899 lines
37 KiB
Plaintext
899 lines
37 KiB
Plaintext
![]() |
Computer underground Digest Sun Mar 13, 1994 Volume 6 : Issue 24
|
||
|
ISSN 1004-042X
|
||
|
|
||
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
||
|
Archivist: Brendan Kehoe (He's Baaaack)
|
||
|
Acting Archivist: Stanton McCandlish
|
||
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
||
|
Ralph Sims / Jyrki Kuoppala
|
||
|
Ian Dickinson
|
||
|
Copita Editor: Sheri O'Nothera
|
||
|
|
||
|
CONTENTS, #6.24 (Mar 13, 1994)
|
||
|
File 1--Clipping the Wings of Freedom (Reprint, by J.P. Barlow)
|
||
|
File 2--Leahy to hold hearings on Clipper Chip!
|
||
|
File 3--Survey: communication ethics on the net
|
||
|
File 4--Starring Tom Cruise as Kevin Poulsen?
|
||
|
|
||
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
||
|
available at no cost electronically.
|
||
|
|
||
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
||
|
|
||
|
Or, to subscribe, send a one-line message: SUB CUDIGEST your name
|
||
|
Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
|
||
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
||
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
||
|
60115, USA.
|
||
|
|
||
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
||
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
||
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
||
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
||
|
the PC Telecom forum under "computing newsletters;"
|
||
|
On Delphi in the General Discussion database of the Internet SIG;
|
||
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
||
|
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
|
||
|
CuD is also available via Fidonet File Request from
|
||
|
1:11/70; unlisted nodes and points welcome.
|
||
|
|
||
|
EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
|
||
|
In ITALY: Bits against the Empire BBS: +39-461-980493
|
||
|
|
||
|
FTP: UNITED STATES: etext.archive.umich.edu (141.211.164.18) in /pub/CuD/
|
||
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
||
|
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
|
||
|
nic.funet.fi
|
||
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
||
|
|
||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
|
information among computerists and to the presentation and debate of
|
||
|
diverse views. CuD material may be reprinted for non-profit as long
|
||
|
as the source is cited. Authors hold a presumptive copyright, and
|
||
|
they should be contacted for reprint permission. It is assumed that
|
||
|
non-personal mail to the moderators may be reprinted unless otherwise
|
||
|
specified. Readers are encouraged to submit reasoned articles
|
||
|
relating to computer culture and communication. Articles are
|
||
|
preferred to short responses. Please avoid quoting previous posts
|
||
|
unless absolutely necessary.
|
||
|
|
||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
||
|
the views of the moderators. Digest contributors assume all
|
||
|
responsibility for ensuring that articles submitted do not
|
||
|
violate copyright protections.
|
||
|
|
||
|
----------------------------------------------------------------------
|
||
|
|
||
|
Date: Sun, 13 Mar 1994 11:30:17 -0500
|
||
|
From: John Perry Barlow <barlow@EFF.ORG>
|
||
|
Subject: File 1--Clipping the Wings of Freedom (Reprint, by J.P. Barlow)
|
||
|
|
||
|
Clipping the Wings of Freedom page 1
|
||
|
|
||
|
Jackboots on the Infobahn
|
||
|
by John Perry Barlow
|
||
|
<barlow@eff.org>
|
||
|
|
||
|
[Note: I wish to reserve to Wired Magazine first paper publication of
|
||
|
the following piece. However, given the fairly immediate nature of
|
||
|
this issue, I am net-casting it now. Feel free to pass it on
|
||
|
electronically as you see fit, but please do not turn it into any sort
|
||
|
of hard copy until Wired has done so. I also encourage you to buy the
|
||
|
April issue of Wired in which it will appear.]
|
||
|
|
||
|
|
||
|
On January 11, I managed to schmooze myself aboard Air Force 2. It was
|
||
|
flying out of LA, where its principal passenger had just outlined his
|
||
|
vision of the Information Superhighway to a suited mob of television,
|
||
|
show biz, and cable types who fervently hoped to own it one day...if
|
||
|
they could ever figure out what the hell it was.
|
||
|
|
||
|
>From the standpoint of the Electronic Frontier Foundation, the speech
|
||
|
had been wildly encouraging. The Vice President's announced program
|
||
|
incorporated many of the concepts of open competition, universal
|
||
|
access, and deregulated common carriage which we'd been pushing for
|
||
|
the previous year.
|
||
|
|
||
|
But he had said nothing about future of privacy, except to cite among
|
||
|
the bounties of the NII its ability to "help law enforcement agencies
|
||
|
thwart criminals and terrorists who might use advanced
|
||
|
telecommunications to commit crimes."
|
||
|
|
||
|
On the plane I asked him what this had meant regarding Administration
|
||
|
policy on cryptography. He became non-committal as a cigar store
|
||
|
indian. "We'll be making some announcements... I can't tell you
|
||
|
anything more." He hurried back to the front of the plane, leaving me
|
||
|
to troubled speculation.
|
||
|
|
||
|
|
||
|
Despite its fundamental role in assuring privacy, transaction
|
||
|
security, and reliable identity within the NII, the Clinton/Gore
|
||
|
Administration policies regarding cryptography have not demonstrated
|
||
|
an enlightenment to match the rest of their digital visions.
|
||
|
|
||
|
The Clipper Chip...which bodes to be either the goofiest waste of
|
||
|
federal dollars since Gerald Ford's great Swine Flu program or, if
|
||
|
actually deployed, a surveillance technology of profound
|
||
|
malignancy...seemed at first an ugly legacy of Reagan/Bush. "This is
|
||
|
going to be our Bay of Pigs," one White House official told me at the
|
||
|
time Clipper was introduced, referring to the distastrous Cuban
|
||
|
invasion plan Kennedy inherited from Eisenhower.
