885 lines
39 KiB
Plaintext
885 lines
39 KiB
Plaintext
![]() |
|
|||
|
|
|||
|
Computer underground Digest Wed Sep 22 1993 Volume 5 : Issue 74
|
|||
|
ISSN 1004-042X
|
|||
|
|
|||
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|||
|
Archivist: Brendan Kehoe
|
|||
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|||
|
Ralph Sims / Jyrki Kuoppala
|
|||
|
Ian Dickinson
|
|||
|
Cookie Editor: Etaoin Shrdlu, III
|
|||
|
|
|||
|
CONTENTS, #5.74 (Sep 22 1993)
|
|||
|
File 1--Phil Zimmerman Comments on Encryption Flap
|
|||
|
File 2--NEW State Dept FLASH on Moby Clipper (Grady Ward)
|
|||
|
File 3--"Secret Science"
|
|||
|
File 4--Comment on Elansky BBS/Conn. Law
|
|||
|
File 5--Fingerprinting Welfare Recipients
|
|||
|
File 6--Gov't Computer Databases & Right to Privacy (Thesis Abst)
|
|||
|
File 7--Revised WH E-mail FAQ
|
|||
|
|
|||
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|||
|
available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
|
|||
|
editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|||
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|||
|
60115.
|
|||
|
|
|||
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|||
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|||
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|||
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|||
|
the PC Telecom forum under "computing newsletters;"
|
|||
|
On Delphi in the General Discussion database of the Internet SIG;
|
|||
|
on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
|
|||
|
WHQ) (203) 832-8441 NUP:Conspiracy; RIPCO BBS (312) 528-5020
|
|||
|
CuD is also available via Fidonet File Request from 1:11/70; unlisted
|
|||
|
nodes and points welcome.
|
|||
|
EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
|
|||
|
In ITALY: Bits against the Empire BBS: +39-461-980493
|
|||
|
|
|||
|
ANONYMOUS FTP SITES:
|
|||
|
UNITED STATES:
|
|||
|
halcyon.com( 202.135.191.2) in /pub/mirror/cud
|
|||
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud
|
|||
|
etext.archive.umich.edu (141.211.164.18) in /pub/CuD/cud
|
|||
|
ftp.eff.org (192.88.144.4) in /pub/cud
|
|||
|
AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
|
|||
|
EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
|
|||
|
ftp.warwick.ac.uk in pub/cud (United Kingdom)
|
|||
|
|
|||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|||
|
information among computerists and to the presentation and debate of
|
|||
|
diverse views. CuD material may be reprinted for non-profit as long
|
|||
|
as the source is cited. Authors hold a presumptive copyright, and
|
|||
|
they should be contacted for reprint permission. It is assumed that
|
|||
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|||
|
specified. Readers are encouraged to submit reasoned articles
|
|||
|
relating to computer culture and communication. Articles are
|
|||
|
preferred to short responses. Please avoid quoting previous posts
|
|||
|
unless absolutely necessary.
|
|||
|
|
|||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|||
|
the views of the moderators. Digest contributors assume all
|
|||
|
responsibility for ensuring that articles submitted do not
|
|||
|
violate copyright protections.
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
Date: Tue, 21 Sep 1993 05:36:08 GMT
|
|||
|
From: hugh@GARGOYLE.UCHICAGO.EDU(Hugh Miller)
|
|||
|
Subject: File 1--Phil Zimmerman Comments on Encryption Flap
|
|||
|
|
|||
|
Phil asked me to forward this to the Digest. It points up the
|
|||
|
problems of keeping _ANYTHING_ secret in the electronic world (unless,
|
|||
|
of course, it is SECURELY encrypted %;-%).
|
|||
|
|
|||
|
It is more or less self-explanatory. Let me square his remark at
|
|||
|
the end, though: whatever happens, Phil is facing some pretty vast
|
|||
|
legal bills. Now is the time for all of us who favor crypto for the
|
|||
|
masses to pony up and put our wallets where our mouths are. I pledge
|
|||
|
$100 NOW, and challenge every one of you to match or exceed me. I'll
|
|||
|
keep it up until Phil's out of the hole. ($100 on a regular basis is
|
|||
|
a lot of money on an assistant professor's salary with 3 kids.)
|
|||
|
|
|||
|
Examine your conscience and write that check. Pronto.
|
|||
|
|
|||
|
Hugh Miller
|
|||
|
Asst. Prof.
|
|||
|
Dept. of Philosophy
|
|||
|
Loyola University Chicago
|
|||
|
|
|||
|
++-------------------
|
|||
|
Date--Sun, 19 Sep 1993 13:38:44 -0500
|
|||
|
From--Philip Zimmermann <prz@columbine.cgd.ucar.edu>
|
|||
|
Subject--Zimmermann statement on PGP investigation
|
|||
|
|
|||
|
Some of you may have received my Internet message of a couple of days
|
|||
|
ago about the ongoing U.S. Customs investigation of the exportation
|
|||
|
of PGP, which has now progressed to the level of Federal Grand Jury
|
|||
|
subpoenas. This earlier message was intended by me for distribution
|
|||
|
to a very small group of friends who previously communicated their
|
|||
|
concern about me and the investigation and asked to be kept
|
|||
|
informed. I did not send the message to anyone outside this group.
|
|||
|
Unfortunately, I did not adequately assert my desire that the message
|
|||
|
not be further disseminated. It appears that the message has gone
|
|||
|
completely public. This was not my intention.
|
|||
|
|
|||
|
My lawyer, Phil Dubois, has been in touch with the Assistant U.S.
