home *** CD-ROM | disk | FTP | other *** search
Text File | 2003-06-11 | 57.0 KB | 1,020 lines |
-
- Computer underground Digest Sun Apr 03, 1994 Volume 6 : Issue 29
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Archivist: Brendan Kehoe (He's Baaaack)
- Acting Archivist: Stanton McCandlish
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Suspercollater: Shrdlu Nooseman
-
- CONTENTS, #6.29 (Apr 03, 1994)
- File 1--Bill Gates' Gov't Appointment (Apr 1 Press Release)
- File 2--Response to Edwards and GrimJim
- File 3--Cyberspace Forum - April 2nd, 1994
- File 4--Piracy & Phreakers
- File 5--Response to D.S. Weyker on software piracy
- File 6--Computers, Freedom, and Privacy '94 Conference Report
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send a one-line message: SUB CUDIGEST your name
- Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
- In ITALY: Bits against the Empire BBS: +39-461-980493
-
- FTP: UNITED STATES: etext.archive.umich.edu (141.211.164.18) in /pub/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
- nic.funet.fi
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: 01 Apr 94 16:13:22 EST
- From: Urnst Couch <70743.1711@COMPUSERVE.COM>
- Subject: File 1--Bill Gates' Gov't Appointment (Apr 1 Press Release)
-
- "GOVERNMENT TO INTELLECTUALIZE
- INFORMATION HIGHWAY THROUGH MENTUFACTURING"
-
- (AP)-In an unexpected White House press conference on April 1,
- Vice-President Albert Gore announced Microsoft's Bill Gates would be
- named director of a new agency designed to regulate and stimulate the
- development of the Information Superhighway.
-
- "If you have a personal computer, chances are that Mr. Gates and
- Microsoft Corp. are already a part of your life," said Gore during the
- conference. "In many cases, the personal computer is the on-ramp to
- the information highway, the conduit through which much of the
- national intellectual product of the future will flow. This
- intellectual product, or property, is manufactured, but not - in the
- conventional sense - through machinery. Rather, the commerce of the
- information highway is the harvest of the mind, our mental facilities.
- 'Mentufacturing' is the word the PR backroom guys -<laughter>- have
- coined. Mr. Gates's excellence in the field make him the logical
- candidate for a new project to guide and accelerate the nation's
- transition to a mentufacturing industrial base."
-
- Gore went on to explain how Gates, along with a core consulting group
- consisting of telecommunications guru John Malone and cellular phone
- titan Craig McCaw, would make up the industry-government interface for
- the agency, tentatively named the Ministry of Mentufacturing,
- Organization, Networking and Electronic Exchange (MO*MONEE).
-
- The ministry is to be located at 2001 L Street NW, Washington, D.C.,
- alongside offices of the Business Software Alliance.
-
- The initial mandate of the ministry, said Gore, would be to work up a
- plan for the issuing of Licenses of Mentufactury, which would become
- necessary - just as the motor vehicle operator's license is a must for
- drivers - for the operation of on-line services or the production of
- intellectual "soft goods." Gore said that he, along with Congress,
- would move briskly toward legislation requiring Licenses of
- Mentufactury for all computer industry and information highway
- entrepeneurs by late 1995.
-
- Roger Thrush, an administrative lieutenant speaking for the absent
- Gates, who was vacationing in Hawaii, explained how licensing would
- work.
-
- "It really is simpler than it sounds," said Thrush. "We envision
- several classes of mentufacturing, the primary of which constitutes
- existing on-line services and retail software developers in the
- Fortune 500. For the most part, this group has already been granted
- provisionary licenses with permanent approval contingent only upon
- minor structural and operational changes which we think will be no
- inconvenience to implement. For example, most of the captains of the
- information industry already have the capability to suborn their
- telecommunications feeds to something we call the Microserve and
- Mentufacturing Market Organizational Network - or MAMMON - backbone, a
- super-net which will make the registration of Licenses of Mentufactury
- electronic, instantaneous and economical.
-
- "For the small businessman - or millions of home hobbyists - there
- will be a different class of license. This should make it easier for
- the government to distinguish legitimate mentufacturing needs from
- socially heretical activity. For example, we would consider the
- bulletin board system application for a Licence of Mentufactury from a
- member of the North American Man-Boy Love Association frivolous. And
- this has an added benefit, because it allows for interactive,
- non-intrusive patrol of the information highway, thus hindering those
- who would use it for soliciting, piracy, or the dissemination of
- private, sensitive or proprietary information. Of course, the small
- businessman with a 5-6 line service will find the legislation
- transparent, which should make the cyber civil libertarians happy,"
- Thrush laughed.
-
- Licenses of Mentufactury will be assigned tariffs based on a sliding
- scale beginning at $500, said Thrush. Fees would go to a government
- superfund, controlled by MO*MONEE. The superfund would be used for
- federal employee reimbursement and seed cash for promising
- breakthroughs in mentufacturing.
-
- Silicon Valley venture capitalist and ex-Gates paramour Ann Winblad
- said in interview, "Bill has wanted to adopt the mindset of a true
- visionary, to take even greater risks, for a long time. No one can
- doubt the scope of his ambition and his great admiration for Henry
- Ford is likewise well known. Like that entrepeneur, Bill wants to
- move Americans forward a quantum jump. Mentufacturing could be the
- answer for him, as well as the nation."
-
- "Mentufacturing mania will probably pique everyone's fancy in the next
- few months," said computer magazine writer John Dvorak. "It's a great
- concept, but making it concrete may take a little longer."
-
- "I believe everyone from education to industry will rush to go
- 'mental' on the Information Superhighway, now that the Vice President
- has put this welcome proposal onto the playing field," said
- Congressman Edward Markey (Dem.), also in attendance at the press
- meeting.
-
- Gore concluded the press conference by paraphrasing the Grolier
- dictionary's definition of "mentufacture." "To mentufacture is to
- engage in the _manufacture_ of the God which resides in every man: the
- fruit of the soul, our minds, ourselves. Thank you ladies and
- gentlemen."
