home *** CD-ROM | disk | FTP | other *** search
Text File | 2003-06-11 | 147.2 KB | 2,973 lines |
-
-
- THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING / Published Periodically
- ======================================================================
- ISSN 1074-3111 Volume One, Issue Two April 4, 1994
- ======================================================================
-
- Editor-in-Chief: Scott Davis (dfox@fennec.com)
- Technology Editor: Max Mednick (kahuna@bga.com)
- Consipracy Editor: Gordon Fagan (dolphin@bga.com)
- Network Security: George Phillips (ice9@bga.com)
-
- ** ftp site: etext.archive.umich.edu /pub/Zines/JAUC
-
- U.S. Mail:
- The Journal Of American Underground Computing
- 10111 N. Lamar #25
- Austin, Texas 78753-3601
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- To Subscribe to "TJOAUC", send mail to: sub@fennec.com
- All questions/comments about this publication to: comments@fennec.com
- Send all articles/info that you want published to: submit@fennec.com
- Commercial Registration for Profitable Media: form1@fennec.com
-
- "The underground press serves as the only effective counter to a growing
- power, and more sophisticated techniques used by establishment mass media
- to falsify, misrepresent, misquote, rule out of consideration as a priori
- ridiculous, or simply ignore and blot out of existence: data, books,
- discoveries that they consider prejudicial to establishment interest..."
-
- (William S. Burroughs and Daniel Odier, "The Job", Viking, New York, 1989)
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- Contents Copyright (C) 1994 The Journal Of American Underground Computing
- and/or the author of the articles presented herein. All rights reserved.
- Nothing may be reproduced in whole or in part without written permission
- of the Editor-In-Chief and/or the author of the article. This publication
- is made available quarterly to the amateur computer hobbyist free of
- charge. Any commercial usage (electronic or otherwise) is strictly
- prohibited without prior consent of the Editor, and is in violation of
- applicable US Copyright laws. To subscribe, send email to sub@fennec.com
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- DISCLAIMER AND NOTICE TO DISTRIBUTORS -
-
- NOTE: This electronic publication is to be distributed free of charge
- without modifications to anyone who wishes to have a copy. Under NO
- circumstances is any issue of this publication, in part or in whole,
- to be sold for money or services, nor is it to be packaged with other
- computer software, including, but not limited to CD Rom disks, without
- the express written or verbal consent of the author and/or editor.
- To obtain permission to distribute this publication under any of the
- certain circumstances stated above, please contact the editor at one of
- the addresses above. If you have intentions of publishing this journal
- in any of the ways described above, or you are in doubt about whether or
- not your intentions conflict with the restrictions, please contact the
- editor. FOR A COPY OF THE REGISTRATION FORM, MAIL - form1@fennec.com
- This publication is provided without charge to anyone who wants it.
- This includes, but is not limited to lawyers, government officials,
- cops, feds, hackers, social deviants, and computer hobbyists. If anyone
- asks for a copy, please provide them with one, or mail the subscription
- list so that you may be added.
-
- The articles and information printed herein are the property of the author
- and / or The Journal Of American Underground Computing. An electronic mail
- address of the author will be provided when made available to us so that you
- can contact the author with your comments. No article in this publication
- can be reprinted without the permission of the author / editor. Any attempt
- to do so will be in direct violation of United States Copyright laws.
- Any attempt to sell this publication in part or in whole, on CD Rom or
- while packaged with any other software bundle without the express consent
- of the editor is also a direct violation of United States Copyright laws.
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING - Volume 1, Issue 2
-
- TABLE OF CONTENTS
-
- 1) A note from the Editor Scott Davis
- 2) Comments from our readers Readers
- 3) Paul and Karla Hit The Net Wired Online
- 4) AT&T Cellular Privacy Systems David Arneke
- 5) Clipper / From "The Guardian" Mike Holderness
- 6) Privacy: Notes from Cyberspace Various
- 7) Kidnapped By The State / Internet Not Safe Matthew Mihaly
- 8) Legion Of Doom - Internet T-Shirts Chris Goggans
- 9) Public vs. Mass Media: The Case of The Internet Jim O'Loughlin
- 10) Bruce Sterling's Comments at CFP '94 Bruce Sterling
- 11) Book Review - Doing Business On The Internet Steve Brock
- 12) Generic Usenet Flame Form [Humor]
- 13) McDonnell Douglas Warranty Card [Humor]
- 14) Social Contract Between Us and Them [Humor]
- 15) Electronic Petition Against Clipper Editors
- 16) Form letter againt Clipper for the President Editors
- 17) Official Government press release: Clipper Editors
- 18) ISDN Information (RBOCS) Max Mednick
- 19) A catalog of national ISDN solutions Max Mednick
- 20) Sprint expands presence in China News
- 21) SSN FAQ / Social Security Number info Chris Hibbert
- 22) The Clipper Chip is your friend Bob Davis (WSJ)
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- A NOTE FROM THE EDITOR
-
- It is my pleasure to welcome aboard to the editing staff Mr. Max Mednick
- as the Technology Editor. Max is a technical trainer and network support
- specialist for a Fortune 500 company, and has several years of experience
- in the field of networking and communications. Everyone send him a message
- welcoming him. (kahuna@bga.com). Also, we are welcoming Carl Guderian
- as Director of Information Systems. He is currently employed by big-brother.
- His email address is bjacques@cypher.com
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- COMMENTS FROM OUR READERS
-
-
- From: jim@rsa.com (Jim Bidzos)
- To: comments@fennec.com
- Subject: TJOAUC-1.1
-
- Great! I'm honored to have contributed to TJOAUC! Thanks, and keep up
- the good work.
-
- =-=-=-=-=-=-=-=-=-=-=-=-=-=
-
- From: Anonymous@some.government.agency
- To: comments@fennec.com
- Subject: Thanks!
-
- I checked your archived 'Journal of American Underground Computing'
- at extext.archive.umich.edu.
-
- I found the quality and content to be high.
-
- If you could also subscribe me, I would be grateful. Sorry about
- the skepticism (with reservations to Mark Lanes allegations that
- the CIA murdered JFK).
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- PAUL AND KARLA HIT THE NET
-
- Posted By Dennis R. Hilton (drhilton@kaiwan.com)
- Copyright 1993,4 Wired Ventures, Ltd. All Rights Reserved
- For complete copyright information, please see the end of this file
-
- WIRED 2.04
- Electric Word
- *************
-
- Recent events in Canada have proven once again that - for better or worse -
- the information genie has escaped into cyberspace and can't be put back in
- the bottle. When an Ontario judge issued an order barring media coverage of
- a sensationalized murder trial, Canadians used the Net to break the ban.
-
- The case concerns Paul "Bernardo" Teale and his wife, Karla Homolka Teale,
- who were each charged in the grisly murders of two teenagers. Paul Teale
- now stands accused of 48 sex-related charges, while Karla Homolka entered
- into a plea bargain: She pleaded guilty to manslaughter and is expected to
- testify against Paul.
-
- The nonstop press coverage prompted Paul Teale's lawyer to ask for a media
- gag order until the conclusion of his trial, on the grounds that it would
- be impossible to impanel an impartial jury. Despite legal intervention by
- several major Canadian media outlets, the court imposed a ban on the
- publication of the details of the crimes.
-
- At first the ban had its desired effect. When the US television show
- A Current Affair featured the case, it was banned in Canada, and Canadian
- cable stations blacked out CNN coverage of the case.
-
- With the conventional media halted, the infosphere took over. First, two
- BBSes in Toronto began to post daily details of the trial. In August, a
- group of McGill University students created a Usenet group, alt.fan.karla-
- homolka, to discuss the case. By December, after phone calls by law-abiding
- Net surfers to systems managers, the Usenet group had been banned by
- systems managers and university officials at sites all over Canada.
-
- After the banning of alt.fan.karla-homolka, two new Usenet groups were
- created: alt.pub-ban and alt.pub-ban.homolka.
-
- Some Net users theorized that if they cross-posted all over the Net, the
- Royal Canadian Mounted Police would be in the impossible position of
- scrambling through cyberspace plugging leaks. One Net dweller jokingly
- proposed the ideal tactic: "The solution is obvious. Take the discussion to
- rec.sport.hockey. You silly Canadians would never ban that group."
-
- Other curious Canadians searched the pay-per-view news and magazine
- databases on Nexis and CompuServe for stories published by US newspapers.
- Most of the banned articles were re-posted verbatim to alt.true-crime, a
- group overlooked by the Mounties.
-
- As the infosphere grows to encompass the planet, the question is no longer
- whether certain information is too sensitive to be made public. The real
- question becomes whether it is even possible to keep certain information
- out of cyberspace. In the Teale-Homolka case, the ban was not so much
- broken as rendered irrelevant by the voracious online community: It is
- estimated that one in four Canadians knows the banned facts.
-
- Anita Susan Brenner and B. Metson
-
-
- %%%%%%%%%%%%%%%%%%%% WIRED Online Copyright Notice %%%%%%%%%%%%%%%%%%%%%%
-
- Copyright 1993,4 Wired Ventures, Ltd. All rights reserved.
-
- This article may be redistributed provided that the article and this
- notice remain intact. This article may not under any circumstances
- be resold or redistributed for compensation of any kind without prior
- written permission from Wired Ventures, Ltd.
- If you have any questions about these terms, or would like information
- about licensing materials from WIRED Online, please contact us via
- telephone (+1 (415) 904 0660) or email (info@wired.com).
-
- WIRED and WIRED Online are trademarks of Wired Ventures, Ltd.
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- AT&T CELLULAR PRIVACY SYSTEMS
- AMERITECH CELLULAR PRIVACY SERVICE USES AT&T TECHNOLOGY
-
- By David R. Arneke (darneke@attmail.com)
-
- AT&T SECURE COMMUNICATIONS SYSTEMS NEWS RELEASE
- Reprinted with permission
-
- GREENSBORO, N.C. -- Ameritech Cellular Services in Chicago has
- become the first cellular telephone system in the country to offer
- voice privacy service using the AT&T Advanced Cellular Privacy System.
-
- Ameritech launched its Enhanced Voice Privacy service in Chicago
- this month.
-
- "This technology adds to the productivity and value that
- Ameritech cellular service provides to its customers," said Thomas A.
- Brooks, AT&T Paradyne senior vice president, Secure Communications
- Systems.
-
- "And, by helping the carrier provide value to the cus- tomer,
- AT&T cellular privacy technology adds value to the carrier as well."
-
- The AT&T technology scrambles the cellular telephone's
- over-the-air signal. The signal is descrambled at Ameritech's
- cellular switch, transmitting a conventional phone signal to the
- recipient.
-
- If the scrambled over-the-air signal is intercepted, the
- eavesdropper will hear only a chirping sound. AT&T's advanced privacy
- technology renders the over-the-air signal unintelligible.
-
- The system already is in wide use in Japan in the cellular system
- of one of the two major Japanese telephone companies.
-
- The AT&T Cellular Privacy System offers cellular users a variety
- of benefits.
-
- -- Its technology is small enough and light enough to be
- embeddable in today's small, portable phones.
-
- -- The system features an unmatched combination of high voice
- quality and an advanced level of privacy.
-
- -- It is applicable to all three types of cellular telephones --
- portable, transportable ("bag phones") and mobile (car phones).
-
- The system has two components. The AT&T privacy unit attaches to
- the phone and scrambles the phone's signal. Voice privacy modules are
- available for several brands of cellular telephones, among them AT&T
- models, including the AT&T Privacy-Capable Portable Telephone 9000;
- the Audiovox 3200 series; Mitsubishi models using the Model 1200
- transceiver; the Motorola 2600; the NEC 3800B and 4800; the Oki 800
- series; and the Toshiba 3200 series.
-
- Modules for other brands and models are in development.
-
- The Mobile Telephone Office Switch (MTSO) unit is installed at
- the cellular carrier's switch and descrambles the signal.
-
- Because the privacy system scrambles only the over-the-air
- portion of the call, no matching unit or special equipment is required
- at the receiving phone.
-
- The AT&T Paradyne Cellular Privacy System was developed by AT&T
- Secure Communications Systems, a world leader in the design,
- manufacture and integration of encryption and privacy products. It is
- a primary supplier of secure products to the governments of the United
- States and other nations as well as corporations around the world.
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- CLIPPER (From The Guardian)
-
- By Mike Holderness (mikeh@gn.apc.org)
-
- This piece on the Clipper controversy appeared in the London, UK
- _Guardian_ on 3 March 1994. My apologies for the delay in circulating
- this to all of you who helped with advice and comments or expressed
- an interest; and to a couple people whose attributions got cut for space.
-
- Some Netizens may find the piece a bit wishy-washy. Better that than
- the _Independent_'s coverage, which was full of unsubstantiated claims --
- if they _know_ the NSA has a back-door, I wish they'd publish
- the evidence...
-
- I _know_ the description of the technology ended up inexact. Anyone
- who can give an exact description in fewer words gets a bottle of
- champagne next time you're in London...
-
- If you re-distribute this, please do so in its entirety and un-cut.
- Contact me to discuss terms before you publish it on paper: I have
- a freelance living to earn and a landlord to feed.
-
- (C)opyright 1994 Mike Holderness
- mikeh@gn.apc.org
- London, UK
-
- HED: Are these men a threat to freedom?
- PIC: (4-column): Gore & Clinton
-
- YOUR COMPANY is, at last, connected to the Internet. You can swap memos
- with branch offices around the world within minutes. But you naturally
- don't want your competitors, or their governments, siphoning the details
- of your bid for that dam contract in the Philippines out of the net.
- What do you do?
-
- On the other hand, when you receive an electronic message announcing a
- call for tenders, how do you know it's genuine? You've heard that it's
- possible to fake electronic mail, and you're worried about all the
- possibilities for creative industrial espionage which this opens up.
-
- Then again, you might be a Cabinet minister, setting up a meeting with
- your boyfriend on the mobile phone. Wouldn't it be good to know that
- no-one could tap the message?
-
- The answer to all these problems lies in encryption technology. The
- solution the US government proposed earlier this month, however, has
- generated a furious row in the "on-line community" about the government
- interfering in citizens' right to communicate in private. The disturbing
- implications for people outside the US have gone largely unremarked.
-
- Computer programs that can do practically unbreakable encryption are
- available to the public in the US and elsewhere. One, named PGP for
- Pretty Good Privacy, is increasingly being used to authenticate
- electronic messages (Computer Guardian, Nov ?? 1993). It can encrypt the
- whole message, or send the main text "in clear", followed by an
- encrypted block containing a mathematical "fingerprint" of the message
- and the sender's name and address. The program can thus verify whether a
- signature belongs to the purported sender and whether the message
- arrives as it left.
-
- Encryption has long worried law-enforcement agencies. What if drug- dealers
- and terrorists start using unbreakable encryption? The US government's
- Key Escrow Encryption system -- commonly known by its working title,
- Clipper -- is its answer.
-
- Clipper uses an encryption chip suitable for building into a mobile
- phone or a modem. Its method of encryption, developed by the US National
- Security Agency (NSA), depends on "keys". These are codes which are used
- mathematically to mangle the text or speech. The receiver can only get
- the original back out if they have the key and can use it to un-mangle
- -- decrypt -- the message.
-
- PGP depends on a "public-key" system. Users sending signed messages
- encrypt the signature with keys known only to them. They also issue
- public keys. These are mathematically derived from the private key, and
- allow anyone to verify the signature. If someone sends them a message
- encrypted with their public key, only the private key will extract it.
