968 lines
46 KiB
Plaintext
968 lines
46 KiB
Plaintext
|
|
|||
|
Computer underground Digest Sun Mar 15, 1998 Volume 10 : Issue 18
|
|||
|
ISSN 1004-042X
|
|||
|
|
|||
|
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
|
|||
|
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
|
|||
|
Archivist: Brendan Kehoe
|
|||
|
Shadow Master: Stanton McCandlish
|
|||
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|||
|
Ralph Sims / Jyrki Kuoppala
|
|||
|
Ian Dickinson
|
|||
|
Field Agent Extraordinaire: David Smith
|
|||
|
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
|||
|
|
|||
|
CONTENTS, #10.18 (Sun, Mar 15, 1998)
|
|||
|
|
|||
|
File 1--Filtering software poses legal pitfalls.
|
|||
|
File 2--USACM Letter on HR 2652, the "Collections of Information
|
|||
|
File 3--How Fast Is The Internet Going Right This Second?
|
|||
|
File 4--Policy Post 4.4: CONGRESS PREPARES TO TAKE UP CRYPTO AGAIN
|
|||
|
File 5--EFFector 11.02: ACTION ALERT: Database Copyright Bill v. Fair Use
|
|||
|
File 6--Cu Digest Header Info (unchanged since 7 May, 1997)
|
|||
|
|
|||
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
|||
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|||
|
|
|||
|
---------------------------------------------------------------------
|
|||
|
|
|||
|
Date: Sun, 15 Mar 1998 20:52:18 -0500
|
|||
|
From: "David J. Loundy" <David@Loundy.com>
|
|||
|
Subject: File 1--Filtering software poses legal pitfalls.
|
|||
|
|
|||
|
Published in the Chicago Daily Law Bulletin, March 12, 1998 at page 5.
|
|||
|
---------------------------------------------------------------
|
|||
|
|
|||
|
Filtering software poses legal pitfalls.
|
|||
|
|
|||
|
Copyright 1998 by David Loundy
|
|||
|
Archived at http://www.Loundy.com/CDLB/
|
|||
|
To subscribe, send the message
|
|||
|
"subscribe" to Loundy-request@netural.com
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
|
|||
|
A decision is expected shortly in a case brought in the United States
|
|||
|
District Court for the Eastern Division of Virginia, Mainstream Loudoun v.
|
|||
|
Board of Trustees of the Loudoun County Public Library, No. CA-97-2049-A,
|
|||
|
which is being watched carefully by libraries, legislatures, civil rights
|
|||
|
activists and the anti-pornography crowd. The suit concerns the use of
|
|||
|
"filtering software" (often referred to as "blocking software" or simply as
|
|||
|
"censorware").
|
|||
|
|
|||
|
Filtering software is designed to screen Internet material for
|
|||
|
"inappropriate" content. Such software packages have been widely adopted,
|
|||
|
especially in light of their endorsement by President Clinton at a White
|
|||
|
House Summit following the U.S. Supreme Court's mention of the software as
|
|||
|
perhaps being a preferable alternative to legislation such as the ill-fated
|
|||
|
Communications Decency Act. Various states have also jumped on the
|
|||
|
bandwagon by proposing legislation that would require the installation of
|
|||
|
such software or other means of content restriction in schools and public
|
|||
|
libraries.
|
|||
|
|
|||
|
Sen. John McCain, R-Ariz., has also introduced legislation in the U.S.
|
|||
|
Senate (S1619 IS, available on the Internet at
|
|||
|
ftp://ftp.loc.gov/pub/thomas/c150/s1619.is.txt), which would deny certain
|
|||
|
funds to schools and libraries that fail to implement a filtering or
|
|||
|
blocking system for Internet-connected computers.
|
|||
|
|
|||
|
There are a few problems with these legislative attempts and other
|
|||
|
voluntary efforts to install such software: the software packages do not
|
|||
|
work as well as most people think they do, and they also erroneously block
|
|||
|
Constitutionally protected material. To understand the legal pitfalls
|
|||
|
associated with filtering software, it is necessary to look at the
|
|||
|
technology and how it operates.
|
|||
|
|
|||
|
Filtering software works by employing a variety of schemes. Two common
|
|||
|
blocking schemes used in filtering software either screen, based on the
|
|||
|
presence of key words, or block certain addresses. Some filtering software
|
|||
|
packages will search for words present in Internet material which match a
|
|||
|
list of prohibited terms. If a prohibited term is present, the material is
|
|||
|
blocked from viewers. Other filtering software may block material based on
|
|||
|
its URL (Uniform Resource Locator-- a standardized way of describing an
|
|||
|
Internet address, be it a web page, a usenet news post, an e-mail address,
|
|||
|
or an FTP file archive). Blocked URLs are usually included on a list that
|
|||
|
comes with the software after the manufacturer examines the material and
|
|||
|
classifies it as objectionable to a particular audience. Thus, users are
|
|||
|
offered options to filter particular types of material they wish to avoid,
|
|||
|
such as material which contains sexual content, violence, profanity, etc.
|
|||
|
Users must obtain updated lists to account for new sites that are found or
|
|||
|
addresses that have changed after the software was purchased.
|
|||
|
|
|||
|
Unfortunately, both of these filtering schemes are flawed. First of all,
|
|||
|
key word blocking will not block images. Second, if a key word filter
|
|||
|
blocks key words appearing in an address, such as in a domain name, all of
|
|||
|
the content appearing at that domain will be blocked, regardless of what
|
|||
|
material is actually housed at that domain. Third, key words can be
|
|||
|
circumvented. For instance, if a filter blocks the word "breast" it might
|
|||
|
not block "bre_ast." And fourth, if the list of blocked key words is
|
|||
|
expanded too greatly, then inoffensive content may also be blocked, as
|
|||
|
occurred in the famous incident where part of the White House web site was
|
|||
|
blocked by a filtering package because the software blocked occurrences of
|
|||
|
the word "couple"-- which was used to describe Bill and Hillary Rodham
|
|||
|
Clinton.
|
|||
|
|
|||
|
Filtering software which blocks based on the material's address may allow
|
|||
|
for more precision in theory, but it also suffers some drawbacks in
|
|||
|
practice. To block based on a URL requires that all URLs be checked and
|
|||
|
classified. This is generally a subjective endeavor allowing for
|
|||
|
inaccuracies in classification and, thus, filtering.
