787 lines
31 KiB
Plaintext
787 lines
31 KiB
Plaintext
|
|
Computer underground Digest Wed Jun 3, 1998 Volume 10 : Issue 32
|
|
ISSN 1004-042X
|
|
|
|
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
|
|
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
|
|
Archivist: Brendan Kehoe
|
|
Shadow Master: Stanton McCandlish
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Field Agent Extraordinaire: David Smith
|
|
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
|
|
|
CONTENTS, #10.32 (Wed, Jun 3, 1998)
|
|
|
|
File 1--MURKOWSKI: Free Speech Chilled by Junk Email law
|
|
File 2--Murkowski "Unsolicited Commercial Email Choice Act"
|
|
File 3--REVIEW: "Privacy on the Line", Whitfield Diffie/Susan Landau
|
|
File 4--Cu Digest Header Info (unchanged since 25 Apr, 1998)
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
---------------------------------------------------------------------
|
|
|
|
Date: Thu, 14 May 1998 11:36:32 -0400
|
|
From: "Robert A. Costner" <pooh@efga.org>
|
|
Subject: File 1--MURKOWSKI: Free Speech Chilled by Junk Email law
|
|
|
|
Source -- Fight-Censorship List <fight-censorship@vorlon.mit.edu>
|
|
|
|
I would like to write something detailed about the recently passed (in the
|
|
Senate) spam law, but I don't have time today. So here are some quick
|
|
comments. The proposed will
|
|
|
|
* Restricts speech of normal email communications
|
|
* Is vague in that "Unsolicited" is not defined
|
|
* Has a trigger threshold of one email to one person
|
|
* Attempts to legislate a particular technology for removals
|
|
* Legitimizes spam, and does not effect many categories of spam
|
|
|
|
What follows are some random notes I have on this.
|
|
|
|
---------------------------
|
|
|
|
On May 12, 1998, the U.S. Senate adopted S. 1618 by a vote of 99-0. This
|
|
was Senator Murkowski's attempt at stopping email spam. The text of the
|
|
bill can be found at http://www.efga.org/netabuse/
|
|
|
|
An article in wired about this is located at
|
|
http://www.wired.com/news/news/politics/story/12289.html
|
|
|
|
The CAUCE web site, which no doubt has info on this is http://www.cauce.org/
|
|
|
|
THIS EMAIL MESSAGE YOU ARE READING IS A COMMERCIAL MESSAGE
|
|
|
|
Yes. Under the proposed bill, this is a commercial message. Why? Because
|
|
I have the wired link above, and wired is a site that by definition
|
|
|
|
(C) promotes the use of or contains a list of one or more
|
|
Internet sites that contain an advertisement
|
|
|
|
Guess what? Wired has advertisements. So do a lot of other sites. Please
|
|
correct me if I am wrong, but apparently sending one copy of this one
|
|
message to any one email address may place a $15,000 fine on me.
|
|
|
|
Some other info I found in the bill. For background.
|
|
|
|
Section 306 makes it illegal when any
|
|
|
|
intervening interactive computer service provider knowingly
|
|
and intentionally retransmits any electronic mail in violation
|
|
of Sections 301 or 306
|
|
|
|
This only seems to apply to commercial advertising, or more specifically
|
|
email that contains commercial advertising, whether or not the intent was
|
|
to advertise. It is unclear if this about to become federal law (in the
|
|
US) would hold a remailer or mail list liable for mail passing thru it.
|
|
|
|
(1) COMMERCIAL ELECTRONIC MAIL.- The term "commercial electronic
|
|
mail means any electronic mail that-
|
|
(A) contains an advertisement for the sale of a product or service;
|
|
(B) contains a solicitation for the use of a telephone number,
|
|
the use of which connects the user to a person or service that
|
|
advertises the sale of or sells a product or service; or
|
|
(C) promotes the use of or contains a list of one or more
|
|
Internet sites that contain an advertisement referred to in
|
|
subparagraph (A) or a solicitation referred to in subparagraph (B).
