849 lines
39 KiB
Plaintext
849 lines
39 KiB
Plaintext
|
||
|
||
Computer underground Digest Sun Apr 18 1993 Volume 5 : Issue 28
|
||
ISSN 1004-042X
|
||
|
||
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
||
Archivist: Brendan Kehoe
|
||
Shadow-Archivists: Dan Carosone / Paul Southworth
|
||
Ralph Sims / Jyrki Kuoppala
|
||
Ian Dickinson
|
||
Cyop Editor: Etaoin Shrdlu, Senior
|
||
|
||
CONTENTS, #5.28 (Apr 18 1993)
|
||
File 1--NREN Wrap (or "Joe's Ride at the Houston Chron")
|
||
File 2--Clinton Proposes National ID Card
|
||
File 3--White House Crypto Statement
|
||
File 4--Debate on Gov't Encryption Initiative (from CPSR)
|
||
File 5--RU Sirius/Mondo interview (from GEnie)
|
||
File 6--Rune Stone BBS (IIRG Home Board) Back On-Line
|
||
|
||
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
||
available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
|
||
editors may be contacted by voice (815-753-6430), fax (815-753-6302)
|
||
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
||
60115.
|
||
|
||
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
||
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
||
LAWSIG, and DL0 and DL12 of TELECOM; on GEnie in the PF*NPC RT
|
||
libraries and in the VIRUS/SECURITY library; from America Online in
|
||
the PC Telecom forum under "computing newsletters;"
|
||
On Delphi in the General Discussion database of the Internet SIG;
|
||
on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
|
||
WHQ) 203-832-8441 NUP:Conspiracy
|
||
CuD is also available via Fidonet File Request from 1:11/70; unlisted
|
||
nodes and points welcome.
|
||
EUROPE: from the ComNet in Luxembourg BBS (++352) 466893;
|
||
|
||
ANONYMOUS FTP SITES:
|
||
UNITED STATES: ftp.eff.org (192.88.144.4) in /pub/cud
|
||
uglymouse.css.itd.umich.edu (141.211.182.53) in /pub/CuD/cud
|
||
halcyon.com( 202.135.191.2) in /pub/mirror/cud
|
||
AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
|
||
EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
|
||
ftp.warwick.ac.uk in pub/cud (United Kingdom)
|
||
|
||
Back issues also may be obtained through mailservers at:
|
||
mailserv@batpad.lgb.ca.us or server@blackwlf.mese.com
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted for non-profit as long
|
||
as the source is cited. Some authors do copyright their material, and
|
||
they should be contacted for reprint permission. It is assumed that
|
||
non-personal mail to the moderators may be reprinted unless otherwise
|
||
specified. Readers are encouraged to submit reasoned articles
|
||
relating to computer culture and communication. Articles are
|
||
preferred to short responses. Please avoid quoting previous posts
|
||
unless absolutely necessary.
|
||
|
||
DISCLAIMER: The views represented herein do not necessarily represent
|
||
the views of the moderators. Digest contributors assume all
|
||
responsibility for ensuring that articles submitted do not
|
||
violate copyright protections.
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
Date: Thu, 15 Apr 1993 00:56:26 EDT
|
||
From: Joe Abernathy <Joe.Abernathy@HOUSTON.CHRON.COM>
|
||
Subject: File 1--NREN Wrap (or "Joe's Ride at the Houston Chron")
|
||
|
||
((MODERATORS' NOTE: The following is Joe Abernathy's last story for
|
||
the Houston Chronicle. We've known Joe since 1990, and have found him
|
||
a strong supporter of civil liberties in cyberspace. As his knowledge
|
||
of the the topic has grown, so has the sophistication of his articles.
|
||
His periodic columns in The Village Voice's "Wired" section have been
|
||
consistently penetrating commentaries on law, ethics, and policy. We
|
||
wish Joe the best in his new life. Thanks Joe.))
|
||
|
||
NREN Wrap -- This is my last story for the Houston Chronicle. It is to
|
||
appear on April 4, 1993. Please feel free to redistribute it for any
|
||
non-commercial use.
|
||
|
||
To those of you who have provided so much help these past four
|
||
years, thanks. It's been a real education. I've accepted the job of
|
||
Senior Editor-News at PC World magazine, and I'll still be writing the
|
||
Village Voice Technocracy column, so I hope you'll all stay in touch.
|
||
My new contact information is P.O. Box 572390, Houston, Texas
|
||
77257-2390, joe@blkbox.com.
|
||
|
||
By JOE ABERNATHY
|
||
Houston Chronicle Staff Writer
|
||
|
||
The specters of class struggle and international economic warfare
|
||
are casting a shadow over administration hearings on how to build a
|
||
sophisticated national computer network.
|
||
|
||
Billed as an engine of job growth, a central concern is emerging
|
||
that the "data superhigh way" promised by Vice President Al Gore and
|
||
President Bill Clinton during the campaign could produce a large
|
||
underclass of "information have-nots."
