home *** CD-ROM | disk | FTP | other *** search
-
-
- ****************************************************************************
- >C O M P U T E R U N D E R G R O U N D<
- >D I G E S T<
- *** Volume 3, Issue #3.04 (January 28, 1991) **
- ****************************************************************************
-
- MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet)
- ARCHIVISTS: Bob Krause / Alex Smith / Bob Kusumoto
- RESIDENT SYSTEM CRASH VICTIM:: Brendan Kehoe
-
- USENET readers can currently receive CuD as alt.society.cu-digest. Back
- issues are also available on Compuserve (in: DL0 of the IBMBBS sig),
- PC-EXEC BBS (414-789-4210), and at 1:100/345 for those on FIDOnet.
- Anonymous ftp sites: (1) ftp.cs.widener.edu (2) cudarch@chsun1.uchicago.edu
- E-mail server: archive-server@chsun1.uchicago.edu.
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted as long as the source is
- cited. Some authors, however, do copyright their material, and those
- authors should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles relating to
- the Computer Underground. Articles are preferred to short responses.
- Please avoid quoting previous posts unless absolutely necessary.
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
- DISCLAIMER: The views represented herein do not necessarily represent the
- views of the moderators. Contributors assume all responsibility
- for assuring that articles submitted do not violate copyright
- protections.
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- CONTENTS THIS ISSUE:
- File 1: Moderators' Corner
- File 2: From the Mailbag
- File 3: BMUG's ECPA Commentary (reprinted with permission from BMUG
- File 4: The CU in the News
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- ----------------------------------------------------------------------
-
- ********************************************************************
- *** CuD #3.04, File 1 of 4: Moderator's corner ***
- ********************************************************************
-
- From: Moderators
- Subject: Moderators' Corner
- Date: January 28, 1991
-
- ++++++++++
- In this file:
- 1. LEN ROSE UPDATE
- 2. FIRST CONFERENCE ON COMPUTERS, FREEDOM AND PRIVACY
- 3. FTP INFO AND WIDENER CRASH
- ++++++++++
-
- +++++++++++++++++++
- Len Rose Update
- +++++++++++++++++++
-
- Len Rose's trial, originally scheduled for January 28, has been pushed back to
- April 1 because of a superceding indictment related to the same facts. Len is
- currently represented by Catterton, Kemp, and Mason of Rockville, Md.
- The EFF's amicus brief in the case is available from the CuD archives or
- directly from EFF.
-
- +++++++++++++++++++++++
- First Conference on Computers, Freedom and Privacy
- +++++++++++++++++++++++++
-
- Don't forget The First Conference On Computers, Freedom and Privacy coming
- up on March 25-28. The conference will be held at the Airport SFO Marriott
- Hotel in Burlingame (that's the San Francisco Airport about 15 minutes
- south of the city for out-of-towners). All are invited, but participation
- is limited to the first 600 registering. For more information, contact
- JWARREN@WELL.SF.CA.US or WELL!JWARREN@APPLE.COM
-
- ++++++++++++++++++++++++++++++
- FTP Info and Widener Crash
- +++++++++++++++++++++++++++++++
-
- The Widener ftp site is experiencing some problems and is down for awhile.
- But, the others are currently working. Back issues of cuds on Compuserve
- are in: DL0 of the IBMBBS sig. Added to the archives: A dozen more state
- computer statutes, NIA #69 (which came out last month), Phantasy #4, and a
- few other things. An anonymous contributor also deposited about a dozen or
- more university computer policies/regulations in the "legal" directory
- which are well worth reading. Thanks to the donor! Brian Peretti also send
- over his "Computer Publication and the First Amendment," which we also
- recommend.
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- From: Assorted
- Subject: From the Mailbag
- Date: January 29, 1990
-
- ********************************************************************
- *** CuD #3.04, File 2 of 4: From the Mailbag ***
- ********************************************************************
-
- Subject: New address for ATI.
- From: Ground Zero <gzero@TRONSBOX.XEI.COM>
- Date: Tue, 22 Jan 91 18:07:55 EST
-
- Dear ATI Readers:
-
- Hello!! Those of you who attempted to send mail to us may have noticed
- that it bounced back or didn't make it here. Due to some changes in our
- home site, ATI now has a new address. Our new address is:
-
- gzero@tronsbox.xei.com
-
- As always, do send all correspondence to the above address and NOT the
- address this message is comeing from (the one beginning with "zero-list").
-
- Due to changes in our home site, the release of ATI54 has been delayed.
- However, we're working on it, and you should expect to see ATI54
- within a few days.
- See ya then!
