home *** CD-ROM | disk | FTP | other *** search
Text File | 2003-06-11 | 51.3 KB | 1,006 lines |
-
- Computer underground Digest Wed Mar 20, 1996 Volume 8 : Issue 22
- ISSN 1004-042X
-
- Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
- News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Field Agent Extraordinaire: David Smith
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
-
- CONTENTS, #8.22 (Wed, Mar 20, 1996)
-
- File 1--The CDA challenge is about to begin!
- File 2--Shimomura's "Takedown" v. Littman's "Fugitive Game"
- File 3--"Takedown": A Postmodernist Romance
- File 4--CFP96 - the Sixth Conference on Computers, Freedom, and Privacy
- File 5--Dorothy Denning attacks Leahy's crypto bill
- File 6--Cu Digest Header Info (unchanged since 16 Dec, 1995)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: Wed, 20 Mar 1996 13:32:48 -0800 (PST)
- From: Declan McCullagh <declan@EFF.ORG>
- Subject: File 1--The CDA challenge is about to begin!
-
- Read on for more information on the details of the court challenge.
-
- -Declan
-
-
- // declan@eff.org // I do not represent the EFF // declan@well.com //
-
-
-
- March 20, 1996
-
- _____________________________________________________
- News from the ACLU National Headquarters
-
-
- ACLU V. RENO: Background Briefing
-
- Three-Judge Panel to Hear ACLU Testimony in
- Landmark Challenge to Internet Censorship Law
-
- PHILADELPHIA, PA--Beginning tomorrow, a three-judge panel in
- federal district court in Philadelphia will hear testimony in the
- consolidated cases of ACLU et al v. Reno and American Library
- Association et al v. Reno, the landmark challenge to censorship
- provisions of the Telecommunications Law of 1996.
-
- Free speech in cyberspace is at stake as the first major legal
- challenge to censorship on the Internet gets underway. The case began
- when the ACLU filed a motion for a temporary restraining order against
- indecency provisions of the Telecommunications Bill immediately after
- it was signed into law by President Clinton on February 8. The suit
- challenges provisions of the law that criminalize making available to
- minors "indecent" or "patently offensive" speech.
-
- Acting on behalf of 20 individuals and organizations that provide
- information via the Internet -- including itself -- the ACLU said it
- was moving quickly because it feared that the telecommunications
- legislation would have an immediate impact on the Internet.
-
- Following this action, a second legal challenge was filed on
- February 26 by a coalition of more than 20 corporate and trade
- organizations known as the Citizens Internet Empowerment Coalition
- (CIEC). The CIEC suit, organized by the American Library Association,
- America Online and the Center for Democracy and Technology, was
- formally consolidated with ACLU v. Reno.
-
- The CIEC lawsuit, which addresses essentially the same issues as
- the ACLU challenge, further illustrates the broad spectrum of
- individuals and organizations that would be affected by the censorship
- provisions, and strengthens the case for a finding that the law is
- unconstitutional.
-
-
- The Court Case
-
- According to procedures laid out by the judges, direct testimony
- in ACLU v. Reno is to be submitted via affidavit. During the three
- days of testimony allowed, which will take place over March 21 and 22
- and April 1, lawyers for the Department of Justice will cross-examine
- coalition witnesses, after which lawyers for the ACLU and ALA
- coalitions will have an opportunity to redirect, i.e., question their
- witnesses in response to the government's cross-examination.
-
- In preparation for the case, lawyers for the Department of Justice
- have been deposing all the ACLU and CIEC witnesses it may choose to
- cross-examine. So far, government lawyers have declined to cross-
- examine only two witnesses: Christine Soto and Hunter Allen, teenagers
- whose affidavits attest to the importance of uncensored access to the
- Internet by minors.
-
- The government is scheduled to present its witnesses for cross-
- examination on April 11 and 12, 1996. A fourth day of testimony has
- been scheduled for April 26, to allow the ACLU and ALA coalitions to
- present witnesses rebutting the government's testimony. Following
- these six days of trial, the judges will issue a ruling. Depending
- on the outcome, either side may seek an appeal to the U.S. Supreme
- Court.
-
-
- The Witnesses
-
- Thursday, March 21:
- --Scott O. Bradner, senior technical consultant, Information Technology
- Services, Harvard University (ALA)
- --Ann W. Duvall, president, SurfWatch Inc. (ALA)
- --Patricia Nell Warren, author and publisher, WildCat Press (ACLU)
-
- Friday, March 22
- --Donna Hoffman, associate professor of management, Owen Graduate School
- of Management, Vanderbilt University (ACLU)
- --William Stayton, psychologist and Baptist minister (ACLU)
- --Robert B. Cronenberger, director, Carnegie Library of Pittsburgh
- Professor (ALA)
- --Kiyoshi Kuromiya, director, Critical Path AIDS Project (ACLU)
-
- Monday, April 1
- --Howard Rheingold, author and cyberspace expert
- --Barry Steinhardt, associate director, ACLU
- --Stephen Donaldson, Stop Prisoner Rape
-
- (*Note: schedule is subject to change)
-
-
- Chronology
-
- February 7
- -- At a news conference in Washington, D.C., the ACLU announces plans
- to seek a temporary restraining order against indecency provisions of
- the Telecommunications Bill immediately after it is signed into law
- by President Clinton on February 8.
- --The ACLU announces the launch of its new "Freedom Network" World
- Wide Web site, <http://www.aclu.org>, with a home page declaring,
- "Keep Cyberspace Free." Over 200,000 hits are recorded in the first
- 48 hours of the launch.
