home *** CD-ROM | disk | FTP | other *** search
Text File | 1992-07-14 | 30.8 KB | 648 lines | [TEXT/EDIT] |
- ########## | Volume I July 26,1991 Number 9 |
- ########## | |
- ### | EFFECTOR ONLINE |
- ####### | |
- ####### | |
- ### | |
- ########## | The Electronic Newsletter of |
- ########## | The Electronic Frontier Foundation |
- | (eff.org) |
- ########## | |
- ########## | |
- ### | Staff: |
- ####### | Gerard Van der Leun (van@eff.org) |
- ####### | Mike Godwin (mnemonic@eff.org) |
- ### | Mitchell Kapor (mkapor@eff.org) |
- ### | Chris Davis (ckd@eff.org) |
- ### | Helen Rose (hrose@eff.org) |
- | |
- ########## | Reproduction of Effector Online via all |
- ########## | electronic media is encouraged.. |
- ### | To reproduce signed articles individually |
- ####### | please contact the authors for their express |
- ####### | permission.. |
- ### | |
- ### | Published Fortnightly by |
- ### | The Electronic Frontier Foundation (eff.org) |
-
- effector n, Computer Sci. A device for producing a desired change.
- -==--==--==-<>-==--==--==-
-
-
- WE WUZ HACKED!
-
- As Monty Python has wisely noted, "NOBODY expects the Spanish
- Inquisition!" In like manner, nobody expects people to crack their
- system in quite the way that they *are* cracked. After all, if you
- knew about an unlocked door in your system, you'd lock it. Right? As
- soon as you could get around to it, of course.
-
- One of the machines here at eff.org is named "black-cube". As you might
- suspect, that machine is a NeXT. A remote execution daemon called "rexd"
- that runs on the NeXT (and many other machines) has an authentication
- routine that is effectively brain dead, and is automatically turned on
- with a new installation (NeXT Operators Take Note!). Those who know that
- one of the eff.org machines is a NeXT, or who might guess it by seeing
- the name "black-cube" can exploit the weakness of "rexd" to gain entry
- into the system.
-
- On July 1, this happened to us. If you run a NeXT, or even if you don't,
- it could happen to you.
-
- The sequence of events, as detailed in Chris Davis' report on the
- incident was as follows:
-
- "At about 1 am on July 1, the NeXT was breached by an intruder using
- the rexd remote execution daemon. The following things happened, in
- uncertain but approximate order:
-
- "(1) rexd mounted file systems from 'kropotkin.gnu.ai.mit.edu'. Only
- that, the local disk, and the /home partition from the Sun were
- mounted.
-
- "(2) the /etc/inetd.conf internet daemon configuration file was edited,
- as user mkapor, to allow rexecd to be run.
-
- "(3) the /etc/nu.cf new user program configuration file was edited or
- modified in an unknown fashion as user mkapor (it's possible that only
- the modification date was changed).
-
- "(4) a file 'rc', a 16K Mach executable, was created in mkapor's home
- directory, as mkapor.
-
- "(5) the /etc/wtmp file was overwritten with an empty file, removing
- login accounting timestamps
-
- "User 'mycroft' was logged into kropotkin.gnu.ai.mit.edu at the appropriate
- time, and admits entering the machine, but denies 2, 3, 4, and 5."
-
- We note that "mycroft" was the name of Sherlock Holmes' older brother.
- He was said to be even more brilliant that Holmes himself. But it
- doesn't take great brilliance to crack a machine, only weak routines,
- a certain specific knowledge, and the willingness to wander around in
- other peoples' homes without being invited.
-
- The security hole was apparently known to CERT (Computer Emergency
- Response Team), but the alert was netcast before we owned the NeXT so
- we were not aware of it. We've retired black-cube from active service
- and have reviewed all other security programs and measures.
-
- We were very careful to close all known security holes on our principal
- machine. We were not quite careful enough to apply the same level of
- discipline with black-cube.