|
||
|
||
Based on an emerging global computer net work known as the
|
||
Internet, which links up to 12 million people in more than 30 nations,
|
||
the National Research and Education Network (NREN) is a decade-long
|
||
project of former Sen. Gore.
|
||
|
||
Gore envisions a future in which oceans of data, including
|
||
libraries of movies, books and other creative works, would be readily
|
||
avail able to every home. In selling a $5 billion spending plan
|
||
focused on the network in 1992, Gore held forth the image of
|
||
classrooms without walls, sophisticated medical collaborations, and
|
||
globally competitive small businesses.
|
||
|
||
"The NREN is at all odds the most important and lucrative
|
||
marketplace of the 21st century," he said in a recent statement.
|
||
|
||
But in trying to make it work, it has become apparent that the NREN
|
||
remains in many ways a captive of its privileged institutional
|
||
heritage. Some Americans don't even have telephone service, and many
|
||
still don't have computers with which to access the net.
|
||
|
||
Two congressional hearings were held in late March concerning the
|
||
National Information Infrastructure, and a bill has been introduced
|
||
that would take up where Gore's 1992 High-Performance Computing Act
|
||
left off _ bringing the net to classrooms, small business and other
|
||
potentially disenfranchised Americans. Clinton's budget includes an
|
||
additional $489 million over six years for the network.
|
||
|
||
And while the regional Bells, newspapers and other information
|
||
giants have been struggling for years over the future of the medium,
|
||
congressional insiders say that with the in creased attention, a
|
||
resolution seems likely to be found during the current session of
|
||
Congress.
|
||
|
||
"What I think is really getting squeezed out is that there hasn't
|
||
been a genuine, public interest, bottom-up grass roots voice. It's a
|
||
huge, huge issue," said Marc Rotenberg, director of the Washington
|
||
offices of Computer Professionals for Social Responsibility, the
|
||
primary champion of civil rights in the new electronic medium. "It's
|
||
about people, it's about institutions, it's about who gets to connect
|
||
and on what terms."
|
||
|
||
Observers also fear that the rush to wield the network as an
|
||
economic weapon could produce dramatic incursions into free speech and
|
||
other civil liberties.
|
||
|
||
"I'm very concerned that the rhetoric about national
|
||
competitiveness is transforming itself into a new cold war," said
|
||
Gary Chapman, director of CPSR's 21st Century Project in Cambridge,
|
||
Mass. "The concerns of intelligence and other federal agencies
|
||
including NASA has been to look at technology resources that are not
|
||
related to military security but to economic benefits as being things
|
||
that have to be protected by Draconian measures of security."
|
||
|
||
Recent disciplinary actions at NASA Ames Research Center in
|
||
Northern California seem to support Chapman's concerns.
|
||
|
||
Up to eight of the 11 scientists disciplined in December were
|
||
targeted because of their participation in politically oriented,
|
||
international discussion groups hosted on the Internet computer
|
||
network, according to documents obtained by the Houston Chronicle
|
||
under the Freedom of Information Act, along with subsequent
|
||
interviews of NASA Ames personnel.
|
||
|
||
"Some people there were accused of dealing with foreign nationals
|
||
about non-classified technology issues," said Chapman, whose
|
||
organization also has made inquiries into the matter. "NASA said
|
||
the U.S. has to protect its technology assets because of the global
|
||
environment of competitiveness."
|
||
|
||
The issues are even simpler for Raymond Luh, a subcontracting
|
||
engineer fired by NASA. Luh, an American of Chinese ancestry, feels
|
||
that his career was destroyed simply because he joined in one of the
|
||
thousands of political discussions aired each day over the Internet.
|
||
|
||
"I feel I have been gravely wronged by NASA," Luh said. "I
|
||
cannot possibly seek employment elsewhere. My reputation as a
|
||
law-abiding citizen and a hard-working researcher has been tarnished
|
||
almost beyond repair."
|
||
|
||
NASA refused to comment on the matter.
|
||
|
||
According to FOIA documents provided by NASA's Office of the
|
||
Inspector General, Luh was fired when "a document containing Chinese
|
||
writing was found in (Luh's computer). ... Investigation determined
|
||
that Luh's office computer held a large volume of files relating to
|
||
his efforts to promote Most Favored Nation trade status for the
|
||
People's Republic of China. ... Luh was not authorized to use his
|
||
computer for this activity."
|
||
|
||
To Luh, however, he was only one of the chorus of voices that
|
||
joined in a fiery debate surrounding fallout from the Tiananmen Square
|
||
massacre. He wasn't trying to make policy _ he was exercising
|
||
intellectual freedom, in his spare time.
|
||
|
||
"That's a very dangerous and disturbing kind of trend," said
|
||
Chapman. "The parallel is with the Cold War and transforming the
|
||
modes of thinking and the practices of these agencies into new forms
|
||
of control, even in the absence of militarily significant enemies.
|
||
We'll start thinking about the Japanese or whatever Pacific Rim
|
||
country you want to pick as being %enemies,' and intellectual commerce
|
||
with these people will be a matter of economic security.