-
- ------------------------------
-
- Date: Mon, 28 Mar 94 15:27:38 GMT
- From: 88-8315@WWIV.FRED.COM(Mr. Badger #88 @8315)
- Subject: File 2--Response to Edwards and GrimJim
-
- Bruce Edwards' response to my review of Dibbell's article states:
- "After reading his post several times, it seems only an exercise
- to excoriate the idea of fantasy play and belittle Dibbell's
- concepts."
-
- Half right. It is as an experienced fantasy role player (D&D,
- Fantasy Trip, Warhammer, and GuRPS within the last year, alone)
- that I find Dibbell's concepts ridiculous.
-
- I also find it ridiculous that Edwards believes experience in
- role playing would help a jury decide on whether or not a child
- molester ought to be punished or not. Any weakening of the
- fundamental difference between fantasy/reality or words/actions
- is exactly what leads to the vagaries of the modern justice system.
- A person can fantasize about whatever they wish, but those who
- commit rape and child abuse deserve to be punished. To attempt
- to impart special significance to fantasies on-line does nothing
- but debase the truth concerning actual acts of aggression.
- True, the use of words can be potent. Witness libel. But Edwards
- should realize that libel has also been difficult to prosecute,
- precisely because the claimant must prove actual damages.
-
- Do I think he MUDers took things too seriously? Of course!
- Boot the offender off the system and have done with it. If
- push comes to shove, grab your marbles and go play elsewhere.
- Heck, for all I care, argue about it on-line until your phone
- line melts. Just don't try and draw shoddy parallels to real
- life that only serve to weaken judgment in both realms.
-
- ------------------------------
-
- Date: Sat, 2 Apr 94 23:37:14 MST
- From: adunkin@NYX.CS.DU.EDU(Alan Dunkin)
- Subject: File 3--Cyberspace Forum - April 2nd, 1994
-
- ((MODERATORS' NOTE: Alan Dunkin is the guy resposnible for the CuD
- cummulative subject/topic index that readers have found helpful. His
- notion of an occasional forum seems like a good idea, and we're hoping
- he can be talked into doing an occasional profile of computer culture
- personalities. Contrary to what he says below, we don't think he's
- "stupid" for taking on a massive project. Quite the contrary!!
- Masochistic, maybe, but in a noble sort of way. We hope readers can
- give him some useful suggestions)).
-
-
- THE CYBERSPACE FORUM (Intro and Ideas)
-
- Most of you probably do not know me. I have been posted in the
- Computer underground Digest only a few times, starting from the
- summer of last year. Back then I once told Jim Thomas that I'd
- try to contribute in any way I could to CuD and it's readership,
- and he gave me an affectionate pat on the back and told me to
- get lost. Actually, he didn't say much of anything, but several
- months later I finally came up with an idea that was actually
- meaningful, the CuD Cumulative Index. Sure, the volume indices
- are nice in their own right, but the subject headings of articles
- is not particularly useful because they fail to provide the "meat"
- of a CuD file. I showed Jim a preliminary copy, and he was totally
- amazed on how stupid I was for doing such a seemingly colossal project.
- However, he urged me on, and I managed to fully complete the first
- four volumes and it was published in the last issue of CuD for 1993.
- Pretty soon now you should be seeing the new version, updated for
- volume five, on the electronic newsstands across the nation.
-
- Early this year, however, I started thinking about other ideas for
- CuD, and I remember seeing once that Jim had posted some thoughts
- on improving the digest. Immediately one of my own pet peeves hit
- me, how about a regular feature about the cyberworld, and it's impact
- on pretty much everything? A re-vamping of "CU in da Newz" with a
- bit of the twist. A new technologies forum for those who relish in
- new toys. New net happenings you never heard of. A place where ideas
- are welcome, posts are posted (maybe not fully, but you get the picture),
- and debate on some of the big issues facing us today. Or tomorrow. And,
- a valuable pointer to the past.
-
-
- Unfortunately I don't remember much of what Jim thought of the idea,
- other than "great" or something to that effect. So is this the
- beginning?
-
- Sort of. Right now I'm looking for ideas. Sure, I have some of my
- own I'd like to explore, but your input would mean a lot to me. What
- would you like to see? Hopefully nothing long and overdrawn, there is
- a kind of space limitation. The "column", if you will, should be in
- every third or fourth issue of CuD. So send your ideas along today,
- and we'll see what we can do it fulfill them.
-
- Next time -- ground rules for posting, copyrights, and other
- miscellaneous legal stuff that you'd rather not see but I'd like to
- get into the open.
-
- And remember, send your ideas a' comin', and we can get this thang
- a'rollin'.
-
- --- Alan Dunkin, Angelo State University [adunkin@nyx.cs.du.edu]
- "Standing erect, he was two feet wide" -- Peter Shickele's
- Bach Portrait.
-
- ------------------------------
-
- Date: Sun, 27 Mar 1994 07:29:00 GMT
- From: chris.hind@MAVERICKBBS.COM(Chris Hind)
- Subject: File 4--Piracy & Phreakers
-
- >And what is the Hacker community's record with regard to malicious
- >hackers who trash companies systems? Do they actively try to find out
- >these guys and inform on them? I doubt it, although I'd be happy to
- >learn otherwise. If non-malicious hackers' real purpose is to help
- >companies to defend themselves against malicious hackers, then they
- >probably should as a rule inform on malicious hackers.
-
- They should give a reward of lets say $50 per person who can find a
- flaw in the system first. Also in regards to piracy, CDROMS are a good
- and effective method to stop piracy because the audio in programs on a
- CDROM isn't contained inside a file, its written on the disc itself
- like anyy Compact Disc would. Also, nobody is gonna be stupid enough
- to pirate a 600MB program! I keep in touch with the hackers &
- phreakers and I know exactly what they do. I've only seen once where
- someone was stupid enough to put a CDROM on their BBS for people to
- download. The minimum size for a file was 19MB!! Software companies
- should put counters in their software to see how often its been used.
