home *** CD-ROM | disk | FTP | other *** search
- @BEGIN_FILE_ID.DIZ
- ><-><-><-><-><-><-><-><-><-><
- Computer underground Digest
- Sun Oct 10, 1994
- Volume 6 : Issue 88
- ><-><-><-><-><-><-><-><-><-><
- @END_FILE_ID.DIZ
- Computer underground Digest Sun Oct 10, 1994 Volume 6 : Issue 88
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Archivist: Brendan Kehoe
- Retiring Shadow Archivist: Stanton McCandlish
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Urban Legend Editor: E. Greg Shrdlugold
-
- CONTENTS, #6.88 (Sun, Oct 10, 1994)
-
-
- File 1--EFF Statement on Passage of Digital Telephony Act
- File 2--The DT bill just passed in the Senate.
- File 3--EPIC on Wiretap Bill Passag
- File 4--Computer Freedom and Privacy-95 Conf info (corrected ver.)
- File 5--Cu Digest Header Information (unchanged since 10 Sept 1994)
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ----------------------------------------------------------------------
-
- Date: Sat, 8 Oct 1994 15:23:26 -0400 (EDT)
- From: Stanton McCandlish <mech@EFF.ORG>
- Subject: File 1--EFF Statement on Passage of Digital Telephony Act
-
- EFF Statement on and Analysis of Digital Telephony Act
- ------------------------------------------------------
-
- October 8, 1994
-
-
- Washington, DC - Congress late Friday (10/7) passed and sent to the President
- the Edwards/Leahy Digital Telephony Legislation (HR 4922/S 2375). The bill
- places functional design requirements on telecommunications carriers in
- order to enable law enforcement to continue to conduct electronic
- surveillance pursuant to a court order, though the bill does not expand law
- enforcement authority to conduct wiretaps. Moreover, the design
- requirements do not apply to providers or operators of online services such
- as the Internet, BBS's, Compuserve, and others. The bill also contains
- significant new privacy protections, including increased protection for
- online personal information, and requirements prohibiting the use of pen
- registers to track the physical location of individuals.
-
- Jerry Berman, EFF's Policy Director, said: "Although we remain unconvinced
- that this legislation is necessary, the bill draws a hard line around the
- Internet and other online networks. We have carved cyberspace out of this
- legislation".
-
- Berman added, "The fact that the Internet, BBS's, Prodigy, and other online
- networks are not required to meet the surveillance capability requirements
- is a significant victory for all users of this important communications
- medium."
-
-
- Privacy Protections for Online Personal Information Increased
- -------------------------------------------------------------
-
- The bill adds a higher standard for law enforcement access to online
- transactional information. For maintenance and billing purposes, most
- online communications and information systems create detailed records of
- users' communication activities as well as lists of the information,
- services, or people that they have accessed or contacted. Under current
- law, the government can gain access to such transactional records with a
- mere subpoena, which can be obtained without the intervention of a court.
- To address this issue, EFF pushed for the addition of stronger protections
- against indiscriminate access to online transactional records.
-
- Under the new protections, law enforcement must convince a court to issue
- an order based on a showing of "specific and articulable facts" which prove
- that the information sought would be relevant and material to an ongoing
- criminal investigation.
-
- Berman said: "The new legal protections for transactional information are
- critical in that they recognize that these records are extremely sensitive
- and deserve a high degree of protection from casual law enforcement access.
- With these provisions, we have achieved for all online systems a
- significantly greater level of protection than exists today for any other
- form of electronic communication, including the telephone."
-
-
- EFF to Continue to Monitor Implementation
- -----------------------------------------
-
- Berman added: "There are numerous opportunities under this bill for public
- oversight and intervention to ensure that privacy is not short-changed.
- EFF will closely monitor the bill's implementation, and we stand ready to
- intervene if privacy is threatened."
-
- In the first four years, the government is required to reimburse carriers
- for all costs associated with meeting the design requirements of the bill.
- After four years, the government is required to reimburse carriers for all
- costs for enhancements that are not "reasonably achievable", as determined
- in a proceeding before the FCC. The FCC will determine who bears the costs
- in terms of the impact on privacy, costs to consumers, national security
- and public safety, the development of technology, and other factors. If
- the FCC determines that compliance is not reasonably achievable, the
- government will either be required to reimburse the carrier or consider it
- to be in compliance without modification.
-
- Berman said: "EFF is committed to making a case before the FCC, at the
- first possible opportunity, that government reimbursement is an essential
- back-stop against unnecessary or unwanted surveillance capabilities. If
- the government pays, it will have an incentive to prioritize, which will
- further enhance public accountability and protect privacy."