|
||
|
||
"The freedom of expression aspect of that is very critical. We
|
||
want to make sure that this is a system in which people can express
|
||
themselves freely without repercussions."
|
||
|
||
Observers fear that Luh may be only the first such casualty as
|
||
federal agencies and special interest groups reshape the Internet into
|
||
their own model, carving up a pie estimated to be worth $3.5 trillion.
|
||
|
||
While Gore's vision implies the construction of a high-speed,
|
||
high-tech fiber optic network, a number of counter-proposals are being
|
||
floated.
|
||
|
||
The Electronic Frontier Foundation _ which earlier made a name for
|
||
itself with a successful court challenge to the conduct of the Secret
|
||
Service in a hacker crackdown _ is focusing on building a less
|
||
powerful, less costly network that could reach more people, more
|
||
quickly.
|
||
|
||
"Our central concern is that we get from debate to doing
|
||
something," said Jerry Berman, EFF director.
|
||
|
||
EFF's approach _ endorsed by Rep. Edward J. Markey, D-Mass. _ is to
|
||
build an ISDN (Integrated Services Digital Network) service atop the
|
||
telephone network, making a modest level of digital computer
|
||
transmission available quickly to every home. The more sophisticated
|
||
fiber optic approach implied by Gore's NREN could be implemented as
|
||
time and money allow.
|
||
|
||
But few voices have been heard backing ISDN.
|
||
|
||
"The current state of the discussion is turmoil and chaos," said
|
||
the CPSR's Rotenberg. "It's a mistake to place too much emphasis on
|
||
any technological configuration. A lot of that energy and those
|
||
resources would be better spent talking about users and institutions
|
||
rather than technology and standards.
|
||
|
||
"This is like trying to explain railroads in the 18th century or
|
||
cars in the 19th century. Here we are in the 20th century, and we know
|
||
something big is happening right under our feet and we know it has
|
||
something to do with these new telecommunications technologies.
|
||
|
||
"None of us knows where this is going to take us, but I think
|
||
people should have some sensitivity to the prospect that the future
|
||
world we're going to live in is going to be shaped in many ways by the
|
||
decisions we make today about the information infrastructure."
|
||
|
||
------------------------------
|
||
|
||
Date: Thu, 15 Apr 93 16:33:01 EDT
|
||
From: "W. K. (Bill) Gorman" <34AEJ7D@CMUVM.CSV.CMICH.EDU>
|
||
Subject: File 2--Clinton Proposes National ID Card
|
||
|
||
Here is a data pointer you might find of interest.
|
||
|
||
++++++++++++++++++++++++ATTACHMENT++++++++++++++++++++++++++++++++++++++
|
||
|
||
From--Ross_Werner@next.com
|
||
Subject--A national ID card - coming soon from the Clinton administration?
|
||
Date--7 Apr 93 18:52:13 GMT
|
||
|
||
This is a brief synopsis of an article in Section B, page 7, in the
|
||
Wednesday, April 7, 1993 San Jose Mercury News. Excerpted without
|
||
permission. All typos are mine.
|
||
|
||
Headline: Big Brother's little sibling: the smart card
|
||
Author: Martin Anderson
|
||
|
||
The article discusses work ongoing in the Clinton administration to
|
||
give everyone a "smart card" for personal medical information, to cut
|
||
down on waste, fraud, and abuse in health care.
|
||
|
||
"But now the smart card idea may have taken an ugly turn.
|
||
Recently, Ira Magaziner, a Uria Heepish bureaucrat in charge
|
||
of coordinating the development of health care policy for the
|
||
Clinton Administration, asserted they want "to create an
|
||
integrated system with a card that everyone will get at
|
||
birth."
|
||
|
||
another paragraph:
|
||
|
||
"The smart card is an open, engraved invitation to a national
|
||
identity card. In the early 1980s when I worked in the West
|
||
Wing of the White House as President Reagan's domestic policy
|
||
adviser I was surprised by the ardent desire of government
|
||
bureaucrats, many of them Reagan appointees, for a national
|
||
identity card."
|
||
|
||
Apparently it almost happened.
|
||
|
||
"The idea of a national identity card, with a new name, has
|
||
risen once again from the graveyard of bad policy ideas, more
|
||
powerful and virulent than ever. Unless it is stopped quickly
|
||
we may live to see the end of privacy in the United States,
|
||
all of us tagged like so many fish."
|
||
|
||
The best part of this article is that it gives phone numbers to call
|
||
to express your opinion, as Clinton has invited the public to do. I
|
||
urge everyone to call, and to spread the word.
|
||
|
||
(202) 456 - 1414 White House switch board
|
||
(202) 456 - 6406 Ira Magaziner's direct line (the person working
|
||
for Clinton on the smart card)
|
||
|
||
about the author:
|
||
|
||
"Martin Anderson, a senior adviser on the President's Economic
|
||
Policy Advisory Board during the Reagan administration, is now
|
||
a senior fellow at the Hoover Institution at Stanford. He
|
||
wrote this article fore the Scripps Howard News Service."