-
- February 8
- --The ACLU files its legal challenge in federal district court in
- Philadelphia before Judge Ronald L. Buckwalter.
- -- In the first court action over the constitutionality of the
- Communications Decency Act , Judge Buckwalter directs the government
- to refrain from prosecuting for so-called indecent or patently
- offensive material online until the motion for a TRO is decided.
- -- The judge instructs the government to file a reply brief to the
- ACLU's request for a TRO within one week.
- --Government lawyers conceded that the abortion speech restrictions
- of the CDA are unconstitutional.
-
- February 15
- -- Judge Buckwalter grants a temporary restraining order on the
- indecency provisions of the Communications Decency Act, and denies
- the TRO motions on prosecution for "patently offensive material" and
- on the "Comstock Law" abortion speech provisions of the CDA.
- --A three-judge panel is convened to hear the case: Chief Judge
- Dolores K. Sloviter, Judge Stuart Dalzell, and Judge Ronald L.
- Buckwalter.
-
- February 21
- --More than 5,000 visitors to the ACLU website use the "instant action"
- feature to e-mail or fax Attorney General Janet Reno, urging her not
- to prosecute under the new law.
-
- February 23
- -- ACLU announces that government lawyers have agreed not to initiate
- investigations or prosecute Internet "indecency" until three-judge
- court rules on the case.
- --Hearing dates set for the case; the ACLU will present its evidence
- on March 21 and 22, with April 1 reserved. The government's dates
- are April 11 and 12, 1996. The total trial is scheduled to last five days.
-
- February 26
- --More than 20 corporate and trade organizations, known as the Citizens
- Internet Empowerment Coalition (CIEC), initiate a second legal
- challenge to the Communications Decency Act.
-
- February 27
- --The CIEC suit, organized by the American Library Association, America
- Online and the Center for Democracy and Technology, is formally
- consolidated with ACLU v. Reno.
-
- March 21
- --Trial opens at 9:30 a.m. in the ceremonial courtroom in federal
- district court in Philadelphia.
-
- ###
-
- Contact: Emily Whitfield, (212) 944-9800 ext.426
-
- _________________________________________________________________
- Media Relations Office 132 W 43rd Street, NYC 10036 (212) 944-9800 ext. 414
-
- ------------------------------
-
- Date: Wed, 20 Mar 1996 13:04:41 -0600 (CST)
- From: Crypt Newsletter <crypt@sun.soci.niu.edu>
- Subject: File 2--Shimomura's "Takedown" v. Littman's "Fugitive Game"
-
- Mitnick reviewed: Shimomura's "Takedown" v. Littman's "Fugitive Game"
-
- Through spring at least two books will probably catch your eye
- as US publishers vie for position in the Kevin Mitnick-money chase:
- Tsutomu Shimomura's "Takedown," an auto-hagiography of the author that
- only incidentally deals with the dark-side hacker, and writer John
- Littman's "The Fugitive Game" which holds up much better than
- "Takedown" in terms of human interest, computer shenanigans and
- controversy.
-
- "Takedown" (Hyperion) is an unpleasant, tedious read revolving
- around the reality that while Shimomura may have been able to track
- Kevin Mitnick, he can barely write an interesting story even with
- New York Times reporter John Markoff to prop him up.
-
- "Takedown's" turgid quality is magnified by Shimomura's intent
- to sing a paean to himself and his computer feats. He's so
- hell-bent on it, in fact, he comes off unselfconsciously repellent.
- In "Takedown," everyone but Shimomura and his cohort, John Markoff, are
- criminal worms, in the way, or country bumpkins and dolts.
-
- The reader will feel particularly sorry for the FBI's Levord Burns. As
- written up in "Takedown," Burns is a fossilized piece of wood,
- intermittently described as either always home in bed fast asleep when
- the game's afoot, baffled to the point of silence by the technical
- nature of the pursuit of Mitnick, or falling into a doze on the
- telephone while being badgered to perform some minor duty connected
- with the chase. The Computer Emergency Response Team is a vague,
- inefficient, slow-moving bureaucracy. The NSA is another big, dumb
- government institution to Shimomura, even though he's trying to squeeze
- funding from it at the beginning of the tale. Andrew Gross, Shimomura's
- Renfield, is always screwing things up, tampering with files, messing up
- evidence or being a stumblebum for our cyber-Poirot. Julia Menapace, the
- girlfriend, is a co-dependent who can't decide to throw over her
- ex-paramour - John Gilmore of Sun Microsystems - fast enough for our
- hacker tracker, even while Shimomura's being a cad with her in Gilmore's
- home.
-
- At least fifty percent of "Takedown" is devoted to Shimomura explaining
- his life of privilege in the same detail he uses to describe the
- names of his computers. Eventually, the battle is joined and our
- cyber-sleuth and his entourage light out on the trail of Mitnick,
- blamed for invading Shimomura's computer over Christmas. It would be
- exaggerating to say this is interesting. The details of the
- Mitnick-hysteria and Shimomura chase have been repeated so often in the
- media already none of the story is fresh except for parts near the
- end where Shimomura grudgingly admits that it might not have been
- Mitnick who was into his computers in the first place, but an unknown
- collaborator who finally panicked and begged him off the chase
- in a message on his answering service after Mitnick was in custody.
- Yes, but Mitnick and his collaborator called Shimomura names and made
- dirty jokes about our hero on an Internet talk channel, dammnit!!
