957 lines
44 KiB
Plaintext
957 lines
44 KiB
Plaintext
|
||
|
||
Computer underground Digest Sun Oct 10 1993 Volume 5 : Issue 79
|
||
ISSN 1004-042X
|
||
|
||
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
||
Archivist: Brendan Kehoe
|
||
Shadow-Archivists: Dan Carosone / Paul Southworth
|
||
Ralph Sims / Jyrki Kuoppala
|
||
Ian Dickinson
|
||
Copie Editor: Etaoin Shrdlu, III
|
||
|
||
CONTENTS, #5.79 (Oct 10 1993)
|
||
File 1--FOIA Releases 10-4-93
|
||
File 2--CPSR Key Escrow Comments
|
||
File 3--Sea Joins the Encryption Game
|
||
File 4--ITAR and export regulations
|
||
File 5--Sexual harassment via computers (newspaper article).
|
||
File 6--The Net and Netizens (Paper)
|
||
File 7--E-mail Announcements From O'Reilly & Associates
|
||
File 8--A Few More CuD-Carrying BBSes
|
||
File 9--Survey: what harassment _is_ there on the Net?
|
||
|
||
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
||
available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
|
||
editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
||
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
||
60115.
|
||
|
||
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
||
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
||
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
||
libraries and in the VIRUS/SECURITY library; from America Online in
|
||
the PC Telecom forum under "computing newsletters;"
|
||
On Delphi in the General Discussion database of the Internet SIG;
|
||
on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
|
||
WHQ) (203) 832-8441 NUP:Conspiracy; RIPCO BBS (312) 528-5020
|
||
CuD is also available via Fidonet File Request from 1:11/70; unlisted
|
||
nodes and points welcome.
|
||
EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
|
||
In ITALY: Bits against the Empire BBS: +39-461-980493
|
||
|
||
ANONYMOUS FTP SITES:
|
||
AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
|
||
EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
|
||
UNITED STATES:
|
||
aql.gatech.edu (128.61.10.53) in /pub/eff/cud
|
||
etext.archive.umich.edu (141.211.164.18) in /pub/CuD/cud
|
||
ftp.eff.org (192.88.144.4) in /pub/cud
|
||
halcyon.com( 202.135.191.2) in /pub/mirror/cud
|
||
ftp.warwick.ac.uk in pub/cud (United Kingdom)
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted for non-profit as long
|
||
as the source is cited. Authors hold a presumptive copyright, and
|
||
they should be contacted for reprint permission. It is assumed that
|
||
non-personal mail to the moderators may be reprinted unless otherwise
|
||
specified. Readers are encouraged to submit reasoned articles
|
||
relating to computer culture and communication. Articles are
|
||
preferred to short responses. Please avoid quoting previous posts
|
||
unless absolutely necessary.
|
||
|
||
DISCLAIMER: The views represented herein do not necessarily represent
|
||
the views of the moderators. Digest contributors assume all
|
||
responsibility for ensuring that articles submitted do not
|
||
violate copyright protections.
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
Date: Tue, 5 Oct 1993 15:58-0400
|
||
From: The White House <75300.3115@COMPUSERVE.COM>
|
||
Subject: File 1--FOIA Releases 10-4-93
|
||
|
||
Clinton Memorandum on Administration of Freedom of Information Act
|
||
|
||
Contact: The White House, Office of the Press Secretary,
|
||
202-456-2100
|
||
|
||
Oct. 4, 1993
|
||
|
||
MEMORANDUM FOR HEADS OF DEPARTMENTS AND AGENCIES
|
||
|
||
SUBJECT: The Freedom of Information Act
|
||
|
||
I am writing to call your attention to a subject that is of great
|
||
importance to the American public and to all Federal departments and
|
||
agencies -- the administration of the Freedom of Information Act, as
|
||
amended (the "Act"). The Act is a vital part of the participatory
|
||
system of government. I am committed to enhancing its effectiveness
|
||
in my Administration.
|
||
|
||
For more than a quarter century now, the Freedom of Information
|
||
Act has played a unique role in strengthening our democratic form of
|
||
government. The statute was enacted based upon the fundamental
|
||
principle that an informed citizenry is essential to the democratic
|
||
process and that the more the American people know about their
|
||
government the better they will be governed. Openness in government
|
||
is essential to accountability and the Act has become an integral
|
||
part of that process.
|
||
|
||
The Freedom of Information Act, moreover, has been one of the
|
||
primary means by which members of the public inform themselves about
|
||
their government. As Vice President Gore made clear in the National
|
||
Performance Review, the American people are the Federal Government's
|
||
customers. Federal departments and agencies should handle requests
|
||
for information in a customer-friendly manner. The use of the Act by
|
||
ordinary citizens is not complicated, nor should it be. The
|
||
existence of unnecessary bureaucratic hurdles has no place in its
|
||
implementation.
|
||
|
||
I therefore call upon all Federal departments and agencies to
|
||
renew their commitment to the Freedom of Information Act, to its
|
||
underlying principles of government openness, and to its sound
|
||
administration. This is an appropriate time for all agencies to take
|
||
a fresh look at their administration of the Act, to reduce backlogs
|
||
of Freedom of Information Act requests, and to conform agency
|
||
practice to the new litigation guidance issued by the Attorney
|
||
General, which is attached.
|
||
|
||
Further, I remind agencies that our commitment to openness
|
||
requires more than merely responding to requests from the public.
|
||
Each agency has a responsibility to distribute information on its own
|
||
initiative, and to enhance public access through the use of
|
||
electronic information systems. Taking these steps will ensure
|
||
compliance with both the letter and spirit of the Act.
