home *** CD-ROM | disk | FTP | other *** search
Text File | 2003-06-11 | 48.1 KB | 1,119 lines |
-
- Computer underground Digest Fri Aug 2, 1996 Volume 8 : Issue 57
- ISSN 1004-042X
-
- Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
- News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Field Agent Extraordinaire: David Smith
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
-
- CONTENTS, #8.57 (Fri, Aug 2, 1996)
- File 1--: ACT NOW! freedom & privacy trashed in grab for police-state power
- File 2--Cu Digest Header Info (unchanged since 7 Apr, 1996)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: Fri, 2 Aug 1996 11:05:43 -0700
- From: jwarren@WELL.COM(Jim Warren)
- Subject: File 1--Freedom & privacy trashed in grab for police-state power
-
- ((This CuD special issue is devoted to two combined posts from
- Jim Warren, a long-time Net activist))
-
- This is not a drill! We ARE under direct attack, NOW!
-
- I would not normally broadcast (spam) this so widely, especially of such
- length, unedited.
-
- But this effort by federal enforcers and the President, to massively
- demolish much of what's left of our nation's civil liberties and whatever
- little we have of privacy protection is SO CAPRICIOUS and MOVING SO FAST
- THROUGH CONGRESS that it requires INSTANT RESPONSE in the form of IMMEDIATE
- phone calls and faxes to *our* "representatives" -- if there is any *hope*
- to turn this appalling stampede to Big Brotherhood by Congress critters.
-
- --jim
- Jim Warren, GovAccess list-owner/editor, advocate & columnist (jwarren@well.com)
- 345 Swett Rd., Woodside CA 94062; voice/415-851-7075; fax/<# upon request>
-
- [puffery FWIW: Hugh M. Hefner First-Amendment Award, Playboy Foundation;
- James Madison Freedom-of-Information Award, Soc.of Prof.Journalists-Nor.Cal.;
- Pioneer Award, Electronic Frontier Foundation (its first year, 1992);
- founded InfoWorld, DataCast, Computers, Freedom & Privacy confs, etc. :-).]
-
-
-
- &&&&&&&&&&&&&&&&&&&&
-
-
-
- Date: Thu, 1 Aug 1996 10:15:15 -0800
- From: telstar@wired.com (--Todd Lappin-->)
- Subject--ALERT: Clinton's Wiretap Gambit
-
-
- ** RED ALERT **
-
- The Clinton administration is exploiting the TWA crash and the Atlanta
- Olympics blast to secure a massive expansion of FBI wiretap authority --
- RIGHT NOW -- without public hearings, and without requiring the FBI to
- publicly disclose evidence that it needs the increased snooping power.
-
- The administration wants Congress to approve the new measures before the
- recess which begins Friday (tomorrow!), so that the president can sign them
- into law Monday.
-
- Congress is prepared to back the plan.
-
- An agreement the administration reached with Congress last night would
- authorize:
-
- -- emergency wiretap authority under which a "suspected
- terrorist's" calls could be tapped for 48 hours WITHOUT a judge's order, and
-
- -- roving, multi-point wiretaps that cover a suspect instead of just one
- telephone.
-
- This is happening so quickly that we have very little opportunity to mount
- a response.
-
- Moreover, all this is probably a curtain-raiser for the next phase of the
- Clinton administration's assault on privacy. Come September, brace
- yourself for increased calls for full funding for the Digital Telephony
- wiretap provisions, AND the introduction of crypto key escrow legislation.
-
- More detail on the current situation below.
-
- --Todd Lappin-->
- WIRED Magazine
-
- ------------------------------------------------
- From: http://www.yahoo.com/headlines/960801/news/stories/terrorism_19.html
- (Similar story at http://www.cnn.com)
-
- Accord Reached on U.S. Anti-Terrorism Bill
-
- WASHINGTON (Reuter) - U.S. lawmakers reached broad accord with the
- Clinton administration Wednesday on the shape of possible new
- anti-terrorism legislation following the crash of TWA Flight 800 and a
- pipe-bomb blast at the Olympic Games.
-
- Announcement of the agreement followed a series of negotiating sessions
- between House and Senate members of both parties and White House chief
- of staff Leon Panetta.
-
- ``I am very confident that we are going to be able to put a bill
- together that hopefully will be adopted by the House and Senate and
- passed on to the president,'' Panetta told reporters.
-
- Clinton had sought swift action on areas where agreement could be found
- before Congress leaves town at the end of the week for a month's recess.
- ``We're looking for some immediate help,'' Clinton said Tuesday.
-
- Congressional staff were to work through much of the night to work on
- legislative language.
-
- The announcement by Panetta and the leader of the congressional task
- force, Larry Craig, an Idaho Republican, followed earlier signals by
- Republican leaders casting doubt on whether Congress could act this
- week.
-
- In a letter to Clinton, Republican leaders had said that more
- information was needed before any final decisions could be made, and
- expressed concern that anti-terorrism money and authority already
- provided was was not being used.
-
- The letter, signed by House Speaker Newt Gingrich, Senate Leader Trent
- Lott and House Leader Dick Armey, requested a briefing by Attorney
- General Janet Reno, FBI Director Louis Freeh and Panetta Thursday.
-
- But Lott, who had told reporters earlier he did not see how a bill could
- be approved by the weekend and sent to Clinton, told the Senate in
- mid-evening: ``We believe we can take up an agreed-to package on the
- anti-terrorism issue hopefully tomorrow or Friday.''
