home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Monster Media 1994 #2
/
Monster Media No. 2 (Monster Media)(1994).ISO
/
freq_qa
/
priv5.zip
/
PRIV5.TXT
< prev
Wrap
Text File
|
1994-05-25
|
159KB
|
3,575 lines
Archive-name: net-privacy/part1
Last-modified: 1993/10/11
Version: 3.2
IDENTITY, PRIVACY, and ANONYMITY on the INTERNET
================================================
(c) Copyright 1993 L. Detweiler. Not for commercial use except by
permission from author, otherwise may be freely copied. Not to be
altered. Please credit if quoted.
SUMMARY
=======
Information on email and account privacy, anonymous mailing and
posting, encryption, and other privacy and rights issues associated
with use of the Internet and global networks in general.
(Search for <#.#> for exact section. Search for '_' (underline) for
next section.)
PART 1
====== (this file)
Identity
--------
<1.1> What is `identity' on the internet?
<1.2> Why is identity (un)important on the internet?
<1.3> How does my email address (not) identify me and my background?
<1.4> How can I find out more about somebody from their email address?
<1.5> How do I provide more/less information to others on my identity?
<1.6> Why is identification (un)stable on the internet?
<1.7> What is the future of identification on the internet?
Privacy
-------
<2.1> What is `privacy' on the internet?
<2.2> Why is privacy (un)important on the internet?
<2.3> How (in)secure are internet networks?
<2.4> How (in)secure is my account?
<2.5> How (in)secure are my files and directories?
<2.6> How (in)secure is X Windows?
<2.7> How (in)secure is my email?
<2.8> How am I (not) liable for my email and postings?
<2.9> Who is my sysadmin? What does s/he know about me?
<2.10> Why is privacy (un)stable on the internet?
<2.11> What is the future of privacy on the internet?
Anonymity
---------
<3.1> What is `anonymity' on the internet?
<3.2> Why is `anonymity' (un)important on the internet?
<3.3> How can anonymity be protected on the internet?
<3.4> What is `anonymous mail'?
<3.5> What is `anonymous posting'?
<3.6> Why is anonymity (un)stable on the internet?
<3.7> What is the future of anonymity on the internet?
PART 2
====== (next file)
Issues
------
<4.1> What is the Electronic Frontier Foundation (EFF)?
<4.2> Who are Computer Professionals for Social Responsibility (CPSR)?
<4.3> What was `Operation Sundevil' and the Steve Jackson Game case?
<4.4> What is Integrated Services Digital Network (ISDN)?
<4.5> What is the National Research and Education Network (NREN)?
<4.6> What is the FBI's proposed Digital Telephony Act?
<4.7> What is U.S. policy on freedom/restriction of strong encryption?
<4.8> What other U.S. legislation is related to privacy?
<4.9> What are references on rights in cyberspace?
<4.10> What is the Computers and Academic Freedom (CAF) archive?
<4.11> What is the Conference on Freedom and Privacy (CFP)?
<4.12> What is the NIST computer security bulletin board?
Clipper
-------
<5.1> What is the Clipper Chip Initiative?
<5.2> How does Clipper blunt `cryptography's dual-edge sword'?
<5.3> Why are technical details of the Clipper chip being kept secret?
<5.4> Who was consulted in the development of the Clipper chip?
<5.5> How is commerical use/export of Clipper chips regulated?
<5.6> What are references on the Clipper Chip?
<5.7> What are compliments/criticisms of the Clipper chip?
<5.8> What are compliments/criticisms of the Clipper Initiative?
<5.9> What are compliments/criticisms of the Clipper announcement?
<5.10> Where does Clipper fit in U.S. cryptographic technology policy?
PART 3
====== (last file)
Resources
---------
<6.1> What UNIX programs are related to privacy?
<6.2> How can I learn about or use cryptography?
<6.3> What is the cypherpunks mailing list?
<6.4> What are some privacy-related newsgroups? FAQs?
<6.5> What is internet Privacy Enhanced Mail (PEM)?
<6.6> What are other Request For Comments (RFCs) related to privacy?
<6.7> How can I run an anonymous remailer?
<6.8> What are references on privacy in email?
<6.9> What are some email, Usenet, and internet use policies?
Miscellaneous
-------------
<7.1> What is ``digital cash''?
<7.2> What is a ``hacker'' or ``cracker''?
<7.3> What is a ``cypherpunk''?
<7.4> What is `steganography' and anonymous pools?
<7.5> What is `security through obscurity'?
<7.6> What are `identity daemons'?
<7.7> What standards are needed to guard electronic privacy?
Footnotes
---------
<8.1> What is the background behind the Internet?
<8.2> How is Internet `anarchy' like the English language?
<8.3> Most Wanted list
<8.4> Change history
* * *
IDENTITY
========
_____
<1.1> What is `identity' on the internet?
Generally, today people's `identity' on the internet is primarily
determined by their email address in the sense that this is their
most unchanging 'face' in the electronic realm. This is your
login name qualified by the complete address domain information,
for example ``ld231782@longs.lance.colostate.edu''. People see
this address when receiving mail or reading USENET posts from you
and in other situations where programs record usage. Some obsolete
forms of addresses (such as BITNET) still persist.
In email messages, additional information on the path that a message
takes is prepended to the message received by the recipient. This
information identifies the chain of hosts involved in the
transmission and is a very accurate trace of its origination. This
type of identify-and-forward protocol is also used in the USENET
protocol to a lesser extent. Forging these fields requires
corrupted mailing software at sites involved in the forwarding and
is very uncommon. Not so uncommon is forging the chain at the
origination point, so that all initial sites in the list are faked
at the time the message is created. Tracing these messages can be
difficult or impossible when the initial faked fields are names of
real machines and represent real transfer routes.
_____
<1.2> Why is identity (un)important on the internet?
The concept of identity is closely intertwined with communication,
privacy, and security, which in turn are all critical aspects of
computer networks. For example, the convenience of communication
afforded by email would be impossible without conventions for
identification. But there are many potential abuses of identity
possible that can have very severe consequences, with massive
computer networks at the forefront of the issue, which can
potentially either exacerbate or solve these problems.
Verifying that an identity is correct is called `authentication',
and one classic example of the problems associated with it is
H.G. Well's ``War of the Worlds'' science fiction story adapted to
a radio broadcast that fooled segments of the population into
thinking that an alien invasion was in progress. Hoaxes of this
order are not uncommon on Usenet and forged identities makes them
more insidious. People and their reputations can be assaulted by
forgery.
However, the fluidity of identity on the internet is for some one of
its most attractive features. Identity is just as useful as it is
harmful. A professor might carefully explain a topic until he
finds he is talking to an undergraduate. A person of a particular
occupation may be able to converse with others who might normally
shun him. Some prejudices are erased, but, on the other hand, many
prejudices are useful! A scientist might argue he can better
evaluate the findings of a paper as a reviewer if he knows more
about the authors. Likewise, he may be more likely to reject it
based on unfair or irrelevant criteria. On the other side of the
connection, the author may find identities of reviewers useful in
exerting pressure for acceptance.
Identity is especially crucial in establishing and regulating
`credit' (not necessarily financial) and `ownership' and `usage'.
Many functions in society demand reliable and accurate techniques
for identification. Heavy reliance will be placed on digital
authentication as global economies become increasingly electronic.
Many government functions and services are based on identification,
and law enforcement frequently hinges on it. Hence, employees of
many government organizations push toward stronger identification
structures. But when does identification invade privacy?
The growth of the internet is provoking social forces of massive
proportions. Decisions made now on issues of identity will affect
many future users, especially as the network becomes increasingly
global, universal, widespread, and entrenched; and the positive or
adverse affects of these actions, intended and inadvertent, will
literally be magnified exponentially.
_____
<1.3> How does my email address (not) identify me and my background?
Your email address may contain information that influences people's
perceptions of your background. The address may `identify' you as
from a department at a particular university, an employee at a
company, or a government worker. It may contain your last name,
initials, or cryptic identification codes independent of both. In
the US some are based on parts of social security numbers. Others
are in the form 'u2338' where the number is incremented in the
order that new users are added to the system.
Standard internet addresses also can contain information on your
broad geographical location or nationhood. However, none of this
information is guaranteed to be correct or be there at all. The
fields in the domain qualification of the username are based on
rather arbitrary organization, such as (mostly invisible) network
cabling distributions. The only point to make is that early fields
in the address are more specific (such as specific computer names
or local networks) and the later ones the most general (such as
continental domains). Typically the first field is the name of the
computer receiving mail.
Gleaning information from the email address alone is sometimes an
inspired art or an inconsistent and futile exercise. (For more
information, see the FAQs on email addresses and known
geographical distributions.) However, UNIX utilities exist to aid
in the quest (see the question on this).
Common Suffixes
---------------
.us United States
.uk United Kingdom
.ca Canada
.fi Finland
.au Australia
.edu university or college
.com commercial organization
.org 'other' (e.g. nonprofit organization)
.gov government
.mil military site
_____
<1.4> How can I find out more about somebody with a given email address?
One simple way is to send email to that address, asking. Another
way is to send mail to the postmaster at that address (i.e.
postmaster@address), although the postmaster's job is more to help
find user ID's of particular people given their real name and solve
mail routing problems. The sysadmin (i.e. `root@address') may also
be able to supply information. Users with related email address
may have information. However, all of these methods rely on the
time and patience of others so use them minimally.
One of the most basic tools for determining identity over the
internet is the UNIX utility 'finger'. The basic syntax is:
finger user@here.there.everywhere
This utility uses communication protocols to query the computer
named in the address for information on the user named. The
response is generated completely by the receiving computer and may
be in any format. Possible responses are as follows:
- A message `unknown host' meaning some aspect of the address is
incorrect, two lines with no information and '???'.
- A message `In real life: ???' in which case the receiving computer
could not find any kind of a match on the username. The finger
utility may return this response in other situations.
- A listing of information associated with multiple users. Some
computers will search only for matching user IDs, others will
attempt to find the username you specified as a substring of all
actual full names of users kept in a local database.
At some sites `finger' can be used to get a list of all users on the
system with a `finger @address'. In general this is often
considered weak security, however, because `attackers' know valid
user ID's to `crack' passwords.
More information on the fields returned by `finger' is given below.
More information on `finger' and locating people's email addresses
is given in the email FAQ (such as the WHOIS lookup utility). Just
as you can use these means to find out about others, they can use
them to find out about you. You can `finger' yourself to find out
what is publicly reported by your UNIX system about you. Be
careful when modifying `finger' data; virtually anyone with
internet access worldwide can query this information. In one
famous case, the New York Times writer J. Markoff uncovered the
identity of R. Morris, author of the Internet Worm, through the
use of `finger' after an anonymous caller slipped by revealing his
initials which were also his login ID. See the book Cyberpunk by
K. Hafner and J. Markoff.
_____
<1.5> How do I provide more/less information to others on my identity?
The public information of your identity and account is mostly
available though the UNIX utility `finger' described above.
- You have control over most of this information with the utility
`chfn', the specifics vary between sites (on some systems use
`passwd -f').
- You can provide unlimited information in the .plan file which is
copied directly to the destination during the fingering.
- A technique that works at some sites allows you to find out who is
'finger'ing you and even to vary the .plan file sent to them.
- Your signature is determined by the environment variable SIGNATURE
- USENET signatures are conventionally stored in the .signature file
in your home directory.
Providing less information on your online identity is more difficult
and involved. One approach is to ask your system adminstrator to
change or delete information about you (such as your full name).
You may be able to obtain access on a public account or one from
someone unrelated to you personally. You may be able to remotely
login (via modem or otherwise) to computers that you are not
physically near. These are tactics for hiding or masking your
online activities but nothing is foolproof. Consult man pages on
the `chmod' command and the default file mode. Generally, files on
a shared system have good safeguards within the user pool but very
little protection is possible from corrupt system administrators.
To mask your identity in email or on USENET you can use different
accounts. More untraceable are new `anonymous posting' and
remailing services that are very recently being established. See
the sections on that topic.
Experienced UNIX users can install programs that vary the .plan
file based on `who is calling' or even determine the ID of the
`caller' in some configurations. See the files on
quartz.rutgers.edu:
backfinger.tar.gz, fing-plan.c.gz, planinit*.gz: Programs to do
tricks with UNIX finger; log incoing fingers, etc.
Thanks to dzr@world.std.com for contributions here.
_____
<1.6> Why is identification (un)stable on the internet?
Generally, identity is an amorphous and almost nonexistent concept
on the Internet for a variety of reasons. One is the inherent
fluidity of `cyberspace' where people emerge and submerge
frequently, and absences are not readily noted in the `community'.
Most people remember faces and voices, the primary means of casual
identification in the 'real world'. The arbitary and cryptic
sequences of letters and digits comprising most email addresses are
not particularly noticeable or memorable and far from a unique
identification of an individual, who may use multiple accounts on
multiple machines anywhere in the world.
Currently internet users do not really have any great assurances
that the messages in email and USENET are from who they appear to
be. A person's mailing address is far from an identification of an
individual.
- Anyone with access to the account, e.g. they know the password,
either legitimately or otherwise, can send mail with that address
in the From: line.
- Email addresses for an individual tend to change frequently as
they switch jobs or make moves inside their organizations.
- As part of current mailing protocol standards, forging the From:
line in mail messages is a fairly trivial operation for many
hackers.
The status and path information prepended to messages by
intermediate hosts is generally unforgeable. In general, while
possible, forgeries are fairly rare on most newsgroups and in
email. Besides these pathological cases abve there are many basic
problems with today's internet protocols affecting identification
on the internet:
- Internet mail standards, described in RFC-822, are still evolving
rapidly and not entirely orderly. For example, standards for
mail address `munging' or `parsing' tend to vary slightly between
sites, particularly with gateways and embedded addresses, and
frequently mean the difference between finding addresses and
bouncing mail.
- Domain names and computer names are frequently changed at sites,
and there are delays in the propagation of this data.
- Addresses cannot be resolved when certain critical computers
crash, such as the receiving computer or other computers involved
in resolving names into addresses called `nameservers'.
- A whole slew of problems is associated with `nameservers'; if
they are not updated they will not find name addresses, and even
the operation of what constitutes `updating' has different
interpretations at different sites.
The current internet mailing and addressing protocols are slightly
anachronistic in that they were created when the network was
somewhat obscure and not widespread, with only a fraction of the
traffic it now sees. Today a large proportion of internet traffic
is email, comprising millions of messages.
_____
<1.7> What is the future of identification on the internet?
Some new technologies and standards are introducing facial images
and voice messages into mail and these will improve the sense of
community that comes from the familiarity of identification.
However, they are not currently widespread, require large amounts
of data transfer, standardized software, and make some compromises
in privacy.
Promising new cryptographic techniques may make `digital signatures'
and `digital authentication' common. Also, the trend in USENET
standards is toward greater authentication of posted information.
On the other hand, advances in ensuring anonymity (such as
remailers) are forthcoming. (See the sections on these topics.)
PRIVACY
=======
_____
<2.1> What is `privacy' on the internet?
Generally, while `privacy' has multiple connotations in society and
perhaps even more on the internet, in cyberspace most take it to
mean that you have exclusive use and access to your account and the
data stored on and and directed to it (such as email), and you do
not encounter arbitrary restrictions or searches. In other words,
others may obtain data associated with your account, but not
without your permission. These ideas are probably both fairly
limiting and liberal in their scope in what most internet users
consider their private domains. Some users don't expect or want
any privacy, some expect and demand it.
_____
<2.2> Why is privacy (un)important on the internet?
This is a somewhat debatable and inflammatory topic, arousing
passionate opinions. On the internet, some take privacy for
granted and are rudely surprised to find it tenuous or nonexistent.
