home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Wed Mar 1, 1995 Volume 7 : Issue 17
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Archivist: Brendan Kehoe
- Semi-retiring Shadow Archivist: Stanton McCandlish
- Correspondent Extra-ordinaire: David Smith
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Monster Editor: Loch Nesshrdlu
-
- CONTENTS, #7.17 (Wed, Mar 1, 1995)
-
- File 1--TWO-BBSCON Duesseldorf , Germany 8-11 February 1995
- File 2--EFF SUES TO OVERTURN CRYPTOGRAPHY RESTRICTIONS
- File 3--ACLU cyber-liberties alert: Axe the Exon Bill!
- File 4--Tired of S.314 Hysteria
- File 5--Cu Digest Header Info (unchanged since 26 Feb, 1995)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ----------------------------------------------------------------------
-
- Date: Sun, 19 Feb 1995 02:50:57 GMT
- From: John Malathronas <John@SCROLL.DEMON.CO.UK>
- Subject: File 1--TWO-BBSCON Duesseldorf , Germany 8-11 February 1995
-
- Copyright John Malathronas, sysop of SCROLL BBS - The London Community Board.
-
- The first BBS conference in Europe, TWO BBSCON (TWO standing for Trans
- World On-line) was the brainchild of Gerald Maier and Joerg
- Steinhaeuser who came upon the idea 15 months ago in ONE BBSCON, a
- regular feature in the US attracting delegates of the region of 4000
- per year. Along with help and sponsorship by Galacticomm Inc, whose
- product, the Major BBS is one of the big three BBS programs (along
- with TBBS and Wildcat), the event finally took off in a rainy
- Duesseldorf on 8-11 February 1995.
-
- Although the event was publicised mainly on Boardwatch, a magazine
- with very limited subscription-only circulation in Europe and on
- Internet Usegroups, around 400 people attended the conference with
- about 300 attending the last night gala dinner. In Germany, the event
- was publicised in PC-Online - this and the fact that it was organised
- in Germany, accounted for the fact that about 60% of the attendees was
- German with another 20% American.. The exhibitors were also purely US
- and Germany-based. However, delegates came from Eastern Europe
- (Czechoslovakia, Hungary, Poland, Russia),Spain and Portugal, France,
- the UK, Italy, Greece, Switzerland, Finland, Norway, Holland, Ireland,
- Austria, Germany and the US. It was easy to distinguish the Europeans
- from the Americans: the Americans wore suits and ties during the day
- because they were either the speakers or were giving business
- presentations; the Europeans were the ones who wore suits and ties in
- the gala dinner, where the Americans came with open shirts or even
- jeans. Let's hear it for the cultural differences.
-
- So what of the conference itself : John Dvorak, contributor to PC
- Magazine , Boardwatch , San Francisco Chronicle and author of 18
- computer books was the conference keynote speaker. His theme was the
- apparent paradox of fragmentation versus consolidation that he sees
- prevalent in our society. On one hand, the Soviet Union disintegrates
- down to the insurrection of Chechenya within Russia itself and on the
- other the EU expands in what appears to the US increasingly as a
- single market unit. In the Americas, Quebec and Mexican separatists
- coexist with the new North American single market of Canada, Mexico
- and the US. Drawing a parallel, he said that the giant on-line service
- providers (Compuserve, America On-line, Delphi and Prodigy) coexist
- simultaneously with 60000 *known* bulletin boards in the US. With
- Microsoft and IBM entering the market now, there is likely to be a
- huge shake-up at the top - and who's to say what happens at the bottom
- ? The issue, he said for the apparent paradox of trends is loss of
- information control by government. Information is now free: even the
- Chinese can not control the faxes into China or the mullahs of Iran
- the images beamed on their rooftops by satellites. Information is also
- unaffected by natural disasters as the LA and Kobe earthquakes showed
- or by uprisings as the Russian 1991 coup also showed. His thesis is
- that this freedom is a very dangerous development and that governments
- will
- try to regulate it.
-
- The governments will try to regulate such flow by highlighting the
- negative aspects , namely the free flow of lies and dis-information.
- This is why we must also accept such negative aspects to keep
- regulatory bodies out.We must also accept porno BBSs, Hacker BBSs,
- Terrorist BBSs etc. - in the same way that other technological
- inventions such as typography, telephony and TV having entered the
- mainstream, were used reflecting the society they were in.
-
- In short, the Dvorak thesis explains the fragmentation aspect of
- society as the pressure exerted by the individual to escape big
- government, and the trend in consolidation as the governmental
- response to this.
-
- The second keynote speaker was Ms Josee van den Berg from the IDC
- Network Expertise Centre Europe in Amsterdam who put the European
- market in perspective. The TELECOM business in Europe is worth 160bn
- US$, the Computer Business 140bn US$ , the Publishing 100bn US$ and
- Catalogue Shopping 50bn US$. All these industries are going to be
- affected by Online Services. (I personally noticed catalogue shopping
- by CD-ROM available through Dusseldorf newsagents. The cost of the
- CD-ROM: 5DM same as a catalogue book.) In 1993 there were 12 million
- PCs (estimated) in the 17 EU and EFTA countries , This should double
- by 1998 to 25 million. The vast majority of those are Intel based 286s
- running DOS. It is likely that the 386 will be bypassed altogether in
- favour of 486s or Pentium PCs as the prices come down.
