home *** CD-ROM | disk | FTP | other *** search
Text File | 2003-06-11 | 40.9 KB | 1,047 lines |
- =========================================================================
- ________________ _______________ _______________
- /_______________/\ /_______________\ /\______________\
- \\\\\\\\\\\\\\\\\ \ ||||||||||||||||| / ////////////////
- \\\\\\\\\\\\\\\\\/ ||||||||||||||||| / ////////////////
- \\\\\\_______/\ ||||||_______\ / //////_____\
- \\\\\\\\\\\\\ \ |||||||||||||| / /////////////
- \\\\\\\\\\\\\/____ |||||||||||||| / /////////////
- \\\\\___________/\ ||||| / ////
- \\\\\\\\\\\\\\\\ \ ||||| / ////
- \\\\\\\\\\\\\\\\/ ||||| \////
-
- =========================================================================
- EFFector Online Volume 07 No. 09 May 11, 1994 editors@eff.org
- A Publication of the Electronic Frontier Foundation ISSN 1062-9424
-
- In This Issue:
-
- PGP 2.5 available from Electronic Frontier Foundation ftp site
- EFF Urges Support for Brock Meeks Defense Fund
- IITF Privacy Working Group Request for Comments on Principles
- EFF's Kapor Announces New Cyberspace TV Show
- Announcemennt of OTA Wireless study and the NII
- Name Change for the "Big Dummy's Guide to the Internet"
- Errata - Correction to EFFector 07.08 Ratcliffe Nat'l. ID article
- Note About EFFector - New Frequency, What to Do If You Are Moving
- What YOU Can Do
-
- ----------------------------------------------------------------------
-
-
- Subject: PGP 2.5 available from Electronic Frontier Foundation ftp site
- -----------------------------------------------------------------------
-
- With the early May announcement of the availability of the new version of
- PGP (Pretty Good Privacy) a free encryption program for email and other
- files, EFF has decided to provide PGP and other cryptographic material to
- users of the Internet. EFF applauds and congratulates the PGP development
- team, MIT (who initially made PGP 2.5 available), and RSA Data Security
- (patent holders of the RSA and RSAREF encryption code) for coming to an
- agreement and providing this new version of the most popular email encryption
- program in the world - a free version that is finally legal in the US.
-
- Previous versions of PGP arguably violated US patent law, with the
- exception of ViaCrypt's commercial PGP 2.4, but the new 2.5 is built upon
- the free RSAREF encryption functions, rather than the previous RSA functions
- which required a special licensing arrangement for use in applications
- like PGP.
-
- Despite the patent & licensing issues being resolved, PGP is still not legally
- exportable from the United States (except to Canada), due to ITAR export
- restrictions which categorize cryptographic materials as weapons of war.
- Thus, EFF can only make PGP and other crypto tools and source code available
- to US and Canadian nationals currently residing in the US or Canada and
- connecting to EFF's site from a US or Canadian site.
-
- PGP and similar material is available from EFF's ftp site in a hidden
- directory, and only to Americans and Canadians. Access to this directory
- can be obtained by reading and following the instructions in the README.Dist
- file at:
-
- ftp.eff.org, /pub/Net_info/Tools/Crypto/
- gopher.eff.org, 1/Net_info/Tools/Crypto
- gopher://gopher.eff.org/11/Net_info/Tools/Crypto
- http://www.eff.org/pub/Net_info/Tools/Crypto/
-
- PGP can only be obtained from EFF via ftp currently. Gopher and WWW
- access to the material itself is not supported at this time.
-
- Only the DOS and Unix versions of PGP 2.5 have been released so far.
- The Unix version is in source code form, and so can be readily ported to
- VMS, NeXT and many other operating systems. A Macintosh version has yet to
- be released.
-
-
-
- If you would like to see US export restrictions on cryptography removed,
- please send a message supporting Rep. Cantwell's export reform act (bill
- HR3627) to cantwell@eff.org, ask your Representatives to co-sponsor this
- bill, and ask your Senators to co-sponsor Sen. Murray's companion bill
- (S1846) in the US Senate. Congress contact information is available from
- ftp.eff.org, /pub/EFF/Issues/Activism/govt_contact.list
-
- ------------------------------
-
-
- Subject: EFF Urges Support for Brock Meeks Defense Fund
- -------------------------------------------------------
-
- The Electronic Frontier Foundation urges its members and supporters
- to contribute to the defense fund for Brock Meeks, the online
- journalist now being sued for his hardhitting reporting in
- Cyberwire Dispatch. EFF is in touch with Meeks's attorneys, and
- stands prepared to intervene in the case if critical First
- Amendment issues arise as it develops.