Most governments have rules that protect privacy (such as the
illegal search and seizure clause of the U.S. Constitution, adopted
by others) but have many that are antithetical to it (such as laws
prohibiting secret communications or allowing wiretapping). These
rules generally carry over to the internet with few specific rules
governing it. However, the legal repercussions of the global
internet are still largely unknown and untested (i.e. no strong
legal precedents and court cases). The fact that internet traffic
frequently passes past international boundaries, and is not
centrally managed, significantly complicates and strongly
discourages its overall regulation.
_____
<2.3> How (in)secure are internet networks?
- `Theoretically' people at any site in the chain of sites with
access to hardware and network media that transmits data over the
Internet could potentially monitor or archive it. However, the
sheer volume and general 'noise' inherent to this data makes
these scenarios highly improbable, even by government agencies
with supposedly vast funding and resources, although a
sophisticated science dedicated to filtering data can be
exploited for this role.
- Internet communications is extremely vulnerable to `traffic
analysis,' a technique where the content of messages is not
uncovered but information on the source and destination addresses
can effectively suggest its meaning. For example, knowing that
certain people are on certain mailing lists exposes their
interests.
- Technologies exist to `tap' magnetic fields given off by
electrical wires without detection. Less obscurely, any machine
with a network connection is a potential station for traffic
detection, but this scenario requires knowledge and access to
very low-level hardware (the network card) to pursue, if even
possible.
- A company Network General Inc. is one of many that manufactures
and markets sophisticated network monitoring tools that can
`filter' and read packets by arbitrary criteria for
troubleshooting purposes, but the cost of this type of device is
prohibitive for casual use.
Known instances of the above types of security breaches at a major
scale (such as at network hubs) are very rare. The greatest risks
tend to emerge locally. Note that all these approaches are almost
completely defused with the use of cryptography. (See the section
on that subject.)
The following text was excerpted from the Computer Systems
Laboratory (CSL) Bulletin for July 1993, entitled, "Connecting to
the Internet: Security Considerations." Ironically, one paragraph
specifically states the admitted security concerns for unencrypted
traffic:
> Ease of Spying and Spoofing: The vast majority of Internet
> traffic is unencrypted and therefore easily readable. As a
> result, e-mail, passwords, and file transfers can be monitored
> and captured using readily available software. Intruders have
> been known to monitor connections to well-known Internet sites
> for the purpose of gaining information that would allow them to
> crack security or to steal valuable information. This
> information sometimes permits intruders to spoof legitimate
> connections, i.e., trick system security into permitting normally
> disallowed network connections.
For more information on the CSL Laboratory see the
Thanks to P. Ferguson <fergp@sytex.com> for contributions to this
section.
_____
<2.4> How (in)secure is my account?
By default, not very. There are a multitude of factors that may
reinforce or compromise aspects of your privacy on the internet.
First, your account must be secure from other users. The universal
system is to use a password, but if it is `weak' (i.e. easy to
guess) this security is significantly diminished. Somewhat
surprisingly and frighteningly to some, certain users of the
system, particularly the administrator, generally have unlimited
access regardless of passwords, and may grant that access to
others. This means that they may read any file in your account
without detection.
Furthermore, not universally known, most UNIX systems keep fairly
extensive accounting records of when and where you logged in, what
commands you execute, and when they are executed (in fact, login
information is usually public). Most features of this `auditing' or
`process accounting' information are enabled by default after the
initial installation and the system administrator may customize it
to strengthen or weaken it to satisfy performance or privacy aims.
This information is frequently consulted for troubleshooting
purposes and may otherwise be ignored. This data tracks
unsuccessful login attempts and other `suspicious' activities on
the system. A traditional part of the UNIX system that tracks user
commands is easily circumvented by the user with the use of
symbolic links (described in `man ln').
UNIX implementations vary widely particularly in tracking features
and new sophisticated mechanisms are introduced by companies
regularly. Typically system adminstrators augment the basic UNIX
functionality with public-domain programs and locally-developed
tools for monitoring, and use them only to isolate `suspicious'
activity as it arises (e.g. remote accesses to the `passwd' file,
incorrect login attempts, remote connection attempts, etc.).
Generally, you should expect little privacy on your account for
various reasons:
- Potentially, every keystroke you type could be intercepted by
someone else.
- System administrators make extensive backups that are completely
invisible to users which may record the states of an account over
many weeks.
- Erased files can, under many operating systems, be undeleted.
- Most automated services keep logs of use for troubleshooting or
otherwise; for example FTP sites usually log the commands and
record the domain originations of users, including anonymous
ones.
- Some software exacerbates these problems. See the section on
``X Windows (in)security''.
Indepedent of malevolent administrators are fellow users, a much
more commonly harmful threat. There are multiple ways to help
ensure that your account will not be accessed by others, and
compromises can often be traced to failures in these guidelines:
- Choose a secure password. Change it periodically.
- Make sure to logout always.
- Do not leave a machine unattended for long.
- Make sure no one watches you when you type your password.
- Avoid password references in email.
- Be conservative in the use of the .rhost file.
- Use utilities like `xlock' to protect a station, but be
considerate.
Be wary of situations where you think you should supply your
password. There are only several basic situations where UNIX
prompts you for a password: when you are logging in to a system or
changing your password. Situations can arise in which prompts for
passwords are forged by other users, especially in cases where you
are talking to them (such as Internet Relay Chat). Also, be aware
that forged login screens are one method to illegitimately obtain
passwords.
(Thanks to Jim Mattson <mattson@cs.ucsd.edu> for contributions
here.)
_____
<2.5> How (in)secure are my files and directories?
The most important privacy considerations are related to file
rights, and many lapses can be traced to their misunderstood nature
or haphazard maintenance. Be aware of the rights associated with
your files and directories in UNIX. If the `x' (`execute') right on
your parent directory is off for users, groups, and other, these
users cannot gain information on anything in your directories.
Anything less may allow others to read, change, or even delete
files in your home directory. The rights on a directory supersede
the rights associated with files in that directory. For a
directory, `x' means that access to the files (or subdirectories)
in the directory is possible -- if you know their names. To list
the contents of the directory, however, requires the `r' right.
By default most accounts are accessable only to the owner, but the
initial configuration varies between sites based on administrator
preference. The default file mode specifies the initial rights
associated with newly created files, and can be set in the shell
with `umask'. The details of rights implementations tend to vary
between versions of UNIX. Consult man pages on `chmod' and `ls'.
Examples
--------
traver.lance % ls -ld ~
drwx------ 15 ld231782 1536 Jan 31 21:22 /users/ld231782/
Here is a listing of the rights associated with a user's home
directory, denoted by `~'. The columns at the left identify what
rights are available. The first column identifies the entry as a
directory, and the next three columns mean that read, write, and
execute rights, respectively, are permitted for that user. For
directories, the `x' right means that contents (file and
subdirectory names) within that directory can be listed. The
subsequent columns indicate that no other users have any rights to
anything in the directory tree originating at that point. They
can't even `see' any lower files or subdirectories; the hierarchy
is completely invisible to them.
traver.lance % ls -l msg
-rw-r--r-- 1 ld231782 35661 Jan 29 23:13 msg
traver.lance % chmod u=rw,g=,o= msg
traver.lance % ls -l msg
-rw------- 1 ld231782 35661 Jan 29 23:13 msg
Here the modes on the file `msg' were changed to take away rights
from `group' and `other'.
Note that `ls -l <file>' requires both the 'r' right to get the list
of files and subdirectories, and the 'x' right to access the files
and subdirectories in order to get their size, etc. For example,
suppose the directory `foo' has rights dr--r--r--, the following
is possible:
ls foo
These commands would fail independent of file rights:
ls -l foo
ls -l foo/file
cat foo/file
cd foo
If the directory `foo' has rights d--x--x--x, the following are
possible if it is known beforehand that `foo' contains an 'r'
readable file named `file':
ls -l foo/file
cat foo/file
cd foo
The following commands fail:
ls foo
ls -l foo
(Thanks to Uwe Waldmann <uwe@mpi-sb.mpg.de> for contributions here.)
_____
<2.6> How (in)secure is X Windows?
X Windows is the primary software developed by the MIT Athena
project (1983-1991) which was funded by commercial grants
primarily from DEC and IBM to develop applications to harness the
power of networks in enhancing computational tasks, particularly the
human-computer interface. The software implements a client-server
interface to a computer via graphical windows. In this case the
`client' is the application requesting or utilizing graphical
resources (such as windows or a mouse) and the `server' is the
machine that provides them. In many situations the client is an
application program running on the same machine as the server.
The great utility of X Windows comes from its complete dissociation
of the client and server so that windows may be `broadcast' to a
server at a remote location from the client. Unfortunately this
dynamic power also introduces many deep, intricate, and complicated
security considerations. The primary security and privacy issue
associated with X Windows is that much more sensitive data may be
sent over a network, and over wider regions, than in the case where
the human is situated near the host computer. Currently there is
no encryption of data such as screen updates and keystrokes in X
Windows.
Due to either intentional design decisions or unintentional design
flaws, early versions of the X Window system are extremely
insecure (the decision may have been made not to attempt to
overcome existing vulnerabiliies in the Unix system). Anyone with
an account on the server machine can disrupt that display or read
it electronically based on access to the device unix:0.0 by any
regular user. There are no protections from this type of access
in these versions. The problem arises because the security is
completely based on machine addresses rather than users, such that
any user at a `trusted' machine is himself trusted. Quoting from X
documentation (man Xsecurity):
> Any client on a host in the host access control list is allowed
> access to the X server. This system can work reasonably well in
> an environment where everyone trusts everyone, or when only a
> single person can log into a given machine...This system does not
> work well when multiple people can log in to a single machine and
> mutual trust does not exist.
With the access control list, the `xhost' command may prevent some
naive attempts (i.e. those other than the direct-access unix:0.0
evasion); the syntax as typed on the host machine is ``xhost
+[name]'' where [name] is the domain name or internet address of an
authorized client machine. By default clients running nonlocal to
the host are disabled. Public domain programs to disrupt a display
momentarily (such as 'flip' or slowly mirror the screen image, or
cause pixels to 'melt' down to the bottom) have been circulating on
the internet among hackers for several years and played as pranks
on unsuspecting or inexperienced users. Much more serious security
breaches are conceivable from similar mechanisms exploiting this
inherent weaknesses. (The minimal, easily-bypassed `trusted'
security mode of `xhost' has been jokingly referred to as ``X
Hanging Open, Security Terrible.'').
New versions of the X Window system (X11R5 and higher) by default
make server access as secure as the file system using a .Xauthority
file and 'magic cookies'. Remote machines must have a code in the
.Xauthority file in the home directory that matches the code
allowed by the server. Many older programs and even new
vendor-supplied code does not support or is incompatible with
`magic cookies'. The basic magic cookie mechanism is vulnerable to
monitoring techniques described earlier because no encryption of
keys occurs in transmission. X11R5 also includes other
sophisticated encryption mechanisms. Try `man Xsecurity' to find
out what is supported at your site. Even though improved security
mechanisms have been available in X Windows since ~1990, local
sites often update this software infrequently because installation
is extremely complex.
(Thanks to Marc Vanheyningen <mvanheyn@whale.cs.indiana.edu>,
Jim Mattson <mattson@cs.ucsd.edu>, and Bill Marshall
<marshall@cs.iastate.edu> for contributions here.)
_____
<2.7> How (in)secure is my email?
By default, not very. The characters that you are reading are
almost certainly encoded in ASCII, the American Standard Code for
Information Interchange that maps alphabetic and symbolic
characters onto numeric codes and vice versa. Virtually every
computer system uses this code, and if not, has ways of converting
to and from it. When you write a mail message, by default it is
being sent in ASCII, and since the standard is virtually
universal, there is no intrinsic privacy. Despite milleniums worth
of accumulated cryptographic knowledge, cryptographic technologies
are only recently being established that afford high priority to
privacy as a primary criteria in computer and network design. Some
potential pitfalls in privacy are as follows:
- The most serious threats are instances of immature or unscrupulous
system operators reading private mail in the `spool files' at a
local site (i.e. at the source or destination of the message),
such as a university.
- System administrators may also release files to law enforcement
agencies, but conventions and protocols for warrants involving
computer searches have still not been strongly established and
tested legally.
- Note that bounced messages go to postmasters at a given site in
their entirety. This means that if you address mail with an
incorrect address it has a good chance of being seen by a human
other than the recipient.
- Typically new user accounts are always set up such that the local
mail directory is private, but this is not guaranteed and can be
overridden.
- Finally, be aware that some mailing lists (email addresses of
everyone on a list) are actually publicly accessable via mail
routing software mechanisms. This `feature' can be disabled.
Most potential compromises in email privacy can be thoroughly
avoided with the use of strong end-to-end cryptography, which has
its own set of caveats (for example, unscrupulous administrators
may still be a threat if the encryption site is shared or
nonlocal). See the sections on ``email privacy'' and ``email
policies.''
_____
<2.8> How am I (not) liable for my email and postings?
As punishment or whatever, your system administrator can revoke
certain `privileges' such as emailing, USENET posting or reading
certain groups, file transferring, remote communications, or
generally any subset of capabilities available from your account.
This all is completely at the discretion of the local administrator
and under the procedures followed at a particular site, which in
many cases are haphazard and crisis-oriented. Currently there are
virtually no widespread, uniform guidelines or procedures for
restricting use to any internet services, and local administrators
are free to make arbitrary decisions on access.
Today punitive measures are regularly applied in various situations.
In the typical scenario complaint(s) reach a system adminstrator
regarding abuses by a user, usually but not necessarily preceded by
complaints to the user in email, regarding that person's
objectionable email or postings. `abusive' posters to USENET are
usually first given admonitions from their system administrators as
urged by others on the `net'. (The debate persists endlessly on
many newsgroups whether this is also used as a questionable means
of attacking or silencing `harmless crackpots' or censoring
unpopular opinions.)
System administrators at remote sites regularly cooperate to
'squelch' severe cases of abuse. In general, however, by tradition
Usenet readers are remarkably tolerant of diverse views and uses of
the system, but a colorful vocabularly of slang helps describe
their alternatives when this patience is sapped: the options
wielded by the individual user are to simply advance to the next
message (referred to as ``hitting the `n' key''), or to `plonk'
annoying posters (according to the Hacker's Dictionary, the sound a
jerk makes at the end of a fall to the bottom of a kill file).
In cases where punitive actions are applied, generally system
administrators are least likely to restrict email. USENET postings
are much more commonly restricted, either to individual users or
entire groups (such as a university campus). Restrictions are most
commonly associated with the following `abuses':
- harassing or threatening notes, `email terrorism'
- illegal uses, e.g. piracy or propagation of copyrighted material
- `ad hominem' attacks, i.e. insulting the reputation of the
poster instead of citing the content of the message
- intentional or extreme vulgarity and offensiveness
- inappropriate postings, esp. binary files in regular groups
`mail-bombing': inundating mail boxes with numerous or massive
files
Major problems originate from lack of distinctions in private and
official email or postings. Most users have internet access via
accounts at businesses or universities and their activities on the
internet can be construed as representative of their parent
organizations. Many people put disclaimers in their `signatures' in
an attempt dissociate their identity and activities from parent
organizations as a precaution. A recent visible political case
involves the privacy of electronic mail written by White House
staff members of the Bush administration. Following are some
guidelines:
- Acquaint yourself with your company or university policy.
- If possible, avoid use of your company email address for private
communication.
- Use a disclaimer.
- Keep a low profile (avoid `flamewars' or simply don't post).
- Avoid posting information that could be construed to be
proprietary or `internal'.
Famous Usenet contributor Carl Kadie and associates maintain an
archive tracking user liability as part of the Computers and
Academic Freedom project (see also the section on ``internet use
policies''). The following references are available from
ftp.eff.org:
/pub/academic/banned.1991
/pub/academic/banned.1992
---
Computer material that was banned/challenged in academia in 1991
and 1992 including USENET hierarchies.
/pub/academic/cases
---
This is an on-line collection of information about specific
computers and academic freedom cases. File README is a detailed
description of the items in the directory.