|
|||
|
Attorney (William Keane) assigned to the investigation. We have no
|
|||
|
reason to believe that Mr. Keane is anything other than a professional
|
|||
|
and reasonable person. He made it clear that no decision has been
|
|||
|
made regarding any prosecution of anyone for any offense in this
|
|||
|
matter. Such decisions will not be made for some time, perhaps
|
|||
|
several months. Mr. Keane also made clear his willingness to listen
|
|||
|
to us (me and my lawyer) before making any decision. It appears that
|
|||
|
both Mr. Keane's mind and the lines of communication are open.
|
|||
|
|
|||
|
My fear is that public dissemination of my message will close the
|
|||
|
lines of communication and put Mr. Keane into an irretrievably
|
|||
|
adversarial position. Such a result would not serve any of our
|
|||
|
interests. My lawyer tells me that nothing irritates a prosecutor
|
|||
|
more than being the subject of what he perceives to be an
|
|||
|
orchestrated publicity campaign. He also tells me that his
|
|||
|
nightmares involve FOAs (Friends Of the Accused), invariably people
|
|||
|
with good intentions, doing things on their own. I understand that
|
|||
|
the issues involved in this investigation are of the greatest
|
|||
|
importance and transcend my personal interests. Even so, I would
|
|||
|
rather not turn an investigation into a full-scale federal
|
|||
|
prosecution. I ask that everyone keep in mind that the government's
|
|||
|
resources are limitless and that mine are not.
|
|||
|
|
|||
|
Speaking of resources, many of you have offered help, and I am
|
|||
|
grateful. Those wishing to contribute financially or otherwise
|
|||
|
should contact either me or Philip L. Dubois, Esq., at dubois@csn.org
|
|||
|
or by phone at 303-444-3885 or by mail at 2305 Broadway, Boulder, CO,
|
|||
|
80304. Mr. Dubois has just got on the Internet and is still learning
|
|||
|
how to use it. Donated funds will be kept in a trust account, and all
|
|||
|
contributions will be accounted for. If this whole thing somehow goes
|
|||
|
away with money left in the account, the balance will be refunded to
|
|||
|
contributors in proportion to the amounts of their contributions.
|
|||
|
|
|||
|
This message can be widely circulated on public forums.
|
|||
|
|
|||
|
Philip Zimmermann
|
|||
|
prz@acm.org
|
|||
|
303 541-0140
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Tue, 21 Sep 1993 21:13:17 GMT
|
|||
|
From: Grady Ward <grady@netcom.com>
|
|||
|
Subject: File 2--NEW State Dept FLASH on Moby Clipper (Grady Ward)
|
|||
|
|
|||
|
(please edit follow-ups)
|
|||
|
|
|||
|
In a fresh (to me, stunning) development, the Austin Code Works
|
|||
|
received a letter today (Tuesday 9/21/93) from the State Department,
|
|||
|
Bureau of Politico Military Affairs, Office of Defense Trade Controls
|
|||
|
advising them, in part, of their need to register as an International
|
|||
|
Arms Trafficker *even if* their crypto material is intended solely for
|
|||
|
*domestic* publication, regardless of whether they are selling
|
|||
|
executables, source, descriptions, algorithms of any crypto (and
|
|||
|
presumably viral detection) software or documentation, as defined by
|
|||
|
ITAR.
|
|||
|
|
|||
|
This requirement literally implies that a Cereal manufacturer is
|
|||
|
required to register as an arms trafficker if it wants to include a
|
|||
|
secret de/coder ring in the box, has a cardboard outline of a de/coder
|
|||
|
printed on the box, or even a description how to construct or use a
|
|||
|
de/coder ring.
|
|||
|
|
|||
|
Complete text of the letter follows:
|
|||
|
|
|||
|
(State Department Seal)
|
|||
|
United States Department of State
|
|||
|
|
|||
|
Bureau of Politico-Military Affairs
|
|||
|
Office of Defense Trade Controls
|
|||
|
|
|||
|
Washington, D.C. 20522-0602
|
|||
|
|
|||
|
AUG 31 1993
|
|||
|
|
|||
|
Austin Code Works
|
|||
|
11100 Leafwood Lane
|
|||
|
Austin, TX 78750-3587
|
|||
|
|
|||
|
Dear Sir:
|
|||
|
|
|||
|
It has come to the attention of this office that your company is
|
|||
|
making cryptographic source code and technical data available
|
|||
|
for commercial export claiming a technical data exemption
|
|||
|
from the International Traffic in Arms Regulations.
|
|||
|
Cryptographic software, including source code, is a munitions
|
|||
|
article as defined in 22 CFR # 120.1, category XIII(b). Further,
|
|||
|
the exemptions listed in 22 CFR # 125.4 for technical data do
|
|||
|
not apply to cryptographic software and source code. A valid
|
|||
|
Department of State license is required to export cryptographic
|
|||
|
source code. As such, it would be a violation of the
|
|||
|
International Traffic in Arms Regulations to export
|
|||
|
cryptographic source code without a valid Department of State
|
|||
|
export license.
|
|||
|
|
|||
|
We take this opportunity of advise you that any company or
|
|||
|
individual who engages in the United State in the business of
|
|||
|
either manufacturing or exporting defense articles or
|
|||
|
furnishing defense services is required to register for a fee
|
|||
|
with the Office of Defense Trade Controls (DTC) pursuant to 22
|
|||
|
U.S.C. # 2778(b)(1)(A) and 22 C.F.R. Part 122. Furthermore, the
|
|||
|
export of such defense articles and related technical data must
|
|||
|
be licensed by the Department of State in accordance with 22
|
|||
|
U.S.C # 2778(b)(1)(B)(2) and 22 D.F.R. Parts 120-130
|
|||
|
(International Traffic in Arms Regulations). A booklet entitled
|
|||
|
"REGISTRATION: The First Step in Defense Trade" is enclosed.
