877 lines
41 KiB
Plaintext
877 lines
41 KiB
Plaintext
|
|
Computer underground Digest Thu Feb 1, 1996 Volume 8 : Issue 10
|
|
ISSN 1004-042X
|
|
|
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU
|
|
Archivist: Brendan Kehoe
|
|
Shadow Master: Stanton McCandlish
|
|
Field Agent Extraordinaire: David Smith
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
|
|
|
CONTENTS, #8.10 (Thu, Feb 1, 1996)
|
|
|
|
File 1--DJ: Senate Passes Telecom Bill, Vote 91-5
|
|
File 2--AR article-Straight Jacketing the Internet
|
|
File 3--Commentary on Denning Crypto article
|
|
File 4--Net is Mainstream and Votes!
|
|
File 5--Re: So Many Errors to Be Answered! (in re 8.05 - 1A)
|
|
File 6--Cu Digest Header Info (unchanged since 16 Dec, 1995)
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
---------------------------------------------------------------------
|
|
|
|
Date: Thu, 1 Feb 1996 18:49:41 -0500 (EST)
|
|
From: "Declan B. McCullagh" <declan+@CMU.EDU>
|
|
Subject: File 1--DJ: Senate Passes Telecom Bill, Vote 91-5
|
|
|
|
"Deregulatory," oh yes indeed.
|
|
|
|
-Declan
|
|
|
|
---
|
|
|
|
WASHINGTON -DJ-
|
|
|
|
[...]
|
|
|
|
The Senate approved the bill 91-5.
|
|
|
|
''It's procompetitive; it's deregulatory,'' said Senate Commerce
|
|
Committee Chairman Larry Pressler, R-S.D. ''It will affect every
|
|
single American.''
|
|
|
|
The House cleared the measure in a 414-16 vote just a few minutes
|
|
before Senators began casting their votes.
|
|
|
|
The votes clear the way for White House approval of the
|
|
legislation. President Clinton is expected to sign it into law.
|
|
|
|
[...]
|
|
|
|
Voting against the measure in the Senate were Paul Simon, D-Ill.;
|
|
John McCain, R-Ariz.; Russell Feingold, D-Wis.; Paul Wellstone,
|
|
D-Minn., and Patrick Leahy, D-Vt.
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 25 Jan 1996 11:37:27 -0700
|
|
X-Original-To: internet_censorship@monad.net
|
|
From: proteios@bigjim.iuc.org (El Tiburon)
|
|
Subject: File 2--AR article-Straight Jacketing the Internet
|
|
|
|
|
|
NEWS ANALYSIS: TELECOM REFORM
|
|
+
|
|
by Craig A. Johnson
|
|
American Reporter Correspondent
|
|
Washington, D.C.
|
|
1/22/96
|
|
|
|
CONGRESS STRAIGHT-JACKETS THE NET
|
|
by Craig A. Johnson
|
|
American Reporter Correspondent
|
|
|
|
WASHINGTON -- Chief House and Senate telecom conference
|
|
negotiators are set to squeeze the Internet into yet another a
|
|
regulatory rathole.
|
|
Conference leaders are attempting to attach further
|
|
"de-regulatory" restrictions to the conference committee's draft
|
|
telecom bill that will remove guarantees for access and
|
|
interconnection, and permit telecom companies to price Net services in
|
|
ways which seem defensible only to the special interests which crafted
|
|
the provisions.
|
|
Fresh from the "indecency" defeat, Net lobbyists and public
|
|
interest groups barely caught their breath before a new "red tide" of
|
|
restraints appeared in the draft conference bill language.
|
|
Though Netheads in Washington, such as D.C. Internet Society
|
|
Chair Ross Stapleton-Gray, reassure us that the Internet will remain
|
|
"pretty much the way it is now," and that neighborhood Internet
|
|
service providers (ISPs) will generally be able to offer access at
|
|
continuing competitive rates, insiders who have studied the language
|
|
of the bill have grave concerns about how the Internet of the future
|
|
will look.
|
|
A senior counsel on the Senate Justice Committee told the
|
|
American
|
|
Reporter last week that new draft changes will put back into the bill
|
|
the original Cox-Wyden language (AR, No. 65) that would have
|
|
prohibited the FCC from "economically regulating" the Internet.
|
|
"Nobody really knows what this means," the source said.
|
|
In a style now familiar to reporters covering the telecom
|
|
bill,
|
|
House Commerce Committee Chairman Tom Bliley (R-VA) prefers critical
|
|
conference decisions to be made in the dark corners of Capitol offices
|
|
and meeting rooms as far away from open committee meetings as
|
|
possible.
|
|
A "signature sheet" is presently being substituted for open
|
|
discussion and debate. This assures that so-called "technical"
|
|
changes and at least one "substantive" change to the draft telecom
|
|
bill, according to Senate Commerce Committee staffers, can proceed
|
|
without conferees understanding too much about what the changes really
|
|
mean.