/pub/academic/faq/netnews.liability
---
Notes on university liability for Usenet.
______
<2.9> Who is my sysadmin? What does s/he know about me?
The requirements and screening for getting a system administration
job (and thereby access to all information on a system) vary widely
between sites and are sometimes frighteningly lax, especially at
universities. Many UNIX systems at universities are largely
managed by undergraduates with a background in computing and often
`hacking'. In general, commercial and industrial sites are more
strict on qualifications and background, and government sites are
extremely strict.
The system adminstrator (root user) can monitor what commands you
used and at what times. S/he may have a record (backups) of files
on your account over a few weeks. S/he can monitor when you send
email or post USENET messages, and potentially read either. S/he
may have access to records indicating what hosts you are using,
both locally and elsewhere. Administrators sometimes employ
specialized programs to track `strange' or `unusual' activity,
which can potentially be misused.
______
<2.10> Why is privacy (un)stable on the internet?
For the numerous reasons listed above, privacy should not be an
expectation with current use of the internet. Furthermore, large
parts of the internet are funded by the U.S. NSF (National Science
Foundation) which places certain restrictions on its use (such as
prohibiting commercial use). Some high-level officials in this and
other government agencies may be opposed to emerging techniques to
guarantee privacy (such as encryption and anonymous services).
Historically the major threats to privacy on the internet have been
local. Perhaps the most common example of this are the widespread
occurrences of university administrators refusing to carry some
portion of USENET newsgroups labelled as `pornographic'. The
`alternative' hierarchy in the USENET system, which has virtually
no restrictions on propagation and new group creation, is
frequently targeted (although this material may appear anywhere).
From the global point of view traffic is generally completely
unimpeded on the internet and only the most egregious offenders
are pursued. For example, verbatim transcriptions of copyrighted
material (such as newspaper or magazine articles) are posted to
USENET with regularity without major consequences (some email
complaints may ensue). More astonishing to some is that currently
significant portions of USENET traffic, and less so internet
traffic, is comprised of sexually-explicit digitized images almost
entirely originating from copyrighted material (newsgroups such as
`alt.sex' regularly have the highest traffic).
______
<2.11> What is the future of privacy on the internet?
Some argue that the internet currently has an adequate or
appropriate level of privacy. Others will argue that as a
prototype for future global networks it has woefully inadequate
safeguards. The internet is growing to become a completely global,
international superhighway for data, and this traffic will
inevitably entail data such as voice messages, postal mail, and
many other items of extremely personal nature. Computer items that
many people consider completely private (such as their local hard
drives) will literally be inches from global network connections.
Also, sensitive industrial and business information is exchanged
over networks currently and this volume may conceivably merge with
the internet.
Most would agree that, for these basic but sensitive uses of the
internet, no significant mechanisms are currently in place to
ensure much privacy. New standards are calling for uniform
introduction of `privacy enhanced mail' (PEM) which uses encryption
technologies to ensure privacy, so that privacy protection is
automatic, and may significantly improve safeguards.
The same technology that can be extremely destructive to privacy
(such as with surreptitious surveilance) can be overwhelmingly
effective in protecting it (e.g. with encryption). Some government
agencies are opposed to unlimited privacy in general, and believe
that it should lawfully be forfeited in cases of criminal conduct
(e.g. court-authorized wiretapping). However, powerful new
technologies to protect privacy on computers are becoming
increasingly popular, provoking some to say that ``the cat is out
of the bag'' and the ``genie can't be put back in the bottle''. In
less idiomatic terms, they believe that the spread of strong
cryptography is already underway will be socially and technically
unstoppable.
To date, no feasible system that guarantees both secure
communication and government oversight has been proposed (the two
goals are largely incompatible). Proposals for ``registration'' of
secret keys (by D. Denning on sci.crypt and the Clipper chip proposal,
for example) have been met with hot controversy at best and ridicule
and derision at worst, mainly because of concerns for the right to
privacy and objections of inherent feasibility. Electronic privacy
issues, and particularly the proper roles of networks and the
internet, will foreseeably become highly visible and explosive over
the next few years.
ANONYMITY
=========
_____
<3.1> What is `anonymity' on the internet?
Simply stated, anonymity is the absence of identity, the ultimate in
privacy. However, there are several variations on this simple theme.
A person may wish to be consistently identified by a certain pseudonym
or `handle' and establish a reputation under it in some area,
providing pseudo-anonymity. A person may wish to be completely
untraceable for a single one-way message (a sort of `hit-and-run').
Or, a person may wish to be openly anonymous but carry on a
conversation with others (with either known or anonymous identities)
via an `anonymous return address'. A user may wish to appear as a
`regular user' but actually be untraceable. Sometimes a user wishes
to hide who he is sending mail to (in addition to the message itself).
The anonymous item itself may be directed at individuals or groups.
A user may wish to access some service and hide all signs of the
association.
All of these uses are feasible on the internet but are currently
tricky to carry out in practice, because of all the tracking
mechanisms inherent to operating systems and network protocols.
Officials of the NSF and other government agencies may be opposed to
any of these uses because of the potential for abuse. Nevertheless,
the inherent facelessness of large networks will always guarantee a
certain element of anonymity.
_____
<3.2> Why is `anonymity' (un)important on the internet?
Anonymity is another powerful tool that can be beneficial or
problematic depending on its use. Arguably absence of
identification is important as the presence of it. It may be the
case that many strong benefits from electronic anonymity will be
discovered that were unforeseen and unpredicted, because true
anonymity has been historically very difficult to establish.
One can use anonymity to make personal statements to a colleague
that would sabotage a relationship if stated openly (such as
employer/employee scenarios). One can use it to pass information
and evade any threat of direct retribution. For example,
`whistleblowers' reporting on government abuses (economic, social,
or political) can bring issues to light without fear of stigma or
retaliation. Sensitive, personal, potentially damaging information
is often posted to some USENET groups, a risky situation where
anonymity allows conversations to be carried on completely
independent of the identities of the participants. Some police
departments run phone services that allow anonymous reporting of
crimes; such uses would be straightforward on the network.
Anonymity can be extremely important and potentially lifesaving
diagnoses and discussions carried out on medical or theurapeutic
newsgroups. Unfortunately, extortion and harassment become more
insidious with assurances of anonymity.
_____
<3.3> How can anonymity be protected on the internet?
The chief means, as alluded to above, are masking identities in
email and posting. However, anonymous accounts (public accounts as
accessable and anonymous as e.g. public telephones) may be
effective as well, but this use is generally not officially
supported and even discouraged by some system adminstrators and NSF
guidelines. The nonuniformity in the requirements of obtaining
accounts at different sites and institutions makes anonymous
accounts generally difficult to obtain to the public at large.
Many communications protocols are inherently detrimental to
anonymity. Virtually every protocol in existence currently
contains information on both sender and receiver in every packet.
New communications protocols will likely develop that guarantee
much higher degrees of secure anonymous communication.
_____
<3.4> What is `anonymous mail'?
One approach to `anonymizing' mail has been to set up an `anonymous
server' that, when activated by email to its address, responds by
allocating and supplying an `anonymous ID' that is unique to the
person requesting it (based on his email address). This will vary
for the same person for different machine address email
originations. To send anonymous mail, the user sends email directed
to the server containing the final destination. The server
`anonymizes' the message by stripping of identification information
and forwards the message, which appears to originate from the
anonymous server only from the corresponding anonymous user id.
This is the `interactive' use of anonymity or pseudonymity
mentioned above.
Another more `fringe' approach is to run a `cypherpunk' remailer
from a regular user account (no root system privileges are
required). These are currently being pioneered by Eric Hughes and
Hal Finney <hal@alumni.caltech.edu>. The operator runs a process on
a machine that anonymizes mail sent to him with certain
characteristics that distinguish it from his regular incoming mail
(typically fields in the header). One has been implemented as a
PERL script running on UNIX. Several of these are in existence
currently but sites and software currently somewhat unstable; they
may be in operation outside of system administrator knowledge.
The remailers don't generally support anonymous return addresses.
Mail that is incorrectly addressed is received by the operator.
Generally the user of the remailer has to disavow any
responsibility for the messages forwarded through his system,
although actually may be held liable regardless.
These approaches have several serious disadvantages and weaknesses:
- The anonymous server approach requires maintaining a mapping of
anonymous ID's to real addresses that must be maintained
indefinitely. One alternative is to allow `deallocation' of
aliases at the request of the user, but this has not been
implemented yet.
- Although an unlikely scenario, traffic to any of these sites could
conceivably be monitored from the `outside', necessitating the
use of cryptography for basic protection,.
- Local administrators can shut them down either out of caprice or
under pressure from local, network, or government agencies.
- Unscrupulous providers of the services can monitor the traffic
that goes through them.
- Some remailers keep logs that may be inspected.
- The cypherpunk approach tends to be highly unstable because these
operators are basically network users who do not own the
equipment and are accountable to their own system
administrators, who may be unaware of the use and unsympathetic
to the philosophy of anonymity when the operation is discovered,
regarding it as illicit use.
- In all cases, a high degree of trust is placed in the anonymous
server operator by the user.
Currently the most direct route to anonymity involves using SMTP
protocols to submit a message directly to a server with arbitrary
field information. This practice, not uncommon to hackers, and the
approach used by remailers, is generally viewed with hostility by
most system administrators. Information in the header routing data
and logs of network port connection information may be retained
that can be used to track the originating site. In practice, this
is generally infeasible and rarely carried out. Some
administrators on the network will contact local administrators to
request a message be tracked and its writer admonished or punished
more severely (such as revoking the account), all of this actually
happening occasionally but infrequently.
_____
<3.5> What is `anonymous posting'?
Anonymous servers have been established as well for anonymous Usenet
posting with all the associated caveats above (monitored traffic,
capricious or risky local circumstances, logging). Make sure to
test the system at least once by e.g. anonymous posting to
misc.test (however some operators don't recommend this because many
sites `autorespond' to test messages, possibly causing the
anonymous server to allocate anonymous IDs for those machines).
Another direct route involves using NNTP protocols to submit a
message directly to a newserver with arbitrary field information.
This practice, not uncommon to hackers, is also generally viewed
with hostility by most system administrators, and similar
consequences can ensue.
See also:
- Anonymity on the Internet FAQ, rtfm.mit.edu:
/pub/usenet/news.answers/net-anonymity.
- ``Censorship Fights Heat Up on Academic Networks'', W. M.
Bulkeley, Wall St. Journal, May 24 1993 p. B1.
- ``A Computer Program That Can Censor Electronic Messages Sets
Off a Furor'', D. L. Wilson, Chronicle of Higher Education,
May 12, 1993 p. A25.
- Information Week, May 31 1993 pg. 84 summarizes the Wall St.
Journal article.
_____
<3.6> Why is anonymity (un)stable on the internet?
As noted, many factors compromise the anonymity currently available
to the general internet community, and these services should be
used with great caution. To summarize, the technology is in its
infancy and current approaches are unrefined, unreliable, and not
completely trustworthy. No standards have been established and
troubling situations of loss of anonymity and bugs in the software
are prevalent. Here are some encountered and potential bugs:
- One anonymous remailer reallocated already allocated anonymous
return addresses.
- Others passed signature information embedded in messages
unaltered.
- Address resolution problems resulting in anonymized mail bounced
to a remailer are common.
- Forgeries to the anonymous server itself are a problem, possibly
allowing unauthorized users to potentially glean anon ID - email
address mappings in the alias file. This can be remedied with
the use of passwords.
- Infinite mail loops are possible with chaining remailers.
Source code is being distributed, tested, and refined for these
systems, but standards are progressing slowly and weakly. The
field is not likely to improve considerably without official
endorsement and action by network agencies. The whole idea is
essentially still in its infancy and viewed with suspicion and
distrust by many on the internet, seen as illegitimate or favorable
to criminality. The major objection to anonymity over regular
internet use is the perceived lack of `accountability' to system
operators, i.e. invulnerability to account restrictions resulting
from outside complaints. System adminstrators at some sites have
threatened to filter anonymous news postings generated by the
prominent servers from their redistribution flows. This may only
have the effect of encouraging server operators to create less
characteristically detectable headers. Probably the least
problematic approach, and the most traditional to Usenet, is for
individual users to deal with anonymous mail however they prefer,
e.g. ignoring it or filtering it with kill files.
_____
<3.7> What is the future of anonymity on the internet?
New anonymous protocols effectively serve to significantly increase
safeguards of anonymity. For example, the same mechanism that
routes email over multiple hosts, thereby threatening its privacy,
can also be used to guarantee it. In a scheme called `chaining' an
anonymous message is passed through multiple anonymous servers
before reaching a destination. In this way generally multiple
links of the chain have to be `broken' for security to be
compromised. Re-encryption at each link makes this scenario even
more unlikely. Even more significantly the anonymous remailers
could be spread over the internet globally so that local weaknesses
(such as corrupt governments or legal wiretapping within a nation)
would be more unlikely to sacrifice overall security by message
tracing. However, remailers run by corrupt operators are possible.
The future of anonymous services on the internet is, at this time,
highly uncertain and fraught with peril. While specific groups seem
to benefit significantly from anonymous posting capabilities, many
feel that unlimited newsgroup scope for anonymous posting is a
disruptive and dangerous idea and detracts from discussions in
`serious' groups. The introduction of unlimited group anonymity
may have fundamental repercussions on Usenet conventions and
distribution mechanisms such as moderated and `alt' groups have had
in the past. For example, as part of new group creation, the
charter may specify whether `anonymous' posting is (un)welcome.
Nevertheless, the widespread introduction and use of anonymity may
be inevitable. Based on traffic statistics, anonymous services are
in huge demand. Pervasive and readily available anonymity could
carry significant and unforeseen social consequences. However, if
its use is continued to be generally regarded as subversive it may
be confined to the underground. The ramifications of the
widespread introduction of anonymity to Usenet are still largely
unknown. It is unclear whether it will provoke signficant amounts
of new traffic or, instead of expansion, cause a shift where a
greater portion of existing traffic is anonymized. Conceivably the
services could play a role in influencing future mainstream social
acceptance of Usenet.
* * *
This is Part 1 of the Privacy & Anonymity FAQ, obtained via anonymous
FTP to rtfm.mit.edu:/pub/usenet/news.answers/net-privacy/ or
newsgroups news.answers, sci.answers, alt.answers every 21 days.
Written by L. Detweiler <ld231782@longs.lance.colostate.edu>.
All rights reserved.
------------------------------------------------------------------------
Date: 05-21-94 Msg # 12471
To: ALL Conf: (2120) news.answers
From: LD231782@LONGS.LANCE.COLO Stat: Public
Subj: Privacy & Anonymity on th Read: Yes
------------------------------------------------------------------------
@FROM :LD231782@LONGS.LANCE.COLOSTATE.EDU
@SUBJECT:Privacy & Anonymity on the Internet FAQ (2 of 3)
@PACKOUT:05-21-94
Message-ID: <net-privacy/part2_769514754@rtfm.mit.edu>
Newsgroups: sci.crypt,comp.society.privacy,alt.privacy,sci.answers
comp.answers,alt.answers,news.answers
Organization: TMP Enterprises
Archive-name: net-privacy/part2
Last-modified: 1993/10/11
Version: 3.2
IDENTITY, PRIVACY, and ANONYMITY on the INTERNET
================================================
(c) Copyright 1993 L. Detweiler. Not for commercial use except by
permission from author, otherwise may be freely copied. Not to be
altered. Please credit if quoted.
SUMMARY
=======
Information on email and account privacy, anonymous mailing and
posting, encryption, and other privacy and rights issues associated
with use of the Internet and global networks in general.
(Search for <#.#> for exact section. Search for '_' (underline) for
next section.)
PART 2
====== (this file)
Issues
------
<4.1> What is the Electronic Frontier Foundation (EFF)?
<4.2> Who are Computer Professionals for Social Responsibility (CPSR)?