|
|||
|
|
|||
|
Blocking by URL is fundamentally an impossible proposition. The Internet is
|
|||
|
growing too quickly for a small software company to keep up with the
|
|||
|
volumes of new material. It is not economically feasible for a software
|
|||
|
company to hire sufficient numbers of people to rate every web site and
|
|||
|
usenet news group, much less stay abreast of changing content. As a result,
|
|||
|
some filtering software may block an entire domain or portion thereof as a
|
|||
|
short-cut. If the domain belongs to an Internet service provider, then
|
|||
|
access to all of the service provider's clients' web sites may be blocked
|
|||
|
because of the rating assigned to one or two of the service provider's
|
|||
|
users. In addition, some content may be available through a database which
|
|||
|
spontaneously generates web pages, and therefore has no stable address to
|
|||
|
block.
|
|||
|
|
|||
|
Any legislation that requires that all inappropriate material be blocked
|
|||
|
cannot be complied with using existing technology. All of the existing
|
|||
|
filtering technology may be considerably over-inclusive in its
|
|||
|
restrictions, a state of affairs that is not likely to survive last year's
|
|||
|
U.S. Supreme Court decision in Reno v. ACLU, 117 S.Ct. 2329 (1997).
|
|||
|
Additionally, the Constitutional tests for obscenity and indecency both
|
|||
|
include a "community standards" element. Any statute that requires that
|
|||
|
access be blocked to "obscene," "indecent," or "illegal" material requires
|
|||
|
evaluation based on local community standards. Some filtering package
|
|||
|
promoters make the claim that their software blocks only illegal material.
|
|||
|
This is a nonsensical claim. Either the software must employ the judgment
|
|||
|
of the software company as to what material is inappropriate, or each
|
|||
|
individual community must rate the entire Internet (as the McCain bill
|
|||
|
would require of each school board or library).
|
|||
|
|
|||
|
These issues are being squarely debated in the Mainstream Loudoun case. In
|
|||
|
this case, U.S. District Judge Leonie Brinkema (who, at the end of
|
|||
|
February, struck down as unconstitutional a Virginia statute which sought
|
|||
|
to restrict State employees' access to sexually explicit material using
|
|||
|
state-owned computers) is faced with the issue of whether the Loudoun
|
|||
|
public library is violating the First Amendment by requiring the use of
|
|||
|
filtering software on library computers.
|
|||
|
|
|||
|
A citizens' group and a few assorted plaintiffs are suing the Loudoun
|
|||
|
Library Board, claiming that the "X-Stop" filtering software installed on
|
|||
|
library computers is infringing their Constitutional rights. Specifically,
|
|||
|
the plaintiffs argue that the library policy "is a harsh and censorial
|
|||
|
solution in search of a problem." It restricts all users to content suited
|
|||
|
to the most sensitive users, and threatens criminal penalties to any who
|
|||
|
try and circumvent the block. None of the libraries in the County system
|
|||
|
had complained that there was a problem with inappropriate material, and
|
|||
|
the library board was presented with data "that less than two-tenths of one
|
|||
|
percent of the information available on the Internet is even arguably
|
|||
|
'pornographic'" before it imposed what some consider to be the nation's
|
|||
|
most restrictive access policy.
|
|||
|
|
|||
|
In addition, the plaintiff's have argued that the policy requires the
|
|||
|
software to perform, in essence, a legal test to determine what material is
|
|||
|
inappropriate. Furthermore, enforcement of the library policy requires that
|
|||
|
Internet terminals be placed in full view, thus increasing, rather than
|
|||
|
reducing, the chance that library patrons will be exposed to material they
|
|||
|
find offensive. This public placement of terminals may also have a chilling
|
|||
|
effect by dissuading patrons from looking even at unfiltered content which
|
|||
|
they do not want to share with any library patron who may be in the area.
|
|||
|
|
|||
|
The plaintiffs also argued that the legislation is overbroad and that the
|
|||
|
filtering software removes the ability of a parent to determine what his or
|
|||
|
her children (or self) should be allowed to see.
|
|||
|
|
|||
|
Perhaps the plaintiffs' best argument against the legislation is that the
|
|||
|
filtering software would block material on the Internet that is available
|
|||
|
to library patrons by simply picking up the same material from the
|
|||
|
library's shelves. (An argument not likely to be as effective is that the
|
|||
|
policy requiring blocking software violates the library's own "Freedom for
|
|||
|
Ideas-- Freedom From Censorship" policy (as well as the American Library
|
|||
|
Association's principals of freedom and its explicit resolution condemning
|
|||
|
the imposition of filtering software).)
|
|||
|
|
|||
|
The defendants' arguments are also interesting, but unpersuasive. The
|
|||
|
defendants argue that the legislation is based on a policy restricting the
|
|||
|
library's obtaining of objectionable material at a library patron's
|
|||
|
request. However, the library board has argued that calling up material
|
|||
|
from a remotely located machine on an Internet-connected computer is
|
|||
|
analogous to using the library facilities to request an interlibrary loan
|
|||
|
of the material. The defendants have stated that as far as they know "no
|
|||
|
court has ever held that libraries are required by the First Amendment to
|
|||
|
fulfill a patron's request to obtain a pornographic film-- or any other
|
|||
|
information-- through an interlibrary loan." Furthermore, they argue that
|
|||
|
there is Supreme Court precedent in a sharply divided case (Board of
|
|||
|
Education v. Pico, 457 U.S. 853 (1982)) that intimates that school boards
|
|||
|
should have the freedom to decide what materials to house in their
|
|||
|
libraries.
|
|||
|
|
|||
|
The interlibrary loan argument is unpersuasive because the Internet
|
|||
|
connection and its benefits are already present in the library, and the
|
|||
|
library staff is not needed to arrange for the transfer of any content
|
|||
|
available to an Internet-connected library computer. The software which
|
|||
|
restricts access to certain material, on the other hand, is brought into
|
|||
|
the library by its staff in order to remove access to material which would
|
|||
|
otherwise be freely available to library patrons but for the blocking
|
|||
|
software. A better analogy would be for the librarians to tell patrons that
|
|||
|
they may read any books in the library, except the ones the librarians grab
|
|||
|
out of the patron's hands if they try to take the restricted books off the
|
|||
|
shelf.
|
|||
|
|
|||
|
I predict that some of the legislation requiring blocking of Internet
|
|||
|
content will pass. I also predict the library patrons will win (as,
|
|||
|
hopefully, will the plaintiffs who challenge any passed filtering
|
|||
|
legislation). The stakes in this debate are high. At issue here are small
|
|||
|
battles in schools and libraries.