-
- Craig said that seven or eight areas had been under discussion and
- agreement reached on five that would be examined. ``Both sides had to
- swallow hard on several issues,'' he said.
-
- The accord includes expansion of wiretap authority linked, as a
- tradeoff, to strengthening of privacy laws. This would include
- multi-point wiretaps that would cover a suspect instead of just one
- telephone, and emergency wiretap authority under which a suspected
- terorist's calls could be tapped for 48 hours without a judge's order.
-
- Craig said the accord included a new capital offense for murder by
- bombing ``specific to the Olympics.'' It also includes a blue ribbon
- presidential commission to look at the long-term terrorism threat.
-
- Apparently out of the deal is the controversial question of placing a
- distinctive chemical in black powder, which might have been the
- explosive used in the Olympic pipe-bomb, to help trace it.
-
-
-
-
- &&&&&&&&&&&&&&&&&&&&
-
-
-
-
- Date: Thu, 1 Aug 1996 10:00:30 -0400
- From: editor@cdt.org (Bob Palacios)
- Subject--Policy Post 2.29 - Administration, Congress Propose Sweeping
- Anti-Terrorism Initiatives
-
- -----------------------------------------------------------------------------
- _____ _____ _______
- / ____| __ \__ __| ____ ___ ____ __
- | | | | | | | | / __ \____ / (_)______ __ / __ \____ _____/ /_
- | | | | | | | | / /_/ / __ \/ / / ___/ / / / / /_/ / __ \/ ___/ __/
- | |____| |__| | | | / ____/ /_/ / / / /__/ /_/ / / ____/ /_/ (__ ) /_
- \_____|_____/ |_| /_/ \____/_/_/\___/\__, / /_/ \____/____/\__/
- The Center for Democracy and Technology /____/ Volume 2, Number 29
- ----------------------------------------------------------------------------
- A briefing on public policy issues affecting civil liberties online
- ----------------------------------------------------------------------------
- CDT POLICY POST Volume 2, Number 29 August 1, 1996
-
- CONTENTS: (1) Clinton Administration, Congress Propose Sweeping
- Anti-Terrorism Initiatives
- (2) How to Subscribe/Unsubscribe
- (3) About CDT, contacting us
-
- ** This document may be redistributed freely with this banner intact **
- Excerpts may be re-posted with permission of <editor@cdt.org>
- ** This document looks best when viewed in COURIER font **
- -----------------------------------------------------------------------------
-
- (1) CLINTON ADMINISTRATION, CONGRESS PROPOSE SWEEPING ANTI-TERRORISM
- INITIATIVES
-
- In the wake of the recent bombing at the Olympics and the suspected
- terrorist involvement in the TWA crash, the Clinton Administration and
- members of Congress are proposing a set of sweeping counter-terrorism
- initiatives. If enacted into law, these proposals will dramatically
- increase law enforcement surveillance authority over the Internet and other
- advanced communications technologies. An outline of the Administration's
- proposal was circulated on Capitol Hill on Monday July 29.
-
- President Clinton has urged Congress to pass new counter-terrorism
- legislation before the Congressional recess at the end of this week. While
- several prominent Republican members of Congress, including House Speaker
- Newt Gingrich (R-GA), have said publicly that Congress should not rush into
- any new counter-terrorism legislation, most observers believe there is a
- strong possibility that some or all of the Administration's proposal will
- be enacted before the August recess.
-
- The draft proposal contains several measures which were rejected by
- Congress as part of the previous counter-terrorism initiative proposed
- last year after the Oklahoma City bombing, as well as several new measures
- including as-yet unspecified changes to U.S. encryption policy and funding
- for the Communications Assistance for Law Enforcement Act (CALEA, a.k.a.
- Digital Telephony).
-
- CDT is concerned that the latest counter-terrorism efforts on Capitol Hill
- are occurring without appropriate deliberation. Major policy decisions
- expanding the surveillance powers of law enforcement should not be made
- without careful consideration of the necessity of such proposals and the
- relative benefit to society. In the coming days and weeks, CDT will work
- with Congressional leaders, privacy advocates, and the net.community to
- ensure that constitutional civil liberties and the openness of the Internet
- are protected as Congress considers counter-terrorism measures.
- ________________________________________________________________________
-
- MAJOR POINTS OF THE COUNTER-TERRORISM PROPOSALS CIRCULATING ON THE HILL
-
- The administration's new counter-terrorism initiative and other amendments
- circulating this week in Congress contain numerous provisions, but four
- are of particular concern to the net.community:
-
- * New Threats to Encryption, Opposition to the Pro-CODE Bill
- * Funding for Digital Telephony Without Public Accountability
- * Amendment to Criminalize 'Bomb-Making' Information on the Internet
- * Expanded Authority for Multi-Point, "Roving" Wiretaps
-
- The full text of the Administration's proposal and background information
- are available at CDT's counter-terrorism Web Page:
-
- http://www.cdt.org/policy/terrorism/
-
- --------------------------------------------------------
-
- I. NEW THREATS TO ENCRYPTION, OPPOSITION TO THE PRO-CODE BILL
-
- The Administration's outline contains the following statement on encryption:
-
- "* Encryption -- We will seek legislation to strengthen our ability to
- prevent terrorists from coming into the possession of the technology
- to encrypt their communications and data so that they are beyond the
- reach of law enforcement. We oppose legislation that would eliminate
- current export barriers and encouraging the proliferation of encryption
- which blocks appropriate access to protect public safety and the
- national security."
