EFFector Online JULY 4, 1992

 ########## ########## ########## | LIBERTY, EQUALITY, CONNECTIVITY!  |

########## ########## ########## | THE DECLARATION & BILL OF RIGHTS  |

####       ####       ####       |                                   |

########   ########   ########   | HOUSE TO NSF:RELAX ACCEPTABLE USE |

########   ########   ########   |                                   |

####       ####       ####       |        Howard Rheingold on        |

########## ####       ####       |      VIRTUAL COMMUNITIES, 1992    |

########## ####       ####       |       (Third of three parts)      |

=====================================================================|

EFFector Online             JULY 4, 1992                   Issue  3.0|

         A Publication of the Electronic Frontier Foundation         |

                           ISSN 1062-9424                            |

=====================================================================|


         *

         %%

         ||____________________________________________

         || * * * * * * |==============================|

         ||  * * * * *  |==============================|

         || * * * * * * |==============================|

         ||  * * * * *  |==============================|

         || * * * * * * |==============================|

         ||  * * * * *  |==============================|

         || * * * * * * |==============================|

         ||  * * * * *  |==============================|

         || * * * * * * |==============================|

         ||============================================|

         ||============================================|

         ||============================================|

         ||============================================|

         ||============================================+

         || 

         ||       LIBERTY, EQUALITY, CONNECTIVITY!

         ||   A PEOPLE, UNITED, CAN NEVER BE DEFEATED!

         ||      216 FOURTHS AND STILL GOING STRONG!  

         || 

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%


                       In CONGRESS, July 4, 1776.

                                    

                             A DECLARATION

                                    

                     By the REPRESENTATIVES of the

                                    

                       UNITED STATES OF AMERICA,

                                    

                     In GENERAL CONGRESS assembled.


_      _

\\    //HEN in the Course of human Events, it becomes necessary

 \\/\// for one People to dissolve the Political bands which have

  \/\/  connected them with another, and to assume among the

Powers of the Earth, the separate and equal station to which the

Laws of Nature and of Nature's God entitle them, a decent respect

to the Opinions of Mankind requires that they should declare the

causes which impel them to the Separation.


     We hold these Truths to be self-evident, that all Men are created

equal, that they are endowed by their Creator with certain unalienable

rights, that among these are Life, Liberty, and the Pursuit of

Happiness--That to secure these Rights, Governments are instituted among

Men, deriving their just Powers from the Consent of the Governed, that

whenever any Form of Government becomes destructive of these Ends, it is

the Right of the People to alter or to abolish it, and to institute new

Government, laying its foundation on such Principles and organizing its

Powers in such Form, as to them shall seem most likely to effect their

Safety and Happiness.  Prudence, indeed, will dictate that Governments

long established should not be changed for light and transient Causes;

and accordingly all Experience hath shown, that Mankind are more

disposed to suffer, while evils are sufferable, than to right themselves

by abolishing the Forms to which they are accustomed.  But when a long

train of Abuses and Ursurpations, pursuing invariably the same Object,

evinces a Design to reduce them under absolute Despotism, it is their

Right, it is their Duty, to throw off such Government, and to provide

new Guards for their future Security.


                          * * * * * * * * * *


     WE, THEREFORE, The Representatives of the UNITED STATES OF AMERICA,

in General Congress, Assembled, appealing to the Supreme Judge of the

world for the rectitude of our intentions, do, in the Name, and by

Authority of the good People of these Colonies, solemnly publish and

declare, That these United Colonies are, and of Right ought to be FREE

AND INDEPENDENT STATES; that they are Absolved from all Allegiance to

the British Crown, and that all political connection between them and

the State of Great Britain, is and ought to be totally dissolved; and

that as Free and Independent States, they have full Power to levy War,

conclude Peace, contract Alliance, establish commerce, and to do all

other Acts and Things which Independent States may of right do.  And for

the support of this Declaration, with a firm reliance on the protection

of divine Providence, we mutually pledge to each other our Lives, our

Fortunes, and our sacred Honor.


 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%


                           THE BILL OF RIGHTS


                             1st Amendment


Congress shall make no law respecting an establishment of religion, or

prohibiting the free exercise thereof; or abridging the freedom of

speech, or of the press; or the right of the people peaceably to

assemble, and to petition the government for a redress of grievances.


                             2nd Amendment


A well-regulated militia being necessary to the security of a free

state, the right of the people to keep and bear arms shall not be

infringed.


                             3rd Amendment


No soldier shall, in time of peace, be quartered in any house, without

the consent of the owner; nor in time of war, but in a manner to be

prescribed by law.


                             4th Amendment


The right of the people to be secure in their persons, houses, papers,

and effects, against unreasonable searches and seizures, shall not be

violated; and no warrants shall issue, but upon probable cause,

supported by oath or affirmation, and particularly describing the place

to be searched and the persons or things to be seized.


                             5th Amendment


No person shall be held to answer for a capital, or otherwise infamous,

crime, unless on a presentment or indictment of a grand jury, except in

cases arising in the land or naval forces, or in the militia, when in

actual service, in time of war, or public danger; nor shall any person

be subject, for the same offence, to be twice put in jeopardy of life or

limb; nor shall be compelled, in any criminal case, to be a witness

against himself; nor be deprived of life, liberty, or property, without

due process of law; nor shall private property be taken for public use,

without just compensation.


                             6th Amendment


In all criminal prosecutions, the accused shall enjoy the right to a

speedy and public trial, by an impartial jury of the state and district

wherein the crime shall have been committed, which district shall have

been previously ascertained by law; and to be informed of the nature and

cause of the accusation; to be confronted with the witnesses against

him; to have compulsory process for obtaining witnesses in his favor;

and to have the assistance of counsel for his defence.


                             7th Amendment


In suits at common law, where the value in controversy shall exceed

twenty dollars, the right of trial by jury shall be preserved; and no

fact, tried by a jury, shall be otherwise re- examined in any court of

the United States than according to the rules of the common law.


                             8th Amendment


Excessive bail shall not be required, nor excessive fines imposed, nor

cruel and unusual punishment inflicted.


                             9th Amendment


The enumeration in the Constitution of certain rights shall not be

construed to deny or disparage others retained by the people.


                             10th Amendment


The powers not delegated to the United States shall not be construed to

extend to any suit in law or equity, commenced or prosecuted against one

of the United States by citizens of another State or by citizens or

subjects of any foreign state.


 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%


                       -==--==--==-<>-==--==--==-


           HOUSE ALLOWS NSF TO RELAX ACCEPTABLE USE POLICIES


This Monday (6/29) the House passed by voice vote Rep. Boucher's (D-VA)

bill to allow the NSF to relax current Acceptable Use Policies that

limit NSFNet traffic to that which is "in support of research and

education."  This restriction prevent commercial traffic, such as the

offering of commercial information services, from passing over the

NSFNET backbone.


Boucher's bill amends the National Science Foundation Act of 1950 (42

USC 1862) to read:


"the Foundation is authorized to foster and support the development and

use of computer networks which may be used substantially for purposed

related to research and education in the sciences and engineering, if

the additional uses will tend to increase the overall capabilities of

the networks to support such research and education activities."


That is a long way of saying that commercial services may be offered for

sale over the NSFNET backbone provided those services would be

potentially valuable to the research and education community.


The identical provision is attached to the NASA Reauthorization bill now

pending before the Senate.  Senate staff indicate they are hoping that

the provision will move through without much fuss.  However, there is

some possible opposition from Department of Energy and other "mission

agencies'" who run large nets that interconnect with the NSF.  These

agencies don't like to trend toward commercialization because, a) it

puts pressure on them to do the same, and b) it puts them just one hop a

away from an increasingly public network.


                       -==--==--==-<>-==--==--==-


[Note: Because of the length of this essay, this is the third of three

 parts. Our readers are asked to take careful note of the author's 

remarks at the end of this article.]


                A SLICE OF LIFE IN MY VIRTUAL COMMUNITY

                               (Part Two)

                     by Howard Rheingold  June 1992

                          (hlr@well.sf.ca.us)


[ Continued from EFFector Online 2.12 June 19, 1992. Available via

ftp.eff.org or by email from eff@eff.org]


    Who Is The WELL?


    One way to know what the WELL is like is to know something about the

kind of people who use it. It has roots in the San Francisco Bay Area,

and in two separate cultural revolutions that took place there in past

decades. The Whole Earth Catalog originally emerged from the

counterculture as Stewart Brand's way of providing access to tools and

ideas to all the communes who were exploring alternate ways of life in

the forests of Mendocino or the high deserts outside Santa Fe. The Whole

Earth Catalogs and the magazines they spawned, Co-Evolution Quarterly

and Whole Earth Review, have outlived the counterculture itself, since

they are still alive and raising hell after nearly 25 years. For many

years, the people who have been exploring alternatives and are open to

ideas that you don't find in the mass media have found themselves in

cities instead of rural communes, where their need for new tools and

ideas didn't go away.


    The Whole Earth Catalog crew received a large advance in the mid-

1980s to produce an updated version, a project involving many

geographically-separated authors and editors, many of whom were using

computers. They bought a minicomputer and the license to Picospan, a

computer conferencing program, leased an office next to the magazine's

office, leased incoming telephone lines, set up modems, and the WELL was

born in 1985. The idea from the beginning was that the founders weren't

sure what the WELL would become, but they would provide tools for people

to build it into something useful. It was consciously a cultural

experiment, and the business was designed to succeed or fail on the

basis of the results of the experiment. The person Stewart Brand chose

to be the WELL's first director -- technician, manager, innkeeper, and

bouncer -- was Matthew McClure, not-coincidentally a computer-savvy

veteran of The Farm, one of the most successful of the communes that

started in the sixties. Brand and McClure started a low- rules,

high-tone discussion, where savvy networkers, futurists, misfits who had

learned how to make our outsiderness work for us, could take the

technology of CMC to its cultural limits.


    The Whole Earth network -- the granola-eating utopians, the solar-

power enthusiasts, serious ecologists and the space-station crowd,

immortalists, Biospherians, environmentalists, social activists -- was

part of the core population from the beginning. But there were a couple

of other key elements. One was the subculture that happened ten years

after the counterculture era -- the personal computer revolution.

Personal computers and the PC industry were created by young iconoclasts

who wanted to have whizzy tools and change the world. Whole Earth had

honored them, including the outlaws among them, with the early Hacker's

Conferences. The young computer wizards, and the grizzled old hands who

were still messing with mainframes, showed up early at the WELL because

the guts of the system itself -- the UNIX operating system and "C"

language programming code -- were available for tinkering by responsible

craftsmen.


    A third cultural element that made up the initial mix of the WELL,

which has drifted from its counterculture origins in many ways, were the

deadheads. Books and theses have been written about the subculture that

have grown up around the band, the Grateful Dead. The deadheads have a

strong feeling of community, but they can only manifest it en masse when

the band has concerts. They were a community looking for a place to

happen when several technology-savvy deadheads started a "Grateful Dead

Conference" on the WELL. GD was so phenomenally successful that for the

first several years, deadheads were by far the single largest source of

income for the enterprise.


    Along with the other elements came the first marathon swimmers in

the new currents of the information streams, the futurists and writers

and journalists. The New York Times, Business Week, the San Francisco

Chronicle, Time, Rolling Stone, Byte, the Wall Street Journal all have

journalists that I know personally who drop into the WELL as a listening

post. People in Silicon Valley lurk to hear loose talk among the pros.

Journalists tend to attract other journalists, and the purpose of

journalists is to attract everybody else: most people have to use an old

medium to hear news about the arrival of a new medium.


    Things changed, both rapidly and slowly, in the WELL. There were

about 600 members of the WELL when I joined, in the summer of 1985. It

seemed that then, as now, the usual ten percent of the members did 80%

of the talking. Now there are about 6000 people, with a net gain of

about a hundred a month. There do seem to be more women than other parts

of cyberspace. Most of the people I meet seem to be white or Asian;

African-Americans aren't missing, but they aren't conspicuous or even

visible. If you can fake it, gender and age are invisible, too. I'd

guess the WELL consists of about 80% men, 20% women. I don't know

whether formal demographics would be the kind of thing that most WELL

users would want to contribute to. It's certainly something we'd

discuss, argue, debate, joke about.


    One important social rule was built into Picospan, the software that

the WELL lives inside: Nobody is anonymous. Everybody is required to

attach their real "userid" to their postings. It is possible to use

pseudonyms to create alternate identities, or to carry metamessages, but

the pseudonyms are always linked in every posting to the real userid. So

individual personae -- whether or not they correspond closely to the

real person who owns the account -- are responsible for the words they

post. In fact, the first several years, the screen that you saw when you

reached the WELL said "You own your own words."  Stewart Brand, the

WELL's co-founder likes epigrams: "Whole Earth," "Information wants to

be free." "You own your own words." Like the best epigrams, "You own

your own words" is open to multiple interpretations. The matter of

responsibility and ownership of words is one of the topics WELLbeings

argue about endlessly, so much that the phrase has been abbreviated to

"YOYOW," As in, "Oh no, another YOYOW debate."


    Who are the WELL members, and what do they talk about? I can tell

you about the individuals I have come to know over six years, but the

WELL has long since been something larger than the sum of everybody's

friends. The characteristics of the pool of people who tune into this

electronic listening post, whether or not they every post a word in

public, is a strong determinant of the flavor of the "place." There's a

cross-sectional feeling of "who are we?" that transcends the

intersecting and non-intersecting rings of friends and acquaintances

each individual develops.


    My Neighborhood On The WELL


    Every CMC system gives users tools for creating their own sense of

place, by customizing the way they navigate through the database of

conferences, topics, and responses. A conference or newsgroup is like a

place you go. If you go to several different places in a fixed order, it

seems to reinforce the feeling of place by creating a customized

neighborhood that is also shared by others. You see some of the same

users in different parts of the same neighborhood. Some faces, you see

only in one context -- the parents conference, the Grateful Dead tours

conference, the politics or sex conference.


    My home neighborhood on the WELL is reflected in my ".cflist," the

file that records my preferences about the order of conferences I visit.

It is always possible to go to any conference with a command, but with a

.cflist you structure your online time by going from conference to

specified conference at regular intervals, reading and perhaps

responding in several ongoing threads in several different places.

That's the part of the art of discourse where I have found that the

computer adds value to the intellectual activity of discussing formally

distinct subjects asynchronously, from different parts of the world,

over extending periods, by enabling groups to structure conversations by

topic, over time.


    My .cflist starts, for sentimental reasons, with the Mind

conference, the first one I hosted on the WELL, since 1985. I've changed

my .cflist hundreds of times over the years, to add or delete

conferences from my regular neighborhood, but I've always kept Mind in

the lede. The entry banner screen for the Mind conference used to

display to each user the exact phase of the moon in numbers and ASCII

graphics every time they logged in to the conference. But the volunteer

programmer who had created the "phoon" program had decided to withdraw

it, years later, in a dispute with WELL management. There is often a

technological fix to a social problem within this particular universe.

Because the WELL seems to be an intersection of many different cultures,

there have been many experiments with software tools to ameliorate

problems that seemed to crop up between people, whether because of the

nature of the medium or the nature of the people. A frighteningly

expensive pool of talent was donated by volunteer programmers to create

tools and even weapons for WELL users to deal with each other. People

keep giving things to the WELL, and taking them away. Offline readers

and online tools by volunteer programmers gave others increased power to

communicate.


    The News conference is what's next. This is the commons, the place

where the most people visit the most often, where the most outrageous

off-topic proliferation is least pernicious, where the important

announcements about the system or social events or major disputes or new

conferences are announced. When an earthquake or fire happens, News is

where you want to go. Immediately after the 1989 earthquake and during

the Oakland fire of 1991, the WELL was a place to check the damage to

the local geographic community, lend help to those who need it, and get

first-hand reports. During Tienamen square, the Gulf War, the Soviet

Coup, the WELL was a media-funnel, with snippets of email from Tel-Aviv

and entire newsgroups fed by fax machines in China, erupting in News

conference topics that grew into fast-moving conferences of their own.

During any major crisis in the real world, the routine at our house is

to turn on CNN and log into the WELL.


    After News is Hosts, where the hottest stuff usually happens. The

hosts community is a story in itself. The success of the WELL in its

first five years, all would agree, rested heavily on the efforts of the

conference hosts -- online characters who had created the character of

the first neighborhoods and kept the juice flowing between one another

all over the WELL, but most pointedly in the Hosts conference. Some

spicy reading in the Archives conference originated from old hosts'

disputes - and substantial arguments about the implications of CMC for

civil rights, intellectual property, censorship, by a lot of people who

know what they are talking about, mixed liberally with a lot of other

people who don't know what they are talking about, but love to talk

anyway, via keyboard and screen, for years on end.


    In this virtual place, the pillars of the community and the worst

offenders of public sensibilities are in the same group -- the hosts.

At their best and their worst, this ten percent of the online population

put out the words that the other ninety percent keep paying to read.

Like good hosts at any social gathering, they make newcomers welcome,

keep the conversation flowing, mediate disputes, clean up messes, and

throw out miscreants, if need be. A WELL host is part salon keeper, part

saloon keeper, part talk-show host, part publisher.  The only power to

censor or to ban a user is the hosts' power. Policy varies from host to

host, and that's the only policy. The only justice for those who misuse

that power is the forced participation in weeks of debilitating and

vituperative post-mortem.


    The hosts community is part long-running soap opera, part town

meeting, bar-room brawl, anarchic debating society, creative groupmind,

bloody arena, union hall, playpen, encounter group. The Hosts conference

is extremely general, from technical questions to personal attacks. The

Policy conference is supposed to be restricted to matters of what WELL

policy is, or ought to be. The part-delusion, part-accurate perception

that the hosts and other users have strong influence over WELL policy is

part of what feeds debate here, and a strong element in the libertarian

reputation of the stereotypical WELLite. After fighting my way through a

day's or hour's worth of the Hot New Dispute in News, Hosts, and Policy,

I check on the conferences I host -- Info, Virtual Communities, Virtual

Reality. After that my .cflist directs me, at the press of the return

key, to the first new topic or response in the Parenting, Writers',

Grateful Dead tours, Telecommunication, Macintosh, Weird, Electronic

Frontier Foundation, Whole Earth, Books, Media, Men on the WELL,

Miscellaneous, and Unclear conferences.


    Grabbing attention in the Commons is a powerful act. Some people

seem drawn to performing there; others burst out there in acts of

desperation, after one history of frustration or another. Dealing with

people who are so consistently off-topic or apparently deeply grooved

into incoherence, long-windedness, scatology, is one of the events that

challenges a community to decide what its values really are, or ought to

be.


    Something is happening here. I'm not sure anybody understands it

yet. I know that the WELL and the net is an important part of my life

and I have to decide for myself whether this is a new way to make

genuine commitments to other human beings, or a silicon-induced illusion

of community. I urge others to help pursue that question in a variety of

ways, while we have the time. The political dimensions of CMC might lead

to situations that would pre-empt questions of other social effects;

responses to the need for understanding the power- relationships

inherent in CMC are well represented by the Electronic Frontier

Foundation and others. We need to learn a lot more, very quickly, about

what kind of place our minds are homesteading.


    The future of virtual communities is connected to the future of

everything else, starting with the most precious thing people have to

gain or lose -- political freedom. The part played by communication

technologies in the disintegration of communism, the way broadcast

television pre-empted the American electoral process, the power of fax

and CMC networks during times of political repression like Tienamen

Square and the Soviet Coup attempt, the power of citizen electronic

journalism, the power-maneuvering of law enforcement and intelligence

agencies to restrict rights of citizen access and expression in

cyberspace, all point to the future of CMC as a close correlate of

future political scenarios. More important than civilizing cyberspace is

ensuring its freedom as a citizen-to-citizen communication and

publication medium; laws that infringe equity of access to and freedom

of expression in cyberspace could transform today's populist empowerment

into yet another instrument of manipulation. Will "electronic democracy"

be an accurate description of political empowerment that grows out of

the screen of a computer? Or will it become a brilliant piece of

disinfotainment, another means of manipulating emotions and

manufacturing public opinion in the service of power.


    Who controls what kinds of information is communicated in the

international networks where virtual communities live? Who censors, and

what is censored? Who safeguards the privacy of individuals in the face

of technologies that make it possible to amass and retrieve detailed

personal information about every member of a large population? The

answers to these political questions might make moot any more abstract

questions about cultures in cyberspace. Democracy itself depends on the

relatively free flow of communications. The following words by James

Madison are carved in marble at the United States Library of Congress:

"A popular government without popular information, or the means of

acquiring it, is but a prologue to a farce or a tragedy, or perhaps

both. Knowledge will forever govern ignorance, and a people who mean to

be their own governors must arm themselves with the power which

knowledge gives." It is time for people to arm themselves with power

about the future of CMC technology.


    Who controls the market for relationships? Will the world's

increasingly interlinked, increasingly powerful, decreasingly costly

communications infrastructure be controlled by a small number of very

large companies? Will cyberspace be privatized and parceled out to those

who can afford to buy into the auction? If political forces do not seize

the high ground and end today's freewheeling exchange of ideas, it is

still possible for a more benevolent form of economic control to stunt

the evolution of virtual communities, if a small number of companies

gain the power to put up toll-roads in the information networks, and

smaller companies are not able to compete with them.


    Or will there be an open market, in which newcomers like Apple or

Microsoft can become industry leaders? The playing field in the global

telecommunications industry will never be level, but the degree of

individual freedom available through telecommunication technologies in

the future may depend upon whether the market for goods and services in

cyberspace remains open for new companies to create new uses for CMC.


    I present these observations as a set of questions, not as answers.

I believe that we need to try to understand the nature of CMC,

cyberspace, and virtual communities in every important context --

politically, economically, socially , culturally, cognitively. Each

different perspective reveals something that the other perspectives do

not reveal. Each different discipline fails to see something that

another discipline sees very well. We need to think as teams here,

across boundaries of academic discipline, industrial affiliation,

nation, to understand, and thus perhaps regain control of, the way human

communities are being transformed by communication technologies.  We

can't do this solely as dispassionate observers, although there is

certainly a huge need for the detached assessment of social science.

But community is a matter of the heart and the gut as well as the head.

Some of the most important learning will always have to be done by

jumping into one corner or another of cyberspace, living there, and

getting up to your elbows in the problems that virtual communities face.


    References:


    Sara Kiesler, "The Hidden Messages in Computer Networks," Harvard

Business Review, January-February 1986.


    J.C.R. Licklider, Robert Taylor, and E. Herbert, "The Computer as a

Communication Device," International Science and Technology, April 1978.


    Ray Oldenburg, "The Great Good Place: Cafes, Coffee Shops, Community

Centers, Beauty Parlors, General Stores, Bars, Hangouts, and How They

Get You Through The Day," New York: Paragon House, 1991.


    M. Scott Peck, M.D., "The Different Drum: Community Making and

Peace," New York: Touchstone, 1987.


    Howard Rheingold, "Tools for Thought," Simon & Schuster 1986.


Note: In 1988, _Whole Earth Review_ published my article, "Virtual

Communities." Four years later, I reread it and realized that I had

learned a few things, and that the world I was observing had changed.

So I rewrote it. The original version is available on the WELL as

/uh/72/hlr/virtual_communities88.


Portions of this will appear in "Globalizing Networks: Computers and

International Communication," edited by Linda Harasim and Jan Walls for

MIT press. Portions of this will appear in "Virtual Communities," by

Howard Rheingold, Addison-Wesley. Portions of this may find their way

into Whole Earth Review.


This is a world-readable file, and I think these are important issues;

encourage distribution, but I do ask for fair use: Don't remove my name

from my words when you quote or reproduce them, don't change them, and

don't impair my ability to make a living with them.


                                            Howard Rheingold

                                            Editor, Whole Earth Review

                                            27 Gate Five Road

                                            Sausalito, CA 94965

                                            Tel: 415 332 1716

                                            Fax: 415 332 3110

                                            Internet: hlr@well.sf.ca.us


                   (This is the last of three parts.)


                       -==--==--==-<>-==--==--==-


            MEMBERSHIP IN THE ELECTRONIC FRONTIER FOUNDATION

If you support our goals and our work, you can show that support by

becoming a member now. Members receive our quarterly newsletter,

EFFECTOR, our bi-weekly electronic newsletter, EFFector Online (if you

have an electronic address that can be reached through the Net), and

special releases and other notices on our activities.  But because we

believe that support should be freely given, you can receive these

things even if you do not elect to become a member.


Our memberships are $20.00 per year for students, $40.00 per year for

regular members.  You may, of course, donate more if you wish.


Our privacy policy: The Electronic Frontier Foundation will never, under

any circumstances, sell any part of its membership list.  We will, from

time to time, share this list with other non-profit organizations whose

work we determine to be in line with our goals. If you do not grant

explicit permission, we assume that you do not wish your membership

disclosed to any group for any reason.


---------------- EFF MEMBERSHIP FORM ---------------


Mail to: The Electronic Frontier Foundation, Inc.

         155 Second St. #30

         Cambridge, MA 02141


I wish to become a member of the EFF  I enclose:$__________

            $20.00 (student or low income membership)

            $40.00 (regular membership)

            $100.00(Corporate or company membership.

                    This allows any organization to

                    become a member of EFF. It allows

                    such an organization, if it wishes

                    to designate up to five individuals

                    within the organization as members.)


    |     I enclose an additional donation of $___________


Name:______________________________________________________


Organization:______________________________________________


Address: __________________________________________________


City or Town: _____________________________________________


State:_______ Zip:________ Phone:(    )_____________(optional)


FAX:(    )____________________(optional)


Email address: ______________________________


I enclose a check [  ]   .

Please charge my membership in the amount of $_____________

to my Mastercard [  ]     Visa [  ]      American Express [ ]


Number:____________________________________________________


Expiration date: ____________


Signature: ________________________________________________


Date:______________________


I hereby grant permission to the EFF to share my name with

other non-profit groups from time to time as it deems

appropriate   [  ]  .

                       Initials:___________________________


Your membership/donation is fully tax deductible.

=====================================================================|

                   EFFector Online is published by                   |

                  The Electronic Frontier Foundation                 |

                 155 Second Street, Cambridge MA 02141               |

                 Phone:(617)864-0665 FAX:(617)864-0866               |

                     Internet Address: eff@eff.org                   |

 Reproduction of this publication in electronic media is encouraged  |

               To reproduce signed articles individually,            |

          please contact the authors for their express permission.   |

=====================================================================|

           "LIFE, LIBERTY, AND THE PURSUIT OF CONNECTIVITY."



########## ########## ########## |  RAPID GROWTH OF ONLINE SERVICES  
########## ########## ########## |  ONE BBSCON /EFF LIBRARY/ USENET  
####       ####       ####       |                                   
########   ########   ########   |       JOHN PERRY BARLOW ON        
########   ########   ########   |  THE NSA, THE FBI, ENCRYPTION,    
####       ####       ####       |         AND WIRE-TAPPING          
########## ####       ####       |                                   
########## ####       ####       |         THE TAO TE CHIP           
=====================================================================
EFFector Online             JULY 29, 1992         Issue  3.1 / Part 1
         A Publication of the Electronic Frontier Foundation         
                           ISSN 1062-9424                            
=====================================================================

         ONLINE SERVICES EXPERIENCE SOLID GROWTH OVER PAST 5 YEARS
                  WITH MORE FORECAST FOR THE NEAR FUTURE

A new study released by SIMBA Information, a research group based in
Wilton, Connecticut, says sales by online services increased by 61.1
percent in the last five years. The trend will continue over the next five
years, says SIMBA, with a projected increase of 48%.