-
-
- EFF Decision to Work on Legislation
- -----------------------------------
-
- Since 1992 EFF, in conjunction with the Digital Privacy and Security
- Working Group (a coalition of over 50 computer, communications, and public
- interest organizations and associations working on communications privacy
- issues, coordinated by EFF) has been successful at stopping a series of FBI
- Digital Telephony proposals, which would have forced communications
- companies to install wiretap capability into every communications medium.
- However, earlier this year, Senator Leahy and Rep. Edwards, who have helped
- to quash previous FBI proposals, concluded that passage of such a bill this
- year was inevitable. Leahy and Edwards stepped in to draft a narrow bill
- with strong privacy protections, and asked for EFF's help in the process.
-
- "By engaging in this process for the last several months," Berman noted,
- "we have been successful in helping to craft a proposal that is
- significantly improved over the FBI's original bill in terms of privacy,
- technology policy, and civil liberties, and have, in the process, added
- significant new privacy protections for users of communications networks.
- We commend Representative Edwards, Senator Leahy, and Representatives
- Boucher and Markey for standing up for civil liberties and pushing for
- strong privacy protections."
-
- The Electronic Frontier Foundation (EFF) is a non-profit public interest
- organization dedicated to achieving the democratic potential of new
- communications technology and works to protect civil liberties in new
- digital environments.
-
-
- Other Privacy Protections Added by the Bill
- -------------------------------------------
-
- The bill also adds the following new privacy protections
-
- * The standard for law enforcement access to online transactional records
- is raised to require a court order instead of a mere subpoena.
-
- * No expansion of law enforcement authority to conduct electronic
- surveillance.
-
- * The bill recognizes a citizen's right to use encryption.
-
- * All authorized surveillance must be conducted with the affirmative
- intervention of the telecommunications carrier. Monitoring
- triggered remotely by law enforcement is prohibited.
-
- * Privacy advocates will be able to track law enforcement requests
- for surveillance capability, and expenditures for all surveillance
- capability and capacity added under this bill will be open to
- public scrutiny.
-
- * Privacy protections must be maintained in making new technologies
- conform to the requirements of the bill, and privacy advocates may
- intervene in the administrative standard setting process.
-
- * Information gleaned from pen register devices is limited to dialed
- number information only. Law enforcement may not receive location
- information.
-
-
- Analysis of and comments on major provisions of the bill
- --------------------------------------------------------
-
- A. Key new privacy protections
-
- 1. Expanded protection for transactional records sought by law
- enforcement
-
- Senator Leahy and Rep. Edwards have agreed that law enforcement access to
- transactional records in online communication systems (everything from the
- Internet to AOL to hobbyist BBSs) threatens privacy rights because the
- records are personally identifiable, because they reveal the content of
- people's communications, and because the compilation of such records makes
- it easy for law enforcement to create a detailed picture of people's lives
- online. Based on this recognition, the draft bill contains the following
- provisions:
-
- i. Court order required for access to transactional records instead of
- mere subpoena
-
- In order to gain access to transactional records, such as a list of to whom
- a subject sent email, which online discussion group one subscribes to, or
- which movies you request on a pay-per view channel, law enforcement will
- have to prove to a court, by the showing of "specific and articulable
- facts" that the records requested are relevant to an ongoing criminal
- investigation. This means that the government may not request volumes of
- transactional records merely to see what it can find through traffic
- analysis. Rather, law enforcement will have to prove to a court that it has
- reason to believe that it will find some specific information that is
- relevant to an ongoing criminal investigation in the records that it
- requests.
-
- With these provisions, we have achieved for all online systems, a
- significantly greater level of protection than currently exists for
- telephone toll records. The lists of telephone calls that are kept by local
- and long distance phone companies are available to law enforcement without
- any judicial intervention at all. Law enforcement gains access to hundreds
- of thousands of such telephone records each year, without a warrant and
- without even notice to the citizens involved. Court order protection will
- make it much more difficult for law enforcement to go on "fishing
- expeditions" through online transactional records, hoping to find evidence
- of a crime by accident.
-
- ii. Standard of proof much greater than for telephone toll records, but
- below that for content
-
- The most important change that these new provisions offer, is that law
- enforcement will (a) have to convince a judge that there is reason to look
- at a particular set of records, and (b) have to expend the time and energy
- necessary to have a US Attorney or DA actually present a case before a
- court. However, the burden or proof to be met by the government in such a
- proceeding is lower than required for access to the content of a
- communication.
-
- 2. New protection for location-specific information available in
- cellular, PCS and other advanced networks
-
- Much of the electronic surveillance conducted by law enforcement today
- involves gathering telephone dialing information through a device known as
- a pen register. Authority to attach pen registers is obtained merely by
- asserting that the information would be relevant to a criminal
- investigation. Courts have no authority to deny pen register requests.