- The program should auto-recognize the computer's peripherals
- (moniter,mouse,speed,etc.) and encrypt a file within the executible
- that contains this information. If you change a device on your system,
- it resets the counter back to zero. So if a pirate copies software
- off someone else's computer and installs it on his, the software will
- automatically reset the counter to show how often he uses the
- software. If he uses the software often and the cops catch him, he
- should be fined. This is a simple method to defeat or lower piracy
- effectively. In regards to the article you were talking about that
- phreakers have the potential to change people's minds over which
- equipment, companies should buy for fear of getting hacked. You gave
- an example about if phreakers printed and article in Phrack about how
- to hack such-and-such equipment then that might change a telco's mind
- about which brand of equipment they should buy. Now that this
- information is released, there's a whole new ball game! Now phreakers
- will use this as power over the market. They could use reverse
- psychology to screw up the telco's and then that would open up a huge
- window for phreakers to hack into a telco and pick it's bones clean.
- Before this information was released, phreakers probably didn't know
- they had that power.
-
- ------------------------------
-
- Date: Wed, 30 Mar 94 10:53 EST
- From: "AMERICAN EAGLE PUBLICATION INC." <0005847161@MCIMAIL.COM>
- Subject: File 5--Response to D.S. Weyker on software piracy
-
- I've personally had to deal with both sides of the piracy issue, so
- I'd like to make some comments on Mr. Weyker's comments in CUD 6.27
- regarding software piracy, which perhaps also relate to hacking in
- general.
-
- First a little background: as one of the generation who pulled himself
- up by the bootstraps into the micro-computer profession in the late
- 70's and early 80's, I must confess that I simply couldn't have done
- it without a modicum of copying. As a graduate student in a different
- field, I could BARELY justify the investment in a cheap computer, and
- most software was simply out of the question. It simply would not have
- been practical to learn enough about computers to sell my services
- were I to obey the letter of the law. What were my real options? (A)
- Buy a FORTRAN compiler for $700 up on a research assistant's salary
- (e.g. about $350/month),
- (B) Write my own from scratch in BASIC (which I did legally own),
- (C) "Borrow" a copy from the University?
-
- Again, I've worked for major hardware manufacturers. Anyone who's
- tried to develop PC hardware knows compatibility is the name of the
- game. With 3 million different applications and versions of
- applications out there, how do you make your hardware compatible with
- every single one? Sure, 99.9% of them are no problem at all, but the
- 0.1% that are can be a real bear. What can you do when a customer
- calls up and says "I'm having a problem with your product and
- Borland's Turbo Linker 1.27b, but your competitor's product works just
- fine."?? Just try to call Borland and get Turbo Linker 1.27b
- legitimately. I've done it, and it's a joke. They're on version 2.1
- now and 1.27b is dead. I mean DEAD. Nobody even knows it exists. The
- guys who wrote that are at Microsoft now. Then ask this question "If
- you can't supply it to me, would you mind if I got a bootleg copy?"
- It's good for a laugh, but you're not going to get a polite "sure,
- friend."
-
- On the other side of the coin, I run my own business now, and I CAN
- pay for the software I use--AND I DO PAY FOR IT, 100%. Not only that,
- being rather neutral on computer viruses, I have written them and
- copyrighted them, selling them for educational purposes to those who
- need to know. However, anti-virus developers are not the fount of
- morality they often make themselves out to be. A number of them have
- decided, quite apart from the law, that since virus writing is a
- priori immoral, that they have the perfect right to copy viruses among
- themselves as they see fit, including my own work. Some have even
- been so bold as to boast about it in print. So I find myself in the
- position of being financially damaged by an organized piracy ring.
- I'd like to take legal action, but frankly, (1) lawyers cost too damn
- much, (2) I don't seriously believe the courts care for justice at
- all, as judges are often carressed by slick-tongued lawyers, and (3)
- it is rather hard to prove who copied what--even when they boast about
- it in print.
-
- In short, I guess I've seen both sides of this problem. As far as I
- can see, there are two ways to approach it on ethical grounds, which
- really depends on what kind of society you live in. If you live in a
- society where there are absolute moral standards, you're probably
- pretty well off, because you can use those standards like theorem and
- hypothesis to draw some conclusions. That isn't the United States,
- though. In our society there are no absolute morals anymore.
-
- Once a pirate was brought to stand trial before Alexander the Great.
- Alexander asked him by whose authority he comandeered ships. The
- pirate, facing immanent execution, defiantly asked Alexander by whose
- authority he comandeered nations. The point is simple: in a world
- without absolutes, power is the only rule, and all men do what they
- can get away with. The state becomes the chief criminal, the
- Godfather, not the standard-bearer of righteousness. May I submit to
- you that this is exactly where we are at today. Our government has
- cast off all restraints of law. If the government could claim any
- authority beyond raw power, it would appeal to the founding fathers
- and the constitution. The founding fathers plainly appealed to God in
- the Declaration of Independence and many less noticed writings. Yet
- any such claims are patently false, in as much as our government now
- subverts the constitution and the original intent of the fathers at
- will. I could give a myriad of examples. Furthermore, our government
- is the chief purveyor of immorality. You name it--whether you're
- talking homoerotic art and ads for condoms, or the subversion of
- justice in the courts, the willingness of government agencies to
- murder anyone they don't like (e.g. Vicki Weaver or the Davidians), or
- let others murder without consequence (LA riots), or the character of
- our leaders, the message is clear: our government is the leader in
- every evil thing. In word it may tell us to obey the law, but in deed,
- our leaders are saying loud and clear that there is no law but power.
-
- As such, the law as a statement of prevailing morality is purely the
- tool of the powerful. If you have power, you consolidate it into law
- and give it the name of morality. Machiavelli.
-
- Now let's look at piracy from that angle: There are two sources of
- power: first, there's power where the money is: e.g. the software
- developers. Second, there's power where the technology is. And the
- technology favors the pirates. When you can copy a disk for $0.30 in
- less than a minute in complete privacy, and then encrypt it so nobody
- but you can read it, that's power. It didn't have to be that way. I
- mean, what if software came on custom LSI chips, which you would plug
- into a board in your machine? Piracy wouldn't be a real issue then.
