812 lines
45 KiB
Plaintext
812 lines
45 KiB
Plaintext
|
|
|
|
########## | Volume I Number 5 |
|
|
########## | |
|
|
### | EFFECTOR ONLINE |
|
|
####### | |
|
|
####### | In this issue: |
|
|
### | NetNews: Prodigy's Stage.Dat |
|
|
########## | Crooks,Big Brother,Biden,and the F.B.I. |
|
|
########## | Privacy: The Real Vs. The Ideal |
|
|
| Five (Common?) Misperceptions about the NREN |
|
|
########## | Macrotransformation: The 'Telecosm' |
|
|
########## | Crunch, Stoll, and Optick at the CFP |
|
|
### | A Daytrip to Prodigy Land |
|
|
####### | -==--==--==-<:>-==--==--==- |
|
|
####### | Editors: |
|
|
### | Gerard Van der Leun (boswell@eff.org) |
|
|
### | Mike Godwin (mnemonic@eff.org) |
|
|
### | Mitchell Kapor (mkapor@eff.org) |
|
|
| |
|
|
########## | The general contents of Effector Online may be |
|
|
########## | freely reproduced throughout the Net. |
|
|
### | To reproduce signed material herein outside the |
|
|
####### | Net, please secure the express permission of |
|
|
####### | the author. |
|
|
### | |
|
|
### | Published Fortnightly by |
|
|
### | The Electronic Frontier Foundation (eff.org) |
|
|
|
|
effector n, Computer Sci. A device for producing a desired change.
|
|
-==--==--==-<>-==--==--==-
|
|
|
|
|
|
FAST BREAKS:
|
|
Net News from throughout known Cyberspace
|
|
|
|
>>The Stage.Dat Flap:
|
|
Prodigy took it on the chin yet again this month. A rumor began to
|
|
circulate around the nets, (followed by numerous assertions of the
|
|
"truth" of these rumors) that Prodigy, through a part of their program
|
|
known as Stage.Dat, was actively spying on and collecting information
|
|
from its users' hard disks. Exactly why Prodigy would want to do this
|
|
went largely unasked. As did the question of what in the world Prodigy
|
|
would do with the shards, bits,odd bytes,code clusters and fragments of
|
|
information it collected. It was also unclear whether or not the
|
|
Stage.Dat program sucked user data off the hard disk in the first place.
|
|
None of this mattered to numerous online factions ready to believe
|
|
anything evil about Prodigy in the wake of the company's recent orgy of
|
|
user abuse.
|
|
Ultimately, the Stage.Dat file was found to be harmless and the
|
|
users' suspicions without foundation. When the Prodigy software creates
|
|
Stage.Dat, it essentially "lays claim" to a chunk of the hard disk. Any
|
|
remnants and scraps of previously deleted material inside the new
|
|
boundries of Stage.Dat will naturally be contained in the file. Nothing
|
|
malign can be laid at Prodigy's door. It merely continues to pay the
|
|
price in user mistrust for its previous attempts to control its users by
|
|
seeing them as revenue sources rather than human beings. Until Prodigy
|
|
recognizes that basic rights extend even to the private and corporate
|
|
realms of Cyberspace, it will continue to be plagued with incidents such
|
|
as Stage.Dat.
|
|
|
|
>>Tracking Steve Jackson
|
|
Many people have asked what has happened since the EFF filed suit
|
|
against the U.S. Secret Service and others two weeks ago. Other than a
|
|
spate of stories in the public and trade press, not a lot has happened.
|
|
The wheels of justice grind slow and fine. The EFF will be in this for
|
|
the long haul, but lawsuits don't have dramatic new twists and turns on
|
|
a weekly basis, no matter what we see on L.A. Law.
|
|
In the meantime, watch this space.
|
|
|
|
>>EFF Opposes Federal Restrictions on Encryption Use
|
|
The Electronic Frontier Foundation opposes Senate Bill.266 and any
|
|
other proposed federal statute that would limit the private use of
|
|
encryption technology.
|
|
If the language in SB 266 had the force of law, it would require
|
|
commercial and noncommercial service providers and system operators to
|
|
produce plain-text versions of public or private messages on their
|
|
systems when presented with a proper warrant. This would, in effect,
|
|
prohibit users of these systems from using public key encryption
|
|
technology on these systems, since no service provider or system operator
|
|
who allowed such encryption would be able to comply with the law.
|
|
We at the EFF believe that, in an era of increasing technological
|
|
encroachments upon everyone's privacy, public key encryption presents at
|
|
least a partial defense for individuals and organizations that are
|
|
concerned about privacy. We believe that making the use of such
|
|
encryption technology illegal, or creating strong legal disincentives for
|
|
its use, would deprive Americans of an important tool they can now use to
|
|
help preserve their privacy. At the same time, we believe, it would do
|
|
little to keep such technology, already well-documented and widely
|
|
available, out of the hands of the terrorist and criminal entities with
|
|
which the bill is concerned. We also believe this legislation flies in
|
|
the face of the government's own policies, since the Department of
|
|
Defense has long subsidized the development of commercial encryption
|
|
technology.
|
|
Currently, it is legal for any citizen to encrypt a letter and send it
|
|
through the U.S. mail system. Because we believe that computer-network
|
|
communication will assume an increasingly important role in the lives of
|
|
all Americans, we oppose any statutory scheme that would grant less
|
|
privacy to computer-based electronic communication than it grants to the
|
|
mails.
|
|
In a late breaking development, the ACLU and the EFF have been in
|
|
contact with Senator Biden's staff. The staff has agreed to sit down with
|
|
us and hear our concerns. Any people with information or concerns about
|
|
S.266 are invited to send email to Mitchell Kapor (mkapor@eff.org).