|
||
|
||
------------------------------
|
||
|
||
Date: Fri, 16 Apr 1993 16:20:19 EST
|
||
From: David Sobel <dsobel@WASHOFC.CPSR.ORG>
|
||
Subject: File 3--White House Crypto Statement
|
||
|
||
White House Crypto Statement
|
||
|
||
THE WHITE HOUSE
|
||
|
||
Office of the Press Secretary
|
||
|
||
For Immediate Release April 16, 1993
|
||
|
||
|
||
STATEMENT BY THE PRESS SECRETARY
|
||
|
||
|
||
The President today announced a new initiative that will bring
|
||
the Federal Government together with industry in a voluntary
|
||
program to improve the security and privacy of telephone
|
||
communications while meeting the legitimate needs of law
|
||
enforcement.
|
||
|
||
The initiative will involve the creation of new products to
|
||
accelerate the development and use of advanced and secure
|
||
telecommunications networks and wireless communications links.
|
||
|
||
For too long there has been little or no dialogue between our
|
||
private sector and the law enforcement community to resolve the
|
||
tension between economic vitality and the real challenges of
|
||
protecting Americans. Rather than use technology to accommodate
|
||
the sometimes competing interests of economic growth, privacy and
|
||
law enforcement, previous policies have pitted government against
|
||
industry and the rights of privacy against law enforcement.
|
||
|
||
Sophisticated encryption technology has been used for years to
|
||
protect electronic funds transfer. It is now being used to
|
||
protect electronic mail and computer files. While encryption
|
||
technology can help Americans protect business secrets and the
|
||
unauthorized release of personal information, it also can be used
|
||
by terrorists, drug dealers, and other criminals.
|
||
|
||
A state-of-the-art microcircuit called the "Clipper Chip" has
|
||
been developed by government engineers. The chip represents a
|
||
new approach to encryption technology. It can be used in new,
|
||
relatively inexpensive encryption devices that can be attached to
|
||
an ordinary telephone. It scrambles telephone communications
|
||
using an encryption algorithm that is more powerful than many in
|
||
commercial use today.
|
||
|
||
This new technology will help companies protect proprietary
|
||
information, protect the privacy of personal phone conversations
|
||
and prevent unauthorized release of data transmitted
|
||
electronically. At the same time this technology preserves the
|
||
ability of federal, state and local law enforcement agencies to
|
||
intercept lawfully the phone conversations of criminals.
|
||
|
||
A "key-escrow" system will be established to ensure that the
|
||
"Clipper Chip" is used to protect the privacy of law-abiding
|
||
Americans. Each device containing the chip will have two unique
|
||
|
||
|
||
2
|
||
|
||
|
||
"keys," numbers that will be needed by authorized government
|
||
agencies to decode messages encoded by the device. When the
|
||
device is manufactured, the two keys will be deposited separately
|
||
in two "key-escrow" data bases that will be established by the
|
||
Attorney General. Access to these keys will be limited to
|
||
government officials with legal authorization to conduct a
|
||
wiretap.
|
||
|
||
The "Clipper Chip" technology provides law enforcement with no
|
||
new authorities to access the content of the private
|
||
conversations of Americans.
|
||
|
||
To demonstrate the effectiveness of this new technology, the
|
||
Attorney General will soon purchase several thousand of the new
|
||
devices. In addition, respected experts from outside the
|
||
government will be offered access to the confidential details of
|
||
the algorithm to assess its capabilities and publicly report
|
||
their findings.
|
||
|
||
The chip is an important step in addressing the problem of
|
||
encryption's dual-edge sword: encryption helps to protect the
|
||
privacy of individuals and industry, but it also can shield
|
||
criminals and terrorists. We need the "Clipper Chip" and other
|
||
approaches that can both provide law-abiding citizens with access
|
||
to the encryption they need and prevent criminals from using it
|
||
to hide their illegal activities. In order to assess technology
|
||
trends and explore new approaches (like the key-escrow system),
|
||
the President has directed government agencies to develop a
|
||
comprehensive policy on encryption that accommodates:
|
||
|
||
-- the privacy of our citizens, including the need to
|
||
employ voice or data encryption for business purposes;
|
||
|
||
-- the ability of authorized officials to access telephone
|
||
calls and data, under proper court or other legal
|
||
order, when necessary to protect our citizens;
|
||
|
||
-- the effective and timely use of the most modern
|
||
technology to build the National Information
|
||
Infrastructure needed to promote economic growth and
|
||
the competitiveness of American industry in the global
|
||
marketplace; and
|
||
|
||
-- the need of U.S. companies to manufacture and export
|
||
high technology products.
|
||
|
||
The President has directed early and frequent consultations with
|
||
affected industries, the Congress and groups that advocate the
|
||
privacy rights of individuals as policy options are developed.