By 1996, the online information market should be worth about $14.2 billion
annually. Business uses will consume the lion's share of this market by a
factor of 24 to 1. Regardless of this, the services used by consumers were
the fastest growing segment of the market in the 1990-1991 period. This
growth in consumer use is expected to increase by 145 percent over the next
five years.

The report, "Online Services: 1992 Review, Trends, and Forecast" was
written for SIMBA by analyst Chris Elwell.

Other items in the report of interest: Subscribers to online services
numbered 5.4 million at the end of 1991, an increase of 18% over 1990.
Leading online services (CompuServe, Genie, Prodigy, etc.) reported an
aggregate sales growth of nearly 7% in 1991 from 1990 levels.

Some of the more notable conclusions of this report are:
        #North American-based online services account for 57% of 
         worldwide sales,with rapid growth in the near term. 
        #More than half of the growth in online subscribers in 1991
         was accounted for by Prodigy.
        #One out of every five home computers has a modem.
        #As the Regional Bell companies enter the online services
         arena, the initial focal point of their efforts will be
         online directory publishing.
        #Even though the report gives detailed profiles of 35 major
         players, it notes that most online services and database 
         publishers are relatively small operations.

                        -==--==--==-<>-==--==--==-

                        EFF to Crash The ONE BBSCON

         August 13-16, Stouffer Concourse Hotel, Denver Colorado.

The ONE BBSCON is the major BBS conference of the year, hosting seminars in
such topics as How to make your BBS profitable; What is Internet?; FidoNet,
RelayNet, INet, et. al.; Graphics over a Modem; Learn from the Winners; as
well hosting an exhibition attended by vendors of BBS-related products.

And EFF will be there with a booth as well.  We'll be doing the usual
booth-related activities such as handing out literature and selling
t-shirts; however, we're more interested in talking with the members of the
BBS community and learning what it needs from EFF.  Along with seminars on
BBSs and the Law, EFF staff counsel Shari Steele will be presenting a talk
on the EFF at which we will be looking for feedback.  If you'll be
attending, do stop by either the booth or the seminar and tell us what you
think.

For more information on ONE BBSCON, contact
                                       ONE, Inc.
                                       4255 S. Buckley Road
                                       Suite 308
                                       Aurora, Colorado  80013
                                       (303)693-5252
Note: There is no email address. Leaves room for improvement.

                        -==--==--==-<>-==--==--==-

                         UPDATE ON THE EFF LIBRARY

The EFF Library was set up over a year ago when it became clear that,
regardless of the digital revolution, we were being overwhelmed by a wave
of hard copy.  At that time, we had a backlog of around 1,000 documents,
books and magazines concerning issues relevant to the Electronic Frontier.
We engaged a professional librarian, Hae Young Wang, to bring order to
chaos, and to provide us with a method that would enable us to file and
retrieve material necessary to the work of the foundation.

Today, the EFF library in Cambridge houses over 2,300 items. The holdings
cover journal articles, newspaper articles, conference proceedings, court
documents, legislation, magazines, books, and brochures.  The subject areas
include such things as information infrastructure, computers and civil
liberties, intellectual property and copyrights, and EFF archives.

The Library also maintains over 130 subscriptions to magazines and
newsletters.

In addition, the EFF library maintains, classifies and indexes EFF's
anonymous ftp archive files.  These files, which are accessible to everyone
with Internet access, have recently been re-organized into what we hope is a
more user-friendly and informative manner. In the EFF ftp directory, you
can find documents about the EFF, back issues of its online newsletter,
notes on eff-issues, historical items, legal issues, current legislation,
local chapters, and a host of other material germane to the Electronic
Frontier.

While the ftp files are open to all, the EFF Library can now serve only the
staff here and in Washington.  We hope to be able to provide service to EFF
members and the general public in the future, as funding and staffing
allow.

In the meantime, we have recently acquired new scanning software which we
hope will reduce the work involved in moving hard-copy information into
digital form. With this in place we will be adding items to the anonymous
ftp archive at an increased rate throughout the rest of the summer.

Recent additions to the EFF ftp files are:
    The EFF Open Platform Proposal. This is the full text of the
    EFF's plan to create a national public network through the
    deployment of ISDN technology.
    (pub/EFF/papers/open-platform-proposal)

    Howard Rhinegold's "A Slice of Life in My Virtual Community".
    This meditation on what it means to be online in 1992 was
    first serialized in EFFector Online.
    (pub/EFF/papers/cyber/life-in-virtual-community)

    Senator Al Gore's High-Tech Bill (S.2937) as introduced on July
    1, 1992. This bill provides funding to both NSF and NASA to
    develop technology for "digital libraries", huge data bases
    that store text, imagery, video, and sound and are accessible
    over computer networks like NSFNET.  The bill also funds
    development of prototype "digital libraries" around the
    country. This is the full-text of this bill along with the
    press release from Gore's office announcing the bill.
    (pub/EFF/legislation/gore-bill-1992)

    An information packet on the GPO/WINDO legislation before congress
    as S.2813/H.R. 2772. This discusses the function of the proposed
    "gateway" for online public access to government databases. From
    the Taxpayers Assets Project.
    (pub/EFF/legislation/gpo-windo-info)

These files are also available through WAIS as eff-documents.src.  WAIS
clients are available for the Mac, PC, NeXT, X11, and GNU Emacs
environments via anonymous ftp from think.com.  A "guest" WAIS client is
available by telnetting to quake.think.com and logging in as 'wais'.

To retrieve these files via email, send mail to archive-server@eff.org,
containing (in the body of the message) the command

send eff <path from pub/EFF>

So to get the Gore bill, you would send

send eff legislation/gore-bill-1992

If you have any trouble obtaining these documents, send email to
ftphelp@eff.org.

                        -==--==--==-<>-==--==--==-

                        UNCLEAR ON USENET INTERNET?

Veteran members of the Internet know, through osmosis, the difference
between Internet and Usenet. Still, newcomers are often confused since the
two seem to be, at times, used interchangeably. To provide for an ultimate
answer, we turned to Chris Davis (ckd), star sysadmin at eff.org. He said:

   "The definitive answer is long and mostly uninteresting except to
pedants like me :).

   "The Internet is that collection of connected TCP/IP networks.  Roughly
speaking, if you can connect directly to 'nic.ddn.mil' with telnet, you're
on the Internet.  You may be able to get Internet mail without being on the
Internet proper (say, if you're on America Online).

   "USENET is that set of machines and people who interchange USENET
messages.  A large number of USENET sites are on the Internet, and many
Internet sites get USENET.  Many USENET sites are NOT on the Internet,
however, getting their news via dialup lines, satellite receivers, magnetic
tape shipments (no kidding), and the like.  Roughly speaking, you're on
USENET if you get the 'news.announce.important' newsgroup.

   "They are related in that they are partially congruent and often
confused with each other :) but they are not the same network."

                        -==--==--==-<>-==--==--==-

                       Decrypting the Puzzle Palace
                                    by
                             John Perry Barlow
                              barlow@eff.org
                                     
                       "A little sunlight is the best disinfectant."
                                            --Justice Louis Brandeis

Over a year ago, in a condition of giddier innocence than I enjoy today, I
wrote the following about the discovery of Cyberspace:

"Imagine discovering a continent so vast that it may have no other side.
Imagine a new world with more resources than all our future greed might
exhaust, more opportunities than there will ever be entrepreneurs enough to
exploit, and a peculiar kind of real estate which expands with
development."

One less felicitous feature of this terrain which I hadn't noticed then is
what seems to be a long-encamped and immense army of occupation.

This army represents interests which are difficult to define, guards the
area against unidentified enemies, meticulously observes almost every
activity undertaken there, and continuously prevents most who inhabit its
domain from drawing any blinds against such observation.

It marshals at least 40,000 troops, owns the most advanced computing
resources in the world, and uses funds the dispersal of which does not fall
under any democratic review.

Imagining this force won't require from you the inventive powers of a
William Gibson. The American Occupation Army of Cyberspace exists.  Its
name is the National Security Agency.

It may be argued that this peculiar institution inhibits free trade, has
directly damaged American competitiveness, and poses a threat to liberty
anywhere people communicate with electrons. It's principal function, as
miff colleague John Gilmore puts it, is "wire-tapping the world," which it
is free to do without a warrant from any judge.

It is legally constrained from domestic surveillance, but precious few
people are in a good position to watch what, how, or whom the NSA watches.
And those who are tend to be temperamentally sympathetic to its objectives
and methods. They like power, and power understands the importance of
keeping it own secrets and learning everyone else's.

Whether it is meticulously ignoring every American byte or not, the NSA is
certainly pursuing policies which will render our domestic affairs
transparent to anyone who can afford big digital hardware.  Such policies
could have profound consequences on our liberty and privacy.
 
More to point, the role of the NSA in the area of domestic privacy needs to
be assessed in the light of other recent federal initiatives which seem
directly aimed at permanently denying privacy to the inhabitants of
Cyberspace, whether foreign or American.

Finally it seems a highly opportune time, directly following our
disorienting victory in the Cold War, to ask if the threats from which the
NSA purportedly protects us from are as significant as the hazards its
activities present.

Like most Americans I'd never given much thought to the NSA until recently.
(Indeed its very existence was a secret for much of my life. Beltway types
used to joke that NSA stood for "No Such Agency.")

I vaguely knew that it was another of the 12 or so shadowy federal spook
houses which were erected shortly after the Iron Curtain with the purpose
of stopping its further advance. It derives entirely from a memorandum sent
by Harry Truman on October 24, 1952 to Secretary of State Dean Acheson and
Defense Secretary Robert Lovatt. This memo, the official secrecy of which
remained unpenetrated for almost 40 years, created the NSA, placed it under
the authority of the Secretary of Defense, and charged it with monitoring
and decoding any signal transmission relevant to the security of the United
States.

Even after I started noticing the NSA, my natural immunity to paranoia
combined with a general belief in the incompetence of all bureaucracies...
especially those whose inefficiencies are unmolested by public scrutiny...
to mute any sense of alarm. But this was before I began to understand the
subterranean battles raging over data encryption and the NSA's role in
them. Lately, I'm less sanguine.

Encryption may be the only reliable method for conveying privacy to the
inherently public domain of Cyberspace. I certainly trust it more than
privacy protection laws. Relying on government to protect your privacy is
like asking a peeping tom to install your window blinds.

In fact, we already have a strong-sounding federal law protecting our
electronic privacy, the Electronic Communications Privacy Act or ECPA. But
this law has not particular effective in those areas were electronic
eavesdropping is technically easy. This is especially true in the area of
cellular phone conversations, which, under the current analog transmission
standard, are easily accessible to anyone from the FBI to you.

The degree of law enforcement apprehension over secure cellular encryption
provides mute evidence of how seriously they've been taking ECPA. They are
moving on a variety of fronts to see that robust electronic privacy
protection systems don't become generally available to the public. Indeed,
the current administration may be so determined to achieve this end that
they may be willing to paralyze progress in America's most promising
technologies rather than yield on it.

Push is coming to shove in two areas of communications technology: digital
transmission of heretofore analog signals and the encryption of transmitted
data.

As the communications service providers move to packet switching, fiber
optic transmission lines, digital wireless, ISDN and other advanced
techniques, what have been discrete channels of continuous electrical
impulses, voices audible to anyone with alligator clips on the right wires,
are now becoming chaotic blasts of data packets, readily intelligible only
to the sender and receiver. This development effectively forecloses
traditional wire-tapping techniques, even as it provides new and different
opportunities for electronic surveillance.

It is in the latter area where the NSA knows its stuff. A fair percentage
of the digital signals dispatched on planet Earth must pass at some point
through the NSA's big sieve in Fort Meade, Maryland, 12 underground acres
of the heaviest hardware in the computing world. There, unless these
packets are also encrypted with a particularly knotty algorithm, sorting
them back into their original continuity is not so difficult.

Last spring, alarmed at a future in which it would have to sort through an
endless fruit salad of encrypted bits, the FBI persuaded Senator Joseph
Biden to include language in Senate Bill 266 which would have directed
providers of electronic communications services and devices (such as
digital cellular phone systems or other multiplexed communications
channels) to implement only such encryption methods as would assure
governmental ability to extract from the data stream the plain text of any
voice or data communications in which it took a legal interest. It was if
the government had responded to a technological leap in lock design by
requiring building contractors to supply it with skeleton keys to every
door in America.

The provision raised wide-spread concern in the computer community, which
was better equipped to understand its implications than the general public,
and in August of last year, the Electronic Frontier Foundation, in
cooperation with Computer Professionals for Social Responsibility and other
industry groups, successfully lobbied to have it removed from the bill.

Our celebration was restrained. We knew we hadn't seen the last of it. For
one thing, the movement to digital communications does create some serious
obstacles to traditional wire-tapping procedures. I fully expected that law
enforcement would be back with new proposals, which I hoped might be ones
we could support. But what I didn't understand then, and am only now
beginning to appreciate, was the extent to which this issue had already
been engaged by the NSA in the obscure area of export controls over data
encryption algorithms.

Encryption algorithms, despite their purely defensive characteristics, have
been regarded by the government of this country as weapons of war for many
years. If they are to be employed for privacy (as opposed to
authentication) and they are any good at all, their export is licensed
under State Department's International Traffic in Arms Regulations or ITAR.

The encryption watchdog is the NSA. It has been enforcing a policy, neither
debated nor even admitted to, which holds that if a device or program
contains an encryption scheme which the NSA can't break fairly easily, it
will not be licensed for international sale.

Aside for marveling at the silliness of trying to embargo algorithms, a
practice about as practicable as restricting the export of wind, I didn't
pay much attention to the implications of NSA encryption policies until
February of this year.  It was then that I learned about the deliberations
of an obscure group of cellular industry representatives called the Ad Hoc
Authentication Task Force, TR45.3 and of the influence which the NSA has
apparently exercised over their findings.

In the stately fashion characteristic of standard-setting bodies, this
group has been working for several years on a standard for digital cellular
transmission, authentication, and privacy protection to be known by the
characteristically whimsical telco moniker IS-54B.

In February they met near Giants Stadium in East Rutherford, NJ. At that
meeting, they recommended, and agreed not to publish, an encryption scheme
for American-made digital cellular systems which many sophisticated
observers believe to be intentionally vulnerable.  It was further thought
by many observers that this "dumbing down" had been done indirect
cooperation with the NSA.

Given the secret nature of the new algorithm, its actual merits were
difficult to assess. But many cryptologists believe there is enough in the
published portions of the standard to confirm that it isn't any good.

One cryptographic expert, one of two I spoke with who asked not to be
identified lest the NSA take reprisals against his company, said:

"The voice privacy scheme, as opposed to the authentication scheme, is
pitifully easy to break. It involves the generation of two "voice privacy
masks" each 260 bits long. They are generated as a byproduct of the
authentication algorithm and remain fixed for the duration of a call. The
voice privacy masks are exclusive_ORed with each frame of data from the
vocoder at the transmitter. The receiver XORs the same mask with the
incoming data frame to recover the original plain text.  Anyone familiar
with the fundamentals of cryptanalysis can easily see how weak this scheme
is."

And indeed, Whitfield Diffie, co-inventor of Public Key cryptography and
arguably the dean of this obscure field, told me this about the fixed
masks:

"Given that description of the encryption process, there is no need for the
opponents to know how the masks were generated. Routine cryptanalytic
operations will quickly determine the masks and remove them.''

Some on committee claimed that possible NSA refusal of export licensing had
no bearing on the algorithm they chose. But their decision not to publish
the entire method and expose it to cryptanalytical abuse (not to mention
ANSI certification) was accompanied by the following convoluted
justification:

"It is the belief of the majority of the Ad Hoc Group, based on our current
understanding of the export requirements, that a published algorithm would
facilitate the cracking of the algorithm to the extent that its fundamental
purpose is defeated or compromised."(Italics added.)

Now this is a weird paragraph any way you parse it, but its most singular
quality is the sudden, incongruous appearance of export requirements in a
paragraph otherwise devoted to algorithmic integrity. In fact, this
paragraph is itself code, the plain text of which goes something like this:
"We're adopting this algorithm because, if we don't, the NSA will slam an
export embargo on all domestically manufactured digital cellular phones."

Obviously, the cellular phone systems manufacturers and providers are not
going to produce one model for overseas sale and another for domestic
production. Thus, a primary effect of NSA-driven efforts to deny some
unnamed foreign enemy secure cellular communications is on domestic
security. The wireless channels available to private Americans will be
cloaked in a mathematical veil so thin that, as one crypto-expert put it,
"Any county sheriff with the right PC-based black box will be able to
monitor your cellular conversations."

When I heard him say that, it suddenly became clear to me that, whether
consciously undertaken with that goal or not, the most important result of
the NSA's encryption embargoes has been the future convenience of domestic
law enforcement. Thanks to NSA export policies, they will be assured that,
as more Americans protect their privacy with encryption, it will be of a
sort easily penetrated by authority.

I find it increasingly hard to imagine this is not their real objective as
well. Surely, they must be aware of how ineffectual their efforts have been
in keeping good encryption out of inimical military possession. An
algorithm is somewhat less easily stopped at the border than, say, a
nuclear reactor. As William Neukom, head of Microsoft Legal puts it, "The
notion that you can control this technology is comical."

I became further persuaded that this was the case upon hearing, from a
couple of sources, that the Russians have been using the possibly
uncrackable (and American) RSA algorithm in their missile launch codes for
the last ten years and that, for as little as five bucks, one can get a
software package called Crypto II on the streets of Saint Petersburg which
includes both RSA and DES encryption systems.

Nevertheless, the NSA has been willing to cost American business a lot of
revenue rather than allow domestic products with strong encryption into the
global market.

While it's impossible to set a credible figure on what that loss might add
up to, it's high. Jim Bidzos, whose RSA Data Security licenses RSA, points
to one major Swiss bid in which a hundred million dollar contract for
financial computer terminals went to a European vendor after American
companies were prohibited by the NSA from exporting a truly secure network.

The list of export software containing intentionally broken encryption is
also long. Lotus Notes ships in two versions. Don't count on much
protection from the encryption in the export version.  Both Microsoft and
Novell have been thwarted in their efforts to include RSA in their
international networking software, despite frequent publication of the
entire RSA algorithm in technical publications all over the world.

With hardware, the job has been easier. NSA levied against the inclusion of
a DES chip in the AS/390 series IBM mainframes in late 1990 despite the
fact that, by this time, DES was in widespread use around the world,
including semi-official adoption by our official enemy, the USSR.

I now realize that Soviets have not been the NSA's main concern at any time
lately. Naively hoping that, with the collapse of the Evil Empire, the NSA
might be out of work, I then learned that, given their own vigorous crypto
systems and their long use of some embargoed products, the Russians could
not have been the threat from whom this forbidden knowledge was to be kept.
Who has the enemy been then? I started to ask around.

Cited again and again as the real object of the embargoes were Third-World
countries. terrorists and... criminals. Criminals, most generally
drug-flavored, kept coming up, and nobody seemed terribly concerned that
some of their operations might be located in areas supposedly off-limits to
NSA scrutiny.

Presumably the NSA is restricted from conducting American surveillance by
both the Foreign Intelligence Surveillance Act of 1978 (FISA) and a series
of presidential directives, beginning with one issued by President Ford
following Richard Nixon's bold misuse of the NSA, in which he explicitly
directed the NSA to conduct widespread domestic surveillance of political
dissidents and drug users.

But whether or not FISA has actually limited the NSA's abilities to conduct
domestic surveillance seemed less relevant the more I thought about it. A
better question to ask was, "Who is best served by the NSA's encryption
export policies?" The answer is clear: domestic law enforcement. Was this
the result of some spook plot between NSA and, say, the Department of
Justice? Not necessarily.

Certainly in the case of the digital cellular standard, cultural congruity
between foreign intelligence, domestic law enforcement, and what somebody
referred to as "spook wannabes on the TR45.3 committee" might have a lot
more to do with the its eventual flavor than any actual whisperings along
the Potomac.

                [continued in Effector Online 3.1  Part 2]

      EFFector Online     JULY 22, 1992    Issue  3.1 / end of Part 1
=====================================================================
EFFector Online             JULY 29, 1992         Issue  3.1 / Part 2
         A Publication of the Electronic Frontier Foundation         
                           ISSN 1062-9424                            
=====================================================================

[Decrypting the Puzzle Palace by John Perry Barlow - continued - ]

Unable to get anyone presently employed by the NSA to comment on this or
any other matter and with little opportunity to assess the NSA's
congeniality toward domestic law enforcement from the inside, I
approached a couple of old hands for a highly distilled sample of
intelligence culture.

I called Admirals Stansfield Turner and Bobby Ray Inman. Not only had their
Carter administration positions as, respectively, CIA and NSA Directors,
endowed them with considerable experience in such matters, both are
generally regarded to be somewhat more sensitive to the limits of
democratic power than their successors. None of whom seemed likely to
return my calls anyway.

My phone conversations with Turner and Inman were amiable enough, but they
didn't ease my gathering sense that the NSA takes an active interest in
areas which are supposedly beyond its authorized field of scrutiny.

Turner started out by saying he was in no position to confirm or deny any
suspicions about direct NSA-FBI cooperation on encryption, but he didn't
think I was being exactly irrational in raising the question.  In fact, he
genially encouraged me to investigate the matter further.

He also said that while a sub rosa arrangement between the NSA and the
Department of Justice to compromise domestic encryption would be
"injudicious," he could think of no law, including FISA (which he helped
design), which would prevent it.

Most alarmingly, this gentleman who has written eloquently on the hazards
of surveillance in a democracy did not seem terribly concerned that our
digital shelters are being rendered permanently translucent by and to the
government.

He said, "A threat could develop...terrorism, narcotics, whatever...where
the public would be pleased that all electronic traffic was open to
decryption. You can't legislate something which forecloses the possibility
of meeting that kind of emergency."

Admiral Inman had even more enthusiasm for assertive governmental
supervision. Although he admitted no real knowledge of the events behind
the new cellular encryption standard, he wasn't the least disturbed to hear
that it might be flawed.

And, despite the fact that his responsibilities as NSA Director had been
restricted to foreign intelligence, he seemed a lot more comfortable
talking about threats on the home front.

"The Department of Justice," he began, "has a very legitimate worry.  The
major weapon against white collar crime has been the court-ordered wiretap.
If the criminal elements go to using a high quality cipher, the principal
defense against narcotics traffic is gone."  This didn't sound like a guy
who, were he still head of NSA, would rebuff FBI attempts to get a little
help from his agency.

He brushed off my concerns about the weakness of the cellular encryption
standard. "If all you're seeking is personal privacy, you can get that with
a very minimal amount of encipherment."

Well, I wondered, Privacy from whom?

And he seemed to regard real, virile encryption to be something rather like
a Saturday Night Special.  "My answer," he said, "would be legislation
which would make it a criminal offense to use encrypted communication to
conceal criminal activity."

Wouldn't that render all encrypted traffic automatically suspect? I asked.

"Well, he said, "you could have a registry of institutions which can
legally use ciphers. If you get somebody using one who isn't registered,
then you go after him."

You can have my encryption algorithm, I thought to myself, when you pry my
cold dead fingers from its private key.

It wasn't a big sample, but it was enough to gain a better appreciation of
the cultural climate of the intelligence community.  And these guys are the
liberals. What legal efficiencies might their Republican successors be
willing to employ to protect the American Way?

Without the comfortably familiar presence of the Soviets to hate and fear,
we can expect to see a sharp increase in over-rated bogeymen and virtual
states of emergency. This is already well under way. I think we can expect
our drifting and confused hardliners to burn the Reichstag repeatedly until
they have managed to extract from our induced alarm the sort of government
which makes them feel safe.

This process has been under way for some time. One sees it in the war on
terrorism, against which pursuit "no liberty is absolute," as Admiral
Turner put it. This, despite the fact that, during last year for which I
have a solid figure, 1987, only 7 Americans succumbed to terrorism.

You can also see it clearly under way in the War on Some Drugs. The Fourth
Amendment to the Constitution has largely disappeared in this civil war.
And among the people I spoke with, it seemed a common canon that drugs (by
which one does not mean Jim Beam, Marlboros, Folger's, or Halcion) were a
sufficient evil to merit the government's holding any more keys it felt the
need for.

One individual close to the committee said that at least some of the
aforementioned "spook wannabes" on the committee were "interested in weak
cellular encryption because they considered warrants not to be "practical"
when it came to pursuing drug dealers and other criminals using cellular
phones."

In a miscellaneously fearful America, where the people cry for shorter
chains and smaller cages, such privileges as secure personal communications
are increasingly regarded as expendable luxuries. As Whitfield Diffie put
it, "From the consistent way in which Americans seem to put security ahead
of freedom, I rather fear that most of them would prefer that all
electronic traffic was open to government decryption right now if they had
given it any thought."

In any event, while I found no proof of an NSA-FBI conspiracy to gut the
American cellular phone encryption standard, it seemed clear to me that
none was needed. The same results can be delivered by a cultural
"auto-conspiracy" between like-minded hardliners and cellular companies who
will care about privacy only when their customers do.

You don't have to be a hand-wringing libertarian like me to worry about the
domestic consequences of the NSA's encryption embargoes.  They are also, as
stated previously, bad for business, unless, of course, the business of
America is no longer business but, as sometimes seems the case these days,
crime control.

As Ron Rivest (the "R" in RSA) said to me, "We have the largest information
based economy in the world. We have lots of reasons for wanting to protect
information, and weakening our encryption systems for the convenience of
law enforcement doesn't serve the national interest."

But by early March, it had become clear that this supposedly business-
oriented administration had made a clear choice to favor cops over commerce
even if the costs to the American economy were to become extremely high.

A sense of White House seriousness in this regard could be taken from their
response to the first serious effort by Congress to bring the NSA to task
for its encryption embargoes. Rep. Mel Levine (D-Calif.)  proposed an
amendment to the Export Administration Act to transfer mass market software
controls to the Commerce Department, which would relax the rules. The
administration responded by saying that they would veto the entire bill if
the Levine amendment remained attached to it.

Even though it appeared the NSA had little to fear from Congress, the
Levine amendment may have been part of what placed the agency in a
bargaining mood for the first time. They entered into discussions with the
Software Publishers Association who, acting primarily on behalf of
Microsoft and Lotus, got to them to agree "in principle" to a streamlined
process for export licensing of encryption which might provide for more
robust standards than have been allowed previously.

But the negotiations between the NSA and the SPA were being conducted
behind closed doors, with the NSA-imposed understanding that any agreement
they reached would be set forth only in a "confidential" letter to
Congress. As in the case of the digital cellular standard, this would
eliminate the public scrutiny by cryptography researchers which anneals
genuinely hardened encryption.

Furthermore, some cryptographers worried that the encryption key lengths to
which the SPA appeared willing to restrict its member publishers might be
too short to provide much defense against the sorts of brute-force
decryption assaults which advances in processor technology will yield in
the fairly near future. And brute force has always been the NSA's strong
suit.