|
|
|
|
>>EFF Assists Challenge of Computer-Use Prohibition In Atlanta Case
|
|
The Electronic Frontier Foundation has sought amicus curiae status
|
|
to assist in challenging a condition of a computer-crime defendant's
|
|
supervised release that prohibits the defendant from owning or
|
|
personally using a coputer.
|
|
Defendants Robert Riggs, Adam Grant, and Frank Darden, who pled
|
|
guilty last summer to offenses relating the unauthorized copying
|
|
of a memorandum concerning the E911 emergency telephone system,
|
|
received, in addition to prison terms and restitutionary requirements,
|
|
a prohibition on personal use and ownership of computers. Because
|
|
the EFF believes this prohibition was overbroad, infringing upon
|
|
the First Amendment rights of the defendants and extending far beyond
|
|
the scope of federal sentencing law, the Foundation has chosen to
|
|
assist defendant Robert Riggs in his challenge of the prohibition.
|
|
It is EFF's position that the restriction on computer-use is not
|
|
sufficiently narrowly tailored to achieve the government's purposes
|
|
as set out in federal sentencing law. We believe that computer use
|
|
is so fundamentally related to First Amendment rights of expression
|
|
and association that restrictions on such use, even when imposed
|
|
on convicted defendants, must meet high standards of Constitutional
|
|
scrutiny.
|
|
|
|
>>Two Distinguished Professionals Join EFF Board
|
|
Mitchell Kapor recently announced the election of Esther Dyson and
|
|
Jerry Berman to the Board of The Electronic Frontier Foundation. In
|
|
making the announcement, Kapor said, "These are two terrific people and
|
|
will bring an incredible amount of expertise and wisdom to the board.
|
|
Esther knows the industry and the issues as well as anyone on the planet.
|
|
And Jerry Berman's experience with the legal aspects of all the EFF
|
|
issues -- stemming from his first-rate work with the ACLU -- is is
|
|
outstanding."
|
|
|
|
>>Anonymous FTP Available At EFF
|
|
The EFF's anonymous FTP area is now set up. If you are on the
|
|
Internet,you can use your computer's FTP program to connect to eff.org
|
|
(192.88.144.3). Login as "anonymous" and use your e-mail address as the
|
|
password. Example:
|
|
|
|
eff% ftp eff.org
|
|
Connected to eff.org.
|
|
220 eff FTP server (SunOS 4.1) ready.
|
|
Name (eff.org:ckd): anonymous
|
|
331 Guest login ok, send ident as password.
|
|
Password:ckd@eff.org (NOTE: this will not display)
|
|
230 Guest login ok, access restrictions apply.
|
|
|
|
From there you can use the normal ftp commands to look around, change
|
|
directories, and the like. See your local system documentation or type
|
|
'help' at the ftp prompt.
|
|
Files available include back issues of Effector Online, information
|
|
about the EFF's activities and goals, and documents on the Steve Jackson
|
|
Games lawsuit. For more information, contact ftphelp@eff.org.
|
|
|
|
>>System Manager Joins EFF Staff
|
|
Christopher Davis recently joined the EFF's staff as Network
|
|
Administrator and System Manager. He is responsible for the day-to-day
|
|
operations of eff.org (a Sun 4/110), several Macintoshes in the office,
|
|
the local network, and printers. A 1990 Magna Cum Laude graduate from
|
|
Boston University, he holds a Bachelor of Science in Management
|
|
Information Systems. His electronic mail address is (ckd@eff.org).
|
|
|
|
-==--==--==-<>-==--==--==-
|
|
|
|
|
|
CROOKS, BIG BROTHER, BIDEN AND THE F.B.I.
|
|
|
|
by Denise Caruso
|
|
|
|
Dateline: May 5, 1991
|
|
|
|
How do you both keep Big Brother at bay and criminals out of
|
|
circulation when computer technology has become a easy, powerful
|
|
enhancement to traditional spying techniques such as wiretapping
|
|
and encryption?
|
|
Yet another ugly question looming on the electronic frontier.
|
|
It looms large as debate rages about a proposal tucked into a
|
|
Senate bill on terrorism, S. 266, which "suggests" that makers of
|
|
computer security equipment consider building trap-doors into their
|
|
systems.
|
|
Though at first it was thought that the S. 266 provision was
|
|
cooked up by the National Security Agency, most now believe it was
|
|
engineered by the Federal Bureau of Investigation. Of late, the FBI
|
|
quietly got a similar suggestion placed in another Senate crime bill,
|
|
S.618, "the Violent Crime Control Act of 1991."
|
|
The FBI wants to easily intercept and interpret encrypted phone calls,
|
|
data transmissions and electronic files when they've has been given the
|
|
authority to do so by the courts. Gorges are rising in the technology
|
|
community as a result. What happens in a court of law, for example, when
|
|
a vendor hasn't followed this "suggestion"?
|
|
Another argument asks whether a suspected criminal, being forced to
|
|
provide a "key" to decrypt a message, could be seen as "self-incriminating"
|
|
something we're protected against in the Fifth Amendment.
|
|
Also, does forcing me to compromise the security of my data infringe on
|
|
my right to self defense? Since encryption is considered a munition,
|
|
making it less reliable could be tantamount to, say, forcing me to use a
|
|
varmint rifle instead of a sawed-off 12-gauge. You got it: "When
|
|
encryption is outlawed, only outlaws will use encryption."
|
|
These examples don't even begin to address the significant industry
|
|
aspects of such a proposal. A group of heavy-hitting companies including
|
|
Apple Computer, Novell, Lotus Development, Microsoft, Sun Microsystems
|
|
and Digital Equipment are almost finished drafting a plan to implement
|
|
encryption technology from RSA Data Security in Redwood City.