-
- While no specific legislative language has yet been proposed, this
- represents the first statement by the Administration that they will seek
- legislation to further restrict encryption. Even more troubling, the
- Administration is clearly attempting to use the recent suspected terrorist
- incidents to push for a new and more restrictive encryption policy.
-
- This new proposal comes as Congress is finally beginning to seriously
- consider major changes in U.S. encryption policy. Bipartisan legislation
- in both the House and Senate to relax encryption export controls is gaining
- momentum. The Senate Commerce Committee has held 3 hearings in the last 6
- weeks, and is preparing to vote to send the Burns/Leahy "Pro-CODE" bill (S.
- 1726) to the floor of the Senate. The Administration's attempt to leverage
- the public's concern about terrorism to block passage of the Pro-CODE bill
- is disturbing, and poses a significant threat to privacy and security on the
- Internet.
-
- CDT is working with members of Congress, privacy advocates, and the
- communications and computer industries to oppose any attempt by the
- Administration to impose new restrictions on encryption, and we continue to
- work to move the bipartisan export relief legislation through Congress.
-
- --------------------------------------------------------
-
- II. FUNDING FOR DIGITAL TELEPHONY WITHOUT PUBLIC ACCOUNTABILITY
-
- The Administration is also seeking to override the public accountability
- provisions of the Communications Assistance for Law Enforcement Act (CALEA
- - a.k.a. 'Digital Telephony') by providing a funding for the law in a way
- that prevents public oversight of the FBI's surveillance ability.
-
- Enacted in October of 1994, granted law enforcement new authority to
- influence the design of telecommunications networks (the Internet,
- Commercial online services, and BBS's were exempted) in order to preserve
- their ability to conduct court authorized electronic surveillance.
-
- Congress balanced this new authority with a number of mechanisms to ensure
- public accountability over law enforcement surveillance ability.
- While complicated, the public accountability mechanisms are designed to
- work as follows:
-
- * Law enforcement provides telecommunications carriers, the Congress,
- and the public with notice of its surveillance capacity needs (i.e.,
- the number of simultaneous wiretaps in a given geographic location)
- with an opportunity for public comment.
-
- * Based on an assessment of the reasonableness of the law enforcement
- surveillance capacity request, Congress appropriates money to cover
- the cost of modifications. If Congress does not believe law
- enforcement has adequately justified its request, money will not be
- appropriated.
-
- * Telecommunications carriers are not obligated to comply with the
- statute or make any capacity modifications without government
- reimbursement.
-
- In October 1995, the FBI published its first notice of surveillance
- capacity (see CDT Policy Post Vol. 1, No. 26). The telecommunications
- industry and privacy advocates used the public accountability provisions of
- CALEA to respond to the FBI's request and argued that the FBI had not
- adequately justified the extensive surveillance capability contained in the
- request. As a result, Congress has not yet appropriated funds and no
- modifications have been made.
-
- The FBI clearly believes that the public accountability provisions of CALEA
- are working **too well**, and appears to be using the recent focus on
- terrorism to push for a new funding mechanism which does not contain public
- oversight.
-
- CDT is fighting hard to ensure that the public accountability provisions of
- CALEA, which have until now prevented the FBI from acquiring unnecessary
- surveillance capacity, remain a part of the law, and will vigorously oppose
- any effort by the FBI and the Clinton Administration to remove the last
- opportunity for public oversight over law enforcement power.
-
- --------------------------------------------------------
-
- III. THE AVAILABILITY OF 'BOMB-MAKING' INFORMATION ON THE INTERNET
-
- Senator Dianne Feinstein (D-CA) has reintroduced an amendment to make it
- illegal to disseminate information on how to construct explosives knowing
- that the information will be used in furtherance of a federal crime. The
- amendment was adopted by the Senate earlier this month as part of a
- Department of Defense Appropriations bill. CDT believes that the vague
- provisions of the Feinstein amendment could have a chilling effect on online
- speech, needlessly duplicate existing criminal statutes, and should be
- removed.
-
- Feinstein first proposed the amendment as part of the 1995
- counter-terrorism bill. The initial Feinstein amendment was extremely broad
- and would have resulted in a flat ban on certain constitutionally protected
- speech online. After civil liberties advocates objected, Feinstein
- narrowed her amendment substantially, although it was ultimately dropped
- from the final terrorism bill signed in April 1996.
-
- --------------------------------------------------------
-
- IV. EXPANDED WIRETAP AUTHORITY
-
- The Administration's proposal would also significantly expand current
- wiretapping authority to allow multi-point (or "roving") wiretaps. This
- would dramatically change surveillance authority to include wiretaps of
- INDIVIDUALS instead of LOCATIONS.
-
- This proposal would do away with the delicate balance between privacy and
- law enforcement that Congress has struck over 30 years of wiretapping
- legislation. Federal law has always required that wiretaps issue for a
- specific location, to meet Fourth Amendment requirements. In 1986 Congress
- introduced a narrow exception to this rule, only for cases where it could
- be shown that the target was intentionally evading wiretaps by changing
- facilities. The Administration proposal would completely remove this
- standard, allowing so-called "roving taps" for any persons whose behavior
- makes wiretapping difficult for law enforcement.
