1114 lines
53 KiB
Plaintext
1114 lines
53 KiB
Plaintext
Computer underground Digest Wed Sep 21, 1994 Volume 6 : Issue 83
|
|
ISSN 1004-042X
|
|
|
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|
Archivist: Brendan Kehoe
|
|
Retiring Shadow Archivist: Stanton McCandlish
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Urban Legend Editor: E. Greg Shrdlugold
|
|
|
|
CONTENTS, #6.83 (Wed, Sep 21, 1994)
|
|
|
|
File 1--EPIC Letter on Wiretap Bill
|
|
File 2--EFF Policy Dir. Jerry Berman, 09/13/94 HR Testimony on DigTel bill
|
|
File 3--Dig Teleph Bill (HR 4922) to be marked up in Sen. Judic. Comm
|
|
File 4-- For CUD: Pizza by E-mail in Santa Cruz
|
|
File 5--One Hundred Reasons to Oppose the FBI Wiretap Bill (CPSR)
|
|
File 6--Cu Digest Header Information (unchanged)
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
----------------------------------------------------------------------
|
|
|
|
Date: Wed, 21 Sep 1994 16:25:03 EST
|
|
From: David Sobel <dsobel@WASHOFC.EPIC.ORG>
|
|
Subject: File 1--EPIC Letter on Wiretap Bill
|
|
|
|
EPIC Letter on Wiretap Bill
|
|
September 13, 1994
|
|
|
|
Hon. Jack Brooks
|
|
Chairman
|
|
Committee on the Judiciary
|
|
U.S. House of Representatives
|
|
2138 Rayburn House Office Bldg.
|
|
Washington, DC 20515
|
|
|
|
Dear Chairman Brooks:
|
|
|
|
We are writing with regard to H.R. 4922, the Federal Bureau
|
|
of Investigation's proposed wiretap legislation now pending before
|
|
the Judiciary Committee. As you know, the current bill is the
|
|
most recent version to emerge from a process that began more than
|
|
two years ago, when the FBI first sought legislation to ensure its
|
|
ability to conduct electronic surveillance through mandated design
|
|
changes in the nation's information infrastructure. The
|
|
Electronic Privacy Information Center (EPIC) has monitored that
|
|
process closely and has scrutinized the FBI's claims that remedial
|
|
legislation is necessary. EPIC has sponsored conferences at which
|
|
the need for such legislation was debated with the participation
|
|
of the law enforcement community, the telecommunications industry
|
|
and privacy advocates. We have also sought the disclosure of all
|
|
relevant information through a series of requests under the
|
|
Freedom of Information Act. Having thus examined the issue, EPIC
|
|
remains unconvinced of the necessity or advisability of the
|
|
pending bill.
|
|
|
|
|
|
The Need for the Proposed Legislation
|
|
|
|
As a threshold matter, we do not believe that a compelling
|
|
case has been made that new communications technologies hamper the
|
|
ability of law enforcement agencies to execute court orders for
|
|
electronic surveillance. For more than two years, EPIC has sought
|
|
the public disclosure of any FBI records that might document the
|
|
alleged problem. To date, no such documentation has been
|
|
released. We recently initiated litigation under the FOIA in
|
|
federal district court seeking disclosure of two internal FBI
|
|
surveys cited by Director Freeh in support of the proposed
|
|
legislation. Through earlier litigation we discovered that no FBI
|
|
field offices had reported technical difficulties in executing
|
|
court-ordered electronic surveillance. In fact, several field
|
|
offices reported that they had not encountered such problems.
|
|
|
|
Without public scrutiny of factual information on the nature
|
|
and extent of the alleged technological impediments to
|
|
surveillance, the FBI's claims remain anecdotal and speculative.
|
|
Indeed, representatives of the telecommunications industry have
|
|
consistently maintained that they are unaware of any instances in
|
|
which a communications carrier has been unable to comply with law
|
|
enforcement's requirements. For instance, in Congressional
|
|
testimony on March 18, 1994, Roy Neel, President of the United
|
|
States Telephone Association stated that,
|
|
|
|
In the quarter century since the federal government
|
|
first authorized court ordered wiretaps there have been
|
|
tens of thousands of requests for assistance from local
|
|
telephone exchange companies. In virtually every
|
|
instance the local telephone company provided the
|
|
appropriate law enforcement authority with the timely
|
|
assistance it needed to effect the intercept.
|
|
|
|
Under these circumstances, the nation should not embark upon
|
|
a costly and potentially dangerous re-design of its telecommunica-
|
|
tions network solely to protect the viability of fewer than 1000
|
|
annual surveillances against wholly speculative impediments.
|
|
|
|
|
|
Increased Risk of Network Vulnerability
|
|
|
|
Our nation's communications infrastructure has never before
|
|
been designed with the stated purpose of facilitating the
|
|
interception of private communications. The proposed legislation
|
|
would require, for the first time, that the telephone network must
|
|
have vulnerabilities intentionally built into it. The potential
|
|
pitfalls of such a course are apparent. As the General Services
|
|
Administration noted in its analysis of an earlier version of the
|
|
FBI's proposal (which we obtained under the FOIA),
|
|
|
|
The proposed legislation would assist eavesdropping by
|
|
law enforcement, but it would also apply to users who
|
|
acquire the new technology capability and make it easier
|
|
for criminals, terrorists, foreign intelligence (spies)
|
|
and computer hackers to electronically penetrate the
|
|
phone network and pry into areas previously not open to
|
|
snooping. This situation of easier access due to new
|
|
technology changes could therefore affect national
|
|
security.
|
|
|
|
As your report on the Computer Security Act of 1987 noted,
|
|
"lack of computer security is a serious problem since such systems
|
|
are the core of every modern organization." H. Rpt. 100-153, Part
|
|
2, at 10. With an ever-increasing flow of sensitive commercial
|
|
and personal information traveling through the communications
|
|
infrastructure, we should be seeking to strengthen the security of
|
|
those transmissions. Unfortunately, as the GSA recognized, the
|
|
pending legislation is likely to have the precise opposite effect
|
|
on communications security.
|
|
|
|
|
|
A Threat to Privacy in the Future
|
|
|
|
We also believe that the proposed legislation would establish
|
|
a dangerous precedent for the future. While the FBI claims that
|
|
the legislation would not enhance its surveillance powers beyond
|
|
those contained in existing law, the pending bill represents a
|
|
fundamental change in the law's approach to electronic
|
|
surveillance and police powers generally. The legislation would,
|
|
for the first time, mandate that our means of communications must
|
|
be designed to facilitate government interception. While we as a
|
|
society have always recognized law enforcement's need to obtain
|
|
investigative information upon presentation of a judicial warrant,
|
|
we have never accepted the notion that the success of such a
|
|
search must be guaranteed. By mandating the success of police
|
|
searches through the re-design of the telephone network, the
|
|
proposed legislation breaks troubling new ground. The principle
|
|
underlying the pending bill could easily be applied to all
|
|
emerging information technologies and be incorporated into the
|
|
design of the National Information Infrastructure. It could also
|
|
soon lead to the prohibition of encryption techniques other than
|
|
government-designed "key escrow" or "Clipper" type systems.