|
||
|
||
|
||
|
||
3
|
||
|
||
The Administration is committed to working with the private
|
||
sector to spur the development of a National Information
|
||
Infrastructure which will use new telecommunications and computer
|
||
technologies to give Americans unprecedented access to
|
||
information. This infrastructure of high-speed networks
|
||
("information superhighways") will transmit video, images, HDTV
|
||
programming, and huge data files as easily as today's telephone
|
||
system transmits voice.
|
||
|
||
Since encryption technology will play an increasingly important
|
||
role in that infrastructure, the Federal Government must act
|
||
quickly to develop consistent, comprehensive policies regarding
|
||
its use. The Administration is committed to policies that
|
||
protect all Americans' right to privacy while also protecting
|
||
them from those who break the law.
|
||
|
||
Further information is provided in an accompanying fact sheet.
|
||
The provisions of the President's directive to acquire the new
|
||
encryption technology are also available.
|
||
|
||
For additional details, call Mat Heyman, National Institute of
|
||
Standards and Technology, (301) 975-2758.
|
||
|
||
- - ---------------------------------
|
||
|
||
QUESTIONS AND ANSWERS ABOUT THE CLINTON ADMINISTRATION'S
|
||
TELECOMMUNICATIONS INITIATIVE
|
||
|
||
Q: Does this approach expand the authority of government
|
||
agencies to listen in on phone conversations?
|
||
|
||
A: No. "Clipper Chip" technology provides law enforcement with
|
||
no new authorities to access the content of the private
|
||
conversations of Americans.
|
||
|
||
Q: Suppose a law enforcement agency is conducting a wiretap on
|
||
a drug smuggling ring and intercepts a conversation
|
||
encrypted using the device. What would they have to do to
|
||
decipher the message?
|
||
|
||
A: They would have to obtain legal authorization, normally a
|
||
court order, to do the wiretap in the first place. They
|
||
would then present documentation of this authorization to
|
||
the two entities responsible for safeguarding the keys and
|
||
obtain the keys for the device being used by the drug
|
||
smugglers. The key is split into two parts, which are
|
||
stored separately in order to ensure the security of the key
|
||
escrow system.
|
||
|
||
Q: Who will run the key-escrow data banks?
|
||
|
||
A: The two key-escrow data banks will be run by two independent
|
||
entities. At this point, the Department of Justice and the
|
||
Administration have yet to determine which agencies will
|
||
oversee the key-escrow data banks.
|
||
|
||
Q: How strong is the security in the device? How can I be sure
|
||
how strong the security is?
|
||
|
||
A: This system is more secure than many other voice encryption
|
||
systems readily available today. While the algorithm will
|
||
remain classified to protect the security of the key escrow
|
||
system, we are willing to invite an independent panel of
|
||
cryptography experts to evaluate the algorithm to assure all
|
||
potential users that there are no unrecognized
|
||
vulnerabilities.
|
||
|
||
Q: Whose decision was it to propose this product?
|
||
|
||
A: The National Security Council, the Justice Department, the
|
||
Commerce Department, and other key agencies were involved in
|
||
this decision. This approach has been endorsed by the
|
||
President, the Vice President, and appropriate Cabinet
|
||
officials.
|
||
|
||
Q: Who was consulted? The Congress? Industry?
|
||
|
||
A: We have on-going discussions with Congress and industry on
|
||
encryption issues, and expect those discussions to intensify
|
||
as we carry out our review of encryption policy. We have
|
||
briefed members of Congress and industry leaders on the
|
||
decisions related to this initiative.
|
||
|
||
Q: Will the government provide the hardware to manufacturers?
|
||
|
||
A: The government designed and developed the key access
|
||
encryption microcircuits, but it is not providing the
|
||
microcircuits to product manufacturers. Product
|
||
manufacturers can acquire the microcircuits from the chip
|
||
manufacturer that produces them.
|
||
|
||
Q: Who provides the "Clipper Chip"?
|
||
|
||
A: Mykotronx programs it at their facility in Torrance,
|
||
California, and will sell the chip to encryption device
|
||
manufacturers. The programming function could be licensed
|
||
to other vendors in the future.
|
||
|
||
Q: How do I buy one of these encryption devices?
|
||
|
||
A: We expect several manufacturers to consider incorporating
|
||
the "Clipper Chip" into their devices.
|
||
|
||
Q: If the Administration were unable to find a technological
|
||
solution like the one proposed, would the Administration be
|
||
willing to use legal remedies to restrict access to more
|
||
powerful encryption devices?
|
||
|
||
A: This is a fundamental policy question which will be
|
||
considered during the broad policy review. The key escrow
|
||
mechanism will provide Americans with an encryption product
|
||
that is more secure, more convenient, and less expensive
|
||
than others readily available today, but it is just one
|
||
piece of what must be the comprehensive approach to
|
||
encryption technology, which the Administration is
|
||
developing.
