875 lines
38 KiB
Plaintext
875 lines
38 KiB
Plaintext
|
|
||
|
Computer underground Digest Sun Apr 7, 1996 Volume 8 : Issue 28
|
||
|
ISSN 1004-042X
|
||
|
|
||
|
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
|
||
|
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
|
||
|
Archivist: Brendan Kehoe
|
||
|
Shadow Master: Stanton McCandlish
|
||
|
Field Agent Extraordinaire: David Smith
|
||
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
||
|
Ralph Sims / Jyrki Kuoppala
|
||
|
Ian Dickinson
|
||
|
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
||
|
|
||
|
CONTENTS, #8.28 (Sun, Apr 7, 1996)
|
||
|
|
||
|
File 1--Singapore leader condemns Net as porn, bomb-building haven
|
||
|
File 2--Computers, Porn, the Law and the Media (One day in the UK)
|
||
|
File 3--German Internet Update (3/29/96)
|
||
|
File 4--Re: Australia's New South Wales tries net-censorship
|
||
|
File 5--Letter to the Minister of Justice (Canada)
|
||
|
File 6--ACM/IEEE Letter on Crypto
|
||
|
File 7--NETRADIO--"CYBERSPACE LAW for NONLAWYERS" E-Mail Seminar (fwd)
|
||
|
File 8--Formal FCC Complaint Filed Against I-Phone
|
||
|
File 9--Re: Formal FCC Complaint Filed Against I-Phone
|
||
|
File 10--IMPACT: U. Penn on CDA
|
||
|
File 11--Cu Digest Header Info (unchanged since 7 Apr, 1996)
|
||
|
|
||
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
||
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
||
|
|
||
|
---------------------------------------------------------------------
|
||
|
|
||
|
Date: Fri, 8 Mar 1996 02:57:14 -0500 (EST)
|
||
|
From: "Declan B. McCullagh" <declan+@CMU.EDU>
|
||
|
Subject: File 1--Singapore leader condemns Net as porn, bomb-building haven
|
||
|
|
||
|
ASEAN members include Malaysia, the Philippines, Thailand, Singapore,
|
||
|
Brunei, Indonesia and Vietnam. So if I'm keeping track properly, China,
|
||
|
the U.S., the E.C., Middle Eastern nations, and ASEAN all have said they
|
||
|
want greater controls on the Net. The unanimity is amazing.
|
||
|
|
||
|
Also today, Reuters reports that the first Sri Lankan cybercafes are opening
|
||
|
up...
|
||
|
|
||
|
-Declan
|
||
|
|
||
|
---------- Forwarded message begins here ----------
|
||
|
|
||
|
March 7, 1996
|
||
|
|
||
|
SINGAPORE (Reuter) - ASEAN information ministers warned
|
||
|
Thursday there was a dark side to the information technology
|
||
|
revolution and agreed to establish a regulatory body to oversee
|
||
|
the Internet invasion.
|
||
|
A joint press statement issued by the ministers said they
|
||
|
would set up the regulatory body by the end of the year to come
|
||
|
up with ``appropriate responses'' to the Internet.
|
||
|
|
||
|
[...]
|
||
|
|
||
|
The ministers earlier expressed concern about pornographic
|
||
|
content in cyberspace and information on the Internet that could
|
||
|
spread racial and religious tension within their countries.
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Tue, 2 Apr 1996 14:39:14 -0600
|
||
|
From: David G. Bell <dbell@zhochaka.demon.co.uk>
|
||
|
Subject: File 2--Computers, Porn, the Law and the Media (One day in the UK)
|
||
|
|
||
|
Computers, Pornography, the Law, and the Media -- One Day in the UK.
|
||
|
|
||
|
Today, the 2nd of April 1996, British Police forces raided 40 houses
|
||
|
looking for child pornography. In a court in Birmingham, two men plead
|
||
|
guilty when a judge ruled that computer images were photographs. And,
|
||
|
somehow, BBC Radio News managed to combine these two stories into the
|
||
|
usual 'Internet Pornography' story, despite a police denial that
|
||
|
computers were involved in the first story.
|
||
|
|
||
|
In fact, it was said by one police officer that video recordings were
|
||
|
the most common sort of material they encountered. Oddly enough, the
|
||
|
only recording medium mentioned in the news bulletins were 'computer
|
||
|
disks', while a longer report managed to bring in the Internet and
|
||
|
involve the 'usual suspects'.
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Mon, 1 Apr 1996 19:13:29 -0800 (PST)
|
||
|
From: Declan McCullagh <declan@EFF.ORG>
|
||
|
Subject: File 3--German Internet Update (3/29/96)
|
||
|
|
||
|
I'm cleaning out my mailbox now that I'm back from CFP, and found this. I
|
||
|
heard a common theme from the non-Americans at CFP -- if America, the
|
||
|
world's "freest" country, can engage in online censorship, then so can
|
||
|
they...
|
||
|
|
||
|
-Declan
|
||
|
|
||
|
---------- Forwarded message ----------
|
||
|
Date--Sat, 30 Mar 1996 07:08:14 -0800 (PST)
|
||
|
From--Jay Holovacs <holovacs@styx.ios.com>
|
||
|
Subject--News From Germany
|
||
|
|
||
|
|
||
|
The following is excerpted from Nando News Website, check it out for more
|
||
|
info.