|
||
|
|
||
|
(Clipper, in case you're just tuning in, is an encryption chip which
|
||
|
the NSA and FBI hope will someday be in every phone and computer in
|
||
|
America. It scrambles your communications, making them unintelligible
|
||
|
to all but their intended recipient. All, that is, but the government,
|
||
|
which would hold the "key" to your chip. The key would separated into
|
||
|
two pieces, held in escrow, and joined with the appropriate "legal
|
||
|
authority.")
|
||
|
|
||
|
Of course, trusting the government with your privacy is trusting a
|
||
|
peeping tom to install your window blinds. And, since the folks I've
|
||
|
met in this White House seem extremely smart, conscious, and
|
||
|
freedom-loving...hell, a lot of them are Deadheads...I was sure that
|
||
|
after they felt fully moved in, they'd face down the NSA and FBI, let
|
||
|
Clipper die a natural death, and lower the export embargo on reliable
|
||
|
encryption products.
|
||
|
|
||
|
Furthermore, NIST and the National Security Council have been studying
|
||
|
both Clipper and export embargoes since April. Given that the volumes
|
||
|
of expert testimony they collected opposed them both almost
|
||
|
unanimously , I expected the final report to give the Administration
|
||
|
all the support it needed to do the right thing.
|
||
|
|
||
|
I was wrong about this. Instead, there would be no report. Apparently,
|
||
|
they couldn't draft one which supported, on the evidence, what they
|
||
|
had decided to do instead.
|
||
|
|
||
|
|
||
|
THE OTHER SHOE DROPS
|
||
|
|
||
|
On Friday, February 4, the other jack-boot dropped. A series of
|
||
|
announcements from the Administration made it clear that cryptography
|
||
|
would become their very own "Bosnia of telecommunications" (as one
|
||
|
staffer put it). It wasn't just that the old Serbs in the NSA and the
|
||
|
FBI were still making the calls. The alarming new reality was that the
|
||
|
invertebrates in the White House were only too happy to abide by them.
|
||
|
Anything to avoid appearing soft on drugs or terrorism.
|
||
|
|
||
|
So, rather than ditching Clipper, they declared it a Federal Data
|
||
|
Processing Standard, backing that up with an immediate government
|
||
|
order for 50,000 Clipper devices. They appointed NIST and the
|
||
|
Department of Treasury as the "trusted" third parties that would hold
|
||
|
the Clipper key pairs. (Treasury, by the way, is also home to such
|
||
|
trustworthy agencies as the Secret Service and the Bureau of Alcohol,
|
||
|
Tobacco, and Firearms.)
|
||
|
|
||
|
They re-affirmed the export embargo on robust encryption products,
|
||
|
admitting for the first time that its purpose was to stifle
|
||
|
competition to Clipper. And they outlined a very porous set of
|
||
|
requirements under which the cops might get the keys to your chip.
|
||
|
(They would not go into the procedure by which the NSA would get them,
|
||
|
though they assured us it was sufficient.)
|
||
|
|
||
|
They even signaled the impending return of the dread Digital
|
||
|
Telephony, an FBI legislative initiative which would require
|
||
|
fundamentally re-engineering the information infrastructure to make
|
||
|
provision of wiretapping ability the paramount design priority.
|
||
|
|
||
|
|
||
|
INVASION OF THE BODY SNATCHERS
|
||
|
|
||
|
Actually, by the time the announcements thudded down, I wan't
|
||
|
surprised by them. I had spent several days the previous week in and
|
||
|
around the White House.
|
||
|
|
||
|
I felt like I was in another re-make of The Invasion of the Body
|
||
|
Snatchers. My friends in the Administration had been transformed.
|
||
|
They'd been subsumed by the vast mind-field on the other side of the
|
||
|
security clearance membrane, where dwell the monstrous bureaucratic
|
||
|
organisms which feed themselves on fear. They'd adopted the
|
||
|
institutionally paranoid National Security Weltanschauung.
|
||
|
|
||
|
They used all the tell-tale phrases. Mike Nelson, the White House
|
||
|
point man on NII, told me, "If only I could tell you what I know,
|
||
|
you'd feel the same way I do." I told him I'd been inoculated against
|
||
|
that argument during Vietnam. (And it does seem to me that if you're
|
||
|
going to initiate a process which might end freedom in America, you
|
||
|
probably need an argument that isn't classified.)
|
||
|
|
||
|
Besides, how does he know what he knows? Where does he get his
|
||
|
information? Why the NSA, of course. Which, given its strong interest
|
||
|
in the outcome, seems hardly an unimpeachable source.
|
||
|
|
||
|
However they reached it, Clinton and Gore have an astonishingly simple
|
||
|
bottom line, against which even the future of American liberty and
|
||
|
prosperity is secondary: They believe that it is their responsibility
|
||
|
to eliminate, by whatever means, the possibility that some terrorist
|
||
|
might get a nuke and use it on, say, the World Trade Center. They have
|
||
|
been convinced that such plots are more likely to ripen to their
|
||
|
hideous fruition behind a shield of encryption.
|
||
|
|
||
|
The staffers I talked to were unmoved by the argument that anyone
|
||
|
smart enough to steal and detonate a nuclear device is probably smart
|
||
|
enough to use PGP or some other uncompromised crypto standard. And
|
||
|
never mind that the last people who popped a hooter in the World Trade
|
||
|
Center were able to put it there without using any cryptography and
|
||
|
while under FBI surveillance.