- The bottom line is that we have a power struggle. Techno-power
- inherent in the ease of copying, or money?
-
- Money has made the law. Technology has made a farce of the law. If we
- face the facts, practically everyone who has a keen personal interest
- in computers has copied software at some time or another. The old joke
- about engineers, after all, is that "I never saw a piece of software
- he didn't like." So it seems resonable to suppose that, legally
- speaking, we might equate engineers with felons. Furthermore, as a
- systems-level programmer, I can GUARANTEE you that nobody in the past
- 10 years has written good, compatible PC systems software without at
- least a little "piracy". It's simply impossible to do it legally, as I
- discussed above. Thus, since systems software is the foundation that
- all other software is build upon, we might say that the whole of
- cyberspace is built on illegal activity.
-
- Now, the essence of tyranny is to put everyone in violation of a
- draconian law at all times. Then, anyone can be arrested at any time
- for any variety of reasons, and legally punished without measure. Our
- software piracy law seems to fit well in line here. If I were Stalin,
- I could well rejoice in it. With a stroke of the pen I would have
- declared the very people who have built the technological society we
- so love to be felons. Of course I wouldn't arrest them all and herd
- them off to jail. That would not be expedient. But when one of them
- steps on my toes, I get out my little black law-book and start looking
- for things to get them on. Software piracy looks like a mighty fine
- tool to me.
-
- Mr. Weyker makes the comment that "We are all morally bound to obey
- the law" except in a public protest. I'll plainly disagree. All of
- this talk about piracy being "stealing" and the like is concocted
- double-speak. I mean, whose morals are we talking about here?
- America's? Then might makes right, and you can do what you like. How
- about the Bible? Surely it forbids stealing, yet as far as I can see
- that applies to tangible objects alone. I can find no example of an
- "intellectual property" right there, which would imply that there is
- no such thing as intellectual property in God's eyes. If we really
- face the facts, it's harder to put your finger on software than on
- air. To say that copying software is stealing is streching "stealing"
- FURTHER than if you say that I'm stealing if I breathe air in your
- house. Even if there were grounds for "intellectual property" here,
- biblical punishments for stealing are only something like five-fold
- restoration. That would suggest that--bibilically speaking (moral high
- ground)--the present law is immoral.
-
- The oldest form of protest is exactly to IGNORE the law. Nothing works
- better to make a mockery of the laws and the lawmakers. And a public
- protester will get nowhere if there are not a multitude who have gone
- before him quietly ignoring a law they dislike. Dr. Kevorkian is
- indeed a good example here.
-
- Suppose we did away with "intellectual property rights" re software
- altogether and just let people decide for themselves when to pay for
- something? Where would society go? Having been in the software
- industry and sold software, I expect what it would do might just be
- beneficial. Firstly, I expect you would see, for the most part, a
- gentleman's fair-use agreement much like most people use under the
- table today to determine when to buy software. In other words, if I
- use it regularly and it benefits me, I buy it. Despite the amoral
- climate we live in, I think most people try to be fair to vendors most
- of the time. For the most part, they have been to my company, even
- though there is a cadre who aren't.
-
- It's not the little guy who will get hurt in such a scheme. He can
- still sell software because chances are his neighbor won't have that
- package anyhow. The big guy will get hurt though. But is that
- necessarily so bad? It sounds to me like a good way to keep monopolies
- out of the software industry. Sort of a natural limit on how big you
- can get. Right now, the spectre of monopolies appears to me to be the
- biggest hinderance to continued progress in cyberspace. Robert
- Cringley recently (Infoworld, Mar 28 94, p.98) compared the software
- industry to the auto industry. The comparison is apt. "In 1920 there
- were about 300 full-line american automobile makers. By 1930 there
- were 25. By 1940 there were 10. Today there are 3." And think of what
- you'd have to do to make that 4! Government red tape, financing,
- advertising . . . it's impossible. Notice that progress also stopped.
- I mean, if you go back 50 years and look at predictions of what today
- would be like, they had us flying to work! Monopolies and innovation
- are not usually cousins. Software is going to be just like that in 20
- years if something doesn't change. I mean the works. Government
- license and red tape. Mega windows gui apps that take thirty
- man-centuries to develop. And innovation dead.
-
- Frankly, I think the hacker ethic re piracy as expounded by Emmanuel
- Goldstein is perhaps closer to the truth than present SPA and
- government policy. Yet I don't think we'll see "intellectual property
- rights" abandoned anytime soon, so the only real game in town is to
- leverage power. The key to this is to know where your power is. The
- software developers who support the SPA know. That's why they write
- immorally draconian laws. The pirate's power is in technology. I
- decided to leverage that by sponsoring development of the Potassium
- Hydroxide encryption system. If you'll look at that program, you'll
- notice that it is IDEAL for protecting the individual against
- enforcement of the piracy laws. (Don't think it wasn't developed as a
- response to the new laws.) It encrypts your hard disk and all your
- floppies using IDEA. Then only you can see them. The executable is
- freeware so you won't be a pirate if you use it, and the source is
- available for a modest fee. So get it and use it.
-
- ------------------------------
-
- Date: 28 Mar 1994 20:39:07 GMT
- From: lfa1@cec3.wustl.edu (Lorrie Faith Cranor)
- Subject: File 6--Computers, Freedom, and Privacy '94 Conference Report
-
- The following is my second annual Computers, Freedom, and Privacy
- conference report. Last year I wrote a report on CFP93 for my advisor
- and friends and soon had requests to distribute it around the world
- (followed by rebuttals from half the EFF board). So this year I'll go
- ahead and grant permission for reposting in advance. If you do repost
- or if you have any comments or corrections, please let me know. I
- have tried my best to accurately quote people and get the spelling of
- speakers' names right. However, I have not had the opportunity to
- listen to a tape of the proceedings, double check with the speakers
- themselves, or even carefully edit this report, so there may be some
- (hopefully minor) errors. Anyway, here is the CFP94 conference as I
- experienced it. All unattributed opinions are my own.
