home *** CD-ROM | disk | FTP | other *** search
- Computer underground Digest Wed Oct 6 1993 Volume 5 : Issue 78
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Archivist: Brendan Kehoe
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Copie Editor: Etaoin Shrdlu, III
-
- CONTENTS, #5.78 (Oct 6 1993)
- File 1--The Elansky Case (A Response to CuD's Editors)
- File 2--CuD and the Elansky Case (Response to L. Detweiler)
- File 3--CA state Legislative Info Bill
- File 4--U. Minn. Campus Police Investigate Software Theft Ring
- File 5--Computers & Writing Call for Proposals
- File 6--ACTIVIST ALERT-CPSR Solicits CLIPPER/SKIPJACK comments
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
- editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115.
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
- WHQ) (203) 832-8441 NUP:Conspiracy; RIPCO BBS (312) 528-5020
- CuD is also available via Fidonet File Request from 1:11/70; unlisted
- nodes and points welcome.
- EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
- In ITALY: Bits against the Empire BBS: +39-461-980493
-
- ANONYMOUS FTP SITES:
- AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
- EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
- UNITED STATES:
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud
- etext.archive.umich.edu (141.211.164.18) in /pub/CuD/cud
- ftp.eff.org (192.88.144.4) in /pub/cud
- halcyon.com( 202.135.191.2) in /pub/mirror/cud
- ftp.warwick.ac.uk in pub/cud (United Kingdom)
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: Tue, 28 Sep 93 02:23:12 -0600
- From: "L. Detweiler" <ld231782@LONGS.LANCE.COLOSTATE.EDU>
- Subject: File 1--The Elansky Case (A Response to CuD's Editors)
-
- Editor: your theories on the "hacker culture" among adolescents,
- including the ideas of unique vocabulary and initiation ceremonies
- etc. in the line of sophisticated and evolved social customs, are
- interesting, and certainly have some degree of validity in general and
- apropos application to the Elansky case in particular.
-
- Nevertheless, your agenda in painting Elansky as a clear cut "victim"
- is very obvious. Now, I agree that the Elansky case shows some rather
- outrageous excesses of the legal system and the rooted paranoias
- therein. In particular, I find the latest news that Elansky is
- languishing" and that the extraordinary bail of $500K has not been
- challenged or revised quite shocking.
-
- However, I'm writing because you note in a previous newsletter that
- Elansky supposedly had a record of breaking into a high school science
- supply room to steal chemicals. Now this is an extremely incriminating
- action that you wholly failed to address. In fact, you skipped right
- over this piece of information almost without comment. It really
- rather significantly damages your argument and portrayal of Elansky as
- nothing but a victimized BBS operator with nothing but an academic
- interest in explosives recipes. To the contrary, your own academic
- bias is revealed.
-
- Very rarely are we ever afforded an opportunity to have such clear cut
- villains and heroes as in, say, the Steve Jackson Games case.
- Polarized accounts condemning law enforcement for various overreaction
- that selectively present various data are not a service to *any*
- community. If you wish to continue to adhere to high academic
- standards in your own published analyses and opinions, please exercise
- the utmost impartiality. In burying the information about Elansky's
- possible breaking-and-entering crime, and failing to follow it up as
- diligently as all the other claims that tend to extenuate his guilt,
- this standard has been compromised to the detriment of your own
- journalistic, editorial, and academic integrity. I'm hopeful you will
- rectify this partiality in future editorials.
-
- Sincerely,
- L. Detweiler
-
- ------------------------------
-
- Date: Wed, 6 Oct, 1993 21:18:20 CDT
- From: CuD Moderators <tk0jut2@mvs.cso.niu.edu>
- Subject: File 2--CuD and the Elansky Case (Response to L. Detweiler)
-
- In criticizing CuD comments on the Elansky/Hartford case, in which
- which Michael Elansky, a BBS sysop was arrested for two having to
- "anarchist" text files on his board (see CuD #5.69, 5.71), "L.
- Detweiler" <ld231782@LONGS.LANCE.COLOSTATE.EDU> (previous file)
- writes:
-
- >However, I'm writing because you note in a previous
- >newsletter that Elansky supposedly had a record of breaking
- >into a high school science supply room to steal chemicals.