|
|||
|
|
|||
|
However, there are two issues more important than whether the Loudoun
|
|||
|
County libraries allow uncensored Internet access. First, there are whole
|
|||
|
countries that use "proxy servers" that function as national filtering
|
|||
|
software. Some proposed filtering-enabling schemes, such as PICS (Platform
|
|||
|
for Internet Content Selection), constitute what some believe to be the
|
|||
|
ultimate tool for government censorship by building a mechanism for
|
|||
|
censorship into the Internet's infrastructure. While countries are entitled
|
|||
|
to their own Internet content laws, the mainstreaming of such tools should
|
|||
|
proceed only with care and consideration as to the potential effects.
|
|||
|
|
|||
|
The second issue, to return to the beginning, is that these filtering tools
|
|||
|
do not work as most people believe them to work. People need to understand
|
|||
|
what they may be missing, and to what they may still be subjected.
|
|||
|
Filtering software is not the Holy Grail, at best, it is the Holy Colander.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
http://www.Loundy.com/CDLB/1998-Censorware.html
|
|||
|
|
|||
|
|
|||
|
|
|||
|
______________________________________________________________________
|
|||
|
David J. Loundy | E-Mail: David@Loundy.com
|
|||
|
| WWW: http://www.Loundy.com/
|
|||
|
Davis, Mannix & McGrath | Listserv (for my Technology
|
|||
|
125 S. Wacker Drive, Suite 1700 | Law column): Send a message
|
|||
|
Chicago, IL 60606-4402 | reading "subscribe" to
|
|||
|
Phone: (312) 332-0954 | Loundy-request@netural.com
|
|||
|
______________________________________________________________
|
|||
|
Opinions are mine, not my employer's, & are subject to change without
|
|||
|
notice. You are not now my client, this is not meant as legal advice.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Fri, 6 Mar 1998 06:55:33 -0500
|
|||
|
From: ACM US Public Policy Office <usacm_dc@ACM.ORG>
|
|||
|
Subject: File 2--USACM Letter on HR 2652, the "Collections of Information
|
|||
|
|
|||
|
March 5, 1998
|
|||
|
|
|||
|
Representative Howard Coble
|
|||
|
Chairman
|
|||
|
House Judiciary Subcommittee on Courts and Intellectual Property
|
|||
|
2239 Rayburn House Office Building
|
|||
|
United States House of Reprsentatives
|
|||
|
Washington, D.C. 20515
|
|||
|
|
|||
|
Dear Chairman Coble,
|
|||
|
|
|||
|
We are writing to express our concern about H.R. 2652, the
|
|||
|
"Collections of Information Antipiracy Act." The Association for Computing
|
|||
|
(ACM) recognizes the need to protect investments made in large data
|
|||
|
collections. However, the proposed legislation fails to recognize the
|
|||
|
legitimate needs of academic, professional, scientific, and ordinary users
|
|||
|
of data. Therefore, we believe that the legislation, as currently drafted,
|
|||
|
is generally not in the interests of the computing profession or of the
|
|||
|
general public.
|
|||
|
|
|||
|
The ACM is the largest, international professional association of
|
|||
|
computer scientists with 60,000 members in the United States. We have a
|
|||
|
particular interest in the development of intellectual property policies
|
|||
|
that serve a broad mission. We believe that such policies should ensure the
|
|||
|
continued vibrancy of not-for-profit publishers, students, researchers, and
|
|||
|
the general public, even as they seek to protect commercial investments.
|
|||
|
Sensible legislative proposals should promote the "Progress of Science and
|
|||
|
the Useful Arts" by allowing exemptions for public-good uses in libraries,
|
|||
|
universities, and laboratories. They should not establish perpetual
|
|||
|
protection for data while eliminating the "fair use" upon which the
|
|||
|
research community is heavily dependent.
|
|||
|
|
|||
|
ACM has developed considerable expertise in the copyright issues
|
|||
|
associated with the creation of electronic databases. The ACM publishes
|
|||
|
many journals, some of which include research results derived from data
|
|||
|
collection. Additionally, ACM has an on-line searchable database. Under
|
|||
|
the proposed legislation, the extraction of a substantial unauthorized "use
|
|||
|
in commerce" of the data compilations will be prohibited if it would "harm"
|
|||
|
the original compiler's market. Thus, the owner of the data compilation
|
|||
|
will have the authority to determine which users may access the data if
|
|||
|
more than a "substantial" amount of data from the compilation is requested.
|
|||
|
This limitation on the use of data is contrary to the traditional
|
|||
|
scientific research model. In the U.S., data collections are routinely
|
|||
|
reused and revised in the course of scientific and academic research
|
|||
|
without royalties being exchanged. The bill also includes an overly broad
|
|||
|
definition of what constitutes "information" and no definition of
|
|||
|
"substantiality." This, too, could have a chilling effect on academic
|
|||
|
research and publication.
|
|||
|
|
|||
|
The fair use provisions in H.R. 2652 fall far short of the
|
|||
|
exemptions necessary to permit researchers to verify others' results,
|
|||
|
educators to demonstrate models in classrooms, scientists to make use of
|
|||
|
government databases, and other traditionally protected uses. Such "full
|
|||
|
and open" use of data is indispensable to effective and accurate research.
|
|||
|
The fair use provisions allow only extractions which do "not harm the
|
|||
|
actual or potential market for the product." "Full and open" is defined in
|
|||
|
the scientific community as data and information derived from publicly
|
|||
|
funded research which is made available with as few restrictions as
|
|||
|
possible, on a nondiscriminatory basis, for no more than the cost of
|
|||
|
reproduction and dissemination. The inadequate fair use provisions in H.R.
|
|||
|
2652 do not meet this definition. Furthermore, this also impacts citizens,
|
|||
|
who currently have the right to full and open access to data from databases
|
|||
|
created by their government and by organizations funded by the government,
|
|||
|
no matter if someone else has also published the data.
|
|||
|
|
|||
|
H.R. 2652 would create proprietary rights in compilations of
|
|||
|
scientific information which are now in the public domain; thus,
|
|||
|
unauthorized extraction or use of this information, of the kind which
|
|||
|
scientists are accustomed to make today, would appear to harm the market
|
|||
|
for the compilation as a matter of definition. For example, all the names
|
|||
|
and numbers registered with NSF's contractors (Network Solutions and ISI)
|
|||
|
pertaining to the Internet are freely accessible. The public can access
|
|||
|
such data for any legal reasons, including operating Internet routers and
|
|||
|
directory services. The extraction of data from this compilation could be
|
|||
|
limited by H.R. 2652. Naturally, this principle extends to all sorts of
|
|||
|
financial and other data which major publishers resell.