- That made it personal! Nyahh, nyahh, nyahh! And Mitnick was reading
- other people's mail on the Well and into Netcom! Of course, Kevin
- Mitnick is no hero but Shimomura's a thin, thin choice for
- a celebrity cybersavior. Ultimately, "Takedown" is completely lacking
- in the kind of humanity, self-effacing wit and style of Cliff Stoll's
- "The Cuckoo's Egg," a prior classic on hacker takedown, mostly because
- its author can't help being a boor.
-
- However, there is a choice on bookshelves. Jonathan Littman's
- "The Fugitive Game" (Little, Brown) is better. For reasons probably
- having to do with the general knowledge that Littman was writing a
- book about hackers, Mitnick started calling the reporter regularly
- during the same period of time Shimomura was on his case. And unless
- Littman's making everything up, the result makes Shimomura and John
- Markoff look like turds.
-
- Littman's book bolsters the idea that it wasn't Mitnick who was
- into Shimomura's system and that what the San Diego scientist did
- wasn't particularly special -- a Seattle man, Todd Young, had
- tracked and spotted the hacker in that city long before Shimomura
- came along but allowed him to escape through a combination of
- ignorance, bad luck and disinterest in the gravity of Mitnick's
- alleged criminal doings.
-
- In "The Fugitive Game," Littman accuses Markoff and Shimomura of
- a cozy relationship stemming from an old article in WIRED
- magazine on cellular phone crime. Markoff's original article
- anonymized the identities of the cell phone hackers because they
- were playing around with illegality. Littman insists they were
- Shimomura and Mark Lottor, an acquaintance of the author and hacker
- Kevin Poulsen. The story goes that Shimomura reverse-engineered
- code designed to program an Oki cellular phone for the purpose of
- reprogramming it into a transmission snooper, or something like
- that. When Shimomura's computer was broken into, the material
- was copied off it. Littman draws the conclusion in "The Fugitive
- Game" that Shimomura, in addition to being fired up over the invasion
- of his system, was also embarrassed by the loss of this software,
- software he engineered, the author implies, under quasi-legal
- circumstances. Indirectly, "Takedown" supports this argument.
- Shimomura obsesses over the loss of a file which a reader of both
- books might guess contained the Oki software.
-
- Throughout "The Fugitive Game," for the first time in book, Mitnick
- is portrayed as a real human being, not a caricature. He has a sense of
- humor, regrets, weaknesses, and a pack of serious neuroses stemming from
- his jail-time and uncontrollable cyber-fame. But the author isn't
- easy on him: Mitnick also comes off as a hardened con-man who relishes
- snooping other people's privates, cruel treachery, and duping the
- unwitting into compromising themselves or their places of employment.
-
- At one point Mitnick indicates something very interesting about
- users of Pretty Good Privacy. Some users of it on the 'Net,
- particularly those running services hooked directly to it,
- keep their PGP software on the public host. Mitnick laughs at the
- lapse - he implies it's been a simple matter for him to put a
- backdoor into the PGP source which deliver the keys and passphrase
- of the user to another spot on the host he's invaded, compile it and
- replace the original host copies. From here, it's simple, he maintains,
- to read their encrypted mail -- this in a conversation on Mark Lottor
- in which the hacker says he's read Lottor's electronic correspondence.
-
- If there's a need for a bona fide, hiss-able villain in "The
- Fugitive Game," Littman produces one: Justin Petersen. Petersen
- aka Agent Steal, is a side-plot in the book: a pathological
- liar, car thief, and con-man who portrays himself as a
- combination cyberpunk/heavy metal rock 'n' roller. Fond of
- artificially busty stripper/hookers from the sleazy end of Sunset in
- Hollywood, Littman paints Petersen as the maximum disinformer
- and criminal -- a squealer for the FBI who embarrassed the agency
- by embezzling Social Security funds and then going on the lam when
- lawmen tried to reel him in. "The Fugitive Game" has him
- bargaining with the FBI for tidbits on Mitnick's whereabouts.
-
- Littman wraps up "The Fugitive Game" with broadsides at Shimomura
- and Markoff. With Markoff playing Mitnick as the enemy of all
- computerized civilization on the front page of the New York Times,
- the stage was set to ensure maximum hysteria and the subsequent
- introduction of the reporter's friend, Tsutomu Shimomura, into
- a carefully arranged media spotlight. Behind the scenes, Markoff's
- agent was negotiating a big money deal - approximately $2 million,
- says Littman - for the reporter and Shimomura, three days before
- Markoff put the physicist on the front page of the New York Times.
-
- Ironically, the increasing cynicism which is the natural crop sown
- and cultivated by this type of media rigging for the benefit of men
- of privilege is a tale of treachery and contempt, too, but one that
- goes well beyond hacker Kevin Mitnick.
-
- Crypt Newsletter 35 (http://www.soci.niu.edu/~crypt)
-
- ------------------------------
-
- Date: Wed, 20 Mar 1996 18:23:32 (CST)
- From: Jim Thomas <jthomas@well.sf.ca.us>
- Subject: File 3--"Takedown": A Postmodernist Romance
-
- TAKEDOWN: The Pursuit and Capture of Kevin Mitnick, America's Most
- Wanted Computer Outlaw--by the Man who did it. Tsutomu Shimomura
- (with John Markoff). 1995. New York: Ballantine. 324 pp. $24.95
- (cloth). Reviewed by: Jim Thomas.
