905 lines
42 KiB
Plaintext
905 lines
42 KiB
Plaintext
|
||
|
||
****************************************************************************
|
||
>C O M P U T E R U N D E R G R O U N D<
|
||
>D I G E S T<
|
||
*** Volume 3, Issue #3.04 (January 28, 1991) **
|
||
****************************************************************************
|
||
|
||
MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet)
|
||
ARCHIVISTS: Bob Krause / Alex Smith / Bob Kusumoto
|
||
RESIDENT SYSTEM CRASH VICTIM:: Brendan Kehoe
|
||
|
||
USENET readers can currently receive CuD as alt.society.cu-digest. Back
|
||
issues are also available on Compuserve (in: DL0 of the IBMBBS sig),
|
||
PC-EXEC BBS (414-789-4210), and at 1:100/345 for those on FIDOnet.
|
||
Anonymous ftp sites: (1) ftp.cs.widener.edu (2) cudarch@chsun1.uchicago.edu
|
||
E-mail server: archive-server@chsun1.uchicago.edu.
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted as long as the source is
|
||
cited. Some authors, however, do copyright their material, and those
|
||
authors should be contacted for reprint permission. It is assumed that
|
||
non-personal mail to the moderators may be reprinted unless otherwise
|
||
specified. Readers are encouraged to submit reasoned articles relating to
|
||
the Computer Underground. Articles are preferred to short responses.
|
||
Please avoid quoting previous posts unless absolutely necessary.
|
||
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
DISCLAIMER: The views represented herein do not necessarily represent the
|
||
views of the moderators. Contributors assume all responsibility
|
||
for assuring that articles submitted do not violate copyright
|
||
protections.
|
||
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
||
CONTENTS THIS ISSUE:
|
||
File 1: Moderators' Corner
|
||
File 2: From the Mailbag
|
||
File 3: BMUG's ECPA Commentary (reprinted with permission from BMUG
|
||
File 4: The CU in the News
|
||
|
||
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
********************************************************************
|
||
*** CuD #3.04, File 1 of 4: Moderator's corner ***
|
||
********************************************************************
|
||
|
||
From: Moderators
|
||
Subject: Moderators' Corner
|
||
Date: January 28, 1991
|
||
|
||
++++++++++
|
||
In this file:
|
||
1. LEN ROSE UPDATE
|
||
2. FIRST CONFERENCE ON COMPUTERS, FREEDOM AND PRIVACY
|
||
3. FTP INFO AND WIDENER CRASH
|
||
++++++++++
|
||
|
||
+++++++++++++++++++
|
||
Len Rose Update
|
||
+++++++++++++++++++
|
||
|
||
Len Rose's trial, originally scheduled for January 28, has been pushed back to
|
||
April 1 because of a superceding indictment related to the same facts. Len is
|
||
currently represented by Catterton, Kemp, and Mason of Rockville, Md.
|
||
The EFF's amicus brief in the case is available from the CuD archives or
|
||
directly from EFF.
|
||
|
||
+++++++++++++++++++++++
|
||
First Conference on Computers, Freedom and Privacy
|
||
+++++++++++++++++++++++++
|
||
|
||
Don't forget The First Conference On Computers, Freedom and Privacy coming
|
||
up on March 25-28. The conference will be held at the Airport SFO Marriott
|
||
Hotel in Burlingame (that's the San Francisco Airport about 15 minutes
|
||
south of the city for out-of-towners). All are invited, but participation
|
||
is limited to the first 600 registering. For more information, contact
|
||
JWARREN@WELL.SF.CA.US or WELL!JWARREN@APPLE.COM
|
||
|
||
++++++++++++++++++++++++++++++
|
||
FTP Info and Widener Crash
|
||
+++++++++++++++++++++++++++++++
|
||
|
||
The Widener ftp site is experiencing some problems and is down for awhile.
|
||
But, the others are currently working. Back issues of cuds on Compuserve
|
||
are in: DL0 of the IBMBBS sig. Added to the archives: A dozen more state
|
||
computer statutes, NIA #69 (which came out last month), Phantasy #4, and a
|
||
few other things. An anonymous contributor also deposited about a dozen or
|
||
more university computer policies/regulations in the "legal" directory
|
||
which are well worth reading. Thanks to the donor! Brian Peretti also send
|
||
over his "Computer Publication and the First Amendment," which we also
|
||
recommend.
|
||
|
||
********************************************************************
|
||
>> END OF THIS FILE <<
|
||
***************************************************************************
|
||
|
||
------------------------------
|
||
|
||
From: Assorted
|
||
Subject: From the Mailbag
|
||
Date: January 29, 1990
|
||
|
||
********************************************************************
|
||
*** CuD #3.04, File 2 of 4: From the Mailbag ***
|
||
********************************************************************
|
||
|
||
Subject: New address for ATI.
|
||
From: Ground Zero <gzero@TRONSBOX.XEI.COM>
|
||
Date: Tue, 22 Jan 91 18:07:55 EST
|
||
|
||
Dear ATI Readers:
|
||
|
||
Hello!! Those of you who attempted to send mail to us may have noticed
|
||
that it bounced back or didn't make it here. Due to some changes in our
|
||
home site, ATI now has a new address. Our new address is:
|
||
|
||
gzero@tronsbox.xei.com
|
||
|
||
As always, do send all correspondence to the above address and NOT the
|
||
address this message is comeing from (the one beginning with "zero-list").