- >Now this is an extremely incriminating action that you
- >wholly failed to address. In fact, you skipped right over
- >this piece of information almost without comment. It really
- >rather significantly damages your argument and portrayal of
- >Elansky as nothing but a victimized BBS operator with
- >nothing but an academic interest in explosives recipes. To
- >the contrary, your own academic bias is revealed.
-
- His above post perceives some unspecified "obvious agenda" that we
- presumably hide, challenges our integrity, and objects to an
- "academic bias," whatever that might mean. We thank him for sharing
- his opinion. However, we're less charitable toward his beliefs that
- more should have been mentioned of Elansky's previous legal troubles
- and that the lack of primacy of previous charges, unrelated to the BBS
- anarchist files, somehow subverts CuD commentary on the case and
- weakens any First Amendment issues the case raises.
-
- The basic facts in the Elansky case: 1) Elansky was arrested in early
- August, '93, for making to common anarchy files available; 2)
- According to existing public information, the arrest was solely for the
- two anarchy files, written four years ago by a 15 year old teenager;
- 3) Elansky's bond for this offense was set at half a million dollars;
- 4) Elansky remains in jail as of October 6, awaiting his next hearing
- on October 10. In CuD 5.72, we reprinted the Connecticut laws under
- which Elansky was charged. Although both are felonies, neither
- justifies the excessive bond. CuD explicitly summarized Elansky's
- previous legal problems. Despite current evidence that those offenses
- may have been far less serious than the language of the charges
- indicates, they are not the issue. Cud was careful to qualify comments
- by acknowledging that, because the relevant court documents are
- sealed, it is always possible that the prosecutor possesses evidence
- of more serious behavior. We think we were sufficiently clear: THE
- ISSUE IS NOT ELANSKY, BUT THE CRIMINALIZATION OF TEXT FILES THAT ONLY
- THE HARTFORD PROSECUTOR DEEMS ILLEGAL. This is a First Amendment
- issue, pure and simple, and whether Elansky is a serial murder or a
- squeaky-clean choirboy is irrelevant.
-
- Elansky, we repeat for those who skipped the first 50 lines, was
- arrested and remains in jail for posting two anarchist files on his
- BBS. CuDs 5.69, 5.71 and 5.72 summarized the case, reprinted the
- anarchy files, and reprinted what apparently was an investigation
- report justifying the arrest. The files do not support the charges.
-
- The two "anarchy" files in question are not only legal, and therefore
- protected by the First Amendment, but they are, by "anarchy"
- standards, considered mild, even "lame." As any highschool graduate
- should know, the files contain little that cannot be constructed from
- a highschool chemistry course. They contain absolutely nothing that
- cannot be found in over-the-counter literature and television. The
- _Anarchists' Cookbook_, in it's 29th printing since 1971, contains
- hundreds of recipes for home-made weapons, pyrotechnics, and
- psychedelics. It is legal. We note with amusement that the latest
- catalogue from Delta Press, Ltd (PO Box 1625 Dept 93W; 215 S.
- Washington St., El Dorado, AR 71731; fax (501) 862-9671; voice: (501)
- 862-4984) is available, along with its contents, without obvious
- restrictions to anybody with the purchase price for publications.
- Delta Press's inventory includes:
-
- CIA Explosives for Sabotage ($9.00)
- Improvised Munitions from Ammonium Nitrate ($7.50)
- Death by Deception: Advanced Improvised Booby Traps ($14.00)
- Terrorist Explosives Handbook ($6.95)
- Counterbomb ("assassination by explosives") ($14.00)
- Improvised Land Mines ($12.00)
- Improvised Explosives ($12.00)
- Boobytraps ($8.00)
-
- The list is extensive. It includes manuals on full-auto conversion
- and silencer construction for weapons; military manuals;
- poaching manuals; killing manuals; survival manuals;
- blowing-people-away manuals; poisoning manuals. They are legal. They
- appear easily accessible. Yet, Elansky posts two juvenile files
- demonstrably written by others, both of which are "lame," and he's
- arrested and slapped with a $500,000 bond. This is the issue.
-
- Is CuD off-base in the assessment of the case? Perhaps. If so, though,
- we're in excellent company.
-
- Lance Rose, perhaps the most knowledgeable legal guru on BBS law, and
- columnist for BOARDWATCH MAGAZINE, calls the case "ridiculous." He
- summarizes the facts of the case in his October, '93, column, and
- alludes to Elansky's cat-and-mouse game with local police. He
- concludes:
-
- Regardless of their motivations, however, the police made a
- big mistake in jailing Elansky for a text file on his BBS.