-
- The administration proposed similar provisions in the spring of 1995 in the
- wake of the Oklahoma City bombing. These provisions proved controversial in
- Congress and were dropped from the final bill.
-
- ________________________________________________________________________
-
- FOR MORE INFORMATION
-
- For more information on the counter-terrorism proposals and their impact on
- the Internet check out:
-
- CDT's Counter-Terrorism Page: http://www.cdt.org/policy/terrorism/
- CDT's Encryption Policy Page: http://www.cdt.org/crypto/
- CDT's Digital Telephony Page: http://www.cdt.org/digtel.html
- Encryption Policy Resource Page: http://www.crypto.com/
-
- ------------------------------------------------------------------------
-
- (4) SUBSCRIPTION INFORMATION
-
- Be sure you are up to date on the latest public policy issues affecting
- civil liberties online and how they will affect you! Subscribe to the CDT
- Policy Post news distribution list. CDT Policy Posts, the regular news
- publication of the Center For Democracy and Technology, are received by
- nearly 10,000 Internet users, industry leaders, policy makers and
- activists, and have become the leading source for information about
- critical free speech and privacy issues affecting the Internet and other
- interactive communications media.
-
- To subscribe to CDT's Policy Post list, send mail to
-
- policy-posts-request@cdt.org
-
- with a subject:
-
- subscribe policy-posts
-
- If you ever wish to remove yourself from the list, send mail to the
- above address with a subject of:
-
- unsubscribe policy-posts
-
- -----------------------------------------------------------------------
-
- (5) ABOUT THE CENTER FOR DEMOCRACY AND TECHNOLOGY/CONTACTING US
-
- The Center for Democracy and Technology is a non-profit public interest
- organization based in Washington, DC. The Center's mission is to develop
- and advocate public policies that advance democratic values and
- constitutional civil liberties in new computer and communications
- technologies.
-
- Contacting us:
-
- General information: info@cdt.org
- World Wide Web: URL:http://www.cdt.org/
- FTP URL:ftp://ftp.cdt.org/pub/cdt/
-
- Snail Mail: The Center for Democracy and Technology
- 1634 Eye Street NW * Suite 1100 * Washington, DC 20006
- (v) +1.202.637.9800 * (f) +1.202.637.0968
-
- -----------------------------------------------------------------------
- End Policy Post 2.29 8/1/96
- -----------------------------------------------------------------------
-
-
-
-
- &&&&&&&&&&&&&&&&&&&&
-
-
-
-
- From: shabbir@vtw.org (Shabbir J. Safdar)
- Date: Thu, 01 Aug 1996 16:44:06 -0400
-
- please send this to your own lists..
-
- -Shabbir J. Safdar * Online Representative * Voters Telecomm. Watch (VTW)
- http://www.vtw.org/ * Defending Your Cyberspace Rights In The Real World *
-
-
- ======================================================================
- ____ _____ ____ ___ _ _____ ____ _____
- | _ \| ____| _ \ / _ \| | | ____| _ \_ _| CONGRESS RUSHING TO
- | |_) | _| | | | | | |_| | | | _| | |_) || | ENACT SURVEILLANCE
- | _ <| |___| |_| | | _ | |___| |___| _ < | | LEGISLATION. CALL
- |_| \_\_____|____/ |_| |_|_____|_____|_| \_\|_| CONGRESS NOW! 8/1/96
-
- REPOST THIS ALERT WHERE APPROPRIATE
- DO NOT REDISTRIBUTE AFTER AUGUST 7, 1996
- ----------------------------------------------------------------------
- Table of contents
- Introduction
- What you can do now
- Background
- Participating organizations
- ----------------------------------------------------------------------
- INTRODUCTION
-
- Late Wednesday, Congress and the Clinton Administration reached a
- preliminary agreement on a sweeping new surveillance initiative. The
- President and several Congressional leaders are pushing for a vote on the
- measure BEFORE CONGRESS RECESSES ON AUGUST 2.
-
- If enacted, parts of the proposal would dramatically impact privacy and
- security on the Internet and other advanced communications technologies.
-
- Of particular concern are provisions which:
-
- 1. Allows law enforcement to wiretap "suspected terrorists" for up to
- 48 hours BEFORE obtaining a court order
- 2. Provide funding for the Digital Telephony Proposal without any public
- accountability over how the FBI spends the funds
-
- Other provisions are also circulating that would:
-
- 3. Threaten to impose new restrictions on encryption technologies
- 4. Seek to criminalize the distribution of 'bomb-making' information on
- the Internet that is legal in print.
-
- Congress needs to hear from you. Congress will rush through the passage
- of massive new surveillance plans with privacy risks unless you
- show them there is support for slow, deliberate, reasoned thought on
- the issue.
-
- ----------------------------------------------------------------------
- WHAT YOU CAN DO NOW
-
- CALL KEY MEMBERS OF CONGRESS IMMEDIATELY!
- NO LATER THAN FRIDAY (8/2/96)
-
- Please contact as many elected officials on the list below as you can.
- Urge them to "go slow" and carefully consider the impact these
- surveillance proposals will have on the privacy and security of
- all Internet users.
-
- Tell them while you appreciate their concern about combating terrorism,
- the measures being proposed have many potential side effects which must be
- carefully considered.
-
- 1. Call the key members of Congress below and ask them to "go slow" and
- examine the issues before rushing into changing the delicate balance
- of law enforcement surveillance and the public.