- By contrast, each Clipper chip will have an encryption key built in.
- When the chip is manufactured, two parts of the key will be lodged with
- two separate US government agencies. (In legal jargon, this is like
- "holding the keys in escrow".) A secret "super-key" allows law
- enforcement agencies to retrieve the serial number of the chip used on
- the link they're tapping.
-
- Under US guidelines released on February 4, if a law enforcement agency
- wants to eavesdrop on encrypted communications, it should send details
- of a search warrant to the agencies holding the key components.
-
- This is a red rag to the inhabitants of Internet discussion forums,
- "the world's largest functioning anarchy". There, discussions of the
- right (under the First Amendment to the Constitution) to unrestricted
- free speech can and do slip effortlessly into the belief that, as one
- participant put it, "The People must be allowed to discuss anything,
- including revolution."
-
- According to Brian Yoder, president of California company Networxx,
- "The US Constitution doesn't grant the government the power to maintain
- this kind of surveillance capability over the population. Period. The
- assumption is that anything that enhances the ability of the police to
- catch criminals is OK, but that is not what the Constitution says, and
- that's not the kind of country I want to live in."
-
- Cryptology specialist Dr Dorothy Denning at Georgetown University in
- Washington DC, who was part of a team reviewing the NSA's design
- process, points out that Clipper "will not make it any easier to tap
- phones, let alone computer networks. All it will do is make it
- technically possible to decrypt communications that are encrypted with
- the standard, assuming the communications are not super-encrypted with
- something else. Law enforcers still need to get a court order."
-
- But who trusts the NSA? The Clipper design is secret. Many assume that
- the Agency has built in a "trap-door" allowing it to break encryption
- without the keys.
-
- No-one has proposed making non-Clipper encryption illegal, but the US
- government clearly hopes to establish it as an industry standard. For
- example, while it's usually illegal to export any form of encryption
- technology from the US, it will be legal to export Clipper.
-
- Non-US companies using it to protect their communications will have to
- live with the uneasy knowledge that the NSA could be listening in -- and
- the NSA, like its UK sibling organisation GCHQ in Cheltenham, has a long
- history of intercepting foreign commercial messages for the benefit of
- home companies. (GCHQ declined to say whether it had been involved in
- any discussions over Clipper.)
-
- The protests have started. A petition organised by Computer
- Professionals for Social Responsibility against Clipper, and in favour
- of a Bill to permit export of competing encryption systems, gathered
- more than 20,000 electronic signatures in its first two weeks. Wired
- magazine has proclaimed that ``This is a pivotal moment in history'',
- accusing ``the Clinton-Gore administration'' of ``attempting a stealth
- strike on our rights''. It has asked readers to sign the CPSR petition
- against Clipper and to ``call or write your Congressional
- representatives and let them know how you feel''.
-
- Encryption and authentication are important for much more than the
- privacy of the frequently obscure or banal discussions on the Net.
- Medical and financial records are now commonly held on computers, and a
- growing proportion of business transactions take place on line.
- Cyberspace is where your money is.
-
- For private communications, Emma Nicholson MP takes a relaxed view: "In
- communicating, we should start from a belief that everyone listens to
- everything. Gossip is what makes the world go round. I have very few
- secrets. I would be deeply concerned if a device were marketed that
- could stop interception -- I would support the FBI completely."
-
- Computer-law barrister Alistair Kelman, however, believes that any
- attempt to enforce the Clipper chip as a worldwide standard would meet
- stiff opposition. The European Commission could be expected to object
- that it fell foul of Treaty of Rome provisions against misuse of a
- dominant position. "If you want to have a world standard for encryption,
- fine," Kelman said, but the EC could respond: "let's all get together
- and settle on something that meets our requirements as well."
-
- <ufpoints>
-
- Wired articles on Clipper can be obtained via the Internet by putting
- the following three lines into the body of an electronic mail message
- addressed to infobot@wired.com:
- send clipper/privacy.meeks
- send clipper/privacy.barlow
- end
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- PRIVACY: NOTES FROM CYBERSPACE
-
- These are just little tidbits picked up from here and there...feel free to
- comment on them. -Editors
-
-
- NOTES FROM CYBERSPACE - ARTICLE 1
- By Arthur Entlich (ua107@freenet.victoria.bc.ca)
- Subject: Privacy in Canada
-
- Over the last several years there has been a feeding frenzy in the private
- sector toward collection of private information. Currently, to my know-
- ledge there is only one province in Canada that has legislation on the
- books which protects individual's private information within the
- private sector, and that is Quebec, which may not be a province of
- Canada for long, if things continue.
-
- Anyway, recently a few provinces have developed Offices of Privacy and
- Freedom of Information (Ontario and British Columbia) both of which have
- "left of center" parties in power. However, these government offices
- only regulate the issues of freedom of information and privacy within the
- public sector (governmental agencies). These is also a similar
- office on a federal basis. Ther eis much to be done here to roll
- back the amount and connectivity of information in the public and
- private sector. For instance, our SIN number (Social Insurance Number)
- which was legislated originally for only about 6 programs, all relating
- to employment, has been expanded to uses such as banking, (required by law
- now) medical plans, etc, Also, the private sector has a field day with
- this number and it has basically become a national identity number.
-
- Some changes are occurring, such as in British Columbia, we were issued
- a separate and unique medical plan number after many complaints, however
- on several occasions I have by phone or in person requested information
- about my coverage and claimed I did not have my medical number handy,
- and was asked for my SIN, at which point they crossreferenced to my
- medical number, so obviously they are still connected internally.
-
- More recently, the government of B.C. has indicated that in two months
- a new program called PharmaNet will be put in place. This will hook up
- all pharmacies in the province so that ones drug profile is available
- to each pharmacist if they use a keyword you provide (the keyword was
- demanded by the office of privacy, originally it didn't even have this).
- You must provide this keyword and your medical plan number in order
- to purchase the drugs. The government claims it is becaus ethey
- have a problem with drug interactions, especially amongst the
- elderly who see numerous doctors and don't remember what they are taking.
-
- They also claim it is to prevent the practice of people seeing several
- doctors for one prescription type, then go to several pharmacies to buy
- multiple prescriptions, and then sell the drugs on the street.
-
- The government does have some justification, in that they do pay for
- the partial cost of drugs to people over 65 and they also pay for
- all drug costs over $600 per family per year. However, the vast
- majority of the population does not fit into these groups.
-
- In the private sector things are much worse. Most video stores re-
- quire D.L.# plus SIN, and they can sell this info to anyone at
- the present state of the law. Banks have gotten really nasty of
- late, and are requiring a credit card number just to open a chequing
- (or checking if you are south of the border) account. I was required
- to sign a statement when opening a simple chequing/savings account
- at a credit union which gave them permission to "acquire any information
- deemed necessary to verify the information provided, or to protect the
- credit union", and that such information could be transmitted to
- other financial institutions, branches of their company, and other
- companies they own (which includes and investment and insurance
- division). I am fighting to change this now, as the next shareholders
- meeting is in mid-April and i have submitted several resolutions to
- change the current constitution of the credit union.
-
- Anyway, I know this has been long winded... sorry. I would be most
- interested in anyone who can provide inform
- anyone who can provide information on laws in the states or elsewhere
- which deal with issues such as these. I would like to know what other
- legislation is out there to protect the privacy of personal information
- in either the public or private sector.
-
- Thanks... please E-Mail me.
-
- %%%%%%%%%%%%%%%%%%%
-
- NOTES FROM CYBERSPACE - ARTICLE 2
- By Anonymous
- Subject: What is being done about Privacy???
-
- I have been doing some reading about the available databases, I was
- shoked at some of the services that are listed. Just to name a
- few ....
-
- * Searches for SSN's, lists name, address, last transaction
- * Searches for Mass Mailings and magazine subscriptions
- * change of address, (someone also mentioned PO Box info!!)
- * for most states - car ownership and Drivers lisc history
- * Top of Credit reports (name, address, SSN, employer)
- * neighborhood searches, demographics (income, ect ..)
- * National Phone listings
- * Airplane and Boat ownership
- * Professional Lisc's
- * ect, ect, ......
-
- I have seen alot of talk about not giving out a SSN, but whats the point?
- It seems like it is already too late. I haven't seen the info in all of
- these datbases, but it seems as though Big Brother is already here.
-
- I am sure many people in this group already knew about alot of this. I
- am curious if anything is actually being done about this? I have seen
- the EFF do alot against clipper; are they doing anything against these
- databases that are open to the public (for a price)??? The clipper
- petition got alot of names, couldn't the same be done about these
- databases. I would bet most people have no idea all this personal
- information is available. They would be just as shocked as I was and
- you could get more signatures than the clipper petition.
-
- %%%%%%%%%%%%%%%%%%
-
- NOTES FROM CYBERSPACE - ARTICLE 3
- By Anonymous
- Subject: Comments on Wall Street Journal / NSA 'cryptomathematician'
-
- In the Tuesday March 22, 1994 issue of the Wall Street Journal appeared
- an interview by reporter Bob Davis of Clinton Brooks the head of the
- NSA effort for an Escrow Encryption system commonly associated with
- Clipper. In the article Mr. Brooks relates there efforts to produce
- such as system came to fruition in a timely fashion with respect to
- AT&T desiring to sell secure voice systems.
-
- Having spoken with several people marketing AT&T Surety Communications
- products, it appears that indeed, NSA 'balked', and not just over the
- point of export licensing for DES based products. AT&T also sells several
- proprietary encryption algorithms, including one approved for export
- under ITAR. These all predate clipper. One of the marketing types
- at AT&T Surety indicated that NSA didn't want DES in secure voice
- products and hinted at international agreements to limit proliferation
- of DES applications, although apparently no evidence of this has arisen
- through John Gilmores FOIA requests.
-
- If AT&T was ready to sell two tier products domestic/overseas, why
- the jump to clipper? They offered a captive market, the Justice Department,
- which has paid in the neighborhood of $8 million dollars from asset siezures
- for a couple thousand clipper phone units probably at a higher price
- than they would sell for on the open market. They have also gained the
- promise of a single tiered product, although the rest of the STUIII
- compatible products are still available. AT&T appears hard pressed to
- find a nongovernment related market place for secure voice, without
- significant non-Justice shipping. Part of this may be cost, a Telephone
- Security Device costs more than an AT&T videophone while having a lower
- complexity. A popular MODEM manufacturer Paradyne, a subsidiary of
- AT&T, sells a MODEM with more than half the complexity of the Telephone
- Security Device for $179 retail. The videophone is selling for around
- $940 while the TSD 3600, a unit sitting between your phone and the wall
- sells for $1050.
-
- AT&T appears to have had a hard time waiting for MYK-78e chip shipments
- from Mykotronx. They received the initial production lot in October or
- November, following a protracted nonreassuring rubber stamp review
- process and a NIST Encryption Escrow non Standard release, which from
- the WSJ article was staged simple for AT&Ts benefit.
-
- That and we get a secretive governmental agency starting an unprecedented
- propaganda effort. Is this a case of our government doing more for us than
- we would possibly ask? Perhaps we should ask why.
-
- %%%%%%%%%%%%%%%%%%%%
-
- NOTES FROM CYBERSPACE - ARTICLE 4
- By Anonymous
- Subject: Creative Freedom / Restrictions on Free Communcication
-
- I am aware of a case where a student made significant headway
- in development of techniques which accelerate convergence of
- algorithms used in computer arbitrage. The advisor told
- the student that this was amazing and great! But then the
- advisor tried to get the student to change the name of the
- technique to something that would make it sound like the
- advisor thought of it. Then, on the second idea the student
- mentioned, the advisor exclaimed how great it was and then
- suddenly turned around and began to try to talk the student
- out of the idea. But, the student had already convinced his/herself
- of the validity and value and stood ground on the second idea.
-
- When the student began to e-mail others in the community, the
- advisor had an irrational reaction. The advisor required the
- student to consult with (the advisor) before discussing his/her
- results vi e-mail with others in the community. Also, the advisor
- said that such discussions should not leave the local research
- group.
-
- TELL ME, IS THIS AN ETHICAL REQUIREMENT??
- WHAT DO YOU THINK IS GOING ON HERE?
-
- %%%%%%%%%%%%%%%%%%%%%
-
- NOTES FROM CYBERSPACE - ARTICLE 5
- From: James Ebright (jebright@magnus.acs.ohio-state.edu)
- Subject: Re: Wall Street Journal Interview with NSA 'cryptomathematician'
-
- My response to AT&T: I switched to MCI today... (Who else is listening
- to my true voice?) You can switch too... call 800-624-8030.
-
- My response to NSA: I still don't think folks are going to buy
- many guaranteed tapable 'secure' phones.
-
- But this shows the power of entrenched bureacuracies who have a vested
- interest in intrusive government. If the Cantwell bill passes, this
- mugging of US businesses via ITARs would be impossible.
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- KIDNAPPED BY THE STATE / INTERNET NOT SAFE
-
- By Matthew A. Mihaly (mam6@cornell.edu)
-
- O.k., here is the situation. I had been contemplating suicide and
- posted my situation on alt.romance.chat (lot's of nice people replied,
- btw.) I also posted something on alt.drugs (under the name "Matt" asking
- for some useful drugs for the purpose of killing myself (which, for any
- of you fu*king ass-sucking cops out there: I am not saying I want to).
-
- The Internet is not safe. Two days (on 3/14) after I posted it, a couple
- of cops show up at my door, along with some nut from the mental health
- department of Tompkins County (that's this county obviously) and tell me
- I have to come with them to the hospital for "an hour, maybe an hour and
- a half." I said "What if I don't choose to go." They replied that I
- don't have a choice. They informed me that I'm going with them because
- some people read my internet message and were concerned. I was in the
- middle of conducting some business on the phone and asked if I could make
- a couple of phone calls first but the pigs replied that no, I couldn't.
- In effect, they kidnapped me.
-
- So, they drive me to Tompkins County Hospital where I am forced to sit in
- a room for 2 hours (with a couple of goons waiting outside to make sure I
- don't try to run). Finally, some bitch comes in and talks to me for all
- of 4 or 5 minutes. I explicity told her that I am not planning on
- killing myself (partly due to the 20 or 30 supportive e-mail messages I
- got from people). She said it's not here decision whether I'm held or
- not but that she would go give the doctor her opinion (she left me with
- the impression that she would tell me to let me go.) The doctor came in,
- after another 45 minutes of waiting) and talked to me for maybe 2
- minutes. I said I wanted a lawyer. He said "Sure, you can always have a
- lawyer." and walked away mumbling something about always being able to
- have a lawyer. Apparently he was being sarcastic because no lawyer ever
- showed up. After another 20 minutes or so, some guy pokes his head in
- the room and asks me who I am. I didn't tell me of course, but 2 minutes
- later, some little geek walks in, sits down and says "I don't know if
- you've heard yet, but you are being transfered to a mental health ward."
- I say something to the effect of f*ck you I'm not going anywhere. By
- this time, there were a couple of goons in the room also. They told me
- that I could either go of my own free will or they would drag me there.
- Noticing that there were about six other guys standing out in the hall
- way I said I'd go. I then stood up, told the little geek that I hope he
- goes home tonight and suffers the worst kind of hell (or something to
- that effect). Then, one of the goons grabs me and drags me out into the
- hallway where I see one of those portable beds for ambulances with
- restraining devices on them.