- The 1ST AMENDMENT prohibits government officials from acting
- against anyone for distributing material containing
- political content. If, as Elansky's parents claim, he did
- not even know the file was on his BBS until after he was
- arrested, then he is entitled to even greater legal
- protection from prosecution, such as accorded to book stores
- and magazine distributors. Distributors are not responsible
- for materials like obscene or infringing publications, unless
- they are specifically aware of the material in question. This
- rule is necessary to assure the smooth flow of 1st Amendment
- materials through mass distribution systems for both printed
- and electronic materials.
- ......
- Even if Elansky made bombs all those years as the police
- believe, this gives no support to jailing him based on the BBS
- file. The police acted criminally in penalizing him for
- speech on his BBS.
-
- The Harford Courant, on September 17 (pp A1, A3: "Free Speech and
- Computers Central to Bomb-Recipe Case," by John M. Moran), was equally
- adamant. The reporter, John Moran, is an experienced user of the Net
- and of BBSes, and it shows in a thoughtful and incisive commentary.
- Moran, too, distinguishes between Elansky's run-ins with the police
- and the issues underlying his arrest. His well-researched article
- alludes to the availability of _The Anarchists' Cookbook_ in local
- bookstores and libraries, and concludes by raising what appears to be
- the double standard between Constitutional protections granted to
- print and electronic media:
-
- This apparent double standard between printed text and The
- Deth Vegetable's ((the author of the disputed files))
- computer text files is precisely what makes the Ionizer
- ((Elansky's BBS handle)) so important, say public interest
- groups familiar with the Elansky case.
-
- "It's pretty clear that the First Amendment's been trampled
- on the way to the riot in this case," said David Banisar, a
- policy analyst for Computer Professionals for Social
- Responsibility. "It appears that the prosecutor doesn't
- realize that electronic publications have the same
- protection as printed publications."
-
- Ralph G. Elliot, a Hartford lawyer who has represented The
- Courant on First Amendment issues, agreed that the Elansky
- case does raise free-speech questions. He likened it to a
- well-known case in which The Progressive, a Wisconsin
- magazine, was found to have the right to publish publicly
- available information about how to construct a nuclear bomb.
-
- Mike Godwin, legal counsel for the Electronic Frontier
- Foundation, another advocacy group, said Connecticut's
- "inciting injury to persons or property" charge is
- unconstitutional.
-
- "Traditionally, we've understood the First Amendment to
- apply to all forms of expression," Godwin said. "I think the
- prosecutor in this case has shown monstrous disregard for
- the Constitution that he has sworn to uphold."
-
- "There are very few law-enforcement actions that qualify as
- genuinely evil, but I think this is one of them," he said.
-
- The relevance of this case for cyberspace lies in the danger of any
- local prosecutor to define Constitutionally protected electronic forms
- of expression as illegal. If Elansky is guilty of crimes, then it is
- those crimes for which he should be charged. However, on no account
- ought prosecutors be allowed to subvert the Constitution in order to
- develop a case against any U.S. citizen, regardless of what other
- offenses they might be *suspects*. To compound the error with an
- excessive bond while the suspect languishes in jail strikes us as a
- gross abuse of prosecutorial power. Perhaps the wrong people are in
- jail.
-
- ------------------------------
-
- Date: Thu, 30 Sep 1993 20:00:09 GMT
- From: kiddyr@GALLANT.APPLE.COM(Ray Kiddy)
- Subject: File 3--CA state Legislative Info Bill
-
- Here is the text of the bill that is waiting on Gov Pete Wilson's desk.
- i hope other states begin to use this as a model.