-
- Eternal vigilance is the price of network security.
-
- -==--==--==-<>-==--==--==-
-
-
- "When the 'oppressors' become too strict, we have what is
- known as a police state, wherein all dissent is forbidden,
- as is chuckling, showing up in a bow tie, or referring to
- the mayor as 'Fats.' Civil liberties are greatly curtailed
- in a police state, and freedom of speech is unheard of,
- although one is allowed to mime to a record. Opinions
- critical of the government are not tolerated, particularly
- about their dancing. Freedom of the press is also
- curtailed and the ruling party 'manages' the news,
- permitting the citizens to hear only acceptable political
- ideas and ball scores that will not cause unrest."
-
- Woody Allen, "Without Feathers" (Ballentine,1972)
-
- -==--==--==-<>-==--==--==-
-
- THE AUSTIN EFF ORGANIZATIONAL MEETING
- by Steve Jackson
-
- An Austin meeting for those interested in the EFF and its mission
- was held July 19 at the offices of Steve Jackson Games. About 60
- people (50 or so actively interested, and another 10 along for the
- ride) attended to cook hot dogs, drink sodas and beer, and talk
- about Constitutional freedoms in the electronic age.
- The meeting had been publicized almost exclusively over the net
- and local BBSs; some attendees read about it first on the Well. Local
- media were informed, but as far as we know, none mentioned it.
- I introduced the idea of an Austin EFF chapter by pointing out
- that the EFF *has* no local chapters, and one of the first missions of
- an Austin group - if we started one - would be to find out what a
- local chapter was good for.
-
- Suggestions from the group included:
- * Liaison with local law enforcement groups, both to influence
- their attitudes and to offer expert assistance and cooperation.
- * Liaison with media: offering information, correcting errors,
- and if necessary being ready to go to editorial boards if facts are
- consistently misrepresented.
- * Education and communication with others: speaking at schools
- and club meetings, writing opinion pieces for newspapers, and so on.
- * Education and communication among ourselves. The issue of ``Just
- what ARE the laws regarding sysop liability?" was specifically raised.
- * Direct political action: querying candidates on their stands on
- EFF-related issues, and initiating legislation to preserve civil
- rights in the high-tech age.
- * More organized input into national EFF concerns, especially
- creation of "ethical standards and practices."
- * Recruitment of members for the national EFF.
- * General networking among people with common interests. (Earl
- Cooley, sysop of SMOF - an old and respected, but underutilized, local
- board - volunteered to host a local EFF discussion. SMOF, the `World's
- Oldest Online SF Convention,' can be reached at 512-467-7317.)
-
- Four people - Bruce Sterling, John Quarterman, Matt Lawrence
- and myself - expressed willingness to serve on a local EFF board
- "provided no one of us has to do all the work." Four seems to be
- about the *minimum* workable number; we'll certainly be looking for
- more organizers.
- Another attendee was a Houston civil-libertarian, representing a
- group of about 20 like-minded computer users; a Houston EFF chapter
- is probably in the offing.
- 10 people signed up as national EFF members at the meeting (several
- others had already joined), and many more membership forms were
- distributed. A signup sheet was passed around so that everyone could
- be contacted directly for further meetings. And there will be more
- meetings; the "sense of the crowd" was clear on that. Our four
- volunteers will now have to discuss the next step.
-
- Thanks go to Loyd Blankenship, for making sure that all the food,
- drink and furniture arrived at the right time and place; to
- Monica Stephens, Mike and Brenda Hurst, and John Quarterman for
- assorted help with cooking, cleanup and publicity; and to everyone
- who brought chairs and food!