|
|
Why do you think companies like these (they're competitors, in case you
|
|
hadn't noticed) are toiling away together on implementing encryption in
|
|
their products? They've lived the experience of not having it: Hacker
|
|
invasions and compromised passwords. Viruses infecting diskettes that
|
|
get shipped to customers. Sensitive competitive information siphoned off
|
|
telephone lines and local-area networks.
|
|
And there is a growing customer clamor for secure electronic data
|
|
interchange or EDI, an electronically transmitted document that is as
|
|
legally binding as a written and signed paper contract. Who would use an
|
|
EDI security product with a built-in back door? Intruders don't need
|
|
search warrants.
|
|
Here's another interesting scenario. The Prodigy Information Service
|
|
software, via an alleged "quirk" in the program, gives Prodigy access to
|
|
the contents of a user's computer files. But Apple Computer (with
|
|
permission, please note) can essentially "reach in" to your system and
|
|
record what equipment you've got hooked up, what kind of software you
|
|
use, etc., via its AppleLink online service.
|
|
This is not particularly high-tech or even unusual. America Online,
|
|
where I spend a lot of time, automatically updates its software onto my
|
|
hard disk -- without my permission -- when another version is ready for
|
|
use. It saves the enormous cost and hassle of sending diskettes to
|
|
thousands of users. The phone link is a two-way connection: if AO wanted
|
|
to read the contents of my hard disk, it could, as could Apple or any
|
|
online service -- or well-equipped individual, for that matter -- who
|
|
wanted to. Personal encryption software would make it impossible to do
|
|
so.
|
|
In a world where online communications makes it ridiculously easy to
|
|
reach out and grab someone's private information, I find it
|
|
counterproductive to introduce doubt and suspicion into the good news of
|
|
a growing data protection industry. It's bad enough that bills such as
|
|
S. 266 and S. 618 would probably kill the cryptography business in the
|
|
United States and strengthen it offshore. But worse yet is that the
|
|
privacy and protection of proprietary information will take a big hit.
|
|
I want crime to stop. I want terrorism to stop. But do we want to secure
|
|
the networks or not? I have never seen evidence that power in the hands
|
|
of government authority didn't corrupt. I have never heard of a
|
|
compromise-able network that didn't get compromised. With increasing
|
|
reliance on computer-based networks, back doors for law enforcement (or
|
|
whoever else figures out how to crack them) make me afraid. I don't
|
|
think they're a good idea.
|
|
|
|
Copyright 1991 by Denise Caruso. (dcaruso@well.sf.ca.us)
|
|
Reproduced by permission of the author.
|
|
|
|
-==--==--==-<>-==--==--==-
|
|
|
|
Recent Microsoft ad:
|
|
"Some people don't see the advantages of combining
|
|
Microsoft applications. But then some people
|
|
didn't see what would come of mixing nitro and
|
|
glycerin"
|
|
|
|
-==--==--==-<>-==--==--==-
|
|
|
|
THE REAL AND IDEAL LIMITS OF PRIVACY: How Far Apart?
|
|
|
|
by Jim Warren (jwarren@well.sf.ca.us)
|
|
|
|
[Editor's note: At the Computer Freedom & Privacy Conference,
|
|
Marc Rotenberg vigorously defended the following position:
|
|
"No organization shall make secondary use of personal information
|
|
without the individual's affirmative consent."
|
|
After the event, Jim Warren, the organizer and Chair of the CFP
|
|
Conference considered ramifications of such a policy, posted some thoughts
|
|
on the WELL, and edited and condensed them at our request for publication,
|
|
here.]
|
|
|
|
Here are some specific examples of how "affirmative consent" might impact
|
|
use of personal information:
|
|
Although there were a multitude of co-sponsors of the March CFP
|
|
Conference, CPSR was the sponsor and is the legal owner of the database
|
|
detailing those who registered and/or paid fees to attend the event.
|
|
OK:
|
|
Should CPSR be prohibited from using that list for anything
|
|
other than validating registrant's access to the Conference?
|
|
CPSR had a fund-raising reception at the Conference hotel. Should CPSR
|
|
be prohibited from mailing invitations to Conference registrants? The
|
|
registrants provided addresses for Conference registration; not to be invited
|
|
to one of the co-sponsor's fund-raiser.
|
|
Would it make a difference if the invitation did or did not request a
|
|
donation? How about if it required a "donation" for admission?
|
|
Please note that some percentage of the participants almost certainly oppose
|
|
some or most of what CPSR espouses.
|
|
Those who provided their personal information in this database -- names,
|
|
addresses, phones, etc., -- for the singular purpose of being permitted to
|
|
attend the Conference.
|
|
Should they be notified of the availability of audio-tapes, video-tapes
|
|
and printed Proceedings of the Conference? I.e., should their computerized
|
|
personal information be used for direct-mail marketing of products related
|
|
to the CFP Conference? How about its use for mailing information about
|
|
related events, publications and organizations (such as EFF)?
|
|
What if someone is -- gawd forbid! -- someone makes a profit from products
|
|
or services offered by such direct mail to those database names? Like nasty,
|
|
awful capitalist publishers -- who take the entrepreneurial risk of
|
|
publishing the Proceedings in hopes of making a profit (and risk a loss)?
|
|
If affirmative consent is required, but was not obtained in the first
|
|
[unsolicited, direct-mail] advertisement of the Conference, how can CPSR
|
|
obtain the required consent without mailing a solicitation for which they
|
|
have no affirmative consent [seeking permission to solicit]?