-
- thanx - ray kiddy, ray@ganymede.apple.com
-
-
- AMENDED IN SENATE AUGUST 30, 1993
-
- AMENDED IN SENATE AUGUST 25, 1993
-
- AMENDED IN SENATE AUGUST 16, 1993
-
- AMENDED IN SENATE JUNE 17, 1993
-
- AMENDED IN ASSEMBLY MAY 18, 1993
-
- CALIFORNIA LEGISLATURE--1993-94 REGULAR SESSION
-
- ASSEMBLY BILL No. 1624
-
- Introduced by Assembly Member Bowen
- (Principal coauthor: Senator Torres)
- (Coauthors: Assembly Members Areias, Bornstein,
- Goldsmith, Isenberg, Johnson, Karnette, Katz
- Mountjoy, Nolan, Polanco, Speier, and
- Vasconcellos)
- (Coauthors: Senators Dills, Hayden, Killea, Morgan, and
- Rosenthal)
-
- March 4, 1993
-
- An act to add Section 10248 to the Government Code,
- relating to the Legislature;
-
- LEGISLATIVE COUNSELUS DIGEST
-
- AB 1624, as amended, Bowen. Legislature: legislative
- information: access by computer network.
- Under existing law, all meetings of a house of the Legislature
- or a committee thereof are required to be open and public, unless
- specifically exempted, and any meeting that is required to be open
- and public, including specified closed sessions, may be held only
- after full and timely notice to the public as provided by the
- Joint Rules of the Assembly and Senate.
- This bill would make a legislative finding that it is desirable
- to make information regarding matters pending before the Legislature
- and its proceedings available to the citizens of this state,
- irrespective of where they reside, in a timely manner and for the
- least possible cost.
- This bill would require the Legislative Counsel, with the advice
- of the Assembly Committee on Rules and the Senate Committee on Rules,
- to make available to the public, by means of access by way of the
- largest nonproprietary, nonprofit cooperative public computer network,
- specified information concerning bills, the proceedings of the
- houses and committees of the Legislature, statutory enactments,
- and the California Constitution.
- Vote: majority. Appropriation: no. Fiscal committee: yes.
- State-mandated local program: no.
-
- The people of the State of California do enact as follows:
-
- 1 SECTION 1. The Legislature finds and declares that
- 2 it is now possible and feasible in this electronic age to
- 3 more widely distribute legislative information by way of
- 4 electronic communication in order to better inform the
- 5 public of the matters pending before the Legislature and
- 6 its proceedings. The Legislature further finds that it is
- 7 desirable to make information regarding these matters
- 8 and proceedings available to the citizens of this state,
- 9 irrespective of where they reside, in a timely manner and
- 10 for the least possible cost.
- 11 Sec. 2. Section 10248 is added to the Government
- 12 Code, to read:
- 22 (a) The Legislative Counsel shall, with the advice of
-
- 1 the Assembly Committee on Rules and the Senate
- 2 Committee on Rules, make all of the following
- 3 information available to the public in electronic form:
- 4 (1) The
- 5 legislative calendar, the
- 6 schedule of legislative committee hearings, a list of
- 7 matters pending on the floors of both houses of the
- 8 Legislature, and a list of the committees of the
- 9 Legislative and their members.
- 10 (2) The text of each bill introduced in each current
- 11 legislative session, including each amended, enrolled,
- 12 and chaptered form of each bill.
- 13 (3) The bill history of each bill introduced and
- 14 amended in each current legislative session.
- 15 (4) The bill status of each bill introduced and
- 16 amended in each current legislative session.
- 17 (5) All bill analyses prepared by legislative
- 18 committees in connection with each bill in each current
- 19 legislative session.
- 20 (6) All vote information concerning each bill in each
- 21 current legislative session.
- 22 (7) Any veto messages concerning a bill in each
- 23 current legislative session.
- 24 (8) The California Codes.
- 25 (9) The California Constitution.
- 26 (10) All statutes enacted on or after
- 27 January 1, 1993.
- 34 (b) The
- 36 information identified in
- 37 subdivision (a) shall be made available to the public by
- 38 means of access by way of the largest nonproprietary,
- 39 nonprofit cooperative public computer network.
- 40 The
-
- 1 information shall be made available in one or more
- 2 formats and by one or more means in order to provide the
- 3 greatest feasible access to the general public in this state.
- 4 Any person who accesses the information may access all
- 5 or any part of the information. The information may also
- 6 be made available by any other means of access that
- 7 would facilitate public access to the information.
- 11 The information that is maintained in the
- 12 legislative information center that is operated and
- 13 maintained by the Legislative Counsel shall be made
- 14 available
- 15 in the shortest feasible after
- 16 the information is available in the information system.
- 17 The information that is not maintained in the information
- 18 system shall be made available in the shortest feasible
- 19 time after it is available to the Legislative Counsel.