-
- *********************
-
- "Think Globally, Act Locally"
-
- We are really encouraged and a bit overwhlemed by the spontaneous
- interest in forming chapters. In comp.org.eff.talk several other
- individuals offered to help organize local chapters in different parts of
- the country. Local activities to promote EFF causes can be a major factor
- in civilizing the frontier. Over the summer we will be thinking about
- what constitutes a good set of ground rules for chapters and how to
- coordinate and support activities from the already-busy EFF office. We'd
- certainly like to see more discussion on comp.org.eff.talk about possible
- roles for local chapters. Thanks to Steve Jackson for getting the ball
- rolling.
-
-
- -==--==--==-<>-==--==--==-
-
- MORE TITLES ON THE EFF MAGAZINE STAND
-
- INTERTEXT, an electronic magazine devoted to fiction, is published
- bi-monthly by Jason Snell (jsnell@ucsd.edu).
- Although primarily established as a place on the net to publish genres
- other than sci-fi/fantasy, it does still contain some. The quality of
- the fiction is about that of what you would find in alt.prose.
- Jason welcomes submissions of all genres. INTERTEXT is also available
- by e-mail subscription and is primarily archived on network.ucsd.edu.
-
- QUANTA is the electronically distributed journal of Science Fiction
- and Fantasy. As such, each issue contains fiction by amateur authors as well
- as articles, reviews, and other items of interest.
- You'll find pretty standard sci-fi/fantasy in QUANTA, with an
- occasional gem or two. The editors of INTERTEXT and QUANTA are
- friends and they tend to use some of the same editorial policies: they
- publish just about whatever they get and they publish their favorite
- writers all the time. QUANTA is much sharper in format than INTERTEXT.
- QUANTA is edited by Daniel Applequist (daln@andrew.cmu.edu). Submissions
- should be sent to quanta@andrew.cmu.edu. Subscription requests should
- be sent to quanta+requests-acii@andrew.cmu.edu.
-
- PARSONS MESSENGER AND INTELLIGENCER is a fictional small-town
- newspaper consisting primarily of editorials written by the fictional
- residents of Parsons, MidWest, USA. The Editor, Jane Smith, is also
- fictional.
- Most of the letters and opinions etc. are stock stereotypes, but
- a few are creative and interesting. It's a fresh idea, but it stales
- too quickly.
-
- THE UNPLASTIC NEWS is a brand new little magazine of quips and
- quotes from anywhere and everywhere. It's published by Todd Tibbetts
- (tibbetts@hsi.hsi.com), who is new to the net and hasn't quite figured
- out how to effectively distribute Unplastic yet.
- Unplastic's first issue is a collection of fully documented quotes
- >from sources outside the net. I get the impression that Todd wants to
- collect brilliant offerings from the net for future issues and mix them
- in heavily with the quotes from other sources. If he can pull this off
- successfully, THE UNPLASTIC NEWS will be one cutting-edge pub.
-
- All four titles are available via anonymous ftp from eff.org. They are
- to be found in the Journals Directory.
-
-
- -==--==--==-<>-==--==--==-
-
- Paraphrased from Time magazine:
-
- President Bush is finally switching from his manual typewriter to a
- personal computer, and taking lessons on how to use it. But he hasn't
- set his sights too high. "I don't expect this to teach me how to set
- the clock on the VCR or anything complicated," says the President.
-
- -- Denis Coskun, Alias Research Inc., Toronto Canada dcoskun@alias.com
-
- -==--==--==-<>-==--==--==-
-
-
-
- HACKER HYSTERIA DOWNUNDER
- by Mike Godwin, Staff Counsel, EFF
-
- I had just begun to think we had been making progress against the
- reflexive prejudice that so often afflicts the policy debates about
- hackers and computer crime. Then I read Tom Forester's recent
- distressing article about the need to "clamp down" on hackers.
-
- It's not that I disagree with Forester about the principle that
- computer intrusion and vandalism should be illegal. But I was
- astonished at both at the moral simplicity and the factual inaccuracy
- of Tom Forester's newspaper column.