|
|||
|
|
|||
|
If you are unsure whether an article is on the U.S. Munitions
|
|||
|
List, you may send five (5) copies of descriptive literature
|
|||
|
about the product and request a commodity jurisdiction
|
|||
|
determination from this office according to 22 C.F.R # 120.5 of
|
|||
|
the ITAR.
|
|||
|
|
|||
|
If you have any questions regarding the matters discussed in
|
|||
|
this letter, please do not hesitate to contact this office at (703)
|
|||
|
875-6650.
|
|||
|
|
|||
|
Sincerely,
|
|||
|
|
|||
|
(signed) Clyde G. Bryant, Jr., Chief
|
|||
|
Compliance and Enforcement Branch
|
|||
|
|
|||
|
++++++++++++++++
|
|||
|
|
|||
|
I guess this means that all FTP sites who implement the GET command
|
|||
|
and have anything to do with crypto or viral detection, including
|
|||
|
RFCs, overviews or discussions of specific techniques or algorithms,
|
|||
|
etc. must be registered as International Arms Traffickers *even if*
|
|||
|
they disallow all but domestic FTP connections.
|
|||
|
|
|||
|
What to do now.
|
|||
|
|
|||
|
My advice to this new twist of the NSA and State Department regulating
|
|||
|
activities *within* the United States is twofold:
|
|||
|
|
|||
|
(1) GET and FAMILIARIZE yourself with PGP sources or other crypto
|
|||
|
options NOW and upload it to your local BBS (if you deem it still
|
|||
|
legal for you to do these things) and
|
|||
|
|
|||
|
(2) Consider supporting the Electronic Freedom Foundation.
|
|||
|
|
|||
|
|
|||
|
PGP sites:
|
|||
|
|
|||
|
black.ox.ac.uk (129.67.1.165)
|
|||
|
src.doc.ic.ac.uk (146.169.2.1)
|
|||
|
ftp.demon.co.uk (158.152.1.65)
|
|||
|
ghost.dsi.unimi.it (149.132.2.1)
|
|||
|
nic.funet.fi (128.214.6.100)
|
|||
|
soda.berkeley.edu (128.32.149.19)
|
|||
|
|
|||
|
Electronic Freedom Foundation
|
|||
|
1001 G Street, NW
|
|||
|
Suite 950 East
|
|||
|
Washington, D.C. 20001
|
|||
|
202/347-5400 voice
|
|||
|
202/393-5509 FAX
|
|||
|
FTP ftp.eff.org
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: 22 Sep 93 19:05:22 EDT
|
|||
|
From: Urnst Kouch <70743.1711@COMPUSERVE.COM>
|
|||
|
Subject: File 3--"Secret Science"
|
|||
|
|
|||
|
((MODERATORS' NOTE: Urnst Kouch is editor of Crypt Newsletter, a
|
|||
|
periodic 'Zine of tech information and political satire and
|
|||
|
commentary)).
|
|||
|
|
|||
|
"In 1989 the Pentagon classified as secret a set of
|
|||
|
rocks -- Russian rocks gathered by Americans, with Moscow's
|
|||
|
approval -- from below the surface of Soviet territory.
|
|||
|
[According to the classification memorandum] '. . .Those
|
|||
|
who want them must be government-certified to handle
|
|||
|
secret rocks.' Soviet officials said they were ordinary
|
|||
|
rocks . . ."
|
|||
|
--from Herbert N. Foerstel's "Secret Science:
|
|||
|
Federal Control of American Science and Technology,"
|
|||
|
(1993, Praeger Publishers)
|
|||
|
|
|||
|
CuD readers following the National Security Agency's attack on Phil
|
|||
|
Zimmerman and the cryptography algorithms involved in Pretty Good
|
|||
|
Privacy might want to stroll over to their favorite library and browse
|
|||
|
Herbert N. Foerstel's "Secret Science," an interesting book which
|
|||
|
reviews the increasingly smothering and anti-democratic government
|
|||
|
control over technology and science in the US. Foerstel is the head of
|
|||
|
the University of Maryland's Engineering & Physical Sciences Library
|
|||
|
and his book expends quite a bit of effort documenting the National
|
|||
|
Security Agency's efforts to control and classify any technology -
|
|||
|
usually cryptography - which falls within its sphere of interest.
|
|||
|
|
|||
|
Completely beyond public oversight, the NSA operates almost entirely
|
|||
|
behind the curtain of "deep black" classification, despite, in recent
|
|||
|
years, a cynical facade of public relations efforts and "friendly"
|
|||
|
review of cryptography research.
|
|||
|
|
|||
|
Foerstel's book recounts the relentless campaign by the NSA to control
|
|||
|
cryptographic research funding through the National Science Foundation
|
|||
|
and efforts to wrest all independence from the scientific community
|
|||
|
through the idea of voluntary prior restraint. What this translates
|
|||
|
to, according to "Secret Science," is that all scientists engaged in
|
|||
|
cryptographic research should be gentlemen and funnel all findings to
|
|||
|
the NSA for oversight or the agency will use executive mandates to
|
|||
|
intimidate and quash those in non-compliance.
|
|||
|
|
|||
|
Foerstel does not candy-coat the story, pointing out when he thinks it
|
|||
|
appropriate, the self-serving agendas and illogic of government
|
|||
|
leaders.
|
|||
|
|
|||
|
For example, Foerstel writes:
|
|||
|
|
|||
|
"Many in business and government point out the impossibility of
|
|||
|
controlling cryptographic software. Indeed, the U.S. has agreed to
|
|||
|
let its allies decontrol mass market software with encryption
|
|||
|
features, and foreign companies, unencumbered by munitions-type
|
|||
|
restrictions are bringing encrypted software and related services to
|
|||
|
the international market. The British have stated publicly that they
|
|||
|
are permitting the uncontrolled export of such software, but US
|
|||
|
software manufacturers are prevented from selling their products
|
|||
|
abroad."