- 26 (c) Any documentation that describes the electronic
- 27 digital formats of the information identified in
- 28 subdivision (a) and is available to the public shall be
- 29 made available by means of access by way of the
- 30 computer network specified in subdivision (b).
-
- 2 Personal information
- 3 concerning a person who accesses the information may
- 4 be maintained only for the purpose of providing service
- 5 to the person.
- 6 (e) No fee or other charge may be imposed by
- 7 the Legislative Counsel as a condition
- 8 of accessing the information that is accessible by way of
- 9 the computer network specified in subdivision (b).
- 10 (f) The electronic public access provided by
- 11 way of the computer network specified in
- 12 subdivision (b) shall be in addition to other electronic or
- 13 print distribution of the information.
- 14 (g) No action taken pursuant to this section shall be
- 15 deemed to alter or relinquish any copyright or other
- 16 proprietary interest or entitlement of the State of
- 17 California relating to any of the information made
- 18 available pursuant to this section.
-
- ------------------------------
-
- Date: Sat, 02 Oct 93 04:15:34 EDT
- From: jackmcnac@AOL.COM
- Subject: File 4--U. Minn. Campus Police Investigate Software Theft Ring
-
- Minnesota Campus Police Investigating Software Theft Ring
- By Nancy Livingston
- Saint Paul Pioneer Press
-
- Sep. 30--Call it a hijacking on the nation's information
- superhighway - a crime of the 90s.
-
- University of Minnesota police are investigating allegations that
- a group of university students have copied computer software games and
- other programs protected by copyright and sold them via Internet, the
- international computer network.
-
- Internet is a global network of 1.7 million computers used by 15
- million to 30 million people. Growing by one million users a month,
- Internet has been dubbed the information superhighway. It is heavily
- used in academia for research, electronic mail, software transfer and
- other purposes, and many faculty members and students have accounts to
- use the Internet.
-
- Last May, a supervisor in the Institute of Technology computer lab
- became concerned when he noticed that the amount of disk space on the
- lab's Sun Microsystems computer system was running low.
-
- A search for users who had taken up unusual amounts of disk space
- revealed that three users had a large amount of commercial software in
- their files that cannot be used on the Sun computer. It was stored in
- a format for transmission over the Internet.
-
- The university supervisor surmised that the students were selling
- the software in violation of Minnesota law, and he locked the
- accounts.
-
- More extensive checking turned up six more users with what
- appeared to be a large amount of commercial software in their
- directories along with a large amount of mail. Their accounts were
- also locked and police were contacted.
-
- University police Capt. Francis Gernandt obtained a search warrant
- in June to gain access to the computer files in question, but he did
- not receive the information he needed until this week. The delay was
- due to a change in personnel at the computer lab.
-
- Gernandt said Wednesday that he will be asking university computer
- experts to help him analyze the computer files. Meanwhile, Gernandt is
- checking on the whereabouts of nine students who had the commercial
- software in their files. He is also looking into how much the software
- is worth and how the students came to possess it.
-
- ------------------------------
-
- Date: Sat, 11 Sep 1993 16:04:37 CDT
- From: Eric Crump <C509379@MIZZOU1.BITNET>
- Subject: File 5--Computers & Writing Call for Proposals
-
- +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
- Please forward this announcement to appropriate mailing
- lists, newsgroups, bbs, and individuals.