|
||
|
||
(s) William J. Clinton
|
||
|
||
------
|
||
|
||
Oct. 4, 1993
|
||
|
||
MEMORANDUM FOR HEADS OF DEPARTMENTS AND AGENCIES
|
||
|
||
Subject--The Freedom of Information Act
|
||
|
||
President Clinton has asked each Federal department and agency to
|
||
take steps to ensure it is in compliance with both the letter and the
|
||
spirit of the Freedom of Information Act (FOIA), 5 U.S.C. 552. The
|
||
Department of Justice is fully committed to this directive and stands
|
||
ready to assist all agencies as we implement this new policy.
|
||
|
||
First and foremost, we must ensure that the principle of openness
|
||
in government is applied in each and every disclosure and
|
||
nondisclosure decision that is required under the Act. Therefore, I
|
||
hereby rescind the Department of Justice's 1981 guidelines for the
|
||
defense of agency action in Freedom of Information Act litigation.
|
||
The Department will no longer defend an agency's withholding of
|
||
information merely because there is a "substantial legal basis" for
|
||
doing so. Rather, in determining whether or not to defend a
|
||
nondisclosure decision, we will apply a presumption of disclosure.
|
||
|
||
To be sure, the Act accommodates, through its exemption structure,
|
||
the countervailing interests that can exist in both disclosure and
|
||
nondisclosure of government information. Yet while the Act's
|
||
exceptions are designed to guard against harm to governmental and
|
||
private interests, I firmly believe that these exemptions are best
|
||
applied with specific reference to such harm, and only after
|
||
consideration of the reasonably expected consequences of disclosure
|
||
in each particular case.
|
||
|
||
In short, it shall be the policy of the U.S. Department of Justice
|
||
to defend the assertion of a FOIA exemption only in those cases where
|
||
the agency reasonably foresees that disclosure would be harmful to an
|
||
interest protected by that exemption. Where an item of information
|
||
might technically or arguably fall within an exemption, it ought not
|
||
to be withheld from a FOIA requester unless it need be.
|
||
|
||
It is my belief that this change in policy serves the public
|
||
interest by achieving the Act's primary objective -- maximum
|
||
responsible disclosure of government information -- while preserving
|
||
essential confidentiality. Accordingly, I strongly encourage your
|
||
FOIA officers to make "discretionary disclosures" whenever possible
|
||
under the Act. Such disclosures are possible under a number of FOIA
|
||
exemptions, especially when only a governmental interest would be
|
||
affected. The exemptions and opportunities for "discretionary
|
||
disclosures" are discussed in the Discretionary Disclosure and Waiver
|
||
section of the "Justice Department Guide to the Freedom of
|
||
Information Act." As that discussion points out, agencies can make
|
||
discretionary FOIA disclosures as a matter of good public policy
|
||
without concern for future "waiver consequences" for similar
|
||
information. Such disclosures can also readily satisfy an agency's
|
||
"reasonable segregation" obligation under the Act in connection with
|
||
marginally exempt information, see 5 U.S.C. 552(b), and can lessen an
|
||
agency's administrative burden at all levels of the administrative
|
||
process and in litigation. I note that this policy is not intended
|
||
to create any substantive or procedural rights enforceable at law.
|
||
|
||
In connection with the repeal of the 1981 guidelines, I am
|
||
requesting that the Assistant Attorneys General for the Department's
|
||
Civil and Tax Divisions, as well as the United States Attorneys,
|
||
undertake a review of the merits of all pending FOIA cases handled by
|
||
them, according to the standards set forth above. The Department's
|
||
litigating attorneys will strive to work closely with your general
|
||
counsels and their litigation staffs to implement this new policy on
|
||
a case-by-case basis. The Department's office of Information and
|
||
Privacy can also be called upon for assistance in this process, as
|
||
well as for policy guidance to agency FOIA officers.
|
||
|
||
In addition, at the Department of Justice we are undertaking a
|
||
complete review and revision of our regulations implementing the
|
||
FOIA, all related regulations pertaining to the Privacy Act of 1974,
|
||
5 U.S.C. 552a, as well as the Department's disclosure policies
|
||
generally. We are also planning to conduct a Department-wide "FOIA
|
||
Form Review." Envisioned is a comprehensive review of all standard
|
||
FOIA forms and correspondence utilized by the Justice Department's
|
||
various components. These items will be reviewed for their
|
||
correctness, completeness, consistency and particularly for their use
|
||
of clear language. As we conduct this review, we will be especially
|
||
mindful that FOIA requesters are users of a government service,
|
||
participants in an administrative process, and constituents of our
|
||
democratic society. I encourage you to do likewise at your
|
||
departments and agencies.
|
||
|
||
Finally, I would like to take this opportunity to raise with you
|
||
the longstanding problem of administrative backlogs under the Freedom
|
||
of Information Act. Many Federal departments and agencies are often
|
||
unable to meet the Act's ten-day time limit for processing FOIA
|
||
requests, and some agencies -- especially those dealing with
|
||
high-volume demands for particularly sensitive records -- maintain
|
||
large FOIA backlogs greatly exceeding the mandated time period. The
|
||
reasons for this may vary, but principally it appears to be a problem
|
||
of too few resources in the face of too heavy a workload. This is a
|
||
serious problem -- one of growing concern and frustration to both
|
||
FOIA requesters and Congress, and to agency FOIA officers as well.
|
||
|
||
It is my hope that we can work constructively together, with
|
||
Congress and the FOIA-requester community, to reduce backlogs during
|
||
the coming year. To ensure that we have a clear and current
|
||
understanding of the situation, I am requesting that each of you send
|
||
to the Department's Office of Information and Privacy a copy of your
|
||
agency's Annual FOIA Report to Congress for 1992. Please include
|
||
with this report a letter describing the extent of any present FOIA
|
||
backlog, FOIA staffing difficulties and any other observations in
|
||
this regard that you believe would be helpful.