|
||
|
_________________________________________________________________
|
||
|
|
||
|
GERMANY PLANS BILL TO PUNISH INTERNET INDECENCY
|
||
|
___________________________________________________________
|
||
|
|
||
|
Copyright © 1996 Nando.net
|
||
|
Copyright © 1996 Reuter Information Service
|
||
|
|
||
|
BONN (Mar 29, 1996 10:27 a.m. EST) - Germany's justice minister is
|
||
|
planning a new law making clear companies who provide access to the
|
||
|
Internet are not expected to police cyberspace on the lookout for
|
||
|
pornography or neo-Nazi propaganda.
|
||
|
|
||
|
Edzard Schmidt-Jortzig told reporters on Thursday night that firms who
|
||
|
offer a link to the worldwide computer network would only be punished
|
||
|
if they discovered illegal material was available via their service
|
||
|
and did nothing about it.
|
||
|
|
||
|
"Someone who opens a door cannot know what the people who walk through
|
||
|
it are going to be carrying," he said. "And if there were body
|
||
|
searches for everyone going through your door, people would simply
|
||
|
choose to go through another."
|
||
|
|
||
|
...
|
||
|
|
||
|
Internet regulation has been a particularly prickly issue in Germany.
|
||
|
Child pornography investigators searched the Munich offices of access
|
||
|
provider CompuServe in November and found several Internet pages they
|
||
|
considered illegal.
|
||
|
|
||
|
Authorities are also investigating several other online services as
|
||
|
part of a probe into pornographic and neo-Nazi material found on the
|
||
|
Internet.
|
||
|
|
||
|
But so far prosecutors have not been able to bring any charges, partly
|
||
|
because legal experts are unsure where new companies stand under laws
|
||
|
drafted long before they existed.
|
||
|
|
||
|
|
||
|
-----------------------------------------------------------------------
|
||
|
Jay Holovacs <holovacs@ios.com>
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Sat, 6 Apr 1996 10:03:30 -0500 (EST)
|
||
|
From: "Declan B. McCullagh" <declan+@CMU.EDU>
|
||
|
Subject: File 4--Re: Australia's New South Wales tries net-censorship
|
||
|
|
||
|
My growing collection of international Net-censorship attempts is at:
|
||
|
http://www.cs.cmu.edu/~declan/zambia/
|
||
|
|
||
|
-Declan
|
||
|
|
||
|
---------- Forwarded message begins here ----------
|
||
|
|
||
|
SYDNEY, April 3 (UPI) -- People will face a maximum penalty of one
|
||
|
year in jail or fines of $7,800 ($10,000 Australian) if caught
|
||
|
transmitting or advertising pornographic material on the Internet, the
|
||
|
New South Wales government announced Tuesday.
|
||
|
Corporations would face stiffer penalties, Attorney General Jeff Shaw
|
||
|
said at a press conference.
|
||
|
Under the state government's tough new legislation soon to be
|
||
|
introduced, it will be illegal to transmit, advertise, permit access to
|
||
|
and retrieve of pornographic material on-line.
|
||
|
The new laws will also cover computer games that include violence and
|
||
|
sexual activity, Shaw said.
|
||
|
He said the move to penalize people who peddle and download porn was
|
||
|
necessary to protect children, but he admitted policing the legislation
|
||
|
could be ``difficult.''
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Sun, 17 Mar 1996 23:19:17 -0500
|
||
|
From: Dov Wisebrod <sherlock@io.org>
|
||
|
Subject: File 5--Letter to the Minister of Justice (Canada)
|
||
|
|
||
|
Folks,
|
||
|
|
||
|
The following letter is in the mail.
|
||
|
|
||
|
It is a response to a pending amendment to the Canadian Criminal Code
|
||
|
revising the law of search and seizure of computer systems and data. While
|
||
|
not a Canadian Communications Decency Act, the legislative Bill reflects as
|
||
|
much misunderstanding of computers and computer mediated communication as
|
||
|
the infamous American Act.
|
||
|
|
||
|
The letter was prepared through the combined efforts of Dov Wisebrod, Daniel
|
||
|
Shap, David Fruitman, and John Kingdon. It has been sent to the Minister of
|
||
|
Justice (Hon. Allan Rock), the Department of Justice's advisor on computer
|
||
|
law (Donald Piragoff), the Federal Privacy Commissioner (Bruce Phillips),
|
||
|
and the local Member of Parliament (Tony Ianno).
|
||
|
|
||
|
Please distribute widely.
|
||
|
|
||
|
Dov
|
||
|
|
||
|
----------------------------------------------
|
||
|
|
||
|
The Legal Group for the Internet in Canada
|
||
|
206 St. George St., Suite 603
|
||
|
Toronto, Ontario, Canada M5R 2N6
|
||
|
http://www.io.org/~logic
|
||
|
logic@io.org - (416) 963-9434
|
||
|
|
||
|
March 18, 1996
|
||
|
|
||
|
The Honourable Allan Rock
|
||
|
Minister of Justice
|
||
|
Attorney General of Canada
|
||
|
Department of Justice
|
||
|
239 Wellington Street
|
||
|
Ottawa, Ontario K1A 0H8
|
||
|
|
||
|
Dear Mr. Rock:
|
||
|
|
||
|
Re: Bill C-118
|
||
|
"An Act to amend the Criminal Code and to amend certain other Acts"
|
||
|
|
||
|
The Legal Group for the Internet in Canada ("LoGIC") is a conduit for the
|
||
|
exchange of information and ideas about policies concerning emerging
|
||
|
communication and information technologies. We are devoted to ensuring
|
||
|
informed public, legislative, and regulatory responses to these
|
||
|
technologies, which at present are manifest most profoundly in the Internet.