|
|
|
|
The bill is specific about removing headers. You may not alter headers to
|
|
make the message appear to not come from the original sender.
|
|
|
|
(b) ROUTING INFORMATION-All internet routing information
|
|
contained within or accompanying an electronic mail message
|
|
described in subsection (a) must be accurate, valid according
|
|
to the prevailing standards for Internet protocols, and
|
|
accurately reflect message routing.
|
|
|
|
It should be noted that the $15,000 fine does not apply to bulk email, but
|
|
to a single message sent to a single person.
|
|
|
|
Therefore, it would appear that this message is covered under the bill. If
|
|
this was sent by an anonymous remailer, it would seem the remailer operator
|
|
may be liable as well.
|
|
|
|
----------------------
|
|
|
|
Because this law effect all communications, not just bulk communications,
|
|
it requires that all email users maintain removal databases that are
|
|
triggered by the use of the keyword "remove" in the subject line. As in
|
|
|
|
Subject --Remove me from your stupid list
|
|
Subject --Re: Remove
|
|
Subject --Can you suggest how I remove ants from my yard?
|
|
|
|
Software will interpret all above cases as a remove request, which under
|
|
the law, they in fact are.
|
|
|
|
The law really seems to have a lot of free speech implications. Once I get
|
|
a chance, I'll read through it some more.
|
|
|
|
|
|
|
|
-- Robert Costner Phone: (770) 512-8746
|
|
Electronic Frontiers Georgia mailto:pooh@efga.org
|
|
http://www.efga.org/ run PGP 5.0 for my public key
|
|
|
|
------------------------------
|
|
|
|
Date: Fri, 15 May 1998 22:54:30 -0500
|
|
From: jthomas3@SUN.SOCI.NIU.EDU(Jim Thomas)
|
|
Subject: File 2--Murkowski "Unsolicited Commercial Email Choice Act"
|
|
|
|
((MODERATORS' NOTE: For those who missed it, here is a reprint of
|
|
the Murowski Act))
|
|
|
|
From: http://www.senate.gov/~murkowski/commercialemail
|
|
(Senator Frank Murkowski homepage)
|
|
|
|
Be it enacted by the Senate and House of Representatives of the United
|
|
States of America in Congress assembled,
|
|
|
|
SECTION 1. SHORT TITLE.
|
|
|
|
This Act may be cited as the ``Unsolicited Commercial Electronic Mail
|
|
Choice Act of 1997''.
|
|
|
|
SEC. 2. FINDINGS.
|
|
|
|
Congress makes the following findings:
|
|
|
|
(1) The Internet is a worldwide network of information that growing
|
|
numbers of Americans use on a regular basis for educational and
|
|
personal activities.
|
|
|
|
(2) Electronic mail messages transmitted on the Internet constitute an
|
|
increasing percentage of communications in the United States.
|
|
|
|
(3) Solicited commercial electronic mail is a useful and
|
|
cost-effective means for Americans to receive information about a
|
|
business and its products.
|
|
|
|
(4) The number of transmissions of unsolicited commercial electronic
|
|
mail advertisements has grown exponentially over the past several
|
|
years as the technology for creating and transmitting such
|
|
advertisements in bulk has made the costs of distribution of such
|
|
advertisements minimal.
|
|
|
|
(5) Individuals have available no effective means of differentiating
|
|
between unsolicited commercial electronic mail advertisements and
|
|
other Internet communications.
|
|
|
|
(6) The transmitters of unsolicited commercial electronic mail
|
|
advertisements can easily move from State to State.
|
|
|
|
(7) Individuals and businesses that receive unsolicited commercial
|
|
electronic mail advertisements often pay for the costs of such receipt
|
|
,including the costs of Internet access and long distance telephone
|
|
charges.
