home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Sun July 24, 1994 Volume 6 : Issue 67
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Archivist: Brendan Kehoe
- Retiring Shadow Archivist: Stanton McCandlish
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Copper Ionizer: Ephram Shrustleau
-
- CONTENTS, #6.67 (Sun, July 24, 1994)
-
- File 1--White House retreats on Clipper
- File 2--EPIC Alert 1.04 (Gore on Clipper)
- File 3--HR 3937 now a dead end; House Rules Comm results
- File 4--Sen. Leahy on Clipper
- File 5--Summary of Amateur Action BBS Trial (Days 1-3)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send a one-line message: SUB CUDIGEST your name
- Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
- In ITALY: Bits against the Empire BBS: +39-461-980493
-
- UNITED STATES: etext.archive.umich.edu (141.211.164.18) in /pub/CuD/
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
- JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: Thu, 21 Jul 1994 14:03:10 -0400 (EDT)
- From: Stanton McCandlish <mech@EFF.ORG>
- Subject: File 1--White House retreats on Clipper
-
- Yesterday, the Clinton Administration announced that it is taking several
- large, quick steps back in its efforts to push EES or Clipper
- encryption technology. Vice-President Gore stated in a letter to
- Rep. Maria Cantwell, whose encryption export legislation is today being
- debated on the House floor, that EES is being limited to voice
- communications only.
-
- The EES (Escrowed Encryption Standard using the Skipjack algorithm, and
- including the Clipper and Capstone microchips) is a Federal Information
- Processing Standard (FIPS) designed by the National Security Agency, and
- approved, despite a stunningly high percentage anti-EES public comments on
- the proposal) by the National Institute of Standards and Technology. Since
- the very day of the announcement of Clipper in 1993, public outcry against
- the key "escrow" system has been strong, unwavering and growing rapidly.
-
- What's changed? The most immediate alteration in the White House's
- previously hardline path is an expressed willingness to abandon the EES
- for computer applications (the Capstone chip and Tessera card), and push
- for its deployment only in telephone technology (Clipper). The most
- immediate effect this will have is a reduction in the threat to the
- encryption software market that Skipjack/EES plans posed.
-
- Additionally, Gore's letter indicates that deployment for even the telephone
- application of Clipper has been put off for months of studies, perhaps
- partly in response to a draft bill from Sens. Patrick Leahy and Ernest
- Hollings that would block appropriation for EES development until many
- detailed conditions had been met.
-
- And according to observers such as Brock Meeks (Cyberwire Dispatch) and
- Mark Voorhees (Voorhees Reports/Information Law Alert), even Clipper is
- headed for a fall, due to a variety of factors including failure in
- attempts to get other countries to adopt the scheme, at least one state
- bill banning use of EES for medical records, loss of NSA credibility after
- a flaw in the "escrowed" key system was discovered by Dr. Matt Blaze of
- Bell Labs, a patent infringement lawsuit threat (dealt with by buying off
- the claimant), condemnation of the scheme by a former Canadian Defense
- Minister, world wide opposition to Clipper and the presumptions behind it,
- skeptical back-to-back House and Senate hearings on the details of the
- Administration's plan, and pointed questions from lawmakers regarding
- monopolism and accountability.
-
- One of the most signigicant concessions in the letter is that upcoming
- encryption standards will be "voluntary," unclassified, and exportable,
- according to Gore, who also says there will be no moves to tighten export
- controls.
-
- Though Gore hints at private, rather than governmental, key "escrow," the
- Administration does still maintain that key "escrow" is an important part of
- its future cryptography policy.
-
- EFF would like to extend thanks to all who've participated in our online
- campaigns to sink Clipper. This retreat on the part of the Executive
- Branch is due not just to discussions with Congresspersons, or letters
- from industry leaders, but in large measure to the overwhelming response from
- users of computer-mediated communication - members of virtual communities
- who stand a lot to gain or lose by the outcome of the interrelated
- cryptography debates. Your participation and activism has played a key
- role, if not the key role, in the outcome thus far, and will be vitally
- important to the end game!
-
-
- Below is the public letter sent from VP Gore to Rep. Cantwell.
-
- ******
-
- July 20, 1994
-
- The Honorable Maria Cantwell
- House of Representatives
- Washington, D.C., 20515
-
- Dear Representative Cantwell:
-
- I write to express my sincere appreciation for your efforts to move
- the national debate forward on the issue of information security and export
- controls. I share your strong conviction for the need to develop a
- comprehensive policy regarding encryption, incorporating an export policy
- that does not disadvantage American software companies in world markets
- while preserving our law enforcement and national security goals.