|
||
|
||
The Administration is not saying, "since encryption
|
||
threatens the public safety and effective law enforcement,
|
||
we will prohibit it outright" (as some countries have
|
||
effectively done); nor is the U.S. saying that "every
|
||
American, as a matter of right, is entitled to an
|
||
unbreakable commercial encryption product." There is a
|
||
false "tension" created in the assessment that this issue is
|
||
an "either-or" proposition. Rather, both concerns can be,
|
||
and in fact are, harmoniously balanced through a reasoned,
|
||
balanced approach such as is proposed with the "Clipper
|
||
Chip" and similar encryption techniques.
|
||
|
||
Q: What does this decision indicate about how the Clinton
|
||
Administration's policy toward encryption will differ from
|
||
that of the Bush Administration?
|
||
|
||
A: It indicates that we understand the importance of encryption
|
||
technology in telecommunications and computing and are
|
||
committed to working with industry and public-interest
|
||
groups to find innovative ways to protect Americans'
|
||
privacy, help businesses to compete, and ensure that law
|
||
enforcement agencies have the tools they need to fight crime
|
||
and terrorism.
|
||
|
||
Q: Will the devices be exportable? Will other devices that use
|
||
the government hardware?
|
||
|
||
A: Voice encryption devices are subject to export control
|
||
requirements. Case-by-case review for each export is
|
||
required to ensure appropriate use of these devices. The
|
||
same is true for other encryption devices. One of the
|
||
attractions of this technology is the protection it can give
|
||
to U.S. companies operating at home and abroad. With this
|
||
in mind, we expect export licenses will be granted on a
|
||
case-by-case basis for U.S. companies seeking to use these
|
||
devices to secure their own communications abroad. We plan
|
||
to review the possibility of permitting wider exportability
|
||
of these products.
|
||
|
||
--------------end-------------------------
|
||
|
||
------------------------------
|
||
|
||
Date: Fri, 16 Apr 1993 16:43:02 EST
|
||
From: Dave Banisar <banisar@WASHOFC.CPSR.ORG>
|
||
Subject: File 4--Debate on Gov't Encryption Initiative (from CPSR)
|
||
|
||
April 16, 1993
|
||
Washington, DC
|
||
|
||
COMPUTER PROFESSIONALS CALL FOR PUBLIC
|
||
DEBATE ON NEW GOVERNMENT ENCRYPTION INITIATIVE
|
||
|
||
Computer Professionals for Social Responsibility (CPSR)
|
||
today called for the public disclosure of technical data
|
||
underlying the government's newly-announced "Public Encryption
|
||
Management" initiative. The new cryptography scheme was
|
||
announced today by the White House and the National Institute
|
||
for Standards and Technology (NIST), which will implement the
|
||
technical specifications of the plan. A NIST spokesman
|
||
acknowledged that the National Security Agency (NSA), the super-
|
||
secret military intelligence agency, had actually developed the
|
||
encryption technology around which the new initiative is built.
|
||
|
||
According to NIST, the technical specifications and the
|
||
Presidential directive establishing the plan are classified. To
|
||
open the initiative to public review and debate, CPSR today
|
||
filed a series of Freedom of Information Act (FOIA) requests
|
||
with key agencies, including NSA, NIST, the National Security
|
||
Council and the FBI for information relating to the encryption
|
||
plan. The CPSR requests are in keeping with the spirit of the
|
||
Computer Security Act, which Congress passed in 1987 in order to
|
||
open the development of non-military computer security standards
|
||
to public scrutiny and to limit NSA's role in the creation of
|
||
such standards.
|
||
|
||
CPSR previously has questioned the role of NSA in
|
||
developing the so-called "digital signature standard" (DSS), a
|
||
communications authentication technology that NIST proposed for
|
||
government-wide use in 1991. After CPSR sued NIST in a FOIA
|
||
lawsuit last year, the civilian agency disclosed for the first
|
||
time that NSA had, in fact, developed that security standard.
|
||
NSA is due to file papers in federal court next week justifying
|
||
the classification of records concerning its creation of the
|
||
DSS.
|
||
|
||
David Sobel, CPSR Legal Counsel, called the
|
||
administration's apparent commitment to the privacy of
|
||
electronic communications, as reflected in today's official
|
||
statement, "a step in the right direction." But he questioned
|
||
the propriety of NSA's role in the process and the apparent
|
||
secrecy that has thus far shielded the development process from
|
||
public scrutiny. "At a time when we are moving towards the
|
||
development of a new information infrastructure, it is vital
|
||
that standards designed to protect personal privacy be
|
||
established openly and with full public participation. It is
|
||
not appropriate for NSA -- an agency with a long tradition of
|
||
secrecy and opposition to effective civilian cryptography -- to
|
||
play a leading role in the development process."
|
||
|
||
CPSR is a national public-interest alliance of computer
|
||
industry professionals dedicated to examining the impact of
|
||
technology on society. CPSR has 21 chapters in the U.S. and
|
||
maintains offices in Palo Alto, California, Cambridge,
|
||
Massachusetts and Washington, DC. For additional information on
|
||
CPSR, call (415) 322-3778 or e-mail <cpsr@csli.stanford.edu>.