|
|
|
|
(8) Unsolicited commercial electronic mail can be used to advertise
|
|
legitimate services and goods but is also used for fraudulent and
|
|
deceptive purposes in violation of Federal and State law.
|
|
|
|
(9) Individuals and companies that use unsolicited commercial
|
|
electronic mail for fraudulent and deceptive purposes often use
|
|
fraudulent identification information in such electronic mail, making
|
|
it impossible for a recipient to request to be removed from the
|
|
mailing list or for law enforcement authorities to identify the
|
|
sender.
|
|
|
|
(10) The inability of recipients of unsolicited commercial electronic
|
|
mail to identify the senders of such electronic mail or to prevent its
|
|
receipt impedes the flow of commerce and communication on the Internet
|
|
and threatens the integrity of commerce on the Internet.
|
|
|
|
(11) Internet service providers are burdened by the cost of equipment
|
|
necessary to process unsolicited commercial electronic mail.
|
|
|
|
(12) To facilitate the development of commerce and communication on
|
|
the Internet, unsolicited commercial electronic mail should be readily
|
|
identifiable and filterable by individuals and Internet service
|
|
providers.
|
|
|
|
SEC. 3. REQUIREMENTS RELATING TO TRANSMISSIONS OF UNSOLICITED
|
|
COMMERCIAL ELECTRONIC MAIL.
|
|
|
|
(a) Information on Advertisement.
|
|
|
|
(1) Requirement.
|
|
|
|
Unless otherwise authorized pursuant to a provision of section 7, a
|
|
person who transmits an electronic mail message as part of the
|
|
transmission of unsolicited commercial electronic mail shall cause to
|
|
appear in each electronic mail message transmitted as part of such
|
|
transmission the information specified in paragraph (3).
|
|
|
|
(2) Placement.
|
|
|
|
(A) Advertisement.
|
|
|
|
The information specified in subparagraph (A) of paragraph (3) shall
|
|
appear as the first word of the subject line of the electronic mail
|
|
message without any prior text or symbol.
|
|
|
|
(B) Other information._The information specified in subparagraph (B)
|
|
of that paragraph shall appear prominently in the body of the message.
|
|
|
|
|
|
(3) Covered information.
|
|
|
|
The following information shall appear in an electronic mail message
|
|
under paragraph (1):
|
|
|
|
(A) The term ``advertisement''.
|
|
|
|
(B) The name, physical address, electronic mail address, and telephone
|
|
number of the person who initiates transmission of the message.
|
|
|
|
(b) Routing Information.
|
|
|
|
All Internet routing information contained within or accompanying an
|
|
electronic mail message described in subsection (a) shall be valid
|
|
according to the prevailing standards for Internet protocols.
|
|
|
|
(c) Effective Date.
|
|
|
|
The requirements in this section shall take effect 30 days after the
|
|
date of enactment of this Act.
|
|
|
|
SEC. 4. FEDERAL REGULATION OF UNSOLICITED COMMERCIAL ELECTRONIC MAIL.
|
|
|
|
(a) Transmissions.
|
|
|
|
(1) In general.
|
|
|
|
Upon notice from a person of the person's receipt of electronic mail
|
|
in violation of a provision of section 3 or 7, the Commission
|
|
|
|
(A) may conduct an investigation to determine whether or not the
|
|
electronic mail was transmitted in violation of the provision; and
|
|
|
|
(B) if the Commission determines that the electronic mail was
|
|
transmitted in violation of the provision, may
|
|
|
|
(i) impose upon the person initiating the transmission a civil fine in
|
|
an amount not to exceed $11,000;
|
|
|
|
(ii) commence in a district court of the United States a civil action
|
|
to recover a civil penalty in an amount not to exceed $11,000 against
|
|
the person initiating the transmission; or
|
|
|
|
(iii) both impose a fine under clause (i) and commence an action under
|
|
clause (ii).
|
|
|
|
(2) Deadline.