|
||
|
We want to ensure that new laws and regulations have no detrimental effects
|
||
|
on the free and interactive communication of information.
|
||
|
|
||
|
We are concerned about certain proposed amendments to the Criminal Code
|
||
|
contained within Bill C-118 (as it was identified while passing First
|
||
|
Reading during the last complete session of the Legislature). Our concerns
|
||
|
relate to section 41 of the Bill. Section 41 proposes to amend the existing
|
||
|
Criminal Code section 487, which sets out information required for search
|
||
|
warrants.
|
||
|
|
||
|
For your immediate reference, we have attached to this letter the text of
|
||
|
section 487 as it would appear after being amended. The proposed amendments
|
||
|
are highlighted by capitalization. Our comments and recommendations with
|
||
|
respect to the substance of these provisions follow.
|
||
|
|
||
|
Comments
|
||
|
--------
|
||
|
|
||
|
The proposed amendments would introduce new subsections 487(2.1) and
|
||
|
487(2.2) providing for the search and seizure of computer systems and data.
|
||
|
Our primary concern is that the provisions do not adequately reflect the
|
||
|
complexities of computer use and communication. In particular, the
|
||
|
provisions do not accord with the distributed nature of the medium,
|
||
|
including the distribution of users of a particular computer system and the
|
||
|
distribution of data accessible by the system. The proposed amendments
|
||
|
ignore the globally distributed nature of data and its users.
|
||
|
|
||
|
The new subsection 487(2.1)(a) would provide that a person authorized to
|
||
|
search a computer system for data may use any computer system in the
|
||
|
building "to search any data contained in or available to the computer
|
||
|
system." The quoted language does not distinguish between the two sources
|
||
|
of data. However, there is good reason to treat data available to the
|
||
|
computer system differently from data contained within it. Data available
|
||
|
to the system may be physically located outside of the jurisdiction of the
|
||
|
issuer of the warrant, potentially bringing the persons authorizing and
|
||
|
conducting the search into conflict with foreign law. A similar concern is
|
||
|
identified and addressed in the existing subsection 487(2), which provides
|
||
|
for modified search warrants in circumstances where the subject of the
|
||
|
search "is believed to be in any other territorial division" within Canada.
|
||
|
In the context of the search of a computer system, it is quite probable that
|
||
|
the data available to the computer system includes data located in
|
||
|
jurisdictions outside of Canada. The international nature of the difficulty
|
||
|
calls for a solution beyond that offered by subsection 487(2). It is
|
||
|
necessary to have two distinct sets of provisions, one of which governs the
|
||
|
search of data "contained in" a computer system and another specifically
|
||
|
designed to address the difficulty of searching data "available to" a
|
||
|
computer system. The words "or available to" should be removed from the
|
||
|
proposed amendment to both subsections 487(2.1)(a) and 487(2.2)(a).
|
||
|
|
||
|
In addition, the proposed amendments do not respect the privacy rights of
|
||
|
persons whose data may be contained in or available to the computer system
|
||
|
subject to the search. The disregard for privacy rights may be seen in two
|
||
|
related ways. First, data available to the system may include data
|
||
|
contained in other computer systems and available only by password access to
|
||
|
those other systems. The other computer systems may be within the control,
|
||
|
ownership, and reasonable expectation of privacy of persons unrelated to the
|
||
|
subject and purpose of the search warrant. The provisions thus create a
|
||
|
"backdoor" to search computer systems for which a warrant has not directly
|
||
|
been issued. Similarly, data contained in the computer system may be
|
||
|
subject to the control, ownership, and reasonable expectation of privacy of
|
||
|
other persons. For instance, if the computer system subject to the search
|
||
|
is used to provide an online service to subscribers, it may contain the
|
||
|
private data of those subscribers. This data may include electronic
|
||
|
correspondence or other information sent by the subscribers to others, as
|
||
|
well as electronic information sent by others to the subscribers. Again, a
|
||
|
"backdoor" is created by the new provisions to infringe the reasonable
|
||
|
expectation of privacy of both the sender and the recipient of this
|
||
|
electronic information.
|
||
|
|
||
|
These concerns are intensified by the language of the proposed subsection
|
||
|
487(2.2). The subsection would provide that any warrant authorizing the
|
||
|
search of any building or place also authorizes the search of "any data
|
||
|
contained in or available to" any computer system at that location. The
|
||
|
proposed language explicitly authorizes the search of computer data without
|
||
|
requiring any information to be sworn in support of the reasons for the
|
||
|
search. There is no requirement of any substantive review by a judge
|
||
|
authorizing the search of data. In effect, the proposed subsection creates
|
||
|
a default authorization to search data. Given the problems inherent in any
|
||
|
search involving a computer system, a judicial review of the information
|
||
|
justifying the search of data is essential in all cases. The authorizing
|
||
|
judge must be presented with clear and reasonably precise reasons and
|
||
|
guidelines for the intended search and seizure. This is necessary to ensure
|
||
|
that both the purpose and conduct of the search is justified. In order to
|
||
|
maintain these protective measures in the procedure for authorizing a
|
||
|
search, the proposed default authority must be removed.
|
||
|
|
||
|
Finally, we are concerned about the potential for self-incriminatory
|
||
|
activity by the person whose property is the subject of a search.
|
||
|
Subsection 487(2.1) would authorize the person conducting the search to use
|
||
|
the computer system in order to search, reproduce, and seize data.