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- From: Nigel Allen <chinacat!uunet!contact!ndallen@CS.UTEXAS.EDU>
- Subject: Algorithm: A Newsletter for People Who Enjoy Programming
- Date: Thu, 24 Jan 91 04:23 EST
-
- Algorithm: A Newsletter for People Who Enjoy Programming
-
- For one year now, A.K. Dewdney (author of Scientific American's popular
- Computer Recreations column) has been publishing a newsletter (or is it a
- magazine?) called Algorithm. Appearing bi-monthly, Algorithm features a
- wide range of topics in each issue, mostly centered around fascinating
- programming projects of the kind we used to see in Computer Recreations.
- Besides Dewdney, Clifford Pickover (JBM's graphic genius), Michael Ecker
- (formerly of Creative Computing) and Dennis Shasta (creator of the Dr. Ecco
- puzzles) also write columns for Algorithm. Each issue features Algoletters
- from vendors with projects and ideas to share, the four programming columns
- just mentioned, stimulating articles and reviews of weird and wonderful
- programs written by individuals and small companies.
-
- The basic vehicle of Algorithm is algorithms. By specifying program ideas
- in pseudocode, the publication makes them available in a
- language-independent form. The emphasis in mainly recreational and (dare I
- say it?) educational. Topics range from fractals and chaos to cellular
- automata, scientific simulation and computer games. The scope is wide open
- and engaging.
-
- Anyone wishing a free inspection copy of Algorithm should drop a line to
- Algorithm, P.O. Box 29237, Westmount Postal Outlet, 785 Wonderland Road,
- London, Ontario, CANADA N6K 1M6. Alternatively, they can send me e-mail
- (ndallen@contact.uucp) or reply to this message, and I'll forward the
- request to Algorithm.
-
- +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- From: sjackson@TIC.COM(Steve Jackson)
- Subject: More on What to Say when the Warrant Comes
- Date: Sun, 2 Dec 90 12:54:28 cst
-
- (1) Regarding "Don't Talk To The Police" in CuD 2.14: I question the
- statement that
-
- >He cannot legally place you under arrest or enter your home without a
- >warrant signed by a judge. If he indicates that he has such a warrant,
- >ask to see it. A person under arrest, or located on premises to be
- >searched, generally must be shown a warrant if he requests it and must be
- >given a chance to read it.
-
- It is important to be VERY POLITE AND CAREFUL when refusing to cooperate
- with police, unless you are locally powerful and have lots of witnesses.
- And even then, politeness and care are worthwhile. Your "rights" can
- evaporate instantly if you antagonize an officer, especially if there are
- no disinterested witnesses. Your friends and family are not disinterested
- enough to worry a hostile officer; he may arrest them, too.
-
- Regarding "place you under arrest" - If, in the process of refusing entry
- to a police officer, you demonstrate a "bad attitude," the officer may be
- motivated to FIND a reason to arrest you. Any display of a weapon, any
- possibly-illegal item or situation visible from where the officer stands,
- any threat against the officer's person, or (depending on local law) any
- behavior the officer can characterize as indicative of drunkenness or drug
- use . . . BANG, you're under arrest. And, in some situations, the officers
- can now search your home because they arrested you. If, for instance, they
- observed an illegal weapon, they can now reasonably suspect that there are
- more. In the process of searching for more weapons, they will naturally
- keep their eyes open for the original object of the search.
-
- Regarding "signed warrant" - The general lay public believes, as I did
- before March 1, that no search may be conducted if the police cannot show
- you a signed search warrant. But *this does not appear to be true.* When my
- office was invaded, the agents did *not* show a signed search warrant; they
- showed a photocopy with many spaces, including the space for a judge's
- signature, STILL BLANK.
-
- Nevertheless, no resistance was made to their search. And it seems that
- this is just as well. Later that day, when I asked my attorney what would
- have happened if we had objected to the lack of a signature, I was told
- "Everybody who resisted the search would have been handcuffed and taken
- downtown for obstructing officers in the performance of their duties."
-
- It appears - and I have been trying, to no avail, to get an authoritative
- statement on this - that if officers HAVE a signed search warrant - or if
- they believe that a judge has signed a copy of their warrant, even if they
- themselves don't have a signed copy - then they can conduct a legal search.
- In the latter case, they obviously can't show a signed warrant; they don't
- have one!
-
- My point is that the common belief that "they have to show you a SIGNED
- warrant" may be a misconception that can get a citizen into serious trouble.
- We really need to get an authoritative clarification on this.
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- From: "Ofer Inbar" <cos@CHAOS.CS.BRANDEIS.EDU>
- Date: Wed, 23 Jan 91 13:02:55 est
- Subject: Discussion of Dark Adept's articles (con't)
-
- In CuD #3.03, file 2, David Daniel wrote a critique of Dark Adept's latest
- essay. Although much of David's essay was well thought out, there are
- points which I think he should reconsider.
