home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Tue July 12, 1994 Volume 6 : Issue 63
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Archivist: Brendan Kehoe
- Retiring Shadow Archivist: Stanton McCandlish
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Copper Ionizer: Ephram Shrustleau
-
- CONTENTS, #6.63 (Tue, July 12, 1994)
-
- File 1--2600 FOIA Decision
- File 2--Draft Motion in response to Am. Action BBS Judge
- File 3--Steve Jackson Games case - comments/update
- File 4--White House Pays off in potential patent infringement
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send a one-line message: SUB CUDIGEST your name
- Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
- In ITALY: Bits against the Empire BBS: +39-461-980493
-
- UNITED STATES: etext.archive.umich.edu (141.211.164.18) in /pub/CuD/
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
- JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: Mon, 11 Jul 1994 15:12:15 EST
- From: David Sobel <dsobel@WASHOFC.EPIC.ORG>
- Subject: File 1--2600 FOIA Decision
-
- 2600 FOIA Decision
-
- A federal judge in Washington, DC has ordered the release of
- Secret Service documents concerning the November 1992 raid on a
- meeting of 2600 Magazine readers at a shopping mall in Virginia.
- The documents were the subject of a Freedom of Information Act
- lawsuit filed by Computer Professionals for Social Responsibility
- (CPSR). The case is being litigated by the Electronic Privacy
- Information Center (EPIC), a joint project of CPSR and the Fund
- for Constitutional Government.
-
- The FOIA case has confirmed the involvement of the Secret Service
- in the incident, in which numerous individuals were detained,
- searched and ordered to identify themselves even though no search
- warrant was presented. The detentions and searches were conducted
- by Arlington County Police and mall security officers. Meeting
- participants believe that these actions were undertaken at the
- behest of the Secret Service, which has never publicly explained
- its role in the incident.
-
- Judge Louis F. Oberdorfer's decision and order are re-printed
- below.
-
-
- David L. Sobel
- Legal Counsel
- Electronic Privacy Information Center
- <dsobel@epic.org>
-
-
- ================================================================
-
-
- UNITED STATES DISTRICT COURT
- FOR THE DISTRICT OF COLUMBIA
-
-
-
- COMPUTER PROFESSIONALS FOR )
- SOCIAL RESPONSIBILITY, )
- )
- Plaintiff, )
- )
- v. ) Civil Action No. 93-0231-LFO
- )
- UNITED STATES SECRET SERVICE, )
- )
- Defendant. )
- _________________________________)
-
- MEMORANDUM
-
- Plaintiff brought this action under the Freedom of
- Information Act, 5 U.S.C. Sec. 552 et seq., to obtain any
- documents in defendant's possession relating to the breakup of a
- meeting of computer enthusiasts that took place on November 6,
- 1992 at the Pentagon City mall in Arlington, Virginia. The
- attendees, apparently affiliated with a computer magazine called
- 2600 and referred to in media accounts of the incident as computer
- "hackers," were dispersed shortly after their arrival by Arlington
- County Police and mall security officers.[1] According to
- plaintiff, the officers took names of attendees and confiscated
- some of their personal property before ordering them to leave the
- mall. Plaintiff also avers that an agent or agents of defendant
- participated in the incident.
-
- Plaintiff submitted its FOIA request to defendant on November
- 10, 1992. Several months later, defendant released to plaintiff
-
- ------------------------
-
- [1] See "Hackers Allege Harassment at Mall," Wash. Post ,
- Nov. 12, 1992, at A9.
-
-
-
- several newspaper articles about the incident. Defendant informed
- plaintiff that it was withholding two additional responsive
- documents pursuant to FOIA exemptions 7 (A), (C), and (D). The
- parties filed cross-motions for summary judgment. During the
- pendency of these motions, defendant discovered six additional
- responsive documents in its Washington, D.C. field office.
- Defendant submitted a supplementary declaration and memorandum in
- which it stated that it would withhold the six new documents under
- the same three FOIA exemptions claimed for the two earlier
- documents. Defendant subsequently filed an additional declaration
- _in camera_. Plaintiff has moved to strike defendant's _in
- camera_ submission.
