home *** CD-ROM | disk | FTP | other *** search
- =========================================================================
- ________________ _______________ _______________
- /_______________/\ /_______________\ /\______________\
- \\\\\\\\\\\\\\\\\/ ||||||||||||||||| / ////////////////
- \\\\\________/\ |||||________\ / /////______\
- \\\\\\\\\\\\\/____ |||||||||||||| / /////////////
- \\\\\___________/\ ||||| / ////
- \\\\\\\\\\\\\\\\/ ||||| \////
-
- =========================================================================
- EFFector Online Volume 08 No. 04 May 6, 1995 editors@eff.org
- A Publication of the Electronic Frontier Foundation ISSN 1062-9424
-
- In This Issue:
- Dept. of Justice Opposes Exon Bill - But Calls for Replacement
- A Note About This Newsletter
- Calendar of Events
- What YOU Can Do
-
- * See http://www.eff.org/Alerts/ or ftp.eff.org, /pub/Alerts/ for more
- information on current EFF activities and online activism alerts! *
-
- ----------------------------------------------------------------------
-
-
- Subject: Dept. of Justice Opposes Exon Bill - But Calls for Replacement
- -----------------------------------------------------------------------
-
- Below is a letter from the Justice Department in response to (D-VT) Sen. Pat
- Leahy's recent enquiry regarding the DoJ's position on the Exon/Gorton
- Communications Decency Act. The CDA was recently folded into larger
- Senate telecom deregulation bill S. 652, after significant but
- insufficient amendment to reduce system operator liability. The House
- version of the bill, still in its original form, remains a separate bill,
- H.R.1004, whose sponsor appears to have had second thoughts and has
- called for slowing the bill down.
-
- As grassroots, and especially online, activists and concerned citizens
- continue to raise serious doubts about this bill, and as organizations
- like EFF, Voters' Telecommunications Watch, the Center for Democracy and
- Technology, and dozens of others, work to derail it, the following letter
- comes as a pleasant surprise for the most part.
-
- The Department of Justice maintains first and foremost that the bill will
- greatly harm law enforcement's efforts against obscenity and sexual abuse
- of minors, in a number of ways. Most of these flaws in the bill are due
- to imprecise application of terms like "digital" and insufficient
- consideration of the effects that supposedly minor changes to one section of
- the telecommunications regulations have on other sections, their enforcement
- and their interpretation by the courts.
-
- However, and to their credit, the DoJ has also identified four distinct
- and serious threats to privacy posed by the CDA. Besides making it
- easier for system crackers to evade detection, Sen. Exon's legislation
- would also negate the "exclusionary rule" of 18 USC section 2515,
- reducing the privacy protections of phone calls in one way, and
- additionally weaken this privacy by introducing a loophole into the
- wiretap statute that would broadly allow monitoring by anyone of private
- voice communications. The Department further warns that one section of the
- bill "would encourage intrusion by on-line service providers into the
- private electronic mail communications of individual users. [The section]
- actually promotes intrusions into private electronic mail by making it
- 'safer' to monitor private communications than to risk liability. At the
- same time, [the section] would defeat efforts by the government to
- enforce federal privacy protections against illegal eavesdropping."
-
- Not all is sunshine however, and those concerned about civil liberties online
- should keep one eye open for a replacement bill in the not too distant
- future. The Acting Assistant Attorney General notes that "While we agree
- with the goal of various legislative proposals designed to keep obscenity
- and child pornography off of the information superhighway, we are
- currently developing a legislative proposal that will best meet these
- challenges and provide additional prosecutorial tools. This legislative
- package is being developed while taking into consideration the need to
- protect fundamental rights guaranteed by the First Amendment."
-
- Needless to say, many of us will remain skeptical.
-
-
- ***********
-
- Department of Justice Letter to Sen. Leahy
-
-
- May 3, 1995
-
- Honorable Patrick J. Leahy
- United States Senate
- Washington, DC 20510
-
-
-
- I write to respond to your letter of March l, 1995 concerning our
- prosecution of violations of federal child pornography and obscenity laws
- and your April 21, 1995 request for the views of the United States
- Department of Justice on the "Communications Decency Act," which has been
- incorporated as title IV of the proposed "Telecommunications Competition
- and Deregulation Act of 1995," S. 652. In accordance with your request,
- the analysis of the Communications Decency Act focuses on sections 402
- and 405 of the bill.