|
||
|
|
||
|
We are dealing with religion here. Though only 10 American lives were
|
||
|
lost to terrorism in the last two years, the primacy of this threat
|
||
|
has become as much an article of faith with these guys as the Catholic
|
||
|
conviction that
|
||
|
human life begins at conception or the Mormon belief that the Lost
|
||
|
Tribe of Israel crossed the Atlantic in submarines.
|
||
|
|
||
|
In the spirit of openness and compromise, they invited EFF to submit
|
||
|
other solutions to the "problem" of the nuclear-enabled terrorist
|
||
|
besides key escrow devices, but they would not admit into discussion
|
||
|
the argument that such a threat might, in fact, be some kind of
|
||
|
phantasm created by the spooks to ensure their lavish budgets into the
|
||
|
Post-Cold War era.
|
||
|
|
||
|
As to the possibility that good old-fashioned investigative techniques
|
||
|
might be more valuable in preventing their show-case catastrophe (as
|
||
|
it was after the fact in finding the alleged perpetrators of the last
|
||
|
attack on the World Trade Center),they just hunkered down and said
|
||
|
that when wire-taps were necessary, they were damned well necessary.
|
||
|
|
||
|
When I asked about the business that American companies lose to their
|
||
|
inability to export good encryption products, one staffer essentially
|
||
|
dismissed the market, saying that total world trade in crypto goods
|
||
|
was still less than a billion dollars. (Well, right. Thanks more to
|
||
|
the diligent efforts of the NSA than lack of sales potential.)
|
||
|
|
||
|
I suggested that a more immediate and costly real-world effect of
|
||
|
their policies would be reducing national security by isolating
|
||
|
American commerce, owing to a lack of international confidence in the
|
||
|
security of our data lines. I said that Bruce Sterling's fictional
|
||
|
data-enclaves in places like the Turks and Caicos Islands were
|
||
|
starting to look real world inevitable.
|
||
|
|
||
|
They had a couple of answers to this, one unsatisfying and the other
|
||
|
scary. Their first answer was that the international banking
|
||
|
community could just go on using DES, which still seemed robust enough
|
||
|
to them. [DES is the old federal Data Encryption Standard, thought by
|
||
|
most cryptologists to be nearing the end of its credibility.]
|
||
|
|
||
|
More troubling was their willingness to counter the data-enclave
|
||
|
future with one in which no data channels anywhere would be secure
|
||
|
from examination by some government or another. They pointed to
|
||
|
unnamed other countries which were developing their own mandatory
|
||
|
standards and restrictions regarding cryptography and have said to me
|
||
|
on several occasions words to the effect that, "Hey, it's not like you
|
||
|
can't outlaw the stuff. Look at France."
|
||
|
|
||
|
Of course, they have also said repeatedly...and for now I believe
|
||
|
them...that they have absolutely no plans to outlaw non-Clipper crypto
|
||
|
in the U.S. But that doesn't mean that such plans couldn't develop in
|
||
|
the presence of some pending "emergency." Then there is that White
|
||
|
House briefing document, issued at the time Clipper was first
|
||
|
announced, which asserts that no U.S. citizen "as a matter of right,
|
||
|
is entitled to an unbreakable commercial encryption product."
|
||
|
|
||
|
Now why, if it's an ability they have no intention of contesting, do
|
||
|
they feel compelled to declare that it's not a right? Could it be that
|
||
|
they are preparing us for the laws they'll pass after some bearded
|
||
|
fanatic has gotten himself a surplus nuke and used something besides
|
||
|
Clipper to conceal his plans for it?
|
||
|
|
||
|
If they are thinking about such an eventuality, we should be doing so
|
||
|
as well. How will we respond? I believe there is a strong, though
|
||
|
currently untested, argument that outlawing unregulated crypto would
|
||
|
violate the First Amendment, which surely protects the manner of our
|
||
|
speech as clearly as it protects the content.
|
||
|
|
||
|
But of course the First Amendment is, like the rest of the
|
||
|
Constitution, only as good as the government's willingness of the to
|
||
|
uphold it. And they are, as I say, in a mood to protect our safety
|
||
|
over our liberty.
|
||
|
|
||
|
This is not a mind-frame against which any argument is going to be
|
||
|
very effective. And it appeared that they had already heard and
|
||
|
rejected every argument I could possibly offer.
|
||
|
|
||
|
In fact, when I drew what I thought was an original comparison between
|
||
|
their stand against naturally proliferating crypto and the folly of
|
||
|
King Canute (who placed his throne on the beach and commanded the tide
|
||
|
to leave him dry), my opposition looked pained and said he had heard
|
||
|
that one almost as often as jokes about road-kill on the Information
|
||
|
Superhighway.
|
||
|
|
||
|
I hate to go to war with them. War is always nastier among friends.
|
||
|
Furthermore, unless they've decided to let the NSA design the rest of
|
||
|
the National Information Infrastructure as well, we need to go on
|
||
|
working closely with them on the whole range of issues like access,
|
||
|
competition, workplace privacy, common carriage, intellectual
|
||
|
property, and such. Besides, the proliferation of strong crypto will
|
||
|
probably happen eventually no matter what they do.
|
||
|
|
||
|
But then again, it might not. In which case we could shortly find
|
||
|
ourselves under a government that would have the automated ability to
|
||
|
log the time, origin and recipient of everycall we made, could track
|
||
|
our physical whereabouts continuously, could keep better account of
|
||
|
our financial transactions than we do, and all without a warrant. Talk
|
||
|
about crime prevention!
