844 lines
33 KiB
Plaintext
844 lines
33 KiB
Plaintext
|
||
|
||
Computer underground Digest Fri, Mar 13, 1992 Volume 4 : Issue 12
|
||
|
||
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
||
Associate Editor: Etaion Shrdlu
|
||
|
||
CONTENTS, #4.12 (Mar 13, 1992)
|
||
File 1--Correction on THE WELL Access
|
||
File 2--Readers Reply: "Bury Usenet" (CuD, #4.09)
|
||
File 3--Readers Reply: Sidetracked--Yet Another Usenet Problem (4.09)
|
||
File 4--CUD Archives Have Moved
|
||
File 5--The FBI initiative
|
||
File 6--Sun Devil FOIA Ruling (CPSR suit)
|
||
|
||
Issues of CuD can be found in the Usenet alt.society.cu-digest news
|
||
group, on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG,
|
||
and DL0 and DL12 of TELECOM, on Genie, on the PC-EXEC BBS at (414)
|
||
789-4210, and by anonymous ftp from ftp.cs.widener.edu (147.31.254.132),
|
||
chsun1.spc.uchicago.edu, and ftp.ee.mu.oz.au. To use the U. of
|
||
Chicago email server, send mail with the subject "help" (without the
|
||
quotes) to archive-server@chsun1.spc.uchicago.edu.
|
||
European distributor: ComNet in Luxembourg BBS (++352) 466893.
|
||
|
||
NOTE: THE WIDENER SITE IS TEMPORARILY RE-ORGANIZING AND IS CURRENTLY
|
||
DIFFICULT TO ACCESS. FTP-ERS SHOULD USE THE ALTERNATE FTP SITES UNTIL
|
||
FURTHER NOTICE.
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted as long as the source
|
||
is cited. Some authors do copyright their material, and they should
|
||
be contacted for reprint permission. It is assumed that non-personal
|
||
mail to the moderators may be reprinted unless otherwise specified.
|
||
Readers are encouraged to submit reasoned articles relating to
|
||
computer culture and communication. Articles are preferred to short
|
||
responses. Please avoid quoting previous posts unless absolutely
|
||
necessary.
|
||
|
||
DISCLAIMER: The views represented herein do not necessarily represent
|
||
the views of the moderators. Digest contributors assume all
|
||
responsibility for ensuring that articles submitted do not
|
||
violate copyright protections.
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
Date: Fri, 13 Mar 92 11:15:16 CST
|
||
From: Moderators <tk0jut2@mvs.cso.niu.edu>
|
||
Subject: File 1--Correction on THE WELL Access
|
||
|
||
We inadvertently reported in #4.11 that The Well (Whole Earth
|
||
'Lectronic Link) in Sausalito, Calif., was available through ftp.
|
||
This is not correct. The Well is accessible through TELNET
|
||
(192.132.30.2). We are told that it can also be reached through
|
||
well.sf.ca.us, although this address doesn't seem to work on some
|
||
systems.
|
||
|
||
It remains correct that The Well is perhaps the best system in the
|
||
country, if not the world. It is inexpensive, rich in diversity and
|
||
content, and intellectually stimulating. The voice phone for those
|
||
wanting more information: (415) 332-4335 (9 am to 5 pm PST).
|
||
|
||
------------------------------
|
||
|
||
Date: Wed, 11 Mar 92 11:38:55 PST
|
||
Subject: File 2--Readers Reply: "Bury Usenet" (CuD, #4.09)
|
||
From: Steve Elias <eli@CISCO.COM>
|
||
|
||
As the one who created alt.dcom.telecom after one of my
|
||
"disagreements" with Patrick regarding the telecom digest, I've got
|
||
three things to say:
|
||
|
||
1 -- Patrick decided not to post some articles I submitted, but mostly
|
||
those that had quotes from an anonymous source inside US Sprint.
|
||
Other articles i submitted, without anonymous sources, he did usually
|
||
post.
|
||
|
||
2 -- I also agree with nearly everything Steve Steinberg wrote in his
|
||
"Bury Usenet" article. I think usenet usually sucks wind, hence i
|
||
*usually* ;) decline to participate in the net. But don't allege that
|
||
the net should be completely "abolished" or "buried". I have mostly
|
||
"buried usenet" from my own point of view, because the benefits to me
|
||
are not worth any effort and time i might put into posting articles,
|
||
and the real-life penalties for stating controversial views can be
|
||
substantial.
|
||
|
||
3 -- gnu not usenet.