|
|
The proposed language prohibiting the FCC from economically
|
|
regulating the Internet is doubly ironic in that it was not part of
|
|
the Cox-Wyden measure, which overwhelmingly passed the House on a vote
|
|
of 420-4, and an FCC role for "describing" measures to regulate
|
|
Internet "content" is positively sanctioned in the draft language.
|
|
Title V of the bill, "Broadcast Obscenity and Violence,"
|
|
classifies the Internet as equivalent to a broadcast facility and
|
|
regurgitates the now familiar criminalization of speech measure
|
|
inserted into the bill by the Christian Coalition's poster boy, House
|
|
Judiciary Chairman Henry Hyde (R-IL).
|
|
Hyde, always eager to please fundamentalists, rammed his
|
|
amendment through the House conference caucus on a razor-thin vote (AR
|
|
No. 174) of 17 to 16, with members saying later that they did not
|
|
understand the implications of what they voted for. This change in
|
|
the House language brought it into line with the Exon "indecency"
|
|
clause in the Senate bill.
|
|
Part of this regulatory cowpie is thrown into the FCC's lap
|
|
(whose
|
|
budget of course is chopped by the Congressional-deficit boys). The
|
|
bill states: "The Commission may describe measures which are
|
|
reasonable, effective, and appropriate to restrict access to
|
|
prohibited communications..."
|
|
But, while permitting the FCC to "describe" such measures, the
|
|
bill expressly states that the agency has "no enforcement authority
|
|
over the failure [on the part of providers or users] to utilize such
|
|
measures."
|
|
This part of the bill is a honey-trap for litigators. Placing
|
|
the
|
|
FCC solely in an advisory role literally ensures that all of the
|
|
interpretation, implementation, and enforcement will be undertaken by
|
|
the courts and the Department of Justice. Of course, numerous
|
|
individual and organizational users and providers will get caught in
|
|
the cross-fire.
|
|
Other measures tucked away in the telecom bill's turgid prose
|
|
seem
|
|
to have escaped the scrutiny of many self-styled Internet defenders,
|
|
protectors, and aficionados. Interconnection and equal access have
|
|
barely passed the lips of Net mavens in connection with the telecom
|
|
bills, yet these provisions in the draft bill could leave Net
|
|
providers out in the cold without protection from gusts of corporate
|
|
capriciousness.
|
|
The draft bill states that "each telecommunications carrier
|
|
has
|
|
the duty to interconnect directly or indirectly with the facilities
|
|
and equipment of other telecommunications carriers" as well as the the
|
|
duty to provide "to any other telecom carrier" interconnection and
|
|
"nondiscriminatory access to network elements on an unbundled
|
|
basis..."
|
|
What are "network elements," and why is "interconnection"
|
|
important? The House telecom bill, H.R. 1555, clearly spelled these
|
|
out, prior to its re-write by the conference committee.
|
|
In the language of H.R. 1555, "a local exchange carrier" had
|
|
to
|
|
offer to those providing "a telecommunications service or an
|
|
information service, reasonable and nondiscriminatory access on an
|
|
unbundled basis ... to databases, signalling systems, poles, ducts,
|
|
conduits, and rights-of-way ... or other facilities, functions, or
|
|
information ... integral to the efficient transmission, routing, or
|
|
other provision... that is sufficient to ensure the full
|
|
interoperability of the equipment and facilities..." of those seeking
|
|
such access.
|
|
But, the conferees, under pressure from the Regional Bell
|
|
Operating Companies (RBOCs) removed guarantees of access and
|
|
interconnection to providers of "information services," which include
|
|
Internet service providers.
|
|
In plain English, these changes in the bill mean that ISPs,
|
|
online
|
|
service providers, and any other interactive "information service"
|
|
providers dependent upon telecom networks must worship at the altar of
|
|
the Bell companies in order to attain "interconnection" and "equal
|
|
access," two vital functions of communications which this bill was
|
|
supposed to guarantee and enshrine for the information-centered
|
|
future.
|
|
In even plainer English, they mean that carriers can play with
|
|
Net
|
|
providers like tigers playing with their prey. As providers of the
|
|
critical conduits to Internet backbones, local exchange carriers under
|
|
the provisions of the bill can essentially charge information services
|
|
what ever the market will bear, thus potentially maiming or killing
|
|
off small- to medium-sized ISPs.
|
|
The carriers can also promote sweetheart deals with corporate
|
|
monoliths such as Microsoft, TCI, AT&T, MCI, and Time Warner for
|
|
access at discounted rates, as determined by volume or a similar
|
|
measure. They can underprice, overprice, or offer no prices, since
|
|
information service providers are stripped of all guarantees as the
|
|
draft law is currently written.