|
|||
|
|
|||
|
We recognize it is important to protect investments made in data
|
|||
|
collection. However, we do not believe it has been demonstrated that
|
|||
|
further legislation is necessary. The "Collections of Information
|
|||
|
Antipiracy Act" is overly broad in its application of the misappropriation
|
|||
|
doctrine and will affect both the computing community and scientific
|
|||
|
research generally. We believe that there are alternative technical
|
|||
|
approaches that may better serve the interests of users of new digital
|
|||
|
technologies. We would be very pleased to work with you on a study of these
|
|||
|
issues.
|
|||
|
|
|||
|
We would look forward to working with you on this effort. If you
|
|||
|
have any questions, please contact Lauren Gelman at 202/544-4859.
|
|||
|
|
|||
|
Sincerely yours,
|
|||
|
|
|||
|
Dr. Barbara Simons
|
|||
|
Chair, U.S. Public Policy Committee
|
|||
|
The Association For Computing Machinery
|
|||
|
|
|||
|
cc: House Judiciary Subcommittee on Courts and Intellectual Property
|
|||
|
Rep. Henry J. Hyde, Chairman, House Judiciary Committee
|
|||
|
Rep. John Conyers, Jr., Ranking Member, House Judiciary Committee
|
|||
|
Rep. Newt Gingrich, Speaker of the House, U.S. House of Representatives
|
|||
|
Rep. Richard Armey, Majority Leader, U.S. House of Representatives
|
|||
|
Rep. Richard Gephardt, Minority Leader, U.S. House of Representatives
|
|||
|
Rep. F. James Sensenbrenner, Jr., Chairman House Science Committee
|
|||
|
Rep. George Brown, Ranking Member, House Science Committee
|
|||
|
Rep. Vernon Ehlers, Vice Chairman, House Science Committee
|
|||
|
Sen. Orrin G. Hatch, Chairman, Senate Judiciary Committee
|
|||
|
Sen. Patrick J. Leahy, Ranking Minority Member, Senate Judiciary
|
|||
|
Committee
|
|||
|
|
|||
|
|
|||
|
/\ /\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/
|
|||
|
Association for Computing, + http://www.acm.org/usacm/
|
|||
|
Office of U.S. Public Policy * +1 202 544 4859 (tel)
|
|||
|
666 Pennsylvania Ave., SE Suite 302 B * +1 202 547 5482 (fax)
|
|||
|
Washington, DC 20003 USA + gelman@acm.org
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Mon, 9 Mar 1998 12:35:56 -0500 (EST)
|
|||
|
From: mds@MDS.PRWIRE.COM
|
|||
|
Subject: File 3--How Fast Is The Internet Going Right This Second?
|
|||
|
|
|||
|
How Fast Is The Internet Going Right This Second?
|
|||
|
|
|||
|
ACTON, Mass., March 9 /PRNewswire/ -- The Internet Traffic Report
|
|||
|
(at www.internettrafficreport.com) can tell you. The site gives an
|
|||
|
independent, real-time measure of how well "traffic" is moving on the Internet
|
|||
|
highway -- city by city, country by country, and for the Internet as a whole.
|
|||
|
Checking the site can tell you if it's a good time to do a big download or
|
|||
|
search, and historical performance graphs show when traffic is usually down.
|
|||
|
The site can also be used to determine if it's your ISP that's performing
|
|||
|
badly, or if the whole Internet is bogged down. Some people even like to check
|
|||
|
the site just to confirm particularly hideous Internet performance.
|
|||
|
The Traffic Report collects data on package loss and response time each
|
|||
|
hour from routers around the world, mapping them into global and local
|
|||
|
performance indices. The site also includes graphs of Internet speed over the
|
|||
|
past 24 hours and the previous week.
|
|||
|
The site could be of use to your readers, but I also thought it might be
|
|||
|
of use to you as a source of independent data for stories about Internet
|
|||
|
performance.
|
|||
|
We're in the process of compiling a list of reporters and editors who'd
|
|||
|
like to be notified by email each time the Internet's performance spikes or
|
|||
|
plunges. We'll only contact you in the case of the most extreme performance
|
|||
|
variations, and will include some analysis or explanation, when possible.
|
|||
|
The Internet Traffic Report is part of Andover.net, a network for
|
|||
|
technology-oriented consumers, which provides everything from technology news
|
|||
|
to the world's largest collection of free software sites.
|
|||
|
If you'd like to be put on our notification list, or would like more
|
|||
|
information on the site, please feel free to contact me at 978-635-5300 or
|
|||
|
sarahlawson@mediaone.net.
|
|||
|
|
|||
|
SOURCE Andover.net
|
|||
|
-0- 03/09/98
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Fri, 6 Mar 1998 17:55:21 -0500
|
|||
|
From: Graeme Browning <gbrowning@CDT.ORG>
|
|||
|
Subject: File 4--Policy Post 4.4: CONGRESS PREPARES TO TAKE UP CRYPTO AGAIN
|
|||
|
|
|||
|
Source: CDT POLICY POST Volume 4, Number 4 March 6, 1998
|
|||
|
_____________________________________________________________________________
|
|||
|
|
|||
|
CONGRESS PREPARES TO TAKE UP CRYPTO AGAIN
|
|||
|
|
|||
|
Congress is back in session and the ongoing debate on encryption controls
|
|||
|
has moved front and center. This spring Congress will be considering
|
|||
|
diametrically opposed approaches to the regulation of encryption, including
|
|||
|
an FBI proposal that would, for the first time, control the type of
|
|||
|
encryption programs Americans may use within their own borders. The most
|
|||
|
recent developments are outlined below.
|
|||
|
|
|||
|
(1) Sens. McCain and Kerrey propose revised crypto bill
|
|||
|
|
|||
|
Senators John McCain (R-AZ) and Robert Kerrey (D-NE) have a new version of
|
|||
|
their Secure Public Networks Act, S.909. The revised draft includes several
|
|||
|
changes in response to industry and privacy concerns. Despite these
|
|||
|
changes, CDT remains opposed to S. 909 for one fundamental reason: the
|
|||
|
revised draft still seeks, through a series of incentives (export controls,
|
|||
|
government procurement and liability safe-harbors), to require encryption
|
|||
|
users to surrender control over their keys on the government's terms.
|
|||
|
|
|||
|
Major changes in the revised McCain-Kerrey bill include:
|
|||
|
* it heightens the legal standards for access to escrowed keys;
|
|||
|
* it removes the linkage between key recovery and the regulation of
|
|||
|
certificate authorities; and
|
|||
|
* it refines export control requirements, lifting export limits to 56 bits
|
|||
|
for non-key recovery products.