-
- AT this point I was absolutely livid with rage. No way are you f*ckers
- restraining me I said. Well, they said I had to be restrained because I
- had just threatened the little geek with violence (not true, I just
- wished hell on him). So, they strap me down (I cooperated but was
- berating them the whole time) and put me in the ambulance and left a guy
- in the back to watch me. I was telling him what a dick he is and how big
- a violation of my human rights this was and he just told me to shut up.
- After a period of silence I apologized to him and told him I didn't mean
- anything personal. He responded with something to the effect of "Well
- f*ck you, I dont' like your tone of voice." I asked him, very
- sarcastically, if he was pleased with how well he was doing his job. He
- said "Look, I'm just doing my job here." Yeah, yeah I replied, so were
- the Nazi death-camp guards.
-
- Anyhow, they get me to this hospital (Soldiers and Sailors Memorial in
- Penn Yan, NY). They made me strip and put on stupid hospital clothes.
- By this time it was 8:30 at night (I got picked up at about 4:30) and no
- one had given me anything to eat. They gave me some graham crackers at
- this point. Whoopee.
-
- So anyhow, I wait for an hour or so and some guy named Tom Rice (yeah, I
- hope you're reading this you cocksucker) comes in and talks to me for
- about 3 minutes and says "o.k., I'm admitting you." Well, I was pretty
- pissed as you might imagine.
-
- So, they bring me upstairs, give me a room, etc., etc. and expect me to
- go to sleep until morning. Yeah, whatever. Like I can sleep when I'm a
- prisoner. I spent the whole night planning a way to escape (pathetic
- security cause I was in the wing where people with things like depression
- are kept, not the criminally insane wing). At 6:30 in the morning, they
- come in and tell me they are going to take blood from me. When I said no
- they said they were going to anyhow.
-
- Well, the long and short of this all is that I ended up spending two
- nights in a f*cking mental hospital because A) some f*ckers at Cornell
- University are idiots (I know at least one of their names so far... Leeza
- Casinelli, a therapist at our health services.. she is a fascist pig,
- don't go see her) and B) the idiot psychiatrist I saw the next morning
- said they have to keep me another night for observation. Nevermind the
- fact that I was obviously fine and the rest of the staff knew it. The
- food there sucked, I was confined in EXTREME boredom (what, they expect
- me to read 2 year old Time magazines all day???), missed many classes, a
- test, and some papers. Furthermore, I do alot of investing and lost a
- significant sum during this time.
-
- I guess my point in all this is that the Internet is definitely not safe,
- even if you aren't breaking the law. I got back about 2 hours ago from
- that f*cking place. I'm thinking about suing Cornell U (they are the
- ones who started all this) and maybe the state of New York. The way I
- look at it, I was held without indictement, without warrant, and without
- legal representation based on evidence contained on a Usenet posting. I
- mean c'mon. Like even 1/8 of the stuff posted here should be taken
- seriously. Take a look at alt.devilbunnies for instance. A completely
- amusing group, but not something to take seriously. Anyhow, I go to
- Cornell and live in Ithaca. I keep on trying to contact the ACLU here
- but no one ever answers. I've only gotten a busy signal once too. Also,
- are there any lawyers around here that someone can recommend for me?
-
- I was kidnapped and imprisoned for two days by the state. The state, not
- just of America, but the state of the world must be destroyed. Power,
- concentrated like this is absolutely tyrannical. I am not suicidial
- (although I was at one point) and these morons should have realized this.
- Be careful what you post and look into PGP encryption. F*ck the
- government and f*ck you you Cornell U. bastards. I hope you rot in the
- worst part of hell for what you put me through. If you want me to be
- depressed, go ahead, do it again. Make me miss classes, tests, and lose
- money.
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- LEGION OF DOOM T-SHIRTS!! Get 'em
-
- By Chris Goggans <phrack@well.sf.ca.us>
-
- After a complete sellout at HoHo Con 1993 in Austin, TX this past
- December, the official Legion of Doom t-shirts are available
- once again. Join the net luminaries world-wide in owning one of
- these amazing shirts. Impress members of the opposite sex, increase
- your IQ, annoy system administrators, get raided by the government and
- lose your wardrobe!
-
- Can a t-shirt really do all this? Of course it can!
-
- --------------------------------------------------------------------------
-
- "THE HACKER WAR -- LOD vs MOD"
-
- This t-shirt chronicles the infamous "Hacker War" between rival
- groups The Legion of Doom and The Masters of Destruction. The front
- of the shirt displays a flight map of the various battle-sites
- hit by MOD and tracked by LOD. The back of the shirt
- has a detailed timeline of the key dates in the conflict, and
- a rather ironic quote from an MOD member.
-
- (For a limited time, the original is back!)
-
- "LEGION OF DOOM -- INTERNET WORLD TOUR"
-
- The front of this classic shirt displays "Legion of Doom Internet World
- Tour" as well as a sword and telephone intersecting the planet
- earth, skull-and-crossbones style. The back displays the
- words "Hacking for Jesus" as well as a substantial list of "tour-stops"
- (internet sites) and a quote from Aleister Crowley.
-
- --------------------------------------------------------------------------
-
- All t-shirts are sized XL, and are 100% cotton.
-
- Cost is $15.00 (US) per shirt. International orders add $5.00 per shirt for
- postage.
-
- Send checks or money orders. Please, no credit cards, even if
- it's really your card.
-
-
- Name: __________________________________________________
-
- Address: __________________________________________________
-
- City, State, Zip: __________________________________________
-
-
- I want ____ "Hacker War" shirt(s)
-
- I want ____ "Internet World Tour" shirt(s)
-
- Enclosed is $______ for the total cost.
-
-
- Mail to: Chris Goggans
- 603 W. 13th #1A-278
- Austin, TX 78701
-
-
- These T-shirts are sold only as a novelty items, and are in no way
- attempting to glorify computer crime.
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- PUBLIC vs. MASS MEDIA: THE CASE OF THE INTERNET
-
- By Jim O'Loughlin (v049lnwe@ubvms.cc.buffalo.edu)
-
- In its initial configuration, the Internet was designed to be
- neither a public or a mass media. Twenty years ago, the ARPAnet, as
- it was then called, was a U.S. Department of Defense research experiment
- into how to create a computer network that could withstand partial
- outages, as from a bomb attack. (Krol 11) In the mid 1980s, the National
- Science Foundation created a network built on the ARPAnet technology that
- for the first time expanded access beyond computer researchers and
- government employees. The NSF promoted universal access by connecting
- universities only if they had plans to promote Internet use. (12)
- The Internet, as a network of networks, began expanding rapidly, becoming
- international and spawning commercial imitators such as Prodigy, CompuServe,
- and America Online.
-
- Currently, strictly commercial ventures are banned on the Internet,
- which is still officially only used for research purposes. However, its
- growing popularity and commercial potential have whetted the appetite of
- business. Much of the current discussion about the "information
- superhighway" revolves around how to turn the Internet into a source of
- commercial profit. Lost in much of the information superhighway rhetoric
- is the nature of most of the "traffic" on the Internet. For while media
- discussion often portrays the Internet as a science fiction version of
- Cable TV, much of its current popularity is due to its ability to
- facilitate discussions between people throughout the globe. To understand
- what is at stake in the transition from the Internet to the information
- superhighway, it is necessary to consider the cultural position of the
- Internet, or, to use C. Wright Mills terminology from *The Power Elite*,
- the extent to which the Internet is a public vs. a mass media.
-
- Though Mills's model focuses on the extent to which a population is a
- public or a mass, I believe it can be applied to media and its use.
- First, the formal media of communication need to be examined for the
- proportion of expressed to received opinions. In a public, "virtually
- as many people express opinions as receive them." (303) In essence,
- opinions would be communicated through direct discussions. In a mass,
- "far fewer people express opinions than receive them." (304) The extreme
- of the latter state would be a case in which "one person talks impersonally
- through a network of communications to millions of listeners and viewers."
- (302)
-
- The second standard is the extent to which an opinion can be
- responded to without "internal or external reprisals being taken." (302)
- Public communications would be organized to facilitate the immediate and
- effective response to any publicly expressed opinion without fear of
- retribution. The conditions of mass communications make it impossible for
- any individual to "answer back immediately or with any effect." (304)
-
- The third term of measurement would be the degree to which the
- formation of opinions can lead to social action. In a public realm,
- opinions can readily lead to effective action, even against the powers
- that be. Authorities retain tight control over opinion in a mass sphere
- and can organize and control any attempts at such action.
-
- Finally, there is the extent to which "institutionalized authority,
- with its sanctions and controls, penetrates the public." (303) Is a
- particular media one in which the public has true autonomy? In an ideal
- public, "authoritative institutions do not penetrate the public," (304) while
- in a mass, people have no autonomy from institutions of power and are
- frequently manipulated.
-
- The limitations of these terms need to be understood. They represent
- extreme types, "social reality is always some sort of mixture of the two.
- Yet we cannot readily understand just how much of which is mixed into our
- situation if we do not first understand, in terms of explicit dimensions,
- the clear-cut and extreme types." (302) The Internet functions in a
- combination of mass and public roles. Importantly, however, this paper
- will argue that much of what is involved in the creation of the information
- superhighway will turn the Internet into more of a mass media, to the
- detriment of the extent to which the Internet is currently a public media.
-
- The Internet is probably most noteworthy as a public media for the
- extent to which people have equal access to expressing and receiving
- opinions. Though large parts of the Internet exist to disperse information
- (tools such as GOPHER and MOSAIC are designed to facilitate access to
- databases and other information banks), much of the Internet is made up of
- bulletin boards, salons, or discussion groups around cultural, political or
- leisure topics (such as alt.cyberspace, soc.politics or
- rec.food.veg.cooking). Though some groups are controlled by moderators,
- the majority have no limitations on what can be posted. In a newsgroup,
- there are usually a number of parallel conversations (or threads) going
- on at any one time. In a recent overview of commercial on-line services
- in *Newsweek*, it was noted that people seem more interested in
- communication than services. "People want to talk to one another."
- (Meyer 39) On-line shopping and banking facilities have had a less than
- stellar reception, however, discussion groups have been hugely popular.
- More than 100,000 messages are posted on the Prodigy system every day.
- On the Internet, the equivalent of dozens of full-length novels are
- written on a daily basis. This interchange, or the extent to which
- authorship has become a public role, is perhaps the Internet's most
- important feature.
-
- A concern with the coming of the information superhighway is the
- extent to which these discussion groups will be affected. As the Internet
- becomes increasingly privatized, it comes questionable whether or not these
- groups will retain their current form. Some businesses have attempted to
- capitalize on their popularity. Microsoft is launching a Complete Baseball
- newsgroup that features discussions, fantasy-baseball leagues, and access to
- a wealth of statistical information. According to Barry Berkov of
- CompuServe, "this is where the growth is... Anything addictive is good."
- (quoted in Meyer 39) Groups based on entertainment or leisure topics
- (particularly ones in which certain people have an obsessive interest) may
- attract capital. It remains questionable what would happen to less
- "addictive" or more politically inclined groups.
-
- At its best, discussion on the Internet operates on a civil
- libertarian model. One is free to post whatever one wishes and free to
- participate in any of the discussions. However, the computer technology
- upon which the Internet relies also makes surveillance and reprisals a
- simple matter. It is relatively easy for any group to monitor a conversation
- (some on the Internet have suggested that governmental agencies do just
- that), and a simple matter for systems operators at any computer site to
- tap into one's account or to withdraw one's Internet privileges.
- Though cases of direct governmental intervention so far are few, there
- are cases such as the 18 year old who was arrested for threatening the
- president's life over electronic mail (president@whitehouse.gov).
-
- However, one of the most ominous recent developments has been the
- proposed "Clipper chip." A Clinton administration proposal to standardize
- encryption chips was recently developed in consultation with the National
- Security Agency. Telephones containing the Clipper chip would send out "a
- string of bits called a law enforcement field. Its purpose is to enable the
- police and the FBI to decode conversations that they wiretap pursuant to
- court order." (Wallich 116) Both computer civil libertarians and major
- software companies have been opposed to this proposal (the former for
- reasons of privacy, the latter for reasons of international competitiveness).
- The Clinton administration is currently rethinking the policy, nevertheless,
- the technology and means does exist to give the government an exclusive
- "back-door" into cellular telephones.
-
- The third criterion for measurement, the extent to which the
- formation of opinions can lead to social action, is the one in which the
- jury is still out on the Internet. Few traditional political groups are
- entirely "online," and the physical distance between Internet participants
- raises serious questions as to its use in organizing. Is cyberspace a
- locale within which social action is likely or possible? Has it become
- a medium of a public sphere in which people can engage public authorities
- "in a debate over the general rules governing relations in the basically
- privatized but publicly relevant sphere of commodity exchange and social
- labor?" (Habermas 27) Computer Professionals for Social Responsibility
- circulated an electronic petition in opposition to the Clipper Chip
- proposal. This petition was distributed to a wide variety of newsgroups
- and eventually forwarded to the president. Such examples, however, are
- the exception rather than the rule. Calls to action are rare on the
- Internet. The question would be whether that is a carry over from the
- state of the world outside of cyberspace or endemic to shifting populations
- of the Internet.
-
- The final issue to consider is the role of institutionalized
- authority. No single authority governs the Internet. A council of elders
- (called the Internet Architecture Board) from the Internet Society has
- responsibility for the technical management and direction of the Internet.
- (Krol 14) However, this group has almost no control over the actual content
- of materials over the Internet. Often the metaphor used to describe the
- rules of the Internet is "frontier justice." "The two overriding premises
- of network ethics are: Individualism is honored and fostered.
- The network is good and must be protected." (35) Such a definition seems
- a bit romanticized but it does capture the suspicion of any authorial
- intrusion into cyberspace. Many recognize that the computer technology
- which brought about the Internet also makes stricter governmental control
- a possibility.
-
- As the Internet slowly becomes repaved into the Information
- superhighway, it will be important to watch the extent to which people are
- assumed to be either a mass or a public. In the former case, we can expect
- governmental concern about consumer rights, or the ability of people to have
- the ability to obtain as much information as possible for a reasonable price.
- Such a mindset governs most federal discussions about cable television
- regulation. However, if the people are considered to constitute a public,
- then concern will be raised about what Jurgen Habermas has termed
- "participatory rights" (229) These are not simply rights which protect
- people from something (often the intrusion of government), but rights which,
- in this case, ensure people's ability to partake in freedom of assembly and
- association through the medium of the Internet.
-
- Works Cited
-
- Habermas, Jurgen. *The Structural Transformation of the Public Sphere: An
- Inquiry into a Category of Bourgeois Society* Cambridge: MIT Press,
- 1993 (1962).
-
- Krol, Ed. *The Whole Internet: User's Buide & Catalog* Sebastopal, CA:
- O'Reilly & Associates, Inc., 1992.
-
- Meyer, Michael. "The 'On-Line' War Heats Up." *Newsweek* 28 March
- 1994: 38-9.
-
- Mills, C. Wright. *The Power Elite* New York: Oxford University Press,
- 1956.
-
- Wallich Paul. "Clipper Runs Aground." *Scientific American* August 1993:
- 116.