-
- Despite the pretentious title, TAKEDOWN is a subtle and complex
- narrative of emotional angst, indecision, alienation, and
- romance. Against the backdrop of the seamy underside of computer
- culture, TAKEDOWN deconstructs gender relations in contemporary
- society by depicting a lovers' triangle of dependence and
- co-dependence played out in hot tubs, ski lodges, and at computer
- consoles. John Markoff cleverly uses the "as told to" literary
- style to create distance between author, story narrator, and the
- subject, a young California woman named Julia. This ingenious
- layering further heightens the isolation of Julia from the
- reader, creating a pathos rarely found in contemporary
- literature. Markoff skillfully combines irony with a playful
- stylistic pastiche in juxtaposing Julia's dramatic complexity
- with the mundane vision of the unsympathetic narrator.
-
- Small wonder, then, that TAKEDOWN made it to seventh place on the New
- York Times Business Best Sellers and may eventually be a movie.
-
- We learn that Julia (to be played by Claudine Longet) is beautiful,
- in her mid-30s:
-
- A tall, graceful woman who is strong and wiry, and who often
- wears her hair drawn back in a braid...With an intense gaze and
- blue-gray eyes, Julia was often introspective but also quick to
- laugh. She was a talented yoga teacher and had an ethereal
- quality...." (p. 7-8).
-
- She's also very bright (a computer programmer). But, as we learn from
- Skiamour, the tale's narrator (to be played by Spider Sabitch), who
- depicts her as an emotional flake even while lauding her feminine
- charms while trying to woo her affections from her boyfriend, she's
- co-dependant on her boyfriend's hangups and has a few of her own.
- But, her primary character flaw seems to be that she won't leave her
- boyfriend for the skier.
-
- The story opens with Julia flying back from Bangkok, looking for
- someone to pick her up at the airport. Julia's boyfriend John, a
- nationally-respected computer wizard (to be played by Andy Williams),
- is visiting relatives over Christmas. In his absence, she asks a
- friend of her boyfriend to pick her up, maybe because he drives fast
- (310 klicks in a snowstorm in under two hours?) or because he's macho
- (he even carried is ice pick through airport security and "nobody
- even blinked"). Or, maybe Julia likes self-absorbed skiers who race,
- serve in the Nordic ski patrol, teach skiing, and in their spare time
- do computer programming. Or, maybe she's a sucker for guys who speak
- in "kilometers" instead of miles.
-
- Julia quickly ends up in the jacuzzi with Skiamour at John's house,
- splashing amidst fronds of fern and four overhead spotlights that
- dimly illuminate each corner of the tub and steamy air. "This is
- just amazing," murmurs Julia (p. 13), relating tales of Sherpa
- guides, mountain trekking, and birthday blessings from a Tibetan
- Lama. Skiamour, in turn, told tales of unforthcoming research grants
- and stupid bureaucrats. Then, lost in thought and perhaps overcome by
- the steamy silence (and, of course, the absence of her boyfriend), he
- proposed. Well, almost:
-
- "I want to tell you something I've been thinking about," I said.
- "I've thought about a lot of things while you were away. I'd
- really like to try having a committed relationship with you, if
- you're willing to." (p. 20).
-
- Julia remained silent, but reached over and held him closely. "Why
- don't you come with me and live in the mountains?" he asked. "You can
- come ski and it will be good to be outside."
-
- Careless readers might see such dialogue as simply banal. But,
- in fact the dialogue--and it occurs throughout the book--further
- illustrates Markoff's ability to heighten the contrasts between
- the sympathetic Julia and the shallowness of Skiamour.
-
- The idyllic love-fest, however, is interrupted by one or more
- computer hackers breaking into the boyfriend's computer, then into
- Skiamour's computer, and even into his voicemail. One of the hackers
- was Kevin Mitnick (to be played by Matthew Broderick), which sets up
- the chase in which Julia follows him (Skiamour, not Mitnick) around
- the Bay area, and eventually across the country, as they pursue their
- quarry from system to system.
-
- Things heat up when the boyfriend returns. Skiamour calls John to ask
- about the computer probes, and learns that "he had become
- increasingly uncomfortable about my contact with Julia. It was a
- strained conversation." Now, if a friend of mine had been snookering
- up to my girlfriend in my hot tub professing love to her and steamily
- proposing a committed relation while I was away, I'm not sure that
- "uncomfortable" about his "contact" is quite how I'd describe it.
- Let's see--Skiamour has taken Julia down in the hot tub in John's
- house, in ski resorts, in....well, you get the idea. The book is,
- after all, called TAKEDOWN. Contra the narrator's judgment, the boy
- friend seems to be handling things remarkably well.
-
- Julia remains torn between her two men. This doesn't make Skiamour
- jealous. He's above such things, spending as much time with her as he
- can, while simultaneously wondering if she's not being
- self-destructive in her unwillingness to break off with her
- boyfriend, presumably to spend more time on the slopes with him. The
- boyfriend, however, seems to act jealous, despite "politically
- correct" protestations to the contrary. At least, this is Skiamour's
- interpretation. So, it must be true--he is, after all, a detached,
- objective paragon of judgment in affairs of the heart and loins.
-
- The yarn continues, with Julia and Skiamour hopping in bed, riding in
- cars, hiking, and meeting hither and yon. Markoff (to be played by
- Brock Meeks) paints a stark picture of an independent woman dependent
- upon her men, unable to chose between them, unwilling to give up one
- and commit to another. Julia is portrayed as the archetypical
- new-age "gypsy professional," semi-rootless, no established career or
- plans, and living on the economic precipice, needing the strong hand
- and wisdom of a good man to guide her.