|
||
|
||
In closing, I want to reemphasize the importance of our
|
||
cooperative efforts in this area. The American public's
|
||
understanding of the workings of its government is a cornerstone of
|
||
our democracy. The Department of Justice stands prepared to assist
|
||
all federal agencies as we make government throughout the executive
|
||
branch more open, more responsive, and more accountable.
|
||
|
||
/s/ Janet Reno
|
||
|
||
------------------------------
|
||
|
||
From: David Sobel <dsobel@WASHOFC.CPSR.ORG>
|
||
Date: Tue, 5 Oct 1993 16:51:12 EST
|
||
Subject: File 2--CPSR Key Escrow Comments
|
||
|
||
CPSR Key Escrow Comments
|
||
|
||
|
||
September 27, 1993
|
||
|
||
Director, Computer Systems Laboratory
|
||
ATTN: Proposed FIPS for Escrowed Encryption Standard
|
||
Technology Building, Room B-154
|
||
National Institute of Standards and Technology
|
||
Gaithersburg, MD 20899
|
||
|
||
Re: Request for Comments; Docket No. 930659-3159
|
||
|
||
This letter constitutes the formal comments of Computer
|
||
Professionals for Social Responsibility (CPSR) on the proposed
|
||
Federal Information Processing Standard for an Escrowed Encryption
|
||
Standard (EES), as described in the Federal Register on July 30,
|
||
1993 (58 FR 40791). CPSR, a national organization of
|
||
professionals in the computing field, has a long-standing interest
|
||
in government policies concerning cryptography and computer
|
||
security. During the past several years we have pursued an
|
||
extensive study of cryptography policy in the United States. We
|
||
have organized several public conferences, conducted litigation
|
||
under the Freedom of Information Act, and appeared on a number of
|
||
panels to discuss the importance of cryptography for privacy
|
||
protection and the need to scrutinize carefully government
|
||
proposals designed to limit the use of this technology. While we
|
||
do not represent any particular computer company or trade
|
||
association, we do speak for a great many people in the computer
|
||
profession who value privacy and are concerned about the
|
||
government's key escrow initiative.
|
||
|
||
To properly evaluate the key escrow proposal, it is necessary
|
||
to consider the Computer Security Act of 1987, which made clear
|
||
Congress' intent that in the area of unclassified computing
|
||
systems NIST -- and not the National Security Agency (NSA) --
|
||
would be responsible for the development of technical standards.
|
||
The Act emphasizes public accountability and stresses open
|
||
decision-making.
|
||
|
||
In the spirit of the Act, NIST set out in 1989 to develop a
|
||
public key cryptography standard. According to documents obtained
|
||
by CPSR through the Freedom of Information Act (FOIA), NIST
|
||
recommended that the algorithm be "public, unclassified,
|
||
implementable in both hardware or software, usable by federal
|
||
Agencies and U.S. based multi-national corporations." However,
|
||
the key escrow proposal and the proposed Clipper and Capstone
|
||
configurations are quite different: the underlying Skipjack
|
||
algorithm is classified; public access to the reasons behind the
|
||
proposal is restricted; Skipjack can be implemented only in
|
||
tamper-proof hardware; the key escrow system is unlikely to be
|
||
used by multi-national corporations; and the security of the
|
||
algorithm remains unproved.
|
||
|
||
The key escrow proposal undermines the central purpose of the
|
||
Computer Security Act and conflicts with the goals NIST itself
|
||
articulated in 1989. The most significant deficiencies of the
|
||
proposal are set forth below.
|
||
|
||
* The potential risks of the proposal have not been assessed
|
||
and many questions about the implementation remain unanswered.
|
||
The Federal Register notice states that the current proposal "does
|
||
not include identification of key escrow agents who will hold the
|
||
keys for the key escrow microcircuits or the procedures for access
|
||
to the keys." In a recent briefing for Congressional staffers,
|
||
however, Justice Department representatives indicated that NIST
|
||
and a "non-law enforcement" component of the Treasury Department
|
||
will be designated as the escrow agents. Such an arrangement
|
||
would be cause for serious concern and would not constitute a true
|
||
"escrow" system. As described in the Federal Register notice,
|
||
|
||
To escrow something (e.g., a document, an encryption
|
||
key) means that it is "delivered to a third person to be
|
||
given to the grantee only upon the fulfillment of a
|
||
condition" (Webster's Seventh New Collegiate
|
||
Dictionary). A key escrow system is one that entrusts
|
||
components of a key used to encrypt telecommunications
|
||
to third persons, called key component escrow agents.
|
||
|
||
It is, we submit, disingenuous to apply the word "escrow" to
|
||
an arrangement whereby two components of the Executive branch
|
||
(NIST and Treasury) would be providing cryptographic keys to
|
||
another component of the Executive branch (a law enforcement
|
||
agency). By any stretch of the imagination, such a system would
|
||
lack the "third party" that is an integral part of any true escrow
|
||
system.
|
||
|
||
Notwithstanding the identity of the escrow agents, the
|
||
proposed key escrow configuration may also create a dangerous
|
||
vulnerability in the nation's communications networks. The risks
|
||
of misuse of this feature greatly outweigh any perceived benefit.