-
-
- The Department's Criminal Division has, indeed, successfully prosecuted
- violations of federal child pornography and obscenity laws which were
- perpetrated with computer technology. In addition, we have applied
- current law to this emerging problem while also discovering areas where
- the new technology may present challenges to successful prosecution.
- While we agree with the goal of various legislative proposals designed to
- keep obscenity and child pornography off of the information superhighway,
- we are currently developing a legislative proposal that will best meet
- these challenges and provide additional prosecutorial tools. This
- legislative package is being developed while taking into consideration
- the need to protect fundamental rights guaranteed by the First Amendment.
-
- With respect to the communications Decency Act, while we understand that
- section 402 is intended to provide users of online services the same
- protection against obscene and harassing communications afforded to
- telephone subscribers, this provision would not accomplish that goal.
- Instead, it would significantly thwart enforcement of existing laws
- regarding obscenity and child pornography, create several ways for
- distributors and packagers of obscenity and child pornography to avoid
- criminal liability, and threaten important First Amendment and privacy
- rights.
-
- Similarly, while we understand that section 405 of this bill is intended
- to expand privacy protections to "digital" communications, such
- communications are already protected under existing law. Moreover, this
- provision would have the unintended consequences of jeopardizing law
- enforcement's authority to conduct lawful, court-ordered wiretaps and
- would prevent system administrators from protecting their systems when
- they are under attack by computer hackers.
-
- Despite the flaws in these provisions, the Administration applauds the
- primary goal of this legislation: prevent obscenity from being widely
- transmitted over telecommunications networks to which minors have access.
- However, the legislation raises complex policy issues that merit close
- examination prior to Congressional action. We recommend that a
- comprehensive review be undertaken of current laws and law enforcement
- resources for prosecuting online obscenity and child pornography, and the
- technical means available to enable parents and users to control the
- commercial and non commercial communications they receive over
- interactive telecommunications systems.
-
- The following are the Department's primary objections to sections 402 and
- 405 of the pending telecommunication bill:
-
- First, Section 402 of the bill would impose criminal sanctions on the
- transmission of constitutionally protected speech. Specifically,
- subsections 402(a)(1) and (b)(2) of the bill would criminalize the
- transmission of indecent communications, which are protected by the First
- Amendment. In _Sable Communications of Cal. v. FCC_, 492 U.S. 115 (1989),
- the Supreme Court ruled that any restrictions on the content of protected
- speech in media other than broadcast media must advance a compelling
- state interest and be accomplished by the "least restrictive means." 8y
- relying on technology relevant only to 900 number services, section 402
- fails to take into account less restrictive alternatives utilizing
- existing and emerging technologies which enable parents and other adult
- users to control access to content.
-
- Nearly ten years of litigation, along with modifications of the
- regulations, were necessary before the current statute as applied to
- audiotext services, or "dial-a-porn" calling numbers, was upheld as
- constitutional. See _Dial Information Services v. Thornburg_, 938 F. 2d
- 1535 (2d Cir. 1991). The proposed amendment in section 40-2 of the bill
- would jeopardize the enforcement of the existing dial-a-porn statute by
- inviting additional constitutional challenges, with the concomitant
- diversion of law enforcement resources.
-
- Second, the definition of "knowingly" in section 402 of the bill would
- cripple obscenity prosecutions. Under subsection 402(e), only those
- persons with "actual knowledge" of the "specific content of the
- communication" could be held criminally liable. This definiition would,
- make it difficult, if not impossible, to prove guilt, and the standard is
- higher than the prevailing knowledge requirements under existing
- obscenity and child sexual exploitation statutes. Under _Miller v.