-
- I.
-
- Plaintiff objects to defendant's _in camera_ submission on
- the ground that permitting such submissions in FOIA actions
- undermines the adversarial structure of Vaughn v. Rosen, 484 F.2d
- 820 (D.C. Cir. 1973), cert. denied, 415 U.S. 977 (1974), by
- preventing the plaintiff from expressing its views as to the
- government's reasons for withholding documents. See Yeager v.
- DEA, 678 F.2d 315, 324-25 (D.C. Cir. 1982). As plaintiff
- contends, _in camera_ submissions should only be permitted in
- those instances where they are "absolutely necessary" to resolve
- the case. Id. This is such an instance. Defendant has made a
- thorough effort to explain as much of its case as possible in its
- public filings. However, the confidential nature of the criminal
- investigation underlying
-
- (2)
-
-
-
- defendant's withholding of documents makes _in camera_ review the
- exclusive means of weighing specific aspects of defendant's
- claims. Accordingly, plaintiff's motion to strike defendant's _in
- camera_ submission will be denied, and that submission will be
- considered in ruling on the parties' cross-motions for summary
- judgment.
-
- II.
-
- FOIA exemption 7 permits the withholding of several
- categories of "records or information compiled for law enforcement
- purposes." 5 U.S.C. Sec. 552(b)(7). Initially, plaintiff argues
- that defendant has categorically failed to satisfy the threshold
- requirement for invoking exemption 7 because defendant has failed
- to demonstrate that the information at issue relates to a criminal
- investigation.
-
- Defendant's public declarations specify the nature of the
- underlying criminal investigation, and its _in camera_ submission
- discusses that investigation with even greater specificity. This
- is a case to which exemption 7 might properly be applied.
- Defendant has withheld documents based on three provisions of that
- exemption.
-
- A.
-
- FOIA exemption 7(C) permits the withholding of information
- that "could reasonably be expected to constitute an unwarranted
- invasion of personal privacy." 5 U.S.C. Sec. 552 (b)(7)(C).
- Defendant argues that exemption 7(C) applies in this case because
- of "the 'strong interest' of individuals, whether they be
- suspects, witnesses, or investigators, 'in not being associated
- unwarrantedly
-
- (3)
-
-
-
- with alleged criminal activity.'" Dunkelberger v. Department of
- Justice, 906 F.2d 779, 781 (D.C. Cir. 1990) (citation omitted).
-
- The cases defendant cites in support its exemption 7(C) claim
- generally involve persons whose connection with a criminal file
- could embarrass or endanger them -- for example, persons
- investigated but not charged in criminal matters. See, e.g., Fund
- for Constitutional Government v. National Archives and Records
- Service, 656 F.2d 856, 861-66 (D.C. Cir. 1981). Defendant has not
- suggested that the meeting at issue here is the object of any
- criminal investigation. The incident occurred in plain view of
- the patrons of a busy shopping mall. The mere fact that defendant
- has maintained materials relating to the incident in connection
- with a criminal investigation does not mark participants in the
- meeting with the "stigma" of being associated with a criminal
- investigation, which defendant identifies as the gravamen of its
- 7(C) claim. Indeed, several participants in the meeting have
- executed privacy waivers in connection with a later FOIA request
- from defendant, which suggests that they do not perceive release
- of the material defendant is withholding as a threat to their
- privacy interests. Exemption 7(C) is not an appropriate basis for
- withholding responsive documents in this case.
-
- B.
-
- Defendant next invokes FOIA exemption 7(D), which permits the
- withholding of documents that "could reasonably be expected to
- disclose the identity of a confidential source ... and ...
- information furnished by a confidential source." 5 U.S.C. Sec.
-
- (4)
-
-
-
- 552(b)(7)(D). To support its claim of this exemption, defendant
- initially cited the law of this Circuit that "in the absence of
- evidence to the contrary, promises of confidentiality are
- 'inherently implicit' when the FBI solicits information." Keys v.
- Department of Justice, 830 F.2d 337, 345 (D.C. Cir. 1987)
- (citations omitted). However, during the pendency of this motion,
- the Supreme Court in Department of Justice v. Landano, 113 S.Ct.