-
- The article, "Hackers:Clamp Down Now", appeared in an Australian
- newspaper earlier this summer. I had expected a well-reasoned article
- from Forester, who co-authored COMPUTER ETHICS: CAUTIONARY TALES AND
- ETHICAL DILEMMAS IN COMPUTING (Blackwell / Allen & Unwin, 1990). After
- all, it was a book I had reviewed favorably for WHOLE EARTH REVIEW's
- Summer 1991 issue.
-
- But "Hackers:Clamp Down Now" turned out to be a potpourri of various
- statements and misperceptions regarding hackers that were common in
- the American media a year ago and still persist in many quarters. It
- was painful and infuriating to see them surface again in Australia.
- Especially when written by someone who should know better.
-
- Among other things, Forester writes:
-
- >Breaking into a computer is no different from breaking into your
- >neighbour's house. It is burglary plain and simple - though often
- >accompanied by malicious damage and theft of information.
-
- Yet nothing is "plain" or "simple" about analogizing computer trespass
- to burglary. The English common law that informs the British,
- American, and Australian legal systems has always treated burglary
- harshly, primarily because it involves a threat to the victim's
- *residence* and to his *person*.
-
- But computer intrusion in general, and the cases Forester discusses in
- particular, pose neither threat. A mainframe computer at a university
- or business, while it clearly ought to be protected "space" under the
- law, is not a house "plain and simple." The kind of invasion and the
- potential threat to traditional property interests is not the same.
-
- Consider this: anyone who has your phone number can dial your home--
- can cause an electronic event to happen *inside your house*. That
- "intruder" can even learn things about you from the attempt
- (especially if you happen to answer, in which case he learns your
- whereabouts). Do we call this attempted burglary? Do we call it spying
- or information theft? Of course not--because we're so comfortable with
- telephone technology that we no longer rely on metaphors to do our
- thinking for us.
-
- This is not to say that all computer intrusion is innocuous. Some of
- it is quite harmful--as when a true "vandal" runs programs that damage
- or delete important information. But it is important to continue to
- make moral and legal distinctions, based on the intent of the actor
- and the character of the damage.
-
- Tom Forester seems to want to turn his back on making such
- distinctions. This, to me, is a shameful position to take.
-
- Forester supported his oddly simplistic moral stance with some odder
- factual errors. Here are some of the more egregious ones.
-
- >Last year, the so-called 'Legion of Doom' managed to completely
- >stuff up the 911 emergency phone system in nine US states, thus
- >endangering human life. They were also later charged with trading
- >in stolen credit card numbers, long-distance phone card numbers
- >and information about how to break into computers.
-
- Only a person who is willfully ignorant of the record could make these
- statements. The so-called Legion of Doom never damaged or threatened
- to damage the E911 system. If Forester had done even minimal research,
- he could have discovered this. What they did, of course, was copy a
- bureaucratic memo from an insecure Bell South computer and show it to
- each other.
-
- At the trial of Craig Neidorf, who was charged along with Legion of
- Doom members, it was revealed that the information in that memo was
- publicly available in print.
-
- Thus, there was no proprietary information involved, much less a
- threat to the E911 system. Forester is simply inventing facts in order
- to support his thesis. For an academic, this is the gravest of sins.
-
- >Leonard Rose Jr. was charged with selling illegal
- >copies of a US $77,000 AT&T operating system.
-
- Len Rose was never charged with "selling" anything. His crime
- concerned his possession of the expensive source code, which he, like
- many other Unix consultants, used in his work.
-
- >Robert Morris, who launched the disastrous Internet worm, got a
- >mere slap on the wrist in the form of a US $10,000 fine and 400
- >hours' community service.
-
- If Forester had investigated the case, he might have discovered an
- explanation for the lightness of Robert Morris Jr.'s sentence: that
- Morris never intended to cause any damage to the networks. In any
- case, Morris hardly qualifies as a "hacker" in the sense that Forester
- uses the word; by all accounts, he was interested neither in "theft"
- nor "burglary" nor "vandalism."