Whether accurate or not, the impression engendered by the style of the
NSA-SPA negotiations was not one of unassailable confidence. The lack of it
will operate to the continued advantage of foreign manufacturers in an era
when more and more institutions are going to be concerned about the privacy
of their digital communications.

But the economic damage which the NSA-SPA agreement might cause would be
minor compared to what would result from a startling new federal
initiative, the Department of Justice's proposed legislation on digital
telephony. If you're wondering what happened to the snooping provisions
which were in Senate Bill 266, look no further. They're back. And they're
bigger and bolder than ever.

They are contained in a sweeping proposal which have been made by the
Justice Department to the Senate Commerce Committee for legislation which
would "require providers of electronic communications services and private
branch exchanges to ensure that the Government's ability to lawfully
intercept communications is unimpeded by the introduction of advanced
digital telecommunications technology or any other telecommunications
technology."

Amazingly enough, this really means what it says: before any advance in
telecommunications technology can be deployed, the service providers and
manufacturers must assure the cops that they can tap into it. In other
words, development in digital communications technology must come to a
screeching halt until Justice can be assured that it will be able to grab
and examine data packets with the same facility they have long enjoyed with
analog wire-tapping.

It gets worse. The initiative also provides that, if requested by the
Attorney General, "any Commission proceeding concerning regulations,
standards or registrations issued or to be issued under authority of this
section shall be closed to the public." This essentially places the
Attorney General in a position to shut down any telecommunications advance
without benefit of public hearing.

When I first heard of the digital telephony proposal, I assumed it was a
kind of bargaining chip. I couldn't imagine it was serious. But it now
appears they are going to the mattresses on this one.

Taken together with NSA's continued assertion of its authority over
encryption, a pattern becomes clear. The government of the United States is
so determined to maintain law enforcement's traditional wire-tapping
abilities in the digital age that it is willing to fundamentally cripple
the American economy to do so. This may sound hyperbolic, but I believe it
is not.

The greatest technology advantage this country presently enjoys is in the
areas of software and telecommunications. Furthermore, thanks in large part
to the Internet, much of America is already wired for bytes, as significant
an economic edge in the Information Age as the existence of a railroad
system was for England one hundred fifty years ago.

If we continue to permit the NSA to cripple our software and further convey
to the Department of Justice the right to stop development the Net without
public input, we are sacrificing both our economic future and our
liberties. And all in the name of combating terrorism and drugs.

This has now gone far enough. I have always been inclined to view the
American government as pretty benign as such creatures go. I am generally
the least paranoid person I know, but there is something scary about a
government which cares more about putting its nose in your business than it
does about keeping that business healthy.

As I write this, a new ad hoc working group on digital privacy, coordinated
by the Electronic Frontier Foundation, is scrambling to meet the challenge.
The group includes representatives from organizations like AT&T, the
Regional Bells, IBM, Microsoft, the Electronic Mail Association and about
thirty other companies and public interest groups.

Under the direction of Jerry Berman, EFF's Washington office director, and
John Podesta, a capable lobbyist and privacy specialist who helped draft
the ECPA, this group intends to stop the provisions in digital telephony
proposal from entering the statute books.

We also intend to work with federal law enforcement officials to address
their legitimate concerns. We don't dispute their need to conduct some
electronic surveillance, but we believe this can be assured by more
restrained methods than they're proposing.

We are also preparing a thorough examination of the NSA's encryption export
policies and looking into the constitutional implications of those
policies. Rather than negotiating behind closed doors, as the SPA has been
attempting to do, America's digital industries have a strong self-interest
in banding together to bring the NSA's procedures and objectives into the
sunlight of public discussion.

Finally, we are hoping to open a dialog with the NSA. We need to develop a
better understanding of their perception of the world and its threats. Who
are they guarding us against and how does encryption fit into that
endeavor? Despite our opposition to their policies on encryption export, we
assume that NSA operations have some merit. But we would like to be able to
rationally balance the merits against the costs.

We strongly encourage any organization which might have a stake in the
future of digital communication to become involved. Letters expressing your
concern may be addressed to: Sen. Ernest Hollings, Chairman, Senate
Commerce Committee, U.S. Senate, Washington, DC and to Don Edwards,
Chairman, Subcommitee on Constitutional Rights, House Judiciary Committee.
(I would appreciate hearing those concerns myself. Feel free to copy me
with those letters at my physical address, c/o P.O. Box 1009, Pinedale, WY
82941 or in Cyberspace, barlow@eff.org.)

If your organization is interested in becoming part of the digital privacy
working group, please contact EFF's Washington office at: 666 Pennsylvania
Avenue SE, Suite 303, Washington, DC 20003, 202/544- 9237, FAX:
202/547-5481. EFF also encourages individuals interested in these issues to
join the organization. Contact us at: Electronic Frontier Foundation, 155
Second Street, Cambridge, MA 02141,617/864- 0665, eff-request@eff.org.

The legal right to express oneself is meaningless if there is no secure
medium through which that expression may travel. By the same token, the
right to hold certain unpopular opinions is forfeit unless one can discuss
those opinions with others of like mind without the government listening in.
 
Even if you trust the current American government, as I am still largely
inclined to, there is a kind of corrupting power in the ability to create
public policy in secret while assuring that the public will have little
secrecy of its own.

In its secrecy and technological might, the NSA already occupies a very
powerful position. And conveying to the Department of Justice what amounts
to licensing authority for all communications technology would give it a
control of information distribution rarely asserted over English-speaking
people since Oliver Cromwell's Star Chamber Proceedings.

Are there threats, foreign or domestic, which are sufficiently grave to
merit the conveyance of such vast legal and technological might?  And even
if the NSA and FBI may be trusted with such power today, will they always
be trustworthy? Will we be able to do anything about it if they aren't?

Senator Frank Church said of NSA technology in 1975 words which are more
urgent today:

"That capability at any time could be turned around on the American people
and no American would have any privacy left. There would be no place to
hide. If this government ever became a tyranny, the technological capacity
that the intelligence community has given the government could enable it to
impose total tyranny. There would be no way to fight back, because the most
careful effort to combine together in resistance to the government, no
matter how privately it was done, is within the reach of the government to
know. Such is the capacity of this technology."

San Francisco, California
May, 1992

Reprinted from Communications of the ACM, June 1992 
by permission of the author

                        -==--==--==-<>-==--==--==-

                           from THE TAO TE CHIP
                           by Jeffrey Sorrenson
                           sorensen@ecse.rpi.edu
               (with help from Steven Mitchell and Lao Tzu)

               2

When users see one GUI as beautiful,
other user interfaces become ugly.
When users see some programs as winners,
other programs become lossage.

Pointers and NULLs reference each other.
High level and assembler depend on each other.
Double and float cast to each other.
High-endian and low-endian define each other.
While and until follow each other.

Therefore the Guru 
programs without doing anything
and teaches without saying anything.
Warnings arise and he lets them come;
processes are swapped and he lets them go.
He has but doesn't possess,
acts but doesn't expect.
When his work is done, he deletes it.
That is why it lasts forever.

               80

If a system is administered wisely,
its users will be content.
They enjoy hacking their code
and don't waste time implementing
labor-saving shell scripts.
Since they dearly love their accounts,
they aren't interested in other machines.
There may be telnet, rlogin, and ftp,
but these don't access any hosts.
There may be an arsenal of cracks and malware,
but nobody ever uses them.
People enjoy reading their mail,
take pleasure in being with their newsgroups,
spend weekends working at their terminals,
delight in the doings at the site.
And even though the next system is so close
that users can hear its key clicks and biff beeps,
they are content to die of old age
without ever having gone to see it.

                        -==--==--==-<>-==--==--==-

             MEMBERSHIP IN THE ELECTRONIC FRONTIER FOUNDATION
If you support our goals and our work, you can show that support by
becoming a member now. Members receive our quarterly newsletter,
EFFECTOR, our bi-weekly electronic newsletter, EFFector Online (if you
have an electronic address that can be reached through the Net), and
special releases and other notices on our activities.  But because we
believe that support should be freely given, you can receive these
things even if you do not elect to become a member.

Our memberships are $20.00 per year for students, $40.00 per year for
regular members.  You may, of course, donate more if you wish.

Our privacy policy: The Electronic Frontier Foundation will never, under
any circumstances, sell any part of its membership list.  We will, from
time to time, share this list with other non-profit organizations whose
work we determine to be in line with our goals. If you do not grant
explicit permission, we assume that you do not wish your membership
disclosed to any group for any reason.

---------------- EFF MEMBERSHIP FORM ---------------

Mail to: The Electronic Frontier Foundation, Inc.
         155 Second St. #31
         Cambridge, MA 02141

I wish to become a member of the EFF  I enclose:$__________
            $20.00 (student or low income membership)
            $40.00 (regular membership)
            $100.00(Corporate or company membership.
                    This allows any organization to
                    become a member of EFF. It allows
                    such an organization, if it wishes
                    to designate up to five individuals
                    within the organization as members.)

    |     I enclose an additional donation of $___________

Name:______________________________________________________

Organization:______________________________________________

Address: __________________________________________________

City or Town: _____________________________________________

State:_______ Zip:________ Phone:(    )_____________(optional)

FAX:(    )____________________(optional)

Email address: ______________________________

I enclose a check [  ]   .
Please charge my membership in the amount of $_____________
to my Mastercard [  ]     Visa [  ]      American Express [ ]

Number:____________________________________________________

Expiration date: ____________

Signature: ________________________________________________

Date:______________________

I hereby grant permission to the EFF to share my name with
other non-profit groups from time to time as it deems
appropriate   [  ]  .
                       Initials:___________________________

Your membership/donation is fully tax deductible.
=====================================================================
                   EFFector Online is published by
                 The Electronic Frontier Foundation
                155 Second Street, Cambridge MA 02141
             Phone: +1 617 864 0665 FAX: +1 617 864 0866
                    Internet Address: eff@eff.org
 Reproduction of this publication in electronic media is encouraged
             To reproduce signed articles individually,
      please contact the authors for their express permission.
=====================================================================
       This newsletter is printed on 100% recycled electrons.


########## ########## ########## |    
########## ########## ########## |   
####       ####       ####       |                                   
########   ########   ########   |       THE FUTURE OF NSFNET
########   ########   ########   |    
####       ####       ####       |                   
########## ####       ####       |                                   
########## ####       ####       |                   
=====================================================================
EFFector Online             August 19, 1992                Issue  3.2
         A Publication of the Electronic Frontier Foundation         
                           ISSN 1062-9424                            
=====================================================================


               GETTING A HANDLE ON THE FUTURE OF NSFNET
                    by Andrew Blau (blau@eff.org)

                  A Report on the July 23 Meeting 
                 of the Communications Policy Forum 
                          in Washington, D.C.

The National Science Foundation (NSF) is responsible for the NSFNet. 
Originally a network created to link a handful of supercomputing 
centers serving the U.S. research and education community, NSFNet 
became the backbone of the Internet in this country, now serving 
millions of people and thousands of organizations.  Since 1987, the 
NSF has contracted with a partnership of Merit Network, Inc., IBM 
and MCI to provide and manage these "backbone network services.  
That contract will expire in November of this year.

In order to award a contract for the next phase of the NSFNet's 
growth and management, NSF staff is preparing a solicitation that 
will describe the network that the NSF wants and invite interested 
organizations to bid to become the provider of those services.  
However, before releasing the final solicitation that will be bid 
on, the NSF released a draft and asked for public comment on it. 
Comments were to be filed by August 3rd of this year.

In response to this, EFF, which administers the Communications 
Policy Forum in Washington, DC convened a roundtable on July 23 to 
bring together a wide cross-section of groups that would either be 
bidding on the new contract or would be affected by its outcome. 
Also attending the meeting were members of the NSF staff. The 
meeting itself, in order to stimulate an open exchange of views, was 
"off-the-record" in that while notes on the sense of the speakers 
were maintained, no speaker was directly quoted.

                 The Proposed New Shape of NSFNet

The Draft Solicitation describes a new architecture for the NSFNet. 
It specifies certain requirements for those who are interested in 
providing these services.  

Until now, the "backbone network services" that lie at the heart of 
the NSFNet worked as a single package. This package was a trunk for 
connecting regional or "mid-level" networks across the country. It 
was provided by an organization that also controlled access to the 
backbone and directed traffic on it.  In recent years, this 
arrangement created a sense of unfairness among competitors in the 
independent commercial sector who are eager to provide network 
services and Internet connections. 

In order to address these and other concerns, the Draft Solicitation 
proposes that the next generation will split this package into two 
distinct units. The first unit would be a "very high speed backbone" 
or "vBNS". The second unit would provide a number of "network access 
points" or "NAPs."  The entity responsible for providing the NAPs 
will also be the Routing Authority that oversees network traffic.

The draft also specifies some requirements for the new architecture. 
First the vBNS must operate at 155 mbps or higher. Second, it must 
connect to all NAPs. Third, it must provide high speed interregional 
connectivity. Fourth it must be restricted to research and education 
traffic only. Fifth, the NAPs must operate at speeds of at least 100 
mbps, may connect any number of networks to each other or the vBNS, 
and are open to any kind of traffic.  Finally, the vBNS provider and 
the NAP manager must be two different entities.

                        Reactions at the CPF

Two major themes emerged from the nearly six hours of discussion at 
the July 23rd CPF meeting.  

First, there has been substantial lack of shared understanding about 
some of the draft's key elements.  Among items mentioned were such 
basic questions as what is a NAP, what is the vBNS, how will they 
relate, are there ways of connecting to the vBNS without going 
through a NAP, how many NAPs will there be and where will they be 
located, what will it cost to connect to a NAP and how will charges 
be set?

Second, it became clear that there were many important issues about 
which the NSF remained "intentionally silent."  Most obviously, the 
draft has no guidelines to suggest how bids will be evaluated.  In 
addition, the draft is silent about how this generation of the 
NSFNet intersects with the development of the NREN. It does not 
suggest how prices for NAP attachment will be set, and when. The 
draft fails to address the procedure for starting a non-NSF 
sponsored NAP and connecting to the vBNS. The draft also fails to 
illuminate how the NSF determines when a technology is no longer 
"experimental" and can be provided commercially without further 
government funding.

Additional issues came from the various constituencies around the 
table who brought with them very different concerns.  For example, 
the research and education community appreciated that the draft 
seemed to make it easier to access commercial services through the 
Internet, yet expressed concern that the new architecture would 
disrupt the regional arrangements that allow costs to be shared.  
These cost sharing arrangements, they argue, foster more widespread 
connectivity, and disrupting them could reduce rather than increase 
the number of networked institutions.

Commercial network service providers expressed a range of opinions.  
Some supported the basic architecture, although suggested certain 
modifications, such as that the Routing Authority be separate from 
the entity that manages the NAPs.  Others argued that the draft 
continues to unfairly distort the marketplace for network services 
by subsidizing standard connections such as e-mail.

Local telephone companies, who have not previously been involved in 
the development of the NSFNet, pointed out that the NSF was 
proposing a new commercial network without taking into account the 
infrastructure and regulatory boundaries of the nation's local 
exchange telephone companies.  Since the breakup of the Bell System, 
for example, the Baby Bells cannot transport traffic across certain 
regional boundaries.  If the NSF's architecture does not put a NAP 
in every one of these regions, then these network providers are 
automatically excluded from full participation.

Following the meeting, the EFF staff prepared a summary of the major 
issues that arose during the course of the discussion and circulated 
it to all those in attendance. The EFF also submitted it to the NSF as 
a record of important concerns that the EFF believes should be 
considered in preparing the final solicitation.  In addition, the EFF 
asked the NSF to resubmit a draft solicitation for public comment 
before issuing a final version.
                       *      *      *      *      *

Want more information?

For more information about the NSFNet draft solicitation and bidding
process, contact our Washington office at eff.org.  DC staff members 
Danny Weitzner(djw@eff.org) and Andrew Blau (blau@eff.org), as well as 
Jerry Berman (jberman@eff.org), the Director of the Washington office, 
have all been working on this issue.

About the Communications Policy Forum

The Communications Policy Forum, a project administered by the EFF, 
provides consumer and public interest groups, telecommunications 
companies, computer industry groups and policy makers a common forum 
in which to discuss telecommunications issues and exchange views in 
a non-partisan setting.  The CPF also undertakes non-partisan 
research.  It is co-sponsored with the Consumer Federation of 
America and the ACLU.

                        -==--==--==-<-==--==--==-

             MEMBERSHIP IN THE ELECTRONIC FRONTIER FOUNDATION
If you support our goals and our work, you can show that support by
becoming a member now. Members receive our quarterly newsletter,
EFFECTOR, our bi-weekly electronic newsletter, EFFector Online (if you
have an electronic address that can be reached through the Net), and
special releases and other notices on our activities.  But because we
believe that support should be freely given, you can receive these
things even if you do not elect to become a member.

Our memberships are $20.00 per year for students, $40.00 per year for
regular members.  You may, of course, donate more if you wish.

Our privacy policy: The Electronic Frontier Foundation will never, under
any circumstances, sell any part of its membership list.  We will, from
time to time, share this list with other non-profit organizations whose
work we determine to be in line with our goals. If you do not grant
explicit permission, we assume that you do not wish your membership
disclosed to any group for any reason.

---------------- EFF MEMBERSHIP FORM ---------------

Mail to: The Electronic Frontier Foundation, Inc.
         155 Second St. #32
         Cambridge, MA 02141

I wish to become a member of the EFF  I enclose:$__________
            $20.00 (student or low income membership)
            $40.00 (regular membership)
            $100.00(Corporate or company membership.
                    This allows any organization to
                    become a member of EFF. It allows
                    such an organization, if it wishes
                    to designate up to five individuals
                    within the organization as members.)

    |     I enclose an additional donation of $___________

Name:______________________________________________________

Organization:______________________________________________

Address: __________________________________________________

City or Town: _____________________________________________

State:_______ Zip:________ Phone:(    )_____________(optional)

FAX:(    )____________________(optional)

Email address: ______________________________

I enclose a check [  ]   .
Please charge my membership in the amount of $_____________
to my Mastercard [  ]     Visa [  ]      American Express [ ]

Number:____________________________________________________

Expiration date: ____________

Signature: ________________________________________________

Date:______________________

I hereby grant permission to the EFF to share my name with
other non-profit groups from time to time as it deems
appropriate   [  ]  .
                       Initials:___________________________

Your membership/donation is fully tax deductible.
=====================================================================
                   EFFector Online is published by
                 The Electronic Frontier Foundation
                155 Second Street, Cambridge MA 02141
             Phone: +1 617 864 0665 FAX: +1 617 864 0866
                    Internet Address: eff@eff.org
 Reproduction of this publication in electronic media is encouraged
             To reproduce signed articles individually,
      please contact the authors for their express permission.
=====================================================================
       This newsletter is printed on 100% recycled electrons.


########## ########## ########## |  THE EFF AND THE FBI: Two Letters 
########## ########## ########## |                                   
####       ####       ####       |                                   
########   ########   ########   |       ONE BBSCON REPORTS          
########   ########   ########   | At Play in the Field of the Boards
####       ####       ####       |        Dueling BBSCONS            
########## ####       ####       |                                   
########## ####       ####       |                                   
=====================================================================
EFFector Online             August 24, 1992                Issue  3.3
         A Publication of the Electronic Frontier Foundation         
                           ISSN 1062-9424                            
=====================================================================


                THE EFF AND THE FBI: An exchange of views

This is an exchange of letters in the Wall Street Journal between
the Director of the FBI, William Sessions and EFF's Staff Counsel, Mike 
Godwin.

                                                     August 4,1992

FBI Must Keep Up With Wonks & Hackers

Re your July 9 article about a very successful "computer hackers" 
investigation conducted by the FBI and the Secret Service ("Wiretap 
Inquiry Spurs Computer Hacker Charges"):  The article mentions that 
court-ordered electronic surveillance was a critical part of the 
investigation and that the FBI is seeking laws to make it easier to tap 
computer systems.  Mike Godwin, general counsel for the Electronic 
Frontier Foundation, said that "the success in this case 'undercuts' the 
argument that new laws are needed."  I believe the opposite to be the 
case.  This investigation clearly demonstrates why legislation is 
absolutely necessary.

What Mr. Godwin is referring to is a legislative proposal on behalf of 
law enforcement to ensure that as telecommunications technology 
advances, the ability of law enforcement to conduct court-ordered 
electronic surveillance is not lost.  Without the legislation, it is 
almost certain that will occur.  The proposal is not directed at 
computer systems, but pertains to telephone service providers and 
equipment manufacturers.

In 1968, Congress carefully considered and passed legislation setting 
forth the exacting procedure by which court authorization to conduct 
electronic surveillance can be obtained.  Since that time it has become 
an invaluable investigative tool in combating serious and often life-
threatening crimes such as terrorism, kidnapping, drugs and organized 
crime.  The 1968 law contemplates cooperation by the telecommunications 
service providers in implementing these court orders.  The proposed 
legislation only clarifies that responsibility by making it clearly 
applicable regardless of the technology deployed.

Absent legislation, the ability to conduct successful investigations 
such as the one mentioned in your article will certainly be jeopardized.
The deployment of digital telecommunications equipment that is not 
designed to meet the need for law enforcement to investigate crime and 
enforce the laws will have that effect.  No new authority is needed or 
requested.  All the legislation would do if enacted is ensure that the 
status quo is maintained and the ability granted by Congress in 1968 
preserved.

William S. Sessions
Director, FBI, Department of Justice
Wall Street Journal, August 4, 1992


                                                  August 14, 1992

Letters to the Editor
The Wall Street Journal:
200 Liberty Street
New York, NY 10281


In his Aug. 4 letter to the editor, FBI Director William Sessions
disagrees with my quoted opinion that the FBI's success in a
computer-wiretap case "'undercuts' the argument that new laws are 
needed." His disagreement doesn't disturb me too much; it's the kind of 
thing over which reasonable people can disagree.


What does disturb me, however, is Sessions's claim about the FBI's
initiative to require the phone companies (and other
communications-service providers, like CompuServe) to build wiretapping
capabilities into their systems. Says Sessions, apparently without 
irony:
"No new authority is needed or requested. All the legislation would if
enacted is ensure that the status quo is maintained and the ability [of
law enforcement to implement wiretaps] is preserved." Earlier, Sessions
says the proposed legislation "only clarifies [the phone companies']
responsibility" to cooperate with properly authorized law enforcement
under the 1968 Wiretap Act.


What Sessions does not mention, however, is that his legislation would,
among other things, allow the government to impose upon those phone
companies and communications-service providers who do not build
wiretapping into their systems "a civil penalty of $10,000 per day for
each day in violation." By any standards other than those of Sessions 
and the FBI, this constitutes "new authority." If this proposal "only
clarifies" providers' obligations under the 1968 Act, one shudders to
imagine what Sessions would call an "expansion" of law-enforcement
authority.

MIKE GODWIN
Staff Counsel
Electronic Frontier Foundation
Cambridge, Massachusetts

                        -==--==--==-<-==--==--==-


         At Play in the Field of the Boards: Report on ONE BBSCON
                         August 13-16, 1992. 
                   by Steve Cisler (sac@apple.com)

                   Validating the BBS Ticket

Our plane punched down through the low clouds a half hour late into 
Denver. A short shuttle ride and you're at the Stouffer Concourse Hotel 
the site of the Online Networking Exposition and BBS Convention ONE 
BBSCon. This was to be the first ecumenical gathering of bulletin board 
system operators (sysops), hardware and software vendors, and 
programmers that spanned the DOS, Unix, and Macintosh worlds. There had 
once been annual meetings of Fidonet sysops, but the parent organization 
had folded even as the number of BBS systems continued to explode.

Jack Rickard, President of ONE, Inc. and publisher of Boardwatch 
Magazine <jack.rickard@boardwatch.com> had partnered up with Phil 
Becker, author of TBBS software, to organize a trade show for BBS 
operators that would be inexpensive enough to attract those running 
their boards as hobbies but featured tutorials and panels with subjects 
attractive to entrepreneurs who have mounted and maintained successful 
business systems with four, eight, on up to 64 phone lines for their 
clients. 

Most of us in the online world are stratified in our interests when it 
comes to networking and communications. There are MIS shops depending on 
minis and mainframes; there are the academic and research networks where 
NREN and the Internet dominate; there are consumer services, a 
continuing, failure when promoted and maintained by the regional phone 
companies and successful in different ways at Prodigy, GEnie, 
CompuServe, and America Online. But then there are the BBS systems.

BBS systems, users, and sysops have never been validated by many of the 
mainstream opinion makers. Most of the operators and users have been 
outsiders, socially, politically, and even economically. Of these, a 
significant subset are proud of this status, but others yearn to make 
their "hobby" into a full-fledged industry. Indeed, if some of the 
reports of BBS size heard in the panels and in the halls are even 
remotely accurate, there are many "machete and loincloth BBSs that rival 
commercial services. ONE BBSCON brought nearly 1000 of these outsiders 
together for the first time. It also attracted mainstream users who have 
found BBSs to be cost effective, easy to maintain (compared to other 
sorts of electronic systems), and extremely useful. ONE BBSCON put the 
spotlight on the "Industry" as Rickard and Becker hope it will become. 

BBS System vendors were on the organizing board, and there were tracks 
for the major DOS/Intel systems: Wildcat!, TBBS, PCBoard, MAJOR, and 
Searchlight as well as other operating systems such as UNIX and 
Macintosh (the latter comprised less than 5% of the attendees). Other 
tracks were for legal and social issues, corporate and business 
applications, how to make money with a BBS, the Internet/NREN, Mail 
networks, and a technical track. 

                       Few Ties and Big Skies

The opening reception included a sprinkling of ties, making me feel 
over-dressed in a sport coat. With the dress code set for the rest of 
the days ahead, I thumbed through the program and spoke with BBS and 
networking folks whom I had met online or at other conferences. Dave 
Hughes of Old Colorado City Communications <dave@well.sf.ca.us> and 
Frank Odasz of Big Sky Telegraph <frank@bigsky.dillon.mt.us> noted the 
lack of education tracks in the program, but with their participation in 
the program it became an important sub-theme. 

The range of activities in the BBS world indicates the potential power 
and freedom to experiment that goes with cheap hardware, BBS software, 
and a reasonably priced public telephone network. A journalist from 
Albuquerque is running his newspaper's 16 line system, which provides 
news to callers at no charge. A BBS team had just returned from Russia 
where they were helping set up a country-wide system using low-orbiting 
satellites for data transmission. An entrepreneur who had been sued by 
Playboy enterprises for vending GIF images of Playmates (and using that 
trademarked name in his BBS menus) without much thought of copyright was 
present and seeking advice and solace. 