|
|
|
|
In short, EPIC believes that the proposed FBI wiretap bill
|
|
raises substantial civil liberties and privacy concerns. The
|
|
present need for the legislation has not been established and its
|
|
future implications are frightening. In the spring of 1992, you
|
|
convened hearings on law enforcement's claimed need to restrict
|
|
the development and use of privacy-enhancing encryption
|
|
technology. You observed that "the decisions we make in this area
|
|
could have a profound impact on the future of U.S. industry and
|
|
our society as a whole." We share your concern and urge you to
|
|
examine closely both the claimed need for H.R. 4922 and its
|
|
desirability for our democratic society.
|
|
|
|
|
|
|
|
|
|
|
|
Sincerely,
|
|
|
|
______________________________ ______________________________
|
|
Marc Rotenberg David L. Sobel
|
|
Director Legal Counsel
|
|
|
|
------------------------------
|
|
|
|
Date: Wed, 21 Sep 1994 16:22:11 EST
|
|
From: mech@eff.org (Stanton McCandlish)
|
|
Subject: File 2--EFF Policy Dir. Jerry Berman, 09/13/94 HR Testimony on DigTel b
|
|
ill
|
|
|
|
Electronic Frontier Foundation
|
|
|
|
Testimony of
|
|
|
|
Jerry J. Berman, Policy Director
|
|
Electronic Frontier Foundation
|
|
|
|
before the
|
|
|
|
United States House Of Representatives
|
|
Committee on Energy and Commerce
|
|
Subcommittee On Telecommunications and Finance
|
|
|
|
Hearing on
|
|
|
|
Digital Telephony Legislation (H.R. 4922)
|
|
|
|
September 13, 1994
|
|
|
|
Chairman Markey and Members of the Subcommittee:
|
|
|
|
I want to thank you for the opportunity to testify today on the
|
|
recently introduced Digital Telephony bill (H.R. 4922, S. 2375). Over
|
|
the past several years under the leadership of Chairman Markey,
|
|
Representatives Fields, Boucher, and others, the Subcommittee has
|
|
demonstrated knowledge, sensitivity, and vision in crafting our nation's
|
|
telecommunications policy. I am pleased that the Subcommittee has
|
|
chosen to apply its experience and expertise to the extraordinarily
|
|
complex issues posed by the Digital Telephony legislation.
|
|
The Electronic Frontier Foundation (EFF) is a public interest
|
|
membership organization dedicated to achieving the democratic potential
|
|
of new communications and computer technology and works to protect civil
|
|
liberties in new digital environments. EFF also coordinates the Digital
|
|
Privacy and Security Working Group (DPSWG), a coalition of more than 50
|
|
computer, communications, and public interest organizations and
|
|
associations working on communications privacy issues. I am testifying
|
|
today, however, only on behalf of EFF.
|
|
Since 1992, the Electronic Frontier Foundation has opposed a
|
|
series of FBI Digital Telephony proposals, each of which would have
|
|
forced communications companies to install wiretap capability into every
|
|
communications network. However, earlier this year, when it became
|
|
apparent that some version of the bill would pass the Congress, Senator
|
|
Patrick Leahy and Representative Don Edwards asked EFF, along with
|
|
computer and communications industry groups, to participate in a process
|
|
that would yield a narrow bill that both met law enforcement needs and
|
|
had strong privacy protections. The result of that process is the bill
|
|
before us today.
|
|
EFF remains deeply troubled by the prospect of the federal
|
|
government requiring communications networks to be made "wiretap ready,"
|
|
but we believe that this legislation is substantially less intrusive
|
|
that the original FBI proposals. If Congress is going to act in this
|
|
area, it should work to improve and pass this version of the
|
|
legislation.
|
|
As I testified to before a joint hearing of the House Subcommittee
|
|
on Civil and Constitutional Rights and the Senate Subcommittee on
|
|
Technology and the Law on August 11, 1994, we have worked diligently on
|
|
this legislation with all interested parties in an effort to strike a
|
|
careful balance between law enforcement's ability to conduct electronic
|
|
surveillance and the more important public good -- the right to privacy
|
|
guaranteed by the 4th amendment. The bill strikes this balance in a
|
|
number of critical areas:
|
|
|
|
* Law enforcement gains no additional authority to conduct
|
|
electronic surveillance. The warrant requirements specified
|
|
under current law remain unchanged
|
|
|
|
* The standard for law enforcement access to online
|
|
transactional records is raised to require a court order
|
|
instead of a mere subpoena
|
|
|
|
* Information gleaned from pen register devices is limited to dialed
|
|
number information only. Law enforcement may not receive
|
|
location-specific information
|
|
|
|
* The bill does not preclude a citizen's right to use encryption
|
|
|
|
* Privacy must be maintained in making new technologies
|
|
conform to the requirements of the bill and privacy groups
|
|
may intervene in the administrative standard-setting
|
|
process.
|
|
|
|
However, Mr. Chairman, the effectiveness of these privacy
|
|
protections, as well as the future of technological innovation and the
|
|
deployment of advanced telecommunications services to the American
|
|
public, turn on one critical issue which remains to be addressed: Who
|
|
assumes the risk and pays the cost of complying with the bill's
|
|
requirements? The government or industry?
|
|
EFF believes that allocating the risk and cost to industry will
|
|
place privacy and security at risk if industry is required to foot the
|
|
bill for unnecessary or unwarranted surveillance capabilities.
|
|
Similarly, privacy may be shortchanged if industry takes short cuts to
|
|
save costs in meeting the legislation's requirements. Industry may
|
|
also be discouraged from deploying new and innovative technologies
|
|
because of the costs of law enforcement compliance features. Finally,
|
|
public accountability is undermined by making potentially significant
|
|
law enforcement costs without public scrutiny and debate. In our view,
|
|
the public interest can only be served if government assumes the risk
|
|
and pays the costs of compliance. While effective law enforcement may
|
|
be in the public interest, it should not come at the expense of other
|
|
public goods -- privacy, public accountability, and technological
|
|
innovation. To resolve this issue, we believe that the legislation
|
|
should be amended to require government to pay all reasonable costs
|
|
incurred to meet the statute's requirements on an ongoing basis.