-
- 2. If you are at a loss for words, use the following sample communique:
-
- SAMPLE COMMUNIQUE
-
- Dear _________,
-
- Please do not rush the passage of counter terrorism legislation;
- I'm concerned that Congress is rushing without carefully
- considering the implications of privacy. I'm from <city, state>.
-
- Thanks, <click>
-
- You should call the following members of Congress because they
- are steering this legislation and need to hear there is support
- for slow, deliberate, thoughtful consideration of this issue.
- Some of thee members *have publicly expressed reservations* about this
- legislation, and we should support them in their efforts.
-
- Senate members:
-
- P ST Name and Address Phone Fax
- = == ======================== ============== ==============
- R MS Lott, Trent 1-202-224-6253 1-202-224-2262
- D DE Biden Jr., Joseph R. 1-202-224-5042 1-202-224-0139
- D SD Daschle, Thomas A. 1-202-224-2321 1-202-224-2047
- R UT Hatch, Orrin G. 1-202-224-5251 1-202-224-6331
- R PA Specter, Arlen 1-202-224-4254 1-717-782-4920
- D VT Leahy, Patrick J. 1-202-224-4242 1-202-224-3595
-
- House members:
-
- Dist ST Name, Address, and Party Phone Fax
- ==== == ======================== ============== ==============
- 6 GA Gingrich, Newt (R) 1-202-225-4501 1-202-225-4656
- 3 MO Gephardt, Richard A. (D) 1-202-225-2671 1-202-225-7452
- 6 IL Hyde, Henry J. (R) 1-202-225-4561 1-202-226-1240
- 14 MI Conyers Jr., John (D) 1-202-225-5126 1-202-225-0072
-
- President William Clinton:
- White House Comment Line: 1-202-456-1414
-
- 3. If you get a response, take a moment and send mail to vtw@vtw.org
- with "feedback" in the subject line.
-
- $ Mail vtw@vtw.org
- Subject--my feedback from calling Congress
- They said they're not going to pass most of Clinton's package,
- because it upsets the delicate balance between law enforcement and
- the public.
- ^D
- Mail sent!
-
- ----------------------------------------------------------------------
- BACKGROUND
-
- Among other things, the law enforcement proposals circulating on Capitol
- Hill include provisions which:
-
- o WIRETAPPING WITHOUT COURT ORDER ALLOWED FOR 48 HOURS
-
- Congress and the President have already agreed to provisions which
- would dramatically expand law enforcement surveillance authority. Both
- of these provisions were proposed by the President as part of the 1995
- counter-terrorism legislation, but were dropped from the final bill
- after Republicans and civil liberties advocates objected.
-
- The current proposal would expand law enforcement surveillance
- authority in two ways:
-
- - Emergency 48 Hour Wiretap Authority: Current law requires law
- enforcement officials to get the affirmative consent of a judge
- before installing a wiretap.
-
- The current proposal would expand law enforcement authority to
- wiretap "suspected terrorists" for up to 48 hours before obtaining a
- court order, limiting a critical 4th amendment safeguard.
-
- - Multi-Point "Roving" Wiretaps: Current law allows law enforcement to
- tap only specific LOCATIONS (i.e., a telephone number). In certain
- very limited circumstances, law enforcement can tap a specific
- INDIVIDUAL if it can be shown to a judge that the suspect is moving
- from place to place with the specific intent of thwarting law
- enforcement.
-
- The current proposal would expand this so-called "roving" wiretap
- authority by making it much easier for law enforcement to tap specific
- INDIVIDUALS as opposed to specific physical locations. This change
- would dramatically effect the balance between 4th Amendment privacy
- rights and public safety which has existed for nearly 30 years, and
- should not be enacted without careful consideration of the
- implications.
-
- o FUNDING FOR DIGITAL TELEPHONY WITHOUT PUBLIC ACCOUNTABILITY
-
- The Administration and Congress are seeking funding to implement the
- Digital Telephony Law in a way which eliminates any opportunity for
- public oversight of law enforcement surveillance ability.
-
- The controversial law, known officially as the Communications
- Assistance for Law Enforcement Act (CALEA), granted the FBI new
- authority to influence the design of telecommunications networks. At
- the same time, the law provided substantial public oversight over the
- FBI's surveillance ability by requiring the FBI to state, on the
- public record, what its surveillance needs are.
-
- The FBI has faced stiff resistance from civil liberties groups and some
- members of Congress and has not yet been able to obtain funding to
- implement the requirements of the law.
-
- As part of the current proposal, the FBI is seeking a mechanism which
- will provide funding for CALEA in a way which skirts the public
- oversight provisions of the law. This is an extremely troubling move
- by law enforcement which, if enacted, would allow law enforcement
- essentially unlimited authority to influence the design of
- telecommunications networks without any accountability.
-
- Other provisions which could show up in legislation in the next 72 hours are:
-
- o BOMB MAKING MATERIAL ON THE INTERNET
-
- In the wake of the recent public concern about terrorism, Senators
- Dianne Feinstein (D-CA) and Joseph Biden (D-DE) have renewed their
- efforts to pass legislation to restrict the availability of 'bomb-
- making' information on the Internet.
-
- The Feinstein/Biden amendment was added to the Senate Defense
- Appropriations bill (S. 1762) in early July, and is not currently part
- of the new law enforcement initiative. However, the amendment poses a
- serious threat to chill the the free flow of information on the
- Internet.