|
|||
|
|
|||
|
Foerstel also compares the price of a brute force solution to the
|
|||
|
current dumbed down NSA compliant DES key: $5,000 as opposed to _$200
|
|||
|
septillion_ using the original IBM 128-bit key.
|
|||
|
|
|||
|
The conclusion he draws is simple and ugly: Our government is
|
|||
|
determined to impede the development and dissemination of
|
|||
|
sophisticated cryptographic tools in the private sector, mainly
|
|||
|
because it wants to reserve the right to break the privacy of American
|
|||
|
citizens when deemed necessary. The rationalization that national
|
|||
|
sensitive technology must be kept from foreign hands is a sham.
|
|||
|
|
|||
|
It's hard to emphasize how good a read "Secret Science" is! In
|
|||
|
addition to amusing stuff on the above passage dealing with "secret
|
|||
|
rocks," the book covers the explosion of classification during the
|
|||
|
Reagan administration, the drive to lock up general scientific
|
|||
|
material in libraries thought to be sensitive even _after_ widespread
|
|||
|
international publication and the FBI's continuing campaign to comb
|
|||
|
public libraries for imagined revolutionaries, troublemakers,
|
|||
|
foreigners or anyone with foreign-sounding names who accesses the
|
|||
|
technical literature.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Sat, 18 Sep 1993 18:05:26 -0400
|
|||
|
From: Doug Luce <doug@FOXHOLLY.PGH.PA.US>
|
|||
|
Subject: File 4--Comment on Elansky BBS/Conn. Law
|
|||
|
|
|||
|
<In CuD 5.72, the CuD moderators cite Connecticut laws under
|
|||
|
which Michael Elansky is being charged>:
|
|||
|
|
|||
|
> (a) A person is guilty of inciting injury to persons or property
|
|||
|
> when ... he advocates, encourages, justifies, praises, incites or
|
|||
|
> solicits ... any assault upon ... the police force of this or any
|
|||
|
> other state ....
|
|||
|
|
|||
|
Public decentralized computer networks are an assault on what we call
|
|||
|
the police force. These information systems furnish easily accessible
|
|||
|
facts and opinions on drugs, criminal acts, criminal psychology,
|
|||
|
police practices, and government policy. They are a new medium which
|
|||
|
disseminates high-quality data currently unfettered by state or mass
|
|||
|
media controls. They force close public examination of the power
|
|||
|
constructs of the government of the United States.
|
|||
|
|
|||
|
There isn't a more acute or potentially destructive threat to law
|
|||
|
enforcement agencies as they are today. It is to the advantage of the
|
|||
|
police to round up and permanently detain the people responsible in
|
|||
|
any way for the operation of the networks. Bad publicity generated by
|
|||
|
this effort will be far outweighed by the benefit of nullifying this
|
|||
|
destructive potential.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Mon, 20 Sep 93 19:09:57 EDT
|
|||
|
From: joec@CFCSYS.LINET.ORG(Joseph Christie)
|
|||
|
Subject: File 5--Fingerprinting Welfare Recipients
|
|||
|
|
|||
|
A further update. Last week the Suffolk County Legislature voted to
|
|||
|
implement a fingerprinting system for welfare recipients. The plan is
|
|||
|
being forwarded to NY State, who hasn't said that Suffolk can not do
|
|||
|
this but they did authorize fingerprinting on a test basis in two
|
|||
|
upstate counties and not in Suffolk. Suffolk County says they don't
|
|||
|
need State approval and the State refuses to comment until they
|
|||
|
formally receive and review the official policy statement from
|
|||
|
Suffolk.
|
|||
|
|
|||
|
Opponents claim that the county should go after provider fraud as this
|
|||
|
is a big ticket item whereas recipient fraud is a small ticket item.
|
|||
|
|
|||
|
On another note, the Sept. 13th issue of Communications Week mentions
|
|||
|
that ViaCrypt, a division of Lemcom of Phoenix, is preparing to market
|
|||
|
a public key encryption program. They have obtained a sub-license from
|
|||
|
PKP. According to ViaCrypt's president, "What we're going to do is
|
|||
|
marry our family of encryption engines to selected parts of PGP code."
|
|||
|
Further "(It) will be covered by the PKP patent license but from the
|
|||
|
outside will look like PGP."
|
|||
|
|
|||
|
They expect to market the MS-DOS version in early Nov. Mac and UNIX
|
|||
|
versions to follow. Cost $199.95 per user but will sell for half price
|
|||
|
through the end of this year.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Tue, 21 Sep 1993 12:31:54 CDT
|
|||
|
From: CuD Moderators <cudigest@mindvox.phantom.com>
|
|||
|
Subject: File 6--Gov't Computer Databases & Right to Privacy (Thesis Abst)
|
|||
|
|
|||
|
ABSTRACT
|
|||
|
|
|||
|
Computerized Governmental Database Systems
|
|||
|
Containing Personal Information
|
|||
|
And
|
|||
|
The Right to Privacy
|
|||
|
by
|
|||
|
Lewis William Oleinick, M.P.Af.
|
|||
|
The University of Texas at Austin, 1993
|
|||
|
SUPERVISORS: Chandler Stolp and Philip Doty
|
|||
|
|
|||
|
This report identifies and examines the potential threats to
|
|||
|
individual privacy created by the collection, aggregation, and
|
|||
|
dissemination of personal information by governmental agencies and the
|
|||
|
role computer systems play in potentiating such threats. Computer
|
|||
|
matching, computer profiling, the national criminal justice database,
|
|||
|
and portfolio creation via data aggregation of personal information
|
|||
|
are the governmental activities stipulated to be potentially
|
|||
|
threatening to personal privacy. These four activities are forms of
|
|||
|
"dataveillance." Dataveillance poses dangers to the security of civil
|
|||
|
liberties in a free society.