-
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- BRUCE STERLING'S REMARKS AT CFP '94
-
- Posted By Carl Kadie (kadie@eff.org)
- Comments to Bruce Sterling (bruces@well.sf.ca.us)
-
- LITERARY FREEWARE: NOT FOR COMMERCIAL USE
-
- I've been asked to explain why I don't worry much about the
- topics of privacy threat raised by this panel. And I don't. One reason
- is that these scenarios seem to assume that there will be large,
- monolithic bureaucracies (of whatever character, political or
- economic) that are capable of harnessing computers for one-way
- surveillance of an unsuspecting populace. I've come to feel that
- computation just doesn't work that way. Being afraid of monolithic
- organizations especially when they have computers, is like being
- afraid of really big gorillas especially when they are on fire.
-
- The threat simply doesn't concur with my historical
- experience. None of the large organizations of my youth that
- compelled my fear and uneasy respect have prospered. Let me just
- roll off a few acronyms here. CCCP. KGB. IBM. GM. AEC. SAC.
-
- It was recently revealed that the CIA has been of actual
- negative worth -- literally worse than useless -- to American
- national security. They were in the pockets of the KGB during our
- death struggle with the Soviet Union -- and yet we still won.
- Japanese zaibatsus -- Japan Inc. -- the corporate monoliths of Japan
- -- how much hype have we heard about that lately? I admit that
- AT&T has prospered, sort of -- if you don't count the fact that
- they've hollowed themselves out by firing a huge percentage of their
- personnel.
-
- Suppose that, say, Equifax, turned into an outright fascist
- organization and stated abusing privacy in every way they could.
- How could they keep that a secret? Realistically, given current
- employment practices in the Western economies, what kind of
- loyalty could they command among their own personnel? The low
- level temps have no health insurance and no job security; the high
- level people are ready to grab their golden parachutes and bail at any
- time. Where is the fanatically loyal army of gray flannel
- organization men who will swear lifelong allegiance to this
- organization, or *any* organization in this country with the possible
- exception of the Mafia?
-
- I feel that the real threat to our society isn't because people
- are being surveilled but because people are being deliberately
- ignored. People drop through the safety nets. People stumble
- through the streets of every city in this country absolutely wrapped
- in the grip of demons, groping at passersby for a moment's attention
- and pity and not getting it. In parts of the Third World people are
- routinely disappeared, not because of high-tech computer
- surveillance but for the most trivial and insane reasons -- because
- they wear glasses, because they were seen reading a book -- and if
- they survive, it's because of the thin thread of surveillance carried
- out by Amnesty International.
-
- There may be securicams running 24 hours a day all around us,
- but mechanical surveillance is not the same as people actually
- getting attention or care. Sure, rich people, like most of us here, are
- gonna get plenty of attention, probably too much, a poisonous
- amount, but in the meantime life has become so cheap in this society
- that we let people stagger around right in front of us exhaling
- tuberculosis without treatment. It's not so much information haves
- and have-nots and watch and watch-nots.
-
- I wish I could speak at greater length more directly to the
- topic of this panel. But since I'm the last guy to officially speak at
- CFP IV, I want the seize the chance to grandstand and do a kind of
- pontifical summation of the event. And get some irrepressible
- feelings off my chest.
-
- What am I going to remember from CFP IV? I'm going to
- remember the Chief Counsel of NSA and his impassioned insistence
- that key escrow cryptography represents normality and the status
- quo, and that unlicensed hard cryptography is a rash and radical leap
- into unplumbed depths of lawlessness. He made a literary reference
- to BRAVE NEW WORLD. What he said in so many words was, "We're
- not the Brave New World, Clipper's opponents are the Brave New
- World."
-
- And I believe he meant that. As a professional science fiction
- writer I remember being immediately struck by the deep conviction
- that there was plenty of Brave New World to go around.
-
- I've been to all four CFPs, and in my opinion this is the darkest
- one by far. I hear ancestral voices prophesying war. All previous
- CFPs had a weird kind of camaraderie about them. People from the
- most disparate groups found something useful to tell each other.
- But now that America's premiere spookocracy has arrived on stage
- and spoken up, I think the CFP community has finally found a group of
- outsiders that it cannot metabolize. The trenchworks are going up
- and I see nothing but confrontation ahead.
-
- Senator Leahy at least had the elementary good sense to
- backpedal and temporize, as any politician would when he saw the
- white-hot volcano of technological advance in the direct path of a
- Cold War glacier that has previously crushed everything in its way.
-
- But that unlucky flak-catcher the White House sent down here
- -- that guy was mousetrapped, basically. That was a debacle! Who
- was briefing that guy? Are they utterly unaware? How on earth
- could they miss the fact that Clipper and Digital Telephony are
- violently detested by every element in this community -- with the
- possible exception of one brave little math professor this high?
- Don't they get it that everybody from Rush Limbaugh to Timothy
- Leary despises this initiative? Don't they read newspapers? The
- Wall Street Journal, The New York Times? I won't even ask if they
- read their email.
-
- That was bad politics. But that was nothing compared to the
- presentation by the gentleman from the NSA. If I can do it without
- losing my temper, I want to talk to you a little bit about how
- radically unsatisfactory that was.
-
- I've been waiting a long time for somebody from Fort Meade to
- come to the aid of Dorothy Denning in Professor Denning's heroic and
- heartbreaking solo struggle against twelve million other people with
- email addresses. And I listened very carefully and I took notes and I
- swear to God I even applauded at the end.
-
- He had seven points to make, four of which were disingenuous,
- two were half-truths, and the other was the actual core of the
- problem.
-
- Let me blow away some of the smoke and mirrors first, more
- for my own satisfaction than because it's going to enlighten you
- people any. With your indulgence.
-
- First, the kidporn thing. I am sick and tired of hearing this
- specious blackwash. Are American citizens really so neurotically
- uptight about deviant sexual behavior that we will allow our entire
- information infrastructure to be dictated by the existence of
- pedophiles? Are pedophiles that precious and important to us? Do
- the NSA and the FBI really believe that they can hide the structure of
- a telephone switch under a layer of camouflage called child
- pornography? Are we supposed to flinch so violently at the specter
- of child abuse that we somehow miss the fact that you've installed a
- Sony Walkman jack in our phones?
-
- Look, there were pedophiles before NII and there will be
- pedophiles long after NII is just another dead acronym. Pedophiles
- don't jump out of BBSes like jacks in the box. You want to impress
- me with your deep concern for children? This is Chicago! Go down
- to the Projects and rescue some children from being terrorized and
- recruited by crack gangs who wouldn't know a modem if it bit them
- on the ass! Stop pornkidding us around! Just knock it off with that
- crap, you're embarrassing yourselves.
-
- But back to the speech by Mr. Baker of the NSA. Was it just me,
- ladies and gentlemen, or did anyone else catch that tone of truly
- intolerable arrogance? Did they guy have to make the remark about
- our missing Woodstock because we were busy with our
- trigonometry? Do spook mathematicians permanently cooped up
- inside Fort Meade consider that a funny remark? I'd like to make an
- even more amusing observation -- that I've seen scarier secret
- police agencies than his completely destroyed by a Czech hippie
- playwright with a manual typewriter.
-
- Is the NSA unaware that the current President of the United
- States once had a big bushel-basket-full of hair? What does he
- expect from the computer community? Normality? Sorry pal, we're
- fresh out! Who is it, exactly, that the NSA considers a level-headed
- sober sort, someone to sit down with and talk to seriously? Jobs?
- Wozniak? Gates? Sculley? Perot -- I hope to God it's not Perot.
- Bob Allen -- okay, maybe Bob Allen, that brownshoe guy from AT&T.
- Bob Allen seems to think that Clipper is a swell idea, at least he's
- somehow willing to merchandise it. But Christ, Bob Allen just gave
- eight zillion dollars to a guy whose idea of a good time is Microsoft
- Windows for Spaceships!
-
- When is the NSA going to realize that Kapor and his people and
- Rotenberg and his people and the rest of the people here are as good
- as people get in this milieu? Yes they are weird people, and yes they
- have weird friends (and I'm one of them), but there isn't any
- normality left for anybody in this society, and when it comes to
- computers, when the going got weird the weird turned pro! The
- status quo is *over!* Wake up to it! Get used to it!
-
- Where in hell does a crowd of spooks from Fort Meade get off
- playing "responsible adults" in this situation? This is a laugh and a
- half! Bobby Ray Inman, the legendary NSA leader, made a stab at
- computer entrepreneurism and rapidly went down for the third time.
- Then he got out of the shadows of espionage and into the bright
- lights of actual public service and immediately started gabbling like
- a daylight-stricken vampire. Is this the kind of responsive public
- official we're expected to blindly trust with the insides of our
- phones and computers? Who made him God?
-
- You know, it's a difficult confession for a practiced cynic like
- me to make, but I actually trust EFF people. I do; I trust them;
- there, I've said it. But I wouldn't trust Bobby Ray Inman to go down
- to the corner store for a pack of cigarettes.
-
- You know, I like FBI people. I even kind of trust them, sort of,
- kind of, a little bit. I'm sorry that they didn't catch Kevin Mitnick
- here. I'm even sorry that they didn't manage to apprehend Robert
- Steele, who is about one hundred times as smart as Mitnick and ten
- thousand times as dangerous. But FBI people, I think your idea of
- Digital Telephony is a scarcely mitigated disaster, and I'll tell you
- why.
-
- Because you're going to be filling out your paperwork in
- quintuplicate to get a tap, just like you always do, because you don't
- have your own pet court like the NSA does. And for you, it probably
- is going to seem pretty much like the status quo used to be. But in
- the meantime, you will have armed the enemies of the United States
- around the world with a terrible weapon. Not your court-ordered,
- civilized Digital Telephony -- their raw and tyrannical Digital
- Telephony.
-
- You're gonna be using it to round up wiseguys in streetgangs,
- and people like Saddam Hussein are gonna be using it to round up
- democratic activists and national minorities. You're going to
- strengthen the hand of despotism around the world, and then you're
- going to have to deal with the hordes of state-supported
- truckbombers these rogue governments are sending our way after
- annihilating their own internal opposition by using your tools. You
- want us to put an axe in your hand and you're promising to hit us
- with only the flat side of it, but the Chinese don't see it that way;
- they're already licensing fax machines and they're gonna need a lot
- of new hardware to gear up for Tiananmen II.
-
- I've talked a long time, but I want to finish by saying
- something about the NSA guy's one real and actual argument. The
- terrors of the Brave New World of free individual encryption. When
- he called encryption enthusiasts "romantic" he was dead-on, and
- when he said the results of spreading encryption were unpredictable
- and dangerous he was also dead-on, because people, encryption is not
- our friend. Encryption is a mathematical technique, and it has about
- as much concern for our human well-being as the fact that seventeen
- times seventeen equals two hundred and eighty-nine. It does, but
- that doesn't make us sleep any safer in our beds.
-
- Encrypted networks worry the hell out of me and they have
- since the mid 1980s. The effects are very scary and very
- unpredictable and could be very destabilizing. But even the Four
- Horsemen of Kidporn, Dope Dealers, Mafia and Terrorists don't worry
- me as much as totalitarian governments. It's been a long century,
- and we've had enough of them.
-
- Our battle this century against totalitarianism has left
- terrible scars all over our body politic and the threat these people
- pose to us is entirely and utterly predictable. You can say that the
- devil we know is better than the devil we don't, but the devils we
- knew were ready to commit genocide, litter the earth with dead, and
- blow up the world. How much worse can that get? Let's not build
- chips and wiring for our police and spies when only their police and
- spies can reap the full benefit of them.
-
- But I don't expect my arguments to persuade anyone in the NSA.
- If you're NSA and I do somehow convince you, by some fluke, then I
- urge you to look at your conscience -- I know you have one -- and
- take the word to your superiors and if they don't agree with you --
- *resign.* Leave the Agency. Resign now, and if I'm right about
- what's coming down the line, you'll be glad you didn't wait till later.
-
- But even though I have a good line of gab, I don't expect to
- actually argue people out of their livelihood. That's notoriously
- difficult.
-
- So CFP people, you have a fight on your hands. I'm sorry that a
- community this young should have to face a fight this savage, for
- such terribly high stakes, so soon. But what the heck; you're
- always bragging about how clever you are; here's your chance to
- prove to your fellow citizens that you're more than a crowd of net-
- nattering MENSA dilettantes. In cyberspace one year is like seven
- dog years, and on the Internet nobody knows you're a dog, so I figure
- that makes you CFP people twenty-eight years old. And people, for
- the sake of our society and our children you had better learn to act
- your age.
-
- Good luck. Good luck to you. For what it's worth, I think you're
- some of the best and brightest our society has to offer. Things look
- dark but I feel hopeful. See you next year in San Francisco.
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- [BOOK REVIEW] DOING BUSINESS ON THE INTERNET: HOW THE ELECTRONIC
- HIGHWAY IS TRANSFORMING AMERICAN COMPANIES
-
- By Steve Brock (sbrock@teal.csn.org)
-
- DOING BUSINESS ON THE INTERNET: HOW THE ELECTRONIC HIGHWAY IS
- TRANSFORMING AMERICAN COMPANIES by Mary J. Cronin. Van Nostrand
- Reinhold, 115 Fifth Avenue, N.Y., NY 10003, (800) 544-0550, (212)
- 254-9499 FAX. Index, bibliography, list of service providers. 320
- pp., $29.95 paper. 0-442-01770-7
-
- REVIEW
-
- Buying and selling on the Internet? Deals being made? Call
- the net police! Seriously, commercial traffic is only forbidden on
- the NSFnet - the Internet backbone, and restrictions there are
- scheduled to disappear by the end of this year, when the National
- Science Foundation (NSF) turns its administration of NSFnet over to
- commercial organizations. Sensing this transition, companies are
- flocking to the Internet. In a recent survey, 63% of Internet
- traffic worldwide is by businesses or their research labs.
-
- What can businesses get from the Internet? Mary Cronin, in
- her new book "Doing Business on the Internet," has many answers.
- After an overview of the mother of all networks and tips for
- choosing a service provider, she outlines strategies for seeking
- and exchanging information, increasing productivity, and increasing
- communications between departments and with customers.
-
- Another asset for businesses is that information can be
- retrieved swiftly. While the Internet has gone through many
- permutations, businesses have business to do right now, and Cronin
- says that companies with an Internet connection can "receive the
- advantages of high-speed telecommunications and continuously
- evolving technology while learning invaluable lessons about the
- management of networked organizations."
-
- While a few may desire more information than the non-technical
- overview Cronin provides, "Doing Business on the Internet" is a
- solid introduction to networked communication and information
- retrieval - the way business is going to be conducted from now on.
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- GENERIC FLAME FORM
-
- This form is a generic-all-purpose Flame Form (tm). Don't you just hate it
- when you are reading Usenet and can't filter through all of the crap
- posted by people who simply do not have a clue! Well, maybe this form
- will cut down on some of that. If someone pisses you off on Usenet,
- fill it out and mail it to 'em.
-
- ---------cut here-------------cut here-------------cut here-------------
-
- *************************************************************************
- GENERIC FLAME FORM
- *************************************************************************
-
- Dear Sir/Madam
-
- I took exception to your recent post to alt.insert.newsgroup.here
-
- MESSAGE CONTENT SECTION
-
- It was (check all that apply):
-
- ___ lame.
- ___ stupid.
- ___ much longer than any worthwhile thought of which you may be capable.