- California_, 413 U.S. 629 (1973j, the government must only prove that a
- person being prosecuted under an obscenity statute had knowledge of the
- general nature of the material being distributed. Large-scale
- distributors of child pornography and other obscene materials--among the
- most egregious violators -- do not read or view each obscene item they
- distribute. the proposed definition in subsection 402(e) would make it
- nearly impossible for the government to establish the necessary knowledge
- requirement and would thereby severely handicap enforcement of existing
- statutes.
-
- Third, section 402 would add new terms and defenses that would thwart
- ongoing enforcement of the dial-a-porn statute. Currently, the government
- is vigorously enforcing the existing dial-a-porn statute. It took more
- than ten years for the government to be able to do so, due to
- constitutional challenges. The proposed amendment to this statute
- fundamentally changes its provisions and subjects it to renewed
- constitutional attack which would hinder current enforcement efforts.
-
- Fourth, section 402 would do significant harm by inserting new and
- sweeping defenses that may be applied to nullify existing federal
- criminal statutes. The government currently enforces federal criminal
- laws preventing the distribution over computer networks of obscene and
- other pornographic material that is harmful to minors (under 18 U.S.C.
- section 1465, 2252 * 2423 (a)), the illegal solicitation of a minor by
- way of a computer network (under 18 U.S.C. section 2252), and illegal
- "luring" of a minor into sexual activity through computer conversations
- (under 18 U.S.C. section 2423(b)). These statutes apply to all methods of
- "distribution" including over computer networks. The new defenses
- proposed in subsection 402(d) would thwart ongoing government obscenity
- and child sexual exploitation prosecutions in several important ways:
-
- * The first defense under subsection 402 (d)(1) would immunize from
- prosecution "any action" by a defendant who operates a computer bulletin
- board service as an outlet for the distribution of pornography and
- obscenity so long as he does not create or later the material [sic]. In
- fact, this defense would establish a system under which distributors of
- pornographic material by way of computer would be subject to fewer
- criminal sanctions than distributors of obscene videos, books, or magazines.
-
- * The second defense provided in subsection 402(d)(2) would exculpate
- defendants who "lacked editorial control over the communications." Such a
- defense may significantly harm the goal of ensuring that obscene or
- pornographic material is not available on the Internet or other computer
- networks by creating a disincentive for operators of public bulletin
- board services to control postings on their boards.
-
- Moreover, persons who provide critical links in the pornography and
- obscenity distribution chains by serving as "package fulfillment centers"
- filling orders for obscene materials, could assert the defense that they
- lack the requisite "editorial control." This proposed defense would
- complicate prosecutions of entire obscenity distribution chains.
-
- * The third defense provided in subsection 402 (d)(3), containing five
- subparts, would be available to pornographic bulletin boards operators
- who take such innocuous steps as (A) directing users to their "on/off"
- switches on their computer as a "means to restrict access" to certain
- communications; (B) warning, or advertising to, users that they could
- receive obscene material; and (C) responding to complaints about such
- minimum, [sic] this proposed defense would lead to litigation over whether
- such actions constitute "good faith" steps to avoid prosecution for
- violating the section 402, and could thwart existing child pornography
- and obscenity prosecutions.
-
- * The fourth defense provided in subsection 402 (d)(4) would exculpate
- defendants whose pornography business does not have the "predominate
- purpose" of engaging in unlawful activity. This defense would severely
- undercut law enforcement's efforts to prosecute makers and distributors
- of noncommercial pornography and obscenity.
-
- * The fifth defense provided in subsection 402 (d)(5) would preclude any
- cause of action from being brought against any person who has taken good
- faith steps to, _inter_alia_, "restrict or prevent the transmission of,
- or access to," a communication deemed unlawful under section 402. This
- defense would encourage intrusion by on-line service providers into the
- private electronic mail communications of individual users. The defense
- actually promotes intrusions into private electronic mail by making it
- "safer" to monitor private communications than to risk liability. At the
- same time, this defense would defeat efforts by the government to enforce
- federal privacy protections against illegal eavesdropping.