|
||
|
||
* The Federal Register notice states that the escrow agents
|
||
will provide the key components to a government agency that
|
||
"properly demonstrates legal authorization to conduct electronic
|
||
surveillance of communications which are encrypted." The crucial
|
||
term "legal authorization" has not been defined. The vagueness of
|
||
the term leaves open the possibility that court-issued warrants
|
||
may not be required in some circumstances. Indeed, in NIST's
|
||
letter of invitation to the five experts who were selected to
|
||
evaluate the Skipjack algorithm (recently released to CPSR under
|
||
the FOIA), the agency describes the escrow system and states that
|
||
the key components will be made available "only to authorized
|
||
government officials under proper legal authorizations, usually a
|
||
court order." Network users cannot be expected to embrace a
|
||
communications security system that -- in the words of the agency
|
||
proposing the system -- will "usually" require a court order
|
||
before the privacy of a communication is compromised. Those
|
||
circumstances in which judicial warrants will not be required must
|
||
be precisely and unambiguously described before any meaningful
|
||
public debate of the proposal can proceed.
|
||
|
||
* The classification of the Skipjack algorithm as a "national
|
||
security" matter is inappropriate for technology that will be used
|
||
primarily in civilian and commercial applications. Classification
|
||
of such technical information limits the computing community's
|
||
ability to evaluate fully the proposal and the general public's
|
||
right to know about the activities of government in this vitally
|
||
important area. CPSR has initiated litigation in federal district
|
||
court challenging NSA's failure to disclose information relevant
|
||
to the key escrow system. CPSR v. NSA, et al., Civil Action No.
|
||
93-1074 (D.D.C.). NSA recently requested a one-year delay in
|
||
those judicial proceedings. We submit that complete and
|
||
meaningful public comment on the key escrow proposal is impossible
|
||
until all relevant documentation has been made available for
|
||
public review.
|
||
|
||
* The key escrow proposal was not developed in response to a
|
||
public concern or a request from industry. It was put forward by
|
||
the National Security Agency and the Federal Bureau of
|
||
Investigation so that those two agencies could more easily conduct
|
||
surveillance of electronic communications. It has not been
|
||
established that such surveillance is necessary for crime
|
||
prevention. The number of arrests resulting from wiretaps has
|
||
remained essentially unchanged since the federal wiretap law was
|
||
enacted in 1968. Likewise, it has not been demonstrated that the
|
||
use of encryption technology has in any way hampered the ability
|
||
of law enforcement agencies to execute court-ordered electronic
|
||
surveillance warrants.
|
||
|
||
* Adoption of the proposed key escrow standard would have an
|
||
adverse impact upon the ability of U.S. manufacturers to market
|
||
cryptographic products abroad. It is unlikely that non-U.S. users
|
||
would purchase communication security products to which the U.S.
|
||
government holds keys. The key escrow proposal is the most recent
|
||
manifestation of the government's outdated and unrealistic attempt
|
||
to "control" the dissemination of emerging information
|
||
technologies, often to the detriment of American developers and
|
||
innovators. In a recent letter to the President, a bi-partisan
|
||
group of Congressmen (including Majority Leader Gephardt and
|
||
Minority Whip Gingrich) noted the folly of this course:
|
||
|
||
Encrypted mass market software has been subject
|
||
to ... outdated controls. Mass market software is
|
||
available from foreign manufacturers and distributors
|
||
and is easily transmitted using only a long distance
|
||
telephone line and a modem. Yet, the United States
|
||
continues to control this computer software as a
|
||
Munitions List item.
|
||
|
||
It is difficult to understand the utility of
|
||
controlling such equipment and technology when it is
|
||
so easily available to those from whom we are trying to
|
||
keep it. Yet, by imposing controls, we are limiting the
|
||
ability of American businesses to export some of their
|
||
most marketable items. As a result, we are losing our
|
||
competitive edge in these areas.
|
||
|
||
|
||
* * *
|
||
|
||
|
||
In summary, we believe the key escrow proposal is an ill-
|
||
conceived and futile attempt to control the development and wide
|
||
dissemination of effective, privacy-enhancing encryption
|
||
technology. The proposal was spawned by highly dubious and
|
||
unproven "law enforcement" assertions and, if adopted, would
|
||
create unacceptable vulnerabilities in our information infra-
|
||
structure. Network users have a right to secure and effective
|
||
means of communication, uninhibited by law enforcement and
|
||
intelligence agency attempts to monitor and control telecommuni-
|
||
cations systems. NIST should abandon the key escrow proposal and,
|
||
pursuant to its mandate under the Computer Security Act and the
|
||
Omnibus Trade and Competitiveness Act, encourage the development
|
||
and use of the strongest possible communications security
|
||
technologies.
|
||
|
||
|
||
|
||
|
||
Sincerely,
|
||
|
||
|
||
|
||
Marc Rotenberg David L. Sobel
|
||
Director, CPSR Washington Office CPSR Legal Counsel
|
||
|
||
------------------------------
|
||
|
||
From: ygoland@HURRICANE.SEAS.UCLA.EDU
|
||
Subject: File 3--Sea Joins the Encryption Game
|
||
Date: Sun, 3 Oct 1993 05:34:33 -0800 (PDT)
|
||
|
||
To: September 28, 1993
|
||
|
||
Director, Computer Systems Laboratory
|
||
ATTN: Proposed FIPS for Escrowed Encryption Standard
|
||
Technology Building, Room B-154
|
||
National Institute of Standards and Technology
|
||
Gaithersburg, MD 20899
|
||
|
||
%From:
|
||
|
||
The Society for Electronic Access
|
||
P.O. Box 3131
|
||
Church Street Station
|
||
New York, New York 10008-3131
|
||
Voice telephone: (212) 592-3801
|
||
Internet e-mail: Sea@Sea.org
|
||
|
||
|
||
The Society for Electronic Access's response to the call for Public
|
||
Comment contained in:
|
||
|
||
FEDERAL REGISTER
|
||
VOL. 58, No. 145
|
||
DEPARTMENT OF COMMERCE (DOC)
|
||
National Institute of Standards and Technology (NIST)
|
||
|
||
Docket No. 930659-3159
|
||
RIN 0693-AB19
|
||
|
||
A Proposed Federal Information Processing Standard
|
||
for an Escrowed Encryption Standard (EES) 58 FR 40791
|
||
|
||
|
||
The Society for Electronic Access would like to register its concern
|
||
with the proposed implementation of the Clipper Chip/Skipjack
|
||
Algorithm key escrow scheme. These related protocols will be referred
|
||
to as a group as "Clipper" in the body of this letter. While we do not
|
||
object to classification of Federal Information Processing Standards
|
||
(FIPS) for encrypting information vital to national security, we
|
||
believe that a system for transferring sensitive but unclassified
|
||
information used by civilian Government offices, corporations and
|
||
private citizens should be open to public review.
