1118 lines
47 KiB
Plaintext
1118 lines
47 KiB
Plaintext
|
|
Computer underground Digest Fri Aug 2, 1996 Volume 8 : Issue 57
|
|
ISSN 1004-042X
|
|
|
|
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
|
|
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
|
|
Archivist: Brendan Kehoe
|
|
Shadow Master: Stanton McCandlish
|
|
Field Agent Extraordinaire: David Smith
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
|
|
|
CONTENTS, #8.57 (Fri, Aug 2, 1996)
|
|
File 1--: ACT NOW! freedom & privacy trashed in grab for police-state power
|
|
File 2--Cu Digest Header Info (unchanged since 7 Apr, 1996)
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
---------------------------------------------------------------------
|
|
|
|
Date: Fri, 2 Aug 1996 11:05:43 -0700
|
|
From: jwarren@WELL.COM(Jim Warren)
|
|
Subject: File 1--Freedom & privacy trashed in grab for police-state power
|
|
|
|
((This CuD special issue is devoted to two combined posts from
|
|
Jim Warren, a long-time Net activist))
|
|
|
|
This is not a drill! We ARE under direct attack, NOW!
|
|
|
|
I would not normally broadcast (spam) this so widely, especially of such
|
|
length, unedited.
|
|
|
|
But this effort by federal enforcers and the President, to massively
|
|
demolish much of what's left of our nation's civil liberties and whatever
|
|
little we have of privacy protection is SO CAPRICIOUS and MOVING SO FAST
|
|
THROUGH CONGRESS that it requires INSTANT RESPONSE in the form of IMMEDIATE
|
|
phone calls and faxes to *our* "representatives" -- if there is any *hope*
|
|
to turn this appalling stampede to Big Brotherhood by Congress critters.
|
|
|
|
--jim
|
|
Jim Warren, GovAccess list-owner/editor, advocate & columnist (jwarren@well.com)
|
|
345 Swett Rd., Woodside CA 94062; voice/415-851-7075; fax/<# upon request>
|
|
|
|
[puffery FWIW: Hugh M. Hefner First-Amendment Award, Playboy Foundation;
|
|
James Madison Freedom-of-Information Award, Soc.of Prof.Journalists-Nor.Cal.;
|
|
Pioneer Award, Electronic Frontier Foundation (its first year, 1992);
|
|
founded InfoWorld, DataCast, Computers, Freedom & Privacy confs, etc. :-).]
|
|
|
|
|
|
|
|
&&&&&&&&&&&&&&&&&&&&
|
|
|
|
|
|
|
|
Date: Thu, 1 Aug 1996 10:15:15 -0800
|
|
From: telstar@wired.com (--Todd Lappin-->)
|
|
Subject--ALERT: Clinton's Wiretap Gambit
|
|
|
|
|
|
** RED ALERT **
|
|
|
|
The Clinton administration is exploiting the TWA crash and the Atlanta
|
|
Olympics blast to secure a massive expansion of FBI wiretap authority --
|
|
RIGHT NOW -- without public hearings, and without requiring the FBI to
|
|
publicly disclose evidence that it needs the increased snooping power.
|
|
|
|
The administration wants Congress to approve the new measures before the
|
|
recess which begins Friday (tomorrow!), so that the president can sign them
|
|
into law Monday.
|
|
|
|
Congress is prepared to back the plan.
|
|
|
|
An agreement the administration reached with Congress last night would
|
|
authorize:
|
|
|
|
-- emergency wiretap authority under which a "suspected
|
|
terrorist's" calls could be tapped for 48 hours WITHOUT a judge's order, and
|
|
|
|
-- roving, multi-point wiretaps that cover a suspect instead of just one
|
|
telephone.
|
|
|
|
This is happening so quickly that we have very little opportunity to mount
|
|
a response.
|
|
|
|
Moreover, all this is probably a curtain-raiser for the next phase of the
|
|
Clinton administration's assault on privacy. Come September, brace
|
|
yourself for increased calls for full funding for the Digital Telephony
|
|
wiretap provisions, AND the introduction of crypto key escrow legislation.
|
|
|
|
More detail on the current situation below.
|
|
|
|
--Todd Lappin-->
|
|
WIRED Magazine
|
|
|
|
------------------------------------------------
|
|
From: http://www.yahoo.com/headlines/960801/news/stories/terrorism_19.html
|
|
(Similar story at http://www.cnn.com)
|
|
|
|
Accord Reached on U.S. Anti-Terrorism Bill
|
|
|
|
WASHINGTON (Reuter) - U.S. lawmakers reached broad accord with the
|
|
Clinton administration Wednesday on the shape of possible new
|
|
anti-terrorism legislation following the crash of TWA Flight 800 and a
|
|
pipe-bomb blast at the Olympic Games.
|
|
|
|
Announcement of the agreement followed a series of negotiating sessions
|
|
between House and Senate members of both parties and White House chief
|
|
of staff Leon Panetta.
|
|
|
|
``I am very confident that we are going to be able to put a bill
|
|
together that hopefully will be adopted by the House and Senate and
|
|
passed on to the president,'' Panetta told reporters.
|
|
|
|
Clinton had sought swift action on areas where agreement could be found
|
|
before Congress leaves town at the end of the week for a month's recess.
|
|
``We're looking for some immediate help,'' Clinton said Tuesday.
|
|
|
|
Congressional staff were to work through much of the night to work on
|
|
legislative language.
|
|
|
|
The announcement by Panetta and the leader of the congressional task
|
|
force, Larry Craig, an Idaho Republican, followed earlier signals by
|
|
Republican leaders casting doubt on whether Congress could act this
|
|
week.
|
|
|
|
In a letter to Clinton, Republican leaders had said that more
|
|
information was needed before any final decisions could be made, and
|
|
expressed concern that anti-terorrism money and authority already
|
|
provided was was not being used.
|
|
|
|
The letter, signed by House Speaker Newt Gingrich, Senate Leader Trent
|
|
Lott and House Leader Dick Armey, requested a briefing by Attorney
|
|
General Janet Reno, FBI Director Louis Freeh and Panetta Thursday.
|
|
|
|
But Lott, who had told reporters earlier he did not see how a bill could
|
|
be approved by the weekend and sent to Clinton, told the Senate in
|
|
mid-evening: ``We believe we can take up an agreed-to package on the
|
|
anti-terrorism issue hopefully tomorrow or Friday.''