-
- As you know, the Administration disagrees with you on the extent to
- which existing controls are harming U.S. industry in the short run and the
- extent to which their immediate relaxation would affect national security.
- For that reason we have supported a five-month Presidential study. In
- conducting this study, I want to assure you that the Administration will
- use the best available resources of the federal government. This will
- include the active participation of the National Economic Council and the
- Department of Commerce. In addition, consistent with the Senate-passed
- language, the first study will be completed within 150 days of passage of
- the Export Administration Act reauthorization bill, with the second study
- to be completed within one year after the completion of the first. I want
- to personally assure you that we will reassess our existing export controls
- based on the results of these studies. Moreover, all programs with
- encryption that can be exported today will continue to be exportable.
-
- On the other hand, we agree that we need to take action this year
- to assure that over time American companies are able to include information
- security features in their programs in order to maintain their admirable
- international competitiveness. We can achieve this by entering into an new
- phase of cooperation among government, industry representatives and privacy
- advocates with a goal of trying to develop a key escrow encryption system
- that will provide strong encryption, be acceptable to computer users
- worldwide, and address our national needs as well.
-
- Key escrow encryption offers a very effective way to accomplish our
- national goals, That is why the Administration adopted key escrow
- encryption in the "Clipper Chip" to provide very secure encryption for
- telephone communications while preserving the ability for law enforcement
- and national security. But the Clipper Chip is an approved federal
- standard for telephone communications and not for computer networks and
- video networks. For that reason, we are working with industry to
- investigate other technologies for those applications.
-
- The Administration understands the concerns that industry has
- regarding the Clipper Chip. We welcome the opportunity to work with
- industry to design a more versatile, less expensive system. Such a key
- escrow system would be implementable in software, firmware, hardware, or
- any combination thereof, would not rely upon a classified algorithm, would
- be voluntary, and would be exportable. While there are many severe
- challenges to developing such a system, we are committed to a diligent
- effort with industry and academia to create such a system. We welcome your
- offer to assist us in furthering this effort.
-
- We also want to assure users of key escrow encryption products that
- they will not be subject to unauthorized electronic surveillance. As we
- have done with the Clipper Chip, future key escrow systems must contain
- safeguards to provide for key disclosure only under legal authorization and
- should have audit procedures to ensure the integrity of the system. Escrow
- holders should be strictly liable for releasing keys without legal
- authorization.
-
- We also recognize that a new key escrow encryption system must
- permit the use of private-sector key escrow agents as one option. It is
- also possible that as key escrow encryption technology spreads, companies
- may established layered escrowing services for their own products. Having
- a number of escrow agents would give individuals and businesses more
- choices and flexibility in meeting their needs for secure communications.
-
- I assure you the President and I are acutely aware of the need to
- balance economic an privacy needs with law enforcement and national
- security. This is not an easy task, but I think that our approach offers
- the best opportunity to strike an appropriate balance. I am looking
- forward to working with you and others who share our interest in developing
- a comprehensive national policy on encryption. I am convinced that our
- cooperative endeavors will open new creative solutions to this critical
- problem.
-
- Sincerely,
-
- Al Gore
-
- AG/gcs
-
- ------------------------------
-
- Date: Thu, 21 Jul 1994 14:34:24 +0000
- From: Dave Banisar <banisar@EPIC.ORG>
- Subject: File 2--EPIC Alert 1.04 (Gore on Clipper)
-
- A letter from Vice President Al Gore to Representative Maria
- Cantwell (D-WA) sent this week during Congressional debate on the
- Export Administration Act has raised important questions about the
- current state of the Clipper proposal. Some have hailed the statement
- as a major reversal. Others say the letter seals a bad deal.
-
- Below we have included the letter from the Vice President, a
- statement from EPIC, and recommendations for further action.
-
- =======================================================================
- [2] EPIC Statement on Gore Letter to Cantwell
- =======================================================================
-
- News reports that the Clinton Administration has reversed
- itself on encryption policy are not supported by the letter from Vice
- President Gore to Maria Cantwell regarding export control policy. In
- fact, the letter reiterates the White House's commitment to the NSA's
- key escrow proposal and calls on the private sector to develop
- products that will facilitate electronic surveillance.
-
- The letter from the Vice President calls on the government and
- the industry to develop jointly systems for key escrow cryptography.