|
|
|
|
A. Linkage of cost to compliance requirements in the first four
|
|
years -- the FBI gets what it pays for and no more
|
|
|
|
The bill authorizes, but does not appropriate, $500 million to be
|
|
spent by the government in reimbursing telecommunications carriers for
|
|
bringing their networks into compliance with the bill within the first
|
|
four years of enactment. The FBI maintains that this is enough money to
|
|
cover all reasonable expenses of retrofitting. The industry, however,
|
|
has consistently maintained that the costs are five to ten times higher.
|
|
Given the FBI's confidence in their cost estimate, we believe that
|
|
telecommunications carriers should only be required to comply to the
|
|
extent that they have been reimbursed.
|
|
In his testimony before a joint hearing of the House Subcommittee
|
|
on Civil and Constitutional Rights and the Senate Subcommittee on
|
|
Technology and the Law on August 11, 1994, the FBI director stated that
|
|
"I think it would be [...] extremely unlikely for a district court judge
|
|
in the process which is contemplated by this legislation to force
|
|
compliance or use of any sanctions when compliance is impossible because
|
|
of the non-reimbursement which is the predicate in the legislation".
|
|
Based on the Director's previous testimony and other discussions with
|
|
the FBI, EFF believes that the bill should include a provision to
|
|
directly link telecommunications carriers liability with government
|
|
reimbursement for retrofitting.
|
|
|
|
|
|
B. Government reimbursement for compliance costs after four years
|
|
-- public accountability necessary
|
|
|
|
The problem, Mr. Chairman, is that under the current bill, the
|
|
government is not responsible for paying the cost of meeting the
|
|
mandated capability requirements after four years, particularly with
|
|
respect to new services. The FBI has repeatedly argued that the costs
|
|
for incorporating surveillance capabilities in new services at the
|
|
design stage will be de minimis, a contention which most industry
|
|
representatives and EFF believe may not be correct.
|
|
As this Subcommittee is aware, it is impossible to estimate
|
|
compliance costs for technologies which are not even on the drawing
|
|
boards. The way to resolve the issue is to have the government assume
|
|
the risks.
|
|
If costs for compliance after four years are truly de minimis,
|
|
then the expenses born by the taxpayers will be minimal. If, however,
|
|
costs are substantial, the government should pay. This will insure that
|
|
the government, on a case-by-case basis and with an opportunity for
|
|
public oversight, determines if compliance is significant enough to pay
|
|
for out of taxpayers' funds. This will also ensure that the government
|
|
sets law enforcement priorities.
|
|
As I stated earlier, if the telecommunications industry is
|
|
responsible for all future compliance costs, it may be forced to accept
|
|
solutions which short-cut the privacy and security of telecommunications
|
|
networks, or be forced to leave advanced features on the shelf, slowing
|
|
technological innovation and the development of the NII. Linking
|
|
compliance to government reimbursement in the out years also has the
|
|
added benefit of providing public oversight and accountability for law
|
|
enforcement surveillance capability.
|
|
The drafters of this legislation have wisely included public
|
|
oversight of government surveillance expenditures in the first four
|
|
years. This same principal should be applied to out year compliance
|
|
costs.
|
|
|
|
C. Ensure the right to deploy untappable services
|
|
|
|
The enforcement provisions of the bill suggest, but do not state
|
|
explicitly, that services which are untappable may be deployed.
|
|
Having worked for many years towards the goal of promoting the
|
|
development of the NII, the members of this Subcommittee are clearly
|
|
aware that its promise and potential rest on the deployment of advanced
|
|
technologies and services. EFF remains deeply concerned that
|
|
technological innovation and the deployment of advanced
|
|
telecommunications services to the public may be stifled if
|
|
telecommunications carriers are forced to incur huge costs for
|
|
compliance, or if the Government is allowed to prohibit a new feature or
|
|
service from being deployed. Although EFF believes that the bill
|
|
intends to allow carriers to deploy untappable features or services,
|
|
the bill must clearly state that if it is technically and economically
|
|
unreasonable to make a service tappable, or if the government has failed
|
|
to reimburse a carrier for compliance costs, then it may be deployed,
|
|
without interference by a court. Making the government responsible for
|
|
all reasonable costs of having new services comply with the legislation
|
|
will go a long way to insuring that this legislation will not be a drag
|
|
on innovation.
|
|
|
|
D. Additional areas where strengthening is necessary
|
|
|
|
In addition to our concerns about compliance costs, EFF believes
|
|
that the bill requires strengthening in the following areas before final
|
|
passage:
|
|
|
|
|
|
1. Strengthened public process
|
|
|
|
In the first four years of the bill's implementation, most of the
|
|
requests that law enforcement makes to carriers are required to be
|
|
recorded in the public record. However, additional demands for
|
|
compliance after that time are only required to be made by written
|
|
notice to the carrier. To facilitate public scrutiny, the bill should
|
|
require all compliance requirements, whether initial requests or
|
|
subsequent modification, must be recorded in the Federal Register.
|
|
|
|
2. Clarify definition of call identifying information
|
|
|
|
The definition of call identifying information in the bill is too
|
|
broad. Whether intentionally or not, the term now covers network
|
|
signaling information of networks which are beyond the scope of the
|
|
bill. As drafted, the definition would appear to require
|
|
telecommunications carriers to deliver not only the signaling
|
|
information generated by their own services, but also the signaling
|
|
information generated by information services and electronic
|
|
communication services that travel over the facilities of the
|
|
telecommunication carrier. In many cases this may be technically
|
|
impractical. Moreover, it is contrary to the policy adopted by the bill
|
|
to maintain a narrow scope.
|
|
|
|
3. Review of minimization requirements in view of commingled
|
|
communications
|
|
|
|
The bill implicitly contemplates that law enforcement, in some
|
|
cases, will intercept large bundles of communications, some of which are
|
|
from subscribers who are not subject of wiretap orders. For example,
|
|
when tapping a single individual whose calls are handled by a PBX, law
|
|
enforcement may sweep in calls of other individuals as well. Currently
|
|
the Constitution and Title III requires "minimization" procedures in all
|
|
wiretaps, to minimize the intrusion on the privacy of conversations not
|
|
covered by a court's wiretap order. In the world of 1968, when the
|
|
original Wiretap Act was passed, most subscribers telecommunications
|
|
facilities carried single conversations on single lines. But today,
|
|
many conversations are co-mingled on one broadband communications
|
|
facility. In order to ensure that constitutionally-mandated
|
|
minimization is maintained, the bill should recognize that stronger
|
|
minimization procedures may be required.
|
|
|
|
E. New privacy protections
|
|
|
|
The Digital Telephony legislation before us includes significant
|
|
recognition that new communication technologies, and new patterns of
|
|
technology use, require new privacy protections. Thanks to the work of
|
|
Senator Leahy and Representative Edwards and Senator Biden, the bill
|
|
contains a number of significant privacy advances, including enhanced
|
|
protection for the detailed transactional information records generated
|
|
by online information services, email systems, and the Internet. These
|
|
protections should remain in the legislation.