At the opening session it was immediately evident ONE BBSCON was going 
to be a successful conference. It was also clear how BBSs would become 
an industry that would overshadow but not eliminate hobby uses of such 
systems: cheap 9600 bps modems, inexpensive 486 servers, and telephone 
systems that are not charging by measured use (as is done in many other 
countries). Boardwatch estimates that there are 44,000 public systems 
(and many more private and corporate ones) in the U.S. The four vendors 
sitting on ONE, Inc. board claim to have an installed base of 50,000, 
and this excludes Fido, the most popular of all systems. Phil Becker 
made a strong pitch for the BBS as a business tool for mainstream 
activities and belittled what he called the 'stupid niches' like Keith 
Wade's THE ANARCHIST GUIDE TO BBS. Clearly, Becker wanted to encourage 
mainstream business uses of this technology. They were impressive and 
diverse. Others like Tom Jennings (author of the extremely cheap and 
popular Fido software) sees the technology benefiting the outsiders: the 
fat, the handicapped, the socially inept, the disenfranchised, the 
radical, the non-mainstream. And of course, BBS technology can fill both 
Becker's and Jennings' very different visions, but Becker's was the one 
in the ascendent at ONE BBSCon 

The keynote speech was given by John Dvorak, who writes for many 
computer magazines, has co-authored a successful book on telecomms, and 
is often on the public speaker circuit. His columns are entertaining, 
opinionated and as Art Kleiner said in an old S.F. Bay Guardian article, 
he is a "curmudgeon without a cause." 

People who like to rattle cages can be good speakers and warm the crowd 
up for the ensuing events. However, Dvorak devoted so much time to self 
advertisements and plugging his books that it seemed he must have spent 
about 10 minutes thinking about some of the issues that needed 
addressing with regards to BBSes. A sprinkling of Dvorak comments: "get 
a fan for your 486 machines... OS/2 is fun! (Windows is not)...the BBS 
community needs a lobbyist in each state; it's embarrassingly naive and 
should examine how it operates on different levels...Al Gore is the Dan 
Quayle of the Democratic Party...The porno boards are always under 
scrutiny by the government. one way or another... Playboy images on a 
BBS has to be called fair use... BBSes cannot continue to allow slander 
on the boards. You have to clean up your act by self-policing. 

Dvorak also called for a constitutional amendment to protect electronic 
rights, apparently unaware that constitutional scholar Laurence Tribe 
had proposed this in his keynote at Computers, Freedom, and Privacy 1 
some eighteen months ago, a proposal that received national publicity. 
On the one hand Dvorak pandered to anti-Congress sentiments in the crowd 
and then urged involvement in politics; on the other hand he found the 
Perot candidacy a sham, including the electronic element. 

                Panels: Social and Technical

I attended the Electronic Frontier Foundation program which filled up 
with an overflow from the Legal track where Lance Rose addressed many 
questions about the rights and responsibilities of sysops in an 
increasingly litigious and regulated environment. Shari Steele, a lawyer 
in the EFF Washington office, explained their activities and then 
answered questions. The questions revealed the strong anti-Washington, 
anti-lawyer, anti-regulation sentiments in the audience. It is evident 
that many sysops value the control they believe they have when they set 
up and run a bulletin board. Hearing about the FCC and Congressional 
efforts to change 'their' world made some people angry and others want 
to organize. 

Midway through the conference a group of software developers decided to 
organize to try and learn about existing standards before setting ones 
that would benefit their own developers and users. The three main areas 
include interface, messaging and document structure, and graphics. 
Surprisingly, some did not want to give up the diversity that is so 
evident in the many interfaces and message protocols, but most agreed to 
try and set an agenda via electronic mail and plan for other actions at 
the next conference. The Internet Engineering Task Force use of RFCs 
(Request for Comment) was held up as a model they would emulate. 

Jim Warren moderated the panel on electronic democracy where most 
members were excited about the power of the tools. Gary Stryker of 
Galacticom proposed a system called SuperDemocracy which would include 
continuous electronic voting on issues in a hierarchy by geographical 
region. Shari Steele reminded the group that many did not have computers 
or modems, and that electronic democracy would exclude many potential 
voters. Gary Nakarado, a PUC commissioner in Colorado recounted how he 
started a BBS to learn more about the medium and to be in touch with the 
interesting people in his community. Unfortunately, they have not been 
logging in. PUC activities attract very little attention and he has very 
few calls and questions from the general public. He is interested in 
having more input on issues such as ISDN service, BBSes, and other 
issues affecting Colorado utility users. 

Bernard Aboba, author of BBSes and Beyond , talked about the software 
for connecting Macs to the global mail networks (RIME, Fido, Internet, 
uucp) and it was evident that the Mac is a terrific front end for many 
systems, but as a server it needs more power and more tools from third 
parties. Developers from ResNova 714 840 6082 showed how their Mac BBS 
software could fill the gaps, as did a rep. from SoftArc 416 299 4723. 
SoftArc's FirstClass server and client software looked very powerful and 
full of features that would allow a FirstClass BBS to serve many 
concurrent users on LAN, dialup and TCP/IP access. 

All of the companies are quite small, and the wish lists of new features 
grows faster than the staff to work on them. Still I was amazed at the 
power and sophistication of the DOS and Mac BBS systems. Event Horizons, 
the BBS vending adult GIF images south of Portland, Oregon, has a 64 
line 80486 system running on TBBS! Other systems running multiple cpus 
have a hundred or more lines coming in. Clearly, these are not basement 
run, part time operations. 

                       The BBS Bulletin Board

One morning I went down to comb the literature tables and read the cork 
bulletin board where a variety of fascinating notes had been posted. 
They will give you a sense of the diversity in this community: 

    -Monterey Gaming System 408 655 5555 (free) 

    -Black Cat Information Service in Rochester NY 716 262 3680 (Visa/MC 
accepted!) Games, Society for Creative Anachronism files and Adult Info 

    -the Zoo...an electric safari. your tour guide: Chuck 2. 312 907 
1831 to 1839. 

    -The OU BBS, University of Oklahoma (telnet 
oubbs,telecom.uoknor.edu) 

    -Power Windows! BBS (also for OS/2 users) Huntsville, AL 205 881 
8619 

    -The Invention Factory, (NY, NY) 212 274 8110 

    -The Online Diver (Brooklyn Center, MN) 566 5267 No area code must 
indicate that it's for local Minnesota divers primarily. 

    -Nautilus Commercial Data System with 250,000 public domain files, 
200 incoming data lines (!), 28 gigabytes of storage, satellite weather 
images, hourly news updates, games, dBase templates, GIF images---all 
out of Iola, Kansas  316 365 7631. 

    -Infinity Complex "a wickedly addictive Science Fiction game for 
MAJOR BBS systems. Infinity Complex puts your users in a bizarre arena 
of the future, where they must battle for their very lives...and use up 
a lot of online hours in the process!" 403 476 8369 (voice) 

    -an ad for the first annual Puget Sound (WA) BBS convention (no 
phone contact) 

    -ads for serial port boards, new BBS software, consulting services, 
and calls for source code for data compression. 

    -BAWIT Bay Area Women in Telecom for working women in 
telecommunications in the San Francisco area. Contact 
bawitrequest@igc.apc.org. 

    -Make your own custom CD-ROM for $199. Up to 640 mb. ISO 9660. 800 
762. 

                     Internet and NREN 

There was a lot of interest in Internet/NREN issues, but only a few 
people knew much about them. The panels on Internet connectivity, 
legislation, and interfaces drew good sized crowds but needed more basic 
information in a standard presentation format before having Q&A. BBSes 
can be a good interface for people going on to the Internet. It provides 
a way of formatting and filtering the anarchy of the Internet, even as 
it offers occasion for excess control of what a caller can see and use. 
I spent more time showing resources using Mac-based interfaces than 
talking about the intricacies of the growth of NREN in my session which 
was included in the small Macintosh track rather than the larger 
Internet track. I also participated in a graphics discussion where the 
panelists discussed GIF (the CompuServe standard so popular on BBSes and 
the Internet), NAPLPS (which is good for multi-lingual communications 
and small vector-based images), JPEG (the compression du jour that may 
displace GIF and the one that the Smithsonian and Apple are touting for 
Project Chapman), and FIF (fractal image format which is a more 
efficient proprietary algorithm than JPEG but which takes a long time to 
compress). 

                          Summary 

The BBS world is changing, growing, exploding. Jack Rickard has provided 
good coverage in his magazine. His conference was a big success (and a 
very good value considering the amount of fine food that was included 
with the conference activities). If you are not in the BBS world, and 
even if you are, it's hard to be aware of the all activity because it is 
so distributed. This conference helped immensely. 

I think that Rickard will have to face a problem of success: will he 
continue to be the lively and opinionated journalist when his magazine 
and his conference become the focus of the whole industry and a possible 
industry association? He may have to defend actions when he should be 
exposing them, but that is looking a couple of years ahead. Right now, 
there is no way to go but up and out because of the growing interest in 
this medium of information dissemination and of personal communication. 

A BBS provides both sysops and users an enormous amount of leverage, and 
the library world should take notice more than it does. One prominent 
public librarian who is quite involved in electronic dissemination of 
information remarked to me a few years ago that it would be great if 
BBSes just went away. I have heard other dismissive or even snobbish 
comments about BBSes, but the four librarians whom I met at ONE BBSCON 
all realized this is foolish. It's not the only tool to use, but it can 
be a very important one. 

Contacts mentioned in the text: 
       Gary Nakarado, Colorado Public Utilities commissioner 
<nakarado@well.sf.ca.us> 303 526 5505 is his BBS number. 
       NAPLPS: North American Presentation Level Protocol Syntax. 
       Dave Hughes <dave@oldcolo.com or dave@well.sf.ca.us> 
       Fractal compression: Fracterm, Inc. in Richmond, BC 
800-676-3111 
       GIF: CompuServe Art Gallery and various browsers at ftp sites 
       JPEG: mail jpeg-info@uunet.uu.net or contact sac@apple.com 
       Boardwatch : 303 973 6038 or jack.rickard@boardwatch.com 
       TBBS software: eSoft 303 699 6565 
       SuperDemocracy Foundation: 305 583 5990 
       Bernard Aboba: BMUG, Inc., 510 547 0345  
       Jim Warren (electronic democracy): jwarren@well.sf.ca.us 
       Electronic Frontier Foundation: eff@eff.org 
       Lance Rose (legal issues):  author of Syslaw a legal guide to the 
rights and responsibilities of sysops. 
       Laurence H. Tribe, "The Constitution in Cyberspace" anonymous ftp 
from ftp.apple.com in the /ftp/alug/rights directory 49 kb. 

====================================================================
Copyright 1992 by Steve Cisler, Apple Library. All or part of this 
document may be redistributed free of charge in electronic format (disk, 
CD-ROM, online) by any party. Print re-distribution is allowed for 
personal use as well as  non-profit. educational and government 
newsletters and journals. Please send email to the author when you do 
reprint or repost or quote from this report. Internet: sac@apple.com 


                        -==--==--==-<-==--==--==-

  
                             Dueling BBScons:
                          The View From The Booth
                       by Rita Rouvalis (rita@eff.org)

Last week, Denver was the host of not one, but two BBS conferences.  
Most people didn't know that -- especially those attending ONE BBSCON.

At some point, last year's FidoCon split -- spinning off into The ONE 
BBScon and IBECC (International BBSing and Electronic Commuications 
Conference). Who split first is hotly debated. Why they split in 
the first place was never addressed.  Neither conference benefitted.

IBECC, focused primarily upon hobbyist and other non-profit boards, took 
the worse hit.  Hampered by the absence of an adequate publicity 
machine, attendance was extremely low.  On the afternoon I spent at that 
conference, the EFF's panel was the best attended class -- with 
around ten people in the audience.  These individuals were 
intensely interested in the social implications of the growth 
of BBS networks, questioning EFF staff attorney Shari Steele and myself 
about everything from the Open Platform proposal to what the EFF plans 
to do about the harassment of pagan BBS'ers in heavy fundamentalist 
territory.  

Although the hit didn't come in the pocketbook for ONE BBScon, it did 
suffer from the split. Without the presence of the educational and non-
profit interests of IBECC, much of the conference came off as crass 
commercialism at its worst.  I found it odd that a conference professing 
to be "it" for the BBS world would intentionally excluded such a large
faction  of the BBS community. The emphasis was placed squarely on 
making money from your BBS.  Phil Becker even went so far as to ridicule 
a book entitled The Anarchist's Guide to the BBS -- summarily dismissing 
one of the most valuable functions of BBS's -- the distribution of 
information not easily had in other places. 

Just previous and during the conference rumors and accusations were 
flying about unfair methods on the behalf of ONE to lure IBECC attendees 
to ONE BBSCon.  Some individuals claimed that when they called the 
Stouffer Concourse, where ONE BBSCon was being held, hotel staff told 
them that it was the hotel for IBECC (IBECC was held in the Sheraton on 
the other side of Denver).  Another claimed that ONE intentionally 
designed a sign in the lobby on the first day to look like IBECC.  Some 
ONE attendees, unaware that IBECC was happening across town, recalled 
hearing about it and assumed that ONE was the same conference.

ONE BBSCon was a far better publicized and organized conference than 
IBECC, which goes a lot farther in accounting for its success than any 
alleged underhanded practices. What I fail to understand, however,
is why these two conferences split off in the first place, and why their
organizers are wasting our time with petty politics when it is obvious 
that the BBS community needs and wants to become more unified.


                        -==--==--==-<-==--==--==-


             MEMBERSHIP IN THE ELECTRONIC FRONTIER FOUNDATION
If you support our goals and our work, you can show that support by
becoming a member now. Members receive our quarterly newsletter,
EFFECTOR, our bi-weekly electronic newsletter, EFFector Online (if you
have an electronic address that can be reached through the Net), and
special releases and other notices on our activities.  But because we
believe that support should be freely given, you can receive these
things even if you do not elect to become a member.

Our memberships are $20.00 per year for students, $40.00 per year for
regular members.  You may, of course, donate more if you wish.

Our privacy policy: The Electronic Frontier Foundation will never, under
any circumstances, sell any part of its membership list.  We will, from
time to time, share this list with other non-profit organizations whose
work we determine to be in line with our goals. If you do not grant
explicit permission, we assume that you do not wish your membership
disclosed to any group for any reason.

---------------- EFF MEMBERSHIP FORM ---------------

Mail to: The Electronic Frontier Foundation, Inc.
         155 Second St. #33
         Cambridge, MA 02141

I wish to become a member of the EFF  I enclose:$__________
            $20.00 (student or low income membership)
            $40.00 (regular membership)
            $100.00(Corporate or company membership.
                    This allows any organization to
                    become a member of EFF. It allows
                    such an organization, if it wishes
                    to designate up to five individuals
                    within the organization as members.)

    |     I enclose an additional donation of $___________

Name:______________________________________________________

Organization:______________________________________________

Address: __________________________________________________

City or Town: _____________________________________________

State:_______ Zip:________ Phone:(    )_____________(optional)

FAX:(    )____________________(optional)

Email address: ______________________________

I enclose a check [  ]   .
Please charge my membership in the amount of $_____________
to my Mastercard [  ]     Visa [  ]      American Express [ ]

Number:____________________________________________________

Expiration date: ____________

Signature: ________________________________________________

Date:______________________

I hereby grant permission to the EFF to share my name with
other non-profit groups from time to time as it deems
appropriate   [  ]  .
                       Initials:___________________________

Your membership/donation is fully tax deductible.
=====================================================================
                   EFFector Online is published by
                 The Electronic Frontier Foundation
                155 Second Street, Cambridge MA 02141
             Phone: +1 617 864 0665 FAX: +1 617 864 0866
                    Internet Address: eff@eff.org
 Reproduction of this publication in electronic media is encouraged
             To reproduce signed articles individually,
      please contact the authors for their express permission.
=====================================================================
       This newsletter is printed on 100% recycled electrons.


########## ########## ########## |    FIGALLO DIRECTS EFF/CAMBRIDGE  
########## ########## ########## |
####       ####       ####       |        CLINTON ON HIGH TECH       
########   ########   ########   |
########   ########   ########   |         ELECTRONIC DEMOCRACY      
####       ####       ####       |          The Implications         
########## ####       ####       |
########## ####       ####       |
=====================================================================
EFFector Online           September 11, 1992              Issue  3.04
         A Publication of the Electronic Frontier Foundation
                           ISSN 1062-9424
=====================================================================

                      FIGALLO ONLINE AT EFF.ORG

Cliff Figallo became the new director of EFF-Cambridge at the beginning 
of the month.  Former director of The Whole Earth 'Lectronic Link (the 
EFF's birthplace), Fig is charged with developing and coordinating the 
Cambridge office's outreach activities, increasing active EFF membership, 
and expanding overall awareness of the EFF's programs in the computer-
conferencing community and the world at large.

Commenting on his new task, Figallo said, "EFF came upon the online scene 
a couple years ago with a big splash.  I'd like for us to continue 
splashing.  EFF is uniquely engaged in many useful and important 
activities in the areas of online civil liberties, sane lawmaking and 
advocacy of improved electronic highways for the future.  I want news of 
these activities to get out to the people for whom we are making a 
difference.  I also want us to develop better channels for these same 
people to communicate their wants and needs to those of us with access to 
the legal, informational and technical resources.  Our purpose is to 
serve those wants and needs for the betterment of the world. 
    "More specifically, I will encourage  people to become members of EFF 
by demonstrating to them the value of a membership.  One should expect 
noticeable benefits from paying membership dues and I intend to make it 
plain that those benefits exist and will only increase as more people 
become involved in telecommunications.  I will also be working with 
regional groups who may be interested in forming local EFF chapters so 
that we can learn together how such affiliations can enhance our mutual 
effectiveness. 
    "I'm excited about working here.  I believe in what EFF is all about."

Cliff can be reached as fig@eff.org.

                          -==--==--==-<>-==--==--==-

       STATEMENT OF BILL CLINTON FOR THE INSTITUTE OF ELECTRICAL
                    AND ELECTRONIC ENGINEERS (IEEE)

Bill Clinton for President Committee * 1317 F Street, NW, Suite 902 *
    Washington DC 20004  Telephone 202-393-3323  FAX 202-393-3329
                 e-mail correspondence@dc.Clinton-Gore.org

    "We face a fundamental economic challenge today:  to create a
high-wage, high-growth national economy that will carry America into
the 21st century.  We need a long-term national strategy to meet this
challenge and win.

    "Our productivity and income have been growing so slowly
because we've stopped investing in the economic infrastructure that
binds our markets and businesses together, in the education and
training necessary to give our workers world-class skills, and in the
research and development that can restore America to the cutting
edge of the world economy.  As a nation, we're spending more on the
present and the past and building less for the future.  We need a
President who will turn the country around and refocus on the long
view.  As President, I will divide the budget into three parts, creating
a separate 'future budget' for the federal government to make
investments that will enrich our country over the long term.  Today
the federal government spends only 9 per cent of the budget on
investments for the future; a Clinton Administration will double that.
We will pay for it by diverting resources no longer needed for
defense, but we will ensure that every dollar we take out of military
R&D goes into R&D for civilian technologies until civilian R&D can
match and eventually surpass our Cold War military R&D commitment.

    "As President, I will create an investment tax credit and a new
enterprise tax cut that rewards those who invest in new businesses
that create new jobs.  I will also make the research and development
tax credit permanent.

    "My administration will create a civilian research and
development agency to support research in the technologies that
scientists have already identified as the basis for launching new
growth industries and revitalizing traditional ones over the next two
decades.   This civilian DARPA will coordinate R&D to help companies
develop innovative technologies and bring new products to market.
And without inhibiting the competition that drives innovation, we will
encourage and promote collaborative efforts among firms and with
research institutes for commercial development just as we have done
with defense technologies for 40 years.

    "A Clinton Administration will create a high-speed rail network
between out nation's major cities.  And in the new economy,
infrastructure means information as well as transportation.  More than
half the U.S. workforce is employed in information-intensive
industries,  yet we have no national strategy to create a national
information network.  Just as the interstate highway system in the
1950s spurred two decades of economic growth, we need a door-to-
door fiber optics system by the year 2015; a link to every home, lab,
classroom and business in America.

    "For small defense manufacturers hit by cuts in defense
spending, the Small Business Administration will provide small
conversion loans to help finance their transition, and launch a
Technology Assistance Service -- modeled on the Agricultural
Extension Service -- to provide easy access to the technical expertise
it takes to convert to commercial production.

    "To enjoy the full benefit of these investments, we must do
everything possible to open up markets now closed to American
products.  My administration will provide the leadership for Japan and
the European countries to join us in coordinating our macroeconomic
policies and in reaching multilateral trade negotiations.  But we will
also provide the muscle to open up Japan's markets to competitive U.S.
products using a stronger and more carefully targeted "Super 301"
approach.  We favor a free and open trading system, but if our
competitors won't play by those rules, we will play by theirs.

    "All the investments in the world won't mean much if our
workers don't have the education or the skills to take advantage of the
opportunities they create.  My administration will fully fund Head
Start, increase funding for Chapter 1, and provide seed money for
innovative education projects.  However, we will also raise standards
by establishing a national testing system in elementary and secondary
schools and instituting report cards for ever state, school district, 
and school in the nation, to measure their progress.  We will also
create a nationwide apprenticeship program for those young people who
choose not to go to college, and a national trust fund for college loans
for those who do.  These loans will be repaid either as a small 
percentage of income over time or with a couple of years of national 
service.

    "With the strategy I have outlined, we can restore the American
Dream by enabling every citizen and every business to become more
productive, and in so doing, restore our nation to the front lines of
high technology.

                        -==--==--==-<-==--==--==-

         ON ELECTRONIC DEMOCRACY AND ITS PROFOUND IMPLICATIONS
                        by Marilyn Davis, Ph.D.
                           madavis@igc.org
               Principal Software Engineer and Founder
            The Electronic Democracy Project on EcoNet
     President and Principal Software Engineer, Frontier Systems

One vision of Electronic Democracy is the television show, where we are
presented with some options and we vote, using either phone lines or new
gadgets attached to our television cables.

Experiments in this type of ED (the QUBE system in Columbus, Ohio, 1977-
1984; Canada's Talking Back, 1978-9; the New Zealand Televote, 1981; the
Prime Time Electronic Town Meeting in the SF Bay Area, 1987) can all be
characterized as the "big-vote" type of Electronic Democracy.  We are
presented with a set of predetermined options and we press a button to
indicate our choice, and it's over.  The articles written about these
systems state that participation runs high, and that participants came
from all walks of life, but that, in the Canadian experiment, at least,
the results were largely ignored by lawmakers.

Getting our lawmakers to listen to us is one problem with this style of
Electronic Democracy.  Another problem is that it requires us to all
watch television at some specific times.  Still another is the
technological inefficiency involved in building a system that is huge
enough to record everyone's nearly simultaneous vote, but, that is only
used for a half-hour per week.

The worst complaint about this style of Electronic Democracy is that it
is not "democracy" from a political theory point of view.  The big-vote
type of Electronic Democracy was criticized in 1982 by Jean Betheke
Elshtain, a political scientist, as being an "interactive shell game
[that] cons us into believing that we are participating when we are
really simply performing as the responding "end" of a prefabricated
system of external stimuli." Elshtain complains that these systems are
not "democracies", but "plebiscites".  "In a plebiscitary system, the
views of the majority, ..., swamp minority or unpopular views.
Plebiscitism is compatible with authoritarian politics
carried out under the guise of, or with the connivance of, majority
views. That opinion can be registered by easily manipulated, ritualistic
plebiscites, so there is no need for debate on substantive questions."

Another political theorist, Brian Fay, has said about democracy that
what "is most significant is the involvement of the citizens in the
process of determining their own collective identity." Thus, the primary
activity of a real democracy is discussion, not voting.  In a real
democracy, there is facility to bring up issues, exchange opinions, poll
ourselves, re-discuss, and re-poll, until consensus is reached.  Here I
suggest two tenets of an ideal democracy:

1.  Equal power:  In an ideal democracy, every participant has equal
opportunity to bring up new issues, equal opportunity to participate in
every discussion, equal opportunity to vote in every decision, and equal
weight in each vote.  Because, until now, we haven't had the technology
for Electronic Democracy, we have been trapped away from this ideal by
the necessity for a representative democracy, i.e., a democracy where we
elect representatives who make our decisions, rather than make our
decisions ourselves.

2.  Consensus: In an ideal democracy, group action only results from
a consensus agreement.

Here (and everywhere), by "consensus", I prefer Webster's New Twentieth
Century Dictionary, unabridged, definition that says, "unanimity;
agreement, especially in opinion; hence, general opinion." Random House
has a much longer discussion of the word but has no interpretation that
implies "unanimity".

More practically, by "consensus", I mean the style of consensus
decision-making practiced by Quakers, by many peace groups, and by some
groups of people who live together.  These groups don't act until all
agree - or, at least, no one disagrees.  You may "stand-out" of the vote
if you still disagree with an action, but don't wish to block the group.

Our computer networks offer the only means to implement a method of
organization and decision-making where these ideals can be efficiently
achieved.

Although the number of on-line participants is growing fast, still there
are only an elite few of us.  The first tenet of an ideal democracy
demands equal access; we don't have that yet.  But, if providing tenet
#1 becomes a national priority, it would also provide an economic
alternative for some of our dependence on technical weapon-making.

Each of us, who is a member of a BBS community, has equal opportunity to
introduce and discuss issues, but very limited decision-making tools.
Even so, these systems are proving themselves to be powerful political
tools.  In Santa Monica, where there is a city-provided computer network
with a public BBS, the on-line citizens have been able to coerce their
lawmakers into opening the public beach showers in the early morning so
that the homeless can clean up and possibly find work.  On the
Association for Progressive Communications (APC) networks, EcoNet,
PeaceNet, and others, 10,000 peace and environmental activists world-
wide participate in discussions and organize for actions with the goal
of saving the planet.

In October of this year, these networks, and all C/Unix-based
conferencing systems, can add voting to their list of features.
"eVote", vote-keeping software from Frontier Systems, will be available
for integration into these systems.  This software will enable the on-
line communities to take votes and polls, to spend budgets
democratically, and to develop consensus opinions.

IMPORTANT TECHNICAL DETAILS

Most C/Unix-based conferencing systems maintain a number of conferences;
each conference is a discussion about one narrow (or broad) subject.  To
organize the discussion, each conference has a list of "topics",
relevant to the conference, that are posted there by users as the
conference grows. Each topic has a number of "messages", also posted by
users, that carry the thread of the conversation on the topic.

When eVote comes on line, votes will be taken at the "topic" level only,
not on messages.  This means that you will always be able to add a
message when you vote, to qualify or explain it.

The list of topic titles for a particular conference appears on the
"index screen".  When eVote is in place, the index screen will also list
statistics indicating the number of readers, and, if a vote is being
collected on the topic, the number of voters and average vote.

The user who originates the topic dictates the format for the vote: 
whether the vote will be from "0 to 9", "Yes or No", or "Vote for 3 of
the following 10".  The voting can be configured so that users can
change their votes and see how others voted.  These are essential
features for enabling consensus and/or for emulating an in-person
meeting.

The "Vote for 3 of the following 10" feature can be used to
democratically spend a budget.  In this case the instructions will be
"Distribute your 100ED-bucks among the following 20 proposals".  The
group can decide (probably by consensus) to spend the real budget
according to the group's average distribution.  This then, is a
mechanism for determining and carrying out group decisions without
depending on a representative.

A group can decide to spend money on a political campaign.  The
Electronic Democracy candidate would be a figure-head who, if elected,
makes all the decisions of the office according to the decisions of the
on-line group.