- 2014 (1993), eliminated the Keys presumption. The Court held that
- exemption 7(D) only applies where there is an actual promise of
- confidentiality, or circumstances from which such a promise may be
- inferred -- for example, a type of crime that makes recriminations
- against sources likely. Id. at 2023. After Landano, which
- defendant concedes governs the exemption 7(D) claim in this case,
- defendant's sole basis for applying exemption 7(D) is a statement
- in its supplemental memorandum that defendant "recently contacted"
- the source, which told defendant that the source understood the
- information to have been provided on a confidential basis.
- Supplemental Declaration of Melvin E. Laska (June 18, 1993) at
- para. 49. Such a post hoc rationalization is inadequate. At no
- time has defendant offered any evidence of an express or implied
- promise of confidentiality at the time the source provided the
- information. Thus, defendant's exemption 7(D) claim does not
- survive Landano.
-
- C.
-
- Defendant's strongest claim for withholding certain responsive
- documents is based on FOIA exemption 7(A) That exemption permits
-
- (5)
-
-
-
- an agency to withhold responsive documents that "could reasonably
- be expected to interfere with law enforcement proceedings." 5
- U.S.C. Sec. 552(b)(7)(A). Defendant has represented that it is
- maintaining the withheld documents as part of a particular,
- ongoing criminal investigation. It has elaborated on this
- representation in its _in camera_ submission. Withholding of
- documents is appropriate under exemption 7(A) if release of the
- documents would interfere with the ongoing investigation in any of
- the ways defendant enumerates: by alerting individuals that they
- are under investigation, thus allowing them to alter their
- behavior; by exposing or chilling the participation of informants
- or witnesses; or by providing premature access to the government's
- strategy or the nature, focus, and limits of its case. See
- generally NLRB v. Robbins Tire & Rubber Co., 437 U.S. 214, 239-241
- (1978).
-
- Defendant, however, has failed to demonstrate that the
- release of each of the documents it has withheld would interfere
- with the ongoing investigation in any of these ways. Defendant's
- public filings state that the investigation involves allegations
- made by, a private corporation of telephone fraud. See
- Defendant's Supplemental Memorandum of Points and Authorities in
- Support of Defendant's Motion for Summary Judgment (June 25, 1993)
- at 3. Thus, defendant cannot fear the possibility that release of
- the withheld documents might reveal defendant's involvement in
- this type of investigation. Similarly, the fact that the
- documents at issue are responsive to plaintiff's FOIA request
- indicates that those documents concern the breakup of the November
- 6, 1992 meeting
-
- (6)
-
-
-
- at Pentagon City. Thus, defendant cannot claim exemption 7(A) to
- withhold documents based on the possibility that the documents
- would reveal that investigators were interested in that meeting.
- The only documents at issue that defendant might properly withhold
- under exemption 7(A) would fall into one of the following three
- categories: information identifying the individual(s) under
- investigation and stating that they are under investigation;
- information identifying any witness(es) or informant(s) of the
- activity under criminal investigation and stating that they are
- witnesses or informants; and information revealing the particular
- strategy or parameters of the criminal investigation, such as the
- name of the corporation complaining of telephone fraud, the dates
- of the suspected criminal activity, or any conclusions defendant's
- agents have drawn in connection with the investigation. Beyond
- information in these specific categories, defendant has failed to
- explain how release of any withheld documents would interfere with
- any ongoing criminal investigation. Accordingly, the accompanying
- Order instructs defendant to redact from the withheld documents
- information that falls into the three specific categories
- described in this paragraph and to release the redacted documents
- to plaintiff.
