599 lines
29 KiB
Plaintext
599 lines
29 KiB
Plaintext
########## ########## ########## | QUESTION TECHNOLOGY:|
|
|
########## ########## ########## | Information Age Fallacies|
|
|
#### #### #### | |
|
|
######## ######## ######## | OLD SCAMS IN NEW BOTTLES:|
|
|
######## ######## ######## | Computer Crime Now|
|
|
#### #### #### | |
|
|
########## #### #### | ANS & CIX to Interconnect|
|
|
########## #### #### | |
|
|
=====================================================================|
|
|
EFFector Online June 9, 1992 Issue 2.10|
|
|
A Publication of the Electronic Frontier Foundation |
|
|
ISSN 1062-9424 |
|
|
=====================================================================|
|
|
|
|
ANS CO+RE and CIX Agree to Interconnect
|
|
|
|
|
|
Elmsford, NY . . . ANS CO+RE Systems, Inc., (ANS) and the Commercial
|
|
Internet Exchange (CIX) have announced that they will interconnect for
|
|
a provisional period in order to increase connectivity among their
|
|
clients and members. During this period they will continue to work
|
|
together on technical issues and equitable arrangements that could
|
|
lead to a permanent interconnection.
|
|
|
|
ANS operates a high-speed, nationwide data network (ANSnet) supporting
|
|
research, education and business. The ANSnet interconnects with 17
|
|
other networks that carry commercial data, as well as data related to
|
|
research and education. The CIX is an association of seven networks
|
|
that carry commercial traffic. By signing an agreement with ANS and
|
|
by joining the CIX, midlevel networks will be able to exchange
|
|
commercial traffic with other CIX members via the ANS network. ANS is
|
|
not becoming a member of the CIX at this time.
|
|
|
|
During the provisional period of interconnectivity, the CIX and ANS
|
|
will co-sponsor a workshop, which will include other commercial
|
|
networking service providers, to develop a framework conducive to the
|
|
rapid expansion of the Commercial Internet. Among the issues to be
|
|
addressed in the workshop sessions are the potential methods for
|
|
permanently interconnecting network service providers and for managing
|
|
all related issues associated with interconnection. Both ANS and the
|
|
CIX have agreed to forego any cross payments during the provisional
|
|
period.
|
|
|
|
In commenting on the agreement, ANS President and CEO Al Weis stated,
|
|
"The CIX and ANS have taken a step forward in addressing some of the
|
|
challenges that face our industry. Providing a means for CIX members
|
|
and ANS clients to exchange commercial traffic has been an important
|
|
issue to the networking community. Today's announcement is the result
|
|
of negotiations that include input from many members of this
|
|
community, especially the New England Academic and Research Network
|
|
(NEARnet), whose ideas were instrumental in bringing about the final
|
|
agreement. I am hopeful that our efforts will help broaden
|
|
interconnectivity and begin to establish a framework for the evolution
|
|
of the Commercial Internet."
|
|
|
|
Mitch Kapor, Chairman of the CIX, said, "In taking this significant
|
|
step, we enable greater freedom from content restrictions on the
|
|
Internet. This agreement stands as an example that the private sector
|
|
can achieve the important goal of strengthening the openness of our
|
|
nation's information and communications infrastructure on a
|
|
cooperative basis, without the necessity of government regulation."
|
|
|
|
CONTACTS:
|
|
June 8, 1992 Susan Eldred (ANS)
|
|
914-789-5339
|
|
eldred@ans.net
|
|
|
|
Mitchell Kapor (CIX)
|
|
617-864-1550
|
|
mkapor@eff.org
|
|
|
|
-==--==--==-<>-==--==--==-
|
|
|
|
|
|
Around the Virtual Town
|
|
Notes by van@eff.org
|
|
|
|
With the advent of June weather in Cambridge its time to see what has
|
|
been happening in the EFF office and out on the Net in the past few
|
|
weeks.