-
- I flew into Chicago around noon on March 23 and took the train to the
- Palmer House Hilton, the conference hotel. I was impressed with the
- way the train stopped almost right at the hotel entrance -- until I
- realized that my room was almost directly above the train station. At
- CFP93 last year I was often tempted to skip a session, enjoy the
- sunshine, and walk along the bay. However, at CFP94, held in a high
- rise hotel in the middle of a maze of very tall buildings and
- elevated train tracks that prevented all but the most determined sun
- beams from making their way down to street level, this was not a
- temptation.
-
- I missed the morning pre-conference tutorials, but arrived in time to
- attend a three-hour afternoon tutorial session at the John Marshall
- Law School (a few blocks away from the conference hotel). The
- election tutorial I had planned on attending was canceled, so I went
- to a tutorial on cryptography instead. Despite the hot stuffy air in
- the room (as they wheeled in auxiliary air conditioners and draped air
- hoses around the room the people from Chicago kept explaining that it
- wasn't supposed to be 75 degrees in Chicago in March and that very
- tall buildings don't adapt well to temperature change), the
- cryptography tutorial was quite interesting and informative. Lawyer
- Mark Hellmann gave some good background information in his
- introduction, but Matt Blaze of AT&T Bell Labs stole the show with his
- presentation titled "Everything you need to know about cryptography in
- just 60 easy minutes." Blaze explained why cryptography is
- useful/necessary, how some popular cryptosystems work, some
- applications in which cryptography is used, and questions people should
- ask before using a cryptosystem. His conclusion was "Be realistic,
- but be paranoid." Douglas Engert of Argonne National Laboratory
- followed with a rather rushed and confusing explanation and
- demonstration of Kerberos, a "practical implementation of encryption."
-
- Conference chair George Trubow officially opened the single-track
- conference at 8:30 a.m. on Thursday morning. He announced some
- changes to the conference program and introduced John McMullen,
- scholarship chair. McMullen introduced the scholarship recipients
- (including myself) and noted that three-time scholarship winner Phiber
- Optik would not be in attendance because he is currently in jail.
-
- The keynote address, originally scheduled to be delivered by John
- Podesta, was delivered by David Lytel of the White House Office of
- Science and Technology Policy. Lytel first spoke about the
- administration's plans for the National Information Infrastructure
- (NII), explaining that the white house was attempting to lead by
- example by accepting email correspondence (and maybe soon actually
- responding to it properly) and making white house publications
- available electronically. (Look for a "welcome to the white house"
- WWW server sometime soon. Information from the II task force is
- currently available via gopher from iitf.doc.gov.) Lytel then put
- himself in the line of fire by discussing the administration's
- encryption policy. He stated the goals of this policy as 1) to
- provide a higher baseline security for everyone and 2) to maintain
- the ability to do wiretaps. Notably, he stated: "There will be no
- restrictions on domestic use of encryption," and "If you don't think
- Clipper is secure, don't use it." Then the bombing began. In the
- following Q&A session, Lytel claimed ignorance on many points of the
- Clipper proposal, but did make some interesting claims. He stated
- that (here I've paraphrased):
-
- - Clipper will be a government procurement standard that agencies may
- choose to use in addition to other standards.
-
- - The establishment of a public key registration system for all public
- key cryptosystems is important (this has not been officially proposed).
-
- - Clipper-encrypted messages may be further encrypted with another
- cryptosystem. However, messages may not be encrypted before being
- encrypted with Clipper.
-
- - The public is more at risk from criminal activity (which Clipper may be
- able to prevent) than from government abuse of power.
-
- - Clipper was designed by the government for it's own use. But they
- wouldn't mind if it becomes popularized as a commercial product.
-
- - Clipper was only designed to catch "dumb criminals."
-
- - Clipper does not make it easier or harder for law enforcement to get
- permission to do a wire tap.
-
- After a short break, Lytel took the podium again as one of six
- panelists in a discussion of "The Information Superhighway: Politics
- and the Public Interest." The panelists generally agreed that the
- information superhighway should provide "universal access" and two-way
- communication. They all seemed to fear a future in which the
- information superhighway was simply a 500 channel cable television
- network in which two-way communication only occurred when consumers
- ordered products from the home shopping network. Jeff Chester of the
- Center for Media Education stressed the need for public activism to
- prevent the form and content of the information superhighway from
- being determined only by cable and telephone providers. In the
- following Q&A session the "information superhighway" was dubbed a bad
- metaphor ("The vice president's office is the department of metaphor
- control," quipped Lytel.), and subsequently used sparingly for the
- remainder of the conference.
-
- Thursday's lunch (all lunches and dinners were included in the price
- of admission) was the first of many really bad meals served at CFP. I
- requested vegetarian meals and winded up eating plate after plate of
- steamed squash. My meat-eating friends claimed not to enjoy their
- meals either. Fortunately the lunch speaker was much better than the
- lunch itself. David Flaherty, Canada's Information and Privacy
- Commissioner, explained what his job entails and gave some
- interesting examples of privacy cases he has worked on.
-
- The first panel discussion after lunch was titled "Is it Time for a
- U.S. Data Protection Agency?" The panelists agreed that with all the
- information currently being collected about people, it is time for the
- U.S. to institute an organization to help protect privacy. Currently,
- litigation is the only way to force compliance with the "patchwork" of
- privacy laws in the U.S. However, the panelists disagreed on what
- form a privacy protection organization should take. The most concrete
- proposal came from Khristina Zahorik, a congressional staffer who
- works for Senator Paul Simon. Simon recently introduced legislation
- to form a five-member independent privacy commission. Martin Abrams
- of TRW objected to the formation of a commission, but supported the
- formation of a "fair information office." Law professor Paul Schwartz
- then discussed the European draft directive on data protection and
- stated that once the Europeans approve this directive the U.S. will
- have difficulty doing business with Europe unless a U.S. data
- protection board is formed.