-
-
-
-
-
- Date: July 1, 1994 /sig/
-
- Louis F. Oberdorfer
- UNITED STATES DISTRICT JUDGE
-
-
- (7)
-
-
-
- ------------------------------------------------------------------
-
-
-
- UNITED STATES DISTRICT COURT
- FOR THE DISTRICT OF COLUMBIA
-
-
-
- COMPUTER PROFESSIONALS FOR )
- SOCIAL RESPONSIBILITY, )
- )
- Plaintiff, )
- )
- v. ) Civil Action No. 93-0231-LFO
- )
- UNITED STATES SECRET SERVICE, )
- )
- Defendant. )
- _________________________________)
-
- ORDER
-
- For the reasons stated in the accompanying Memorandum, it is
- this 1st day of July 1994, hereby
-
- ORDERED: that plaintiff's motion to strike defendant's _in
- camera_ submission should be, and is hereby, DENIED; and it is
- further
-
- ORDERED: that defendant's motion for summary judgment should
- be, and is hereby, GRANTED in part with respect to FOIA exemption
- 7(A); and it is further
-
- ORDERED: that plaintiff's cross-motion for summary judgment
- should be, and is hereby, GRANTED with respect to FOIA exemptions
- 7(C) and (D) and is GRANTED in part with respect to FOIA exemption
- 7(A); and it is further
-
- ORDERED: that defendant shall redact from the withheld
- documents information that falls into the three specific
- categories described in the accompanying Memorandum and shall
- release the redacted documents to plaintiff.
-
-
-
-
-
- /sig/
-
- Louis F. Oberdorfer
- UNITED STATES DISTRICT JUDGE
-
- ------------------------------
-
- Date: Sat, 9 Jul 94 22:53:05 PDT
- From: hkhenson@CUP.PORTAL.COM
- Subject: File 2--Draft Motion in response to Am. Action BBS Judge
-
- DRAFT MOTION
-
- (Note this is not a motion, but an early draft by a non-lawyer --
- -me- about one aspect of the AA BBS case. I have been very
- concerned with what I have found about the performance of the
- courts. It has turned out to be a lot worse than I thought.
- Keith Henson)
-
- On July 8, 1994 Judge Julia Smith-Gibbons, United States District
- Court for the Western District of Tennessee in Memphis TN,
- verbally ruled that defendant's motion to dismiss (improper venue
- based on the North American Free Trade Agreement and others) was
- denied. Her words were that her order denying the motion was "in
- the typewriter." Defendants and defendant's attorney expect (on
- the basis of her previous judicial conduct) to be handed the
- written order at the time of trial, precluding any interlocutory
- appellate remedies.
-
- Defendants Robert and Carleen Thomas are therefore forced to
- appeal Judge Gibbon's ruling without an order reduced to writing
- and signed by the court. However, her verbal ruling is "final"
- with respect to this issue.
-
- If this interlocutory appeal were delayed until after trial the
- Thomases' would be irreparably harmed, even if acquitted. Not
- only would they lose the cost of trial, which could not be
- recovered civilly, but they would have to shutdown their business
- as it requires part time physical presence. (Trial in this area
- would not be as onerous in that the business could continue to be
- operated with a few hours attention each night.)
-
- These motions are being filed in both the Sixth and Ninth Cir-
- cuits because the underlying case involves an *assault* on the
- authority of the Circuit Courts, and therefore upon the entire
- court system. When the Courts lose their capacity to function
- normally it is termed insurrection. The case at hand may be
- close to this state.
-
- As is made clear by attached documents, a *district* court in the
- Sixth Circuit is attempting to enforce authority over persons and
- property in the Ninth Circuit on the basis of a manufactured
- "crime".
-
- The gross inequity performed by law enforcement agents in
- manufacturing the child pornography charge could be proved at
- trial, but the *law* on which the "crime" is based (Title 18,
- Section 2252 of the Federal Code) has been ruled "unconstitutio-
- nal on its face" in the Ninth Circuit (US vs X-citement Video,
- Inc., 982 Federal Reporter Second Edition, page 1285, Dec. 16,
- 1992). At the time of the search of the Thomas's home and
- business, (January 10, 1994) this statute *could not* be used to
- prosecute *any* person in the Ninth Circuit because it is an
- unconstitutional law, and unenforceable. (Judge Gibbons was
- notified on June 22, 1994 of these facts.)