|
|||
|
See http://www.senate.gov/~kerrey/inits/encrypt/
|
|||
|
|
|||
|
Overall, the new bill still threatens electronic privacy and security
|
|||
|
through the coercion of the marketplace towards adoption of a government
|
|||
|
key recovery standard, with all the risks that entails. Any legislation
|
|||
|
that includes government-dictated standards for key recovery is not a
|
|||
|
compromise. It entails too many risks and is fundamentally inconsistent
|
|||
|
with the user-controlled nature of the new electronic technologies.
|
|||
|
|
|||
|
CDT also opposes the revised bill because its privacy standards fall short;
|
|||
|
it criminalizes a wide range of uses of encryption; and it effectively
|
|||
|
retains current export controls on encryption. CDT believes S.909 is at
|
|||
|
best a codification of a bad status-quo.
|
|||
|
|
|||
|
In a press release, the Senators said they intend to move the bill to the
|
|||
|
floor of the Senate for a vote in May. See
|
|||
|
http://www.senate.gov/~mccain/encryp.htm .
|
|||
|
|
|||
|
|
|||
|
(2) Broad new coalition formed to fight crypto controls
|
|||
|
|
|||
|
Americans for Computer Privacy (ACP), a broad new coalition opposed to
|
|||
|
encryption controls, held its introductory press conference Wednesday,
|
|||
|
March 4. See http://www.computerprivacy.org . ACP opposes domestic
|
|||
|
restrictions on the use of encryption and supports lifting export controls
|
|||
|
to permit the sale of strong U.S. encryption in the global market. Members
|
|||
|
include not only key components of the computer industry and communications
|
|||
|
industry but also such diverse groups as Americans for Tax Reform, the
|
|||
|
National Rifle Association, and the Automobile Manufacturers Association,
|
|||
|
as well as CDT.
|
|||
|
|
|||
|
CDT will work with ACP to explain to the public the dangers of encryption
|
|||
|
controls; the vehicle for this public-education effort will be an expansion
|
|||
|
of our successful 'Adopt Your Legislator' campaign. The campaign, which now
|
|||
|
has 16,000 members across all 435 congressional districts, was a powerful
|
|||
|
voice against domestic controls in the last session of Congress.
|
|||
|
|
|||
|
'Adopt Your Legislator' helps individual Internet users keep track online
|
|||
|
of the positions their Members of Congress take on encryption policy.
|
|||
|
Through electronic alerts, it updates supporters on the latest news about
|
|||
|
the legislative fight. If you haven't joined the campaign, see:
|
|||
|
http://www.crypto.com/adopt/
|
|||
|
|
|||
|
(3) Senate crypto hearings planned
|
|||
|
|
|||
|
Sen John Ashcroft (R-MO), chairman of the Senate Subcommittee on the
|
|||
|
Constitution, is planning to hold a hearing on encryption on March 17. Sen.
|
|||
|
Ashcroft is a staunch opponent of domestic controls and an advocate of
|
|||
|
export relief. Witnesses invited to testify include: Rep. Goodlatte, author
|
|||
|
of the House SAFE (Security and Freedom through Encryption) bill; a
|
|||
|
representative of the Department of Justice; industry representatives;
|
|||
|
Cindy Cohn, lead attorney in the Bernstein encryption case; and law
|
|||
|
professors who will testify on the constitutionality of encryption
|
|||
|
controls.
|
|||
|
|
|||
|
(4) Critical infrastructures
|
|||
|
|
|||
|
On the same day as the Ashcroft hearing, another Senate subcommittee will
|
|||
|
hold a hearing to 'review policy directives for protecting America's
|
|||
|
critical infrastructures.' This issue has been the vehicle for some
|
|||
|
disturbing proposals regarding the Internet.
|
|||
|
|
|||
|
In November 1997, the President's Commission on Critical Infrastructure
|
|||
|
Protection issued its report. See http://www.pccip.gov One little-noticed
|
|||
|
provision (below) recommended the establishment of an 'Early Warning and
|
|||
|
Response capability' to protect telecommunications networks against
|
|||
|
cyber-attack:
|
|||
|
|
|||
|
'Conceptually, a successful cyber-attack warning and response system would
|
|||
|
include:
|
|||
|
1) A means for near real-time monitoring of the telecommunications
|
|||
|
infrastructure.
|
|||
|
2) The ability to recognize, collect, and profile system anomalies
|
|||
|
associated with attacks.
|
|||
|
3) The capability to trace, re-route, and isolate electronic signals that
|
|||
|
are determined to be associated with an attack.'
|
|||
|
|
|||
|
The concept reappeared in December when the Justice and Interior ministers
|
|||
|
of the G8, which includes the world's eight most industrialized nations,
|
|||
|
agreed that 'To the extent practicable, information and telecommunications
|
|||
|
systems should be designed to help prevent and detect network abuse, and
|
|||
|
should also facilitate the tracing of criminals and the collection of
|
|||
|
evidence.'
|
|||
|
|
|||
|
Witnesses invited to testify at this March 17 hearing include: a lead
|
|||
|
witness fronm the National Security Council; FBI Director Freeh, who will
|
|||
|
testify about the Infrastructure Protection Center, the FBI's new
|
|||
|
cyber-attack-monitoring center; and former Sen. Sam Nunn and former deputy
|
|||
|
Attorney General Jamie Gorelick, co-chairs of the President's Commission on
|
|||
|
Critical Infrastructure Protection Advisory Committee.
|
|||
|
|
|||
|
CDT remains concerned that this new initiative will form the basis for a
|
|||
|
sweeping plan to build new surveillance capabilities into the information
|
|||
|
infrastructure.
|
|||
|
______________________________________________________________________________
|
|||
|
|
|||
|
(5) SUBSCRIPTION INFORMATION
|
|||
|
|
|||
|
Be sure you are up to date on the latest public policy issues affecting
|
|||
|
civil liberties online and how they will affect you! Subscribe to the CDT
|
|||
|
Policy Post news distribution list. CDT Policy Posts, the regular news
|
|||
|
publication of the Center For Democracy and Technology, are received by
|
|||
|
more than 13,000 Internet users, industry leaders, policy makers and
|
|||
|
activists, and have become the leading source for information about
|
|||
|
critical free speech and privacy issues affecting the Internet and other
|
|||
|
interactive communications media.