-
- In terms of availability of ISDN lines, France leads Europe with 100%
- of its area available for ISDN. The UK has 95% availability (100% end
- of 1995) and Germany 70% (because of the former East Germany) hoping
- to reach 100% end of 1995. Italy and Spain aim for 70% coverage by
- end of 1995. Note that 100% availability does not mean that everyone
- has ISDN - only that everyone CAN have should they decide to have it
- installed.
-
- The percentage of home computers in households is estimated as France
- 21% (mainly because of Minitel installations), Germany 14%, Sweden
- 12%, Denmark 10% and UK 9%. This was an eye opener for the UK-based
- delegates who thought that the UK is a European leader in home
- computing. The average across the EU is 10% so the UK is about average
- in percentage of home computers. In the US, the figure is 34%. If we
- accept that the US shows the way we are looking for a tripling of the
- home computer and online market in the next 3-4 years.
-
- The third keynote speaker on Thursday was Esther Dyson, president of
- EDventure Holdings, publisher of Release 1.0 and founder of the
- Electronic Frontier Foundation, a sort of Civil Liberties Society for
- the net. She shocked and stunned the audience with predictions that
- soon all software would be free, and intellectual copyright will be
- abolished because shareware does not pay and the way to make money is
- via support, training and consultancy. Since, a lot of people in the
- audience were programmers waiting to receive the Ziff-Davis European
- shareware awards (awarded by PC Magazine on the gala night), there was
- some heated discussions afterwards. Should then programmers provide
- even more incomprehensible documentation ? Should they design-in bugs
- ? Esther Dyson gave away copies of her copyrighted newsletter in the
- end.
-
- The first day's afternoon was spent in Workshops. I went Nick Anis's
- discussion on the Convergence of the BBS, Internet and Online
- Information services, because Nick Anis is a wonderfully funny
- speaker. He spoke about Phase II of the BBS market in the US when all
- is connected to the Internet. He gave first a BBS history : from the
- first Ward Christiansen BBS in Chicago in 1978 who produced a solenoid
- specially to turn his floppy drive on when the phone rang to answer
- his BBS, to 1985 when there were hundreds of BBSs in the US with only
- 2% used for profit, to 1992 when there were thousands, 85% with more
- than one line and 10% offering Internet access. It is also estimated
- that this increase in activity is taking place when only about 5% of
- the PCs in the US have a modem .
-
- Next I saw a demo of Microsoft Network (MSN), which comes integrated
- with Windows 95 (in full demo throughout the conference) by Robert
- Mitchnik, a former sysop, now working for Microsoft. Microsoft Network
- will be a kind of McDonalds of the airwaves. It will be franchised
- locally to sysops who will be able to run their forums under the
- Microsoft umbrella. If someone wants to run a BBS for Belgian rock
- fans - they can apply to Microsoft who was recruiting sysops (400 have
- already been recruited) in the conference. Microsoft were in pains to
- deny that they were competing with Internet providers or online
- megaboards such as Compuserve - they were there to 'expand the market'
- and to 'provide opportunities for sysops'. Their business model of
- franchising the network along with their technical solution : click
- from within Windows seamlessly dialling local Microsoft numbers may
- actually work given the installed base of Windows 3.1. UUNet is
- providing full Internet Access to MSN and Microsoft have taken a
- minority equity position in the company. It will run in 23 languages
- in 20 countries and by March 500 Forum sysops will have been trained
- in Microsoft's HQ in Redmond, USA.
-
- After Microsoft came IBM who pushed O/S Warp. The presentation was
- made by Jonathan Fleet from IBM UK whose presentation was slick : he
- started with a list of problems and then presented the solution to all
- these problems which is Warp OS/2. He hit Microsoft where it hurts by
- casually observing that such a system is available NOW, with 175
- points-of presence for IBM already there and working, to be increased
- to 400 by the end of 95. Warp is an impressive system for those who
- have seen it and the pricing of IBM is very competitive. One does not
- even have to run OS/2 to be on IBM's network - one must first buy the
- product to register and then switch to Windows, say. All this and for
- the company who, err. BUILT the Internet in the 60's and 70's for the
- US Department of Defense as Jonathan reminded us. Certainly his talk
- was better received than Microsoft's whose sheer size and monopoly
- power seems to generate hostility - like it once did for IBM.
-
- On for the second day which produced the best session with three
- excellent speakers one after the other.
-
- First came Dr. Paul Weissenberg European Commissioner with a brief for
- IT, certainly the first time BBSs and sysops came into contact with
- someone from the European Commission. He explained that the
- Commissioners try now to bring the Commission to the people and make
- them understand how they work and are helping Europe. As an example he
- cited the Pan European TGV project. There are designs on the table for
- a fast train from Lisbon to Warsaw - beyond the EU. There are
- proposals on teleworking and on a scheme to allow medical online
- services to isolated areas of the EU, Scotland for instance, where the
- first consultation with the doctor will be via videoconferencing
- technology. He also appeared to agree with members of the audience who
- wanted to take state telecomms to task; it was very difficult to allow
- 'liberalisation' or 'privatisation' of key state industries in some
- countries because they were part of a national identity. Airlines (Air
- France, Lufthansa) and state telecom companies fell under this
- category. What the Commission was striving towards was removal of
- state subsidies - something which national governments were better at
- concealing in their budgets year-by-year. During question time the
- animosity of the delegates against state telecom companies was much in
- evidence. Ten years of a private BT has made UK residents forget what
- it was like in the late seventies; it seems that the UK fares better
- in the big telecomms industry's attitude towards the people it serves
- than in other countries. The Portuguese Telecom was singled out for
- criticism for abusing its monopoly and allegedly supplying free
- modems for computer users to join its own online service with money
- obtained from the EU.