-
- o THREATEN TO IMPOSE NEW RESTRICTIONS ON ENCRYPTION TECHNOLOGIES:
-
- While no specific legislation has been proposed, the Clinton
- Administration has circulated an outline to Congress which states:
-
- "We will seek legislation to strengthen our ability to
- prevent terrorists from coming into the possession of the technology
- to encrypt their communications and data so that they are beyond the
- reach of law enforcement."
-
- This statement marks the first time that the Administration has
- suggested legislation to restrict encryption. This is especially
- troubling because it comes at a time of growing Congressional support
- for legislation to promote privacy and security tools for the Net.
- Of even more concern, the Administration is clearly attempting to use
- the recent suspected terrorist incidents to push for a new and more
- restrictive encryption policy.
-
- If the Administration succeeds in passing new restrictions on
- encryption as part of the new surveillance legislation, the future
- of the Internet as a secure and trusted platform for commerce and
- private communication will be threatened.
-
- Some or all of these provisions may be included in a package voted
- on by both houses by August 3rd. It is not clear what a final bill
- will look like, and some of these provisions may not be considered by
- Congress until later this summer.
-
- ----------------------------------------------------------------------
- PARTICIPATING ORGANIZATIONS
-
- The following organizations all urge you to take this action to combat the
- surveillance initiatives. Check their pages for more background
- information on these issues.
-
- American Civil Liberties Union (http://www.aclu.org)
- American Communication Association
- Center for Democracy and Technology (http://www.cdt.org)
- Electronic Frontier Foundation (http://www.eff.org)
- EF-Austin (http://www.efa.org)
- Electronic Privacy Information Center (http://www.epic.org)
- Feminists for Free Expression
- National Libertarian Party (http://www.lp.org)
- National Writers Union (http://www.nwu.org/nwu/)
- People For the American Way (http://www.pfaw.org)
- Voters Telecommunications Watch (http://www.vtw.org)
- Wired Ventures Ltd. (http://www.hotwired.com)
- ======================================================================
-
-
- Just processed these additional items on the administration's FAST-moving
- efforts to demolish freedom and privacy in Amerika.
-
- --jim
-
-
- &&&&&&&&&&&&&&&&&&&&
-
-
- HOUSE VOTE TO ALLOW MASSIVE, ILL-CONTROLLED SURVEILLANCE, LIKELY TODAY!
-
- Date: Fri, 2 Aug 1996 11:07:40 -0400
- From: jseiger@cdt.org (Jonah Seiger)
- Subject--URGENT: Surveillance Bill Gets New Life - House Vote Likely TODAY!
-
- (please forward where appropriate)
-
- It's not over yet....
-
- The House has scheduled a vote on "suspension" for a 'counter-terrorism'
- bill TODAY (Friday).
-
- Despite media reports that the negotiations had stalled out, house
- Republicans have apparently worked out their differences and are set to
- vote on the bill today. The Senate may or may not vote on the measure on
- Saturday.
-
- No one I've talked to knows for sure what's in the bill, though I have
- heard that there are no encryption provisions and that some of the wiretap
- proposals have been scaled back.
-
- I will post details as I get them. In the mean time, keep those calls
- coming into Congress.
-
- Jonah
-
- ** THE FIGHT FOR FREE SPEECH ONLINE CONTINUES TO THE SUPREME COURT **
- It's not too late to be a part of history -- Join the Lawsuit
- <http://www.cdt.org/ciec> -- <ciec-info@cdt.org>
-
- --
- Jonah Seiger, Policy Analyst Center for Democracy and Technology
- <jseiger@cdt.org> 1634 Eye Street NW, Suite 1100
- Washington, DC 20006
- PGP Key via finger (v) +1.202.637.9800
- http://www.cdt.org/ (f) +1.202.637.0968
- http://www.cdt.org/homes/jseiger/
-
-
- &&&&&&&&&&&&&&&&&&&&
-
-
- Date: Fri, 2 Aug 1996 12:17:07 -0400
- From: jseiger@cdt.org (Jonah Seiger)
- Subject--More on the latest Surveillance Bill...
-
- The outline below is from a document produced by the House Republican
- Conference. It is ONLY A SUMMARY of the proposed bill and is NOT actual
- legislation. No one I have spoken with has seen any specific legislative
- language yet.
-
- The outline is confusing on several points, particularly the "FBI DIGITAL
- TELEPHONY" Section, which says:
-
- "The bill authorizes the FBI to use enhanced telephone technology to
- investigate suspected terrorist activity. Funding for equipment purchase was
- provided in the 1996 omnibus appropriations measure enacted earlier this
- year."
-
- The first sentence above is not at all clear, and probably won't be until
- we can get our hands on the actual text of the bill. It could be additional
- wiretap authority (ie, roving wiretaps), or it could be nothing. As far as
- the funding goes, the "1996 omnibus appropriations measure" DID NOT contain
- funding for implementation of the law - but it did appropriate $37 million
- to cover new equipment for the FBI.
-
- The rest looks like it is a scaled back version of a measure the
- Administration and members of Congress were pushing earlier this week, but
- the scope of the new bill depends a lot on what the actual text says.
-
- I will post additional information as soon as I get it.