|
||
|
||
------------------------------
|
||
|
||
Date: Tue, 10 Mar 1992 23:46:05 GMT
|
||
From: tom_limoncelli@WARREN.MENTORG.COM(Tom Limoncelli)
|
||
Subject: File 3--Readers Reply: Sidetracked--Yet Another Usenet Problem (4.09)
|
||
|
||
One of the big problems I've always found with Usenet is the fact
|
||
that a good, productive discussion can be side tracked by any user
|
||
that wants to. Or, more usually, a person can unintentionally do so.
|
||
|
||
For example, the discussion of "Bury Usenet" has now been side-tracked
|
||
and is a debate over whether or not the Telcom Digest moderator is
|
||
biased.
|
||
|
||
For example, the countless discussions on many newsgroups where one or
|
||
two grammar (or spelling) queens will kill a productive thread by
|
||
pointing out typos.
|
||
|
||
[I'm trying not to add to the problem here, so let me bring it directly
|
||
back to "Bury Usenet"]
|
||
|
||
Solutions have been attempted: Moderated newsgroups, which many people
|
||
have problems with; and "experts only" newsgroup, which doesn't stop
|
||
people from asking how to delete a file called "-f" on a Unix system.
|
||
Neither works as well as some would wish.
|
||
|
||
The one solution that works is to avoid (uhhh, should I say "bury")
|
||
Usenet and use a standard mailing list. There are a few really high-
|
||
quality mailing lists out there that don't get advertised. One is
|
||
for system administrators that use NNTP, rather than users. It avoids
|
||
unwanted conversation because it's hidden from people that shouldn't
|
||
know about it. Another example is the problem that all of the activism
|
||
forums on the net are bombarded with pro/con arguments rather than
|
||
discussions that aid the activist's work itself. Recently there have
|
||
been two mailing lists created where the topic is not "Who's right?"
|
||
but "We're pooling resources, giving advice, and helping each other."
|
||
|
||
I hate to say it, but if the quality of either of those mailing lists
|
||
drops too much, I will create a new mailing list under a new and more
|
||
secret name and start over.
|
||
|
||
|
||
Given a topic you can create two forums. One talks about the topic,
|
||
one has a goal of achieving that topic. The problem with Usenet is
|
||
that all newsgroups are created to be the later, but turn into (or
|
||
users later assume it is) the former. The written proposal for
|
||
soc.motss dictates that it is for gay, lesbian and bisexual Usenet
|
||
members to discuss gay, lesbian and bisexual life AND it explicitly
|
||
prohibits discussions about if homosexuality/bisexuality is right or
|
||
wrong. Amazingly enough, homophobes post enough messages each day to
|
||
make the newsgroup useless to many people.
|
||
|
||
|
||
Future directions:
|
||
Sometimes I think that I'd be willing to pay for a service where I could
|
||
explain my likes and dislikes and they would pre-scan netnews for me
|
||
and mark anything I would find interesting; I could skip all the rest.
|
||
This might be worth-while for certain ultra-high volume newsgroups.
|
||
|
||
Then I think that it might be better to pay some highly trained
|
||
individual to go through my newsfeed as it arrives and add a new
|
||
header to each message that would list five to a hundred and five
|
||
keywords from the official Library of Congress keywords list [i.e.
|
||
synonyms are removed; you don't look in the card catalog under "Movies",
|
||
you look under "Films"] so that a killfile would have a better fighting
|
||
chance.
|
||
|
||
Then I start to think about the first mailing list I was ever on. Our
|
||
VAX at school wasn't on any networks yet, but someone in a silly mood
|
||
created the "SMC" mailing list and started sending people joking
|
||
invitations saying that they were invited to her "Secret Mail Club."
|
||
|
||
Maybe the SMC was going in the right direction the whole time.
|
||
|
||
------------------------------
|
||
|
||
Date: Wed, 11 Mar 1992 22:08:07 -0500
|
||
From: Brendan Kehoe <brendan@EFF.ORG>
|
||
Subject: File 4--CUD Archives Have Moved
|
||
|
||
The Computer Underground Digest archives have moved! For a number of
|
||
reasons, including decreasing disk space, the archives at Widener have
|
||
found a new home at the Electronic Frontier Foundation.
|
||
|
||
Everything looks the same, and over a dozen new items are available,
|
||
including Phrack 37. FTP to ftp.eff.org (presently with the IP
|
||
address of 192.88.144.4, but keep in the habit of using the name), and
|
||
go to the directory pub/cud.
|
||
|
||
My thanks to the folks at the EFF for their aid & assistance.
|
||
|
||
A copy of the present Index appears below. Please send offers of
|
||
submissions (not the submissions themselves) to cudarch@eff.org.