|
||
|
Subsection 487(2.2), while similar, would add that the person whose property
|
||
|
is being searched "shall, on presentation of the warrant, permit the person
|
||
|
carrying out the search" to use the computer system. It is unclear from
|
||
|
this language whether the person whose property is being searched is
|
||
|
required to take positive steps to assist the person carrying out the
|
||
|
search. Our concern is that the inherent vagueness of the proposed
|
||
|
provision allows for such an interpretation. If the computer system is
|
||
|
accessible only by first supplying a password, the person may have to supply
|
||
|
it. If the data being searched is encrypted, the person may have to provide
|
||
|
the decryption key. This would amount to being compelled to assist in the
|
||
|
discovery of evidence against oneself, which is inconsistent with the most
|
||
|
fundamental principles of criminal law. The proposed amendment should be
|
||
|
rewritten to remedy its potentially dangerous vagueness.
|
||
|
|
||
|
Recommendations
|
||
|
---------------
|
||
|
|
||
|
o Remove the words "or available to" from the proposed amendment.
|
||
|
|
||
|
o Require a search warrant for a computer system to describe the type of
|
||
|
data authorized to be searched.
|
||
|
|
||
|
o Require a search warrant for data to limit the computer systems
|
||
|
authorized to be searched.
|
||
|
|
||
|
o Do not provide for default authorization to search computer systems.
|
||
|
|
||
|
o Do not compel potentially self-incriminatory activity from the person
|
||
|
whose property is being searched.
|
||
|
|
||
|
Thank you for the time taken to consider our comments and recommendations.
|
||
|
We would be pleased to confer with you further. Daniel Shap, a co-founder
|
||
|
of The Legal Group for the Internet in Canada, has previously commented at
|
||
|
length on this subject. His 1993 paper, entitled "Search and Seizure of
|
||
|
Canadian Computer Environments," was prepared for, and is in the possession
|
||
|
of, Donald Piragoff of the Department of Justice. It is also available on
|
||
|
the Internet's World Wide Web at:
|
||
|
http://www.io.org/~logic/papers/ds-search.htm
|
||
|
|
||
|
The Legal Group for the Internet in Canada may be contacted at the above
|
||
|
street and Internet addresses and telephone number. We look forward to
|
||
|
hearing from you.
|
||
|
|
||
|
Yours very truly,
|
||
|
|
||
|
[Signed]
|
||
|
|
||
|
Dov Wisebrod
|
||
|
L o G I C
|
||
|
The Legal Group for the Internet in Canada
|
||
|
|
||
|
c.c. Donald Piragoff
|
||
|
Department of Justice
|
||
|
|
||
|
Bruce Phillips
|
||
|
Federal Privacy Commissioner
|
||
|
|
||
|
Tony Ianno
|
||
|
Member of Parliament
|
||
|
|
||
|
|
||
|
SECTION 41: INFORMATION FOR SEARCH WARRANTS
|
||
|
-----------------------------------------------
|
||
|
|
||
|
487
|
||
|
---
|
||
|
|
||
|
(1) A justice who is satisfied by information on oath in Form 1 that there
|
||
|
are reasonable grounds to believe that there is in a building, receptacle or
|
||
|
place
|
||
|
(a) anything on or in respect of which any offence against this Act or any
|
||
|
other Act of Parliament has been or is suspected to have been committed,
|
||
|
(b) anything that there are reasonable grounds to believe will afford
|
||
|
evidence with respect to the commission of an offence, or will reveal the
|
||
|
whereabouts of a person who is believed to have committed an offence,
|
||
|
against this Act or any other Act of Parliament, or
|
||
|
(c) anything that there are reasonable grounds to believe is intended to be
|
||
|
used for the purpose of committing any offence against the person for which
|
||
|
a person may be arrested without warrant,
|
||
|
|
||
|
may at any time issue a warrant under his hand authorizing a person named
|
||
|
therein or a peace officer
|
||
|
|
||
|
(d) to search the building, receptacle or place for any such thing and to
|
||
|
seize it, and
|
||
|
(e) subject to any other Act of Parliament, to, as soon as practicable,
|
||
|
bring the thing seized before, or make a report in respect thereof to, the
|
||
|
justice or some other justice for the same territorial division in
|
||
|
accordance with section 489.1.
|
||
|
|
||
|
(2) Where the building, receptacle or place in which anything mentioned in
|
||
|
subsection (1) is believed to be is in any other territorial division, the
|
||
|
justice may issue his warrant in like form modified according to the
|
||
|
circumstances, and the warrant may be executed in the other territorial
|
||
|
division after it has been Endorsed, in Form 28, by a justice having
|
||
|
jurisdiction in that territorial division.
|
||
|
|
||
|
(2.1) A PERSON AUTHORIZED UNDER THIS SECTION TO SEARCH A COMPUTER SYSTEM IN
|
||
|
A BUILDING OR PLACE FOR DATA MAY
|
||
|
(A) USE OR CAUSE TO BE USED ANY COMPUTER SYSTEM AT THE BUILDING OR PLACE TO
|
||
|
SEARCH ANY DATA CONTAINED IN OR AVAILABLE TO THE COMPUTER SYSTEM;
|
||
|
(B) REPRODUCE OR CAUSE TO BE REPRODUCED ANY DATA IN THE FORM OF A PRINT-OUT
|
||
|
OR OTHER INTELLIGIBLE OUTPUT;
|
||
|
(C) SEIZE THE PRINT-OUT OR OTHER OUTPUT FOR EXAMINATION OR COPYING; AND
|
||
|
(D) USE OR CAUSE TO BE USED ANY COPYING EQUIPMENT AT THE PLACE TO MAKE
|
||
|
COPIES OF THE DATA.