|
||
|
||
------------------------------
|
||
|
||
Date: 16 Apr 93 22:00:39 EDT
|
||
From: Gordon Meyer <72307.1502@COMPUSERVE.COM>
|
||
Subject: File 5--RU Sirius/Mondo interview (from GEnie)
|
||
|
||
The following is an edited transcript of a GEnie real-time conference held
|
||
with R.U. Sirius of Mondo 2000. The full transcript is available
|
||
for downloading on GEnie. Reprinted with permission.
|
||
|
||
Copyright (C), 1993 Jack Smith, the Writers' RoundTable All rights
|
||
reserved. No part of this file may be reproduced or copied by any means
|
||
(graphic, electronic, magical or mechanical) without the written permission
|
||
of Jack Smith (GEnie address = WRITERS.INK, snail mail = 401 North
|
||
Washington Street, Rockville, MD, 20850, MN3).
|
||
|
||
This file was downloaded from the Writers' RoundTable on GEnie. To join
|
||
GEnie you can signup via computer or by following these steps:
|
||
|
||
1) Set your communications software for half duplex (local echo) at 300,
|
||
1200 or 2400 baud.
|
||
2) Dial toll free: 1-800-638-8369 (or in Canada, 1-800-387-8330). When you
|
||
see CONNECT on your screen, quickly type HHH.
|
||
3) At the U#= prompt, enter XTX99003,WRITERS and press Return.
|
||
4) Have a major credit card ready (or in the U.S., you can also use your
|
||
checking account number).
|
||
For voice information (in other words... a real person), call 800-638-9636.
|
||
*************
|
||
<[Jack] WRITERS.INK> Okay folks tonight's guest is R. U. Sirius of
|
||
the Mondo 2000 magazine and book. I'll start off with the first
|
||
question... How did you come up with the name for the magazine?
|
||
|
||
<[R. U. Sirius]> We had a publication called Reality Hackers that wasn't
|
||
doing that well. We were moving in the direction of cyberpunk and those
|
||
kinds of influences and wanted something that had more of an overall pop
|
||
gestalt.
|
||
|
||
I was watching tv severely wasted one night and there were all these ads
|
||
for this and that "2000." and a whole show called Discovery 2000. I
|
||
crawled into Queen Mu's bedroom and said "Everybody's using 2000 to sell
|
||
shit. Why not us?" She immediately came up with MONDO 2000 cause she knew
|
||
that all the 0's would make for a good looking logo.
|
||
|
||
<[Barbara] B.PAUL> I keep reading cyberpunk is dead; is that why you want a
|
||
more pop gestalt?
|
||
|
||
<[R. U. Sirius]> Well, in a literal sense, cyberpunk was never really
|
||
alive. It's all media mythology and as the culture complexities, less and
|
||
less people want to conform to any sort of tribal identity for a long
|
||
period of time. But basically we wanted to really be effective
|
||
communicators and succeed at what we're doing. And part of doing that
|
||
involves a bit of strategic thinking while at the same time working within
|
||
whatever your obsessions and interests happen to be... It was always
|
||
important to us that we published a very slick looking magazine. It's
|
||
like dressing up to get inside an establishment dinner. It's much more
|
||
subversive, I think, than picketing outside with your fist in the air.
|
||
|
||
<[Barbara] B.PAUL> Actually, I like the nonexistent cyberpunk myself; the
|
||
word has attached itself to a certain style and pov that are distinctive.
|
||
Do you mean you've lost interest in it?
|
||
|
||
<[R. U. Sirius]> I like the sort of tough post punk no bullshit aesthetic
|
||
that was expressed through cyberpunk sci fi and the way that sort of took
|
||
on a living breathing reality in hacker and in industrial performance
|
||
culture. I just don't like to get caught up in movements or names like
|
||
cyberpunk. The sense of the thing continues. I know very few people who
|
||
actually want to call themselves "a Cyberpunk."
|
||
|
||
<HG> you seem to have an idea in mind in publishing MONDO 200o, do you have
|
||
a succinct philosophy?
|
||
|
||
<[R. U. Sirius] PRESS22>
|
||
HA!!!! The explanation for the meme changes every time I have to answer
|
||
the question. I'll put it in two ways, one of them politic and the other
|
||
one vulgar
|
||
1) MONDO is a magazine for the culture of cyberspace, for a
|
||
generation that has grown up inside of media, inside of bits and bytes
|
||
and who can recognize the fact that this is the primary territory in
|
||
which our socio-political and economic lives are taking place. It's
|
||
about consciously occupying that space. In fact, it's possible that a
|
||
relatively democratic do-it-yourself "sub"culture has really moved into
|
||
cyberspace more completely than the power elites.
|
||
2: MONDO 2000 is here to give the high tech culture of America in the 90's
|
||
the enema it so desperately needs!!!
|
||
|
||
<[Bryce] K.CAMPBELL14> What's your opinion on the media/corporations
|
||
applying the 'cyber' label to everything (from Networks like GEnie to
|
||
microprocessor controlled toasters).