-
- Of course, making such subtle distinctions would only blunt the force
- of Forester's thesis, so he chooses to ignore them.
-
- >Instead, [the hacker] tends to spend his time with the computer,
- >rising at 2pm, then working right through to 6am,, consuming mountains
- >of delivered pizza and gallons of soft drink.
-
- This is the kind of stereotyping that Forester should be embarrassed
- to parrot in a public forum.
-
- >Some suffer from what Danish doctors are now calling "computer
- >psychosis" - an inability to distinguish between the real world
- >and the world inside the screen.
- >
- >For the hacker, the machine becomes a substitute for human
- >contact, because it responds in rational manner, uncomplicated by
- >feelings and emotions.
-
- And here Forester diagnoses people whom he has never met. One is
- forced to wonder where Forester acquired his medical or psychiatric
- training. Of the people whose names he blithely cites, I have met or
- spoken to half a dozen. None of them has been confused about the
- difference between computers and reality, although it may be
- understandable that they prefer working with computers to working with
- people who prejudge them out of hatred, ignorance, or fear.
-
- >One day, these meddlers will hack into a vital military, utility
- >or comms system and cause a human and social catastrophe. It's
- >time we put a stop to their adolescent games right now.
-
- History suggests that we have far more to fear from badly designed or
- overly complex software than from hackers. Recent failures of phone
- networks in the United States, for example, have been traced to
- software failures.
-
- Even if we grant that there are some hackers with the ability to
- damage critical systems, the question Forester fails to ask is this:
- Why hasn't it happened already? The answer seems to be that few
- hackers have the skill or desire to damage or destroy the very thing
- they are interested in exploring.
-
- Of course, there are some "vandals" out there, and they should be
- dealt with harshly. But there are far more "hackers" interested in
- exploring and understanding systems. While they may well violate the
- law now and then, the punishments they earn should take into account
- both their intentions and their youth.
-
- It has been noted many times that each generation faces the challenge
- of socializing a wave of barbarians--its own children. We will do our
- society little good if we decide to classify all our half-socialized
- children into criminals. For an ethicist, Forester seems to have given
- little thought to the ethics of lumping all computer trespass into one
- category of serious crime.
-
- -==--==--==-<>-==--==--==-
-
-
- "Twas midnight, and the UNIX hacks
- Did gyre and gimble in their cave
- All mimsy was the CS-VAX
- And Cory raths outgrave.
-
- "Beware the software rot, my son!
- The faults that bite, the jobs that thrash!
- Beware the broken pipe, and shun
- The frumious system crash!"
-
-
- -==--==--==-<>-==--==--==-
-
-
- STUDENT SUSPENDED FOR MAILING PASSWORDS
- by Rita Rouvalis
-
- The University of Georgia's (UGA) Student Judiciary has recently
- sentenced a student to two quarters suspension for e-mailing Athena's
- /etc/passwd file to an unauthorized user who wanted to break into the
- system. Intense debate ensued when the following post was made to
- eff.talk:
-
- >The University will soon be issuing a news release about this incident.
- >In the meantime, here is a summary:
-
- >(1) A number of unauthorized users have been using various University
- >of Georgia computers. Most of them have left much more of a trail than
- >they realized and will be hearing from us.
-
- >(2) The first person actually caught as part of this incident has now
- >been sentenced to 2 quarters' suspension, plus a probated expulsion,
- >by the Student Judiciary. This was a U.Ga. student whose name cannot
- >be released due to confidentiality of educational records. What this
- >student did was mail a copy of /etc/passwd from athena.cs.uga.edu to a
- >"hacker" who had already penetrated another system, and who wanted to
- >use a password-guessing program to break into athena. The student was
- >fully aware that he was assisting in a break-in.
- > -- Michael Covington, sysadmin UGA
-
- Discussion was muddied considerably by confusion with other threads,
- and opinions were posted without factual basis. If one looks at the
- facts, one finds the student received surprisingly fair treatment from
- the University of Georgia, whether or not one agrees with the actual
- sentence.