|
|
These are rather extreme visions. The reality is that
|
|
discretionary pricing may well take place, but the Internet backbone's
|
|
national service providers (NSPs) are working with the Commercial
|
|
Internet Exchange (CIX), the Internet Society and others to ensure
|
|
that draconian results do not obtain.
|
|
Corporate strategy is rapidly developing which will allow
|
|
traditional providers control over Internet access and provision.
|
|
Diversity will hang on a while longer but the wind is clearly blowing
|
|
in the direction of conglomeration and concentration -- in no small
|
|
part because telcos in the U.S. are rapidly grasping the fact that
|
|
long-term marginal costs for local calls are moving toward zero.
|
|
Pricing is increasingly geared toward toward the content that
|
|
is
|
|
accessed, rather than transport costs. Carriers are restructuring in
|
|
order to dominate the markets for content provision.
|
|
The threat to small- to medium-sized ISPs as well as other
|
|
small
|
|
businesses providing information services is real. The conference
|
|
committee draft already anticipates the problem. The title of its
|
|
Kafkaesque Section 257, "Market Entry Barriers Proceeding," calls for
|
|
remedial action by the FCC for anti-competitive conditions which the
|
|
bill may actively foster.
|
|
It stipulates that "within 15 months after the date of
|
|
enactment,"
|
|
"the FCC shall complete a proceeding for the purpose of identifying
|
|
and eliminating ... market entry barriers for entrepreneurs and other
|
|
small businesses in the provision and ownership of telecommunications
|
|
services and information services, or in the provision of parts or
|
|
services to providers of telecommunications services and information
|
|
services."
|
|
The FCC is supposed to complete this proceeding using criteria
|
|
which will favor "diversity of media voices, vigorous economic
|
|
competition, technological advancement, and promotion of the public
|
|
interest, convenience, and necessity." The next FCC review would not
|
|
come for three years, thus placing an enormous burden on the agency to
|
|
get it right in its first rulemaking proceeding. In the fast-moving
|
|
communications world, a three-year lag time can be equivalent to
|
|
setting policy in stone.
|
|
Apparently, for the conference leadership, having the
|
|
beleaguered
|
|
FCC take on additional burdens is more palatable than taking the
|
|
Congressional responsibility of rectifying the problem in law, and
|
|
thus risk flying in the face of powerful interests filling campaign
|
|
coffers.
|
|
However, in the most unkind cut of all, the bill managers in
|
|
this
|
|
Kafka-like castle on the Hill intend to strip the FCC of economic
|
|
regulatory authority over the Internet, thus rendering the above
|
|
provision moot. The FCC will have no power to redress market entry
|
|
barriers such as distorted conditions for interconnection and access,
|
|
or skewed pricing, if the rider on the "signature sheet" currently
|
|
circulating makes its way into the bill.
|
|
This outcome, depending on its specific language, could well
|
|
impact Internet access to schools, hospitals, and libraries. The bill
|
|
requires telecommunications carriers to provide "any of its services
|
|
that are within the definition of universal service" to schools and
|
|
libraries at reduced rates.
|
|
But, if the above qualification goes into effect, the
|
|
definition
|
|
of "universal service" could not include the Internet because it could
|
|
not be "economically" regulated by the FCC as a "universal service."
|
|
Net pricing for schools, hospitals, and libraries may therefore be up
|
|
for grabs in a free-for-all commercial environment.
|
|
In a bill which is a patchwork of compromises between industry
|
|
giants, this Congress insists on behaving recklessly and destructively
|
|
with regard to the Internet and its constituency. And, many of the
|
|
conferees, as the old saw goes, appear to not "have the sense to pound
|
|
sand in a rathole."
|
|
|
|
-30-
|
|
|
|
* * *
|
|
|
|
The American Reporter
|
|
Copyright 1996 Joe Shea, The American Reporter
|
|
and Craig A. Johnson
|
|
All Rights Reserved
|
|
The American Reporter is published daily at 1812 Ivar
|
|
Ave., No. 5, Hollywood, CA 90028 Tel. (213)467-0616,
|
|
by members of the Society of Professional Journalists
|
|
(SPJ) Internet discussion list. It has no affiliation
|
|
with the SPJ. Articles may be submitted by email to
|
|
joeshea@netcom.com. Subscriptions: Reader: $10.00
|
|
per month ($100 per year) and $.01 per word to republish
|
|
stories, or Professional: $125.00 per week for the re-use of
|
|
all American Reporter stories. We are reporter-owned. URL:
|
|
http://www.newshare.com/Reporter/today.html Archives:
|
|
http://www.newshare.com/Reporter/archives/
|
|
|
|
|
|
|
|
------------------------------
|
|
|
|
Date: Sat, 27 Jan 1996 09:53:03 -0500 (EST)
|
|
From: Jay Holovacs <holovacs@styx.ios.com>
|
|
Subject: File 3--Commentary on Denning Crypto article
|
|
|
|
Response to "The Future of Cryptography" by Dorothy Denning
|
|
|
|
In a recent article (available at
|
|
http://www.cosc.georgetown.edu/~denning/crypto/Future.html),
|
|
Dorothy Denning spells out her reasons for support of government
|
|
escrowed encryption keys. There are several significant logical
|
|
fallacies in those arguments which I would like to address here.