-
- >manufacture and/or market it. Mr. Adept expressed his belief that a user
- >interface was generic. I'm sure we could find many hard working programmers
- >who would heartily disagree as well as corporate executives who have
- >overseen the expenditure of many thousands or man-hours and dollars in the
- >development of a unique software product. Don't they deserve a return on
- >their investment? Mr. Adept denies the existence of license agreements when
-
- It's quite likely that the interface had already been developed by someone
- else. If it were not protected by some other company's legal department,
- the corporation in question would never have had to spend thousands of
- dollars on developing it in the first place.
-
- If everyone has to spend money reinventing the wheel, it's only fair to
- entitle them to some return on their investment. But wouldn't it be nice
- if the wheel was free to begin with?
-
- If someone comes up with some interface that is truly new, they deserve
- some protection for a limited time. If their invention is really
- wonderful, they will get back far more than they spent. This is in fact
- the reasoning behind patents. However, patents have a life of seven years
- (I think), which in most markets is a limited time but in the computer
- world translates to eternity, since anything new is bound to be obsolete
- long before seven years are over.
-
- >their investment? Mr. Adept denies the existence of license agreements when
- >he asserts that an inefficient company can tie up a good interface by tying
- >it to a bad program. He also denies the idea of a joint marketing venture
- >by two or more companies which combine their strongest products.
-
- Mr. Adept does not deny the existence of these possibilities. Nor, in
- fact, does he deny the possiblity of the developer putting it's interface
- in the public domain. His complaint was about giving the developer the
- power to tie things up. Not every company has such enlightened attitudes.
- Some, like Adobe, choose to charge exorbitant license fees; PostScript
- could have been a unifying standard, but instead we are now seeing a
- rebellion against Adobe which will result in several standards confusing
- everyone. Others, like Lotus, choose not to allow anyone to use their
- interface, and sue everyone who tries. Others, like Apple, appropriate
- someone else's interface, and then take the same attitude as Lotus does.
-
- >Mr. Adept wrote about the danger of protecting algorithms since they are
- >merely mathematical models. Should we consider DOS and BIOS in the same
- >category? Should these proprietary packages be freely circulated without
- >compensation? It might be an attractive utopian concept but not workable
- >within our present system.
-
- Why is it not workable? DOS and BIOS are far from just algorithms. On the
- other hand, shell sort is a clever algorithm, and I'm certainly glad
- someone didn't try to patent it and charge license fees from every
- programmer who used it. Remember the scare when it seemed Unisys was going
- to enforce their perceived rights to LZW compression? Would it be good if
- Unisys had the right to outright prohibit a programmer from using LZW
- compression without prior written permission from them?
-
- +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++=
-
-
- Subject: Dark Adept's Response to posts
- From: Dark Adept <deleted@thenets.edu>
- Date: Tue, 22 Jan 91 23:57:25 CST
-
- First, I would like to thank everyone who had a comment, criticism, or
- suggestion about my previous articles. I take all such comments to heart,
- and try to improve my thinking and writing processes with them.
-
- Second, I feel some of the criticisms have been my fault. I will try to
- briefly clear these areas up:
-
- 1) When refering to IBM's "release" of their operating system, I was
- talking about BIOS, not DOS. DOS is, of course, the property of Microsoft
- and/or IBM depending on whether it is MS or PC. I apologize for this
- misunderstanding. BIOS is IBM's own product. I did not mean to
- misrepresent anyone.
-
- 2) My use of the masculine pronouns is intended to be generic. This usage
- comes from how I was taught English. I stand by it. I have yet to see an
- English grammar manual that states this is an incorrect usage. I try to
- write in standard formal English, and this is how I was taught.
-
- 3) "his [first] wife's maiden name" is actually a line from the Hacker's
- Anthem by the Cheshire Catalyst. It was meant as an inside joke. Still, I
- have not met a female system operator -- yet. I hold no malice toward any
- women in the computer field, and I apologize.
-
- 4) I thank David Daniel for representing the corporate voice re patents and
- copyrights. However, I never stated DOS and BIOS were algorithms and
- should be free. Yet the way they interface programs should be in the public
- domain (DoubleDos and 4DOS come to mind?). Also, certainly, proprietary
- source and object code should be protected. I was attempting to say the
- output generated (i.e., the interface) and the algorithm that creates it
- should not be protected. I do not know whether this changes his position
- or not, but I feel that my position should be clear.