-
- Your attention is drawn to the fact that:
-
- ___ What you posted/said has been done before.
- ___ Not only that, it was also done better the last time.
- ___ Your post was a pathetic imitation of ______________________.
- ___ Your post contained commercial advertising.
- ___ Your post contained numerous spelling errors.
- ___ Your post contained multiple grammatical errors.
- ___ YOUR POST CONTAINED EXCESSIVE CAPITALIZATION AND/OR PUNCTUATION!!!!!
- ___ Your post was an obvious forgery.
- ___ It was done clumsily.
- ___ You quoted an article in followup and added no new text.
- ___ You quoted an article in followup and only added ___ lines of text.
- ___ You quoted an article in followup and only added the line "Me, too!!!"
- ___ You flamed someone who has been around far longer than you.
- ___ You flamed someone who is far more intelligent and witty than you.
- ___ Your lines are 80 columns wide or wider.
-
- SIGNATURE SECTION
-
- ___ Your .sig is longer than four lines.
- ___ And your mailer truncated it.
- ___ Your .sig is ridiculous because (check all that apply):
- ___ You listed ___ snail mail address(es).
- ___ You listed a nine-digit ZIP code.
- ___ You listed ___ phone numbers for people to use in prank calls.
- ___ You included a stupid disclaimer.
-
- ___ Your pathetic attempt at being witty in the disclaimer failed.
- ___ Miserably.
-
- You included:
- ___ a stupid self-quote.
- ___ a stupid quote from a net.nobody.
- ___ a Rush Limbaugh quote.
- ___ a Dan Quayle joke.
- ___ a Hitler reference
- ___ a reference to the world being 6000 years old
- ___ a reference to Beavis & Butthead.
- ___ lame ASCII graphic(s) (Choose all that apply):
- ___ USS Enterprise
- ___ Australia
- ___ The Amiga logo
- ___ Company logo
- ___ and you stated that you don't speak for your employer.
- ___ Bicycle
- ___ Bart Simpson
-
- Furthermore:
-
- ___ You have greatly misunderstood the purpose of alt.insert.newsgroup.here
- ___ You have greatly misunderstood the purpose of the net.
- ___ You are a loser.
- ___ You must have spent your entire life on a milk carton to be this dumb!
- ___ This has been pointed out to you before.
-
- ___ It is recommended that you:
- ___ Stick to FidoNet and come back when you've grown up.
- ___ Find a volcano and throw yourself in.
- ___ Get a gun and shoot yourself.
- ___ Stop reading alt.censorship and get a life.
- ___ Stop sending email and get a life.
- ___ Learn the concepts of cross-posting and follow-ups
- ___ Try reading a newsgroup for a week (or more than an hour) before
- posting
-
- Additional comments:
- Follow-ups to: /dev/null
-
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- McDonnell Douglas
- AIRCRAFT-SPACE SYSTEMS-MISSILES
-
- Important! Important!
-
- Please fill out and mail this form within 10 days of purchase
-
- Thank you for purchasing a McDonnell Douglas military aircraft. In
- order to protect your new investment, please take a few moments to
- fill out the warranty registration card below. Answering the survey
- questions is not required, but the information will help us to develop new
- products that best meet your needs and desires.
-
- 1. _Mr. _Mrs. _Ms. _Lt. _Gen. _Comrade _Classified _Other
-
- First Name________________Initial____Last Name_______________________
-
- Latitude________________________Longitude____________________________
-
- Altitude____________________Password, Code Name, Etc.________________
-
- 2. Which model aircraft did you purchase?
-
- _F-15 Eagle _F-16 Falcon _F-117A Stealth _Classified
-
- 3. Date of purchase: Month___________Day___________Year____________
-
- 4. Serial Number____________________
-
- 5. Please check where this product was purchased:
-
- _Received as Gift/Aid Package
- _Catalog Showroom
- _Sleazy Arms Broker
- _Mail Order
- _Discount Store
- _Government Surplus
- _Classified
-
- 6. Please check how you became aware of the McDonnell Douglas product
- you have just purchased:
-
- _Heard loud noise, looked up
- _Store Display
- _Espionage
- _Recommended by friend/relative/ally
- _Political lobbying by Manufacturer
- _Was attacked by one
-
- 7. Please check the three (3) factors which most influenced your
- decision to purchase this McDonnell Douglas product:
-
- _Style/Appearance
- _Kickback/Bribe
- _Recommended by salesperson
- _Speed/Maneuverability
- _Comfort/Convenience
- _McDonnell Douglas Reputation
- _Advanced Weapons Systems
- _Price/Value
- _Back-Room Politics
- _Negative experience opposing one in combat
-
- 8. Please check the location(s) where this product will be used:
-
- _North America
- _Central/South America
- _Aircraft Carrier
- _Europe
- _Middle East
- _Africa
- _Asia/Far East
- _Misc. Third-World Countries
- _Classified
-
- 9. Please check the products that you currently own, or intend to purchase in
- the near future:
-
- Product Own Intend to purchase
- Color TV
- VCR
- ICBM
- Killer Satellite
- CD Player
- Air-to-Air Missiles
- Space Shuttle
- Home Computer
- Nuclear Weapon
-
- 10. How would you describe yourself or your organization? Check all
- that apply:
-
- _Communist/Socialist
- _Terrorist
- _Crazed (Islamic)
- _Crazed (Other)
- _Neutral
- _Democratic
- _Dictatorship
- _Corrupt (Latin American)
- _Corrupt (Other)
- _Primitive/Tribal
-
- 11. How did you pay for your McDonnell Douglas product?
-
- _Cash
- _Suitcases of Cocaine
- _Oil Revenues
- _Deficit Spending
- _Personal Check
- _Credit Card
- _Ransom Money
- _Traveler's Check
-
- 12. Occupation You Your Spouse
-
- Homemaker
- Sales/Marketing
- Revolutionary
- Clerical
- Mercenary
- Tyrant
- Middle Management
- Eccentric Billionaire
- Defense Minister/General
- Retired
- Student
-
- 13. To help us understand our Customers' lifestyles, please indicate
- the interests and activities in which you and your spouse enjoy
- participating on a regular basis:
-
- Activity/Interest You Your Spouse
- Golf
- Boating/Sailing
- Sabotage
- Running/Jogging
- Propaganda/Disinformation
- Destabilizing/Overthrow
- Default on Loans
- Gardening
- Crafts
- Black Market/Smuggling
- Collectibles/Collections
- Watching Sports on TV
- Wines
- Interrogation/Torture
- Household Pets
- Crushing Rebellions
- Espionage/Reconnaissance
- Fashion Clothing
- Border Disputes
- Mutually Assured Destruction
-
- Thanks for taking the time to fill out this questionnaire. Your
- answers will be used in market studies that will help McDonnell
- Douglas serve you better in the future -- as well as allowing you to
- receive mailings and special offers from other companies, governments,
- extremist groups, and mysterious consortia.
-
- Comments or suggestions about our fighter planes? Please write to:
-
- McDONNELL DOUGLAS CORPORATION
- Marketing Department
- Military Aerospace Division
- P.O. Box 800
- St. Louis, MO 55500
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- SOCIAL CONTRACT
- between an individual and the United States Government
-
- WHEREAS I wish to reside on the North American continent, and
- WHEREAS the United States Government controls the area of the
- continent on which I wish to reside, and
- WHEREAS tacit or implied contracts are vague and therefore
- unenforceable,
-
- I agree to the following terms:
-
- SECTION 1: I will surrender a percentage of my property to the
- Government. The actual percentage will be determined by the Government and
- will be subject to change at any time. The amount to be surrended may be
- based on my income, the value of my property, the value of my purchases, or
- any other criteria the Government chooses. To aid the Government in
- determining the percentage, I will apply for a Government identification
- number that I will use for all of my major financial transactions.
-
- SECTION 2: Should the Government demand it, I will surrender my liberty for
- a period of time determined by the Government and typically no shorter than
- two years. During that time, I will serve the Government in any way it
- chooses, including military service in which I may be called upon to
- sacrifice my life.
-
- SECTION 3: I will limit my behavior as demanded by the Government. I will
- consume the drugs only permitted by the Government. I will limit my sexual
- activities to those permitted by the Government. I will forsake religious
- beliefs that conflict with the Government's determination of propriety.
- More limits may be imposed at any time.
-
- SECTION 4: In consideration of the above the Government will allow me to
- find employment, subject to limits that will be subject to the Government.
- These limits may restrict my choice of career or the wages I may accept.
-
- SECTION 5: The Government will permit me to reside in the area of North
- America that it controls. Also the Government will permit me to speak
- freely, subject to limits determined by the Government's Congress and
- Supreme Court.
-
- SECTION 6: The Government will attempt to protect my life and my claim to
- the property that it has allowed me to keep. I agree not to hold the
- Government liable if it fails to protect me or my property.
-
- SECTION 7: The Government will offer various services to me. The nature
- and extent of these services will be determined by the Government and are
- subject to change at any time.
-
- SECTION 8: The Government will determine whether I may vote for certain
- Government officials. The influence of my vote will vary inversely with the
- number of voters, and I understand that it will be typically miniscule. I
- agree not to hold any elected Government officials liable for acting against
- my best interests or for breaking promises, even if those promises motivated
- me to vote for them.
-
- SECTION 9: I agree that the Government may hold me fully liable if I fail
- to abide by the above terms. In that event, the Government may confiscate
- any property that I have not previously surrended to it, and may imprison me
- for a period of time determined by the Government. I also agree that the
- Government may alter the terms of this contract at any time.
-
-
- ______________________________________ ______________________________
- SIGNATURE DATE
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- Electronic Petition to Oppose Clipper
- Please Distribute Widely
-
- On January 24, many of the nation's leading experts in cryptography
- and computer security wrote President Clinton and asked him to
- withdraw the Clipper proposal.
-
- The public response to the letter has been extremely favorable,
- including coverage in the New York Times and numerous computer and
- security trade magazines.
-
- Many people have expressed interest in adding their names to the
- letter. In response to these requests, CPSR is organizing an
- Internet petition drive to oppose the Clipper proposal. We will
- deliver the signed petition to the White House, complete with the
- names of all the people who oppose Clipper.
-
- To sign on to the letter, send a message to:
-
- Clipper.petition@cpsr.org
-
- with the message "I oppose Clipper" (no quotes)
-
- You will receive a return message confirming your vote.
-
- Please distribute this announcement so that others may also express
- their opposition to the Clipper proposal.
-
- CPSR is a membership-based public interest organization. For
- membership information, please email cpsr@cpsr.org. For more
- information about Clipper, please consult the CPSR Internet Library -
- FTP/WAIS/Gopher CPSR.ORG /cpsr/privacy/crypto/clipper
-
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- The President
- The White House
- Washington, DC 20500
-
- Dear Mr. President:
-
- We are writing to you regarding the "Clipper" escrowed encryption
- proposal now under consideration by the White House. We wish to
- express our concern about this plan and similar technical standards
- that may be proposed for the nation's communications infrastructure.
-
- The current proposal was developed in secret by federal agencies
- primarily concerned about electronic surveillance, not privacy
- protection. Critical aspects of the plan remain classified and thus
- beyond public review.
-
- The private sector and the public have expressed nearly unanimous
- opposition to Clipper. In the formal request for comments conducted
- by the Department of Commerce last year, less than a handful of
- respondents supported the plan. Several hundred opposed it.
-
- If the plan goes forward, commercial firms that hope to develop
- new products will face extensive government obstacles. Cryptographers
- who wish to develop new privacy enhancing technologies will be
- discouraged. Citizens who anticipate that the progress of technology
- will enhance personal privacy will find their expectations
- unfulfilled.
-
- Some have proposed that Clipper be adopted on a voluntary basis
- and suggest that other technical approaches will remain viable. The
- government, however, exerts enormous influence in the marketplace, and
- the likelihood that competing standards would survive is small. Few
- in the user community believe that the proposal would be truly
- voluntary.
-
- The Clipper proposal should not be adopted. We believe that if
- this proposal and the associated standards go forward, even on a
- voluntary basis, privacy protection will be diminished, innovation
- will be slowed, government accountability will be lessened, and the
- openness necessary to ensure the successful development of the
- nation's communications infrastructure will be threatened.
-
- We respectfully ask the White House to withdraw the Clipper
- proposal.
-
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- THE WHITE HOUSE
- Office of the Press Secretary
-
- For Immediate Release
-
- STATEMENT BY THE PRESS SECRETARY
-
- The President today announced a new initiative that will bring
- the Federal Government together with industry in a voluntary
- program to improve the security and privacy of telephone
- communications while meeting the legitimate needs of law
- enforcement.
-
- The initiative will involve the creation of new products to
- accelerate the development and use of advanced and secure
- telecommunications networks and wireless communications links.
-
- For too long, there has been little or no dialogue between our
- private sector and the law enforcement community to resolve the
- tension between economic vitality and the real challenges of
- protecting Americans. Rather than use technology to accommodate
- the sometimes competing interests of economic growth, privacy and
- law enforcement, previous policies have pitted government against
- industry and the rights of privacy against law enforcement.
-
- Sophisticated encryption technology has been used for years to
- protect electronic funds transfer. It is now being used to
- protect electronic mail and computer files. While encryption
- technology can help Americans protect business secrets and the
- unauthorized release of personal information, it also can be used
- by terrorists, drug dealers, and other criminals.
-
- A state-of-the-art microcircuit called the "Clipper Chip" has
- been developed by government engineers. The chip represents a
- new approach to encryption technology. It can be used in new,
- relatively inexpensive encryption devices that can be attached to
- an ordinary telephone. It scrambles telephone communications
- using an encryption algorithm that is more powerful than many in
- commercial use today.
-
- This new technology will help companies protect proprietary
- information, protect the privacy of personal phone conversations
- and prevent unauthorized release of data transmitted
- electronically. At the same time this technology preserves the
- ability of federal, state and local law enforcement agencies to
- intercept lawfully the phone conversations of criminals.
-
- A "key-escrow" system will be established to ensure that the
- "Clipper Chip" is used to protect the privacy of law-abiding
- Americans. Each device containing the chip will have two unique
- "keys," numbers that will be needed by authorized government
- agencies to decode messages encoded by the device. When the
- device is manufactured, the two keys will be deposited separately
- in two "key-escrow" data bases that will be established by the
- Attorney General. Access to these keys will be limited to
- government officials with legal authorization to conduct a
- wiretap.
-
- The "Clipper Chip" technology provides law enforcement with no
- new authorities to access the content of the private
- conversations of Americans.
-
- To demonstrate the effectiveness of this new technology, the
- Attorney General will soon purchase several thousand of the new
- devices. In addition, respected experts from outside the
- government will be offered access to the confidential details of
- the algorithm to assess its capabilities and publicly report
- their findings.
-
- The chip is an important step in addressing the problem of
- encryption's dual-edge sword: encryption helps to protect the
- privacy of individuals and industry, but it also can shield
- criminals and terrorists. We need the "Clipper Chip" and other
- approaches that can both provide law-abiding citizens with access
- to the encryption they need and prevent criminals from using it
- to hide their illegal activities. In order to assess technology
- trends and explore new approaches (like the key-escrow system),
- the President has directed government agencies to develop a
- comprehensive policy on encryption that accommodates:
-
- the privacy of our citizens, including the need to
- employ voice or data encryption for business purposes;
-
- the ability of authorized officials to access telephone
- calls and data, under proper court or other legal
- order, when necessary to protect our citizens;
-
- the effective and timely use of the most modern
- technology to build the National Information
- Infrastructure needed to promote economic growth and
- the competitiveness of American industry in the global
- marketplace; and
-
- the need of U.S. companies to manufacture and export
- high technology products.
