home *** CD-ROM | disk | FTP | other *** search
- Computer underground Digest Wed Apr 14 1993 Volume 5 : Issue 27
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Archivist: Brendan Kehoe
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Cooyp Editor: Etaoin Shrdlu, Senior
-
- CONTENTS, #5.27 (Apr 14 1993)
- File 1--EFF and CPSR testimony against 18 USC 1030 Sent. Revisions
- File 2--CPSR Comments on 1030 Guidelines
- File 3--EFF Response to Proposed Sentencing Guidelines
- File 4--LEGISLATIVE DATA ONLINE -- AB1624 needs support
- File 5--AB1624 MANDATES ONLINE PUBLIC ACCESS TO LEGISLATIVE RECORDS
- File 6--Some comments on AB1624 re online legislative access
- File 7--AB1624 UPDATE#1--Making Leg. Data available Online
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
- editors may be contacted by voice (815-753-6430), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115.
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL0 and DL12 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
- WHQ) 203-832-8441 NUP:Conspiracy
- CuD is also available via Fidonet File Request from 1:11/70; unlisted
- nodes and points welcome.
- EUROPE: from the ComNet in Luxembourg BBS (++352) 466893;
-
- ANONYMOUS FTP SITES:
- UNITED STATES: ftp.eff.org (192.88.144.4) in /pub/cud
- uglymouse.css.itd.umich.edu (141.211.182.53) in /pub/CuD/cud
- halcyon.com( 202.135.191.2) in /pub/mirror/cud
- AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
- EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
- ftp.warwick.ac.uk in pub/cud (United Kingdom)
-
- Back issues also may be obtained through mailservers at:
- mailserv@batpad.lgb.ca.us or server@blackwlf.mese.com
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Some authors do copyright their material, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: Wed, Apr 12 93 122:12:21 CST
- From: Moderators <tk0jut2@mvs.cso.niu.edu>
- Subject: File 1--EFF and CPSR testimony against 18 USC 1030 Sent. Revisions
-
- On March 22, '93, the U.S. Sentencing Commission held public hearings
- for input on revision in federal sentencing guidelines. CuD 5.09
- reprinted the proposed revisions, and Jack King (gjk@well.sf.ca.us)
- wrote the following:
-
- The U.S. Dept. of Justice has asked the U.S. Sentencing
- Commission to promulgate a new federal sentencing guideline,
- Sec. 2F2.1, specifically addressing the Computer Fraud and
- Abuse Act of 1988 (18 USC 1030), with a base offense level
- of 6 and enhancements of 4 to 6 levels for violations of
- specific provisions of the statute.
-
- The new guideline practically guarantees some period of
- confinement, even for first offenders who plead guilty.
-
- For example, the guideline would provide that if the
- defendant obtained "protected" information (defined as
- "private information, non-public government information, or
- proprietary commercial information), the offense level would
- be increased by two; if the defendant disclosed protected
- information to any person, the offense level would be
- increased by four levels, and if the defendant distributed
- the information by means of "a general distribution
- system," the offense level would go up six levels.
-
- The proposed commentary explains that a "general
- distribution system" includes "electronic bulletin board
- and voice mail systems, newsletters and other publications,
- and any other form of group dissemination, by any means."
-
- So, in effect, a person who obtains information from the
- computer of another, and gives that information to another
- gets a base offense level of 10; if he used a 'zine or BBS
- to disseminate it, he would get a base offense level of 12.
- The federal guidelines prescribe 6-12 months in jail for a
- first offender with an offense level of 10, and 10-16 months
- for same with an offense level of 12. Pleading guilty can
- get the base offense level down by two levels; probation
- would then be an option for the first offender with an
- offense level of 10 (reduced to 8). But remember: there is
- no more federal parole. The time a defendant gets is the
- time s/he serves (minus a couple days a month "good time").
-
- If, however, the offense caused an economic loss, the
- offense level would be increased according to the general
- fraud table (Sec. 2F1.1). The proposed commentary explains
- that computer offenses often cause intangible harms, such as
- individual privacy rights or by impairing computer
- operations, property values not readily translatable to the
- general fraud table. The proposed commentary also suggests
- that if the defendant has a prior conviction for "similar
- misconduct that is not adequately reflected in the criminal
- history score, an upward departure may be warranted." An
- upward departure may also be warranted, DOJ suggests, if
- "the defendant's conduct has affected or was likely to
- affect public service or confidence" in "public
- interests" such as common carriers, utilities, and
- institutions. Based on the way U.S. Attorneys and their
- computer experts have guesstimated economic "losses" in a
- few prior cases, a convicted tamperer can get whacked with a
- couple of years in the slammer, a whopping fine, full
- "restitution" and one to two years of supervised release
- (which is like going to a parole officer). (Actually, it
- *is* going to a parole officer, because although there is no
- more federal parole, they didn't get rid of all those parole
- officers. They have them supervise convicts' return to
- society.)