-
- Again, thank all of you for your comments and articles that have responded
- to mine. The more opinions all of us receive, the more all of us can
- learn. This was my goal, and it appears that I have succeeded.
-
- The Dark Adept
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- From: Reprint from BMUG (Berkeley MacIntosh Users' Group)
- Subject: BMUG's ECPA Commentary (reprinted with permission from BMUG
- Date: January, 1991
-
- ********************************************************************
- *** CuD #3.04, File 3 of 4: The Politics of the ECPA of 1986 ***
- ********************************************************************
-
- The Politics of the Electronic Communications Privacy Act of 1986
-
- Copyright (C) 1990, Bernard Aboba. All rights reserved.
-
- The Electronic Communications Privacy Act (ECPA) of 1986 was a landmark
- piece of legislation which is likely to affect online services and hobbyist
- bulletin boards for many years to come. Since the ECPA is a complex and
- often arcane piece of legislation, it is very hard to understand without
- looking at the history of how it came to be. In understanding the
- politics of ECPA, this article relies heavily on the transcripts of the
- House Judiciary Committee Hearings on H.R. 3378, which eventually became
- the Electronic Communications Privacy Act.
-
- During the hearings on ECPA in 1985-86 only one member of the online
- service industry, The Source (subsequently acquired by Compuserve)
- submitted an opinion. Though endorsing the bill, the assessment hinted
- at possible long term costs imposed by the lack of preemption of state
- standards. However, this one page assessment hardly made an impression on
- the hearings compared with the impressive lineup of spokesmen from the
- ACLU, cellular communications firms, Regional Bell Operating Companies
- (RBOC's), broadcasting groups, credit and banking firms, and computer and
- telecommunications industry associations, all lined up in support of the
- bill.
-
- Only the U.S. Department of Justice, manufacturers of scanning equipment,
- and amateur radio associations expressed strong reservations about the
- bill. However, since the passage of ECPA, the long term costs of the
- legislation and its effects on commercial and hobbyist conferencing systems
- have become apparent. Ironically, none of these effects were anticipated
- at the hearings.
-
- Outline of ECPA
-
- Broadened Protection of Communications
-
- The ECPA amended the Omnibus Crime Control and Safe Streets Act of 1968
- (which covered wire tapping of common carriers) to prohibit monitoring of
- all electronic communications systems not designed to be accessible by the
- public. This includes voice, data, and video on non-public systems, and
- applies to communications regardless of the mode of transmission.
-
- Search and Seizure
-
- To obtain access to communications such as electronic mail, the government
- is required to obtain a warrant on probable cause. Law enforcement must
- also obtain a court order based on reasonable suspicion before obtaining
- toll records of telephone calls.or gaining access to records of an
- electronic communications system which concern specific communications.
-
- Criminal Penalties
-
- Criminal penalties can result from unauthorized access to computers if
- messages are obtained or altered. Felony charges can be brought if the
- violation was commited maliciously or for commercial gain, in which case
- the act is punishable by up to one year imprisonment and a $250,000 fine.
- In other cases, a term of imprisonment of six months and a maximum fine of
- $5,000 is applicable.
-
- Civil Penalties
-
- Civil damages may be pursued for violation of the rights contained in the
- act.
-
- Disclosure
-
- Electronic communications systems operators may not disclose electronic
- messages without authorization except in special circumstances. The
- Politics of ECPA
-
- The ECPA was supported by the cellular phone, telephone, packet switching,
- paging, and broadcasting industries; private firms owning large
- communications networks, miscellaneous computer and communications trade
- associations, the ACLU and Consumer's Union, and credit bureaus. Law
- enforcement agencies were supportive, but skeptical. The only vigorous
- opposition came from amateur radio associations, and manufacturers of
- scanning equipment which, while protesting loudly, saw few of their
- recommended modifications enacted into law.
-
- Also playing a role were sponsoring legislators, such as Senator Patrick
- Leahy of Vermont, and Charles Mathias of Maryland, as well as
- Representatives Robert Kastenmeier and Carlos Moorhead. Senator Leahy, in
- his opening remarks at the hearings on the bill, set the stage for the
- legislation:
-
- "At this moment phones are ringing, and when they are answered, the message
- that comes out is a stream of sounds denoting ones and zeros.... What is
- remarkable is the fact that none of these transmissions are protected from
- illegal wiretaps, because our primary law, passed back in 1968, failed to
- cover data communications, of which computer to computer transmission are a
- good example. When Congress enacted that law,Title III of the Omnibus
- Crime Control and Safe Streets Act of 1968, it had in mind a particular
- kind of communication - voice - and a particular way of transmitting that
- communication - via a common carrier analog telephone network. Congress
- chose to cover only the "aural acquisition" of the contents of a common
- carrier wire communication. The Supreme Court has interpreted that
- language to mean that to be covered by Title III, a communication must be
- capable of being overheard. The statue simply fails to cover the
- unauthorized interception of data transmissions." Senator Leahy also had
- more practical reasons for supporting the bill. The rapidly growing U.S.