|
||
|
|
||
|
Worse, under some vaguely defined and surely mutable "legal
|
||
|
authority," they also would be able to listen to our calls and read
|
||
|
our e-mail without having to do any backyard rewiring. (And wouldn't
|
||
|
even need that to monitor our overseas calls.)
|
||
|
|
||
|
If there's going to be a fight, I'd far rather it be with this
|
||
|
government than the one we'd likely face on that hard day.
|
||
|
|
||
|
Hey, I've never been a paranoid before. It's always seemed to me that
|
||
|
most governments are too incompetent to keep a good plot strung
|
||
|
together all the way from coffee break to quitting time. But I am now
|
||
|
very nervous about the government of the United States of America.
|
||
|
|
||
|
Because Bill 'n' Al, whatever their other new paradigm virtues, have
|
||
|
allowed the very old paradigm trogs of the Guardian Class to the
|
||
|
define as their highest duty the defense of America against an enemy
|
||
|
that exists primarily in the imagination and is therefore capable of
|
||
|
anything.
|
||
|
|
||
|
To assure absolute safety against such an enemy, there is no limit to
|
||
|
the liberties we will eventually be asked to sacrifice. And, with a
|
||
|
Clipper chip in every phone, there will certainly be no technical
|
||
|
limit on their ability to enforce those sacrifices.
|
||
|
|
||
|
|
||
|
WHAT YOU CAN DO
|
||
|
|
||
|
GET CONGRESS TO LIFT THE CRYPTO EMBARGO
|
||
|
|
||
|
The Administration is trying to impose Clipper on us by manipulating
|
||
|
market forces. Purchasing massive numbers of Clipper devices, they
|
||
|
intend to produce an economy of scale which will make them cheap while
|
||
|
their export embargo renders all competition either expensive or
|
||
|
non-existent.
|
||
|
|
||
|
We have to use the market to fight back. While it's unlikely that
|
||
|
they'll back down on Clipper deployment, the Electronic Frontier
|
||
|
Foundation believes that with sufficient public involvement, we can
|
||
|
get Congress to eliminate the export embargo.
|
||
|
|
||
|
Rep. Maria Cantwell (D-WA) has a bill (H.R. 3627) before the Economic
|
||
|
Policy, Trade, and Environment Science Subcommittee of the House
|
||
|
Foreign Affairs Committee which would do exactly that. She will need a
|
||
|
lot of help from the public. They may not care much about your privacy
|
||
|
in DC, but they still care about your vote.
|
||
|
|
||
|
Please signal your support of H.R. 3627, either by writing her
|
||
|
directly or e-mailing her at cantwell@eff.org. Messages sent to that
|
||
|
address will be printed out and delivered to her office. In the
|
||
|
Subject header of your message, please include the words "support HR
|
||
|
3627." In the body of your message, express your reasons for
|
||
|
supporting the bill. You may also express your sentiments to Rep. Lee
|
||
|
Hamilton, the Foreign Relations Committee chairman, by e-mailing
|
||
|
hamilton@eff.org.
|
||
|
|
||
|
Furthermore, since there is nothing quite as powerful as a letter from
|
||
|
a constituent, you should check the following list of subcommittee and
|
||
|
committee members to see if your congressperson is among them. If so,
|
||
|
please copy them your letter to Ms. Cantwell.
|
||
|
|
||
|
Economic Policy, Trade, and Environment Science Subcommittee:
|
||
|
Democrats: Sam Gejdenson (Chairman), James Oberstar, Cynthia McKinney,
|
||
|
Maria Cantwell, Eric Fingerhut, Albert R. Wynn, Harry Johnston, Eliot
|
||
|
Engel, Charles Schumer. Republicans: Toby Roth (ranking), Donald
|
||
|
Manzullo, Doug Bereuter, Jan Meyers, Cass Ballenger, Dana Rohrabacher.
|
||
|
|
||
|
Foreign Affairs Committee:
|
||
|
Democrats: Lee Hamilton (Chairman), Tom Lantos, Robert Torricelli,
|
||
|
Howard Berman, Gary Ackerman, Eni Faleomavaega, Matthew Martinez,
|
||
|
Robert Borski, Donal Payne, Robert Andrews, Robert Menendez, Sherrod
|
||
|
Brown, Alcee Hastings, Peter Deutsch, Don Edwards, Frank McCloskey,
|
||
|
Thomas Sawyer, Luis Gutierrez. Republicans: Benjamin Gilman (ranking),
|
||
|
William Goodling, Jim Leach, Olympia Snowe, Henry Hyde, Christopher
|
||
|
Smith, Dan Burton, Elton Gallegly, Ileana Ros-Lehtinen, David Levy,
|
||
|
Lincoln Diaz-Balart, Ed Royce.
|
||
|
|
||
|
|
||
|
BOYCOTT CLIPPER DEVICES AND THE COMPANIES WHICH MAKE THEM.
|
||
|
|
||
|
Don't buy anything with a Clipper chip in it. Don't buy any product
|
||
|
from a company which manufactures devices with "Big Brother Inside."
|
||
|
It is likely that the government will ask you to use Clipper for
|
||
|
communications with the IRS or when doing business with Federal
|
||
|
agencies. They cannot, as yet, require you to do so. Just say no.
|
||
|
|
||
|
|
||
|
LEARN ABOUT ENCRYPTION AND EXPLAIN THE ISSUES TO YOUR UNWIRED FRIENDS
|
||
|
|
||
|
The administration is banking on the likelihood that this stuff too
|
||
|
technically obscure to agitate anyone but nerds like us. You prove
|
||
|
them wrong by patiently explaining what's going on to all the people
|
||
|
you know who have never touched a computer and glaze over at the
|
||
|
mention of words like "cryptography."