- This legislation offers significant new limits on the use of pen register
- data.
-
- Under this bill, when law enforcement seeks pen register information from a
- carrier, the carrier is forbidden to deliver to law enforcement any
- information which would disclose the location or movement of the calling or
- called party. Cellular phone networks, PCS systems, and so-called
- "follow-me" services all store location information in their networks.
- This new limitation is a major safeguard which will prevent law enforcement
- from casually using mobile and intelligent communications services as
- nation-wide tracking systems.
-
- i. New limitations on "pen register" authority
-
- Law enforcement must use "technology reasonably available" to limit pen
- registers to the collection of calling number information only. Currently,
- law enforcement is able to capture not only the telephone number dialed,
- but also any other touch-tone digits dialed which reflect the user's
- interaction with an automated information service on the other end of the
- line, such as an automatic banking system or a voice-mail password.
-
- 3. Bill does not preclude use of encryption
-
- Unlike previous Digital Telephony proposals, this bill places no obligation
- on telecommunication carriers to decipher encrypted messages, unless the
- carrier actually holds the key. The bill in no way prohibits citizens from
- using encryption.
-
- 4. Automated remote monitoring precluded
-
- Law enforcement is specifically precluded from having automated, remote
- surveillance capability. Any electronic surveillance must be initiated by
- an employee of the telecommunications carrier.
-
- 5. Privacy considerations essential to development of new technology
-
- One of the requirements that telecommunications carriers must meet to be in
- compliance with the Act is that the wiretap access methods adopted must
- protect the privacy and security of each user's communication. If this
- requirement is not met, anyone may petition the FCC to have the wiretap
- access service be modified so that network security is maintained. So, the
- technology used to conduct wiretaps cannot also jeopardize the security of
- the network as a whole. If network-wide security problems arise because of
- wiretapping standards, then the standards can be overturned.
-
- 6. Increased Public Accountability
-
- All law enforcement requests for surveillance capability and capacity, as
- well as all expenditures paid by law enforcement to telecommunications
- carriers and all modifications made by carriers to comply with this bill,
- will be accountable to the public. The government is also required to pay
- for all upgrades, in both capability and capacity, in the first four years,
- and all costs after four years for incorporating the capability
- requirements in the costs for meeting those requirements are not
- 'reasonably achievable'. A determination of whether compliance after four
- years is reasonably achievable will be made by the FCC in an open and
- public proceeding. Government reimbursement for compliance costs will
- permit the public the opportunity to decide whether additional surveillance
- capability is necessary.
-
- In all, the reimbursement requirements combined with the reporting
- requirements and the open processes built in to this bill, law enforcement
- surveillance capability, capacity, and expenditures will be more
- accountable to the public than ever before.
-
- B. Draconian provisions softened
-
- In addition, the surveillance requirements imposed by the bill are not as
- far-reaching as the original FBI version. A number of procedural
- safeguards are added which seek to minimize the threatens to privacy,
- security, and innovation. Though the underlying premise of the Act is
- still cause for concern, these new limitations deserve attention:
-
- 1. Narrow Scope
-
- The bill explicitly excludes Internet providers, email systems, BBSs, and
- other online services. Unlike the bills previously proposed by the FBI,
- this bill is limited to local and long distance telephone companies,
- cellular and PCS providers, and other common carriers.
-
- 2. Open process with public right of intervention
-
- The public will have access to information about the implementation of the
- Act, including open access to all standards adopted in compliance with the
- Act, the details of how much wiretap capacity the government demands, and a
- detailed accounting of all federal money paid to carriers for modifications
- to their networks. Privacy groups, industry interests, and anyone else has
- a statutory right under this bill to challenge implementation steps taken
- by law enforcement if they threaten privacy or impede technology
- advancement.
-
- 3. Technical requirements standards developed by industry instead of
- the Attorney General
-
- All surveillance requirements are to be implemented according to standards
- developed by industry groups. The government is specifically precluded
- from forcing any particular technical standard, and all requirements are
- qualified by notions of economic and technical reasonableness.
-
- 4. Right to deploy untappable services
-
- Unlike the original FBI proposal, this bill recognizes that there may be
- services which are untappable, even with Herculean effort to accommodate
- surveillance needs. In provisions that still require some strengthening,
- the bill allows untappable services to be deployed if redesign is not
- economically or technically feasible.