|
|
|
|
1. Expanded protection for transactional records sought by law
|
|
enforcement
|
|
|
|
Chief among these new protections is an enhanced protection for
|
|
transactional records from indiscriminate law enforcement access. For
|
|
purposes of maintenance and billing, most online communication and
|
|
information systems create detailed records of users' communication
|
|
activities as well as lists of the information that they have accessed.
|
|
Provisions in the bill recognize that this transactional information
|
|
created by new digital communications systems is extremely sensitive and
|
|
deserves a high degree of protection from casual law enforcement access
|
|
which is currently possible without any independent judicial
|
|
supervision.
|
|
EFF commends the authors of this legislation for recognizing that
|
|
law enforcement access to transactional records in online communication
|
|
systems (everything from the Internet to America OnLine to hobbyist
|
|
BBSs) threatens privacy rights. Indiscriminate access to transactional
|
|
records implicates privacy interests because:
|
|
|
|
* the records are personally identifiable,
|
|
* they reveal the content of people's communications, and,
|
|
* the compilation of such records makes it easy for law enforcement
|
|
to create a detailed picture of people's lives online.
|
|
|
|
Based on this recognition, the draft bill contains the following
|
|
provisions:
|
|
|
|
* Court order required for access to transactional records instead
|
|
of mere subpoena
|
|
|
|
In order to gain access to transactional records, such as a list
|
|
of to whom a subject sent email, which online discussion group one
|
|
subscribes to, or which movies a subject requested on a pay-per view
|
|
channel, law enforcement will have to prove to a court, by the showing
|
|
of "specific and articulable facts" that the records requested are
|
|
relevant to an ongoing criminal investigation. This means that the
|
|
government may not request volumes of transactional records merely to
|
|
see what it can find through traffic analysis. Rather, law enforcement
|
|
will have to prove to a court that it has reason to believe that it will
|
|
find specific information relevant to an ongoing criminal investigation
|
|
in the records it requests.
|
|
With these provisions, we have achieved for all online systems a
|
|
significantly greater level of protection than exists today for records
|
|
such as email logs, and greater protection than currently exists for
|
|
telephone toll records. The lists of telephone calls that are kept by
|
|
local and long distance phone companies are available to law enforcement
|
|
without any judicial intervention at all. Law enforcement gains access
|
|
to hundreds of thousands of such telephone records each year, without a
|
|
warrant and without even notice to the citizens involved. Court order
|
|
protection will make it much more difficult for law enforcement to go on
|
|
"fishing expeditions" through online transactional records, hoping to
|
|
find evidence of a crime by accident. We have also submitted a detailed
|
|
memorandum on the importance of protection and would ask that this
|
|
document be included in the record of these proceedings along with this
|
|
testimony.
|
|
|
|
* Standard of proof much greater than for telephone toll records,
|
|
but below that for content
|
|
|
|
The most important change that these new provisions offer is that
|
|
law enforcement will: (a) have to convince a judge that there is reason
|
|
to look at a particular set of records, and; (b) have to expend the time
|
|
and energy necessary to have a United States Attorney or District
|
|
Attorney actually present a case before a court. However, the burden of
|
|
proof to be met by the government in such a proceeding is lower than
|
|
required for access to the content of a communication.
|
|
|
|
2. New protection for location-specific information available in
|
|
cellular, PCS and other advanced networks
|
|
|
|
Much of the electronic surveillance conducted by law enforcement
|
|
today involves gathering telephone dialing information through a device
|
|
known as a pen register. Authority to attach pen registers is obtained
|
|
merely by asserting that the information would be relevant to a criminal
|
|
investigation. Under current law, courts must approve pen register
|
|
requests without any substantive review of the basis for law
|
|
enforcement's request. This legislation offers significant new limits on
|
|
the use of pen register data.
|
|
Under this bill, when law enforcement seeks pen register
|
|
information from a telecommunications carrier, the carrier is forbidden
|
|
to deliver to law enforcement any information which would disclose the
|
|
location or movement of the calling or called party. Cellular phone
|
|
networks, PCS systems, and so-called "follow-me" services all store
|
|
location information in their networks. This new limitation is a major
|
|
safeguard which will prevent law enforcement from casually using mobile
|
|
and intelligent communications services as nation-wide tracking systems.
|
|
|
|
3. New limitations on "pen register" authority
|
|
|
|
Contemporary uses of pen registers also involve substantial
|
|
privacy invasion, even aside from location information. Currently, law
|
|
enforcement is able to use pen registers to capture not only the
|
|
telephone number dialed, but also any other touch-tone digits dialed
|
|
which reflect the user's interaction with an automated information
|
|
service on the other end of the line, such as an automatic banking
|
|
system or a voice-mail password. If this bill is enacted, law
|
|
enforcement would be required to use "technology reasonably available"
|
|
to limit pen registers to the collection of calling number information
|
|
only. We are aware that new pen register devices are now on the market
|
|
which automatically screen out all dialed digits except for the actual
|
|
telephone numbers. Just as this bill would require telecommunications
|
|
carriers to deploy technology which facilitates taps, we believe that
|
|
law enforcement should be required to deploy technology which shields
|
|
users communications from unauthorized invasion.
|
|
|
|
4. Bill does not preclude use of encryption
|
|
|
|
Unlike previous Digital Telephony proposals, this bill places no
|
|
obligation on telecommunication carriers to decipher encrypted messages,
|
|
unless the carrier actually holds the key to the message as well.
|
|
|
|
5. Automated remote monitoring precluded
|
|
|
|
Law enforcement is specifically precluded from having automated,
|
|
remote surveillance capability. Any court-ordered electronic
|
|
surveillance must be initiated by an employee of the telecommunications
|
|
carrier, upon request by law enforcement. Maintaining operational
|
|
separation between law enforcement agents and communication networks is
|
|
an important privacy safeguard.
|
|
|
|
6. Privacy considerations essential to development of new technology
|
|
|
|
One of the requirements that telecommunications carriers must meet
|
|
to be in compliance with the bill is that the wiretap access methods
|
|
adopted must protect the privacy and security of each user's
|
|
communication. If this requirement is not met, anyone may petition the
|
|
FCC to have the wiretap access requirements modified so that network
|
|
security is maintained. This requirement, just like those designed to
|
|
serve law enforcement's needs, must be carefully implemented and
|
|
monitored so that the technology used to conduct wiretaps cannot also
|
|
jeopardize the security of the network as a whole. If network-wide
|
|
security problems arise because of wiretapping standards, then the
|
|
standards should be overturned.
|
|
|
|
F. Improvements over previous Administration proposals
|
|
|
|
In addition to the privacy protections added to this bill, we also
|
|
note that the surveillance requirements are not as far-reaching as the
|
|
original FBI version. A number of procedural safeguards are added which
|
|
seek to minimize the threatens to privacy, security, and innovation.