- cellular communications industry had become alarmed by the ease with which
- cellular communications could be monitored. Television sets built during
- the period 1966-1982 were capable of picking up cellular conversations on
- UHF channels 80-83. This was possible because cellular communications used
- the same frequency modulation techniques utilized in transmitting
- television sound. In addition, scanning equipment which for several
- hundred dollars was capable of receiving cellular communications in the 800
- Mhz band. During 1985, several incidents threatened to make the
- vulnerability of cellular communications into front page news. For
- example, private conversations of state legislators in Austin were
- intercepted and made available in the public press, with embarrassing
- consequences.
-
- This ease of reception threatened the viability of the cellular industry.
- In response, according to Richard Colgan of the Association of North
- American Radio Clubs, "cellular firms resorted to pervasive
- misrepresentation of the actual interception vulnerability of cellular. "
- In fairness to the cellular industry, cellular communications does provide
- certain inherent protections against interception. For example, since each
- half of the conversation is transmitted on different frequencies, usually
- it is only possible to listen in on one side of a conversation. In
- addition, while it is easy to pick up some conversation, it is difficult to
- pick up a particular conversation of interest. Also, the frequencies will
- shift during passage from one cell to another. However, given the
- relatively large cell size, frequencies are likely to be stable over the
- average life of a call. In his remarks, Senator Leahy stated that the
- ECPA was needed to help the cellular industry get off the ground, and that
- the American people and American business wanted the ECPA. A more
- emotional defense was made by John Stanton, Executive VP of McCaw
- Communications, who stated "The inhibition of the growth of cellular
- technology and paging technology, forced by the lack of privacy, is
- unfair."
-
- Law enforcement interests and businesses were also in favor of the bill.
- In 1986, the nation was just becoming aware of the threat posed by computer
- crime, and the need for laws allowing prosecution of perpetrators. The
- ECPA was therefore viewed by elements of law enforcement and business as a
- vehicle for criminalizing the act of breaking into computers. Businesses
- such as GTE Telenet, EDS, and Chase Manhattan thus supported the ECPA as a
- computer crime bill. Telephone companies such as AT&T even attempted to
- tack on additional computer crime provisions covering breaking into to
- their switching equipment.
-
- In retrospect, the preoccupation with computer crime distorted evaluations
- of the ECPA. Computer crime was more effectively addressed by state penal
- code revisions such as California Penal Code Section 502 - Computer Crime,
- and Section 499c - Trade Secrets. The purpose of ECPA was to insure
- privacy rather than to define the criminal uses of computers.
-
- The cellular industry had no such illusions. Mr. Philip Quigley, CEO of
- pacTel Mobil Co. described the economic benefits of ECPA by noting that
- without legislation, "defending the right (to privacy) could take years of
- litigation." "Individuals can use scanning devices today... (it is our
- intent) to merely excise out... the capability that exists today to zone in
- on the channels and the frequencies that are associated with cellular
- telephony." Without the ECPA, the industry would have faced incorporation
- of expensive encryption technology into their systems. For example, John
- Stanton of McCaw testified that "Encryption devices make it difficult to
- roam from system to system," generated scratchy sound, and required 30%
- more investment for the base unit, and 100% for the phone. Mr. Colgan's
- estimated high grade commercial encryption as costing $40 for the
- encryption chip (quantity one), plus associated circuitry . In either
- case, the net cost for several million subscribers was estimated in the
- tens if not hundreds of millions of dollars.
-
- Industry associations such as ADAPSO pointed out the trade benefits of the
- legislation, since Asia had not developed privacy protection, although
- Europe had done so. John Stanton of McCaw commented that if the U.S.
- passed the ECPA, then it would enjoy superior communications privacy to
- that available in Europe.
-
- Representatives of the nation's amateur radio enthusiasts were among the
- staunchest opponents of the bill. Richard Colgan of the Association of
- North American Radio Clubs represented their position. "While we have no
- animosity towards cellular, we cannot sit idly by while they use their
- influence to make dubious changes in public policy, largely to benefit
- their bottom lines..." In response to the concerns of amateur radio
- enthusiasts, and scanner manufacturers, the interception standard was
- changed from "willful" to "intentional," so as to allow for "inadvertent"
- interceptions.