|
|||
|
|
|||
|
To carry on an intelligible discussion about privacy and how the
|
|||
|
collection, aggregation, and dissemination of personal information by
|
|||
|
governmental agencies may threaten individual privacy it is necessary
|
|||
|
to first define privacy and personal information. Independence,
|
|||
|
autonomy, dignity, and respect create a conceptual framework upon
|
|||
|
which privacy may be defined.
|
|||
|
|
|||
|
Privacy is a culturally defined norm. As such a discussion of
|
|||
|
the American cultural tradition of privacy is necessary to understand
|
|||
|
both how Americans have defined privacy over time and the roles
|
|||
|
privacy has played in American society in 1) "starting over," 2) in
|
|||
|
interpersonal relationships, and 3) in maintaining the "balance of
|
|||
|
power" with the State. Privacy is held to be as important as the
|
|||
|
unalienable rights of "life, liberty, and the pursuit of happiness" by
|
|||
|
the majority of the American public. Americans have become more and
|
|||
|
more concerned with their privacy as intrusive technologies have
|
|||
|
evolved. Many Americans fear that computers allow the U.S. Government
|
|||
|
too much power over the average citizen.
|
|||
|
Privacy has been protected in the United States by
|
|||
|
|
|||
|
precedents set in court cases, by legislation and by executive act.
|
|||
|
The breadth of cases pertaining to privacy precludes the examination
|
|||
|
of all cases. Supreme Court cases provide a historical overview of
|
|||
|
the evolution of the right to privacy as the questions presented to
|
|||
|
the Court have become more complex with the introduction of new
|
|||
|
technologies into the law enforcement process.
|
|||
|
|
|||
|
Congress has attempted to address the public's concerns of the
|
|||
|
government's collection, aggregation, and dissemination of personal
|
|||
|
information by passing legislation designed to protect individual
|
|||
|
privacy. The four major pieces of legislation passed by Congress for
|
|||
|
the protection of the citizen's right to privacy are the Freedom of
|
|||
|
Information Act, the Privacy Act, the Computer Security Act of 1987,
|
|||
|
and the Computer Matching and Privacy Protection Act of 1988. The
|
|||
|
Office of Management and Budget has produced regulations designed to
|
|||
|
enforce the intent of the legislation promulgated by Congress. These
|
|||
|
regulations are contained in OMB Circular A-130 which details federal
|
|||
|
information policy.
|
|||
|
|
|||
|
This report concludes by suggesting the need for the
|
|||
|
implementation of a Privacy Protection Board at the national level.
|
|||
|
Such a board would be based on the model suggested by David Flaherty.
|
|||
|
|
|||
|
The primary conclusion that should be drawn from this report is
|
|||
|
that society as a whole must re-evaluate the existing paradigm of who
|
|||
|
should be in control of personal information; i.e., should it be the
|
|||
|
agency who collects it or should the power of control remain with the
|
|||
|
individual about whom the information was collected. This report
|
|||
|
suggests that a certain modicum of control over the disclosure of
|
|||
|
personal information should revert to the individual about whom the
|
|||
|
information was collected.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Sat, 4 Sep 1993 18:41:02 EST
|
|||
|
From: Dave Banisar <banisar@WASHOFC.CPSR.ORG>
|
|||
|
Subject: File 7--Revised WH E-mail FAQ
|
|||
|
|
|||
|
Revised WH E-mail FAQ
|
|||
|
WHITE HOUSE ELECTRONIC PUBLICATIONS AND PUBLIC ACCESS EMAIL
|
|||
|
FREQUENTLY ASKED QUESTIONS
|
|||
|
|
|||
|
Updated August 30, 1993
|
|||
|
|
|||
|
Table Of Contents
|
|||
|
|
|||
|
I. Signing up for Daily Electronic Publications.
|
|||
|
A. Widely Available Sources.
|
|||
|
B. Notes on Widely Available Sources.
|
|||
|
C. Direct Email Distribution
|
|||
|
|
|||
|
II. Searching and Retrieving White House documents.
|
|||
|
- WAIS
|
|||
|
- GOPHER
|
|||
|
- FedWorld BBS
|
|||
|
|
|||
|
III. Sending Email to the White House.
|
|||
|
- Internet Direct
|
|||
|
- Forwarding From Other Networks
|
|||
|
|
|||
|
I. HOW DO I SIGN UP FOR ELECTRONIC PUBLICATIONS BY THE WHITE HOUSE?
|
|||
|
|
|||
|
The White House Communications office is distributing press releases
|
|||
|
over an experimental system developed during the campaign at the MIT
|
|||
|
Artificial Intelligence Laboratory.
|
|||
|
|
|||
|
You can obtain copies of all the press releases from a wide variety of
|
|||
|
on-line services or discussion groups devoted to either national
|
|||
|
politics in general or President Clinton in particular. These are
|
|||
|
listed in sections I and II.
|
|||
|
|
|||
|
Section Ic explains how you can sign up to receive press releases
|
|||
|
directly from the experimental MIT system by using an automated email
|
|||
|
server. The present system was not designed to handle high levels of
|
|||
|
message traffic. A more powerful system will become available in due
|
|||
|
course, and in the meantime, it would be appreciated if you used this
|
|||
|
service sparingly. One appropriate current use is secondary
|
|||
|
redistribution and archiving. If you use it, you will be carried
|
|||
|
forward when the more powerful system that replaces it.