-
- The questions were so many, Dr Weissenberg had to move to another room
- to continue answering them; still, delegates were commenting on the
- fact that the Commission seems to be building a train TGV network
- while the US were creating an information superhighway: one project
- looks back to the 19th century while the other looks to the 21st. I
- must say, if I wanted to travel from Lisbon to Warsaw, I would take
- the plane.
-
- Jack Rickard, editor of Boardwatch magazine, picked up the theme of
- BBSs vs. the world with an upbeat message. A BBS is not technology,
- not a phone line, but a place, he postulated. It's like a restaurant -
- there are inherent problems in scaleability. Firstly - how many of us
- will want to eat in a 20,000 seater ? Secondly, how will the owners be
- able to find so many trained chefs *at once* ? MSN, IBM, Compuserve -
- all can coexist alongside a local BBS. A local specialised BBS will
- serve as an editor filtering out the noise from the information
- overload and providing a place for a user to relax, chat and meet
- like-minded people, a sense of 'belonging'. This is why Compuserve is
- successful: it is like a common interface to many small villages ,
- its forums. This is also why MSN may be successful - it is using the
- franchise business model. None of these larger services, however, will
- spell the deatch of the local specialised BBS.
-
- Finally Dennis Hayes, the president of the modem manufacturers who
- provided us with the de facto standard modem commands, gave an insight
- into the future in probably the best speech of the conference. Firstly
- he polled the audience. How many were using or supporting 2400 baud ?
- Very few did. Most were working on 9600+ with a high number of ISDN
- connections. The number of hands up on the ISDN front was 5 times as
- high as in the US - this is because AT&T was broken up before a
- standard and a cabling provision was set. ISDN line laying is
- something that state telecom companies *do* do well. In the US states
- such as Tennessee forced the telephone company by legislation to lay
- cables. Others such as high tech California have some parts of even
- San Francisco uncovered - and there are no plans for when ISDN will be
- offered if at all. It seems ISDN availability is one area where Europe
- is doing better than the US.
-
- Dennis Hayes also spoke of the limitations inherent in modem speeds
- via telephone lines. 28.8KB/s will probably be the practical limit.
- The new standard being worked on, V34bis, will not go further than
- 34KB/s - compare that with a virtual doubling of the comms speed every
- 18 months since 1981 when the Hayes AT command set was published.
-
- Voice and data simultaneous transmission in also something to hit our
- desktops, although this again is an answer to some unasked question,
- like multimedia. There are now two standards for 28.8K modems. The
- DSBS standard (to which Hayes belongs) allows 8.8K for voice and 20K
- for data; the AT&T standard splits 28.8K in two allowing bandwidth of
- 14.4 each for voice and 14.4 for data. The only application thought
- about for this is telecommuting applications when the employee can
- talk on the phone while simultaneously sending data. BBSs can also
- benefit - one line can always be used as a personal phone, even though
- it is connected to the BBS.
-
- Finally, he reminded us that there is a new player in the field of
- Telecomms, Computers, TV-Electronics and Multimedia : the Power
- companies who are laying down fibre optic cable for power transmission
- and realising that it can also be used for digital communications.
- The emergence of a competitor to BT and Mercury in the UK, owned by a
- power company is a pointer to that. Certainly the future will be
- interesting.
-
- I spent the rest of the conference attending various specialised
- workshops. The presentations of Tim Stryker from Galacticomm (Major
- BBS) and Phil Becker from eSoft were (probably on purpose) at the same
- time so I went to see Phil Becker as I am a TBBS sysop. Certainly TWO
- BBSCON showed the parting ways of the two big players in the BBS
- arena. TBBS is producing the IPAD - a hardware platform to be
- connected to your modems and computer to give you Internet access
- management in hardware. MBBS on the other hand have tried to develop a
- better BBS interface - they have produced a sexy client-server
- interface in Visual Basic which is a marvel to behold. The problem
- with the TBBS approach is that it is not there yet - since it is
- hardware, it requires certification by the FCC, BT, and every phone
- company in each country. It will also cost $6000-$7000 per unit in the
- US. The problem with Galacticomm's approach is, surprise surprise,
- that is not yet there but also that it is proprietary. This great VB
- interface can only be used for MBBS. Would the users switch terminal
- programs if they wanted to call another BBS ? Galacticomm seem to
- have abandoned their belief in BBS RIP graphics and gone
- wholeheartedly into the client server bandwagon. TBBS 2.3 on the other
- hand comes with RIP built-in, beacuse it has become a graphics
- standard for BBSs.