|
|
|
|
Mitchell Kapor has been trying, with some success, to cut back on his
|
|
hectic schedule of meetings for and speeches about EFF and its
|
|
activities to groups around the country. But as this domestic schedule
|
|
begins to lessen, he is preparing for an extended trip to Japan at the
|
|
middle of this month. In Japan, Kapor will meet with key people in
|
|
telecom. He just finished an online stint at EFFSIG, the new EFF Forum
|
|
on CompuServe, fielding CIS users questions and comments.
|
|
|
|
The Washington office continues to take on more and more projects. A
|
|
large part of the effort of Berman and Company is the development of the
|
|
EFF Open Platform proposal for making digital voice, data, and video
|
|
communications possible on public switched telephone, cable and other
|
|
networks using technologies like ISDN as a transition to fiber optics.
|
|
|
|
Another item at the top of Washington's agenda is continued coalition
|
|
building among industry and public-interest groups to oppose the FBI's
|
|
digital telephony proposal; a proposal with could slow down the
|
|
development of advanced communications technology as well as threaten
|
|
the privacy of groups and individuals.
|
|
|
|
EFF has also testified against HR191, legislation which would allow the
|
|
government to copyright software developed by the government and which
|
|
could impede public access to government information.
|
|
|
|
With the able assistance of Shari Steele, Daniel Weitzner, Andrew Blau
|
|
and Craig Neidorf, the Washington office is also keeping up with filings
|
|
and motions and general tracking of issues such as business rate charges
|
|
for home BBS services, 900 number legislation, video dialtone, common
|
|
carriage, and first amendment questions. In their spare time, the
|
|
Washington office discuss current electoral politics, and win bets on
|
|
primary outcomes from Cambridge staff members.
|
|
|
|
John Barlow, as if he didn't have enough to do in Cyberspace, has just
|
|
been made a member of the Board of Directors of the Whole Earth
|
|
'Lectronic Link (The WELL) at a crucial moment in that system's
|
|
evolution.
|
|
|
|
EFF/Publications recently finished the first issue of our members
|
|
newsletter, "@eff.org" and are working on the second for later this
|
|
month. This publication is mailed to the "formal" members of EFF to
|
|
keep them apprised of what the various people here are doing. We will be
|
|
publishing this short newsletter monthly, so if you are an EFF member,
|
|
look for it in a non-virtual mailbox near you soon.
|
|
|
|
We have also just produced an update of the EFF General Information
|
|
brochure, as well as new pamphlets such as CRIME & PUZZLEMENT by John
|
|
Barlow, and BUILDING THE OPEN ROAD by Mitchell Kapor and Jerry Berman.
|
|
All of these are free for the asking by writing to us here in Cambridge.
|
|
|
|
Adam Gaffin, the writer of The EFF Guide to the Net has been bombarding
|
|
us with chunks of copy for weeks now. It looks like we have that rarest
|
|
of all book projects, one that is ahead of schedule. We still have a
|
|
long way to go however. Look for this in the late Fall at the earliest.
|
|
Print is slow you know.
|
|
|
|
Also in pre-production is the next issue of EFFECTOR, our main printed
|
|
journal designed to present longer articles. EFFECTOR 3 will be in
|
|
magazine format and will feature such writers as Howard Rheingold, John
|
|
Barlow, Mike Godwin and others. The topics will range from "Innkeeping
|
|
in Cyberspace" to a "History of Women on the Internet" as well as an
|
|
interview with Cliff Figallo, departing manager of the WELL. It will
|
|
also be illustrated (sorry, no color as yet). In keeping with EFF
|
|
policy, this will be available as a PostScript file via ftp. So look for
|
|
it around the end of July.
|
|
|
|
Chris Davis and Helen Rose keep expanding and improving our Internet
|
|
node, eff.org, in so many ways that it is impossible to track them.
|
|
Recent improvements are the expansion of our WAIS archive (Yes,
|
|
Virginia, EFF is a WAIS site), and overseeing the installation of a new
|
|
56kbps line to the Washington Office to enhance communication. They are
|
|
also continually tweaking the Sun SPARC stations in order to handle
|
|
EFF's ever increasing ftp load smoothly and transparently. In addition,
|
|
they keep up with a mail load that would sink the U.S. Post Office and
|
|
handle IRC! If you are going to USENIX next week, the dynamic duo will
|
|
be there representing the EFF at the BOF and in the halls. Look for
|
|
them. They'll be wearing EFF t-shirts and probably looking for a place
|
|
to jack their Powerbooks into the Net in order to login and read mail.
