2970 lines
148 KiB
Plaintext
2970 lines
148 KiB
Plaintext
|
|
||
|
THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING / Published Periodically
|
||
|
======================================================================
|
||
|
ISSN 1074-3111 Volume One, Issue Two April 4, 1994
|
||
|
======================================================================
|
||
|
|
||
|
Editor-in-Chief: Scott Davis (dfox@fennec.com)
|
||
|
Technology Editor: Max Mednick (kahuna@bga.com)
|
||
|
Consipracy Editor: Gordon Fagan (dolphin@bga.com)
|
||
|
Network Security: George Phillips (ice9@bga.com)
|
||
|
|
||
|
** ftp site: etext.archive.umich.edu /pub/Zines/JAUC
|
||
|
|
||
|
U.S. Mail:
|
||
|
The Journal Of American Underground Computing
|
||
|
10111 N. Lamar #25
|
||
|
Austin, Texas 78753-3601
|
||
|
|
||
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
|
|
||
|
To Subscribe to "TJOAUC", send mail to: sub@fennec.com
|
||
|
All questions/comments about this publication to: comments@fennec.com
|
||
|
Send all articles/info that you want published to: submit@fennec.com
|
||
|
Commercial Registration for Profitable Media: form1@fennec.com
|
||
|
|
||
|
"The underground press serves as the only effective counter to a growing
|
||
|
power, and more sophisticated techniques used by establishment mass media
|
||
|
to falsify, misrepresent, misquote, rule out of consideration as a priori
|
||
|
ridiculous, or simply ignore and blot out of existence: data, books,
|
||
|
discoveries that they consider prejudicial to establishment interest..."
|
||
|
|
||
|
(William S. Burroughs and Daniel Odier, "The Job", Viking, New York, 1989)
|
||
|
|
||
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
|
|
||
|
Contents Copyright (C) 1994 The Journal Of American Underground Computing
|
||
|
and/or the author of the articles presented herein. All rights reserved.
|
||
|
Nothing may be reproduced in whole or in part without written permission
|
||
|
of the Editor-In-Chief and/or the author of the article. This publication
|
||
|
is made available quarterly to the amateur computer hobbyist free of
|
||
|
charge. Any commercial usage (electronic or otherwise) is strictly
|
||
|
prohibited without prior consent of the Editor, and is in violation of
|
||
|
applicable US Copyright laws. To subscribe, send email to sub@fennec.com
|
||
|
|
||
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
|
|
||
|
DISCLAIMER AND NOTICE TO DISTRIBUTORS -
|
||
|
|
||
|
NOTE: This electronic publication is to be distributed free of charge
|
||
|
without modifications to anyone who wishes to have a copy. Under NO
|
||
|
circumstances is any issue of this publication, in part or in whole,
|
||
|
to be sold for money or services, nor is it to be packaged with other
|
||
|
computer software, including, but not limited to CD Rom disks, without
|
||
|
the express written or verbal consent of the author and/or editor.
|
||
|
To obtain permission to distribute this publication under any of the
|
||
|
certain circumstances stated above, please contact the editor at one of
|
||
|
the addresses above. If you have intentions of publishing this journal
|
||
|
in any of the ways described above, or you are in doubt about whether or
|
||
|
not your intentions conflict with the restrictions, please contact the
|
||
|
editor. FOR A COPY OF THE REGISTRATION FORM, MAIL - form1@fennec.com
|
||
|
This publication is provided without charge to anyone who wants it.
|
||
|
This includes, but is not limited to lawyers, government officials,
|
||
|
cops, feds, hackers, social deviants, and computer hobbyists. If anyone
|
||
|
asks for a copy, please provide them with one, or mail the subscription
|
||
|
list so that you may be added.
|
||
|
|
||
|
The articles and information printed herein are the property of the author
|
||
|
and / or The Journal Of American Underground Computing. An electronic mail
|
||
|
address of the author will be provided when made available to us so that you
|
||
|
can contact the author with your comments. No article in this publication
|
||
|
can be reprinted without the permission of the author / editor. Any attempt
|
||
|
to do so will be in direct violation of United States Copyright laws.
|
||
|
Any attempt to sell this publication in part or in whole, on CD Rom or
|
||
|
while packaged with any other software bundle without the express consent
|
||
|
of the editor is also a direct violation of United States Copyright laws.
|
||
|
|
||
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
|
|
||
|
THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING - Volume 1, Issue 2
|
||
|
|
||
|
TABLE OF CONTENTS
|
||
|
|
||
|
1) A note from the Editor Scott Davis
|
||
|
2) Comments from our readers Readers
|
||
|
3) Paul and Karla Hit The Net Wired Online
|
||
|
4) AT&T Cellular Privacy Systems David Arneke
|
||
|
5) Clipper / From "The Guardian" Mike Holderness
|
||
|
6) Privacy: Notes from Cyberspace Various
|
||
|
7) Kidnapped By The State / Internet Not Safe Matthew Mihaly
|
||
|
8) Legion Of Doom - Internet T-Shirts Chris Goggans
|
||
|
9) Public vs. Mass Media: The Case of The Internet Jim O'Loughlin
|
||
|
10) Bruce Sterling's Comments at CFP '94 Bruce Sterling
|
||
|
11) Book Review - Doing Business On The Internet Steve Brock
|
||
|
12) Generic Usenet Flame Form [Humor]
|
||
|
13) McDonnell Douglas Warranty Card [Humor]
|
||
|
14) Social Contract Between Us and Them [Humor]
|
||
|
15) Electronic Petition Against Clipper Editors
|
||
|
16) Form letter againt Clipper for the President Editors
|
||
|
17) Official Government press release: Clipper Editors
|
||
|
18) ISDN Information (RBOCS) Max Mednick
|
||
|
19) A catalog of national ISDN solutions Max Mednick
|
||
|
20) Sprint expands presence in China News
|
||
|
21) SSN FAQ / Social Security Number info Chris Hibbert
|
||
|
22) The Clipper Chip is your friend Bob Davis (WSJ)
|
||
|
|
||
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
|
|
||
|
A NOTE FROM THE EDITOR
|
||
|
|
||
|
It is my pleasure to welcome aboard to the editing staff Mr. Max Mednick
|
||
|
as the Technology Editor. Max is a technical trainer and network support
|
||
|
specialist for a Fortune 500 company, and has several years of experience
|
||
|
in the field of networking and communications. Everyone send him a message
|
||
|
welcoming him. (kahuna@bga.com). Also, we are welcoming Carl Guderian
|
||
|
as Director of Information Systems. He is currently employed by big-brother.
|
||
|
His email address is bjacques@cypher.com
|
||
|
|
||
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
|
|
||
|
COMMENTS FROM OUR READERS
|
||
|
|
||
|
|
||
|
From: jim@rsa.com (Jim Bidzos)
|
||
|
To: comments@fennec.com
|
||
|
Subject: TJOAUC-1.1
|
||
|
|
||
|
Great! I'm honored to have contributed to TJOAUC! Thanks, and keep up
|
||
|
the good work.
|
||
|
|
||
|
=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
||
|
|
||
|
From: Anonymous@some.government.agency
|
||
|
To: comments@fennec.com
|
||
|
Subject: Thanks!
|
||
|
|
||
|
I checked your archived 'Journal of American Underground Computing'
|
||
|
at extext.archive.umich.edu.
|
||
|
|
||
|
I found the quality and content to be high.
|
||
|
|
||
|
If you could also subscribe me, I would be grateful. Sorry about
|
||
|
the skepticism (with reservations to Mark Lanes allegations that
|
||
|
the CIA murdered JFK).
|
||
|
|
||
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
|
|
||
|
PAUL AND KARLA HIT THE NET
|
||
|
|
||
|
Posted By Dennis R. Hilton (drhilton@kaiwan.com)
|
||
|
Copyright 1993,4 Wired Ventures, Ltd. All Rights Reserved
|
||
|
For complete copyright information, please see the end of this file
|
||
|
|
||
|
WIRED 2.04
|
||
|
Electric Word
|
||
|
*************
|
||
|
|
||
|
Recent events in Canada have proven once again that - for better or worse -
|
||
|
the information genie has escaped into cyberspace and can't be put back in
|
||
|
the bottle. When an Ontario judge issued an order barring media coverage of
|
||
|
a sensationalized murder trial, Canadians used the Net to break the ban.
|
||
|
|
||
|
The case concerns Paul "Bernardo" Teale and his wife, Karla Homolka Teale,
|
||
|
who were each charged in the grisly murders of two teenagers. Paul Teale
|
||
|
now stands accused of 48 sex-related charges, while Karla Homolka entered
|
||
|
into a plea bargain: She pleaded guilty to manslaughter and is expected to
|
||
|
testify against Paul.
|
||
|
|
||
|
The nonstop press coverage prompted Paul Teale's lawyer to ask for a media
|
||
|
gag order until the conclusion of his trial, on the grounds that it would
|
||
|
be impossible to impanel an impartial jury. Despite legal intervention by
|
||
|
several major Canadian media outlets, the court imposed a ban on the
|
||
|
publication of the details of the crimes.
|
||
|
|
||
|
At first the ban had its desired effect. When the US television show
|
||
|
A Current Affair featured the case, it was banned in Canada, and Canadian
|
||
|
cable stations blacked out CNN coverage of the case.
|
||
|
|
||
|
With the conventional media halted, the infosphere took over. First, two
|
||
|
BBSes in Toronto began to post daily details of the trial. In August, a
|
||
|
group of McGill University students created a Usenet group, alt.fan.karla-
|
||
|
homolka, to discuss the case. By December, after phone calls by law-abiding
|
||
|
Net surfers to systems managers, the Usenet group had been banned by
|
||
|
systems managers and university officials at sites all over Canada.
|
||
|
|
||
|
After the banning of alt.fan.karla-homolka, two new Usenet groups were
|
||
|
created: alt.pub-ban and alt.pub-ban.homolka.
|
||
|
|
||
|
Some Net users theorized that if they cross-posted all over the Net, the
|
||
|
Royal Canadian Mounted Police would be in the impossible position of
|
||
|
scrambling through cyberspace plugging leaks. One Net dweller jokingly
|
||
|
proposed the ideal tactic: "The solution is obvious. Take the discussion to
|
||
|
rec.sport.hockey. You silly Canadians would never ban that group."
|
||
|
|
||
|
Other curious Canadians searched the pay-per-view news and magazine
|
||
|
databases on Nexis and CompuServe for stories published by US newspapers.
|
||
|
Most of the banned articles were re-posted verbatim to alt.true-crime, a
|
||
|
group overlooked by the Mounties.
|
||
|
|
||
|
As the infosphere grows to encompass the planet, the question is no longer
|
||
|
whether certain information is too sensitive to be made public. The real
|
||
|
question becomes whether it is even possible to keep certain information
|
||
|
out of cyberspace. In the Teale-Homolka case, the ban was not so much
|
||
|
broken as rendered irrelevant by the voracious online community: It is
|
||
|
estimated that one in four Canadians knows the banned facts.
|
||
|
|
||
|
Anita Susan Brenner and B. Metson
|
||
|
|
||
|
|
||
|
%%%%%%%%%%%%%%%%%%%% WIRED Online Copyright Notice %%%%%%%%%%%%%%%%%%%%%%
|
||
|
|
||
|
Copyright 1993,4 Wired Ventures, Ltd. All rights reserved.
|
||
|
|
||
|
This article may be redistributed provided that the article and this
|
||
|
notice remain intact. This article may not under any circumstances
|
||
|
be resold or redistributed for compensation of any kind without prior
|
||
|
written permission from Wired Ventures, Ltd.
|
||
|
If you have any questions about these terms, or would like information
|
||
|
about licensing materials from WIRED Online, please contact us via
|
||
|
telephone (+1 (415) 904 0660) or email (info@wired.com).
|
||
|
|
||
|
WIRED and WIRED Online are trademarks of Wired Ventures, Ltd.
|
||
|
|
||
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
|
|
||
|
AT&T CELLULAR PRIVACY SYSTEMS
|
||
|
AMERITECH CELLULAR PRIVACY SERVICE USES AT&T TECHNOLOGY
|
||
|
|
||
|
By David R. Arneke (darneke@attmail.com)
|
||
|
|
||
|
AT&T SECURE COMMUNICATIONS SYSTEMS NEWS RELEASE
|
||
|
Reprinted with permission
|
||
|
|
||
|
GREENSBORO, N.C. -- Ameritech Cellular Services in Chicago has
|
||
|
become the first cellular telephone system in the country to offer
|
||
|
voice privacy service using the AT&T Advanced Cellular Privacy System.
|
||
|
|
||
|
Ameritech launched its Enhanced Voice Privacy service in Chicago
|
||
|
this month.
|
||
|
|
||
|
"This technology adds to the productivity and value that
|
||
|
Ameritech cellular service provides to its customers," said Thomas A.
|
||
|
Brooks, AT&T Paradyne senior vice president, Secure Communications
|
||
|
Systems.
|
||
|
|
||
|
"And, by helping the carrier provide value to the cus- tomer,
|
||
|
AT&T cellular privacy technology adds value to the carrier as well."
|
||
|
|
||
|
The AT&T technology scrambles the cellular telephone's
|
||
|
over-the-air signal. The signal is descrambled at Ameritech's
|
||
|
cellular switch, transmitting a conventional phone signal to the
|
||
|
recipient.
|
||
|
|
||
|
If the scrambled over-the-air signal is intercepted, the
|
||
|
eavesdropper will hear only a chirping sound. AT&T's advanced privacy
|
||
|
technology renders the over-the-air signal unintelligible.
|
||
|
|
||
|
The system already is in wide use in Japan in the cellular system
|
||
|
of one of the two major Japanese telephone companies.
|
||
|
|
||
|
The AT&T Cellular Privacy System offers cellular users a variety
|
||
|
of benefits.
|
||
|
|
||
|
-- Its technology is small enough and light enough to be
|
||
|
embeddable in today's small, portable phones.
|
||
|
|
||
|
-- The system features an unmatched combination of high voice
|
||
|
quality and an advanced level of privacy.
|
||
|
|
||
|
-- It is applicable to all three types of cellular telephones --
|
||
|
portable, transportable ("bag phones") and mobile (car phones).
|
||
|
|
||
|
The system has two components. The AT&T privacy unit attaches to
|
||
|
the phone and scrambles the phone's signal. Voice privacy modules are
|
||
|
available for several brands of cellular telephones, among them AT&T
|
||
|
models, including the AT&T Privacy-Capable Portable Telephone 9000;
|
||
|
the Audiovox 3200 series; Mitsubishi models using the Model 1200
|
||
|
transceiver; the Motorola 2600; the NEC 3800B and 4800; the Oki 800
|
||
|
series; and the Toshiba 3200 series.
|
||
|
|
||
|
Modules for other brands and models are in development.
|
||
|
|
||
|
The Mobile Telephone Office Switch (MTSO) unit is installed at
|
||
|
the cellular carrier's switch and descrambles the signal.
|
||
|
|
||
|
Because the privacy system scrambles only the over-the-air
|
||
|
portion of the call, no matching unit or special equipment is required
|
||
|
at the receiving phone.
|
||
|
|
||
|
The AT&T Paradyne Cellular Privacy System was developed by AT&T
|
||
|
Secure Communications Systems, a world leader in the design,
|
||
|
manufacture and integration of encryption and privacy products. It is
|
||
|
a primary supplier of secure products to the governments of the United
|
||
|
States and other nations as well as corporations around the world.
|
||
|
|
||
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
|
|
||
|
CLIPPER (From The Guardian)
|
||
|
|
||
|
By Mike Holderness (mikeh@gn.apc.org)
|
||
|
|
||
|
This piece on the Clipper controversy appeared in the London, UK
|
||
|
_Guardian_ on 3 March 1994. My apologies for the delay in circulating
|
||
|
this to all of you who helped with advice and comments or expressed
|
||
|
an interest; and to a couple people whose attributions got cut for space.
|
||
|
|
||
|
Some Netizens may find the piece a bit wishy-washy. Better that than
|
||
|
the _Independent_'s coverage, which was full of unsubstantiated claims --
|
||
|
if they _know_ the NSA has a back-door, I wish they'd publish
|
||
|
the evidence...
|
||
|
|
||
|
I _know_ the description of the technology ended up inexact. Anyone
|
||
|
who can give an exact description in fewer words gets a bottle of
|
||
|
champagne next time you're in London...
|
||
|
|
||
|
If you re-distribute this, please do so in its entirety and un-cut.
|
||
|
Contact me to discuss terms before you publish it on paper: I have
|
||
|
a freelance living to earn and a landlord to feed.
|
||
|
|
||
|
(C)opyright 1994 Mike Holderness
|
||
|
mikeh@gn.apc.org
|
||
|
London, UK
|
||
|
|
||
|
HED: Are these men a threat to freedom?
|
||
|
PIC: (4-column): Gore & Clinton
|
||
|
|
||
|
YOUR COMPANY is, at last, connected to the Internet. You can swap memos
|
||
|
with branch offices around the world within minutes. But you naturally
|
||
|
don't want your competitors, or their governments, siphoning the details
|
||
|
of your bid for that dam contract in the Philippines out of the net.
|
||
|
What do you do?
|
||
|
|
||
|
On the other hand, when you receive an electronic message announcing a
|
||
|
call for tenders, how do you know it's genuine? You've heard that it's
|
||
|
possible to fake electronic mail, and you're worried about all the
|
||
|
possibilities for creative industrial espionage which this opens up.
|
||
|
|
||
|
Then again, you might be a Cabinet minister, setting up a meeting with
|
||
|
your boyfriend on the mobile phone. Wouldn't it be good to know that
|
||
|
no-one could tap the message?
|
||
|
|
||
|
The answer to all these problems lies in encryption technology. The
|
||
|
solution the US government proposed earlier this month, however, has
|
||
|
generated a furious row in the "on-line community" about the government
|
||
|
interfering in citizens' right to communicate in private. The disturbing
|
||
|
implications for people outside the US have gone largely unremarked.
|
||
|
|
||
|
Computer programs that can do practically unbreakable encryption are
|
||
|
available to the public in the US and elsewhere. One, named PGP for
|
||
|
Pretty Good Privacy, is increasingly being used to authenticate
|
||
|
electronic messages (Computer Guardian, Nov ?? 1993). It can encrypt the
|
||
|
whole message, or send the main text "in clear", followed by an
|
||
|
encrypted block containing a mathematical "fingerprint" of the message
|
||
|
and the sender's name and address. The program can thus verify whether a
|
||
|
signature belongs to the purported sender and whether the message
|
||
|
arrives as it left.
|
||
|
|
||
|
Encryption has long worried law-enforcement agencies. What if drug- dealers
|
||
|
and terrorists start using unbreakable encryption? The US government's
|
||
|
Key Escrow Encryption system -- commonly known by its working title,
|
||
|
Clipper -- is its answer.
|
||
|
|
||
|
Clipper uses an encryption chip suitable for building into a mobile
|
||
|
phone or a modem. Its method of encryption, developed by the US National
|
||
|
Security Agency (NSA), depends on "keys". These are codes which are used
|
||
|
mathematically to mangle the text or speech. The receiver can only get
|
||
|
the original back out if they have the key and can use it to un-mangle
|
||
|
-- decrypt -- the message.
|
||
|
|
||
|
PGP depends on a "public-key" system. Users sending signed messages
|
||
|
encrypt the signature with keys known only to them. They also issue
|
||
|
public keys. These are mathematically derived from the private key, and
|
||
|
allow anyone to verify the signature. If someone sends them a message
|
||
|
encrypted with their public key, only the private key will extract it.