|
||
|
||
Due to changes in our home site, the release of ATI54 has been delayed.
|
||
However, we're working on it, and you should expect to see ATI54
|
||
within a few days.
|
||
See ya then!
|
||
|
||
++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
||
From: Nigel Allen <chinacat!uunet!contact!ndallen@CS.UTEXAS.EDU>
|
||
Subject: Algorithm: A Newsletter for People Who Enjoy Programming
|
||
Date: Thu, 24 Jan 91 04:23 EST
|
||
|
||
Algorithm: A Newsletter for People Who Enjoy Programming
|
||
|
||
For one year now, A.K. Dewdney (author of Scientific American's popular
|
||
Computer Recreations column) has been publishing a newsletter (or is it a
|
||
magazine?) called Algorithm. Appearing bi-monthly, Algorithm features a
|
||
wide range of topics in each issue, mostly centered around fascinating
|
||
programming projects of the kind we used to see in Computer Recreations.
|
||
Besides Dewdney, Clifford Pickover (JBM's graphic genius), Michael Ecker
|
||
(formerly of Creative Computing) and Dennis Shasta (creator of the Dr. Ecco
|
||
puzzles) also write columns for Algorithm. Each issue features Algoletters
|
||
from vendors with projects and ideas to share, the four programming columns
|
||
just mentioned, stimulating articles and reviews of weird and wonderful
|
||
programs written by individuals and small companies.
|
||
|
||
The basic vehicle of Algorithm is algorithms. By specifying program ideas
|
||
in pseudocode, the publication makes them available in a
|
||
language-independent form. The emphasis in mainly recreational and (dare I
|
||
say it?) educational. Topics range from fractals and chaos to cellular
|
||
automata, scientific simulation and computer games. The scope is wide open
|
||
and engaging.
|
||
|
||
Anyone wishing a free inspection copy of Algorithm should drop a line to
|
||
Algorithm, P.O. Box 29237, Westmount Postal Outlet, 785 Wonderland Road,
|
||
London, Ontario, CANADA N6K 1M6. Alternatively, they can send me e-mail
|
||
(ndallen@contact.uucp) or reply to this message, and I'll forward the
|
||
request to Algorithm.
|
||
|
||
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
||
From: sjackson@TIC.COM(Steve Jackson)
|
||
Subject: More on What to Say when the Warrant Comes
|
||
Date: Sun, 2 Dec 90 12:54:28 cst
|
||
|
||
(1) Regarding "Don't Talk To The Police" in CuD 2.14: I question the
|
||
statement that
|
||
|
||
>He cannot legally place you under arrest or enter your home without a
|
||
>warrant signed by a judge. If he indicates that he has such a warrant,
|
||
>ask to see it. A person under arrest, or located on premises to be
|
||
>searched, generally must be shown a warrant if he requests it and must be
|
||
>given a chance to read it.
|
||
|
||
It is important to be VERY POLITE AND CAREFUL when refusing to cooperate
|
||
with police, unless you are locally powerful and have lots of witnesses.
|
||
And even then, politeness and care are worthwhile. Your "rights" can
|
||
evaporate instantly if you antagonize an officer, especially if there are
|
||
no disinterested witnesses. Your friends and family are not disinterested
|
||
enough to worry a hostile officer; he may arrest them, too.
|
||
|
||
Regarding "place you under arrest" - If, in the process of refusing entry
|
||
to a police officer, you demonstrate a "bad attitude," the officer may be
|
||
motivated to FIND a reason to arrest you. Any display of a weapon, any
|
||
possibly-illegal item or situation visible from where the officer stands,
|
||
any threat against the officer's person, or (depending on local law) any
|
||
behavior the officer can characterize as indicative of drunkenness or drug
|
||
use . . . BANG, you're under arrest. And, in some situations, the officers
|
||
can now search your home because they arrested you. If, for instance, they
|
||
observed an illegal weapon, they can now reasonably suspect that there are
|
||
more. In the process of searching for more weapons, they will naturally
|
||
keep their eyes open for the original object of the search.
|
||
|
||
Regarding "signed warrant" - The general lay public believes, as I did
|
||
before March 1, that no search may be conducted if the police cannot show
|
||
you a signed search warrant. But *this does not appear to be true.* When my
|
||
office was invaded, the agents did *not* show a signed search warrant; they
|
||
showed a photocopy with many spaces, including the space for a judge's
|
||
signature, STILL BLANK.
|
||
|
||
Nevertheless, no resistance was made to their search. And it seems that
|
||
this is just as well. Later that day, when I asked my attorney what would
|
||
have happened if we had objected to the lack of a signature, I was told
|
||
"Everybody who resisted the search would have been handcuffed and taken
|
||
downtown for obstructing officers in the performance of their duties."
|
||
|
||
It appears - and I have been trying, to no avail, to get an authoritative
|
||
statement on this - that if officers HAVE a signed search warrant - or if
|
||
they believe that a judge has signed a copy of their warrant, even if they
|
||
themselves don't have a signed copy - then they can conduct a legal search.
|
||
In the latter case, they obviously can't show a signed warrant; they don't
|
||
have one!
|
||
|
||
My point is that the common belief that "they have to show you a SIGNED
|
||
warrant" may be a misconception that can get a citizen into serious trouble.
|
||
We really need to get an authoritative clarification on this.