-
- Finally, but no less significantly, section 405 amends the federal
- wiretap statute in several respects, each of which creates considerable
- problems. First, it amends the wiretap statute to add the term "digital"
- to 10 USC section 2511 (see footnote #1), without considering the effect
- of this amendment on other statutory provisions. For example, 10 USC
- section 2516 (1) provides that certain government officials may authorize
- an application for a wiretap order for wire or oral communications while
- 18 USC section 2516 (3) provides that other government officials may
- authorize an application for a wiretap order for electronic
- communications. Since section 405 does not amend 10 USC section 2516, to
- include the term "digital," it would appear that _no_ government official
- has the authority to authorize an application for a wiretap order for
- digital communications. This is particularly problematic, since this
- investigative tool is reserved for the most serious cases, including
- those involving terrorists, organized crime, and narcotics.
-
- Equally disconcerting, the amendment serves to protect computer hackers
- at the expense of all users of the National Information Infrastructure
- (NII), including businesses, government agencies and individuals. Prior
- to 1994, wiretap statute allowed electronic communication services
- providers to monitor _voice_ communications to protect their systems from
- abuse. 18 USC section 2511 (2)(a)(i) (1986 version). Thus, when hackers
- attacked computer systems and system administrators monitored these
- communications, they had no clear statutory authority to do so. In
- October 1994, Congress finally remedied this defect by amending 10 USC
- section 2511 (2)(a)(i) to permit the monitoring of electronic (i.e.,
- digital, non-voice) communications. If section 405 is enacted and these
- hacker communications are deemed digital, system administrators will
- once again be denied the statutory authority to monitor hacker
- communications. It would be most unfortunate if, at the same time
- Congress is encouraging the widespread use of the NII, it passed a law
- giving system administrator's a Hobson's choice: either allow hackers to
- attack systems unobserved or violate federal law.
-
- There are three other concerns as well. First, by adding the term
- "digital" without amending the suppression provisions of 18 USC section
- 2515, voice communications -- if they are deemed "digital" -- will no
- longer be protected by the statute's exclusionary rule. This would serve
- to reduce the privacy protections for phone calls.
-
- Second, section 405 would replace the words "oral communication" with
- "communication" in 18 USC section 2511 (l)(B). This would have
- undesirable consequences for law enforcement because it would criminalize
- the interception of communications as to which there was no reasonable
- expectation of privacy (see footnote #2).
-
- From the law enforcement perspective, there is simply no sound reason for
- eliminating this highly desirable feature of present law. Additionally,
- the amendment might also impact upon the news gathering process. For
- example, if the conversation of two individuals shouting in a hotel room
- were recorded by a news reporter standing outside the room, the reporter
- would, under section 405, be violating the wiretap statute. Under current
- law, of course, the individuals could not complain about the recording
- because, by shouting loud enough to be heard outside the room, they lack
- any reasonable expectation of privacy.
-
- Last, the provision in section 402 (d)(5) provides that "no cause of
- action may be brought in any court ... against any person on account of
- any action which the person has taken in good faith to implement a
- defense authorized under this section ...." This would seem to suggest
- that any person can freely engage in electronic surveillance otherwise
- prohibited under Title III- so long as they claim to be implementing a
- section 402 defense. As such, section 402 (d)(5) severely weakens the
- privacy protections currently offered by the wiretap statute.
-
- In sum, sections 402 and 405 of the bill would hamper the government's
- ongoing work in stopping the dissemination of obscenity and child
- pornography and threaten law enforcement's continued ability to use
- court-authorized wiretaps. We believe that a comprehensive review be
- undertaken [sic] to guide response to the problems that the Communications
- Decency Act seeks to address.
-
- I assure you that the Department is aware of the growing use of computers
- to transmit and traffic obscenity [sic] and child pornography. The Criminal
- Division's Child Exploitation and Obscenity Section is aggressively
- investigating and prosecuting the distribution of child pornography and
- obscenity through computer networks, and the use of computers to locate
- minors for the purpose of sexual exploitation. As we have discussed with
- your staff in a meeting focused on these issues, we remain committed to
- an aggressive effort to halt the use of computers to sexually exploit
- children and distribute obscenity.