|
|
|
|
The first problem is that Denning opens with a more or less
|
|
"straw man" argument by referring to the Crypto Anarchy position
|
|
of Tim May, followed by the statement "I do not want to live in
|
|
an anarchistic society -- if such could be called a society at
|
|
all -- and I doubt many would." The implicit assumption here is
|
|
that advocacy of strong truly private communication is
|
|
equivalent to endorsement of May's anarchist position
|
|
(throughout the remainder of this article, reference to private
|
|
cryptography should be interpreted to mean strong cryptography
|
|
without escrowed key access). This is hardly the case. The
|
|
advocacy of the availability of private crypto is simply the
|
|
position that citizens should be able to take reasonable steps
|
|
to protect their privacy without handing information to the
|
|
government.
|
|
|
|
Denning continues:
|
|
|
|
"This is the claim that I want to address here. I do not accept
|
|
crypto anarchy as the inevitable outcome. A new paradigm of
|
|
cryptography, key escrow, is emerging and gaining acceptance in
|
|
industry. Key escrow is a technology that offers tools that
|
|
would assure no individual absolute privacy or untraceable
|
|
anonymity in all transactions. I argue that this feature of the
|
|
technology is what will allow individuals to choose a civil
|
|
society over an anarchistic one.
|
|
|
|
After saying that she does not accept crypto anarchy as the
|
|
inevitable outcome of private crypto, Denning proceeds to argue
|
|
as if it is, and assumes that the only way to avoid anarchy is
|
|
to put limits on communication privacy. This vast leap of faith
|
|
assumes that because citizen A can communicate privately with
|
|
citizen B, or even that criminal A can communicate privately
|
|
with criminal B, society and social order will collapse. Not too
|
|
likely. There are very few threatening crimes that can be
|
|
accomplished through communication alone and even those have
|
|
real world effects which can be observed.
|
|
|
|
Denning continues
|
|
|
|
"Less recognized are cryptography's limitations. Encryption is
|
|
often oversold as the solution to all security problems or to
|
|
threats that it does not address"
|
|
|
|
correctly pointing out that crypto is not a cure all for
|
|
security problems, yet fails to make the same connection
|
|
regarding its potential involvement in criminal behavior, i.e.
|
|
it is no magic bullet to criminals either.
|
|
|
|
"The drawbacks of cryptography are frequently overlooked as well.
|
|
The widespread availability of unbreakable encryption coupled
|
|
with anonymous services could lead to a situation where
|
|
practically all communications are immune from lawful
|
|
interception (wiretaps) and documents from lawful search and
|
|
seizure, and where all electronic transactions are beyond the
|
|
reach of any government regulation or oversight. The
|
|
consequences of this to public safety and social and economic
|
|
stability could be devastating. With the government essentially
|
|
locked out, computers and telecommunications systems would
|
|
become safe havens for criminal activity.
|
|
|
|
There is a serious discrepancy here. If crypto does not provide
|
|
security from random hackers, how does it make computers and
|
|
telecommunication systems "safe havens for criminal activity?"
|
|
This "chicken little" position ignores the fact that the vast
|
|
majority of criminal investigation and apprehension involves
|
|
physical world gumshoe work.
|
|
|
|
". . . The benefits of strong cryptography can be realized
|
|
without following the crypto anarchy path to social disorder.
|
|
One promising alternative is key escrow encryption, also called
|
|
escrowed encryption
|
|
|
|
Again the tenuous link between private crypto and social
|
|
collapse!
|
|
|
|
"Encryption also threatens national security by interfering with
|
|
foreign intelligence operations. The United States, along with
|
|
many other countries, imposes export controls on encryption
|
|
technology to lessen this threat.
|
|
|
|
Encryption developments possibly do interfere somewhat with some
|
|
aspects of foreign intelligence gathering. That, however, is
|
|
water under the bridge. I doubt it will be possible to convince
|
|
other nations not to use strong crypto, and no amount of
|
|
legislation or US crypto standards is going to change that. Of
|
|
course, by the same token, our own government communications are
|
|
more secure from foreign interception, it works both ways.
|
|
|
|
Throughout her article, Denning constantly refers to "lawful
|
|
intervention" as if that were the only concern citizens had
|
|
regarding their communication privacy. Time after time FOIA
|
|
(Freedom of Information Act) documents have shown extensive
|
|
government surveillance of private citizens (from Martin Luther
|
|
King, Leonard Bernstein and other famous individuals to less
|
|
known business people, journalists and political activists). The
|
|
government has never been a totally benign force.