-
- As we enter a world in which users of the networks increasingly
- are able to act as producers of information as well as consumers,
- it is vital that we stand united against those who would use
- litigation to chill the full expression of individual First Amendment
- rights. Please read the Meeks Defense Fund alert below and contribute
- a dollar (or more) to the vindication of freedom of speech on the Net.
-
-
- --Mike Godwin
- EFF Online Counsel
-
-
- * * *
-
- Subject: ALERT: KEEP FREE AND OPEN SPEECH ON NET
- Date: Wed, 11 May 1994 13:38:30 -0400 (EDT)
- From: Meeks Defense Fund <fund@idi.net>
-
-
- Dear Net Citizen:
-
- How do you put a price on free and open dialogue on the Net?
-
- How much are you willing to spend to preserve the concept of roboust
- and open debate that have become a part of the Internet's culture?
- $100? $50? $20?
-
- What if the cost of helping to preserve an open and robust Net was
- no more than $1.29? That's right, less than the cost of a fast
- food hamburger. Freedom on the Internet for only $1.29... cheap
- at twice the price.
-
- A joke? Hardly. The free and open speech, indeed the First Amendment
- rights of the Internet -- rights we've all enjoyed for decades -- are now
- being challenged in court.
-
- CyberWire Dispatch, the well-respected online newswire written and
- developed for the Internet community by journalist Brock Meeks, is
- the subject of a libel suit. CyberWire Dispatch has been at the
- forefront of bringing the Net community timely and insightful
- articles.
-
- This suit was highlighted in a _Wall St. Journal_ article (April
- 22, page B1). The subject of a Dispatch investigation is suing
- Meeks for simply doing what journalists in the traditional print
- medium have done since the founding of newspapers: Print the
- facts and let the public decide the outcome.
-
- Brock and the Cyperwire Dispatch are examples of the "bottom up"
- journalism that charachterizes the Net, where anyone with a modem can
- compete with the traditional press. Of course, most of us don't come
- to the Net with a lawyer in tow, or the resources to defend a legal
- action taken against us in courts located hundreds of miles from our
- homes.
-
- This libel action is one of the earliest cases of libel involving
- alleged defamatory statements published over a computer network.
- It raises the extremely important legal and policy issues. It's impact
- may well determine how and to what extent anyone feels free to express
- strong opinions on the Net, wihtout being put at risk of legal action.
-
- It is crucial that Brock have a strong defense and that the principles
- that come out of this case provide the maximum protection to the
- exercise of free and open speech as possible.
-
- CyberWire Dispatch is unique because it's distributed solely in
- electronic form. A service for the Net community at large. And
- all CyberWire Dispatch articles are free. Meeks neither charges
- anyone for receiving them; he gets paid nothing to write them.
-
- For all these efforts, he's being sued. And being sued by a
- company with a large financial backing. Meeks, on the other hand,
- has no such resources. His attorney, Bruce Sanford of Baker &
- Hostetler is arguably the finest First Amendment lawyer in the
- U.S.
-
- And although he has agreed to represent Meeks at a reduced rate,
- the cost of defending against this unmerited suit will not be
- cheap.
-
- We have formed this committee to lend our support in helping him
- raise money for his legal defense. And all we're asking you to
- send is $1.29. That's it. Why that price? The math is easy: $1
- in an envelope with a 29 cent stamp applied.
-
- Who can't afford $1.29 to help save the great freedoms we all
- enjoy here today?
-
- Can you send more? Of course. Any contributions will be
- welcomed and accepted. Tax deductible donations also are
- possible by following the instructions below.
-
- All money sent for Meeks' legal defense fund will be go to that
- purpose. All the administrative services for administering the
- fund are being donated; 100% of your money goes to defer the
- legal costs of this case.
-
- You are encouraged to repost this message. But please, we urge
- you to keep proper Net protocol in mind when reposting or cross
- posting this message.
-
- Thanks for your time. On behalf of Brock and for future
- generations of electronic journalists, we appreciate your
- contributions and support.
-
- Sincerely,
-
-
- Samuel A. Simon
- President, Issue Dynmics, Inc.*
- ssimon@idi.net
-
- Mitch Kapor
- Chair, Electronic Frontier Foundation*
- Kapor@eff.org
-
- David Farber
- The Alfred Fitler Moore Professor of Telecommunications Systems
- University of Pennsylvania*
- farber@central.cis.upenn.edu
-
- Philip Elmer-DeWitt
- Senior Writer
- TIME Magazine*
- ped@panix.com
-
- Marc Rotenberg
- Electronic Infomation Privacy Center*
- epic@cpsr.org
-
- Nicholas Johnson
- Former FCC Commissoner*
- 103-5393@mcimail.com
-
- Jerry Berman
- Electronic Frontier Foundation*
- jbeman@eff.org
-
- Mike Godwin
- Electronic Frontier Foundation*
- mnemonic@eff.org
-
- *AFFILIATION IS FOR INDENTIFICATION PURPOSE ONLY
-
- For Tax Deductible Donations:
-
- Make Checks out to "Point Foundation" and clearly annotate on the check:
- "For Legal Defense Fund."