|
|
Should only those who asked for information about tapes and published
|
|
Proceedings be notified of their availability? Then, prices of the tapes
|
|
and books would have to be much higher than if unauthorized solicitation were
|
|
made to the much-broader potential customer-base.
|
|
Should the database owner, CPSR, be permitted to use the personal
|
|
information on the CFP registrants' to solicit new members?
|
|
Should CPSR be permitted to use it to mail notices about the U.S. Privacy
|
|
Council -- that was created during the Conference, but was not an official
|
|
Conference activity? Note: Conference registrants included direct-marketing
|
|
representatives -- hardly eager to support ardent privacy regulation.
|
|
Should CPSR use the CFP database to distribute advocacy of their
|
|
Freedom of Information Act litigation against the FBI? After all, the
|
|
database includes FBI agents and other enforcement officers -- who furnished
|
|
names and addresses for the singular purpose of registering for the
|
|
Conference. (This is a hypothetical. I know of no CPSR plans to produce
|
|
or mail such an announcement.)
|
|
Or, should CPSR use the personal profiling information collected from
|
|
registrants to segment the CFP reg list -- to mail solicitations
|
|
[though without affirmative consent] only to those likely to be
|
|
interested in promoting privacy, or supporting FOIA actions against the FBI
|
|
-- avoiding those who would probably be uninterested or offended?
|
|
This is exactly what the direct-marketing groups try to do. They use
|
|
personal profile information to attempt to identify only addressees who will
|
|
want and use their catalogs.
|
|
There are other practical issues. As a minor datapoint -- the CFP
|
|
Conference would probably be in the black and would have been better
|
|
organized, had it not been for the *many*, many hours spent by my
|
|
assistant, entering, checking and endlessly modifying the privacy locks
|
|
Conference registrants could check. It was *very* costly data-processing.
|
|
Or, here's an example of government efficiency versus privacy:
|
|
We had a number of government employees attend the CFP Conference. Most
|
|
required that we accept a purchase order and bill them. (Given the April
|
|
15th season, I thought of demanding immediate payment from the several IRS
|
|
representatives, however I decided that such demands only work one-way.)
|
|
The purchase orders were some approximation of Standard Form 182 or DD1556
|
|
-- those eleventeen-part forms that are supposed to provide all needed
|
|
information to all involved bureaucrats and outside parties.
|
|
Thus, they included registrants' *home* addresses, home phones, social
|
|
security numbers, dates of birth, office phones, years and months
|
|
of continuous service, position-levels, pay grades, type of
|
|
appointments, whether they were handicapped and education levels.
|
|
This included information on at least one attendee from an investigative
|
|
agency, plus others responsible for their agency's privacy project!
|
|
Some of the forms arrived with all this typewritten info clearly
|
|
visible -- to me, my staff and CPSR, the legal owner of those records.
|
|
Other forms had some of the really important personal stuff blocked out.
|
|
Not, of course, the home address or personal work phone-extension or
|
|
education level. I mean *important*, secret stuff -- like the "first five
|
|
letters of the last name" and years and months of service. In fairness,
|
|
one form did block out the social security number and date of birth.
|
|
Another had the home phone X'ed out by typewriter. However, all left most
|
|
personal information clearly visible.
|
|
Had they computerized the records, they could have avoided inappropriate
|
|
disclosures, unneeded multi-part forms and rekeying of information -- which
|
|
several agencies did. Internal managers could have simply referred to the
|
|
computer record, as needed. But, that would create one of those terrifying
|
|
computerized records containing all that personal information.
|
|
Here's an example of selective privacy, granted only to certain powerful
|
|
public officials -- including those Los Angeles Police officers featured in
|
|
recent videos (to which this is in no way specifically related):
|
|
An organization of California judges joined forces with a statewide police
|
|
officers' association and persuaded the Legislature and Governor to pass
|
|
special legislation authorizing judges and police officers to seal
|
|
their personal information in some otherwise-public records (e.g., voter
|
|
registration).
|
|
More recently, information-provider companies proudly demonstrated to a
|
|
meeting of judges how much information they had compiled on the judges, their
|
|
families, personal habits, biases, etc. -- sold to attorneys with litigants
|
|
wealthy enough to research jurists before going to trial. The judges
|
|
freaked! First, they considered going back to the Legislature to ask for
|
|
still more special privacy benefits for themselves. Finally, they decided
|
|
they'd tolerate the same lack of privacy of everyone else -- a laudable
|
|
judgement!
|
|
Should some public officials have greater privacy rights than the
|
|
general public? Should they be able to seal their voter reg records?
|
|
How about their residency information -- so citizens are unable to verify
|
|
whether officials really fulfill perhaps-mandated jurisdiction residency?
|
|
How about their property assessment records -- prohibiting concerned
|
|
citizens from verifying that officials are fairly assessed?
|
|
If judges can seal records -- as they can, to some extent -- to protect
|
|
them and their families, then cannot the same case be made for all political
|
|
figures, the wealthy and the powerful? How about Hollywood stars and
|
|
starlettes (however defined)? And rock stars? How about attractive women --
|
|
and men? How about the elderly and frail -- less able to defend themselves?
|
|
How about all those big bucks political donors who would prefer to have no
|
|
public record on themselves, their property or their financial activity?
|
|
In fact, how about everyone who wants to keep their "public" records
|
|
secret? Should property assessments be secret? Voter registrations?
|
|
Professional licenses? Professional competency findings?
|
|
To what extent do citizens want to be prohibited from accessing records by
|
|
which they may independently and personally verify that all citizens --
|
|
great and small -- are being equitably and fairly treated? Sealing public
|
|
records guarantees opportunity for covert manipulation, special treatment,
|
|
and rampant abuse.