|
|
Though the underlying premise of the bill is still cause for concern,
|
|
these new limitations deserve attention:
|
|
|
|
1. Narrow Scope
|
|
|
|
The bill explicitly excludes Internet providers, email systems,
|
|
BBSs, and other online services. Unlike the bills previously proposed by
|
|
the FBI, this bill is limited to local and long distance telephone
|
|
companies, cellular and PCS providers, and other common carriers.
|
|
|
|
2. Open process with public right of intervention
|
|
|
|
The public will have access to information about the
|
|
implementation of the bill, including open access to all standards
|
|
adopted in compliance with the bill, the details of how much wiretap
|
|
capacity the government demands, and a detailed accounting of all
|
|
federal money paid to carriers for modifications to their networks.
|
|
Privacy groups, industry interests, and anyone else has a statutory
|
|
right under this bill to challenge implementation steps taken by law
|
|
enforcement if they threaten privacy or impede technology advancement.
|
|
|
|
3. Technical requirements standards developed by industry instead of
|
|
the Attorney General
|
|
|
|
All surveillance requirements are to be implemented according to
|
|
standards developed by industry groups. The government is specifically
|
|
precluded from forcing any particular technical standard, and all
|
|
requirements are qualified by notions of economic and technical
|
|
reasonableness.
|
|
|
|
4. Right to deploy untappable services
|
|
|
|
Unlike the original FBI proposal, this bill recognizes that there
|
|
may be services which are untappable, even with Herculean effort to
|
|
accommodate surveillance needs. We understand that the bill intends to
|
|
allow untappable services to be deployed if redesign is not economically
|
|
or technically feasible. These provisions, however, should be
|
|
clarified.
|
|
|
|
G. Conclusion
|
|
|
|
In closing, I would like to thank Chairman Markey and members of
|
|
the Subcommittee, as well as others who have worked so hard on this
|
|
legislation. The Electronic Frontier Foundation looks forward to
|
|
working with all of you as the bill moves through the legislative
|
|
process.
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 22 Sep 1994 00:27:05 -0400 (EDT)
|
|
From: "Shabbir J. Safdar" <shabbir@PANIX.COM>
|
|
Subject: File 3--Dig Teleph Bill (HR 4922) to be marked up in Sen. Judic. Comm
|
|
|
|
DISTRIBUTE WIDELY (though no later than October 15, 1994)
|
|
|
|
[If you've only got 2 minutes, skip down to the "What You Can Do"
|
|
section.
|
|
|
|
The place to concentrate grass-roots efforts is now the Senate! The
|
|
Senate half of this bill is about to be "marked up" in the Judiciary
|
|
Committee. This is a great time to stop it. Your Senator needs to
|
|
hear from you!]
|
|
|
|
The FBI's Wiretap bills (also known as the DT - Digital Telephony bills)
|
|
mandate that *all* communications carriers must provide wiretap-ready
|
|
equipment so that the FBI can more easily implement their court-ordered
|
|
wiretaps more easily. The costs of re-engineering all communications
|
|
equipment will be borne by the government, industry and consumers.
|
|
|
|
The bill is vague and the standards defining "wiretap ready" do not
|
|
exist. Furthermore, the FBI has yet to make a case which demonstrates
|
|
that they have been unable to implement a single wiretap. Although
|
|
we as a society have accepted law enforcement's need to perform
|
|
wiretaps, it is not reasonable to mandate this functionality as a part
|
|
of the design. In itself, that would be an important balance. However
|
|
without any proof that this is indeed a realistic and present problem,
|
|
it is unacceptable and premature to pass this legislation today.
|
|
|
|
The Voters Telecomm Watch (VTW) does not believe the FBI has made a
|
|
compelling case to justify that all Americans give up their privacy.
|
|
Furthermore, the VTW does not believe the case has been made to justify
|
|
spending 500 million Federal dollars over the next 4 years to
|
|
re-engineer equipment to compromise privacy, interfere with
|
|
telecommunications privacy, and fulfill an unproven government need.
|
|
|
|
|
|
WHAT YOU CAN DO
|
|
========================
|
|
You can help stop this legislation before it is too late!
|
|
Contact your Senators, especially if they're on the Judiciary
|
|
Committee. Faxes are best, phone calls are second best; email
|
|
is probably not the greatest method of showing your opposition.
|
|
Congress just doesn't handle email well yet.
|
|
|
|
|
|
Step 1.
|
|
Figure out which state you're in. :-)
|
|
Find your two Senators on the lists appended.
|
|
|
|
Step 2. Pick up the phone, or type up your letter.
|
|
|
|
Step 3. Express your opinion. If you're at a loss for words, use
|
|
our sample communique below:
|
|
|
|
SAMPLE PHONE CALL
|
|
|
|
The FBI's Digital Telephony bill (SB 2375) affects the delicate
|
|
balance between the public's privacy and law enforcement's need
|
|
to perform wiretaps. It will require huge unknown amounts of
|
|
funding, and its need has not yet been justified by the FBI to
|
|
the public.
|
|
|
|
Please vote against SB 2375.
|
|
|
|
Thank you,
|
|
|
|
___________________
|
|
|
|
SAMPLE FAX
|
|
Dear Honorable Senator _______________,
|
|
|
|
The FBI's Digital Telephony bill (SB 2375) disturbs me
|
|
greatly. The FBI has not yet made their case to the public
|
|
that we need to build wiretap functionality into the telephones
|
|
of 250 million people to justify wiretaps which have not yet
|
|
been proven to be difficult to implement.
|
|
|
|
Furthermore, no one has yet explained how we as a nation are
|
|
going to pay for the costs of this bill, which are at least 500
|
|
million dollars and likely to be higher.
|
|
|
|
The bill would clearly compromise the privacy of all Americans
|
|
with no counterbalancing benefit to either law enforcement or
|
|
the public. The FBI has not yet demonstrated to the public a
|
|
need for this.
|
|
|
|
I urge you to oppose the Digital Telephony bill (SB 2375).
|
|
|
|
Sincerely,
|
|
|
|
___________________
|
|
|
|
Step 4. Feel good about yourself. You've just participated in democracy
|
|
without leaving your seat.
|
|
|
|
Step 5. [Extra special bonus step for activists :-]
|
|
Before you hang up, ask your Senator's staff member what
|
|
their position is on SB 2375. It's not an unreasonable question,
|
|
they were elected to represent people like you. Mail the answer
|
|
to vtw@vtw.org. We believe in making legislators accountable
|
|
for their positions.
|
|
|
|
For more information about the Digital Telephony bills, check the
|
|
Voters Telecomm Watch gopher site (gopher.panix.com) or contact Steven
|
|
Cherry, VTW Press Contact at (718) 596-2851 or stc@vtw.org.