-
- Send those checks to:
-
- Meeks Defense Fund
- c/o Point Foundation
- 27 Gate Five Road
- Sausalito, CA 94965
-
- For those who don't care about the tax deductible status, send
- contributions to:
-
- Meeks Defense Fund
-
- c/o IDI
- 901 15th St. NW
- Suite 230
- Washington, DC 20005
-
- ####################################################################
- # Meeks Defense Fund | Internet: fund@idi.net #
- # ---------------------------------------------------------------- #
- # c/o IDI c/o Point Foundation #
- # 901 15th St. NW 27 Gate Five Road #
- # Suite 230 Sausalito, CA 9465 #
- # Washington, DC 20005 #
- ####################################################################
-
- ------------------------------
-
-
- Subject: IITF Privacy Working Group Request for Comments on Principles
- ----------------------------------------------------------------------
-
- From: CMATTEY@ntia.doc.gov
- Date: Wed, 04 May 1994 14:53:26 -0400
- X-deadline: June 13, 1994!
-
- [...]this is indeed time sensitive, and we want people to have ample
- opportunity to review it and react. Please disseminate it
- however you think appropriate.
-
- I hope it is not too confusing to publicize this document after
- publicizing NTIA's Notice of Inquiry; people may wonder why there
- are two separate bodies in government examining privacy issues.
- Some background explanation for you: the Privacy Working Group
- (part of the interagency NII task force) is trying to develop a
- broad framework for dealing with privacy issues that span all
- sectors of the economy, while NTIA (the Executive branch agency
- specifically responsible for developing positions on
- telecommunications policy) is examining privacy issues affecting
- the telecommunications and media industries. [...] (I am involved in both
- efforts, as I am NTIA's representative to the interagency Privacy Working
- Group. As such, I obviously am trying to make sure both efforts are in sync
- with one another.)
-
- Feel free to contact me if you have any questions.
-
-
- Carol Mattey
-
- ************************************************************
- The following file is posted at the request of the
- Information Infrastructure Task Force's Privacy Working
- Group, chaired by Robert Veeder, Office of Management and
- Budget
- ************************************************************
-
-
- Request for Comments on the draft Principles for Providing
- and Using Personal Information and their Commentary.
-
- The draft Principles for Providing and Using Personal
- Information and the associated Commentary are the first work
- product of the Information Infrastructure Task Force's
- Working Group on Privacy. They are intended to update the
- Code of Fair Information Practices that was developed in the
- early 1970s. While many of the Code's principles are still
- valid, the Code itself was developed in an era when paper
- records were the norm.
-
- The advent of the National Information Infrastructure has
- caused two things to change dramatically. No longer is
- information usage bound by the limitations of paper -- the
- seamless web of networks linking us to each other is
- creating an interactive environment in which all of the
- participants must share certain responsibilities. Moreover,
- non-governmental usage rivals the government's, and is
- largely unregulated.
-
- The following Principles were developed with the goal of
- providing guidance to all participants in this new
- interactive world. The Working Group recognizes that the
- Principles cannot apply uniformly to all sectors. They must
- be carefully adapted to specific circumstances.
- Nevertheless, the developers believe that the
- responsibilities and relationships the Principles describe
- are basic ones. As such, they are intended to assist
- legislators, regulators, and companies as they develop codes
- of practice.
-
- The Working Group invites public comment on the Principles
- and Commentary. We are especially interested in
- understanding how the Principles would work in this new
- interactive electronic environment and particularly in non-
- governmental settings. Are they workable? How, if at all,
- should they be changed? We hope that those who obtain the
- Principles for review and comment will also share them as
- widely as possible with others who might be interested in
- them.
-
- The Comment period will close on June 13, 1994. Comments
- should be sent to the Working Group on Privacy c/o the NII
- Secretariat, National Telecommunications and Information
- Administration, US Department of Commerce, Room 4892,
- Washington, D.C. 20230. The Principles and Commentary can be
- downloaded from the IITF Gopher/Bulletin Board System: 202-501-
- 1920. The IITF Gopher/Bulletin Board can be accessed through the
- Internet by pointing your Gopher Client to iitf.doc.gov or by
- telnet to iitf.doc.gov and login as gopher. Electronic comments
- may be sent to nii@ntia.doc.gov.