|
|
|
|
The situation becomes even more critical for international
|
|
communications. First, the US government has never even
|
|
pretended that international communications are private, the
|
|
fact that a US citizen is on one end of the line does not deter
|
|
the government from the position that the communication is fair
|
|
game. Consider for example communication among networks of human
|
|
rights activists. There are quite a few places where transfer of
|
|
information regarding political prisoners can be deadly.
|
|
Communication of encrypted messages through anonymous remailers
|
|
can be a critical link in getting this information out. And the
|
|
danger is not entirely in the foreign end of the line.
|
|
Particularly with some of the Central American governments,
|
|
there has been considerable cooperation between the US
|
|
government and the military regimes in question regarding
|
|
identification of activists ("troublemakers"). PGP has been a
|
|
blessing for political activists inside and outside the US.
|
|
|
|
"I found numerous cases where investigative agencies had
|
|
encountered encrypted communications and computer files. These
|
|
cases involved child pornography, customs violations, drugs,
|
|
espionage, embezzlement, murder, obstruction of justice, tax
|
|
protesters, and terrorism.
|
|
|
|
Crypto had nothing to do with the of the actual crimes above.
|
|
One cannot murder someone with cryptography. At the very most,
|
|
cryptography can be used as a means of hiding peripheral
|
|
evidence, that's all. You can't hide the real evidence of a
|
|
crime with crypto. You can't hide drugs, a murder weapon or a
|
|
body in crypto. Even relatively abstract crimes like
|
|
embezzlement or tax evasion still have real world end
|
|
points--money is missing. This is where the actual crime is, not
|
|
that some aspects of the trail are encrypted.
|
|
|
|
Child pornography has become a frequent rallying cry in
|
|
objections to private crypto. What seems to be overlooked in the
|
|
current frenzy is that the real crime involved is the sexual
|
|
violation of children involved in producing some of this
|
|
material, not whether 1 copy or 10,000 copies were distributed.
|
|
Unfortunately, the obsession has become tracking down whoever
|
|
has the pictures that were produced (really a peripheral issue)
|
|
rather than the real crime itself. The fact that some person may
|
|
posses illicit pictures that the police can't find (either
|
|
because they are encrypted or because they are well hidden
|
|
physically) has very little to do with the children being abused.
|
|
|
|
Consider for comparison, people who produce this material rarely
|
|
use commercial photo labs, for obvious reasons. Home photo
|
|
processing equipment, Polaroid cameras or video cameras make
|
|
this product possible. Yet we do not hear impassioned pleas to
|
|
ban or license these items. These essential items are accepted
|
|
because they have widespread beneficial uses. Private crypto is
|
|
no different in this regard.
|
|
|
|
Denning then proceeds to discuss escrowed encryption, but mixes
|
|
two entirely unrelated concepts:
|
|
|
|
"AccessData Corp., a company in Orem, Utah which specializes in
|
|
providing software and services to help law enforcement agencies
|
|
and companies recover data that has been locked out through
|
|
encryption, reports receiving about a dozen and a half calls a
|
|
day from companies with inaccessible data. About one-half dozen
|
|
of these calls result from disgruntled employees who left under
|
|
extreme situations and refused to cooperate in any transitional
|
|
stage by leaving necessary keys (typically in the form of
|
|
passwords). Another half dozen result from employees who died or
|
|
left on good terms, but simply forgot to leave their keys. The
|
|
third half dozen result from loss of keys by current employees.
|
|
|
|
. . .
|
|
|
|
"The government has not been alone in its pursuit of key escrow
|
|
technology. Some type of key escrow is a feature or option of
|
|
several commercial products including Fisher Watchdog®,
|
|
Nortel's Entrust, PC Security Stoplock KE, RSA Secure[TM], and
|
|
TECSEC Veil[TM]. Escrowing is done within the user's
|
|
organization and serves primarily to protect against data loss.
|
|
|
|
The issue here is a company'a escrowing of keys to its own data.
|
|
No one (including Tim May as I interpret his writing) is
|
|
objecting to this. The business owns the information, the
|
|
business can and should take measures to assure that it is
|
|
properly accessible. This is at all nothing at all like
|
|
government mandated key escrow, a corporate escrow process can
|
|
occur without any government involvement whatever. The problem
|
|
arises when personal communication (which is the property of the
|
|
individual) is required to be compromised by someone else.
|
|
|
|
Denning continues
|
|
|
|
"International interest in key escrow will also contribute to its
|
|
success. There is growing recognition on the part of governments
|
|
and businesses worldwide of the potential of key escrow to meet
|
|
the needs of both users and law enforcement. In addition to
|
|
providing confidentiality and emergency backup decryption,
|
|
escrowed encryption is seen as a way of overcoming export
|
|
restrictions, common to many countries, which have limited the
|
|
international availability of strong encryption in order to
|
|
protect national security interests.