-
- In the next panel discussion, "Owning and Operating the NII: Who, How,
- and When?" Mark Rotenberg of Computer Professionals for Social
- Responsibility (CPSR) played talk show host as he questioned four
- panelists. The panelists stressed the importance of universal access
- and privacy for the NII. Barbara Simons, chair of ACM's new public
- policy committee USACM, was particularly concerned that the NII would
- be viewed as an electronic democracy even though large segments of the
- U.S. population would be unlikely to have access to it. "I worry that
- when people talk about electronic democracy they might be serious,"
- she said. She added that NII discussions are exposing all of the
- major problems with our society including poverty and poor education.
- Her comments were interrupted by a call to the podium phone, which
- turned out to be a wrong number. Jamie Love of the Taxpayer Assets
- Project pointed out problems that could occur if NII providers do not
- have flat rate fees. For example, listservers, which are often used
- as organizational and community-building tools, would not be able to
- exist unless somebody volunteered to pick up the tab. Somebody from
- the audience pointed out that throughout the day panelists had been
- opposing plans for carrying entertainment on the NII, despite the fact
- that most Americans want entertainment, especially shows like Beavis
- and Butthead. Love explained that the panelists were not opposing
- entertainment plans, just plans that only include entertainment. He
- noted, "I personally like to watch Beavis and Butthead."
-
- After the panel discussion, conference organizers scurried to hook up
- a teleconference with Senator Patrick Leahy, author of the 1986
- Electronic Privacy Act. Jerry Berman acted as moderator, speaking to
- Leahy through the podium phone as audience members watched and
- listened to Leahy on a projection TV. The teleconference began with
- some technical difficulties during which the audience could see Leahy,
- but only Berman could hear him. Berman reported this problem to Leahy
- and then told the audience, "Senator Leahy may hold his speech up in
- front of his face." Once the technical difficulties had been worked
- out, Leahy discussed the NII and problems with the Clipper proposal.
-
- The final panel discussion of the day was titled, "Data Encryption:
- Who Holds the Keys?" The discussion began with a presentation from
- Professor George Davida, whose 1970s crypto research brought him some
- unwanted attention from the National Security Agency (NSA). Davida
- explained the importance of cryptography for both privacy and
- authentication. The Clipper proposal, he said, was a bad idea because
- it would attempt to escrow privacy. He pointed out that the bad
- guys have a lot of money to hire hackers to write encryption schemes
- for them that the government does not hold the keys to. Furthermore,
- he opposed the idea of the NSA being responsible for an encryption
- scheme that many people would use to guard their privacy. "Asking the
- NSA to guarantee privacy is kind of like asking Playboy to guard
- chastity belts," he explained. Next, Stewart Baker of the NSA took
- the podium to deliver an ultra-slick presentation on the "Seven Myths
- about Key Escrow Encryption." His main points (here paraphrased)
- were:
-
- - If you think key escrow encryption will create a "brave new world" of
- governmental intrusion, ask yourself how bad governmental intrusion
- is today. If won't be any worse with key escrow encryption.
-
- - If you think unreadable encryption is the key to our future liberty,
- you should be aware that the beneficiaries of unreadable encryption
- are going to be bad guys.
-
- - If you think key escrow encryption will never work because crooks
- won't use it if it's voluntary and therefore there must be a secret
- plan to make key escrow encryption mandatory, you're wrong.
-
- - If you think the government is interfering with the free market by
- forcing key escrow on the private sector, remember that nobody is
- forcing the private sector to use Clipper.
-
- - If you think the NSA is a spy agency and thus has no business worrying
- about domestic encryption policy, you should realize that the NSA also
- designs encryption technology for government use.
-
- David Banisar of CPSR followed Baker with more anti-Clipper arguments.
- Banisar pointed out that communication systems are designed to
- communicate, not to provide intelligence information. If we build
- communications systems as intelligence systems, we are treating
- everyone as a criminal, he said. He pointed out that there were about
- 14 million arrests in the U.S. in 1992, but only about 800 wire taps.
-
- The encryption panel was followed by the annual EFF awards reception
- and the conference banquet. (Incidentally, I can't complain about the
- EFF board the way I did last year because most board members were not
- present this year. Seriously, though, I have been much more impressed
- with the way EFF has been reaching out to its members this year.)
- During dinner (more squash) Ben Masel of NORML lectured my table on
- how to legally harvest marijuana. After dinner, the lights dimmed,
- choir music played, and Simon Davies walked through the banquet hall
- garbed in pontifical robes. The founder and Director General of
- Privacy International, Davies told the audience he would read from
- "The Book of Unix." Davies read a witty parable about privacy in the
- U.S. and then urged the audience to "get off their computer screens
- and start lobbying ordinary people." He said efforts like CPSR's
- anti-Clipper petition only reach people on the net, not the general
- public. Unless the public becomes aware of privacy problems, there
- will be no privacy in the U.S. within 15 years he stated.
-
- Following Davies' talk, conference participants went to
- Birds-of-a-Feather sessions, some of which ran until almost midnight.
- I stopped by a BOF for scholarship winners before attending a lively
- discussion on "Censorship of Computer-Generated Fictional
- Interactivity."
-
- The second day of the conference began at 9 a.m. Many participants
- had not gotten enough sleep the night before, and many skipped the
- first session on health information policy. Congressional staffer Bob
- Gellman discussed a bill in the U.S. House of Representatives that
- would provide for comprehensive rules for using health information,
- patient rights for access to and correction of their health
- information, and security of health data. He said the bill was
- important because health reform will increase the use of medical
- information. (The bill is available via gopher from cpsr.org. An OTA
- report on privacy of computerized medical information is available via
- FTP from ota.gov.) Janlori Goldman of the ACLU added that privacy has
- been an afterthought in health care reform proposals. All panelists
- agreed that if the privacy problem is not dealt with, patients will
- withhold important information from their doctors so that it does not
- appear in their medical records. In response to a question from the
- audience about the use of social security numbers as medical
- identification numbers, the panelists gave conflicting responses.