|
|||
|
|
|||
|
A. WIDELY AVAILABLE SOURCES
|
|||
|
|
|||
|
1. On USENET/NETNEWS, electronic publications are found on a variety
|
|||
|
of groups:
|
|||
|
|
|||
|
Direct Distribution
|
|||
|
|
|||
|
alt.politics.clinton
|
|||
|
alt.politics.org.misc
|
|||
|
alt.politics.reform
|
|||
|
alt.politics.usa.misc
|
|||
|
alt.news-media
|
|||
|
alt.activism
|
|||
|
talk.politics.misc
|
|||
|
|
|||
|
Indirect Distribution
|
|||
|
|
|||
|
misc.activism.progressive
|
|||
|
cmu.soc.politics
|
|||
|
assocs.clinton-gore-92
|
|||
|
|
|||
|
2. On CompuServe: GO WHITEHOUSE
|
|||
|
|
|||
|
3. On America Online: keyword WHITEHOUSE or THE WHITEHOUSE or CLINTON
|
|||
|
|
|||
|
4. On The WELL: type whitehouse
|
|||
|
|
|||
|
5. On MCI: type VIEW WHITE HOUSE
|
|||
|
|
|||
|
6. On Fidonet: See Echomail WHITEHOUSE
|
|||
|
|
|||
|
7. On Peacenet or Econet: See pol.govinfo.usa.
|
|||
|
|
|||
|
B. NOTES ON WIDELY AVAILABLE SOURCES
|
|||
|
|
|||
|
2. CompuServe's White House Forum (GO WHITEHOUSE) is devoted to
|
|||
|
discussion of the Clinton administration's policies and
|
|||
|
activities. The forum's library consists of news releases and
|
|||
|
twice daily media briefings from the White House Office of
|
|||
|
Media Affairs. CompuServe members can exchange information and
|
|||
|
opinions with each other in the 17 sections in the forum's
|
|||
|
message area. The message board spans a broad range of topics,
|
|||
|
including international and United Nations activities,
|
|||
|
defense, health care, the economy and the deficit, housing and
|
|||
|
urban development, the environment, and education and national
|
|||
|
service.
|
|||
|
|
|||
|
3. On America Online the posts are sent to the White House Forum,
|
|||
|
located in the News & Finance department of the service and
|
|||
|
accessible via keywords "white house" and "clinton." The
|
|||
|
White House Forum on America Online contains the press
|
|||
|
releases from the White House, divided into the categories
|
|||
|
"Press Briefings," "Meetings & Speeches," "Foreign Policy,"
|
|||
|
"The Economy," "Technology," "Health Care," and
|
|||
|
"Appointments." The area features a message board so you can
|
|||
|
discuss the releases with other AOL members, and a searchable
|
|||
|
database for easy retrieval of releases in the topic that
|
|||
|
interests you.
|
|||
|
|
|||
|
4. MCI Mail users can access daily information on the administration's
|
|||
|
programs provided by the White House through MCI Mail bulletin
|
|||
|
boards. The available boards are: WHITE HOUSE ECONOMIC, WHITE
|
|||
|
HOUSE FOREIGN, WHITE HOUSE SOCIAL, WHITE HOUSE SPEECHES and
|
|||
|
WHITE HOUSE NEWS. A listing of these boards can also be
|
|||
|
obtained by simply typing VIEW WHITE HOUSE at the COMMAND
|
|||
|
prompt.
|
|||
|
|
|||
|
|
|||
|
C. DIRECT EMAIL DISTRIBUTION
|
|||
|
|
|||
|
If you don't have access to the these accounts or if you would prefer
|
|||
|
to receive the releases via email, then the next section details how
|
|||
|
to sign up for this service. The server is not set up to answer
|
|||
|
email letters, comments or requests for specific information. To
|
|||
|
reach this MIT server, send email:
|
|||
|
|
|||
|
To: Clinton-Info@Campaign92.Org
|
|||
|
Subject--Help
|
|||
|
|
|||
|
The server works by reading the subject line of the incoming message
|
|||
|
and taking whatever action that line calls for. If you want to sign up
|
|||
|
to automatically receive press releases, then your subject line would
|
|||
|
begin with the word RECEIVE. You can then specify what kind of
|
|||
|
information you are interested in receiving. The categories of
|
|||
|
information are:
|
|||
|
|
|||
|
ECONOMIC POLICY
|
|||
|
Get releases related to the economy such as budget
|
|||
|
news, technology policy review, etc.
|
|||
|
|
|||
|
FOREIGN POLICY
|
|||
|
Get releases related to foreign policy such as
|
|||
|
statements on Bosnian airdrop, Haitian refugee status,
|
|||
|
etc.
|
|||
|
|
|||
|
SOCIAL POLICY
|
|||
|
Get releases related to social issues like National
|
|||
|
Service (Student Loan) program, abortion, welfare
|
|||
|
reform, etc.
|
|||
|
|
|||
|
SPEECHES
|
|||
|
All speeches made by the President and important
|
|||
|
speeches made by other Administration officials.
|
|||
|
|
|||
|
NEWS
|
|||
|
Transcripts of press conferences released by the White
|
|||
|
House Communications office, as well as the
|
|||
|
President's remarks in photo ops and other Q&A
|
|||
|
sessions.