|
|
|
|
This is not realistic. To meet current US export restrictions, a
|
|
product would have to be escrowed so as to be readable to US
|
|
authorities. How many foreign governments or corporations would
|
|
be happy with that? By contrast, if the US agreed to share the
|
|
escrowed keys (there has never been any indication of this), how
|
|
many companies or individuals would be comfortable knowing that
|
|
a wide range of governments with a wide range of standards had
|
|
access to the communications (yes, Virginia, some of our
|
|
"allies" have terrible human rights records).
|
|
|
|
"The IBAG principles acknowledge the right of businesses and
|
|
individuals to protect their information and the right of
|
|
law-abiding governments to intercept and lawfully seize
|
|
information when there is no practical alternative. Businesses
|
|
and individuals would lodge keys with trusted parties who would
|
|
be liable for any loss or damage resulting from compromise or
|
|
misuse of those keys. The trusted parties could be independently
|
|
accredited entities or accredited entities within a company. The
|
|
keys would be available to businesses and individuals on proof
|
|
of ownership and to governments and law enforcement agencies
|
|
under due process of law and for a limited time frame. The
|
|
process of obtaining and using keys would be auditable.
|
|
Governments would be responsible for ensuring that international
|
|
agreements would allow access to keys held outside national
|
|
jurisdiction. The principles call for industry to develop open
|
|
voluntary, consensus, international standards and for
|
|
governments, businesses, and individuals to work together to
|
|
define the requirements for those standards. The standards would
|
|
allow choices about algorithm, mode of operation, key length,
|
|
and implementation in hardware or software. Products conforming
|
|
to the standards would not be subject to restrictions on import
|
|
or use and would be generally exportable.
|
|
|
|
Sounds good. Doesn't work. An excellent example is Project
|
|
Shamrock, which involved the coercion by NSA of large private
|
|
communications companies (ITT, RCA and others) to surrender
|
|
copies of cable traffic from the 50's until it was exposed in
|
|
the 70's is . Private agencies are in no position to strongly
|
|
resist government pressure, especially with assurance that it is
|
|
in the national interest and that their cooperation will be kept
|
|
strictly private. This occurred in the relatively open US. How
|
|
confident are you that it does not happen even more so in many
|
|
other countries? Maybe PGP isn't such a bad idea after all.
|
|
|
|
"If government-proof encryption begins to seriously undermine the
|
|
ability of law enforcement agencies to carry out their missions
|
|
and fight organized crime and terrorism, then legislative
|
|
controls over encryption technology may be desirable.
|
|
|
|
Desirable to whom? There is almost nothing that can't be
|
|
justified by law enforcement expediency. Would it be O.K. to
|
|
suggest, for example, that all conversations I have with my
|
|
spouse, my friends or business associates be done in publicly
|
|
accessible places so that police with "lawful orders" could
|
|
listen in if necessary? Why should the fact that we are
|
|
communicating electronically alter that right in the slightest?
|
|
|
|
At this point a historical perspective is in order. This whole
|
|
issue is a 20th century product. In earlier times, without
|
|
recording devices, long range listening or night vision scopes,
|
|
it was quite easy to have conversations which were private,
|
|
period. The development of the telephone opened a new era in
|
|
person to person communication. As an accident of technology, it
|
|
was possible to listen in on phone conversations. There was no
|
|
constitutional right of the government to do such listening,
|
|
it's just that it became physically possible. After a bit of
|
|
thrashing around in the courts, it became obvious that there was
|
|
a great danger in allowing unlimited snooping by law
|
|
enforcement, so legal limits were placed on circumstances where
|
|
such listening could be done.
|
|
|
|
What is occurring now, however, is a reversal of that rationale.
|
|
The new technologies of digital telephony inherently make
|
|
"tapping" much more difficult and personal computers (through
|
|
cryptography) make it possible for individuals to take active
|
|
steps to maintain a level of privacy in communication. The
|
|
response in law enforcement is as if some inherent right is
|
|
being "taken away" from government. It was never a right of
|
|
government, simply a convenient accident of technology, a
|
|
technology that is fast becoming obsolete.
|
|
|
|
Technology is a two edged sword. Computer networks have greatly
|
|
enabled enhancements in legitimate law enforcement. They have
|
|
also provided some enabling of personal communication privacy
|
|
(along with a great loss of many other types of privacy).
|
|
Citizen communication privacy will not bring down society any
|
|
more than the Bill of Rights did 200 years ago.