|
||
|
|
||
|
(2.2) EVERY PERSON WHO IS IN POSSESSION OR CONTROL OF ANY BUILDING OR PLACE
|
||
|
IN RESPECT OF WHICH A SEARCH IS CARRIED OUT UNDER THIS SECTION SHALL, ON
|
||
|
PRESENTATION OF THE WARRANT, PERMIT THE PERSON CARRYING OUT THE SEARCH
|
||
|
(A) TO USE OR CAUSE TO BE USED ANY COMPUTER SYSTEM AT THE BUILDING OR PLACE
|
||
|
TO SEARCH ANY DATA CONTAINED IN OR AVAILABLE TO THE COMPUTER SYSTEM FOR DATA
|
||
|
THAT THE PERSON IS AUTHORIZED BY THIS SECTION TO SEARCH FOR;
|
||
|
(B) TO OBTAIN A HARD COPY OF THE DATA AND TO SEIZE IT; AND
|
||
|
(C) TO USE OR CAUSE TO BE USED ANY COPYING EQUIPMENT AT THE PLACE TO MAKE
|
||
|
COPIES OF THE DATA.
|
||
|
|
||
|
(3) A search warrant issued under this section may be in the form set out as
|
||
|
Form 5 in Part XXVIII, varied to suit the case.
|
||
|
|
||
|
(4) An endorsement that is made on a warrant as provided for in subsection
|
||
|
(2) is sufficient authority to the peace officers or the persons to whom it
|
||
|
was originally directed and to all peace officers within the jurisdiction of
|
||
|
the justice by whom it is endorsed to execute the warrant and to deal with
|
||
|
the things seized in accordance with section 489.1 or as otherwise provided
|
||
|
by law.
|
||
|
|
||
|
(6) Subsections 487(2) and (4) apply, with such modifications as the
|
||
|
circumstances require, to a warrant issued under subsection (1).
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: 1 Apr 1996 16:25:03 -0500
|
||
|
From: "Dave Banisar" <banisar@EPIC.ORG>
|
||
|
Subject: File 6--ACM/IEEE Letter on Crypto
|
||
|
|
||
|
Reply to: ACM/IEEE Letter on Crypto
|
||
|
|
||
|
|
||
|
Association For Computing Machinery
|
||
|
Office of US Public Policy
|
||
|
666 Pennsylvania Avenue SE
|
||
|
Suite 301
|
||
|
Washington, DC 20003 USA
|
||
|
(tel) 202/298-0842 (fax) 202/547-5482
|
||
|
|
||
|
Institute of Electronics and Electrical Engineers
|
||
|
United States Activities
|
||
|
1828 L Street NW
|
||
|
Suite 1202
|
||
|
Washington, DC 20036-5104 USA
|
||
|
(tel) 202/785-0017 (fax) 202/785-0835
|
||
|
|
||
|
April 2, 1996
|
||
|
|
||
|
Honorable Conrad Burns
|
||
|
Chairman, Subcommittee on Science, Technology and Space
|
||
|
Senate Commerce, Science and Transportation Committee
|
||
|
US Senate SD-508
|
||
|
Washington, DC 20510
|
||
|
|
||
|
Dear Chairman Burns:
|
||
|
|
||
|
On behalf of the nation's two leading computing and engineering
|
||
|
associations, we are writing to support your efforts, and the efforts of
|
||
|
the other cosponsors of the Encrypted Communications Privacy Act, to
|
||
|
remove unnecessarily restrictive controls on the export of encryption
|
||
|
technology. The Encrypted Communications Privacy Act sets out the
|
||
|
minimum changes that are necessary to the current export controls on
|
||
|
encryption technology. However, we believe that the inclusion of issues
|
||
|
that are tangential to export, such as key escrow and encryption in
|
||
|
domestic criminal activities, is not necessary. The relaxation of
|
||
|
export controls is of great economic importance to industry and users,
|
||
|
and should not become entangled in more controversial matters.
|
||
|
|
||
|
Current restrictions on the export of encryption technology harm
|
||
|
the interests of the United States in three ways: they handicap American
|
||
|
producers of software & hardware, prevent the development of a secure
|
||
|
information infrastructure, and limit the ability of Americans using new
|
||
|
online services to protect their privacy. The proposed legislation will
|
||
|
help mitigate all of these problems, though more will need to be done to
|
||
|
assure continued US leadership in this important hi-tech sector.
|
||
|
|
||
|
Technological progress has moved encryption from the realm of
|
||
|
national security into the commercial sphere. Current policies, as well
|
||
|
as the policy-making processes, should reflect this new reality. The
|
||
|
legislation takes a necessary first step in shifting authority to the
|
||
|
Commerce Department and removing restrictions on certain encryption
|
||
|
products. Future liberalization of export controls will allow Americans
|
||
|
to excel in this market.
|
||
|
|
||
|
The removal of out-dated restrictions on exports will also enable
|
||
|
the creation of a Global Information Infrastructure sufficiently secure
|
||
|
to provide seamless connectivity to customers previously unreachable by
|
||
|
American companies. The United States is a leader in Internet
|
||
|
commerce. However, Internet commerce requires cryptography. Thus
|
||
|
American systems have been hindered by cold-war restraints on the
|
||
|
necessary cryptography as these systems have moved from the laboratory
|
||
|
to the marketplace. This legislation would open the market to secure,
|
||
|
private, ubiquitous electronic commerce. The cost of not opening the
|
||
|
market may include the loss of leadership in computer security
|
||
|
technologies, just at the time when Internet users around the world will
|
||
|
need good security to launch commercial applications.