|
||
|
|
||
|
Maybe you glaze over yourself. Don't. It's not that hard. For some
|
||
|
hands-on experience, download a copy of PGP, a shareware encryption
|
||
|
engine which uses the robust RSA encryption algorithm. and learn to
|
||
|
use it.
|
||
|
|
||
|
|
||
|
GET YOUR COMPANY TO THINK ABOUT EMBEDDING REAL CRYPTOGRAPHY IN ITS
|
||
|
PRODUCTS
|
||
|
|
||
|
If you work for a company which makes software, computer hardware, or
|
||
|
any kind of communications device, work from within to get them to
|
||
|
incorporate RSA or some other strong encryption scheme into their
|
||
|
products. If they say that they are afraid to violate the export
|
||
|
embargo, ask them to consider manufacturing such products overseas and
|
||
|
importing them back into the United States. There appears to be no law
|
||
|
against that. As yet.
|
||
|
|
||
|
You might also lobby your company to join the Digital Privacy and
|
||
|
Security Working Group, a coalition of companies and public interest
|
||
|
groups that includes IBM, Apple, Sun, Microsoft (and, interestingly,
|
||
|
Clipper phone manufacturer AT&T) that is working to get the embargo
|
||
|
lifted.
|
||
|
|
||
|
|
||
|
JOIN EFF, CPSR, OR BOTH
|
||
|
|
||
|
Self-serving as it sounds coming from me, I think you can do a lot to
|
||
|
help by becoming a member of one of these organizations. In addition
|
||
|
to giving you access to the latest information on this subject, every
|
||
|
additional member strengthens our credibility with Congress.
|
||
|
|
||
|
Join the Electronic Frontier Foundation by writing membership@eff.org.
|
||
|
Join Computer Professionals for Social Responsibility by writing
|
||
|
[provide e-mail address here.]
|
||
|
|
||
|
In his LA speech, Gore called the development of the NII "a
|
||
|
revolution." And it is a revolutionary war we are engaged in here.
|
||
|
Clipper is a last ditch attempt by the United States, the last great
|
||
|
power from the Industrial Era, to establish imperial control over
|
||
|
Cyberspace. If they win, the most liberating development in the
|
||
|
history of humankind could become, instead, the surveillance system
|
||
|
which will monitor our grandchildren's morality. We can be better
|
||
|
ancestors than that.
|
||
|
|
||
|
|
||
|
John Perry Barlow is co-founder and Vice-Chairman of the Electronic
|
||
|
Frontier Foundation, a group which defends liberty, both in Cyberspace
|
||
|
and the Physical World. He has three daughters.
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Mon, 7 Mar 1994 21:12:57 -0500 (EST)
|
||
|
From: Stanton McCandlish <mech@EFF.ORG>
|
||
|
Subject: File 2--Leahy to hold hearings on Clipper Chip!
|
||
|
|
||
|
Dear Friends on the Electronic Frontier:
|
||
|
|
||
|
I have some good news to share with you. Senator Leahy just sent me a
|
||
|
letter indicating that he *will* be scheduling hearings on the
|
||
|
Administration's Clipper Chip proposal. I would like to thank all of
|
||
|
you who sent us messages to forward to him urging hearings. I'm sure
|
||
|
that stack of messages we printed out made a significant impact on the
|
||
|
Senator -- the stack was over seven inches tall! (We look forward to
|
||
|
the day when no trees will have to be sacrificed in the furtherance of
|
||
|
democracy!)
|
||
|
|
||
|
And if you haven't written a message to Rep. Cantwell yet about her
|
||
|
proposed amendment to the Export Control Act, please do so and forward
|
||
|
it to cantwell@eff.org. This is an address we set up to enable us to
|
||
|
collect messages in support of her bill. We have been printing out
|
||
|
messages and delivering them each week -- so far we've received over
|
||
|
4500 letters of support. For more information on the Cantwell bill,
|
||
|
send a message to cantwell-info@eff.org.
|
||
|
|
||
|
Thanks again. We'll let you know as soon as the Clipper hearing gets
|
||
|
scheduled.
|
||
|
|
||
|
Sincerely,
|
||
|
|
||
|
Jerry Berman
|
||
|
EFF Executive Director
|
||
|
|
||
|
-.-.-.-.-.-.-. forward from Sen. Leahy -.-.-.-.-.-.-.-.-.-.
|
||
|
|
||
|
|
||
|
United States Senate
|
||
|
Committee on the Judiciary
|
||
|
Washington, DC 20510
|
||
|
|
||
|
March 1, 1994
|
||
|
|
||
|
Mr. Jerry Berman
|
||
|
Executive Director
|
||
|
Electronic Frontier Foundation
|
||
|
1001 G Street, Suite 950 East
|
||
|
Washington, DC 20001
|
||
|
|
||
|
Dear Jerry,
|
||
|
|
||
|
Thank you for forwarding to me the many thoughtful and informative messages
|
||
|
you received over the Internet regarding the Administration's recent
|
||
|
approval of an escrowed encryption standard, known as the Clipper Chip.
|
||
|
|
||
|
Many of the messages urge Congress to hold hearings to review the
|
||
|
Administration's Clipper Chip standard. In fact, I intend to hold a
|
||
|
hearing before the Judiciary Subcommittee on Technology and the Law, which
|
||
|
I chair, to consider the important issues raised by the Clipper Chip. I
|
||
|
will let you know when a date for the hearing is scheduled.
|
||
|
|
||
|
Thank you again.