|
|
|
|
The Commission may not take action under paragraph (1)(B) with respect
|
|
to a transmission of electronic mail more than 2 years after the date
|
|
of the transmission.
|
|
|
|
(b) Administration.
|
|
|
|
(1) Notice by electronic means.
|
|
|
|
The Commission shall establish an Internet web site with an electronic
|
|
mail address for the receipt of notices under subsection (a).
|
|
|
|
(2) Information on enforcement.
|
|
|
|
The Commission shall make available through the Internet web site
|
|
established under paragraph (2) information on the actions taken by
|
|
the Commission under subsection (a)(1)(B).
|
|
|
|
(3) Assistance of federal communications commission.
|
|
|
|
The Federal Communications Commission may assist the Commission in
|
|
carrying out its duties this section.
|
|
|
|
SEC. 5. ACTIONS BY STATES.
|
|
|
|
(a) In General.
|
|
|
|
Whenever an attorney general of any State has reason to believe that
|
|
the interests of the residents of that State have been or are being
|
|
threatened or adversely affected because any person is engaging in a
|
|
pattern or practice of the transmission of electronic mail in
|
|
violation of a provision of section 3 or 7, the State, as parens
|
|
patriae, may bring a civil action on behalf of its residents to enjoin
|
|
such transmission, to enforce compliance with the provision, to obtain
|
|
damages or other compensation on behalf of its residents, or to obtain
|
|
such further and other relief as the court considers appropriate.
|
|
|
|
(b) Notice to Commission.
|
|
|
|
(1) Notice.
|
|
|
|
The State shall serve prior written notice of any civil action under
|
|
this section upon the Commission and provide the Commission with a
|
|
copy of its complaint, except that if it is not feasible for the State
|
|
to provide such prior notice, the State shall serve written notice
|
|
immediately upon instituting such action.
|
|
|
|
(2) Rights of commission.
|
|
|
|
Upon receiving a notice with respect to a civil action under paragraph
|
|
(1), the Commission shall have the right
|
|
|
|
(A) to intervene in the action;
|
|
|
|
(B) upon so intervening, to be heard in all matters arising therein;
|
|
and
|
|
|
|
(C) to file petitions for appeal.
|
|
|
|
(c) Actions by Commission.
|
|
|
|
Whenever a civil action has been instituted by or on behalf of the
|
|
Commission for violation of a provision of section 3 or 7, no State
|
|
may, during the pendency of such action, institute a civil action
|
|
under this section against any defendant named in the complaint in
|
|
such action for violation of any provision as alleged in the
|
|
complaint.
|
|
|
|
(d) Construction.
|
|
|
|
For purposes of bringing a civil action under subsection(a), nothing
|
|
in this section shall prevent an attorney general from exercising the
|
|
powers conferred on the attorney general by the laws of the State
|
|
concerned to conduct investigations or to administer oaths or
|
|
affirmations or to compel the attendance of witnesses or the
|
|
production of documentary or other evidence.
|
|
|
|
(e) Venue; Service of Process.
|
|
|
|
Any civil action brought under subsection (a)in a district court of
|
|
the United States may be brought in the district in which the
|
|
defendant is found, is an inhabitant, or transacts business or
|
|
wherever venue is proper under section 1391 of title 28, United States
|
|
Code. Process in such an action may be served in any district in which
|
|
the defendant is an inhabitant or in which the defendant may be found.
|
|
|
|
|
|
(f) Actions by Other State Officials.
|
|
|
|
Nothing in this section may be construed to prohibit an authorized
|
|
State official from proceeding in State court on the basis of an
|
|
alleged violation of any civil or criminal statute of the State
|
|
concerned.
|
|
|
|
(g) Definition.
|
|
|
|
In this section, the term ``attorney general'' means the chief legal
|
|
officer of a State.
|
|
|
|
SEC. 6. INTERNET SERVICE PROVIDERS.
|
|
|
|
(a) Exemption for Certain Transmissions.