- ***Heartfelt apologies to those poor souls who see this
- announcement several million times***
- +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- ====================================
- Call for Proposals
-
- The Tenth
-
- COMPUTERS AND WRITING CONFERENCE
- ====================================
-
- Hosted by the University of Missouri
- Columbia, MO
- May 20-23, 1994
-
- THEME:
- The Global Web of Writing Technologies
-
- THE CONFERENCE
- This conference serves a growing and diverse community of writing
- teachers, students, and scholars who are interested in the
- convergence of computer technology and writing education. Many
- schools are now poised for their first leap into computer writing
- instruction, while in other places writing teachers and their
- students are making forays into new domains such as the wide world
- of the Internet. This conference brings together people from those
- extremes and from all points on the intervening continuum to share
- their ideas, research, and experiences. ************************
- +---------------- * Tight travel budget? *
- ************************|
- ELECTRONIC ACCESS |
- The program for this year's conference will emphasize the role of |
- the wide-area academic networks in writing education. And |
- electronic access will, we hope, make attending the event possible|
- to people who for some reason cannot travel to Columbia. It seems |
- only appropriate that conferences--especially those that are |
- concerned with computers and computer networks--should employ |
- the reach of the Internet in order to give more people access |
- to the conversation. ******************** <--|
- +---------------- * Attend C&W94 via *
- * the Internet (at *
- * a reduced fee) *
- ********************
- PROPOSALS
- We invite proposals that pertain in some way to the use of
- computers at any level of writing education, K-12 to community
- colleges to colleges and large universities, from technologically
- rich environments to places where instruction with computers is
- just getting started. Hands-on sessions, demonstrations, or any
- other format that encourages audience participation and interaction
- are particularly welcome. Here is a short list from among
- innumerable possible topics:
-
- --The latest reports from teachers and students--K-12 through
- college level--who are exploring the possibilities of networked
- classrooms
-
- --Tales of adventure from teachers and students who are venturing
- from the classroom into the wider network world
-
- --Help taking the first steps toward incorporating computers into
- writing instruction and research
-
- --Possibilities for using computers to forge better connections
- between K-12 and college educators
-
- --Hypertext theory, its classroom applications and cultural
- implications
-
- --Hypermedia applications and their impact on how we view "text,"
- "rhetoric," and "writing"
-
- --Writing in distance education programs
-
- --Computers and networks in writing across the curriculum programs
-
- --The legal, economic, and cultural impact of computer technology
-
- --The latest studies of and experiences with word processing and
- computer-assisted instruction programs
-
- --The impact of computer technology on writing and editing in
- journalism
-
- --How global information networks may affect the nature of journalism
-
- --Hypertext and network collaboration and new shapes in creative
- writing
-
- --The changing relationship between writers and information
- sources: libraries and librarians of the future
-
- SPECIAL FOCUS
- --The history and future of the computers and writing field
-
- The tenth Computers and Writing Conference seems like an
- appropriate place and time in which to indulge in some
- retrospection, introspection, and prognostication. We hope veterans
- and novices in the field will suggest opportunities for exploring
- the State of the Field, whether via special forums or by weaving
- the subject into regular sessions.
-
- VIRTUAL SESSIONS?
- We hope to have adequate access to a multiple user environment
- (MediaMOO, probably, or Internet Relay Chat) for conference
- activities. Presenters who are interested in trying something
- rather new might want to consider proposing sessions that include
- realtime conferencing over the Internet using these systems.
-
- CW94:FORUM
- The electronic forum offered this year by the University of
- Michigan was a great success, and we plan to continue the
- practice. Although the technical details have not yet been
- nailed down, we expect to make available a similar bulletin-
- board-type conferencing system that will allow participants
- to read presentation summaries and discuss the issues they
- raise well in advance of the May 20-23 gathering in Columbia.
-
- Presenters whose proposals are accepted will be asked to
- submit longer versions for use in conjunction with the
- electronic conference. Details will be included in
- acceptance notices.
- +--------------------------------------------------
-
- Proposals for sessions on any subject related to computers and
- writing will be accepted from August 1 to November 1, 1993. We
- encourage electronic submission, but acceptance is not in any way
- contingent upon it. Submissions can also be made in print or on 3.5
- inch computer disks, initialized either in Macintosh or IBM format,
- as long as the text is saved in ASCII (text) format. Notification
- will be made in January 1994.
-
- Please submit a 200- to 300-word abstract plus title for individual
- presentations, for poster sessions, and for each portion of panel
- presentations. For roundtables, think tanks, and readings (creative
- writing, for example), please submit a single 300-word abstract with
- names and addresses of each participant along with descriptions of the
- contribution each participant will make. For workshops, please include,
- in addition to a single 300-word abstract, an estimated timetable of
- activities.
-
- We also invite alternative session formats to the ones listed
- here. Past conference-goers have expressed interest in more
- of the hands-on and demo-type sessions, but presenters should
- also feel free to suggest presentation formats that best fit
- their work (although in the interest of the organizers' sanity,
- it might be good to also suggest standard options in case the
- preferred version simply can't be made to fit the program).
-
- Include name, institutional affiliation, postal address, and electronic
- mail address for each presenter.