|
||
|
||
Thanks,
|
||
Brendan
|
||
|
||
++
|
||
|
||
Computer Underground Digest Archives
|
||
====================================
|
||
|
||
Last updated: 03/11/92
|
||
|
||
To subscribe to the Computer Underground Digest, write to
|
||
TK0JUT2@NIU.BITNET. See the bottom of this file for information on
|
||
submitting to the archives.
|
||
|
||
The archives on ftp.eff.org are now the main CuD archives. Two
|
||
shadow sites are being maintained:
|
||
|
||
* chsun1.spc.uchicago.edu in the directory pub/cud
|
||
* ftp.ee.mu.oz.au in the directory pub/text/CuD
|
||
|
||
If you're in Australia please go to your nearby site. If you're in
|
||
Japan, England, or Germany, and would be willing to maintain a mirror
|
||
of these archives (%13Mb of space), please write cudarch@eff.org.
|
||
|
||
An email server is available at
|
||
archive-server@chsun1.spc.uchicago.edu.
|
||
|
||
See the file "uncompressing" for info on how to uncompress files with
|
||
a ".Z" extension.
|
||
|
||
File Description
|
||
---- -----------
|
||
alcor/* Files on the Alcor Cryonics email privacy suit.
|
||
|
||
ane/* Anarchy & Explosives Digest, #1-7.
|
||
|
||
ati/* The Activist Times Incorporated files, #1-57.
|
||
Files #4 and #9 are missing. [ They supposedly don't exist. ]
|
||
Contact gzero@tronsbox.xei.com for info on
|
||
future issues.
|
||
|
||
bootlegger/* Issues 6 and 7 of the Bootlegger misc. info collections.
|
||
|
||
ccc/* Stuff from titania.mathematik.uni-ulm.de:/info/CCC. See
|
||
the file LIES_MICH [README in German] for info on specific
|
||
files. Also included are things from the CCC Congress.
|
||
|
||
chalisti/* The Chalisti German Newsletter, #1-12,14-17. [ They're in
|
||
German. Some ambitious and talented linguicist care to
|
||
translate 'em? ]
|
||
|
||
cpi/* Corrupted Programming International Newsletter #1-2.
|
||
|
||
cud/* The Computer Underground Digest, #1.00 - 4.11.
|
||
Also: Indices to Volumes 1, 2 and 3; Niedorf Flash.
|
||
Contact tk0jut2@niu.bitnet for a subscription.
|
||
|
||
fbi/* Freaker's Bureau Inc newsletter, #1.1-1.2.
|
||
|
||
dfp/* Digital Free Press, #1.1-1.2.
|
||
|
||
inform/* Informatik #1-2.
|
||
|
||
law/<state> Current computer crime laws are online for:
|
||
AL, AK, AZ, CA, CO, CT, DE, FL, GA, HI, IA, ID, IL,
|
||
IN, MD, MN, NC, NJ, NM, NY, OR, TX, VT, VA, WA, WI,
|
||
and WV.
|
||
(Everyone [law students especially] is encouraged to send
|
||
along other statutes...we want to build this area up to
|
||
[hopefully] a full set.)
|
||
Still needed: AR, DC, KS, KY, ME, MI, MO, MS, MT, ND,
|
||
NH, NV, OK, RI, SC, SD, TN, UT, WY
|
||
|
||
law/<country> Current computer crime laws are online for:
|
||
The United States (federal code), Canada, Ghana, and
|
||
Great Britain.
|
||
|
||
law/bill.s.618 Senate bill 618, addressing registration of encryption keys
|
||
with the government.
|
||
|
||
law/hr3515 House of Rep bill 3515, Telecommunications Law
|
||
|
||
law/improve Improvement of Information Access bill
|
||
|
||
law/monitoring Senate bill 516; concerning abuses of electronic monitoring
|
||
in the workplace.
|
||
|
||
law/us.e-privacy
|
||
Title 18, relating to computer crime & email privacy.
|
||
|
||
law/scourt-bios Biographies of the Superme Court Justices.
|
||
|
||
lod/* The LOD/H Technical Journals, #1-4.
|
||
|
||
misc/anarch.man Manual of the Anarchist, volume 1.
|
||
|
||
misc/basic1.net Basic Networking (old Telenet lore)
|
||
|
||
misc/cdc-100.Z The "Cult of the Dead Cow", #100.
|
||
|
||
misc/china-2.3 CHiNA Educational InfoFile Series II, #3.
|
||
|
||
misc/codaphone Coda-Phones (about message-taking machines)
|
||
|
||
misc/codehack What to Look For in a Code Hacking Program
|
||
|
||
misc/cyberspace-1.1
|
||
The Cyberspace Chronicle
|
||
|
||
misc/defense Defense Data Network Blues by "Harry Hackalot"
|
||
|
||
misc/elektrix-001
|
||
ELEKTRIX Issue 1.