|
|
|
|
VTW posts a Digital Telephony FAQ monthly to several Usenet newsgroups
|
|
including comp.org.cpsr.talk and comp.org.eff.talk. Look for it or
|
|
contact us at vtw@vtw.org for a copy.
|
|
|
|
List of Senators on the Judiciary Committee:
|
|
p st name phone fax
|
|
========================
|
|
D DE Biden Jr., Joseph R. 1-202-224-5042 na
|
|
Note: Sen. Biden is both the Chairman and a cosponsor of the bill
|
|
R UT Hatch, Orrin G. 1-202-224-5251 1-202-224-6331
|
|
D MA Kennedy, Edward M. 1-202-224-4543 1-202-224-2417
|
|
R SC Thurmond, Strom 1-202-224-5972 1-202-224-1300
|
|
D OH Metzenbaum, Howard 1-202-224-2315 1-202-224-6519
|
|
R WY Simpson, Alan K. 1-202-224-3424 1-202-224-1315
|
|
D AZ DeConcini, Dennis 1-202-224-4521 1-202-224-2302
|
|
R IA Grassley, Charles E. 1-202-224-3744 na
|
|
D VT Leahy, Patrick J. 1-202-224-4242 na
|
|
Note: Sen. Leahy is the bill's sponsor
|
|
R PA Specter, Arlen 1-202-224-4254 na
|
|
D AL Heflin, Howell T. 1-202-224-4124 1-202-224-3149
|
|
R CO Brown, Henry 1-202-224-5941 na
|
|
D IL Simon, Paul 1-202-224-2152 1-202-224-0868
|
|
R ME Cohen, William S. 1-202-224-2523 1-202-224-2693
|
|
D WI Kohl, Herbert H. 1-202-224-5653 na
|
|
R SD Pressler, Larry 1-202-224-5842 1-202-224-1630
|
|
D CA Feinstein, Diane 1-202-224-3841 na
|
|
D IL Moseley-Braun, Carol 1-202-224-2854 na
|
|
|
|
|
|
Complete list of Senators:
|
|
p st name phone fax
|
|
========================
|
|
R AK Murkowski, Frank H. 1-202-224-6665 1-202-224-5301
|
|
R AK Stevens, Ted 1-202-224-3004 1-202-224-1044
|
|
D AL Heflin, Howell T. 1-202-224-4124 1-202-224-3149
|
|
D AL Shelby, Richard C. 1-202-224-5744 1-202-224-3416
|
|
D AR Bumpers, Dale 1-202-224-4843 1-202-224-6435
|
|
D AR Pryor, David 1-202-224-2353 na
|
|
D AZ DeConcini, Dennis 1-202-224-4521 1-202-224-2302
|
|
R AZ McCain, John 1-202-224-2235 na
|
|
D CA Boxer, Barbara 1-202-225-5161 na
|
|
D CA Feinstein, Diane 1-202-224-3841 na
|
|
D CO Campbell, Ben N. 1-202-225-4761 1-202-225-0228
|
|
R CO Brown, Henry 1-202-224-5941 na
|
|
D CT Dodd, Christopher J. 1-202-224-2823 na
|
|
D CT Lieberman, Joseph I. 1-202-224-4041 1-202-224-9750
|
|
D DE Biden Jr., Joseph R. 1-202-224-5042 na
|
|
R DE Roth Jr., William V. 1-202-224-2441 1-202-224-2805
|
|
D FL Graham, Robert 1-202-224-3041 na
|
|
R FL Mack, Connie 1-202-224-5274 1-202-224-8022
|
|
D GA Nunn, Samuel 1-202-224-3521 1-202-224-0072
|
|
R GA Coverdell, Paul 1-202-224-3643 na
|
|
D HI Akaka, Daniel K. 1-202-224-6361 1-202-224-2126
|
|
D HI Inouye, Daniel K. 1-202-224-3934 1-202-224-6747
|
|
D IA Harkin, Thomas 1-202-224-3254 1-202-224-7431
|
|
R IA Grassley, Charles E. 1-202-224-3744 na
|
|
R ID Craig, Larry E. 1-202-224-2752 1-202-224-2573
|
|
R ID Kempthorne, Dirk 1-202-224-6142 1-202-224-5893
|
|
D IL Moseley-Braun, Carol 1-202-224-2854 na
|
|
D IL Simon, Paul 1-202-224-2152 1-202-224-0868
|
|
R IN Coats, Daniel R. 1-202-224-5623 1-202-224-8964
|
|
R IN Lugar, Richard G. 1-202-224-4814 na
|
|
R KS Dole, Robert 1-202-224-6521 1-202-224-8952
|
|
R KS Kassebaum, Nancy L. 1-202-224-4774 1-202-224-3514
|
|
D KY Ford, Wendell H. 1-202-224-4343 na
|
|
R KY McConnell, Mitch 1-202-224-2541 1-202-224-2499
|
|
D LA Breaux, John B. 1-202-224-4623 na
|
|
D LA Johnston, J. Bennett 1-202-224-5824 na
|
|
D MA Kennedy, Edward M. 1-202-224-4543 1-202-224-2417
|
|
D MA Kerry, John F. 1-202-224-2742 na
|
|
D MD Mikulski, Barbara A. 1-202-224-4654 1-202-224-8858
|
|
D MD Sarbanes, Paul S. 1-202-224-4524 1-202-224-1651
|
|
D ME Mitchell, George J. 1-202-224-5344 na
|
|
R ME Cohen, William S. 1-202-224-2523 1-202-224-2693
|
|
D MI Levin, Carl 1-202-224-6221 na
|
|
D MI Riegle Jr., Donald 1-202-224-4822 1-202-224-8834
|
|
D MN Wellstone, Paul 1-202-224-5641 1-202-224-8438
|
|
R MN Durenberger, David 1-202-224-3244 na
|
|
R MO Bond, Christopher S. 1-202-224-5721 1-202-224-8149
|
|
R MO Danforth, John C. 1-202-224-6154 na
|
|
R MS Cochran, Thad 1-202-224-5054 na
|
|
R MS Lott, Trent 1-202-224-6253 1-202-224-2262
|
|
D MT Baucus, Max 1-202-224-2651 na
|
|
R MT Burns, Conrad R. 1-202-224-2644 1-202-224-8594
|
|
R NC Faircloth, D. M. 1-202-224-3154 1-202-224-7406
|
|
R NC Helms, Jesse 1-202-224-6342 na
|
|
D ND Conrad, Kent 1-202-224-2043 na
|
|
D ND Dorgan, Byron L. 1-202-225-2611 1-202-225-9436
|
|
D NE Exon, J. J. 1-202-224-4224 na
|
|
D NE Kerrey, Joseph R. 1-202-224-6551 1-202-224-7645
|
|
R NH Gregg, Judd 1-202-224-3324 na
|
|
R NH Smith, Robert 1-202-224-2841 1-202-224-1353
|
|
D NJ Bradley, William 1-202-224-3224 1-202-224-8567
|
|
D NJ Lautenberg, Frank R. 1-202-224-4744 1-202-224-9707
|
|
D NM Bingaman, Jeff 1-202-224-5521 na
|
|
R NM Domenici, Pete V. 1-202-224-6621 1-202-224-7371
|
|
D NV Bryan, Richard H. 1-202-224-6244 na
|
|
D NV Reid, Harry 1-202-224-3542 1-202-224-7327
|
|
D NY Moynihan, Daniel P. 1-202-224-4451 1-202-224-9293
|
|