|
||
|
By contrast, each Clipper chip will have an encryption key built in.
|
||
|
When the chip is manufactured, two parts of the key will be lodged with
|
||
|
two separate US government agencies. (In legal jargon, this is like
|
||
|
"holding the keys in escrow".) A secret "super-key" allows law
|
||
|
enforcement agencies to retrieve the serial number of the chip used on
|
||
|
the link they're tapping.
|
||
|
|
||
|
Under US guidelines released on February 4, if a law enforcement agency
|
||
|
wants to eavesdrop on encrypted communications, it should send details
|
||
|
of a search warrant to the agencies holding the key components.
|
||
|
|
||
|
This is a red rag to the inhabitants of Internet discussion forums,
|
||
|
"the world's largest functioning anarchy". There, discussions of the
|
||
|
right (under the First Amendment to the Constitution) to unrestricted
|
||
|
free speech can and do slip effortlessly into the belief that, as one
|
||
|
participant put it, "The People must be allowed to discuss anything,
|
||
|
including revolution."
|
||
|
|
||
|
According to Brian Yoder, president of California company Networxx,
|
||
|
"The US Constitution doesn't grant the government the power to maintain
|
||
|
this kind of surveillance capability over the population. Period. The
|
||
|
assumption is that anything that enhances the ability of the police to
|
||
|
catch criminals is OK, but that is not what the Constitution says, and
|
||
|
that's not the kind of country I want to live in."
|
||
|
|
||
|
Cryptology specialist Dr Dorothy Denning at Georgetown University in
|
||
|
Washington DC, who was part of a team reviewing the NSA's design
|
||
|
process, points out that Clipper "will not make it any easier to tap
|
||
|
phones, let alone computer networks. All it will do is make it
|
||
|
technically possible to decrypt communications that are encrypted with
|
||
|
the standard, assuming the communications are not super-encrypted with
|
||
|
something else. Law enforcers still need to get a court order."
|
||
|
|
||
|
But who trusts the NSA? The Clipper design is secret. Many assume that
|
||
|
the Agency has built in a "trap-door" allowing it to break encryption
|
||
|
without the keys.
|
||
|
|
||
|
No-one has proposed making non-Clipper encryption illegal, but the US
|
||
|
government clearly hopes to establish it as an industry standard. For
|
||
|
example, while it's usually illegal to export any form of encryption
|
||
|
technology from the US, it will be legal to export Clipper.
|
||
|
|
||
|
Non-US companies using it to protect their communications will have to
|
||
|
live with the uneasy knowledge that the NSA could be listening in -- and
|
||
|
the NSA, like its UK sibling organisation GCHQ in Cheltenham, has a long
|
||
|
history of intercepting foreign commercial messages for the benefit of
|
||
|
home companies. (GCHQ declined to say whether it had been involved in
|
||
|
any discussions over Clipper.)
|
||
|
|
||
|
The protests have started. A petition organised by Computer
|
||
|
Professionals for Social Responsibility against Clipper, and in favour
|
||
|
of a Bill to permit export of competing encryption systems, gathered
|
||
|
more than 20,000 electronic signatures in its first two weeks. Wired
|
||
|
magazine has proclaimed that ``This is a pivotal moment in history'',
|
||
|
accusing ``the Clinton-Gore administration'' of ``attempting a stealth
|
||
|
strike on our rights''. It has asked readers to sign the CPSR petition
|
||
|
against Clipper and to ``call or write your Congressional
|
||
|
representatives and let them know how you feel''.
|
||
|
|
||
|
Encryption and authentication are important for much more than the
|
||
|
privacy of the frequently obscure or banal discussions on the Net.
|
||
|
Medical and financial records are now commonly held on computers, and a
|
||
|
growing proportion of business transactions take place on line.
|
||
|
Cyberspace is where your money is.
|
||
|
|
||
|
For private communications, Emma Nicholson MP takes a relaxed view: "In
|
||
|
communicating, we should start from a belief that everyone listens to
|
||
|
everything. Gossip is what makes the world go round. I have very few
|
||
|
secrets. I would be deeply concerned if a device were marketed that
|
||
|
could stop interception -- I would support the FBI completely."
|
||
|
|
||
|
Computer-law barrister Alistair Kelman, however, believes that any
|
||
|
attempt to enforce the Clipper chip as a worldwide standard would meet
|
||
|
stiff opposition. The European Commission could be expected to object
|
||
|
that it fell foul of Treaty of Rome provisions against misuse of a
|
||
|
dominant position. "If you want to have a world standard for encryption,
|
||
|
fine," Kelman said, but the EC could respond: "let's all get together
|
||
|
and settle on something that meets our requirements as well."
|
||
|
|
||
|
<ufpoints>
|
||
|
|
||
|
Wired articles on Clipper can be obtained via the Internet by putting
|
||
|
the following three lines into the body of an electronic mail message
|
||
|
addressed to infobot@wired.com:
|
||
|
send clipper/privacy.meeks
|
||
|
send clipper/privacy.barlow
|
||
|
end
|
||
|
|
||
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
|
|
||
|
PRIVACY: NOTES FROM CYBERSPACE
|
||
|
|
||
|
These are just little tidbits picked up from here and there...feel free to
|
||
|
comment on them. -Editors
|
||
|
|
||
|
|
||
|
NOTES FROM CYBERSPACE - ARTICLE 1
|
||
|
By Arthur Entlich (ua107@freenet.victoria.bc.ca)
|
||
|
Subject: Privacy in Canada
|
||
|
|
||
|
Over the last several years there has been a feeding frenzy in the private
|
||
|
sector toward collection of private information. Currently, to my know-
|
||
|
ledge there is only one province in Canada that has legislation on the
|
||
|
books which protects individual's private information within the
|
||
|
private sector, and that is Quebec, which may not be a province of
|
||
|
Canada for long, if things continue.
|
||
|
|
||
|
Anyway, recently a few provinces have developed Offices of Privacy and
|
||
|
Freedom of Information (Ontario and British Columbia) both of which have
|
||
|
"left of center" parties in power. However, these government offices
|
||
|
only regulate the issues of freedom of information and privacy within the
|
||
|
public sector (governmental agencies). These is also a similar
|
||
|
office on a federal basis. Ther eis much to be done here to roll
|
||
|
back the amount and connectivity of information in the public and
|
||
|
private sector. For instance, our SIN number (Social Insurance Number)
|
||
|
which was legislated originally for only about 6 programs, all relating
|
||
|
to employment, has been expanded to uses such as banking, (required by law
|
||
|
now) medical plans, etc, Also, the private sector has a field day with
|
||
|
this number and it has basically become a national identity number.
|
||
|
|
||
|
Some changes are occurring, such as in British Columbia, we were issued
|
||
|
a separate and unique medical plan number after many complaints, however
|
||
|
on several occasions I have by phone or in person requested information
|
||
|
about my coverage and claimed I did not have my medical number handy,
|
||
|
and was asked for my SIN, at which point they crossreferenced to my
|
||
|
medical number, so obviously they are still connected internally.
|
||
|
|
||
|
More recently, the government of B.C. has indicated that in two months
|
||
|
a new program called PharmaNet will be put in place. This will hook up
|
||
|
all pharmacies in the province so that ones drug profile is available
|
||
|
to each pharmacist if they use a keyword you provide (the keyword was
|
||
|
demanded by the office of privacy, originally it didn't even have this).
|
||
|
You must provide this keyword and your medical plan number in order
|
||
|
to purchase the drugs. The government claims it is becaus ethey
|
||
|
have a problem with drug interactions, especially amongst the
|
||
|
elderly who see numerous doctors and don't remember what they are taking.
|
||
|
|
||
|
They also claim it is to prevent the practice of people seeing several
|
||
|
doctors for one prescription type, then go to several pharmacies to buy
|
||
|
multiple prescriptions, and then sell the drugs on the street.
|
||
|
|
||
|
The government does have some justification, in that they do pay for
|
||
|
the partial cost of drugs to people over 65 and they also pay for
|
||
|
all drug costs over $600 per family per year. However, the vast
|
||
|
majority of the population does not fit into these groups.
|
||
|
|
||
|
In the private sector things are much worse. Most video stores re-
|
||
|
quire D.L.# plus SIN, and they can sell this info to anyone at
|
||
|
the present state of the law. Banks have gotten really nasty of
|
||
|
late, and are requiring a credit card number just to open a chequing
|
||
|
(or checking if you are south of the border) account. I was required
|
||
|
to sign a statement when opening a simple chequing/savings account
|
||
|
at a credit union which gave them permission to "acquire any information
|
||
|
deemed necessary to verify the information provided, or to protect the
|
||
|
credit union", and that such information could be transmitted to
|
||
|
other financial institutions, branches of their company, and other
|
||
|
companies they own (which includes and investment and insurance
|
||
|
division). I am fighting to change this now, as the next shareholders
|
||
|
meeting is in mid-April and i have submitted several resolutions to
|
||
|
change the current constitution of the credit union.
|
||
|
|
||
|
Anyway, I know this has been long winded... sorry. I would be most
|
||
|
interested in anyone who can provide inform
|
||
|
anyone who can provide information on laws in the states or elsewhere
|
||
|
which deal with issues such as these. I would like to know what other
|
||
|
legislation is out there to protect the privacy of personal information
|
||
|
in either the public or private sector.
|
||
|
|
||
|
Thanks... please E-Mail me.
|
||
|
|
||
|
%%%%%%%%%%%%%%%%%%%
|
||
|
|
||
|
NOTES FROM CYBERSPACE - ARTICLE 2
|
||
|
By Anonymous
|
||
|
Subject: What is being done about Privacy???
|
||
|
|
||
|
I have been doing some reading about the available databases, I was
|
||
|
shoked at some of the services that are listed. Just to name a
|
||
|
few ....
|
||
|
|
||
|
* Searches for SSN's, lists name, address, last transaction
|
||
|
* Searches for Mass Mailings and magazine subscriptions
|
||
|
* change of address, (someone also mentioned PO Box info!!)
|
||
|
* for most states - car ownership and Drivers lisc history
|
||
|
* Top of Credit reports (name, address, SSN, employer)
|
||
|
* neighborhood searches, demographics (income, ect ..)
|
||
|
* National Phone listings
|
||
|
* Airplane and Boat ownership
|
||
|
* Professional Lisc's
|
||
|
* ect, ect, ......
|
||
|
|
||
|
I have seen alot of talk about not giving out a SSN, but whats the point?
|
||
|
It seems like it is already too late. I haven't seen the info in all of
|
||
|
these datbases, but it seems as though Big Brother is already here.
|
||
|
|
||
|
I am sure many people in this group already knew about alot of this. I
|
||
|
am curious if anything is actually being done about this? I have seen
|
||
|
the EFF do alot against clipper; are they doing anything against these
|
||
|
databases that are open to the public (for a price)??? The clipper
|
||
|
petition got alot of names, couldn't the same be done about these
|
||
|
databases. I would bet most people have no idea all this personal
|
||
|
information is available. They would be just as shocked as I was and
|
||
|
you could get more signatures than the clipper petition.
|
||
|
|
||
|
%%%%%%%%%%%%%%%%%%
|
||
|
|
||
|
NOTES FROM CYBERSPACE - ARTICLE 3
|
||
|
By Anonymous
|
||
|
Subject: Comments on Wall Street Journal / NSA 'cryptomathematician'
|
||
|
|
||
|
In the Tuesday March 22, 1994 issue of the Wall Street Journal appeared
|
||
|
an interview by reporter Bob Davis of Clinton Brooks the head of the
|
||
|
NSA effort for an Escrow Encryption system commonly associated with
|
||
|
Clipper. In the article Mr. Brooks relates there efforts to produce
|
||
|
such as system came to fruition in a timely fashion with respect to
|
||
|
AT&T desiring to sell secure voice systems.
|
||
|
|
||
|
Having spoken with several people marketing AT&T Surety Communications
|
||
|
products, it appears that indeed, NSA 'balked', and not just over the
|
||
|
point of export licensing for DES based products. AT&T also sells several
|
||
|
proprietary encryption algorithms, including one approved for export
|
||
|
under ITAR. These all predate clipper. One of the marketing types
|
||
|
at AT&T Surety indicated that NSA didn't want DES in secure voice
|
||
|
products and hinted at international agreements to limit proliferation
|
||
|
of DES applications, although apparently no evidence of this has arisen
|
||
|
through John Gilmores FOIA requests.
|
||
|
|
||
|
If AT&T was ready to sell two tier products domestic/overseas, why
|
||
|
the jump to clipper? They offered a captive market, the Justice Department,
|
||
|
which has paid in the neighborhood of $8 million dollars from asset siezures
|
||
|
for a couple thousand clipper phone units probably at a higher price
|
||
|
than they would sell for on the open market. They have also gained the
|
||
|
promise of a single tiered product, although the rest of the STUIII
|
||
|
compatible products are still available. AT&T appears hard pressed to
|
||
|
find a nongovernment related market place for secure voice, without
|
||
|
significant non-Justice shipping. Part of this may be cost, a Telephone
|
||
|
Security Device costs more than an AT&T videophone while having a lower
|
||
|
complexity. A popular MODEM manufacturer Paradyne, a subsidiary of
|
||
|
AT&T, sells a MODEM with more than half the complexity of the Telephone
|
||
|
Security Device for $179 retail. The videophone is selling for around
|
||
|
$940 while the TSD 3600, a unit sitting between your phone and the wall
|
||
|
sells for $1050.
|
||
|
|
||
|
AT&T appears to have had a hard time waiting for MYK-78e chip shipments
|
||
|
from Mykotronx. They received the initial production lot in October or
|
||
|
November, following a protracted nonreassuring rubber stamp review
|
||
|
process and a NIST Encryption Escrow non Standard release, which from
|
||
|
the WSJ article was staged simple for AT&Ts benefit.
|
||
|
|
||
|
That and we get a secretive governmental agency starting an unprecedented
|
||
|
propaganda effort. Is this a case of our government doing more for us than
|
||
|
we would possibly ask? Perhaps we should ask why.
|
||
|
|
||
|
%%%%%%%%%%%%%%%%%%%%
|
||
|
|
||
|
NOTES FROM CYBERSPACE - ARTICLE 4
|
||
|
By Anonymous
|
||
|
Subject: Creative Freedom / Restrictions on Free Communcication
|
||
|
|
||
|
I am aware of a case where a student made significant headway
|
||
|
in development of techniques which accelerate convergence of
|
||
|
algorithms used in computer arbitrage. The advisor told
|
||
|
the student that this was amazing and great! But then the
|
||
|
advisor tried to get the student to change the name of the
|
||
|
technique to something that would make it sound like the
|
||
|
advisor thought of it. Then, on the second idea the student
|
||
|
mentioned, the advisor exclaimed how great it was and then
|
||
|
suddenly turned around and began to try to talk the student
|
||
|
out of the idea. But, the student had already convinced his/herself
|
||
|
of the validity and value and stood ground on the second idea.
|
||
|
|
||
|
When the student began to e-mail others in the community, the
|
||
|
advisor had an irrational reaction. The advisor required the
|
||
|
student to consult with (the advisor) before discussing his/her
|
||
|
results vi e-mail with others in the community. Also, the advisor
|
||
|
said that such discussions should not leave the local research
|
||
|
group.
|
||
|
|
||
|
TELL ME, IS THIS AN ETHICAL REQUIREMENT??
|
||
|
WHAT DO YOU THINK IS GOING ON HERE?
|
||
|
|
||
|
%%%%%%%%%%%%%%%%%%%%%
|
||
|
|
||
|
NOTES FROM CYBERSPACE - ARTICLE 5
|
||
|
From: James Ebright (jebright@magnus.acs.ohio-state.edu)
|
||
|
Subject: Re: Wall Street Journal Interview with NSA 'cryptomathematician'
|
||
|
|
||
|
My response to AT&T: I switched to MCI today... (Who else is listening
|
||
|
to my true voice?) You can switch too... call 800-624-8030.
|
||
|
|
||
|
My response to NSA: I still don't think folks are going to buy
|
||
|
many guaranteed tapable 'secure' phones.
|
||
|
|
||
|
But this shows the power of entrenched bureacuracies who have a vested
|
||
|
interest in intrusive government. If the Cantwell bill passes, this
|
||
|
mugging of US businesses via ITARs would be impossible.
|
||
|
|
||
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
|
|
||
|
KIDNAPPED BY THE STATE / INTERNET NOT SAFE
|
||
|
|
||
|
By Matthew A. Mihaly (mam6@cornell.edu)
|
||
|
|
||
|
O.k., here is the situation. I had been contemplating suicide and
|
||
|
posted my situation on alt.romance.chat (lot's of nice people replied,
|
||
|
btw.) I also posted something on alt.drugs (under the name "Matt" asking
|
||
|
for some useful drugs for the purpose of killing myself (which, for any
|
||
|
of you fu*king ass-sucking cops out there: I am not saying I want to).
|
||
|
|
||
|
The Internet is not safe. Two days (on 3/14) after I posted it, a couple
|
||
|
of cops show up at my door, along with some nut from the mental health
|
||
|
department of Tompkins County (that's this county obviously) and tell me
|
||
|
I have to come with them to the hospital for "an hour, maybe an hour and
|
||
|
a half." I said "What if I don't choose to go." They replied that I
|
||
|
don't have a choice. They informed me that I'm going with them because
|
||
|
some people read my internet message and were concerned. I was in the
|
||
|
middle of conducting some business on the phone and asked if I could make
|
||
|
a couple of phone calls first but the pigs replied that no, I couldn't.
|
||
|
In effect, they kidnapped me.
|
||
|
|
||
|
So, they drive me to Tompkins County Hospital where I am forced to sit in
|
||
|
a room for 2 hours (with a couple of goons waiting outside to make sure I
|
||
|
don't try to run). Finally, some bitch comes in and talks to me for all
|
||
|
of 4 or 5 minutes. I explicity told her that I am not planning on
|
||
|
killing myself (partly due to the 20 or 30 supportive e-mail messages I
|
||
|
got from people). She said it's not here decision whether I'm held or
|
||
|
not but that she would go give the doctor her opinion (she left me with
|
||
|
the impression that she would tell me to let me go.) The doctor came in,
|
||
|
after another 45 minutes of waiting) and talked to me for maybe 2
|
||
|
minutes. I said I wanted a lawyer. He said "Sure, you can always have a
|
||
|
lawyer." and walked away mumbling something about always being able to
|
||
|
have a lawyer. Apparently he was being sarcastic because no lawyer ever
|
||
|
showed up. After another 20 minutes or so, some guy pokes his head in
|
||
|
the room and asks me who I am. I didn't tell me of course, but 2 minutes
|
||
|
later, some little geek walks in, sits down and says "I don't know if
|
||
|
you've heard yet, but you are being transfered to a mental health ward."
|
||
|
I say something to the effect of f*ck you I'm not going anywhere. By
|
||
|
this time, there were a couple of goons in the room also. They told me
|
||
|
that I could either go of my own free will or they would drag me there.
|
||
|
Noticing that there were about six other guys standing out in the hall
|
||
|
way I said I'd go. I then stood up, told the little geek that I hope he
|
||
|
goes home tonight and suffers the worst kind of hell (or something to
|
||
|
that effect). Then, one of the goons grabs me and drags me out into the
|
||
|
hallway where I see one of those portable beds for ambulances with
|
||
|
restraining devices on them.
|
||
|
|
||
|
AT this point I was absolutely livid with rage. No way are you f*ckers
|
||
|
restraining me I said. Well, they said I had to be restrained because I
|
||
|
had just threatened the little geek with violence (not true, I just
|
||
|
wished hell on him). So, they strap me down (I cooperated but was
|
||
|
berating them the whole time) and put me in the ambulance and left a guy
|
||
|
in the back to watch me. I was telling him what a dick he is and how big
|
||
|
a violation of my human rights this was and he just told me to shut up.