-
- Background Information
- ----------------------
-
- * The Bill:
- ftp.eff.org, /pub/EFF/Policy/Digital_Telephony/digtel94.bill
- gopher.eff.org, 1/EFF/Policy/Digital_Telephony, digtel94.bill
- http.eff.org/pub/EFF/Policy/Digital_Telephony/digtel94.bill
-
- All other files available from
- ftp.eff.org, /pub/EFF/Policy/Digital_Telephony/Old/
- gopher.eff.org, 1/EFF/Policy/Digital_Telephony/Old
- http.eff.org/pub/EFF/Policy/Digital_Telephony/Old/
-
- * EFF Analysis of Bill as Introduced: digtel94_analysis.eff
- * EFF Statement on Earlier 1994 Draft of Bill: digtel94_old_statement.eff
- * EFF Analysis of Earlier 1994 Draft: digtel94_draft_analysis.eff
- * EFF Statement on Announcement of 1994 Draft: digtel94.announce
- * EFF Statement on Announcement of 1993 Draft: digtel93.announce
- * Late 1993/Early 1994 Draft: digtel94_bill.draft
- * EFF Statement on 1992 Draft: digtel92_analysis.eff
- * EFF Statement on 1992 Draft: digtel92_opposition.announce
- * Late 1992 Draft: digtel92_bill.draft
- * Original 1992 Draft: digtel92_old_bill.draft
-
-
- For more information Contact
- ----------------------------
-
- Jerry Berman Policy Director <jberman@eff.org>
- Jonah Seiger Project Coordinator <jseiger@eff.org>
-
- +1 202 347 5400 (voice)
- +1 202 393 5509 (fax)
-
- ------------------------------
-
- Date: Sat, 8 Oct 1994 00:55:41 -0400 (EDT)
- From: "Shabbir J. Safdar" <shabbir@PANIX.COM>
- Subject: File 2--The DT bill just passed in the Senate.
-
- The Wiretap Watch
- Final Issue
- October 7, 1994
- Distribute Widely
-
- Recent Quotes: (It's been a busy week, we've answered over 2,000 emails)
-
- "I think we should adjourn now [..] the country is safer when
- we're not in session."
- -Sen. Charles Grassley (R-IA) on C-SPAN
-
- "Senator Wallop's office, may I help you?"
- "Yes, I called to register my support for the Senator's
- concerned position on the bill."
- "Ok, got it. Thanks"
- "Have there been a lot of calls today? Dozens? Fifty?"
- "Hundreds so far today."
- -A conversation I had earlier today with Sen. Wallop's
- office
-
- "I called Feinstein again and the offical breakfast food is
- still a waffle."
- -Another California caller on Feinstein's FBI Wiretap
- position
-
-
- -------------------------------------------------------------------
- Contents
- A look back at the bill
- What you should do right now
- Positions of legislators pro and con
- Status of the bills
- Brief explanation of the bill
- -------------------------------------------------------------------
- A LOOK BACK AT THE BILL
-
- As you may have already discovered the Senate passed the bill tonight
- on "unanimous consent". Although I will leave the soothsaying to more
- eloquent folks, there are a number of things that need to be said and
- people that need to be thanked.
-
- 1. A TREMENDOUS AMOUNT WAS ACCOMPLISHED WITH THIS LEGISLATIVE FIGHT
- During this campaign, we asked people to contact several legislators
- about the bill. This was a very effective means ofat mobilizing people.
- When we put out the word that Senator Wallop needed support, hundreds of
- calls were received the very next day -- their office was stunned.
-
- This is the first time many of the sitting legislators learned that
- constituents were concerned about privacy. We have begun to teach
- them that this is an important issue. Educating a legislator is an
- ongoing process that we'll continue to assist with in preparation for
- the elections. It would be great if legislators begin to consider what
- effects their actions will have on "the privacy vote."
-
- Sincere thanks go out to the literally thousands of people who took the
- time to call their legislators. The response we received to our alerts
- was amazing. The mail itself was overwhelming; the letters really
- kept us going on those late nights. When people wrote to us, saying
- that they had faxed our press release to a dozen papers and called the
- same number of legislators, it seemed inconceivable that we should let
- something as minor as sleep slow us down.
-
- Thanks to everyone who contributed by calling and faxing (and sending in
- corrections). It appears that our technique of providing excellent
- information with the research done for the reader is a technique people
- appreciate. We'll continue to refine it in preparation for the next
- legislative session.
-
- 2. THIS COULD HAVE BEEN MUCH WORSE
- Much worse versions of the DT bill have been introduced. They were all
- killed before really getting anywhere. When this version was brought up,
- the EFF had a difficult decision in front of them: assume the soothsayers
- were right about it passing this year and try to hack in some privacy
- provisions, or try and mount a fight against it. Other factors such as
- organizational direction played a part in this decision I'm sure, but I'm
- not qualified to talk about that. (I'm about as far from an EFF insider
- as you can get.)