|
|||
|
|
|||
|
To subscribe to CDT's Policy Post list, send mail to
|
|||
|
|
|||
|
majordomo@cdt.org
|
|||
|
|
|||
|
in the BODY of the message (leave the SUBJECT LINE BLANK), type
|
|||
|
|
|||
|
subscribe policy-posts
|
|||
|
|
|||
|
|
|||
|
If you ever wish to remove yourself from the list, send mail to the above
|
|||
|
address with NOTHING IN THE SUBJECT LINE AND a BODY TEXT of:
|
|||
|
|
|||
|
unsubscribe policy-posts
|
|||
|
|
|||
|
World Wide Web: http://www.cdt.org/
|
|||
|
|
|||
|
Snail Mail: The Center for Democracy and Technology
|
|||
|
1634 Eye Street NW * Suite 1100 * Washington, DC 20006
|
|||
|
(v) +1.202.637.9800 * (f) +1.202.637.0968
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Tue, 17 Mar 1998 17:11:10 -0800 (PST)
|
|||
|
From: Stanton McCandlish <mech@eff.org>
|
|||
|
Subject: File 5--EFFector 11.02: ACTION ALERT: Database Copyright Bill v. Fair Use
|
|||
|
|
|||
|
EFFector Vol. 11, No. 2 Mar. 17, 1998 editor@eff.org
|
|||
|
A Publication of the Electronic Frontier Foundation ISSN 1062-9424
|
|||
|
|
|||
|
See http://www.eff.org for more information on EFF activities & alerts!
|
|||
|
|
|||
|
_________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
The Electronic Frontier Foundation March 17, 1998
|
|||
|
|
|||
|
IMMEDIATE ACTION ALERT, MARCH 18 DEADLINE:
|
|||
|
CONTACT KEY REPRESENTATIVES ON THE SUBCOMMITTEE ON COURTS AND
|
|||
|
INTELLECTUAL PROPERTY TO OPPOSE DATABASE BILL
|
|||
|
|
|||
|
Please distribute widely to appropriate forums,
|
|||
|
no later than April 1, 1998.
|
|||
|
|
|||
|
SUMMARY:
|
|||
|
|
|||
|
* Latest News:
|
|||
|
House "Collections of Information Antipiracy" bill would
|
|||
|
create a new property right in databases and make criminal
|
|||
|
many uses of information without express permission from the
|
|||
|
database supplier.
|
|||
|
|
|||
|
* What You Can Do Now:
|
|||
|
Follow the directions below and call Rep. Howard Coble and
|
|||
|
members of House Subcommittee on Courts and Intellectual
|
|||
|
Property. Ask them to oppose expansion of rights to database
|
|||
|
holders without clear proof that additional protections are
|
|||
|
needed and without explicit explanation of how fair use will
|
|||
|
be protected. Explain that no new legislation is needed.
|
|||
|
|
|||
|
_________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
THE LATEST NEWS
|
|||
|
|
|||
|
On March 18, 1998, the House Subcommittee on Courts and Intellectual
|
|||
|
Property will mark up H.R. 2652, the "Collections of Information
|
|||
|
Antipiracy Act." Introduced by Rep. Howard Coble (R-NC), H.R. 2652
|
|||
|
expands the rights of database collectors and authorizes enormous
|
|||
|
civil and criminal penalties (up to $250,000 and/or 5 years in prison
|
|||
|
for a first offense; $500,000 and/or 10 years in prison for subsequent
|
|||
|
convictions) against anyone who uses data collected in a database
|
|||
|
without the express consent of the person who maintains that database.
|
|||
|
|
|||
|
The Act, backed by major database maintainers such as Microsoft and
|
|||
|
West Publishing, is designed to create a new crime against those who
|
|||
|
extract or commercially use a "substantial part" of a collection of
|
|||
|
information gathered, organized or maintained by another person
|
|||
|
"through a substantial investment of money or other resources" so as
|
|||
|
to harm the data collectors "actual or potential" market for a
|
|||
|
product or service that incorporates that collection of information.
|
|||
|
|
|||
|
The main problem with the bill is that key terms are either not
|
|||
|
defined or are poorly defined, leaving huge loopholes that render
|
|||
|
literally all data vulnerable under the Act. For example, even though
|
|||
|
the bill is titled the "Collections of Information Antipiracy Act,"
|
|||
|
the term "collection" is not defined. "Substantial part" is not
|
|||
|
defined. And "information" is defined as "facts, data, works of
|
|||
|
authorship, or any other intangible material capable of being
|
|||
|
collected and organized in a systematic way," an extremely broad
|
|||
|
definition that could include just about anything!
|
|||
|
|
|||
|
Unfortunately, while Congress has feeling a lot of pressure from the
|
|||
|
database maintainers to pass this legislation, they have not been
|
|||
|
hearing from those of us opposed to the bill. YOUR immediate action
|
|||
|
is needed to stop it from passing out of the Subcommittee.
|
|||
|
|
|||
|
_________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
IMMEDIATE ACTION TO TAKE
|
|||
|
|
|||
|
Free speech supporters, *especially supporters from states represented
|
|||
|
on the House Subcommittee on Courts and Intellectual Property*, are
|
|||
|
asked to IMMEDIATELY contact these key Representatives and ask them to
|
|||
|
"kill" the database bill, H.R. 2652, at the House Subcommittee on
|
|||
|
Courts and Intellectual Property markup meeting this Wednesday, March
|
|||
|
18, 1998 at 2:00 p.m. (ET).
|
|||
|
|
|||
|
We ask you to take JUST TWO MINUTES or so per call to contact the
|
|||
|
offices of Rep. Coble (Chair of the Subcommittee on Courts and
|
|||
|
Intellectual Property) and the rest of the Subcommittee and express
|
|||
|
your opposition to this legislation! Urge the Representatives to
|
|||
|
refrain from giving protections to database producers who already see
|
|||
|
hefty profits and need no additional sheltering of their wares.
|
|||
|
|
|||
|
Feel free to make use of the sample fax and phone "script" below.
|
|||
|
|
|||
|
|
|||
|
HOUSE JUDICITARY COMMITTEE'S
|
|||
|
SUBCOMMITTEE ON COURTS AND INTELLECTUAL PROPRETY
|
|||
|
|
|||
|
|
|||
|
ST PTY REPRESENTATIVE PHONE FAX
|
|||
|
DIST
|
|||
|
---------------------------------------- (Use 202 area code)---
|
|||
|
|
|||
|
NC 6 R Coble, Howard (chair) 225-3065 225-8611
|
|||
|
CA 26 D Berman, Howard 225-4695 225-5279
|
|||
|
VA 9 D Boucher, Rick 225-8361 225-0442
|
|||
|
FL 12 R Canady, Charles 225-1252 225-2279
|
|||
|
UT 3 D Cannon, Chris 225-7751 225-5629
|
|||
|
MI 14 D Conyers, John 225-5126 225-0072
|
|||
|
MA 10 D Delahunt, William 225-3411 226-0771
|
|||
|
MA 4 D Frank, Barney 225-5931 225-0182
|
|||
|
CA 23 R Gallegly, Elton 225-5811 225-1100
|
|||
|
VA 6 R Goodlatte, Robert 225-5431 225-9681
|
|||
|
CA 6 D Lofgren, Zoe 225-3072 225-3336
|
|||
|
FL 8 R McCollum, William 225-2176 225-0999
|
|||
|
IN 7 D Pease, Edward 225-5805 225-1649
|
|||
|
CA 27 R Rogan, James 225-4176 225-5828
|
|||
|
WI 9 R Sensenbrenner, F.J. 225-5101 225-3190
|
|||
|
_________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
SAMPLE PHONE "SCRIPT" & SAMPLE FAX
|
|||
|
|
|||
|
If you would like to both call, and send a fax, this extra action
|
|||
|
would certainly help.