|
||
|
|
||
|
Sincerely,
|
||
|
|
||
|
/s/ PATRICK J. LEAHY
|
||
|
United States Senator
|
||
|
|
||
|
PJL/jud
|
||
|
-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.
|
||
|
|
||
|
JOIN EFF!!
|
||
|
==========
|
||
|
|
||
|
EFF's work as a civil liberties organization in Washington has been very
|
||
|
successful, but the realization of our goals of freedom and privacy online
|
||
|
can only come with the active and vocal participation of the entire online
|
||
|
community. Now that you have personally experienced both the threat of the
|
||
|
loss of your privacy and the power having won the first battle, won't you
|
||
|
take that next step and become a member of EFF?
|
||
|
|
||
|
By joining EFF, you will help us to expand our reach to educate and involve
|
||
|
an even greater number of people in the shaping of these critical issues.
|
||
|
Your tax-deductible donation will tie you into the EFF information network
|
||
|
and support our public policy and legal work. As a member, you will be
|
||
|
guaranteed timely the timely information and mechanism you need to respond
|
||
|
on these issues. Our voices in unity *do* make a difference.
|
||
|
|
||
|
-------- 8< ------- cut here ------- 8< --------
|
||
|
|
||
|
|
||
|
MEMBERSHIP IN THE ELECTRONIC FRONTIER FOUNDATION
|
||
|
================================================
|
||
|
|
||
|
Print out in monospaced (non-proportional) font and mail to:
|
||
|
|
||
|
Membership Coordinator
|
||
|
Electronic Frontier Foundation
|
||
|
1001 G Street, NW, Suite 950 East, Washington, DC 20001
|
||
|
|
||
|
|
||
|
SIGN ME UP!
|
||
|
-----------
|
||
|
|
||
|
I wish to become a member of the Electronic Frontier Foundation. I enclose:
|
||
|
|
||
|
___ Regular membership -- $40
|
||
|
___ Student membership -- $20
|
||
|
|
||
|
|
||
|
* Special Contribution
|
||
|
|
||
|
I wish to make an additional tax-deductible donation in the amount of
|
||
|
$__________ to further support the activities of EFF and to broaden
|
||
|
participation in the organization.
|
||
|
|
||
|
|
||
|
PAYMENT METHOD:
|
||
|
---------------
|
||
|
|
||
|
___ Enclosed is a check or money order payable to
|
||
|
the Electronic Frontier Foundation.
|
||
|
|
||
|
___ Please charge my:
|
||
|
|
||
|
___ MasterCard ___ Visa ___ American Express
|
||
|
|
||
|
Card Number: _____________________________________________
|
||
|
|
||
|
Expiration Date: _________________________________________
|
||
|
|
||
|
Signature: _______________________________________________
|
||
|
|
||
|
NOTE: We do not recommend sending credit card information via email!
|
||
|
|
||
|
|
||
|
YOUR CONTACT INFORMATION:
|
||
|
-------------------------
|
||
|
|
||
|
Name: __________________________________________________________
|
||
|
|
||
|
Organization: __________________________________________________
|
||
|
|
||
|
Address: _______________________________________________________
|
||
|
|
||
|
_______________________________________________________
|
||
|
|
||
|
Phone: _____________________
|
||
|
|
||
|
FAX: _____________________
|
||
|
|
||
|
BBS: _____________________ BBS Name: ____________________
|
||
|
|
||
|
E-mail addresses: ______________________________________________
|
||
|
|
||
|
______________________________________________
|
||
|
|
||
|
PREFERRED CONTACT
|
||
|
|
||
|
___ Electronic: Please contact me via the Internet address listed above.
|
||
|
I would like to receive the following at that address:
|
||
|
|
||
|
___ EFFector Online - EFF's biweekly electronic newsletter
|
||
|
(back issues available from ftp.eff.org,
|
||
|
pub/EFF/Newsletters/EFFector).
|
||
|
|
||
|
___ Online Bulletins - bulletins on key developments
|
||
|
affecting online communications.
|
||
|
|
||
|
NOTE: Traffic may be high. You may wish to browse these
|
||
|
publications in the Usenet newsgroup comp.org.eff.news (also
|
||
|
available in FidoNet, as EFF-NEWS).
|
||
|
|
||
|
___ Paper: Please contact EFF through the US Mail at the street
|
||
|
address listed above.
|
||
|
|
||
|
NOTE: Paper documents available upon request.
|
||
|
"Networks & Policy" Newsletter automatically sent via US Mail.
|
||
|
|
||
|
|
||
|
PRIVACY POLICY
|
||
|
--------------
|
||
|
|
||
|
EFF occasionally shares our mailing list with other organizations promoting
|
||
|
similar goals. However, we respect an individual's right to privacy and
|
||
|
will not distribute your name without explicit permission.
|
||
|
|
||
|
___ I grant permission for the EFF to distribute my name and contact
|
||
|
information to organizations sharing similar goals.
|
||
|
|
||
|
[This form from eff.org 3/7/94 Cantwell--please leave this line on the form!]
|
||
|
|
||
|
The Electronic Frontier Foundation is a nonprofit, 501(c)(3) organization
|
||
|
supported by contributions from individual members, corporations and
|
||
|
private foundations. Donations are tax-deductible.