- Key escrow is the central feature of the Clipper chip and the NSA's
- recommended method for electronic surveillance of digital
- communications.
-
- The letter also reaffirms the Administration's support for
- Clipper Chip as the federal standard for voice networks. There is no
- indication that the White House will withdraw this proposal.
- Statements that Clipper is "dead" are absurd.
-
- The letter offers no changes in export control policy. It
- recommends instead that the status quo be maintained and that more
- studies be conducted. (The White House already completed such a
- study earlier this year. The results were never disclosed to the
- public, despite EPIC's request for release of the findings under the
- Freedom of Information Act.)
-
- This is a significant setback for groups expecting that export
- control laws would be revised this year.
-
- The White House expresses a willingness to allow unclassified
- algorithms and to hold key escrow agents liable for misuse. These are
- the only provisions of the Gore letter favorable to the user
- community. But neither provision would even be necessary if the White
- House did not attempt to regulate cryptography in the first place.
-
- The Administration's willingness to accept private sector
- alternatives to Clipper for data networks essentially ratifies an
- agreement to develop "wiretap ready" technologies for data networks.
-
- We believe the letter from the Vice President is essentially
- a blueprint for electronic surveillance of digital networks. The
- government will set out the requirements for surveillance systems such
- as key escrow, and the industry will build complying systems.
-
- The plan dovetails neatly with the FBI's Digital Telephony
- proposal, which will establish legal penalties for companies and users
- that design systems that cannot be wiretapped.
-
- We do not believe this is in the interests of users of the
- information highway. Key escrow necessarily weakens the security and
- privacy of electronic communications. It makes networks vulnerable to
- tampering and confidential messages subject to compromise. It is the
- approach urged by organizations that specialize in electronic
- eavesdropping. No group of Internet users has ever called for key
- escrow encryption.
-
- If this proposal goes forward, electronic surveillance will
- almost certainly increase, network security will be weakened, and
- people who design strong cryptography without key escrow could become
- criminals. This is not a victory for freedom or privacy.
-
- We support unclassified standards and relaxation of export
- controls. We cannot support the premise that the government and
- industry should design key escrow systems. We also do not believe
- that Clipper is an appropriate standard for federal voice
- communications.
-
- We are asking the Vice President to reconsider his position
- and urging network users to make known their concerns about the
- proposal.
-
- Electronic Privacy Information Center
- Washington, DC
- July 21, 1994
-
-
- =======================================================================
- [3] Letter from Gore to Cantwell
- =======================================================================
-
-
- THE VICE PRESIDENT^KWASHINGTON
-
- July 20, 1994
-
- The Honorable Maria Cantwell House of Representatives Washington, DC
- 20515
-
- "Dear Maria,
-
- "I write today to express my sincere appreciation of your
- efforts to move the national debate forward on the issue of
- information security and export controls. I share your strong
- conviction for the need to develop a comprehensive policy regarding
- encryption, incorporating an export policy that does not disadvantage
- American software companies in world markets while preserving our law
- enforcement and national security goals.
-
- "As you know, the Administration disagrees with you on the
- extent to which existing controls are harming U.S. industry in the
- short run and the extent to which their immediate relaxation would
- affect national security. For that reason we have supported a
- five-month Presidential study. In conducting this study, I want to
- assure you that the Administration will use the best available
- resources of the federal government. This will include the active
- participation of the National Economic Council and the Department of
- Commerce. In addition, consistent with the Senate-passed language,
- the first study will be completed within 150 days of passage of the
- Export Administration Act reauthorization bill, with the second study
- to be completed within one year after the completion of the first. I
- want to personally assure you that we will reassess our existing
- export controls based on the results of these studies. Moreover, all
- programs with encryption that can be exported today will continue to
- be exportable.
-
- "On the other hand, we agree that we need to take action this
- year to ensure that over time American companies are able to include
- information security features in their program in order to maintain
- their international competitiveness. We can achieve this by entering
- into a new phase of cooperation among government, industry
- representatives and privacy advocates with a goal of trying to develop
- a key escrow encryption system that will provide strong encryption, be
- acceptable to computer users worldwide, and address our national
- security needs as well.
-
- "Key escrow encryption offers a very effective way to
- accomplish our mutual goals. That is why the Administration adopted
- the key escrow encryption standard in the "Clipper Chip" to provide
- very secure encryption for telephone communications while preserving
- the ability for law enforcement and national security. But the
- Clipper Chip is an approved federal standard for telephone
- communication and not for computer networks and video networks. For
- that reason, we are working with industry to investigate other
- technologies for these applications.