|
||
|
||
NIST, by calling for public comment, would seem to be inviting just
|
||
such a review. However, NIST will not let the public examine either
|
||
the Clipper Chip or the Skipjack algorithm, has not commissioned
|
||
studies concerning either the cost or impact of the Clipper plan, and
|
||
will not let the public examine studies undertaken by the NSA on the
|
||
issue of escrow agency security. Furthermore, since an escrow scheme
|
||
requires a trusted third party while in the proposed scheme NIST
|
||
itself is one of the key holders, we feel that NIST will not be able
|
||
to review public comment as a disinterested party. Under these
|
||
circumstances we feel a call for public comment is hampered.
|
||
|
||
Our concerns with Clipper fall into four broad categories: it is
|
||
unnecessary; the present Administration has promoted its "voluntary"
|
||
use by the public without abjuring the possibility of outlawing
|
||
competing systems; the key escrow scheme is not a true escrow; and
|
||
attempts to gather information necessary for a public assessment of
|
||
Clipper have met obstacles raised by the Government. These concerns
|
||
are enumerated below.
|
||
|
||
1) Clipper is unnecessary.
|
||
|
||
Clipper is not a response to any public need. In a reply to questions
|
||
about Clipper from RSA, NIST states that "[the decisions made about
|
||
Clipper] offer a balance among the various needs of corporations and
|
||
citizens for improved security and privacy and of the law enforcement
|
||
community for continued legal access to the communications of
|
||
criminals."
|
||
|
||
Corporations and citizens can already obtain "improved security and
|
||
privacy" from a wide variety of sources, as there are several
|
||
commercially available encryption standards currently on the market.
|
||
Since the public already has what NIST says it needs, it follows that
|
||
the only reason for Clipper to exist is the addition of the Law
|
||
Enforcement Access Field (LEAF), which allows the government to
|
||
decrypt all messages encrypted by Clipper. Furthermore, the phrase
|
||
"legal access to the communications of criminals" is particularly
|
||
chilling, as it demonstrates a lack of sensitivity to the rule of law.
|
||
Neither the FBI nor any other agency entrusted with surveillance
|
||
activities can determine in advance of a trial whether a citizen is a
|
||
criminal or not. We believe NIST's attitude belies a misunderstanding
|
||
of the rights of American citizens.
|
||
|
||
2) The Administration has promoted its "voluntary" use by the public
|
||
without abjuring the possibility of outlawing competing systems.
|
||
|
||
NIST has consistently maintained that outside Federal use, adoption of
|
||
Clipper by citizens and individuals will be strictly voluntary. When
|
||
pressed on this point by RSA, NIST responded "There are no current
|
||
plans to legislate the use of Clipper. Clipper will be a government
|
||
standard, which can be - and likely will be - used voluntarily by the
|
||
private sector. The option for legislation may be examined during the
|
||
policy review ordered by the President." We are concerned that asking
|
||
for public approval of Clipper as one of several encryption
|
||
possibilities open to the public while the possibility of outlawing
|
||
all other options still exists will prevent legitimate assessment of
|
||
Clipper's ultimate impact.
|
||
|
||
Furthermore, many organizations from small companies to multi-national
|
||
corporations have invested in alternative encryption schemes like RSA,
|
||
Diffie-Hellman and IDEA, many of them based solely on software and
|
||
therefore incompatible with Clipper even as a retro-fit. To outlaw
|
||
these schemes would cause them an enormous fiscal burden, as well as
|
||
mandating a US-only standard incompatible with the protocols chosen by
|
||
many international standard-setting organizations, thereby reducing
|
||
the competitiveness of US companies doing business in the
|
||
international arena.
|
||
|
||
We feel that unless the present administration publicly abjures the
|
||
possibility of banning alternate methods of encryption, no true
|
||
analysis of Clipper is possible.
|
||
|
||
3) The escrow scheme does not use true escrow agencies.
|
||
|
||
This scheme has been publicly promoted as an escrow scheme, but the
|
||
core of any functioning escrow scheme is the presence of a trusted
|
||
third party (or in this case two trusted third parties.) We are
|
||
concerned with the idea that Governmental agencies will hold these
|
||
positions, as they are not truly third parties. In addition, we are
|
||
particularly concerned that the same agency is responsible for
|
||
reviewing Public Comment on the proposed encryption scheme and
|
||
occupying the position of one of the two key holders. We are not
|
||
convinced that NIST can fulfill both roles without conflict of
|
||
interest.
|
||
|
||
4) Attempts to gain information necessary for public review of Clipper
|
||
have met obstacles raised by the Government.
|
||
|
||
The National Security Agency has asked for an increased period of time
|
||
to respond to FOIA requests for information about Clipper, from 10
|
||
business days to one year. Ten business days falls within the Public
|
||
Comment period. One year does not. We feel that if NSA requires this
|
||
period of time to comply with requests for information that the period
|
||
for public analysis and comment should also be extended for an equal
|
||
period of time.