|
||
|
|
||
|
For this legislation to fulfill its promise the final approval of
|
||
|
export regulations must be based on analysis of financial and commercial
|
||
|
requirements and opportunities, not simply on the views of experts in
|
||
|
national security cryptography. Therefore, we urge you to look at ways
|
||
|
to further relax restrictive barriers.
|
||
|
|
||
|
Finally, the legislation will serve all users of electronic
|
||
|
information systems by supporting the development of a truly global
|
||
|
market for secure desktop communications. This will help establish
|
||
|
private and secure spaces for the work of users, which is of particular
|
||
|
interest to the members of the IEEE/USA and the USACM.
|
||
|
|
||
|
On behalf of the both the USACM and the IEEE/USA we look forward
|
||
|
to working with you on this important legislation to relax export
|
||
|
controls and promote the development of a robust, secure, and reliable
|
||
|
communications infrastructure for the twenty-first century.
|
||
|
|
||
|
Please contact Deborah Rudolph in the IEEE Washington Office at
|
||
|
(202) 785-0017 or Lauren Gelman in the ACM Public Policy Office at (202)
|
||
|
298-0842 for any additional information.
|
||
|
|
||
|
|
||
|
Sincerely,
|
||
|
|
||
|
|
||
|
Barbara Simons, Ph.D.3
|
||
|
Chair, U.S. Public Policy
|
||
|
Committee of ACM
|
||
|
|
||
|
|
||
|
Joel B. Snyder, P.E.
|
||
|
Vice President, Professional Activities and
|
||
|
Chair, United States Activities Board
|
||
|
|
||
|
cc: Members of the Subcommittee on
|
||
|
Science, Technology and Space
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Fri, 22 Mar 1996 08:43:12 -0600
|
||
|
From: Michael Lazar <d10mhl1@corn.cso.niu.edu>
|
||
|
Subject: File 7--NETRADIO--"CYBERSPACE LAW for NONLAWYERS" E-Mail Seminar (fwd)
|
||
|
|
||
|
Thought this would be of interest to many of you...
|
||
|
|
||
|
---------- Forwarded message ----------
|
||
|
Date--Wed, 20 Mar 1996 09:11:22 EST -0500
|
||
|
From--Chuck Poulton <poulton@wksu.kent.edu>
|
||
|
|
||
|
------- Forwarded Message Follows -------
|
||
|
|
||
|
Prof. Larry Lessig, University of Chicago Law School
|
||
|
Prof. David Post, Georgetown University Law Center
|
||
|
Prof. Eugene Volokh, UCLA School of Law
|
||
|
and the Cyberspace Law Institute and Counsel Connect present
|
||
|
|
||
|
************** CYBERSPACE LAW for NONLAWYERS **************
|
||
|
|
||
|
a FREE e-mail Internet seminar
|
||
|
(one message every 2-3 days)
|
||
|
Over 8000 subscribers already
|
||
|
|
||
|
* Learn the basic principles of -- and unlearn some common
|
||
|
myths about --
|
||
|
- copyright law,
|
||
|
- free speech law,
|
||
|
- libel law,
|
||
|
- privacy law,
|
||
|
- contract law, and
|
||
|
- trademark law
|
||
|
as they apply on the Net, from three of the top experts in
|
||
|
the law of cyberspace.
|
||
|
|
||
|
* The seminar is aimed at educated laypeople, not primarily at
|
||
|
lawyers. Low on legalese and Latin.
|
||
|
|
||
|
* This is a low-traffic distribution list, NOT a discussion
|
||
|
list. Subscribers will get one message (a few paragraphs
|
||
|
long) every few days.
|
||
|
|
||
|
* The seminar will start in April or May, but you should sign
|
||
|
up now -- send a message with the text
|
||
|
|
||
|
SUBSCRIBE CYBERSPACE-LAW yourfirstname yourlastname
|
||
|
|
||
|
to LISTPROC-REQUEST@COUNSEL.COM
|
||
|
|
||
|
|
||
|
****************************************************************
|
||
|
|
||
|
Larry Lessig clerked for U.S. Supreme Court Justice Antonin
|
||
|
Scalia, and now teaches constitutional law and the law of
|
||
|
cyberspace. He's written about law and cyberspace for the
|
||
|
Yale Law Journal and the University of Chicago Legal Forum
|
||
|
(forthcoming).
|
||
|
|
||
|
David Post practiced computer law for six years, then clerked
|
||
|
for U.S. Supreme Court Justice Ruth Bader Ginsburg, and now
|
||
|
teaches constitutional law, copyright law, and the law of
|
||
|
cyberspace. He's written about law and cyberspace for the
|
||
|
University of Chicago Legal Forum (forthcoming) and the Journal
|
||
|
of Online Law, and writes a monthly column on law and
|
||
|
technology issues for the American Lawyer.
|
||
|
|
||
|
Eugene Volokh worked as a computer programmer for 12 years,
|
||
|
and is still partner in a software company that sells the
|
||
|
software he wrote for the Hewlett-Packard Series 3000. He
|
||
|
clerked for U.S. Supreme Court Justice Sandra Day O'Connor, and
|
||
|
now teaches constitutional law and copyright law. He's written
|
||
|
about law and cyberspace for the Yale Law Journal, Stanford Law
|
||
|
Review, Michigan Law Review (forthcoming), and the University
|
||
|
of Chicago Legal Forum (forthcoming).