-
- Both the EFF and CPSR submitted objections to the proposed revisions.
- Their objections follow in the next two files.
-
- ------------------------------
-
- Date: Wed, 24 Mar 1993 23:26:20 EST
- From: Dave Banisar <banisar@WASHOFC.CPSR.ORG>
- Subject: File 2--CPSR Comments on 1030 Guidelines
-
- CPSR COMMENTS ON PROPOSED CHANGES TO
- COMPUTER CRIME SENTENCING GUIDELINES
-
- March 15, 1993
-
- Chairman William W. Wilkins, Jr.
- US Sentencing Commission
- One Columbus Circle, NE
- Suite 2-500
- South Lobby
- Washington, DC 20002-8002
-
- Dear Mr. Chairman:
-
- We are writing to you regarding the proposed amendments to sentencing
- guidelines, policy statements, and commentary announced in the Federal
- Register, December 31, 1992 (57 FR 63832). We are specifically
- interested in addressing item 59, regarding the Computer Fraud and
- Abuse Act of 1988 (18 U.S.C. 1030).
-
- CPSR is national membership organization of professionals in the
- computing field. We have a particular interest in information
- technology, including the protection of civil liberties and privacy.
- We have sponsored a number of public conferences to explore the issues
- involving computers, freedom, and privacy.
-
- We have also testified before the House of Representatives and the
- Senate regarding the federal computer crime law. It is our position
- that the government must be careful not to extend broad criminal
- sanctions to areas where technology is rapidly evolving and terms are
- not well defined. We believe that such efforts, if not carefully
- considered, may ultimately jeopardize the use of new information
- technology to promote education, innovation, commerce, and public
- life.
-
- We also remain concerned that criminal sanctions involving the use of
- information technologies may unnecessarily threaten important personal
- freedoms, such as speech, assembly, and privacy. It is the experience
- of the computing profession that misguided criminal investigation and
- the failure of law enforcement to fully understand the use of computer
- technology will have a detrimental impact on the entire community of
- computer users.
-
- For example, you may wish to review the recent decision of Steve
- Jackson Games v. Secret Service, involving a challenge to the
- government's conduct of a particular computer crime investigation.
- The court found that the Secret Service's conduct "resulted in the
- seizure of property, products, business records, business documents,
- and electronic communications equipment of a corporation and four
- individuals that the statutes were intended to protect." The court,
- clearly concerned about the government's conduct, recommended "better
- education, investigation, and strict compliance with the statutes as
- written."
-
- Clearly, the decisions made by the Sentencing Commission regarding
- those factors that may increase or decrease a criminal sentence will
- have an important impact on how computer crime is understood and how
- the government conducts investigations. We therefore appreciate the
- opportunity to express our views on the propose changes to the
- guidelines for 18 U.S.C. 1030.
-
- For the reasons stated below, it our belief that the proposed
- guidelines regarding the Computer Fraud and Abuse Act now under
- consideration by the Sentencing Commission place emphasis upon the
- wrong factors, and may discourage the use of computer technology for
- such purposes as publication, communication, and access to government
- information. For these reasons, CPSR hopes that the current proposal
- will not be adopted.
-
- The Proposed Guidelines Will have a Chilling Effect on
- Constitutionally Protected Activities
-
- The proposed amendment would treat as an aggravating factor the
- alteration, obtaining, or disclosure of "Protected information." This
- term is defined in the proposed guidelines as "private information,
- non-public government information, or proprietary commercial
- information." The term is nowhere mentioned in the statute passed
- Congress.
-
- We oppose this addition. It has been the experience of the computer
- profession that efforts to create new categories of information
- restriction invariably have a chilling impact on the open exchange of
- computerized data.
- For example, National Security Decision Directive 145, which gave the
- government authority to peruse computer databases for so-called
- "sensitive but unclassified information," was widely opposed by the
- computing community, as well as many organizations including the
- Information Industry Association and the American Library Association.
- The reason was that the new designation allowed the government to
- extend classification authority and to restrict the free flow of
- information and ideas.
-
- Clearly, this proposal to increase the sentence for a violation of a
- particular federal statute is not as sweeping as a Presidential order.