|
||
|
||
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
||
From: "Ofer Inbar" <cos@CHAOS.CS.BRANDEIS.EDU>
|
||
Date: Wed, 23 Jan 91 13:02:55 est
|
||
Subject: Discussion of Dark Adept's articles (con't)
|
||
|
||
In CuD #3.03, file 2, David Daniel wrote a critique of Dark Adept's latest
|
||
essay. Although much of David's essay was well thought out, there are
|
||
points which I think he should reconsider.
|
||
|
||
>manufacture and/or market it. Mr. Adept expressed his belief that a user
|
||
>interface was generic. I'm sure we could find many hard working programmers
|
||
>who would heartily disagree as well as corporate executives who have
|
||
>overseen the expenditure of many thousands or man-hours and dollars in the
|
||
>development of a unique software product. Don't they deserve a return on
|
||
>their investment? Mr. Adept denies the existence of license agreements when
|
||
|
||
It's quite likely that the interface had already been developed by someone
|
||
else. If it were not protected by some other company's legal department,
|
||
the corporation in question would never have had to spend thousands of
|
||
dollars on developing it in the first place.
|
||
|
||
If everyone has to spend money reinventing the wheel, it's only fair to
|
||
entitle them to some return on their investment. But wouldn't it be nice
|
||
if the wheel was free to begin with?
|
||
|
||
If someone comes up with some interface that is truly new, they deserve
|
||
some protection for a limited time. If their invention is really
|
||
wonderful, they will get back far more than they spent. This is in fact
|
||
the reasoning behind patents. However, patents have a life of seven years
|
||
(I think), which in most markets is a limited time but in the computer
|
||
world translates to eternity, since anything new is bound to be obsolete
|
||
long before seven years are over.
|
||
|
||
>their investment? Mr. Adept denies the existence of license agreements when
|
||
>he asserts that an inefficient company can tie up a good interface by tying
|
||
>it to a bad program. He also denies the idea of a joint marketing venture
|
||
>by two or more companies which combine their strongest products.
|
||
|
||
Mr. Adept does not deny the existence of these possibilities. Nor, in
|
||
fact, does he deny the possiblity of the developer putting it's interface
|
||
in the public domain. His complaint was about giving the developer the
|
||
power to tie things up. Not every company has such enlightened attitudes.
|
||
Some, like Adobe, choose to charge exorbitant license fees; PostScript
|
||
could have been a unifying standard, but instead we are now seeing a
|
||
rebellion against Adobe which will result in several standards confusing
|
||
everyone. Others, like Lotus, choose not to allow anyone to use their
|
||
interface, and sue everyone who tries. Others, like Apple, appropriate
|
||
someone else's interface, and then take the same attitude as Lotus does.
|
||
|
||
>Mr. Adept wrote about the danger of protecting algorithms since they are
|
||
>merely mathematical models. Should we consider DOS and BIOS in the same
|
||
>category? Should these proprietary packages be freely circulated without
|
||
>compensation? It might be an attractive utopian concept but not workable
|
||
>within our present system.
|
||
|
||
Why is it not workable? DOS and BIOS are far from just algorithms. On the
|
||
other hand, shell sort is a clever algorithm, and I'm certainly glad
|
||
someone didn't try to patent it and charge license fees from every
|
||
programmer who used it. Remember the scare when it seemed Unisys was going
|
||
to enforce their perceived rights to LZW compression? Would it be good if
|
||
Unisys had the right to outright prohibit a programmer from using LZW
|
||
compression without prior written permission from them?
|
||
|
||
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++=
|
||
|
||
|
||
Subject: Dark Adept's Response to posts
|
||
From: Dark Adept <deleted@thenets.edu>
|
||
Date: Tue, 22 Jan 91 23:57:25 CST
|
||
|
||
First, I would like to thank everyone who had a comment, criticism, or
|
||
suggestion about my previous articles. I take all such comments to heart,
|
||
and try to improve my thinking and writing processes with them.
|
||
|
||
Second, I feel some of the criticisms have been my fault. I will try to
|
||
briefly clear these areas up:
|
||
|
||
1) When refering to IBM's "release" of their operating system, I was
|
||
talking about BIOS, not DOS. DOS is, of course, the property of Microsoft
|
||
and/or IBM depending on whether it is MS or PC. I apologize for this
|
||
misunderstanding. BIOS is IBM's own product. I did not mean to
|
||
misrepresent anyone.
|
||
|
||
2) My use of the masculine pronouns is intended to be generic. This usage
|
||
comes from how I was taught English. I stand by it. I have yet to see an
|
||
English grammar manual that states this is an incorrect usage. I try to
|
||
write in standard formal English, and this is how I was taught.
|
||
|
||
3) "his [first] wife's maiden name" is actually a line from the Hacker's
|
||
Anthem by the Cheshire Catalyst. It was meant as an inside joke. Still, I
|
||
have not met a female system operator -- yet. I hold no malice toward any
|
||
women in the computer field, and I apologize.
|
||
|
||
4) I thank David Daniel for representing the corporate voice re patents and
|
||
copyrights. However, I never stated DOS and BIOS were algorithms and
|
||
should be free. Yet the way they interface programs should be in the public
|
||
domain (DoubleDos and 4DOS come to mind?). Also, certainly, proprietary
|
||
source and object code should be protected. I was attempting to say the
|
||
output generated (i.e., the interface) and the algorithm that creates it
|
||
should not be protected. I do not know whether this changes his position
|
||
or not, but I feel that my position should be clear.
|
||
|
||
Again, thank all of you for your comments and articles that have responded
|
||
to mine. The more opinions all of us receive, the more all of us can
|
||
learn. This was my goal, and it appears that I have succeeded.