|
|||
|
|
|||
|
ALL All of the above
|
|||
|
|
|||
|
So, if you wanted to sign up to get releases related to the economy
|
|||
|
your email message would look like this:
|
|||
|
|
|||
|
To: Clinton-Info@Campaign92.Org
|
|||
|
Subject--RECEIVE ECONOMY
|
|||
|
|
|||
|
When you send a signup message to the clinton-info server, it sends
|
|||
|
you back a status message letting you know what distribution streams
|
|||
|
you are signed up for. If you ever want to check on what groups you
|
|||
|
are signed up for send the following message:
|
|||
|
|
|||
|
To: Clinton-Info@Campaign92.Org
|
|||
|
Subject--STATUS
|
|||
|
|
|||
|
You can stop receiving email releases by sending a REMOVE message to
|
|||
|
the clinton-info server. The word REMOVE would be followed by whatever
|
|||
|
distribution stream you wanted to drop. If you wanted to stop
|
|||
|
receiving message about the ECONOMY then your mail would look like
|
|||
|
this:
|
|||
|
|
|||
|
To: Clinton-Info@Campaign92.Org Subject--REMOVE ECONOMY
|
|||
|
|
|||
|
You could substitute SOCIAL, FOREIGN, SPEECHES, NEWS or ALL for
|
|||
|
ECONOMY in the above message and you would be dropped from that
|
|||
|
distribution list. If you send the subject line REMOVE ALL, then you
|
|||
|
will be taken off the email distribution system all together and will
|
|||
|
not receive further releases of any kind.
|
|||
|
|
|||
|
You can also ask for help from the automated server. Send an email
|
|||
|
query as follows:
|
|||
|
|
|||
|
To: Clinton-Info@Campaign92.Org
|
|||
|
Subject--HELP
|
|||
|
|
|||
|
The server will respond by sending you a detailed form that will guide
|
|||
|
you through the process of signing up for the various distribution
|
|||
|
streams. As you will quickly discover, there is a automatic form
|
|||
|
processing interface that parallel the quick and easy subject line
|
|||
|
commands discussed here. More detailed help is available by sending
|
|||
|
an email query as follows:
|
|||
|
|
|||
|
To: Clinton-Info@Campaign92.Org
|
|||
|
Subject--Please Help!
|
|||
|
|
|||
|
Finally, if you want to search and retrieve documents, but you do not
|
|||
|
have access to the retrieval methods discussed in section II, you can
|
|||
|
do this via email through the MIT server. You can obtain the WAIS
|
|||
|
query form by sending an email query as follows:
|
|||
|
|
|||
|
To: Clinton-Info@Campaign92.Org
|
|||
|
Subject--WAIS
|
|||
|
|
|||
|
Once you have identified the documents that you want, be careful not
|
|||
|
to request them all at once, because you may be sent a message
|
|||
|
containing all the documents and this message may be too big for some
|
|||
|
mail delivery systems between the email server and you.
|
|||
|
|
|||
|
|
|||
|
II. HOW DO I RETRIEVE WHITE HOUSE PUBLICATIONS FROM INTERNET ARCHIVES?
|
|||
|
|
|||
|
Various sites are archiving the press releases distributed . What follows
|
|||
|
is an
|
|||
|
incomplete list of some of the sites containing the documents that
|
|||
|
have been released to date. This FAQ will be updated to reflect new
|
|||
|
sites as they become known.
|
|||
|
|
|||
|
SITE DIRECTORY
|
|||
|
|
|||
|
1. SUNSITE.UNC.EDU
|
|||
|
pub/academic/political-science/whitehouse-papers
|
|||
|
2. FTP.CCO.CALTECH.EDU /PUB/BJMCCALL
|
|||
|
3. FTP MARISTB.MARIST.EDU
|
|||
|
4. CPSR.ORG /CPSR/CLINTON
|
|||
|
5. FedWorld Online System 703-321-8020 8-N-1 or:
|
|||
|
Telnet fedworld.doc.gov
|
|||
|
|
|||
|
Notes: The following are notes on how to log in and get
|
|||
|
information from the above sites.
|
|||
|
|
|||
|
1. Office FOR Information Technology at University of
|
|||
|
North Carolina Maintains the full collection of White
|
|||
|
House electronic release available for search with WAIS and
|
|||
|
also accessible via Gopher and FTP.
|
|||
|
1.a WAIS
|
|||
|
(:source
|
|||
|
:version 3
|
|||
|
:database-name "/home3/wais/White-House-Papers" :ip-
|
|||
|
address "152.2.22.81"
|
|||
|
:ip-name "sunsite.unc.edu"
|
|||
|
:tcp-port 210
|
|||
|
:cost 0.00
|
|||
|
:cost-unit :free
|
|||
|
:maintainer "pjones@sunsite.unc.edu"
|
|||
|
|
|||
|
:description "Server created with WAIS release 8 b5 on
|
|||
|
Feb 27 15:16:16 1993 by pjones@sunsite.unc.edu These are the
|
|||
|
White House Press Briefings and other postings dealing with
|
|||
|
William Jefferson Clinton and Albert Gore as well as members
|
|||
|
of the President's Cabinet and the first lady Hillary Rodham
|
|||
|
Clinton, Chelsea, Socks and others in Washington DC. Dee Dee
|
|||
|
Meyers and George Stephanopoulos. Other good words:
|
|||
|
United States of America, Bill Al Tipper Democrats USA
|
|||
|
US These files are also available via anonymous ftp
|
|||
|
from sunsite.unc.edu The files of type filename used in
|
|||
|
the index were:
|
|||
|
/home3/ftp/pub/academic/political-science/whitehouse-
|
|||
|
papers/1993 ")
|
|||
|
|
|||
|
Folks without WAIS clients or gophers that act as WAIS
|
|||
|
clients may telnet to sunsite.unc.edu and login as swais
|
|||
|
to access this information via WAIS.
|
|||
|
|
|||
|
1.b GOPHER is a distributed menuing system for information access on
|
|||
|
the
|
|||
|
Internet developed at the University of Minnesota. gophers are
|
|||
|
client-server implementations and various gopher clients are
|
|||
|
available for nearly any computing platform. You may now use
|
|||
|
gopher clients to access the White House Papers and other
|
|||
|
political information on SunSITE.unc.edu's new gopher server.
|
|||
|
You may also add links from your local gopher server to
|
|||
|
SunSITE for access to the White House Papers.