-
- Each submission should include a description, as precise as possible,
- of equipment needs, if any. We do not guarantee absolutely that
- equipment requests will be fulfillable, but we will do our best to
- provide excellent technical support and will work with presenters to
- make the best arrangements we can. Computer classrooms and labs
- sporting IBM 55s with OS/2 2.1 or DOS 6.0 and Macintosh Centris
- computers with System 7.1 will be available. Any additional hardware
- or software requirements will need to be arranged on a case-by-case
- basis.
-
- Send electronic submissions (and any other correspondence) to: Eric Crump
- at LCERIC@mizzou1.bitnet or LCERIC@mizzou1.missouri.edu. Please include
- somewhere in the subject line: CWC94.
-
- Send disks and print submissions to: Eric Crump, 231 Arts & Science,
- University of Missouri. Columbia, MO 65211.
-
- ------------------------------
-
- Date: Fri, 24 Sep 1993 17:35:54 -0400
- From: ssimpson@EFF.ORG(Sarah L Simpson)
- Subject: File 6--ACTIVIST ALERT-CPSR Solicits CLIPPER/SKIPJACK comments
-
- ACTIVIST ALERT - The Government Is Messin' With Your Privacy!
-
- Computer Professionals for Social Responsibility (CPSR) posted the
- following call for comments to the Net. As the deadline for comments on
- the proposed Escrow Encryption Standard (CLIPPER/SKIPJACK) looms near, EFF
- wholeheartedly supports CPSR's work to bring attention to the proposal and
- encourages everyone who reads this to respond with comments.
-
- We have added a sample letter and additional information at the end of the
- CPSR post.
-
- ====================
- text of CPSR post
- ====================
- Call for Clipper Comments
-
- The National Institute of Standards and Technology (NIST) has
- issued a request for public comments on its proposal to establish
- the "Skipjack" key-escrow system as a Federal Information
- Processing Standard (FIPS). The deadline for the submission of
- comments is September 28, 1993. The full text of the NIST notice
- follows.
-
- CPSR is urging all interested individuals and organizations to
- express their views on the proposal and to submit comments
- directly to NIST. Comments need not be lengthy or very detailed;
- all thoughtful statements addressing a particular concern will
- likely contribute to NIST's evaluation of the key-escrow proposal.
-
- The following points could be raised about the NIST proposal
- (additional materials on Clipper and the key escrow proposal may
- be found at the CPSR ftp site, cpsr.org):
-
- * The potential risks of the proposal have not been assessed and
- many questions about the implementation remain unanswered. The
- NIST notice states that the current proposal "does not include
- identification of key escrow agents who will hold the keys for the
- key escrow microcircuits or the procedures for access to the
- keys." The key escrow configuration may also create a dangerous
- vulnerability in a communications network. The risks of misuse of
- this feature should be weighed against any perceived benefit.
-
- * The classification of the Skipjack algorithm as a "national
- security" matter is inappropriate for technology that will be used
- primarily in civilian and commercial applications. Classification
- of technical information also limits the computing community's
- ability to evaluate fully the proposal and the general public's
- right to know about the activities of government.
-
- * The proposal was not developed in response to a public concern
- or a business request. It was put forward by the National
- Security Agency and the Federal Bureau of Investigation so that
- these two agencies could continue surveillance of electronic
- communications. It has not been established that is necessary for
- crime prevention. The number of arrests resulting from wiretaps
- has remained essentially unchanged since the federal wiretap law
- was enacted in 1968.
-
- * The NIST proposal states that the escrow agents will provide the
- key components to a government agency that "properly demonstrates
- legal authorization to conduct electronic surveillance of
- communications which are encrypted." The crucial term "legal
- authorization" has not been defined. The vagueness of the term
- "legal authorization" leaves open the possibility that court-
- issued warrants may not be required in some circumstances. This
- issue must be squarely addressed and clarified.
-
- * Adoption of the proposed key escrow standard may have an adverse
- impact upon the ability of U.S. manufacturers to market
- cryptographic products abroad. It is unlikely that non-U.S. users
- would purchase communication security products to which the U.S.
- government holds keys.
-
-
- Comments on the NIST proposal should be sent to:
-
- Director, Computer Systems Laboratory
- ATTN: Proposed FIPS for Escrowed Encryption Standard
- Technology Building, Room B-154
- National Institute of Standards and Technology
- Gaithersburg, MD 20899
-
- Submissions must be received by September 28, 1993. CPSR has
- asked NIST that provisions be made to allow for electronic
- submission of comments.
