member.
|
||
|
|
||
|
Our memberships are $20.00 per year for students, $40.00 per year for
|
||
|
regular members. You may, of course, donate more if you wish.
|
||
|
|
||
|
Our privacy policy: The Electronic Frontier Foundation will never, under
|
||
|
any circumstances, sell any part of its membership list. We will, from
|
||
|
time to time, share this list with other non-profit organizations whose
|
||
|
work we determine to be in line with our goals. If you do not grant
|
||
|
explicit permission, we assume that you do not wish your membership
|
||
|
disclosed to any group for any reason.
|
||
|
|
||
|
---------------- EFF MEMBERSHIP FORM ---------------
|
||
|
|
||
|
Mail to: The Electronic Frontier Foundation, Inc.
|
||
|
155 Second St. #31
|
||
|
Cambridge, MA 02141
|
||
|
|
||
|
I wish to become a member of the EFF I enclose:$__________
|
||
|
$20.00 (student or low income membership)
|
||
|
$40.00 (regular membership)
|
||
|
$100.00(Corporate or company membership.
|
||
|
This allows any organization to
|
||
|
become a member of EFF. It allows
|
||
|
such an organization, if it wishes
|
||
|
to designate up to five individuals
|
||
|
within the organization as members.)
|
||
|
|
||
|
| I enclose an additional donation of $___________
|
||
|
|
||
|
Name:______________________________________________________
|
||
|
|
||
|
Organization:______________________________________________
|
||
|
|
||
|
Address: __________________________________________________
|
||
|
|
||
|
City or Town: _____________________________________________
|
||
|
|
||
|
State:_______ Zip:________ Phone:( )_____________(optional)
|
||
|
|
||
|
FAX:( )____________________(optional)
|
||
|
|
||
|
Email address: ______________________________
|
||
|
|
||
|
I enclose a check [ ] .
|
||
|
Please charge my membership in the amount of $_____________
|
||
|
to my Mastercard [ ] Visa [ ] American Express [ ]
|
||
|
|
||
|
Number:____________________________________________________
|
||
|
|
||
|
Expiration date: ____________
|
||
|
|
||
|
Signature: ________________________________________________
|
||
|
|
||
|
Date:______________________
|
||
|
|
||
|
I hereby grant permission to the EFF to share my name with
|
||
|
other non-profit groups from time to time as it deems
|
||
|
appropriate [ ] .
|
||
|
Initials:___________________________
|
||
|
|
||
|
Your membership/donation is fully tax deductible.
|
||
|
=====================================================================
|
||
|
EFFector Online is published by
|
||
|
The Electronic Frontier Foundation
|
||
|
155 Second Street, Cambridge MA 02141
|
||
|
Phone: +1 617 864 0665 FAX: +1 617 864 0866
|
||
|
Internet Address: eff@eff.org
|
||
|
Reproduction of this publication in electronic media is encouraged
|
||
|
To reproduce signed articles individually,
|
||
|
please contact the authors for their express permission.
|
||
|
=====================================================================
|
||
|
This newsletter is printed on 100% recycled electrons.
|
||
|
|
||
|
Downloaded From P-80 International Information Systems 304-744-2253
|