|
||
|
||
Based on these concerns, the Society for Electronic Access feels that
|
||
NIST should not implement the Clipper plan without commissioning
|
||
studies on the cost and impact of implementing Clipper, without
|
||
providing real assurances that Clipper is not a prelude to outlawing
|
||
other encryption schemes, without an implementation of an escrow
|
||
scheme in which NIST does not both review and participate in the proposal,
|
||
and without NSA complying with FOIA requests outstanding from before
|
||
September 28, 1993.
|
||
|
||
Respectfully submitted,
|
||
|
||
|
||
|
||
|
||
Clay Shirky
|
||
Board Member,
|
||
Society for Electronic Access
|
||
|
||
------------------------------
|
||
|
||
Date: Mon, 4 Oct 93 04:29:19 PDT
|
||
From: Fredrick B. Cohen <fc@JUPITER.SAIC.COM>
|
||
Subject: File 4--ITAR and export regulations
|
||
|
||
Your discussion seems very strange to me. I seem to think I have
|
||
heard it all before - about 3 years ago - when I got permission from
|
||
the government to export an RSA cryptosystem with no restriction on
|
||
key length or anything else.
|
||
|
||
It took a few weeks (6-8 as I recall), but all I did was submit the
|
||
software to the government (in 12 copies or so), and request a ruling.
|
||
After a few call-backs, I got permission.
|
||
|
||
I'm not an authorized arms dealer, and of course I can't reimport what
|
||
I have exported, but then I rarely have a reason to do so.
|
||
|
||
By the way, my understanding is that it is not the concept of modular
|
||
exponentiation that is covered by the RSA, but rather their particular
|
||
algorithm for key generation. Am I mistaken? I do key generation
|
||
with a slightly different algorithm - more efficient at some things,
|
||
less efficient at others.
|
||
|
||
All of this is not to say that I think it is reasonable to prevent us
|
||
from doing as we please in this area, and I certainly wish I didn't
|
||
have to wait so long before distributing new versions overseas, but
|
||
why not just apply for export and see what happens? Maybe you'll get
|
||
permission and it will all be no problem.
|
||
|
||
IBM has been exporting DES for quite a few years according to sources
|
||
I have in EC who have seen IBM chips with DES on them in EC computers.
|
||
I believe they simply asked for permission and got it.
|
||
|
||
I applaud the EFF for helping defend people in this area, but maybe if
|
||
they tried to work within the law in the first place, they would have
|
||
found it was easier to obey the law than break it. Maybe if they
|
||
apply now, they will end up with a no-case (assuming they get
|
||
permission). The court is generally pretty lenient under these
|
||
circumstances, and who would want to prosecute you once they find out
|
||
that there was no damage caused?
|
||
|
||
------------------------------
|
||
|
||
Date: Fri, 8 Oct 1993 05:43:44 GMT
|
||
From: emr@EE.MU.OZ.AU(Elizabeth Reid)
|
||
Subject: File 5--Sexual harassment via computers (newspaper article).
|
||
|
||
This article appeared on Page 8 of the Australian newspaper _The Age_
|
||
on Tuesday 5 October 1993. Permission has been granted by the author
|
||
and the newspaper for the article's reproduction in the Computer
|
||
Underground Digest and the Computers and Academic Freedom electronic
|
||
digests and Usenet newsgroups.
|
||
|
||
UNI TO LOOK INTO SEXUAL HARASSMENT VIA COMPUTER
|
||
|
||
By JOANNE PAINTER
|
||
Education reporter
|
||
|
||
Computers have been blamed for many social ills but sexual misconduct
|
||
was never one of them. Now, however, the University of Melbourne is
|
||
investigating the link between computers and sexual harassment on
|
||
campus.
|
||
|
||
A five-member group was formed last month to investigate the extent of
|
||
sexual harassment occurring via the university's computer networks and
|
||
electronic mail systems. It follows several cases in which people
|
||
received sexually explicit and harassing letters. Some of the
|
||
instances occurred after hackers got into the system.
|
||
|
||
The existence of sexually explicit material in networks and personal
|
||
attacks carried out through the networks are also believed to have
|
||
offended people.
|
||
|
||
The university's sexual harassment adviser, Dr Murray Seiffert, said
|
||
that the university was aware of such sexual harassment. But he said
|
||
the group was formed to "nip the problem in the bud" rather than
|
||
respond to an existing pattern of harassment. "We know there has been
|
||
the odd case come up and in a place like ours that does take place,"
|
||
he said. "We have said we have a problem and (we) want to find out
|
||
how big it is."
|
||
|
||
The director of the Advanced Computer Graphics Centre at the Royal
|
||
Melbourne Institute of Technology, Mr Mike Gigante, said the exchange
|
||
of sexually explicit and harassing material was common on electronic
|
||
mail systems. He said it was difficult to monitor and police the
|
||
exchange of such material.
|
||
|
||
"People tend to be far more abusive on bulletin boards or EMAIL than
|
||
they would face to face.. Some of the exchanges I have seen on these
|
||
news groups have been outrageous. If they said it face to face, the
|
||
person saying it would be in court with libel and slander suits."
|
||
|
||
Dr Seiffert said electronic-based sexual harassment was almost
|
||
inevitable in an organisation with 25,000 staff and students,
|
||
thousands of computers that was [sic] linked into the global Internet
|
||
information network.
|
||
|
||
He acknowledged the difficulty of preventing harassment but he said
|
||
offenders would face disciplinary proceedings, including expulsion.