-
- On January 26, 1994 a Federal Grand Jury in Memphis Tennessee
- returned an indictment against Robert Thomas citing section 2252,
- a section which *could not be applied* by any Ninth Circuit
- District Court to a citizen in that circuit or any other Circuit.
- (There were other sections cited including section xxx calling
- for forfeiture of their home, bank accounts, cars, and tens of
- thousands of dollars of computer hardware to the Tennessee
- authorities.)
-
- The effect--if a district court in one section of the country is
- allowed to charge citizens on laws ruled unconstitutional in the
- Circuit where they live--is to completely undermine the authority
- of all the Circuit courts in the country. This case is about
- liberty and property, but taken to the extreme, a person could be
- removed from his home by a District Court operating in another
- part of the country and executed.
-
- This appeal is about nothing less than the authority of *any*
- Federal court to protect the life, liberty and property of any
- citizen of the United States.
-
- If this appeal is not granted, it will show that the Circuit
- courts can ignore another Circuit's laws and do anything they
- want with a citizen's life, liberty and property. It will show
- that the Circuit courts do not have the authority to protect
- life, liberty, or property for the people within their circuit,
- and ultimately will undermine the courts ability to protect any
- inhabitant of the United States.
- (Net.folks--please comment!)
-
- ------------------------------
-
- Date: Thu, 8 Jul 1994 22:50:18 PDT
- From: George, Donaldson & Ford <gdf@well.sf.ca.us>
- Subject: File 3--Steve Jackson Games case - comments/update
-
- Source: LEGAL BYTES, Spring 1994, Volume 2, Number 1
- gdf@well.sf.ca.us
- ___________________________________
-
- Copyright (c) 1994 George, Donaldson & Ford, L.L.P.
- (Permission is granted freely to redistribute
- this newsletter in its entirety electronically.)
-
- ======================================================================
- STEVE JACKSON GAMES v. UNITED STATES SECRET SERVICE:
- GOVERNMENT DROPS ITS APPEAL; PLAINTIFFS PRESS FORWARD ON
- "INTERCEPTION" ISSUE
-
- Earlier issues of LEGAL BYTES reported on the lawsuit brought by
- the Austin, Texas role-playing game publisher, Steve Jackson Games,
- against the U.S. Secret Service for violating the company's civil
- rights and the privacy rights of its electronic bulletin board
- system's users. Armed with bare suspicion and a search warrant based
- on largely inaccurate information, the Secret Service on March 1, 1990
- raided the company's offices, seizing its BBS and two other computers,
- hundreds of floppies, drafts of a soon-to-be released game book, and
- volumes of other computer records and documents. No one was ever
- arrested or charged, but the Secret Service kept the BBS and other
- materials for almost four months.
-
- Three years later, the Secret Service found itself in federal
- court, not prosecuting anyone at Steve Jackson Games, but instead
- trying to defend its raid against a civil lawsuit brought by the
- company, its owner Steve Jackson, and three outside users of the
- company's BBS (represented by the lawfirm publishing this newsletter).
- After a three-day trial, Judge Sam Sparks held that the Secret
- Service's seizure of the draft game books and the BBS violated the
- Privacy Protection Act of 1980, and that its seizure, without probable
- cause, of the BBS e-mail violated a provision of the Electronic
- Communications Privacy Act of 1986, 18 U.S.C. Section 2703. The
- Secret Service was ordered to pay $1,000 to each of the users of the
- BBS, and over $50,000 to Steve Jackson Games to compensate for damaged
- equipment and lost sales. The government also agreed to reimburse
- over $250,000 in costs and attorneys' fees incurred by the company in
- bringing the lawsuit.
-
- The Secret Service initially gave notice of its intent to appeal
- the judgment, but by January, 1994, had changed its mind. The appeal
- was dismissed, and the government has now paid a total of over
- $300,000 to the Plaintiffs. This is the first and only known recovery
- of money from the federal government for violating the civil liberties
- and privacy of computer users.
-
- The Plaintiffs' victory was not complete, however. Judge Sparks
- rejected their argument that the Secret Service had violated yet
- *another* law when it seized the BBS -- the Wiretap Act, as amended by
- the Electronic Communications Privacy Act of 1986 (the "ECPA").