<4.3> What was `Operation Sundevil' and the Steve Jackson Game case?
<4.4> What is Integrated Services Digital Network (ISDN)?
<4.5> What is the National Research and Education Network (NREN)?
<4.6> What is the FBI's proposed Digital Telephony Act?
<4.7> What is U.S. policy on freedom/restriction of strong encryption?
<4.8> What other U.S. legislation is related to privacy?
<4.9> What are references on rights in cyberspace?
<4.10> What is the Computers and Academic Freedom (CAF) archive?
<4.11> What is the Conference on Freedom and Privacy (CFP)?
<4.12> What is the NIST computer security bulletin board?
Clipper
-------
<5.1> What is the Clipper Chip Initiative?
<5.2> How does Clipper blunt `cryptography's dual-edge sword'?
<5.3> Why are technical details of the Clipper chip being kept secret?
<5.4> Who was consulted in the development of the Clipper chip?
<5.5> How is commerical use/export of Clipper chips regulated?
<5.6> What are references on the Clipper Chip?
<5.7> What are compliments/criticisms of the Clipper chip?
<5.8> What are compliments/criticisms of the Clipper Initiative?
<5.9> What are compliments/criticisms of the Clipper announcement?
<5.10> Where does Clipper fit in U.S. cryptographic technology policy?
ISSUES
======
_____
<4.1> What is the Electronic Frontier Foundation (EFF)?
From ftp.eff.org:/pub/EFF/mission_statement:
> A new world is arising in the vast web of digital, electronic
> media which connect us. Computer-based communication media like
> electronic mail and computer conferencing are becoming the basis
> of new forms of community. These communities without a single,
> fixed geographical location comprise the first settlements on an
> electronic frontier.
>
> While well-established legal principles and cultural norms give
> structure and coherence to uses of conventional media like
> newspapers, books, and telephones, the new digital media do not
> so easily fit into existing frameworks. Conflicts come about as
> the law struggles to define its application in a context where
> fundamental notions of speech, property, and place take
> profoundly new forms. People sense both the promise and the
> threat inherent in new computer and communications technologies,
> even as they struggle to master or simply cope with them in the
> workplace and the home.
>
> The Electronic Frontier Foundation has been established to help
> civilize the electronic frontier; to make it truly useful and
> beneficial not just to a technical elite, but to everyone; and to
> do this in a way which is in keeping with our society's highest
> traditions of the free and open flow of information and
> communication.
EFF was started by the multimillionaire Mitchell Kapor, founder of
Lotus software, and John Barlow, lyricist for the Grateful Dead
rock band. A highly publicized endeavor of the organization
involved the legal defense of Steve Jackson Games after an FBI
raid and an accompanying civil suit (see section on ``Steve
Jackson Games''). The foundation publishes EFF News (EFFector
Online) electronically, send requests to effnews-request@eff.org.
In a letter to Mitchell Kapor from the Chairman of the Subcommittee
with primary jurisdiction over telecommunications policy dated
November 5, 1991, Representative Edward J. Markey complemented
Mitchell Kapor on his ``insights on the development of a national
public information infrastructure'' which ``were appreciated greatly
by myself and the Members of the Subcommittee'' (complete text in
ftp.eff.com:/pub/pub-infra/1991-12):
> ...we need to pursue policies that encourage the Bell companies to
> work with other sectors of the communications industry to create
> a consumer-oriented, public information network. Please let me or
> my staff know what policies you and others in the computer
> industry believe would best serve the public interest in creating
> a reasonably priced, widely available network in which
> competition is open and innovation rewarded. I also want to
> learn what lessons from the computer industry over the past ten
> to fifteen years should apply to the current debate on
> structuring the information and communications networks of the
> future....I ask your help in gaining input from the computer
> industry so that the Subcommittee can shape policies that will
> bring this spirit of innovation and entrepreneurship to the
> information services industry.
ftp.eff.org
===========
/pub/EFF/about-eff
---
A file of basic information about EFF including goals, mission,
achievements, and current projects. Contains a membership form.
/pub/EFF/historical/founding-announcement
---
EFF founding press release.
/pub/EFF/historical/eff-history
---
John Perry Barlow's ``Not Terribly Brief History of the EFF'' (July
10, 1990). How EFF was conceived and founded, major legal cases,
and the organizational directions.
/pub/EFF/historical/legal-case-summary
---
EFF legal case summary.
_____
<4.2> Who are Computer Professionals for Social Responsibility (CPSR)?
The Computer Professionals for Social Responsibility have been
working to protect and promote electronic civil liberties issues
since ~1982. The group has three offices (Palo Alto, Cambridge,
Washington, DC) and 20 chapters. It is involved in litigation
against the FBI, The NSA, NIST, the Secret Service and other other
U.S. government agencies to declassify and provide documentation
on issues such as Operation Sundevil, the FBI wiretap proposal,
NSA's interference in crypography, the breakup of the 2600 raid in
Arlington, Va in Nov 1992. Members speak frequently in front on
Congress, state legislators and public utility commissions to
testify on privacy, information policy, computer security, and
caller identification.
CPSR has created an extensive Internet Privacy library available
via FTP, Gopher, WAIS, and email at cpsr.org, currently comprising
the largest collection of privacy documents on the internet. For
more information, anonymous FTP to cpsr.org:/cpsr/cpsr_info.
(Thanks to Dave Banisar <banisar@washofc.cpsr.org> for contributions
here.)
_____
<4.3> What was `Operation Sundevil' and the Steve Jackson Game case?
In the early 1990's a fear spread among U.S. law enforcement
agencies on the illicit activities of `hackers' and `phreakers'
involved in such activities as computer tampering via modem, credit
card fraud, and long-distance call thievery. (Descriptions of real
`hacking' exploits can be found in the book Cyberpunk by J. Markoff
and K. Hafner.)
See ftp.eff.org:/pub/SJG/General_Information/EFFector1.04:
> `Operation Sundevil,' the Phoenix-inspired crackdown of May
> 8,1990, concentrated on telephone code-fraud and credit-card
> abuse, and followed this seizure plan with some success.
> [Bulletin Board Systems] went down all over America, terrifying
> the underground and swiftly depriving them of at least some of
> their criminal instruments. It also saddled analysts with some
> 24,000 floppy disks, and confronted harried Justice Department
> prosecutors with the daunting challenge of a gigantic nationwide
> hacker show-trial involving highly technical issues in dozens of
> jurisdictions.
Massive `show-trials' never materialized, although isolated
instances of prosecution were pursued. The movement reached a
crescendo in Texas with the highly publicized case of illegal
search and seizure involving the Steve Jackson Games company of
Austin Texas on March 1, 1990. From the column GURPS' LABOUR LOST
by Bruce Sterling <bruces@well.sf.ca.us> in Fantasy and Science
Fiction Magazine:
> In an early morning raid with an unlawful and unconstitutional
> warrant, agents of the Secret Service conducted a search of the
> SJG office. When they left they took a manuscript being prepared
> for publication, private electronic mail, and several computers,
> including the hardware and software of the SJG Computer Bulletin
> Board System. Yet Jackson and his business were not only
> innocent of any crime, but never suspects in the first place.
> The raid had been staged on the unfounded suspicion that
> somewhere in Jackson's office there `might be' a document
> compromising the security of the 911 telephone system.
(A detailed and vivid account of the seizure is documented in the
book ``The Hacker Crackdown'' by Bruce Sterling.) FBI agents
involved in the seizure were named in a civil suit filed on behalf
of Steve Jackson Games by The Electronic Frontier Foundation. See
information on EFF below. From an article by Joe Abernathy in the
Houston Chronicle ~Feb 1, 1993:
> AUSTIN -- An electronic civil rights case against the Secret
> Service closed Thursday with a clear statement by federal
> District Judge Sam Sparks that the Service failed to conduct a
> proper investigation in a notorious computer crime crackdown,
> and went too far in retaining custody of seized equipment.
>
> Secret Service Special Agent Timothy Foley of Chicago, who was in
> charge of three Austin computer search-and-seizures on March 1,
> 1990, that led to the lawsuit, stoically endured Spark's rebuke
> over the Service's poor investigation and abusive computer
> seizure policies. While the Service has seized dozens of
> computers since the crackdown began in 1990, this is the first
> case to challenge the practice.
>
> Sparks grew visibly angry when it was established that the Austin
> science fiction magazine and game book publisher was never
> suspected of a crime, and that agents did not do even marginal
> research to establish a criminal connection between the firm and
> the suspected illegal activities of an employee, or to determine
> that the company was a publisher. Indeed, agents testified that
> they were not even trained in the Privacy Protection Act at the
> special Secret Service school on computer crime.
>
> "How long would it have taken you, Mr. Foley, to find out what
> Steve Jackson Games did, what it was?" asked Sparks. "An hour?
>
> "Was there any reason why, on March 2, you could not return to
> Steve Jackson Games a copy, in floppy disk form, of everything
> taken?
>
> "Did you read the article in Business Week magazine where it had
> a picture of Steve Jackson -- a law-abiding, tax-paying citizen
> -- saying he was a computer crime suspect?
>
> "Did it ever occur to you, Mr. Foley, that seizing this material
> could harm Steve Jackson economically?"
>
> Foley replied, "No, sir," but the judge offered his own answer.
>
> "You actually did, you just had no idea anybody would actually go
> out and hire a lawyer and sue you."
>
> More than $200,000 has been spent by the Electronic Frontier
> Foundation in bringing the case to trial. The EFF was founded by
> Mitchell Kapor amid a civil liberties movement sparked in large
> part by the Secret Service computer crime crackdown.
The trial is now recognized as a legal precedent explicitly
guaranteeing protection of electronically stored information under
the Privacy Protection Act, and safeguarding bulletin boards and
electronic mail by federal wiretap laws limiting government
surveillance powers. See the Wall Street Journal, 3/18/93, p. B1,
``Ruling Gives Privacy a High-Tech Edge''
ftp.eff.org
===========
/pub/cud/papers/sundevil
---
A collection of information on Operation SunDevil by the Epic
nonprofit publishing project. Everything you wanted to know but
could never find.
/pub/cud/papers/sj-resp
---
Steve Jackson's response to the charges against him.
_____
<4.4> What is Integrated Services Digital Network (ISDN)?
ISDN is a high-speed data communications standard that utilizes
existing copper telephone lines, and is a possible inexpensive and
intermediate alternative to laying fiber optic cable for phone
networks. The speeds involved may be sufficient for audio and
video transmission applications. G. V. der Leun in the file
ftp.eff.org: /pub/pub-infra/1991-11:
> Telecommunications in the United States is at a crossroads. With
> the Regional Bell Operating Companies now free to provide
> content, the shape of the information networking is about to be
> irrevocably altered. But will that network be the open,
> accessible, affordable network that the American public needs?
> You can help decide this question.
>
> The Electronic Frontier Foundation recently presented a plan to
> Congress calling for the immediate deployment of a national
> network based on existing ISDN technology, accessible to anyone
> with a telephone connection, and priced like local voice service.
> We believe deployment of such a platform will spur the
> development of innovative new information services, and maximize
> freedom, competitiveness, and civil liberties throughout the
> nation.
>
> The EFF is testifying before Congress and the FCC; making
> presentations to public utility commisions from Massachusetts to
> California; and meeting with representatives from telephone
> companies, publishers, consumer advocates, and other stakeholders
> in the telecommunications policy debate.
>
> The EFF believes that participants on the Internet, as pioneers on
> the electronic frontier, need to have their voices heard at this
> critical moment.
To automatically receive a description of the platform and details,
send mail to archive-server@eff.org, with the following line:
send documents open-platform-overview
or send mail to eff@eff.org. See also the Introduction to the EFF
Open Platform Proposal in ftp.eff.org:/pub/pub-infra/1991-02.
References
==========
``Digital Data On Demand.'' MacWorld, 2/82 (page 224).
---
56Kbps vs. ISDN services and products. See comments by J. Powers
in ftp.eff.org:pub/pub-infra/1992-02.
``Telephone Service That Rings of the Future.'' By Joshua Quittner.
Newsday, Tue, Jan 7 1992.
---
Implications of ISDN for the masses, written in popular science
style. John Perry Barlow (cofounder EFF). Regional telephone
companies (Ohio Bell). ISDN as ``Technological Rorschach Test.''
Anecdotes about McDonald's, Barbara Bush teleconferencing. See
complete text in ftp.eff.org:/pub/pub-infra/1992-01.
ftp.eff.org:/pub/pub-infra/
---
Files 1991-11 through 1992-05 containing email from the EFF public
infrastructure group organized by month. Opinions and facts on
the pros and cons of ISDN, Integrated Services Digital Network.
Uses of ISDN (phone video, audio, etc.) Japanese model.
Alternatives to ISDN (HDSL, ADSL, fiber optics). Technical
specifications of ISDN, implementation details, cost issues,
political obstacles, (RBOC, Regional Bell Operating Companies or
`Baby Bells', e.g. NET, New England Telephone). Influencing
development of future networks (e.g. ISDN and NREN, National
Research and Education Network), encouraging competition (cable
TV systems). Press releases and news articles. Letter from Rep.
E. J. Markey to M. Kapor.
_____
<4.5> What is the National Research and Education Network (NREN)?
The Nation Research and Education Network was introduced in
legislation cosponsored by Sen. A. Gore to promote high-speed data
network infrastructure augmenting the internet with up to 50 times
faster transmission rates. The bill passed the House on November
20, 1991, the Senate on November 22, 1991, and was signed by the
President on December 9, 1991.
ftp.eff.org
===========
/pub/internet-info/gore.bill
---
102nd congress 1st Session. Text of high performance computing
bill cosponsored by Sen. A. Gore.
/pub/EFF/legislation/gore-infrastructure-bill
---
The text of S.2937, the Information Infrastructure and Technology
Act of 1992 introduced by Senator Gore to expand Federal efforts
to develop technologies for applications of high-performance
computing and high-speed networking, and to provide for a
coordinated Federal program to accelerate development and
deployment of an advanced information infrastructure.
U.S. SAID TO PLAY FAVORITES IN PROMOTING NATIONWIDE COMPUTER NETWORK
By John Markoff, N.Y. Times (~18 Dec 91).
---
President Bush's legislation for natiowide computer data
`superhighway.' IBM-MCI venture as monopoly destructive to fair
competition and innovation? National Science Foundation NSFnet.
complete text in /pub/pub-infra/1991-12.
Commentary
==========
/pub/academic/statements/nren.privacy.cpsr
---
``Proposed Privacy Guidelines for the NREN'' -- Statement of Marc
Rotenberg, Washington Director Computer Professionals for Social
Responsibility (CPSR).
/pub/internet-info/cisler.nren
---
The National Research and Education Network: Two meetings Steve
Cisler, Senior Scientist Apple Computer Library December 17, 1990
Summary of meetings exploring educational issues of NREN by
diverse members of academia and industry.
/pub/internet-info/privatized.nren
---
Feb. 14 1991 essay by M. Kapor advocating advantages of a private
National Public Network, and specific recommendations for open
NREN policies encouraging competition.
_____
<4.6> What is the FBI's proposed Digital Telephony Act?
``Providers of electronic communication services and private branch
exchange operators shall provide within the United States
capability and capacity for the government to intercept wire and
electronic communications when authorized by law...''
From `BBS Legislative Watch: FBIs Wiretapping Proposal Thwarted' by
S. Steele in Boardwatch Magazine, Feb. 1993, p. 19-22:
> In a move that worried privacy experts, software manufacturers and
> telephone companies, the FBI proposed legislation to amend the
> Communications Act of 1934 to make it easier for the Bureau to
> perform electronic wiretapping. The proposed legislation,
> entitled 'Digital Telephony,' would have required communications
> service providers and hardware manufacturers to make their
> systems 'tappable' by providing 'back doors' through which law
> enforcement officers could intercept communications. Furthermore,
> this capability would have been provided undetectably, while the
> communications was in progress, exclusive of any communications
> between other parties, regardless of the mobility of the target
> of the FBI's investigation, and without degradation of service.