-
- Manufacturers of scanning equipment were vigorously opposed to ECPA since
- the use of their devices was restricted by the act. Richard Brown of
- Regency Electronics, a manufacturer of radio band scanners, argued
- cellular radio licensees have never had any expectation of privacy, that
- cellular operators, not the public, should bear the burden of securing
- cellular communications, and that protecting specific radio frequencies was
- imprudent.
-
- This last point deserves elaboration. Under ECPA, monitoring of cordless
- phone frequencies is not prohibited, although it is hard to argue that the
- average individual's "expectation of privacy" is any different for a
- cordless phone than it would be for a cellular phone. In fact, an
- educated individual might even expect less privacy for a cellular call,
- argued Richard Colgan, because the range of cellular communications is so
- much larger than for cordless phones, thus making interception easier.
-
- Among the most careful analyst of the ECPA was the U.S. Department of
- Justice, as represented by James Knapp, deputy assistant attorney general
- of the criminal division. Knapp concurred with the Amateur Radio
- enthusiasts that cellular and cordless phone technology, as well as tone
- and voice pagers, were easily intercepted, and therefore could not presume
- an "expectation of privacy." Knapp also expressed skepticism about the
- wisdom of criminalizing hobbyist behavior. Knapp was however in favor of
- extending coverage to electronic mail. Finally, he argued for extension of
- the crimes for which wire tapping could be authorized, beyond those
- enumerated in Title III. This suggested modification to the act was
- subsequently incorporated.
-
- In contrast to the detailed arguments submitted by the parties discussed
- above, the one page letter submitted by The Source had a minor impact at
- best, suggesting that the ECPA, by not preempting state statutes, could
- expose the online service industry to an entangling web of federal and
- state statutes.
-
- Analysis of the Economic Effects of ECPA
-
- The parts of ECPA which have ramifications for online services and hobbyist
- bulletin boards mostly have to do with access to stored messages. While
- access to services are often offered via a packet switching network, or
- could even be achieved via use of cellular modems or other radio
- transmissions, worries about the privacy of such access are not likely to
- be major concerns of customers.
-
- An important aspect of ECPA is the presence of both criminal and civil
- penalties. This provides an important incentive for aggrieved parties to
- pursue litigation through contingency fee arrangements. The implications
- of this for the online service business are serious. For example, the fee
- for sending an EasyPlex message on Compuserve is on the order of a few
- dollars, depending on the time spent in composing the message. For that
- fee, Compuserve takes on the responsibility of not disclosing the message,
- which could conceivably be worth millions to the sender and intended
- recipient.
-
-
- Firms Submitting Opinions on H.R. 3378
-
-
- Phone Companies
-
- Southwestern Bell
- AT&T
- Ameritech
- Pacific Telesis
- Bell South
- Northwestern Bell
- United States
- Telephone Assoc.
-
- Radio
-
- Association of North American Radio Clubs
- American Radio Relay League
- National Association of Business & Educational Radio
-
- Cellular
-
- PacTel Mobile
- McCaw Communications
- Motorola
- Centel
-
- Hobbyists
-
-
- Communications
-
- Packet Switching
-
- GTE Telenet
-
- Misc. Associations
-
- Electronic Mail Association
- ADAPSO
- National Assoc. of Manufacturers
- Assoc. of American Railroads
- IEEE
-
- Paging
-
- Telocator Network
-
- Computers
-
- Tandy
-
- Law Enforcement
-
- U.S. Dept. of Justice
-
- Online Services
-
- The Source
-
- Citizen's Groups
-
- ACLU
- Consumer's Union
-
-
- Firms with Private Networks
-
- Chase Manhattan
- EDS
-
- Scanner Manufacturers
-
- Dynascan
- Regency Electronics
- Uniden
-
- Credit Bureaus
-
- American Credit Services
-
- Broadcasters
-
- National Assoc. of Broadcasters
- Radio-TV News Directors Association
- Satellite TV Industry Association
- CBS
-
-
- Source: Hearings, Committee on the Judiciary, House of
- Representatives, H.R. 3378, ECPA, 99th Congress, No. 50, 1986.
-
- Of course, this burden is not theirs alone. Operators of corporate
- communications systems (who were big supporters of ECPA) are also
- likely targets. Indeed, several ECPA suits against employers and
- municipalities have recently been filed. The potential for
- litigation also exists for hobbyist systems such as computer
- bulletin boards.