|
|
|
|
Mike Godwin, Staff Counsel, is currently hiding out for the first part
|
|
of the day studying for the Massachusetts Bar. During his remaining 30
|
|
minutes of consciousness, he is also managing to be among the top 25
|
|
posters to USENET, *and* carry on discussions on CompuServe and the
|
|
WELL at the same time. Mike is already a member of the bars of Texas
|
|
and Washington, D.C. Last month, he made a trip to New York and spoke to
|
|
the NYACC on civil-liberties and the new technologies (see below).
|
|
|
|
Rita Rouvalis? Rita has taken a vacation break from all this and is
|
|
currently spelunking in various caves near St. Louis. She still logs
|
|
in and checks her mail twice a day from down there. No, we don't know
|
|
how.
|
|
|
|
-==--==--==-<>-==--==--==-
|
|
|
|
|
|
GOLDEN THREAD OF THE MONTH AWARD TO:
|
|
|
|
>>>There's no modem tax being proposed. It's a myth.
|
|
-- Cliff Stoll (stoll@ocf.berkeley.edu)
|
|
|
|
>>But isn't there supposed to be an FCC-imposed tax on postings mentioning
|
|
>>Craig Shergold?
|
|
-- Mike Godwin (mnemonic@eff.org)
|
|
|
|
>No, it's on the cookies you buy at Neiman-Marcus. Be sure to ask for
|
|
>the recipe.
|
|
-- Ed McCreary (mccreary@sword.eng)
|
|
|
|
Prodigy tried to replace one of my spreadsheet files with the cookie
|
|
recipe, but the virus in my laser printer stopped it.
|
|
-- James Davies (jrbd@craycos.com)
|
|
|
|
from comp.org.eff.talk
|
|
|
|
-==--==--==-<>-==--==--==-
|
|
|
|
|
|
OLD SCAMS IN NEW TECHNOLOGIES:
|
|
A Discussion Before the New York Amateur Computer Club
|
|
|
|
On May 15, Mike Godwin, staff counsel of the EFF, and Donald Delaney,
|
|
Senior Investigator New York State Police, discussed the advent of
|
|
organized crime in cutting-edge computer crime. The discussion, moderated
|
|
by Newsbytes, John McMullen, took place before a meeting of the New York
|
|
Amateur Computer Club.
|
|
|
|
To open the discussion, McMullen reflected that at a previous appearance
|
|
before the NYACC in 1991, Delaney had called for:
|
|
|
|
1. An effort by law enforcement to increase public awareness of computer
|
|
crime.
|
|
2. Increasing education of law enforcement officers in the technological
|
|
aspects of the new media.
|
|
3. The establishment of a New York State Computer Crime Lab.
|
|
|
|
McMullen noted that, in the main, all of these items on Delaney's 1991
|
|
agenda had been fulfilled. McMullen went on to remark that PBX & Cellular
|
|
Phone Fraud, mounting privacy concerns, and the wiretapping and encryption
|
|
controversies had largely replaced the previous year's concerns.
|
|
|
|
In response, Delaney agreed with McMullen's general assessment and noted
|
|
that "carding" of goods -- the buying of equipment with stolen credit
|
|
cards or credit card numbers -- had become much more prevalent as well.
|
|
More significant, Delaney said, was the explosion in "call-sell"
|
|
operations. These crimes, where international calls are placed for a
|
|
"fee," and which use a private company's PBX exchange illegally to do so,
|
|
have become the most widespread and lucrative form of computer crime
|
|
today--so lucrative and relatively risk-free, he noted, that many drug-
|
|
pushers are moving into the business. This impression was bolstered by
|
|
the fact that one of Delaney's 1991 phone-fraud arrestees had recently
|
|
been found murdered. Delaney believes that he may have been killed for
|
|
trying to operate a call-sell operation in an area of New York City felt
|
|
to be under the control of an Colombian mob-run phone-fraud operation.