-
- Certainly MBBS had a much higher profile during the conference. There
- were four terminals using MBBS software connected to EU-Net and the
- World Wide Web for users to browse. They were the sponsors of the gala
- dinner. Tim Stryker was a founder member of TWO BBSCON. TBBS and eSoft
- on the other hand, shared a stand with Boardwatch and kept quiet.
-
- Galacticomm's client server VB approach seems to be in direct
- competition with Durand Communications' GENESYS and Mindwire products.
- These are VB-based client server database applications working with
- Microsoft Access and BBS technology to produce online search and
- retrieval of picture databases. Two applications that have been
- implemented include a database of Supermodels and one for Real estate
- agents in Santa Barbara, California, where details and pictures of
- models and houses are kept on line and queried respectively. This
- should be in direct conflict with Galacticomm, although the solutions
- seem more bespoke- business oriented than what MBBS has to offer. What
- excited the delegates was a new compression technique Durand used,
- called ART which is 50% better than JPEG, does not utilise fractal
- techniques and provides thumbnail images of the order of 1K per image.
-
- The main event was the gala dinner, where veal was eaten in abundance
- - since it is called Kalbfleisch, most Brits ate it without feeling
- guilty - and deals and friendships forged. Modem manufacturers with
- sysop deals were in demand - US Robotics had a deal available but not
- for UK-based sysops unlike Hayes or Supra.
-
- Then there were the Ziff-Davis European shareware awards where
- separate awards were given to German, UK and French shareware authors
- in games, utilities and 'other' sections. Demonstrations of the awards
- were given in real time over a big screen, surprisingly with no
- glitches. The overall winner from all three sections was Denis Bertin
- from Logiciels Graphiques Vincent, a DTP Corel-like program but with
- fantastic capabilities and great ease of use. (French entries, by the
- way, were the most impressive of all).
-
- Other events in the gala dinner included a quiz show by Nick Anis
- where sysops were asked questions and won prizes. The audience prize
- for best answer went to a sysop from Spain who, having been asked how
- many bits there are in a byte answered : 'Depends on the phone
- company'.
-
- So, in conclusion : was TWO BBSCON a success ? Certainly the
- organisers think so, since they will be offering a second exhibition
- in May '96 in Munich. Certainly a good time was had by all, including
- myself, who picked up advice for running my board (SCROLL - the
- London-based board) not least from the very helpful Scots from ALMAC
- BBS which is a cross between Compuserve and Demon - at very
- competitive prices. Let's hope they will expand south of the border.
-
- The only regret was the under-representation from the UK, but
- advertising and marketing may have played its role. Still, there are
- very few boards I know of in the UK, compared with Germany, where they
- are approaching 3000, or even Holland. This is an area we still have
- to catch up on.
-
- John Malathronas can be reached at john@scroll.demon.co.uk
-
- ------------------------------
-
- Date: Tue, 21 Feb 1995 23:16:46 -0500 (EST)
- From: Stanton McCandlish <mech@EFF.ORG>
- Subject: File 2--EFF SUES TO OVERTURN CRYPTOGRAPHY RESTRICTIONS
-
- EFF SUES TO OVERTURN CRYPTOGRAPHY RESTRICTIONS
- First Amendment Protects Information about Privacy Technologies
-
- February 21, 1995
- San Mateo, California
-
- In a move aimed at expanding the growth and spread of privacy and
- security technologies, the Electronic Frontier Foundation is sponsoring a
- federal lawsuit filed today seeking to bar the government from restricting
- publication of cryptographic documents and software. EFF argues that
- the export-control laws, both on their face and as applied to users of
- cryptographic materials, are unconstitutional.
-
- Cryptography, defined as "the science and study of secret writing,"
- concerns the ways in which communications and data can be encoded to
- prevent disclosure of their contents through eavesdropping or message
- interception. Although the science of cryptography is very old, the
- desktop-computer revolution has made it possible for cryptographic
- techniques to become widely used and accessible to nonexperts.
-
- EFF believes that cryptography is central to the preservation of
- privacy and security in an increasingly computerized and networked
- world. Many of the privacy and security violations alleged in the
- Kevin Mitnick case, such as the theft of credit card numbers, the
- reading of other peoples' electronic mail, and the hijacking of other
- peoples' computer accounts, could have been prevented by widespread
- deployment of this technology. The U.S. government has opposed such
- deployment, fearing that its citizens will be private and secure from
- the government as well as from other vandals.
-
- The plaintiff in the suit is a graduate student in Mathematics at the
- University of California at Berkeley named Dan Bernstein. Bernstein
- developed an encryption equation, or algorithm, and wishes to publish the
- algorithm, a mathematical paper that describes and explains the algorithm,
- and a computer program that runs the algorithm. Bernstein also
- wishes to discuss these items at mathematical conferences and other open,
- public meetings.
-
- The problem is that the government currently treats cryptographic software
- as if it were a physical weapon and highly regulates its dissemination. Any
- individual or company who wants to export such software -- or to publish
- on the Internet any "technical data" such as papers describing encryption
- software or algorithms -- must first obtain a license from the State
- Department. Under the terms of this license, each recipient of the licensed
- software or information must be tracked and reported to the government.