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Sun, 31 Mar 1996 21:46:53 +4200 (CST)
|
||
|
From: "Bob Izenberg" <bei@AUSTIN.AUS.SIG.NET>
|
||
|
Subject: File 8--Formal FCC Complaint Filed Against I-Phone
|
||
|
|
||
|
# ACTA Internet Phone Petition (RM No. 8775)
|
||
|
#
|
||
|
# BEFORE THE FEDERAL COMMUNICATIONS COMMISSION Washington, D.C. 20554
|
||
|
#
|
||
|
# In the Matter of
|
||
|
#
|
||
|
# THE PROVISION OF INTERSTATE AND INTERNATIONAL INTEREXCHANGE
|
||
|
# TELECOMMUNICATIONS SERVICE VIA THE "INTERNET" BY NON-TARIFFED,
|
||
|
# UNCERTIFIED ENTITIES
|
||
|
|
||
|
Is the whole ACTA complaint based on the marketing of this
|
||
|
category of software as an "Internet telephone"? If the phone
|
||
|
analogy is the one that we go with in evaluating the merits of
|
||
|
the ACTA position, to which part of the regulated telephone
|
||
|
network does the Internet Phone software correspond? It is
|
||
|
not the service, for the software providers have no responsibility
|
||
|
for actual transmission of voice traffic. It is not the telephone
|
||
|
network, for the transmission facilities used by the software are
|
||
|
provided by third parties who have no business relationship with
|
||
|
the software providers. If we look for what part of the physical
|
||
|
telephone world is close in function to the software to which the
|
||
|
ACTA objects, it is the telephone set itself. It, coupled with
|
||
|
the computer upon which it runs, places calls which cannot be
|
||
|
completed without substantial support hardware and software
|
||
|
provided by other companies and organizations. It does not
|
||
|
seem to be a long distance offering in the sense that AT&T,
|
||
|
Sprint, MCI, and other traditional long distance companies
|
||
|
are.... Not unless you do not differentiate between the
|
||
|
Internet Phone software itself and the mechanisms that carry
|
||
|
the information which it exchanges.
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Wed, 3 Apr 1996 13:44:13 -0800
|
||
|
From: Barry Gold <barry@locus.com>
|
||
|
Subject: File 9--Re: Formal FCC Complaint Filed Against I-Phone
|
||
|
|
||
|
It strikes me that respondents in this rulemaking have two good,
|
||
|
simple, responses:
|
||
|
|
||
|
1. We're not selling phone services, we're selling "phones". As far
|
||
|
as I know, these companies charge nothing for calls, they simply sell
|
||
|
(or rent) their software for a fixed price. The software runs on
|
||
|
standard equipment, connecting to existing wiring (telephone modem,
|
||
|
ISDN, or T1/2/3 link). This makes it phone equipment -- it attaches
|
||
|
to existing lines -- not service.
|
||
|
|
||
|
2. Assuming they lose and the FCC issues the ruling requested by the
|
||
|
ATCA:
|
||
|
Surprise! We've put our software in the public domain! It's now
|
||
|
available on all SimTel mirrors and on sites in the UK, France,
|
||
|
Australia, Finland, etc.
|
||
|
|
||
|
(In other words, you can shut us down, but it won't stop the s/w
|
||
|
from being used and in fact it will be used more widely as
|
||
|
freeware than ever before! Kill us and our death spasms will
|
||
|
injure you more than we ever did alive.)
|
||
|
|
||
|
Now obviously, outcome 1 is preferred, for several reasons:
|
||
|
|
||
|
a. It allows I-Phone, etc. to continue making money to support further
|
||
|
development and support of their software. In the longer run, all
|
||
|
products need support and extensions to continue to exist in the
|
||
|
marketplace.
|
||
|
|
||
|
b. Response 2 would damage the phone companies, but would also remove
|
||
|
the incentive for anybody else to enter the market.
|
||
|
|
||
|
Unfortunately, there are some providers who can't use response #1 as
|
||
|
an escape, because they provide connection to the local phone network
|
||
|
at the other end, rather than just selling/renting ("licensing")
|
||
|
software. But maybe some creative soul on this list can figure out a
|
||
|
way for them to beat this rap, too.
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Wed, 21 Feb 1996 11:54:11 -0800 (PST)
|
||
|
From: telstar@WIRED.COM(--Todd Lappin-->)
|
||
|
Subject: File 10--IMPACT: U. Penn on CDA
|
||
|
|
||
|
Witness the dread "chilling effect."
|
||
|
|
||
|
This letter from Stanley Chodorow, Provost at the University of
|
||
|
Pennsylvania, demonstrates the tough position that many university
|
||
|
administrators now find themselves in as a result of the Communications
|
||
|
Decency Act.
|
||
|
|
||
|
Almost reluctantly, Provost Chodrow points out, "Members of the Penn
|
||
|
community should be aware that although enforcement of the 'indecency'
|
||
|
provision is temporarily barred, the bill's other provisions are and will
|
||
|
remain in effect unless overturned or repealed. Those provisions subject
|
||
|
violators to substantial criminal penalties. Individuals or institutions
|
||
|
that make information or materials available on electronic networks have
|
||
|
an obligation to comply with the statute."
|
||
|
|
||
|
The full text of Chodorow's letter follows below.