|
|||
|
|
|||
|
For best results, try to put this in your own (short!) words, and
|
|||
|
be emotive without being hostile.
|
|||
|
|
|||
|
IF YOU ARE A CONSTITUENT (i.e., you live in the same district as
|
|||
|
the Rep. you are contacting) make sure to say so. For example "I
|
|||
|
am a constituent, and I'm calling/writing because...."
|
|||
|
|
|||
|
IF YOU REPRESENT A COMPANY OR ORGANIZATION, say so: "I'm Jane
|
|||
|
Person from Personal Technologies Inc. of Austin. I'm calling on
|
|||
|
behalf of Personal Technologies to ask the Representative to...."
|
|||
|
Business interests carry a lot of weight with many legislators,
|
|||
|
especially if they are in the legislator's home district.
|
|||
|
Legislators also generally heed organizational voices over
|
|||
|
individiual ones.
|
|||
|
|
|||
|
|
|||
|
PHONE "SCRIPT"
|
|||
|
|
|||
|
|
|||
|
You: [ring ring]
|
|||
|
|
|||
|
Legislative staffer: Hello, Representative Lastname's office.
|
|||
|
|
|||
|
You: I'm calling to urge Representative Lastname to REJECT the
|
|||
|
Collections of Information Antipiracy Act, H.R. 2652. This bill
|
|||
|
is missing key definitions and creates new property rights in
|
|||
|
databases and the raw information contained in them. These new
|
|||
|
rights threaten the free flow of information, freedom of speech
|
|||
|
and press, and fair use rights. The database industry has not
|
|||
|
proven any need for this legislation. The bill is not
|
|||
|
responsive to WIPO treaty language, provides for excessive and
|
|||
|
injust penalties, and does not provide clear guidance on how
|
|||
|
fair use would be protected. There is no need for this
|
|||
|
legislation, and I urge Representative Lastname to REJECT
|
|||
|
H.R. 2652. Thank you.
|
|||
|
|
|||
|
Staffer: OK, thanks. [click]
|
|||
|
|
|||
|
|
|||
|
It's that easy.
|
|||
|
|
|||
|
You can optionally ask to speak to the legislator's technology
|
|||
|
& intellectual property staffer. You probably won't get to, but
|
|||
|
the message may have more weight if you succeed. The staffer who
|
|||
|
first answers the phone probably won't be the tech/i.p. staffer.
|
|||
|
|
|||
|
|
|||
|
SAMPLE FAX
|
|||
|
|
|||
|
Relevant Congressional fax numbers are in the contact list above.
|
|||
|
Please, if you have the time, write your own 1-3 paragraph letter
|
|||
|
in your own words, rather than send a copy of this sample letter.
|
|||
|
(However, sending a copy of the sample letter is far better than
|
|||
|
taking no action!)
|
|||
|
|
|||
|
|
|||
|
Dear Rep. Lastname:
|
|||
|
|
|||
|
I'm writing to urge you to reject additional intellectual
|
|||
|
property protections for database maintainers as contained in
|
|||
|
H.R. 2652, the "Collections of Information Antipiracy Act."
|
|||
|
This bill, while being touted as as a piece of antipiracy
|
|||
|
legislation, actually makes most uses of pure information
|
|||
|
contained in a database illegal without prior permission from
|
|||
|
the database maintainer. The Act does not create useful
|
|||
|
exceptions for the fair use of information, and key definitions
|
|||
|
of crucial terms, such as "collection" and "substantial part"
|
|||
|
are missing. Furthermore the penalties called for - up to
|
|||
|
$500,000 and 10 years in prison - are excessive and injust.
|
|||
|
|
|||
|
The database industry is booming and is quite lucrative for
|
|||
|
companies collecting and disseminating information. At present,
|
|||
|
the law requires database collectors to add some originality to
|
|||
|
the information collected before the collectors receive a
|
|||
|
legally recognized property right in the database. H.R. 2652
|
|||
|
would change this, giving collectors property rights in raw
|
|||
|
information that has traditionally been in the public domain.
|
|||
|
This assault on the public's fair use rights and the free flow
|
|||
|
of information will have dire consequences for free speech and
|
|||
|
press, and scientific and legal research. Additionally, the
|
|||
|
bill is simply not responsive in any way to the requirements of
|
|||
|
recent WIPO treaties. WIPO rejected such a "database giveaway".
|
|||
|
|
|||
|
The database industry has not demonstrated a clear need for this
|
|||
|
legislation, and the public interest is harmed by giving these
|
|||
|
companies additional rights to control plain facts and
|
|||
|
information.
|
|||
|
|
|||
|
H.R. 2652 represents an attempt by some information collection
|
|||
|
owners to fortify their markets through manipulating the legal
|
|||
|
system (instead of through fair competition and the addition of
|
|||
|
value) by raising fears of electronic piracy of information
|
|||
|
over the Internet and through new information technologies.
|
|||
|
Congress should wait until specific and definable market
|
|||
|
failures become apparent before acting to correct them in as
|
|||
|
broad and vague a way as that attempted in H.R. 2652.
|
|||
|
|
|||
|
Sincerely,
|
|||
|
My Name Here
|
|||
|
My Address Here
|
|||
|
|
|||
|
|
|||
|
(Address is especially important if you want your letter to be taken
|
|||
|
as a letter from an actual constituent.)
|
|||
|
|
|||
|
For brief tips on writing letters to Congress, see:
|
|||
|
http://www.vote-smart.org/contact/contact.html
|
|||
|
The most important tip is to BE POLITE AND BRIEF. Swearing will NOT
|
|||
|
help.