>
> ... under the proposal, the Department of Justice (DOJ) can keep
> communications products off the market if it determines that
> these products do not meet the DOJ's own ... guidelines. This
> [could] result in increased costs and reduced competitiveness for
> service providers and equipment manufacturers, since they will be
> unlikely to add any features that may result in a DOJ rejection
> of their entire product. ... the FBI proposal suggests that the
> cost of this wiretapping 'service' to the Bureau would have to be
> borne by the service provider itself ...
>
> The Electronic Frontier Foundation organized a broad coalition of
> public interest and industry groups, from Computer Professionals
> for Social Responsibilty (CPSR) and the ACLU to AT&T and Sun
> Microsystems, to oppose the legislation. A white paper produced
> by the EFF and ratified by the coalition, entitled, `An Analysis
> of the FBI Digital Telephony Proposal,' was widely distributed
> throughout the Congress. ... The Justice Department lobbied hard
> in the final days to get Congress to take up the bill before
> Congress adjourned, but the bill never ... found a Congressional
> sponsor (and was therefore never officially introduced). The FBI
> [may] reintroduce "Digital Telephony" when the 103rd Congress
> convenes in January.
See also the section on the Clipper chip.
ftp.eff.org
===========
/pub/EFF/legislation/fbi-wiretap-bill
/pub/EFF/legislation/new-fbi-wiretap-bill
---
A bill to ensure the continuing access of law enforcement to the
content of wire and electronic communications when authorized by
law and for other purposes. Version 2 of the bill after FBI
changes in response to public response.
/pub/EFF/papers/decrypting-puzzle-palace
---
Analysis of the NSA and FBI role in future wiretapping and
cryptographic regulation roles, by J. Barlow, cofounder of the
EFF (May 1992).
/pub/EFF/legal-issues/eff-fbi-analysis
---
The EFF-sponsored analysis of the FBI's Digital Telephony proposal.
_____
<4.7> What is U.S. policy on freedom/restriction of strong encryption?
The Clipper announcement says ``we [the Clinton Administration]
understand the importance of encryption technology in
telecommunications and computing'' and specifically addresses the
question, ``would the Administration be willing to use legal
remedies to restrict access to more powerful encryption devices?''
It states that ``The U.S. [is not] saying that `every American, as
a matter of right, is entitled to an unbreakable commercial
encryption product' '' although currently ``the Administration is
not saying, `since [strong] encryption threatens the public safety
and effective law enforcement, we will prohibit it outright' as
some countries have effectively done.'' However, currently no
U.S. laws regulate domestic cryptography use, although the U.S.
International Traffic in Arms Regulations classify cryptographic
devices as `munitions' and regulate export. Some argue that
regulation of domestic cryptographic techniques would be
unconstitutional under guarantees of freedom of speech.
_____
<4.8> What other U.S. legislation is related to privacy?
ftp.eff.org
===========
/pub/cud/law/<state>
---
State computer crime laws:
AL, AK, AZ, CA, CO, CT, DE, FL, GA,
HI, IA, ID, IL, IN, MD, MN, NC, NJ,
NM, NY, OR, TX, VT, VA, WA, WI, WV.
/pub/cud/law/<country>
---
Current computer crime laws for: The United States (federal
code), Canada, Ghana, and Great Britain.
/pub/cud/law/bill.s.618
---
Senate bill 618, addressing registration of encryption keys with
the government.
/pub/cud/law/monitoring
---
Senate bill 516; concerning abuses of electronic monitoring in the
workplace.
/pub/cud/law/us.e-privacy
---
Title 18, relating to computer crime & email privacy.
_____
<4.9> What are references on rights in cyberspace?
ftp.eff.org
===========
/pub/cud/papers/const.in.cyberspace
---
Laurence Tribe's keynote address at the first Conference on
Computers, Freedom, & Privacy. `The Constitution in Cyberspace'
/pub/cud/papers/denning
---
Paper presented to 13th Nat'l Comp Security Conf ``Concerning
Hackers Who Break into Computer Systems'' by Dorothy E Denning.
/pub/cud/papers/privacy
---
``Computer Privacy vs First and Fourth Amendment Rights'' by
Michael S. Borella
/pub/cud/papers/rights-of-expr
---
Rights of Expression in Cyberspace by R. E. Baird
_____
<4.10> What is the Computers and Academic Freedom (CAF) archive?
The CAF Archive is an electronic library of information about
computers and academic freedom. run by the Computers and Academic
Freedom group on the Electronic Frontier Foundation FTP site.
> If you have gopher, the archive is browsable with the command:
> gopher -p academic gopher.eff.org
>
> It is available via anonymous ftp to ftp.eff.org (192.88.144.4) in
> directory `pub/academic'. It is also available via email. For
> information on email access send email to archive-server@eff.org.
> In the body of your note include the lines `help' and `index'.
>
> For more information, to make contributions, or to report typos
> contact J.S. Greenfield (greeny@eff.org).
ftp.eff.org
===========
/pub/academic/statements/caf-statement
---
Codifies the application of academic freedom to academic
computers, reflecting seven months of on-line discussion about
computers and academic freedom. Covers free expression, due
process, privacy, and user participation.
/pub/academic/books
---
Directory of book references related to Computers and Academic
Freedom or mentioned in the CAF discussion. The file books/README
is a bibliography.
/pub/academic/faq/archive
---
List of files available on the Computers and Academic Freedom
archive.
/pub/academic/news
---
Directory of all issues of the Computers and Academic Freedom
News. A full list of abstracts is available in file `abstracts'.
The special best-of-the-month issues are named with their month,
for example, `June'.
_____
<4.11> What is the Conference on Freedom and Privacy (CFP)?
CFP is a yearly conference covering issues such as data security,
hacking, viruses, law enforcment, etc. The written proceedings
and the electronic written proceedings of the Second Conference on
Computers, Freedom, and Privacy, sponsored by the Association for
Computing Machinery and held March 18-20, 1992 in Washington, D. C.
are available.
To obtain the written proceedings, contact the ACM Order Department,
P. O. Box 64145, Baltimore MD 21264, 1-800-342-6626 or
1-410-528-4261 (MD, AK, and outside US).
To obtain the electronic proceedings, make an ftp connnection
to ftp.gwu.edu and login as "anonymous". Get file CFP2S00, which
has a table of contents describing the other files CFP2S01,
CFP2S02, ..., CFP2S11.
Thanks to Lance J. Hoffman <hoffman@seas.gwu.edu> for contributions
here.
_____
<4.12> What is the NIST computer security bulletin board?
> NIST maintains a computer security bulletin board system (BBS)
> and Internet-accessible site for computer security information
> open to the public at all times. These resources provide
> information on computer security publications, CSL Bulletins,
> alert notices, information about viruses and anti-virus tools, a
> security events calendar, and sources for more information.
>
> To access the BBS, you need a computer with communications
> capability and a modem. For modems at 2400 bits per second (BPS)
> or less, dial (301) 948-5717. For 9600 BPS, dial (301) 948-5140.
> Modem settings for all speeds are 8 data bits, no parity, 1 stop
> bit.
>
> Internet users with telnet or ftp capability may telnet to the
> BBS at cs-bbs.nist.gov (129.6.54.30). To download files, users
> need to use ftp as follows: ftp to csrc.nist.gov (129.6.54.11),
> log into account anonymous, use your Internet address as the
> password, and locate files in directory pub; an index of all
> files is available for download.
>
> For users with Internet-accessible e-mail capability, send
> e-mail to docserver@csrc.nist.gov with the following message:
> send filename, where filename is the name of the file you wish
> to retrieve. send index will return an index of available
> files.
CLIPPER
=======
_____
<5.1> What is the Clipper Chip Initiative?
On April 16, 1993 the Clinton Administration announced the Clipper
Chip Directive in a saturated publicity effort (including postings
to Usenet newsgroups by NIST) that introduced the technology and
`proposal' that had been developed in strict secrecy prior to that
date. The `initiative' introduced the Clipper Chip, a high-speed
and `high-security' encryption device with applications in
telephones and other network devices, and the government commitment
to installing it in future select government telephones with
potentially much more widespread penetration (e.g. NREN, commercial
telephones, computers, etc.). The voluntary program seeks to unite
the federal government and private industry ``to improve the
security and privacy of telephone communications while meeting the
legitimate needs of law enforcement'' by use of the chip. Critical
aspects of the directive:
- ``A state-of-the-art microcircuit called the `Clipper Chip' has
been developed by government engineers'', for use in phones with
more power than many commercial encryption devices currently
available. ``The key escrow mechanism will provide Americans with
an encryption product that is more secure, more convenient, and
less expensive than others readily available today.''
- The technology seeks to ``help companies protect proprietary
information, protect the privacy of personal phone conversations
and prevent unauthorized release of data transmitted
electronically'' while preserving ``the ability of federal, state
and local law enforcement agencies to intercept lawfully the
phone conversations of criminals''.
- ``A "key-escrow" system will be established to ensure that the
"Clipper Chip" is used to protect the privacy of law-abiding
Americans.'' Keys are released from the escrow agencies to
``government officials with legal authorization to conduct a
wiretap.''
- ``The two key-escrow data banks will be run by two independent
entities. At this point, the Department of Justice and the
Administration have yet to determine which agencies will oversee
the key-escrow data banks.''
- ``The Attorney General will soon purchase several thousand of the
new devices.'' to ``demonstrate the effectiveness of this new
technology.''
- `Clipper Chip' technology provides law enforcement with ``no new
authorities to access the content of the private conversations of
Americans''.
- The Clipper decision was developed and sanctioned by The National
Security Council, the Justice Department, the Commerce
Department, and ``other key agencies''. ``This approach has
been endorsed by the President, the Vice President, and
appropriate Cabinet officials.''
_____
<5.2> How does Clipper blunt `cryptography's dual-edge sword'?
The Clipper wiretapping initiative refers to `tension between
economic vitality and the real challenges of protecting Americans'
and `previous policies [that] have pitted government against
industry and the rights of privacy against law enforcement.' The
Clipper Initiative attempts to find a compromise in encryption's
``dual-edge sword'' wherein it ``helps to protect the privacy of
individuals and industry, but it also can shield criminals and
terrorists.'' ``The Administration is committed to policies that
protect all Americans' right to privacy while also protecting them
from those who break the law.''
The statement notes that sophisticated encryption technology is
increasingly being used by Americans to ``protect business secrets
and the unauthorized release of personal information'' but also
``by terrorists, drug dealers, and other criminals.'' and declares
that ``We need the "Clipper Chip" and other approaches that can
both provide law-abiding citizens with access to the encryption
they need and prevent criminals from using it to hide their illegal
activities.''
Regarding privacy via encryption vs. wiretapping, the Clipper
announces: ``There is a false `tension' created in the assessment
that this issue is an "either-or" proposition. Rather, both
concerns can be, and in fact are, harmoniously balanced through a
reasoned, balanced approach such as is proposed with the "Clipper
Chip" and similar encryption techniques.''
_____
<5.3> Why are technical details of the Clipper chip being kept secret?
- The algorithm will ``remain classified'' to ``protect the
security of the key escrow system.''
- ``Respected experts from outside the government will be offered
access to the confidential details of the algorithm to assess its
capabilities and publicly report their findings.''
- ``We are willing to invite an independent panel of cryptography
experts to evaluate the algorithm to assure all potential users
that there are no unrecognized vulnerabilities.''
_____
<5.4> Who was consulted in the development of the Clipper chip?
- ``The President has directed early and frequent consultations
with affected industries, the Congress and groups that advocate
the privacy rights of individuals.''
- ``We have briefed members of Congress and industry leaders on the
decisions related to this initiative'' and ``expect those
discussions to intensify''.
_____
<5.5> How is commerical use/export of Clipper chips regulated?
- ``Q. How do I buy one of these encryption devices? A. We expect
several manufacturers to consider incorporating the "Clipper
Chip" into their devices.''
- ``The government designed and developed the key access encryption
microcircuits, but ... product manufacturers ... [buy] the
microcircuits from the chip manufacturer [Mykotronx] that
produces them.''
- The chip's (unspecified) `programming function' ``could be
licensed to other vendors in the future.'' Also, ``We plan to
review the possibility of permitting wider exportability of these
products.''
- ``Case-by-case review for each export is required to ensure
appropriate use of these devices'' fitting in with the existing
program for review of ``other encryption devices.'' ``We expect
export licenses will be granted on a case-by-case basis for U.S.
companies.
_____
<5.6> What are references on the Clipper Chip?
- ``Wrestling over the Key to the Codes.'' J. Markoff. The New
York Times, Sunday May 9, 1993.
> ``Electronic communication will be the fabric of tomorrow's
> society, and we will have daily interaction with intimates we
> can only rarely afford to visit in person,'' said Whitfield
> Diffie, a computer researcher at Sun Mycrosystems and one of
> the nation's leading cryptographers. ``By codifying the
> Government's power to spy invisibly on these contacts, we take
> a giant step toward a world in which privacy belongs only to the
> wealthy, the powerful, and perhaps, the criminals.''
- ``The Code of the Future: Uncle Sam wants you to use ciphers it
can crack.'' S. Begley, M. Liu, J. C. Ramo. Newsweek, June 7
1993.
> For now, no one is forced to use the NSA chip. But
> manufacturers who put a rival chip into, say, their modems
> would likely be denied government contracts, as well as export
> licenses for the NSA-proof products. Even that may not appease
> the spymasters. ``No one rules out a mandatory encryption
> standard,'' says NIST spokesman Mats Heyman. That's industry's
> greatest fear.
- ``Government picks affordable chip to scramble phone calls.'' By
Frank J. Murray. The Washington Times, April 17, 1993 Saturday,
Final Edition.
> President Clinton gave a major boost yesterday to one telephone-
> scrambler technology in a decision its delighted manufacture
> likens to the choice of VHS over Beta for videotape machines.
>
> An administration official said the consideration will be given
> to banning more sophisticated systems investigators cannot
> crack, thereby creating a balance between banning private
> encryption and declaring a public right to unbreakably coded
> conversations.
- ``Computer Group, Libertarians Question Clinton Phone Privacy
Stance.'' By Rory J. O'Connor, San Jose Mercury News, Calif.
Knight-Ridder/Tribune Business News, ~Apr. 17 1993.
> SAN JOSE, Calif.--Apr. 17--Civil libertarians and a major
> computer industry group raised concerns Friday about how much
> protection a Clinton administration plan would afford private
> electronic communications, from cellular telephone calls to
> computer data.
>
> "I don't want to sound too stridently opposed to this," said Ken
> Wasch, executive director of the Software Publishers
> Association (SPA) in Washington. "But...we feel blindsided."
>
> American Telephone & Telegraph Co. announced Friday it would
> adapt the $1,200 product, called the Telephone Security Device,
> to use the Clipper Chip by the end of this fiscal quarter. AT&T
> makes a related device, which encrypts voice and computer data
> transmissions, that could be converted to the Clipper
> technology, said spokesman Bill Jones.
>
> VLSI, which invented a manufacturing method the company said
> makes it difficult to "reverse engineer" the chip or discern
> the encryption scheme, expects to make $50 million in the next
> three years selling the device, said Jeff Hendy, director of
> new product marketing for the company.
- ``New Scrambler Designed to Protect Privacy, But Allow Police
Monitoring.'' By Christopher Drew, Chicago Tribune.
Knight-Ridder/Tribune Business News, ~Apr. 19, 1993.
> WASHINGTON--Apr. 19--As a step toward the development of vast
> new data "superhighways," the federal government has designed a
> powerful device that would protect the privacy of electronic
> communications by encoding them but still allow police to
> eavesdrop.
>
> "`A.k.a. Big Brother,' that's what I call it," said Stephen
> Bryen, a former Pentagon official who runs a company developing
> a rival encryption system.