This computer-networked, discussion-dominated, type of Electronic
Democracy provides both tenets of an ideal democracy:  equal power, and
consensus facilitation.  In addition, we can democratically direct funds,
thereby facilitating an ideally democratic process from the first
expression of a new idea, all the way through discussion and decision-
making, to implementation by spending the money.

In face to face meetings, the consensus process works. It is easy to
imagine that it will work in small on-line groups of similar mind (like
the EcoNet community).  Mathematics and computer science will provide
algorithms to insure that each group deals fairly with other groups
Indeed, special cases and special privileges are very difficult to build
into software.  Because we will be starting with small groups, we won't
confront big decisions until we've built the software to coalesce our
small-group decisions into larger and larger circles of consensus. 
There can be no danger in it.

WHAT WILL THIS MEAN TO THE HUMAN RACE?

A seminal difficulty of our species, is the struggle we each face with
two distinct, universal, and somewhat opposing human drives.  The first
is our need, or at least our expectation, that we should have "self-
determination". It is this expectation that has compelled us to rebel
against despots throughout history.  Our struggles with the "terrible
two's" and "troubled teens" can be interpreted as our struggle to
reconcile our expectations of self-determination with our other,
apparently opposing need:  the need to belong to groups.

To survive, we must conform to the expectations of our parents and of
our cultures, and compromise our sense of self-determination for a sense
of security, and for the love of others.  We must organize ourselves
into groups; there must be some method of decision-making, and of
carrying out those decisions.

Electronic Democracy offers a path of reconciliation for these two
powerful forces in each of us.  Using this technology, we can experiment
with decision-making by consensus, the only method of organization that
can fully materialize our dreams of self-determination.

But, how can we know if we should take this path?  How can we know if we
can trust our collective human nature?  The concept is so radical, how
can we know if it is right?

Luckily, living on islands, and deep in the rain forests of Panama, are
the Cuna Indians, who can serve as a model of a consensus-run culture.

ABOUT THE CUNA

These amazing Indians, 40,000 in number, have been making decisions, by
consensus, since before Columbus discovered them on his fourth voyage.
Because the Cuna have been living for centuries in the only truly
democratic culture, we look to the Cuna to answer, "What happens to
people who live democratically"?

There is very little literature about the Cuna.  However, from ALL
accounts, they are well-organized, harmonious, wise, resourceful,
energetic, playful, gentle, astute, even enlightened.

But how do such innocents fair in dealings with the rest of the world? 
The Cuna are possibly the only unconquered native Americans, still
living on, and in control of, their homeland.  They won a short war with
Panama in 1925 when it tried to usurp their autonomy.  When, in this
decade, Catholics came as missionaries, the National Catholic Reporter
reported, "Panamanian Indians Evangelize Evangelizers".

Although non-Cuna Panamanians may not participate in the affairs of the 
Cuna, some Cuna work and study in Panama City, and have been elected to 
offices in the Panamanian government.

While preserving their own culture, which they value more than money,
the Cunas capitalize on the world market for their "molas", the colorful 
fabric art pieces that the women sew.

A connection between the Cunas' consensus-run politics and their obvious
enlightenment, their unity, their individuality, and their strength is
evident here.  As we, through Electronic Democracy, claim our earth and
our rights, we will become like the Cunas:  free.  As Electronic
Democracy replaces our old political systems, and our strengths as
individuals and as communities grow, we will experience a profound, even
miraculous, change in human attitudes in most cultures.

Of course, it's a big leap from our current reality to imagining
ourselves, like the Cuna, loving our system of organization for its
fairness and responsiveness, and for making us feel heard, and for
making us feel powerful.

In addition, we will love our system for being efficient and for not
tempting us to be influenced by clothes, or speech impediments, or age,
or a thousand other irrelevancies.  We'll base our decisions only on the
content of what is written.  We'll make excellent decisions.

Like the Cuna, WE will BE our system.

This tool has been waiting for us, in our future; like speech once
waited for us to discover it; and writing.  When we, as evolving humans,
were given the dexterity for speech; it must have been, somehow, left
for us to discover our ability and invent language.  Given our manual
dexterity and our speech, inventing writing naturally followed.  Given
writing, accumulation of knowledge follows.  Given knowledge, technology
results.  Given technology and our innate and inalienable rights,
Electronic Democracy is inevitable.

Indeed, when you consider the mountain of mathematical, scientific and
technological advances that this system is being built upon, we are a
hair from finished; and just in the nick of time.  Our old structures
for civic organization are buckling under the pressures of bad
decisions.  Our old structures breed bad decisions.  There is, and there
has been, much suffering.  We can make it better now.

Electronic Democracy is an answer.  There is no other. Electronic
Democracy is inevitable. Our deepest natures hunger for it.  The
quicker we adopt Electronic Democracy as our system of civic
organization, the less total suffering there will be.

--------

Becker, Ted, "Teledemocracy - Bringing Power Back to People", The
Futurist, December, 1981, p.6.

Elgin, Duane, "Conscious Democracy Through Electronic Town Meetings",
Whole Earth Review, Summer, 1991, p.28.

Elshtain, Jean Betheke, "Interactive TV - Democracy and the QUBE Tube",
The Nation, August 7-14, 1982, p.108.

Hallowell, Christopher, "A World of Difference", Americas, Jan.-Feb,
1985.

Mazlow, Jonathan, "A Tramp in the Darien", a B.B.C. Adventure Series 
Documentary, 1990.

Moran, Julio, "Computers Forge PEN Pal Link", Los Angeles Times, Feb 25,
1990, p.56.

Myers, Norman, "Kuna Indians, Building a Bright Future", International 
Wildlife, July-Aug., 1987, p.17

Wirpasa, Leslie, "Panamanian Indians Evangelize Evangelizers", National 
Catholic Reporter, Mar 8, 1991, p.8.

Wittig, Michele, Ph.D., "Using a City-Owned Public Electronic Network
for Community Organizing", American Psychological Association, Division
9 Newsletter, July, 1990.

Wittig, Michele, "Electronic City Hall",Whole Earth Review, Summer 1991,
p.24.

                        -==--==--==-<-==--==--==-

             MEMBERSHIP IN THE ELECTRONIC FRONTIER FOUNDATION
If you support our goals and our work, you can show that support by
becoming a member now. Members receive our magazine, EFFECTOR; our bi-
weekly electronic newsletter, EFFector Online; the @eff.org newsletter;
and special releases and other notices on our activities.  But because
we believe that support should be freely given, you can receive these
things even if you do not elect to become a member.

Our memberships are $20.00 per year for students, $40.00 per year for
regular members.  You may, of course, donate more if you wish.

Our privacy policy: The Electronic Frontier Foundation will never, under
any circumstances, sell any part of its membership list.  We will, from
time to time, share this list with other non-profit organizations whose
work we determine to be in line with our goals. If you do not grant
explicit permission, we assume that you do not wish your membership
disclosed to any group for any reason.

---------------- EFF MEMBERSHIP FORM ---------------

Mail to: The Electronic Frontier Foundation, Inc.
         155 Second St. #34
         Cambridge, MA 02141

I wish to become a member of the EFF  I enclose:$__________
            $20.00 (student or low income membership)
            $40.00 (regular membership)
            $100.00(Corporate or company membership.
                    This allows any organization to
                    become a member of EFF. It allows
                    such an organization, if it wishes
                    to designate up to five individuals
                    within the organization as members.)

    |     I enclose an additional donation of $

Name:

Organization:

Address: 

City or Town: 

State:     Zip:      Phone:(    )                 (optional)

FAX:(    )         (optional)

Email address: 

I enclose a check [  ]   .
Please charge my membership in the amount of $
to my Mastercard [  ]     Visa [  ]      American Express [ ]

Number:

Expiration date:

Signature: 

Date:

I hereby grant permission to the EFF to share my name with
other non-profit groups from time to time as it deems
appropriate   [  ]  .
                       Initials:

Your membership/donation is fully tax deductible.
=====================================================================
                   EFFector Online is published by
                 The Electronic Frontier Foundation
                155 Second Street, Cambridge MA 02141
             Phone: +1 617 864 0665 FAX: +1 617 864 0866
                    Internet Address: eff@eff.org
 Reproduction of this publication in electronic media is encouraged
             To reproduce signed articles individually,
      please contact the authors for their express permission.
=====================================================================
       This newsletter is printed on 100% recycled electrons.

########## ########## ########## |    A GUIDE TO EFF LEGAL SERVICES  
########## ########## ########## |
####       ####       ####       |    
########   ########   ########   |   EFF TESTIMONY ON DIGITAL PRIVACY
########   ########   ########   |       AS GIVEN BY DAVID FARBER 
####       ####       ####       |    
########## ####       ####       | WHAT EFF DID ON YOUR SUMMER VACTION
########## ####       ####       |
=====================================================================
EFFector Online           September 18, 1992              Issue  3.05
         A Publication of the Electronic Frontier Foundation
                           ISSN 1062-9424
=====================================================================

                           EFF LEGAL SERVICES
                             by Mike Godwin
                      EFF Staff Counsel, Cambridge

   Because the EFF has spent the last year developing and publicizing
our policy-focused efforts at our new Washington office, many of our
constituents have wondered whether EFF is still active on the
civil-liberties front. The answer to that question is an unqualified
"Yes!" This activity has been less well-publicized, however, often
because of the privacy interests of most of the people who seek EFF help
with their individual cases. I want to take this opportunity to let our
members and constituents know what kind of legal services we offer, and
what kind of casework we do.

   The primary legal services I provide are basic counselling and
referrals. EFF does not charge for this, and you do not have to be an
EFF member to call or write and ask for help. I answer general questions
about computer law and telecommunications law at the federal level as
well as in the jurisdictions in which I am admitted to the bar
(currently Texas and Washington, D.C.). When appropriate, I instruct
people to seek further consultation with lawyers in their respective
jurisdictions, giving them referrals to specific lawyers when possible.
(EFF maintains a database of attorneys who've volunteered to do some
kinds of work on these kinds of cases.) I often mail out source
materials to individuals and organizations. (One of the most frequently
requested materials is the original complaint filed by Steve Jackson
Games in its lawsuit against the U.S. government--many lawyers find that
the complaint is a good primer on civil-liberties issues raised by the
search and seizure of a computer bulletin-board system.) More
frequently, I talk to people on the telephone. The kinds of questions I
deal with tend to fall into the following four general areas:

GENERAL QUESTIONS ABOUT LEGAL ISSUES 
A caller may be a sysop who's been told by someone that it's against the
law to read users' e-mail, and she wants to know whether this is true.
Or it may be a user who wants to know if it's legal to upload a scanned
image of a copyrighted photograph to a BBS for downloading by other
users.  Or it may be a hobbyist programmer who wonders if he may be held
liable if a computer virus he writes somehow "escapes" and infects and
damages other systems. Usually these questions are aimed at
*anticipated* legal risks (the caller wants to know ahead of time if her
actions will lead to legal trouble), but a significant number of the
calls are from people who wonder if their *current* activities are
illegal or create risks of legal liability.  For example, a lot of
sysops of "pirate" BBSs have acquired the notion that they can't be held
liable for providing access to unauthorized copies of commercial
software because it's "the guy downloading the stuff who's doing the
copying"--I tell them they are mistaken and point out the legal risks of
providing such access. A small but consistent fraction of callers prefer
to remain anonymous. I respect their wishes, and try to give just as
much help to anonymous callers as to those who identify themselves.

REQUESTS FOR HELP IN CRIMINAL CASES
Basically, these types of requests fall into two categories, which I
call "target cases" and "non-target cases":

        A "target case" is one in which the request is from some one
(the "target") who is very likely to become, or who has already become,
a defendant in a state or federal case. I may get the request from the
target personally, or I may get a call from the target's lawyer. (If the
target doesn't have a lawyer, my first priority is to do what I can to
help him get one. Although EFF does not normally provide funds for legal
representation in criminal cases, I can tell a caller how to go about
contacting a private defense lawyer or a public defender.) I'll ask the
caller for basic facts about the case, and, once I'm in contact with his
lawyer, I'll do what I can to help the lawyer learn the relevant law and
gather the necessary facts to prepare the case. Even the very best
defense lawyers are likely to be unfamiliar with the legal and
evidentiary issues raised by computer-crime investigations--I'm often
able to give them a running start on their case preparation. On a few
occasions, a case may raise a particularly unusual and important
civil-liberties issue, and I'll make a recommendation to EFF management
as to whether EFF should formally support the case in some way.

        A "non-target case" is one in which the person asking for
assistance or advice is not an actual or prospective defendant, but her
rights or interests have somehow been affected by a criminal
investigation or by the actions of law-enforcement officials. (The
classic example is one in which a non-target sysop's BBS or networked
computer has been seized as part of an investigation of one the system's
users.) As in target cases, I may advise her lawyer, but I often can
resolve things quickly by acting directly as a representative for the
person asking for help. For example, in a recent Washington State case,
I helped a non-target negotiate a quick return of his equipment, which
federal agents had seized and searched as part of a multi-state criminal
investigation.

REQUESTS FOR HELP IN CIVIL CASES. Normally, EFF won't take sides in a
civil case unless it clearly raises an important civil-liberties issue.
One such case involved the manufacturers of a VCR-programming device who
threatened to sue individuals participating in a discussion of their
coding algorithms on the Usenet newsgroup sci.crypt. The company's
lawyer insisted that the Usenetters' efforts at figuring out the
algorithms by deducing them from the codes published in TV Guide
listings and elsewhere was a violation of their copyright, patent, and
trade-secret interests.
       I researched their claim and confirmed the Usenet posters' belief
that their research did not violate any intellectual-property
protections of the manufacturers' products, and I represented their
position to the manufacturer, telling the company that the posters were
engaged in Constitutionally protected speech and inquiry. After several
convesations between me and the company's lawyer, the company dropped
its claims. (The sci.crypt posters' research was eventually published as
a paper in the journal CRYPTOLOGIA--Vol. XVI, Number 3, July 1992--in
which the authors thanked EFF for their legal assistance.)

REQUESTS FOR HELP IN SITUATIONS WHERE THERE'S NO CRIMINAL OR CIVIL CASE
This category includes situations in which, for example, a college
student has his computer-access privileges suspended because a "hacker
newsletter" is discovered by a system administrator rummaging through
the student's directory. (I've explained to more than one system
administrator that mere possession of such information does not make one
a computer intruder, and that their rummaging may have violated the
students' rights.) Or a university computer center may decide to suspend
some kinds of Usenet newsgroups, justifying their actions by saying
they're afraid the sexually oriented newsgroups are illegal. (I've
written and spoken to university administrators to explain that
virtually none of the discussions in the sexually oriented newsgroups on
Usenet qualify legally as "obscenity"--instead, they're protected
expression under established American Constitutional law.) Or a group of
sysops may be concerned about their local phone company's efforts to
impose business rates on nonprofit BBS phone lines. (I now refer most
such calls to Shari Steele, ssteele@eff.org, the staff counsel of EFF's
Washington office, who has given special study to these issues.)

   In addition to individual casework: I have represented EFF's legal
services primarily on three forums--the WELL, Usenet, and CompuServe.
As a result of my presence there, I have been receiving an increasing
amount of casework, requests for legal advice, and invitations to speak.
The number of these cases has increased in response to my presence
online--it also has increased in response to my public appearances.
After the Second Computers, Freedom, and Privacy conference, for
example, I had three or four cases referred to me by people who met me
in Washington.

   It is important that EFF members and constituents recognize we are
here to help you solve individual problems as well as promote your
interests on general policy issues. If you are running into a legal
problem, or if you simply have a general legal question, or even if
you're having a problem on the Electronic Frontier and you're not sure
whether or not it's a legal problem, you should call me, Mike Godwin, at
617-864-0665, or send me electronic mail at mnemonic@eff.org or at
76711,317 on CompuServe. I won't always be able to help, but I'm always
willing to listen. And I may be able to help more often than you'd
think.
                                    
                       -==--==--==-<>-==--==--==-


 From the Univ of Wisconsin Microelectronics bulletin, Prof. F Cerrina 
as the author:

 "After the Microlithography '92 conference in Japan, we toured some
  of the leading electronics laboratories.  Our visit to Hitachi's
  Central Research Lab included an amusing demonstration of the
  resolution of current lithography.  On a four-inch wafer, they 
  printed a map of the world that included the streets of London down to the
  smallest alleys.  It's now possible to put a fully detailed map of
  the world on a six-inch wafer."

 Food for thought...

(Submitted by Gary Delp <gdelp+@rchland.ibm.com> )

                       -==--==--==-<>-==--==--==-

Following are excerpts from the testimony of Professor David Farber, a
member of the EFF Board of Directors, before the Computer Systems
Security and Privacy Advisory Board of the National Institute of
Standards and Technology (NIST) on September 16, 1992.

Mr. Chairman and Members of the Advisory Board:

    My name is David Farber. I am Professor of Computer Science at the
University of Pennsylvania and a member of the Board of Directors of the
Electronic Frontier Foundation (EFF). I am here today representing only
the views of EFF. I want to thank you for inviting us to testify today
as part of your investigation.

    We are pleased to be included at this early phase of the Advisory
Board's inquiry and offer a brief set of principles for proceeding with
this inquiry. First, it is essential that in examining discrete issues
such as the desirability of various cryptography standards, the Board
take a comprehensive view of what we call "digital privacy" policy as a
whole. Such a comprehensive view requires a clear vision of the
underlying civil liberties issues at stake: privacy and free speech. It
also requires looking beyond the cryptography questions raised by many
to include some of law enforcement's recent concerns about the pace of
digital infrastructure innovation. Second, for the sake of promoting
innovation and protecting civil liberties, the Board should bear in mind
the principle that computer security policy is fundamentally a concern
for domestic, civilian agencies. This principle, as articulated in the
Computer Security Act of 1987, can serve as an important guide to the
work of this Board.

A. THE GROWING IMPORTANCE OF DIGITAL PRIVACY TECHNOLOGY

    With dramatic increases in reliance on digital media for
communications on the part of private individuals, government, and
corporations, the need for comprehensive protection of privacy in these
media grows. For most in this room, the point seems trite, but the
digital communications revolution (which we stand at only the very
beginning of), is the key event of which the Advisory Board should take
note. As an example, a communication which is carried on paper through
the mail system, or over the wire-based public telephone network is
relatively secure from random intrusion by others. But the same
communication carried over a cellular or other wireless communication
system, is vulnerable to being overheard by anyone who has very
inexpensive, easy-to-obtain scanning technology.

    For the individual who relies on digital communications media,
reliable privacy protection cannot be achieved without the protection of
robust encryption technology. While legal restrictions on the use of
scanners or other technology which might facilitate such invasions of
privacy seem to be attractive preventative measures, these are not
lasting or comprehensive solutions. We should have a guarantee -- with
physics and mathematics, not only with laws -- that we can give
ourselves real privacy of personal communications through technical
means. Encryption strong enough that even the NSA can't break it. We
already know how to do this, but we have not made encryption technology
widely available for public use because of public policy barriers.
        
B. THE BOARD SHOULD UNDERTAKE A COMPREHENSIVE REVIEW OF DIGITAL PRIVACY 
ISSUES    

    Inasmuch as digital privacy policy has broad implications for
constitutional rights of free speech and privacy, and for international
competitiveness and economic vitality in the information age, these
issues must be explored and resolved in an open, civilian policy
context. These questions are simply too important to be decided by the
national security establishment alone. This principle is central to the
Computer Security Act of 1987.1 The structure of the Act, which is the
basis for the authority of this Advisory Board, arose, in significant
part, from the concern that the national security establishment was
exercising undue control over the flow of public information and the use
of information technology.2

    When considering the law in 1986, the committee asked the question,
"whether it is proper for a super-secret agency [the NSA] that operates
without public scrutiny to involve itself in domestic activities...?"
The answer was a clear no, and the authority for establish computer
security policy was vested in NIST (the NBS).

    In this context, we need a robust public debate over our
government's continuing heavy-handed efforts to control commercially
developed cryptography. It is no secret that throughout the cold war
era, the Defense and State Departments and the National Security Agency
have used any and all means, including threats of prosecution, control
over research, and denial of export licenses to prevent advanced secret
coding capabilities from getting into the hands of our adversaries. NSA
does this to maximize its ability to intercept and crack all
international communications of national security interest.

    Now the Cold War is over but the practice continues. In recent
years, Lotus, Microsoft, and others have developed or tried to
incorporate powerful encryption means into mass market software to
enhance the security and privacy of business, financial, and personal
communications. In an era of computer crime, sophisticated surveillance
technologies, and industrial espionage it is a laudable goal.

    Although NSA does not have the authority to interfere with domestic
distribution of DSA, RSA, and other encryption packages, its licensing
stranglehold over foreign distribution has unfortunate consequences.
Domestic firms have been unable to sell competitive security and privacy
products in international markets.  More important, because the cost of
producing two different products is often prohibitive, NSA policy
encourages firms to produce a single product for both domestic and
worldwide use, resulting in minimal privacy and security for users both
here and abroad.

    While we all recognize that NSA has legitimate national security
concerns in the post cold war era, this is a seriously flawed process.
Foreign countries or entities who want to obtain advanced encryption
technology can purchase it through intermediaries in the United States
or from companies in a host of foreign countries who are not subject to
US export restrictions.  There is a big, big hole in the national
security dike. By taking a page out of the Emperor's New Clothes, NSA
opts to act as if the process works by continuing to block export.

    In order to get some improvement in mass market encryption, the
Software Publishers Association, representing Microsoft, Lotus, and
others, had to use the threat of legislation to get NSA to engage in the
negotiations that finally led NSA to agree to expedited clearance for
the export of RSA encrypting software of limited key lengths. Still, all
concede that the agreement does not go far enough and that far more
powerful third-party products are commonly available in the US,
including the fifteen-year-old US Data Encryption Standard.  SPA knows
that specifying maximum key lengths offers little long-term security
given advances in computer processing power, but was willing to
compromise because of NSA's refusal to budge.

    Does this kind of policy make any sense in the post Cold War era?
Mass market products offer limited security for our citizens and
businesses. Determined adversaries can obtain much more powerful
products from foreign countries or by purchasing it here in the US. Is
the NSA policy of slowing down the pace of encryption use by foreigners
and adversaries --even if demonstrable--any longer worth the significant
price we pay in terms of failing to meet our own communications privacy
and security needs?  That is the policy challenge for this Board to
address by a frank, open, and inclusive public debate.

C. THE BOARD MUST ADDRESS THE DIGITAL PRIVACY ISSUE IN A COMPREHENSIVE
MANNER WHICH REQUIRES CONSIDERING THE FBI'S DIGITAL TELEPHONY PROPOSAL
AND ITS IMPLICATIONS.

    The public policy debate on electronic privacy issues over the last
few years has demonstrated that a comprehensive approach to digital
privacy policy cannot be complete without examining both questions
regarding the availability of encryption technology, and the
corresponding infrastructure issues, such as those raised by the FBI's
Digital Telephony Proposal. Attempts to solve one issue without
addressing the other is an exercise in irrational policy-making and
should be avoided by this Advisory Board.

    Last year, the FBI first proposed a "Sense of the Congress"
resolution stating that communications firms and computer and
communications equipment manufacturers were obligated to provide law
enforcement access to the "plain" text of all voice, data, and video
communications, including communications using software encryption. The
Electronic Frontier Foundation (EFF) played an active and leading role
both in opposing such a law and in seeking to find more acceptable means
for meeting legitimate law enforcement needs. Because of our advocacy
and coalition-building efforts with communications and privacy groups,
we were successful in persuading Senate Judiciary Chairman Joseph Biden
to remove the Sense of the Congress Resolution from active consideration
as part of Omnibus crime legislation last year.

    Putting aside its attempt to control the use of encryption systems,
this year the FBI has come forward with proposed legislation that would
require telephone companies, electronic information providers, and
computer and communications equipment manufacturers to seek an FCC
"license" or Attorney General "certification" that their technologies
are susceptible to electronic surveillance. We are in danger of creating
a domestic version of the export control laws for computer and
communications technology.

    While the FBI claims that neither of this year's proposals address
encryption issues, the Bureau has made it clear it plans to return to
this issue in the future. The Board needs to hear from the broad
coalition made up of telephone companies such as AT&T, computer firms
such as IBM, Sun Microsystems, and Lotus Development Corporation, and
public interest groups such as the EFF. The EFF will shortly release a
white paper representing coalition views on the need for the FBI to
explore more realistic, less vague, and potentially onerous policy
options for meeting legitimate law enforcement needs.

    The resulting multi-front battle being waged about digital privacy
creates formidable roadblocks to a final resolution of the policy
disputes at issue. Those who seek greater privacy and security cannot
trust a settlement on one front, because their victory is likely to be
undermined by action on the other issue. And law enforcement and
national security concerns cannot be adequately addressed without a
sense of the overall solution being proposed on both the encryption and
infrastructure fronts. This Advisory Board can play a valuable role for
the policy process by conducting a comprehensive review of digital
privacy and security policy, with a consideration of both of these sets
of issues.

1 Pub.L.No. 100-235.
2 House Committee On Government Operations, H.R. Rep. No. 99-753,
 Pt. 2, at 5.

                       -==--==--==-<>-==--==--==-

   From "Levitating Trains and Kamikaze Genes: Technological Literacy
for the 1990's"

Describing the difference between computer hardware and software:

     "Those parts of the system that you can hit with a hammer
(not advised) are called hardware; those program instructions that
you can only curse at are called software."

                       -==--==--==-<>-==--==--==-


                  WHAT EFF DID WHILE YOU WERE TANNING

You can't fool us. We saw your I'm-on-vacation bounce notices after
shipping each EFFector Online. And while you were out prematurely aging
your skin, the EFF had a busy summer.

   Both Danny Weitzner of the D.C. office and Mike Godwin of the
Cambridge office took bar exams in July: Danny in New York and Mike in
Massachusetts (Mike is already a member of the Texas and D.C. bars).
Both have recovered and are waiting for their results.

CAMBRIDGE:

# Mitchell Kapor was a keynote speaker for EFF at the International
Networking Conference, 1992, in Kobe, Japan where he spoke on global
networking and the EFF's role in the creation of online communities
around the world. He also appeared before the National Association of
Regional Utility Commissions as a means of opening EFF's state by state
drive to make ISDN happen nationwide. In addition, he has, as usual,
been active in fundraising efforts for EFF within the computer industry.

# In addition to his bar exam, Mike flew to San Francisco several times
as part of the planning committee for Computers, Freedom, and Privacy
III; chaired two meetings of the Massachusetts Computer Crime Council;
assisted counsel for several federal computer crime cases under
indictment; and fielded many, many legal questions on the phone and
online.

# The publications department (Gerard Van der Leun and Rita Rouvalis)
produced a full line of pamphlets, white papers, bumper stickers, and
information disks in addition to several issues of EFFector Online and
@eff.org; staffed booths at ONE BBSCon and IBECC '92 in Denver, Colorado
in August; and laid the groundwork on such projects as The EFF Guide to
Cyberspace and the upcoming EFFECTOR3 magazine.