- Penalties can be pretty stiff -- ten years in jail, a million dollar
- criminal fine, plus civil fines. This legal scheme effectively prevents
- individuals from engaging in otherwise legal communications about encryption.
-
- The lawsuit challenges the export-control scheme as an ``impermissible
- prior restraint on speech, in violation of the First Amendment.''
- Software and its associated documentation, the plaintiff contends, are
- published, not manufactured; they are Constitutionally protected works of
- human-to-human communication, like a movie, a book, or a telephone
- conversation. These communications cannot be suppressed by the government
- except under very narrow conditions -- conditions that are not met by the
- vague and overbroad export-control laws. In denying people the right to
- publish such information freely, these laws, regulations, and procedures
- unconstitutionally abridge the right to speak, to publish, to associate
- with others, and to engage in academic inquiry and study. They also have
- the effect of restricting the availability of a means for individuals to
- protect their privacy, which is also a Constitutionally protected interest.
-
- More specifically, the current export control process:
-
- * allows bureaucrats to restrict publication without ever going to court;
-
- * provides too few procedural safeguards for First Amendment rights;
-
- * requires publishers to register with the government, creating in
- effect a "licensed press";
-
- * disallows general publication by requiring recipients to be
- individually identified;
-
- * is sufficiently vague that ordinary people cannot know what conduct
- is allowed and what conduct is prohibited;
-
- * is overbroad because it prohibits conduct that is clearly protected
- (such as speaking to foreigners within the United States);
-
- * is applied overbroadly, by prohibiting export of software that
- contains no cryptography, on the theory that cryptography could be added
- to it later;
-
- * egregiously violates the First Amendment by prohibiting private
- speech on cryptography because the government wishes its own opinions
- on cryptography to guide the public instead; and
-
- * exceeds the authority granted by Congress in the export control laws
- in many ways, as well as exceeding the authority granted by the
- Constitution.
-
- If this suit is successful in its challenge of the export-control laws, it
- will clear the way for cryptographic software to be treated like any other
- kind of software. This will allow companies such as Microsoft, Apple,
- IBM, and Sun to build high-quality security and privacy protection into
- their operating systems. It will also allow computer and network users,
- including those who use the Internet, much more freedom to build and
- exchange their own solutions to these problems, such as the freely
- available PGP encryption program. And it will enable the next generation
- of Internet protocols to come with built-in cryptographic security and
- privacy, replacing a sagging part of today's Internet infrastructure.
-
- Lead attorney on the case is Cindy Cohn, of McGlashan and Sarrail in San
- Mateo, CA, who is offering her services pro-bono. Major assistance has
- been provided by Shari Steele, EFF staff; John Gilmore, EFF Board; and Lee
- Tien, counsel to John Gilmore. EFF is organizing and supporting the case
- and paying the expenses.
-
- Civil Action No. C95-0582-MHP was filed today in Federal District
- Court for the Northern District of California. EFF anticipates that
- the case will take several years to win. If the past is any guide,
- the government will use every trick and every procedural delaying
- tactic available to avoid having a court look at the real issues.
- Nevertheless, EFF remains firmly committed to this long term project.
- We are confident that, once a court examines the issues on the merits,
- the government will be shown to be violating the Constitution, and
- that its attempts to restrict both freedom of speech and privacy will
- be shown to have no place in an open society.
-
- Full text of the lawsuit and other paperwork filed in the case is available
- from the EFF's online archives. The exhibits which contain cryptographic
- information are not available online, because making them publicly available
- on the Internet could be considered an illegal export until the law is struck
- down. We are still uploading some of the documents, including the main
- complaint, so please try again later if what you want isn't there yet. See:
-
- http://www.eff.org/pub/EFF/Policy/Crypto/ITAR_export/Bernstein_case/
- ftp.eff.org, /pub/EFF/Policy/Crypto/ITAR_export/Bernstein_case/
- gopher.eff.org, 1/EFF/Policy/Crypto/ITAR_export/Bernstein_case
-
- Press contact: Shari Steele, EFF: ssteele@eff.org, +1 202 861 7700.
-
- For further reading, we suggest:
-
- The Government's Classification of Private Ideas: Hearings Before a
- Subcomm. of the House Comm. on Government Operations, 96th Cong., 2d
- Sess. (1980)
-
- John Harmon, Assistant Attorney General, Office of Legal Counsel,
- Department of Justice, Memorandum to Dr. Frank Press, Science Advisor to
- the President, Re: Constitutionality Under the First Amendment of ITAR
- Restrictions on Public Cryptography (May 11, 1978). [Included in the
- above Hearings; also online as http://www.eff.org/pub/EFF/Policy/Crypto/
- ITAR_export/ITAR_FOIA/itar_hr_govop_hearing.transcript].