-
- "The administration understands the concerns that industry has
- regarding the Clipper Chip. We welcome the opportunity to work with
- industry to design a more versatile, less expensive system Such a key
- escrow scheme would be implementable in software, firmware or
- hardware, or any combination thereof, would not rely on a classified
- algorithm, would be voluntary, and would be exportable. While there
- are many severe challenges to developing such a system, we are
- committed to a diligent effort with industry and academics to achieve
- such a system. We welcome your offer to assist us in furthering this
- effort.
-
- "We also want to assure users of key escrow encryption
- products that they will not be subject to unauthorized electronic
- surveillance. As we have done with the Clipper Chip, future key
- escrow schemes must contain safeguards to provide for key disclosure
- only under legal authorization and should have audit procedures to
- ensure the integrity of the system. Escrow holders should be strictly
- liable for releasing keys without legal authorization.
-
- "We also recognize that a new key escrow encryption system
- must permit the use of private-sector key escrow agents as one option.
- It is also possible that as key escrow encryption technology spreads,
- companies may establish layered escrowing services for their own
- products. Having a number of escrow agents would give individuals and
- businesses more choice and flexibility in meeting their needs for
- secure communications.
-
- "I assure you the President and I are acutely aware of the
- need to balance economic and privacy needs with law enforcement and
- national security. This is not an easy task, I think that our
- approach offers the best opportunity to strike an appropriate balance.
- I am looking forward to working with you and others who share our
- interest in developing a comprehensive national policy on encryption.
- I am convinced that our cooperative endeavors will open new creative
- solutions to this critical problems."
-
- Sincerely
- /s/
- Al Gore
-
-
- =======================================================================
- [4] What You Can Do (Email the VP)
- =======================================================================
-
- The Clipper debate has reached a critical juncture. The White House
- and industry are about to seal a deal to make key escrow the standard
- for encrypted communications. If you believe that individuals should
- have the right to make full use of new technologies to protect
- privacy, now is the time for your voice to be heard (and your email to
- be sent).
-
- EMAIL the Vice President at vice.president@whitehouse.gov
-
- - Thank him for the Administration's willingness to reconsider its
- views on Clipper
-
- - Express support for the decision to support unclassified algorithms
- and liability for key escrow agents
-
- - But urge him not to require key escrow as a standard for encryption
- products
-
- - Emphasize that key escrow is the soul of Clipper, the method for
- conducting electronic surveillance of digital communications
-
- - Call for extensive testing and studies before any key escrow system
- is deployed
-
- You should also:
-
- - Urge him to withdraw Clipper as a standard for voice communications
-
- - Urge him to support relaxation of export controls
-
- - Ask for the public release of the earlier White House study on
- cryptography
-
- - Ask for the public release of White House documents reviewing the
- weaknesses of the key escrow proposal
-
- The Vice President has clearly shown a willingness to listen
- to the concerns of the user community on this issue. Your letter
- could make a difference.
-
-
-
- =======================================================================
- [5] Upcoming Privacy Related Conferences and Events
- =======================================================================
-
- DEF CON ][ ("underground" computer culture) "Load up your laptop
- Muffy, we're heading to Vegas!" The Sahara Hotel, Las Vegas, NV. July
- 22-24. Contact: dtangent@defcon.org.
-
- Hackers on Planet Earth: The First US Hacker Congress. Hotel
- Pennsylvania, New York City, NY. August 13-14. Sponsored by 2600
- Magazine. Contact: 2600@well.sf.ca.us.
-
- Technologies of Surveillance; Technologies of Privacy. The Hague, The
- Netherlands. September 5. Sponsored by Privacy International and EPIC.
- Contact: Simon Davies (davies@privint.demon.co.uk).
-
- 16th International Conference on Data Protection. The Hague,
- Netherlands. September 6-8. Contact: B. Crouwers 31 70 3190190
- (tel), 31-70-3940460 (fax).
-
- CPSR Annual Meeting. University of California, San Diego. October 8-9.
- Contact: Phil Agre <pagre@weber.ucsd.edu>
-
- Symposium: An Arts and Humanities Policy for the National Information
- Infrastructure. Boston, Mass. October 14-16. Sponsored by the Center
- for Art Research in Boston. Contact: Jay Jaroslav
- (jaroslav@artdata.win.net).
-
- Third Biannual Conference on Participatory Design, Chapel Hill, North
- Carolina. October 27-28. Sponsored by CPSR. Contact:
- trigg@parc.xerox.com.