|
||
|
||
The Dark Adept
|
||
|
||
********************************************************************
|
||
>> END OF THIS FILE <<
|
||
***************************************************************************
|
||
|
||
------------------------------
|
||
|
||
From: Reprint from BMUG (Berkeley MacIntosh Users' Group)
|
||
Subject: BMUG's ECPA Commentary (reprinted with permission from BMUG
|
||
Date: January, 1991
|
||
|
||
********************************************************************
|
||
*** CuD #3.04, File 3 of 4: The Politics of the ECPA of 1986 ***
|
||
********************************************************************
|
||
|
||
The Politics of the Electronic Communications Privacy Act of 1986
|
||
|
||
Copyright (C) 1990, Bernard Aboba. All rights reserved.
|
||
|
||
The Electronic Communications Privacy Act (ECPA) of 1986 was a landmark
|
||
piece of legislation which is likely to affect online services and hobbyist
|
||
bulletin boards for many years to come. Since the ECPA is a complex and
|
||
often arcane piece of legislation, it is very hard to understand without
|
||
looking at the history of how it came to be. In understanding the
|
||
politics of ECPA, this article relies heavily on the transcripts of the
|
||
House Judiciary Committee Hearings on H.R. 3378, which eventually became
|
||
the Electronic Communications Privacy Act.
|
||
|
||
During the hearings on ECPA in 1985-86 only one member of the online
|
||
service industry, The Source (subsequently acquired by Compuserve)
|
||
submitted an opinion. Though endorsing the bill, the assessment hinted
|
||
at possible long term costs imposed by the lack of preemption of state
|
||
standards. However, this one page assessment hardly made an impression on
|
||
the hearings compared with the impressive lineup of spokesmen from the
|
||
ACLU, cellular communications firms, Regional Bell Operating Companies
|
||
(RBOC's), broadcasting groups, credit and banking firms, and computer and
|
||
telecommunications industry associations, all lined up in support of the
|
||
bill.
|
||
|
||
Only the U.S. Department of Justice, manufacturers of scanning equipment,
|
||
and amateur radio associations expressed strong reservations about the
|
||
bill. However, since the passage of ECPA, the long term costs of the
|
||
legislation and its effects on commercial and hobbyist conferencing systems
|
||
have become apparent. Ironically, none of these effects were anticipated
|
||
at the hearings.
|
||
|
||
Outline of ECPA
|
||
|
||
Broadened Protection of Communications
|
||
|
||
The ECPA amended the Omnibus Crime Control and Safe Streets Act of 1968
|
||
(which covered wire tapping of common carriers) to prohibit monitoring of
|
||
all electronic communications systems not designed to be accessible by the
|
||
public. This includes voice, data, and video on non-public systems, and
|
||
applies to communications regardless of the mode of transmission.
|
||
|
||
Search and Seizure
|
||
|
||
To obtain access to communications such as electronic mail, the government
|
||
is required to obtain a warrant on probable cause. Law enforcement must
|
||
also obtain a court order based on reasonable suspicion before obtaining
|
||
toll records of telephone calls.or gaining access to records of an
|
||
electronic communications system which concern specific communications.
|
||
|
||
Criminal Penalties
|
||
|
||
Criminal penalties can result from unauthorized access to computers if
|
||
messages are obtained or altered. Felony charges can be brought if the
|
||
violation was commited maliciously or for commercial gain, in which case
|
||
the act is punishable by up to one year imprisonment and a $250,000 fine.
|
||
In other cases, a term of imprisonment of six months and a maximum fine of
|
||
$5,000 is applicable.
|
||
|
||
Civil Penalties
|
||
|
||
Civil damages may be pursued for violation of the rights contained in the
|
||
act.
|
||
|
||
Disclosure
|
||
|
||
Electronic communications systems operators may not disclose electronic
|
||
messages without authorization except in special circumstances. The
|
||
Politics of ECPA
|
||
|
||
The ECPA was supported by the cellular phone, telephone, packet switching,
|
||
paging, and broadcasting industries; private firms owning large
|
||
communications networks, miscellaneous computer and communications trade
|
||
associations, the ACLU and Consumer's Union, and credit bureaus. Law
|
||
enforcement agencies were supportive, but skeptical. The only vigorous
|
||
opposition came from amateur radio associations, and manufacturers of
|
||
scanning equipment which, while protesting loudly, saw few of their
|
||
recommended modifications enacted into law.
|
||
|
||
Also playing a role were sponsoring legislators, such as Senator Patrick
|
||
Leahy of Vermont, and Charles Mathias of Maryland, as well as
|
||
Representatives Robert Kastenmeier and Carlos Moorhead. Senator Leahy, in
|
||
his opening remarks at the hearings on the bill, set the stage for the
|
||
legislation:
|
||
|
||
"At this moment phones are ringing, and when they are answered, the message
|
||
that comes out is a stream of sounds denoting ones and zeros.... What is
|
||
remarkable is the fact that none of these transmissions are protected from
|
||
illegal wiretaps, because our primary law, passed back in 1968, failed to
|
||
cover data communications, of which computer to computer transmission are a
|
||
good example. When Congress enacted that law,Title III of the Omnibus
|
||
Crime Control and Safe Streets Act of 1968, it had in mind a particular
|
||
kind of communication - voice - and a particular way of transmitting that
|
||
communication - via a common carrier analog telephone network. Congress
|
||
chose to cover only the "aural acquisition" of the contents of a common
|
||
carrier wire communication. The Supreme Court has interpreted that
|
||
language to mean that to be covered by Title III, a communication must be
|
||
capable of being overheard. The statue simply fails to cover the
|
||
unauthorized interception of data transmissions." Senator Leahy also had
|
||
more practical reasons for supporting the bill. The rapidly growing U.S.