|
|
|
|
Craig said that seven or eight areas had been under discussion and
|
|
agreement reached on five that would be examined. ``Both sides had to
|
|
swallow hard on several issues,'' he said.
|
|
|
|
The accord includes expansion of wiretap authority linked, as a
|
|
tradeoff, to strengthening of privacy laws. This would include
|
|
multi-point wiretaps that would cover a suspect instead of just one
|
|
telephone, and emergency wiretap authority under which a suspected
|
|
terorist's calls could be tapped for 48 hours without a judge's order.
|
|
|
|
Craig said the accord included a new capital offense for murder by
|
|
bombing ``specific to the Olympics.'' It also includes a blue ribbon
|
|
presidential commission to look at the long-term terrorism threat.
|
|
|
|
Apparently out of the deal is the controversial question of placing a
|
|
distinctive chemical in black powder, which might have been the
|
|
explosive used in the Olympic pipe-bomb, to help trace it.
|
|
|
|
|
|
|
|
|
|
&&&&&&&&&&&&&&&&&&&&
|
|
|
|
|
|
|
|
|
|
Date: Thu, 1 Aug 1996 10:00:30 -0400
|
|
From: editor@cdt.org (Bob Palacios)
|
|
Subject--Policy Post 2.29 - Administration, Congress Propose Sweeping
|
|
Anti-Terrorism Initiatives
|
|
|
|
-----------------------------------------------------------------------------
|
|
_____ _____ _______
|
|
/ ____| __ \__ __| ____ ___ ____ __
|
|
| | | | | | | | / __ \____ / (_)______ __ / __ \____ _____/ /_
|
|
| | | | | | | | / /_/ / __ \/ / / ___/ / / / / /_/ / __ \/ ___/ __/
|
|
| |____| |__| | | | / ____/ /_/ / / / /__/ /_/ / / ____/ /_/ (__ ) /_
|
|
\_____|_____/ |_| /_/ \____/_/_/\___/\__, / /_/ \____/____/\__/
|
|
The Center for Democracy and Technology /____/ Volume 2, Number 29
|
|
----------------------------------------------------------------------------
|
|
A briefing on public policy issues affecting civil liberties online
|
|
----------------------------------------------------------------------------
|
|
CDT POLICY POST Volume 2, Number 29 August 1, 1996
|
|
|
|
CONTENTS: (1) Clinton Administration, Congress Propose Sweeping
|
|
Anti-Terrorism Initiatives
|
|
(2) How to Subscribe/Unsubscribe
|
|
(3) About CDT, contacting us
|
|
|
|
** This document may be redistributed freely with this banner intact **
|
|
Excerpts may be re-posted with permission of <editor@cdt.org>
|
|
** This document looks best when viewed in COURIER font **
|
|
-----------------------------------------------------------------------------
|
|
|
|
(1) CLINTON ADMINISTRATION, CONGRESS PROPOSE SWEEPING ANTI-TERRORISM
|
|
INITIATIVES
|
|
|
|
In the wake of the recent bombing at the Olympics and the suspected
|
|
terrorist involvement in the TWA crash, the Clinton Administration and
|
|
members of Congress are proposing a set of sweeping counter-terrorism
|
|
initiatives. If enacted into law, these proposals will dramatically
|
|
increase law enforcement surveillance authority over the Internet and other
|
|
advanced communications technologies. An outline of the Administration's
|
|
proposal was circulated on Capitol Hill on Monday July 29.
|
|
|
|
President Clinton has urged Congress to pass new counter-terrorism
|
|
legislation before the Congressional recess at the end of this week. While
|
|
several prominent Republican members of Congress, including House Speaker
|
|
Newt Gingrich (R-GA), have said publicly that Congress should not rush into
|
|
any new counter-terrorism legislation, most observers believe there is a
|
|
strong possibility that some or all of the Administration's proposal will
|
|
be enacted before the August recess.
|
|
|
|
The draft proposal contains several measures which were rejected by
|
|
Congress as part of the previous counter-terrorism initiative proposed
|
|
last year after the Oklahoma City bombing, as well as several new measures
|
|
including as-yet unspecified changes to U.S. encryption policy and funding
|
|
for the Communications Assistance for Law Enforcement Act (CALEA, a.k.a.
|
|
Digital Telephony).
|
|
|
|
CDT is concerned that the latest counter-terrorism efforts on Capitol Hill
|
|
are occurring without appropriate deliberation. Major policy decisions
|
|
expanding the surveillance powers of law enforcement should not be made
|
|
without careful consideration of the necessity of such proposals and the
|
|
relative benefit to society. In the coming days and weeks, CDT will work
|
|
with Congressional leaders, privacy advocates, and the net.community to
|
|
ensure that constitutional civil liberties and the openness of the Internet
|
|
are protected as Congress considers counter-terrorism measures.
|
|
________________________________________________________________________
|
|
|
|
MAJOR POINTS OF THE COUNTER-TERRORISM PROPOSALS CIRCULATING ON THE HILL
|
|
|
|
The administration's new counter-terrorism initiative and other amendments
|
|
circulating this week in Congress contain numerous provisions, but four
|
|
are of particular concern to the net.community:
|
|
|
|
* New Threats to Encryption, Opposition to the Pro-CODE Bill
|
|
* Funding for Digital Telephony Without Public Accountability
|
|
* Amendment to Criminalize 'Bomb-Making' Information on the Internet
|
|
* Expanded Authority for Multi-Point, "Roving" Wiretaps
|
|
|
|
The full text of the Administration's proposal and background information
|
|
are available at CDT's counter-terrorism Web Page:
|
|
|
|
http://www.cdt.org/policy/terrorism/
|
|
|
|
--------------------------------------------------------
|
|
|
|
I. NEW THREATS TO ENCRYPTION, OPPOSITION TO THE PRO-CODE BILL
|
|
|
|
The Administration's outline contains the following statement on encryption:
|
|
|
|
"* Encryption -- We will seek legislation to strengthen our ability to
|
|
prevent terrorists from coming into the possession of the technology
|
|
to encrypt their communications and data so that they are beyond the
|
|
reach of law enforcement. We oppose legislation that would eliminate
|
|
current export barriers and encouraging the proliferation of encryption
|
|
which blocks appropriate access to protect public safety and the
|
|
national security."