|
|||
|
|
|||
|
_________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
MORE ACTION TO TAKE
|
|||
|
|
|||
|
After calling/faxing members of the House Subcommittee on Courts and
|
|||
|
Intellectual Property, please contact your own Representatives and
|
|||
|
urge them to oppose H.R. 2652, the Collections of Information
|
|||
|
Antipiracy Act. Do this even after the March 18 deadline for the main
|
|||
|
action. If you have time, please also contact House leaders and ask
|
|||
|
them to oppose any such legislation. (See contact list below)
|
|||
|
|
|||
|
You may also wish to follow up your calls and faxes with e-mail.
|
|||
|
|
|||
|
If you are unsure who your legislators are or how to contact them, see
|
|||
|
the EFF Congress Contact Factsheet at:
|
|||
|
http://www.eff.org/congress.html
|
|||
|
|
|||
|
For more information about the Collection of Information Antipiracy
|
|||
|
Act and why it should be opposed, see the Digital Future Coaltion web
|
|||
|
page at:
|
|||
|
http://www.dfc.org/
|
|||
|
|
|||
|
HOUSE LEADERSHIP
|
|||
|
|
|||
|
|
|||
|
ST PTY REPRESENTATIVE PHONE FAX
|
|||
|
DIST
|
|||
|
---------------------------------------- (Use 202 area code)---
|
|||
|
GA 6 R Gingrich, Newt 225-4501 225-4656
|
|||
|
TX 26 R Armey, Richard 225-7772 226-8100
|
|||
|
MO 3 D Gephardt, Richard 225-2671 225-7452
|
|||
|
TX 22 R DeLay, Tom 225-5951 225-5241
|
|||
|
MI 10 D Bonior, David 225-2106 226-1169
|
|||
|
OH 8 R Boehner, John 225-6205 225-0704
|
|||
|
CA 47 R Cox, Christopher 225-5611 225-9177
|
|||
|
CA 3 D Fazio, Vic 225-5716 225-5141
|
|||
|
MD 5 D Hoyer, Steny 225-4131 225-4300
|
|||
|
_________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
House leaders are, respectively: Speaker, Majority Leader, Minority
|
|||
|
Leader, Maj. Whip, Min. Whip, Republican Conference Chair, Rep. Policy
|
|||
|
Committee Chair, Democratic Caucus Chair, Dem. Steering Cmte. Chair.
|
|||
|
|
|||
|
[end of alert]
|
|||
|
_____________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
ADMINISTRIVIA
|
|||
|
|
|||
|
EFFector is published by:
|
|||
|
|
|||
|
The Electronic Frontier Foundation
|
|||
|
1550 Bryant St., Suite 725
|
|||
|
San Francisco CA 94103 USA
|
|||
|
+1 415 436 9333 (voice)
|
|||
|
+1 415 436 9993 (fax)
|
|||
|
|
|||
|
Editor: Stanton McCandlish, Program Director/Webmaster (mech@eff.org)
|
|||
|
|
|||
|
Membership & donations: membership@eff.org
|
|||
|
Legal services: ssteele@eff.org
|
|||
|
General EFF, legal, policy or online resources queries: ask@eff.org
|
|||
|
|
|||
|
Reproduction of this publication in electronic media is encouraged.
|
|||
|
Signed articles do not necessarily represent the views of EFF. To
|
|||
|
reproduce signed articles individually, please contact the authors for
|
|||
|
their express permission. Press releases and EFF announcements may be
|
|||
|
reproduced individually at will.
|
|||
|
|
|||
|
To subscribe to EFFector via email, send message body of:
|
|||
|
subscribe effector-online
|
|||
|
to listserv@eff.org, which will add you to a subscription list for
|
|||
|
EFFector. To unsubscribe, send a similar message body, like so:
|
|||
|
unsubscribe effector-online
|
|||
|
|
|||
|
Please tell ask@eff.org to manually remove you from the list if this
|
|||
|
does not work for some reason.
|
|||
|
|
|||
|
Back issues are available at:
|
|||
|
http://www.eff.org/pub/EFF/Newsletters/EFFector
|
|||
|
|
|||
|
To get the latest issue, send any message to
|
|||
|
effector-reflector@eff.org (or er@eff.org), and it will be mailed to
|
|||
|
you automagically. You can also get:
|
|||
|
http://www.eff.org/pub/EFF/Newsletters/EFFector/current.html
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Thu, 7 May 1997 22:51:01 CST
|
|||
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|||
|
Subject: File 6--Cu Digest Header Info (unchanged since 7 May, 1997)
|
|||
|
|
|||
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|||
|
available at no cost electronically.
|
|||
|
|
|||
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|||
|
|
|||
|
Or, to subscribe, send post with this in the "Subject:: line:
|
|||
|
|
|||
|
SUBSCRIBE CU-DIGEST
|
|||
|
Send the message to: cu-digest-request@weber.ucsd.edu
|
|||
|
|
|||
|
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
|
|||
|
|
|||
|
The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
|
|||
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|||
|
60115, USA.
|
|||
|
|
|||
|
To UNSUB, send a one-line message: UNSUB CU-DIGEST
|
|||
|
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
|
|||
|
(NOTE: The address you unsub must correspond to your From: line)
|
|||
|
|
|||
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|||
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|||
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|||
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|||
|
the PC Telecom forum under "computing newsletters;"
|
|||
|
On Delphi in the General Discussion database of the Internet SIG;
|
|||
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|||
|
CuD is also available via Fidonet File Request from
|
|||
|
1:11/70; unlisted nodes and points welcome.
|
|||
|
|
|||
|
In ITALY: ZERO! BBS: +39-11-6507540
|
|||
|
|
|||
|
UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
|
|||
|
Web-accessible from: http://www.etext.org/CuD/CuD/
|
|||
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|||
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|||
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|||
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|||
|
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
|
|||
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|||
|
|
|||
|
|
|||
|
The most recent issues of CuD can be obtained from the
|
|||
|
Cu Digest WWW site at:
|
|||
|
URL: http://www.soci.niu.edu/~cudigest/
|
|||
|
|
|||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|||
|
information among computerists and to the presentation and debate of
|
|||
|
diverse views. CuD material may be reprinted for non-profit as long
|
|||
|
as the source is cited. Authors hold a presumptive copyright, and
|
|||
|
they should be contacted for reprint permission. It is assumed that
|
|||
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|||
|
specified. Readers are encouraged to submit reasoned articles
|
|||
|
relating to computer culture and communication. Articles are
|
|||
|
preferred to short responses. Please avoid quoting previous posts
|
|||
|
unless absolutely necessary.
|
|||
|
|
|||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|||
|
the views of the moderators. Digest contributors assume all
|
|||
|
responsibility for ensuring that articles submitted do not
|
|||
|
violate copyright protections.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
End of Computer Underground Digest #10.18
|
|||
|
************************************
|
|||
|
|