-
- But, this isn't a Roshomon tale, and a reader might wonder how the
- tale's denouement would differ if told through her eyes.
-
- How does it all end? Ah...this is Markoff's mastery. His
- naturalistic narrative shifts to a final trope of realism:
- Relationships are never easily defined, resolutions are rarely clear,
- and emotional angst isn't dissolved in a few hundred pages. And, as
- in any good work, the reader is left wanting more of Julia.
-
- Oh yeah. TAKEDOWN also has some stuff in it about Tsutomu Shimomura,
- a Silicon Valley computer wizard obsessed with tracking down Kevin
- Mitnick, who hacked into his computer and maybe (or maybe not)
- harassed him via voice mail. The guy seems unlikable, perhaps because
- he comes across like a megalomaniac who likes to ski and slam
- everybody who he thinks is dumber than he, which seems to be almost
- everybody, including The Well personnel, the FBI, hackers, students
- who play practical jokes, bureaucrats, former employers, and most
- other lesser mortals. Even John Markoff receives a few hits. Markoff
- does an admirable job with the material available. But, frankly,
- Shimomura simply is neither likeable nor interesting, and other than
- his computer skills, there isn't enough "there" there to pull the
- reader in. From his self-descriptions, I was left with the
- impression that Shimomura is the Martha Grant of the computer
- world--he does everything so much better than us.
-
- His tracking of Mitnick is impressive, but lacks the flair and drama
- of Cliff Stoll's chase in THE CUCKOO'S EGG. Other than the aura of
- Julia, there is little humanity, compassion, or even a sense of a
- strong morality play. Even Markoff's considerable writing skills
- can't spin silk from a sow's ear. And, even one mixed
- metaphor--hell, any(!) metaphor--might have broken the monotonous
- self-righteousness of Shimomura's occasional mean-spirited
- self-absorption.
-
- Still, Markoff's writing salvages the work, and if one is able to
- focus on the subtexts and avoid Shimomura's cloying egoism, reading
- it is not an unpleasant way to spend an evening. Hopefully, there
- will be a sequel sans Shimomura, and we can catch up on Julia's life.
- Both it and she seem far more interesting.
-
- Oh--and if, as one insider warns, you bump into Shimomura, don't
- introduce him to your girlfriend.
-
- ------------------------------
-
- Date: Tue, 19 Mar 96 11:40:54 EST
- From: Robert Prior <prior@MIT.EDU>
- Subject: File 4--CFP96 - the Sixth Conference on Computers, Freedom, and Privacy
-
- CFP96 - The Sixth Conference on Computers, Freedom & Privacy
-
-
- For immediate release Contact: Robert V. Prior
- March 19, 1996 (617) 253-1584
- prior@mit.edu
-
- MIT to Host Internet and Civil Liberties Conference
-
- CAMBRIDGE, MA -- From electronic commerce--to access to information--to
- participation in electronic democracy, computer and telecommunications
- technologies can enrich our lives by enhancing our freedom to speak, to
- associate, to be left alone, and to exercise political power. At the same
- time, these technologies and the organizations that control them pose
- threats to these same freedoms. Personal privacy is increasingly at risk,
- as is the privacy of our electronic communications and transactions.
- Societal gaps between haves and have-nots are widening.
-
- These technological advances enable new forms of illegal activity, creating
- new challenges for the legal and law enforcement communities. Yet the
- technologies used to combat these new cybercrimes can themselves threaten
- the freedoms we take for granted.
-
- The Sixth Conference on Computers Freedom and Privacy (CFP), which will
- explore these issues, will be hosted by Massachusetts Institute of
- Technology from March 27-30 at the Cambridge Hyatt Regency. Hosted this
- year in conjunction with the MIT Laboratory for Computer Science and the
- World Wide Web Consortium, the conference has, since its inception in 1991,
- brought together international experts from the fields of computer science,
- law, business, public policy, law enforcement, and government to confront
- controversial issues that have dominated public discussions of computer
- communications policy over the past year. Highlights of the conference
- include:
-
- - FBI/DOJ law-enforcement training on computer crime. On the afternoon of
- March 27th, Peter Toren of the US Department of Justice Computer Crime Unit
- and Richard Ress, Head of the FBI's National Computer Crime Squad, will run
- a training session on crime and law in cyberspace. Admission to this
- tutorial will be free for law-enforcement personnel, so long as they
- pre-register.
-
- On Thursday, March 28th
-
- - The Constitutional challenge to the Communications Decency Act. Computer
- companies, internet service providers, publishing and library associations,
- and civil liberties groups have filed suit in Federal court to overturn the
- Communications Decency Act of 1996 on the grounds that it violates the
- First Amendment. A judgment is expected in April. Lawyers involved in the
- ongoing suit will discuss the suit's progress and analyze the
- Constitutional arguments raised by the challengers and by the Department of
- Justice. One basis for the challenge is the existence of less restrictive
- means to protect children from indecent material on-line, including
- filtering software developed at MIT.
-
- - Freedom and Privacy in the Information Age: A European Perspective will
- be the keynote address by George Metakides, Director of Research and
- Development in Information Technologies for the European Union.