-
- *****************************************************************
-
- DRAFT: April 21, 1994
-
- Principles for Providing and Using Personal Information
-
- Preamble
-
- The United States is committed to building a National Information
- Infrastructure (NII) to meet the information needs of its
- citizens. This infrastructure, essentially created by advances
- in technology, is expanding the level of interactivity, enhancing
- communication, and allowing easier access to services. As a
- result, many more users are discovering new, previously
- unimagined uses for personal information. In this environment,
- we are challenged to develop new principles to guide participants
- in the NII in the fair use of personal information.
-
- Traditional fair information practices, developed in the age of
- paper records, must be adapted to this new environment where
- information and communications are sent and received over
- networks on which users have very different capabilities,
- objectives and perspectives. Specifically, new principles must
- acknowledge that all members of our society (government,
- industry, and individual citizens), share responsibility for
- ensuring the fair treatment of individuals in the use of personal
- information, whether in paper or electronic form. Moreover, the
- principles should recognize that the interactive nature of the
- NII will empower individuals to participate in protecting
- information about themselves. The new principles should also
- make it clear that this is an active responsibility requiring
- openness about the process, a commitment to fairness and
- accountability, and continued attention to security. Finally,
- principles must recognize the need to educate all participants
- about the new information infrastructure and how it will affect
- their lives.
-
- These "Principles for Providing and Using Personal Information"
- recognize the changing roles of government and industry in
- information collection and use. Thus they are intended to be
- equally applicable to public and private entities that collect
- and use personal information. However, these Principles are not
- intended to address all information uses and protection concerns
- for each segment of the economy or function of government.
- Rather, they should provide the framework from which specialized
- principles can be developed.
-
-
- I. General Principles for the National Information
-
- Infrastructure
-
- A. Information Privacy Principle
-
- 1. Individuals are entitled to a reasonable expectation of
-
- information privacy.
-
- B. Information Integrity Principles
-
- Participants in the NII rely upon the integrity of the
- information it contains. It is therefore the responsibility of
- all participants to ensure that integrity. In particular,
- participants in the NII should, to the extent reasonable:
-
- 1. Ensure that information is secure, using whatever means
- are appropriate;
-
- 2. Ensure that information is accurate, timely, complete,
- and relevant for the purpose for which it is given.
-
- II. Principle for Information Collectors (i.e. entities that
- collect personal information directly from the individual)
-
- A. Collection Principle
-
- Before individuals make a decision to provide personal
- information, they need to know how it is intended to be used, how
- it will be protected, and what will happen if they provide or
- withhold the information. Therefore, collectors of this
- information should:
-
- 1. Tell the individual why they are collecting the
- information, what they expect it will be used for, what
- steps they will take to protect its confidentiality and
- integrity, the consequences of providing or withholding
- information, and any rights of redress.
-
-
- III. Principles for Information Users (i.e. Information
- Collectors and entities that obtain, process, send or store
- personal information)
-
- A. Acquisition and Use Principles
-
- Users of personal information must recognize and respect the
- stake individuals have in the use of personal information.
- Therefore, users of personal information should:
-
- 1. Assess the impact on personal privacy of current or
- planned activities before obtaining or using personal
- information;
-
- 2. Obtain and keep only information that could reasonably
- be expected to support current or planned activities
- and use the information only for those or compatible
- purposes;
-
- 3. Assure that personal information is as accurate,
- timely, complete and relevant as necessary for the
- intended use;
-
- B. Protection Principle
-
- Users of personal information must take reasonable steps to
- prevent the information they have from being disclosed or altered
- improperly. Such users should:
-
- 1. Use appropriate managerial and technical controls to
- protect the confidentiality and integrity of personal
- information.
-
- C. Education Principle
-
- The full effect of the NII on both data use and personal privacy
- is not readily apparent, and individuals may not recognize how
- their lives can be affected by networked information. Therefore,
- information users should:
-
- 1. Educate themselves, their employees, and the public
- about how personal information is obtained, sent,
- stored and protected, and how these activities affect
- others.
-
- D. Fairness Principles
-
- Because information is used to make decisions that affect
- individuals, those decisions should be fair. Information users
- should, as appropriate:
-
- 1. Provide individuals a reasonable means to obtain,
- review, and correct their own information;
-
- 2. Inform individuals about any final actions taken
- against them and provide individuals with means to
- redress harm resulting from improper use of personal
- information;
-
- 3. Allow individuals to limit the use of their personal
- information if the intended use is incompatible with
- the original purpose for which it was collected, unless
- that use is authorized by law.
-
- IV. Principles for Individuals who Provide Personal Information
-
- A. Awareness Principles
-
- While information collectors have a responsibility to tell
- individuals why they want information about them, individuals
- also have a responsibility to understand the consequences of
- providing personal information to others. Therefore, individuals
- should obtain adequate, relevant information about:
-
- 1. Planned primary and secondary uses of the information;
-
- 2. Any efforts that will be made to protect the
- confidentiality and integrity of the information;
-
- 3. Consequences for the individual of providing or
- withholding information;
-
- 4. Any rights of redress the individual has if harmed by
- improper use of the information.