# EFF Tech (Chris Davis and Helen Rose) upgraded the Washington, D.C.
office's connection to the Internet from a dialup SLIP connection to a
56K leased line; reorganized the anonymous FTP archives for faster and
easier access to the EFF's online documents; began a series of
Postscript versions of EFF documents with about-eff; and made
arrangements to appear on a panel discussing the Internet and the
National Public Network in New York City in late September.

WASHINGTON D.C.:

# Jerry Berman appeared before American Bar Association Conference in
San Francisco on the Panel on Virtual Reality and Future Network Policy;
appeared before Computer Systems Policy Project in Massachusetts to
discuss Open Platform Initiative of the EFF; was on a panel that briefed
the City Council and Mayor of Seattle. He arranged for many computer and
communications firms to sign the EFF-drafted White Paper opposing FBI
digital Telephony proposal to be released September 16 in D.C. He also,
with the aid of the Washington staff, pulled together the second meeting
of the Communications Policy Forum under EFF auspices to discuss the
NSF's draft solicitation on the Internet and NREN.

# Danny Weitzner drafted Open Platform amendments, making narrowband
ISDN deployment a national policy, for Rep. Ed Markey's latest
telecommunications regulation bill; was elected Chair of the Public
Policy and Strategy committee of the North American ISDN Users' Forum;
and initiated a plan to take the Open Platform initiative to state
public utility commissions in order to ensure reasonably priced ISDN
service in the states.

# Andrew Blau testified at Colorado PUC on making ISDN available to
residential subscribers; met with Executive Leadership of NCSL's Task
Force on Info Policy; spoke at National Federation of Local Cable
Programmers' Annual Convention on Video Dialtone, "Electronic
Frontiers", and Community Communications Coalitions; was a panelist on
"Government Initiatives to Promote Public Data Networks"; met with
disability rights activists, seniors, and others about meeting their
future telecommunications needs; and documented uses/application of ISDN
technology in small business, education, health and other settings.

# Shari Steele made presentations on the EFF, our National Public
Network proposal, electronic democracy and BBSs being charged business
telephone rates at ONE BBSCon and IBECC; began writing a monthly legal
column for BBS Callers Digest; and made presentations on the EFF to the
Capital Area SysOps Association (CASA) and a course on Computers,
Freedom and Privacy at the George Washington University.

                       -==--==--==-<>-==--==--==-

            MEMBERSHIP IN THE ELECTRONIC FRONTIER FOUNDATION

If you support our goals and our work, you can show that support by
becoming a member now. Members receive our magazine, EFFECTOR, our bi-
weekly electronic newsletter, EFFector Online, the @eff.org newsletter
and special releases and other notices on our activities.  But because
we believe that support should be freely given, you can receive these
things even if you do not elect to become a member.

Our memberships are $20.00 per year for students, $40.00 per year for
regular members.  You may, of course, donate more if you wish.

Our privacy policy: The Electronic Frontier Foundation will never, under
any circumstances, sell any part of its membership list.  We will, from
time to time, share this list with other non-profit organizations whose
work we determine to be in line with our goals. If you do not grant
explicit permission, we assume that you do not wish your membership
disclosed to any group for any reason.

---------------- EFF MEMBERSHIP FORM ---------------

Mail to: The Electronic Frontier Foundation, Inc.
         155 Second St. #35
         Cambridge, MA 02141

I wish to become a member of the EFF  I enclose:$__________
            $20.00 (student or low income membership)
            $40.00 (regular membership)
            $100.00(Corporate or company membership.
                    This allows any organization to
                    become a member of EFF. It allows
                    such an organization, if it wishes
                    to designate up to five individuals
                    within the organization as members.)

            I enclose an additional donation of $

Name:

Organization:

Address: 

City or Town: 

State:     Zip:      Phone:(    )                 (optional)

FAX:(    )         (optional)

Email address: 

I enclose a check [  ]   .
Please charge my membership in the amount of $
to my Mastercard [  ]     Visa [  ]      American Express [ ]

Number:

Expiration date:

Signature: 

Date:

I hereby grant permission to the EFF to share my name with
other non-profit groups from time to time as it deems
appropriate   [  ]  .
                       Initials:

Your membership/donation is fully tax deductible.
=====================================================================
                   EFFector Online is published by
                 The Electronic Frontier Foundation
                155 Second Street, Cambridge MA 02141
             Phone: +1 617 864 0665 FAX: +1 617 864 0866
                    Internet Address: eff@eff.org
 Reproduction of this publication in electronic media is encouraged
             To reproduce signed articles individually,
      please contact the authors for their express permission.
=====================================================================
       This newsletter is printed on 100% recycled electrons.



########## ########## ########## |     
########## ########## ########## | 
####       ####       ####       |         BRUCE STERLING ON
########   ########   ########   |  PRINCIPLES, ETHICS, AND MORALITY  
########   ########   ########   |           IN CYBERSPACE 
####       ####       ####       |    
########## ####       ####       | 
########## ####       ####       |
=====================================================================
EFFector Online           September 30, 1992              Issue  3.06
         A Publication of the Electronic Frontier Foundation
                            ISSN 1062-9424
=====================================================================
                                    
                       A STATEMENT OF PRINCIPLE
                                  by
                            Bruce Sterling
                         bruces@well.sf.ca.us
                Reprinted from SCIENCE FICTION EYE #10
                    with permission of the author.

I just wrote my first nonfiction book. It's called THE HACKER CRACKDOWN:
LAW AND DISORDER ON THE ELECTRONIC FRONTIER. Writing this book has
required me to spend much of the past year and a half in the company of
hackers, cops, and civil libertarians.

I've spent much time listening to arguments over what's legal, what's
illegal, what's right and wrong, what's decent and what's despicable,
what's moral and immoral, in the world of computers and civil liberties.
My various informants were knowledgeable people who cared passionately
about these issues, and most of them seemed well- intentioned.
Considered as a whole, however, their opinions were a baffling mess of
contradictions.

When I started this project, my ignorance of the issues involved was
genuine and profound. I'd never knowingly met anyone from the computer
underground. I'd never logged-on to an underground bulletin-board or
read a semi-legal hacker magazine. Although I did care a great deal
about the issue of freedom of expression, I knew sadly little about the
history of civil rights in America or the legal doctrines that surround
freedom of the press, freedom of speech, and freedom of association. My
relations with the police were firmly based on the stratagem of avoiding
personal contact with police to the greatest extent possible.

I didn't go looking for this project. This project came looking for me.
I became inextricably involved when agents of the United States Secret
Service, acting under the guidance of federal attorneys from Chicago,
came to my home town of Austin on March 1, 1990, and confiscated the
computers of a local science fiction gaming publisher.  Steve Jackson
Games, Inc., of Austin, was about to publish a gaming- book called GURPS
Cyberpunk.

When the federal law-enforcement agents discovered the electronic
manuscript of CYBERPUNK on the computers they had seized from Mr.
Jackson's offices, they expressed grave shock and alarm. They declared
that CYBERPUNK was "a manual for computer crime."

It's not my intention to reprise the story of the Jackson case in this
column. I've done that to the best of my ability in THE HACKER
CRACKDOWN; and in any case the ramifications of March 1 are far from
over. Mr. Jackson was never charged with any crime. His civil suit
against the raiders is still in federal court as I write this.

I don't want to repeat here what some cops believe, what some hackers
believe, or what some civil libertarians believe. Instead, I want to
discuss my own moral beliefs as a science fiction writer -- such as they
are. As an SF writer, I want to attempt a personal statement of
principle.

It has not escaped my attention that there are many people who believe
that anyone called a "cyberpunk" must be, almost by definition, entirely
devoid of principle. I offer as evidence an excerpt from Buck
BloomBecker's 1990 book, SPECTACULAR COMPUTER CRIMES. On page 53, in a
chapter titled "Who Are The Computer Criminals?", Mr. BloomBecker
introduces the formal classification of "cyberpunk" criminality.

"In the last few years, a new genre of science fiction has arisen under
the evocative name of 'cyberpunk.' Introduced in the work of William
Gibson, particularly in his prize-winning novel NEUROMANCER, cyberpunk
takes an apocalyptic view of the technological future. In NEUROMANCER,
the protagonist is a futuristic hacker who must use the most
sophisticated computer strategies to commit crimes for people who offer
him enough money to buy the biological creations he needs to survive.
His life is one of cynical despair, fueled by the desire to avoid death.
Though none of the virus cases actually seen so far have been so
devastating, this book certainly represents an attitude that should be
watched for when we find new cases of computer virus and try to
understand the motivations behind them.

"The New York Times's John Markoff, one of the more perceptive and
accomplished writers in the field, has written than a number of computer
criminals demonstrate new levels of meanness. He characterizes them, as
do I, as cyberpunks."

Those of us who have read Gibson's NEUROMANCER closely will be aware of
certain factual inaccuracies in Mr. BloomBecker's brief review.
NEUROMANCER is not "apocalyptic." The chief conspirator in NEUROMANCER
forces Case's loyalty, not by buying his services, but by planting
poison-sacs in his brain. Case is "fueled" not by his greed for money or
"biological creations," or even by the cynical "desire to avoid death,"
but rather by his burning desire to hack cyberspace. And so forth.

However, I don't think this misreading of NEUROMANCER is based on
carelessness or malice. The rest of Mr. BloomBecker's book generally is
informative, well-organized, and thoughtful. Instead, I feel that Mr.
BloomBecker manfully absorbed as much of NEUROMANCER as he could without
suffering a mental toxic reaction. This report of his is what he
actually *saw* when reading the novel.

NEUROMANCER has won quite a following in the world of computer crime
investigation. A prominent law enforcement official once told me that
police unfailingly conclude the worst when they find a teenager with a
computer and a copy of NEUROMANCER. When I declared that I too was a
"cyberpunk" writer, she asked me if I would print the recipe for a
pipe-bomb in my works. I was astonished by this question, which struck
me as bizarre rhetorical excess at the time. That was before I had
actually examined bulletin-boards in the computer underground, which I
found to be chock-a-block with recipes for pipe-bombs, and worse. (I
didn't have the heart to tell her that my friend and colleague Walter
Jon Williams had once written and published an SF story closely
describing explosives derived from simple household chemicals.)

Cyberpunk SF (along with SF in general) has, in fact, permeated the
computer underground. I have met young underground hackers who use the
aliases "Neuromancer," "Wintermute" and "Count Zero." The Legion of
Doom, the absolute bete noire of computer law-enforcement, used to
congregate on a bulletin-board called "Black Ice."

In the past, I didn't know much about anyone in the underground, but
they certainly knew about me. Since that time, I've had people express
sincere admiration for my novels, and then, in almost the same breath,
brag to me about breaking into hospital computers to chortle over
confidential medical reports about herpes victims.

The single most stinging example of this syndrome is "Pengo," a member
of the German hacker-group that broke into Internet computers while in
the pay of the KGB. He told German police, and the judge at the trial of
his co-conspirators, that he was inspired by NEUROMANCER and John
Brunner's SHOCKWAVE RIDER.

I didn't write NEUROMANCER. I did, however, read it in manuscript and
offered many purportedly helpful comments. I praised the book publicly
and repeatedly and at length. I've done everything I can to get people
to read this book.

I don't recall cautioning Gibson that his novel might lead to anarchist
hackers selling their expertise to the ferocious and repulsive apparat
that gave the world the Lubyanka and the Gulag Archipelago. I don't
think I could have issued any such caution, even if I'd felt the danger
of such a possibility, which I didn't. I still don't know in what
fashion Gibson might have changed his book to avoid inciting evildoers,
while still retaining the integrity of his vision -- the very quality
about the book that makes it compelling and worthwhile.

This leads me to my first statements of moral principle. 

As a "cyberpunk" SF writer, I am not responsible for every act committed
by a Bohemian with a computer. I don't own the word "cyberpunk" and
cannot help where it is bestowed, or who uses it, or to what ends.

As a science fiction writer, it is not my business to make people
behave. It is my business to make people imagine. I cannot control other
people's imaginations -- any more than I would allow them to control
mine.

I am, however, morally obliged to speak out when acts of evil are
committed that use my ideas or my rhetoric, however distantly, as a
justification.

Pengo and his friends committed a grave crime that was worthy of
condemnation and punishment. They were clever, but treacherously clever.
They were imaginative, but it was imagination in a bad cause.  They were
technically accomplished, but they abused their expertise for illicit
profit and to feed their egos. They may be "cyberpunks" -- according to
many, they may deserve that title far more than I do -- but they're no
friends of mine.

What is "crime"? What is a moral offense? What actions are evil and
dishonorable? I find these extraordinarily difficult questions. I have
no special status that should allow me to speak with authority on such
subjects. Quite the contrary. As a writer in a scorned popular
literature and a self-professed eccentric Bohemian, I have next to no
authority of any kind. I'm not a moralist, philosopher, or prophet.
I've always considered my "moral role," such as it is, to be that of a
court jester -- a person sometimes allowed to speak the unspeakable, to
explore ideas and issues in a format where they can be treated as games,
thought-experiments, or metaphors, not as prescriptions, laws, or
sermons.

I have no religion, no sacred scripture to guide my actions and provide
an infallible moral bedrock. I'm not seeking political responsibilities
or the power of public office. I habitually question any pronouncement
of authority, and entertain the liveliest skepticism about the processes
of law and justice. I feel no urge to conform to the behavior of the
majority of my fellow citizens. I'm a pain in the neck.

My behavior is far from flawless. I lived and thrived in Austin, Texas
in the 1970s and 1980s, in a festering milieu of arty crypto-
intellectual hippies. I've committed countless "crimes," like millions
of other people in my generation. These crimes were of the glamorous
"victimless" variety, but they would surely have served to put me in
prison had I done them, say, in front of the State Legislature.

Had I lived a hundred years ago as I live today, I would probably have
been lynched by outraged fellow Texans as a moral abomination. If I
lived in Iran today and wrote and thought as I do, I would probably be
tried and executed.

As far as I can tell, moral relativism is a fact of life. I think it
might be possible to outwardly conform to every jot and tittle of the
taboos of one's society, while feeling no emotional or intellectual
commitment to them. I understand that certain philosophers have argued
that this is morally proper behavior for a good citizen. But I can't
live that life. I feel, sincerely, that my society is engaged in many
actions which are foolish and shortsighted and likely to lead to our
destruction. I feel that our society must change, and change radically,
in a process that will cause great damage to our present system of
values. This doesn't excuse my own failings, which I regret, but it does
explain, I hope, why my lifestyle and my actions are not likely to make
authority feel entirely comfortable.

Knowledge is power. The rise of computer networking, of the Information
Society, is doing strange and disruptive things to the processes by
which power and knowledge are currently distributed.  Knowledge and
information, supplied through these new conduits, are highly corrosive
to the status quo. People living in the midst of technological
revolution are living outside the law: not necessarily because they mean
to break laws, but because the laws are vague, obsolete, overbroad,
draconian, or unenforceable. Hackers break laws as a matter of course,
and some have been punished unduly for relatively minor infractions not
motivated by malice. Even computer police, seeking earnestly to
apprehend and punish wrongdoers, have been accused of abuse of their
offices, and of violation of the Constitution and the civil statutes.
These police may indeed have committed these "crimes." Some officials
have already suffered grave damage to their reputations and careers --
all the time convinced that they were morally in the right; and, like
the hackers they pursued, never feeling any genuine sense of shame,
remorse, or guilt.

I have lived, and still live, in a counterculture, with its own system
of values. Counterculture -- Bohemia -- is never far from criminality.
"To live outside the law you must be honest" was Bob Dylan's classic
hippie motto. A Bohemian finds romance in the notion that "his clothes
are dirty but his hands are clean." But there's danger in setting aside
the strictures of the law to linchpin one's honor on one's personal
integrity. If you throw away the rulebook to rely on your individual
conscience you will be put in the way of temptation.

And temptation is a burden. It hurts. It is grotesquely easy to justify,
to rationalize, an action of which one should properly be ashamed. In
investigating the milieu of computer-crime I have come into contact with
a world of temptation formerly closed to me.  Nowadays, it would take no
great effort on my part to break into computers, to steal long-distance
telephone service, to ingratiate myself with people who would merrily
supply me with huge amounts of illicitly copied software. I could even
build pipe-bombs. I haven't done these things, and disapprove of them;
in fact, having come to know these practices better than I cared to, I
feel sincere revulsion for them now. But this knowledge is a kind of
power, and power is tempting. Journalistic objectivity, or the urge to
play with ideas, cannot entirely protect you. Temptation clings to the
mind like a series of small but nagging weights. Carrying these weights
may make you stronger. Or they may drag you down.

"His clothes are dirty but his hands are clean." It's a fine ideal, when
you can live up to it. Like a lot of Bohemians, I've gazed with a fine
disdain on certain people in power whose clothes were clean but their
hands conspicuously dirty. But I've also met a few people eager to pat
me on the back, whose clothes were dirty and their hands as well.
They're not pleasant company.

Somehow one must draw a line. I'm not very good at drawing lines. When
other people have drawn me a line, I've generally been quite anxious to
have a good long contemplative look at the other side. I don't feel much
confidence in my ability to draw these lines. But I feel that I should.
The world won't wait. It only took a few guys with pool cues and
switchblades to turn Woodstock Nation into Altamont. Haight-Ashbury was
once full of people who could trust anyone they'd smoked grass with and
love anyone they'd dropped acid with -- for about six months. Soon the
place was aswarm with speed-freaks and junkies, and heaven help us if
they didn't look just like the love-bead dudes from the League of
Spiritual Discovery. Corruption exists, temptation exists. Some people
fall. And the temptation is there for all of us, all the time.

I've come to draw a line at money. It's not a good line, but it's
something. There are certain activities that are unorthodox, dubious,
illegal or quasi-legal, but they might perhaps be justified by an honest
person with unconventional standards. But in my opinion, when you're
making a commercial living from breaking the law, you're beyond the
pale. I find it hard to accept your countercultural sincerity when
you're grinning and pocketing the cash, compadre.

I can understand a kid swiping phone service when he's broke, powerless,
and dying to explore the new world of the networks. I don't approve of
this, but I can understand it. I scorn to do this myself, and I never
have; but I don't find it so heinous that it deserves pitiless
repression. But if you're stealing phone service and selling it -- if
you've made yourself a miniature phone company and you're pimping off
the energy of others just to line your own pockets -- you're a thief.
When the heat comes to put you away, don't come crying "brother" to me.

If you're creating software and giving it away, you're a fine human
being. If you're writing software and letting other people copy it and
try it out as shareware, I appreciate your sense of trust, and if I like
your work, I'll pay you. If you're copying other people's software and
giving it away, you're damaging other people's interests, and should be
ashamed, even if you're posing as a glamorous info- liberating
subversive. But if you're copying other people's software and selling
it, you're a crook and I despise you.

Writing and spreading viruses is a vile, hurtful, and shameful activity
that I unreservedly condemn.

There's something wrong with the Information Society. There's something
wrong with the idea that "information" is a commodity like a desk or a
chair. There's something wrong with patenting software algorithms.
There's something direly mean spirited and ungenerous about inventing a
language and then renting it out to other people to speak. There's
something unprecedented and sinister in this process of creeping
commodification of data and knowledge. A computer is something too close
to the human brain for me to rest entirely content with someone
patenting or copyrighting the process of its thought.  There's something
sick and unworkable about an economic system which has already spewed
forth such a vast black market. I don't think democracy will thrive in a
milieu where vast empires of data are encrypted, restricted,
proprietary, confidential, top secret, and sensitive. I fear for the
stability of a society that builds sand castles out of databits and
tries to stop a real-world tide with royal commands.

Whole societies can fall. In Eastern Europe we have seen whole nations
collapse in a slough of corruption. In pursuit of their unworkable
economic doctrine, the Marxists doubled and redoubled their efforts at
social control, while losing all sight of the values that make life
worth living. At last the entire power structure was so discredited that
the last remaining shred of moral integrity could only be found in
Bohemia: in dissidents and dramatists and their illegal samizdat
underground fanzines. Their clothes were dirty but their hands were
clean. The only agitprop poster Vaclav Havel needed was a sign saying
*Vaclav Havel Guarantees Free Elections.* He'd never held power, but
people believed him, and they believed his Velvet Revolution friends.

I wish there were people in the Computer Revolution who could inspire,
and deserved to inspire, that level of trust. I wish there were people
in the Electronic Frontier whose moral integrity unquestionably matched
the unleashed power of those digital machines. A society is in dire
straits when it puts its Bohemia in power. I tremble for my country when
I contemplate this prospect. And yet it's possible. If dire straits
come, it can even be the last best hope.

The issues that enmeshed me in 1990 are not going to go away. I became
involved as a writer and journalist, because I felt it was right.
Having made that decision, I intend to stand by my commitment. I expect
to stay involved in these issues, in this debate, for the rest of my
life. These are timeless issues: civil rights, knowledge, power, freedom
and privacy, the necessary steps that a civilized society must take to
protect itself from criminals. There is no finality in politics; it
creates itself anew, it must be dealt with every day.

The future is a dark road and our speed is headlong. I didn't ask for
power or responsibility. I'm a science fiction writer, I only wanted to
play with Big Ideas in my cheerfully lunatic sandbox. What little
benefit I myself can contribute to society would likely be best employed
in writing better SF novels. I intend to write those better novels, if I
can. But in the meantime I seem to have accumulated a few odd shreds of
influence. It's a very minor kind of power, and doubtless more than I
deserve; but power without responsibility is a monstrous thing.

In writing HACKER CRACKDOWN, I tried to describe the truth as other
people saw it. I see it too, with my own eyes, but I can't yet pretend
to understand what I'm seeing. The best I can do, it seems to me, is to
try to approach the situation as an open-minded person of goodwill.  I
therefore offer the following final set of principles, which I hope will
guide me in the days to come.

I'll listen to anybody, and I'll try to imagine myself in their
situation.

I'll assume goodwill on the part of others until they fully earn my
distrust.

I won't cherish grudges. I'll forgive those who change their minds and
actions, just as I reserve the right to change my own mind and actions.

I'll look hard for the disadvantages to others, in the things that give
me advantage. I won't assume that the way I live today is the natural
order of the universe, just because I happen to be benefiting from it at
the moment.

And while I don't plan to give up making money from my ethically dubious
cyberpunk activities, I hope to temper my impropriety by giving more
work away for no money at all.

                       -==--==--==-<>-==--==--==-

            MEMBERSHIP IN THE ELECTRONIC FRONTIER FOUNDATION

If you support our goals and our work, you can show that support by
becoming a member now. Members receive our magazine, EFFECTOR, our bi-
weekly electronic newsletter, EFFector Online, the @eff.org newsletter
and special releases and other notices on our activities.  But because
we believe that support should be freely given, you can receive these
things even if you do not elect to become a member.

Our memberships are $20.00 per year for students, $40.00 per year for
regular members.  You may, of course, donate more if you wish.

Our privacy policy: The Electronic Frontier Foundation will never, under
any circumstances, sell any part of its membership list.  We will, from
time to time, share this list with other non-profit organizations whose
work we determine to be in line with our goals. If you do not grant
explicit permission, we assume that you do not wish your membership
disclosed to any group for any reason.

---------------- EFF MEMBERSHIP FORM ---------------

Mail to: The Electronic Frontier Foundation, Inc.
         155 Second St. #36
         Cambridge, MA 02141

I wish to become a member of the EFF  I enclose:$__________
            $20.00 (student or low income membership)
            $40.00 (regular membership)
            $100.00(Corporate or company membership.
                    This allows any organization to
                    become a member of EFF. It allows
                    such an organization, if it wishes
                    to designate up to five individuals
                    within the organization as members.)

            I enclose an additional donation of $

Name:

Organization:

Address: 

City or Town: 

State:     Zip:      Phone:(    )                 (optional)

FAX:(    )         (optional)

Email address: 

I enclose a check [  ]   .
Please charge my membership in the amount of $
to my Mastercard [  ]     Visa [  ]      American Express [ ]

Number:

Expiration date:

Signature: 

Date:

I hereby grant permission to the EFF to share my name with
other non-profit groups from time to time as it deems
appropriate   [  ]  .
                       Initials:

Your membership/donation is fully tax deductible.
=====================================================================
                   EFFector Online is published by
                 The Electronic Frontier Foundation
                155 Second Street, Cambridge MA 02141
             Phone: +1 617 864 0665 FAX: +1 617 864 0866
                    Internet Address: eff@eff.org
 Reproduction of this publication in electronic media is encouraged.
  Signed articles do not necessarily represent the view of the EFF.
             To reproduce signed articles individually,
      please contact the authors for their express permission.
=====================================================================
       This newsletter is printed on 100% recycled electrons.



########## ########## ########## |         PIONEER AWARDS 2.0        
########## ########## ########## |        Call for Nominations       
####       ####       ####       |  
########   ########   ########   |    EFF/AUSTIN: The First Chapter  
########   ########   ########   | 
####       ####       ####       |    THE SETTLING OF THE INTERNET   
########## ####       ####       |  
########## ####       ####       |    FTP.EFF.ORG:The Users' Site    
=====================================================================
EFFector Online           October 22, 1992                Issue  3.07
           A Publication of the Electronic Frontier Foundation
                            ISSN 1062-9424
=====================================================================

         THE SECOND ANNUAL INTERNATIONAL EFF PIONEER AWARDS:
                       CALL FOR NOMINATIONS
                     Deadline: December 31,1992

In every field of human endeavor,there are those dedicated to expanding
knowledge,freedom,efficiency and utility. Along the electronic frontier,
this is especially true. To recognize this,the Electronic Frontier
Foundation has established the Pioneer Awards for deserving individuals
and organizations.

The Pioneer Awards are international and nominations are open to all.

In March of 1992, the first EFF Pioneer Awards were given in Washington
D.C. The winners were: Douglas C. Engelbart of Fremont, California;
Robert Kahn of Reston, Virginia; Jim Warren of Woodside, California; Tom
Jennings of San Francisco, California; and Andrzej Smereczynski of
Warsaw, Poland.

The Second Annual Pioneer Awards will be given in San Francisco,
California at the 3rd Conference on Computers, Freedom, and Privacy
in March of 1993.

All valid nominations will be reviewed by a panel of impartial judges
chosen for their knowledge of computer-based communications and the
technical, legal, and social issues involved in networking.

There are no specific categories for the Pioneer Awards, but the
following guidelines apply:

   1) The nominees must have made a substantial contribution to the
      health, growth, accessibility, or freedom of computer-based
      communications.

   2) The contribution may be technical, social, economic or cultural.

   3) Nominations may be of individuals, systems, or organizations in
      the private or public sectors.

   4) Nominations are open to all, and you may nominate more than one
      recipient. You may nominate yourself or your organization.

   5) All nominations, to be valid, must contain your reasons, however
      brief, on why you are nominating the individual or organization,
      along with a means of contacting the nominee, and your own contact
      number. No anonymous nominations will be allowed.

   6) Every person or organization, with the single exception of EFF
      staff members, are eligible for Pioneer Awards.

   7) Persons or representatives of organizations receiving a Pioneer
      Award will be invited to attend the ceremony at the Foundation's
      expense.

You may nominate as many as you wish, but please use one form per
nomination. You may return the forms to us via email to

             pioneer@eff.org

You may mail them to us at:
             Pioneer Awards, EFF,
             155 Second Street
             Cambridge MA 02141.