|
||
|
After a period of silence I apologized to him and told him I didn't mean
|
||
|
anything personal. He responded with something to the effect of "Well
|
||
|
f*ck you, I dont' like your tone of voice." I asked him, very
|
||
|
sarcastically, if he was pleased with how well he was doing his job. He
|
||
|
said "Look, I'm just doing my job here." Yeah, yeah I replied, so were
|
||
|
the Nazi death-camp guards.
|
||
|
|
||
|
Anyhow, they get me to this hospital (Soldiers and Sailors Memorial in
|
||
|
Penn Yan, NY). They made me strip and put on stupid hospital clothes.
|
||
|
By this time it was 8:30 at night (I got picked up at about 4:30) and no
|
||
|
one had given me anything to eat. They gave me some graham crackers at
|
||
|
this point. Whoopee.
|
||
|
|
||
|
So anyhow, I wait for an hour or so and some guy named Tom Rice (yeah, I
|
||
|
hope you're reading this you cocksucker) comes in and talks to me for
|
||
|
about 3 minutes and says "o.k., I'm admitting you." Well, I was pretty
|
||
|
pissed as you might imagine.
|
||
|
|
||
|
So, they bring me upstairs, give me a room, etc., etc. and expect me to
|
||
|
go to sleep until morning. Yeah, whatever. Like I can sleep when I'm a
|
||
|
prisoner. I spent the whole night planning a way to escape (pathetic
|
||
|
security cause I was in the wing where people with things like depression
|
||
|
are kept, not the criminally insane wing). At 6:30 in the morning, they
|
||
|
come in and tell me they are going to take blood from me. When I said no
|
||
|
they said they were going to anyhow.
|
||
|
|
||
|
Well, the long and short of this all is that I ended up spending two
|
||
|
nights in a f*cking mental hospital because A) some f*ckers at Cornell
|
||
|
University are idiots (I know at least one of their names so far... Leeza
|
||
|
Casinelli, a therapist at our health services.. she is a fascist pig,
|
||
|
don't go see her) and B) the idiot psychiatrist I saw the next morning
|
||
|
said they have to keep me another night for observation. Nevermind the
|
||
|
fact that I was obviously fine and the rest of the staff knew it. The
|
||
|
food there sucked, I was confined in EXTREME boredom (what, they expect
|
||
|
me to read 2 year old Time magazines all day???), missed many classes, a
|
||
|
test, and some papers. Furthermore, I do alot of investing and lost a
|
||
|
significant sum during this time.
|
||
|
|
||
|
I guess my point in all this is that the Internet is definitely not safe,
|
||
|
even if you aren't breaking the law. I got back about 2 hours ago from
|
||
|
that f*cking place. I'm thinking about suing Cornell U (they are the
|
||
|
ones who started all this) and maybe the state of New York. The way I
|
||
|
look at it, I was held without indictement, without warrant, and without
|
||
|
legal representation based on evidence contained on a Usenet posting. I
|
||
|
mean c'mon. Like even 1/8 of the stuff posted here should be taken
|
||
|
seriously. Take a look at alt.devilbunnies for instance. A completely
|
||
|
amusing group, but not something to take seriously. Anyhow, I go to
|
||
|
Cornell and live in Ithaca. I keep on trying to contact the ACLU here
|
||
|
but no one ever answers. I've only gotten a busy signal once too. Also,
|
||
|
are there any lawyers around here that someone can recommend for me?
|
||
|
|
||
|
I was kidnapped and imprisoned for two days by the state. The state, not
|
||
|
just of America, but the state of the world must be destroyed. Power,
|
||
|
concentrated like this is absolutely tyrannical. I am not suicidial
|
||
|
(although I was at one point) and these morons should have realized this.
|
||
|
Be careful what you post and look into PGP encryption. F*ck the
|
||
|
government and f*ck you you Cornell U. bastards. I hope you rot in the
|
||
|
worst part of hell for what you put me through. If you want me to be
|
||
|
depressed, go ahead, do it again. Make me miss classes, tests, and lose
|
||
|
money.
|
||
|
|
||
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
|
|
||
|
LEGION OF DOOM T-SHIRTS!! Get 'em
|
||
|
|
||
|
By Chris Goggans <phrack@well.sf.ca.us>
|
||
|
|
||
|
After a complete sellout at HoHo Con 1993 in Austin, TX this past
|
||
|
December, the official Legion of Doom t-shirts are available
|
||
|
once again. Join the net luminaries world-wide in owning one of
|
||
|
these amazing shirts. Impress members of the opposite sex, increase
|
||
|
your IQ, annoy system administrators, get raided by the government and
|
||
|
lose your wardrobe!
|
||
|
|
||
|
Can a t-shirt really do all this? Of course it can!
|
||
|
|
||
|
--------------------------------------------------------------------------
|
||
|
|
||
|
"THE HACKER WAR -- LOD vs MOD"
|
||
|
|
||
|
This t-shirt chronicles the infamous "Hacker War" between rival
|
||
|
groups The Legion of Doom and The Masters of Destruction. The front
|
||
|
of the shirt displays a flight map of the various battle-sites
|
||
|
hit by MOD and tracked by LOD. The back of the shirt
|
||
|
has a detailed timeline of the key dates in the conflict, and
|
||
|
a rather ironic quote from an MOD member.
|
||
|
|
||
|
(For a limited time, the original is back!)
|
||
|
|
||
|
"LEGION OF DOOM -- INTERNET WORLD TOUR"
|
||
|
|
||
|
The front of this classic shirt displays "Legion of Doom Internet World
|
||
|
Tour" as well as a sword and telephone intersecting the planet
|
||
|
earth, skull-and-crossbones style. The back displays the
|
||
|
words "Hacking for Jesus" as well as a substantial list of "tour-stops"
|
||
|
(internet sites) and a quote from Aleister Crowley.
|
||
|
|
||
|
--------------------------------------------------------------------------
|
||
|
|
||
|
All t-shirts are sized XL, and are 100% cotton.
|
||
|
|
||
|
Cost is $15.00 (US) per shirt. International orders add $5.00 per shirt for
|
||
|
postage.
|
||
|
|
||
|
Send checks or money orders. Please, no credit cards, even if
|
||
|
it's really your card.
|
||
|
|
||
|
|
||
|
Name: __________________________________________________
|
||
|
|
||
|
Address: __________________________________________________
|
||
|
|
||
|
City, State, Zip: __________________________________________
|
||
|
|
||
|
|
||
|
I want ____ "Hacker War" shirt(s)
|
||
|
|
||
|
I want ____ "Internet World Tour" shirt(s)
|
||
|
|
||
|
Enclosed is $______ for the total cost.
|
||
|
|
||
|
|
||
|
Mail to: Chris Goggans
|
||
|
603 W. 13th #1A-278
|
||
|
Austin, TX 78701
|
||
|
|
||
|
|
||
|
These T-shirts are sold only as a novelty items, and are in no way
|
||
|
attempting to glorify computer crime.
|
||
|
|
||
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
|
|
||
|
PUBLIC vs. MASS MEDIA: THE CASE OF THE INTERNET
|
||
|
|
||
|
By Jim O'Loughlin (v049lnwe@ubvms.cc.buffalo.edu)
|
||
|
|
||
|
In its initial configuration, the Internet was designed to be
|
||
|
neither a public or a mass media. Twenty years ago, the ARPAnet, as
|
||
|
it was then called, was a U.S. Department of Defense research experiment
|
||
|
into how to create a computer network that could withstand partial
|
||
|
outages, as from a bomb attack. (Krol 11) In the mid 1980s, the National
|
||
|
Science Foundation created a network built on the ARPAnet technology that
|
||
|
for the first time expanded access beyond computer researchers and
|
||
|
government employees. The NSF promoted universal access by connecting
|
||
|
universities only if they had plans to promote Internet use. (12)
|
||
|
The Internet, as a network of networks, began expanding rapidly, becoming
|
||
|
international and spawning commercial imitators such as Prodigy, CompuServe,
|
||
|
and America Online.
|
||
|
|
||
|
Currently, strictly commercial ventures are banned on the Internet,
|
||
|
which is still officially only used for research purposes. However, its
|
||
|
growing popularity and commercial potential have whetted the appetite of
|
||
|
business. Much of the current discussion about the "information
|
||
|
superhighway" revolves around how to turn the Internet into a source of
|
||
|
commercial profit. Lost in much of the information superhighway rhetoric
|
||
|
is the nature of most of the "traffic" on the Internet. For while media
|
||
|
discussion often portrays the Internet as a science fiction version of
|
||
|
Cable TV, much of its current popularity is due to its ability to
|
||
|
facilitate discussions between people throughout the globe. To understand
|
||
|
what is at stake in the transition from the Internet to the information
|
||
|
superhighway, it is necessary to consider the cultural position of the
|
||
|
Internet, or, to use C. Wright Mills terminology from *The Power Elite*,
|
||
|
the extent to which the Internet is a public vs. a mass media.
|
||
|
|
||
|
Though Mills's model focuses on the extent to which a population is a
|
||
|
public or a mass, I believe it can be applied to media and its use.
|
||
|
First, the formal media of communication need to be examined for the
|
||
|
proportion of expressed to received opinions. In a public, "virtually
|
||
|
as many people express opinions as receive them." (303) In essence,
|
||
|
opinions would be communicated through direct discussions. In a mass,
|
||
|
"far fewer people express opinions than receive them." (304) The extreme
|
||
|
of the latter state would be a case in which "one person talks impersonally
|
||
|
through a network of communications to millions of listeners and viewers."
|
||
|
(302)
|
||
|
|
||
|
The second standard is the extent to which an opinion can be
|
||
|
responded to without "internal or external reprisals being taken." (302)
|
||
|
Public communications would be organized to facilitate the immediate and
|
||
|
effective response to any publicly expressed opinion without fear of
|
||
|
retribution. The conditions of mass communications make it impossible for
|
||
|
any individual to "answer back immediately or with any effect." (304)
|
||
|
|
||
|
The third term of measurement would be the degree to which the
|
||
|
formation of opinions can lead to social action. In a public realm,
|
||
|
opinions can readily lead to effective action, even against the powers
|
||
|
that be. Authorities retain tight control over opinion in a mass sphere
|
||
|
and can organize and control any attempts at such action.
|
||
|
|
||
|
Finally, there is the extent to which "institutionalized authority,
|
||
|
with its sanctions and controls, penetrates the public." (303) Is a
|
||
|
particular media one in which the public has true autonomy? In an ideal
|
||
|
public, "authoritative institutions do not penetrate the public," (304) while
|
||
|
in a mass, people have no autonomy from institutions of power and are
|
||
|
frequently manipulated.
|
||
|
|
||
|
The limitations of these terms need to be understood. They represent
|
||
|
extreme types, "social reality is always some sort of mixture of the two.
|
||
|
Yet we cannot readily understand just how much of which is mixed into our
|
||
|
situation if we do not first understand, in terms of explicit dimensions,
|
||
|
the clear-cut and extreme types." (302) The Internet functions in a
|
||
|
combination of mass and public roles. Importantly, however, this paper
|
||
|
will argue that much of what is involved in the creation of the information
|
||
|
superhighway will turn the Internet into more of a mass media, to the
|
||
|
detriment of the extent to which the Internet is currently a public media.
|
||
|
|
||
|
The Internet is probably most noteworthy as a public media for the
|
||
|
extent to which people have equal access to expressing and receiving
|
||
|
opinions. Though large parts of the Internet exist to disperse information
|
||
|
(tools such as GOPHER and MOSAIC are designed to facilitate access to
|
||
|
databases and other information banks), much of the Internet is made up of
|
||
|
bulletin boards, salons, or discussion groups around cultural, political or
|
||
|
leisure topics (such as alt.cyberspace, soc.politics or
|
||
|
rec.food.veg.cooking). Though some groups are controlled by moderators,
|
||
|
the majority have no limitations on what can be posted. In a newsgroup,
|
||
|
there are usually a number of parallel conversations (or threads) going
|
||
|
on at any one time. In a recent overview of commercial on-line services
|
||
|
in *Newsweek*, it was noted that people seem more interested in
|
||
|
communication than services. "People want to talk to one another."
|
||
|
(Meyer 39) On-line shopping and banking facilities have had a less than
|
||
|
stellar reception, however, discussion groups have been hugely popular.
|
||
|
More than 100,000 messages are posted on the Prodigy system every day.
|
||
|
On the Internet, the equivalent of dozens of full-length novels are
|
||
|
written on a daily basis. This interchange, or the extent to which
|
||
|
authorship has become a public role, is perhaps the Internet's most
|
||
|
important feature.
|
||
|
|
||
|
A concern with the coming of the information superhighway is the
|
||
|
extent to which these discussion groups will be affected. As the Internet
|
||
|
becomes increasingly privatized, it comes questionable whether or not these
|
||
|
groups will retain their current form. Some businesses have attempted to
|
||
|
capitalize on their popularity. Microsoft is launching a Complete Baseball
|
||
|
newsgroup that features discussions, fantasy-baseball leagues, and access to
|
||
|
a wealth of statistical information. According to Barry Berkov of
|
||
|
CompuServe, "this is where the growth is... Anything addictive is good."
|
||
|
(quoted in Meyer 39) Groups based on entertainment or leisure topics
|
||
|
(particularly ones in which certain people have an obsessive interest) may
|
||
|
attract capital. It remains questionable what would happen to less
|
||
|
"addictive" or more politically inclined groups.
|
||
|
|
||
|
At its best, discussion on the Internet operates on a civil
|
||
|
libertarian model. One is free to post whatever one wishes and free to
|
||
|
participate in any of the discussions. However, the computer technology
|
||
|
upon which the Internet relies also makes surveillance and reprisals a
|
||
|
simple matter. It is relatively easy for any group to monitor a conversation
|
||
|
(some on the Internet have suggested that governmental agencies do just
|
||
|
that), and a simple matter for systems operators at any computer site to
|
||
|
tap into one's account or to withdraw one's Internet privileges.
|
||
|
Though cases of direct governmental intervention so far are few, there
|
||
|
are cases such as the 18 year old who was arrested for threatening the
|
||
|
president's life over electronic mail (president@whitehouse.gov).
|
||
|
|
||
|
However, one of the most ominous recent developments has been the
|
||
|
proposed "Clipper chip." A Clinton administration proposal to standardize
|
||
|
encryption chips was recently developed in consultation with the National
|
||
|
Security Agency. Telephones containing the Clipper chip would send out "a
|
||
|
string of bits called a law enforcement field. Its purpose is to enable the
|
||
|
police and the FBI to decode conversations that they wiretap pursuant to
|
||
|
court order." (Wallich 116) Both computer civil libertarians and major
|
||
|
software companies have been opposed to this proposal (the former for
|
||
|
reasons of privacy, the latter for reasons of international competitiveness).
|
||
|
The Clinton administration is currently rethinking the policy, nevertheless,
|
||
|
the technology and means does exist to give the government an exclusive
|
||
|
"back-door" into cellular telephones.
|
||
|
|
||
|
The third criterion for measurement, the extent to which the
|
||
|
formation of opinions can lead to social action, is the one in which the
|
||
|
jury is still out on the Internet. Few traditional political groups are
|
||
|
entirely "online," and the physical distance between Internet participants
|
||
|
raises serious questions as to its use in organizing. Is cyberspace a
|
||
|
locale within which social action is likely or possible? Has it become
|
||
|
a medium of a public sphere in which people can engage public authorities
|
||
|
"in a debate over the general rules governing relations in the basically
|
||
|
privatized but publicly relevant sphere of commodity exchange and social
|
||
|
labor?" (Habermas 27) Computer Professionals for Social Responsibility
|
||
|
circulated an electronic petition in opposition to the Clipper Chip
|
||
|
proposal. This petition was distributed to a wide variety of newsgroups
|
||
|
and eventually forwarded to the president. Such examples, however, are
|
||
|
the exception rather than the rule. Calls to action are rare on the
|
||
|
Internet. The question would be whether that is a carry over from the
|
||
|
state of the world outside of cyberspace or endemic to shifting populations
|
||
|
of the Internet.
|
||
|
|
||
|
The final issue to consider is the role of institutionalized
|
||
|
authority. No single authority governs the Internet. A council of elders
|
||
|
(called the Internet Architecture Board) from the Internet Society has
|
||
|
responsibility for the technical management and direction of the Internet.
|
||
|
(Krol 14) However, this group has almost no control over the actual content
|
||
|
of materials over the Internet. Often the metaphor used to describe the
|
||
|
rules of the Internet is "frontier justice." "The two overriding premises
|
||
|
of network ethics are: Individualism is honored and fostered.
|
||
|
The network is good and must be protected." (35) Such a definition seems
|
||
|
a bit romanticized but it does capture the suspicion of any authorial
|
||
|
intrusion into cyberspace. Many recognize that the computer technology
|
||
|
which brought about the Internet also makes stricter governmental control
|
||
|
a possibility.
|
||
|
|
||
|
As the Internet slowly becomes repaved into the Information
|
||
|
superhighway, it will be important to watch the extent to which people are
|
||
|
assumed to be either a mass or a public. In the former case, we can expect
|
||
|
governmental concern about consumer rights, or the ability of people to have
|
||
|
the ability to obtain as much information as possible for a reasonable price.
|
||
|
Such a mindset governs most federal discussions about cable television
|
||
|
regulation. However, if the people are considered to constitute a public,
|
||
|
then concern will be raised about what Jurgen Habermas has termed
|
||
|
"participatory rights" (229) These are not simply rights which protect
|
||
|
people from something (often the intrusion of government), but rights which,
|
||
|
in this case, ensure people's ability to partake in freedom of assembly and
|
||
|
association through the medium of the Internet.
|
||
|
|
||
|
Works Cited
|
||
|
|
||
|
Habermas, Jurgen. *The Structural Transformation of the Public Sphere: An
|
||
|
Inquiry into a Category of Bourgeois Society* Cambridge: MIT Press,
|
||
|
1993 (1962).
|
||
|
|
||
|
Krol, Ed. *The Whole Internet: User's Buide & Catalog* Sebastopal, CA:
|
||
|
O'Reilly & Associates, Inc., 1992.
|
||
|
|
||
|
Meyer, Michael. "The 'On-Line' War Heats Up." *Newsweek* 28 March
|
||
|
1994: 38-9.
|
||
|
|
||
|
Mills, C. Wright. *The Power Elite* New York: Oxford University Press,
|
||
|
1956.
|
||
|
|
||
|
Wallich Paul. "Clipper Runs Aground." *Scientific American* August 1993:
|
||
|
116.
|
||
|
|
||
|
|
||
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
|
|
||
|
BRUCE STERLING'S REMARKS AT CFP '94
|
||
|
|
||
|
Posted By Carl Kadie (kadie@eff.org)
|
||
|
Comments to Bruce Sterling (bruces@well.sf.ca.us)
|
||
|
|
||
|
LITERARY FREEWARE: NOT FOR COMMERCIAL USE
|
||
|
|
||
|
I've been asked to explain why I don't worry much about the
|
||
|
topics of privacy threat raised by this panel. And I don't. One reason
|
||
|
is that these scenarios seem to assume that there will be large,
|
||
|
monolithic bureaucracies (of whatever character, political or
|
||
|
economic) that are capable of harnessing computers for one-way
|
||
|
surveillance of an unsuspecting populace. I've come to feel that
|
||
|
computation just doesn't work that way. Being afraid of monolithic
|
||
|
organizations especially when they have computers, is like being
|
||
|
afraid of really big gorillas especially when they are on fire.