-
- There are several privacy provisions that have been added to the bill.
- Had the EFF not intervened, they would not be there. PERIOD. I think
- we owe them a thank you for that.
-
- Did they really know what they were doing or was it a lucky guess?
- Who's to say; we all have 20/20 hindsight. When EFF made this
- decision, it was months ago. They were like an ace-in-the-hole should
- the bill pass.
-
- 3. THIS IS STILL A PROCESS THE PUBLIC NEEDS TO MONITOR
- There are several ways in which the powers in the bill could be abused
- by law enforcement. The bill provides law enforcement with unprecedented
- assurance that a wiretap will always be available. This will subtly
- change the way law enforcement does its work. ("When your most ubiqitous
- tool in a hammer, the world starts to look a lot like nails..")
-
- Furthermore the process for creating the wiretap functionality standards
- truly rests in the hands of the FCC. We have seen from past experience
- with the CallerID blocking fiasco that the FCC is not the bastion
- of privacy that we wish it was. In that instance, there was significant
- public outcry against the proposal, and yet privacy still lost.
-
- What's the good news? There are organizations who we can count on to
- watchdog this process. The EFF wrote most (if not all) of the privacy
- provisions of the bill. They will be in a great position to monitor
- the progress of this process and ensure that not just the LETTER of
- the privacy provisions are followed, but the SPIRIT as well.
-
- Furthermore, the Electronic Privacy Information Center (EPIC) is
- aggressive in their FOIA efforts, which keep our government honest. I
- sleep better at nights knowing they're keeping an eye out. I would
- have given my left foot to be in the courtroom this week with EPIC when
- the FBI's counsel asked for a five year delay on releasing twenty
- pages of wiretap data, and the judge told the attorney to "..call
- Director Freeh and tell him I said this matter can be taken care of
- in an hour and [a] half."
-
- Finally, I want to take a moment to thank David Sobel, Marc Rotenberg,
- & David Banisar of EPIC for all the help they gave us. Not being in
- DC, its difficult for us to simply "drop by" the office of a swing vote
- legislator and present our arguments. We're very grateful to them for
- this.
- -------------------------------------------------------------------
- WHAT YOU SHOULD DO RIGHT NOW
-
- Nothing for the moment. The Senate passed the Digital Telephony bill
- (S. 2375) a few minutes before adjournment tonight. The various holds
- put on it by Republican Senators were removed and the bill passed on
- "unanimous consent". This means that there was no opposition to it.
- President Clinton is almost certain to sign it.
-
- ---------------------------------------------------------------------
- STATUS
-
- STATUS SB 2375
- It passed on the evening of Oct. 7 on unanimous consent literally
- minutes before the Congress adjourned.
-
- STATUS HR 4922
- It passed on the evening of Oct. 5 on a voice vote.
-
- Oct 7, 94 The Senate passed S. 2375 on unanimous consent minutes
- before adjournment.
- Oct 6, 94 Nothing happened, though a Senate vote was expected. Several
- Senators have placed holds on the bill.
- Oct 5, 94 House passes HR 4922 on a voice vote.
- Oct 4, 94 House is scheduled to vote on HR 4922, along with more than
- 50 other items on the "suspension calendar". The debate
- took place tonight; the House vote was put off until Oct 5, '94.
- Oct 3, 94 Judge Richey instructs the FBI to comply with a FOIA request
- to make available their wiretap surveys (which they claim
- justify their bill) by Nov. 1.
- Sep 29, 94 HR 4922 marked up and reported out of the Hse. Jud. Comm
- and nearly to the full House
- Sep 28, 94 SB 2375 amended, marked up, and reported out of the Sen. Jud.
- Comm. to the full Senate
- Sep 15, 94 HR 4922 hearing held in the Telecommunications Comm.
- Aug 18, 94 HR 4922 reported back to committee (write to Rep. Jack Brooks!)
- Aug 11, 94 Sen. Leahy & Rep. Edwards hold a joint hearing on the bills in
- Wash. DC at 1pm in Rayburn 2237.
- Aug 10, 94 HR 4922 referred to Subcomm. on Civil and Constitutional Rights
- Aug 10, 94 SB 2375 referred to Subcomm. on Technology and the Law
- Aug 9, 94 Rep. Hyde officially cosponsors HR 4922
- Aug 9, 94 HR 4922 referred to House Judiciary Committee
- Aug 9, 94 SB 2375 referred to Senate Judiciary Committee
- Aug 9, 94 Identical House and Senate bills are announced by their respective
- sponsors, Rep. Don Edwards (D-CA) and Sen. Patrick Leahy (D-VT)
- EFF states the legislation is "not necessary" and predicts it
- will pass regardless.