- Congress expanded the Wiretap Act in 1986 to include protection for
- all types of electronic communications, including electronic mail and
- private bulletin board communications. The Wiretap Act prohibits
- interception of electronic communications without a court order, a
- greater burden than obtaining a simple search warrant from a federal
- or local magistrate or judge.
-
- When the Secret Service seized the Steve Jackson Games BBS, it
- contained undelivered electronic mail -- that is, mail written by a
- user and addressed to another user, but not yet read by the intended
- recipient. When the Secret Service seized the BBS, and then later
- read and deleted all the e-mail on that BBS, this mail lost its
- privacy, and was prevented from being delivered.
-
- The government argued that the seizure of mail in transit was not
- an "interception" under the Wiretap Act because the e-mail was
- temporarily stored on the hard drive of the computer. Judge Sparks
- agreed, although the Plaintiffs argued that walking off with mail in
- transit and preventing it from being delivered sure *seems* like an
- interception. Judge Sparks' decision has in effect added an
- additional requirement to the definition of interception -- that an
- "interception" must be *contemporaneous* to its transmission, and
- therefore the seizure of a storage device can never qualify as an
- interception.
-
- The word "contemporaneous" does not appear in the Wiretap Act and
- the Plaintiffs have argued that the legislative history of the
- Electronic Communications Privacy Act, as well as the language and
- logic of the act, indicates that seizures of BBSs that include
- undelivered e-mail are "interceptions" of such communications
- requiring court orders.
-
- The government has responded by arguing that the ECPA establishes
- two separate, airtight compartments -- one for "stored" electronic
- communications resident on hard drives, no matter how temporarily, and
- communications that are in-transit, that is, where the electrons are
- moving from computer to computer. Under the government's theory, BBS
- or Internet e-mail changes legal status, and therefore the level of
- protection, as it moves from computer to computer on its way to its
- destination.
-
- This issue remains important despite Judge Sparks' other ruling
- that the Secret Service's seizure of *all* the e-mail violated another
- provision of the Electronic Communications Privacy Act. At least some
- law enforcement agencies appear to be interpreting Judge Sparks'
- decision as a "go ahead and seize, but don't read or delete, and try
- to return promptly" rule; that is, that the law permits them to seize
- electronic mail without probable cause, as long as they do not read or
- delete it. Although this is not an accurate reading of Judge Sparks's
- ruling, a clear decision that the seizure of in-transit e-mail would
- unambiguously protect not just the *privacy* of e-mail, but would
- protect the *delivery* of the mail as well. Other methods, including
- subpoenas and making on-site duplicates, can preserve the government's
- need for information when legitimate and supported by probable cause.
-
- Further, the ruling exhibits a static application of the statute
- to technology, not intended by Congress when the ECPA was enacted.
- The Plaintiffs have pressed forward with their appeal in order to
- establish better protection for electronic communication privacy. The
- government and law must come to grips with the proliferation of
- privately owned and operated communications systems. While
- single-line dial-up BBSs are now relatively primitive, there are
- countless thousands of them. The large commercial services such as
- CompuServe and America Online are growing at fantastic rates; Steve
- Jackson Games' own BBS has become a commercial Internet machine with a
- T-1 line and over a dozen dial-up connections, providing ftp, telnet,
- newsgroup and e-mail services. It is not unreasonable to ask the
- government to give new means of communications the same respect as it
- has long granted telephone calls. With the much-vaunted information
- superhighway coming, the government will face these problems anyway.
- Private communications increasingly will travel over privately owned,
- small, decentralized service providers, and the government cannot
- continue to argue that the difference in technology (or size) warrants
- lower protection under the law.
-
- ------------------------------
-
- Date: Mon, 11 Jul 1994 14:53:56 -0700
- From: "Brock N. Meeks" <brock@well.sf.ca.us
- Subject: File 4--White House Pays off in potential patent infringement
-
- CyberWire Dispatch // Copyright (c) 1994 // July 11 //
-
- Jacking in from the "Blank Check" Port:
-
- Washington, DC -- The Administration will today announce it has
- sidestepped the threat of patent infringement lawsuit involving its
- Escrow Encryption System, commonly known as Clipper. The solution:
- Toss the original patent holder a blank check and buy him off.