-
- The President has directed early and frequent consultations with
- affected industries, the Congress and groups that advocate the
- privacy rights of individuals as policy options are developed.
-
- The Administration is committed to working with the private
- sector to spur the development of a National Information
- Infrastructure which will use new telecommunications and computer
- technologies to give Americans unprecedented access to
- information. This infrastructure of high-speed networks
- ("information superhighways") will transmit video, images, HDTV
- programming, and huge data files as easily as today's telephone
- system transmits voice.
-
- Since encryption technology will play an increasingly important
- role in that infrastructure, the Federal Government must act
- quickly to develop consistent, comprehensive policies regarding
- its use. The Administration is committed to policies that
- protect all American's right to privacy while also protecting
- them from those who break the law.
-
- Further information is provided in an accompanying fact sheet.
- The provisions of the President's directive to acquire the new
- encryption technology are also available.
-
- For additional details, call Mat Heyman, National Institute of
- Standards and Technology, (301) 975-2758.
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- ISDN Contacts (RBOCS)
-
- Editor's Note:
- This is a list sent to us regarding getting more info on ISDN from the
- RBOCS. We claim no accuracy to this info. I am sure that most, if not
- all of it is valid. If you need ISDN info, feel free to contact one
- of the organizations below.
-
-
- COMPANY CONTACT TELEPHONE NO.
-
- AMERITECH National ISDN Hotline 1-800-543-ISDN
- BELL ATLANTIC ISDN Sales & Technology Center 1-800-570-ISDN
- BELL SOUTH National ISDN HotLine 1-800-428-ISDN
- CINCINNATI BELL ISDN Service Center 1-513-566-DATA
- NYNEX ISDN Information Hotline 1-800-GET-ISDN
- or Roy Ray 1-914-644-5152
- PACIFIC BELL ISDN Information or Wayne Purves, 1-800-622-0735
- NI-1 Product Mgr. 1-510-823-5118
- SNET Donovan Dillon 1-203-553-2369
- STENTOR (Canada) Steve Finlay 1-604-432-3527
- SOUTHWESTERN BELL Cyd McInerney 1-314-235-1567
- U S WEST Louise Walsh 1-303-965-7073
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- BELLSOUTH ANNOUNCES LARGEST GEOGRAPHIC DEPLOYMENT OF ISDN IN THE NATION
-
- Advanced telecommuting telemedicine and education applications will become
- the most widely available in the nation as a result of a technology
- deployment plan announced today by BellSouth Telecommunications.
-
- The nine-state introduction of a new way to provide Integrated Services
- Digital Network (ISDN), which combines voice, data and video services,
- begins in June 1994. ISDN can use advanced fiber optic cable or
- traditional copper cable to transmit multiple services.
-
- Until now, a customer who wished to use ISDN needed to be served by a
- telephone office that was ISDN capable. With the innovative approach by
- BellSouth, a customer can obtain the benefits of ISDN through an alternate
- serving arrangement which eradicates geographic boundaries.
-
- "Expanded access to ISDN will facilitate customer-oriented applications
- since there are fewer technological and geographic limitations on
- availability," said Larry Carter, assistant vice president of product
- management for BellSouth Telecommunications.
-
- This announcement is the latest in a very aggressive deployment strategy
- for ISDN.
-
- -- In July 1992, Bellsouth announced the nation's first metropolitan-wide
- deployment of ISDN in the cities of Huntsville and Madison, Ala.
-
- -- Six months later, South Central Bell customers throughout the state
- of Tennessee were offered ISDN Individual Line Service and now ISDN
- availability is being expanded region wide.
-
- This announcement significantly increases the percentage of customers
- with access to ISDN capabilities and will ultimately lead to 100% of
- BellSouth customers. Until now, 50% of BellSouth's customers in major
- metropolitan areas had direct access to ISDN and 320 central offices were
- equipped with ISDN. The expanded access applies to ISDN Individual Line
- (2B+D) and MegaLink (SM) ISDN Service which is BellSouth's primary rate
- (23B+D) offering.
-
- "Previously, you had to be served directly by a central office switch
- equipped with ISDN capability. Under this new alternate serving
- arrangement, ISDN capabilities can be routed from a nearby ISDN-capable
- switch to your home or office -- at no additional charge. This
- arrangement is a cost-effective and expeditious method of deploying
- ISDN region wide," Carter said.
-
- ISDN availability is an important part of the information superhighway
- providing access at lower speeds. For example, through distance
- learning, advanced classes could be transported at very high speeds
- to a customer's city on the information highway from a university in
- another city. This high speed signal is then divided into lower speeds
- and redistributed within the city. ISDN would make these classes
- available to any school anywhere.
-
- Dr. Ira Denton, chief surgeon at Crestwood Hospital in Huntsville, Ala.,
- has used ISDN to send, receive and annotate X-rays and video images
- while talking to other physicians. Because ISDN is available citywide
- and there are no geographic restrictions, physicians can communicate
- through ISDN from any of their offices and even their homes.
-
- "Health care specialists as well as any other businesses that have
- multiple locations within a metropolitan area can benefit from this new
- capability," Carter added. "The education industry will especially benefit
- from applications including distance learning, security and truancy
- monitoring."
-
- To aid in marketing ISDN, last year BellSouth announced the "ISDN
- Applications and Solutions Plus" (IAS+) initiative where strategic
- marketing alliances are formed in major metropolitan areas to provide
- customers with complete and innovative solutions. This initiative in
- addition to the expanded access will make ISDN applications more readily
- available for BellSouth customers.
-
- BellSouth Telecommunications, Inc., with headquarters in Atlanta, provides
- telecommunications services in the BellSouth (NYSE: BLS) region. BellSouth
- Telecommunications, Inc. does business as Southern Bell in North Carolina,
- South Carolina, Georgia and Florida, and as South Central Bell in
- Kentucky, Tennessee, Alabama, Mississippi and Louisiana. These
- companies serve more than 19 million local telephone lines and provide
- local exchange and intraLATA long distance service over one of the most
- modern telecommunications networks in the world.
-
- CONTACT:
- Karen M. Roughton of BellSouth Telecommunications, 404-529-6514
- BellSouth National ISDN HotLine, 1-800-428-4736
-
- Posted by:
- Bellcore ISDN Hotline 1-800-992-ISDN
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- A CATALOG OF NATIONAL ISDN SOLUTIONS ...
-
- The files in this directory compose the final draft
- of "A Catalog of National ISDN Solutions for Selected NIUF
- Applications, Second Edition." This document was
- approved as an official product of the North American ISDN Users'
- Forum on February 11, 1994.
-
- The Catalog is intended for anyone who needs detailed
- information on how ISDN can be used today to support a wide
- variety of applications. Each of the 61 solution guides includes a
- description, picture, details on what to look for in end-systems, and
- what to ask for from the ISDN provider. A separate chapter
- presents one page summaries of over 200 products and services
- from over 100 companies. The new Catalog goes far beyond the First
- Edition. For the decision maker, example "feasibility studies" are
- included to help support a business' decision to use ISDN. Each
- solution is rewritten to be more accessible. The solutions cover
- National ISDN-1, National ISDN-2, BRI, and PRI. Applications
- range from multipoint videoconferencing to point of sale,
- telecommuting to PBX interflow. For the more technical reader,
- additional detailed information is included on a variety of topics.
-
- CONTENTS
-
- 0.ps Title page, Preface, Table of Contents, etc.
- 1.ps Introduction
- 2.ps ISDN - A Decision Maker's Perspective
- 3.0.ps National ISDN Solutions
- 3.1.A.ps NI-1 BRI Local Area Network (LAN) Solutions
- Integrating telephones and workstations
- Access on demand to local-area networks
- High performance access on demand to local-area
- networks Linking workstations with supercomputers
- Leased line replacement
- 3.1.B.ps NI-1 BRI Screen Sharing Solutions
- Screen sharing for two users
- Screen sharing for many users
- Screen sharing with workstations connected to a
- remote LAN
- 3.1.C.ps NI-1 BRI Video Solutions
- Desktop videoconferencing
- Centralized management of video images
- Videoconferencing facilities
- 3.1.D.ps NI-1 BRI Voice & Data Solutions
- Caller identification
- Call coverage
- ACD agent at home
- 3.1.E.ps NI-1 BRI File Transfer Solutions
- Flexible bandwidth allocation
- File transfer between personal computers
- File transfer between a personal computer and a host
- computer
- High speed transfer of large text and image files
- 3.1.F.ps NI-1 BRI Work-At-Home Solutions
- Telecommuting with casual data requirements
- Telecommuting and transferring files
- Telecommuting accessing interactive services
- High performance telecommuting (interactive
- graphics and text)
- 3.1.G. NI-1 BRI Facsimile and Imaging Solutions
- Group 3 facsimile
- Receiving faxes as electronic documents
- High speed access to electronic document image
- systems
- Multimedia real estate listings
- Medical document imaging
- 3.1.H.ps NI-1 BRI Transaction Services Solutions
- Credit card authorization at the point of sale
- Electronic Data Interchange (EDI)
- Insurance verification at the point of service
- Supermarket checkout
- 3.1.I.ps Other NI-1 BRI Solutions
- Access to IBM mainframes and compatibles
- Remote access to minicomputers
- Integrating voice and data communications
- Integrated communications and messaging
- Automatic utility meter reading
- University dormitory
- Access to frame relay services
- Switched access to frame relay services
- High fidelity voice transmission systems
- 3.2.ps National ISDN-2 BRI Solutions
- Roll about videoconferencing
- X.25 backup
- Packet mode screen sharing for many users
- Home office
- 3.3.0.ps National ISDN-2 PRI Solutions
- 3.3.A.ps NI-2 PRI Local Area Network (LAN) Solutions
- Local-area network interconnection
- File transfer and LAN access in PBX environment
- Private line overflow and disaster recovery
- ISDN concentrator for campus connectivity
- 3.3.B.ps NI-2 PRI Video Solutions
- PRI Videoconferencing
- Multimedia desktop video via Ethernet and
- Multirate ISDN
- Multipoint videoconferencing
- Videoconferencing facilities
- 3.3.C.ps NI-2 PRI Voice & Data Solutions
- Caller identification to PBXs and other devices
- Emergency-services call management
- Call by Call Service Selection
- 3.3.D.ps NI-2 PRI Facsimile and Imaging Solutions
- Fax mail
- Teleradiology
- 3.3.E.ps Other NI-2 PRI Solutions
- High quality audio transmission
- Access to litigation support system
- Call center load balancing
- Networked voice messaging systems
- 4.0&1.ps National ISDN Product Information and Industry
- Contacts
- 4.2.1.ps Basic Rate Terminal Adapters
- 4.2.2.ps Basic Rate Interface Cards for Personal Computers,
- Workstations, and Minicomputers; Workstations
- with Built-in ISDN
- 4.2.3.ps Attendant Consoles
- 4.2.4.ps ISDN Phones
- 4.2.5.ps Single Port ISDN LAN Bridges
- 4.2.6.ps Communications Servers, Routers, Bridges, and
- Multiport ISDN LAN Bridges and Routers
- 4.2.7.ps Inverse Multiplexers, Multiplexers, and
- Communications Controllers
- 4.2.8.ps PRI Adapters
- 4.2.9.ps Videoconferencing Systems and Multipoint Control
- Units
- 4.2.10.ps Other Products
- 4.2.11.ps Network Terminations (NT-1s)
- 4.2.12.ps Power Supplies
- 4.2.13.ps Software and Services
- 4.2.14.ps Private Network Solutions and Private Branch
- Exchanges(PBXs)
- 4.2.15.ps Service Providers
- 4.3.ps Supplier Contact Information
- 5.1.ps Selected Topics in ISDN
- Call Types and Bearer Capabilites
- Terminal Endpoint Identifiers (TEIs)
- Service Profile Identifiers (SPIDs)
- Rate Adaptation: V.110/V.120
- Lower Layer Compatibility (LLC) and Higher Layer
- Compatibility (HLC) Information Elements
- Signaling System 7 (SS7) Interconnection
- Multiline Hunt Group
- Powering and Wiring of Customer Equipment
- Configurations for High Bandwidth Applications
- Communications Server Alternatives
- NIUF ISDN Interface Groups (NIIGs) and Parameter
- Groups (NIPGs)
- Additional Information Applicable to Many ISDN
- Solutions
- Conformance Testing
- 5.2.ps ISDN Signaling Diagrams
- 6.ps Bibliography
- 7.ps Glossary of Terms
- 8.ps Acronym List
- A.ps Annex: How the NIUF is making real the promise of
- ISDN An Overview of the North American ISDN Users'
- Forum (NIUF)
- Relevance of this NIUF Catalog
- Application Profiles
- Implementation Agreements
- Versions
- Conformance Criteria and ISDN Testing
- Application Software Interfaces
- Cost Justification Worksheet
- I.ps Index
-
-
- All of the above files are uncompressed PostScript files and may
- be FTPed using the text/ASCII option.
-
- The Catalog is a publicly available document and may be
- distributed and used freely with proper recognition of the source.
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- SPRINT EXPANDS PRESENCE IN CHINA, INTRODUCES NEW SERVICES
-
-
- Interesting press release I thought you might like.
-
- THIS RELEASE WAS DISTRIBUTED IN CHINA ONLY.
- Contacts: Janis Langley, (O) 202-828-7427
-
- BEIJING, March 21, 1994 -- Sprint today announced a
- significant expansion of its presence, and product and service
- offerings, in China. Sprint also announced the immediate availability
- of three of those services -- a toll-free Sprint Express(R) number for
- calling worldwide and for collect calling to the United States, a
- prepaid calling card, and CLEARLINE(R) international private-line
- service.
-
- Sprint made the announcements today at a press briefing and
- two-day seminar to inform customers and leading Chinese organizations
- of the company's expanded local capabilities.
-
- Sprint is one of the largest telecommunications carriers in
- the United States, providing innovative calling services to nearly 8
- million customers in that country alone. Sprint offers voice, video
- and data communications services worldwide via some of the world's
- largest and most advanced networks.
-
- Sprint is a pioneer and innovator in technology. It built
- the first nationwide (40,000 kilometer) all-digital, fiber-optic
- network in the United States. It also is the first carrier to offer
- such advanced services as Asynchronous Transfer Mode -- a broadband
- service that simultaneously carries voice, data and image -- and a
- voice-recognition calling card that automatically dials frequently
- called numbers with a single-word command, such as "home" or "office."
-
- Sprint has operated locally in China since 1992 through an
- office in Beijing that primarily offered data communications systems
- support for the company's growing customer base. Its Beijing office
- now has expanded to 15 employees who represent the company's
- increasingly diverse capabilities in consumer services, including the
- Sprint Prepaid Calling Card and Sprint FONCARD(SM); international
- network solutions for large-scale multinational users; data
- communications systems and services; and international carrier
- services to provide transit and capacity for telecommunications
- carriers worldwide.
-
- Sprint China will immediately begin to offer several of
- Sprint's versatile and cost-effective calling products: a toll-free
- Sprint Express number for global calling and collect calls to the
- United States; Sprint's Prepaid Calling Card; and its CLEARLINE
- international private line service.