|
|
|
|
The provisions of this Act shall not apply to a transmission of
|
|
electronic mail by an interactive computer service provider unless the
|
|
provider initiates the transmission.
|
|
|
|
(b) Notice of Transmissions from Commission.
|
|
|
|
Not later than 72 hours after receipt from the Commission of notice
|
|
that its computer equipment may have been used by another person to
|
|
initiate a transmission of electronic mail in violation of a provision
|
|
of section 3 or 7, an interactive computer service provider shall
|
|
|
|
(1) provide the Commission such information as the Commission requires
|
|
in order to determine whether or not the computer equipment of the
|
|
provider was used to initiate the transmission; and
|
|
|
|
(2) if the Commission determines that the computer equipment of the
|
|
provider was used to initiate the transmission, take appropriate
|
|
actions to terminate the use of its computer equipment by that person.
|
|
|
|
|
|
(c) Notice of Transmissions from Private Individuals.
|
|
|
|
(1) In general.
|
|
|
|
Subject to paragraph (2), not later than 14 days after receipt from a
|
|
private person of notice that its computer equipment may have been
|
|
used by another person to initiate a transmission of electronic mail
|
|
in violation of a provision of section 3 or 7, an interactive computer
|
|
service provider shall
|
|
|
|
(A) transmit the notice to the Commission together with such
|
|
information as the Commission requires in order to determine whether
|
|
or not the computer equipment of the provider was used to initiate the
|
|
transmission; and
|
|
|
|
(B) if the Commission determines that the computer equipment of the
|
|
provider was used to initiate the transmission, take appropriate
|
|
actions to terminate the use of its computer equipment by that person.
|
|
|
|
|
|
(2) Minimum notice requirement.
|
|
|
|
An interactive computer service provider shall transmit a notice under
|
|
paragraph (1) with respect to a particular transmission of electronic
|
|
mail only if the provider receives notice with respect to the
|
|
transmission from more than 100 private persons.
|
|
|
|
(d) Blocking Systems.
|
|
|
|
(1) Requirement.
|
|
|
|
Each interactive computer service provider shall make available to
|
|
subscribers to such service a system permitting such subscribers, upon
|
|
the affirmative electronic request of such subscribers, to block the
|
|
receipt through such service of any electronic mail that contains the
|
|
term``advertisement'' in its subject line.
|
|
|
|
(2) Notice of availability.
|
|
|
|
Upon the applicability of this subsection to an interactive computer
|
|
service provider, the provider shall
|
|
|
|
(A) notify each current subscriber, if any, to the service of the
|
|
blocking system provided for under paragraph (1); and
|
|
|
|
(B) notify any new subscribers to the service of the blocking system.
|
|
|
|
(3) Blocking by provider.
|
|
|
|
An interactive computer service provider may, upon its own initiative,
|
|
block the receipt through its service of any electronic mail that
|
|
contains the term ``advertisement'' in its subject line.
|
|
|
|
(4) Applicability.
|
|
|
|
The requirements in paragraphs (1) and (2) shall apply
|
|
|
|
(A) beginning 1 year after the date of enactment of this Act, in the
|
|
case of an interactive computer service provider having more than
|
|
25,000 or more subscribers; and
|
|
|
|
(B) beginning 2 years after that date, in the case of an interactive
|
|
computer service provider having less than 25,000 subscribers.
|
|
|
|
(e) Records.
|
|
|
|
An interactive computer service provider shall retain records of any
|
|
action taken on a notice received under this section for not less than
|
|
2 years after the date of receipt of the notice.
|
|
|
|
(f) Construction.
|
|
|
|
Nothing in this section may be construed to require an interactive
|
|
computer service provider to transmit or otherwise deliver any
|
|
electronic mail message containing the term ``advertisement'' in its
|
|
subject line.
|
|
|
|
(g) Definition.