-
- The National Institute of Standards and Technology (NIST), the agency
- walking point for the White House on its proposed encryption Clipper
- encryption standard, has agreed in principle to license two key
- patents relating to the technical workings of the key escrow system
- from patent holder Silvio Macali, an MIT professor.
-
- The government's key escrow system depends on the capturing of digital
- "keys" that allow authorized law enforcement officials to unscramble
- Clipper encoded speech or Capstone encoded data, including electronic
- mail. Macali, as it now turns out, thought up the idea and had the
- moxy to patent his scheme. Macali's inventions detail the process
- whereby a digital key is divided into pieces. Those pieces are then
- held by separate "key escrow agents" which now turn out to be hand
- picked government agencies; one is NIST the other a division of the
- Treasury Department. Those keys must be combined to successfully
- unlock the code that allows law enforcement officials to listen in.
-
- The license agreement effectively eliminates "concerns Macali raised
- about possible infringement of his patents," said NIST spokeswoman,
- Anne Enright Shepherd. It also sidesteps a potentially ugly lawsuit
- in which Macali lawyers could have uncovered all sorts of currently
- unknown information about the Clipper program.
-
- According to sources familiar with the negotiations, the government's
- agreement with Macali grants the Administration a nonexclusive license
- to the patents for use in current implementations of Clipper and
- Capstone and for future implementations, Shepherd said.
-
- It's not known whether the government will make a single payment to
- Macali or pay royalties. "The procurement phase of the agreement is
- still continuing," Shepherd said. Disclosure of the amount paid to
- Macali and details of the license agreement are expected to be made
- public sometime early next month, she said. That agreement, however,
- wont result in any user fees, Shepherd said.
-
- Questions Raised
- ================
-
- Although the government's action today nullifies a pesky problem, it
- also continues to raise serious questions about the Administration's
- -- and more pointedly -- about the National Security Agency's ability
- to ramrod an encryption policy that has been elevated to the status of
- a national security issue.
-
- Surely the NSA or NIST can dial up the U.S. Patent Office and query
- its database, looking for patent conflicts. Apparently the clock and
- dagger crowd was too busy with other matters. Arrogance or oversight?
-
- "Macali made the existence of his patents known during the public comment
- period," Shepherd said. "He let the government know he had some patents
- that he felt were similar to some technology used by the key escrow system.
- So the discussions kind of began at that point," she said.
-
- Unfortunately, the "public comment" period was launched only after the
- White House trotted out its Clipper policy as set in stone. Nobody
- expected Macali to piss the parade.
-
- Privacy and civil liberties groups have roundly criticized the
- government for developing Clipper in secrecy, not allowing public
- debate on the issue. If that debate had taken place, Macali would
- have come forward years ago.
-
- Despite the Administration's continued efforts to push Clipper into
- the deep waters of the mass market, there are rumblings that it may
- not be christened after all. At very least, it may not be the only
- encryption standard blessed by the government.
-
- Several groups are now floating their own alternatives to the Clipper
- program. And although the National Security Agency is working behind
- the scenes to sink such efforts, NIST, at least, is making the
- appearance of listening.
-
- Earlier this year, NIST put out a call for the Cooperative Research
- and Development Agreement (CREDA), which was an effort to draw
- publicly interested parties into a cooperative venture to develop a
- key escrow alternative.
-
- Those that came forward have now thrown off working formally with
- CREDA, but have instead formed their own working group, government
- sources said. Those efforts are being heard and taken seriously,
- according to several government sources familiar with the discussions.
- "Encryption isn't a front page issue, but those [inside the
- Administration] working on this issue are tired of being beat up over
- it," said a White House official.
-
- Discussions on Clipper alternatives "are continuing," Shepherd said.
- "And we're still open to other alternative ideas and we're working
- with the people who have presented their own ideas at this point."
-
- Meeks out...
-
- ------------------------------
-
- End of Computer Underground Digest #6.63
- ************************************
-
-
-