-
- Government regulations fit into two categories: economic
- regulation, and social regulation. In the economic category are
- price controls on crude oil, and tarriffs. Equal opportunity
- legislation is a regulation of the social type. The cost of a
- social regulation can be broken down into two parts. One is the
- cost of complying with the regulation, either by modification of
- business practices, or payment of imposed penalties; another is
- the cost of resolving ambiguities in the legislation through
- establishment of case law. In the case of ECPA, reflection
- discloses that the establishment of precedent is likely to be the
- more expensive than compliance. For example, for a service to
- modify sysop access privileges, and to introduce encryption of
- private mail and passwords would probably entail an expenditure on
- the order of a few million dollars for software development and
- testing. In contrast, were only 0.01% of Compuserve's
- subscribers to file an ECPA lawsuit, given 500,000 subscribers, and
- average legal fees and penalties per case of $100,000, the bill
- would come to over $10 million.
-
- Due to its concentration on cellular industry concerns, the ECPA
- concentrates more on insuring privacy for users than on limiting
- the responsibilities of providers. Due to differences between
- messages in transit and stored messages, cellular firms end up
- forcing the costs of privacy onto hobbyists and outsiders, while
- providers of online services are forced to bear these costs
- themselves. In view of the potentially horrendous litigation
- burdens, there is a strong incentive to limit the ability of
- system administrators to read or disclose private mail.
-
- The key to complying with the act is the notion of "expectations of
- privacy." This notion governs both the legal aspects of ECPA, and
- determinants of end user satisfaction. Under the ECPA, privacy is
- only enforced for systems in which users were lead to "expect
- privacy." Thus a sysop has two alternatives: to explicitly address
- those expectations via an education campaign, or to play a game
- similar to the cellular industry, in denying that privacy is a
- significant issue. One of the concerns voiced by the cellular
- industry in backing ECPA was that their budding industry could ill
- afford the cost of solidifying the right to privacy via litigation
- or adoption of encryption technology. Yet that is precisely the
- course that the ECPA has forced on the online service industry.
- Nor were the concerns of a budding industry entirely genuine.
- Within the next two years, the revenues of cellular communication
- firms will exceed those of all the participants in the information
- services industry.
-
- Bibliography
-
- 1. Electronic Communications Privacy Act of 1986, Public Law
- 99-508, 99th Congress, 2nd session.
-
- 2. Hearings of the Committee on the Judiciary, House of
- Representatives, H.R. 3378, Electronic Communications Privacy Act,
- 99th Congress, No. 50, 1986.
-
- 3. California Penal Code, Section 502, Computer Crime, 502.7
- Obtaining telephone or telegraph services by fraud, 499c, trade
- secrets.
-
- 4. Wallace, Jonathan, and Lance Rose, SYSLAW, L.L.M Press, New
- York City, 1990
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- From: Various
- Subject: The CU in the News
- Date: January, 1991
-
- ********************************************************************
- *** CuD #3.04, File 4 of 4: The CU in the News ***
- ********************************************************************
-
- Subject: Lotus Drops Suit
- From: Anonymous
- Date: Sun, 24 Jan 91 01:21:00 EST
-
- From: New York Times, January 24, 1991, p. C3 (By Lawrence M. Fisher)
-
- SAN FRANCISCO, Jan. 23 - The Lotus Development Corporation and Equifax Inc.
- said today that they had canceled plans to sell a database of names,
- addresses and marketing information on 120 million United States consumers.
-
- The companies said their decision came after they had received 30,000 calls
- and letters from individuals wishing to have their names and personal
- information deleted from the database. The companies said they believed the
- public misunderstood the product and that the costs of addressing privacy
- concerns had made Marketplace:Households no longer viable.
-
- Lotus will also discontinue Market-lace:Business, a similar product with
- information on seven million United States businesses, which began shipment
- in October. Mr. Manzi said the business product was not viable without the
- revenues from the consumer version."
-
- +++++++++++++++++++++++++++++++++++++++++++++++++++
-
- From: cdp!mrotenberg@labrea.stanford.edu
- Subject: CPSR FOIA Suits Seeks Gov't Computer Policy
- Date: Sun, 13 Jan 91 19:20:35 PST
-
- PRESS RELEASE
- Release: Friday, 1/4/91
-
- CPSR Washington Office, 1025 Connecticut Ave., NW, Washington
- DC 20036
-
- For more information:
-
- David Sobel
- Marc Rotenberg 202/775-1588
-
- LAWSUIT SEEKS BUSH DIRECTIVE ON COMPUTER SECURITY
-
- WASHINGTON - Computer Professionals for Social Responsibility ("CPSR") filed
- a lawsuit in Federal District Court today to obtain a classified government
- directive on computer security.