|
||
|
|
||
|
The threat simply doesn't concur with my historical
|
||
|
experience. None of the large organizations of my youth that
|
||
|
compelled my fear and uneasy respect have prospered. Let me just
|
||
|
roll off a few acronyms here. CCCP. KGB. IBM. GM. AEC. SAC.
|
||
|
|
||
|
It was recently revealed that the CIA has been of actual
|
||
|
negative worth -- literally worse than useless -- to American
|
||
|
national security. They were in the pockets of the KGB during our
|
||
|
death struggle with the Soviet Union -- and yet we still won.
|
||
|
Japanese zaibatsus -- Japan Inc. -- the corporate monoliths of Japan
|
||
|
-- how much hype have we heard about that lately? I admit that
|
||
|
AT&T has prospered, sort of -- if you don't count the fact that
|
||
|
they've hollowed themselves out by firing a huge percentage of their
|
||
|
personnel.
|
||
|
|
||
|
Suppose that, say, Equifax, turned into an outright fascist
|
||
|
organization and stated abusing privacy in every way they could.
|
||
|
How could they keep that a secret? Realistically, given current
|
||
|
employment practices in the Western economies, what kind of
|
||
|
loyalty could they command among their own personnel? The low
|
||
|
level temps have no health insurance and no job security; the high
|
||
|
level people are ready to grab their golden parachutes and bail at any
|
||
|
time. Where is the fanatically loyal army of gray flannel
|
||
|
organization men who will swear lifelong allegiance to this
|
||
|
organization, or *any* organization in this country with the possible
|
||
|
exception of the Mafia?
|
||
|
|
||
|
I feel that the real threat to our society isn't because people
|
||
|
are being surveilled but because people are being deliberately
|
||
|
ignored. People drop through the safety nets. People stumble
|
||
|
through the streets of every city in this country absolutely wrapped
|
||
|
in the grip of demons, groping at passersby for a moment's attention
|
||
|
and pity and not getting it. In parts of the Third World people are
|
||
|
routinely disappeared, not because of high-tech computer
|
||
|
surveillance but for the most trivial and insane reasons -- because
|
||
|
they wear glasses, because they were seen reading a book -- and if
|
||
|
they survive, it's because of the thin thread of surveillance carried
|
||
|
out by Amnesty International.
|
||
|
|
||
|
There may be securicams running 24 hours a day all around us,
|
||
|
but mechanical surveillance is not the same as people actually
|
||
|
getting attention or care. Sure, rich people, like most of us here, are
|
||
|
gonna get plenty of attention, probably too much, a poisonous
|
||
|
amount, but in the meantime life has become so cheap in this society
|
||
|
that we let people stagger around right in front of us exhaling
|
||
|
tuberculosis without treatment. It's not so much information haves
|
||
|
and have-nots and watch and watch-nots.
|
||
|
|
||
|
I wish I could speak at greater length more directly to the
|
||
|
topic of this panel. But since I'm the last guy to officially speak at
|
||
|
CFP IV, I want the seize the chance to grandstand and do a kind of
|
||
|
pontifical summation of the event. And get some irrepressible
|
||
|
feelings off my chest.
|
||
|
|
||
|
What am I going to remember from CFP IV? I'm going to
|
||
|
remember the Chief Counsel of NSA and his impassioned insistence
|
||
|
that key escrow cryptography represents normality and the status
|
||
|
quo, and that unlicensed hard cryptography is a rash and radical leap
|
||
|
into unplumbed depths of lawlessness. He made a literary reference
|
||
|
to BRAVE NEW WORLD. What he said in so many words was, "We're
|
||
|
not the Brave New World, Clipper's opponents are the Brave New
|
||
|
World."
|
||
|
|
||
|
And I believe he meant that. As a professional science fiction
|
||
|
writer I remember being immediately struck by the deep conviction
|
||
|
that there was plenty of Brave New World to go around.
|
||
|
|
||
|
I've been to all four CFPs, and in my opinion this is the darkest
|
||
|
one by far. I hear ancestral voices prophesying war. All previous
|
||
|
CFPs had a weird kind of camaraderie about them. People from the
|
||
|
most disparate groups found something useful to tell each other.
|
||
|
But now that America's premiere spookocracy has arrived on stage
|
||
|
and spoken up, I think the CFP community has finally found a group of
|
||
|
outsiders that it cannot metabolize. The trenchworks are going up
|
||
|
and I see nothing but confrontation ahead.
|
||
|
|
||
|
Senator Leahy at least had the elementary good sense to
|
||
|
backpedal and temporize, as any politician would when he saw the
|
||
|
white-hot volcano of technological advance in the direct path of a
|
||
|
Cold War glacier that has previously crushed everything in its way.
|
||
|
|
||
|
But that unlucky flak-catcher the White House sent down here
|
||
|
-- that guy was mousetrapped, basically. That was a debacle! Who
|
||
|
was briefing that guy? Are they utterly unaware? How on earth
|
||
|
could they miss the fact that Clipper and Digital Telephony are
|
||
|
violently detested by every element in this community -- with the
|
||
|
possible exception of one brave little math professor this high?
|
||
|
Don't they get it that everybody from Rush Limbaugh to Timothy
|
||
|
Leary despises this initiative? Don't they read newspapers? The
|
||
|
Wall Street Journal, The New York Times? I won't even ask if they
|
||
|
read their email.
|
||
|
|
||
|
That was bad politics. But that was nothing compared to the
|
||
|
presentation by the gentleman from the NSA. If I can do it without
|
||
|
losing my temper, I want to talk to you a little bit about how
|
||
|
radically unsatisfactory that was.
|
||
|
|
||
|
I've been waiting a long time for somebody from Fort Meade to
|
||
|
come to the aid of Dorothy Denning in Professor Denning's heroic and
|
||
|
heartbreaking solo struggle against twelve million other people with
|
||
|
email addresses. And I listened very carefully and I took notes and I
|
||
|
swear to God I even applauded at the end.
|
||
|
|
||
|
He had seven points to make, four of which were disingenuous,
|
||
|
two were half-truths, and the other was the actual core of the
|
||
|
problem.
|
||
|
|
||
|
Let me blow away some of the smoke and mirrors first, more
|
||
|
for my own satisfaction than because it's going to enlighten you
|
||
|
people any. With your indulgence.
|
||
|
|
||
|
First, the kidporn thing. I am sick and tired of hearing this
|
||
|
specious blackwash. Are American citizens really so neurotically
|
||
|
uptight about deviant sexual behavior that we will allow our entire
|
||
|
information infrastructure to be dictated by the existence of
|
||
|
pedophiles? Are pedophiles that precious and important to us? Do
|
||
|
the NSA and the FBI really believe that they can hide the structure of
|
||
|
a telephone switch under a layer of camouflage called child
|
||
|
pornography? Are we supposed to flinch so violently at the specter
|
||
|
of child abuse that we somehow miss the fact that you've installed a
|
||
|
Sony Walkman jack in our phones?
|
||
|
|
||
|
Look, there were pedophiles before NII and there will be
|
||
|
pedophiles long after NII is just another dead acronym. Pedophiles
|
||
|
don't jump out of BBSes like jacks in the box. You want to impress
|
||
|
me with your deep concern for children? This is Chicago! Go down
|
||
|
to the Projects and rescue some children from being terrorized and
|
||
|
recruited by crack gangs who wouldn't know a modem if it bit them
|
||
|
on the ass! Stop pornkidding us around! Just knock it off with that
|
||
|
crap, you're embarrassing yourselves.
|
||
|
|
||
|
But back to the speech by Mr. Baker of the NSA. Was it just me,
|
||
|
ladies and gentlemen, or did anyone else catch that tone of truly
|
||
|
intolerable arrogance? Did they guy have to make the remark about
|
||
|
our missing Woodstock because we were busy with our
|
||
|
trigonometry? Do spook mathematicians permanently cooped up
|
||
|
inside Fort Meade consider that a funny remark? I'd like to make an
|
||
|
even more amusing observation -- that I've seen scarier secret
|
||
|
police agencies than his completely destroyed by a Czech hippie
|
||
|
playwright with a manual typewriter.
|
||
|
|
||
|
Is the NSA unaware that the current President of the United
|
||
|
States once had a big bushel-basket-full of hair? What does he
|
||
|
expect from the computer community? Normality? Sorry pal, we're
|
||
|
fresh out! Who is it, exactly, that the NSA considers a level-headed
|
||
|
sober sort, someone to sit down with and talk to seriously? Jobs?
|
||
|
Wozniak? Gates? Sculley? Perot -- I hope to God it's not Perot.
|
||
|
Bob Allen -- okay, maybe Bob Allen, that brownshoe guy from AT&T.
|
||
|
Bob Allen seems to think that Clipper is a swell idea, at least he's
|
||
|
somehow willing to merchandise it. But Christ, Bob Allen just gave
|
||
|
eight zillion dollars to a guy whose idea of a good time is Microsoft
|
||
|
Windows for Spaceships!
|
||
|
|
||
|
When is the NSA going to realize that Kapor and his people and
|
||
|
Rotenberg and his people and the rest of the people here are as good
|
||
|
as people get in this milieu? Yes they are weird people, and yes they
|
||
|
have weird friends (and I'm one of them), but there isn't any
|
||
|
normality left for anybody in this society, and when it comes to
|
||
|
computers, when the going got weird the weird turned pro! The
|
||
|
status quo is *over!* Wake up to it! Get used to it!
|
||
|
|
||
|
Where in hell does a crowd of spooks from Fort Meade get off
|
||
|
playing "responsible adults" in this situation? This is a laugh and a
|
||
|
half! Bobby Ray Inman, the legendary NSA leader, made a stab at
|
||
|
computer entrepreneurism and rapidly went down for the third time.
|
||
|
Then he got out of the shadows of espionage and into the bright
|
||
|
lights of actual public service and immediately started gabbling like
|
||
|
a daylight-stricken vampire. Is this the kind of responsive public
|
||
|
official we're expected to blindly trust with the insides of our
|
||
|
phones and computers? Who made him God?
|
||
|
|
||
|
You know, it's a difficult confession for a practiced cynic like
|
||
|
me to make, but I actually trust EFF people. I do; I trust them;
|
||
|
there, I've said it. But I wouldn't trust Bobby Ray Inman to go down
|
||
|
to the corner store for a pack of cigarettes.
|
||
|
|
||
|
You know, I like FBI people. I even kind of trust them, sort of,
|
||
|
kind of, a little bit. I'm sorry that they didn't catch Kevin Mitnick
|
||
|
here. I'm even sorry that they didn't manage to apprehend Robert
|
||
|
Steele, who is about one hundred times as smart as Mitnick and ten
|
||
|
thousand times as dangerous. But FBI people, I think your idea of
|
||
|
Digital Telephony is a scarcely mitigated disaster, and I'll tell you
|
||
|
why.
|
||
|
|
||
|
Because you're going to be filling out your paperwork in
|
||
|
quintuplicate to get a tap, just like you always do, because you don't
|
||
|
have your own pet court like the NSA does. And for you, it probably
|
||
|
is going to seem pretty much like the status quo used to be. But in
|
||
|
the meantime, you will have armed the enemies of the United States
|
||
|
around the world with a terrible weapon. Not your court-ordered,
|
||
|
civilized Digital Telephony -- their raw and tyrannical Digital
|
||
|
Telephony.
|
||
|
|
||
|
You're gonna be using it to round up wiseguys in streetgangs,
|
||
|
and people like Saddam Hussein are gonna be using it to round up
|
||
|
democratic activists and national minorities. You're going to
|
||
|
strengthen the hand of despotism around the world, and then you're
|
||
|
going to have to deal with the hordes of state-supported
|
||
|
truckbombers these rogue governments are sending our way after
|
||
|
annihilating their own internal opposition by using your tools. You
|
||
|
want us to put an axe in your hand and you're promising to hit us
|
||
|
with only the flat side of it, but the Chinese don't see it that way;
|
||
|
they're already licensing fax machines and they're gonna need a lot
|
||
|
of new hardware to gear up for Tiananmen II.
|
||
|
|
||
|
I've talked a long time, but I want to finish by saying
|
||
|
something about the NSA guy's one real and actual argument. The
|
||
|
terrors of the Brave New World of free individual encryption. When
|
||
|
he called encryption enthusiasts "romantic" he was dead-on, and
|
||
|
when he said the results of spreading encryption were unpredictable
|
||
|
and dangerous he was also dead-on, because people, encryption is not
|
||
|
our friend. Encryption is a mathematical technique, and it has about
|
||
|
as much concern for our human well-being as the fact that seventeen
|
||
|
times seventeen equals two hundred and eighty-nine. It does, but
|
||
|
that doesn't make us sleep any safer in our beds.
|
||
|
|
||
|
Encrypted networks worry the hell out of me and they have
|
||
|
since the mid 1980s. The effects are very scary and very
|
||
|
unpredictable and could be very destabilizing. But even the Four
|
||
|
Horsemen of Kidporn, Dope Dealers, Mafia and Terrorists don't worry
|
||
|
me as much as totalitarian governments. It's been a long century,
|
||
|
and we've had enough of them.
|
||
|
|
||
|
Our battle this century against totalitarianism has left
|
||
|
terrible scars all over our body politic and the threat these people
|
||
|
pose to us is entirely and utterly predictable. You can say that the
|
||
|
devil we know is better than the devil we don't, but the devils we
|
||
|
knew were ready to commit genocide, litter the earth with dead, and
|
||
|
blow up the world. How much worse can that get? Let's not build
|
||
|
chips and wiring for our police and spies when only their police and
|
||
|
spies can reap the full benefit of them.
|
||
|
|
||
|
But I don't expect my arguments to persuade anyone in the NSA.
|
||
|
If you're NSA and I do somehow convince you, by some fluke, then I
|
||
|
urge you to look at your conscience -- I know you have one -- and
|
||
|
take the word to your superiors and if they don't agree with you --
|
||
|
*resign.* Leave the Agency. Resign now, and if I'm right about
|
||
|
what's coming down the line, you'll be glad you didn't wait till later.
|
||
|
|
||
|
But even though I have a good line of gab, I don't expect to
|
||
|
actually argue people out of their livelihood. That's notoriously
|
||
|
difficult.
|
||
|
|
||
|
So CFP people, you have a fight on your hands. I'm sorry that a
|
||
|
community this young should have to face a fight this savage, for
|
||
|
such terribly high stakes, so soon. But what the heck; you're
|
||
|
always bragging about how clever you are; here's your chance to
|
||
|
prove to your fellow citizens that you're more than a crowd of net-
|
||
|
nattering MENSA dilettantes. In cyberspace one year is like seven
|
||
|
dog years, and on the Internet nobody knows you're a dog, so I figure
|
||
|
that makes you CFP people twenty-eight years old. And people, for
|
||
|
the sake of our society and our children you had better learn to act
|
||
|
your age.
|
||
|
|
||
|
Good luck. Good luck to you. For what it's worth, I think you're
|
||
|
some of the best and brightest our society has to offer. Things look
|
||
|
dark but I feel hopeful. See you next year in San Francisco.
|
||
|
|
||
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
|
|
||
|
[BOOK REVIEW] DOING BUSINESS ON THE INTERNET: HOW THE ELECTRONIC
|
||
|
HIGHWAY IS TRANSFORMING AMERICAN COMPANIES
|
||
|
|
||
|
By Steve Brock (sbrock@teal.csn.org)
|
||
|
|
||
|
DOING BUSINESS ON THE INTERNET: HOW THE ELECTRONIC HIGHWAY IS
|
||
|
TRANSFORMING AMERICAN COMPANIES by Mary J. Cronin. Van Nostrand
|
||
|
Reinhold, 115 Fifth Avenue, N.Y., NY 10003, (800) 544-0550, (212)
|
||
|
254-9499 FAX. Index, bibliography, list of service providers. 320
|
||
|
pp., $29.95 paper. 0-442-01770-7
|
||
|
|
||
|
REVIEW
|
||
|
|
||
|
Buying and selling on the Internet? Deals being made? Call
|
||
|
the net police! Seriously, commercial traffic is only forbidden on
|
||
|
the NSFnet - the Internet backbone, and restrictions there are
|
||
|
scheduled to disappear by the end of this year, when the National
|
||
|
Science Foundation (NSF) turns its administration of NSFnet over to
|
||
|
commercial organizations. Sensing this transition, companies are
|
||
|
flocking to the Internet. In a recent survey, 63% of Internet
|
||
|
traffic worldwide is by businesses or their research labs.
|
||
|
|
||
|
What can businesses get from the Internet? Mary Cronin, in
|
||
|
her new book "Doing Business on the Internet," has many answers.
|
||
|
After an overview of the mother of all networks and tips for
|
||
|
choosing a service provider, she outlines strategies for seeking
|
||
|
and exchanging information, increasing productivity, and increasing
|
||
|
communications between departments and with customers.
|
||
|
|
||
|
Another asset for businesses is that information can be
|
||
|
retrieved swiftly. While the Internet has gone through many
|
||
|
permutations, businesses have business to do right now, and Cronin
|
||
|
says that companies with an Internet connection can "receive the
|
||
|
advantages of high-speed telecommunications and continuously
|
||
|
evolving technology while learning invaluable lessons about the
|
||
|
management of networked organizations."
|
||
|
|
||
|
While a few may desire more information than the non-technical
|
||
|
overview Cronin provides, "Doing Business on the Internet" is a
|
||
|
solid introduction to networked communication and information
|
||
|
retrieval - the way business is going to be conducted from now on.
|
||
|
|
||
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
|
|
||
|
GENERIC FLAME FORM
|
||
|
|
||
|
This form is a generic-all-purpose Flame Form (tm). Don't you just hate it
|
||
|
when you are reading Usenet and can't filter through all of the crap
|
||
|
posted by people who simply do not have a clue! Well, maybe this form
|
||
|
will cut down on some of that. If someone pisses you off on Usenet,
|
||
|
fill it out and mail it to 'em.