>
> Bryen said it was "very disturbing" that the government has gone
> so far with the previously classified project "without
> consulting with experts in the industry" whose investments
> could be wiped out.
>
> To spur the venture, the Justice Department will soon purchase
> several thousand of the devices. Military and spy agencies also
> are expected to use them.
- ``US reveals computer chip for scrambling telephones.'' By John
Mintz. Washington Post, April, 17 1993.
> WASHINGTON -- The White House yesterday announced its new plan
> to prevent criminals, terrorists, and industrial spies from
> decoding communications over telephones, fax machines, and
> computers while ensuring the government's ability to eavesdrop.
>
> The official White House announcement yesterday was the
> endorsement of the Clipper Chip, developed by NSA, as the
> government standard for encryption devices.
- ``Clinton security plan hints of Big Brother: Clipper Chip would
let governemnt eavesdrop on encrypted voice and data
communications.'' By Ellen Messmer. Network World, April 19,
1993.
> But government officials had a difficult time last week
> rebutting the question why any criminal would use a Clipper
> Chip-based product when the person knows the government could
> listen in, particularly since there are a host of other
> encryption products available on the market that are, in
> theory, unbreakable codes.
>
> "A criminal probably wouldn't use it," said Mike Agee, marketing
> manager for secure products at AT&T, adding that the Clipper
> Chip is for the rest of the world.
For additional details, call Mat Heyman, National Institute of
Standards and Technology, (301) 975-2758.
See also soda.berkeley.edu:/pub/cypherpunks/clipper/ for an excellent
collection of data and articles, including information on Mycotronx,
the Clipper chip maker.
_____
<5.7> What are compliments/criticisms of the Clipper chip?
Compliments
----------
- Chip may protect the law abiding citizen's privacy from the casual
snooper.
- Potentially sophisticated and superior algorithm endorsed by the
NSA.
- May establish a new standard whereby companies may be able to
come up with competing pin-compatible chips.
- Potential for encrypting `on top' of the Clipper algorithm.
- May allow diverse law enforcement agency's to retain wiretapping
ability without serious or impossible obstacles.
- May enable broad new traffic analysis by law enforcement agencies.
Criticisms
----------
- Algorithm designed exclusively by the NSA with biased interests.
- Possibly unsophisticated, inferior, or more costly in comparison
with current or emerging technology.
- Compromised keys retroactively weaken all communication ever sent
over the device.
- Key generation techniques are `baroque activities in a vault':
suspicious and unrealistic-sounding.
- Impossible to ensure secrecy of a chip in the face of today's
technology and inevitable intense independent inquiry and
scrutiny, and dependence on it weakens security.
- No specific assurance that key generation is impartial and safe.
- Secrecy of the algorithm prevents serious inquiry and sabotages
trust in the algorithm. No guarantee against `back door'.
_____
<5.8> What are compliments/criticisms of the Clipper Initiative?
Compliments
-----------
- Brings privacy and encryption issues into the limelight.
- Sharpens the public debate on the role, extent, and legitimacy of
wiretapping practices.
- Exposes previously concealed high-level agenda in U.S. government
to manage cryptographic technology.
- Potential new option for individuals and companies interested in
protecting privacy.
- Suggests Clinton administration has strong interest in technology,
reaching compromises, and encouraging competitiveness.
Criticisms
----------
- Evasion of critical aspects (such as key agencies) and
preoccupation with others (references to criminals) ``begs the
question'' of inherent public desireability and support of plan.
- Legality within framework of paramount constitutional guarantees
on freedom of speech and freedom from unreasonable search and
seizure wholly unaddressed.
- Unilaterally imposed, i.e. no involvement from the parties it
purports to represent.
- Funded with taxpayer money with no meaningful public oversight and
scrutiny.
- Represents a fundamental switch in the government's role in
wiretapping from passive to active.
- Potentially criminals won't use the technology and will easily
evade it, while law-abiding citizens will be inconvenienced
and/or sacrifice rights.
- Does not protect the individual from corrupt government officials.
- Secrecy of the algorithm may amount to `security through
obscurity,' i.e. the algorithm security may rely on aspects of
chip operation staying confidential and undiscovered.
- Government appears to be colluding with private companies and
using leverage to intentionally create a monopoly.
- Possibility of taxpayer funds effectively subsidizing chip sales
not addressed.
- Secrecy of the chip design prevents inquiries into its precise
security.
- ``government engineers'' in competition with private industries,
with special favoritism in policies of the Clinton
administration.
- May require new vast and superfluous government bureacracies.
_____
<5.9> What are compliments/criticisms of the Clipper announcement?
Compliments
-----------
- Shows unequivocal commitment to wiretapping drug dealers,
criminals, and terrorists.
- Publicizes previously secret development and processes regarding
Clipper in particular and cryptography in general.
- Well publicized within some circles. Usenet press release
unprecedented and sophisticated.
- Shows Clinton administration commitment to developing national
policies on `information infrastructure' and the intrinsic role
of encryption technology.
- Masterpiece of propaganda for study by future generations.
Criticisms
----------
- States that Clipper is better than many encryption technologies
available today but does not indicate that many are recognized to
be weak and new and more powerful technologies are already under
development.
- Vague on critical aspects such as who the key escrow agencies are.
- Appears to assume that Americans wish to preserve wiretapping
capabilities by law enforcement agencies in the face of new
unbreakable encryption technologies.
- Specifically does not commit to freedom of encryption and hints
that failure of Clipper-style approaches may lead to restrictions
on strong cryptography.
- Gives the impression that Congress and private industry was
involved when their participation is minimal to nonexistent.
- Authoritarian, dictatorial, and Orwellian undertones.
- Evades mention of the NSA's specific involvement.
- Refers to the chip as `state of the art' without evidence.
- Refers to ``drug dealers, criminals, and terrorists'' with terms
such as `alleged,' `suspected,' `reputed,' and `accused'
conspicuously absent.
- Does not specifically commit to unrestrained public policy review
and appears to evade it.
- Evades mention of the history of the plan and erroneously implies
that Clinton administration involvement is primary.
_____
<5.10> Where does Clipper fit in U.S. cryptographic technology policy?
The Clipper chip is part of a large-scale plan that involves ``the
creation of new products to accelerate the development and use of
advanced and secure telecommunications networks and wireless
communications links'' utilizing the chip.
- ``we [of the Clinton Administration] understand the importance of
encryption technology in telecommunications and computing and are
committed to working with industry and public-interest groups to
find innovative ways to protect Americans' privacy, help
businesses to compete, and ensure that law enforcement agencies
have the tools they need to fight crime and terrorism.''
- ``The President has directed government agencies to develop a
comprehensive policy on encryption'' and ``explore new approaches
like the key-escrow system'' which ``is just one piece of what
must be the comprehensive approach to encryption technology,
which the Administration is developing.''
- The `broad policy review' will also address the role of
cryptography in ``the development of a National Information
Infrastructure or `information superhighways''' and consider
``the need of U.S. companies to manufacture and export high
technology products.''
- ``The Federal Government must act quickly to develop consistent,
comprehensive policies regarding its use'' and ``as we carry out
our review of encryption policy'' the ``on-going discussions with
Congress and industry on encryption issues'' are expected to
``intensify.''
* * *
SEE ALSO
========
Part 1
------ (previous file)
<1.1> What is `identity' on the internet?
<1.2> Why is identity (un)important on the internet?
<1.3> How does my email address (not) identify me and my background?
<1.4> How can I find out more about somebody from their email address?
<1.5> How do I provide more/less information to others on my identity?
<1.6> Why is identification (un)stable on the internet?
<1.7> What is the future of identification on the internet?
<2.1> What is `privacy' on the internet?
<2.2> Why is privacy (un)important on the internet?
<2.3> How (in)secure are internet networks?
<2.4> How (in)secure is my account?
<2.5> How (in)secure are my files and directories?
<2.6> How (in)secure is X Windows?
<2.7> How (in)secure is my email?
<2.8> How am I (not) liable for my email and postings?
<2.9> Who is my sysadmin? What does s/he know about me?
<2.10> Why is privacy (un)stable on the internet?
<2.11> What is the future of privacy on the internet?
<3.1> What is `anonymity' on the internet?
<3.2> Why is `anonymity' (un)important on the internet?
<3.3> How can anonymity be protected on the internet?
<3.4> What is `anonymous mail'?
<3.5> What is `anonymous posting'?
<3.6> Why is anonymity (un)stable on the internet?
<3.7> What is the future of anonymity on the internet?
Part 3
------ (next file)
<6.1> What UNIX programs are related to privacy?
<6.2> How can I learn about or use cryptography?
<6.3> What is the cypherpunks mailing list?
<6.4> What are some privacy-related newsgroups? FAQs?
<6.5> What is internet Privacy Enhanced Mail (PEM)?
<6.6> What are other Request For Comments (RFCs) related to privacy?
<6.7> How can I run an anonymous remailer?
<6.8> What are references on privacy in email?
<6.9> What are some email, Usenet, and internet use policies?
<7.1> What is ``digital cash''?
<7.2> What is a ``hacker'' or ``cracker''?
<7.3> What is a ``cypherpunk''?
<7.4> What is `steganography' and anonymous pools?
<7.5> What is `security through obscurity'?
<7.6> What are `identity daemons'?
<7.7> What standards are needed to guard electronic privacy?
<8.1> What is the background behind the Internet?
<8.2> How is Internet `anarchy' like the English language?
<8.3> Most Wanted list
<8.4> Change history
* * *
This is Part 2 of the Privacy & Anonymity FAQ, obtained via anonymous
FTP to rtfm.mit.edu:/pub/usenet/news.answers/net-privacy/ or
newsgroups news.answers, sci.answers, alt.answers every 21 days.
Written by L. Detweiler <ld231782@longs.lance.colostate.edu>.
All rights reserved.
------------------------------------------------------------------------
Date: 05-21-94 Msg # 12474
To: ALL Conf: (2120) news.answers
From: LD231782@LONGS.LANCE.COLO Stat: Public
Subj: Privacy & Anonymity on th Read: Yes
------------------------------------------------------------------------
@FROM :LD231782@LONGS.LANCE.COLOSTATE.EDU
@SUBJECT:Privacy & Anonymity on the Internet FAQ (3 of 3)
@PACKOUT:05-21-94
Message-ID: <net-privacy/part3_769514754@rtfm.mit.edu>
Newsgroups: sci.crypt,comp.society.privacy,alt.privacy,sci.answers
comp.answers,alt.answers,news.answers
Organization: TMP Enterprises
Archive-name: net-privacy/part3
Last-modified: 1993/10/11
Version: 3.2
IDENTITY, PRIVACY, and ANONYMITY on the INTERNET
================================================
(c) Copyright 1993 L. Detweiler. Not for commercial use except by
permission from author, otherwise may be freely copied. Not to be
altered. Please credit if quoted.
SUMMARY
=======
Email and account privacy, anonymity, file encryption, relevant
legislation and references, and other privacy and rights issues
associated with use of the Internet and global networks in general.
(Search for <#.#> for exact section. Search for '_' (underline) for
next section.)
PART 3
====== (this file)
Resources
---------
<6.1> What UNIX programs are related to privacy?
<6.2> How can I learn about or use cryptography?
<6.3> What is the cypherpunks mailing list?
<6.4> What are some privacy-related newsgroups? FAQs?
<6.5> What is internet Privacy Enhanced Mail (PEM)?
<6.6> What are other Request For Comments (RFCs) related to privacy?
<6.7> How can I run an anonymous remailer?
<6.8> What are references on privacy in email?
<6.9> What are some email, Usenet, and internet use policies?
Miscellaneous
-------------
<7.1> What is ``digital cash''?
<7.2> What is a ``hacker'' or ``cracker''?
<7.3> What is a ``cypherpunk''?
<7.4> What is `steganography' and anonymous pools?
<7.5> What is `security through obscurity'?
<7.6> What are `identity daemons'?
<7.7> What standards are needed to guard electronic privacy?
Footnotes
---------
<8.1> What is the background behind the Internet?
<8.2> How is Internet `anarchy' like the English language?
<8.3> Most Wanted list
<8.4> Change history
* * *
RESOURCES
=========
_____
<6.1> What UNIX programs are related to privacy?
For more information, type `man [cmd]' or `apropos [keyword]' at the
UNIX shell prompt.
passwd - change password
finger - obtain information about a remote user
chfn - change information about yourself obtainable by remote
users (sometimes `passwd -f')
chmod - change the rights associated with a file or directory
umask - (shell) change the default (on creation) file access
rights
ls - list the rights associated with files and directories
xhost - allow or disable access control of particular users to an
Xwindow server
last - list the latest user logins on the system and their
originations
who - list other users, login/idle times, originations
w - list other users and what they are running
xhost - access control list for X Window client use
xauth - control X Window server authentication
.signature - file in the home directory appended to USENET posts
.forward - file used to forward email to other accounts
.Xauthority - file used for X Window server authentication keys
$SIGNATURE - variable used for name in email and USENET postings
The `tcpdump' packet-tracing program is loosely based on SMI's
"etherfind". It was originally written by Van Jacobson, Lawrence
Berkeley Laboratory, as part of an ongoing research project to
investigate and improve tcp and internet gateway performance. A
current version is available via anonymous ftp from host
ftp.ee.lbl.gov (currently at address 128.3.254.68) file
tcpdump.tar.Z (a compressed Unix tar file).
_____
<6.2> How can I learn about or use cryptography?
A general introduction to mostly theoretical cryptographic issues,
especially those frequently discussed in sci.crypt, is available
in FAQ form:
> Compiled by:
> cme@ellisun.sw.stratus.com (Carl Ellison)
> Gwyn@BRL.MIL (Doug Gwyn)
> smb@ulysses.att.com (Steven Bellovin)
NIST (U.S. National Institute for Standards and Technology)
publishes an introductory paper on cryptography, special
publication 800-2 ``Public-Key Cryptograhy'' by James Nechvatal
(April 1991). Available via anonymous FTP from
csrc.ncsl.nist.gov (129.6.54.11), file pub/nistpubs/800-2.txt.
Also via available anonymous FTP from wimsey.bc.ca as crypt.txt.Z
in the crypto directory. Covers technical mathematical aspects
of encryption such as number theory.
More general information can be found in a FAQ by Paul Fahn of RSA
Labortories via anonymous FTP from rsa.com in /pub/faq.ps.Z. See
the `readme' file for information on the `tex' version. Also
available as hardcopy for $20 from RSA Laboratories, 100 Marine
Parkway, Redwood City, CA 94065. Send questions to
faq-editor@rsa.com.
Phil Zimmerman's PGP (Pretty Good Privacy) package for public key
encryption is available at numerous sites, and is in widespread use
over the internet for general PC-, Macintosh-, and UNIX-based file
encryption (including email). Consult the archie FTP database.
Also see the newsgroup alt.security.pgp. Mailing list requests to
info-pgp-request@lucpul.it.luc.edu.
From the RIPEM FAQ by Marc VanHeyningen
<mvanheyn@whale.cs.indiana.edu> on news.answers:
> RIPEM is a program which performs Privacy Enhanced Mail (PEM)
> using the cryptographic techniques of RSA and DES. It allows
> your electronic mail to have the properties of authentication
> (i.e. who sent it can be confirmed) and privacy (i.e. nobody can
> read it except the intended recipient.)
>
> RIPEM was written primarily by Mark Riordan
> <mrr@scss3.cl.msu.edu>. Most of the code is in the public domain,
> except for the RSA routines, which are a library called RSAREF
> licensed from RSA Data Security Inc.
>
> RIPEM is available via anonymous FTP to citizens and permanent
> residents in the U.S. from rsa.com; cd to rsaref/ and read the
> README file for info.
>
> RIPEM, as well as some other crypt stuff, has its `home site' on
> rpub.cl.msu.edu, which is open to non-anonymous FTP for users in
> the U.S. and Canada who are citizens or permanent residents. To
> find out how to obtain access, ftp there, cd to pub/crypt/, and
> read the file GETTING_ACCESS.