-
- Jonah
-
- --
-
-
- Bipartisan Antiterrorism Initiative
- HR__
-
- Committee on the Judiciary
- No Report Filed
- To Be Introduced
-
- Floor Situation:
-
- The House is scheduled to consider HR__ on Friday August 2, 1996. On
- Thursday August 1, the Rules Committee granted a rule to allow the bill to
- be considered under suspension of the rules. It is debatable for 40
- minutes, may not be amended, and requires a two-thirds vote for passage.
-
- Summary:
-
- HR__ includes several bipartisan initiatives intended to bolster federal
- efforts to combat domestic terrorism in addition to those already enacted
- earlier this year as part of the 1996 Antiterrorism and Effective Death
- Penalty Act (P.L. 104-132). The bill contains the following
- counter-terrorism provisions:
-
- Aviation SECURITY MEASURES: The bill enables domestic airports to
- aggressively search for and prevent explosives from causing destruction and
- harm to individuals or property through enhanced explosive detection
- procedures, baggage and passenger screening, and FBI authority to improve
- airport security training and standards to ensure that provisions of the
- 1990 Aviation Security Act (P.L 101-604) are implemented expeditiously.
- Specifically, the bill (1) requires the FAA to implement increased
- explosives section methods immediately, (2) strengthen the level of
- training and expertise possessed by security personnel who are assigned to
- domestic airports, (3) allows airports to use available funding to
- reinforce such training for security personnel, and (4) extends criminal
- background requirements to include a greater number of airport employees.
-
- IMPLEMENTATION OF EXISTING ANTI-TERRORISM LAWS: The bill urges
- implementation of provisions enacted in the 1996 Antiterrorism and
- Effective Death Penalty Act (P.L. 104-132), such as designating and
- freezing the assets of foreign terrorist organizations and implementing
- expedited removal procedures for aliens convicted of a crime.
-
- BIPARTISAN "BLUE RIBBON" COMMISSION: The bill establishes a special
- commission to review all aspects of U.S. anti-terrorism policy and make
- legislative recommendations about methods to most effectively establish a
- long-term defense against terrorist threats, including enhancing the
- nation's human intelligence capabilities.
-
- PRIVACY ACT AMENDMENTS: The bill includes provisions which grant a cause of
- action against the U.S. if in the course of a wiretap investigation
- damaging information is willfully disclosed to the detriment of an innocent
- party by the federal government. The cause of action includes monetary
- damages to the plaintiff if a favorable decision is rendered in federal
- court.
-
- EXPLOSIVES STUDY: The bill authorizes a study on black and smokeless powder
- by an independent agency selected by the National Institute of Justice.
-
- FEDERAL RACKETEERING STATUTE CRIMES: The bill permits federal prosecutors
- to deem those acts determined to be terrorist in nature as substantial
- enough to invoke criminal prosecution under existing criminal racketeering
- (RICO) statutes.
-
- FBI DIGITAL TELEPHONY: The bill authorizes the FBI to use enhanced
- telephone technology to investigate suspected terrorist activity. Funding
- for equipment purchase was provided in the 1996 omnibus appropriations
- measure enacted earlier this year.
-
- <...>
-
- Jonah Seiger, Policy Analyst Center for Democracy and Technology
- <jseiger@cdt.org> 1634 Eye Street NW, Suite 1100
- Washington, DC 20006
- PGP Key via finger (v) +1.202.637.9800
- http://www.cdt.org/ (f) +1.202.637.0968
- http://www.cdt.org/homes/jseiger/
-
-
- &&&&&&&&&&&&&&&&&&&&
-
-
- ELECTRONIC FRONTIER FOUNDATION ALSO ISSUED A LENGTHY (30KB) ACTION ALERT,
- (Excerpted here)
-
- Date: Thu, 1 Aug 1996 21:32:43 -0700 (PDT)
- From: Stanton McCandlish <mech@eff.org>
- Subject--EFFector Online 09.10: ALERT: Act NOW against wiretapping bill!
- Reply-To: editor@eff.org
- Organization: Electronic Frontier Foundation
- X-EFF_General_Info: info@eff.org
- X-URL: http://www.eff.org/pub/EFF/Newsletters/EFFector/
-
-
- =========================================================================
- ________________ _______________ _______________
- /_______________/\ /_______________\ /\______________\
- \\\\\\\\\\\\\\\\\/ ||||||||||||||||| / ////////////////
- \\\\\________/\ |||||________\ / /////______\
- \\\\\\\\\\\\\/____ |||||||||||||| / /////////////
- \\\\\___________/\ ||||| / ////
- \\\\\\\\\\\\\\\\/ ||||| \////
-
- =========================================================================
- EFFector Online Volume 09 No. 10 Aug. 1, 1996 editors@eff.org
- A Publication of the Electronic Frontier Foundation ISSN 1062-9424
-
- IN THIS ISSUE:
-
- ALERT: Congress Rushing to Enact Anti-Privacy Bill - Call Congress NOW!
- Introduction
- What you can do now
- Background
- Participating organizations
- NewsNybbles
- EFF Web Site Now Features "What's Hot" News Updates and Search Engine
- Upcoming Events
- Quote of the Day
- What YOU Can Do
- Administrivia
-
- * See http://www.eff.org/Alerts/ or ftp.eff.org, /pub/Alerts/ for more
- information on current EFF activities and online activism alerts! *
-
- ----------------------------------------------------------------------
-
-
- Subject--ALERT: Congress Rushing to Enact Anti-Privacy Bill - Call Congress NOW!