- Nonetheless, we believe that the problems posed by efforts to create
- new categories of computer-based information for the purpose of
- criminal sentencing will raise similar concerns as did NSDD-145. It
- is not in the interest of those who rely on information systems for
- the purpose of public dissemination to encourage the development of
- such classifications.
-
- The proposed guidelines would also treat as an aggravating factor the
- alteration of public record information. This proposal may go
- directly against efforts to promote public access to electronic
- information and to encourage the use of computer networks for the
- conduct of government activities. For example, computer bulletin
- boards have been established by agencies, such as the Department of
- Commerce and Environmental Protection Agency, precisely for the
- purpose of encouraging public use of on-line services and to
- facilitate the administration of agency business.
-
- Much of the problem may well be with the use of the term "alter"
- without any further discussion of the nature of the alteration.
- Computer systems are by nature interactive. Any user of a computer
- system "alters" the data on the system. System operators may control
- the status of a particular file by designating it as a "read only"
- file or a "read-write" file. When a file is "read only," a user may
- access the file but is technically unable to alter the files contents.
- However a file that is "read-write" may allow users to both review
- files and to alter them.
-
- Certainly, there are many other factors that relate to computer system
- security, but this particular example demonstrates that in many
- instances altering a public file may in fact be the intended outcome
- of a system operator. Failing to distinguish between permissible and
- impermissible alterations of a computer file in the sentencing
- guidelines misses entirely the operation of many computer systems.
-
- The proposed amendment would also discourage the publication of
- information in electronic environments. The amendment recommends that
- the sentence be increased by 4 levels where "the defendant disclosed
- protected information to any person" and by six levels where "the
- defendant disclosed protected information to the public by means of a
- general distribution system."
-
- Both of these proposals would punish the act of publication where
- there is no economic advantage to the defendant nor any specific harm
- indicated. Such provisions could be used to discourage
- whistle-blowing in the first instance, and subsequent dissemination of
- computer messages by system operators in the second.
-
- For this reason, we strongly oppose the inclusion of comment 10 which
- states that a "general distribution system" includes electronic
- bulletin boards and voice mail systems. This particular comment could
- clearly have a chilling effect on operators of electronic bulletin
- boards who may become reluctant to disseminate information where such
- dissemination could be considered an aggravating factor for the
- purpose of the federal computer crime law.
-
-
- Current guidelines
-
- It is our view that the current guidelines are a reasonably fair
- articulation of the specific harms that might warrant additional
- stringency, at least in the area of computer crime. We believe that
- it is appropriate to impose additional sanction where there is "more
- than minimal planning" or "scheme to defraud more than one victim," as
- currently stated in the Guidelines. One of our concerns with the
- application of 18 U.S.C. 1030 after the decision in U.S. v. Morris,
- 928 F.2d 504 (2d Cir. 1991) is that the provision does not adequately
- distinguish between those acts where harm is intended and those where
- it is not. For this reason, provisions in the sentencing guidelines
- which help to identify specific harms, and not simply the disclosure
- of computerized information, may indeed be helpful to prosecutors who
- are pursuing computer fraud cases and to operators of electronic
- distribution systems.
-
- For similar reasons, we support the current $2F1.1(4) which allows an
- upward departure where the offense involves the "conscious or reckless
- risk of serious bodily injury." Again, it is appropriate to impose a
- greater penalty where there is risk of physical harm
-
- The Commission may wish to consider at some future date a provision
- which would allow an upward departure for the disclosure of personally
- identifiable data that is otherwise protected by federal or state
- statute. We believe that privacy violations remain an important
- non-economic harm that the Commission could address. For instance, the
- disclosure of credit reports, medical records, and criminal history
- records, by means of an unauthorized computer use (or where use
- exceeds authorization) may be an appropriate basis for the imposition
- of additional sanctions.
-
- We suggest that the Commission also consider whether a downward
- departure may be appropriate for those defendants who provide
- technical information about computer security that may diminish the
- risk of subsequent violations of the computer fraud statute. Such a
- provision may lead to improvements in computer security and the
- reduced likelihood of computer-related crime.
-
- We recognize that the Commission is currently considering factors that
- should be considered in the imposition of federal sentencing, and that
- this process should not be equated with the creation of new criminal
- acts. Nonetheless, the decisions of the Commission in this area may
- well influence subsequent legislation, and the ability of computer
- users to make use of information systems, to access government
- information, and to disseminate electronic records and files. It is
- for these reasons that we hope the Sentencing Commission will give
- careful consideration as to potential impact on the user community of
- these proposed changes to the federal sentencing guidelines.