-
- - Can the US government outlaw unauthorized encryption? In cooperation
- with the Criminal Justice Section of the American Bar Association, there
- will be a moot Court hearing on the Constitutionality of a proposed law
- that criminalizes the use of encryption methods that have not been
- authorized by the government. The arguments, which pit former federal
- prosecutors against noted civil liberties lawyers, will be conducted before
- a distinguished panel of federal appellate and district court judges.
-
- - Export-controlled encryption software on the Internet. Jeff Schiller,
- Manager of the MIT Network, and Ron Lee, General Counsel of the National
- Security Agency, will describe the legal and technical procedures for
- distributing software over the Internet in compliance with US export
- controls.
-
- - "Ancient Humans in the Information Age." Michael Dertouzos, Director of
- the MIT Laboratory for Computer Science, will address: Will the Information
- Market increase the gap between rich and poor? Will it affect democracy and
- our tribal aggregation into nations? And what influence might it have on
- human relationships? Our assessment of these issues will be informed by the
- value of information and electronic proximity, acting under an ancient and
- powerful constant --human nature.
-
- On Friday, March 29th
-
- - Freedom of expression in digital networked environments, will copyright
- law be an enabler or an impediment? Does digitizing information so
- fundamentally change the economics of creating and disseminating
- information products as to render copyright law obsolete? Pamela Samuelson
- of Cornell Law School will explore this topic with an international panel
- of copyright experts.
-
- - Limiting on-line speech on campus. Harvard Law School's Arthur Miller
- will moderate a panel of university administrators, lawyers, and
- journalists to explore the conflicts between universities and the
- free-speech rights of their students.
-
- - Electronic Money. Should on-line payments be anonymous or traceable?
- David Chaum of DigiCash, the American Bankers Association's Kawika Daguio,
- Stan Morris of FINCEN (the Financial Crimes Enforcement Network) and other
- experts will compare perspectives.
-
- - The struggle to control controversial content on the Internet is being
- waged in the U.S. Congress and in open and restrictive societies around the
- world. Will conflicts among governments over what and how to censor
- restrict the flow of ideas for all? Moderator Danny Weitzner of the
- Washington-based Center for Democracy and Technology and an international
- panel will offer their views.
-
- On Saturday, March 30th
-
- - Data privacy in the Global Information Infrastructure will be a
- discussion of the roles of governments and technology with privacy advocate
- Marc Rotenberg and a panel of international experts.
-
- - China and the Internet. The Chinese expression "may you live in
- interesting times" clearly applies to issues of computers and society as
- the Internet spreads explosively throughout China and the rest of Asia.
- Sociologist Gary Marx and a panel that includes officials of the China
- Education and Research Network (CERNET) discuss the likely social impacts
- of the Internet on China and of China's Internet policies on the rest of
- the Internet.
-
- - We Know Where You Will Live... To close the conference, noted science
- fiction authors Pat Cadigan, Tom Maddox, Bruce Sterling, and Vernor Vinge
- will present their unique perspectives on the future of freedom and privacy
- in an increasingly computerized world.
-
-
- CFP96 http://web.mit.edu/cfp96
-
- For additional information or to request a press pass, please contact:
- Robert V. Prior, CFP96 Press Coordinator prior@mit.edu / (617) 253-1584
-
- For general registration, call (617) 253-1700
-
- ---------------------------------------------------------------
- CFP96 - THE SIXTH CONFERENCE ON COMPUTERS, FREEDOM, AND PRIVACY
- ---------------------------------------------------------------
- Robert V. Prior
- CFP96 Press Coordinator prior@mit.edu
- The MIT Press (617) 253-1584
- 55 Hayward Street Fax: (617) 258-6779
- Cambridge, MA 02142 http://web.mit.edu/cfp96
-
- ------------------------------
-
- Date: Tue, 19 Mar 1996 21:44:59 -0800 (PST)
- From: Declan McCullagh <declan@WELL.COM>
- Subject: File 5--Dorothy Denning attacks Leahy's crypto bill
-
- I may have to adjust my position on Leahy's bill. Any legislation that
- Dorothy Denning attacks so virulently must be worth passing.
-
- -Declan
-
- ------------------------------------------------------------
-
- Date--Tue, 19 Mar 96 14:53:35 EST
- From--denning@cs.cosc.georgetown.edu (Dorothy Denning)
- To--farber@central.cis.upenn.edu
- March 14, 1996
-
- The Honorable Patrick Leahy
- United States Senate
- Russell Building, Room 433
- 1st and C Streets, NE
- Washington, DC 20510
-
- Dear Senator Leahy:
-
- As author, scholar, lecturer, researcher, and consultant to the
- government and industry in cryptography and information security, I am
- concerned that S.1587, the "Encrypted Communications Privacy Act of
- 1996," is not in balance with society's needs. By removing practically
- all export controls on encryption, the bill will make it far easier for
- criminals, terrorists, and foreign adversaries to obtain and use
- encryption that is impenetrable by our government. The likely effect
- will be to erode the ability of our law enforcement and intelligence
- agencies to carry out their missions. This is not consistent with your
- own findings in the bill which recognize the need for a "national
- encryption policy that advances the development of the national and
- global information infrastructure, and preserves Americans' right to
- privacy and the Nation's public safety and national security."