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 1 Feb 1996 14:47:50 -0600
|
|
From: Donna Hoffman <hoffman@COLETTE.OGSM.VANDERBILT.EDU>
|
|
Subject: File 4--Net is Mainstream and Votes!
|
|
|
|
Cyberspace to Congress: The Net is Mainstream -- and it Votes!
|
|
|
|
By Professor Donna L. Hoffman
|
|
|
|
You would think from the way that Congress is rushing to censor
|
|
"indecency" on the Internet that cyberspace is a virtual den of
|
|
iniquity and pornographic debasement. In the interests of
|
|
promoting a bit more sanity in the halls of Congress, allow me to
|
|
offer a few facts about the real nature of the "cyberporn" threat
|
|
and about the character of the fast-growing community of Americans
|
|
online.
|
|
|
|
First, let's be clear that what we're really talking about here --
|
|
pornography -- actually constitutes an infinitesimally-small
|
|
percentage of all online information. Indeed, Marty Rimm's ill
|
|
fated study of pornography on the "information superhighway"
|
|
revealed that less than 1/2 of 1% of all images on the Internet
|
|
were likely to consist of porn.
|
|
|
|
But never mind that somewhat inconvenient fact. Congress in its
|
|
infinitely-debatable wisdom, has chosen to "save" America's
|
|
children not by finally fixing our broken school systems -- that,
|
|
after all, would be hard and complex work -- but by attempting
|
|
instead to shield families from "indecency" (a sure vote-getter).
|
|
|
|
But guess what? It turns out that the majority of online users are *not*
|
|
lonely sex-deprived (or depraved) single males but families! That's right,
|
|
42% of those on the Web are married and another 9% report living with
|
|
a partner, while only 41% are single. And 35% of Web-using
|
|
households contain children.
|
|
|
|
What's more, according to the latest GVU/Hermes survey of Web
|
|
users, 29 percent of Web users globally are female (the percentage
|
|
of female users rises to 33% in the United States), 40% are 36
|
|
years old or over, almost a third of the respondents make less
|
|
than $30,000 a year, and nearly half make less than $50,000 a
|
|
year.
|
|
|
|
Indeed, the best research available indicates that cyberspace is
|
|
increasingly going mainstream. Aside from the strong family
|
|
orientation of Internet users -- and the increasing prevalence of
|
|
women -- ever more middle-class and working-class people are
|
|
joining the ranks of the "wired." Occupationally, more students,
|
|
more people in sales and service work, more retired people, and
|
|
more people in a more diverse variety of occupations (e.g. day
|
|
laborers, crafts people, homemakers and others) are online
|
|
everyday, as are people reporting smaller annual household incomes
|
|
(especially under than $30,000).
|
|
|
|
As for the political persuasion of Internet users, the facts are
|
|
rather startling. Despite the image of cyberspace as some stomping
|
|
ground of the liberal elite, the fact of the matter is that there
|
|
are significantly more Republicans and Independents online than
|
|
Democrats. And while online users are nearly indistinguishable
|
|
from people not online in terms of political party affiliation and
|
|
who they voted for in the 1992 Presidential election and 1994
|
|
House elections, online users are *much more likely to vote* than
|
|
people not online. Consider the following statistics from the
|
|
Times Mirror 1995 Technology in the American Household study:
|
|
|
|
|
|
|
|
Party Identification and Voting Behavior
|
|
|
|
Party Online Not Online
|
|
Users
|
|
|
|
Democrat 25% 29%
|
|
Independent 43% 40%
|
|
Republican 32% 31%
|
|
|
|
100% 100%
|
|
|
|
1992 Presidential Vote (among voters)
|
|
|
|
Candidate Online Not Online
|
|
Users
|
|
|
|
Bush 37% 38%
|
|
Clinton 44% 45%
|
|
Perot 18% 17%
|
|
|
|
100% 100%
|
|
|
|
1994 House Vote (among voters)
|
|
|
|
Party Online Not Online
|
|
Users
|
|
|
|
Democrat 43% 44%
|
|
Republican 55% 54%
|
|
Other 2% 2%
|
|
|
|
100% 100%
|
|
|
|
Percent Who Voted in 1994
|
|
|
|
Age Online Users Not Online
|
|
|
|
18-29 32% 15%
|
|
30-49 58% 46%
|
|
50-64 80% 58%
|
|
|
|
65+ * 61%
|
|
|
|
100% 100%
|
|
|
|
* too few cases to estimate reliably
|
|
|
|
Source: Times Mirror Center for the People and the Press (now the
|
|
Pew Research Center) "Technology in the American Household" 1995
|
|
study.
|
|
|
|
|
|
Oh yes, and one other little tidbit for Congress to consider: the
|
|
majority of online users *oppose* current efforts to censor
|
|
content on the Internet.
|
|
|
|
Given these figures, one has to wonder if the Republican Congress
|
|
is shooting itself in the foot -- alienating precisely the
|
|
constituency whose support it will need to win the White House in
|
|
1996 -- by voting for a censorship bill that will, according to
|
|
virtually all constitutional scholars, in any event probably be
|
|
overturned by the courts.
|
|
|
|
Congress take heed: the citizens of cyberspace represent a
|
|
politically diverse and demographically varied voting population.
|
|
Attempt to censor them only at your peril.
|
|
__________________________________________________________
|
|
Donna L. Hoffman is an Associate Professor of Management at
|
|
Vanderbilt University and co-directs Project 2000
|
|
(www2000.ogsm.vanderbilt.edu) at the Owen School.