|
|
|
|
Delaney predicted that PBX fraud will continue to grow and to vex
|
|
companies for as long as companies using PBX systems fail to understand
|
|
the security problems and to correct them.
|
|
|
|
Mike Godwin, in his portion of the discussion, drew attention to the fact
|
|
that, without greater recognition of the uniqueness of BBS and
|
|
conferencing systems, legislators seeking to reduce PBX-related crime and
|
|
other telecommunications fraud may make decisions affecting BBS systems
|
|
through misunderstandings. Godwin made a distinction between telephone
|
|
conversations which are one-to-one (except for conference calls, which are
|
|
often ineffective and inefficient), newspaper and broadcast media which
|
|
are one-to-many, and BBS systems which are many-to-many. "We are
|
|
concerned," he said, " that law enforcement will respond to the challenges
|
|
of this new technology in inappropriate ways. For example, the FBI and
|
|
Justice Department in the recent 'Digital Telephony' Initiative have
|
|
requested that phone companies be *required* to provide law enforcement
|
|
with a method of wire-tapping, arguing that technological developments
|
|
that make present methods less effective."
|
|
|
|
"Such a procedure would, in effect, make the phone companies part of the
|
|
surveillance system. We don't think that is their job. The EFF believes
|
|
that it is up to law enforcement to develop their own crime-fighting
|
|
tools. When the telephone was first developed it made it more difficult to
|
|
catch crooks. They no longer had to go to known criminal hangouts to
|
|
conspire to commit crimes; they could do it by telephone. The government
|
|
responded to this problem by resorting to wiretapping." It is appropriate
|
|
for law enforcement to bear the burden of coming up with new ways to
|
|
investigate crimes if technology threatens to make old ways obsolete,
|
|
Godwin said. Godwin cited the recent conviction of John Gotti as a case in
|
|
which law enforcement had innovated in response to Gotti's refusal to use
|
|
his wiretapped phones for important conversations. In that case, he said,
|
|
law-enforcement agents bugged the lampposts along the street where Gotti
|
|
walked as he consulted with his subordinates.
|
|
|
|
Godwin also spoke briefly concerning the on-going debate over encryption.
|
|
"The government," he said, "through various agencies such as NSA, keeps
|
|
attempting to restrict citizens from cloaking their computer files or
|
|
messages in seemingly unbreakable encryption. The EFF believes that people
|
|
have rights to privacy and, should they wish to protect it by encrypting
|
|
computer messages, have a perfect right to do so."
|
|
|
|
The last speaker of the evening was Bruce Fancher, owner of MindBox, a
|
|
commercial BBS in New York. His remarks told of his early experience as a
|
|
"hacker". Fancher asked the audience to understand that these individuals,
|
|
even if discovered inside a computer system, were not computer terrorists
|
|
with malign intentions, but explorers.
|
|
|
|
Following these presentations there was a question-and-answer period. In
|
|
response to one question, Delaney suggested that a method of resolving the
|
|
debate over who should hold the keys to encrypted messages was to allow a
|
|
third party -- such as an insurance company or a bank -- to maintain the
|
|
keys for those using encryption. An official seeking to read an encrypted
|
|
message would have to get a court order to obtain the key and read the
|
|
documents in question.
|
|
|
|
Godwin disagreed with this saying that such a third party and its system
|
|
would become a high-profile target for "crackers". It was not, he said, in
|
|
the best interest of the country to add yet another level of complexity
|
|
and bureaucracy to the problem.
|
|
|
|
-==--==--==-<>-==--==--==-
|
|
|
|
|
|
Fifty Ways to Hose Your Code
|
|
----- ---- -- ---- ---- ----
|
|
Kind of by Paul Simon
|
|
|
|
The problem's all inside your code she said to me;
|
|
Recursion is easy if you take it logically.
|
|
I'm here to help you if you're struggling to learn C,
|
|
There must be fifty ways to hose your code.
|
|
|
|
She said it's really not my habit to #include,
|
|
And I hope my files won't be lost or misconstrued;
|
|
But I'll recompile at the risk of getting screwed,
|
|
There must be fifty ways to hose your code.