-
- I am concerned that the proposed legislation responds only to a loud
- cry for assistance and is not the reasoned and practiced position of
- our multinational corporations. At the International Cryptography
- Institute, which I chaired in September 1994 and 1995, our discussions
- did not find that this unrestricted distribution of encryption
- technology was required to satisfy business objectives. Our
- corporations recognize the need to respect the legitimate interests of
- governments and the need for encryption methods that use "key escrow"
- or "trusted third parties" with data recovery capabilities to protect
- their own information assets. Businesses are moving in the direction
- of key escrow, and key escrow is becoming a standard feature of
- commercial products. I have recently summarized the features of thirty
- products and proposals for key escrow in a taxonomy which I developed
- with Dennis Branstad.
-
- Because of the need to address information security at an international
- level, the Organization for Economic Cooperation Development, through
- its Committee for Information, Computer, and Communications Policy, is
- bringing together the international business community and member
- governments to develop encryption policy guidelines that would respect
- the interests of businesses, individuals, and governments. In support
- of that objective, the INFOSEC Business Advisory Group (IBAG), an
- association of associations representing the information security
- interests of users, issued a statement of principles recognizing the
- needs of governments, industry, and individuals, and supporting
- approaches based on trusted third parties. A similar statement was
- issued by a quadripartite group consisting of EUROBIT (European
- Association of Manufacturers of Business Machines and Information
- Technology Industry), ITAC (Information Technology industry Association
- of Canada), ITI (Information Technology Industry Council, U.S.), and
- JEIDA (Japan Electronic Industry Development Association), which
- accounts for more than 90% of the worldwide revenue in information
- technology. X/Open is pursuing a public key infrastructure project
- aimed at creating specifications and possibly operating manuals that
- could be used in conformance testing and site accreditation of trusted
- parties.
-
- The European Commission has proposed a project to establish a
- European-wide network of trusted parties that would be accredited to
- offer services that support digital signatures, notarization,
- confidentiality, and data integrity. The trust centers, which would be
- under the control of member nations, would hold keys that would enable
- them to assist the owners of data with emergency decryption or supply
- keys to their national authorities on production of a legal warrant.
-
- Within the U.S., the Clinton Administration is developing federal
- standards for key escrow encryption (these are in addition to and more
- general than the original Clipper standard, FIPS 185), adopting
- escrowed encryption within the federal government, and liberalizing
- export controls on encryption products that include an acceptable
- system of key escrow. The Administration's policy has considerable
- flexibility, allowing for both hardware and software implementations,
- classified and unclassified algorithms, and government and private
- sector key holders. Some companies have submitted products for review
- under the liberalized export controls for key escrow encryption.
- Trusted Information Systems has already received approval for their
- Gauntlet firewall.
-
- Industry is also developing cryptographic application programming
- interfaces (CAPIs), which will facilitate the inclusion of
- cryptographic services in applications, networks, and operating
- systems. This approach, recently demonstrated by Microsoft, will allow
- U.S. software companies to develop exportable applications and systems
- that run with separate security modules. These modules can provide
- either domestic grade encryption or exportable encryption. The impact
- of export controls will thus be limited to those companies selling
- encryption modules, not the entire U.S. hardware and software
- industry. Even this impact can be made negligible by allowing
- companies to export security modules with strong encryption where the
- keys are held with escrow agents in the purchaser's country. Bilateral
- mutual assistance agreements could ensure that U.S. law enforcement
- agencies are able to obtain decryption assistance if the exported
- module is used in a crime against the U.S. CAPIs are providing the
- technological base for experiments under the International Cryptography
- Experiment (ICE), an informal international alliance of individuals and
- organizations working together to promote the international use of
- encryption within import and export regulations that respect law
- enforcement and national security interests.
-
- As these examples illustrate, businesses and governments are working
- hard to establish policies and technologies that respect the needs of
- users, industry, and governments in the furtherance of a secure global
- information infrastructure. Considerable progress has been made during
- the past year. The export provisions in S.1587 are likely to undermine
- those efforts by satisfying the immediate export demands of a few U.S.
- companies at the expense of other stakeholders and society at large.
- It will undermine the ability of governments worldwide to fight global
- organized crime and terrorism.
-
- Although some U.S. companies have lost sales because of export controls
- on encryption, the overall impact of these controls on the U.S.
- information technology industry as a whole is much less clear. In the
- most comprehensive study of export controls to date, the Department of
- Commerce and National Security Agency found that in all but three
- countries surveyed, sources indicated that U.S. market share (about 75%
- overall) was keeping pace with overall demand. Most of the impact was
- found to be on the sale of security-specific products, which account
- for only a small percentage of the total market, rather than
- general-purpose software products. Sales of security-specific products
- are generally few and mostly to customers within the country where the
- product originates. Visits to 50 computer and software stores in
- Canada, France, Germany, Japan, S. Korea, Thailand, and the U.K. found
- that all the general-purpose software products with encryption were
- from U.S. manufacturers. The study concluded that "the impact of U.S.
- export controls on the international market shares of general-purpose
- products is probably negligible" and that "the export licensing process
- itself is not a major obstacle to U.S. competitiveness." This is in
- stark contrast to the dire prediction of the Computer Systems Policy
- Project that U.S. industry stands to lose $30-60 billion in revenues
- by the year 2000 because of export controls.
-
- The Commerce/NSA study did acknowledge that the existence of foreign
- products claiming strong encryption could have a negative effect on
- U.S. competitiveness. However, by allowing encryption services to be
- sold separately from the applications software that uses them, CAPIs
- will make it extremely unlikely that general-purpose software will be
- substantially effected by export controls. Even security-specific
- products, which are a growing industry, can use CAPIs to separate out
- the encryption component from the main product (e.g., firewall).