|
||
|
||
misc/fbi-1.1 The Freakers Bureau Incorporated newsletter. Vol 1 No 1.
|
||
|
||
misc/globe-1.x The Globe Trotter, issues 1.1-1.3.
|
||
|
||
misc/hnet.1 H-Net Digest, #1. (Started June 1990) (None since)
|
||
|
||
misc/hun-1.2 Hackers Unlimited Magazine, Vol 1 Issue 2.
|
||
|
||
misc/kcah.1,2 Kcah Vol 1-2.
|
||
|
||
misc/phreak1.bok
|
||
(Another) Phreaker's Handbook
|
||
|
||
misc/ppa.2 Phreakers/Hackers/Anarchists Newsletter Vol 1 #2.
|
||
|
||
misc/rrg.1 Rebels' Riting Guild #1.
|
||
|
||
misc/tph-1 The Phreaker's Handbook, #1.
|
||
|
||
misc/watch* See CuD 3.19 for more info.
|
||
|
||
narc/* The Nuclear Anarchists/Phreakers/Hackers Digest, #1-10.
|
||
|
||
networks/* Acceptable Use Policies for a number of networks.
|
||
See networks/Index for more information.
|
||
|
||
nfx/* The New Fone Express #1-3.
|
||
|
||
nia/* The Network Information Access Newsletter, #1-73.
|
||
Contact elisem@nuchat.sccsi.com for more information
|
||
about NIA.
|
||
|
||
nsa/* National Security Anarchists #1.1-1.4.
|
||
|
||
papers/baudy.world
|
||
Appears in F. Schmalleger's "Computers In Criminal Justice"
|
||
%%The Baudy World of the Byte Bandit: A Postmodernist
|
||
Interpretation of the Computer Underground''
|
||
by Gordon Meyer and Jim Thomas
|
||
|
||
papers/bbs.and.the.law.Z
|
||
%%The Electronic Pamphlet--Computer Bulletin Boards and the Law
|
||
by Michael H. Riddle
|
||
|
||
papers/bbs.defamation
|
||
Defamation Liability of Computerized Bulletin Board
|
||
Operators and Problems of Proof
|
||
by John R. Kahn
|
||
|
||
papers/biblio A bibliography of CU-related news articles.
|
||
by Bob Krause
|
||
|
||
papers/candp "Story" of sorts describing a view on the world in which
|
||
we live.
|
||
%%Crime and Puzzlement''
|
||
by John Barlow (an EFF founder)
|
||
|
||
papers/civil.disobedience
|
||
"Civil Disobedience" by Henry David Thoreau.
|
||
|
||
papers/closing.the.net
|
||
"Closing The Net" by Greg Costikyan. Reproduced from
|
||
_Reason_ magazine with permission.
|
||
|
||
papers/company-email
|
||
Formulating a Company Policy on Access to and Disclosure of
|
||
Electronic Mail on Company Computer Systems
|
||
by David R. Johnson and John Podesta for the
|
||
Electronic Mail Association
|
||
|
||
papers/computer.crime
|
||
Computer Crime: Current Practices, Problems and
|
||
Proposed Solutions
|
||
by Brian J. Peretti
|
||
|
||
papers/const.in.cyberspace
|
||
Laurence Tribe's keynote address at the first Conference
|
||
on Computers, Freedom, & Privacy. "The Constitution in
|
||
Cyberspace"
|
||
|
||
papers/crime.puzzle
|
||
The 2600 Magazine article about Crime & Puzzlement.
|
||
|
||
papers/cyberspace
|
||
Cyberspace and the Legal Matrix: Laws or Confusion?
|
||
by Lance Rose
|
||
|
||
papers/denning Paper presented to 13th Nat'l Comp Security Conf
|
||
%%Concerning Hackers Who Break into Computer Systems''
|
||
by Dorothy E Denning.
|
||
|
||
papers/dennis.hayes
|
||
About Dennis Hayes' arrest & conviction for copyright
|
||
violation.
|
||
|
||
papers/ecpa.layman
|
||
The Electronic Communications Privacy Act of 1986: A Layman's
|
||
View
|
||
by Michael H. Riddle
|
||
|
||
papers/edwards_letter
|
||
A letter from the Director of the Secret Service to US
|
||
Rep. Don Edwards, D-California, in response to questions
|
||
raised by Edwards' Subcommittee. This copy came from
|
||
Computer Professionals for Social Responsibility in
|
||
Washington, D.C.
|
||
|
||
papers/electropolis
|
||
Electropolis: Communication & Community on Internet Relay Chat
|
||
by Elizabeth M. Reid
|
||
|
||
papers/fbi.systems
|
||
A description of how information's stored on the FBI's
|
||
computer systems.