|
||
|
|
||
|
---------cut here-------------cut here-------------cut here-------------
|
||
|
|
||
|
*************************************************************************
|
||
|
GENERIC FLAME FORM
|
||
|
*************************************************************************
|
||
|
|
||
|
Dear Sir/Madam
|
||
|
|
||
|
I took exception to your recent post to alt.insert.newsgroup.here
|
||
|
|
||
|
MESSAGE CONTENT SECTION
|
||
|
|
||
|
It was (check all that apply):
|
||
|
|
||
|
___ lame.
|
||
|
___ stupid.
|
||
|
___ much longer than any worthwhile thought of which you may be capable.
|
||
|
|
||
|
Your attention is drawn to the fact that:
|
||
|
|
||
|
___ What you posted/said has been done before.
|
||
|
___ Not only that, it was also done better the last time.
|
||
|
___ Your post was a pathetic imitation of ______________________.
|
||
|
___ Your post contained commercial advertising.
|
||
|
___ Your post contained numerous spelling errors.
|
||
|
___ Your post contained multiple grammatical errors.
|
||
|
___ YOUR POST CONTAINED EXCESSIVE CAPITALIZATION AND/OR PUNCTUATION!!!!!
|
||
|
___ Your post was an obvious forgery.
|
||
|
___ It was done clumsily.
|
||
|
___ You quoted an article in followup and added no new text.
|
||
|
___ You quoted an article in followup and only added ___ lines of text.
|
||
|
___ You quoted an article in followup and only added the line "Me, too!!!"
|
||
|
___ You flamed someone who has been around far longer than you.
|
||
|
___ You flamed someone who is far more intelligent and witty than you.
|
||
|
___ Your lines are 80 columns wide or wider.
|
||
|
|
||
|
SIGNATURE SECTION
|
||
|
|
||
|
___ Your .sig is longer than four lines.
|
||
|
___ And your mailer truncated it.
|
||
|
___ Your .sig is ridiculous because (check all that apply):
|
||
|
___ You listed ___ snail mail address(es).
|
||
|
___ You listed a nine-digit ZIP code.
|
||
|
___ You listed ___ phone numbers for people to use in prank calls.
|
||
|
___ You included a stupid disclaimer.
|
||
|
|
||
|
___ Your pathetic attempt at being witty in the disclaimer failed.
|
||
|
___ Miserably.
|
||
|
|
||
|
You included:
|
||
|
___ a stupid self-quote.
|
||
|
___ a stupid quote from a net.nobody.
|
||
|
___ a Rush Limbaugh quote.
|
||
|
___ a Dan Quayle joke.
|
||
|
___ a Hitler reference
|
||
|
___ a reference to the world being 6000 years old
|
||
|
___ a reference to Beavis & Butthead.
|
||
|
___ lame ASCII graphic(s) (Choose all that apply):
|
||
|
___ USS Enterprise
|
||
|
___ Australia
|
||
|
___ The Amiga logo
|
||
|
___ Company logo
|
||
|
___ and you stated that you don't speak for your employer.
|
||
|
___ Bicycle
|
||
|
___ Bart Simpson
|
||
|
|
||
|
Furthermore:
|
||
|
|
||
|
___ You have greatly misunderstood the purpose of alt.insert.newsgroup.here
|
||
|
___ You have greatly misunderstood the purpose of the net.
|
||
|
___ You are a loser.
|
||
|
___ You must have spent your entire life on a milk carton to be this dumb!
|
||
|
___ This has been pointed out to you before.
|
||
|
|
||
|
___ It is recommended that you:
|
||
|
___ Stick to FidoNet and come back when you've grown up.
|
||
|
___ Find a volcano and throw yourself in.
|
||
|
___ Get a gun and shoot yourself.
|
||
|
___ Stop reading alt.censorship and get a life.
|
||
|
___ Stop sending email and get a life.
|
||
|
___ Learn the concepts of cross-posting and follow-ups
|
||
|
___ Try reading a newsgroup for a week (or more than an hour) before
|
||
|
posting
|
||
|
|
||
|
Additional comments:
|
||
|
Follow-ups to: /dev/null
|
||
|
|
||
|
|
||
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
|
|
||
|
McDonnell Douglas
|
||
|
AIRCRAFT-SPACE SYSTEMS-MISSILES
|
||
|
|
||
|
Important! Important!
|
||
|
|
||
|
Please fill out and mail this form within 10 days of purchase
|
||
|
|
||
|
Thank you for purchasing a McDonnell Douglas military aircraft. In
|
||
|
order to protect your new investment, please take a few moments to
|
||
|
fill out the warranty registration card below. Answering the survey
|
||
|
questions is not required, but the information will help us to develop new
|
||
|
products that best meet your needs and desires.
|
||
|
|
||
|
1. _Mr. _Mrs. _Ms. _Lt. _Gen. _Comrade _Classified _Other
|
||
|
|
||
|
First Name________________Initial____Last Name_______________________
|
||
|
|
||
|
Latitude________________________Longitude____________________________
|
||
|
|
||
|
Altitude____________________Password, Code Name, Etc.________________
|
||
|
|
||
|
2. Which model aircraft did you purchase?
|
||
|
|
||
|
_F-15 Eagle _F-16 Falcon _F-117A Stealth _Classified
|
||
|
|
||
|
3. Date of purchase: Month___________Day___________Year____________
|
||
|
|
||
|
4. Serial Number____________________
|
||
|
|
||
|
5. Please check where this product was purchased:
|
||
|
|
||
|
_Received as Gift/Aid Package
|
||
|
_Catalog Showroom
|
||
|
_Sleazy Arms Broker
|
||
|
_Mail Order
|
||
|
_Discount Store
|
||
|
_Government Surplus
|
||
|
_Classified
|
||
|
|
||
|
6. Please check how you became aware of the McDonnell Douglas product
|
||
|
you have just purchased:
|
||
|
|
||
|
_Heard loud noise, looked up
|
||
|
_Store Display
|
||
|
_Espionage
|
||
|
_Recommended by friend/relative/ally
|
||
|
_Political lobbying by Manufacturer
|
||
|
_Was attacked by one
|
||
|
|
||
|
7. Please check the three (3) factors which most influenced your
|
||
|
decision to purchase this McDonnell Douglas product:
|
||
|
|
||
|
_Style/Appearance
|
||
|
_Kickback/Bribe
|
||
|
_Recommended by salesperson
|
||
|
_Speed/Maneuverability
|
||
|
_Comfort/Convenience
|
||
|
_McDonnell Douglas Reputation
|
||
|
_Advanced Weapons Systems
|
||
|
_Price/Value
|
||
|
_Back-Room Politics
|
||
|
_Negative experience opposing one in combat
|
||
|
|
||
|
8. Please check the location(s) where this product will be used:
|
||
|
|
||
|
_North America
|
||
|
_Central/South America
|
||
|
_Aircraft Carrier
|
||
|
_Europe
|
||
|
_Middle East
|
||
|
_Africa
|
||
|
_Asia/Far East
|
||
|
_Misc. Third-World Countries
|
||
|
_Classified
|
||
|
|
||
|
9. Please check the products that you currently own, or intend to purchase in
|
||
|
the near future:
|
||
|
|
||
|
Product Own Intend to purchase
|
||
|
Color TV
|
||
|
VCR
|
||
|
ICBM
|
||
|
Killer Satellite
|
||
|
CD Player
|
||
|
Air-to-Air Missiles
|
||
|
Space Shuttle
|
||
|
Home Computer
|
||
|
Nuclear Weapon
|
||
|
|
||
|
10. How would you describe yourself or your organization? Check all
|
||
|
that apply:
|
||
|
|
||
|
_Communist/Socialist
|
||
|
_Terrorist
|
||
|
_Crazed (Islamic)
|
||
|
_Crazed (Other)
|
||
|
_Neutral
|
||
|
_Democratic
|
||
|
_Dictatorship
|
||
|
_Corrupt (Latin American)
|
||
|
_Corrupt (Other)
|
||
|
_Primitive/Tribal
|
||
|
|
||
|
11. How did you pay for your McDonnell Douglas product?
|
||
|
|
||
|
_Cash
|
||
|
_Suitcases of Cocaine
|
||
|
_Oil Revenues
|
||
|
_Deficit Spending
|
||
|
_Personal Check
|
||
|
_Credit Card
|
||
|
_Ransom Money
|
||
|
_Traveler's Check
|
||
|
|
||
|
12. Occupation You Your Spouse
|
||
|
|
||
|
Homemaker
|
||
|
Sales/Marketing
|
||
|
Revolutionary
|
||
|
Clerical
|
||
|
Mercenary
|
||
|
Tyrant
|
||
|
Middle Management
|
||
|
Eccentric Billionaire
|
||
|
Defense Minister/General
|
||
|
Retired
|
||
|
Student
|
||
|
|
||
|
13. To help us understand our Customers' lifestyles, please indicate
|
||
|
the interests and activities in which you and your spouse enjoy
|
||
|
participating on a regular basis:
|
||
|
|
||
|
Activity/Interest You Your Spouse
|
||
|
Golf
|
||
|
Boating/Sailing
|
||
|
Sabotage
|
||
|
Running/Jogging
|
||
|
Propaganda/Disinformation
|
||
|
Destabilizing/Overthrow
|
||
|
Default on Loans
|
||
|
Gardening
|
||
|
Crafts
|
||
|
Black Market/Smuggling
|
||
|
Collectibles/Collections
|
||
|
Watching Sports on TV
|
||
|
Wines
|
||
|
Interrogation/Torture
|
||
|
Household Pets
|
||
|
Crushing Rebellions
|
||
|
Espionage/Reconnaissance
|
||
|
Fashion Clothing
|
||
|
Border Disputes
|
||
|
Mutually Assured Destruction
|
||
|
|
||
|
Thanks for taking the time to fill out this questionnaire. Your
|
||
|
answers will be used in market studies that will help McDonnell
|
||
|
Douglas serve you better in the future -- as well as allowing you to
|
||
|
receive mailings and special offers from other companies, governments,
|
||
|
extremist groups, and mysterious consortia.
|
||
|
|
||
|
Comments or suggestions about our fighter planes? Please write to:
|
||
|
|
||
|
McDONNELL DOUGLAS CORPORATION
|
||
|
Marketing Department
|
||
|
Military Aerospace Division
|
||
|
P.O. Box 800
|
||
|
St. Louis, MO 55500
|
||
|
|
||
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
|
|
||
|
SOCIAL CONTRACT
|
||
|
between an individual and the United States Government
|
||
|
|
||
|
WHEREAS I wish to reside on the North American continent, and
|
||
|
WHEREAS the United States Government controls the area of the
|
||
|
continent on which I wish to reside, and
|
||
|
WHEREAS tacit or implied contracts are vague and therefore
|
||
|
unenforceable,
|
||
|
|
||
|
I agree to the following terms:
|
||
|
|
||
|
SECTION 1: I will surrender a percentage of my property to the
|
||
|
Government. The actual percentage will be determined by the Government and
|
||
|
will be subject to change at any time. The amount to be surrended may be
|
||
|
based on my income, the value of my property, the value of my purchases, or
|
||
|
any other criteria the Government chooses. To aid the Government in
|
||
|
determining the percentage, I will apply for a Government identification
|
||
|
number that I will use for all of my major financial transactions.
|
||
|
|
||
|
SECTION 2: Should the Government demand it, I will surrender my liberty for
|
||
|
a period of time determined by the Government and typically no shorter than
|
||
|
two years. During that time, I will serve the Government in any way it
|
||
|
chooses, including military service in which I may be called upon to
|
||
|
sacrifice my life.
|
||
|
|
||
|
SECTION 3: I will limit my behavior as demanded by the Government. I will
|
||
|
consume the drugs only permitted by the Government. I will limit my sexual
|
||
|
activities to those permitted by the Government. I will forsake religious
|
||
|
beliefs that conflict with the Government's determination of propriety.
|
||
|
More limits may be imposed at any time.
|
||
|
|
||
|
SECTION 4: In consideration of the above the Government will allow me to
|
||
|
find employment, subject to limits that will be subject to the Government.
|
||
|
These limits may restrict my choice of career or the wages I may accept.
|
||
|
|
||
|
SECTION 5: The Government will permit me to reside in the area of North
|
||
|
America that it controls. Also the Government will permit me to speak
|
||
|
freely, subject to limits determined by the Government's Congress and
|
||
|
Supreme Court.
|
||
|
|
||
|
SECTION 6: The Government will attempt to protect my life and my claim to
|
||
|
the property that it has allowed me to keep. I agree not to hold the
|
||
|
Government liable if it fails to protect me or my property.
|
||
|
|
||
|
SECTION 7: The Government will offer various services to me. The nature
|
||
|
and extent of these services will be determined by the Government and are
|
||
|
subject to change at any time.
|
||
|
|
||
|
SECTION 8: The Government will determine whether I may vote for certain
|
||
|
Government officials. The influence of my vote will vary inversely with the
|
||
|
number of voters, and I understand that it will be typically miniscule. I
|
||
|
agree not to hold any elected Government officials liable for acting against
|
||
|
my best interests or for breaking promises, even if those promises motivated
|
||
|
me to vote for them.
|
||
|
|
||
|
SECTION 9: I agree that the Government may hold me fully liable if I fail
|
||
|
to abide by the above terms. In that event, the Government may confiscate
|
||
|
any property that I have not previously surrended to it, and may imprison me
|
||
|
for a period of time determined by the Government. I also agree that the
|
||
|
Government may alter the terms of this contract at any time.
|
||
|
|
||
|
|
||
|
______________________________________ ______________________________
|
||
|
SIGNATURE DATE
|
||
|
|
||
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
|
|
||
|
Electronic Petition to Oppose Clipper
|
||
|
Please Distribute Widely
|
||
|
|
||
|
On January 24, many of the nation's leading experts in cryptography
|
||
|
and computer security wrote President Clinton and asked him to
|
||
|
withdraw the Clipper proposal.
|
||
|
|
||
|
The public response to the letter has been extremely favorable,
|
||
|
including coverage in the New York Times and numerous computer and
|
||
|
security trade magazines.
|
||
|
|
||
|
Many people have expressed interest in adding their names to the
|
||
|
letter. In response to these requests, CPSR is organizing an
|
||
|
Internet petition drive to oppose the Clipper proposal. We will
|
||
|
deliver the signed petition to the White House, complete with the
|
||
|
names of all the people who oppose Clipper.
|
||
|
|
||
|
To sign on to the letter, send a message to:
|
||
|
|
||
|
Clipper.petition@cpsr.org
|
||
|
|
||
|
with the message "I oppose Clipper" (no quotes)
|
||
|
|
||
|
You will receive a return message confirming your vote.
|
||
|
|
||
|
Please distribute this announcement so that others may also express
|
||
|
their opposition to the Clipper proposal.
|
||
|
|
||
|
CPSR is a membership-based public interest organization. For
|
||
|
membership information, please email cpsr@cpsr.org. For more
|
||
|
information about Clipper, please consult the CPSR Internet Library -
|
||
|
FTP/WAIS/Gopher CPSR.ORG /cpsr/privacy/crypto/clipper
|
||
|
|
||
|
|
||
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
|
|
||
|
The President
|
||
|
The White House
|
||
|
Washington, DC 20500
|
||
|
|
||
|
Dear Mr. President:
|
||
|
|
||
|
We are writing to you regarding the "Clipper" escrowed encryption
|
||
|
proposal now under consideration by the White House. We wish to
|
||
|
express our concern about this plan and similar technical standards
|
||
|
that may be proposed for the nation's communications infrastructure.
|
||
|
|
||
|
The current proposal was developed in secret by federal agencies
|
||
|
primarily concerned about electronic surveillance, not privacy
|
||
|
protection. Critical aspects of the plan remain classified and thus
|
||
|
beyond public review.
|
||
|
|
||
|
The private sector and the public have expressed nearly unanimous
|
||
|
opposition to Clipper. In the formal request for comments conducted
|
||
|
by the Department of Commerce last year, less than a handful of
|
||
|
respondents supported the plan. Several hundred opposed it.
|
||
|
|
||
|
If the plan goes forward, commercial firms that hope to develop
|
||
|
new products will face extensive government obstacles. Cryptographers
|
||
|
who wish to develop new privacy enhancing technologies will be
|
||
|
discouraged. Citizens who anticipate that the progress of technology
|
||
|
will enhance personal privacy will find their expectations
|
||
|
unfulfilled.
|
||
|
|
||
|
Some have proposed that Clipper be adopted on a voluntary basis
|
||
|
and suggest that other technical approaches will remain viable. The
|
||
|
government, however, exerts enormous influence in the marketplace, and
|
||
|
the likelihood that competing standards would survive is small. Few
|
||
|
in the user community believe that the proposal would be truly
|
||
|
voluntary.
|
||
|
|
||
|
The Clipper proposal should not be adopted. We believe that if
|
||
|
this proposal and the associated standards go forward, even on a
|
||
|
voluntary basis, privacy protection will be diminished, innovation
|
||
|
will be slowed, government accountability will be lessened, and the
|
||
|
openness necessary to ensure the successful development of the
|
||
|
nation's communications infrastructure will be threatened.
|
||
|
|
||
|
We respectfully ask the White House to withdraw the Clipper
|
||
|
proposal.
|
||
|
|
||
|
|
||
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
|
|
||
|
THE WHITE HOUSE
|
||
|
Office of the Press Secretary
|
||
|
|
||
|
For Immediate Release
|
||
|
|
||
|
STATEMENT BY THE PRESS SECRETARY
|
||
|
|
||
|
The President today announced a new initiative that will bring
|
||
|
the Federal Government together with industry in a voluntary
|
||
|
program to improve the security and privacy of telephone
|
||
|
communications while meeting the legitimate needs of law
|
||
|
enforcement.
|
||
|
|
||
|
The initiative will involve the creation of new products to
|
||
|
accelerate the development and use of advanced and secure
|
||
|
telecommunications networks and wireless communications links.
|
||
|
|
||
|
For too long, there has been little or no dialogue between our
|
||
|
private sector and the law enforcement community to resolve the
|
||
|
tension between economic vitality and the real challenges of
|
||
|
protecting Americans. Rather than use technology to accommodate
|
||
|
the sometimes competing interests of economic growth, privacy and
|
||
|
law enforcement, previous policies have pitted government against
|
||
|
industry and the rights of privacy against law enforcement.
|
||
|
|
||
|
Sophisticated encryption technology has been used for years to
|
||
|
protect electronic funds transfer. It is now being used to
|
||
|
protect electronic mail and computer files. While encryption
|
||
|
technology can help Americans protect business secrets and the
|
||
|
unauthorized release of personal information, it also can be used
|
||
|
by terrorists, drug dealers, and other criminals.
|
||
|
|
||
|
A state-of-the-art microcircuit called the "Clipper Chip" has
|
||
|
been developed by government engineers. The chip represents a
|
||
|
new approach to encryption technology. It can be used in new,
|
||
|
relatively inexpensive encryption devices that can be attached to
|
||
|
an ordinary telephone. It scrambles telephone communications
|
||
|
using an encryption algorithm that is more powerful than many in
|
||
|
commercial use today.
|
||
|
|
||
|
This new technology will help companies protect proprietary
|
||
|
information, protect the privacy of personal phone conversations
|
||
|
and prevent unauthorized release of data transmitted
|
||
|
electronically. At the same time this technology preserves the
|
||
|
ability of federal, state and local law enforcement agencies to
|
||
|
intercept lawfully the phone conversations of criminals.
|
||
|
|
||
|
A "key-escrow" system will be established to ensure that the
|
||
|
"Clipper Chip" is used to protect the privacy of law-abiding
|
||
|
Americans. Each device containing the chip will have two unique
|
||
|
"keys," numbers that will be needed by authorized government
|
||
|
agencies to decode messages encoded by the device. When the
|
||
|
device is manufactured, the two keys will be deposited separately
|
||
|
in two "key-escrow" data bases that will be established by the
|
||
|
Attorney General. Access to these keys will be limited to
|
||
|
government officials with legal authorization to conduct a
|
||
|
wiretap.
|
||
|
|
||
|
The "Clipper Chip" technology provides law enforcement with no
|
||
|
new authorities to access the content of the private
|
||
|
conversations of Americans.
|
||
|
|
||
|
To demonstrate the effectiveness of this new technology, the
|
||
|
Attorney General will soon purchase several thousand of the new
|
||
|
devices. In addition, respected experts from outside the
|
||
|
government will be offered access to the confidential details of
|
||
|
the algorithm to assess its capabilities and publicly report
|
||
|
their findings.