-
- We appreciate the opportunity to provide these comments to the
- Commission and would be pleased to answer any questions you might
- have. Please contact me directly at 202/544-9240.
-
-
- Sincerely yours,
-
-
- Marc Rotenberg, director
- CPSR Washington office
- Enclosure
-
- ------------------------------
-
- Date: Mon, Mar 22 92 22:50:29 PST
- From: Cliff Figallo <fig@well.sf.ca.us>
- Subject: File 3--EFF Response to Proposed Sentencing Guidelines
-
- March 15, 1993
-
- United States Sentencing Commission
- One Columbus Circle, NE
- Suite 2-500, South Lobby
- Washington, DC 20002-9002
- Attention: Public Information
-
- Re: Proposed Amendment #59 to the Sentencing Guidelines for
- United States Courts, which creates a new guideline applicable
- to violations of the Computer Fraud and Abuse Act of 1988 (18
- U.S.C. 1030)
-
-
- Dear Commissioners:
-
- The Electronic Frontier Foundation (EFF) writes to state our
- opposition to the new proposed sentencing guideline applicable to
- violations of the Computer Fraud and Abuse Act of 1988, 18 U.S.C.
- 1030 (CFAA). We believe that, while the proposed guideline promotes
- the Justice Department's interest in punishing those who engage in
- computer fraud and abuse, the guideline is much too harsh for first
- time offenders and those who perpetrate offenses under the statute
- without malice aforethought. In addition, promulgation of a
- sentencing guideline at the present time is premature, as there have
- been very few published opinions where judges have issued sentences
- for violations of the CFAA. Finally, in this developing area of the
- law, judges should be permitted to craft sentences that are just in
- relation to the facts of the specific cases before them.
-
- The Proposed Guideline Is Too Harsh.
- The proposed CFAA sentencing guideline, with a base offense level of
- six and innumerable enhancements, would impose strict felony
- liability for harms that computer users cause through sheer
- inadvertence. This guideline would require imprisonment for first
- time offenders who caused no real harm and meant none. EFF is
- opposed to computer trespass and theft, and we do not condone any
- unauthorized tampering with computers -- indeed, EFF's unequivocal
- belief is that the security of private computer systems and networks
- is both desirable and necessary to the maintenance of a free society.
- However, it is entirely contrary to our notions of justice to brand a
- computer user who did not intend to do harm as a felon. Under the
- proposed guideline, even a user who painstakingly attempts to avoid
- causing harm, but who causes harm nonetheless, will almost assuredly
- be required to serve some time in prison.
-
- The proposed guideline, where the sentencing judge is given no
- discretion for crafting a just sentence based on the facts of the
- case, is too harsh on less culpable defendants, particularly first
- time offenders. As the Supreme Court has stated, the notion that a
- culpable mind is a necessary component of criminal guilt is "as
- universal and persistent in mature systems of law as belief in
- freedom of the human will and a consequent ability and duty of the
- normal individual to choose between good and evil." Morissette v.
- United States, 342 U.S. 246, 250 (1952). In the words of another
- court, "[u]sually the stigma of criminal conviction is not visited
- upon citizens who are not morally to blame because they did not know
- they were doing wrong." United States v. Marvin, 687 F.2d 1221, 1226
- (8th Cir. 1982), cert. denied, 460 U.S. 1081 (1983).
-
- There Is Not Yet Enough Caselaw to Warrant a Guideline.
-
- The Sentencing Commission itself has recognized the importance of
- drafting guidelines based on a large number of reported decisions.
- In the introduction to the Sentencing Commission's Guidelines Manual,
- the Commission states:
-
- The Commission emphasizes that it drafted the initial guidelines with
- considerable caution. It examined the many hundreds of criminal
- statutes in the United States Code. It began with those that were
- the basis for a significant number of prosecutions and sought to
- place them in a rational order. It developed additional distinctions
- relevant to the application of these provisions, and it applied
- sentencing ranges to each resulting category. In doing so, it relied
- upon pre-guidelines sentencing practice as revealed by its own
- statistical analyses based on summary reports of some 40,000
- convictions, a sample of 10,000 augmented pre-sentence reports, the
- parole guidelines, and policy judgments.
-
- United States Sentencing Commission, Guidelines Manual, Chap. 1, Part
- A (1991).
-
- At the present time, there are only five reported decisions that
- mention the court's sentencing for violations of the Computer Fraud
- and Abuse Act. See, United States v. Lewis, 872 F.2d 1030 (6th Cir.