-
- Alexander, Preserving High-Tech Secrets: National Security Controls on
- University Research and Teaching, 15 Law & Policy in Int'l Business 173
- (1983)
-
- Cheh, Government Control of Private Ideas-Striking a Balance Between
- Scientific Freedom and National Security, 23 Jurimetrics J. 1 (1982)
-
- Funk, National Security Controls on the Dissemination of Privately
- Generated Scientific Information, 30 U.C.L.A. L. Rev. 405 (1982)
-
- Pierce, Public Cryptography, Arms Export Controls, and the First
- Amendment: A Need for Legislation, 17 Cornell Int'l L. J. 197 (1984)
-
- Rindskopf and Brown, Jr., Scientific and Technological Information and
- the Exigencies of Our Period, 26 Wm. & Mary L. Rev. 909 (1985)
-
- Ramirez, The Balance of Interests Between National Security Controls and
- First Amendment Interests in Academic Freedom, 13 J. Coll. & U. Law 179
- (1986)
-
- Shinn, The First Amendment and the Export Laws: Free Speech on
- Scientific and Technical Matters, 58 Geo. W. L. Rev. 368 (1990)
-
- Neuborne and Shapiro, The Nylon Curtain: America's National Border and
- the Free Flow of Ideas, 26 Wm. & Mary L. Rev. 719 (1985)
-
- Greenstein, National Security Controls on Scientific Information, 23
- Jurimetrics J. 50 (1982)
-
- Sullivan and Bader, The Application of Export Control Laws to Scientific
- Research at Universities, 9 J. Coll. & U. Law 451 (1982)
-
- Wilson, National Security Control of Technological Information, 25
- Jurimetrics J. 109 (1985)
-
- Kahn, The Codebreakers: The Story of Secret Writing. New York:
- Macmillan (1967) [Great background on cryptography
- and its history.]
-
- Relyea, Silencing Science: national security controls and scientific
- communication, Congressional Research Service. Norwood, NJ:
- Ablex Publishing Corp. (1994)
-
- John Gilmore, Crypto Export Control Archives, online at
- http://www.cygnus.com/~gnu/export.html
-
- EFF Crypto Export Control Archives, online at
- ftp.eff.org, /pub/EFF/Policy/Crypto/ITAR_export/
- gopher.eff.org, 1/EFF/Policy/Crypto/ITAR_export
- http://www.eff.org/pub/EFF/Policy/Crypto/ITAR_export/
-
-
-
-
- --
- <A HREF="http://www.eff.org/~mech/"> Stanton McCandlish
- </A><HR><A HREF="mailto:mech@eff.org"> mech@eff.org
- </A><P><A HREF="http://www.eff.org/"> Electronic Frontier Foundation
- </A><P><A HREF="http://www.eff.org/1.html"> Online Services Mgr. </A>
-
- ------------------------------
-
- From: ACLU Information <infoaclu@ACLU.ORG>
- Date: Thu, 23 Feb 1995 10:48:53 -0500
- Subject: File 3--ACLU cyber-liberties alert: Axe the Exon Bill!
-
- **ACLU CYBER-LIBERTIES ALERT**
-
- FIGHT ONLINE CENSORSHIP!
-
- AXE THE EXON BILL!
-
- The American Civil Liberties Union urges you to contact the members of
- the U.S. Senate Commerce Committee and your own Senators to ask them
- to oppose the efforts to turn online communications into the most
- heavily censored form of American media.
-
- In a clumsy effort to purge sexual expression from the Internet and other
- online networks, the self-described "Communications Decency Act of 1995"
- (S.314, introduced by Senator Exon on 2/2/95) would make ALL
- telecommunications service providers liable for every message, file, or
- other content carried on their networks. Senator Exon is planning to
- attach the bill to Senator Pressler's new telecommunications legislation,
- which is targeted for action in early March.
-
- The Exon proposal would severely restrict the flow of online information by
- requiring service providers to act as private censors of e-mail messages,
- public forums, mailing lists, and archives to avoid criminal liability.
- The ACLU believes that online users should be the only censors of the
- content of the information they receive.
-
- **The Exon proposal broadens existing law by subjecting service providers,
- as well as the individuals who actually send messages, to criminal
- liability for any "obscene, lewd, lascivious, filthy, or indecent" message
- transmitted over their networks.**
-
- If enacted into law, this vague and overly broad legislation could have the
- following draconian effects:
-
- * The Exon proposal would prohibit communications with sexual cont
- ent
- through private e-mail between consenting adults, and would inhibit people
- from making comments that might or might not be prohibited.
-
- * Under the Exon proposal, service providers would pay up to $100,
- 000 or
- spend up to 2 years in jail for prohibited content produced by subscribers
- on other networks, over which they had no control.
-
- * The Exon proposal would expand current restrictions on telephone
- access
- by minors to dial-a-porn services to include online access to indecent
- material, requiring service providers to purge "indecent" material from
- public bulletin boards and discussion groups to avoid accidental viewing by
- a minor.
-
- In effect, online providers would be forced to offer to adults only that
- content that is "suitable for minors."
-
-
- S. 314 is nearly identical to an amendment Senator Exon successfully
- attached to last year's Senate version of the telecommunications law
- overhaul. Last year's bill died for unrelated reasons, but the Senate
- Commerce Committee is determined to pass new telecommunications legislation
- this year that could easily include the Exon proposal.
-
- The ACLU opposes the restrictions on speech imposed by this legislation
- because they violate the First Amendment's guarantee of free expression.
- Forcing carriers to pre-screen content violates the Constitution and
- threatens the free and robust expression that is the promise of the Net.