|
|
Sealed voter registrations deter citizens' ability to communicate with the
|
|
electorate and make independent citizen review functionally impossible.
|
|
Let us think carefully before we too-quickly seal records in the sacred
|
|
name of "privacy," or we may later discover that we have destroyed our
|
|
citizenry's ability to effectively communicate with itself and make informed
|
|
judgements about the equitable treatment of its members.
|
|
|
|
Reproduced by permission of the author.
|
|
|
|
-==--==--==-<>-==--==--==-
|
|
|
|
Excerpt from conversation between customer support person
|
|
and customer working for a well-known military-affiliated
|
|
research lab:
|
|
|
|
Support:"You're not our only customer, you know."
|
|
Customer:"But we're one of the few with tactical nuclear weapons."
|
|
|
|
-==--==--==-<>-==--==--==-
|
|
|
|
Five (Common?) Misconceptions About the NREN
|
|
|
|
by Tom Valovic (tvacorn@well.sf.ca. us)
|
|
|
|
1. NREN will solve the most critical problem in the US telecom
|
|
infrastructure namely, the lack of band width capacity in the local loop.
|
|
((Comment: NREN, either via Gore or ANI, will not even begin to address
|
|
this problem.))
|
|
2. NREN will provide certain advanced capabilities that don't exist
|
|
today, but that can be considered the wave of the future. For example,
|
|
hospital teleradiology applications; modeling and simulation capabilities
|
|
for use in private enterprise R&D, etc..
|
|
((Comment: Many of the kinds of applications frequently invoked to justify
|
|
NREN are already being done today, and a fair measure involve either
|
|
trials or actual service being developed by the RBOCs. One example is
|
|
Nynex's SMDS trial in Boston which links four major medical centers for
|
|
teleradiology and other applications. There are many such activities
|
|
underway, in many areas of the country. They have nothing whatsoever to
|
|
do with NREN. Similarly, many companies are using workstations and
|
|
networked CAD/CAM to do collaborative R&D among geographically dispersed
|
|
sites and this too has been going on for some time, sans NREN.))
|
|
3. NREN will allow the US to stay competitive with the Japanese in
|
|
telecommunications.
|
|
((Comment: The Japanese have an aggressive program in place to deploy
|
|
fiber throughout NTT's subscriber base i.e. residential applications. We
|
|
do not. This -- the deployment of fiber and high band width capacity in
|
|
the local exchange -- is where we are falling behind with respect to the
|
|
telecom policies and programs of some other developed countries,
|
|
including Japan. The lack of progress has much to do with the CATV/telco
|
|
stalemate over who gets to deliver the fiber to your neighborhood.
|
|
Again, NREN as currently conceived, will do nothing to address this.))
|
|
4. NREN/K-12 represents a major set of solutions to the educational
|
|
crisis in the US.
|
|
((Comment: Maybe. But as Stephen Wolff pointed out at a recent NREN
|
|
seminar, it's mainly intended to serve the needs of the "best and the
|
|
brightest", whereas educational problems in the US cut across a broad
|
|
spectrum. If NREN/K-12 is going to help most of our kids, and not just a
|
|
select few, then the little girl in Tennessee accessing the Library of
|
|
Congress via modem first has to learn how to read. Further, there is
|
|
already an abundance of computer technology in K-12 today that's being
|
|
wasted because of poor utilization. This is a human resources and training
|
|
problem not a technological problem. Until we solve it, throwing more
|
|
technology at the educational system (K-12, at least) will continue to
|
|
be ineffective.))
|
|
5. NREN will provide the "data superhighways of the future" on a
|
|
nationwide basis if its implemented.
|
|
((Comment: This is somewhat misleading since these data superhighways
|
|
already exist in the form of interexchange carrier fiber capacity that's
|
|
already been deployed by the likes of ATT, Sprint, MCI, and a large
|
|
group of independent long-haul fiber providers like Wiltel and others.
|
|
Alternate (non-RBOC) fiber is also being deployed in many major metro
|
|
areas by ALC's like Teleport (Merrill Lynch), MFS, Eastern TeleLogic,
|
|
ICC, and many others. All of this activity constitutes the real basis
|
|
for the "data superhighways of the future". Much of this capacity, at
|
|
least as far as the major metro areas are concerned, is available right
|
|
now. The real issues are cost and access --which, in theory, NREN does
|
|
address.)
|
|
|
|
(BTW, the foregoing is *not* an argument against NREN, but rather an
|
|
attempt to demonstrate that some of the arguments now being used to justify
|
|
it are based on somewhat dubious assumptions.)
|
|
|
|
Reproduced by permission of the author.
|
|
|
|
-==--==--==-<>-==--==--==-
|
|
"The less you know about home computers, the more
|
|
you'll want the new IBM PS/1."
|
|
-- Ad in The Edmonton Journal
|
|
-==--==--==-<>-==--==--==-
|
|
|
|
MACROTRANSFORMATION:
|
|
A Review of "Into the Telecosm" by George Gilder
|
|
|
|
by Scott Loftesness (Compuserve: 76703,407 )
|
|
|
|
In my reading this week, I came across an article by
|
|
George Gilder in the latest issue of the Harvard Business Review. "Into
|
|
the Telecosm" urges action at the state and national levels to begin
|
|
rapid deployment of a national fiber-optic networking capability that
|
|
ultimately would provide a fiber connection to every American home.