|
||
|
||
"Potentially it's a fairly big problem here because of the place
|
||
having a large number of computers," he said. The group will report
|
||
back to the university's equal opportunity committee next month.
|
||
|
||
------------------------------
|
||
|
||
Date: Sun, Oct 4 1993 21:32:32 CDT
|
||
From: Michael Hauben <hauben@columbia.edu>
|
||
Subject: File 6--The Net and Netizens (Paper)
|
||
|
||
((Moderators' Note: The following excerpt is from Michael Hauben's
|
||
substantial and useful paper: "The Net and Netizen's: The Impact the
|
||
Net has on People's Lives." The full text, about 80 K, can be obtained
|
||
from the CuD ftp sites)).
|
||
|
||
++++
|
||
|
||
|
||
II. INTRODUCTION
|
||
|
||
The world of the Netizen was envisioned some twenty five years ago by
|
||
J.C.R. Licklider and Robert Taylor in "The Computer as a Communication
|
||
Device" (Science and Technology, April 1968). Licklider brought to his
|
||
leadership of the Department of Defense's ARPANET a vision of "the
|
||
intergalatic computer network." Whenever he would speak of ARPANET, he
|
||
would mention this vision. J.C.R. Licklider was a prophet of the Net. In
|
||
his paper, "The Computer as a Communication Device", Licklider establishes
|
||
several helpful principles as to make the computer play a helpful role in
|
||
human communication. Licklider clarified his definition of communication as
|
||
a creative process by writing:
|
||
|
||
"But to communicate is more than to send and to receive. Do two
|
||
tape recorders communicate when they play to each other and record from
|
||
each other? Not really - not in our sense. We believe that
|
||
communicators have to do something nontrivial with the information they
|
||
send and receive. And to interact with the richness of living
|
||
information -- not merely in the passive way that we have become
|
||
accustomed to using books and libraries, but as active participants in
|
||
an ongoing process, bringing something to it through our interaction
|
||
with it, and not simply receiving from it by our connection to it...We
|
||
want to emphasize something beyond its one-way transfer: the increasing
|
||
significance of the jointly constructive, the mutually reinforcing
|
||
aspect of communication - the part that transcends 'now we both know a
|
||
fact that only one of us knew before.' When minds interact, new ideas
|
||
emerge. We want to talk about the creative aspect of communication."
|
||
|
||
Licklider defines four principles for computers to make a
|
||
contribution towards human communication. They are:
|
||
|
||
1) Communication is defined as an interactive creative process.
|
||
2) Response times needs to be short to make the "conversation"
|
||
free and easy.
|
||
3) The larger network would form out of smaller regional networks.
|
||
4) Communities would form out of affinity and common interests.
|
||
|
||
In this paper I will explore the uses Netizens have discovered for
|
||
the Net. Licklider's understandings from his 1968 paper have stood the test
|
||
of time, and do represent the Net today. In a later paper he co-wrote with
|
||
Albert Vezza, "Applications of Information Networks" (Proceedings of
|
||
IEEE, Vol 66, No 11, Nov 1978) Licklider explores possible business
|
||
applications of information networks. Licklider's survey of business
|
||
applications in 1978 come short of the possibilities he outlaid in his
|
||
earlier paper, and represent but a tiny fraction of the resources the Net
|
||
currently embodies.
|
||
|
||
------------------------------
|
||
|
||
Date: Fri, 20 Aug 1993 13:19:32 -0700
|
||
From: Richard Budrevich <rich@ORA.COM>
|
||
Subject: File 7--E-mail Announcements From O'Reilly & Associates
|
||
|
||
SUBSCRIBING TO ORA-NEWS
|
||
|
||
If you would like to receive this service, we now have an easy
|
||
automated way for you to subscribe to our "ora-news" mailing list.
|
||
To subscribe, address an e-mail message to:
|
||
|
||
listproc@online.ora.com
|
||
|
||
Put the following information on the first line of your message
|
||
(not in the Subject:, because commands there are ignored):
|
||
|
||
subscribe ora-news "Your Name" of "Your Company"
|
||
|
||
for example:
|
||
|
||
subscribe ora-news Jane Doe of Bland University
|
||
|
||
Within the next day or so (usually much sooner), you should get a
|
||
reply message welcoming you to the list. If you don't get a reply,
|
||
or you have other problems or questions, please send mail to:
|
||
listown@online.ora.com -- tell us when you sent your message
|
||
and include your telephone number.
|
||
|
||
(If you have more than one computer account or read e-mail on several
|
||
different services, be sure to send your subscription request from the
|
||
place where you want to read "ora-news." Our system automatically
|
||
reads your e-mail address from your message and registers you at that
|
||
particular address.)
|
||
|
||
------------------------------
|
||
|
||
Date: Sun, 10 Oct 1993 16:35:06 CDT
|
||
From: CuD Moderators <cudigest@mindvox.phantom.com>
|
||
Subject: File 8--A Few More CuD-Carrying BBSes
|
||
|
||
Here are a few more BBSes carrying CuDs, PHRACKs, and other
|
||
'Zines. One of these days, perhaps an ambitious reader could
|
||
compile a substantial BBS directory, organized by area code, of
|
||
BSSes specializing in text files.
|
||
From--aphelps%vicstoy%alfred@OSCEOLA.CS.UCF.EDU(Austin Phelps)
|
||
Subject--CuD BBS
|
||
Date--Mon, 13 Sep 1993 23:14:43 -0400 (EDT)
|
||
|
||
LIGHTNING STRIKE BBS carries CuDs as well.
|
||
|
||
Lightning Strikes Here 14.4 down to 1200.
|
||
|
||
I have all CuD with the Index. Packed up with PKZIP 2 format.
|
||
|
||
More Info is in the Sig.