- 1989); United States v. Morris, 928 F.2d 504 (2d Cir. 1991), cert.
- denied, 112 S. Ct. 72 (1991); United States v. Carron, 1991 U.S. App.
- LEXIS 4838 (9th Cir. 1991); United States v. Rice, 1992 U.S. App.
- LEXIS 9562 (1992); and United States v. DeMonte, 1992 U.S. App.
- LEXIS 11392 (6th Cir. 1992). New communications technologies, in
- their earliest infancy, are becoming the subject of precedent-setting
- litigation. Overly strict sentences imposed for computer-related
- fraud and abuse may have the effect of chilling these technologies
- even as they develop. Five decisions are not enough on which to base
- a guideline to be used in such an important and growing area of the
- law.
-
- The Commission itself has recognized that certain areas of federal
- criminal law and procedure are so new that policy statements, rather
- than inflexible guidelines, are preferable. See, e.g., United States
- Sentencing Commission, Guidelines Manual, Chap. 7, Part A (1990)
- (stating the Commission's choice to promulgate policy statements,
- rather than guidelines, for revocation of probation and supervised
- release "until federal judges, probation officers, practitioners, and
- others have the opportunity to evaluate and comment. . . ."). A
- flexible policy statement, rather than a specific sentencing
- guideline, is a more appropriate way to handle sentencing under the
- Computer Fraud and Abuse Act until there has been enough litigation
- on which to base a guideline.
-
- Judges Must Be Permitted to Craft Their Own Sentences for Cases
- Involving Special Circumstances.
-
- Individual sentencing decisions are best left to the discretion of the
- sentencing judge, who presumably is most familiar with the facts
- unique to each case. To promulgate an inflexible sentencing
- guideline, which would cover all crimes that could conceivably be
- prosecuted under the Computer Fraud and Abuse Act, is premature at
- this time.
-
- As discussed above, there have only been five reported decisions
- where the Computer Fraud and Abuse Act has been applied. In three of
- these reported CFAA cases, the judges involved used their discretion
- and fashioned unique sentences for the defendants based on the
- special facts of the case. See, Morris, 928 F.2d at 506 (where the
- judge placed Defendant Morris on probation for three years to perform
- 400 hours of community service, ordered him to pay fines of $10,050,
- and ordered him to pay for the cost of his supervision at a rate of
- $91 a month); Carron at 3 (where the judge found that Defendant
- Carron's criminal history justified a sentence of 12 months
- incarceration followed by 12 months of supervised release and
- restitution to the two injured credit card companies); and DeMonte at
- 4 (where the trial court judge held that Defendant DeMonte's
- "extraordinary and unusual level of cooperation" warranted a sentence
- of three years probation with no incarceration). Judges must be
- permitted to continue fashioning sentences that are just, based on
- the facts of a specific case.
-
- Computer communications are still in their infancy. Legal
- precedents, particularly the application of a sentencing guideline to
- violations of the Computer Fraud and Abuse Act, can radically affect
- the course of the computer technology's future, and with it the fate
- of an important tool for the exchange of ideas in a democratic
- society. When the law limits or inhibits the use of new
- technologies, a grave injustice is being perpetrated. The Electronic
- Frontier Foundation respectfully asks the Commission to hold off
- promulgating a sentencing guideline for the Computer Fraud and Abuse
- Act until there are enough prosecutions on which to base a guideline.
-
- Thank you in advance for your thoughtful consideration of our
- concerns. We would be pleased to provide the Commission with any
- further information that may be needed.
-
- Sincerely yours,
-
-
- Shari Steele
- Staff Attorney
-
-
- The Electronic Frontier Foundation is a privately funded, tax-exempt,
- nonprofit organization concerned with the civil liberties, technical
- and social problems posed by the applications of new computing and
- telecommunications technology. Its founders include Mitchell Kapor,
- a leading pioneer in computer software development who founded
- the Lotus Development Corporation and developed the Lotus 1-2-3
- Spreadsheet software.
-
- ------------------------------
-
- Date: Mon, 12 Apr 1993 09:21:42 -0700
- From: Jim Warren <jwarren@WELL.SF.CA.US>
- Subject: File 4--LEGISLATIVE DATA ONLINE -- AB1624 needs support
-
- A bill has been introduced to require almost all legislative
- information to be made "available to the public by means of access
- through a computer modem" --including full text of all bills,
- amendments, bill analyses, bill history, bill status, veto messages,
- daily files of each house of the legislature, each house and committee
- schedule, etc.