-
- Ethics in the Computer Age Conference. Gatlinburg, Tennessee. November
- 11-13. Sponsored by ACM. Contact: jkizza@utcvm.utc.edu
-
- (Send calendar submissions to Alert@epic.org)
-
-
- =======================================================================
-
- To subscribe to the EPIC Alert, send the message:
-
- SUBSCRIBE CPSR-ANNOUNCE Firstname Lastname
-
- to listserv@cpsr.org. You may also receive the Alert by reading the
- USENET newsgroup comp.org.cpsr.announce
-
- =======================================================================
-
- The Electronic Privacy Information Center is a public interest
- research center in Washington, DC. It was established in 1994 to
- focus public attention on emerging privacy issues relating to the
- National Information Infrastructure, such as the Clipper Chip, the
- Digital Telephony proposal, medical record privacy, and the sale of
- consumer data. EPIC is sponsored by the Fund for Constitutional
- Government and Computer Professionals for Social Responsibility. EPIC
- publishes the EPIC Alert and EPIC Reports, pursues Freedom of
- Information Act litigation, and conducts policy research on emerging
- privacy issues. For more information email info@epic.org, or write
- EPIC, 666 Pennsylvania Ave., SE, Suite 301, Washington, DC 20003. +1
- 202 544 9240 (tel), +1 202 547 5482 (fax).
-
- The Fund for Constitutional Government is a non-profit organization
- established in 1974 to protect civil liberties and constitutional
- rights. Computer Professionals for Social Responsibility is a national
- membership organization of people concerned about the impact of
- technology on society. For information contact: cpsr-info@cpsr.org
-
- ------------------------ END EPIC Alert 1.04 ------------------------
-
-
-
- ------------------------------
-
- Date: Fri, 22 Jul 1994 00:22:13 -0400 (EDT)
- From: "Shabbir J. Safdar" <shabbir@PANIX.COM>
- Subject: File 3--HR 3937 now a dead end; House Rules Comm results
-
- [updated July 21, 1994 shabbir]
-
- *********************************************************************
-
- DISTRIBUTE WIDELY
-
- *********************************************************************
-
- Table of contents:
- Introduction
- Result of House Rules committee vote
- Status of the bill
- 1994 Voters Guide
-
- -------------------------------------------------------------------------------
- INTRODUCTION
-
- Voters Telecomm Watch keeps scorecards on legislators' positions on
- legislation that affects telecommunications and civil liberties.
- If you have updates to a legislator's positions, from either:
-
- -public testimony,
- -reply letters from the legislator,
- -stated positions from their office,
-
- please contact vtw@vtw.org so they can be added to this list.
-
- General questions: vtw@vtw.org
- Mailing List Requests: vtw-list-request@vtw.org
- Press Contact: stc@vtw.org
- Gopher URL: gopher://gopher.panix.com:70/11/vtw
- WWW URL:We're working on it. :-)
- -------------------------------------------------------------------------------
- RESULT OF THE HOUSE RULES COMMITTEE VOTE ON HR 3937
-
- Based on information gathered by volunteers, we've been able to
- piece together some of the positions of the House Rules Committee
- as to how they voted for/against opening up HR 3937 to amendments on
- the House floor. [This is now somewhat moot, as is explained in the
- next section.]
-
- Extensive kudos go to
- Joe Thomas <jthomas@pawpaw.mitre.org>
- gaj@portman.com (Gordon Jacobson)
- who both did extensive work to help find this information.
-
- Here are the results we were able to obtain:
-
- [The committee voted 5-4 to open the bill]
-
- HOUSE RULES COMMITTEE MEMBERS
-
- Dist ST Name, Address, and Party Phone
- ==== == ======================== ==============
- 9 MA Moakley, John Joseph (D) 1-202-225-8273
- UNSPECIFIED POSITION
-
- 3 SC Derrick, Butler (D) 1-202-225-5301
- UNSPECIFIED POSITION
-
- 24 CA Beilenson, Anthony (D) 1-202-225-5911
- UNSPECIFIED POSITION
-
- 24 TX Frost, Martin (D) 1-202-225-3605
- UNSPECIFIED POSITION
-
- 10 MI Bonior, David E. (D) 1-202-225-2106
- UNSPECIFIED POSITION
-
- 3 OH Hall, Tony P. (D) 1-202-225-6465
- UNSPECIFIED POSITION
-
- 5 MO Wheat, Alan (D) 1-202-225-4535
- UNSPECIFIED POSITION
-
- 6 TN Gordon, Bart (R) 1-202-225-4231
- UNSPECIFIED POSITION
-
- 28 NY Slaughter, Louise M. (D) 1-202-225-3615
- Voted "open"
-
- 22 NY Solomon, Gerald B. (R) 1-202-225-5614
- Voted "open"
-
- 1 TN Quillen, James H. (R) 1-202-225-6356
- Told a constituent he would vote for "open".