You may FAX them to us at:
             +1 617 864 0866

Just tell us the name of the nominee, the phone number or email address
at which the nominee can be reached, and, most important, why you feel
the nominee deserves the award.  You may attach supporting
documentation.  Please include your own name, address, and phone number.

We're looking for the Pioneers of the Electronic Frontier that have made
and are making a difference. Thanks for helping us find them,

The Electronic Frontier Foundation

        -------EFF Pioneer Awards Nomination Form------

Please return to the Electronic Frontier Foundation
via email to:       pioneer@eff.org
via surface mail to EFF 155 Second Street, Cambridge, MA 02141 USA;
via FAX to +1 617 864 0866


Nominee:

Title:

Company/Organization:

Contact number or email address:

Reason for nomination:

Your name and contact information:

Extra documentation attached:

DEADLINE: ALL NOMINATIONS MUST BE RECEIVE BY THE ELECTRONIC FRONTIER
FOUNDATION BY MIDNIGHT, EASTERN STANDARD TIME U.S., DECEMBER 31,1992.

                   -==--==--==-<>-==--==--==-


                        THE EFF/AUSTIN CHAPTER
               A Progress Report by John S. Quarterman
                      President of Autsin EFF.

As of July 1992, the official name of our group is EFF-Austin,
and we are a Texas nonprofit corporation. Our goals, adapted from
those of EFF-National, are given in our Articles of Incorporation:

      (a) to engage in and support educational activities that
      increase understanding of the opportunities and challenges posed
      by computing and telecommunications, and related civil liberties
      issues.

      (b) to foster a clearer social understanding of the issues
      underlying free and open telecommunications; and

      (c) to facilitate and encourage communication between
      individuals interested in computer and telecommunication
      technology and related social and legal issues.

Among other activities in pursuit of these goals, we hold three
distinct types of public meetings: member meetings; Public Forums; and
Cyberdawgs.

Member meetings consist of presentations by EFF-Austin directors and
others on what EFF-Austin is doing, and questions and suggestions
from the attendees.

Our first general public meeting was held in May, at the Austin
Technology Incubator. Close to sixty people attended to listen to
what we had to say and to offer ideas. We are planning another member
meeting for November.

Public Forums have specific agendas and speakers, and both present
information of interest to our members and the public, and invite
discussion.

Our most recent public forum was "The Net: What is It, Where is it,
Who Uses It, and for What?", presented by John Quarterman and Smoot
Carl-Mitchell of Texas Internet Consulting and Matrix Information
and Directory Services, and Anna Couey, an art networker from
San Francisco. This was held at MCC and included online demonstrations
of Internet applications such as anonymous FTP, archie, and gopher,
as well as TELNET to locations such as Moscow and the WELL.

The next scheduled Public Forum is on October 29. Noted science
fiction author Bruce Sterling will speak and sign copies concerning his
latest work, the nonfiction book, The Hacker Crackdown, just published
by Bantam. This meeting will be held at the University of Texas. We
are inviting local law enforcement officers to attend, considering
the subject matter of the book. Cliff Figallo, Director of the Cambridge
Office of the Electronic Frontier Foundation will also attend.

Ed Cavazos is currently organizing a panel discussion on Sysop Liability
that will be given in January of next year.

In contrast to the formal presentation of a Public Forum is a
"Cyberdawg". These are informal networking mixers. (The name comes
from a hot dog picnic held last year at the Steve Jackson Games office
in Austin.) We have held two Cyberdawgs so far , in June and August,
at the High Times Tea Bar and Brain Gym (a local establishment
that serves intellectual games instead of alcohol), and at Europa Books.
They were well-attended by a diverse mix of the Austin electronic
community. All types of computer users met to talk, exchange
information, make contacts, and simply have fun. We have scheduled the
next Cyberdawg for November, and plan to have Tracy LaQuey Parker
present to sign copies of her latest book, The Internet Companion,
just published by Addison-Wesley.

Another method of information distribution that we have employed is
staffing tables at conventions. For example, we held a table at the
Government and Technology Convention in February of 1992, and have
plans to be present at the 1993 show as well. We had a meeting at
the Armadillocon Science Fiction Convention 9-11 October.

Since several of our members are frequent travelers to SF conventions,
we have presented panels and distributed literature at many such events.
We consider this worthwhile, since science fiction readers are likely
to be interested in the way society evolves to handle evolving 
technology.

At all of these events we have been passing out EFF literature that we
possess at the time. We have created information of our own, as well.
There is the Info Disk, which contains text files that serve as a
primer to relevant issues in the use of computers and networks.
September saw the first issue of our online newsletter, Word, which we
plan to distribute monthly. EFF-Austin also sponsors a moderated
newsgroup, austin.eff, linked bidirectionally with a mailing list,
eff-austin@tic.com. That newsgroup and mailing list are about
EFF-Austin and local concerns, but they are already widely
distributed outside of Austin and on BBSes as well as through
USENET, UUCP, and the Internet.

This is all in addition to the meetings of the Board of Directors
(fifteen in the last twelve months). We currently hold these meetings
on the second Tuesday of each month.

                   -==--==--==-<>-==--==--==-

                        CURRENT SITE @eff.org
                       Where Users Come First.
                         by Rita Rouvalis
                         (rita@eff.org)

Carefully assemble four Sparcstation II's, nine gigs of disk storage,
a T1 and what do you get?  One hopping Internet site and the Heart and
Soul of the EFF. Traditionally, netiquette has required that most ftp
transfers be done druing non-business or off-peak hours.  The reason for
the request is that most ftp machines are also used for other tasks by
the local users.  ftp.eff.org, however, is a dedicated ftp, gopher, and
WAIS machine.  This means that it is not at the staff's disposal, but
yours. So pound away on it at any time of the day or night. That's the
reason we built it.

Services like WAIS, and GOPHER underscore our enthusiasm for better,
easier-to-use technology for accessing the information stored on the
Net.  The wide variety of subject matter found in our anonymous FTP
archives is a working testimony to our belief in the free and open flow
of all kinds of information, not simply the official EFF positions and
publications (these are found only in the EFF directory).

And not only is our hardware the key distribution point for official EFF
documents like EFFector Online and NewsNotes, but we're also the virtual
home for other, similar-minded organizations like Carl Kadie's Computers
and Academic Freedom, the Index on Censorship, the Boston Computer
Society, the Massachusetts branch of Computer Professionals for Social
Responsibility (CPSR), Beyond Dreams, and the Commercial Internet
Exchange (CIX).

Last month, an average of 1371 files *a day* were sucked down from our
archives. Some of your favorites, according to our statistics, are

File                                             Downloads in September
/pub/cud/phrack/phrack-40                                           454
/pub/EFF/legal-issues/eff-fbi-analysis                              230
/pub/EFF/about-eff                                                  197
/pub/cud/cud/cud4.41                                                173
/pub/internet-info/ftp.sites                                        101
/pub/journals/CORE/core1.08                                          53
/etc/passwd                                                          39
/pub/EFF/legal-issues/against-look-and-feel                          39
/pub/EFF/papers/crime-and-puzzlement                                 33
/pub/journals/InterText/ITv2n4-ascii                                 29


One of the best-kept secrets on ftp.eff.org is the relatively quiet
little corner occupied by the /journals directory.  One of the most
selective news stands in Cyberspace, it contains a small number of
excellent and widely varied electronic publications.  Our two newest
additions to the magazine rack are CurrentCites, which presents selected
articles on information transfer, electronic publishing, expert systems
and artificial intelligence, and more; and ScreamBaby, a tense, neurotic
'zine that asks the all-consuming question "What the hell did *YOU* do
today?"

Other recent additions include a document on electronic communications
from Human Right Watch (/pub/EFF/papers/electrifying-speech); the first
edition of Word, the EFF-Austin chapter's newsletter (/pub/EFF/local-
chapters/Austin_TX/Word1); and the EJournal Directory, an extensive list
of electronic publications (/pub/journals/EJournal.Directory2.1).

We are always looking for new files of interest to add to our ftp
collection.  If you know of anything appropriate, please drop us a note
at eff@eff.org.

                   -==--==--==-<>-==--==--==-

 From the Univ of Wisconsin Microelectronics bulletin, Prof. F Cerrina
 as the author:

  "After the Microlithography '92 conference in Japan, we toured some
 of the leading electronics laboratories.  Our visit to Hitachi's
 Central Research Lab included an amusing demonstration of the
 resolution of current lithography.  On a four-inch wafer, they printed
 a map of the world that included the streets of London down to the
 smallest alleys.  It's now possible to put a fully detailed map of
 the world on a six-inch wafer."

 Food for thought...

 (Submitted by Gary Delp <gdelp+@rchland.ibm.com> )


                   -==--==--==-<>-==--==--==-

                    The Settling of the Internet
                         by David Tyckson
                     (DT673@ALBNYVMS.BITNET )


     It has been nearly three months since I sent my original "What's 
Going On Here?" message to PACS-L, which dealt with the migration from 
electronic to print format of some of my favorite network publications.  
While I expected some responses to this message, I did not expect the 
flood of material that came to me both privately and over the network.  
I am finally clearing my mailbox of old messages and would like to 
report to PACS-L on this topic. 

     The vast majority of responses disagreed with me and indicated that 
print is an appropriate, if not preferred, publication medium.  Many 
replies stressed the rights of authors to receive royalty payments for 
print publications, the fact that print gets wider distribution than 
electronic media, and that the author has every right to select the 
publication format.  One particularly thoughtful response (sent on 
PACS-L by Czeslaw Jan Grycz) discussed the role of electronic 
publication in the scholarly communications process.  Other responses 
moved into a variety of related topics, including copyright, the cost of 
the network, and even the global environment.  It is clear that my 
original message struck a nerve among many network users. 

     Some responses were predictable (the editors of PACS Review were 
not pleased with my attack on the print version of their publication), 
some were enlightening (Brendan Kehoe gave an excellent review of the 
evolution of Zen and the Art of the Internet), and some were surprising 
(I did not realize that Zen had been written by an undergraduate 
student).  Perhaps the most surprising response of all was finding 
myself quoted in the Chronicle of Higher Education, a fact which I 
became aware of only when the Office of the President of my university 
called to find out more about my "article" in the Chronicle! 

     After all of this discussion and publicity, what exactly is going 
on here?  The Internet is not dying, as my initial message may have led 
some to believe, but is alive and very, very well. In fact, network 
resources comprise the biggest growth area in the information world at 
the moment.  All of the training sessions, publications, and new network 
position advertisements clearly show that the Internet will be around 
for a long time to come.  It is not death that we must worry about, but 
rapid growth. 

     Because of this growth, something DID happen to the Internet last 
summer.  The issues that I raised originally were not indicators of the 
end of the network, but were signs of its maturation.  Whereas in the 
past the networks were the playthings (and workthings) of a few network 
elite, they have grown to encompass a much broader clientele.  It is 
this volume of users that has resulted in the changes.  Last summer, the 
number of network users passed the critical mass required to attract 
interest from commercial publishers and the press.  While this attention 
will help the Internet to grow even further, it takes something away 
from the communal aspects of the early users. 

     Like the telephone user who was required to move from a party line 
to a private line when he/she realized who else could be monitoring the 
calls, the presence of journalistic and commercial entities on the 
networks may change the nature of the information communicated over 
these networks.  Information that has been given away freely in the past 
may now require some type of payment to a publisher.  While the creators 
of information deserve credit (both intellectual and monetary) for their 
work, the formalization of this process will tend to discourage 
"skywriting" as we have known it in the past.  In addition, authors who 
may formerly have spontaneously responded to other messages may now be 
cautious in what they say and how they say it.  The numerous disclaimer 
statements at the end of author signatures are already a step in this 
direction. 

     Last summer saw the passing of an era in networked resources.  
Before the summer, the network was populated primarily by pioneers, who 
explored its resources out of enthusiasm, interest, and a sense of 
exploration.  Now it is being populated by settlers, who wish to mine 
the networks in some sort of production mode.  The early users 
(pioneers) were able to explore and search in a somewhat unrestricted 
manner, creating their own rules as they went along.  Some did it for 
the challenge, some in search of specific types of resources, and others 
just for the fun of seeing what was out there. 

     The success of those pioneer efforts brought many more users onto 
the networks.  However, these new users did not usually have the same 
motives for utilizing networked resources.  Rather than exploring the 
network wilderness, the new users (settlers) want resources that they 
can use in their everyday lives.  They also want guides to these 
resources and rules for their use.  The commercial and journalistic 
presence in issues related to the network is a clear indication that we 
have evolved into the settler stage. 

     Unfortunately, the cultures of pioneers and settlers do not always 
conform.  Pioneers want freedom, while settlers want order.  While some 
pioneers stake out an area and become leading settlers in an aspect of 
networked resources, others move on and continue to explore new areas.  
The pioneers laid the groundwork for the rest of us (I consider myself a 
very early settler) and we owe them our gratitude for making us aware of 
the capabilities of networked information.  While we may lament the 
passing of the good old days of freewheeling information flow, we have 
moved on into an era in which more networked information will be 
available to more people than ever. 

     Last summer saw the passing of the era of the wild, wild Internet.  
It is now up to those of us who have settled these new territories to 
develop rules, regulations, and guidebooks that will make information 
available equitably for everyone.  I have faith that we, as information 
organizers, will be able to develop a culture that preserves democratic 
access to information resources.  If not, we will have settled a land 
not worth inhabiting.
                                                 David Tyckoson
                                    Head, Reference Department
                                          University Libraries
                                   University at Albany - SUNY
                                                (518) 442-3559
                                                DT673@ALBNYVMS 


                   -==--==--==-<>-==--==--==-

                         FROM THE MBOX

From: "Thomas Leedy, Admin A-402, Ext 2410" <LEEDY@MICF.NIST.GOV>
To: Electronic Frontier Foundation <eff@eff.org>
Subject:    Where Can I Get One of Those Bumper Stickers?
Date:    Thu, 15 Oct 92  09:46:31 EDT


I saw a *great* bumper sticker on the Washington DC Beltway this morning
and almost ran the poor guy off the road trying to read the Internet
address ...so I hope that I have this right. It said "I'd rather be
telecommuting. " Do you people make these available? If so how can I get
one? (The only other way I know is to steal the fellow's bumper!) Would
be interested in other material/positions that the Electronic Frontier
Foundation makes available.
Thanks!

Best ... Tom
leedy@micf.nist.gov

[Editors note:  Card-carrying members of the EFF can get one bumper
sticker for free.  Non-members can buy them for $2 each, pre-paid. 
Please include a self-addressed stamped business-sized envelope and
specify whether you want:

                    "I'd rather be telecommuting."
                              "CYBERNAUT"
                 "Highways in Cyberspace: 'Make it so.'"
                     "My other car is a computer."

  Gifs of these can be viewed by ftp'ing to ftp.eff.org and cd'ing to
/pub/EFF/eff-issues thanks to the generous volunteer work of Mark
Sheenan (sheehan@indiana.edu).]

                   -==--==--==-<>-==--==--==-

    MEMBERSHIP IN THE ELECTRONIC FRONTIER FOUNDATION

If you support our goals and our work, you can show that support by
becoming a member now. Members receive our bi-weekly electronic
newsletter, EFFector Online, the @eff.org newsletter
and special releases and other notices on our activities.  But because
we believe that support should be freely given, you can receive these
things even if you do not elect to become a member.

Our memberships are $20.00 per year for students, $40.00 per year for
regular members.  You may, of course, donate more if you wish.

Our privacy policy: The Electronic Frontier Foundation will never, under
any circumstances, sell any part of its membership list.  We will, from
time to time, share this list with other non-profit organizations whose
work we determine to be in line with our goals. If you do not grant
explicit permission, we assume that you do not wish your membership
disclosed to any group for any reason.

---------------- EFF MEMBERSHIP FORM ---------------

Mail to: The Electronic Frontier Foundation, Inc.
    155 Second St. #37
    Cambridge, MA 02141

I wish to become a member of the EFF  I enclose:$__________
    $20.00 (student or low income membership)
    $40.00 (regular membership)
    $100.00(Corporate or company membership.
    This allows any organization to
    become a member of EFF. It allows
    such an organization, if it wishes
    to designate up to five individuals
    within the organization as members.)

    I enclose an additional donation of $

Name:

Organization:

Address:

City or Town:

State:     Zip:    Phone:(    )     (optional)

FAX:(    )    (optional)

Email address:

I enclose a check [  ]   .
Please charge my membership in the amount of $
to my Mastercard [  ]     Visa [  ]    American Express [ ]

Number:

Expiration date:

Signature:

Date:

I hereby grant permission to the EFF to share my name with
other non-profit groups from time to time as it deems
appropriate   [  ]  .
      Initials:

Your membership/donation is fully tax deductible.
=====================================================================
     EFFector Online is published by
     The Electronic Frontier Foundation
     155 Second Street, Cambridge MA 02141
     Phone: +1 617 864 0665 FAX: +1 617 864 0866
      Internet Address: eff@eff.org
 Reproduction of this publication in electronic media is encouraged.
  Signed articles do not necessarily represent the view of the EFF.
     To reproduce signed articles individually,
    please contact the authors for their express permission.
=====================================================================
     This newsletter is printed on 100% recycled electrons.

########## ########## ########## |          
####       ####       ####       |  A TECHNOLOGY POLICY FOR AMERICA
########   ########   ########   |  by President-Elect Bill Clinton
########   ########   ########   |   
####       ####       ####       |     
########## ####       ####       |
########## ####       ####       |        
=====================================================================
EFFector Online           November 4, 1992                Issue  3.08
           A Publication of the Electronic Frontier Foundation
                            ISSN 1062-9424
=====================================================================


          A TECHNOLOGY POLICY FOR AMERICA Six Broad Initiatives
                          by Bill Clinton
                        (September, 1992)

The Clinton-Gore technology policy consists of six broad initiatives 
that together will restore America's technological leadership: 

1. Building a 21st Century Technology Infrastructure.  

Infrastructure has traditionally been the responsibility of federal and 
state governments. Investing in infrastructure means more than repairing 
bridges, harbors and highways. Today, the United States faces a new 
series of communications, transportation and environmental needs for the 
21st century. The creation of a 21st century infrastructure program 
would serve as a critical technology driver for the nation. It would 
stimulate major new national R&D efforts; create large, predictable 
markets that would prompt significant private sector investments; and 
create millions of new jobs.

A 21st century infrastructure would address many practical problems. For 
example, the government can serve as a catalyst for the private sector 
development of an advanced national communications network, which would 
help companies collaborate on research and design for advanced 
manufacturing; allow doctors across the country to access leading 
medical expertise; put immense educational resources at the fingertips 
of American teachers and students; open new avenues for disabled people 
to do things they can't do today; provide technical information to small 
businesses; and make telecommuting much easier. Such a network could do 
for the productivity of individuals at their places of work and learning 
what the interstate highway of the 1950s did for the productivity of the 
nation's travel and distribution system.

Each year, I plan to devote a significant portion of my four year, $80 
billion Rebuild America fund to laying the groundwork for the nation's 
infrastructure needs in the 21st century. Federal funding for the 
National Research and Education Network is one example of how the 
federal government can serve as a catalyst for private sector 
infrastructure investment. We will also provide additional funding to 
network our schools, hospitals and libraries.

As part of the effort to assess U.S. needs and develop appropriate 
programs, the federal government must monitor, or "benchmark", what 
foreign governments are doing. For example, the Japanese government has 
committed to invest over $120 billion by 1995 to develop a digital 
broadband communication infrastructure called the Information Network 
System, and plans to invest another $150 billion to establish model 
programs for business and residential users.

A comprehensive infrastructure program must also include effective 
standards and regulations. By establishing reasonable standards and a 
constructive regulatory environment, the government can send clear 
signals to industry about important, emerging markets and spur private 
sector investment. For example, the digital standard that the Federal 
Communications Commission (FCC), in cooperation with industry, 
established for high resolution television provides an excellent 
indication of the future technical direction of the industry and will do 
much to facilitate private sector R&D.

A 21st century infrastructure program should consist of the following 
five elements:
     Funding the establishment of key networks and demonstration 
     projects;
     Benchmarking U.S. programs against those of other major industrial 
     nations;
     Establishing standards and a regulatory climate that fosters 
     private sector investment;
     Involving the federal labs, companies, and universities in 
     conducting R&D on key technical issues; and
     Providing training for users of networks and databases.

2.  Establishing Education and Training Programs for a High-Skill 
Workforce. 

The U.S. education system must make sure that American workers have the 
requisite skills. The focus should be not only on the top American 
students who measure up to world-class standards, but also on average 
and disadvantaged students. It must also take into account the need to 
upgrade workers' skills and help people make the difficult transition 
from repetitive, low-skill jobs to the demands of a flexible, high-skill 
workplace. Unlike Germany, the United States does not have a 
sophisticated vocational education program, and unlike Japan, U.S. firms 
do not have a strong incentive to invest in the training and retraining 
of their workers. We need more of both, geared to meet the needs of the 
mobile U.S. workforce.

I will implement the following programs to strengthen the skills of 
America's workforce:
     Establish tough standards and a national examination system in 
     core subjects like writing, communication, math and science; 
     level the playing field for disadvantaged students; 
     reduce class sizes;and give parents the right to chose the public 
     schools their child attends.

     Establish a national apprenticeship program that offers non-
     college bound students training in a marketable skill.

     Give every American the right to borrow money for college by 
     establishing a National Service Trust Fund. Students can repay 
     their borrowing as a percent of their earnings over time, or by 
     serving their communities for one or two years doing work their 
     country needs.  

     Stimulate industry to provide continuing, high skills training to 
     its front-line workers.

For small manufacturers to compete today, it is not good enough simply 
to have access to new equipment and new technologies if their workers do 
not have the skills and know-how to operate them efficiently, and engage 
in truly flexible production. Yet, too much of our training is for only 
top executives or workers after they have lost their jobs. 

My plan calls for companies with over 50 employees to ensure that 1.5 
percent of their payroll goes to training throughout the workforce -- 
not just for the top executives. But we must do more for smaller 
companies who cannot afford to set up the training programs. These 
companies need to adapt to new technologies and new equipment and the 
constantly new demands. 

New production technology should be worker-centered and skill-based, not 
skill-eliminating. In the high-performance workplace, workers have more 
control over production and worker responsibility is increased. Some 
companies that have invested billions in new capital equipment have 
found that genuine employee involvement and good labor-management 
relations are ultimately more important. Therefore we need to undertake 
the following: 
     Manufacturing training centers:
     We need to promote private sector-led efforts to set up training 
     for small companies. These can be done by building off community 
     colleges training and should be an integral part of the network of 
     Manufacturing Extension provisions. These would also be integrated 
     with my Apprenticeship initiative so that young people will have 
     the opportunity to learn specific skills needed for specific 
     manufacturing jobs or industries. Councils including private 
     sector and academic leaders as well as workers would help decide 
     generic areas for training. 

     Certificate of training guarantees:
     In order to be eligible for federal funds for manufacturing 
     training centers, such centers would have to provide all future 
     employers with a Certificate of Guarantee. This would ensure that, 
     when workers do not pick up the necessary skills the first time, 
     these centers would provide additional training -- at no 
     additional cost to the employer.  

     Best Practices on Worker Participation:
     An integral function of the Manufacturing Extension Centers will 
     be to collect and disseminate information on "best practices" with 
     regards to worker participation. Increasing worker productivity is 
     one of the keys to increasing overall manufacturing productivity.

3.  Investing in Technology Programs that Empower America's Small 
Businesses.

A healthy and growing small-business sector is essential to America's 
economic well-being. America's 20 million small businesses account for 
40 percent of our GNP, half of all employment, and more than half of the 
job creation. My technology policy will recognize the importance of 
small and medium-sized business to America's economic growth with:
     Market-driven extension centers:
     Creating 170 manufacturing centers will put the best tools in the 
     hands of those companies that are creating the new jobs on which 
     the American economy depends by helping small- and medium- sized 
     manufacturers choose the right equipment, adopt the top business 
     practices, and learn cutting-edge production techniques. In order 
     to enhance U.S. industrial competitiveness, public policy must 
     promote the diffusion and absorption of technology across the U.S. 
     industrial base. Some state and local governments are already 
     involved in technology diffusion using manufacturing centers. They 
     are helping small businesses improve the productivity of their 
     existing machinery and equipment, adopt computer-integrated or 
     flexible manufacturing techniques, and identify training needs.

The Commerce Department has five Manufacturing Technology Centers across 
the country and has plans for two more. Unfortunately, these efforts are 
only a drop in the bucket compared to those of our major competitors. 
Germany has over 40 contract R&D centers (Fraunhofer Gesellschaft) and a 
broad network of industry associations and research cooperatives that 
effectively diffuse technology across industry. In Japan, major 
government-sponsored research projects, 170 kohsetsushi technology 
support centers for small businesses, and tight links between companies 
and their suppliers serve much the same function. There is no comparable 
system in the United States.

A Clinton-Gore Administration will build on the efforts of state and 
local governments to create a national technology extension program, 
designed to meet the needs of the millions of small businesses that have 
difficulty tracking new technology and adapting it to their needs.

The involvement of workers is critical to developing and executing 
successful industrial extension programs. In technology, as in other 
area, we must put people first. New production technology should be 
worker-centered and skill-based, not skill-eliminating. In the high-
performance workplace, workers have more control over production and 
worker responsibility is increased. Some companies that have invested 
billions in new capital equipment have found that genuine employee 
involvement and good labor-management relations are ultimately more 
important.

No less than 25 of these new manufacturing centers will be regional 
technology alliances devoted to regions hit hard by defense cut-backs. 
These alliances could promote the development of dual-use technologies 
and manufacturing processes on a regional basis. Extending the Small 
Business Innovation Research Program (SBIR)

In addition to creating a national technology extension service for 
small and medium-sized businesses, I will also expand the Small Business 
Innovation Research Program. By requiring that federal agencies set-
aside 1.25 percent of their R&D budget for small businesses, this 
program has helped create billions of dollars of new commercial activity 
while improving the research programs of the federal government. Given 
this track record, the SBIR program should be doubled over a period of 
four years to 2.5% to accelerate the development of new products by 
innovative small businesses. 

Funding private sector-led training centers:
We also need a fundamental change in the way we deal with R&D and 
technology if we are to lead a new era of American manufacturing. 
Currently, our R&D budget reflects neither the realities of the post-
Cold War era nor the demands for a new national security. At present, 
60% of the federal R&D budget is devoted to defense programs and 40% 
percent to non-defense programs. The federal government should aim to 
restore a 50-50 balance between defense and non-defense R&D. That is why 
I have called for a new civilian research and development program to 
support research in the technologies that will launch new growth 
industries and revitalize traditional ones.

This civilian technology program will:  
     Invest in Private-Sector Led Consortia: When the private sector 
     creates consortia to share risks, pool resources, avoid 
     duplication and make investments that they would not make without 
     such agreements, government should be willing to do its part. 
     Support for consortia such as the SEMATECH, National Center for 
     Manufacturing Sciences and the Advanced Battery is appropriate. By 
     requiring firms to match federal contributions on at least a 50:50 
     basis, the government can insure that we are leveraging public 
     dollars and that they are market-led and market-oriented. Often 
     major companies are reluctant to invest in their suppliers and 
     assist them in quality management techniques, because they fear 
     they will go to another company. Private-sector-led consortia 
     allow the major companies to cure that problem by coming together 
     and agreeing on industry-wide efforts to invest in smaller 
     suppliers. Some of these consortia will be funded by the Advanced 
     Technology Program.   