|
|
Gilder claims that the rapidly advancing technologies of microchips,
|
|
electromagnetic waves, and fiber optics will transform commerce:
|
|
"In the next decade or so, microchips will contain a billion or more
|
|
transistors, expanding a millionfold the cost-effectiveness of computer
|
|
hardware. The terminals on our desks and televisions in our living
|
|
rooms will give way to image-processing computers, "telecomputers" that
|
|
will not only receive but also store, manipulate, create and transmit
|
|
digital video programming. Linking these computers will be a worldwide
|
|
web of fiber-optic cables reaching homes and offices."
|
|
The problem, according to Gilder, is that only one of these technologies
|
|
- computer power - is developing at a rapid pace. The big problem area
|
|
is communications or, rather, the lack of it. "Today the wiring is
|
|
holding back what people and boxes can do."
|
|
Progress in the computer area is indeed impressive. Gilder cites
|
|
quadrupling the number of transistors on a chip every three years and
|
|
reductions in the cost of processing power of up to 50% a year as two
|
|
examples of the incredible progress being made on the hardware side of
|
|
computing. Much of this new power is being put to work on images of one
|
|
sort or another. But there is a big problem. The telecommunications
|
|
infrastructure can't handle what the new telecomputers require in terms
|
|
of information bandwidth. "You cannot send an ocean through pipes
|
|
developed for a stream," says Gilder.
|
|
"While the efficiencies of decentralized computing spring
|
|
from the laws of solid-state physics - the "microcosm" - breakthroughs
|
|
in communications will spring from the "telecosm," a domain of reality
|
|
governed by the action of electromagnetic waves and in which all
|
|
distances collapse because communication is at the speed of light. The
|
|
law of the microcosm militates for increasingly distributed computing;
|
|
the telecosm enables powerful links between computers. The challenge is
|
|
to close the gap between microcosm and telecosm, between the logical
|
|
power of computers and the power of their communications."
|
|
Gilder points out that much of the work in the computer industry is
|
|
devoted to trying to live within the limited bandwidth available on
|
|
today's networks, on compression hardware and software products.
|
|
Claiming that the communications crisis is more "a failure of
|
|
imagination than of technology," Gilder points out that a major piece of
|
|
the potential solution is at hand:
|
|
"In a crisp formula, Nicholas Negroponte of MIT's Media Lab outlines the
|
|
needed change: what currently goes through wires, chiefly voice, will
|
|
move to the air; what currently goes through the air, chiefly video,
|
|
will move to wires. The phone will become wireless, as mobile as a
|
|
watch and as personal as a wallet; computer video will run over
|
|
fiber-optic cables in a switched digital system as convenient as the
|
|
telephone today."
|
|
Citing this "reversal" issue as a key one for policy makers, Gilder
|
|
points out that there is plenty of spectrum available for new innovative
|
|
services if the FCC's regulations were changed to help force this shift
|
|
in delivering video from over-the-air to fiber optics. Citing the
|
|
common industry objections to this approach, Gilder claims "costly fiber
|
|
optics is just as mythical as scarce spectrum." The problem is the
|
|
regulatory environment that prevents telephone companies
|
|
from laying fiber to homes.
|
|
Fearing a situation analogous to the videotape recorder, Gilder fears
|
|
that the delays in deploying fiber to the home will result in the U.S.
|
|
again losing a critically important technology leadership position in
|
|
opti-electronic technology and that the U.S. fiber optic production
|
|
capacity is at exposed to lower cost competition from Japan, a country
|
|
that apparently is getting very serious about installing fiber to the
|
|
home. Gilder says that although the U.S. still spends far more money
|
|
per capita on its communications infrastructure than any other country,
|
|
a large chunk of that spending is for private business networks that
|
|
will "ultimately be bad for U.S. business and, ironically, is starving
|
|
the ultimate distribution system for its services and products. To open
|
|
new markets, business leaders need a national network, not simply a
|
|
Babel of business networks."
|
|
A very important effect of this kind of transition to fiber to the home,
|
|
according to Gilder, will be the transition from broadcast to narrowcast
|
|
that the technology will now permit. Fiber will enable cause a shift
|
|
"from a mass-produced and mass-consumed horizontal commodity to a
|
|
vertical feast with a galore of niches and specialties." Marginal costs
|
|
of delivering another program choice drop to almost nothing. The
|
|
two-way nature of the medium enables a huge number of new sources of
|
|
program material, driving the money from the distribution channel of
|
|
today to the creators of programming tomorrow.
|
|
Gilder urges business leaders to take action to force the reform of the
|
|
"telecom snarl that imperils creativity and progress in computers and
|
|
communications." The problem is political. The vested interests "all
|
|
focus on the destruction and mobilize to prevent it. In the U.S., the
|
|
broadcasters are marshaling their forces to preserve what
|
|
they claim are the special virtues of free and universal broadcast
|
|
service. The cable industry is fast becoming a political juggernaut-a
|
|
group of PACs with coax - moving to prevent the phone companies from
|
|
installing fiber-optic networks. Meanwhile, television networks and
|
|
manufacturers around the world are holding out the promise of HDTV,
|
|
which is the old medium dressed up with a bigger screen and sharper
|
|
pictures."
|
|
Gilder's article makes very interesting reading for a very interesting
|
|
time. In April, the National Telecommunications and Information
|
|
Administration (NTIA) of the U.S. Department of Commerce is scheduled to
|
|
release its "comprehensive study of the national telecommunications
|
|
infrastructure." How strongly will the administration advocate a
|
|
dramatic shift in the regulatory environment to enable this kind of
|
|
national broadband network?
|
|
As they say on TV, "film at 11."
|
|
|
|
Reproduced by permission of the author.