|
||
|
|
||
|
The chip is an important step in addressing the problem of
|
||
|
encryption's dual-edge sword: encryption helps to protect the
|
||
|
privacy of individuals and industry, but it also can shield
|
||
|
criminals and terrorists. We need the "Clipper Chip" and other
|
||
|
approaches that can both provide law-abiding citizens with access
|
||
|
to the encryption they need and prevent criminals from using it
|
||
|
to hide their illegal activities. In order to assess technology
|
||
|
trends and explore new approaches (like the key-escrow system),
|
||
|
the President has directed government agencies to develop a
|
||
|
comprehensive policy on encryption that accommodates:
|
||
|
|
||
|
the privacy of our citizens, including the need to
|
||
|
employ voice or data encryption for business purposes;
|
||
|
|
||
|
the ability of authorized officials to access telephone
|
||
|
calls and data, under proper court or other legal
|
||
|
order, when necessary to protect our citizens;
|
||
|
|
||
|
the effective and timely use of the most modern
|
||
|
technology to build the National Information
|
||
|
Infrastructure needed to promote economic growth and
|
||
|
the competitiveness of American industry in the global
|
||
|
marketplace; and
|
||
|
|
||
|
the need of U.S. companies to manufacture and export
|
||
|
high technology products.
|
||
|
|
||
|
The President has directed early and frequent consultations with
|
||
|
affected industries, the Congress and groups that advocate the
|
||
|
privacy rights of individuals as policy options are developed.
|
||
|
|
||
|
The Administration is committed to working with the private
|
||
|
sector to spur the development of a National Information
|
||
|
Infrastructure which will use new telecommunications and computer
|
||
|
technologies to give Americans unprecedented access to
|
||
|
information. This infrastructure of high-speed networks
|
||
|
("information superhighways") will transmit video, images, HDTV
|
||
|
programming, and huge data files as easily as today's telephone
|
||
|
system transmits voice.
|
||
|
|
||
|
Since encryption technology will play an increasingly important
|
||
|
role in that infrastructure, the Federal Government must act
|
||
|
quickly to develop consistent, comprehensive policies regarding
|
||
|
its use. The Administration is committed to policies that
|
||
|
protect all American's right to privacy while also protecting
|
||
|
them from those who break the law.
|
||
|
|
||
|
Further information is provided in an accompanying fact sheet.
|
||
|
The provisions of the President's directive to acquire the new
|
||
|
encryption technology are also available.
|
||
|
|
||
|
For additional details, call Mat Heyman, National Institute of
|
||
|
Standards and Technology, (301) 975-2758.
|
||
|
|
||
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
|
|
||
|
ISDN Contacts (RBOCS)
|
||
|
|
||
|
Editor's Note:
|
||
|
This is a list sent to us regarding getting more info on ISDN from the
|
||
|
RBOCS. We claim no accuracy to this info. I am sure that most, if not
|
||
|
all of it is valid. If you need ISDN info, feel free to contact one
|
||
|
of the organizations below.
|
||
|
|
||
|
|
||
|
COMPANY CONTACT TELEPHONE NO.
|
||
|
|
||
|
AMERITECH National ISDN Hotline 1-800-543-ISDN
|
||
|
BELL ATLANTIC ISDN Sales & Technology Center 1-800-570-ISDN
|
||
|
BELL SOUTH National ISDN HotLine 1-800-428-ISDN
|
||
|
CINCINNATI BELL ISDN Service Center 1-513-566-DATA
|
||
|
NYNEX ISDN Information Hotline 1-800-GET-ISDN
|
||
|
or Roy Ray 1-914-644-5152
|
||
|
PACIFIC BELL ISDN Information or Wayne Purves, 1-800-622-0735
|
||
|
NI-1 Product Mgr. 1-510-823-5118
|
||
|
SNET Donovan Dillon 1-203-553-2369
|
||
|
STENTOR (Canada) Steve Finlay 1-604-432-3527
|
||
|
SOUTHWESTERN BELL Cyd McInerney 1-314-235-1567
|
||
|
U S WEST Louise Walsh 1-303-965-7073
|
||
|
|
||
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
|
|
||
|
BELLSOUTH ANNOUNCES LARGEST GEOGRAPHIC DEPLOYMENT OF ISDN IN THE NATION
|
||
|
|
||
|
Advanced telecommuting telemedicine and education applications will become
|
||
|
the most widely available in the nation as a result of a technology
|
||
|
deployment plan announced today by BellSouth Telecommunications.
|
||
|
|
||
|
The nine-state introduction of a new way to provide Integrated Services
|
||
|
Digital Network (ISDN), which combines voice, data and video services,
|
||
|
begins in June 1994. ISDN can use advanced fiber optic cable or
|
||
|
traditional copper cable to transmit multiple services.
|
||
|
|
||
|
Until now, a customer who wished to use ISDN needed to be served by a
|
||
|
telephone office that was ISDN capable. With the innovative approach by
|
||
|
BellSouth, a customer can obtain the benefits of ISDN through an alternate
|
||
|
serving arrangement which eradicates geographic boundaries.
|
||
|
|
||
|
"Expanded access to ISDN will facilitate customer-oriented applications
|
||
|
since there are fewer technological and geographic limitations on
|
||
|
availability," said Larry Carter, assistant vice president of product
|
||
|
management for BellSouth Telecommunications.
|
||
|
|
||
|
This announcement is the latest in a very aggressive deployment strategy
|
||
|
for ISDN.
|
||
|
|
||
|
-- In July 1992, Bellsouth announced the nation's first metropolitan-wide
|
||
|
deployment of ISDN in the cities of Huntsville and Madison, Ala.
|
||
|
|
||
|
-- Six months later, South Central Bell customers throughout the state
|
||
|
of Tennessee were offered ISDN Individual Line Service and now ISDN
|
||
|
availability is being expanded region wide.
|
||
|
|
||
|
This announcement significantly increases the percentage of customers
|
||
|
with access to ISDN capabilities and will ultimately lead to 100% of
|
||
|
BellSouth customers. Until now, 50% of BellSouth's customers in major
|
||
|
metropolitan areas had direct access to ISDN and 320 central offices were
|
||
|
equipped with ISDN. The expanded access applies to ISDN Individual Line
|
||
|
(2B+D) and MegaLink (SM) ISDN Service which is BellSouth's primary rate
|
||
|
(23B+D) offering.
|
||
|
|
||
|
"Previously, you had to be served directly by a central office switch
|
||
|
equipped with ISDN capability. Under this new alternate serving
|
||
|
arrangement, ISDN capabilities can be routed from a nearby ISDN-capable
|
||
|
switch to your home or office -- at no additional charge. This
|
||
|
arrangement is a cost-effective and expeditious method of deploying
|
||
|
ISDN region wide," Carter said.
|
||
|
|
||
|
ISDN availability is an important part of the information superhighway
|
||
|
providing access at lower speeds. For example, through distance
|
||
|
learning, advanced classes could be transported at very high speeds
|
||
|
to a customer's city on the information highway from a university in
|
||
|
another city. This high speed signal is then divided into lower speeds
|
||
|
and redistributed within the city. ISDN would make these classes
|
||
|
available to any school anywhere.
|
||
|
|
||
|
Dr. Ira Denton, chief surgeon at Crestwood Hospital in Huntsville, Ala.,
|
||
|
has used ISDN to send, receive and annotate X-rays and video images
|
||
|
while talking to other physicians. Because ISDN is available citywide
|
||
|
and there are no geographic restrictions, physicians can communicate
|
||
|
through ISDN from any of their offices and even their homes.
|
||
|
|
||
|
"Health care specialists as well as any other businesses that have
|
||
|
multiple locations within a metropolitan area can benefit from this new
|
||
|
capability," Carter added. "The education industry will especially benefit
|
||
|
from applications including distance learning, security and truancy
|
||
|
monitoring."
|
||
|
|
||
|
To aid in marketing ISDN, last year BellSouth announced the "ISDN
|
||
|
Applications and Solutions Plus" (IAS+) initiative where strategic
|
||
|
marketing alliances are formed in major metropolitan areas to provide
|
||
|
customers with complete and innovative solutions. This initiative in
|
||
|
addition to the expanded access will make ISDN applications more readily
|
||
|
available for BellSouth customers.
|
||
|
|
||
|
BellSouth Telecommunications, Inc., with headquarters in Atlanta, provides
|
||
|
telecommunications services in the BellSouth (NYSE: BLS) region. BellSouth
|
||
|
Telecommunications, Inc. does business as Southern Bell in North Carolina,
|
||
|
South Carolina, Georgia and Florida, and as South Central Bell in
|
||
|
Kentucky, Tennessee, Alabama, Mississippi and Louisiana. These
|
||
|
companies serve more than 19 million local telephone lines and provide
|
||
|
local exchange and intraLATA long distance service over one of the most
|
||
|
modern telecommunications networks in the world.
|
||
|
|
||
|
CONTACT:
|
||
|
Karen M. Roughton of BellSouth Telecommunications, 404-529-6514
|
||
|
BellSouth National ISDN HotLine, 1-800-428-4736
|
||
|
|
||
|
Posted by:
|
||
|
Bellcore ISDN Hotline 1-800-992-ISDN
|
||
|
|
||
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
|
|
||
|
A CATALOG OF NATIONAL ISDN SOLUTIONS ...
|
||
|
|
||
|
The files in this directory compose the final draft
|
||
|
of "A Catalog of National ISDN Solutions for Selected NIUF
|
||
|
Applications, Second Edition." This document was
|
||
|
approved as an official product of the North American ISDN Users'
|
||
|
Forum on February 11, 1994.
|
||
|
|
||
|
The Catalog is intended for anyone who needs detailed
|
||
|
information on how ISDN can be used today to support a wide
|
||
|
variety of applications. Each of the 61 solution guides includes a
|
||
|
description, picture, details on what to look for in end-systems, and
|
||
|
what to ask for from the ISDN provider. A separate chapter
|
||
|
presents one page summaries of over 200 products and services
|
||
|
from over 100 companies. The new Catalog goes far beyond the First
|
||
|
Edition. For the decision maker, example "feasibility studies" are
|
||
|
included to help support a business' decision to use ISDN. Each
|
||
|
solution is rewritten to be more accessible. The solutions cover
|
||
|
National ISDN-1, National ISDN-2, BRI, and PRI. Applications
|
||
|
range from multipoint videoconferencing to point of sale,
|
||
|
telecommuting to PBX interflow. For the more technical reader,
|
||
|
additional detailed information is included on a variety of topics.
|
||
|
|
||
|
CONTENTS
|
||
|
|
||
|
0.ps Title page, Preface, Table of Contents, etc.
|
||
|
1.ps Introduction
|
||
|
2.ps ISDN - A Decision Maker's Perspective
|
||
|
3.0.ps National ISDN Solutions
|
||
|
3.1.A.ps NI-1 BRI Local Area Network (LAN) Solutions
|
||
|
Integrating telephones and workstations
|
||
|
Access on demand to local-area networks
|
||
|
High performance access on demand to local-area
|
||
|
networks Linking workstations with supercomputers
|
||
|
Leased line replacement
|
||
|
3.1.B.ps NI-1 BRI Screen Sharing Solutions
|
||
|
Screen sharing for two users
|
||
|
Screen sharing for many users
|
||
|
Screen sharing with workstations connected to a
|
||
|
remote LAN
|
||
|
3.1.C.ps NI-1 BRI Video Solutions
|
||
|
Desktop videoconferencing
|
||
|
Centralized management of video images
|
||
|
Videoconferencing facilities
|
||
|
3.1.D.ps NI-1 BRI Voice & Data Solutions
|
||
|
Caller identification
|
||
|
Call coverage
|
||
|
ACD agent at home
|
||
|
3.1.E.ps NI-1 BRI File Transfer Solutions
|
||
|
Flexible bandwidth allocation
|
||
|
File transfer between personal computers
|
||
|
File transfer between a personal computer and a host
|
||
|
computer
|
||
|
High speed transfer of large text and image files
|
||
|
3.1.F.ps NI-1 BRI Work-At-Home Solutions
|
||
|
Telecommuting with casual data requirements
|
||
|
Telecommuting and transferring files
|
||
|
Telecommuting accessing interactive services
|
||
|
High performance telecommuting (interactive
|
||
|
graphics and text)
|
||
|
3.1.G. NI-1 BRI Facsimile and Imaging Solutions
|
||
|
Group 3 facsimile
|
||
|
Receiving faxes as electronic documents
|
||
|
High speed access to electronic document image
|
||
|
systems
|
||
|
Multimedia real estate listings
|
||
|
Medical document imaging
|
||
|
3.1.H.ps NI-1 BRI Transaction Services Solutions
|
||
|
Credit card authorization at the point of sale
|
||
|
Electronic Data Interchange (EDI)
|
||
|
Insurance verification at the point of service
|
||
|
Supermarket checkout
|
||
|
3.1.I.ps Other NI-1 BRI Solutions
|
||
|
Access to IBM mainframes and compatibles
|
||
|
Remote access to minicomputers
|
||
|
Integrating voice and data communications
|
||
|
Integrated communications and messaging
|
||
|
Automatic utility meter reading
|
||
|
University dormitory
|
||
|
Access to frame relay services
|
||
|
Switched access to frame relay services
|
||
|
High fidelity voice transmission systems
|
||
|
3.2.ps National ISDN-2 BRI Solutions
|
||
|
Roll about videoconferencing
|
||
|
X.25 backup
|
||
|
Packet mode screen sharing for many users
|
||
|
Home office
|
||
|
3.3.0.ps National ISDN-2 PRI Solutions
|
||
|
3.3.A.ps NI-2 PRI Local Area Network (LAN) Solutions
|
||
|
Local-area network interconnection
|
||
|
File transfer and LAN access in PBX environment
|
||
|
Private line overflow and disaster recovery
|
||
|
ISDN concentrator for campus connectivity
|
||
|
3.3.B.ps NI-2 PRI Video Solutions
|
||
|
PRI Videoconferencing
|
||
|
Multimedia desktop video via Ethernet and
|
||
|
Multirate ISDN
|
||
|
Multipoint videoconferencing
|
||
|
Videoconferencing facilities
|
||
|
3.3.C.ps NI-2 PRI Voice & Data Solutions
|
||
|
Caller identification to PBXs and other devices
|
||
|
Emergency-services call management
|
||
|
Call by Call Service Selection
|
||
|
3.3.D.ps NI-2 PRI Facsimile and Imaging Solutions
|
||
|
Fax mail
|
||
|
Teleradiology
|
||
|
3.3.E.ps Other NI-2 PRI Solutions
|
||
|
High quality audio transmission
|
||
|
Access to litigation support system
|
||
|
Call center load balancing
|
||
|
Networked voice messaging systems
|
||
|
4.0&1.ps National ISDN Product Information and Industry
|
||
|
Contacts
|
||
|
4.2.1.ps Basic Rate Terminal Adapters
|
||
|
4.2.2.ps Basic Rate Interface Cards for Personal Computers,
|
||
|
Workstations, and Minicomputers; Workstations
|
||
|
with Built-in ISDN
|
||
|
4.2.3.ps Attendant Consoles
|
||
|
4.2.4.ps ISDN Phones
|
||
|
4.2.5.ps Single Port ISDN LAN Bridges
|
||
|
4.2.6.ps Communications Servers, Routers, Bridges, and
|
||
|
Multiport ISDN LAN Bridges and Routers
|
||
|
4.2.7.ps Inverse Multiplexers, Multiplexers, and
|
||
|
Communications Controllers
|
||
|
4.2.8.ps PRI Adapters
|
||
|
4.2.9.ps Videoconferencing Systems and Multipoint Control
|
||
|
Units
|
||
|
4.2.10.ps Other Products
|
||
|
4.2.11.ps Network Terminations (NT-1s)
|
||
|
4.2.12.ps Power Supplies
|
||
|
4.2.13.ps Software and Services
|
||
|
4.2.14.ps Private Network Solutions and Private Branch
|
||
|
Exchanges(PBXs)
|
||
|
4.2.15.ps Service Providers
|
||
|
4.3.ps Supplier Contact Information
|
||
|
5.1.ps Selected Topics in ISDN
|
||
|
Call Types and Bearer Capabilites
|
||
|
Terminal Endpoint Identifiers (TEIs)
|
||
|
Service Profile Identifiers (SPIDs)
|
||
|
Rate Adaptation: V.110/V.120
|
||
|
Lower Layer Compatibility (LLC) and Higher Layer
|
||
|
Compatibility (HLC) Information Elements
|
||
|
Signaling System 7 (SS7) Interconnection
|
||
|
Multiline Hunt Group
|
||
|
Powering and Wiring of Customer Equipment
|
||
|
Configurations for High Bandwidth Applications
|
||
|
Communications Server Alternatives
|
||
|
NIUF ISDN Interface Groups (NIIGs) and Parameter
|
||
|
Groups (NIPGs)
|
||
|
Additional Information Applicable to Many ISDN
|
||
|
Solutions
|
||
|
Conformance Testing
|
||
|
5.2.ps ISDN Signaling Diagrams
|
||
|
6.ps Bibliography
|
||
|
7.ps Glossary of Terms
|
||
|
8.ps Acronym List
|
||
|
A.ps Annex: How the NIUF is making real the promise of
|
||
|
ISDN An Overview of the North American ISDN Users'
|
||
|
Forum (NIUF)
|
||
|
Relevance of this NIUF Catalog
|
||
|
Application Profiles
|
||
|
Implementation Agreements
|
||
|
Versions
|
||
|
Conformance Criteria and ISDN Testing
|
||
|
Application Software Interfaces
|
||
|
Cost Justification Worksheet
|
||
|
I.ps Index
|
||
|
|
||
|
|
||
|
All of the above files are uncompressed PostScript files and may
|
||
|
be FTPed using the text/ASCII option.
|
||
|
|
||
|
The Catalog is a publicly available document and may be
|
||
|
distributed and used freely with proper recognition of the source.
|
||
|
|
||
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
|
|
||
|
SPRINT EXPANDS PRESENCE IN CHINA, INTRODUCES NEW SERVICES
|
||
|
|
||
|
|
||
|
Interesting press release I thought you might like.
|
||
|
|
||
|
THIS RELEASE WAS DISTRIBUTED IN CHINA ONLY.
|
||
|
Contacts: Janis Langley, (O) 202-828-7427
|
||
|
|
||
|
BEIJING, March 21, 1994 -- Sprint today announced a
|
||
|
significant expansion of its presence, and product and service
|
||
|
offerings, in China. Sprint also announced the immediate availability
|
||
|
of three of those services -- a toll-free Sprint Express(R) number for
|
||
|
calling worldwide and for collect calling to the United States, a
|
||
|
prepaid calling card, and CLEARLINE(R) international private-line
|
||
|
service.
|
||
|
|
||
|
Sprint made the announcements today at a press briefing and
|
||
|
two-day seminar to inform customers and leading Chinese organizations
|
||
|
of the company's expanded local capabilities.
|
||
|
|
||
|
Sprint is one of the largest telecommunications carriers in
|
||
|
the United States, providing innovative calling services to nearly 8
|
||
|
million customers in that country alone. Sprint offers voice, video
|
||
|
and data communications services worldwide via some of the world's
|
||
|
largest and most advanced networks.
|
||
|
|
||
|
Sprint is a pioneer and innovator in technology. It built
|
||
|
the first nationwide (40,000 kilometer) all-digital, fiber-optic
|
||
|
network in the United States. It also is the first carrier to offer
|
||
|
such advanced services as Asynchronous Transfer Mode -- a broadband
|
||
|
service that simultaneously carries voice, data and image -- and a
|
||
|
voice-recognition calling card that automatically dials frequently
|
||
|
called numbers with a single-word command, such as "home" or "office."
|
||
|
|
||
|
Sprint has operated locally in China since 1992 through an
|
||
|
office in Beijing that primarily offered data communications systems
|
||
|
support for the company's growing customer base. Its Beijing office
|
||
|
now has expanded to 15 employees who represent the company's
|
||
|
increasingly diverse capabilities in consumer services, including the
|
||
|
Sprint Prepaid Calling Card and Sprint FONCARD(SM); international
|
||
|
network solutions for large-scale multinational users; data
|
||
|
communications systems and services; and international carrier
|
||
|
services to provide transit and capacity for telecommunications
|
||
|
carriers worldwide.