-
- For the first time, citizens, reporters, community and interest
- groups, unions, corporations, city and county staff, attorneys, etc.,
- could have *timely* and *economical* access to legislation-in-progress
- that impacts them.
-
- Like Hawaii's FYI system, AB1624 offers leadership for those states
- [and Congress] not yet providing timely, *economical*, online citizen
- access to their legislatures. This California bill was introduced
- March 4th by State Assembly Member Debra Bowen (D-Torrance/Marina del
- Rey area).
-
- The legislative information is already online internally, and is sold
- to a few high-priced information-distributors for $300,000-$500,000
- per year. So far, -- like books in a millionaire's private library --
- only well-funded lobbyists and special interests can afford the high
- per-byte and per-minute fees of those few private data-distributors
- (LegiTech, StateNet, etc.) that functionally monopolize online access
- to these electronic public records.
-
- The FIRST COMMITTEE ACTION will be Monday, 4/19 [new], by the Assembly
- Rules Committee (Chair: John Burton, D-San Francisco). As few as
- 20-30 letters and faxes -- BY FRIDAY, APRIL 16th -- would show
- *significant* support. One page stating some reasons in *your own
- words* is plenty. Hand-written is OK; type-written's preferable. Fax
- is fine given the short time-frame.
-
- Hon. John Burton, Chair, Assembly Rules Committee (D) [San Francisco area]
- State Capitol, Room 3152, Sacramento CA 95814, fax/916-324-4899
-
- Hon. Debra Bowen, Assembly Member (D) [Venice/Marina Del Rey area]
- State Capitol, Room 3126, Sacramento CA 95814, fax/916-327-2201
-
- [Note: Mary Winkley is the staff member most familiar with this bill.]
-
- FOR UPDATES ON THE BILL'S PROGRESS/STATUS
-
- Bowen's office can send updates by snailmail; perhaps in time to be useful.
- For email updates: I am in contact with them and will upload new
- info upon receipt. (Others can do the same.) I can also send an
- electronic copy of AB1624 (~500 words), plus a [personal] analysis of
- some of its issues, advantages, disadvantages and problems (~800
- words).
-
- --jim, Jim Warren, jwarren@well.sf.ca.us
- [345 Swett Rd., Woodside CA 94062; voice/415-851-7075; fax/415-851-2814;
- MicroTimes "futures" columnist, Autodesk Board member; InfoWorld founder;
- 1991 Computers, Freedom & Privacy Conference organizer and Chair; blah blah.]
- Note: I have no official capacity; this is personal, volunteer citizen action.
-
- Please copy, repost, print and circulate this, freely, widely, quickly.
-
- ------------------------------
-
- Date: Mon, 12 Apr 1993 09:25:58 -0700
- From: Jim Warren <jwarren@WELL.SF.CA.US>
- Subject: File 5--AB1624 MANDATES ONLINE PUBLIC ACCESS TO LEGISLATIVE RECORDS
-
- Verbatim complete text of California State Assembly Bill 1624 (AB1624)
- [hand-retyped because electronic copies are not economically available
- to the public. --Jim Warren, jwarren@well.sf.ca.us]
-
- Sponsor: Hon. Debra Bowen, Assembly Member (D-Torrance/Marina del Rey area)
- State Capitol, Room 3126
- Sacramento CA 95814
- fax/916-327-2201
- [Note: Mary Winkley is the Legislative Aide most familiar with this bill.]
- -----
-
- BILL NUMBER: AB1624
-
- INTRODUCED BY Assembly Member Debra Bowen
- March 4, 1993
-
- An act to add Section 9027.5 to the Government Code, relating to the
- Legislature.
-
- LEGISLATIVE COUNSEL'S DIGEST
-
- AB 1624, as introduced, Bowen. Legislature: legislative information;
- access by computer modem.
- Under existing law, all meetings of a house of the Legislature or a
- committee thereof are required to be open and public, unless specifically
- exempted, and any meeting that is required to be open and public, including
- specified closed sessions, may be held only after full and timely notice to
- the public as provided by the Joint Rules of the Assembly and Senate.
- This bill would make legislative findings an declarations that the public
- should be informed to the fullest extent possible as to the time, place, and
- agenda of each meeting.
- This bill would require the Joint Rules Committee of the Senate and
- Assembly to make available to the State Library in electronic form on each day
- that either house of the Legislature is in session specified information
- concerning bills and the proceedings of the houses and committees of the
- Legislature.
- This bill would require the State Library to establish a system whereby
- this information is available to the public by means of access through a
- computer modem.