|
||
|
||
papers/fyi.8 Network Working Group Site Security Handbook
|
||
|
||
papers/gao-report
|
||
US General Accounting Office report intended as a feeler
|
||
to see if future electronic releases are of interest.
|
||
|
||
papers/email_privacy
|
||
Article on the rights of email privacy.
|
||
by Ruel T. Hernandez
|
||
|
||
papers/intro Intro to the Computer Underground, by "The Bandit"
|
||
|
||
papers/len.rose A compilation of information on Len Rose's situation.
|
||
|
||
papers/len.rose.news
|
||
News articles on Len Rose.
|
||
|
||
papers/lod_ss.Z The Secret Service, UUCP, and the Legion of Doom
|
||
by Kevin Mullet
|
||
|
||
papers/memetics Memetics: The Nascent Science of Ideas and Their Transmission
|
||
by J. Peter Vajk
|
||
|
||
papers/meyer Masters Thesis:
|
||
The Social Organization of the Computer Underground
|
||
by Gordon Meyer
|
||
|
||
papers/morris.appeal
|
||
Robert Morris's appeal.
|
||
|
||
papers/netproposition
|
||
An FYI about the proposed NREN setup.
|
||
|
||
papers/privacy %%Computer Privacy vs First and Fourth Amendment Rights''
|
||
by Michael S. Borella
|
||
|
||
papers/riggs.brief
|
||
EFF Amicus Brief in the U.S. v. Riggs case challenging
|
||
computer-use prohibition in "hacker" defendant's sentencing
|
||
|
||
papers/riggs_comment.Z
|
||
United States v. Riggs: Jacking Into the Net With the
|
||
Illinois District Court
|
||
Article for the Rutgers Computer & Technology Law Journal,
|
||
by Jay Wood.
|
||
|
||
papers/rights-of-expr
|
||
Rights of Expression in Cyberspace
|
||
by R. E. Baird
|
||
|
||
papers/ripco-warrant
|
||
The search warrant for the Ripco BBS.
|
||
|
||
papers/rivera A transcript of Geraldo Rivera's %%Now It Can Be Told: Mad
|
||
Hackers' Key Party''.
|
||
|
||
papers/sj-resp Steve Jackson's response to the charges against him, denouncing
|
||
the government's actions.
|
||
|
||
papers/sundevil A collection of information on Operation SunDevil by
|
||
the Epic nonprofit publishing project. Everything you
|
||
wanted to know but could never find.
|
||
|
||
papers/sysops What Files are Legal for Distribution on a BBS?
|
||
by Bob Mahoney, sysop of Exec-PC
|
||
|
||
papers/theft.of.software
|
||
Article by William Cook, US Attorney in the Neidorf trial.
|
||
|
||
phantasy/* Phantasy Newsletter, Issues 1-7 (volumes 1 through 3).
|
||
|
||
phrack/* PHRACK Magazine, #1-37.
|
||
Also an Index to the Phracks.
|
||
Contact phracksub@stormking.com for information about future
|
||
issues.
|
||
|
||
phun/* PHun Magazine, #1-5.
|
||
|
||
pirate/* Pirate Magazine, #1-5.
|
||
|
||
ppp/* P... Phield Phreakers Newsletter #1.
|
||
|
||
schools/* The policies of a number of schools.
|
||
See schools/Index for a full list & description of these.
|
||
|
||
sulaw/* The law archives from Sydney University (sulaw.law.su.oz.au).
|
||
|
||
synd/* The Syndicate Reports, #1-17, 20. [ If you have #18-20, please
|
||
send them in! We can't find them. ]
|
||
|
||
tap/* The TAP Magazine Online, #1.
|
||
|
||
wview/* The World View, #1.5-1.10, 2.0-2.2.
|
||
|
||
Any requests for files to be added to the archives should be sent via
|
||
email to cudarch@eff.org, cudarch@chsun1.uchicago.edu,
|
||
cudarch@ee.mu.oz.au, or TK0JUT2@NIU.BITNET.
|
||
|
||
------------------------------
|
||
|
||
Date: Wed, 11 Mar 92 10:23:23 PDT
|
||
From: Mike Godwin <mnemonic@WELL.SF.CA.US>
|
||
Subject: File 5--The FBI initiative
|
||
|
||
|
||
102nd Congress
|
||
2nd Session
|
||
|
||
|
||
Amendment No.
|
||
Offered by M.