-
- Sincerely,
-
- {sig}
-
- Kent Markus
- Acting Assistant Attorney General
-
-
- FOOTNOTES
-
- (1) It should be noted that "digital" communications are already covered
- by the wiretap statute. Under current law, a "digital" communication is
- either a wire communication under 18 USC sec 2510 (1) (if it contains
- voice) or an "electronic communication" under 18 USC sec 2510 (12) (if it
- does not contain voice). Since such communications are already covered,
- the reason for enacting section 405 is unclear, and it is difficult to
- predict how the courts will interpret the amendment.
-
- (2) The definition of "oral communication" in 18 USC sec 2510 (2)
- contains a requirement that the communication to be protected must have
- been made under circumstances justifying an expectation of privacy.
-
- [End of DoJ document.]
-
- ------------------------------
-
-
- Subject: A Note About This Newsletter
- -------------------------------------
-
- To better serve our members and the interested public, EFF will be
- releasing its newsletter more frequently. This has the dual benefit of
- getting news to you faster, and keeping the size of the newsletter small
- and easier to digest in these times of "information overload".
-
- If you have comments or questions about this newsletter or EFF in
- general, please send them to editor@eff.org (Stanton McCandlish).
-
- ------------------------------
-
-
- Subject: Calendar of Events
- ---------------------------
-
-
- This schedule lists EFF events, and those we feel might be of interest to
- our members. EFF events (those sponsored by us or featuring an EFF speaker)
- are marked with a "*" instead of a "-" after the date. Simlarly, government
- events, such as deadlines for comments on reports or testimony submission, are
- marked with "!" in place of the "-" after the date.
-
- If you know of an event of some sort that should be listed here, please
- send info about it to Stanton McCandlish (mech@eff.org)
-
- The latest full version of this calendar, which includes material for
- later in the year as well as the next couple of months, is available from:
-
- ftp: ftp.eff.org, /pub/EFF/calendar.eff
- gopher: gopher.eff.org, 1/EFF, calendar.eff
- http://www.eff.org/pub/EFF/calendar.eff
-
-
- Updated: May 6, 1995
-
-
- May 7-
- 11 - Assoc. for Computing Machinery Conf. on Computer-Human Interaction
- (CHI95); Denver, Colorado.
- Contact: +1 410 263 5382 (voice)
- Email: chi95@sigchi.acm.org
- WWW: http://info.sigchi.acm.org/sigchi/chi95.html
-
- May 8-
- 10 - IEEE Symposium on Security & Privacy, Oakland, Calif.
- Email: sp95@itd.nrl.navy.mil
-
- May 14-
- 17 - Interactive95; Anaheim, Calif. "The leading forum for developers
- and users of multimedia learning technology".
- Contact: 1-800-348-7246 (voice, US-only), +1 617 393 3344 (voice,
- elsewhere)
-
- May 16 * Networking the World Conf.; Virginia Commonwealth U., Richmond, VA.
- Legal issues panel includes Shari Steele (EFF)
-
- May 17-
- 20 - National Public Telecomputing Network 1995 Conf. (Free-Net '95);
- Computing Commons Bldg., ASU, Tempe, Arizona.
- Includes a session entitled "Laws and Liabilities of Electronic
- Communities".
- Email: amq@nptn.org
- WWW: http://www.nptn.org/
-
- May 22-
- 24 - ErgoCon '95 - Silicon Valley Ergonomics Conference & Exposition;
- San Jose, Calif.
- Contact: Abbas Moallem, +1 408 9244132 (voice), +1 408 924 4153 (fax)
-
- May 26-
- 28 - Virtual Futures 1995; U. of Warwick, Coventry, UK. VF'95 "is an
- interdisciplinary event that examines the role of cybernetic
- and specifically dissipative or non-linear models in the arts,
- sciences, and philosophy. The conference explores the relationship
- between postmodern philosophy and chaos theory, with topics
- ranging from: information technology, hypertext and
- multimedia applications...[to] neural nets, and nanotechnology."
- Speakers include: Kathy Acker, Hakim Bey, Richard Kadrey, Manuel
- DeLanda, Alan Sondheim and many more. Deadline for proposals:
- Mar. 1 '95.