- Vote: majority. Appropriation: no. Fiscal committee: yes.
- State-mandated local program: no.
-
-
- BILL TEXT
-
- THE PEOPLE OF THE STATE OF CALIFORNIA DO ENACT AS FOLLOWS:
-
- SECTION 1. Section 9027.5 is added to the Government Code, to read:
- 9027.5. (a) The Legislature finds and declares that the public
- should be informed to the fullest extent possible as to the time,
- place, and agenda for each meeting of the houses and committees of the
- Legislature. The Legislature further finds and declares that it is
- desirable to make timely information regarding these proceedings
- available to each member of the public, irrespective of where he or
- she resides.
- (b) The Joint Rules Committee of the Senate and Assembly shall make
- available to the State Library in electronic form on each day that either
- house of the Legislature is in session, all of the following information:
- (1) The most recent Assembly Daily File and Senate Daily File.
- (2) The text of each bill introduced in each current legislative
- session, including all amended forms of the bill, the bill history,
- and the bill status.
- (3) All bill analyses prepared in connection with each bill.
- (4) Vote information concerning each bill.
- (5) The veto message, if any, concerning each bill.
- (6) The daily legislative schedule, including the location and time
- set for all floor sessions and committee hearings.
- (c) The State Library shall establish a system whereby the
- information specified in subdivision (b) is available to the public by
- means of access through a computer modem.
- [END]
-
- ------------------------------
-
- Date: Mon, 12 Apr 1993 09:24:13 -0700
- From: Jim Warren <jwarren@WELL.SF.CA.US>
- Subject: File 6--Some comments on AB1624 re online legislative access
-
- *SOME* REASONS TO SUPPORT AB1624 MANDATING PUBLIC ONLINE ACCESS TO
- LEGISLATION California's AB1624, State Assembly Bill 1624, (Bowen
- D-Torrance area) would:
-
- Provide the public with timely, economical access to the public's
- business;
-
- Allow citizens to be *informed* participants in their governance;
-
- Reduce the public's feeling that they are being "done unto" by
- Sacramento insiders; that they have no chance of having timely
- information or access;
-
- Encourage more accurate news reporting by full-text access to bills;
-
- Reduce false and inaccurate rumors by allowing easy, economical
- access to accurate and complete legislative information;
-
- Enhance legislators' relations with their constituents by
- encouraging a fully-informed and timely-informed public;
-
- Improve legislation by allowing the public to identify potential
- problems and suggest useful improvements *before* poorly-phrased or
- ill-structured legislation is passed into law;
-
- Reduce the expense of printing, mailing or faxing bills and other
- online legislative information to constituents and local agencies;
-
- Reduce the time and phone costs that limited legislative staff must
- spend providing such information by phone or in person;
-
- Greatly facilitate research, review, search, retrieval,
- cross-referencing, indexing, etc., of copies of downloaded legislative
- data, customized by and for individuals and groups, limited only by
- their computer access and skills;
-
- Illustrate that the California Legislature knows how to use
- high-technology for the public good;
-
- Illustrate that the California Legislature believes that California
- is, in fact, a leader in high-technology and its application;
-
- Begin making California government as modern and accessible as other
- states that already offer such online legislative access -- for
- example, Hawaii;
-
- Etc. [Please forward additional ideas for inclusion in later
- versions]
-
- REASONS TO OPPOSE THE BILL
-
- High-profit private information distributors might have to add some
- value (more convenient access, improved formatting, cross indexing,
- etc.) in order to continue to make large profits selling the public's
- information assets.
-
- Some bureaucrats may find selling the public's data only to
- high-profit private distributors somewhat less profitable if they
- can't guarantee those "clients" functional monopoly of the public's
- computerized information.
-
- Lobbyists might have less ability to control publicly-undesired
- legislation and get it passed into law before the press or public can
- discover it.
-
- Some politicians might dislike having citizens able to easily obtain
- copies of legislation and track its progress without going through
- their offices.
-
- Some politicians may not *want* to enhance citizens' ability to know
- what they are doing, or be inconvenienced by citizen participation in
- government.
-
- LEGITIMATE CONCERNS THAT MUST BE OVERCOME
-
- 1. The Legislative Data Center (LDC) must remain absolutely secure
- against possible intrusion or harm by "crackers." Solution: LDC can
- perform their daily transfers to the State Library (or its contractor)
- by output-only transmission -- as they now do for their high-profit
- information-distributors. (In the worst case, they can output it on
- magtape and transfer for "sneakernet" transfer -- walking the tapes to
- the State Library).