Note: cryptography is generally not well integrated into email yet
and some system proficiency is required by users to utilize it.
_____
<6.3> What is the cypherpunks mailing list?
Eric Hughes <hughes@toad.com> runs the `cypherpunk' mailing list
dedicated to ``discussion about technological defenses for privacy
in the digital domain.'' Frequent topics include voice and data
encryption, anonymous remailers, the Clipper chip. Send email to
cypherpunks-request@toad.com to be added or subtracted from the
list. (Traffic is sometimes up to 30-40 messages per day.)
From `Wrestling Over the Key to the Codes', by John Markoff,
New York Times, Sun. May 9 1993:
> In the obscure world of computer cryptography, there may be no
> more self-consciously ornery group of coders than the
> Cypherpunks, an alliance of some of Silicon Valley's best
> programmers and hardware designers, who preach absolute privacy
> in the information age.
>
> The Cypherpunks, who often communicate among themselves by
> electronic mail protected with an encryption system popular in
> the computing underground, feel certain about one thing: The
> Government should not be creating a national encoding standard,
> as the Clinton Administration has recently proposed.
From the charter on soda.berkely.edu:/pub/cypherpunks:
> The most important means to the defense of privacy is encryption.
> To encrypt is to indicate the desire for privacy. But to encrypt
> with weak cryptography is to indicate not too much desire for
> privacy. Cypherpunks hope that all people desiring privacy will
> learn how best to defend it.
_____
<6.4> What are some privacy-related newsgroups? FAQs?
Newsgroups
==========
alt.comp.acad-freedom.news
alt.comp.acad-freedom.talk
--------------------------
Moderated and unmoderated issues related to academic freedom and
privacy at universities. Documented examples of violated
privacy in e.g. email. Documented examples of `censorship' as
in e.g. limiting USENET groups local availability.
alt.cyberpunk
-------------
Virtual reality, (science) fiction by William Gibson and Bruce
Sterling, cyberpunk in the mainstream.
alt.hackers
-----------
USENET Network News Transfer Protocol (NNTP) posting mechanisms,
Simple Mail Transfer Protocol (SMTP), `obligatory hack' reports.
alt.politics.org.nsa
--------------------
Discussion of the U.S. National Security Agency, in charge of
international radio surveillance, making and breaking official
military codes and behind the Clipper proposal.
alt.privacy
-----------
General privacy issues involving taxpaying, licensing, social
security numbers, etc.
alt.privacy.anon-server
-----------------------
Spillover of debate on news.admin.policy regarding anonymous servers.
alt.privacy.clipper
-------------------
Group dedicated to discussing technical/political aspects of the
Clipper chip.
alt.security
comp.security.misc
------------------
Computer related security issues. FAQ in news.answers below.
alt.security.pgp
alt.security.ripem
----------------
Dedicated to discussing public domain cryptographic software
packages: PGP, or ``Pretty Good Privacy'' Software developed by
Phil Zimmerman for public key encryption, and RIPEM by Mark
Riordan for public key and DES encryption.
alt.whistleblowing
------------------
Whistleblowing on government and commercial fraud, waste, and
abuse. Discussion of claims. Whistleblower support.
comp.society.privacy
--------------------
Privacy issues associated with computer technologies. Examples:
caller identification, social security numbers, credit
applications, mailing lists, etc. Moderated.
comp.org.eff.news
comp.org.eff.talk
-----------------
Moderated and unmoderated groups associated with the Electronic
Frontier Foundation started by Mitch Kapor for protecting civil
and constitutional rights in the electronic realm.
news.admin
news.admin.policy
-----------------
Concerns of news administrators. NNTP standards and mechanisms.
news.lists
----------
USENET traffic distributions. Most frequent posters, most
voluminous groups, most active sites, etc.
sci.crypt
---------
Considers scientific and social issues of cryptography.
Examples: legitimate use of PGP, public-key patents, DES,
cryptographic security, cypher breaking, etc.
talk.politics.crypto
--------------------
The politics of cryptography. ITAR regulations, patent ]
restrictions, `arms analogies', key escrow, etc.
FAQs
====
FAQs or ``Frequently-Asked Questions'' are available in the
newsgroups *.answers or via anonymous FTP to pit-manager.mit.edu
[18.172.1.27] (also rtfm.mit.edu) from the directory
/pub/usenet/news.answers/[x] where [x] is the archive name. This
FAQ is archived in the file `net-privacy'. Others are:
network-info/part1
------------------
Sources of information about the Internet and how to connect to
it, through the NSF or commercial vendors.
alt-security-faq
----------------
Computer related security issues arising in alt.security and
comp.security.misc, mostly UNIX related.
ssn-privacy
-----------
Privacy issues associated with the use of the U.S. Social
Security number (SSN).
pdial
-----
Public dialup internet accounts list.
college-email/part1
-------------------
How to find email addresses for undergraduate and graduate
students, faculty and staff at various colleges and
universities.
ripem/faq
---------
Information on RIPEM, a program for public key mail encryption
officially sanctioned by Public Key Partners Inc., the company
that owns patents on public key cryptography.
unix-faq/faq/part1
------------------
Frequently-asked questions about UNIX, including information on
`finger' and terminal spying.
distributions/*
---------------
Known geographic, university, and network distributions.
_____
<6.5> What is internet Privacy Enhanced Mail (PEM)?
Internet drafts on Privacy Enhanced Mail (PEM) describe a standard
under revision for six years delineating the official protocols for
email encryption. The standard has only recently stabilized and
implementations are being developed.
- RFC-1421: ``Privacy Enhancement for Internet Electronic Mail:
Part I: Message Encryption and Authentication Procedures.'' J.
Linn <104-8456@mcimail.com>
- RFC-1422: ``Privacy Enhancement for Internet Electronic Mail: Part
II: Certificate-Based Key Management'' S. Kent <Kent@BBN.com>
- RFC-1424: ``Privacy Enhancement for Internet Electronic Mail:
Part IV: Key Certification and Related Services'' B. Kaliski
<burt@rsa.com>
- RFC-1423: ``Privacy Enhancement for Internet Electronic Mail: Part
III: Algorithms, Modes, and Identifiers'' D. Balenson
<belenson@tis.com>
Send email to pem-info@tis.com for more information. See ``RFCs
related to privacy'' for information on how to obtain RFCs.
_____
<6.6> What are other Request For Comments (RFCs) related to privacy?
RFC-822: SMTP, Simple Mail Transfer Protocol
RFC-977: NNTP, Network News Transfer Protocol
RFC-1036: Standard for interchange of network news messages
RFC-1208: Glossary of Networking Terms
RFC-1207: Answers to ``experienced Internet user'' questions
RFC-1206: Answers to ``new Internet user'' questions
RFC-1355: Privacy issues in Network Information center databases
RFC-1177 is ``FYI: Answers to commonly asked ``new internet user''
questions, and includes: basic terminology on the Internet (TCP/IP,
SMTP, FTP), internet organizations such as IAB (Internet
Activities Board) and IETF (Internet Enbgineering Task Force), and
a glossary of terms. Also from ftp.eff.org:
/pub/internet-info/internet.q.
> RFCs can be obtained via FTP from NIC.DDN.MIL, with the pathname
> RFC:RFCnnnn.TXT or RFC:RFCnnnn.PS (where `nnnn' refers to the
> number of the RFC). Login with FTP, username `anonymous' and
> password `guest'. The NIC also provides an automatic mail
> service for those sites which cannot use FTP. Address the
> request to SERVICE@NIC.DDN.MIL and in the subject field of the
> message indicate the RFC number, as in `Subject: RFC nnnn' (or
> `Subject: RFC nnnn.PS' for PostScript RFCs).
>
> RFCs can also be obtained via FTP from NIS.NSF.NET. Using FTP,
> login with username `anonymous' and password `guest'; then
> connect to the RFC directory (`cd RFC'). The file name is of the
> form RFCnnnn.TXT-1 (where `nnnn' refers to the number of the
> RFC). The NIS also provides an automatic mail service for those
> sites which cannot use FTP. Address the request to
> NIS-INFO@NIS.NSF.NET and leave the subject field of the message
> blank. The first line of the text of the message must be `SEND
> RFCnnnn.TXT-1', where nnnn is replaced by the RFC number.
_____
<6.7> How can I run an anonymous remailer?
Cypherpunk remailer source is at soda.berkeley.edu in the
/pub/cypherpunks directory. It's written in PERL, and is
relatively easy to install (no administrative rights are required)
although basic familiarity with UNIX is necessary. Karl Barrus
<elee9sf@menudo.uh.edu> has more information and modifications.
Also, most remailer operators mentioned above are amenable to
discussing features, problems, and helping new sites become
operational. Address all points in the section ``responsibities of
anonymous use'' in this document prior to advertising your service.
You should be committed to the long-term stability of the site and
avoid running one surreptitiously.
_____
<6.8> What are references on privacy in email?
Brown, Bob. ``EMA Urges Users to Adopt Policy on E-mail Privacy.''
Network World (Oct 29, 1990), 7.44: 2.
Bairstow, Jeffrey. ``Who Reads your Electronic Mail?'' Electronic
Business (June 11, 1990) 16 (11): 92.
``Electronic Envelopes - the uncertainty of keeping e-mail private''
Scientific American, February 1993.
ftp.eff.org
===========
/pub/EFF/legal-issues/email-privacy-biblio-2
---
Compilation of bibliography on E-Mail and its privacy issues (part
2 of the work). Compiled by Stacy B. Veeder (12/91).
/pub/EFF/email-privacy-research
---
The author at Digital Research tried to formalize their employee
privacy policy on E-Mail. The casesightings are divided into two
groups: US Constitutional law, and California law.
_____
<6.9> What are some email, Usenet, and internet use policies?
The Computer Policy and Critiques Archive is a collection of the
computer policies of many schools and networks, run by the
Computers and Academic Freedom group on the Electronic Frontier
Foundation FTP site. The collection also includes critiques of some
of the policies.
> If you have gopher, the archive is browsable with the command:
> gopher -p academic/policies gopher.eff.org
>
> The archive is also accessible via anonymous ftp and email. Ftp
> to ftp.eff.org (192.88.144.4). It is in directory
> `pub/academic/policies'. For email access, send email to
> archive-server@eff.org. Include the line:
>
> send acad-freedom/policies <filenames>
>
> where <filenames> is a list of the files that you want. File
> README is a detailed description of the items in the directory.
>
> For more information, to make contributions, or to report typos
> contact J.S. Greenfield (greeny@eff.org). Directory `widener'
> contains additional policies (but not critiques).
ftp.eff.org
===========
/pub/cud/networks/
---
Acceptable Use Policies for various networks, including CompuServe
(file `compuserve'), NSFNET (file `nsfnet') with information on
research and commercial uses. See /pub/cud/networks/index.
/pub/cud/networks/email
---
Policies from various sysadmins about how they handle the issue of
email privacy, control, and abuse, compiled by T. Hooper
<hooper_ta@cc.curtin.edu.au>.
/pub/cud/schools/
---
Computer use policies of a number of schools. See schools/Index
for a full list and description.
Commentary
==========
/pub/academic/faq/policy.best
---
Opinions on the best academic computer policies.
/pub/academic/faq/email.policies
---
Do any universities treat email and computer files as private?
/pub/academic/faq/netnews.writing
---
Policies on what users write on Usenet.
/pub/academic/faq/netnews.reading
---
Policies on what users read on Usenet: should my university remove
(or restrict) Netnews newsgroups because some people find them
offensive?
/pub/academic/faq/policy
---
What guidance is there for creating or evaluating a university's
academic computer policy?
MISCELLANEOUS
=============
_____
<7.1> What is ``digital cash''?
With digital encryption and authentication technologies, the
possibility of a widespread digital cash system may someday be
realized. A system utilizing codes sent between users and banks
(similar to today's checking system except entirely digital) may
be one approach. The issues of cryptography, privacy, and
anonymity are closely associated with transfer of cash in an
economy. See the article in Scientific American by David Chaum
(~Dec.1992).
An experimental digital bank is run by Karl Barrus
<elee9sf@Menudo.UH.EDU> based on suggestions by Hal Finney on the
cypherpunks mailing list. To use the server send mail to
elee7h5@rosebud.ee.uh.edu message with the following text:
::
command: help
user@host
where `user@host' is your email address.
A new set of Internet standards called Internet Mercantile Protocols
are being developed to support cash transactions in encrypted email.
See thumper.bellcore.com:/pub/devetzis/imp. Includes a mailing list
archive and other documents.
Some papers on the subject of digital cash are available from
ftp.cwi.nl:
- CS-R9323 Stefan Brands ``An Efficient Off-line Electronic Cash
System Based On The Representation Problem''
- CS-R9318 N. Ferguson ``Single Term Off-Line Coins''
Thanks to P. Honeyman <honey@citi.umich.edu> and J. McCoy
<mccoy@ccwf.cc.utexas.edu> for contributions to this section.
_____
<7.2> What is a ``hacker'' or ``cracker''?
These terms arouse strong feelings by many on their meaning,
especially on the internet. In the general news media in the past
a person who uses computers and networks to malicious ends (such as
breaking into systems) has been referred to as a hacker, but most
internet users prefer the term ``cracker'' for this. Instead, a
``hacker'' is perceived as a benign but intensely ambitious,
curious, and driven computer user who explores obscure areas of a
system, for example---something of a proud electronic pioneer and
patriot. This is the sense intended in this document. See also
the ``Hacker's Dictionary'' and the FAQ `alt-security-faq'.
_____
<7.3> What is a ``cypherpunk''?
From the charter of the cypherpunk mailing list:
> Cypherpunks assume privacy is a good thing and wish there were
> more of it. Cypherpunks acknowledge that those who want privacy
> must create it for themselves and not expect governments,
> corporations, or other large, faceless organizations to grant
> them privacy out of beneficence. Cypherpunks know that people
> have been creating their own privacy for centuries with whispers,
> envelopes, closed doors, and couriers. Cypherpunks do not seek
> to prevent other people from speaking about their experiences or
> their opinions.
From `Wrestling Over the Key to the Codes,'' by J. Markoff in the
New York Times, Sunday, May 9 1993:
> In the obscure world of computer cryptography, there may be no
> more self-consciously ornery group of coders than the Cypherpunks,
> an alliance of some of Silicon Valley's best programmers and
> hardware designers, who preach absolute privacy in the information
> age.
>
> The Cypherpunks, who often communicate among themselves by
> electronic mail protected with an encryption system popular in
> the electronic underground, feel certain about one thing: The
> Government should not be creating a national encoding standard,
> as the Clinton Administration has recently proposed.
See information on the cypherpunk mailing list below.
See also the CryptoAnarchist Manifesto and the Cryptography Glossary
in soda.berkeley.edu:/pub/cypherpunks.
_____
<7.4> What is `steganography' and anonymous pools?
Closely associated with encryption is `steganography' or the
techniques for not only pursuing private (encrypted) communication
but concealing the very existence of the communication itself.
Many new possibilities in this area are introduced with the
proliferation of computer technology. For example, it is possible
to encode messages in the least-significant bits of images,
typically the most 'noisy'. In addition, when such an item is
posted in a public place (such as a newsgroup), virtually
untraceable communication can take place between sender and
receiver. For steganographic communications in the electronic
realm one another possibility is setting up a mailing list where
individual messages get broadcast to the entire list and individual
users decode particular messages with their unique key. An
anonymous pool has been set up by Miron Cuperman
(miron@extropia.wimsey.com) for experiments. Send email to
<pool0-request@extropia.wimsey.com> with one of the following
commands in the subject line:
subscribe
unsubscribe
help
_____
<7.5> What is `security through obscurity'?