- --------------------------------------------------------------------------------
-
- **** Last minute update ****
-
- Just before ye editor was about to send this issue out, reports are
- filtering in that negotiations on the bill that is the subject of the
- alert below, have collapsed.
-
- CNN reports: "Key members of the Senate blamed House conservatives for the
- failure, saying they had insisted on linking proposed new
- wiretapping authority for the FBI to an expansion of privacy laws."
-
- CNN quotes Rep. Charles Schumer (D-NY) as saying that House Republican
- leaders "have come up with this smokescreen called privacy". You may
- wish to let Rep. Schumer know how you feel about your right to privacy
- being labelled "a smokescreen":
-
- 9th Dist. NY Schumer, Charles E. (D)
- 1-202-225-6616 (voice), 1-202-225-4183 (fax)
-
- The full text of the CNN article is available at:
- http://www.cnn.com/US/9608/01/wh.terror.bill/index.html
-
- The article also reports that "lawmakers said there is hope for
- agreement after the month long" Congressional recess beginning at the end
- of this week.
-
- THIS MEANS THAT THE ALERT BELOW IS STILL URGENT, and still important.
- We just have a short breathing space now.
-
- - mech@eff.org
-
-
- ____ _____ ____ ___ _ _____ ____ _____
- | _ \| ____| _ \ / _ \| | | ____| _ \_ _| CONGRESS RUSHING TO
- | |_) | _| | | | | | |_| | | | _| | |_) || | ENACT SURVEILLANCE
- | _ <| |___| |_| | | _ | |___| |___| _ < | | LEGISLATION. CALL
- |_| \_\_____|____/ |_| |_|_____|_____|_| \_\|_| CONGRESS NOW! 8/1/96
-
- REPOST THIS ALERT WHERE APPROPRIATE
- DO NOT REDISTRIBUTE AFTER AUGUST 7, 1996
-
- ______________________________________________________________________
-
- Table of contents
- Introduction
- What you can do now
- Background
- Participating organizations
- ______________________________________________________________________
-
-
- * INTRODUCTION
-
- <...>
-
- * WHAT YOU CAN DO NOW
-
- CALL KEY MEMBERS OF CONGRESS IMMEDIATELY!
- NO LATER THAN FRIDAY (8/2/96)
-
- Please contact as many elected officials on the list below as you can.
- Urge them to "go slow" and carefully consider the impact these
- surveillance proposals will have on the privacy and security of
- all Internet users.
-
- Tell them while you appreciate their concern about combating terrorism,
- the measures being proposed have many potential side effects which must be
- carefully considered.
-
- 1. Call the key members of Congress below and ask them to "go slow" and
- examine the issues before rushing into changing the delicate balance
- of law enforcement surveillance and the public.
-
- 2. If you are at a loss for words, use the following sample communique:
-
- SAMPLE COMMUNIQUE
-
- Dear _________,
-
- Please do not rush the passage of counter terrorism legislation;
- I'm concerned that Congress is rushing without carefully
- considering the implications of privacy. I'm from <city, state>.
-
- Thanks, <click>
-
- You should call the following members of Congress because they
- are steering this legislation and need to hear there is support
- for slow, deliberate, thoughtful consideration of this issue.
- Some of thee members *have publicly expressed reservations* about this
- legislation, and we should support them in their efforts.
-
- Senate members:
-
- P ST Name and Address Phone Fax
- = == ======================== ============== ==============
- R MS Lott, Trent 1-202-224-6253 1-202-224-2262
- D DE Biden Jr., Joseph R. 1-202-224-5042 1-202-224-0139
- D SD Daschle, Thomas A. 1-202-224-2321 1-202-224-2047
- R UT Hatch, Orrin G. 1-202-224-5251 1-202-224-6331
- R PA Specter, Arlen 1-202-224-4254 1-717-782-4920
- D VT Leahy, Patrick J. 1-202-224-4242 1-202-224-3595
-
- House members:
-
- Dist ST Name, Address, and Party Phone Fax
- ==== == ======================== ============== ==============
- 6 GA Gingrich, Newt (R) 1-202-225-4501 1-202-225-4656
- 3 MO Gephardt, Richard A. (D) 1-202-225-2671 1-202-225-7452
- 6 IL Hyde, Henry J. (R) 1-202-225-4561 1-202-226-1240
- 14 MI Conyers Jr., John (D) 1-202-225-5126 1-202-225-0072
-
- President William Clinton:
- White House Comment Line: 1-202-456-1414
-
- 3. If you get a response, take a moment and send mail to vtw@vtw.org
- with "feedback" in the subject line.
-
- $ Mail vtw@vtw.org
- Subject--my feedback from calling Congress
- They said they're not going to pass most of Clinton's package,
- because it upsets the delicate balance between law enforcement and
- the public.
- ^D
- Mail sent!
-
- ------------------------------
-
- Date: Thu, 21 Mar 1996 22:51:01 CST
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 2--Cu Digest Header Info (unchanged since 7 Apr, 1996)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send post with this in the "Subject:: line:
-
- SUBSCRIBE CU-DIGEST
- Send the message to: cu-digest-request@weber.ucsd.edu
-
- DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
-
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CU-DIGEST
- Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
- Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
- In ITALY: ZERO! BBS: +39-11-6507540
- In LUXEMBOURG: ComNet BBS: +352-466893
-
- UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #8.57
- ************************************
-
-
-