-
- For more information about the Digital Telephony bills, check the
- Voters Telecomm Watch gopher site (gopher.panix.com) or contact Steven
- Cherry, VTW Press Contact at (718) 596-2851 or stc@vtw.org.
-
- ---------------------------------------------------------------------
- FINAL POSITIONS OF LEGISLATORS
-
- Because the Senate version passed with "unanimous consent", all of the
- sitting Senators supported it. This means that if someone is a Senator,
- they supported it. No fancy ASCII tables required.
-
- Three representatives we know of opposed the bill in the House:
-
- Dist ST Name, Address, and Party Phone Fax
- ==== == ======================== ============== ==============
- 4 CA Doolittle, John T. (R) 1-202-225-2511 1-202-225-5444
- 1 OR Furse, Elizabeth (D) 1-202-225-0855 na
- 12 NC Watt, Melvin* (D) 1-202-225-1510 1-202-225-1512
-
- Please call them and thank them for their privacy stances.
-
- ---------------------------------------------------------------------
- BRIEF EXPLANATION OF THE BILLS
-
- The FBI's Wiretap bills (also known as the DT - Digital Telephony bills)
- mandate that *all* communications carriers must provide wiretap-ready
- equipment so that the FBI can more easily implement their court-ordered
- wiretaps. The costs of re-engineering all communications equipment will
- be borne by the government, industry and consumers. It does not cover
- information service providers.
-
- The bill is vague and the standards defining "wiretap ready" do not
- exist. Furthermore, the FBI has yet to make a case which demonstrates
- that they have been unable to implement a single wiretap. Although
- we as a society have accepted law enforcement's need to perform
- wiretaps, it is not reasonable to mandate this functionality as a part
- of the design. In itself, that would be an important debate. However
- without any proof that this is indeed a realistic and present problem,
- it is unacceptable and premature to pass this legislation today.
-
- The Voters Telecomm Watch (VTW) does not believe the FBI has made a
- compelling case to justify that all Americans give up their privacy.
- Furthermore, the VTW does not believe the case has been made to justify
- spending 500 million Federal dollars over the next several years to
- re-engineer equipment to compromise privacy, interfere with
- telecommunications privacy, and fulfill an unproven government need.
-
- There are some privacy protections built into the bill. Their benefit
- does not outweigh the damage that building wiretaps into all communication
- does, however.
-
- ------------------------------
-
- Date: Sat, 8 Oct 1994 16:06:52 -0700
- From: email list server <listserv@SUNNYSIDE.COM>
- Subject: File 3--EPIC on Wiretap Bill Passag
-
- EPIC on Wiretap Bill Passage
-
- The passage of the FBI Wiretap Bill in the closing hours of the 103d
- Congress demonstrates the need for continued and aggressive advocacy
- in support of communications privacy. The legislation, which mandates
- the re-design of the nation's telecommunications infrastructure to
- facilitate government interception, was enacted with no floor debate
- and no resolution of the lingering questions concerning the need for
- such an unprecedented and far-reaching change in the law. The
- Electronic Privacy Information Center (EPIC) opposed passage of the
- bill and believes that its enactment could establish a dangerous
- precedent for the design and development of the National Information
- Infrastructure.
-
- The grassroots campaign that emerged to oppose the wiretap legislation
- shows the potential of the Internet as a means of educating the public
- and promoting democratic participation in the policymaking process.
- In the two-month period between the introduction of the legislation
- and its enactment, grassroots efforts demonstrated that a measure
- initially touted as a "compromise" bill was, in fact, a highly
- controversial proposal. Numerous Congressional offices admitted to
- being astounded by the number of calls and faxes they received in
- opposition to the legislation as it moved to consideration in both
- houses. EPIC believes that the on-line campaign to defeat the wiretap
- bill can serve as a model for the Internet community to build upon in
- the future. We congratulate the thousands of individuals who
- participated in the process and wish to express our appreciation and
- admiration for the work of the Voters Telecomm Watch (VTW) in bridging
- the gap between Washington and activists around the country. EPIC
- looks forward to continuing to work VTW, the American Civil Liberties
- Union, the Internet Business Association and the many other
- organizations that joined us in opposing the FBI Wiretap Bill.
-
- Implementation of the newly enacted legislation must be closely
- monitored. EPIC is committed to continuing its efforts to obtain
- relevant government data under the Freedom of Information Act,
- including the aggressive pursuit of our pending litigation against the
- FBI for the release of information cited in support of the wiretap
- legislation. EPIC also intends to monitor proceedings in the Federal
- Communications Commission pursuant to the new law and to participate
- in such proceedings to protect the privacy interests of network users.