-
- B. Redress Principles
-
- Individuals should be protected from harm resulting from
- inaccurate or improperly used personal information. Therefore,
- individuals should, as appropriate:
-
- 1. Be given means to obtain their information and be
- provided opportunity to correct inaccurate information
- that could harm them;
-
- 2. Be informed of any final actions taken against them and
- what information was used as a basis for the decision;
-
- 3. Have a means of redress if harmed by an improper use of
- their personal information.
-
-
-
- A document of IITF commentary on and detailed description of these
- principles is available at:
- ftp.eff.org, /pub/EFF/Policy/Privacy/iitf_principles.comments
- gopher.eff.org, 1/EFF/Policy/Privacy, iitf_principles.comments
- gopher://gopher.eff.org/11/EFF/Policy/Privacy, iitf_principles.comments
- http://www.eff.org/pub/EFF/Policy/Privacy/iitf_principles.comments
-
- ------------------------------
-
-
- Subject: EFF's Kapor Announces New Cyberspace TV Show
- -----------------------------------------------------
-
- From: mkapor@kei.com (Mitchell Kapor)
-
-
- New Cyberspace TV Program
-
- I am developing a new program on cyberspace in conjunction with WGBH-TV,
- PBS' Boston affiliate. The show is intended to be a window onto the world
- of computer networks for the television viewer, whose point of view is
- that the world of on-line communications is interesting because of what
- people do there, not because of the digital plumbing which enables it.
- We will be focusing on the human aspects of networking and the individual
- and social aspects of being on-line. Cyberspace will be portrayed as a
- not-so-really strange territory after all, where all of us will
- increasingly come to live and work. My role is to guide people through
- this new territory, introducing the audience to its native culture, its
- scenic attraction, and its sights and sounds.
-
- We assume our audience is motivated by curiosity to learn more about what
- goes on in cyberspace, but we do not assume they are knowledgeable or, in
- general experienced with it. On the other hand, we will not trivialize the
- subject matter by reducing it to a least common denominator.
-
- We will give the show a look and feel which is approachable and
- down-to-earth. Interview guests and roundtable participants will be drawn
- from the net community itself. There will be plenty of demos of cool net
- stuff from Mosaic, CU See Me, and other cutting-edge applications and
- services.
-
- We are taping two test shows in mid-June which will be shown in Boston and
- other cities and hope to have some sort of national distribution (to be
- determined) in the fall for a regularly scheduled program. We are also
- going to create a WWW server for the show, the segments of which will be
- downloadable. The server will be have on it additional material which
- won't fit into the show format.
-
-
- An Invitation:
-
- We would like to include some video clips of net citizens expressing their
- greatest hope and worst fear about the future of the net which we will edit
- into an on-air piece for our regular feedback session.
-
- It's important to me to have the voices heard (and faces seen) of people
- already on the net. This is an opportunity for those of us who enjoy
- appreciate the decentralized and democratic character to express that
- sentiment to a mass audience. I hope you'll take advantage of the
- opportunity.
-
-
- Guidelines:
-
- Since an individual on-air clip will run at most 20-30 seconds, please keep
- your statement succinct.
-
- In shooting the clip, please feel free to pick a location which says
- something about yourself, whether it's your computer, your pet, or the
- great outdoors.
-
- We can accept Quicktime movies, VHS cassettes, or 8mm tapes. If you
- enclose a mailer, we will return your tape. We can also pick up digital
- submissions from any FTP site, etc.
-
-
- Contact Information:
-
- email: cybertv@kei.com
-
- Postal:
-
- Cybertv
- c/o Kapor Enterprises, Inc.
- 238 Main St., Suite 400
- Cambridge MA 02142
-
- ------------------------------
-
-
- Subject: Announcemennt of OTA Wireless study and the NII
- --------------------------------------------------------
-
- From: Todd LaPorte <tlaporte@tct.ota.gov>
-
- Your readers may be interested in this announcement. Please feel free to
- cross-post.
-
-
- March 27, 1994
-
- Announcement
-
- New OTA Study on Wireless Technology and the National
- Information Infrastructure
-
- We are pleased to announce that the Office of
- Technology Assessment's study of the implications of
- wireless technologies for the National Information
- Infrastructure (NII) was formally approved by our
- Congressional Technology Assessment Board at its February
- 8th meeting. The texts of the request letters for the
- study, the press release from Representatives Brown and
- Boucher, and the proposal for the study, which outlines the
- issues we will be considering during the next 14 months, are
- all available via ftp at otabbs.ota.gov. Look in
- pub\wireless\ for these documents. Other study-related
- documents will be posted as they become available.