- Goldman opposed the use of the SSN for identification purposes because
- it is not a unique identifier and because it is already used for other
- purposes and thus easy to cross reference. However, Gellman argued
- that if a new identification number is introduced, it will soon have
- the same problems as the SSN. He said the SSN should be used, but
- there should be restrictions on its use. Lee Ledbetter of HDX added
- that most databases can do cross references based on telephone
- numbers. The panelists also discussed the problem of informed
- consent. Gellman explained that people often sign away privacy rights
- through informed consent because they think they have to, not because
- they really are informed or consenting.
-
- The next panel was titled, "Can Market Mechanisms Protect Consumer
- Privacy?" This discussion, which centered around whether privacy is a
- right or good, was probably most easily understood by the lawyers and
- economists (I am neither) in the audience. Of note, panelist Eli Noam
- suggested that consumers could reduce intrusion on their privacy by
- telemarketers if telemarketers could only reach them through personal
- 900 numbers. Mark Rotenberg explained that the real problem with
- caller ID is that the phone companies use it to sell rights to
- consumers. One audience member challenged a panelist's proposal that
- people should own the information about themselves asking, "Who owns
- your birthday -- you or your mother?"
-
- The lunch lecture was eloquently delivered by Phil Zimmermann, author of
- Pretty Good Privacy (PGP), a public key encryption tool. Zimmermann,
- who is being investigated for export control violations but has not been
- indicted, told the audience that the future of privacy in America
- is not hopeless. Referring to the Clipper proposal he said, "We
- live in a democracy here... we ought to be able to stop it."
- Zimmermann explained why he developed PGP and allows it to be distributed
- free of charge. He also spoke out against the fact that all public
- key cryptography patents are in the hands of one company (thus
- those who use PGP without licensing the cryptographic algorithm may
- be breaking the law).
-
- The next panel discussion focused on "Creating an Ethical Community
- in Cyberspace." Computer science professor Martin van Swaay began by
- explaining the importance of trust in a free society. "Freedom is not
- the absence of restraint, but the presence of self restraint," he
- stated. He said freedom is necessary to earn trust, and trust is
- necessary to give laws meaning. Philosophy professor Bruce
- Umbaugh then discussed anonymity and pseudonymity in cyberspace.
- He gave some examples of cases where pseudonymity is useful but
- anonymity is not and explained why anonymity is much more
- of a threat than pseudonymity. Steven Levy, author of Hackers,
- then discussed the hacker ethic and how it is helping to shape
- cyberspace. In response to a question, van Swaay said he reserves
- the right to ignore anonymous messages because, "If you have
- something real to say, why do you want to hide? And if you want
- to hide, it makes me wonder why."
-
- Most non-computer-scientists skipped the next panel discussion,
- "Standards for Certifying Computer Professionals." However, among
- computer scientists, the panel was quite controversial. Professor
- Donald Gotterbarn explained that both ACM and IEEE are considering
- licensing proposals. He discussed one proposal that would impose
- mandatory licensing on computer professionals. The proposal called
- for various levels of licensing, based on skill and areas of
- competence. Attorney Steve Barber explained some of the problems with
- a licensing model, including the fact that licensing is usually
- handled by the states and thus varies from state to state. John
- Marciniak of CTA Inc. stated that the computer industry does not need
- licensing because the companies, not the programmers, stand behind their
- products. He suggested that a voluntary certification program be
- considered instead. Another panelist (whose name was not in the
- program) insisted that "when a B777 [a plane with completely
- computerized controls] goes down, we will have licensing." He
- suggested that computer professionals come to a consensus about what
- kind of licensing they want so that they can tell congress when
- congress demands licensing. Gotterbarn urged people interested in
- working on a licensing proposal to contact him at d.gotterbarn@computer.org.
-
- The final panel of the day, "Hackers and Crackers: Using and Abusing
- the Networks," was led by Emmanuel Goldstein, publisher of 2600
- magazine. Goldstein hung a sign reading "hackers" on the table where
- the four other panelists sat. He hung a sign reading "crackers" on an
- empty table at the opposite side of the podium. "One thing that
- distinguishes hackers from crackers is that hackers are here and
- crackers are not," said Goldstein. After rattling off several other
- differences he looked under the empty table and retrieved three boxes
- of crackers (the edible kind). "Alright I stand corrected," he
- quipped. As Goldstein spoke admiringly about hackers and their quest
- for knowledge, several audience members were mumbling that they didn't
- understand. Goldstein then unveiled a large photograph of hacker
- Phiber Optik and played a taped message that Phiber recorded from
- prison. Panelist Bruce Fancher of Mindvox said he used to think there
- was no problem with breaking into other peoples' computer systems. "I
- think my opinion changed when I started running a public access
- Internet site....[I discovered that a breakin] wasn't that
- charming." He encouraged hackers to explore and learn about computer
- systems, but urged them not to break into other peoples' systems.
- Panelist Robert Steele described hacking as "elegance." He explained,
- "Hacking is doing it better than it has ever been done before," no
- matter what "it" is. He added that hackers should not be blamed for
- breaking into systems because most systems are wide open to attack.
- "Ethics is nice. Engineering is better," he stated. Panelist Bob
- Strantton of UUNET discussed the need for an electronic "place" people
- can go to learn things without disrupting the work of others. During
- the Q&A session Goldstein illustrated how unsecure computer and
- telecommunication systems are by picking up a cellular phone call on a
- hand-held scanner, much to the amazement of some audience members.
-
- The day's program concluded with a dinner reception at Chicago's
- Museum of Science and Industry. The food was tasty (finally a decent
- meal) and the museum exhibits were both educational and enjoyable.