|
||
cellular communications industry had become alarmed by the ease with which
|
||
cellular communications could be monitored. Television sets built during
|
||
the period 1966-1982 were capable of picking up cellular conversations on
|
||
UHF channels 80-83. This was possible because cellular communications used
|
||
the same frequency modulation techniques utilized in transmitting
|
||
television sound. In addition, scanning equipment which for several
|
||
hundred dollars was capable of receiving cellular communications in the 800
|
||
Mhz band. During 1985, several incidents threatened to make the
|
||
vulnerability of cellular communications into front page news. For
|
||
example, private conversations of state legislators in Austin were
|
||
intercepted and made available in the public press, with embarrassing
|
||
consequences.
|
||
|
||
This ease of reception threatened the viability of the cellular industry.
|
||
In response, according to Richard Colgan of the Association of North
|
||
American Radio Clubs, "cellular firms resorted to pervasive
|
||
misrepresentation of the actual interception vulnerability of cellular. "
|
||
In fairness to the cellular industry, cellular communications does provide
|
||
certain inherent protections against interception. For example, since each
|
||
half of the conversation is transmitted on different frequencies, usually
|
||
it is only possible to listen in on one side of a conversation. In
|
||
addition, while it is easy to pick up some conversation, it is difficult to
|
||
pick up a particular conversation of interest. Also, the frequencies will
|
||
shift during passage from one cell to another. However, given the
|
||
relatively large cell size, frequencies are likely to be stable over the
|
||
average life of a call. In his remarks, Senator Leahy stated that the
|
||
ECPA was needed to help the cellular industry get off the ground, and that
|
||
the American people and American business wanted the ECPA. A more
|
||
emotional defense was made by John Stanton, Executive VP of McCaw
|
||
Communications, who stated "The inhibition of the growth of cellular
|
||
technology and paging technology, forced by the lack of privacy, is
|
||
unfair."
|
||
|
||
Law enforcement interests and businesses were also in favor of the bill.
|
||
In 1986, the nation was just becoming aware of the threat posed by computer
|
||
crime, and the need for laws allowing prosecution of perpetrators. The
|
||
ECPA was therefore viewed by elements of law enforcement and business as a
|
||
vehicle for criminalizing the act of breaking into computers. Businesses
|
||
such as GTE Telenet, EDS, and Chase Manhattan thus supported the ECPA as a
|
||
computer crime bill. Telephone companies such as AT&T even attempted to
|
||
tack on additional computer crime provisions covering breaking into to
|
||
their switching equipment.
|
||
|
||
In retrospect, the preoccupation with computer crime distorted evaluations
|
||
of the ECPA. Computer crime was more effectively addressed by state penal
|
||
code revisions such as California Penal Code Section 502 - Computer Crime,
|
||
and Section 499c - Trade Secrets. The purpose of ECPA was to insure
|
||
privacy rather than to define the criminal uses of computers.
|
||
|
||
The cellular industry had no such illusions. Mr. Philip Quigley, CEO of
|
||
pacTel Mobil Co. described the economic benefits of ECPA by noting that
|
||
without legislation, "defending the right (to privacy) could take years of
|
||
litigation." "Individuals can use scanning devices today... (it is our
|
||
intent) to merely excise out... the capability that exists today to zone in
|
||
on the channels and the frequencies that are associated with cellular
|
||
telephony." Without the ECPA, the industry would have faced incorporation
|
||
of expensive encryption technology into their systems. For example, John
|
||
Stanton of McCaw testified that "Encryption devices make it difficult to
|
||
roam from system to system," generated scratchy sound, and required 30%
|
||
more investment for the base unit, and 100% for the phone. Mr. Colgan's
|
||
estimated high grade commercial encryption as costing $40 for the
|
||
encryption chip (quantity one), plus associated circuitry . In either
|
||
case, the net cost for several million subscribers was estimated in the
|
||
tens if not hundreds of millions of dollars.
|
||
|
||
Industry associations such as ADAPSO pointed out the trade benefits of the
|
||
legislation, since Asia had not developed privacy protection, although
|
||
Europe had done so. John Stanton of McCaw commented that if the U.S.
|
||
passed the ECPA, then it would enjoy superior communications privacy to
|
||
that available in Europe.
|
||
|
||
Representatives of the nation's amateur radio enthusiasts were among the
|
||
staunchest opponents of the bill. Richard Colgan of the Association of
|
||
North American Radio Clubs represented their position. "While we have no
|
||
animosity towards cellular, we cannot sit idly by while they use their
|
||
influence to make dubious changes in public policy, largely to benefit
|
||
their bottom lines..." In response to the concerns of amateur radio
|
||
enthusiasts, and scanner manufacturers, the interception standard was
|
||
changed from "willful" to "intentional," so as to allow for "inadvertent"
|
||
interceptions.
|
||
|
||
Manufacturers of scanning equipment were vigorously opposed to ECPA since
|
||
the use of their devices was restricted by the act. Richard Brown of
|
||
Regency Electronics, a manufacturer of radio band scanners, argued
|
||
cellular radio licensees have never had any expectation of privacy, that
|
||
cellular operators, not the public, should bear the burden of securing
|
||
cellular communications, and that protecting specific radio frequencies was
|
||
imprudent.