-
- Upon investigating an intrusion into one of the AI Lab's machines, the
- sysadmin for the AI lab found that the intruder had saved, on disk, a
- copy of Athena's /etc/passwd file with an email header indicating it
- had come from the student in question's account on Athena. Assuming at
- first that either the e-mail header was bogus, or that the student's
- account had also been hacked, the Athena sysadmins deactivated the
- account. Notice that this was a file saved under an unauthorized
- username; no e-mail was ever intercepted.
-
- Upon further investigation, the student admitted to being the
- owner/sender of this e-mail message. He also apparently admitted to
- being a member of an "elite group of hackers/phreakers," and knowing
- that the /etc/passwd file would be used to try to crack Athena.
-
- When the matter came before them, UGA officials felt the needs of the
- student would be better served if he/she was brought before the
- Student Judiciary instead of filing criminal charges. The only
- punishments the Student Judiciary can hand out are expulsion,
- suspension, and community service; all proceedings are kept
- confidential as required by federal law.
-
- According to UGA Student Judiciary policy, a student can choose either
- an administrative hearing, or a student court hearing before three
- specially trained students. In either case, the student is assisted by
- a trained defender (also a student) and has the right to have other
- people present for his defense. The hearing is supervised by UGA's
- staff of Judicial Programs and follow the same rules of evidence and
- procedure as a courtroom trial. If convicted, the student can appeal
- to the Vice President and to the President (which this student has
- done).
-
- Despite protests from a few netters about the sentence the student
- received, it is clear that the student court carefully considered the
- intent and personality of the student when handing down the sentence
- -- a consideration not taken in too many hacker cases. Officials felt
- that two quarters suspension would effectively remove the student from
- the influence of the hackers/phreakers and realign his priorities.
- Community service involving computers was not chosen for the express
- reason of not encouraging hacking to prove ability.
-
- While some netters may disagree with the sentence handed down, they
- should agree that this case was fairly and thoroughly handled by UGA
- officials. Their measured deliberation of all the issues involved
- should be used as an example in this era of hacker hysteria.
-
- EFFector Online will keep you posted as the case progresses...
- Portions of postings by Michael Covington, sysadmin of one of the UGA
- machines involved, are reproduced by permission.
-
- -==--==--==-<>-==--==--==-
-
- Letters From The Sun
-
- From: mib@gnu.ai.mit.edu (Michael I Bushnell)
- To: editors@eff.org
- Subject: Free software and electronic freedom
-
- There is a convergence of interests between advocates of free software
- and the EFF, which I think bears some examination. I think we can
- "assist" the government, the police, the media, and the courts by
- stressing that what is happening to computers is by no means new. I do
- not believe that education (though it will help) can solve our problem.
- The people from AT&T who assign $50,000 price tags to login.c and claim
- millions of dollars of damage done by Riggs, Darden, and Grant are
- completely aware of the real nature of what was done. The same is
- certainly true of Apple's claim that irrevocable damage was done by the
- distribution of NuPrometheus. We can end, through education, damage to
- people like Steve Jackson wrought by overzealous police. But the damage
- done by the false claims of knowledgeable people seeking money and
- victims will not be ended solely be education.
-
- The possiblility of perjury suits should be considered, of course, but
- that is not the only way to end the problem. The computer shares with
- certain other inventions several important characteristics: it is cheaper
- than older alternatives; it is faster; and it offers new ways of thinking
- about the world. The most obvious invention in the past with these
- characteristics is the movable-type printing press. Suddenly books could
- be published by only a few people, rather than requiring laborious
- copying. Printing presses were cheaper than the hundreds of copyists
- previously required. And, perhaps most importantly, the availability of
- books encouraged people to see the world as somewhat smaller, as
- information could suddenly be transmitted more quickly.