- The Constitution requires that any abridgement of speech use the least
- restrictive means available -- the language of the Exon proposal is clearly
- the most restrictive because it sweeps broadly against a wide array of
- protected material involving sexual expression.
-
- Stop the information superhighway from becoming the most censored segment
- of communications media!
-
- ACT NOW:
-
- Urge members of the Senate Committee on Commerce, Science, and
- Transportation:
-
- *To oppose the Exon proposal, or any Senate or House variation.
-
- *To drop the Exon proposal BEFORE it goes to the Senate floor.
-
- *To hold full hearings on the Exon proposal and to review it thoroughly
- before it goes to the Senate floor.
-
- *To reject any effort to attach the Exon proposal to the Senate
- telecommunications legislation.
-
- THE EXON PROPOSAL COULD BE LAW WITHIN WEEKS IF WE DON'T ACT TODAY.
-
- Send your letter by e-mail, fax, or snail mail to:
-
- Senator Larry Pressler, S.D.
- Chairman, Committee on Commerce, Science, and Transportation
- SR-254 Russell Senate Office Building
- Washington, DC 20510-6125
- (202) 224-5842 (phone)
- (202) 224-1630 (fax)
- e-mail: larry_pressler@pressler.senate.gov
-
- To maximize the impact of your letter, you should also write to the members
- of the Senate Commerce Committee and to your own Senators.
-
- A sample letter is attached.
-
- Majority Members of the Senate Commerce Committee
-
- Senator Bob Packwood, Ore.
- SR-259 Russell Senate Office Building
- Washington, DC 20510-3702
- (202) 224-5244 (phone)
- (202) 228-3576 (fax)
-
- Senator Ted Stevens, Alaska
- SH-522 Hart Senate Office Building
- Washington, DC 20510-0201
- (202) 224-3004 (phone)
- (202) 224-1044 (fax)
-
- Senator John McCain, Ariz.
- SR-111 Russell Senate Office Building
- Washington, DC 20510-0303
- (202) 224-2235 (phone)
- (202) 228-2862 (fax)
-
- Senator Conrad Burns, Mont.
- SD-183 Dirksen Senate Office Building
- Washington, DC 20510-2603
- (202) 224-2644 (phone)
- (202) 224-8594 (fax)
-
- Senator Slade Gorton, Wash.
- SH-730 Hart Senate Office Building
- Washington, DC 20510-4701
- (202) 224-3441 (phone)
- (202) 224-9393 (fax)
- e-mail: senator_gorton@gorton.senate.gov
-
- Senator Trent Lott, Miss.
- SR-487 Russell Senate Office Building
- Washington, DC 20510-2403
- (202) 224-6253 (phone)
- (202) 224-2262 (fax)
-
- Senator Kay Bailey Hutchison, Tex.
- SH-703 Hart Senate Office Building
- Washington, DC 20510-4303
- (202) 224-5922 (phone)
- (202) 224-0776 (fax)
- e-mail: senator@hutchison.senate.gov
-
- Senator Olympia J. Snowe, Maine
- SR-174 Russell Senate Office Building
- Washington, DC 20510-1903
- (202) 224-5344 (phone)
- (202) 224-6853 (fax)
-
- Senator John Ashcroft, Mo.
- SH-705 Hart Senate Office Building
- Washington, DC 20510-2504
- (202) 224-6154 (phone)
- (202) 224-7615 (fax)
-
- Minority Members of the Senate Commerce Committee
-
- Senator Ernest F. Hollings, S.C.
- SR-125 Russell Senate Office Building
- Washington, DC 20510-4002
- (202) 224-6121 (phone)
- (202) 224-4293 (fax)
-
- Senator Daniel K. Inouye, Hawaii
- SH-772 Hart Senate Office Building
- Washington, DC 20510-1102
- (202) 224-3934 (phone)
- (202) 224-6747 (fax)
-
- Senator Wendell H. Ford, Ky.
- SR-173A Russell Senate Office Building
- Washington, DC 20510-1701
- (202) 224-4343 (phone)
- (202) 224-0046 (fax)
- e-mail: wendell_ford@ford.senate.gov
-
- Senator J. James Exon, Neb.
- SH-528 Hart Senate Office Building
- Washington, DC 20510-2702
- (202) 224-4224 (phone)
- (202) 224-5213 (fax)
-
- Senator John D. (Jay) Rockefeller IV, W. Va.
- SH-109 Hart Senate Office Building
- Washington, DC 20510-4802
- (202) 224-6472 (phone)
- (202) 224-1689 (fax)
-
- Senator John F. Kerry, Mass.
- SR-421 Russell Senate Office Building
- Washington, DC 20510-2102
- (202) 224-2742 (phone)
- (202) 224-8525 (fax)
-
- Senator John B. Breaux, La
- SH-516 Hart Senate Office Building
- Washington, DC 20510-1803
- (202) 224-4623 (phone)
- (202) 224-2435 (fax)
-
- Senator Richard H. Bryan, Nev.
- SR-364 Russell Senate Office Building
- Washington, DC 20510-2804
- (202) 224-6244 (phone)
- (202) 224-1867 (fax)
-
- Senator Byron L. Dorgan, N.D.