|
|
|
|
While no specific legislative language has yet been proposed, this
|
|
represents the first statement by the Administration that they will seek
|
|
legislation to further restrict encryption. Even more troubling, the
|
|
Administration is clearly attempting to use the recent suspected terrorist
|
|
incidents to push for a new and more restrictive encryption policy.
|
|
|
|
This new proposal comes as Congress is finally beginning to seriously
|
|
consider major changes in U.S. encryption policy. Bipartisan legislation
|
|
in both the House and Senate to relax encryption export controls is gaining
|
|
momentum. The Senate Commerce Committee has held 3 hearings in the last 6
|
|
weeks, and is preparing to vote to send the Burns/Leahy "Pro-CODE" bill (S.
|
|
1726) to the floor of the Senate. The Administration's attempt to leverage
|
|
the public's concern about terrorism to block passage of the Pro-CODE bill
|
|
is disturbing, and poses a significant threat to privacy and security on the
|
|
Internet.
|
|
|
|
CDT is working with members of Congress, privacy advocates, and the
|
|
communications and computer industries to oppose any attempt by the
|
|
Administration to impose new restrictions on encryption, and we continue to
|
|
work to move the bipartisan export relief legislation through Congress.
|
|
|
|
--------------------------------------------------------
|
|
|
|
II. FUNDING FOR DIGITAL TELEPHONY WITHOUT PUBLIC ACCOUNTABILITY
|
|
|
|
The Administration is also seeking to override the public accountability
|
|
provisions of the Communications Assistance for Law Enforcement Act (CALEA
|
|
- a.k.a. 'Digital Telephony') by providing a funding for the law in a way
|
|
that prevents public oversight of the FBI's surveillance ability.
|
|
|
|
Enacted in October of 1994, granted law enforcement new authority to
|
|
influence the design of telecommunications networks (the Internet,
|
|
Commercial online services, and BBS's were exempted) in order to preserve
|
|
their ability to conduct court authorized electronic surveillance.
|
|
|
|
Congress balanced this new authority with a number of mechanisms to ensure
|
|
public accountability over law enforcement surveillance ability.
|
|
While complicated, the public accountability mechanisms are designed to
|
|
work as follows:
|
|
|
|
* Law enforcement provides telecommunications carriers, the Congress,
|
|
and the public with notice of its surveillance capacity needs (i.e.,
|
|
the number of simultaneous wiretaps in a given geographic location)
|
|
with an opportunity for public comment.
|
|
|
|
* Based on an assessment of the reasonableness of the law enforcement
|
|
surveillance capacity request, Congress appropriates money to cover
|
|
the cost of modifications. If Congress does not believe law
|
|
enforcement has adequately justified its request, money will not be
|
|
appropriated.
|
|
|
|
* Telecommunications carriers are not obligated to comply with the
|
|
statute or make any capacity modifications without government
|
|
reimbursement.
|
|
|
|
In October 1995, the FBI published its first notice of surveillance
|
|
capacity (see CDT Policy Post Vol. 1, No. 26). The telecommunications
|
|
industry and privacy advocates used the public accountability provisions of
|
|
CALEA to respond to the FBI's request and argued that the FBI had not
|
|
adequately justified the extensive surveillance capability contained in the
|
|
request. As a result, Congress has not yet appropriated funds and no
|
|
modifications have been made.
|
|
|
|
The FBI clearly believes that the public accountability provisions of CALEA
|
|
are working **too well**, and appears to be using the recent focus on
|
|
terrorism to push for a new funding mechanism which does not contain public
|
|
oversight.
|
|
|
|
CDT is fighting hard to ensure that the public accountability provisions of
|
|
CALEA, which have until now prevented the FBI from acquiring unnecessary
|
|
surveillance capacity, remain a part of the law, and will vigorously oppose
|
|
any effort by the FBI and the Clinton Administration to remove the last
|
|
opportunity for public oversight over law enforcement power.
|
|
|
|
--------------------------------------------------------
|
|
|
|
III. THE AVAILABILITY OF 'BOMB-MAKING' INFORMATION ON THE INTERNET
|
|
|
|
Senator Dianne Feinstein (D-CA) has reintroduced an amendment to make it
|
|
illegal to disseminate information on how to construct explosives knowing
|
|
that the information will be used in furtherance of a federal crime. The
|
|
amendment was adopted by the Senate earlier this month as part of a
|
|
Department of Defense Appropriations bill. CDT believes that the vague
|
|
provisions of the Feinstein amendment could have a chilling effect on online
|
|
speech, needlessly duplicate existing criminal statutes, and should be
|
|
removed.
|
|
|
|
Feinstein first proposed the amendment as part of the 1995
|
|
counter-terrorism bill. The initial Feinstein amendment was extremely broad
|
|
and would have resulted in a flat ban on certain constitutionally protected
|
|
speech online. After civil liberties advocates objected, Feinstein
|
|
narrowed her amendment substantially, although it was ultimately dropped
|
|
from the final terrorism bill signed in April 1996.
|
|
|
|
--------------------------------------------------------
|
|
|
|
IV. EXPANDED WIRETAP AUTHORITY
|
|
|
|
The Administration's proposal would also significantly expand current
|
|
wiretapping authority to allow multi-point (or "roving") wiretaps. This
|
|
would dramatically change surveillance authority to include wiretaps of
|
|
INDIVIDUALS instead of LOCATIONS.
|
|
|
|
This proposal would do away with the delicate balance between privacy and
|
|
law enforcement that Congress has struck over 30 years of wiretapping
|
|
legislation. Federal law has always required that wiretaps issue for a
|
|
specific location, to meet Fourth Amendment requirements. In 1986 Congress
|
|
introduced a narrow exception to this rule, only for cases where it could
|
|
be shown that the target was intentionally evading wiretaps by changing
|
|
facilities. The Administration proposal would completely remove this
|
|
standard, allowing so-called "roving taps" for any persons whose behavior
|
|
makes wiretapping difficult for law enforcement.
|
|
|
|
The administration proposed similar provisions in the spring of 1995 in the
|
|
wake of the Oklahoma City bombing. These provisions proved controversial in
|
|
Congress and were dropped from the final bill.