-
- The objective of this study is to provide a
- comprehensive analysis of the problems and promises of
- integrating wireless technologies into the NII. Wireless
- technologies and systems--such as TV and radio broadcasting,
- new personal communications services, and many kinds of
- satellite communications--will form an integral part of the
- NII, but the role they will play and the implications of
- their widespread adoption are not yet clear. In particular,
- integrating the many wireless and wireline systems that will
- comprise the NII will prove a difficult challenge for
- Federal, State, and local regulators. Many factors,
- including standards development, interconnection and pricing
- arrangements, and differing industry regulation, must be
- addressed before radio-based technologies and systems can
- become an effective part of the NII.
-
- This study will: identify and discuss the various
- wireless technologies that could contribute to the
- development of the NII, assess the barriers to greater or
- more efficient use of radio-based systems, and explore the
- economic, regulatory, and social implications of the
- convergence of wireline and wireless technologies in the
- NII. The study will also present policy options addressing
- relevant wireless/NII issues.
-
- Over the course of the study, we will try to talk to as
- many people as we can in order to understand the wide range
- of interests and concerns surrounding these complex and
- difficult issues. In addition, OTA will also conduct
- several (as yet undetermined) workshops that will address
- specific issues in more detail. These meetings will be
- announced as far in advance as possible. If you would like
- more information, please feel free to contact the study team
- at our project e-mail address, wireless@ota.gov. Any
- suggestions you may have for people we should talk to or
- other sources of data and information will be greatly
- appreciated.
-
- David Wye, Todd La Porte, Alan Buzacott, Greg Wallace
- Wireless Project Team
- Telecommunications and Computing Technologies Program
- Office of Technology Assessment
- U.S. Congress
- (202) 228-6760
- wireless@ota.gov
-
- ****
-
- From: wireless <wireless@tct.ota.gov>
- Date: Thu, 05 May 94 11:26:00 PDT
-
- Regarding your expressed interest in the Wireless Study, I have enclosed a
- copy of the agenda for the first meeting of the Advisory Panel along with
- the memorandum sent via regular mail to other interested persons.
-
- Greg Wallace
- Research Analyst
-
-
-
-
- May 2, 1994
-
-
- MEMORANDUM
-
- To: Interested persons
-
- Fr: David Wye
- Project Director
-
- Re: First Advisory Panel Meeting for Wireless/NII study
-
-
- The first meeting of the Advisory Panel for OTA+s study of wireless
- technologies and the National Information Infrastructure (NII) will be held
- on May 12, 1994 from
- 9:00 AM-4:30 PM in the OTA conference center at 600 Pennsylvania Ave. SE,
- Washington, DC. The meeting is open to the public, and you are welcome to
- attend as an observer, but only a small amount of time will be set aside for
- observer comments.
-
- The Advisory Panel is composed of 19 individuals chosen to represent
- the broad mix of stakeholder interests in this study. A list of the members
- is enclosed for your information.
-
- The purpose of the the Advisory Panel is to help the project staff
- understand the broad range of issues and concerns surrounding the deployment
- of wireless technologies in the NII, and to identify appropriate
- methodologies and strategies for analyzing these issues. The panel will
- also help ensure that the final report is as balanced, accurate, and
- objective as possible.
-
- Enclosure
-
-
-
-
- Office of Technology Assessment
- Telecommunication and Computing Technologies Program
-
- Wireless Technologies and the NII
- Advisory Panel Meeting Agenda
-
- May 12, 1994
-
- 8:30-9:00 Coffee and Pastries
-
- 9:00-9:30 Opening Remarks
-
- Welcome to OTA: Jim Curlin, Program Manager
- Administrative announcements: Liz Emanuel, Office Administrator
- Plans for the day: Rob Kling, Chair
-
- 9:30-10:45 Panel Introductions and Opening Statements (4 mins each)
-
- 10:45-11:00 Break
-
- 11:00-12:20 First Session: Overall Context of the Study
-
- This study grew out of our belief that wireless technologies were not
- being adequately considered in discussions of the National Information
- Infrastructure (NII). But even apart from the concept of the NII,
- telecommunication and information technologies of all sorts--including
- wireless--are advancing rapidly, forcing regulatory, economic, social, and
- technological changes. In this first session, we would like to examine the
- role and relationship of wireless technologies to the evolving
- communications infrastructure of the United States.
-
- o Does the study include all the issues it should? What topics are missing?
- What issues are not so important?
-
- o What specific characteristics or capabilities make wireless systems
- important for the NII? Are wireless technologies different from other
- components of the NII? What special benefits can wireless offer?