-
- 28 CA Dreier, David (R) 1-202-225-2305
- UNSPECIFIED POSITION
-
- 14 FL Goss, Porter J. (R) 1-202-225-2536
- UNSPECIFIED POSITION
-
- It is probably not worth the trouble to ask the remaining legislators
- how they voted unless you happen to chat with their staff often.
- -------------------------------------------------------------------------------
- STATUS OF THE BILL (updated 7/21/94)
-
- If you read the appropriate newsgroups (or any major newspaper) you've
- seen the news about the Gore/Cantwell compromise. Since everyone
- has reprinted it already, we'll not reprint it again, though we'll
- happily send you a copy should you have missed it.
-
- The upshot of this is that Rep. Maria Cantwell will not be offering
- her amendment and therefore HR 3937 is a dead end this year for
- liberalizing cryptography exports. Since VTW is an organization dedicated
- to working on legislation, and there is no longer a piece of relevant
- legislation, we will be concentrating on other projects. The "cantwell"
- section of our archive will be reworked, and the records of legislators
- that voted will be kept there for future reference. [NOTE: these
- voting records will also be rolled into our 1994 Voters Guide]
-
- Here is the final schedule/chronology of the bill
-
- Jul 21, 94 Rep. Cantwell and Vice Pres. Al Gore compromise on seven
- principles, retreating on the Clipper chip; Rep. Cantwell
- chooses not continue to press the legislation or the amendment
- (see relevant articles in today's NY Times and Washington Post)
- Jul 20, 94 HR3937 comes to House floor; a "good" amendement will be offered
- Jul 11, 94 House Rules Committee marks HR3937 "open"; allowing amendments
- Jun 30, 94 [*** vote postponed, perhaps till the week of 7/11/94]
- House Rules Comm. decides whether to allow amendments
- on the bill when it reaches the House floor
- Jun 14, 94 Gutted by the House Select Committee on Intelligence
- May 20, 94 Referred to the House Select Committee on Intelligence
- May 18, 94 Passed out of the House Foreign Affairs Committee on May 18
- attached to HR 3937, the General Export Administration Act
- Dec 6, 93 Referred to the Subcommittee on Economic Policy, Trade and
- Nov 22, 93 Referred to the House Committee on Foreign Affairs.
-
- -------------------------------------------------------------------------------
- 1994 VOTERS GUIDE
-
- Voters Telecomm Watch believes that you should be informed about your
- legislators' positions on key issues. We will be developing a survey
- to give to current legislators and their challengers that will gauge
- their positions on key issues involving telecommunications and civil
- liberties. These results will be made publicly available on the net
- for you to use in casting your vote in November.
-
- We'll be depending on you to help get legislative candidates to fill
- out and return their surveys. Please watch this space for the
- announcement of survey availability in the coming weeks.
-
- If you wish to participate in the development of the survey, feel free
- to join the working list by mailing a note to that effect to
-
- vtw@vtw.org
-
- ------------------------------
-
- Date: Fri, 22 Jul 1994 17:15:55 EST
- From: David Sobel <dsobel@WASHOFC.EPIC.ORG>
- Subject: File 4--Sen. Leahy on Clipper
-
- Sen. Leahy on Clipper
-
-
- U.S. SENATOR PATRICK LEAHY
-
- Vermont
-
- ________________________________________________________________
-
- STATEMENT OF PATRICK LEAHY ON
- VICE PRESIDENT GORE'S CLIPPER CHIP LETTER
-
- July 21, 1994
-
- I have read the July 20th letter from the Vice President about the
- Administration's current thinking on Clipper Chip and, to my mind, it
- represents no change in policy. In fact, when this letter was sent, I
- would be surprised if the Administration even thought it was news.
-
- The letter makes clear to me that the Administration continues to
- embrace key escrow encryption technology, and stands behind Clipper Chip
- as a federal standard for telephone communications. The official
- standard makes clear that this standard applies to any communications
- over telephone lines. Those communications include not only voice, but
- also low-speed computer data and facsimile messages. The Administration
- is working on encryption technologies for higher-speed transmissions,
- such as for computer networks and video networks.