|
||
|
||
|
||
1. SEC. 1. FINDINGS AND PURPOSES
|
||
2. (a) The Congress finds:
|
||
3. (1) that telecommunications systems and networks are often
|
||
4 used in the furtherance of criminal activities including
|
||
5 organized crime, racketeering, extortion, kidnapping, espionage,
|
||
6 terrorism, and trafficking in illegal drugs; and
|
||
7 (2 ) that recent and continuing advances in
|
||
8 telecommunications technology, and the introduction of new
|
||
9 technologies and transmission modes by the telecommunications
|
||
10 industry, have made it increasingly difficult for government
|
||
11 agencies to implement lawful orders or authorizations to
|
||
12 intercept communications and thus threaten the ability of such
|
||
13 agencies effectively to enforce the laws and protect the national
|
||
14 security; and
|
||
15 (3) without the assistance and cooperation of providers of
|
||
16 electronic communication services and private branch exchange
|
||
17 operators, the introduction of new technologies and transmission
|
||
18 modes into telecommunications systems witout consideration and
|
||
19 accommodation of the need of government agencies lawfully to
|
||
20 intercept communications, would impede the ability of such
|
||
21 agencies effectively to carry out their responsibilities.
|
||
22
|
||
|
||
|
||
|
||
|
||
1 The purpose of this Act are:
|
||
2 (1) to clarify the duty of providers of electronic
|
||
3 communication services and private branch exchange operators to
|
||
4 provide such assistance as necessary to ensure the ability of
|
||
5 government agencies to implement lawful orders or authorizations
|
||
6 to intercept communications; and
|
||
7 (2) to ensure that the Federal Communications Commission,
|
||
8 in the setting of standards affecting providers of electronic
|
||
9 communication services or private branch exchange operators, will
|
||
10 accommodate the need of government agencies lawfully to intercept
|
||
11 communications.
|
||
|
||
12 SEC. 2. Title II of the Communications Act of 1934 is amended
|
||
13 by adding at the end thereof the following new sections:
|
||
14 "Sec__. GOVERNMENT REQUIREMENTS
|
||
15 "(a) The Federal Communications Commission shall,
|
||
16 within 120 days after enactment of this Act, issue such
|
||
17 regulations as are necessary to ensure that the government
|
||
18 can intercept communications when such interception is
|
||
19 otherwise lawfully authorized
|
||
20 "(b) The regulations issued by the commission shall:
|
||
21 "(1) establish standards and specifications for
|
||
22 telecommunications equipment and technology employed by
|
||
23 providers of electronic communication services or
|
||
24 private branch exchange operators as may be necessary
|
||
25 to maintain the ability of the government to lawfully
|
||
26 intercept communication
|
||
|
||
|
||
|
||
|
||
|
||
|
||
1 "(2) require that any telecommunications
|
||
2 equipment or technology which impedes the ability of
|
||
3 the government to lawfully intercept communications and
|
||
4 and which has been introduced into a telecommunications
|
||
5 system by providers of electronic communication
|
||
6 services or private branch exchange operators shall not
|
||
7 expanded so as to further impede such utility until
|
||
8 that telecommunications equipment or technology is
|
||
9 brought into compliance with the requirements set forth
|
||
10 in regulations issued by the Commission;
|
||
11 "(3) require that modifications which are
|
||
12 necessary to be made to existing telecommunications
|
||
13 equipment or technology to eliminate impediments to the
|
||
14 ability of the government to lawfully intercept
|
||
15 communications shall be implemented by such providers
|
||
16 of electronic communication services and private branch
|
||
17 exchange operators within 180 days of issuance of such
|
||
18 regulations; and
|
||
19 "(4) prohibit the use by electronic communication
|
||
20 service providers and private branch exchange operators
|
||
21 of any telecommunications equipment or technoloqy which
|
||
22 does not comply with the regulations issued under this
|
||
23 section after the 180th day following the issuance of
|
||
24 such regulations.
|
||
25 "(c) For the purposes of administering and enforcing
|
||
26 the provisions of this section and the regulations
|
||
|
||
|
||
|
||
|
||
|
||
|
||
1 prescribed hereunder, the Commission shall have the same
|
||
2 authority, power, and functions with respect to providers of
|
||
3 electronic communication services or private branch exchange
|
||
4 operators as the Commission has in administering and
|
||
5 enforcing the provisions of this title with respect to any
|
||
6 common carrier otherwise subject to Commission jurisdiction.
|
||
7 Any violation of this section by any provider of electronic
|
||
8 communication service or any private branch exchange
|
||
9 operator shall be subject to the same remedies, penalties,
|
||
10 and procedures as are applicable to a violation of this
|
||
11 chapter by a common carrier otherwise subject to Commission
|
||
12 jurisdiction, except as otherwise specified in subsection
|
||
13 (d).