|
||
|
||
This last point deserves elaboration. Under ECPA, monitoring of cordless
|
||
phone frequencies is not prohibited, although it is hard to argue that the
|
||
average individual's "expectation of privacy" is any different for a
|
||
cordless phone than it would be for a cellular phone. In fact, an
|
||
educated individual might even expect less privacy for a cellular call,
|
||
argued Richard Colgan, because the range of cellular communications is so
|
||
much larger than for cordless phones, thus making interception easier.
|
||
|
||
Among the most careful analyst of the ECPA was the U.S. Department of
|
||
Justice, as represented by James Knapp, deputy assistant attorney general
|
||
of the criminal division. Knapp concurred with the Amateur Radio
|
||
enthusiasts that cellular and cordless phone technology, as well as tone
|
||
and voice pagers, were easily intercepted, and therefore could not presume
|
||
an "expectation of privacy." Knapp also expressed skepticism about the
|
||
wisdom of criminalizing hobbyist behavior. Knapp was however in favor of
|
||
extending coverage to electronic mail. Finally, he argued for extension of
|
||
the crimes for which wire tapping could be authorized, beyond those
|
||
enumerated in Title III. This suggested modification to the act was
|
||
subsequently incorporated.
|
||
|
||
In contrast to the detailed arguments submitted by the parties discussed
|
||
above, the one page letter submitted by The Source had a minor impact at
|
||
best, suggesting that the ECPA, by not preempting state statutes, could
|
||
expose the online service industry to an entangling web of federal and
|
||
state statutes.
|
||
|
||
Analysis of the Economic Effects of ECPA
|
||
|
||
The parts of ECPA which have ramifications for online services and hobbyist
|
||
bulletin boards mostly have to do with access to stored messages. While
|
||
access to services are often offered via a packet switching network, or
|
||
could even be achieved via use of cellular modems or other radio
|
||
transmissions, worries about the privacy of such access are not likely to
|
||
be major concerns of customers.
|
||
|
||
An important aspect of ECPA is the presence of both criminal and civil
|
||
penalties. This provides an important incentive for aggrieved parties to
|
||
pursue litigation through contingency fee arrangements. The implications
|
||
of this for the online service business are serious. For example, the fee
|
||
for sending an EasyPlex message on Compuserve is on the order of a few
|
||
dollars, depending on the time spent in composing the message. For that
|
||
fee, Compuserve takes on the responsibility of not disclosing the message,
|
||
which could conceivably be worth millions to the sender and intended
|
||
recipient.
|
||
|
||
|
||
Firms Submitting Opinions on H.R. 3378
|
||
|
||
|
||
Phone Companies
|
||
|
||
Southwestern Bell
|
||
AT&T
|
||
Ameritech
|
||
Pacific Telesis
|
||
Bell South
|
||
Northwestern Bell
|
||
United States
|
||
Telephone Assoc.
|
||
|
||
Radio
|
||
|
||
Association of North American Radio Clubs
|
||
American Radio Relay League
|
||
National Association of Business & Educational Radio
|
||
|
||
Cellular
|
||
|
||
PacTel Mobile
|
||
McCaw Communications
|
||
Motorola
|
||
Centel
|
||
|
||
Hobbyists
|
||
|
||
|
||
Communications
|
||
|
||
Packet Switching
|
||
|
||
GTE Telenet
|
||
|
||
Misc. Associations
|
||
|
||
Electronic Mail Association
|
||
ADAPSO
|
||
National Assoc. of Manufacturers
|
||
Assoc. of American Railroads
|
||
IEEE
|
||
|
||
Paging
|
||
|
||
Telocator Network
|
||
|
||
Computers
|
||
|
||
Tandy
|
||
|
||
Law Enforcement
|
||
|
||
U.S. Dept. of Justice
|
||
|
||
Online Services
|
||
|
||
The Source
|
||
|
||
Citizen's Groups
|
||
|
||
ACLU
|
||
Consumer's Union
|
||
|
||
|
||
Firms with Private Networks
|
||
|
||
Chase Manhattan
|
||
EDS
|
||
|
||
Scanner Manufacturers
|
||
|
||
Dynascan
|
||
Regency Electronics
|
||
Uniden
|
||
|
||
Credit Bureaus
|
||
|
||
American Credit Services
|
||
|
||
Broadcasters
|
||
|
||
National Assoc. of Broadcasters
|
||
Radio-TV News Directors Association
|
||
Satellite TV Industry Association
|
||
CBS
|
||
|
||
|
||
Source: Hearings, Committee on the Judiciary, House of
|
||
Representatives, H.R. 3378, ECPA, 99th Congress, No. 50, 1986.
|
||
|
||
Of course, this burden is not theirs alone. Operators of corporate
|
||
communications systems (who were big supporters of ECPA) are also
|
||
likely targets. Indeed, several ECPA suits against employers and
|
||
municipalities have recently been filed. The potential for
|
||
litigation also exists for hobbyist systems such as computer
|
||
bulletin boards.