|
|
|
|
Just blow up the stack Jack,
|
|
Make a bad call Paul,
|
|
Just hit the wrong key Lee,
|
|
And set your pointers free.
|
|
|
|
Just mess up the bus Gus,
|
|
You don't need to recurse much,
|
|
You just listen to me.
|
|
|
|
She said it grieves me to see you compile again.
|
|
I wish there were some hardware that wasn't such a pain.
|
|
I said I appreciate that and could you please explain,
|
|
About the fifty ways.
|
|
|
|
She said why don't we both just work on it tonight,
|
|
And I'm sure in the morning it'll be working just right.
|
|
Then she hosed me and I realized she probably was right,
|
|
There must be fifty ways to hose your code.
|
|
|
|
Just lose the address Les,
|
|
Clear the wrong Int Clint,
|
|
Traverse the wrong tree Lee,
|
|
And set your list free.
|
|
|
|
Just mess up the bus Gus,
|
|
You don't need to recurse much,
|
|
You just program in C.
|
|
|
|
|
|
--by Miles Deforest (deforest@sundae11.dab.ge.com) and Al Pena
|
|
|
|
-==--==--==-<>-==--==--==-
|
|
|
|
|
|
TECHNO-FALLACIES OF THE INFORMATION AGE
|
|
Gary T. Marx
|
|
Department of Sociology
|
|
Massachusetts Institute of Technology
|
|
Cambridge, Massachusetts
|
|
|
|
New information technologies are breaking the boundaries
|
|
of time and space, and are bringing with them far-reaching changes in
|
|
the way information is gathered, accessed, and disseminated. While
|
|
holding much promise, it is also important to be aware of the background
|
|
assumptions that often accompany the advocacy and introduction of new
|
|
technologies. In particular, it is critical to examine the broader
|
|
cultural climate, the rationales for action, and the empirical and value
|
|
assumptions surrounding the introduction and widespread adoption of a
|
|
technology.
|
|
|
|
Academic analysts try to offer theories, concepts,
|
|
methods, and data, and also, hopefully, wisdom. A part of the wisdom
|
|
arises in being able to identify and question the web of tacit
|
|
assumptions that underlie action. As an ethnographer, I watch and
|
|
listen. When it comes to technology, I sometimes hear things that seem
|
|
empirically, logically, or normatively wrong, much as a musician knows
|
|
that certain notes are off key: "Turn the technology loose and let the
|
|
benefits flow"..."Do away with the human interface"..."When you choose
|
|
to make a phone call, you are consenting to have your telephone number
|
|
released"..."Only the computer sees it"..."Those of us who are involved
|
|
in consumer marketing are the best agents for protecting the consumer's
|
|
privacy"..."That's never happened"..."The public interest is whatever
|
|
the public is interested in watching"..."There is no law against
|
|
this"..."The technology is neutral."
|
|
|
|
There are a number of assumptions underlying assertions
|
|
like these. If we are to use emergent technology to best serve human
|
|
needs in a democratic society, it is important we be on guard against
|
|
what can be called "tarnished silver-bullet techno-fallacies".
|
|
Following are a number of these information-age leaps in logic of which
|
|
we must be aware, and against which we must guard.
|
|
|
|
1. The fallacy of assuming that only the guilty have to
|
|
fear the development of intrusive technology (or, if you've done nothing
|
|
wrong, you have nothing to hide).
|
|
|
|
2. The fallacy of the free lunch or "painless dentistry"
|
|
in which it is assumed that information technology offers cost-free
|
|
solutions.
|
|
|
|
3. The legalistic fallacy of assuming that the only
|
|
criterion that ought to guide the use of technology is whether or not
|
|
the law permits it.
|
|
|
|
4. The fallacy of assuming that pragmatism and/or
|
|
efficiency should automatically overrule other values such as fairness,
|
|
equity, external costs imposed on third parties, and symbolic meaning.
|
|
|
|
5. The fallacy of lowest common denominator morality, in
|
|
assuming that if the competition or others push moral limits, you are
|
|
justified in doing the same.