R NY D'Amato, Alfonse M. 1-202-224-6542 1-202-224-5871
|
|
D OH Glenn, John 1-202-224-3353 na
|
|
D OH Metzenbaum, Howard 1-202-224-2315 1-202-224-6519
|
|
D OK Boren, David L. 1-202-224-4721 na
|
|
R OK Nickles, Donald 1-202-224-5754 1-202-224-6008
|
|
R OR Hatfield, Mark O. 1-202-224-3753 na
|
|
R OR Packwood, Robert 1-202-224-5244 na
|
|
D PA Wofford, Harris 1-202-224-6324 1-202-224-4161
|
|
R PA Specter, Arlen 1-202-224-4254 na
|
|
D RI Pell, Claiborne 1-202-224-4642 1-202-224-4680
|
|
R RI Chafee, John H. 1-202-224-2921 na
|
|
D SC Hollings, Ernest F. 1-202-224-6121 na
|
|
R SC Thurmond, Strom 1-202-224-5972 1-202-224-1300
|
|
D SD Daschle, Thomas A. 1-202-224-2321 1-202-224-2047
|
|
R SD Pressler, Larry 1-202-224-5842 1-202-224-1630
|
|
D TN Mathews, Harlan 1-202-224-1036 1-202-228-3679
|
|
D TN Sasser, James 1-202-224-3344 na
|
|
D TX Krueger, Robert 1-202-224-5922 na
|
|
R TX Gramm, Phil 1-202-224-2934 na
|
|
R UT Bennett, Robert 1-202-224-5444 na
|
|
R UT Hatch, Orrin G. 1-202-224-5251 1-202-224-6331
|
|
D VA Robb, Charles S. 1-202-224-4024 1-202-224-8689
|
|
R VA Warner, John W. 1-202-224-2023 1-202-224-6295
|
|
D VT Leahy, Patrick J. 1-202-224-4242 na
|
|
R VT Jeffords, James M. 1-202-224-5141 na
|
|
D WA Murray, Patty 1-202-224-2621 1-202-224-0238
|
|
R WA Gorton, Slade 1-202-224-3441 1-202-224-9393
|
|
D WI Feingold, Russell 1-202-224-5323 na
|
|
D WI Kohl, Herbert H. 1-202-224-5653 na
|
|
D WV Byrd, Robert C. 1-202-224-3954 1-202-224-4025
|
|
D WV Rockefeller, John D. 1-202-224-6472 1-202-224-1689
|
|
R WY Simpson, Alan K. 1-202-224-3424 1-202-224-1315
|
|
R WY Wallop, Malcolm 1-202-224-6441 1-202-224-3230
|
|
|
|
------------------------------
|
|
|
|
Date: Fri, 16 Sep 1994 18:27 CDT
|
|
From: Bill Higgins-- Beam Jockey <HIGGINS@FNALV.BITNET>
|
|
Subject: File 4-- For CUD: Pizza by E-mail in Santa Cruz
|
|
|
|
In Santa Cruz, a Pizza Hut will now accept pizza delivery orders by
|
|
e-mail. Wow.
|
|
|
|
After a much-forwarded press release landed in my mailbox, I phoned
|
|
one of the numbers to see if it was a hoax (well, if it is, at least
|
|
they have the phones covered convincingly), then fired up Mosaic to
|
|
look at the WWW page. I append some excerpts from the press release
|
|
and an account of the project snagged (with permission) from one of
|
|
the PizzaNet Web pages.
|
|
|
|
History has been made. Ordering pizza from your computer. It's the
|
|
fulfillment of a hacker dream at least as old as computer networking.
|
|
(Is this indeed the first time such a service has been available?)
|
|
|
|
Bill Higgins Internet: HIGGINS@FNAL.FNAL.GOV
|
|
Fermi National Accelerator Laboratory Bitnet: HIGGINS@FNAL.BITNET
|
|
=========
|
|
FOR IMMEDIATE RELEASE CONTACT:
|
|
|
|
Rob Doughty Elisheva Steiner
|
|
Pizza Hut, Inc. The Santa Cruz Operation, Inc.
|
|
TEL: 316/681-9602 TEL: 408/427-7252
|
|
|
|
SCO AND PIZZA HUT ANNOUNCE PILOT PROGRAM
|
|
FOR PIZZA DELIVERY ON THE INTERNET
|
|
|
|
"PizzaNet'' Program Enables Computer Users
|
|
to Electronically Order Deliveries
|
|
|
|
|
|
WICHITA, KS AND SANTA CRUZ, CA, SCO FORUM94 (August 22, 1994) --
|
|
(NASDAQ:SCOC) In a revolutionary spin on business use of the
|
|
Information Superhighway, The Santa Cruz Operation, Inc. (SCO)
|
|
and Pizza Hut, Inc. today announced "PizzaNet," a pilot program
|
|
that enables computer users, for the first time, to
|
|
electronically order pizza delivery from their local Pizza Hut
|
|
restaurant via the worldwide Internet.
|
|
|
|
Pizza Hut will launch the PizzaNet pilot in the Santa Cruz area
|
|
on August 22 and use it to study the feasibility of expanding the
|
|
program to other cities in the U.S. and around the world.
|
|
Technology for the pilot program includes the SCO Global Access
|
|
product, an integrated Internet business server solution. The SCO
|
|
Global Access incorporates advanced NCSA Mosaic software for
|
|
browsing the Internet, and the custom "PizzaNet" application
|
|
software developed by SCO's Professional Services organization.
|
|
|
|
[...]
|
|
|
|
To participate in the PizzaNet Pilot, customers in the Santa Cruz
|
|
area need computers with Internet access and any version of
|
|
Mosaic, such as Windows, Mac, or UNIX. Customers use the
|
|
Internet's World Wide Web to access the centralized PizzaNet
|
|
server at Pizza Hut Headquarters in Wichita, Kansas. This 486
|
|
system runs SCO Open Server and SCO Global Access software, using
|
|
the Mosaic and Hypertext Transfer Protocol to present customers
|
|
with a customized menu page for ordering pizza deliveries. Mosaic
|
|
is widely used at many technology companies, government agencies,
|
|
and universities. It is rapidly being adopted by many business
|
|
and home users in response to the continuing availability of new
|
|
and innovative business and information services.