-
- The Vice President says that they want to work with industry to
- design a key escrow system that could be implemented not just in
- hardware, but also in software, that would be voluntary, exportable and
- not rely upon a classified encoding formula. The Administration said all
- this last February when the federal standard was approved. Yet, when
- Administration witnesses were questioned about the progress they had made
- in this effort at my Judiciary subcommittee hearing in early May, I
- learned they had held only a few meetings.
-
- Last week, the Appropriations Committee accepted strong Report
- language I suggested on Clipper Chip. The Attorney General is directed
- to report to Congress within four months on ten areas of concern about
- Clipper Chip.
-
- I agree with the Vice President that balancing economic and privacy
- needs with law enforcement and national security is not always an easy
- task. But we can do better than Clipper Chip.
-
- ------------------------------
-
- Date: Sat, 23 Jul 94 15:31:03 PDT
- From: hkhenson@cup.portal.com (H Keith Henson)
- Subject: File 5--Summary of Amateur Action BBS Trial (Days 1-3)
-
- ((MODERATORS NOTE: The Amateur Action BBS trial has started, and
- Keith Henson reports on the proceedings from the first three days))
-
- AA BBS Trial--days 1 and 2.
-
- Robert and Carleen along with their attorney had the typical problems
- of defending yourself a long way from home. The airline made them
- check their legal files, and then promptly lost them, plus all their
- luggage. So first day was a mess, showing up before the judge in
- traveling clothes--who ordered Richard Williams (their attorney) go
- out and buy a suit over lunchtime. (Robert actually went out and
- bought a suit for Richard. The luggage and files finally showed
- up--after enough time for them all to have been run through a copier.)
-
- All of day 1 and the first hour today was used up picking a jury.
- Richard did the best he could-- considering where the trial is being
- held. There was only one person who had ever been on a bbs, and the
- prosecution bumped that one. There are only 2 out of 14 who have know
- anything about computers, however, 9 of the 12 are men . . . . and he
- did get most of the thumpers out of the mix.
-
- I got tossed out after the opening statements because I am to be a
- witness to Dirmeyer's statements. I might have been of more use
- inside picking up the prosecutors abysmal ignorance than as a witness.
- Ah well, perhaps I can stir up folks out here to the injustice.
-
- Dan Newsom, small frame, gray hair opened up with a 1950's lecture on
- obscenity, here a prong there a prong, what a way to spend your life!
- He tried to explain GIFs, got to talking about faxes, then went off
- into a really sorry description of chat mode.
-
- He made an issue of the contents of AA BBS being wide open to the
- public (not true, it being membership) and made a big issue out of
- David Dirmeyer finding menu items which mentioned "teen" (And, so
- what? 18-19 is legal, and nudist material of any age is legal.) He
- went into the prosecution's argument that Robert had asked for the
- government's kiddy porn to be shipped to him, so it could be put on
- the BBS as GIFs. (Right, as if the AA Sysop would put up GIFs with
- titles and subject matter like "Little Girls Like to Fuck Too! He
- won't even let members upload GIFs.) Like Humpty Dumpty, the
- government's term for child porn is now "action mags," and *you* are
- expected to know this.
-
- Much of the rest of the day was spent on a computer class, with
- pictures of mainframes, monitors, keyboards and mice, plus diagrams
- and maps. Massive boredom was setting in . . . I have been peeking
- through the glass into the court room, and about 3:30 they did get to
- the first of the "porn" tapes. The poor jury! I am now glad they
- threw me out. Multiple hours of watching shit and piss closeups--and
- no popcorn! Out of the hundreds of tapes AA had, you would think
- David Dirmeyer could have picked out something with a little wider
- appeal. Each to their own fetish I suppose. Richard was watching
- Dirmeyer and mentioned to me that Dirmeyer (who must have seen this
- one a dozen times by now) was staring at the monitor--just transfixed.
- >From half a dozen peeks at it, I must say the technical quality was
- pretty good--you could almost smell it. :-) Audio was in German.
-
- (Far be it from me to judge other people's harmless (if disgusting)
- fetishes, but if the jury decided to lynch the prosecutor for
- subjecting *them* to other people's fetish material I would be happy
- to knot the rope. The variety in what people get off on out there at
- 5-6 sigma is amazing, and definitely not for everyone.)