|
|
|
|
In this section, the term ``interactive computer service provider''
|
|
has the meaning given that term in section 230(e)(2) of the
|
|
Communications Act of 1934 (47 U.S.C. 230(e)(2)).
|
|
|
|
SEC. 7. RECEIPT OF TRANSMISSIONS BY PRIVATE PERSONS.
|
|
|
|
(a) Termination of Transmissions.
|
|
|
|
(1) Request.
|
|
|
|
A person who receives a transmission of unsolicited commercial
|
|
electronic mail not otherwise authorized under this section may
|
|
request, by electronic mail to the same electronic mail address from
|
|
which the transmission originated, the termination of transmissions of
|
|
such mail by the person initiating the transmission.
|
|
|
|
(2) Deadline.
|
|
|
|
A person receiving a request for the termination of transmissions of
|
|
electronic mail under this subsection shall cease initiating
|
|
transmissions of electronic mail to the person submitting the request
|
|
not later than 48 hours after receipt of the request.
|
|
|
|
(b) Affirmative Authorization of Transmissions Without Information.
|
|
|
|
(1) In general.
|
|
|
|
Subject to paragraph (2), a person may authorize another person to
|
|
initiate transmissions to the person of unsolicited commercial
|
|
electronic mail without inclusion in such transmissions of the
|
|
information required by section 3.
|
|
|
|
(2) Termination.
|
|
|
|
(A) Notice.
|
|
|
|
A person initiating transmissions of electronic mail under paragraph
|
|
(1) shall include, with each transmission of such mail to a person
|
|
authorizing the transmission under that paragraph, notice that the
|
|
person authorizing the transmission may request at any time the
|
|
recommencement of the inclusion in such transmissions of the
|
|
information required by section 3.
|
|
|
|
(B) Deadline.
|
|
|
|
A person receiving a request under this paragraph shall include the
|
|
information required by section 3 in all transmissions of unsolicited
|
|
commercial electronic mail to the person making the request beginning
|
|
not later than 48 hours after receipt of the request.
|
|
|
|
(c) Constructive Authorization of Transmissions Without Information.
|
|
|
|
(1) In general.
|
|
|
|
Subject to paragraph (2), a person who secures a good or service from,
|
|
or otherwise responds electronically to, an offer in a transmission of
|
|
unsolicited commercial electronic mail shall be deemed to have
|
|
authorized transmissions of such mail without inclusion of the
|
|
information required under section 3 from the person who initiates the
|
|
transmission providing the basis for such authorization.
|
|
|
|
(2) Termination.
|
|
|
|
(A) Request.
|
|
|
|
A person deemed to have authorized the transmissions of electronic
|
|
mail under paragraph (1) may request at any time the recommencement of
|
|
the inclusion in such transmissions of the information required by
|
|
section 3.
|
|
|
|
(B) Deadline.
|
|
|
|
A person receiving a request under this paragraph shall include the
|
|
information required by section 3 in all transmissions of unsolicited
|
|
commercial electronic mail to the person making the request beginning
|
|
not later than 48 hours after receipt of the request.
|
|
|
|
(d) Effective Date of Termination Requirements.
|
|
|
|
Subsections (a), (b)(2), and(c)(2) shall take effect 30 days after the
|
|
date of enactment of this Act.
|
|
|
|
SEC. 8. ACTIONS BY PRIVATE PERSONS.
|
|
|
|
(a) In General.
|
|
|
|
Any person adversely affected by a violation of a provision of section
|
|
3 or 7, or an authorized person acting on such person's behalf, may,
|
|
within 1 year after discovery of the violation, bring a civil action
|
|
in a district court of the United States against a person who has
|
|
violated the provision. Such an action may be brought to enjoin the
|
|
violation, to enforce compliance with the provision, to obtain
|
|
damages, or to obtain such further and other relief as the court
|
|
considers appropriate.
|
|
|
|
(b) Damages.
|
|
|
|
(1) In general.