|
|
|
|
-==--==--==-<>-==--==--==-
|
|
Real Americans talk About Why They Chose the
|
|
Sun SPARCstation 2000 (tm):
|
|
|
|
"Last week we had a fella from Digital come out
|
|
and look at the soybean crop. After 20
|
|
minutes, Ma chased him off and threw his
|
|
keyboard out the window. We`re from old
|
|
Norwegian stock, and we know a thing or two
|
|
about bus controllers."
|
|
-- Buck Flange, Arkansas, Texas
|
|
[Collected internally from a gag article at Sun...]
|
|
-==--==--==-<>-==--==--==-
|
|
|
|
Crunch, Stoll, Optik and the Other Usual Suspects
|
|
A Snapshot of the Computer Freedom and Privacy Conference
|
|
|
|
by Kevin Kelly (kk@well.sf.ca.us)
|
|
|
|
I was blown away by this conference. I expected a decent education
|
|
and left today feeling I had attended an EVENT. Impressions is all I can
|
|
offer right now.
|
|
Crunch coming up to Phiber Optik who is talking to me. "Boy this is
|
|
a weird conference. All my friends are here, but so is my prosecutor."
|
|
"Yeah," says Phiber, "my prosecutor is here, too!"
|
|
I didn't have a personal prosecutor and sort of felt left out. Just
|
|
before Crunch had appeared, Phiber was telling me about his late night
|
|
rendezvous with Donn Parker. Parker and Phiber are sitting in a hotel cafe
|
|
booth and Parker is giving Phiber fatherly advice (you should go to school),
|
|
while Phiber is telling him what's really cool (and better than school)
|
|
about tunneling through cyberspace. Oh.... to have been there!
|
|
Cliff Stoll scampering on the floor in agitated delirium telling his
|
|
story about the Strange Lady of the conference confronting him, saying,
|
|
"I disagree with everything you ever wrote." I nearly got knuckled by
|
|
his yo-yo as he talked.
|
|
Sterling telling the university of Florida crime professor his version
|
|
of what happened to all the computer cops. He weaves in references to
|
|
turf battles, and the fact that 'my computer is better than any of the
|
|
computers the feds have to work with'. Later, the crime professor
|
|
admits on a panel that half of all the computer trained cops with a
|
|
job today are at this conference!
|
|
John Gilmore's rousing speech. "I want to be able to rent a video
|
|
without having to identify myself. I want to get a drivers' license
|
|
without having to identify myself."
|
|
I spent a lot of time with David Chaum, the totally anonymous
|
|
electronic money guy, whom Gilmore was referencing, and I now believe
|
|
Gilmore's dream is possible (though unlikely as put).
|
|
|
|
-==--==--==-<>-==--==--==-
|
|
|
|
A Day In The Life of Prodigy
|
|
|
|
by Mitchell Kapor
|
|
|
|
I spent half a day at Prodigy the other week with a dozen senior
|
|
managers. Reconstructed and condensed dialog from my notes:
|
|
|
|
MK> Why do you feel it's necessary to pre-screen postings to public
|
|
conference areas?
|
|
|
|
P> Two reasons. Prodigy is a family oriented service. We have to
|
|
screen out offensive material. Also, topic drift. Many of our
|
|
subscribers are more interested in information than in conversation so
|
|
we remove irrelevant comments. Of course, those affected never *think*
|
|
they're being irrelevant.
|
|
|
|
MK> You could offer uncensored public conferencing without fear of
|
|
offense if you offered a free blocking option that would let
|
|
subscribers block particular conferences so their children couldn't
|
|
read them. You could also have your editors create digests of
|
|
conferences for the information-minded to read. (Prodigy refers to the
|
|
people who screen conference postings as editors, not censors. All have
|
|
journalism backgrounds, I was told.)
|
|
|
|
P> We never thought of that.
|
|
|
|
From this I concluded that promotion of free and open inquiry simply
|
|
didn't sit very high in their pantheon of values.
|
|
I also mentioned that the Well had a method of on-line dispute
|
|
resolution which did not involve throwing people off the system. (I
|
|
didn't mention that it works by endless rehashing of issues intermixed
|
|
with invective until everyone is too tired to go on. :-) ). I sang the
|
|
praises of virtual community self-managed as developed in these parts.
|
|
About a week later I got a follow up call from one of the folks at
|
|
the meeting who asked me to arrange a meeting for Prodigy management to
|
|
visit the Well and learn what it's all about. I asked Cliff and he
|
|
agreed. I'm not sure how much of the Well is going to rub off on the
|
|
Prodigy. Their corporate immune system can knock out almost any foreign
|
|
meme, but we can always hope for a mild memetic infection.
|
|
|
|
-==--==--==-<>-==--==--==-
|
|
|
|
Topic 192: 'Misuse of Copyrighted material on the Well'
|
|
Not without merit (jrc) Thu, May 9, '91 _16 Lines
|
|
|
|
Friends, this break in the action is brought to you by rent-a-flamer.
|
|
Fed up with garbage that you've been seeing flow across your screen? Are
|
|
your favorites getting abused by lowlife meatheads? And yet, are you
|
|
afraid to get involved in the endless wrangle and end up like (oops,
|
|
almost mentioned a userid there) so many hapless souls who now only post
|
|
in Forth and who want to meet jax face to face.
|
|
|
|
Well, hey! We've got a staff of experts waiting to serve you. Just tell
|
|
use which loathsome self-righteous toadstool you want us to go after,
|
|
and one of our Bonded Flamers will get on the case and in his/her face
|
|
Right This Minute! Pick your issue: You own your words, passive hosting
|
|
techniques, racial epithets, technical competence *or* who did what
|
|
hacking where first! It's your choice!
|
|
|
|
$50 per hour plus all online charge. Void where prohibited.