-
- 5:20 improvement--the last half hour of the tape is of a woman
- masturbating--after 10 minutes, it switches to regular hetro sex.
- Strangely spliced. Jury is not any too happy at the prosecution for
- running past 5pm.
-
- The big unanswered question to me is *what* is the government (or this
- part of it) trying to accomplish? If they want to keep this kind of
- material out of the Bible Belt, there has to be more effective
- approaches than going after AA BBS in California. If they want to
- keep it off computers, good luck.
-
- PS--one dismissed prospective juror was a minister who said his son
- had been diagnosed as a "pornography addict." Can someone comment if
- there is such a classification in the diagnostic index?
-
- AA BBS Trial--day 3.
-
- More videos today. David Dirmeyer is still staring at them and
- occasionally adjusting his clothes. Dan Newsom sits a good distance
- away from him with a grim look on his face. The jury overloaded, and
- some of them dozed off. The case is not turning into a media circus.
- One of the local TV stations has been there, and one stringer for AP.
- Courthouse workers wonder by, stare in for a few minutes and wonder on
- shaking their heads as to why Memphis has to deal with Californians.
-
- I spent the day researching--partly looking into the different
- "community" standards argument. In my view, a person such as Dirmeyer
- who has bought the kind of hardware you need to download GIFs, has
- read what AA BBS has to offer, sends them money or a credit card, and
- goes to the trouble of downloading porn GIFs is no more a member of a
- "bible belt" community than someone who has moved to San Francisco.
- In fact, the physic distance one travels in just login on to the
- Internet is at least that far!
-
- It has slowly dawned on me that this trial is just a small wave on top
- of a major cultural clash which is going on today. It is the
- community standards of puritanical/ fundamentalist groups (serious
- Catholics--the few that are left, various Baptist related groups,
- Mormons, etc.) against the community standards which dominate the net.
-
- There is an excellent article in Time this week about the spread of
- net culture and its values as more people are absorbed into the net.
- In spite of the net being "everywhere" (I log on through a local
- telenet number in Memphis) there is a concentration of net people on
- the coasts and concentration of the others through the center of the
- United States.
-
- Among the major cultural differences--I would estimate well over half
- the people who read usenet news or get serious amounts of email are
- aware of "jury nullification." The login cookie for the machine I use
- is:
-
- "If the jury feels the law is unjust, we recognize the undisputed
- power of the jury to acquit, even if its verdict is contrary to the
- law as given by a judge, and contrary to the evidence ... and the
- courts must abide by that decision."
- - US v Moylan, 4th Circuit Court of Appeals, 1969, 417 F.2d at 1006
-
- Similar quotes are in many .sig lines. Except among libertarians,
- knowledge of the power of juries outside of the computer field is
- rare.
-
- My other research took me to an adult video store. No question, they
- are tamer than the wildest you can get in San Francisco. But I did
- note that among perhaps a thousand they had all the standard ones,
- _Debby does Dallas_, _Behind the Green Door_ and, within 6 blocks of
- the courthouse where the famous ruling came down, _Deep Throat_.
-
- The case is clearly going to run over the week the judge wanted. The
- prosecution has more videos to show, I think the animal ones are next.
- In fact, the judge has to be away Friday. They had Dirmeyer on the
- stand today and are still on trying to make out that Robert ordered
- kiddy porn. I believe the argument now is that he did not *respond*
- to an email message about "action mags." I will get copies of the
- actual text, and will post the entire transcript.
-
- Since there is no chance I will be called this week, I am going back
- to San Jose to take care of business (Xanadu) till they have a better
- idea of when I will be needed.
-
- I will call Memphis on a daily basis and post trial news as I can.
-
- Keith Henson
-
- PS. I asked why the NAFTA argument failed. The court ruled on good
- logic that the entire agreement is a sham on the American public and a
- fraud on Canada and Mexico--because it has absolutely no authority to
- be enforced. That surprised the heck out of me, and it seems that the
- AA BBS postings have had an unexpected effect as far away as the GATT
- negotiations. Someone there is reported to have noticed the NAFTA
- postings, and as a result, the US will be admitted to GATT only if the
- agreement passes as a Treaty!
-
- PPS. The judge also ruled on the speedy trial. It seems that the
- airline losing their luggage and making them a few hours late allowed
- her to rule against them on speedy trial, even though the trial was 33
- days over the limit! Well, my mom always said to be prompt!
-
- ------------------------------
-
- End of Computer Underground Digest #6.67
- ************************************
-
- ^Z
-
-