- Moreover, if keys can be held in other countries under appropriate
- bilateral agreements as noted earlier, export controls need not
- substantially impact encryption products.
-
- Export controls are often blamed for the lack of security in our public
- infrastructure. The Commerce/NSA study found "little evidence that
- U.S. export controls have had a negative effect on the availability of
- products in the U.S. marketplace," although they "may have hindered
- incorporation of strong encryption algorithms in some domestic
- mass-market, general-purpose products." There are many factors which
- have played an even larger role in the general lack of security we find
- on the Internet: the high cost and low demand for security, the
- difficulty of designing systems that are secure, pressure to bring new
- products to market before their security implications are understood,
- the willingness of users to take risks in favor of acquiring new tools
- and services, and lack of a public key infrastructure to support
- encryption on a national and international basis. Many systems are so
- riddled with security holes that any would-be attacker can gain access
- to the system itself, and from there access to plaintext data and
- keys. Malicious code can be injected into a victim's system through
- electronic mail, documents, images, and web browsers; once there, it
- can transmit sensitive data back to its owner. Keyboard sniffers can
- capture a user's keystrokes before they are ever encrypted. Thus,
- while export controls have played a part in the slow integration of
- strong encryption into software and systems, they are not responsible
- for most of the security vulnerabilities we see today. Moreover, most
- of these vulnerabilities are remedied with non-cryptographic controls
- (e.g., process confinement, trusted systems engineering, biometrics,
- and location-based authentication) or with cryptographic techniques for
- authentication, data integrity, and non-repudiation, which are exempt
- from State Department export controls. I do not mean to suggest that
- encryption is not important. In fact, it is essential to protect
- against certain threats. However, it must be kept in perspective. The
- use of encryption for confidentiality protection is but one small,
- albeit important, piece of an information security program.
-
- The provisions is S.1587 regarding trusted key holders could have the
- benefit of increasing public trust in key holders. However, I have
- some concern that the current provisions may be overly restrictive.
- Thus far, we have practically no experience with the operation of third
- party key holders and the circumstances under which they will be called
- upon to provide keys or decryption assistance. It will be extremely
- important that the provisions allow enough flexibility to accommodate
- legitimate use of the data recovery services of key holders for
- criminal investigations, civil litigation, and intelligence
- operations. The liability risks to key holders should not be onerous.
- The definition of key holder and exact wording in the bill may also
- need some refinement in order to accommodate existing and proposed
- methods of trusted third party encryption.
-
- Encryption policy is a difficult and often emotional issue. It is
- important that Congress work closely with the Administration, industry,
- and other interested parties to develop the best legislative strategy
- for promoting information security on the national and global
- information infrastructure without diminishing the ability of our law
- enforcement and intelligence agencies to protect the public safety and
- national security. Export liberalization should proceed cautiously,
- tied to key escrow or other methods that accommodate the needs of the
- government as well as those of users and industry. The
- Administration's plans to liberalize export controls on software key
- escrow is a good next step. As trust and confidence in key escrow
- grows, the export of virtually unlimited strength encryption systems
- may be possible. Because export controls are our only lever for
- controlling the spread of encryption, they should be used to their full
- advantage. Decisions to liberalize these controls must be fully
- informed by classified national security information as well as by
- economic analysis and market studies.
-
- Law enforcement agencies are encountering encryption with ever greater
- frequency. Within a few years, the successful execution of practically
- all court-ordered intercepts and searches and seizures is likely to
- depend on their ability to decrypt communications and stored
- information. If the encryption cannot be broken, it could be
- impossible to successfully investigate or prosecute those cases.
- Crimes of terrorism and white collar crime, including fraud,
- embezzlement, and money laundering, would be facilitated and perhaps
- impossible to solve. Even crimes of economic espionage, which often
- involve insiders with access to company secrets, are facilitated with
- encryption. It will be important for Congress to closely monitor the
- impact of encryption on law enforcement and use that information to
- guide any encryption legislation.
-
- In summary, our national policy can and must promote the legitimate use
- of strong encryption for information protection without unnecessarily
- hindering the ability of our law enforcement and intelligence agencies
- to do their jobs. In so doing, the policy can accommodate reasonable
- liberalization of export controls and business objectives without
- undermining other national objectives. Such a policy is consistent
- with your own guiding principle for the bill: "Encryption is good for
- American business and good business for Americans." But it goes
- further in order to be equally guided by the principle that law and
- order and national security are essential for the American economy and
- the American people. It is not necessary to so radically lift export
- controls on encryption in order to accommodate both principles.
-
- I will be pleased to meet with you and the committee for comment and
- questioning, or to assist in any way I can with the development of a
- balanced approach to encryption legislation.
-
- Yours respectfully,
-
- Dr. Dorothy E. Denning
- Professor of Computer Sciences
- Georgetown University
- denning@cs.georgetown.edu
- http://www.cosc.georgetown.edu/~denning
-
- ------------------------------
-
- Date: Sun, 16 Dec 1995 22:51:01 CDT
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 6--Cu Digest Header Info (unchanged since 16 Dec, 1995)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send post with this in the "Subject:: line:
-
- SUBSCRIBE CU-DIGEST
- Send the message to: cu-digest-request@weber.ucsd.edu
-
- DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
-
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CU-DIGEST
- Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
- Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
- In ITALY: ZERO! BBS: +39-11-6507540
- In LUXEMBOURG: ComNet BBS: +352-466893
-
- UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #8.22
- ************************************
-
-
-