- EPIC will also continue its research and advocacy activities in the
- areas of encryption policy, medical records privacy, transactional
- data privacy, proposed national identification systems, and other
- issues now emerging with the advent of the information superhighway.
-
-
- Electronic Privacy Information Center
- 666 Pennsylvania Avenue, S.E.
- Suite 301
- Washington, DC 20003
-
- (202) 544-9240 (voice)
- (202) 547-5482 (fax)
- info@epic.org (e-mail)
-
- ------------------------------
-
- From: Judi Clark <judic@MANYMEDIA.COM>
- Subject: File 4--Computer Freedom and Privacy-95 Conf info (corrected ver.)
- Date: Fri, 7 Oct 1994 14:27:22 -0700 (PDT)
-
- Call for Participation - CFP'95
- The Fifth Conference on Computers, Freedom and Privacy
- Sponsored by the ACM SIGCOMM, SIGCAS, SIGSAC and Stanford Law School
- 28 - 31 March 1995
- San Francisco Airport Marriott Hotel, Burlingame, California
-
- INVITATION
- This is an invitation to submit session and topic proposals for
- inclusion in the program of the Fifth Conference on Computers, Freedom
- and Privacy. Proposals may be for individual talks, panel discussions,
- debates, or other presentations in appropriate formats. Proposed topics
- should be within the general scope of the conference, as outlined below.
-
- SCOPE
- The advance of computer and telecommunications technologies holds great
- promise for individuals and society. From convenience for consumers and
- efficiency in commerce to improved public health and safety and
- increased participation in democratic institutions, these technologies
- can fundamentally transform our lives. New computer and
- telecommunications technologies are bringing new meanings to our
- freedoms to speak, associate, be left alone, learn, and exercise
- political power.
-
- At the same time these technologies pose threats to the ideals of a
- just, free, and open society. Personal privacy is increasingly at risk
- from invasion by high-tech surveillance and eavesdropping. The myriad
- databases containing personal information maintained in the public and
- private sectors expose private life to constant scrutiny. Political,
- social, and economic fairness may hinge on ensuring equal access to
- these technologies, but how, at what cost, and who will pay?
-
- Technological advances also enable new forms of illegal activity, posing
- new problems for legal and law enforcement officials and challenging the
- very definitions of crime and civil liberties. But technologies used to
- combat these crimes can threaten the traditional barriers between the
- individual and the state.
-
- Even such fundamental notions as speech, assembly and property are being
- transformed by these technologies, throwing into question the basic
- Constitutional protections that have guarded them. Similarly,
- information knows no borders; as the scope of economies becomes global
- and as networked communities transcend international boundaries, ways
- must be found to reconcile competing political, social, and economic
- interests in the digital domain.
-
- The Fifth Conference on Computers, Freedom and Privacy will assemble
- experts, advocates and interested people from a broad spectrum of
- disciplines and backgrounds in a balanced public forum to explore and
- better understand how computer and telecommunications technologies are
- affecting freedom and privacy in society. Participants will include
- people from the fields of computer science, law, business, research,
- information, library science, health, public policy, government, law
- enforcement, public advocacy, and many others.
-
- Topics covered in previous CFP conferences include:
-
- Personal Information and Privacy
- Access to Government Information
- Computers in the Workplace
- Electronic Speech, Press and Assembly
- Governance of Cyberspace
- Role of Libraries on the Information Superhighway
- Law Enforcement and Civil Liberties
- Privacy and Cryptography
- Free Speech and the Public Communications Network
-
- We are also actively seeking proposals with respect to other possible
- topics on the general subject of computers, freedom and privacy. Some
- new topics we are considering include:
-
- Telecommuting: Liberation or Exploitation?
- Courtesy, and the Freedom to be Obnoxious
- Commercial Life on the Net
- How Does the Net Threaten Government Power?
- Universal Access to Network Services
- The Meaning of Freedom in the Computer Age
- Online Interaction and Communities
- Government-Mandated Databases
-
- PROPOSAL SUBMISSION
- All proposals should be accompanied by a position statement of at least
- one page, describing the proposed topic. Proposals for panel
- discussions, debates and other multi-person presentations should include
- a list of proposed participants and session chair. Proposals should be
- sent to:
-
- CFP'95 Proposals
- Stanford Law and Technology Policy Center
- Stanford Law School
- Stanford, California 94305-8610
-
- or by email to:
-
- cfp95@forsythe.stanford.edu
-
- with the word "Proposal" in the subject line. Proposals should be
- submitted as soon as possible to allow thorough consideration for
- inclusion in the formal program. The deadline for submissions is
- 1 November 1994.