|
||
|
||
Thanks.
|
||
|
||
--
|
||
% Austin C. Phelps % Internet:aphelps@vicstoy.oau.org
|
||
/ Lightning Strikes Here / UUCP: ucf-cs!vicstoy!aphelps
|
||
% FutureNet #44 (407) 297-7288 FutureNet: #1@#44 or #2@#10 or #59@#1
|
||
/ Apple II Forever / % FidoNet: Austin Phelps@1:363/18
|
||
|
||
=================================================================
|
||
|
||
Date--Thu, 09 Sep 93 20:54:35 EDT
|
||
From--System Operator <system%decode%anagld@UUNET.UU.NET>
|
||
|
||
The Decode BBS in Columbia, Maryland, carries both
|
||
comp.society.cu-digest and back issues under /public/cud-arch.
|
||
It also offers a complete set of Phrack issues in
|
||
/public/phrack. There are also various computer underground
|
||
documents and programs in the files section.
|
||
|
||
Decode BBS is reachable at +1 410 730 6734. I am available
|
||
at uunet!anagld!decode!system.
|
||
system@decode.UUCP (System Operator)
|
||
Cryptography, Security, Privacy +1 410 730 6734 Data/FAX
|
||
|
||
====================================================================
|
||
From--metal@PNET01.CTS.COM(Conal .)
|
||
|
||
RABBS is officially going to be open 5 October 1993. The number is
|
||
612.251.8596 and will (crossing fingers%) be online Internet within a
|
||
month (er two). RABBS has changed names to "the Alliance BBS"...but
|
||
will hopefully use RABBS.whatever for mailing.
|
||
|
||
------------------------------
|
||
|
||
Date: 10 Oct 1993 17:51:14 +0100
|
||
From: mch@DOC.IC.AC.UK(Mike C Holderness)
|
||
Subject: File 9--Survey: what harassment _is_ there on the Net?
|
||
|
||
((MODERATORS' NOTE: Mike Holderness's past writings, including some
|
||
some published in CuD, the Times Higher Education Supplement, and
|
||
elsewhere, demonstrate that he is competent, non-sensationalistic, and
|
||
incisive. We trust that he will share some of his findings with CuD
|
||
readers when the story is finished. The following is reprinted from
|
||
Carl Kadie's alt.comp.acad-freedom.talk, a Usenet group devoted to
|
||
issues of net policy and events related to academic freedom)).
|
||
|
||
The Times Higher Education Supplement wants me to do a piece on
|
||
harassment on the Net. No, I am not about to go all sensationalist.
|
||
Neither am I about to abstain from the phone system, let alone call
|
||
for it to be monitored or shut down; in my lifetime I have received
|
||
one nearly-obscene call, one bomb threat and dozens of silent
|
||
harassers through that technology, but I find it, like the Net, rather
|
||
useful. Neither am I at all interested right now in pictures, except
|
||
for specific reports of their being used to harass an individual.
|
||
|
||
I want to look at this phenomenon as a form of harassment, not as a
|
||
nasty mysterious technological thang. And I want to look at the
|
||
_debate_ around it. I hope readers will see this attempt to communicte
|
||
calmly with largely non-Net-connected academics as a useful use of
|
||
bandwidth.
|
||
|
||
I'm hoping for answers to the following. I don't expect any one person
|
||
to answer them all.
|
||
|
||
* How would you say that email harassment is different from other
|
||
forms of harassment -- by mail, by phone, in person?
|
||
|
||
* Would you comment on a _guess_ I make about the phenomenon,
|
||
which is this:
|
||
To senders, a harassing message takes place in the
|
||
"privacy" of their computer environment and/or may seem
|
||
impersonal; whereas to recipients the harassing message is as
|
||
deeply personal as a phone call, is addressed to them
|
||
individually, and is harder to "put down" than a phone.
|
||
|
||
* Have you experienced any form of harassment on the Net? Are you
|
||
prepared to (can you bear to?) describe the incident?
|
||
Do you personally know anyone else who has/can?
|
||
|
||
* Do you know of any statistics and where I can get them?
|
||
|
||
* What do you think is the best way of dealing with harassment?
|
||
With Net harassment specifically? Is there an appropriate
|
||
institutional response (e.g. from a harasser's system
|
||
administrator?)
|
||
|
||
* Why do you think the issue generates such excitement on the Net?
|
||
|
||
* Ironically, in dealing with the some of the preconceptions
|
||
which I know many Net users to have about journalists dealing
|
||
with this and similar issues, I have had to set out a pretty
|
||
thorough pre-agenda for the piece rather than asking open
|
||
questions. Do you have a comment on this?
|
||
|
||
Please indicate how you would prefer your comments to be used.
|
||
[ ] With full attribution including where you work
|
||
[ ] With name and occupation/post only
|
||
[ ] Anonymously
|
||
[ ] This is background. It never happened.
|
||
(Please check one in response and give any relevant info).
|
||
|
||
I look forward to hearing from you! Please reply by email. I will
|
||
summarise. Replies before Wednesday October 13 are more likely to be used.
|
||
|
||
---
|
||
The THES is _the_ weekly publication for people working in higher
|
||
education in the UK. I also write for New Scientist and (right to
|
||
left) the Daily Telegraph, the Independent and the Guardian.
|
||
---
|
||
I tried to post this on Monday Oct 5, but it never got back to
|
||
my site. Apologies for any multiple-posting to individual groups.
|
||
|
||
Mike Holderness
|
||
mch@doc.ic.ac.uk
|
||
mikeh@gn.apc.org
|
||
|
||
------------------------------
|
||
|
||
End of Computer Underground Digest #5.78
|
||
************************************
|
||
|
||
|
||
|