- SH-713 Hart Senate Office Building
- Washington, DC 20510-3405
- (202) 224-2551 (phone)
- (202) 224-1193 (fax)
-
- You can also write or fax your own Senator at:
-
- The Honorable ______________________
- U.S. Senate
- Washington, D.C. 20510
-
- Senate directories including fax numbers may be found at:
-
- gopher://ftp.senate.gov:70
- gopher://una.hh.lib.umich.edu:70/0/socsci/polscilaw/uslegi
-
-
- Additional information about the ACLU's position on this issue and others
- affecting civil liberties online and elsewhere may be found at:
-
- gopher:\\aclu.org:6601
- OR request our FAQ at infoaclu@aclu.org
-
- -----------------------------------------------cut
- here----------------------------------------------------------
-
- SAMPLE LETTER
-
- Dear Senator _______:
-
- I am writing to urge you to oppose the restrictions on speech that would be
- imposed by the legislation introduced by Senator Exon, known as the
- Communications Decency Act of 1995, S.314, introduced on 2/2/95. The Exon
- proposal would severely restrict the flow of online information by
- requiring service providers to act as private censors of e-mail messages,
- public forums, mailing lists, and archives to avoid criminal liability. I
- believe that online users should be the only censors of the content of the
- messages they receive.
-
- I urge you to:
-
- *Oppose the Exon proposal, or any Senate or House variation.
-
- *Drop the Exon proposal BEFORE it goes to the Senate floor.
-
- *Hold full hearings on the Exon proposal and review it thoroughly before
- it goes to the Senate floor.
-
- *Reject any effort to attach the Exon proposal to the Senate
- telecommunications legislation.
-
- Sincerely,
-
- [name]
- --
- ACLU Free Reading Room | American Civil Liberties Union
- gopher://aclu.org:6601 | 132 W. 43rd Street, NY, NY 10036
- mailto:infoaclu@aclu.org| "Eternal vigilance is the
- ftp://ftp.pipeline.com | price of liberty"
-
- ------------------------------
-
- Date: Wed, 01 Mar 1995 15:08:19 -0600
- From: /G=Brad/S=Hicks/OU1=0205465@MHS-MC.ATTMAIL.COM
- Subject: File 4--Tired of S.314 Hysteria
-
- Am I the only person tired of being spammed about S.314, or just the
- first one to complain about it? Do I have to read seven to ten copies
- of this in every newsgroup, even areas as obscure as
- alt.games.whitewolf? All this, on top of the maybe twenty or thirty
- copies I've gotten as e-mail?
-
- Can there possibly be anyone on the planet with an e-mail address who
- =doesn't= know about S.314?
-
- Now, that being said, I finally read one of the marked up copies of
- the current law, showing the changes that S.314 would make. And
- having read them, I am convinced that every single analysis I have
- read is either mistaken, exaggerated, or an outright lie.
-
- It's right there in the text. The section that everybody is scared
- of, the one that makes telecommunications vendors responsible for any
- obscenity or threats that swim in their bitstreams, is prefaced with
- "Whosoever KNOWINGLY ...." (Emphasis added.)
-
- That's right. They left in the word "knowingly." Which means that if
- somebody uses your BBS, or your email service, or your anonymous
- remailer to send someone an invitation to be the star in a
- pornographic snuff film, and you don't know about it, you're not in
- violation of the Exon bill.
-
- The easily alarmed might worry that some court will say that you
- =could= have known, and therefore =should= have known. But that's not
- up to prosecutors, that's up to juries. When witnesses testify as to
- how many kilobytes or megabytes flow through your system per night, no
- jury is going to say that you should have read it all. If you present
- evidence that you couldn't have known, because those bits were all
- encrypted and people didn't tell you what was in them, nobody's going
- to rule that you =could= have known, let alone =should= have.
-
- So. What do the people who oppose S.314 =and who understand it=
- REALLY want? The only reason I see to oppose S.314 is if you =want=
- BBS sysops and telephone sex vendors to be immune to obscenity and
- harrassment laws.
-
- If you want it to be legal for people to use email, or web pages, or
- improvised FidoNets or whatever to send around JPGs of perverts raping
- 6 year olds, or detailed descriptions of rape/murder/torture fantasies
- with people's real names for the victims, or GIFs of people having sex
- involving excrement, carving knives, and/or animals ... well, then say
- so!
-
- Because if that's what you want, then I agree with you 100%. As the
- late great Justice Hugo Black said, "I am a plain and simple man. I
- believe that when the Constitution says, 'no laws,' it MEANS 'no
- laws.'" Of course, there's no way that the American people will
- permit this. However, that's not, in my opinion, a moral reason to
- lie about the contents of a proposed law, and stir up a net.lynch.mob.
-
- ------------------------------
-
-
- ------------------------------
-
- Date: Sun, 26 Feb 1995 22:51:01 CDT
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 5--Cu Digest Header Info (unchanged since 26 Feb, 1995)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send a one-line message: SUB CUDIGEST your name
- Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB <your name>
- Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
- In ITALY: Bits against the Empire BBS: +39-464-435189
- In LUXEMBOURG: ComNet BBS: +352-466893
-
- UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
- JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD
- ftp://www.rcac.tdi.co.jp/pub/mirror/CuD
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu:80/~cudigest
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #7.17
- ************************************
-
-
-