|
|
|
|
The customer uses the menu pages to enter name, address, and
|
|
phone information, along with orders for pizza and beverages. The
|
|
order is then transmitted via the Internet back to Wichita, and
|
|
then relayed via modem and conventional phone lines to the SCO
|
|
Open Server system at the customer's nearest Pizza Hut
|
|
restaurant. The local restaurant can then telephone first-time
|
|
users to verify orders. All money changes hand at the point of
|
|
delivery.
|
|
|
|
[...]
|
|
|
|
Santa Cruz Internet users can access PizzaNet by entering
|
|
http://www.pizzahut.com. To obtain more information on SCO via
|
|
the Internet, enter http://www.sco.com.
|
|
|
|
[End of press release. Text of WWW page with URL
|
|
http://www.pizzahut.com/team.html begins:]
|
|
|
|
The PizzaNet Team
|
|
|
|
PizzaNet is the brainchild of two cooperating companies: Pizza Hut
|
|
Inc. (PHI), and The Santa Cruz Operation (SCO).
|
|
|
|
In particular, it was conceived by Jon Payne (PHI), and Doug Michels
|
|
(SCO) while in a meeting discussing potential uses for the
|
|
``Information Super-Highway.''
|
|
|
|
The idea sort of stewed for a while, until Jon contacted SCO
|
|
Professional Services, to see if he could get some help implementing
|
|
this idea. From there, Phil Neuman (SCO's webmaster) and Steph Marr
|
|
(SCO chief consultant on the project) sat down to figure out if this
|
|
scheme the bosses had cooked up was really do-able.
|
|
|
|
Apparently, they decided it was.
|
|
|
|
Jon provided some initial screen layouts, while Phil and Steph tried
|
|
to figure a transaction flow that could be dealt with in HTML forms.
|
|
Kurt Schmidt (PHI) was trying to figure out a way to interface into
|
|
the existing SCO-based branch automation system used in Pizza Hut
|
|
stores. Kurt made this as painless as possible by tying into an
|
|
existing interface used by Pizza Hut Customer Service Centers.
|
|
|
|
With the initial forms done, Steph left Santa Cruz (phil was replacing
|
|
SCO's Web Server with a new system at the time), and went to Wichita
|
|
to work on integration with Kurt and PHOEBE (the Pizza Hut Order Entry
|
|
Back End) and to help get the 56Kbps Alternet link to the Internet up
|
|
and running.
|
|
|
|
After a few false starts, a few hundred cups of coffee, and only a
|
|
couple of weeks, the link was made, and the first pizza was ordered
|
|
and delivered (to Phil in Santa Cruz) on Friday, 12 August, 1994.
|
|
|
|
The system is now in pilot test within Santa Cruz; given that it is
|
|
successful there, it will become available for use throughout
|
|
Cyberspace where ever Pizza Hut stores are within delivery distance.
|
|
|
|
Pizza in Cyberspace.
|
|
|
|
Well, if you're going to have food here, it might as well be Pizza.
|
|
|
|
Sorry, there's no beer. :-)
|
|
|
|
PizzaNet Services / Pizza Hut Inc. / webmaster@PizzaHut.COM
|
|
|
|
------------------------------
|
|
|
|
Date: Fri, 16 Sep 1994 14:06:07 EST
|
|
From: Marc Rotenberg <rotenberg@WASHOFC.EPIC.ORG>
|
|
Subject: File 5--One Hundred Reasons to Oppose the FBI Wiretap Bill (CPSR)
|
|
|
|
((CuD MODERATORS' NOTE: CPSR is compiling a list of reasons to oppose
|
|
the FBI Wiretap Bill (HR 4922). CuD will reprint them periodically,
|
|
and we produce the first three here. HR 4922 is opposed by a broad
|
|
spectrum of organizations and citizens, because it greatly expands the
|
|
FBI's ability to intercept electronic communications. The complete
|
|
text of HR 4922 was reprinted in CuD 6.73).
|
|
|
|
100 Reasons to Oppose the FBI Wiretap Bill
|
|
|
|
REASON 2: The Constitution protects the right of privacy, not the use
|
|
of wiretap.
|
|
|
|
Privacy is a Constitutional right. The Fourth Amendment protects
|
|
privacy and the right of individuals to be free from unreasonable
|
|
search and seizure. Wiretapping is permitted by federal statute only
|
|
in narrow circumstances. It has no Constitutional basis. Congress
|
|
could outlaw all wiretapping tomorrow if it chose to do so, but it
|
|
could not easily repeal the Fourth Amendment.
|
|
|
|
REASON 21: The wiretap bill mandates new technologies for data
|
|
surveillance
|
|
|
|
The wiretap bill says that "a telecommunications carrier shall
|
|
ensure that it can enable government access to call-identifying
|
|
information." This is the first time the U.S. government has
|
|
required by law that communications networks be designed to
|
|
facilitate electronic data surveillance. Telecommunications
|
|
firms, equipment manufacturers, and those who work in the hi-tech
|
|
industry face a legal obligation to design networks for electronic
|
|
monitoring.
|
|
|
|
REASON 60: The bill contains no provisions to protect the
|
|
confidentiality of telephone toll records.
|
|
|
|
Tens of thousands of telephone toll records are obtained each year
|
|
by subpoena. This process which allows the government to gather
|
|
private records from the telephone companies by simply signing a
|
|
statement effectively endruns the Fourth Amendment premise that a
|
|
judge must first decide if the search is reasonable. Experts on
|
|
wiretap law believe that stronger protections for telephone toll
|
|
records should be a top priority if the federal wiretap law is to be
|
|
amended. This issue is no where addressed in the legislation now
|
|
pending in Congress.
|
|
|
|
==================
|
|
|
|
What To Do: Fax Rep. Jack
|
|
Brooks (202-225-1584). Express your concerns about the FBI Wiretap
|
|
proposal.
|
|
============================
|
|
((100 Reasons is a project of the Electronic Privacy Information
|
|
Center (EPIC) in Washington, DC. For more information:
|
|
100.Reasons@epic.org))
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 13 Aug 1994 22:51:01 CDT
|
|
From: CuD Moderators <tk0jut2@mvs.cso.niu.edu>
|
|
Subject: File 6--Cu Digest Header Information (unchanged)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send a one-line message: SUB CUDIGEST your name
|
|
Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
|
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
|
|
In ITALY: Bits against the Empire BBS: +39-461-980493
|
|
In BELGIUM: Virtual Access BBS: +32.69.45.51.77 (ringdown)
|
|
|
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #6.83
|
|
************************************
|
|
|