|
|
|
|
6. The fallacy of assuming that personal information on
|
|
customers, clients, and cases possessed by an organization is a kind of
|
|
property, to be bought and sold just like office furniture or raw
|
|
materials.
|
|
|
|
7. The fallacy of assuming that because our privacy
|
|
expectations are historically determined and relative, they must
|
|
necessarily become weaker as technology becomes more powerful.
|
|
|
|
8. The fallacy of technical neutrality. (George
|
|
Orwell's response to the assertion that technology was neutral--"so is
|
|
the jungle"--is applicable here).
|
|
|
|
9. The fallacy of implied consent and free choice (For
|
|
example, some phone company officials claim that if you choose to make a
|
|
call you have consented to have your phone number released. You thus
|
|
are encouraged to protect your privacy by not using the phone. But
|
|
that's like saying if you breathe polluted air or drink contaminated
|
|
water, you consent to these).
|
|
|
|
10. The fallacy of believing that because it is possible
|
|
to successfully skate on thin ice it is acceptable to do so. We should
|
|
not have to wait for a disaster to occur before concluding that some
|
|
uses of information technology are simply too risky to be adopted.
|
|
|
|
11. The fallacy of assuming that the means will never
|
|
determine the end. There is a danger of starting with the technology
|
|
and asking what can it be used for, rather than starting with goals and
|
|
asking how can they best be achieved.
|
|
|
|
12. The fallacy of perfect containment (or, technology
|
|
will always remain the solution rather than become the problem).
|
|
|
|
13. The fallacy of assuming that if a critic questions
|
|
the means, he or she must also be against the ends.
|
|
|
|
|
|
With respect to information gathering technology, we are
|
|
now in the twilight that Justice William O. Douglas wrote about when he
|
|
argued that the protection of our basic values is not self-executing,
|
|
and that "As nightfall does not come at once, neither does oppression.
|
|
In both instances, there is a twilight when everything remains seemingly
|
|
unchanged. And it is in such twilight that we all must be most aware of
|
|
change in the air--however slight--lest we become unwitting victims of
|
|
the darkness." One could as well argue that we are in a sunrise zone
|
|
and that we must be aware of change in the air in order to insure that
|
|
we all profit from the sunshine. But for this to happen, the technology
|
|
must be bounded by increased public awareness, responsible corporate and
|
|
government behavior, and new laws and policies framed to ensure
|
|
individual freedoms and protect individual rights.
|
|
* * * * * * * *
|
|
|
|
This essay is based in part on the author's article
|
|
"Technology and Privacy" that appeared in The World and I, September,
|
|
1990 issue, pp. 523-541. Other recent publications by the author
|
|
touching these and related themes include "The Case of the Omniscient
|
|
Organization", Harvard Business Review, 90(March/April, 1990): 12-30;
|
|
Undercover: Police Surveillance in America, Berkeley: University of
|
|
California Press, 1988; and "Monitoring on the Job" (with S. Sherizen),
|
|
Technology Review, 89(November/December, 1986): 62-72.
|
|
|
|
-==--==--==-<>-==--==--==-
|
|
|
|
ELECTRONIC FRONTIER FOUNDATION OFFERS T-SHIRTS
|
|
|
|
For a $10 donation, EFF will send you a spiffy 100% cotton white T-shirt
|
|
with the new black and red EFF logo tastefully displayed on front, and
|
|
the following on the back:
|
|
|
|
ELECTRONIC FRONTIER
|
|
FOUNDATION
|
|
eff@eff.org
|
|
|
|
(50's style graphic with
|
|
large building sitting on world)
|
|
|
|
Serving Cyberspace since 1990
|
|
|
|
|
|
These are the very same hot t-shirts that sold quickly at CFP-2!
|
|
They come in sizes XL and child's S only. Send your $10 check or
|
|
money order to
|
|
|
|
The Electronic Frontier Foundation
|
|
ATT: Rita T. Shirts
|
|
155 Second Street
|
|
Cambridge MA 02141
|
|
|
|
"What a DEAL! People will be hard-pressed to find a shirt of the same
|
|
quality with such fantastic silk-screening for less than $20 in any
|
|
T-shirt store in the country. (You can quote me on that.)"