|
||
14 "(d) In addition to any enforcement authorities vested
|
||
15 in the Commission under this title, the Attorney General may
|
||
16 apply to the appropriate United States District Court for a
|
||
17 restraining order or injunction against any provider of
|
||
18 electronic communication service or private branch exchange
|
||
19 operator based upon a failure to comply with the provisions
|
||
20 of this section or regulations prescribed hereunder.
|
||
21 "(e) Any person who willfully violates any provision
|
||
22 of the regulations issued by the Commission pursuant to
|
||
23 subjection (a) of this section shall be subject to a civil
|
||
24 penalty of $10,000 per day for each day in violation.
|
||
25 "(f) To the extent consistent with the setting or
|
||
26 implementation of just and reasonable rates, charges and
|
||
|
||
|
||
|
||
1 classifications, the Commission shall authorize the
|
||
2 compensation of any electronic communication service
|
||
3 providers or other entities whose rates or charges are
|
||
4 subject to its jurisdiction for the reasonable costs
|
||
5 associated with such modifications of existing
|
||
6 telecommunications equipment or technology, or with the
|
||
7 development or procurement, and the installation of such
|
||
8 telecommunications equipment or technology as is necessary
|
||
9 to carry out the purposes of this Act, through appropriate
|
||
10 adjustments to such rates and charges.
|
||
11 "(g) The Attorney General shall advise the Commission
|
||
12 within 30 days after the date of enactment of this Act, and
|
||
13 periodically thereafter, as necessary, of the specific needs
|
||
14 and performance requirements to ensure the continued ability
|
||
15 of the government to lawfully intercept communications
|
||
16 transmitted by or through the electronic communication
|
||
17 services and private branch exchanges introduced, operated,
|
||
18 sold or leased in the United States.
|
||
l9 "(h) Notwithstanding section 552b of Title 5, United
|
||
20 States Code or any other provision of law, the Attorney
|
||
21 General or his designee may direct that any Commission
|
||
22 proceeding concerning regulations, standards or
|
||
23 registrations issued or to be issued under the authority of
|
||
24 this section shall be closed to the public.
|
||
25 "(i) Definitions -- As used in this section --
|
||
|
||
|
||
|
||
|
||
1 "(l) 'provider of electronic communication
|
||
2 service' or 'private branch exchange operator' means
|
||
3 any service which provides to users thereof the ability
|
||
4 to send or receive wire, oral or electronic
|
||
5 communications, as those terms are defined in
|
||
6 subsections 2510(1) and 2510(12) of Title 18, United
|
||
7 States Code;
|
||
8 "(2) 'communication' means any wire or electronic
|
||
9 communication, as defined in subsection 2510(1) and
|
||
10 2510 (12), of Title 18, United States Code;
|
||
11 "(3) 'impede' means to prevent, hinder or impair
|
||
12 the government's ability to intercept a communication
|
||
13 in the same form as transmitted;
|
||
14 "(4) 'intercept' shall have the same meaning
|
||
l5 set forth in section 2510 (4) of Title 18, United States
|
||
16 Code;
|
||
17 "(5) 'government' means the Government of the
|
||
18 United States and any agency or instrumentality
|
||
19 thereof, any state or political subdivision thereof,
|
||
20 and the District of Columbia, and Commonwealth of Puerto
|
||
21 Rico; and
|
||
22 "(6) 'telecommunications equipment or technology'
|
||
23 means any equipment or technology, used or to be used
|
||
24 by any providers of electronic communication services
|
||
25 or private branch exchange operators, which is for the
|
||
|
||
|
||
|
||
|
||
1 transmission or recept of wire, oral or electronic
|
||
2 communications."
|
||
|
||
3 SEC 3. Section 510, Title V, P.L. 97-259 is amended deleting the
|
||
4 phrase "section 301 or 302a" and substituting the phrase "section
|
||
5 301, 302a, or ____.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
DIGITAL TELEPHONY AMENDMENT
|
||
(report language)
|
||
|
||
|
||
Significant changes are being made in the systems by which
|
||
communications services are provided. Digital technologies,
|
||
fiber optics, and other telecommunications transmission
|
||
technologies are coming into widespread use. These changes
|
||
in communications systems and technologies make it increasingly
|
||
difficult for government agencies to implement lawful orders or
|
||
authorizations to intercept communications in order to enforce
|
||
the laws and protect the national security.
|
||
|
||
|
||
With the assistance of providers of electronic communication
|
||
services, these technological advances need not impede
|
||
the ability of government agencies to carry out their
|
||
responsibilities. This bill would direct the Federal
|
||
Communications Commission (FCC) to issue standards ensuring
|
||
that communications systems and service providers continue
|
||
to accommodate lawful government communications intercepts.