-
- STUDENT PAPER COMPETITION
- Full time students are invited to enter the student paper competition.
- Winners will receive a scholarship to attend the conference and present
- their papers. Papers should not exceed 2,500 words and should examine
- how computer and telecommunications technologies are affecting freedom
- and privacy in society. All papers should be submitted to Professor
- Gary T. Marx by 20 November 1994. Authors may submit their papers either by
- sending them as straight text via email to:
-
- Gary.Marx@colorado.edu
-
- or by sending six printed copies to:
-
- Professor Gary T. Marx
- University of Colorado
- Campus Box 327
- Boulder, Colorado 80309-0327
- (303) 492-1697
-
- Submitters should include the name of their institution, degree program,
- and a signed statement affirming that they are a full-time student at
- their institution and that the paper is an original, unpublished work of
- their own.
-
- INFORMATION
- For more information on the CFP'95 program and advance registration, as
- it becomes available, write to:
-
- CFP'95 Information
- Stanford Law and Technology Policy Center
- Stanford Law School
- Stanford, California 94305-8610
-
- or send email to:
-
- cfp95@forsythe.stanford.edu
-
- with the word "Information" in the subject line.
-
- THE ORGANIZERS
-
- General Chair
- --------------
- Carey Heckman
- Stanford Law School
- Stanford Law & Technology Policy Center
- Stanford, CA 94305-8610
- 415-725-7788 (voice)
- 415-725-1861 (fax)
- ceh@leland.stanford.edu
-
- To discuss potential CFP'95 speakers, topics, and formats, and to receive
- additional CFP'95 information, subscribe to the CFP95 list. Send to
- cfp95@lists.stanford.edu a plain text message consisting of subscribe cfp95.
-
- Program Committee
- ---------------------
- Sheri Alpert
- Internal Revenue Service
-
- Judi Clark
- ManyMedia
-
- Kaye Caldwell
- Software Industry Coalition
-
- Esther Dyson
- EDventure Holdings
-
- Mike Godwin
- Electronic Frontier Foundation
-
- Peter Harter
- National Public Telecomputing Network
-
- Lance J. Hoffman
- George Washington University
-
- Ellen Kirsh
- America OnLine
-
- Bruce R. Koball
- Motion West
-
- Gary T. Marx
- University of Colorado
-
- Mitch Ratcliffe
- Digital Media
-
- Marc Rotenberg
- Electronic Privacy Information Center
-
- Deborah Runkle
- American Association for the Advancement of Science
-
- Barbara Simons
- USACM
-
- Ross Stapleton-Gray
- Georgetown University
-
- Glenn Tenney
- Fantasia Systems
-
- Jeff Ubois
- Author and Consultant
-
- J. Kent Walker, Jr.
- U.S. Department of Justice
-
- Affiliations are listed for identification.
-
- ----
- Please distribute and post this notice!
-
- ------------------------------
-
-
- ------------------------------
-
- Date: Thu, 13 Aug 1994 22:51:01 CDT
- From: CuD Moderators <tk0jut2@mvs.cso.niu.edu>
- Subject: File 5--Cu Digest Header Information (unchanged since 10 Sept 1994)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send a one-line message: SUB CUDIGEST your name
- Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
- In ITALY: Bits against the Empire BBS: +39-461-980493
- In BELGIUM: Virtual Access BBS: +32.69.45.51.77 (ringdown)
-
- UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
- JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #6.88
- ************************************
- ___ _______ __________________________ ___ _________________ ____
- / \/ _ / __/_ ___/ / \/ _/__/ _ / ____/ _ \/ _ \
- / / / / / /\__ / / / / / _/ \ / / / // / / / / /
- _/__/__/__/\____/______/__/\____/__/\__\____/\____/__//__/\____/__/__/
- __ _ _ __/ \________ __ _ ____________________________ ____
- / \ / __/_ ____ / ____/ _ \/ _ \
- / \ /\___ / // / / // / / / / /
- _ __ _ _\_____________/_______ __ /______/__/ \____/__//__/\____/__/__/
- | ___ |_____
- ______|/ \ | \ MYSTIC WHQ (AMIGA)- OUTLAWS WHQ (PC)
- / / \ _|____ \
- / / / / TRSI USHQ (AMIGA) - FIRM USHQ (PC)
- / \_______/ / /
- \ _/ | \_______/\ ALL MST-TRSI-OTL RELEASES ARE FREE D/L'S
- /\ | / \ \
- / | \ / (305)RefeRal
- \____/| _/\_______/
- | / \ \ / 7 NODEZ STRONG 28.8 V34/DUAL & 16.8 DUAL
- | \ \____/
- /\__| \_____/
- .
-