- Contact: +44 0203 523523 x2582 (voice), +44 0203 523019 (fax)
- Email: virtual-futures@warwick.ac.uk
-
- May 31 - Deadline for paper submissions, 11th Ann. Computer Security
- Applications Conference (see Dec. 11, below).
-
- June 4-
- 6 - Cyber.Xpo.95; Sahara Hotel, Las Vegas, Nevada; sponsored by
- _Sysop_News_. Seminar sessions & tradeshow.
- Contact: +1 614 452 4541 (voice)
-
- June 5-
- 6 ! 5th Annual "U.S. Copyright Office Speaks" Seminar (West Coast);
- the Beverly Hilton, Los Angeles, Calif. Topics include: inside
- look at New Register's agenda, analysis of NII legislation,
- ACCORD update, & international developments. (See May 1-2 for
- East Coast event.)
- Contact: +1 201 894 8260 (voice)
-
- June 7-
- 9 - Third International Conference on Artificial Intelligence
- Applications on Wall Street; Pace University, New York City, NY.
- Contact: +1 914 763 8820 (voice), +1 914 763 9324 (fax)
- Email: satwell@mcimail.com
-
- June 8-
- 10 - Exploring the VideoClass Alternative; Raleigh, N. Carolina.
- Email: tom_russell@nsu.edu
-
- June 11-
- 14 - Society & the Future of Computing (SFC'95); Tamarron Lodge,
- Durango, Colorado. Sponsored by the Assoc. for Computing
- Machinery, LANL, U. of Md., IEEE. Speakers will include Phil Agre
- (UCSD), Leslie Sandberg (Institute for Telemedicine), Wm.
- Halverson (PacBell), Don Norman (Apple), Linda Garcia
- (Congressional Office of Technology Assessment), John
- Cherniavsky (Natl. Science Found.) and several others.
- Email: sfc95@lanl.gov
- WWW: http://www.lanl.gov/LANLNews/Conferences/.sfc95/sfcHome.html/
-
- June 13-
- 15 - IDT 95 - 12th Congress on Information Markets and Industries;
- Paris, France. Organized by ADBS (a society of information
- professionals), ANRT (National Association of Technological
- Research), and GFII (French association of information industries).
- Contact: +33 1 43 72 25 25 (voice), +33 1 43 72 30 41 (fax)
-
- June 17-
- 19 - NECC'95: Emerging Technologies and Lifelong Learning: 16th Annual
- National Educational Computing Conf., sponsored by International
- Society for Technology in Education; Baltimore, Maryland.
- VP Gore and Sec'y. of Labor Robert Reich invited as keynote
- speakers. Other speakers include: John Phillipo (CELT), Frank
- Knott (MGITB)
- Contact: +1 503 346 2834 (voice), +1 503 346 5890 (fax)
- Email: necc95@ccmail.uoregon.edu
-
- June 18-
- 21 - ED-MEDIA'95; Graz, Austria. A world conference on educational
- multimedia and hypermedia. Sponsor: The Association for the
- Advancement of Computing.
- Contact: +1 804 973 3987 (voice)
- Email: aace@virginia.edu.
-
- June 24-
- 28 - Workshop on Ethical & Professional Issues in Computing;
- Rensselaer Polytechnic Inst., Troy, NY. Deadline for submissions:
- Apr. 15.
- Contact: +1 518 276 8503 (voice), +1 518 276 2659 (fax)
- Email: cherkt@rpi.edu
-
- June 27-
- 29 - Women in Technology Conference: Channels for Change; Santa Clara
- Conv. Ctr., Santa Clara, Calif. Speakers include: Gloria Steinem.
- Sponsored by Int'l. Network of Women in Technology (WITI).
- Contact: +1 818 990 1987 (voice), +1 818 906 3299 (fax)
- Email: witi@crl.com
-
- June 28-
- 30 - INET '95 Internet Society 5th Ann. International Networking
- Conf.; Honolulu, Hawaii. Sponsored by Internet Society (ISoc).