|
||
|
|
||
|
--Todd Lappin-->
|
||
|
Section Editor
|
||
|
WIRED Magazine
|
||
|
|
||
|
===============================================
|
||
|
|
||
|
|
||
|
To the Penn community:
|
||
|
|
||
|
Recent federal legislation has significant implications for all members of
|
||
|
the Penn community who use telecommunications or electronic networks. The
|
||
|
Telecommunications Act of 1996 , signed into law by President Clinton on
|
||
|
February 8, includes provisions, known as the Communications Decency Act,
|
||
|
that prohibit dissemination of certain materials to persons under the age
|
||
|
of 18.
|
||
|
|
||
|
One provision prohibits using a telecommunications device to make and
|
||
|
transmit any "obscene or indecent" communication to anyone known to be
|
||
|
under 18. Another prohibits using any "interactive computer service" to
|
||
|
display, in a manner available to anyone under 18, any communication that,
|
||
|
"in context, depicts or describes, in terms patently offensive as measured
|
||
|
by contemporary community standards, sexual or excretory activities or
|
||
|
organs." While the terms "indecent" and "patently offensive" are not
|
||
|
defined in the law and their meaning is unclear, the terms may be
|
||
|
construed to include materials with literary, scientific, artistic, or
|
||
|
educational value.
|
||
|
|
||
|
The constitutionality of these provisions has been challenged in Federal
|
||
|
court on the grounds that they prohibit speech protected by the First
|
||
|
Amendment and are impermissibly vague and overbroad. The court has entered
|
||
|
an order that temporarily bars enforcement of the prohibition against
|
||
|
"indecent" communications, but the order does not bar enforcement of the
|
||
|
Act's other provisions. Penn believes the constitutional challenges are
|
||
|
important and should be resolved quickly, because we believe the Act may
|
||
|
chill the free exchange of ideas and information that is central to the
|
||
|
University's mission. It may also significantly restrict the development
|
||
|
and usefulness of new forms of electronic communication.
|
||
|
|
||
|
Members of the Penn community should be aware, however, that although
|
||
|
enforcement of the "indecency" provision is temporarily barred, the bill's
|
||
|
other provisions are and will remain in effect unless overturned or
|
||
|
repealed. Those provisions subject violators to substantial criminal
|
||
|
penalties. Individuals or institutions that make information or materials
|
||
|
available on electronic networks have an obligation to comply with the
|
||
|
statute. Individuals who distribute information through the University's
|
||
|
computing resources are responsible for the content they provide and may
|
||
|
wish to evaluate the material they make available in light of the Act's
|
||
|
requirements. The University is unable to prevent information that is
|
||
|
posted to publicly accessible resources, such as newsgroups and homepages,
|
||
|
from becoming available to persons under the age of 18.
|
||
|
|
||
|
We regret the uncertainty and disruption caused by this legislation and
|
||
|
will try to keep you informed (via Almanac and the University's home
|
||
|
page on the WorldWideWeb) of significant developments as they occur.
|
||
|
|
||
|
Stanley Chodorow
|
||
|
Provost
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Thu, 21 Mar 1996 22:51:01 CST
|
||
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
||
|
Subject: File 11--Cu Digest Header Info (unchanged since 7 Apr, 1996)
|
||
|
|
||
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
||
|
available at no cost electronically.
|
||
|
|
||
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
||
|
|
||
|
Or, to subscribe, send post with this in the "Subject:: line:
|
||
|
|
||
|
SUBSCRIBE CU-DIGEST
|
||
|
Send the message to: cu-digest-request@weber.ucsd.edu
|
||
|
|
||
|
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
|
||
|
|
||
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
||
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
||
|
60115, USA.
|
||
|
|
||
|
To UNSUB, send a one-line message: UNSUB CU-DIGEST
|
||
|
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
|
||
|
(NOTE: The address you unsub must correspond to your From: line)
|
||
|
|
||
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
||
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
||
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
||
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
||
|
the PC Telecom forum under "computing newsletters;"
|
||
|
On Delphi in the General Discussion database of the Internet SIG;
|
||
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
||
|
and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
|
||
|
CuD is also available via Fidonet File Request from
|
||
|
1:11/70; unlisted nodes and points welcome.
|
||
|
|
||
|
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
||
|
Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
|
||
|
In ITALY: ZERO! BBS: +39-11-6507540
|
||
|
In LUXEMBOURG: ComNet BBS: +352-466893
|
||
|
|
||
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
|
||
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
||
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
||
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
||
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
||
|
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
|
||
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
||
|
|
||
|
|
||
|
The most recent issues of CuD can be obtained from the
|
||
|
Cu Digest WWW site at:
|
||
|
URL: http://www.soci.niu.edu/~cudigest/
|
||
|
|
||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
|
information among computerists and to the presentation and debate of
|
||
|
diverse views. CuD material may be reprinted for non-profit as long
|
||
|
as the source is cited. Authors hold a presumptive copyright, and
|
||
|
they should be contacted for reprint permission. It is assumed that
|
||
|
non-personal mail to the moderators may be reprinted unless otherwise
|
||
|
specified. Readers are encouraged to submit reasoned articles
|
||
|
relating to computer culture and communication. Articles are
|
||
|
preferred to short responses. Please avoid quoting previous posts
|
||
|
unless absolutely necessary.
|
||
|
|
||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
||
|
the views of the moderators. Digest contributors assume all
|
||
|
responsibility for ensuring that articles submitted do not
|
||
|
violate copyright protections.
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
End of Computer Underground Digest #8.28
|
||
|
************************************
|
||
|
|