|
|||
|
|
|||
|
For gopher server keepers and adventurous clients to access
|
|||
|
SunSITE you need only know that we use the standard gopher
|
|||
|
port 70 and that our internet address is SunSITE.unc.edu
|
|||
|
(152.2.22.81). Point there and you'll see the references to
|
|||
|
the Politics areas.
|
|||
|
|
|||
|
For folks without gopher clients can telnet to sunsite.unc.edu
|
|||
|
to try out gopher access. You need to have access to internet
|
|||
|
telnet and:
|
|||
|
|
|||
|
telnet sunsite.unc.edu
|
|||
|
login: gopher
|
|||
|
|
|||
|
The rest is very straight forward. Browsing options end with a
|
|||
|
directory mark (/), searching options end with an question mark (?).
|
|||
|
There's plenty of on-line help available.
|
|||
|
|
|||
|
2. No special instructions.
|
|||
|
|
|||
|
3. The CLINTON@MARIST log files which contain all the official
|
|||
|
administration releases distributed through the MIT servers
|
|||
|
are available via anonymous FTP. These logs contain in
|
|||
|
addition to the official releases, the posts that comprise the
|
|||
|
ongoing discussion conducted by the list subscribers.
|
|||
|
To obtain the logs:
|
|||
|
FTP MARISTB.MARIST.EDU - the logs are in the CLINTON directory
|
|||
|
and are named CLINTON LOG9208 thru CLINTON LOGyymm where yymm
|
|||
|
stands for the current year and month. Problems should be
|
|||
|
directed to my attention: URLS@MARISTC.BITNET or
|
|||
|
URLS@VM.MARIST.EDU.
|
|||
|
Posted by Lee Sakkas - owner, CLINTON@MARIST
|
|||
|
|
|||
|
4. Computer Professionals for Social Responsibility is
|
|||
|
providing all Clinton documents on technology and privacy
|
|||
|
at the CPSR Internet Library, available via
|
|||
|
FTP/WAIS/Gopher at cpsr.org /cpsr/clinton (and in other
|
|||
|
folders as relevant). For email access, send a message
|
|||
|
with the word "help" at the 1st line of text to
|
|||
|
listserv@cpsr.org.
|
|||
|
|
|||
|
5. The FedWorld Computer System, operated by the National Technical
|
|||
|
Information Service, archives White House papers in a
|
|||
|
traditional BBS type file library. Connect to FedWorld by
|
|||
|
calling (703) 321-8020. No parity, eight data bits and one stop
|
|||
|
bit (N-8-1). FedWorld accommodates baud speeds of up to 9,600.
|
|||
|
It is also possible to Telnet to FedWorld at FedWorld.doc.gov.
|
|||
|
White House papers are located in the W-House library of files.
|
|||
|
To access this library from the main FedWorld menu,
|
|||
|
enter <f s w-house>. Files are named with the first four digits
|
|||
|
being the release month and day (e.g. 0323XXX.txt). Some
|
|||
|
standard abbreviations after the date include:
|
|||
|
|
|||
|
rem - Remarks by the President
|
|||
|
pc - Press Conference transcript
|
|||
|
pr - Press Release
|
|||
|
AM - AM Press Briefing
|
|||
|
PM - PM Press Briefing
|
|||
|
sch - The President's public schedule
|
|||
|
spch- Text of major speeches.
|
|||
|
|
|||
|
These files are saved in ASCII format. Files can be viewed
|
|||
|
online by requesting to download a file and then selecting
|
|||
|
(L)ist as the download protocol. This will display the file a
|
|||
|
screen at a time. White House papers are kept in the above
|
|||
|
format for up to two months. Papers more than two months old
|
|||
|
are compressed using Pkzip into a single file that contains all
|
|||
|
of the files for that month (e.g. 0193.zip contains all papers
|
|||
|
released during January 1993). In addition to White Documents,
|
|||
|
FedWorld also provides a gateway to more than 100 government
|
|||
|
funded BBSs and computer systems.
|
|||
|
|
|||
|
|
|||
|
III. HOW DO I SEND EMAIL TO THE WHITE HOUSE?
|
|||
|
|
|||
|
We are pleased to introduce this new form of communication into the
|
|||
|
White House for the first time in history. As we work to reinvent
|
|||
|
government and streamline our processes, this electronic mail experiment
|
|||
|
will help put us on the leading edge of progress. Please remember,
|
|||
|
though, this is still very much an experiment.
|
|||
|
|
|||
|
The White House email system is under construction. This is a new
|
|||
|
project and suffers from all of the problems common to a startup
|
|||
|
operation. The Communications office is currently working on defining
|
|||
|
what this system will do, as well as trying to come up with equipment
|
|||
|
and staffing to make sure that it works.
|
|||
|
|
|||
|
Nobody wants this new venture to work more than the staff that has
|
|||
|
devoted so many hours to getting it up and running. But much time and
|
|||
|
effort will be required before the system is truly interactive. In the
|
|||
|
mean time, they will need a little patience from the electronic
|
|||
|
community.
|
|||
|
|
|||
|
When you send to the White House you will receive an immediate
|
|||
|
acknowledge that your message has been received. Email messages are
|
|||
|
currently being printed out and responses are being sent out via US
|
|||
|
Mail, so if you send a message to the White House, please include a US
|
|||
|
Post office address for replies.
|
|||
|
|
|||
|
You can send email to the following addresses:
|
|||
|
|
|||
|
Internet Direct: President@WhiteHouse.GOV
|
|||
|
Vice-President@WhiteHouse.GOV
|
|||
|
|
|||
|
Please send corrections, deletion and additions to this FAQ to:
|
|||
|
|
|||
|
Updates@Campaign92.Org
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
End of Computer Underground Digest #5.74
|
|||
|
************************************
|
|||
|
|
|||
|
|
|||
|
|