- See Jan. 13 for proposal deadline
- Contact: +1 703 648 9888 (voice)
- FTP: ftp.isoc.org, /isoc/inet95/
- Gopher: gopher.isoc.org, 1/isoc/inet95
- WWW: http://www.isoc.org/inet95.html
- Email: inet95@isoc.org
-
- ------------------------------
-
-
- Subject: What YOU Can Do
- ------------------------
-
- * The Exon Bill (Communications Decency Act)
-
- The Communications Decency Act poses serious threats to freedom of
- expression online, and to the livelihoods of system operators. The
- legislation also undermines several crucial privacy protections.
-
- Business/industry persons concerned should alert their corporate govt.
- affairs office and/or legal counsel. Everyone should write to their own
- Senators and ask them to oppose this bill. Explain, quickly and
- clearly, why this bill is dangerous, and urge efforts to stop this
- legislation or remove it from the larger bill it is a part of.
-
- S.652, the Senate telecom deregulation bill, now contains Sen. Exon's
- "Communications Decency Act" (formerly S.314.) The House version, even
- more dangerous to system operators, is H.R.1004.
-
- For more information on what you can do to help stop this dangerous
- legislation, see:
-
- ftp.eff.org, /pub/Alerts/s314_hr1004_s652.alert
- gopher.eff.org, 1/Alerts, s314_hr1004_s652.alert
- http://www.eff.org/pub/Alerts/
-
- If you do not have full internet access, send a request for this action
- alert to ask@eff.org.
-
-
- * Find Out Who Your Congresspersons Are
-
- EFF has lists of the Senate and House with contact information, as well
- as lists of Congressional committees. These lists are available at:
- ftp.eff.org, /pub/Activism/Congress_cmtes/
- gopher.eff.org, 1/EFF/Issues/Activism/Congress_cmtes
- http://www.eff.org/pub/Activism/Congress_cmtes/
- The full Senate and House lists are senate.list and hr.list, respectively.
- Those not in the U.S. should seek out similar information about their
- own legislative bodies. EFF will be happy to archive any such
- information provided.
-
-
- * Join EFF!
-
- For EFF membership info, send queries to membership@eff.org, or send any
- message to info@eff.org for basic EFF info, and a membership form.
-
-
- ------------------------------
-
-
- Administrivia
- =============
-
- EFFector Online is published by:
-
- The Electronic Frontier Foundation
- 1667 K St. NW, Suite 801
- Washington DC 20006-1605 USA
- +1 202 861 7700 (voice)
- +1 202 861 1258 (fax)
- +1 202 861 1223 (BBS - 16.8k ZyXEL)
- +1 202 861 1224 (BBS - 14.4k V.32bis)
- Membership & donations: membership@eff.org
- Legal services: ssteele@eff.org
- Hardcopy publications: pubs@eff.org
- General EFF, legal, policy or online resources queries: ask@eff.org
-
- Editor: Stanton McCandlish, Online Services Mgr. (mech@eff.org)
-
- Reproduction of this publication in electronic media is encouraged. Signed
- articles do not necessarily represent the views of EFF. To reproduce
- signed articles individually, please contact the authors for their express
- permission. Press releases and EFF announcements may be reproduced individ-
- ually at will.
-
- To subscribe to EFFector via email, send message body of "subscribe
- effector-online" (without the "quotes") to listserv@eff.org, which will add
- you to a subscription list for EFFector.
-
- Back issues are available at:
- ftp.eff.org, /pub/EFF/Newsletters/EFFector/
- gopher.eff.org, 1/EFF/Newsletters/EFFector
- http://www.eff.org/pub/EFF/Newsletters/EFFector/
-
- To get the latest issue, send any message to effector-reflector@eff.org (or
- er@eff.org), and it will be mailed to you automagically. You can also get
- the file "current" from the EFFector directory at the above sites at any
- time for a copy of the current issue. HTML editions available in the HTML
- subdirectory of the EFFectory directory just mentioned.
-
- ------------------------------
-
-
-
-
-
- End of EFFector Online v08 #04 Digest
- *************************************
-
- $$
-