|
||
The regulations are not intended to cover federal government
|
||
communications systems. Procedure already exist by which
|
||
the Federal Bureau of Investigation amy obtain federal agency
|
||
cooperation in implementing lawful orders or authorizations
|
||
applicable to such systems. Further, there would be no
|
||
obligation on the part of the service providers or any other party
|
||
to ensure access to the plain text of encrypted or other encoded
|
||
material, but rather only to the communication in whatever form
|
||
it is transmitted. It is thus the intent and purpose of the
|
||
bill only to maintain the government's current communications
|
||
interception capability where properly ordered or authorized.
|
||
No expansion of that authority is sought.
|
||
|
||
|
||
|
||
|
||
ANALYSIS
|
||
|
||
|
||
|
||
Subsection 2(a) and (b) would require the Federal Communications
|
||
Commission (FCC) to issue any regulations deemed necessary to
|
||
ensure that telecommunications equipment and technology used
|
||
by providers of electronic communications services or private branch
|
||
exchange operators will permit the government to intercept
|
||
communications when such interception is lawfully authorized.
|
||
The regulations would also require that equipment or technologies
|
||
currently used by such providers or operators that impede this
|
||
ability until brought into compliance with the regulations.
|
||
Compliance with FCC regulations issued under this section would
|
||
be required within 180 days of their issuance.
|
||
|
||
Subsection 2(c) provides that the Commission's authority to
|
||
implement and enforce the provisions of this section are the same
|
||
as those it has with respect to common carriers subject to its
|
||
jurisdiction.
|
||
|
||
Subsection 2(d) would give the Attorney General the authority to
|
||
request injunctive relief against non-complying service providers
|
||
or private branch exchange operators.
|
||
|
||
Subsection 2(e) provides civil penalty authority for willful
|
||
violations of the regulations of up to $10,000 per day for each
|
||
violation.
|
||
|
||
Subsection 2(f) would permit the FCC to provide rate relief to
|
||
service providers subject to its rate-setting jurisdiction for
|
||
the costs associated with modifying equipment or technologies to
|
||
carry out the purposes of the bill.
|
||
|
||
Subsections 2(g), (h), and (i) require the Attorney General
|
||
to advise the Commission regarding the specific needs and
|
||
performance criteria required to maintain government intercept
|
||
capabilities, require the FCC to ensure that the standards and
|
||
specifications it promulgates may be implemented on a royalty-
|
||
free basis, and authorize the Attorney General to require that
|
||
particular Commission rulemaking proceedings to implement the Act
|
||
be closed to the public.
|
||
|
||
Subsection 2(j) provides definitions for key terms used in this
|
||
section.
|
||
|
||
------------------------------
|
||
|
||
Date: 12 Mar 92 22:28:35 EST
|
||
From: Gordon Meyer <72307.1502@COMPUSERVE.COM>
|
||
Subject: File 6--Sun Devil FOIA Ruling (CPSR suit)
|
||
|
||
U.S.. District Judge Thomas Hogan today upheld the decision of the
|
||
Secret Service to withhold from public disclosure search warrant
|
||
materials associated with the agency's controversial Operation Sun
|
||
Devil investigation. Ruling from the bench in a Freedom of
|
||
Information Act lawsuit filed in Washington by Computer Professionals
|
||
for Social Responsibility (CPSR), the judge accepted the government's
|
||
contention that release of the requested documents would interfere
|
||
with the Secret Service's ongoing investigation of alleged computer
|
||
crime.
|
||
|
||
CPSR had argued that disclosure of the documents -- search warrant
|
||
applications, executed warrants and inventories of seized property --
|
||
would not hamper legitimate law enforcement interests. The Sun Devil
|
||
raids were conducted in May 1990 in 13 cities across the country and
|
||
have not, to date, resulted in any indictments. Similar documents are
|
||
routinely available from judicial clerks' offices and are considered
|
||
to be public records.
|
||
|
||
While noting that the government has not alleged a conspiracy in the
|
||
Sun Devil investigation, the judge ruled that the requested documents,
|
||
when viewed in the aggregate, might reveal heretofore undisclosed
|
||
aspects of the investigation and hamper the government's efforts.
|
||
Such a "compilation" of information, according to the judge, would be
|
||
likely to interfere with the investigation -- the standard the
|
||
government must meet to justify the withholding of law enforcement
|
||
records under the FOIA.
|
||
|
||
CPSR plans to appeal the ruling to the U.S. Court of Appeals for the
|
||
District of Columbia.
|
||
|
||
David L. Sobel,
|
||
CPSR Legal Counsel
|
||
dsobel@washofc.cpsr.org
|
||
|
||
------------------------------
|
||
|
||
End of Computer Underground Digest #4.12
|
||
************************************
|
||
|
||
|
||
|