-
- The document at issue was signed by President Bush on July 5, 1990. It is
- intended to replace a controversial security policy signed by President
- Reagan in 1984. The Reagan policy, designated "NSDD 145," put the
- super-secret National Security Agency ("NSA") in charge of computer
- security, raising concerns about government secrecy. Congress sought to
- limit NSA's role through passage of the Computer Security Act of 1987, which
- transferred responsibility for federal computer security to the National
- Institute for Standards and Technology, a civilian agency.
-
- The administration contends that the revised directive complies with the
- Computer Security Act, but so far has released to the public only an
- unclassified summary of the new directive. According to Marc Rotenberg,
- Director of CPSR's Washington Office, "Computer security policy should not
- be made behind closed doors or through the issuance of classified
- directives. At a time when computer technology touches every aspect of our
- lives, it is essential that the public be fully informed about our
- government's policy."
-
- CPSR first requested a copy of the revised directive from the Defense
- Department under the Freedom of Information Act last August. The
- organization also sought a copy from the National Security Council the
- following month. To date, neither agency has responded to CPSR's requests.
-
- The Freedom of Information Act provides a legal right for individuals to
- obtain records held by government agencies. According to CPSR Legal Counsel
- David Sobel, "Agencies are required to respond to requests within ten
- working days. When agencies fail to respond within a reasonable period of
- time, requesters often begin legal proceedings to obtain the information."
-
- CPSR is a national membership organization of computer scientists. Its
- membership includes a Nobel Laureate and four recipients of the Turing
- Award, the highest honor in computer science. CPSR has prepared reports and
- presented testimony on computer technology issues, including NSDD 145, at
- the request of Congressional committees.
-
- The case is CPSR v. National Security Council, et al., Civil Action No.
- 91-_____, U.S. District Court for the District of Columbia, January 4, 1991.
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- From: well!mercury@APPLE.COM(Michael Edward Marotta)
- Subject: Thoughts on the Bill of Rights
- Date: Tue, 22 Jan 91 21:52:34 pst
-
- GRID News. vol 2 nu 2. January 23, 1991.
- World GRID Association, P. O. Box 15061, Lansing, MI 48901 USA
- --------------------------------------------------------------------
- "The Bill of Rights" by Michael E. Marotta. (54 lines)
-
- When agents of the US Secret Service raided publishers in 1990 while chasing
- The Legion of Doom, they demonstrated that the paradigms of cyberspace are
- not well understood. Therefore, identifiers must be used to show that this
- activity is protected by the Bill of Rights.
-
- Copyright notices are one identifier. A copyright is earned whenever an
- idea achieves physical expression or "realization". Two copies of the
- publication (or two photographs of a work of art) are send to the Library of
- Congress along with a registration fee. Books, sound recordings, and films
- may be copyrighted. A copyright can be given to the mass production of a
- work in the public domain, such as the Bible. You could write out by hand
- an original poem, send two xeroxes to the Library of Congress (along with
- the registration fee) and earn a copyright on your work.
-
- When the United States joined the Berne Convention in December of 1988
- (effective March 1, 1989), life became easier --- perhaps too easy. By
- default, every realization is automatically copyrighted to the creator,
- whether or not copies are sent to the Library of Congress. A copyright
- notice on the login screen announces that the BBS contains works of
- non-fiction, fiction, art or other production that are protected by the
- First Amendment.
-
- The First Amendment also promises that the People have the right to
- PEACEABLY ASSEMBLE to seek redress of grievances against the government. A
- BBS is an assembly and can host assemblies. The Supreme Court has often and
- consistently shown that this right to peaceably assemble is also the right
- to association.
-
- Most BBSes support message bases. Discussions on religion are specially
- protected by the First Amendment.
-
- The Bill of Rights contains two purposely broad articles, the Ninth and
- Tenth. The Ninth Amendment says that there are more rights than the ones
- listed in the Bill of Rights. The Tenth Amendment limits the federal
- government to its enumerated powers and gives all other powers to the States
- (except where prohibited) or to the People (apparently without special
- reservation or stipulation). For instance, without stretching the meaning
- of "religion" or requiring that we photograph blackboards, it is strongly
- argued that there is a Right to Scientific Inquiry. This strongly
- assertable right protects experiments with encryption algorithms.
-
- There may be a Right to Travel. This would extend to the lawful use of
- communication systems to "visit" a computer, whether or not you actually
- "enter" the computer. (Internet syntax tolerates users who chat though not
- logged in.)
-
- To the extent that a computer is a weapon, its ownership is protected under
- the Second Amendment. Indeed, when Saddam Hussein's storm troopers rolled
- into Kuwait, "Hack Iraq" messages appeared on some systems.
-
- The Bill of Rights is your Best Friend. Sleep with it.
-
- ********************************************************************
-
- ------------------------------
-
- **END OF CuD #3.04**
- ********************************************************************
-
-