-
- o Sprint Express -- By dialing "108-13," callers in China can
- place collect calls to family and colleagues in the United States,
- and also charge calls to the United States and worldwide using
- their major credit card or Sprint FONCARD. Operator assistance is
- available in English, with Mandarin support planned.
-
- o Sprint's Prepaid Calling Card, which initially will be
- available only through a limited market test, lets consumers pre-
- purchase calling credits that they can use from any telephone
- without needing exact change. The card carries attractive
- designer graphics -- suitable for collectors -- and offers the
- added convenience of operator assistance.
-
- Callers can use the prepaid calling card from nearly 30
- countries for calls to virtually any other country worldwide --
- including the United States. Mandarin-language instructions are
- available for calls from China (by dialing 108-16). The card can also
- be used in more than 28 countries worldwide to make calls back to
- China or to virtually anywhere in the world.
-
- o CLEARLINE international private-line service lets
- large-scale users consolidate their international calling to receive
- volume discounts. The service is provided via Sprint's worldwide
- network, which extends from the United States through its
- participation in virtually every major submarine fiber-optic cable
- system project.
-
- "Sprint has been active in China for several years, and we
- are delighted to be able to expand our commitment to users in this
- important market by offering some of the other feature-rich, cost
- effective products popular in the United States and worldwide," said
- Herb Bradley, China country manager for Sprint International, Sprint's
- global telecommunications subsidiary.
-
- "We believe that businesses and consumers will benefit from
- these innovative services as much in China as they have in the United
- States, and we look forward to building on strong relationships we
- have formed with many Chinese organizations in delivering these new
- services," he said.
-
- Elsewhere in the Pacific Rim, Sprint has data network points
- of presence in Hong Kong, Indonesia, Japan, Korea, Taiwan, Singapore,
- Australia and New Zealand. It also has an office in Hong Kong, which
- provides sales and technical support for Sprint's business interests
- in Hong Kong, Indochina, Indonesia, Malaysia, the Philippines, Taiwan,
- Thailand and Singapore.
-
- Sprint operates fiber-optic and value-added networks that are
- among the world's largest, offering voice services to over 290
- countries and locations, packet-switched data links to more than
- 120 countries and international locations, and video services via
- one of the world's largest videoconferencing networks, serving
- nearly 40 countries. Sprint also has U.S. cellular operations that
- serve 42 metropolitan markets and more than 50 rural service
- areas. The company has more than 50,000 employees and has
- operations in six continents through more than 50 subsidiaries,
- joint ventures and distributors. Sprint's customers include 80
- percent of the 500 largest U.S. industrial corporations (the
- "Fortune 500"), and the U.S. federal government, which awarded
- Sprint a contract to provide 40 percent of the government's total
- long distance services, and data and video services, over a
- 10-year period.
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- SOCIAL SECURITY FAQ
- HOW TO GET INFORMATION AND HOW TO PROTECT YOUR OWN
-
- By Chris Hibbert (hibbert@netcom.com)
- Computer Professionals For Social Responsibility
-
- Many people are concerned about the number of organizations asking for their
- Social Security Numbers. They worry about invasions of privacy and the
- oppressive feeling of being treated as just a number. Unfortunately, I
- can't offer any hope about the dehumanizing effects of identifying you with
- your numbers. I *can* try to help you keep your Social Security Number
- from being used as a tool in the invasion of your privacy.
-
- Surprisingly, government agencies are reasonably easy to deal with; private
- organizations are much more troublesome. Federal law restricts the agencies
- at all levels of government that can demand your number and a fairly
- complete disclosure is required even if its use is voluntary. There are no
- comparable Federal laws restricting the uses non-government organizations
- can make of it, or compelling them to tell you anything about their plans.
- Some states have recently enacted regulations on collection of SSNs by
- private entities. With private institutions, your main recourse is refusing
- to do business with anyone whose terms you don't like. They, in turn, are
- allowed to refuse to deal with you on those terms.
-
-
- Short History
-
- Social Security numbers were introduced by the Social Security Act of 1935.
- They were originally intended to be used only by the social security
- program. In 1943 Roosevelt signed Executive Order 9397 which required
- federal agencies to use the number when creating new record-keeping systems.
- In 1961 the IRS began to use it as a taxpayer ID number. The Privacy Act of
- 1974 required authorization for government agencies to use SSNs in their
- data bases and required disclosures (detailed below) when government
- agencies request the number. Agencies which were already using SSN as an
- identifier before January 1, 1975 were allowed to continue using it. The
- Tax Reform Act of 1976 gave authority to state or local tax, welfare,
- driver's license, or motor vehicle registration authorities to use the
- number in order to establish identities. The Privacy Protection Study
- Commission of 1977 recommended that the Executive Order be repealed after
- some agencies referred to it as their authorization to use SSNs. I don't
- know whether it was repealed, but no one seems to have cited EO 9397 as
- their authorization recently.
-
- Several states use the SSN as a driver's license number, while others record
- it on applications and store it in their database. Some states that
- routinely use it on the license will make up another number if you insist.
- According to the terms of the Privacy Act, any that have a space for it on
- the application forms should have a disclosure notice. Many don't, and
- until someone takes them to court, they aren't likely to change. (Though
- New York recently agreed to start adding the notice on the basis of a letter
- written by a reader of this blurb.)
-
- The Privacy Act of 1974 (Pub. L. 93-579) requires that any federal, state,
- or local government agency that requests your Social Security Number has to
- tell you four things:
-
- 1: Whether disclosure of your Social Security Number is required or
- optional,
-
- 2: What statute or other authority they have for asking for your number,
-
- 3: How your Social Security Number will be used if you give it to them, and
-
- 4: The consequences of failure to provide an SSN.
-
- In addition, the Act says that only Federal law can make use of the Social
- Security Number mandatory. So anytime you're dealing with a government
- institution and you're asked for your Social Security Number, just look for
- the Privacy Act Statement. If there isn't one, complain and don't give your
- number. If the statement is present, read it. If it says giving your
- Social Security Number is voluntary, you'll have to decide for yourself
- whether to fill in the number.
-
-
- Private Organizations
-
- The guidelines for dealing with non-governmental institutions are much more
- tenuous. Most of the time private organizations that request your Social
- Security Number can get by quite well without your number, and if you can
- find the right person to negotiate with, they'll willingly admit it. The
- problem is finding that right person. The person behind the counter is
- often told no more than "get the customers to fill out the form completely."
-
- Most of the time, you can convince them to use some other number. Usually
- the simplest way to refuse to give your Social Security Number is simply to
- leave the appropriate space blank. One of the times when this isn't a
- strong enough statement of your desire to conceal your number is when
- dealing with institutions which have direct contact with your employer.
- Most employers have no policy against revealing your Social Security Number;
- they apparently believe that it must be an unintentional slip when an
- employee doesn't provide an SSN to everyone who asks.
-
- Public utilities (gas, electric, phone, etc.) are considered to be private
- organizations under the laws regulating SSNs. Most of the time they ask for
- an SSN, and aren't prohibited from asking for it, but they'll usually relent
- if you insist. Ask to speak to a supervisor, insist that they document a
- corporate policy requiring it, ask about alternatives, ask why they need it
- and suggest alternatives.
-
- Lenders and Borrowers
- (those who send reports to the IRS)
-
- Banks and credit card issuers and various others are required by the IRS to
- report the SSNs of account holders to whom they pay interest or when they
- charge interest and report it to the IRS. If you don't tell them your
- number you will probably either be refused an account or be charged a
- penalty such as withholding of taxes on your interest.
-
- Most banks send your name, address, and SSN to a company called ChexSystem
- when you open an account. ChexSystem keeps a database of people whose
- accounts have been terminated for fraud or chronic insufficient funds in the
- past 5 years. ChexSystems is covered by the Fair Credit Reporting Act, and
- the bank is required to let you know if it refuses to open your account
- and a report from ChexSystems was a factor. You can also send a letter to
- ChexSystems directly and request a copy of your report.
-
- Many Banks, Brokerages, and other financial institutions have started
- implementing automated systems to let you check your balance. All too often,
- they are using SSNs as the PIN that lets you get access to your personal
- account information. If your bank does this to you, write them a letter
- pointing out how common it is for the people with whom you have financial
- business to know your SSN. Ask them to change your PIN, and if you feel
- like doing a good deed, ask them to stop using the SSN as a default
- identifier for their other customers. Some customers will believe that
- there's some security in it, and be insufficiently protective of their
- account numbers.
-
- Sometimes banks provide for a customer-supplied password, but are reluctant
- to advertise it. The only way to find out is to ask if they'll let you
- provide a password. (This is reportedly true of Citibank Visa, e.g. They
- ask for a phone number but are willing to accept any password.)
-
- When buying (and possibly refinancing) a house, most banks will now ask for
- your Social Security Number on the Deed of Trust. This is because the
- Federal National Mortgage Association recently started requiring it. The
- fine print in their regulation admits that some consumers won't want to give
- their number, and allows banks to leave it out when pressed. [It first
- recommends getting it on the loan note, but then admits that it's already on
- various other forms that are a required part of the package, so they already
- know it. The Deed is a public document, so there are good reasons to refuse
- to put it there, even though all parties to the agreement already have
- access to your number.]
-
- Insurers, Hospitals, Doctors
-
- No laws require medical service providers to use your Social Security Number
- as an ID number (except for Medicare, Medicaid, etc.) They often use it
- because it's convenient or because your employer uses it to identify
- employees to its groups health plan. In the latter case, you have to get
- your employer to change their policies. Often, the people who work in
- personnel assume that the employer or insurance company requires use of the
- SSN when that's not really the case. When a previous employer asked for my
- SSN for an insurance form, I asked them to try to find out if they had to
- use it. After a week they reported that the insurance company had gone
- along with my request and told me what number to use. Blood banks also ask
- for the number but are willing to do without if pressed on the issue.
- After I asked politely and persistently, the blood bank I go to agreed that
- they didn't have any use for the number. They've now expunged my SSN from
- their database, and they seem to have taught their receptionists not to
- request the number.
-
- Most insurance companies share access to old claims through the Medical
- Information Bureau. If your insurance company uses your SSN, other
- insurance companies will have a much easier time finding out about your
- medical history. You can get a copy of the file MIB keeps on you by writing
- to Medical Information Bureau, P.O. Box 105, Essex Station, Boston, MA
- 02112. Their phone number is (617)426-3660.
-
- If an insurance agent asks for your Social Security Number in order to
- "check your credit", point out that the contract is invalid if your check
- bounces or your payment is late. They don't need to know what your credit
- is like, just whether you've paid them.
-
- Children
-
- The Family Support Act of 1988 (Pub. L. 100-485) requires states to require
- parents to give their Social Security Numbers in order to get a birth
- certificate issued for a newborn. The law allows the requirement to be
- waived for "good cause", but there's no indication of what may qualify.
-
- The IRS requires taxpayers to report SSNs for dependents over one year of
- age, but the requirement can be avoided if you're prepared to document the
- existence of the child by other means if challenged. The law on this can be
- found at 26 USC 6109. The penalty for not giving a dependant's number is
- only $5. Several people have reported that they haven't provided SSNs for
- their dependents for several years, and haven't been challenged by the IRS.
-
- Universities and Colleges
-
- Universities that accept federal funds are subject to the Family Educational
- Rights and Privacy Act of 1974 (the "Buckley Amendment"), which prohibits
- them from giving out personal information on students without permission.
- There is an exception for directory information, which is limited to names,
- addresses, and phone numbers, and another exception for release of
- information to the parents of minors. There is no exception for Social
- Security Numbers, so covered Universities aren't allowed to reveal students'
- numbers without their permission. In addition, state universities are bound
- by the requirements of the Privacy Act, which requires them to provide the
- disclosures mentioned above. If they make uses of the SSN which aren't
- covered by the disclosure they are in violation.
-
- Why SSNs are a bad choice for UIDs in data bases
-
- Database designers continue to introduce the Social Security Number as the
- key when putting together a new database or when re-organizing an old one.
- Some of the qualities that are (often) useful in a key and that people think
- they are getting from the SSN are Uniqueness, Universality, Security, and
- Identification. When designing a database, it is instructive to consider
- which of these qualities are actually important in your application; many
- designers assume unwisely that they are all useful for every application,
- when in fact each is occasionally a drawback. The SSN provides none of
- them, so designs predicated on the assumption that it does provide them will
- fail in a variety of ways.
-
- Uniqueness
-
- Many people assume that Social Security Numbers are unique. They were
- intended by the Social Security Administration to be unique, but the SSA
- didn't take sufficient precautions to ensure that it would be so. They have
- several times given a previously issued number to someone with the same name
- and birth date as the original recipient, thinking it was the same person
- asking again. There are a few numbers that were used by thousands of people
- because they were on sample cards shipped in wallets by their manufacturers.
- (One is given below.)
-
- The passage of the Immigration reform law in 1986 caused an increase in the
- duplicate use of SSNs. Since the SSN is now required for employment,
- illegal immigrants must find a valid name/SSN pair in order to fool the INS,
- and IRS long enough to collect a paycheck. Using the SSN when you can't
- cross-check your database with the SSA means you can count on getting some
- false numbers mixed in with the good ones.
-
- Universality
-
- Not everyone has a Social Security Number. Foreigners are the primary
- exception, but many children don't get SSNs until they're in school. They
- were only designed to be able to cover people who were eligible for Social
- Security.
-
- Identification
-
- Few people ever ask to see an SSN card; they believe whatever you say. The
- ability to recite the number provides little evidence that you're associated
- with the number in anyone else's database.
-
- There's little reason to carry your card with you anyway. It isn't a good
- form of identification, and if your wallet is lost or stolen, it provides
- another way for the thief to hurt you, especially if any of your banks use
- the SSN as your PIN.
-
- Security
-
- The card is not at all forgery-resistant, even if anyone did ever ask for
- it. The numbers don't have any redundancy (no check-digits) so any 9-digit
- number in the range of numbers that have been issued is a valid number.
- It's relatively easy to copy the number incorrectly, and there's no way to
- tell that you've done so.
-
- In most cases, there is no cross-checking that a number is valid. Credit
- card and checking account numbers are checked against a database almost
- every time they are used. If you write down someone's phone number
- incorrectly, you find out the first time you try to use it.
-
-
-
- Why you should resist requests for your SSN
-
- When you give out your number, you are providing access to information about
- yourself. You're providing access to information that you don't have the
- ability or the legal right to correct or rebut. You provide access to data
- that is irrelevant to most transactions but that will occasionally trigger
- prejudice. Worst of all, since you provided the key, (and did so
- "voluntarily") all the info discovered under your number will be presumed to
- be true, about you, and relevant.
-
- A major problem with the use of SSNs as identifiers is that it makes it hard
- to control access to personal information. Even assuming you want someone
- to be able to find out some things about you, there's no reason to believe
- that you want to make all records concerning yourself available. When
- multiple record systems are all keyed by the same identifier, and all are
- intended to be easily accessible to some users, it becomes difficult to
- allow someone access to some of the information about a person while
- restricting them to specific topics.
-
- Unfortunately, far too many organizations assume that anyone who presents
- your SSN must be you. When more than one person uses the same number, it
- clouds up the records. If someone intended to hide their activities, it's
- likely that it'll look bad on whichever record it shows up on. When it
- happens accidentally, it can be unexpected, embarrassing, or worse. How do
- you prove that you weren't the one using your number when the record was
- made?