|
|
|
|
________________________________________________________________________
|
|
|
|
FOR MORE INFORMATION
|
|
|
|
For more information on the counter-terrorism proposals and their impact on
|
|
the Internet check out:
|
|
|
|
CDT's Counter-Terrorism Page: http://www.cdt.org/policy/terrorism/
|
|
CDT's Encryption Policy Page: http://www.cdt.org/crypto/
|
|
CDT's Digital Telephony Page: http://www.cdt.org/digtel.html
|
|
Encryption Policy Resource Page: http://www.crypto.com/
|
|
|
|
------------------------------------------------------------------------
|
|
|
|
(4) SUBSCRIPTION INFORMATION
|
|
|
|
Be sure you are up to date on the latest public policy issues affecting
|
|
civil liberties online and how they will affect you! Subscribe to the CDT
|
|
Policy Post news distribution list. CDT Policy Posts, the regular news
|
|
publication of the Center For Democracy and Technology, are received by
|
|
nearly 10,000 Internet users, industry leaders, policy makers and
|
|
activists, and have become the leading source for information about
|
|
critical free speech and privacy issues affecting the Internet and other
|
|
interactive communications media.
|
|
|
|
To subscribe to CDT's Policy Post list, send mail to
|
|
|
|
policy-posts-request@cdt.org
|
|
|
|
with a subject:
|
|
|
|
subscribe policy-posts
|
|
|
|
If you ever wish to remove yourself from the list, send mail to the
|
|
above address with a subject of:
|
|
|
|
unsubscribe policy-posts
|
|
|
|
-----------------------------------------------------------------------
|
|
|
|
(5) ABOUT THE CENTER FOR DEMOCRACY AND TECHNOLOGY/CONTACTING US
|
|
|
|
The Center for Democracy and Technology is a non-profit public interest
|
|
organization based in Washington, DC. The Center's mission is to develop
|
|
and advocate public policies that advance democratic values and
|
|
constitutional civil liberties in new computer and communications
|
|
technologies.
|
|
|
|
Contacting us:
|
|
|
|
General information: info@cdt.org
|
|
World Wide Web: URL:http://www.cdt.org/
|
|
FTP URL:ftp://ftp.cdt.org/pub/cdt/
|
|
|
|
Snail Mail: The Center for Democracy and Technology
|
|
1634 Eye Street NW * Suite 1100 * Washington, DC 20006
|
|
(v) +1.202.637.9800 * (f) +1.202.637.0968
|
|
|
|
-----------------------------------------------------------------------
|
|
End Policy Post 2.29 8/1/96
|
|
-----------------------------------------------------------------------
|
|
|
|
|
|
|
|
|
|
&&&&&&&&&&&&&&&&&&&&
|
|
|
|
|
|
|
|
|
|
From: shabbir@vtw.org (Shabbir J. Safdar)
|
|
Date: Thu, 01 Aug 1996 16:44:06 -0400
|
|
|
|
please send this to your own lists..
|
|
|
|
-Shabbir J. Safdar * Online Representative * Voters Telecomm. Watch (VTW)
|
|
http://www.vtw.org/ * Defending Your Cyberspace Rights In The Real World *
|
|
|
|
|
|
======================================================================
|
|
____ _____ ____ ___ _ _____ ____ _____
|
|
| _ \| ____| _ \ / _ \| | | ____| _ \_ _| CONGRESS RUSHING TO
|
|
| |_) | _| | | | | | |_| | | | _| | |_) || | ENACT SURVEILLANCE
|
|
| _ <| |___| |_| | | _ | |___| |___| _ < | | LEGISLATION. CALL
|
|
|_| \_\_____|____/ |_| |_|_____|_____|_| \_\|_| CONGRESS NOW! 8/1/96
|
|
|
|
REPOST THIS ALERT WHERE APPROPRIATE
|
|
DO NOT REDISTRIBUTE AFTER AUGUST 7, 1996
|
|
----------------------------------------------------------------------
|
|
Table of contents
|
|
Introduction
|
|
What you can do now
|
|
Background
|
|
Participating organizations
|
|
----------------------------------------------------------------------
|
|
INTRODUCTION
|
|
|
|
Late Wednesday, Congress and the Clinton Administration reached a
|
|
preliminary agreement on a sweeping new surveillance initiative. The
|
|
President and several Congressional leaders are pushing for a vote on the
|
|
measure BEFORE CONGRESS RECESSES ON AUGUST 2.
|
|
|
|
If enacted, parts of the proposal would dramatically impact privacy and
|
|
security on the Internet and other advanced communications technologies.
|
|
|
|
Of particular concern are provisions which:
|
|
|
|
1. Allows law enforcement to wiretap "suspected terrorists" for up to
|
|
48 hours BEFORE obtaining a court order
|
|
2. Provide funding for the Digital Telephony Proposal without any public
|
|
accountability over how the FBI spends the funds
|
|
|
|
Other provisions are also circulating that would:
|
|
|
|
3. Threaten to impose new restrictions on encryption technologies
|
|
4. Seek to criminalize the distribution of 'bomb-making' information on
|
|
the Internet that is legal in print.
|
|
|
|
Congress needs to hear from you. Congress will rush through the passage
|
|
of massive new surveillance plans with privacy risks unless you
|
|
show them there is support for slow, deliberate, reasoned thought on
|
|
the issue.
|
|
|
|
----------------------------------------------------------------------
|
|
WHAT YOU CAN DO NOW
|
|
|
|
CALL KEY MEMBERS OF CONGRESS IMMEDIATELY!
|
|
NO LATER THAN FRIDAY (8/2/96)
|
|
|
|
Please contact as many elected officials on the list below as you can.
|
|
Urge them to "go slow" and carefully consider the impact these
|
|
surveillance proposals will have on the privacy and security of
|
|
all Internet users.
|
|
|
|
Tell them while you appreciate their concern about combating terrorism,
|
|
the measures being proposed have many potential side effects which must be
|
|
carefully considered.
|
|
|
|
1. Call the key members of Congress below and ask them to "go slow" and
|
|
examine the issues before rushing into changing the delicate balance
|
|
of law enforcement surveillance and the public.