|
||
|
||
Government regulations fit into two categories: economic
|
||
regulation, and social regulation. In the economic category are
|
||
price controls on crude oil, and tarriffs. Equal opportunity
|
||
legislation is a regulation of the social type. The cost of a
|
||
social regulation can be broken down into two parts. One is the
|
||
cost of complying with the regulation, either by modification of
|
||
business practices, or payment of imposed penalties; another is
|
||
the cost of resolving ambiguities in the legislation through
|
||
establishment of case law. In the case of ECPA, reflection
|
||
discloses that the establishment of precedent is likely to be the
|
||
more expensive than compliance. For example, for a service to
|
||
modify sysop access privileges, and to introduce encryption of
|
||
private mail and passwords would probably entail an expenditure on
|
||
the order of a few million dollars for software development and
|
||
testing. In contrast, were only 0.01% of Compuserve's
|
||
subscribers to file an ECPA lawsuit, given 500,000 subscribers, and
|
||
average legal fees and penalties per case of $100,000, the bill
|
||
would come to over $10 million.
|
||
|
||
Due to its concentration on cellular industry concerns, the ECPA
|
||
concentrates more on insuring privacy for users than on limiting
|
||
the responsibilities of providers. Due to differences between
|
||
messages in transit and stored messages, cellular firms end up
|
||
forcing the costs of privacy onto hobbyists and outsiders, while
|
||
providers of online services are forced to bear these costs
|
||
themselves. In view of the potentially horrendous litigation
|
||
burdens, there is a strong incentive to limit the ability of
|
||
system administrators to read or disclose private mail.
|
||
|
||
The key to complying with the act is the notion of "expectations of
|
||
privacy." This notion governs both the legal aspects of ECPA, and
|
||
determinants of end user satisfaction. Under the ECPA, privacy is
|
||
only enforced for systems in which users were lead to "expect
|
||
privacy." Thus a sysop has two alternatives: to explicitly address
|
||
those expectations via an education campaign, or to play a game
|
||
similar to the cellular industry, in denying that privacy is a
|
||
significant issue. One of the concerns voiced by the cellular
|
||
industry in backing ECPA was that their budding industry could ill
|
||
afford the cost of solidifying the right to privacy via litigation
|
||
or adoption of encryption technology. Yet that is precisely the
|
||
course that the ECPA has forced on the online service industry.
|
||
Nor were the concerns of a budding industry entirely genuine.
|
||
Within the next two years, the revenues of cellular communication
|
||
firms will exceed those of all the participants in the information
|
||
services industry.
|
||
|
||
Bibliography
|
||
|
||
1. Electronic Communications Privacy Act of 1986, Public Law
|
||
99-508, 99th Congress, 2nd session.
|
||
|
||
2. Hearings of the Committee on the Judiciary, House of
|
||
Representatives, H.R. 3378, Electronic Communications Privacy Act,
|
||
99th Congress, No. 50, 1986.
|
||
|
||
3. California Penal Code, Section 502, Computer Crime, 502.7
|
||
Obtaining telephone or telegraph services by fraud, 499c, trade
|
||
secrets.
|
||
|
||
4. Wallace, Jonathan, and Lance Rose, SYSLAW, L.L.M Press, New
|
||
York City, 1990
|
||
|
||
********************************************************************
|
||
>> END OF THIS FILE <<
|
||
***************************************************************************
|
||
|
||
------------------------------
|
||
|
||
From: Various
|
||
Subject: The CU in the News
|
||
Date: January, 1991
|
||
|
||
********************************************************************
|
||
*** CuD #3.04, File 4 of 4: The CU in the News ***
|
||
********************************************************************
|
||
|
||
Subject: Lotus Drops Suit
|
||
From: Anonymous
|
||
Date: Sun, 24 Jan 91 01:21:00 EST
|
||
|
||
From: New York Times, January 24, 1991, p. C3 (By Lawrence M. Fisher)
|
||
|
||
SAN FRANCISCO, Jan. 23 - The Lotus Development Corporation and Equifax Inc.
|
||
said today that they had canceled plans to sell a database of names,
|
||
addresses and marketing information on 120 million United States consumers.
|
||
|
||
The companies said their decision came after they had received 30,000 calls
|
||
and letters from individuals wishing to have their names and personal
|
||
information deleted from the database. The companies said they believed the
|
||
public misunderstood the product and that the costs of addressing privacy
|
||
concerns had made Marketplace:Households no longer viable.
|
||
|
||
Lotus will also discontinue Market-lace:Business, a similar product with
|
||
information on seven million United States businesses, which began shipment
|
||
in October. Mr. Manzi said the business product was not viable without the
|
||
revenues from the consumer version."
|
||
|
||
+++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
||
From: cdp!mrotenberg@labrea.stanford.edu
|
||
Subject: CPSR FOIA Suits Seeks Gov't Computer Policy
|
||
Date: Sun, 13 Jan 91 19:20:35 PST
|
||
|
||
PRESS RELEASE
|
||
Release: Friday, 1/4/91
|
||
|
||
CPSR Washington Office, 1025 Connecticut Ave., NW, Washington
|
||
DC 20036
|
||
|
||
For more information:
|
||
|
||
David Sobel
|
||
Marc Rotenberg 202/775-1588
|
||
|
||
LAWSUIT SEEKS BUSH DIRECTIVE ON COMPUTER SECURITY
|
||
|
||
WASHINGTON - Computer Professionals for Social Responsibility ("CPSR") filed
|
||
a lawsuit in Federal District Court today to obtain a classified government
|
||
directive on computer security.