- Conversely, what special problems does wireless present for the development
- of the infrastructure?
-
- o Do policies that are adopted for the NII need to be +technology neutral?+
- Is this approach possible or even a good idea? Will this concept help or
- hurt wireless? Do current policies (NII) encourage or hinder the development
- of wireless?
-
- 12:20-12:30 Observer comments
-
- 12:30-1:30 LUNCH
-
- 1:30-2:45 Second Session: Implementation Issues
-
- Wireless technologies being developed today will bring new
- services--voice, data, and video--to the marketplace. Integrating these new
- technologies with existing services may be difficult in many cases, but may
- also offer significant benefits for expanding access to and providing
- competition for NII services. In this session we would like to discuss the
- opportunities and economic and regulatory issues associated with the
- deployment of wireless technologies and services.
-
- o What types of wireless applications are being developed? How might
- education, health care, and the provision of government services benefit
- from the wider use of wireless? How do consumers view wireless services
- today?
-
- o What types of technologies are now being investigated in trials or in the
- lab that might contribute to the NII? What are the implications for
- spectrum allocations?
-
- o What does +interoperability+ mean in the context of wireless systems? Is
- concern about the standards process for wireless justified? Where and how
- should wireless and wireline interconnect? What are the issues associated
- with using wireless with intelligent network concepts, computer network
- protocols, and other technologies first developed for wireline networks?
-
- o What are the key regulatory issues associated with wireless technologies?
- What are the implications of wireless for local loop competition?
-
- 2:45-3:00 Break
-
- 3:00-4:00 Third Session: Implications of Wireless
-
- The widespread adoption of wireless technologies will affect peoples'
- lives in many ways--most of which are still unknown. Some of the effects
- are unlikely to be noticed until the technology has been deployed widely.
- The impacts that wireless technologies may have appear to fall into several
- broad categories: ubiquity, mobility, access, control. In this session we
- would like to explore how wireless technologies may affect peoples+
- lives--at home and at work.
-
- o How might wireless technologies affect personal or societal security?
- Personal privacy and autonomy?
-
- o What are the health effects of wireless technologies? If there are
- uncertainties, what research needs to be done to answer remaining questions?
-
- o How might wireless technologies change work or business organizations, and
- what might any changes mean for workers?
-
- 4:00-4:30 Wrap-up. Final comments and last thoughts.
-
- What else do you think is important that we haven+t talked about today?
- What is the one thing that we should remember?
- Suggestions for workshops or more in-depth study.
-
- 4:30 Observer Comments and Adjournment
-
- ------------------------------
-
-
- Subject: Name Change for the "Big Dummy's Guide to the Internet"
- ----------------------------------------------------------------
-
- EFF's tutorial, "Big Dummy's Guide to the Internet," has been renamed
- "EFF's Guide to the Internet." EFF recently signed a deal to have the
- guide printed by MIT Press and sold in bookstores throughout the country.
- IDG Books, publishers of "Internet for Dummies" and the rest of the "...
- for Dummies" series, expressed their concern that the name similarity
- between the two guides would cause confusion to purchasers. We agreed and
- decided to change the name. The print version of the guide will be called
- "Everybody's Guide to the Internet" and should be available at a bookstore
- near you by the end of the summer. The ASCII text file version of "EFF's
- Guide to the Internet" can be found at:
-
- ftp.eff.org, /pub/Net_info/Guidebooks/EFF_Net_Guide/netguide.eff
- gopher.eff.org, 1/Net_info/Guidebooks/EFF_Net_Guide, netguide.eff
- gopher://gopher.eff.org/pub/Net_info/Guidebooks/EFF_Net_Guide, netguide.eff
- http://www.eff.org/pub/Net_info/Guidebooks/EFF_Net_Guide/netguide.eff
-
- Updates will be at
-
- ftp.eff.org, /pub/Net_info/Guidebooks/EFF_Net_Guide/Updates/
- gopher.eff.org, 1/Net_info/Guidebooks/EFF_Net_Guide/Updates
- gopher://gopher.eff.org/pub/Net_info/Guidebooks/EFF_Net_Guide/Updates
- http://www.eff.org/pub/Net_info/Guidebooks/EFF_Net_Guide/Updates/
-
- Updates will have a filespec of netupdate.??? where ??? is the issue number
- (e.g., netupdate.001, netupdate.002, etc.)
-
- ------------------------------
-
-
- Subject: Errata - Correction to EFFector 07.08 Ratcliffe Nat'l. ID article
- --------------------------------------------------------------------------
-
- From: godsdog@netcom.com (Mitch Ratcliffe)
- Date: Wed, 11 May 1994 14:42:09 -0700
-
- It has been pointed out that there is a factual error in the US Card story:
- During the editorial process, the statement that NASA Ames carried out the
- Clipper R&D was inadvertantly added to the story. NASA Ames did provide
- R&D for the US Card project, but played no known role in the Clipper devel-
- opment. Digital Media is sorry if this mistake caused any confusion.