|
|
|
|
2. If you are at a loss for words, use the following sample communique:
|
|
|
|
SAMPLE COMMUNIQUE
|
|
|
|
Dear _________,
|
|
|
|
Please do not rush the passage of counter terrorism legislation;
|
|
I'm concerned that Congress is rushing without carefully
|
|
considering the implications of privacy. I'm from <city, state>.
|
|
|
|
Thanks, <click>
|
|
|
|
You should call the following members of Congress because they
|
|
are steering this legislation and need to hear there is support
|
|
for slow, deliberate, thoughtful consideration of this issue.
|
|
Some of thee members *have publicly expressed reservations* about this
|
|
legislation, and we should support them in their efforts.
|
|
|
|
Senate members:
|
|
|
|
P ST Name and Address Phone Fax
|
|
= == ======================== ============== ==============
|
|
R MS Lott, Trent 1-202-224-6253 1-202-224-2262
|
|
D DE Biden Jr., Joseph R. 1-202-224-5042 1-202-224-0139
|
|
D SD Daschle, Thomas A. 1-202-224-2321 1-202-224-2047
|
|
R UT Hatch, Orrin G. 1-202-224-5251 1-202-224-6331
|
|
R PA Specter, Arlen 1-202-224-4254 1-717-782-4920
|
|
D VT Leahy, Patrick J. 1-202-224-4242 1-202-224-3595
|
|
|
|
House members:
|
|
|
|
Dist ST Name, Address, and Party Phone Fax
|
|
==== == ======================== ============== ==============
|
|
6 GA Gingrich, Newt (R) 1-202-225-4501 1-202-225-4656
|
|
3 MO Gephardt, Richard A. (D) 1-202-225-2671 1-202-225-7452
|
|
6 IL Hyde, Henry J. (R) 1-202-225-4561 1-202-226-1240
|
|
14 MI Conyers Jr., John (D) 1-202-225-5126 1-202-225-0072
|
|
|
|
President William Clinton:
|
|
White House Comment Line: 1-202-456-1414
|
|
|
|
3. If you get a response, take a moment and send mail to vtw@vtw.org
|
|
with "feedback" in the subject line.
|
|
|
|
$ Mail vtw@vtw.org
|
|
Subject--my feedback from calling Congress
|
|
They said they're not going to pass most of Clinton's package,
|
|
because it upsets the delicate balance between law enforcement and
|
|
the public.
|
|
^D
|
|
Mail sent!
|
|
|
|
----------------------------------------------------------------------
|
|
BACKGROUND
|
|
|
|
Among other things, the law enforcement proposals circulating on Capitol
|
|
Hill include provisions which:
|
|
|
|
o WIRETAPPING WITHOUT COURT ORDER ALLOWED FOR 48 HOURS
|
|
|
|
Congress and the President have already agreed to provisions which
|
|
would dramatically expand law enforcement surveillance authority. Both
|
|
of these provisions were proposed by the President as part of the 1995
|
|
counter-terrorism legislation, but were dropped from the final bill
|
|
after Republicans and civil liberties advocates objected.
|
|
|
|
The current proposal would expand law enforcement surveillance
|
|
authority in two ways:
|
|
|
|
- Emergency 48 Hour Wiretap Authority: Current law requires law
|
|
enforcement officials to get the affirmative consent of a judge
|
|
before installing a wiretap.
|
|
|
|
The current proposal would expand law enforcement authority to
|
|
wiretap "suspected terrorists" for up to 48 hours before obtaining a
|
|
court order, limiting a critical 4th amendment safeguard.
|
|
|
|
- Multi-Point "Roving" Wiretaps: Current law allows law enforcement to
|
|
tap only specific LOCATIONS (i.e., a telephone number). In certain
|
|
very limited circumstances, law enforcement can tap a specific
|
|
INDIVIDUAL if it can be shown to a judge that the suspect is moving
|
|
from place to place with the specific intent of thwarting law
|
|
enforcement.
|
|
|
|
The current proposal would expand this so-called "roving" wiretap
|
|
authority by making it much easier for law enforcement to tap specific
|
|
INDIVIDUALS as opposed to specific physical locations. This change
|
|
would dramatically effect the balance between 4th Amendment privacy
|
|
rights and public safety which has existed for nearly 30 years, and
|
|
should not be enacted without careful consideration of the
|
|
implications.
|
|
|
|
o FUNDING FOR DIGITAL TELEPHONY WITHOUT PUBLIC ACCOUNTABILITY
|
|
|
|
The Administration and Congress are seeking funding to implement the
|
|
Digital Telephony Law in a way which eliminates any opportunity for
|
|
public oversight of law enforcement surveillance ability.
|
|
|
|
The controversial law, known officially as the Communications
|
|
Assistance for Law Enforcement Act (CALEA), granted the FBI new
|
|
authority to influence the design of telecommunications networks. At
|
|
the same time, the law provided substantial public oversight over the
|
|
FBI's surveillance ability by requiring the FBI to state, on the
|
|
public record, what its surveillance needs are.
|
|
|
|
The FBI has faced stiff resistance from civil liberties groups and some
|
|
members of Congress and has not yet been able to obtain funding to
|
|
implement the requirements of the law.
|
|
|
|
As part of the current proposal, the FBI is seeking a mechanism which
|
|
will provide funding for CALEA in a way which skirts the public
|
|
oversight provisions of the law. This is an extremely troubling move
|
|
by law enforcement which, if enacted, would allow law enforcement
|
|
essentially unlimited authority to influence the design of
|
|
telecommunications networks without any accountability.
|
|
|
|
Other provisions which could show up in legislation in the next 72 hours are:
|
|
|
|
o BOMB MAKING MATERIAL ON THE INTERNET
|
|
|
|
In the wake of the recent public concern about terrorism, Senators
|
|
Dianne Feinstein (D-CA) and Joseph Biden (D-DE) have renewed their
|
|
efforts to pass legislation to restrict the availability of 'bomb-
|
|
making' information on the Internet.
|
|
|
|
The Feinstein/Biden amendment was added to the Senate Defense
|
|
Appropriations bill (S. 1762) in early July, and is not currently part
|
|
of the new law enforcement initiative. However, the amendment poses a
|
|
serious threat to chill the the free flow of information on the
|
|
Internet.