|
||
|
||
The document at issue was signed by President Bush on July 5, 1990. It is
|
||
intended to replace a controversial security policy signed by President
|
||
Reagan in 1984. The Reagan policy, designated "NSDD 145," put the
|
||
super-secret National Security Agency ("NSA") in charge of computer
|
||
security, raising concerns about government secrecy. Congress sought to
|
||
limit NSA's role through passage of the Computer Security Act of 1987, which
|
||
transferred responsibility for federal computer security to the National
|
||
Institute for Standards and Technology, a civilian agency.
|
||
|
||
The administration contends that the revised directive complies with the
|
||
Computer Security Act, but so far has released to the public only an
|
||
unclassified summary of the new directive. According to Marc Rotenberg,
|
||
Director of CPSR's Washington Office, "Computer security policy should not
|
||
be made behind closed doors or through the issuance of classified
|
||
directives. At a time when computer technology touches every aspect of our
|
||
lives, it is essential that the public be fully informed about our
|
||
government's policy."
|
||
|
||
CPSR first requested a copy of the revised directive from the Defense
|
||
Department under the Freedom of Information Act last August. The
|
||
organization also sought a copy from the National Security Council the
|
||
following month. To date, neither agency has responded to CPSR's requests.
|
||
|
||
The Freedom of Information Act provides a legal right for individuals to
|
||
obtain records held by government agencies. According to CPSR Legal Counsel
|
||
David Sobel, "Agencies are required to respond to requests within ten
|
||
working days. When agencies fail to respond within a reasonable period of
|
||
time, requesters often begin legal proceedings to obtain the information."
|
||
|
||
CPSR is a national membership organization of computer scientists. Its
|
||
membership includes a Nobel Laureate and four recipients of the Turing
|
||
Award, the highest honor in computer science. CPSR has prepared reports and
|
||
presented testimony on computer technology issues, including NSDD 145, at
|
||
the request of Congressional committees.
|
||
|
||
The case is CPSR v. National Security Council, et al., Civil Action No.
|
||
91-_____, U.S. District Court for the District of Columbia, January 4, 1991.
|
||
|
||
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
||
From: well!mercury@APPLE.COM(Michael Edward Marotta)
|
||
Subject: Thoughts on the Bill of Rights
|
||
Date: Tue, 22 Jan 91 21:52:34 pst
|
||
|
||
GRID News. vol 2 nu 2. January 23, 1991.
|
||
World GRID Association, P. O. Box 15061, Lansing, MI 48901 USA
|
||
--------------------------------------------------------------------
|
||
"The Bill of Rights" by Michael E. Marotta. (54 lines)
|
||
|
||
When agents of the US Secret Service raided publishers in 1990 while chasing
|
||
The Legion of Doom, they demonstrated that the paradigms of cyberspace are
|
||
not well understood. Therefore, identifiers must be used to show that this
|
||
activity is protected by the Bill of Rights.
|
||
|
||
Copyright notices are one identifier. A copyright is earned whenever an
|
||
idea achieves physical expression or "realization". Two copies of the
|
||
publication (or two photographs of a work of art) are send to the Library of
|
||
Congress along with a registration fee. Books, sound recordings, and films
|
||
may be copyrighted. A copyright can be given to the mass production of a
|
||
work in the public domain, such as the Bible. You could write out by hand
|
||
an original poem, send two xeroxes to the Library of Congress (along with
|
||
the registration fee) and earn a copyright on your work.
|
||
|
||
When the United States joined the Berne Convention in December of 1988
|
||
(effective March 1, 1989), life became easier --- perhaps too easy. By
|
||
default, every realization is automatically copyrighted to the creator,
|
||
whether or not copies are sent to the Library of Congress. A copyright
|
||
notice on the login screen announces that the BBS contains works of
|
||
non-fiction, fiction, art or other production that are protected by the
|
||
First Amendment.
|
||
|
||
The First Amendment also promises that the People have the right to
|
||
PEACEABLY ASSEMBLE to seek redress of grievances against the government. A
|
||
BBS is an assembly and can host assemblies. The Supreme Court has often and
|
||
consistently shown that this right to peaceably assemble is also the right
|
||
to association.
|
||
|
||
Most BBSes support message bases. Discussions on religion are specially
|
||
protected by the First Amendment.
|
||
|
||
The Bill of Rights contains two purposely broad articles, the Ninth and
|
||
Tenth. The Ninth Amendment says that there are more rights than the ones
|
||
listed in the Bill of Rights. The Tenth Amendment limits the federal
|
||
government to its enumerated powers and gives all other powers to the States
|
||
(except where prohibited) or to the People (apparently without special
|
||
reservation or stipulation). For instance, without stretching the meaning
|
||
of "religion" or requiring that we photograph blackboards, it is strongly
|
||
argued that there is a Right to Scientific Inquiry. This strongly
|
||
assertable right protects experiments with encryption algorithms.
|
||
|
||
There may be a Right to Travel. This would extend to the lawful use of
|
||
communication systems to "visit" a computer, whether or not you actually
|
||
"enter" the computer. (Internet syntax tolerates users who chat though not
|
||
logged in.)
|
||
|
||
To the extent that a computer is a weapon, its ownership is protected under
|
||
the Second Amendment. Indeed, when Saddam Hussein's storm troopers rolled
|
||
into Kuwait, "Hack Iraq" messages appeared on some systems.
|
||
|
||
The Bill of Rights is your Best Friend. Sleep with it.
|
||
|
||
********************************************************************
|
||
|
||
------------------------------
|
||
|
||
**END OF CuD #3.04**
|
||
********************************************************************
|
||
|
||
|
||
|