-
- Mitch Ratcliffe
-
- ------------------------------
-
-
- Subject: Note About EFFector - New Frequency, What to Do If You Are Moving
- --------------------------------------------------------------------------
-
- EFFector is no longer bi-weekly. Due to the fact that things are moving
- rapidly, and there is more news that ever, EFFector will now be sent out
- more frequently. Whenever we have time-sensitive material, and/or enough
- material for an issue of EFFector, a new issue will be released. We hope
- this will get news to you faster, allow us to include more information,
- and keep the issue size down to something that most mail systems can
- handle without any problem.
-
- If you are moving or otherwise will be needing to unsubscribe from EFFector,
- you can do so by sending a message with "unsubscribe effector-online" (no
- quotes) to listserv@eff.org - IF you joined the EFFector mailing list by
- subcribing via the listserv. If you were manually added to the list
- (which is most of you), you can unsubscribe by sending a request to be
- removed from the list to eff-request@eff.org (a real person, not an infobot.)
-
- Thank you, and hope to see you back on the list soon! Note that if you
- prefer, you may obtain EFFector from Usenet's comp.org.eff.news.
-
- ------------------------------
-
-
- Subject: What YOU Can Do
- ------------------------
-
- Experience should teach us to be most on our guard to protect liberty when
- the Government's purposes are beneficent. Men born to freedom are naturally
- alert to repel invasion of their liberty by evil-minded rulers. The
- greatest dangers to liberty lurk in insidious encroachment by men of zeal,
- well-meaning but without understanding."
-
- - Justice Louis D. Brandeis, dissenting, Olmstead v. United States,
- 277 U.S. 479 (1928)
-
- Who will decide how much privacy is "enough"?
-
- The Electronic Frontier Foundation believes that individuals should be
- able to ensure the privacy of their personal communications through any
- technological means they choose. However, the government's current
- restrictions on the export of encrytion software have stifled the
- development and commercial availability of strong encryption in the U.S.
- Now, more than ever, EFF is working to make sure that you are the one that
- makes these decisions for yourself. Our members are making themselves heard
- on the whole range of issues. To date, EFF has collected over 4800 letters
- of support for Rep. Cantwell's bill (HR3627 - Sen. Murray's companion bill
- is S1846) to liberalize restrictions on cryptography. The bill will need
- your vocal support to succeed. We also gathered over 1400 letters
- supporting Sen. Leahy's open hearings on the proposed Clipper encryption
- scheme, which were held in May 1994.
-
- If you'd like to add your voice in support of the Cantwell bill, send
- email to cantwell@eff.org, Subject: I support HR 3627
-
- Your letters will be printed out and hand delivered to Rep. Cantwell by EFF.
-
- You KNOW privacy is important. You have probably participated in our online
- campaigns. Have you become a member of EFF yet? The best way to protect
- your online rights is to be fully informed and to make your opinions heard.
- EFF members are informed and are making a difference. Join EFF today!
-
- For EFF membership info, send queries to membership@eff.org, or send any
- message to info@eff.org for basic EFF info, and a membership form.
-
- ------------------------------
-
-
- Administrivia
- =============
-
- EFFector Online is published by:
-
- The Electronic Frontier Foundation
- 1001 G Street NW, Suite 950 E
- Washington DC 20001 USA
- +1 202 347 5400 (voice)
- +1 202 393 5509 (fax)
- +1 202 638 6120 (BBS)
- Internet: ask@eff.org
- Internet fax gate: remote-printer.EFF@9.0.5.5.3.9.3.2.0.2.1.tpc.int
-
- Coordination, production and shipping by:
- Stanton McCandlish, Online Activist/SysOp/Archivist <mech@eff.org>
-
- Reproduction of this publication in electronic media is encouraged. Signed
- articles do not necessarily represent the views of EFF. To reproduce
- signed articles individually, please contact the authors for their express
- permission.
-
- To subscribe to EFFector via email, send message body of "subscribe
- effector-online" (no quotes) to listserve@eff.org, which will add you a
- subscription to the EFFector mailing list.
-
- ------------------------------
-
-
- Internet Contact Addresses
- --------------------------
-
- Membership & donations: membership@eff.org
- Legal services: ssteele@eff.org
- Hardcopy publications: pubs@eff.org
- Technical questions/problems, access to mailing lists: eff@eff.org
- General EFF, legal, policy or online resources queries: ask@eff.org
-
-
-
-
-
- End of EFFector Online v07 #09
- ******************************
-
- $$
-