|
|
|
|
o THREATEN TO IMPOSE NEW RESTRICTIONS ON ENCRYPTION TECHNOLOGIES:
|
|
|
|
While no specific legislation has been proposed, the Clinton
|
|
Administration has circulated an outline to Congress which states:
|
|
|
|
"We will seek legislation to strengthen our ability to
|
|
prevent terrorists from coming into the possession of the technology
|
|
to encrypt their communications and data so that they are beyond the
|
|
reach of law enforcement."
|
|
|
|
This statement marks the first time that the Administration has
|
|
suggested legislation to restrict encryption. This is especially
|
|
troubling because it comes at a time of growing Congressional support
|
|
for legislation to promote privacy and security tools for the Net.
|
|
Of even more concern, the Administration is clearly attempting to use
|
|
the recent suspected terrorist incidents to push for a new and more
|
|
restrictive encryption policy.
|
|
|
|
If the Administration succeeds in passing new restrictions on
|
|
encryption as part of the new surveillance legislation, the future
|
|
of the Internet as a secure and trusted platform for commerce and
|
|
private communication will be threatened.
|
|
|
|
Some or all of these provisions may be included in a package voted
|
|
on by both houses by August 3rd. It is not clear what a final bill
|
|
will look like, and some of these provisions may not be considered by
|
|
Congress until later this summer.
|
|
|
|
----------------------------------------------------------------------
|
|
PARTICIPATING ORGANIZATIONS
|
|
|
|
The following organizations all urge you to take this action to combat the
|
|
surveillance initiatives. Check their pages for more background
|
|
information on these issues.
|
|
|
|
American Civil Liberties Union (http://www.aclu.org)
|
|
American Communication Association
|
|
Center for Democracy and Technology (http://www.cdt.org)
|
|
Electronic Frontier Foundation (http://www.eff.org)
|
|
EF-Austin (http://www.efa.org)
|
|
Electronic Privacy Information Center (http://www.epic.org)
|
|
Feminists for Free Expression
|
|
National Libertarian Party (http://www.lp.org)
|
|
National Writers Union (http://www.nwu.org/nwu/)
|
|
People For the American Way (http://www.pfaw.org)
|
|
Voters Telecommunications Watch (http://www.vtw.org)
|
|
Wired Ventures Ltd. (http://www.hotwired.com)
|
|
======================================================================
|
|
|
|
|
|
Just processed these additional items on the administration's FAST-moving
|
|
efforts to demolish freedom and privacy in Amerika.
|
|
|
|
--jim
|
|
|
|
|
|
&&&&&&&&&&&&&&&&&&&&
|
|
|
|
|
|
HOUSE VOTE TO ALLOW MASSIVE, ILL-CONTROLLED SURVEILLANCE, LIKELY TODAY!
|
|
|
|
Date: Fri, 2 Aug 1996 11:07:40 -0400
|
|
From: jseiger@cdt.org (Jonah Seiger)
|
|
Subject--URGENT: Surveillance Bill Gets New Life - House Vote Likely TODAY!
|
|
|
|
(please forward where appropriate)
|
|
|
|
It's not over yet....
|
|
|
|
The House has scheduled a vote on "suspension" for a 'counter-terrorism'
|
|
bill TODAY (Friday).
|
|
|
|
Despite media reports that the negotiations had stalled out, house
|
|
Republicans have apparently worked out their differences and are set to
|
|
vote on the bill today. The Senate may or may not vote on the measure on
|
|
Saturday.
|
|
|
|
No one I've talked to knows for sure what's in the bill, though I have
|
|
heard that there are no encryption provisions and that some of the wiretap
|
|
proposals have been scaled back.
|
|
|
|
I will post details as I get them. In the mean time, keep those calls
|
|
coming into Congress.
|
|
|
|
Jonah
|
|
|
|
** THE FIGHT FOR FREE SPEECH ONLINE CONTINUES TO THE SUPREME COURT **
|
|
It's not too late to be a part of history -- Join the Lawsuit
|
|
<http://www.cdt.org/ciec> -- <ciec-info@cdt.org>
|
|
|
|
--
|
|
Jonah Seiger, Policy Analyst Center for Democracy and Technology
|
|
<jseiger@cdt.org> 1634 Eye Street NW, Suite 1100
|
|
Washington, DC 20006
|
|
PGP Key via finger (v) +1.202.637.9800
|
|
http://www.cdt.org/ (f) +1.202.637.0968
|
|
http://www.cdt.org/homes/jseiger/
|
|
|
|
|
|
&&&&&&&&&&&&&&&&&&&&
|
|
|
|
|
|
Date: Fri, 2 Aug 1996 12:17:07 -0400
|
|
From: jseiger@cdt.org (Jonah Seiger)
|
|
Subject--More on the latest Surveillance Bill...
|
|
|
|
The outline below is from a document produced by the House Republican
|
|
Conference. It is ONLY A SUMMARY of the proposed bill and is NOT actual
|
|
legislation. No one I have spoken with has seen any specific legislative
|
|
language yet.
|
|
|
|
The outline is confusing on several points, particularly the "FBI DIGITAL
|
|
TELEPHONY" Section, which says:
|
|
|
|
"The bill authorizes the FBI to use enhanced telephone technology to
|
|
investigate suspected terrorist activity. Funding for equipment purchase was
|
|
provided in the 1996 omnibus appropriations measure enacted earlier this
|
|
year."
|
|
|
|
The first sentence above is not at all clear, and probably won't be until
|
|
we can get our hands on the actual text of the bill. It could be additional
|
|
wiretap authority (ie, roving wiretaps), or it could be nothing. As far as
|
|
the funding goes, the "1996 omnibus appropriations measure" DID NOT contain
|
|
funding for implementation of the law - but it did appropriate $37 million
|
|
to cover new equipment for the FBI.
|
|
|
|
The rest looks like it is a scaled back version of a measure the
|
|
Administration and members of Congress were pushing earlier this week, but
|
|
the scope of the new bill depends a lot on what the actual text says.
|
|
|
|
I will post additional information as soon as I get it.
|
|
|
|
Jonah
|
|
|
|
--
|
|
|
|
|
|
Bipartisan Antiterrorism Initiative
|
|
HR__
|
|
|
|
Committee on the Judiciary
|
|
No Report Filed
|
|
To Be Introduced
|
|
|
|
Floor Situation:
|
|
|
|
The House is scheduled to consider HR__ on Friday August 2, 1996. On
|
|
Thursday August 1, the Rules Committee granted a rule to allow the bill to
|
|
be considered under suspension of the rules. It is debatable for 40
|
|
minutes, may not be amended, and requires a two-thirds vote for passage.