-
- The final day of the conference began with a 9 a.m. panel on "The Role
- of Libraries on the Information Superhighway." Carl Kadie, editor of
- Computers and Academic Freedom News, described several cases in which
- he had turned to library policies when recommending solutions to
- computers and academic freedom problems. Kadie explained that
- libraries have adopted policies that protect free speech and free
- access to information. Next Bernard Margolis, director of Pikes Peak
- Library District discussed the roles of libraries on the information
- superhighway, describing libraries as on ramps, filling stations, and
- driver training schools. He also noted that as electronic resources
- have been added to the Pikes Peak libraries, the demand for
- traditional resources has not decreased. Elaine Albright of the
- University of Maine library described some of the issues related to
- electronic information delivery currently being discussed by
- librarians. A pamphlet discussing these issues is available from the
- American Library Association by contacting u58552@uicvm.uic.edu.
-
- The next panel, "International Governance of Cyberspace: New Wine in
- Old Bottles -- Or is it Time for New Bottles?" was another discussion
- for the lawyers in attendance. I got lost in the legal jargon as
- panelist discussed whether cyberspace has sovereignty and what sort
- of laws could be practically enforced there. Panelist Herbert Burkett
- described the net as "the greatest threat to national sovereignty
- since the opening of the first McDonalds in Paris." In the Q&A period,
- cypherpunk Eric Hughes put the whole conversation in perspective (for me
- at least) when, referring to people who use cryptography to hide their
- identities, he asked "How is national sovereignty going to have
- any effect if you can't find us?"
-
- The final conference lunch featured more squash and short
- presentations from three of the student paper competition winners (the
- fourth winner, a student from the computers and society course I
- taught last semester, was not able to attend the conference).
-
- The first panel after lunch discussed "The Electronic Republic:
- Delivery of Government Services over the Information Superhighway."
- This was an interesting, but relatively low bandwidth session about
- how governments can use information technology to collect and
- disseminate information. Panelists from information "kiosk" vendors
- had nothing but praise for pilot projects in several states. However,
- Jeff Arnold of the Cook County circuit court raised a number of
- concerns about allowing the public to access computerized court
- records. In particular he was concerned about people who want to use
- court records to generate advertising mailing lists (a list of recent
- divorcees or traffic offenders for example) and liability for
- incorrect information.
-
- The next panel, "Education and NREN, K-12" was quite interesting, but
- not well attended. (By this time most conference participants were
- networking in the hallway outside the main conference room.) The
- panelists generally agreed that most schools are organized in a way
- that is not reflected in the organization of the Internet. Panelist
- Steve Hodas explained that schools are usually organized into tidy
- departments and that information flows mostly in one direction (from
- book to student). In addition schools generally regard the absence of
- censorship as a system failure. The Internet, on the other hand, is
- not tidy, allows a two-way flow of information, and views censorship
- as a system failure. Hodas warned, as people rush in to protect schools
- from the net, "we must remember to protect the net from the schools."
- Panelist Philip Agre added, "American democracy is suffering, in part
- because of educational practices." Janet Murray, a school librarian,
- gave a humorous presentation in which she emphasized the importance of
- freedom of access to information. "If you're worried about what students
- can access on the Internet, think about what else they have access to," she
- said as she displayed slides of racy material found in popular
- news publications.
-
- The final CFP94 session was titled "Guarding the Digital Persona."
- The panelists first discussed the problem of too much personal
- information finding its way into the hands of direct marketers.
- Possible solutions discussed included requiring yellow-page style
- advertising and creating a new legal fiction -- an electronic person
- with the right to own money, communicate electronically, and not be
- arbitrarily deleted. The legal fiction suggestion was motivated by
- the idea that it would be impossible to create useful profiles of
- people if all the information about them was compartmentalized and
- each compartment had a separate identity. This idea seemed to be
- bordering on science fiction, and thus the final speaker, science
- fiction writer Bruce Sterling, seemed an appropriate choice to bat
- cleanup.
-
- I had considered writing an abstract for this lengthy report, but I
- don't think I could do as good a job as Sterling did in his remarks.
- I have read some of Sterling's books, but this was the first time I
- have heard him speak. I must say, the man can speak as well as he
- writes, and he writes pretty darned well. Sterling began his talk by
- stating his general lack of concern about privacy. "Being afraid of
- monolithic organizations, especially when they have computers, is like
- being afraid of really big gorillas, especially when they are on
- fire," he explained. "How can privacy abuses be kept a secret?" He
- then proceeded to describe what he will remember about CFP94. He
- characterized this conference (the fourth CFP) as "the darkest CFP by
- far." Referring to the administration's proposed encryption policy he
- stated, "I see nothing but confrontation ahead." Sterling reminded
- the audience of David Lytel's unsettling key note address ("Who was
- briefing that guy?") and Stewart Baker and the seven myths that the
- NSA wants you to believe are not true ("a tone of intolerable
- arrogance"). And he mentioned Dorothy Denning, one of the few Clipper
- supporters in the computer science community. Denning was not in
- attendance this year, but she was worth mentioning because she was
- certainly present in spirit. Read the talk yourself if you see it
- posted on the net.
-
- I think Sterling identified what was on the minds of most conference
- attendees. While some attendees were extremely concerned about their
- privacy, most had never really considered that they had anything to
- hide, or even anything that anyone else really wanted to know. And
- yet, almost everyone was bothered by the Clipper proposal and the fact
- that it would treat them as if they had something to hide. Last
- year's conference was much more animated and controversial. People
- were constantly complaining that there wasn't enough time for all
- views to be heard. This year there was much more harmony; but it
- was a dark harmony. The disagreements among panelists seemed
- relatively insignificant when compared to the disagreement between
- the people and their government.
-
- Epilogue: As I rode the train out to the airport, I noticed an
- advertisement for the Chicago Sun-Times "Social Security Sweepstakes."
- It seems the Sun-Times is asking people to send in their names and
- social security numbers for a chance to win a trip to Hawaii. Is this
- informed consent?
-
- -- Lorrie Faith Cranor
- March 27, 1994
-
- ------------------------------
-
- End of Computer Underground Digest #6.29
- ************************************
-
-
-