|
||
|
|
||
|
Sprint China will immediately begin to offer several of
|
||
|
Sprint's versatile and cost-effective calling products: a toll-free
|
||
|
Sprint Express number for global calling and collect calls to the
|
||
|
United States; Sprint's Prepaid Calling Card; and its CLEARLINE
|
||
|
international private line service.
|
||
|
|
||
|
o Sprint Express -- By dialing "108-13," callers in China can
|
||
|
place collect calls to family and colleagues in the United States,
|
||
|
and also charge calls to the United States and worldwide using
|
||
|
their major credit card or Sprint FONCARD. Operator assistance is
|
||
|
available in English, with Mandarin support planned.
|
||
|
|
||
|
o Sprint's Prepaid Calling Card, which initially will be
|
||
|
available only through a limited market test, lets consumers pre-
|
||
|
purchase calling credits that they can use from any telephone
|
||
|
without needing exact change. The card carries attractive
|
||
|
designer graphics -- suitable for collectors -- and offers the
|
||
|
added convenience of operator assistance.
|
||
|
|
||
|
Callers can use the prepaid calling card from nearly 30
|
||
|
countries for calls to virtually any other country worldwide --
|
||
|
including the United States. Mandarin-language instructions are
|
||
|
available for calls from China (by dialing 108-16). The card can also
|
||
|
be used in more than 28 countries worldwide to make calls back to
|
||
|
China or to virtually anywhere in the world.
|
||
|
|
||
|
o CLEARLINE international private-line service lets
|
||
|
large-scale users consolidate their international calling to receive
|
||
|
volume discounts. The service is provided via Sprint's worldwide
|
||
|
network, which extends from the United States through its
|
||
|
participation in virtually every major submarine fiber-optic cable
|
||
|
system project.
|
||
|
|
||
|
"Sprint has been active in China for several years, and we
|
||
|
are delighted to be able to expand our commitment to users in this
|
||
|
important market by offering some of the other feature-rich, cost
|
||
|
effective products popular in the United States and worldwide," said
|
||
|
Herb Bradley, China country manager for Sprint International, Sprint's
|
||
|
global telecommunications subsidiary.
|
||
|
|
||
|
"We believe that businesses and consumers will benefit from
|
||
|
these innovative services as much in China as they have in the United
|
||
|
States, and we look forward to building on strong relationships we
|
||
|
have formed with many Chinese organizations in delivering these new
|
||
|
services," he said.
|
||
|
|
||
|
Elsewhere in the Pacific Rim, Sprint has data network points
|
||
|
of presence in Hong Kong, Indonesia, Japan, Korea, Taiwan, Singapore,
|
||
|
Australia and New Zealand. It also has an office in Hong Kong, which
|
||
|
provides sales and technical support for Sprint's business interests
|
||
|
in Hong Kong, Indochina, Indonesia, Malaysia, the Philippines, Taiwan,
|
||
|
Thailand and Singapore.
|
||
|
|
||
|
Sprint operates fiber-optic and value-added networks that are
|
||
|
among the world's largest, offering voice services to over 290
|
||
|
countries and locations, packet-switched data links to more than
|
||
|
120 countries and international locations, and video services via
|
||
|
one of the world's largest videoconferencing networks, serving
|
||
|
nearly 40 countries. Sprint also has U.S. cellular operations that
|
||
|
serve 42 metropolitan markets and more than 50 rural service
|
||
|
areas. The company has more than 50,000 employees and has
|
||
|
operations in six continents through more than 50 subsidiaries,
|
||
|
joint ventures and distributors. Sprint's customers include 80
|
||
|
percent of the 500 largest U.S. industrial corporations (the
|
||
|
"Fortune 500"), and the U.S. federal government, which awarded
|
||
|
Sprint a contract to provide 40 percent of the government's total
|
||
|
long distance services, and data and video services, over a
|
||
|
10-year period.
|
||
|
|
||
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
|
|
||
|
SOCIAL SECURITY FAQ
|
||
|
HOW TO GET INFORMATION AND HOW TO PROTECT YOUR OWN
|
||
|
|
||
|
By Chris Hibbert (hibbert@netcom.com)
|
||
|
Computer Professionals For Social Responsibility
|
||
|
|
||
|
Many people are concerned about the number of organizations asking for their
|
||
|
Social Security Numbers. They worry about invasions of privacy and the
|
||
|
oppressive feeling of being treated as just a number. Unfortunately, I
|
||
|
can't offer any hope about the dehumanizing effects of identifying you with
|
||
|
your numbers. I *can* try to help you keep your Social Security Number
|
||
|
from being used as a tool in the invasion of your privacy.
|
||
|
|
||
|
Surprisingly, government agencies are reasonably easy to deal with; private
|
||
|
organizations are much more troublesome. Federal law restricts the agencies
|
||
|
at all levels of government that can demand your number and a fairly
|
||
|
complete disclosure is required even if its use is voluntary. There are no
|
||
|
comparable Federal laws restricting the uses non-government organizations
|
||
|
can make of it, or compelling them to tell you anything about their plans.
|
||
|
Some states have recently enacted regulations on collection of SSNs by
|
||
|
private entities. With private institutions, your main recourse is refusing
|
||
|
to do business with anyone whose terms you don't like. They, in turn, are
|
||
|
allowed to refuse to deal with you on those terms.
|
||
|
|
||
|
|
||
|
Short History
|
||
|
|
||
|
Social Security numbers were introduced by the Social Security Act of 1935.
|
||
|
They were originally intended to be used only by the social security
|
||
|
program. In 1943 Roosevelt signed Executive Order 9397 which required
|
||
|
federal agencies to use the number when creating new record-keeping systems.
|
||
|
In 1961 the IRS began to use it as a taxpayer ID number. The Privacy Act of
|
||
|
1974 required authorization for government agencies to use SSNs in their
|
||
|
data bases and required disclosures (detailed below) when government
|
||
|
agencies request the number. Agencies which were already using SSN as an
|
||
|
identifier before January 1, 1975 were allowed to continue using it. The
|
||
|
Tax Reform Act of 1976 gave authority to state or local tax, welfare,
|
||
|
driver's license, or motor vehicle registration authorities to use the
|
||
|
number in order to establish identities. The Privacy Protection Study
|
||
|
Commission of 1977 recommended that the Executive Order be repealed after
|
||
|
some agencies referred to it as their authorization to use SSNs. I don't
|
||
|
know whether it was repealed, but no one seems to have cited EO 9397 as
|
||
|
their authorization recently.
|
||
|
|
||
|
Several states use the SSN as a driver's license number, while others record
|
||
|
it on applications and store it in their database. Some states that
|
||
|
routinely use it on the license will make up another number if you insist.
|
||
|
According to the terms of the Privacy Act, any that have a space for it on
|
||
|
the application forms should have a disclosure notice. Many don't, and
|
||
|
until someone takes them to court, they aren't likely to change. (Though
|
||
|
New York recently agreed to start adding the notice on the basis of a letter
|
||
|
written by a reader of this blurb.)
|
||
|
|
||
|
The Privacy Act of 1974 (Pub. L. 93-579) requires that any federal, state,
|
||
|
or local government agency that requests your Social Security Number has to
|
||
|
tell you four things:
|
||
|
|
||
|
1: Whether disclosure of your Social Security Number is required or
|
||
|
optional,
|
||
|
|
||
|
2: What statute or other authority they have for asking for your number,
|
||
|
|
||
|
3: How your Social Security Number will be used if you give it to them, and
|
||
|
|
||
|
4: The consequences of failure to provide an SSN.
|
||
|
|
||
|
In addition, the Act says that only Federal law can make use of the Social
|
||
|
Security Number mandatory. So anytime you're dealing with a government
|
||
|
institution and you're asked for your Social Security Number, just look for
|
||
|
the Privacy Act Statement. If there isn't one, complain and don't give your
|
||
|
number. If the statement is present, read it. If it says giving your
|
||
|
Social Security Number is voluntary, you'll have to decide for yourself
|
||
|
whether to fill in the number.
|
||
|
|
||
|
|
||
|
Private Organizations
|
||
|
|
||
|
The guidelines for dealing with non-governmental institutions are much more
|
||
|
tenuous. Most of the time private organizations that request your Social
|
||
|
Security Number can get by quite well without your number, and if you can
|
||
|
find the right person to negotiate with, they'll willingly admit it. The
|
||
|
problem is finding that right person. The person behind the counter is
|
||
|
often told no more than "get the customers to fill out the form completely."
|
||
|
|
||
|
Most of the time, you can convince them to use some other number. Usually
|
||
|
the simplest way to refuse to give your Social Security Number is simply to
|
||
|
leave the appropriate space blank. One of the times when this isn't a
|
||
|
strong enough statement of your desire to conceal your number is when
|
||
|
dealing with institutions which have direct contact with your employer.
|
||
|
Most employers have no policy against revealing your Social Security Number;
|
||
|
they apparently believe that it must be an unintentional slip when an
|
||
|
employee doesn't provide an SSN to everyone who asks.
|
||
|
|
||
|
Public utilities (gas, electric, phone, etc.) are considered to be private
|
||
|
organizations under the laws regulating SSNs. Most of the time they ask for
|
||
|
an SSN, and aren't prohibited from asking for it, but they'll usually relent
|
||
|
if you insist. Ask to speak to a supervisor, insist that they document a
|
||
|
corporate policy requiring it, ask about alternatives, ask why they need it
|
||
|
and suggest alternatives.
|
||
|
|
||
|
Lenders and Borrowers
|
||
|
(those who send reports to the IRS)
|
||
|
|
||
|
Banks and credit card issuers and various others are required by the IRS to
|
||
|
report the SSNs of account holders to whom they pay interest or when they
|
||
|
charge interest and report it to the IRS. If you don't tell them your
|
||
|
number you will probably either be refused an account or be charged a
|
||
|
penalty such as withholding of taxes on your interest.
|
||
|
|
||
|
Most banks send your name, address, and SSN to a company called ChexSystem
|
||
|
when you open an account. ChexSystem keeps a database of people whose
|
||
|
accounts have been terminated for fraud or chronic insufficient funds in the
|
||
|
past 5 years. ChexSystems is covered by the Fair Credit Reporting Act, and
|
||
|
the bank is required to let you know if it refuses to open your account
|
||
|
and a report from ChexSystems was a factor. You can also send a letter to
|
||
|
ChexSystems directly and request a copy of your report.
|
||
|
|
||
|
Many Banks, Brokerages, and other financial institutions have started
|
||
|
implementing automated systems to let you check your balance. All too often,
|
||
|
they are using SSNs as the PIN that lets you get access to your personal
|
||
|
account information. If your bank does this to you, write them a letter
|
||
|
pointing out how common it is for the people with whom you have financial
|
||
|
business to know your SSN. Ask them to change your PIN, and if you feel
|
||
|
like doing a good deed, ask them to stop using the SSN as a default
|
||
|
identifier for their other customers. Some customers will believe that
|
||
|
there's some security in it, and be insufficiently protective of their
|
||
|
account numbers.
|
||
|
|
||
|
Sometimes banks provide for a customer-supplied password, but are reluctant
|
||
|
to advertise it. The only way to find out is to ask if they'll let you
|
||
|
provide a password. (This is reportedly true of Citibank Visa, e.g. They
|
||
|
ask for a phone number but are willing to accept any password.)
|
||
|
|
||
|
When buying (and possibly refinancing) a house, most banks will now ask for
|
||
|
your Social Security Number on the Deed of Trust. This is because the
|
||
|
Federal National Mortgage Association recently started requiring it. The
|
||
|
fine print in their regulation admits that some consumers won't want to give
|
||
|
their number, and allows banks to leave it out when pressed. [It first
|
||
|
recommends getting it on the loan note, but then admits that it's already on
|
||
|
various other forms that are a required part of the package, so they already
|
||
|
know it. The Deed is a public document, so there are good reasons to refuse
|
||
|
to put it there, even though all parties to the agreement already have
|
||
|
access to your number.]
|
||
|
|
||
|
Insurers, Hospitals, Doctors
|
||
|
|
||
|
No laws require medical service providers to use your Social Security Number
|
||
|
as an ID number (except for Medicare, Medicaid, etc.) They often use it
|
||
|
because it's convenient or because your employer uses it to identify
|
||
|
employees to its groups health plan. In the latter case, you have to get
|
||
|
your employer to change their policies. Often, the people who work in
|
||
|
personnel assume that the employer or insurance company requires use of the
|
||
|
SSN when that's not really the case. When a previous employer asked for my
|
||
|
SSN for an insurance form, I asked them to try to find out if they had to
|
||
|
use it. After a week they reported that the insurance company had gone
|
||
|
along with my request and told me what number to use. Blood banks also ask
|
||
|
for the number but are willing to do without if pressed on the issue.
|
||
|
After I asked politely and persistently, the blood bank I go to agreed that
|
||
|
they didn't have any use for the number. They've now expunged my SSN from
|
||
|
their database, and they seem to have taught their receptionists not to
|
||
|
request the number.
|
||
|
|
||
|
Most insurance companies share access to old claims through the Medical
|
||
|
Information Bureau. If your insurance company uses your SSN, other
|
||
|
insurance companies will have a much easier time finding out about your
|
||
|
medical history. You can get a copy of the file MIB keeps on you by writing
|
||
|
to Medical Information Bureau, P.O. Box 105, Essex Station, Boston, MA
|
||
|
02112. Their phone number is (617)426-3660.
|
||
|
|
||
|
If an insurance agent asks for your Social Security Number in order to
|
||
|
"check your credit", point out that the contract is invalid if your check
|
||
|
bounces or your payment is late. They don't need to know what your credit
|
||
|
is like, just whether you've paid them.
|
||
|
|
||
|
Children
|
||
|
|
||
|
The Family Support Act of 1988 (Pub. L. 100-485) requires states to require
|
||
|
parents to give their Social Security Numbers in order to get a birth
|
||
|
certificate issued for a newborn. The law allows the requirement to be
|
||
|
waived for "good cause", but there's no indication of what may qualify.
|
||
|
|
||
|
The IRS requires taxpayers to report SSNs for dependents over one year of
|
||
|
age, but the requirement can be avoided if you're prepared to document the
|
||
|
existence of the child by other means if challenged. The law on this can be
|
||
|
found at 26 USC 6109. The penalty for not giving a dependant's number is
|
||
|
only $5. Several people have reported that they haven't provided SSNs for
|
||
|
their dependents for several years, and haven't been challenged by the IRS.
|
||
|
|
||
|
Universities and Colleges
|
||
|
|
||
|
Universities that accept federal funds are subject to the Family Educational
|
||
|
Rights and Privacy Act of 1974 (the "Buckley Amendment"), which prohibits
|
||
|
them from giving out personal information on students without permission.
|
||
|
There is an exception for directory information, which is limited to names,
|
||
|
addresses, and phone numbers, and another exception for release of
|
||
|
information to the parents of minors. There is no exception for Social
|
||
|
Security Numbers, so covered Universities aren't allowed to reveal students'
|
||
|
numbers without their permission. In addition, state universities are bound
|
||
|
by the requirements of the Privacy Act, which requires them to provide the
|
||
|
disclosures mentioned above. If they make uses of the SSN which aren't
|
||
|
covered by the disclosure they are in violation.
|
||
|
|
||
|
Why SSNs are a bad choice for UIDs in data bases
|
||
|
|
||
|
Database designers continue to introduce the Social Security Number as the
|
||
|
key when putting together a new database or when re-organizing an old one.
|
||
|
Some of the qualities that are (often) useful in a key and that people think
|
||
|
they are getting from the SSN are Uniqueness, Universality, Security, and
|
||
|
Identification. When designing a database, it is instructive to consider
|
||
|
which of these qualities are actually important in your application; many
|
||
|
designers assume unwisely that they are all useful for every application,
|
||
|
when in fact each is occasionally a drawback. The SSN provides none of
|
||
|
them, so designs predicated on the assumption that it does provide them will
|
||
|
fail in a variety of ways.
|
||
|
|
||
|
Uniqueness
|
||
|
|
||
|
Many people assume that Social Security Numbers are unique. They were
|
||
|
intended by the Social Security Administration to be unique, but the SSA
|
||
|
didn't take sufficient precautions to ensure that it would be so. They have
|
||
|
several times given a previously issued number to someone with the same name
|
||
|
and birth date as the original recipient, thinking it was the same person
|
||
|
asking again. There are a few numbers that were used by thousands of people
|
||
|
because they were on sample cards shipped in wallets by their manufacturers.
|
||
|
(One is given below.)
|
||
|
|
||
|
The passage of the Immigration reform law in 1986 caused an increase in the
|
||
|
duplicate use of SSNs. Since the SSN is now required for employment,
|
||
|
illegal immigrants must find a valid name/SSN pair in order to fool the INS,
|
||
|
and IRS long enough to collect a paycheck. Using the SSN when you can't
|
||
|
cross-check your database with the SSA means you can count on getting some
|
||
|
false numbers mixed in with the good ones.
|
||
|
|
||
|
Universality
|
||
|
|
||
|
Not everyone has a Social Security Number. Foreigners are the primary
|
||
|
exception, but many children don't get SSNs until they're in school. They
|
||
|
were only designed to be able to cover people who were eligible for Social
|
||
|
Security.
|
||
|
|
||
|
Identification
|
||
|
|
||
|
Few people ever ask to see an SSN card; they believe whatever you say. The
|
||
|
ability to recite the number provides little evidence that you're associated
|
||
|
with the number in anyone else's database.
|
||
|
|
||
|
There's little reason to carry your card with you anyway. It isn't a good
|
||
|
form of identification, and if your wallet is lost or stolen, it provides
|
||
|
another way for the thief to hurt you, especially if any of your banks use
|
||
|
the SSN as your PIN.
|
||
|
|
||
|
Security
|
||
|
|
||
|
The card is not at all forgery-resistant, even if anyone did ever ask for
|
||
|
it. The numbers don't have any redundancy (no check-digits) so any 9-digit
|
||
|
number in the range of numbers that have been issued is a valid number.
|
||
|
It's relatively easy to copy the number incorrectly, and there's no way to
|
||
|
tell that you've done so.
|
||
|
|
||
|
In most cases, there is no cross-checking that a number is valid. Credit
|
||
|
card and checking account numbers are checked against a database almost
|
||
|
every time they are used. If you write down someone's phone number
|
||
|
incorrectly, you find out the first time you try to use it.
|
||
|
|
||
|
|
||
|
|
||
|
Why you should resist requests for your SSN
|
||
|
|
||
|
When you give out your number, you are providing access to information about
|
||
|
yourself. You're providing access to information that you don't have the
|
||
|
ability or the legal right to correct or rebut. You provide access to data
|
||
|
that is irrelevant to most transactions but that will occasionally trigger
|
||
|
prejudice. Worst of all, since you provided the key, (and did so
|
||
|
"voluntarily") all the info discovered under your number will be presumed to
|
||
|
be true, about you, and relevant.
|
||
|
|
||
|
A major problem with the use of SSNs as identifiers is that it makes it hard
|
||
|
to control access to personal information. Even assuming you want someone
|
||
|
to be able to find out some things about you, there's no reason to believe
|
||
|
that you want to make all records concerning yourself available. When
|
||
|
multiple record systems are all keyed by the same identifier, and all are
|
||
|
intended to be easily accessible to some users, it becomes difficult to
|
||
|
allow someone access to some of the information about a person while
|
||
|
restricting them to specific topics.