|
|
|
|
Summary:
|
|
|
|
HR__ includes several bipartisan initiatives intended to bolster federal
|
|
efforts to combat domestic terrorism in addition to those already enacted
|
|
earlier this year as part of the 1996 Antiterrorism and Effective Death
|
|
Penalty Act (P.L. 104-132). The bill contains the following
|
|
counter-terrorism provisions:
|
|
|
|
Aviation SECURITY MEASURES: The bill enables domestic airports to
|
|
aggressively search for and prevent explosives from causing destruction and
|
|
harm to individuals or property through enhanced explosive detection
|
|
procedures, baggage and passenger screening, and FBI authority to improve
|
|
airport security training and standards to ensure that provisions of the
|
|
1990 Aviation Security Act (P.L 101-604) are implemented expeditiously.
|
|
Specifically, the bill (1) requires the FAA to implement increased
|
|
explosives section methods immediately, (2) strengthen the level of
|
|
training and expertise possessed by security personnel who are assigned to
|
|
domestic airports, (3) allows airports to use available funding to
|
|
reinforce such training for security personnel, and (4) extends criminal
|
|
background requirements to include a greater number of airport employees.
|
|
|
|
IMPLEMENTATION OF EXISTING ANTI-TERRORISM LAWS: The bill urges
|
|
implementation of provisions enacted in the 1996 Antiterrorism and
|
|
Effective Death Penalty Act (P.L. 104-132), such as designating and
|
|
freezing the assets of foreign terrorist organizations and implementing
|
|
expedited removal procedures for aliens convicted of a crime.
|
|
|
|
BIPARTISAN "BLUE RIBBON" COMMISSION: The bill establishes a special
|
|
commission to review all aspects of U.S. anti-terrorism policy and make
|
|
legislative recommendations about methods to most effectively establish a
|
|
long-term defense against terrorist threats, including enhancing the
|
|
nation's human intelligence capabilities.
|
|
|
|
PRIVACY ACT AMENDMENTS: The bill includes provisions which grant a cause of
|
|
action against the U.S. if in the course of a wiretap investigation
|
|
damaging information is willfully disclosed to the detriment of an innocent
|
|
party by the federal government. The cause of action includes monetary
|
|
damages to the plaintiff if a favorable decision is rendered in federal
|
|
court.
|
|
|
|
EXPLOSIVES STUDY: The bill authorizes a study on black and smokeless powder
|
|
by an independent agency selected by the National Institute of Justice.
|
|
|
|
FEDERAL RACKETEERING STATUTE CRIMES: The bill permits federal prosecutors
|
|
to deem those acts determined to be terrorist in nature as substantial
|
|
enough to invoke criminal prosecution under existing criminal racketeering
|
|
(RICO) statutes.
|
|
|
|
FBI DIGITAL TELEPHONY: The bill authorizes the FBI to use enhanced
|
|
telephone technology to investigate suspected terrorist activity. Funding
|
|
for equipment purchase was provided in the 1996 omnibus appropriations
|
|
measure enacted earlier this year.
|
|
|
|
<...>
|
|
|
|
Jonah Seiger, Policy Analyst Center for Democracy and Technology
|
|
<jseiger@cdt.org> 1634 Eye Street NW, Suite 1100
|
|
Washington, DC 20006
|
|
PGP Key via finger (v) +1.202.637.9800
|
|
http://www.cdt.org/ (f) +1.202.637.0968
|
|
http://www.cdt.org/homes/jseiger/
|
|
|
|
|
|
&&&&&&&&&&&&&&&&&&&&
|
|
|
|
|
|
ELECTRONIC FRONTIER FOUNDATION ALSO ISSUED A LENGTHY (30KB) ACTION ALERT,
|
|
(Excerpted here)
|
|
|
|
Date: Thu, 1 Aug 1996 21:32:43 -0700 (PDT)
|
|
From: Stanton McCandlish <mech@eff.org>
|
|
Subject--EFFector Online 09.10: ALERT: Act NOW against wiretapping bill!
|
|
Reply-To: editor@eff.org
|
|
Organization: Electronic Frontier Foundation
|
|
X-EFF_General_Info: info@eff.org
|
|
X-URL: http://www.eff.org/pub/EFF/Newsletters/EFFector/
|
|
|
|
|
|
=========================================================================
|
|
________________ _______________ _______________
|
|
/_______________/\ /_______________\ /\______________\
|
|
\\\\\\\\\\\\\\\\\/ ||||||||||||||||| / ////////////////
|
|
\\\\\________/\ |||||________\ / /////______\
|
|
\\\\\\\\\\\\\/____ |||||||||||||| / /////////////
|
|
\\\\\___________/\ ||||| / ////
|
|
\\\\\\\\\\\\\\\\/ ||||| \////
|
|
|
|
=========================================================================
|
|
EFFector Online Volume 09 No. 10 Aug. 1, 1996 editors@eff.org
|
|
A Publication of the Electronic Frontier Foundation ISSN 1062-9424
|
|
|
|
IN THIS ISSUE:
|
|
|
|
ALERT: Congress Rushing to Enact Anti-Privacy Bill - Call Congress NOW!
|
|
Introduction
|
|
What you can do now
|
|
Background
|
|
Participating organizations
|
|
NewsNybbles
|
|
EFF Web Site Now Features "What's Hot" News Updates and Search Engine
|
|
Upcoming Events
|
|
Quote of the Day
|
|
What YOU Can Do
|
|
Administrivia
|
|
|
|
* See http://www.eff.org/Alerts/ or ftp.eff.org, /pub/Alerts/ for more
|
|
information on current EFF activities and online activism alerts! *
|
|
|
|
----------------------------------------------------------------------
|
|
|
|
|
|
Subject--ALERT: Congress Rushing to Enact Anti-Privacy Bill - Call Congress NOW!
|
|
--------------------------------------------------------------------------------
|
|
|
|
**** Last minute update ****
|
|
|
|
Just before ye editor was about to send this issue out, reports are
|
|
filtering in that negotiations on the bill that is the subject of the
|
|
alert below, have collapsed.