`Security through obscurity' refers to the attempt to gain
protection from system weaknesses by hiding sensitive information
or programs relating to them. For example, a company may not make
public information on its software's encryption techniques to evade
`attacks' based on knowledge of it. Another example would be
concealing data on the existence of security holes or bugs in
operating systems. Or, some reliance may be made on the fact that
some standard or mechanism with potential problems is serious
because they are ``not widely known'' or ``not widely used.'' This
argument is occasionally applied to mechanisms for email and Usenet
posting `forgery'. `Security through obscurity' is regarded as a
very feeble technique at best and inappropriate and ineffective at
worst (also called the ``head-in-the-sand approach''). See the FAQ
for alt.security.
Some remarks of John Perry Barlow, cofounder of the Electronic
Frontier Foundation, directed to NSA agents at the First
International Symposium on National Security & National
Competitiveness held in McLean, Virginia Dec. 1, 1992:
> Digitized information is very hard to stamp classified or keep
> contained. ... This stuff is incredibly leaky and volatile. It's
> almost a life form in its ability to self-propagate. If
> something hits the Net and it's something which people on there
> find interesting it will spread like a virus of the mind. I
> believe you must simply accept the idea that we are moving into
> an environment where any information which is at all interesting
> to people is going to get out. And there will be very little
> that you can do about it. This is not a bad thing in my view,
> but you may differ...
_____
<7.6> What are `identity daemons'?
Ident Protocol
--------------
The RFC 1413 `Identification Protocol' standard (obsoletes RFC-931)
describes a protocol standard that allows UNIX programs to query a
remote user's login name after connection to a local communication
socket (a connection of this type is established during FTP and
TELNET sessions, for example). The standard is not uniformly
supported, about 200 sites and domains currently implement it but
the number is increasing (the most common implementation `pidentd'
has reportedly been ported to over a dozen UNIX variants).
Under an optional `HIDDEN-USER' function the user may be able to
disable it individually but this capability is not guaranteed.
The protocol is detrimental to anonymity but as a voluntary
standard system adminstrators can decide not to install it. This
standard may represent a trend toward greater authentication
mechanisms (as with user verification in the NNTP news posting
protocol). This software can be used to enforce e.g. program usage
(licensing) restrictions such as databases that restrict access to
a particular organization. The protocol can also be used in some
cases (when it is supported) to track down problematic users.
- An `Ident' server can only inquire about connections from a
directly-connecting host. If a user uses that host as an
intermediate link in a chain the protocol cannot trace past the
nearest link in the chain.
- `Ident' must be running on both sides of a connection for the
receiver's identification request to succeed.
- Reportedly no systems are currently shipped with the Ident
protocol installed. Installation is voluntary on the part of
system administrators.
- The Ident program can be configured to refuse to return
information for particular (groups of) users by the
administrator although the conventional implementation returns
any requested user information by default.
- Some popular freeware packages and sites are now supporting Ident
services. For example, the popular FTP site wuarchive.wustl.edu
contains a built-in Ident client and will interact with an
existing Ident server on the remote machine.
To determine whether or not your particular Unix machine is running
an Ident server, examine the file /etc/services. If you find a
list entry for port 113, your system is supporting Ident. The line
should look something like `auth 113/tcp'
An implementation of the Ident protocol and related files are
available via anonymous FTP from ftp.lysator.liu.se:/pub/ident.
TCP Wrapper
-----------
Wietse Vensema's tcp_wrapper suite is a group of programs that
`wraps around' the traditional tcp/ip utilities, such as finger,
telnet, rsh, and ftp. It allows an admin to make origin-based
decisions about network requests. For example, all `finger'
requests could be denied or `telnet' sessions could be restricted
to certain remote users or sites.
See ftp.win.tue.nl:/pub/security/log_tcp.shar.Z.
Thanks to Wes Morgan <morgan@engr.uky.edu> for contributions here.
_____
<7.7> What standards are needed to guard electronic privacy?
Remailing/Posting
-----------------
- Stable, secure, protected, officially sanctioned and permitted,
publicly and privately operated anonymous servers and hubs.
- Official standards for encryption and anonymity in mail and USENET
postings.
- Truly anonymous protocols with source and destination information
obscured or absent and hidden routing mechanisms (chaining,
encrypted addresses, etc.)
- Standards for anonymous email addressing, embedding files, and
remailer site chaining.
General
-------
- Recognition of anonymity, cryptography, and related privacy
shields as legitimate, useful, desirable, and crucial by the
general public and their governments.
- Widespread use and implementation of these technologies
by systems designers into
hardware, software, and standards, implemented `securely,'
`seamlessly,' and `transparently'.
- General shift of use, dependence, and reliance to means other than
wiretapping and electronic surveillance by law enforcement
agencies.
- Publicity, retraction, and dissolution of laws and government
agencies opposed to privacy, replaced by structures dedicated to
strengthening and protecting it.
FOOTNOTES
=========
_____
<8.1> What is the background behind the Internet?
The article ``Internet'' in Fantasy and Science Fiction by Bruce
Sterling <bruces@well.sf.ca.us> contains general and nontechnical
introductory notes on origins of the Internet, including the role
of the RAND corporation, the goal of network resilience in face of
nuclear attack, MIT, UCLA, ARPANET, TCP/IP, NSF, NREN, etc.:
> ARPANET itself formally expired in 1989, a happy victim of its
> own overwhelming success. Its users scarcely noticed, for
> ARPANET's functions not only continued but steadily improved.
> The use of TCP/IP standards for computer networking is now
> global. In 1971, a mere twenty-one years ago, there were only
> four nodes in the ARPANET network. Today there are tens of
> thousands of nodes in the Internet, scattered over forty-two
> countries, with more coming on-line every day. Three million,
> possibly four million people use this gigantic
> mother-of-all-computer-networks.
>
> The Internet is especially popular among scientists, and is
> probably the most important scientific instrument of the late
> twentieth century. The powerful, sophisticated access that it
> provides to specialized data and personal communication has sped
> up the pace of scientific research enormously.
>
> The Internet's pace of growth in the early 1990s is spectacular,
> almost ferocious. It is spreading faster than cellular phones,
> faster than fax machines. Last year the Internet was growing at
> a rate of twenty percent a *month.* The number of `host'
> machines with direct connection to TCP/IP has been doubling
> every year since 1988. The Internet is moving out of its
> original base in military and research institutions, into
> elementary and high schools, as well as into public libraries
> and the commercial sector.
Internet (NSFNet) statistics are available via anonymous ftp to
nic.merit.edu in the /statistics/nsfnet directory. Summaries
are contained in the `highlights' file organized by year.
References
==========
Bowers, K., T. LaQuey, J. Reynolds, K. Roubicek, M. Stahl, and A.
Yuan, ``Where to Start - A Bibliography of General Internetworking
Information'' (RFC-1175), CNRI, U Texas, ISI, BBN, SRI, Mitre,
August 1990.
The Whole Internet Catalog & User's Guide by Ed Krol. (1992)
O'Reilly and Associates, Inc.
---
A clear, non-jargonized introduction to the intimidating business
of network literacy written in humorous style.
Krol, E., ``The Hitchhikers Guide to the Internet'' (RFC-1118),
University of Illinois Urbana, September 1989.
``The User's Directory to Computer Networks'', by Tracy LaQuey.
The Matrix: Computer Networks and Conferencing Systems Worldwide.
by John Quarterman. Digital Press: Bedford, MA. (1990)
---
Massive and highly technical compendium detailing the
mind-boggling scope and complexity of global internetworks.
``!%@:: A Directory of Electronic Mail Addressing and Networks'' by
Donnalyn Frey and Rick Adams.
The Internet Companion, by Tracy LaQuey with Jeanne C. Ryer (1992)
Addison Wesley.
---
``Evangelical'' etiquette guide to the Internet featuring
anecdotal tales of life-changing Internet experiences. Foreword
by Senator Al Gore.
Zen and the Art of the Internet: A Beginner's Guide by Brendan P.
Kehoe (1992) Prentice Hall.
---
Brief but useful Internet guide with plenty of good advice on
useful databases.
See also ftp.eff.com:/pub/internet-info/. (Thanks to Bruce Sterling
<bruces@well.sf.ca.us> for contributions here.)
General
=======
Cunningham, Scott and Alan L. Porter. ``Communication Networks: A
dozen ways they'll change our lives.'' The Futurist 26, 1
(January-February, 1992): 19-22.
Brian Kahin, ed., BUILDING INFORMATION INFRASTRUCTURE (New York:
McGraw-Hill, 1992) ISBN# 0-390-03083-X
---
Essays on information infrastructure. Policy and design issues,
research and NREN, future visions, information markets. See
table of contents in ftp.eff.org:/pub/pub-infra/1992-03.
Shapard, Jeffrey. ``Observations on Cross-Cultural Electronic
Networking.'' Whole Earth Review (Winter) 1990: 32-35.
Varley, Pamela. ``Electronic Democracy.'' Technology Review
(November/December, 1991): 43-51.
______
<8.2> How is Internet `anarchy' like the English language?
According to Bruce Sterling <bruces@well.sf.ca.us>:
> The Internet's `anarchy' may seem strange or even unnatural, but
> it makes a certain deep and basic sense. It's rather like the
> `anarchy' of the English language. Nobody rents English, and
> nobody owns English. As an English-speaking person, it's up
> to you to learn how to speak English properly and make whatever
> use you please of it (though the government provides certain
> subsidies to help you learn to read and write a bit).
> Otherwise, everybody just sort of pitches in, and somehow the
> thing evolves on its own, and somehow turns out workable. And
> interesting. Fascinating, even. Though a lot of people earn
> their living from using and exploiting and teaching English,
> `English' as an institution is public property, a public good.
> Much the same goes for the Internet. Would English be improved
> if the `The English Language, Inc.' had a board of directors
> and a chief executive officer, or a President and a Congress?
> There'd probably be a lot fewer new words in English, and a lot
> fewer new ideas.
_____
<8.3> Most Wanted list
Hopefully you have benefitted from this creation, compilation, and
condensation of information from various sources regarding privacy,
identity, and anonymity on the internet. The author is committed
to keeping this up-to-date and strengthening it, but this can only
be effective with your feedback, especially on sections of
interest. In particular, the following items are sought:
- Short summaries of RFC documents and other references listed,
esp. CPSR files.
- Internet traffic statistics. How much is email? How much
USENET? What are the *costs* involved?
- Famous or obscure examples of compromised privacy
on the internet.
- Volunteers for EFF, CPSR, Clipper, etc. FAQ writing.
Commerical use of this document is negotiable and is a way for the
author to recoup from a significant time investment. Email feedback
to ld231782@longs.lance.colostate.edu. Please note where you saw
this (which newsgroup, etc.).
_____
<8.4> Change history
10/11/93 v3.2 (current)
More notes on (in)security of internet networks. NIST BBS
pointer. Digital cash section strengthened with IMP and FTP
references. Email & posting liability section mentions C. Kadie.
talk.politics.crypto and alt.politics.org.nsa newsgroups added.
UNIX `finger' utilities and FTP site added (finally!). `finger'
identity question rearranged.
7/10/93 v3.1
Minor formatting, FTP reference fixup. New Clipper references
and quotations. Expansion on Cypherpunk documentation. CFP
reference added. Merit Internet statistics pointer. Anonymity
references added. Identity daemon function elaborated.
5/7/93 v3.0
Revisions/additions to Anonymity history. Anonymity history &
commentary moved to new FAQ. Information on the Clipper chip
initiative. Minor miscellaneous corrections. Crosslink program
info deleted. Some EFF out-of-date file pointers not fixed.
3/3/93 v2.1
CPSR pointer, new UNIX mode examples, digital telephony act,
Steve Jackson incident, additions/ reorganization to
anonymity section, part 3. Note: v2.0 post to sci.crypt,
alt.privacy, news.answers, alt.answers, sci.answers was cancelled
by J. Kamens because of incorrect subject line.
2/14/93 v2.0
Major revisions. New section for X Windows. Some email privacy
items reorganized to network security section. New sections for
email liability issues, anonymity history and responsibilities.
Split into three files. Many new sources added, particularly
from EFF and CAF in new `issues' part. `commentary' from
news.admin.policy. 21 day automated posting starts.
2/3/93 v1.0
More newsgroups & FAQs added. More `Most Wanted'. Posted to
news.answers. Future monthly posting to sci.crypt, alt.privacy.
2/1/93 v0.3
Formatted to 72 columns for quoting etc. `miscellaneous,'
`resources' sections added with cypherpunk servers and use
warnings. More UNIX examples (`ls' and `chmod'). Posted to
alt.privacy, comp.society.privacy.
1/29/93 v0.2
`Identity' and `Privacy' sections added. `Anonymity' expanded.
Remailer addresses removed due to lack of information and
instability. Posted to sci.crypt.
1/25/93 v0.1
Originally posted to the cypherpunks mailing list on 1/25/93 as a
call to organize a list of anonymous servers.
email ld231782@longs.lance.colostate.edu for earlier versions.
* * *
SEE ALSO
========
Part 1
------ (first file)
<1.1> What is `identity' on the internet?
<1.2> Why is identity (un)important on the internet?
<1.3> How does my email address (not) identify me and my background?
<1.4> How can I find out more about somebody from their email address?
<1.5> How do I provide more/less information to others on my identity?
<1.6> Why is identification (un)stable on the internet?
<1.7> What is the future of identification on the internet?
<2.1> What is `privacy' on the internet?
<2.2> Why is privacy (un)important on the internet?
<2.3> How (in)secure are internet networks?
<2.4> How (in)secure is my account?
<2.5> How (in)secure are my files and directories?
<2.6> How (in)secure is X Windows?
<2.7> How (in)secure is my email?
<2.8> How am I (not) liable for my email and postings?
<2.9> Who is my sysadmin? What does s/he know about me?
<2.10> Why is privacy (un)stable on the internet?
<2.11> What is the future of privacy on the internet?
<3.1> What is `anonymity' on the internet?
<3.2> Why is `anonymity' (un)important on the internet?
<3.3> How can anonymity be protected on the internet?
<3.4> What is `anonymous mail'?
<3.5> What is `anonymous posting'?
<3.6> Why is anonymity (un)stable on the internet?
<3.7> What is the future of anonymity on the internet?
Part 2
------ (previous file)
<4.1> What is the Electronic Frontier Foundation (EFF)?
<4.2> Who are Computer Professionals for Social Responsibility (CPSR)?
<4.3> What was `Operation Sundevil' and the Steve Jackson Game case?
<4.4> What is Integrated Services Digital Network (ISDN)?
<4.5> What is the National Research and Education Network (NREN)?
<4.6> What is the FBI's proposed Digital Telephony Act?
<4.7> What is U.S. policy on freedom/restriction of strong encryption?
<4.8> What other U.S. legislation is related to privacy?
<4.9> What are references on rights in cyberspace?
<4.10> What is the Computers and Academic Freedom (CAF) archive?
<4.11> What is the Conference on Freedom and Privacy (CFP)?
<4.12> What is the NIST computer security bulletin board?
<5.1> What is the Clipper Chip Initiative?
<5.2> How does Clipper blunt `cryptography's dual-edge sword'?
<5.3> Why are technical details of the Clipper chip being kept secret?
<5.4> Who was consulted in the development of the Clipper chip?
<5.5> How is commerical use/export of Clipper chips regulated?
<5.6> What are references on the Clipper Chip?
<5.7> What are compliments/criticisms of the Clipper chip?
<5.8> What are compliments/criticisms of the Clipper Initiative?
<5.9> What are compliments/criticisms of the Clipper announcement?
<5.10> Where does Clipper fit in U.S. cryptographic technology policy?
* * *
This is Part 3 of the Privacy & Anonymity FAQ, obtained via anonymous
FTP to rtfm.mit.edu:/pub/usenet/news.answers/net-privacy/ or
newsgroups news.answers, sci.answers, alt.answers every 21 days.
Written by L. Detweiler <ld231782@longs.lance.colostate.edu>.
All rights reserved.