-
-
- What you can do to protect your number
-
- If despite your having written "refused" in the box for Social Security
- Number, it still shows up on the forms someone sends back to you (or worse,
- on the ID card they issue), your recourse is to write letters or make phone
- calls. Start politely, explaining your position and expecting them to
- understand and cooperate. If that doesn't work, there are several more
- things to try:
-
- 1: Talk to people higher up in the organization. This often works
- simply because the organization has a standard way of dealing
- with requests not to use the SSN, and the first person you deal
- with just hasn't been around long enough to know what it is.
-
- 2: Enlist the aid of your employer. You have to decide whether talking
- to someone in personnel, and possibly trying to change
- corporate policy is going to get back to your supervisor and
- affect your job.
-
- 3: Threaten to complain to a consumer affairs bureau. Most newspapers
- can get a quick response. Ask for their "Action Line" or
- equivalent. If you're dealing with a local government agency,
- look in the state or local government section of the phone book
- under "consumer affairs." If it's a federal agency, your
- congressmember may be able to help.
-
- 4: Insist that they document a corporate policy requiring the number.
- When someone can't find a written policy or doesn't want to
- push hard enough to get it, they'll often realize that they
- don't know what the policy is, and they've just been following
- tradition.
-
- 5: Ask what they need it for and suggest alternatives. If you're
- talking to someone who has some independence, and they'd like
- to help, they will sometimes admit that they know the reason
- the company wants it, and you can satisfy that requirement a
- different way.
-
- 6: Tell them you'll take your business elsewhere (and follow through if
- they don't cooperate.)
-
- 7: If it's a case where you've gotten service already, but someone
- insists that you have to provide your number in order to have a
- continuing relationship, you can choose to ignore the request
- in hopes that they'll forget or find another solution before
- you get tired of the interruption.
-
- If someone absolutely insists on getting your Social Security Number, you
- may want to give a fake number. There are legal penalties for providing
- a false number when you expect to gain some benefit from it. A federal
- court of appeals ruled that using a false SSN to get a Driver's License
- violates the federal law.
-
- There are a few good choices for "anonymous" numbers. Making one up at
- random is a bad idea, as it may coincide with someone's real number and
- cause them some amount of grief. It's better to use a number like
- 078-05-1120, which was printed on "sample" cards inserted in thousands of
- new wallets sold in the 40's and 50's. It's been used so widely that both
- the IRS and SSA recognize it immediately as bogus, while most clerks haven't
- heard of it.
-
- There are several patterns that have never been assigned, and which
- therefore don't conflict with anyone's real number. They include numbers
- with any field all zeroes, and numbers with a first digit of 8 or 9.
- For more details on the structure of SSNs and how they are assigned, use
- anonymous ftp to retrieve the file:
- /cpsr/privacy/ssn/SSN-structure from the machine cpsr.org.
-
- Giving a number with an unused patterns rather than your own number isn't
- very useful if there's anything serious at stake since they're likely to be
- noticed . The Social Security Administration recommends that people showing
- Social Security cards in advertisements use numbers in the range 987-65-4320
- through 987-65-4329.
-
- If you're designing a database or have an existing one that currently uses
- SSNs and want to use numbers other than SSNs, you should make your
- identifiers use some pattern other than 9 digits. You can make them longer
- or shorter than that, or include letters somewhere inside. That way no one
- will mistake the number for an SSN.
-
- The Social Security Administration recommends that you request a copy of
- your file from them every few years to make sure that your records are
- correct (your income and "contributions" are being recorded for you, and
- no one else's are.) As a result of a recent court case, the SSA has agreed
- to accept corrections of errors when there isn't any contradictory evidence,
- SSA has records for the year before or after the error, and the claimed
- earnings are consistent with earlier and later wages. (San Jose Mercury
- News, 5/14, 1992 p 6A) Call the Social Security Administration at
- (800) 772-1213 and ask for Form 7004, (Request for Earnings and Benefit
- Estimate Statement.)
-
- When All Else Fails
- (Getting a Replacement Number)
-
- The Social Security Administration (SSA) will occasionally issue a
- replacement SSN. The most common justification is that the SSA or the IRS
- has mixed together earnings records from more than one person, and since one
- of the people can't be located, it's necessary to issue a new number to the
- other. The SSA tries very hard to contact the person who is using the
- number incorrectly before resorting to this process.
-
- There are a few other situations that the SSA accepts as justifying a new
- number. The easiest is if the number contains the sequences 666 or 13. The
- digits need to be consecutive according to SSA's policy manual, but may be
- separated by hyphens. You apparently don't have to prove that your religious
- objection is sincere. Other commonly accepted complaints include harassment,
- sequential numbers assigned to family members, or serious impact on your
- credit history that you've tried to clear up without success.
-
- In all cases, the process includes an in-person interview at which you have
- to establish your identity and show that you are the original assignee of
- the number. The decision is normally made in the local office. If the
- problem is with a credit bureau's records, you have to show that someone
- else continues to use your number, and that you tried to get the credit
- bureau to fix your records but were not successful. When they do issue a
- new number, the new recoreds are linked to the old ones. (Unless you can
- convince them that your life might be endangered by such a link.)
-
- There are a few justifications that they don't accept at all: attempting to
- avoid legal responsibilities, poor credit record which is your own fault,
- lost SSNm card (without evidence that someone else has used it), or use of
- the number by government agencies or private companies.
-
- The only justification the SSA accepts for cancelling the issuance of an SSN
- is that the number was assigned under their Enumeration at Birth (wherein
- SSNs are assigned when birth certificates are issued) program without the
- parent's consent. In this case, the field officer is instructed to try very
- hard to convince the parent that getting the number revoked is futile, but
- to give in when the parent is persistent.
-
- US Passports
-
- The application for US Passports (DSP-11 12/87) requests a Social Security
- Number, but gives no Privacy Act notice. There is a reference to "Federal
- Tax Law" and a misquotation of Section 6039E of the 1986 Internal Revenue
- Code, claiming that the section requires that you provide your name, mailing
- address, date of birth, and Social Security Number. The referenced section
- only requires TIN (SSN), and it requires that it be sent to the IRS and not
- to the Passport office. It appears that when you apply for a passport, you
- can refuse to reveal your SSN to the passport office, and instead mail a
- notice to the IRS, giving only your SSN (other identifying info optional)
- and notifying them that you are applying for a passport. [Copies (in
- postscript) of the letter that was used by one contributor (The measure of
- his success is that he didn't hear back from any with complaints.) are
- available by anonymous ftp from cpsr.org in /cpsr/privacy/ssn/passport.ps.Z.
- I'd be interested in hearing how the State department and the Post Office
- (which processes passport applications) react.]
-
-
- Results from Some Recent Legal Cases (3/24/93)
-
- CPSR joined two legal cases in 1992 which concerned Social Security Numbers
- and privacy. One of them challenged the IRS practice of printing Social
- Security Numbers on mailing labels when they send out tax forms and related
- correspondence. The other challenged Virginia's requirement of a Social
- Security Number in order to register to vote.
-
- Dr. Peter Zilahy Ingerman filed suit against the IRS in Federal District
- Court in 1991, and CPSR filed a friend of the court brief in August '91. The
- case was decided in favor of the IRS. According to "Privacy Journal", the
- IRS plans to start covering the SSNs on its mailing labels, but they made
- the decision too late to affect this year's returns. Some people got a
- version that hid their numbers, but it was apparently a pilot project in
- limited areas. |
-
- The Virginia case was filed by a resident who refused to supply a Social
- Security Number when registering to vote. When the registrar refused to
- accept his registration, he filed suit. He also challenged Virginia on two
- other bases: the registration form lacked a Privacy Act notice, and the
- voter lists they publish include Social Security Numbers. The Federal court
- of appeals ruled that Virginia may not require the disclosure of Social
- Security numbers as a condition of registering to vote. The court said that
- the Virginia requirement places an "intolerable burden" on the right to
- vote. The case is officially referred to as Greidinger v. Davis, No.
- 92-1571, Fourth Circuit Court of Appeals, March 22, 1993.
-
-
- If you have suggestions for improving this document please send them to me
- at:
- Chris Hibbert
- hibbert@netcom.com or 1195 Andre Ave.
- Mountain View, CA 94040
-
-
-
- New versions of this posting are always available using any of the
- following mechanisms. You can use anonymous ftp from the following
- sites:
-
- Site Location
-
- rtfm.mit.edu /pub/usenet-by-hierarchy/news/answers/ssn-privacy
- ftp.pica.army.mil /pub/privacy/ssn-privacy.faq
- ftp.cpsr.org /cpsr/privacy/ssn/Social_Security_Number_FAQ
-
- Gopher can retrieve it from gopher.cpsr.org. World Wide Web (www) can
- find it using the following locator (and probably several others you
- could construct from the other directions I've given):
-
- http://polar.pica.army.mil/ssn_faq.html
-
- You can also retrieve it by sending email to
-
- Address Command (omit the quotes)
-
- listserv@cpsr.org "GET cpsr/privacy/ssn Social_Security_Number_FAQ"
- mail-server@rtfm.mit.edu
- "send usenet-by-hierarchy/news/answers/ssn-privacy"
-
- You can also ask for general help from either of these email servers by
- sending a message to the same address with just "help" in the body.
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- CLIPPER CHIP IS YOUR FRIEND, NSA CONTENDS
- NSA Seeks to Dispel Misgivings of Public About Clipper Chip
-
- By Bob Davis
-
- Staff Reporter of The Wall Street Journal.
- (C)1994 Wall Street Journal
-
- FORT MEADE, Md. --- The National Security Agency wants everyone to know
- that its new computer-security system will protect individual privacy.
- But as the spy agency knows, hardly anyone believes that.
-
- Critics fear the government will use the NSA technology, designed in
- secret, to spy on Americans. The project "is a focal point for the
- distrust of government," acknowledges Clinton Brooks, the NSA scientist
- who led the so-called Clipper Chip project, in the agency's first
- interview on the subject.
-
- The Clinton administration last month adopted the NSA plan for a series
- of computer chips that would protect telephones and computers. Use
- of the technology would be voluntary. Federal agencies would adopt it
- first, and public use is expected to spread gradually.
-
- Under the plan, cryptographic "keys" that could unscramble the
- communications would be split in two and held separately at the Treasury
- Department and the National Institute of Standards and Technology. That
- way, law-enforcement agents could tap the communications by getting court
- authorization to obtain the two halves. The idea is to boost security
- but to keep the technology out of the hands of criminals and spies.
-
- The NSA is the world's biggest eaves-dropper. Equipped with the latest
- in super-computers and satellite receivers, it targets communications by
- foreign governments. The agency shuns publicity but agreed to the
- interview to explain its role in the Clipper controversy and try to
- dispel fears. Mr. Brooks, a 26-year veteran of the NSA, says the project
- began in 1989 and cost more than $2.5 million.
-
- He says the NSA is consumed with what it calls the "equities problem" ---
- how to balance privacy rights against the needs of law enforcement,
- national security and private industry. In 1989, he and Raymond Kammer,
- deputy director of NIST, began discussions about how to improve computer
- security without making it impenetrable to police. NIST is a Commerce
- Department agency with formal responsibility for unclassified computer
- security.
-
- Before the interview, Mr. Brooks takes a look around a small cryptographic
- museum just outside the NSA's gates. He stands before an exhibit of
- Enigma machines, used by the Germans during World War II to encrypt
- messages --- and later broken by Allied intelligence. Enigma started as
- a commercial product; recognizing its military value, the Nazis pulled
- it off the market. "That was the concern we're wrestling with today,"
- Mr. Brooks says --- commercial encryption technology becoming so good that
- U.S. spy agencies can't crack it.
-
- In 1989, NIST and the NSA put together an eight-person team, split evenly
- between the agencies, to quietly work out security concepts. The team
- decided against using a weak encryption code --- "Roman Numeral One is
- that it had to be good security," says Mr. Brooks. And it also rejected
- a so-called trapdoor approach, in which the computer code would be
- designed so it would have a weak spot --- a trapdoor --- that federal
- agencies could enter via computer to tap the communications. Someone else
- could discover the trapdoor, they decided.
-
- The team settled on a system with a powerful encryption formula, called
- an algorithm, and encryption keys that would be held by outsiders. Law-
- enforcement agencies could get copes of the keys when they needed to bug
- the conversations. The toughest decision, both Mr. Brooks and Mr. Kammer
- say, was to keep the algorithm, dubbed the Skipjack, secret. That meant
- the public wouldn't know for sure whether the NSA had inserted a trapdoor
- or some other eavesdropping device.
-
- "It would defeat the purpose [of the project] if we gave the knowledge
- of how the algorithm worked" to the public, says the 56-year-old Mr.
- Brooks. "It was going to have to be kept classified." Otherwise, he
- explains, engineers could use the algorithm to design computer-security
- systems that the government's encryption keys couldn't unlock.
-
- By 1990, he says, as many as 30 NSA "cryptomathematicians" and other
- employees were working to perfect the algorithm and other features. A
- year later, the NSA launched what it called the Capstone Project to build
- the algorithm into a computer chip. The NSA contracted with Mykotronx
- Inc., a small company in Torrance, Calif., to do much of the development.
- By September 1992, the NSA was confident the system would work.
-
- None too early for the NSA. Earlier that year, Mr. Brooks says, American
- Telephone & Telegraph Co. informed the NSA that it wanted to sell a
- phone using a popular encryption technology to scramble conversations.
- The NSA balked. "We said it probably wouldn't get an export license
- from this country," Mr. Brooks says. Instead, AT&T was told of the
- Capstone work and agreed to use the technology if it became a federal
- standard and was exportable, he says. The NSA then took some of the
- functions of the Capstone chip and tailored it to phone equipment, calling
- the resulting product the Clipper Chip. For computers, Capstone was
- encased on a computer card that became known as Tessera.
-
- The the Bush administration, enmeshed in a re-election bid, never pushed
- Capstone. So shortly after the election, National-security heavyweights
- importuned the Clinton transition team to move quickly on Capstone. Just
- weeks after the inauguration, the new administration's national-security
- team was debating the NSA proposal and in April announced to the public
- that it would adopt the scheme.
-
- Last month, the administration gave the final go-ahead --- despite
- withering criticism from industry. Vice President Gore called encryption
- a "law and order issue." NIST's Mr. Kammer says the new administration
- was also trying to line up backing among national-security officials to
- liberalize export controls on computer equipment and other high-tech
- gear.
-
- The high-tech industry was stunned at the decision. David Peyton, vice
- president of the Information Technology Association of America, a trade
- group of computer companies, says the scheme will dangerously centralize
- power in the federal government and will limit exports. James Bidzos,
- president of a computer-security firm, RSA Data Security Inc., goes
- further. He posted a letter on the Internet computer network arguing
- that Clipper may be the "visible portion of a large-scale covert
- operation on U.S. soil by NSA."
-
- Nonsense, responds Mr. Brooks, who says he is distressed by the
- "emotionalism" of the arguments. "The only reason we're involved is
- that we have the best cryptomathematicians in the country."
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- In the super-state, it really does not matter at all what
- actually happened. Truth is what the government chooses
- to tell you. Justice is what it wants to happen.
- --Jim Garrison, New Orleans District Attorney
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- Download Complete. 148539 total bytes, 1456 bytes/sec
-