-
- Gutenberg's first book was the Bible, published in German translation,
- and the Church reacted vehemently to this new "problem". Its monopoly on
- Biblical interpretation suddenly ended, and the Church quickly realized
- that something "needed" to be done. The index of prohibited books became
- its most effective tool. Those who assisted in the production of
- unauthorized books (rulers who refused to arrest recalcitrant printers,
- for example) would be in turn vilified or even excommunicated.
-
- Even today, in many countries, access to the printed word is difficult
- and managed by the state. Those we are fighting must be more visibly
- compared with past opponents to free speech. We must be more vocal in
- admitting and even pointing out that, yes, the computer is powerful and
- dangerous, and in precisely the same ways cheap printing is powerful and
- dangerous. We do not believe, in this country, that access to printing
- presses should be carefully managed and regulated by the government to
- ensure the safe use of this power. Instead, thanks to the wisdom of
- Voltaire, and his ultimate victory over Rousseau, we recognize that the
- solution to the printing of falsehood is the printing of truth. We must
- encourage the same attitude in the public towards computers: that
- computers, and associated networks, must be encouraged to grow without
- regulation and forced record-keeping. Yes, computers are dangerous. But
- they are only dangerous to those who hide in shadows and plot power in
- the dark of night, for they are tools for light if available to all.
-
- -==--==--==-<>-==--==--==-
-
- "I'm hosed." -- Steve Jobs, after his NeXT machine froze up during a
- demonstration to 500 people at Lotus last year.
-
- -==--==--==-<>-==--==--==-
-
- MEMBERSHIP IN THE ELECTRONIC FRONTIER FOUNDATION
-
- If you support the goals and work of EFF, you can show that support by
- becoming a member now. Members receive our quarterly newsletter,
- EFFECTOR, our bi-weekly electronic newsletter, EFFector Online (if you
- have an electronic address that can be reached through the Net), and
- special releases and other notices on our activities. But because we
- believe that support should be freely given, you can receive these things
- even if you do not elect to become a member.
-
- Your membership/donation is fully tax deductible.
-
- Our memberships are $20.00 per year for students, $40.00 per year for
- regular members. You may, of course, donate more if you wish.
-
-
- >>>---------------- EFF@eff.org MEMBERSHIP FORM ---------------<<<
-
- Mail to: The Electronic Frontier Foundation, Inc.
- Online Office Nine
- 155 Second St.
- Cambridge,MA 02141
-
- I wish to become a member of the EFF I enclose:$__________
- $20.00 (student or low income membership)
- $40.00 (regular membership)
-
- [ ] I enclose an additional donation of $___________
-
- Name:______________________________________________________
-
- Organization:______________________________________________
-
- Address: __________________________________________________
-
- Town: _____________________________________________________
-
- State:_______Zip:________Phone:( )_____________(optional)
-
- FAX:( )____________________(optional)
-
- Email address: ______________________________
-
- I enclose a check [ ].
- Please charge my membership in the amount of $_____________
- to my Mastercard [ ] Visa [ ] American Express [ ]
-
- Number:____________________________________________________
-
- Expiration date: ____________
-
- Signature: ________________________________________________
-
- Date:______________________
-
- I hereby grant permission to the EFF to share my name with
- other non-profit groups from time to time as it deems
- appropriate [ ].
- Initials:___________________________
-
- **OUR PRIVACY POLICY: The Electronic Frontier Foundation will never,
- under any circumstances, sell any part of its membership list. We will,
- >from time to time, share this list with other non-profit organizations
- whose work we determine to be in line with our goals. But with us, member
- privacy is the default. This means that you must actively grant us
- permission to share your name with other groups. If you do not grant
- explicit permission, we assume that you do not wish your membership
- disclosed to any group for any reason.**
-
- The EFF is a non-profit, 501c3 organization.
- Donations to the EFF are tax-deductible.
- ******************************************************************
-
-
-
-
-
-