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 1 Feb 1996 21:17 EDT
|
|
From: E. ALLEN SMITH <EALLENSMITH@mbcl.rutgers.edu>
|
|
Subject: File 5--Re: So Many Errors to Be Answered! (in re 8.05 - 1A)
|
|
|
|
Since Mr. Townson and others do not appear to understand the idea of
|
|
allowing speech with which one disagrees, I will explain. In providing
|
|
a space for communication, one may make, at its core, two different
|
|
choices.
|
|
|
|
The first such choice is to allow all speech that is within the stated
|
|
purpose of the space in question. For instance, a moderator to a
|
|
newsgroup or mailing list may restrict postings to ones meeting the
|
|
purpose for which the group or list was established. A university
|
|
computer science department may restrict the newsgroups it carries to
|
|
comp.* and news.* groups, since these are the groups within its
|
|
purpose. A for-profit ISP may restrict the groups to which WWW space
|
|
is given to those who pay, since the purpose of the ISP is to make
|
|
money. In such a case, the individual or organization is neither
|
|
ethically nor (properly) legally responsible for the speech in
|
|
question. The proper legal description of an individual or
|
|
organization who has made such a choice is a "common carrier."
|
|
|
|
The second such choice is to allow only speech with which one agrees.
|
|
Such a choice has been made by online services such as AOL, Prodigy,
|
|
and CompuServe in not carrying material they deem indecent or obscene.
|
|
Such a decision is also made by an ISP who refuses to provide space to
|
|
a group with which that ISP disagrees. By so doing, that individual
|
|
has chosen to take on responsibility for the speech the person allows,
|
|
since the person can then make the choice not to carry it. In the
|
|
Prodigy case, it was correctly found that the individual or
|
|
organization bears legal as well as ethical responsibility for such
|
|
speech.
|
|
|
|
Either choice is valid; except for a governmental body, it is the
|
|
right of a provider to make that choice. Another way to phrase this
|
|
right is that freedom of the press is freedom for the person who owns
|
|
the press.
|
|
|
|
However, one may condemn someone for making a given choice, although
|
|
it is their right to make that choice - a right that one would fight
|
|
to protect. I, and others, condemn the Neo-Nazis for making the choice
|
|
to spew their hateful propaganda. I, and others, also condemn the
|
|
choice of any ISP who decides to limit web space for such groups. I,
|
|
and others, also condemn the choice of the Wiesenthal Center to call
|
|
for such limits. I, and others, would equally condemn the choice of
|
|
any ISP who decided to limit web space for those against such groups.
|
|
|
|
I, and others, condemn the latter because we believe that the best
|
|
response to wrongful speech is more speech, not cutting off that
|
|
wrongful speech. Mr. Townson has claimed that the Neo-Nazi propaganda
|
|
will go unanswered; this claim is false. Such organizations as the
|
|
American Jewish Committee exist, among other purposes, to make
|
|
opposing speech.
|
|
|
|
Furthermore, I am in support of the principle of capitalism that it
|
|
allows for transactions without irrelevant social considerations. This
|
|
principle protects both Neo-Nazis and other groups condemned by the
|
|
majority, such as homosexuals. Mr. Townson has criticized ISPs for
|
|
providing space for a profit. Does he oppose property and other rights
|
|
because a police officer is paid to protect them? Does he censure that
|
|
police officer for protecting rights out of self-interest? Does he
|
|
oppose efforts to heal the sick because a paid doctor is carrying them
|
|
out? Does he censure that doctor for doing what is good out of
|
|
self-interest? While not having a self-interested motive for doing
|
|
what is good is praiseworthy, doing so for the sake of self-interest
|
|
is no cause for condemnation. Doing evil, whether for the sake of
|
|
self-interest or not, is cause for condemnation. And any ISP who
|
|
censors is doing evil.
|
|
|
|
------------------------------
|
|
|
|
Date: Sun, 16 Dec 1995 22:51:01 CDT
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: File 6--Cu Digest Header Info (unchanged since 16 Dec, 1995)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send post with this in the "Subject:: line:
|
|
|
|
SUBSCRIBE CU-DIGEST
|
|
Send the message to: cu-digest-request@weber.ucsd.edu
|
|
|
|
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
|
|
|
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
To UNSUB, send a one-line message: UNSUB CU-DIGEST
|
|
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
|
|
(NOTE: The address you unsub must correspond to your From: line)
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
|
Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
|
|
In ITALY: ZERO! BBS: +39-11-6507540
|
|
In LUXEMBOURG: ComNet BBS: +352-466893
|
|
|
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
|
|
The most recent issues of CuD can be obtained from the
|
|
Cu Digest WWW site at:
|
|
URL: http://www.soci.niu.edu/~cudigest/
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #8.10
|
|
************************************
|
|
|