|
|
|
|
The amount of damages in an action under this section for a violation
|
|
specified in subsection (a) may not exceed $5,000 per violation.
|
|
|
|
(2) Relationship to other damages.
|
|
|
|
Damages awarded for a violation under this subsection are in addition
|
|
to any other damages awardable for the violation under any other
|
|
provision of law.
|
|
|
|
(c) Cost and Fees.
|
|
|
|
The court, in issuing any final order in any action brought under
|
|
subsection (a), may award costs of suit and reasonable attorney fees
|
|
and expert witness fees for the prevailing party.
|
|
|
|
(d) Venue; Service of Process.
|
|
|
|
Any civil action brought under subsection (a)in a district court of
|
|
the United States may be brought in the district in which the
|
|
defendant is found, is an inhabitant, or transacts business or
|
|
wherever venue is proper under section 1391 of title 28, United States
|
|
Code. Process in such an action may be served in any district in which
|
|
the defendant is an inhabitant or in which the defendant may be found.
|
|
|
|
|
|
SEC. 9. RELATION TO STATE LAWS.
|
|
|
|
(a) State Law Applicable Unless Inconsistent.
|
|
|
|
The provisions of this Act do not annul, alter, or affect the
|
|
applicability to any person, or otherwise exempt from the
|
|
applicability to any person, of the laws of any State with respect to
|
|
the transmission of unsolicited commercial electronic, except to the
|
|
extent that those laws are inconsistent with any provision of this
|
|
Act,and then only to the extent of the inconsistency.
|
|
|
|
(b) Requirement Relating to Determination of Inconsistency.
|
|
|
|
The Commission may not determine that a State law is inconsistent with
|
|
a provision of this Act if the Commission determines that such law
|
|
places greater restrictions on the transmission of unsolicited
|
|
commercial electronic mail than are provided for under such provision.
|
|
|
|
|
|
SEC. 10. DEFINITIONS.
|
|
|
|
In this Act:
|
|
|
|
(1) Commercial electronic mail. The term ``commercial electronic
|
|
mail''means any electronic mail that
|
|
|
|
(A) contains an advertisement for the sale of a product or service;
|
|
|
|
(B) contains a solicitation for the use of a toll-free telephone
|
|
number or a telephone number with a 900 prefix the use of which
|
|
connects the user to a person or service that advertises the sale of
|
|
or sells a product or service; or
|
|
|
|
(C) contains a list of one or more Internet sites that contain an
|
|
advertisement referred to in subparagraph (A) or a solicitation
|
|
referred to in subparagraph (B).
|
|
|
|
(2) Commission.
|
|
|
|
The term ``Commission'' means the Federal Trade Commission.
|
|
|
|
(3) State.
|
|
|
|
The term ``State'' means any State of the United States, the District
|
|
of Columbia, Puerto Rico, Guam, American Samoa, the United States
|
|
Virgin Islands, the Commonwealth of the Northern Mariana Islands, the
|
|
Republic of the Marshall Islands, the Federated States of Micronesia,
|
|
the Republic of Palau, and any possession of the United States.
|
|
|
|
------------------------------
|
|
|
|
Date: Tue, 5 May 1998 08:35:39 -0800
|
|
From: "Rob Slade, doting grandpa of Ryan and Trevor" <rslade@sprint.ca>
|
|
Subject: File 3--REVIEW: "Privacy on the Line", Whitfield Diffie/Susan Landau
|
|
|
|
BKPRIVLN.RVW 980301
|
|
|
|
"Privacy on the Line", Whitfield Diffie/Susan Landau, 1998,
|
|
0-262-04167-7, U$25.00
|
|
%A Whitfield Diffie
|
|
%A Susan Landau
|
|
%C 55 Hayward Street, Cambridge, MA 02142-1399
|
|
%D 1998
|
|
%G 0-262-04167-7
|
|
%I MIT Press
|
|
%O U$25.00 +1-800-356-0343 fax: +1-617-625-6660 manak@mit.edu
|
|
%P 342 p.