-
- 2. There must not be increases in costs of equipment or staff.
- Solutions: The LDC now sends its data to Unix-based systems within
- the legislature. It clearly has the hardware to communicate with a
- Unix-based host-computer. If LDC staff do not have the time or skill
- to implement a secure, output-only link to such a host, then experts
- could contract to do the job for $1 (yes, one dollar). Or, such
- secure, output-only transmission could be trivially implemented on any
- of the Unix stations in the Assembly. If an extra Unix station or
- modem is needed, machines could readily be donated.
-
- 3. The State Library doesn't need to own or run an expensive
- public-access system. For preferred maximum access: The State Library
- could contract with a single host-computer connected to the Internet
- -- for $1 per year -- to provide global access, at least by anonymous
- FTP (File Transfer Protocol) and probably by telnet, WAIS, Gopher,
- WWW, etc. This is exactly how the U.S. Supreme Court now distributes
- its decisions, online, worldwide, at no cost to the Court. (They
- download decisions to the free, nonprofit Cleveland Freenet, which
- provides access to the million-plus computers and 15- to 20-million
- users on the global Internet. It, in turn, is partly or fully
- gatewayed to most other networks and commercial services, such as
- CompuServe, MCImail, America OnLine, etc.). The Internet, by *far*,
- provides the most extensive, economical and varied access.
-
- NEEDS NO MONEY; JUST ONE INSTRUCTION
-
- The only thing needed is for the California Legislature to instruct
- its Legislative Data Center to make its computerized legislative
- information publicly accessible online, for no more than the
- incremental cost of copying. Direct one-page letters to:
-
- Hon. John Burton, Chair, Assembly Rules Committee (D) [San Francisco area]
- State Capitol, Room 3152, Sacramento CA 95814, fax/916-324-4899
-
- Hon. Debra Bowen, Assembly Member (D) [Venice/Marina Del Rey area]
- State Capitol, Room 3126, Sacramento CA 95814, fax/916-327-2201
-
- ------------------------------
-
- Date: Mon, 12 Apr 1993 09:28:13 -0700
- From: Jim Warren <jwarren@WELL.SF.CA.US>
- Subject: File 7--AB1624 UPDATE#1--Making Leg. Data available Online
-
- 4/10/93 [after meeting on 4/9 with Mary Winkley, Legislative Aide to
- California Assembly Member Debra Bowen (D-Torrance/Marina del Rey
- area) ]
-
- AB1624 (Bowen) would require that essentially all information about
- California legislation-in-progress be made "available to the public by
- means of access through a computer modem." [bill's text available
- from jwarren@well.sf.ca.us]
-
- Perhaps this is an excellent illustration of why legislative
- information needs to be immediately available to the public, online:
- Things change *fast*! --
-
- On 4/6, Ms. Winkley said AB1624 would first be considered by the
- Assembly Rules Committee (Chair, John Burton, D-San Francisco), 4/14
- in closed session.
-
- On 4/8, she said she just found out that the schedule was changed
- and the Rules Committee would hear it on 4/19.
-
- On 4/9, she said she just found out that (1) the 4/19 meeting would
- be an open [public] meeting, and (2) Rules would not only be reviewing
- the bill to decide committees to which to assign it, but would also be
- acting as its first policy committee and conduct a formal hearing on
- the bill at that time. [ Thus, supporting notes are all-the-more
- needed, by FRIDAY, APRIL 16th, in time to impact the Monday (4/19)
- Rules Committee hearing. ]
-
- The 4/9 meeting was to discuss technical issues and alternatives and
- included staff from the Assembly Computer Services (ACS) and the
- Legislative Counsel's Legislative Data Center (LDC), as well as a
- volunteer from State Sen. Tom Hayden's office (which has a partly
- related bill, SB758) and me.
- Based on the 4/9 discussion, it appears likely that Assembly Member
- Bowen will consider amending AB1624 before it is first heard by Rules.
- The intent will be the same -- mandate broad, lowcost online public
- access --but implementation details/text may be changed and/or made
- more explicit.
-
- Write or fax to (phone calls are of little value in defeating opposition):
- Hon. John Burton, Chair, Assembly Rules Committee (D-San Francisco area)
- State Capitol, Room 3152, Sacramento CA 95814, fax/916-324-4899
- Hon. Debra Bowen, Assembly Member (D-Torrance/Marina del Rey area)
- State Capitol, Room 3126, Sacramento CA 95814, fax/916-327-2201
-
- ------------------------------
-
- End of Computer Underground Digest #5.27
- ************************************
-
-