|
||
|
||
<[R. U. Sirius] PRESS22> It's good for MONDO and what's good for MONDO is
|
||
good for Amerika! Seriously though it's just another bit of language
|
||
manipulation that everybody 'll soon get sick of next everybody from GE
|
||
to toasters will try to latch on to shamanism... like, Be all that you can
|
||
be in the new shamanic army etcetera.
|
||
|
||
<[Danny] D.PERLMAN> I have limited contact with the mag, having skimmed the
|
||
book and read issue 8 in the last 48 hours (my mind is cyber goo) but, I
|
||
found it fascinating. However, I noted right off the bat that the leadoff
|
||
article on Information America had some stuff that didn't quite sit right
|
||
fact-wise, and with about 90 seconds of computer time determined that, at
|
||
least according to the databases of the two newspapers cited, the articles,
|
||
used as bibliographic reference don't exist. What's the deal? Are your
|
||
articles intended to be "factual", or more for amusement?
|
||
|
||
<[R. U. Sirius] PRESS22> I believe that article was intended to be accurate
|
||
although employing hardcore fact checkers is not in our budget yet. We've
|
||
gotten a number of letters on that piece going both ways, challenging some
|
||
of the details or adding additional paranoid data to the brew. We'd be
|
||
interested in any specific details that you care to refute.
|
||
|
||
<[John] J.BILICSKA> Do you foresee MONDO 2000 ever becoming a victim of
|
||
its own success, a la ROLLING STONE (since mass culture absorbs every
|
||
counterculture, eventually)?
|
||
|
||
<[R. U. Sirius] PRESS22> If the magazine gets sold to somebody else, it
|
||
might get wimp-ized. But as long as Mu and I are at it, it'll always be
|
||
wierd. We can't help it. SUre, we might sell it some day and apply our
|
||
wierdness to something else.
|
||
|
||
|
||
<[John] J.BILICSKA> Are you contemplating a multimedia/interactive
|
||
version of MONDO 2000? I think it would really blow the minds of
|
||
suburbanites buying those CD-ROM drives.
|
||
|
||
<[R. U. Sirius] PRESS22> Yeah, I'm talking with somebody right now about
|
||
doing a cd rom version of the Guide. Also, might edit a cd rom version
|
||
of Peter Stafford's Psychedelic's Encyclopedia, a return to my roots for
|
||
me... hope CBS doesn't hear about it!
|
||
|
||
<[CuD] GRMEYER> I've been enjoying the book and mag for quite some time
|
||
now, thanks. I've wondered if you've ever run into any 'censorship' (at
|
||
whatever level).
|
||
|
||
<[R. U. Sirius] PRESS22> We've had problems with printers, I believe over
|
||
female breasts, though the current printer, who we've been with for I
|
||
think 5 issues, hasn't given us any problems. We've had some internal
|
||
wrangles, which I won't go into... guess I'll have to write an
|
||
autobiography some day.
|
||
|
||
<[Jack] WRITERS.INK> Since magazines tend to be business and business means
|
||
money, I was curious if you have control of the magazine or if you have
|
||
investors who profer opinions and advice. Success doesn't always bring
|
||
the best ... er help.
|
||
|
||
<[R. U. Sirius] PRESS22> To be honest, Queen Mu is the majority owner and
|
||
has complete control over the magazine. We do wrestle occasionally...
|
||
|
||
|
||
***end of conference excerpt***
|
||
|
||
------------------------------
|
||
|
||
Date: Thu, 8 Apr 93 23:59:48 CDT
|
||
From: Ron <acct069@CARROLL1.CC.EDU>
|
||
Subject: File 6--Rune Stone BBS (IIRG Home Board) Back On-Line
|
||
|
||
US BBS Callers: Rune Stone BBS (IIRG WHQ) 203-832-8441 NUP:Conspiracy
|
||
|
||
Thanks once again: Mercenary/IIRG
|
||
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
||
THE INTERNATIONAL INFORMATION RETRIEVAL GUILD
|
||
|
||
Invites The Readers of CUD
|
||
|
||
To Call and Participate on The IIRG's Public
|
||
Bulletin Board System, and WHQ :
|
||
|
||
The Rune Stone BBS.
|
||
|
||
Available at: (203)-832-8441
|
||
14.4 HST Public Node
|
||
1200-2400 Baud Callers Welcome
|
||
|
||
Home of The IIRG Archives and Phantasy Magazine
|
||
3000+ Hack/Phreak Text and Magazines
|
||
Archived by The IIRG.
|
||
|
||
NO Ratios, and No Access Charges
|
||
in the tradition of FREE information for all.
|
||
|
||
Sysop: Mercenary Co-Sysop: Anubis
|
||
New User Password: CONSPIRACY
|
||
|
||
------------------------------
|
||
|
||
End of Computer Underground Digest #5.28
|
||
************************************
|
||
|
||
|
||
|