|
||
|
|
||
|
Unfortunately, far too many organizations assume that anyone who presents
|
||
|
your SSN must be you. When more than one person uses the same number, it
|
||
|
clouds up the records. If someone intended to hide their activities, it's
|
||
|
likely that it'll look bad on whichever record it shows up on. When it
|
||
|
happens accidentally, it can be unexpected, embarrassing, or worse. How do
|
||
|
you prove that you weren't the one using your number when the record was
|
||
|
made?
|
||
|
|
||
|
|
||
|
What you can do to protect your number
|
||
|
|
||
|
If despite your having written "refused" in the box for Social Security
|
||
|
Number, it still shows up on the forms someone sends back to you (or worse,
|
||
|
on the ID card they issue), your recourse is to write letters or make phone
|
||
|
calls. Start politely, explaining your position and expecting them to
|
||
|
understand and cooperate. If that doesn't work, there are several more
|
||
|
things to try:
|
||
|
|
||
|
1: Talk to people higher up in the organization. This often works
|
||
|
simply because the organization has a standard way of dealing
|
||
|
with requests not to use the SSN, and the first person you deal
|
||
|
with just hasn't been around long enough to know what it is.
|
||
|
|
||
|
2: Enlist the aid of your employer. You have to decide whether talking
|
||
|
to someone in personnel, and possibly trying to change
|
||
|
corporate policy is going to get back to your supervisor and
|
||
|
affect your job.
|
||
|
|
||
|
3: Threaten to complain to a consumer affairs bureau. Most newspapers
|
||
|
can get a quick response. Ask for their "Action Line" or
|
||
|
equivalent. If you're dealing with a local government agency,
|
||
|
look in the state or local government section of the phone book
|
||
|
under "consumer affairs." If it's a federal agency, your
|
||
|
congressmember may be able to help.
|
||
|
|
||
|
4: Insist that they document a corporate policy requiring the number.
|
||
|
When someone can't find a written policy or doesn't want to
|
||
|
push hard enough to get it, they'll often realize that they
|
||
|
don't know what the policy is, and they've just been following
|
||
|
tradition.
|
||
|
|
||
|
5: Ask what they need it for and suggest alternatives. If you're
|
||
|
talking to someone who has some independence, and they'd like
|
||
|
to help, they will sometimes admit that they know the reason
|
||
|
the company wants it, and you can satisfy that requirement a
|
||
|
different way.
|
||
|
|
||
|
6: Tell them you'll take your business elsewhere (and follow through if
|
||
|
they don't cooperate.)
|
||
|
|
||
|
7: If it's a case where you've gotten service already, but someone
|
||
|
insists that you have to provide your number in order to have a
|
||
|
continuing relationship, you can choose to ignore the request
|
||
|
in hopes that they'll forget or find another solution before
|
||
|
you get tired of the interruption.
|
||
|
|
||
|
If someone absolutely insists on getting your Social Security Number, you
|
||
|
may want to give a fake number. There are legal penalties for providing
|
||
|
a false number when you expect to gain some benefit from it. A federal
|
||
|
court of appeals ruled that using a false SSN to get a Driver's License
|
||
|
violates the federal law.
|
||
|
|
||
|
There are a few good choices for "anonymous" numbers. Making one up at
|
||
|
random is a bad idea, as it may coincide with someone's real number and
|
||
|
cause them some amount of grief. It's better to use a number like
|
||
|
078-05-1120, which was printed on "sample" cards inserted in thousands of
|
||
|
new wallets sold in the 40's and 50's. It's been used so widely that both
|
||
|
the IRS and SSA recognize it immediately as bogus, while most clerks haven't
|
||
|
heard of it.
|
||
|
|
||
|
There are several patterns that have never been assigned, and which
|
||
|
therefore don't conflict with anyone's real number. They include numbers
|
||
|
with any field all zeroes, and numbers with a first digit of 8 or 9.
|
||
|
For more details on the structure of SSNs and how they are assigned, use
|
||
|
anonymous ftp to retrieve the file:
|
||
|
/cpsr/privacy/ssn/SSN-structure from the machine cpsr.org.
|
||
|
|
||
|
Giving a number with an unused patterns rather than your own number isn't
|
||
|
very useful if there's anything serious at stake since they're likely to be
|
||
|
noticed . The Social Security Administration recommends that people showing
|
||
|
Social Security cards in advertisements use numbers in the range 987-65-4320
|
||
|
through 987-65-4329.
|
||
|
|
||
|
If you're designing a database or have an existing one that currently uses
|
||
|
SSNs and want to use numbers other than SSNs, you should make your
|
||
|
identifiers use some pattern other than 9 digits. You can make them longer
|
||
|
or shorter than that, or include letters somewhere inside. That way no one
|
||
|
will mistake the number for an SSN.
|
||
|
|
||
|
The Social Security Administration recommends that you request a copy of
|
||
|
your file from them every few years to make sure that your records are
|
||
|
correct (your income and "contributions" are being recorded for you, and
|
||
|
no one else's are.) As a result of a recent court case, the SSA has agreed
|
||
|
to accept corrections of errors when there isn't any contradictory evidence,
|
||
|
SSA has records for the year before or after the error, and the claimed
|
||
|
earnings are consistent with earlier and later wages. (San Jose Mercury
|
||
|
News, 5/14, 1992 p 6A) Call the Social Security Administration at
|
||
|
(800) 772-1213 and ask for Form 7004, (Request for Earnings and Benefit
|
||
|
Estimate Statement.)
|
||
|
|
||
|
When All Else Fails
|
||
|
(Getting a Replacement Number)
|
||
|
|
||
|
The Social Security Administration (SSA) will occasionally issue a
|
||
|
replacement SSN. The most common justification is that the SSA or the IRS
|
||
|
has mixed together earnings records from more than one person, and since one
|
||
|
of the people can't be located, it's necessary to issue a new number to the
|
||
|
other. The SSA tries very hard to contact the person who is using the
|
||
|
number incorrectly before resorting to this process.
|
||
|
|
||
|
There are a few other situations that the SSA accepts as justifying a new
|
||
|
number. The easiest is if the number contains the sequences 666 or 13. The
|
||
|
digits need to be consecutive according to SSA's policy manual, but may be
|
||
|
separated by hyphens. You apparently don't have to prove that your religious
|
||
|
objection is sincere. Other commonly accepted complaints include harassment,
|
||
|
sequential numbers assigned to family members, or serious impact on your
|
||
|
credit history that you've tried to clear up without success.
|
||
|
|
||
|
In all cases, the process includes an in-person interview at which you have
|
||
|
to establish your identity and show that you are the original assignee of
|
||
|
the number. The decision is normally made in the local office. If the
|
||
|
problem is with a credit bureau's records, you have to show that someone
|
||
|
else continues to use your number, and that you tried to get the credit
|
||
|
bureau to fix your records but were not successful. When they do issue a
|
||
|
new number, the new recoreds are linked to the old ones. (Unless you can
|
||
|
convince them that your life might be endangered by such a link.)
|
||
|
|
||
|
There are a few justifications that they don't accept at all: attempting to
|
||
|
avoid legal responsibilities, poor credit record which is your own fault,
|
||
|
lost SSNm card (without evidence that someone else has used it), or use of
|
||
|
the number by government agencies or private companies.
|
||
|
|
||
|
The only justification the SSA accepts for cancelling the issuance of an SSN
|
||
|
is that the number was assigned under their Enumeration at Birth (wherein
|
||
|
SSNs are assigned when birth certificates are issued) program without the
|
||
|
parent's consent. In this case, the field officer is instructed to try very
|
||
|
hard to convince the parent that getting the number revoked is futile, but
|
||
|
to give in when the parent is persistent.
|
||
|
|
||
|
US Passports
|
||
|
|
||
|
The application for US Passports (DSP-11 12/87) requests a Social Security
|
||
|
Number, but gives no Privacy Act notice. There is a reference to "Federal
|
||
|
Tax Law" and a misquotation of Section 6039E of the 1986 Internal Revenue
|
||
|
Code, claiming that the section requires that you provide your name, mailing
|
||
|
address, date of birth, and Social Security Number. The referenced section
|
||
|
only requires TIN (SSN), and it requires that it be sent to the IRS and not
|
||
|
to the Passport office. It appears that when you apply for a passport, you
|
||
|
can refuse to reveal your SSN to the passport office, and instead mail a
|
||
|
notice to the IRS, giving only your SSN (other identifying info optional)
|
||
|
and notifying them that you are applying for a passport. [Copies (in
|
||
|
postscript) of the letter that was used by one contributor (The measure of
|
||
|
his success is that he didn't hear back from any with complaints.) are
|
||
|
available by anonymous ftp from cpsr.org in /cpsr/privacy/ssn/passport.ps.Z.
|
||
|
I'd be interested in hearing how the State department and the Post Office
|
||
|
(which processes passport applications) react.]
|
||
|
|
||
|
|
||
|
Results from Some Recent Legal Cases (3/24/93)
|
||
|
|
||
|
CPSR joined two legal cases in 1992 which concerned Social Security Numbers
|
||
|
and privacy. One of them challenged the IRS practice of printing Social
|
||
|
Security Numbers on mailing labels when they send out tax forms and related
|
||
|
correspondence. The other challenged Virginia's requirement of a Social
|
||
|
Security Number in order to register to vote.
|
||
|
|
||
|
Dr. Peter Zilahy Ingerman filed suit against the IRS in Federal District
|
||
|
Court in 1991, and CPSR filed a friend of the court brief in August '91. The
|
||
|
case was decided in favor of the IRS. According to "Privacy Journal", the
|
||
|
IRS plans to start covering the SSNs on its mailing labels, but they made
|
||
|
the decision too late to affect this year's returns. Some people got a
|
||
|
version that hid their numbers, but it was apparently a pilot project in
|
||
|
limited areas. |
|
||
|
|
||
|
The Virginia case was filed by a resident who refused to supply a Social
|
||
|
Security Number when registering to vote. When the registrar refused to
|
||
|
accept his registration, he filed suit. He also challenged Virginia on two
|
||
|
other bases: the registration form lacked a Privacy Act notice, and the
|
||
|
voter lists they publish include Social Security Numbers. The Federal court
|
||
|
of appeals ruled that Virginia may not require the disclosure of Social
|
||
|
Security numbers as a condition of registering to vote. The court said that
|
||
|
the Virginia requirement places an "intolerable burden" on the right to
|
||
|
vote. The case is officially referred to as Greidinger v. Davis, No.
|
||
|
92-1571, Fourth Circuit Court of Appeals, March 22, 1993.
|
||
|
|
||
|
|
||
|
If you have suggestions for improving this document please send them to me
|
||
|
at:
|
||
|
Chris Hibbert
|
||
|
hibbert@netcom.com or 1195 Andre Ave.
|
||
|
Mountain View, CA 94040
|
||
|
|
||
|
|
||
|
|
||
|
New versions of this posting are always available using any of the
|
||
|
following mechanisms. You can use anonymous ftp from the following
|
||
|
sites:
|
||
|
|
||
|
Site Location
|
||
|
|
||
|
rtfm.mit.edu /pub/usenet-by-hierarchy/news/answers/ssn-privacy
|
||
|
ftp.pica.army.mil /pub/privacy/ssn-privacy.faq
|
||
|
ftp.cpsr.org /cpsr/privacy/ssn/Social_Security_Number_FAQ
|
||
|
|
||
|
Gopher can retrieve it from gopher.cpsr.org. World Wide Web (www) can
|
||
|
find it using the following locator (and probably several others you
|
||
|
could construct from the other directions I've given):
|
||
|
|
||
|
http://polar.pica.army.mil/ssn_faq.html
|
||
|
|
||
|
You can also retrieve it by sending email to
|
||
|
|
||
|
Address Command (omit the quotes)
|
||
|
|
||
|
listserv@cpsr.org "GET cpsr/privacy/ssn Social_Security_Number_FAQ"
|
||
|
mail-server@rtfm.mit.edu
|
||
|
"send usenet-by-hierarchy/news/answers/ssn-privacy"
|
||
|
|
||
|
You can also ask for general help from either of these email servers by
|
||
|
sending a message to the same address with just "help" in the body.
|
||
|
|
||
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
|
|
||
|
CLIPPER CHIP IS YOUR FRIEND, NSA CONTENDS
|
||
|
NSA Seeks to Dispel Misgivings of Public About Clipper Chip
|
||
|
|
||
|
By Bob Davis
|
||
|
|
||
|
Staff Reporter of The Wall Street Journal.
|
||
|
(C)1994 Wall Street Journal
|
||
|
|
||
|
FORT MEADE, Md. --- The National Security Agency wants everyone to know
|
||
|
that its new computer-security system will protect individual privacy.
|
||
|
But as the spy agency knows, hardly anyone believes that.
|
||
|
|
||
|
Critics fear the government will use the NSA technology, designed in
|
||
|
secret, to spy on Americans. The project "is a focal point for the
|
||
|
distrust of government," acknowledges Clinton Brooks, the NSA scientist
|
||
|
who led the so-called Clipper Chip project, in the agency's first
|
||
|
interview on the subject.
|
||
|
|
||
|
The Clinton administration last month adopted the NSA plan for a series
|
||
|
of computer chips that would protect telephones and computers. Use
|
||
|
of the technology would be voluntary. Federal agencies would adopt it
|
||
|
first, and public use is expected to spread gradually.
|
||
|
|
||
|
Under the plan, cryptographic "keys" that could unscramble the
|
||
|
communications would be split in two and held separately at the Treasury
|
||
|
Department and the National Institute of Standards and Technology. That
|
||
|
way, law-enforcement agents could tap the communications by getting court
|
||
|
authorization to obtain the two halves. The idea is to boost security
|
||
|
but to keep the technology out of the hands of criminals and spies.
|
||
|
|
||
|
The NSA is the world's biggest eaves-dropper. Equipped with the latest
|
||
|
in super-computers and satellite receivers, it targets communications by
|
||
|
foreign governments. The agency shuns publicity but agreed to the
|
||
|
interview to explain its role in the Clipper controversy and try to
|
||
|
dispel fears. Mr. Brooks, a 26-year veteran of the NSA, says the project
|
||
|
began in 1989 and cost more than $2.5 million.
|
||
|
|
||
|
He says the NSA is consumed with what it calls the "equities problem" ---
|
||
|
how to balance privacy rights against the needs of law enforcement,
|
||
|
national security and private industry. In 1989, he and Raymond Kammer,
|
||
|
deputy director of NIST, began discussions about how to improve computer
|
||
|
security without making it impenetrable to police. NIST is a Commerce
|
||
|
Department agency with formal responsibility for unclassified computer
|
||
|
security.
|
||
|
|
||
|
Before the interview, Mr. Brooks takes a look around a small cryptographic
|
||
|
museum just outside the NSA's gates. He stands before an exhibit of
|
||
|
Enigma machines, used by the Germans during World War II to encrypt
|
||
|
messages --- and later broken by Allied intelligence. Enigma started as
|
||
|
a commercial product; recognizing its military value, the Nazis pulled
|
||
|
it off the market. "That was the concern we're wrestling with today,"
|
||
|
Mr. Brooks says --- commercial encryption technology becoming so good that
|
||
|
U.S. spy agencies can't crack it.
|
||
|
|
||
|
In 1989, NIST and the NSA put together an eight-person team, split evenly
|
||
|
between the agencies, to quietly work out security concepts. The team
|
||
|
decided against using a weak encryption code --- "Roman Numeral One is
|
||
|
that it had to be good security," says Mr. Brooks. And it also rejected
|
||
|
a so-called trapdoor approach, in which the computer code would be
|
||
|
designed so it would have a weak spot --- a trapdoor --- that federal
|
||
|
agencies could enter via computer to tap the communications. Someone else
|
||
|
could discover the trapdoor, they decided.
|
||
|
|
||
|
The team settled on a system with a powerful encryption formula, called
|
||
|
an algorithm, and encryption keys that would be held by outsiders. Law-
|
||
|
enforcement agencies could get copes of the keys when they needed to bug
|
||
|
the conversations. The toughest decision, both Mr. Brooks and Mr. Kammer
|
||
|
say, was to keep the algorithm, dubbed the Skipjack, secret. That meant
|
||
|
the public wouldn't know for sure whether the NSA had inserted a trapdoor
|
||
|
or some other eavesdropping device.
|
||
|
|
||
|
"It would defeat the purpose [of the project] if we gave the knowledge
|
||
|
of how the algorithm worked" to the public, says the 56-year-old Mr.
|
||
|
Brooks. "It was going to have to be kept classified." Otherwise, he
|
||
|
explains, engineers could use the algorithm to design computer-security
|
||
|
systems that the government's encryption keys couldn't unlock.
|
||
|
|
||
|
By 1990, he says, as many as 30 NSA "cryptomathematicians" and other
|
||
|
employees were working to perfect the algorithm and other features. A
|
||
|
year later, the NSA launched what it called the Capstone Project to build
|
||
|
the algorithm into a computer chip. The NSA contracted with Mykotronx
|
||
|
Inc., a small company in Torrance, Calif., to do much of the development.
|
||
|
By September 1992, the NSA was confident the system would work.
|
||
|
|
||
|
None too early for the NSA. Earlier that year, Mr. Brooks says, American
|
||
|
Telephone & Telegraph Co. informed the NSA that it wanted to sell a
|
||
|
phone using a popular encryption technology to scramble conversations.
|
||
|
The NSA balked. "We said it probably wouldn't get an export license
|
||
|
from this country," Mr. Brooks says. Instead, AT&T was told of the
|
||
|
Capstone work and agreed to use the technology if it became a federal
|
||
|
standard and was exportable, he says. The NSA then took some of the
|
||
|
functions of the Capstone chip and tailored it to phone equipment, calling
|
||
|
the resulting product the Clipper Chip. For computers, Capstone was
|
||
|
encased on a computer card that became known as Tessera.
|
||
|
|
||
|
The the Bush administration, enmeshed in a re-election bid, never pushed
|
||
|
Capstone. So shortly after the election, National-security heavyweights
|
||
|
importuned the Clinton transition team to move quickly on Capstone. Just
|
||
|
weeks after the inauguration, the new administration's national-security
|
||
|
team was debating the NSA proposal and in April announced to the public
|
||
|
that it would adopt the scheme.
|
||
|
|
||
|
Last month, the administration gave the final go-ahead --- despite
|
||
|
withering criticism from industry. Vice President Gore called encryption
|
||
|
a "law and order issue." NIST's Mr. Kammer says the new administration
|
||
|
was also trying to line up backing among national-security officials to
|
||
|
liberalize export controls on computer equipment and other high-tech
|
||
|
gear.
|
||
|
|
||
|
The high-tech industry was stunned at the decision. David Peyton, vice
|
||
|
president of the Information Technology Association of America, a trade
|
||
|
group of computer companies, says the scheme will dangerously centralize
|
||
|
power in the federal government and will limit exports. James Bidzos,
|
||
|
president of a computer-security firm, RSA Data Security Inc., goes
|
||
|
further. He posted a letter on the Internet computer network arguing
|
||
|
that Clipper may be the "visible portion of a large-scale covert
|
||
|
operation on U.S. soil by NSA."
|
||
|
|
||
|
Nonsense, responds Mr. Brooks, who says he is distressed by the
|
||
|
"emotionalism" of the arguments. "The only reason we're involved is
|
||
|
that we have the best cryptomathematicians in the country."
|
||
|
|
||
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
|
|
||
|
In the super-state, it really does not matter at all what
|
||
|
actually happened. Truth is what the government chooses
|
||
|
to tell you. Justice is what it wants to happen.
|
||
|
--Jim Garrison, New Orleans District Attorney
|
||
|
|
||
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|