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Sun, 6 Mar 94 19:12:56 CST
|
||
|
From: susan@UTAFLL.UTA.EDU(Susan Herring)
|
||
|
Subject: File 3--Survey: communication ethics on the net
|
||
|
|
||
|
The following survey is part of a project I am conducting on communication
|
||
|
ethics on the net. I'd appreciate it if everyone who reads this message
|
||
|
could take a few minutes to answer and return the survey. All responses
|
||
|
will remain strictly confidential. A summary of the results will be made
|
||
|
available to respondents upon request.
|
||
|
|
||
|
=========================================================================
|
||
|
NETIQUETTE SURVEY
|
||
|
|
||
|
The following questions concern behavior on electronic discussion lists
|
||
|
and/or newsgroups. Answer on the basis of your personal experience and
|
||
|
reactions. Needless to say, there are no correct or incorrect answers.
|
||
|
|
||
|
1. What behaviors bother you most on the net?
|
||
|
|
||
|
2. What net behaviors do you most appreciate when you encounter them?
|
||
|
|
||
|
3. In an ideal world, what one change would you most like to see in
|
||
|
the way people participate on the net?
|
||
|
|
||
|
|
||
|
SPECIFIC BEHAVIORS
|
||
|
For each behavior listed below, place an X under the number that indicates
|
||
|
how common the behavior is in your experience on the net, and your typical
|
||
|
reaction when you encounter it. (If the behavior reminds you of a particular
|
||
|
list or group, feel free to mention the group or otherwise comment.)
|
||
|
|
||
|
rare common like dislike
|
||
|
1. Participants post very 1 2 3 4 5 1 2 3 4 5
|
||
|
long messages
|
||
|
|
||
|
2. Participants post short 1 2 3 4 5 1 2 3 4 5
|
||
|
messages
|
||
|
|
||
|
3. The same participant(s) 1 2 3 4 5 1 2 3 4 5
|
||
|
post frequently
|
||
|
|
||
|
4. Requests are posted for 1 2 3 4 5 1 2 3 4 5
|
||
|
obvious or easily-
|
||
|
obtained information
|
||
|
|
||
|
5. Requests are posted on 1 2 3 4 5 1 2 3 4 5
|
||
|
FAQs or topic previously
|
||
|
discussed
|
||
|
rare common like dislike
|
||
|
6. Messages don't contain 1 2 3 4 5 1 2 3 4 5
|
||
|
explicit subject headers
|
||
|
|
||
|
7. Messages contain typos 1 2 3 4 5 1 2 3 4 5
|
||
|
or spelling errors
|
||
|
|
||
|
8. Messages are unclearly 1 2 3 4 5 1 2 3 4 5
|
||
|
worded or otherwise obscure
|
||
|
|
||
|
9. Messages posted on topics 1 2 3 4 5 1 2 3 4 5
|
||
|
not directly related to
|
||
|
focus of list/newsgroup
|
||
|
|
||
|
10. Same msg. posted more than 1 2 3 4 5 1 2 3 4 5
|
||
|
once to same list/newsgroup
|
||
|
rare common like dislike
|
||
|
11. Message cross-posted to 1 2 3 4 5 1 2 3 4 5
|
||
|
multiple lists/newsgroups
|
||
|
|
||
|
12. Messages sent publicly 1 2 3 4 5 1 2 3 4 5
|
||
|
instead of to listserv or
|
||
|
to a private individual
|
||
|
|
||
|
13. Messages quote all of 1 2 3 4 5 1 2 3 4 5
|
||
|
message being responded to
|
||
|
|
||
|
14. Elaborate signature files 1 2 3 4 5 1 2 3 4 5
|
||
|
|
||
|
15. Messages contain personal 1 2 3 4 5 1 2 3 4 5
|
||
|
or intimate information
|
||
|
about sender
|
||
|
rare common like dislike
|
||
|
16. Messages compliment or 1 2 3 4 5 1 2 3 4 5
|
||
|
thank others for their
|
||
|
messages
|
||
|
|
||
|
17. Messages agree with the 1 2 3 4 5 1 2 3 4 5
|
||
|
content of previous msgs.
|
||
|
|
||
|
18. Messages challenge the 1 2 3 4 5 1 2 3 4 5
|
||
|
content of previous msgs.
|
||
|
|
||
|
19. Messages have humorous 1 2 3 4 5 1 2 3 4 5
|
||
|
content
|
||
|
|
||
|
20. Messages are ironic or 1 2 3 4 5 1 2 3 4 5
|
||
|
sarcastic in tone
|
||
|
rare common like dislike
|
||
|
21. Messages contain insider 1 2 3 4 5 1 2 3 4 5
|
||
|
references understandable
|
||
|
only to members of that group
|
||
|
|
||
|
22. Messages give advice to 1 2 3 4 5 1 2 3 4 5
|
||
|
other participants
|
||
|
|
||
|
23. Messages sympathize with 1 2 3 4 5 1 2 3 4 5
|
||
|
other participants
|
||
|
|
||
|
24. Messages are tentative or 1 2 3 4 5 1 2 3 4 5
|
||
|
overly polite
|
||
|
|
||
|
25. Messages forcefully 1 2 3 4 5 1 2 3 4 5
|
||
|
assert sender's views
|
||
|
rare common like dislike
|
||
|
26. Participants boast of own 1 2 3 4 5 1 2 3 4 5
|
||
|
achievements/importance
|
||
|
|
||
|
27. Messages contain profanity 1 2 3 4 5 1 2 3 4 5
|
||
|
|
||
|
28. Messages have racist 1 2 3 4 5 1 2 3 4 5
|
||
|
content
|
||
|
|
||
|
29. Messages have sexist 1 2 3 4 5 1 2 3 4 5
|
||
|
content
|
||
|
|
||
|
30. Participants "flame" or 1 2 3 4 5 1 2 3 4 5
|
||
|
express strong negative
|
||
|
emotion
|
||
|
|
||
|
|
||
|
OTHER
|
||
|
1. How many screens does a message have to be before you consider it
|
||
|
"too long" (i.e. consider deleting it or skipping to the next message)?