|
|
%T "Privacy on the Line: The Politics of Wiretapping and Encryption"
|
|
|
|
This seems to be the year for privacy. Hard on the heels of
|
|
"Technology and Privacy" (cf. BKTCHPRV.RVW), "The Electronic Privacy
|
|
Papers" (cf. BKELPRPA.RVW), and the related "Borders in Cyberspace"
|
|
(cf. BKBRDCYB.RVW) comes this volume.
|
|
|
|
Given the emotional content with which the encryption debate has been
|
|
loaded in recent years, it is important that the introduction, in
|
|
chapter one, is a neutral and even-handed look at the background of
|
|
the discussion, presenting the issues on both sides, although little
|
|
of the case for either. Specific references may be from the United
|
|
States, but the arguments made are generic enough to be considered by
|
|
all audiences. Chapter two gives an overview of cryptography, which
|
|
is, of course, excellent. Not only does it explain the importance of
|
|
keys and cryptographic strength, but it also gives insightful analysis
|
|
into business and social factors in the development of the field.
|
|
Cryptography and public policy, in chapter three, is restricted to
|
|
developments within (and related to) the US, but looks at all types of
|
|
issues, both technical and not. Chapter four discusses national
|
|
security with a quick but clear and thorough overview of the various
|
|
aspects of intelligence gathering, particularly communications
|
|
intelligence. There is also brief mention of information warfare.
|
|
Much of the heat in the current debate about encryption restrictions
|
|
involves law enforcement. (References are frequently made to drug and
|
|
child pornography rings.) Therefore, the brevity of chapter five is
|
|
disappointing. The content, however, is not. It builds a solid
|
|
framework for the topic, and notes an instructive difference in
|
|
effectiveness between wiretaps and other electronic bugs. Chapter six
|
|
is again specific to US history, reviewing activities both in support,
|
|
and destructive, of privacy.
|
|
|
|
Chapter seven deals specifically with wiretapping technology,
|
|
activities, and legality in the US. Much of the material in the
|
|
chapter has been at least touched on previously, and there is
|
|
noticeable duplication. There is less duplication in chapter eight's
|
|
discussion of the current communications scene, although little new
|
|
material. The same is not the case with current cryptography in
|
|
chapter nine, providing brief backgrounds of the myriad efforts being
|
|
made to disseminate and suppress encryption capabilities. The
|
|
conclusion, in chapter ten, seems to come down on the side of opening
|
|
encryption development and distribution.
|
|
|
|
An extensive, possibly exhaustive, bibliography is a major resource in
|
|
the book.
|
|
|
|
The thorough research, even tone, and informed analysis make this work
|
|
an excellent foundation for discussion. It does not, however, provide
|
|
much in the way of direction. That the authors should tend to support
|
|
the dropping of restrictions on cryptography is not surprising, but
|
|
such support is neither strong nor impassioned.
|
|
|
|
copyright Robert M. Slade, 1998 BKPRIVLN.RVW 980301
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 25 Apr 1998 22:51:01 CST
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: File 4--Cu Digest Header Info (unchanged since 25 Apr, 1998)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send post with this in the "Subject:: line:
|
|
|
|
SUBSCRIBE CU-DIGEST
|
|
Send the message to: cu-digest-request@weber.ucsd.edu
|
|
|
|
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
|
|
|
|
The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
To UNSUB, send a one-line message: UNSUB CU-DIGEST
|
|
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
|
|
(NOTE: The address you unsub must correspond to your From: line)
|
|
|
|
CuD is readily accessible from the Net:
|
|
UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
|
|
Web-accessible from: http://www.etext.org/CuD/CuD/
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
|
|
The most recent issues of CuD can be obtained from the
|
|
Cu Digest WWW site at:
|
|
URL: http://www.soci.niu.edu/~cudigest/
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #10.32
|
|
************************************
|
|
|