-
- Please also send copies of your comments on the key escrow
- proposal to CPSR for inclusion in the CPSR Internet Library, our
- ftp site. Copies should be sent to <clipper@washofc.cpsr.org>.
- ===================
- end of CPSR post
- ===================
-
-
- EFF joins with CPSR in urging you to send your comments to NIST as soon as
- possible. To help get your creative juices flowing, we're attaching a
- sample letter. You will probably want to personalize any letter you
- actually send.
-
- And because time is so tight, EFF has set up an Internet address where you
- can send your electronic comments in lieu of mailing them through the U.S.
- Postal Service. Send your letters to:
-
- cryptnow@eff.org
-
- We will be printing out all letters and hand-delivering them before the
- deadline, so please make sure to send us any letter you want included no
- later than 8pm on Monday, September 27.
-
- If you would like additional background materials, you can browse the
- pub/EFF/crypto area of our anonymous ftp site (ftp.eff.org). The original
- solicitation of comments can be found there and is called
- NIST-escrow-proposal.
-
- DO NOT WAIT TO WRITE YOUR COMMENTS! TIME IS SHORT!
-
-
- ======================
- <<your name>>
- <<your organization>>
- <<your street address>>
- <<your city, state, zip>>
-
- <<date>>
-
-
- National Institute for Standards and Technology (NIST)
- ATTN: Proposed FIPS for Escrowed Encryption Standard
- Technology Building, Room B-154
- National Institute of Standards and Technology
- Gaithersburg, MD 20899
-
- Mr. Director:
-
- I am writing to oppose the Proposed Federal Information Processing Standard
- (FIPS) for and Escrowed Encryption Standard, docket # 930659-3159.
-
- Encryption is vital for the protection of individual privacy in the
- Information Age. As more and more personal information flows around
- electronic networks, we all need strong encryption to safeguard information
- from unwanted intrusion
-
- NIST should not be moving forward with technical standards specification
- until critical policy decisions are made. These policy issues include:
-
- o Continued Legal Use of All Forms of Encryption: When the Clinton
- Administration announced the Clipper Chip, it assured the public that this
- would be a purely voluntary system. We must have legal guarantees that
- Clipper isn't the first step toward prohibition against un-escrowed
- encryption.
-
- o Legal Rights of Escrow Users: If people choose to deposit their
- keys with the government or any other escrow agent, they must have some
- legal recourse in the event that those keys are improperly released. The
- most recent draft of the escrow procedures specifically states, however:
-
- "These procedures do not create, and are not intended to create,
- any substantive rights for individuals intercepted through electronic
- surveillance, and noncompliance with these procedures shall not provide the
- basis for any motion to suppress or other objection to the introduction of
- electronic surveillance evidence lawfully acquired."
-
- Leaving users with no recourse will discourage use of the system
- and is a tacit acceptance of unscrupulous government behavior.
-
- o Open Standards: People won't use encryption unless they trust it.
- Secret standards such as Clipper cannot be evaluated by independent experts
- and do not deserve the public trust.
-
- In addition, the current proposed technical standard is incomplete.
- It should not be approved until further comment on the complete proposal is
- possible
-
- o Operating Procedures Unclear: The full operating procedures for
- the escrow agents has yet to be issued. Public comment must be sought on
- the complete procedures, not just the outline presented in the draft FIPS.
- Even the government-selected algorithm review group has declared that it
- needs more information on the escrow process.
-
- o Identity of Escrow Agents: The identity of one or both of the
- escrow agents has not been firmly established.
-
- o Algorithm Classified: Asking for comments on an algorithm that is
- classified makes a mockery of citizen participation in government
- decision-making.
-
- NIST will be involved in making many critical decisions regarding the
- National Information Infrastructure. The next time NIST solicits public
- comments, it should be ready to accept reply by electronic mail in addition
- to paper-based media.
-
- Sincerely,
-
- <<name>>
- <<title>>
- ******************************
- Sarah L. Simpson
- Membership Coordinator
- Electronic Frontier Foundation
- 1001 G Street, NW
- Suite 950 East
- Washington, DC 20001
- 202/347-5400 tel
- 202/393-5509 fax
-
-
- ------------------------------
-
- End of Computer Underground Digest #5.78
- ************************************
-
-