|
||
|
|
||
|
2. Would you favor limits on length and/or frequency of posting to public
|
||
|
lists/newsgroups? If so, what limits would you propose?
|
||
|
|
||
|
3. Put an X next to the statement that best applies:
|
||
|
In my experience on the net, participants behave politely and
|
||
|
appropriately
|
||
|
a) almost all the time
|
||
|
b) most of the time, with some exceptions
|
||
|
c) about half of the time
|
||
|
d) not very often
|
||
|
e) almost never
|
||
|
|
||
|
|
||
|
RESPONDENT BACKGROUND INFORMATION (important)
|
||
|
1. Age: under 25; 25-35; 36-45; 46-55; 56-65; over 65
|
||
|
|
||
|
2. Sex: M F
|
||
|
|
||
|
3. Ethnicity: White (non-Hispanic); Asian; African-American;
|
||
|
Hispanic; Native American; other
|
||
|
|
||
|
4. Native language if other than English:
|
||
|
|
||
|
5. Academic position: Prof; Assoc. Prof; Assist. Prof; Instructor
|
||
|
(non tenure-track); Grad student; Undergrad; academic staff;
|
||
|
researcher; not associated with academia
|
||
|
|
||
|
6. Field of specialization:
|
||
|
|
||
|
7. Number of years using computer networks:
|
||
|
|
||
|
8. Number of electronic discussion lists you currently subscribe to:
|
||
|
|
||
|
9. How often, on the average, do you contribute to these lists?
|
||
|
|
||
|
10. Number of newsgroups you read (regularly or occasionally):
|
||
|
|
||
|
11. How often, on the average, do you contribute to these newsgroups?
|
||
|
|
||
|
|
||
|
=====================================================================
|
||
|
Thank you for responding. Please send surveys and requests for
|
||
|
summary of survey results to susan@utafll.uta.edu or (snail mail):
|
||
|
Prof. Susan Herring, Program in Linguistics, University of Texas,
|
||
|
Arlington, TX 76019 USA.
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Sun, 6 Mar 94 02:21:40 PST
|
||
|
From: raustin@pro-palmtree.socal.com (Ronald Austin)
|
||
|
Subject: File 4--Starring Tom Cruise as Kevin Poulsen?
|
||
|
|
||
|
((The following is reprinted from Telecom Digest (V 14: #115))
|
||
|
|
||
|
Daily Variety
|
||
|
March 3, 1994 Thursday
|
||
|
|
||
|
SECTION: NEWS; Pg.1
|
||
|
BYLINE: MICHAEL FLEMING
|
||
|
|
||
|
PAR'S HACK ATTACK: Though the minds of Paramount execs have surely
|
||
|
been on potential whackings, computer hacking was the chief focus of
|
||
|
execs Bob Jaffe and John Goldwyn last week. The execs got Par to pay a
|
||
|
low six-figure fee against mid-six figures to Jonathan Littman for the
|
||
|
rights to make a movie from his Sept. 12 {L.A. Times Magazine} article
|
||
|
"The Last Hacker," and major names are lining up to be involved. It's
|
||
|
the story of Kevin Lee Poulson, a skilled computer hacker who was so
|
||
|
inventive he once disabled the phone system of KIIS-FM so he could be
|
||
|
the 102nd caller and win the $50,000 Porsche giveaway.
|
||
|
|
||
|
More seriously, he's been charged with using his expertise to breach
|
||
|
national security by accessing top secret files and selling the
|
||
|
information. He's even suspected of disabling the phone systems of
|
||
|
"Unsolved Mysteries" after he was profiled, so that callers couldn't
|
||
|
furnish clues to his whereabouts. Poulson was caught and has been in
|
||
|
jail for the last three years, facing more than 100 years in prison.
|
||
|
|
||
|
ICM agent Kris Dahl got Littman to turn the article into a book for
|
||
|
Little, Brown, and ICM's Irene Webb racked up yet another sale for the
|
||
|
screen rights to the hacker story. It was a vigorous tug of war
|
||
|
between Touchstone, which was trying to purchase it for "City
|
||
|
Slickers" director Ron Underwood, and Paramount, chasing it for
|
||
|
producer Oren Koules.
|
||
|
|
||
|
Littman chose Koules, and now, Dish hears, Underwood wants to join
|
||
|
Koules to direct. Littman, meanwhile, has remained tight with the
|
||
|
underground community of hackers as he researches his book. That takes
|
||
|
its toll. Among other things, the mischief meisters have already
|
||
|
changed his voice mail greeting to render an obscene proposal.
|
||
|
|
||
|
---------------------
|
||
|
|
||
|
UUCP: hatch!pro-palmtree!raustin The Palmtree BBS
|
||
|
Inet: raustin@pro-palmtree.socal.com 310-453-8726 v.32
|
||
|
|
||
|
|
||
|
[TELECOM Digest Editor's Note: Thanks for passing this along. For
|
||
|
readers who do not remember/know of Poulsen, we have a file about him
|
||
|
in the Telecom Archives. As the article above points out, he will
|
||
|
probably be in jail for a long time to come. Articles about other
|
||
|
hackerphreaks who have been arrested and their exploits are in the
|
||
|
same sub-directory in the Archives. You can reach the Archives using
|
||
|
anonymous ftp lcs.mit.edu. PAT]
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
End of Computer Underground Digest #6.24
|
||
|
************************************
|
||
|
|