|
|
-- Brendan Kehoe <brendan@cs.widener.edu> upon receiving his shirt.
|
|
|
|
*** Mention that you are an EFFector Online reader, and we will ***
|
|
waive all shipping and handling charges!
|
|
(We'll also do this if you *don't* mention you're an EO reader.)
|
|
|
|
|
|
-==--==--==-<>-==--==--==-
|
|
|
|
MEMBERSHIP IN THE ELECTRONIC FRONTIER FOUNDATION
|
|
|
|
In order to continue the work already begun and to expand our efforts
|
|
and activities into other realms of the electronic frontier, we need the
|
|
financial support of individuals and organizations.
|
|
|
|
If you support our goals and our work, you can show that support by
|
|
becoming a member now. Members receive our quarterly newsletter,
|
|
EFFECTOR, our bi-weekly electronic newsletter, EFFector Online (if you
|
|
have an electronic address that can be reached through the Net), and
|
|
special releases and other notices on our activities. But because we
|
|
believe that support should be freely given, you can receive these
|
|
things even if you do not elect to become a member.
|
|
|
|
Your membership/donation is fully tax deductible.
|
|
|
|
Our memberships are $20.00 per year for students, $40.00 per year for
|
|
regular members. You may, of course, donate more if you wish.
|
|
|
|
Our privacy policy: The Electronic Frontier Foundation will never, under
|
|
any circumstances, sell any part of its membership list. We will, from
|
|
time to time, share this list with other non-profit organizations whose
|
|
work we determine to be in line with our goals. But with us, member
|
|
privacy is the default. This means that you must actively grant us
|
|
permission to share your name with other groups. If you do not grant
|
|
explicit permission, we assume that you do not wish your membership
|
|
disclosed to any group for any reason.
|
|
|
|
---------------- EFF MEMBERSHIP FORM ---------------
|
|
|
|
Mail to: The Electronic Frontier Foundation, Inc.
|
|
155 Second St. #210
|
|
Cambridge, MA 02141
|
|
|
|
I wish to become a member of the EFF I enclose:$__________
|
|
$20.00 (student or low income membership)
|
|
$40.00 (regular membership)
|
|
$100.00(Corporate or company membership.
|
|
This allows any organization to
|
|
become a member of EFF. It allows
|
|
such an organization, if it wishes
|
|
to designate up to five individuals
|
|
within the organization as members.)
|
|
|
|
| I enclose an additional donation of $___________
|
|
|
|
Name:______________________________________________________
|
|
|
|
Organization:______________________________________________
|
|
|
|
Address: __________________________________________________
|
|
|
|
City or Town: _____________________________________________
|
|
|
|
State:_______ Zip:________ Phone:( )_____________(optional)
|
|
|
|
FAX:( )____________________(optional)
|
|
|
|
Email address: ______________________________
|
|
|
|
I enclose a check [ ] .
|
|
Please charge my membership in the amount of $_____________
|
|
to my Mastercard [ ] Visa [ ] American Express [ ]
|
|
|
|
Number:____________________________________________________
|
|
|
|
Expiration date: ____________
|
|
|
|
Signature: ________________________________________________
|
|
|
|
Date:______________________
|
|
|
|
I hereby grant permission to the EFF to share my name with
|
|
other non-profit groups from time to time as it deems
|
|
appropriate [ ] .
|
|
Initials:___________________________
|
|
|
|
|
|
=====================================================================|
|
|
EFFector Online is published by |
|
|
The Electronic Frontier Foundation |
|
|
155 Second Street, Cambridge MA 02141 |
|
|
Phone:(617)864-0665 FAX:(617)864-0866 |
|
|
Internet Address: eff@eff.org |
|
|
Reproduction of this publication in electronic media is encouraged |
|
|
To reproduce signed articles individually, |
|
|
please contact the authors for their express permission. |
|
|
=====================================================================|
|
|
|
|
REMEMBER:Only *you* can prevent more postcards to Craig Shergold!
|
|
|
|
|
|
|
|
|
|
Downloaded From P-80 International Information Systems 304-744-2253
|