|
|
|
|
-==--==--==-<>-==--==--==-
|
|
|
|
|
|
Computer Freedom and Privacy Conference Available Now!
|
|
|
|
Audio-tapes of the First Conference on Computers, Freedom & Privacy
|
|
Tue-Thu Conference sessions are now available. They may be ordered
|
|
from:
|
|
Recording, Etc./Soper
|
|
633 Cowper Street
|
|
Palo Alto CA 94301
|
|
(415)327-9344
|
|
(800)227-9980 [for calls from beyond California]
|
|
(415)321-9261 by fax
|
|
|
|
TAPES AVAILABLE:
|
|
1. Constitution in the Information Age
|
|
Laurence Tribe, Harvard Law School Professor; J.Warren/Chair
|
|
Tuesday, March 26th:
|
|
2. Trends in Computers & Networks
|
|
D.Chaum, P.Denning, D.Farber, M.Hellman, P.Neumann,J.Quarterman;
|
|
P.Denning/Chair
|
|
3. International Perspectives & Impacts
|
|
D.Flaherty, R.Plesser, T.Riley, R.Veeder; R.Plesser/Chair
|
|
4. Personal Information & Privacy - I
|
|
J.Baker, J.Goldman, M.Rotenberg, A.Westin; L.Hoffman/Chair
|
|
5. Personal Information & Privacy - II
|
|
S.Davies, E.Hendricks, T.Mandel, W.Ware; L.Hoffman/Chair
|
|
6. Network Environments of the Future
|
|
Eli Noam, Columbia University Professor; M.Rotenberg/Chair
|
|
Wednesday, March 27th:
|
|
7. Law Enforcement Practices & Problems
|
|
D.Boll, D.Delaney, D.Ingraham, R.Snyder; G.Tenney/Chair
|
|
8. Law Enforcement & Civil Liberties
|
|
S.Beckman, C.Figallo, M.Gibbons, M.Kapor, M.Rasch,
|
|
K.Rosenblatt, S.Zenner; D.Denning/Chair
|
|
9. Legislation & Regulation
|
|
J.Berman, P.Bernstein, B.Julian, S.McLellan,
|
|
E.Maxwell, C.Schriffries; B.Jacobson/Chair
|
|
10. Computer-Based Surveillance of Individuals
|
|
D.Flaherty, J.Krug, D.Marx, K.Nussbaum; S.Nycum/Chair
|
|
11. Security Capabilities, Privacy & Integrity
|
|
William Bayse, FBI Asst.Director; D.Denning/Chair
|
|
Thursday, March 28th:
|
|
12. Electronic Speech, Press & Assembly
|
|
D.Hughes, E.Lieberman, J.McMullen, G.Perry, J.Rickard,
|
|
L.Rose; E.Lieberman/Chair
|
|
13. Access to Government Information
|
|
D.Burnham, H.Hammitt, K.Mawdsley, R.Veeder; H.Hammitt/Chair
|
|
14. Ethics & Education
|
|
S.Bowman, J.Budd, D.Denning, J.Gilmore, R.Hollinger,
|
|
D.Parker; T.Winograd/Chair
|
|
15. Where Do We Go From Here?
|
|
P.Bernstein, M.Culnan, D.Hughes, D.Ingraham, M.Kapor,
|
|
E.Lieberman, D.Parker, C.Schiffires, R.Veeder, J.Warren/Chair
|
|
|
|
|
|
PRICES & SHIPPING in United States: to Canada: other
|
|
int'l: any one audio-tape ( 1 tape ) $14.95 +sales tax* +$2.50 US
|
|
+$ 5.00 US five-tape tape-set ( 5 tapes) $34.95 +sales tax* +$5.00 US
|
|
+$10.00 US
|
|
Set A: tapes 2, 3, 4, 5 and 6(Noam)
|
|
Set B: tapes 7, 8, 9, 10 and 11(Bayse)
|
|
Set C: tapes 12, 13, 14, 15 and 1(Tribe) full-Conference set (15
|
|
tapes) $59.95 +sales tax* +$7.50 US +$20.00 US * - include 6.5% for
|
|
sales tax to Cal.addresses; prices include U.S. shipping Make checks to
|
|
*Recording, Etc.*; MasterCharge, Visa & American Express OK.
|
|
-==--==--==-<>-==--==--==-
|
|
|
|
Where is the REAL Legion of Doom When The Government Needs Them?
|
|
(Found in rec.arts.comics)
|
|
|
|
From: wga@po.CWRU.Edu (Will G. Austin)
|
|
Subject: The Legion of Doom
|
|
|
|
The members of the Legion of Doom (that I remember) were:
|
|
|
|
Lex Luthor Giganta
|
|
Brainiac Black Manta
|
|
Toyman Riddler
|
|
Sinestro Scarecrow
|
|
Capt. Cold
|
|
Cheetah
|
|
Solomon Grundy
|
|
|
|
-==--==--==-<>-==--==--==-
|
|
|
|
ENDNOTES AND FEEDBACK
|
|
|
|
We are always interested in news, pointers, tall tales, true stories,
|
|
quotes, jokes and brilliant strokes related to life on the Electronic
|
|
Frontier.
|
|
Write to us with comments and criticism, or write for us if you
|
|
prefer. Any letters or stories can be posted to comp.org.eff.talk, or
|
|
sent directly to the editor of Effector Online: boswell@eff.org
|
|
We'll be back in a fortnight with another edition.
|
|
|
|
In the meantime, you are still on the Electronic Frontier.
|
|
Be careful out there.
|
|
-==--==--==-<>-==--==--==-
|
|
|
|
|
|
Downloaded From P-80 International Information Systems 304-744-2253
|