|
|
|
|
CNN reports: "Key members of the Senate blamed House conservatives for the
|
|
failure, saying they had insisted on linking proposed new
|
|
wiretapping authority for the FBI to an expansion of privacy laws."
|
|
|
|
CNN quotes Rep. Charles Schumer (D-NY) as saying that House Republican
|
|
leaders "have come up with this smokescreen called privacy". You may
|
|
wish to let Rep. Schumer know how you feel about your right to privacy
|
|
being labelled "a smokescreen":
|
|
|
|
9th Dist. NY Schumer, Charles E. (D)
|
|
1-202-225-6616 (voice), 1-202-225-4183 (fax)
|
|
|
|
The full text of the CNN article is available at:
|
|
http://www.cnn.com/US/9608/01/wh.terror.bill/index.html
|
|
|
|
The article also reports that "lawmakers said there is hope for
|
|
agreement after the month long" Congressional recess beginning at the end
|
|
of this week.
|
|
|
|
THIS MEANS THAT THE ALERT BELOW IS STILL URGENT, and still important.
|
|
We just have a short breathing space now.
|
|
|
|
- mech@eff.org
|
|
|
|
|
|
____ _____ ____ ___ _ _____ ____ _____
|
|
| _ \| ____| _ \ / _ \| | | ____| _ \_ _| CONGRESS RUSHING TO
|
|
| |_) | _| | | | | | |_| | | | _| | |_) || | ENACT SURVEILLANCE
|
|
| _ <| |___| |_| | | _ | |___| |___| _ < | | LEGISLATION. CALL
|
|
|_| \_\_____|____/ |_| |_|_____|_____|_| \_\|_| CONGRESS NOW! 8/1/96
|
|
|
|
REPOST THIS ALERT WHERE APPROPRIATE
|
|
DO NOT REDISTRIBUTE AFTER AUGUST 7, 1996
|
|
|
|
______________________________________________________________________
|
|
|
|
Table of contents
|
|
Introduction
|
|
What you can do now
|
|
Background
|
|
Participating organizations
|
|
______________________________________________________________________
|
|
|
|
|
|
* INTRODUCTION
|
|
|
|
<...>
|
|
|
|
* WHAT YOU CAN DO NOW
|
|
|
|
CALL KEY MEMBERS OF CONGRESS IMMEDIATELY!
|
|
NO LATER THAN FRIDAY (8/2/96)
|
|
|
|
Please contact as many elected officials on the list below as you can.
|
|
Urge them to "go slow" and carefully consider the impact these
|
|
surveillance proposals will have on the privacy and security of
|
|
all Internet users.
|
|
|
|
Tell them while you appreciate their concern about combating terrorism,
|
|
the measures being proposed have many potential side effects which must be
|
|
carefully considered.
|
|
|
|
1. Call the key members of Congress below and ask them to "go slow" and
|
|
examine the issues before rushing into changing the delicate balance
|
|
of law enforcement surveillance and the public.
|
|
|
|
2. If you are at a loss for words, use the following sample communique:
|
|
|
|
SAMPLE COMMUNIQUE
|
|
|
|
Dear _________,
|
|
|
|
Please do not rush the passage of counter terrorism legislation;
|
|
I'm concerned that Congress is rushing without carefully
|
|
considering the implications of privacy. I'm from <city, state>.
|
|
|
|
Thanks, <click>
|
|
|
|
You should call the following members of Congress because they
|
|
are steering this legislation and need to hear there is support
|
|
for slow, deliberate, thoughtful consideration of this issue.
|
|
Some of thee members *have publicly expressed reservations* about this
|
|
legislation, and we should support them in their efforts.
|
|
|
|
Senate members:
|
|
|
|
P ST Name and Address Phone Fax
|
|
= == ======================== ============== ==============
|
|
R MS Lott, Trent 1-202-224-6253 1-202-224-2262
|
|
D DE Biden Jr., Joseph R. 1-202-224-5042 1-202-224-0139
|
|
D SD Daschle, Thomas A. 1-202-224-2321 1-202-224-2047
|
|
R UT Hatch, Orrin G. 1-202-224-5251 1-202-224-6331
|
|
R PA Specter, Arlen 1-202-224-4254 1-717-782-4920
|
|
D VT Leahy, Patrick J. 1-202-224-4242 1-202-224-3595
|
|
|
|
House members:
|
|
|
|
Dist ST Name, Address, and Party Phone Fax
|
|
==== == ======================== ============== ==============
|
|
6 GA Gingrich, Newt (R) 1-202-225-4501 1-202-225-4656
|
|
3 MO Gephardt, Richard A. (D) 1-202-225-2671 1-202-225-7452
|
|
6 IL Hyde, Henry J. (R) 1-202-225-4561 1-202-226-1240
|
|
14 MI Conyers Jr., John (D) 1-202-225-5126 1-202-225-0072
|
|
|
|
President William Clinton:
|
|
White House Comment Line: 1-202-456-1414
|
|
|
|
3. If you get a response, take a moment and send mail to vtw@vtw.org
|
|
with "feedback" in the subject line.
|
|
|
|
$ Mail vtw@vtw.org
|
|
Subject--my feedback from calling Congress
|
|
They said they're not going to pass most of Clinton's package,
|
|
because it upsets the delicate balance between law enforcement and
|
|
the public.
|
|
^D
|
|
Mail sent!
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 21 Mar 1996 22:51:01 CST
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: File 2--Cu Digest Header Info (unchanged since 7 Apr, 1996)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send post with this in the "Subject:: line:
|
|
|
|
SUBSCRIBE CU-DIGEST
|
|
Send the message to: cu-digest-request@weber.ucsd.edu
|
|
|
|
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
|
|
|
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
To UNSUB, send a one-line message: UNSUB CU-DIGEST
|
|
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
|
|
(NOTE: The address you unsub must correspond to your From: line)
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
|
Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
|
|
In ITALY: ZERO! BBS: +39-11-6507540
|
|
In LUXEMBOURG: ComNet BBS: +352-466893
|
|
|
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
|
|
The most recent issues of CuD can be obtained from the
|
|
Cu Digest WWW site at:
|
|
URL: http://www.soci.niu.edu/~cudigest/
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #8.57
|
|
************************************
|
|
|