     Inward Technology Transfer: While we must strengthen the links 
     between American R&D and American jobs, we must also develop a 
     strategy for acquiring, disseminating, and utilizing foreign 
     technologies. Our Government must increase the collection, 
     translation and dissemination of foreign scientific and technical 
     information.

4. Increasing Dramatically the Percentage of Federal R&D for Critical 
Technologies. 

I will view the support of generic industrial technologies as a priority 
mission. The government already spends $76 billion annually on R&D. This 
funding should be refocused so that more resources are devoted to 
critical technologies, such as advanced materials, information 
technology and new manufacturing processes that boost industrial 
performance.

At present, 60% of the federal R&D budget is devoted to defense programs 
and 40% percent to non-defense programs. This level of support for 
defense R&D is a holdover from the massive arms build-up of the 1980s. 
At the very least, in the next three years the federal government should 
shift the balance between defense and non-defense programs back to a 50-
50 balance, which would free-up over $7 billion for non-defense R&D. 
Having achieved this balance, the government should examine whether 
national security considerations and economic conditions warrant further 
shifts.

I will also create a civilian research and development program to 
support research in the technologies that will launch new growth 
industries and revitalize traditional ones. 

This civilian technology program will: 
     Help companies develop innovative technologies and bring new 
     products to market;
     Take the lead in coordinating the R&D investments of federal 
     agencies; 
     and Cooperate and consult with industry, academia and labor in the 
     formulation and implementation of technology policy and R&D 
     programs. 

Advanced Manufacturing R&D:
The United States is currently underinvesting in advanced manufacturing 
R&D. The federal government should work with the private sector -- with 
the private sector taking the lead -- to develop an investment strategy 
for those technologies critical to 21st century manufacturing. 

Following the lead of my running mate, Al Gore, and several of his 
colleagues, we must do more to support industry's efforts to develop the 
advanced computer-controlled equipment ("intelligent machines") and the 
electronic networks that will enable American factories to work as 
quickly and efficiently as their Japanese counterparts. These 
technologies also include flexible micro- and nanofabrication, 
simulation and modeling of manufacturing processes, tools for concurrent 
engineering, electronic networks that allow firms to share business and 
product data within and between firms, and environmentally-conscious 
manufacturing. According to industry experts, the United States has an 
opportunity to capitalize on the emerging shift from mass production to 
flexible or "agile" manufacturing.

5. Leveraging the Existing Federal Investment in Technology to Maximize 
its Contribution to Industrial Performance. 

R&D conducted at the federal labs and consortia should be carefully 
evaluated to assure that it has a maximum impact on industrial 
performance. Furthermore, cooperation between universities and industry 
should be encouraged.

America's 726 federal laboratories collectively have a budget of $23 
billion, but their missions and funding reflect the priorities that 
guided the United States during the Cold War. Approximately one-half of 
their budget is directed toward military R&D. By contract, the budget 
for the National Institute for Standards and Technology (NIST) - the 
only federal agency whose principal mission is to assist industry - 
accounts for less than one percent of the total federal lab budget. 
Despite several years of legislative reform and many new directives, the 
labs still do not have the autonomy or funding to pursue joint ventures 
and industry aggressively.

These labs and other private non-profit research centers are national 
treasures because they house large, multi-disciplinary teams of 
researchers who have honed the skills of balancing basic and applied 
research for long-term, mission-oriented projects. It would take years 
to match these special capabilities elsewhere. Today, the labs and 
industry cooperate on defense needs; we need to change regulations and 
orientation to get this cooperation on technology development for 
commercial usage.

To remedy these problems, I propose the following: 
     The budget of the National Institute of Standards and Technology 
     should be doubled. Federal labs which can make a significant 
     contribution to U.S. competitiveness should have ten to twenty 
     percent of their existing budget assigned to establish joint 
     ventures with industry.

     Private corporations should compete for this funding through 
     review by panels managed by the labs and made up of corporate and 
     academic experts. Lab directors should have full authority to 
     sign, fund and implement cooperative R&D agreements with industry. 
     Some labs, such as NIST, already have this authority, but others 
     do not.

     Industry and the labs should jointly develop measures to determine 
     how well the technology transfer process is working and review 
     progress after 3 years. If these goals have not been met, industry 
     and the labs should reevaluate their involvement, and funds should 
     be redirected to consortia, universities and other organizations 
     that can work more effectively with industry for results.

     University research accounts for a large part of the federal basic 
     research budget. Funding for basic university research should 
     continue to be provided for a broad range of disciplines, since it 
     is impossible to predict where the next breakthrough may come. 

     While maintaining America's leadership in basic research, 
     government, universities and industry must all work together to 
     take advantage of these new breakthroughs to enhance U.S. 
     competitiveness.

Cooperative R&D programs represent another opportunity. Consortia can 
help firms share risks, pool resources, avoid duplication, and make 
investments that they would not undertake individually. By requiring 
that firms match federal contributions on at least a 50:50 basis, the 
government can leverage its investments and ensure that they are market-
oriented. 

Many industries are demonstrating a new found willingness to cooperate 
to meet the challenge of international competition: SEMATECH has proven 
to be an important investment for the industry and the Nation. It has 
helped improve U.S. semiconductor manufacturing technology, helped 
reversed the decline in world-wide market share of U.S. semiconductor 
manufacturing equipment companies, and improved communications between 
users and suppliers. U.S. automakers have recently formed the United 
States Council for Automotive Research to develop batteries for electric 
cars, reduce emissions, improve safety, and enhance computer-aided 
design. The Michigan-based National Center for Manufacturing Sciences, 
which now has 130 members, is helping to develop and deploy the 
technologies necessary for world-class manufacturing.  The 
Microelectronics Computer Technology Corporation (MCC) is developing an 
information infrastructure which will enable businesses to develop, 
manufacture, deliver and support products and services with superior 
speed, flexibility, and quality. U.S. steel-makers are cooperating to 
develop manufacturing processes which would use less energy, create 
fewer pollutants, and slash the time required to turn iron ore and coal 
into steel.

A Clinton-Gore Administration will work to build a productive 
partnership between government, research labs, universities, and 
business.

6. Creating a World-Class Business Environment for Private Sector 
Investment and Innovation.

Changes in America's tax, trade and regulatory policies are also needed 
to help restore America's industrial and technological leadership. In a 
global economy in which capital and technology are increasingly mobile, 
we must make sure that the United States has the best business 
environment for private sector investment. Tax incentives can spur 
investment in plant and equipment, R&D and new businesses. Trade policy 
can ensure that U.S. firms have the same access to foreign markets that 
our competitors enjoy in the U.S. market. Antitrust reform will enable 
U.S. firms to share risks and pool resources. Strengthening commercial 
sections of our embassies will increase our ability to promote U.S. 
goods abroad. Streamlining export controls will reduce the bureaucratic 
red tape which can undermine competitiveness. And an overhaul of 
cumbersome defense procurement regulations will strengthen both our 
civilian and defense industrial bases. Permanent incentives for private 
sector investment:

Too many federal incentives meant to spur innovation are on-again-off-
again programs that industry views as unreliable. As a result, they have 
not realized their full impact. Several permanent tax measures should be 
put in place immediately to stimulate commercial activity. They include 
the following: 
     Make the R&D tax credit permanent to provide incentives for U.S. 
     companies that invest in developing new technology. 
     Place a permanent moratorium on Treasury Regulation 1.861-8: This 
     regulation increases the effective rate of U.S. taxation of R&D 
     and creates a disincentive for companies to conduct R&D in the 
     United States. 
     Provide a targeted investment tax credit to encourage investment 
     in the new equipment that we need to compete in the global 
     economy, and ensure that depreciation schedules reflect the rapid 
     rate of technological obsolescence of today's high-tech equipment. 
     Help small businesses and entrepreneurs by offering a 50% tax 
     exclusion to those who take risks by making long-term investments 
     in new businesses. 

An effective trade policy:
The Bush-Quayle Administration has failed to stand up for U.S. workers 
and firms. We need a President who will open foreign markets and respond 
forcefully to unfair trade practices. I will:
     - Enact a stronger, sharper Super 301 to ensure that U.S. 
     companies enjoy the same access to foreign markets that foreign 
     companies enjoy to our market. 
     - Successfully complete the Uruguay Round. This will help U.S. 
     manufacturers and high-tech companies by reducing foreign tariffs, 
     putting an end to the rampant theft of U.S. intellectual property, 
     and maintaining strong disciplines against unfair trade practices.
     - Insist on results from our trade agreements. Although the U.S. 
     has negotiated many trade agreements, particularly with Japan, 
     results have been disappointing. I will ensure that all trade 
     agreements are lived up to, including agreements in sectors such 
     as telecommunications, computers and semiconductors. Countries 
     that fail to comply with trade agreements will face sanctions. 
     - Promote manufactured goods exports by small and medium 
     companies: To promote exports of manufactured goods, I will 
     strengthen the commercial sections of our embassies abroad so that 
     they can promote U.S goods, participate in foreign standards-
     setting organizations, and support the sales efforts of small and 
     medium-sized businesses. We should also provide matching funds to 
     trade associations or other organizations who establish overseas 
     centers to promote U.S. manufactured goods exports. 

Streamline Exports Controls:
Export controls are necessary to protect U.S. national security 
interests and prevent the proliferation of nuclear, biological and 
chemical weapons. Nonetheless, these controls are often overly 
restrictive and bureaucratic, creating a mountain of red tape and 
costing the U.S. tens of billions of dollars in exports -- while 
undermining the competitiveness of the high-tech industries on which our 
national security depends. The United States should: 
     - Further liberalize East-West export controls that are 
     unnecessary given the end of the Cold War. 
     - Avoid unilateral export controls and controls on technology 
     widely available in world markets. Unilateral controls penalize 
     U.S. exporters without advancing U.S. national security or foreign 
     policy interests. 
     - Streamline the current decision-making process for export 
     controls. While our competitors use a single agency to administer 
     export controls, the United States system is often characterized 
     by lengthy bureaucratic turf wars between the State Department, 
     the Commerce Department, the Pentagon's Defense Technology 
     Security Agency, the Arms Control and Disarmament Agency, the 
     Department of Energy, and the National Security Agency. 

Antitrust Reform: 
Increasingly, the escalating cost of state-of-the-art manufacturing 
facilities will require firms to share costs and pool risks. To permit 
this cooperation, the United States should extend the National 
Cooperative Research Act of 1984 to cover joint production ventures. 

Civil-military integration: 
Department of Defense procurement regulations are so cumbersome that 
they have resulted in an unnecessary and wasteful segregation of our 
civilian and defense industrial bases. The military specification for 
sugar cookies is 10 pages long. Government procurement is so different 
from private sector practices that companies now set up separate 
divisions and manufacturing facilities to avoid distorting the 
commercial part of their business. The U.S. must review and eliminate 
barriers to the integration of our defense and civilian industrial base. 
These barriers include cost and price accounting, unnecessary military 
specifications, procurement regulations, inflexibility on technical data 
rights, and a failure to develop technologies in a dual-use context.

Taken together, the six initiatives discussed above comprise a 
technology policy that will restore economic growth at home, help U.S. 
firms succeed in world markets, and help American workers earn a good 
standard of living in the international economy.


                   -==--==--==-<>-==--==--==-


         MEMBERSHIP IN THE ELECTRONIC FRONTIER FOUNDATION

If you support our goals and our work, you can show that support by
becoming a member now. Members receive our bi-weekly electronic
newsletter, EFFector Online, the @eff.org newsletter
and special releases and other notices on our activities.  But because
we believe that support should be freely given, you can receive these
things even if you do not elect to become a member.

Our memberships are $20.00 per year for students, $40.00 per year for
regular members.  You may, of course, donate more if you wish.

Our privacy policy: The Electronic Frontier Foundation will never, under
any circumstances, sell any part of its membership list.  We will, from
time to time, share this list with other non-profit organizations whose
work we determine to be in line with our goals. If you do not grant
explicit permission, we assume that you do not wish your membership
disclosed to any group for any reason.

---------------- EFF MEMBERSHIP FORM ---------------

Mail to: The Electronic Frontier Foundation, Inc.
    155 Second St. #38
    Cambridge, MA 02141

I wish to become a member of the EFF  I enclose:$__________
    $20.00 (student or low income membership)
    $40.00 (regular membership)
    $100.00(Corporate or company membership.
    This allows any organization to
    become a member of EFF. It allows
    such an organization, if it wishes
    to designate up to five individuals
    within the organization as members.)

    I enclose an additional donation of $

Name:

Organization:

Address:

City or Town:

State:     Zip:    Phone:(    )     (optional)

FAX:(    )    (optional)

Email address:

I enclose a check [  ]   .
Please charge my membership in the amount of $
to my Mastercard [  ]     Visa [  ]    American Express [ ]

Number:

Expiration date:

Signature:

Date:

I hereby grant permission to the EFF to share my name with
other non-profit groups from time to time as it deems
appropriate   [  ]  .
      Initials:

Your membership/donation is fully tax deductible.
=====================================================================
     EFFector Online is published by
     The Electronic Frontier Foundation
     155 Second Street, Cambridge MA 02141
     Phone: +1 617 864 0665 FAX: +1 617 864 0866
     Internet Address: eff@eff.org
 Reproduction of this publication in electronic media is encouraged.
 Signed articles do not necessarily represent the view of the EFF.
 To reproduce signed articles individually, please contact the authors
 for their express permission.
=====================================================================
     This newsletter is printed on 100% recycled electrons.



########## ########## ########## |          COMPUTER SPIES
########## ########## ########## |         by Mitchell Kapor
####       ####       ####       | 
########   ########   ########   |BUILDING BLOCKS AS STUMBLING BLOCKS
########   ########   ########   |   A Commentary on the 15th NCSC
####       ####       ####       |        by Rebecca Mercuri 
########## ####       ####       |
########## ####       ####       |           THIS OLD DOS
=====================================================================
EFFector Online           November 9, 1992                Issue  3.09
           A Publication of the Electronic Frontier Foundation
                            ISSN 1062-9424
=====================================================================


                             Computer Spies
                           by Mitchell Kapor

Can a company lawfully eavesdrop on its employees' telephone calls? Not 
if they have an expectation of privacy. But, at least in most states, 
the employer can monitor conversations if it tells the workers that that 
is what it is going to do.  

That old legal issue surfaces in a new technological context in Silicon 
Valley, with disturbing consequences for your ability to defend key 
information assets. Take a look at how Borland International, a company 
that should know better after almost a decade on the leading edge of 
technology, may have hurt itself in a case involving an apparent theft of 
trade secrets.  

The allegations in the tangled legal affair are by now well known. On 
Sept. 1 Eugene Wang, a vice president of Borland's computer languages 
division, abruptly jumped ship to join competitor Symantec Corp. A 
pattern of suspicious behavior in Wang's final days suggested that 
perhaps he had traded Borland secrets along with his job. Borland had no 
proof, but it knew where to look. Borland executives opened Wang's MCI 
Mail account, where they found, they said, a number of messages that 
they believe prove Wang delivered Borland product plans, memos and other 
sensitive documents to Symantec. The evidence thus uncovered led to 
police searches of Wang's and Symantec Chief Executive Gordon Eubanks' 
homes and Symantec offices, to a pending criminal investigation of Wang 
and Eubanks and to a civil suit by Borland against Symantec.  

What has been scarcely addressed in newspaper coverage of these events 
is what this case means to the rapidly growing business of electronic 
mail.  

Let's back up and consider the law that protects electronic mail users, 
the federal Electronic Communications Privacy Act of 1986. The privacy 
act protects messages while in transmission on a public mail service 
such as MCI, as well as after messages are received and stored on that 
service.  

Borland and its attorneys, in a hurry to prove their suspicions about 
Wang, justified their intrusion into the mailbox as a property right: 
Borland was paying the bills for Wang's MCI account. "E-mail is like an 
in-box on someone's desk,' says Borland spokesman Steven Grady in 
defense of the search. "When they leave, it reverts to the corporation."  

Case closed? Not quite. Borland's metaphors fall apart when tested 
against the realities of electronic mail. Unlike in-boxes on an 
abandoned desk, E-mail requires a password, and it can be administered 
by a wholly separate communications company, like MCI. As it stands, in 
a criminal case Wang could challenge the legality of all the evidence 
collected on the basis of the messages found in his MCI account. He may 
also have grounds for a countersuit under the electronic privacy act and 
California law, which goes further in protecting individual privacy.  

It's easy to understand the anger Borland executives felt in discovering 
an apparent information hemorrhage. But the methods employed by Borland, 
which likes to flaunt its "barbarian" ways, may have been a little too 
barbarian by the standards of the federal statute. The one thing for 
sure is that all parties will be involved in a lengthy and expensive 
court battle to sort this out. The final result may be a draw between 
Borland and Symantec, and a new definition of privacy for the rest of 
corporate America.  

Borland could have strengthened its case against Wang if it had followed 
the recommendation of the Electronic Mail Association to announce its 
policies on electronic mail. As it was, a source says the Santa Cruz 
County District Attorney staff took potential violations of the 
electronic privacy act so seriously that they used a top computer-crime 
prosecutor from the San Francisco area to help write the search 
warrants.  

Despite Borland's hard-learned lessons, it continues to refuse to 
implement a formal E-mail privacy policy that declares just when 
electronic messages sent from company equipment are company property. 
Perhaps Borland is afraid that announcing such a policy would simply 
remind miscreants to erase incriminating E-mail files before they are 
found. If so, that's naive and shortsighted.  

Some companies may be reluctant to announce in advance that they are 
constantly snooping. So be it, but then they should refrain from 
scanning MCI in-boxes. Whatever they do, they have to confront the 
reality of the enormous power of digital media. In an age when a 
company's most valuable property  may be intangible the source code for 
a software package, for example an E-mail account may amount to an 
unlocked door on a warehouse.  

The electronic privacy act's procedures may need streamlining, and the 
Borland case may be the ratchet that makes the adjustments. By the time 
Borland could have obtained court authorization to examine Wang's 
electronic mail, some of the messages might have been deleted by MCI's 
automated five-day cleanup function. New legislation requires fine-
tuning in the light of the complexities of real world situations in 
order to be effective for the purposes for which it was originally 
designed. But the lesson here is that corporations must begin to adjust 
their own policies to fit the technologies they use.  

from Forbes Magazine November 9 1992  

Mitch Ratcliffe, editor-at-large for MacWEEK, provided research assistance
for this column.  

                   -==--==--==-<>-==--==--==-

                     BUILDING BLOCKS TO SYSTEM SECURITY

                            By Rebecca Mercuri
                      (mercuri@gradient.cis.upenn.edu)

         A Report from the 15th National Computer Security Conference 
                    October 13 -16, Baltimore, Maryland.


I attended the 15th National Computer Security Conference with the hope 
of coming away with some solutions for the security problems I had 
encountered over the past few years. I left with a longer list of
problems, and the vague feeling that our industry has become remiss in
providing us with answers that we can use, or has answers and is either
incapable or unwilling to yield them publicly. 

Let me state clearly here that this comment does not reflect negatively
on the conference organizers. They performed their task well, creating a 
superbly orchestrated event that covered a broad spectrum of
topics. Indeed, "rookies" were liberally mixed on panels with esteemed
"greybeards" and many women (sans beards) were in evidence as session
chairs and presenters (although I was somewhat dismayed to note that
females appeared to constitute less than 10% of the attendees, lower
than in the computing community in general). The breadth and extent of
the conference does not allow one reporter to describe it fully, so I
offer these remarks merely as comment and commentary, perhaps to 
stimulate discussion. 

The conference had an international flavor. The keynote was by Roland
Hueber (Directorate General of the Commission of the European
Communities) and the closing plenary on International Harmonization
serving as bookends. There were repeated calls for cooperation in
developing global security standards, with the primary advantages of
such appearing to be in commerce. In the wake of the cold war, there
seems to be a spirit of openness in this regard.  I offer the
speculation that it may be foolhardy to enter into conformity of thought
and solutions.  Diversity, particularly in commerce, inspires
creativity. Monopoly, or single-mindedness, often leaves one at risk of
exploitation by a strong central power, or of attack by those who are
close enough or who understand the system well enough to side-track it
We may need "fault-tolerant" and "diversified" answers.

It is useful to juxtapose thoughts about covert channels with those
about encryption systems. For the uninitiated, covert channels are
created when  internal intermittent polling is performed in an effort to
conceal illicit data collection activities. Bob Morris provided the
statistic that 1/10 of a bit per second is enough to expose a key in
approximately 1 month. This is at current processing rates, but one can
extrapolate out the Silicon Valley curve and surmise that our current
key encryption systems will be inadequate within the end of the century
(if not now, perhaps).

In the quest for security tools one encounters the debate on provability 
and formal top level specification. With respect to covert channels, 
Virgil Gligor referred to "formal top level specification as an
unmitigated waste of time," saying that data structures and source may
not map to the top level, there may not be enough relevant details
provided, and excessive false illegal flows may occur. Earl Boebert
stated that formal proving methods have worth in analysis of
specifications, but have failed utterly in spec/code, code/object, and
code/behavior correspondence. Still, formal methods have their
supporters, most notably SRI, as indicated by John Rushby, 
one of their directors (who also publicly revealed that there had been a 
major successful break-in at the lab last month). Interestingly, the
panel on Intrusion Detection was chaired by SRI's Teresa Lunt, who
discussed the use of expert systems to encode vulnerabilities, attack
methods and known suspicious behaviors.  Steve Snapp expressed the
divide and conquer approach, saying that there may be no single
generalizable model of intrusion, and that static, incidence/existence,
and data driven methods should all be used.

The matter of viruses was explored throughout various sessions. The
general consensus of opinion seemed to be that rigorous procedures and
policies need to be implemented so that recovery is possible to some
level following contamination or invasion. 

In the talks I attended, no clear method for handling the recovery from
a "new" virus (that can not be eradicated with existing software) was
offered. This was not consoling to someone who had just last week left a
client's law office with the admonishment "don't use any of the text
files that you've created in the last 6 months until I can find out what
the new virus strain is that appears to have adhered to some unknown
quantity of them."  Here too, the standardization on certain operating
systems and environments (such as Microsoft Windows(TM)), and uniform
acceptance of specific tools (such as the legal community's reliance on
Word Perfect(TM)) encourages the proliferation of attacks that could
potentially disable large sectors of the user base.

Losses seem to be tied heavily to the bottom line. In banking, it may
not be advantageous to implement a $10M or more security system that
still does not assure total impenetrability when insurance coverage can
be obtained at a cost of $1M (even if this price only remains low until
there is a hit). 

In health care, as described in Deborah Hamilton's award-winning paper, 
the bottom line may indeed be one or more people's lives. As true with
drug approvals, it is easy to see that holding back an inadequately
tested computer system may cost more lives than providing it while
make improvements and corrections. How does one weigh security,
reliability and verifiability issues when there is a crying need for
access to the developing technology? We are faced with a moral dilemma
without a governing body to set policies.

The area of privacy was eloquently addressed by Attorney Christine
Axsmith who said that our reasonable expectations of privacy, as
expressed by the 4th Amendment, protect people, not just places. But she
went on to say that with regard to the computer industry, the Privacy
Act and other legislation efforts still suffer from a lack of court
rulings necessary to define their interpretations. Will our efforts to
improve security undermine privacy?  

Curt Symes (from IBM) stated that "we'll all be using smart cards in the 
future, for a higher level of authentication." Does this mean that I
will eventually be required to be bioidentified (DNA, fingerprint,
retinal scan, voiceprint) in order to obtain access to my own data and
research?  A chilling thought.

In conclusion, to paraphrase Peter Neumann, perhaps the conference theme 
"Information Systems Security: Building Blocks to the Future" should be 
read not as "building-blocks" (the small bricks), but as "building
BLOCKS" or obstacles to our future as security professionals. There is a
sense of urgency now -- many of us need more than a foundation of toy
blocks, requiring true solutions which appear to not be forthcoming.
What we don't want are systems and design structures that are so
cumbersome as to impede computational progress.  Discussion may be
fruitful, but let us put our noses to the grindstone and provide
functional tools and answers, rather than guidelines and assertions.
While some are working in this direction, many others are needed.

NCSC '92 -- Comment and Commentary
Copyright (c) 1992 by Rebecca Mercuri. All Rights Reserved.
Reposting and/or reprint not granted without prior written permission
from the author. Address questions, response and corrections to:
mercuri@gradient.cis.upenn.edu


                   -==--==--==-<>-==--==--==-


                         THIS OLD DOS


Hi, I'm Bob Wheeler Dealer, and welcome to This Old DOS.  Last week you 
may remember we renovated the Charles Babbage Family computer.  We 
upgraded their antique CPM to the IBM operating system known as MS DOS.  
And this week on This Old DOS, we're continuing our renovation by 
installing a brand new operating system, supposed to be real easy to 
use, called Windows.  And boy am I excited.  So let's go around back and 
see how Norm is doing with it.

Bob:  Hi Norm; how's it going?

Norm: Oh, hi Bob.  Well as you can see I'm about to install Windows on 
our old machine.

Bob: No glass in these Windows, huh Norm? Ha ha.

Norm: Ha ha. That's right, just a handful of floppy disks.  This is an 
attempt at making an IBM PC work *a little bit more* like an Apple 
Macintosh.  Instead of typing commands, you just move a lot of little 
pictures around on a screen.

Bob: I can't wait.  Sounds simple enough; let's take a whack at it.

Norm: Well, ok, the first thing we do is install these disks.  Pop them 
in the computer and follow the uh directions on the screen.  Here you 
try (sound of hard drive grinding).  That's it.

Bob: Simple enough.

Norm: Ok, Bob, now the machine wants to know if you want to modify your 
config.sys or change your autoexec.bat to automatically load when the 
machines boots up.  What do you want to do?

Bob: What's a config.sys? I don't anything about this stuff.

Norm: Never mind, it's ok Bob, I'll take care of it.  There.  Now to be 
really state of the art, we've got to upgrade our microprocessor (sound 
of sawing).  That's the computer chip inside inside so that these 
Windows will work fast enough.  Otherwise, you know, you might as well 
go out and get a cup of coffee while the screen draws pretty pictures, 
heh heh.  So let me get one of these uh 486 chips.  We've got a crane 
here.  Hey fellas.. fellas!  You wanna load that puppy here inta place?  
Careful!  (sound of machinery) Don't bend the pins!  There, all snapped 
in.

Bob: All right, now we're ready to open Windows, right?

Norm: Not on your life, Bob.  While we're at it we're building an 
extention onto the memory board for those fat, greedy programs that 
gobble the stuff up.  I'll just hammer a few of these 4 megabyte chips 
into place (bang bang). There, now we've got 16 megabytes on board.  
Narly, man!

Bob: All right, let her rip, Norm.

Norm: Not so fast, Bob!  Those big Windows programs need lots and lots 
of storage space. Charles talked to his banker and decided to spring for 
that 200 megabyte beauty there.  Hand me that..uh

Bob: You mean this thing here? (groaning and grunting)

Norm: Yeah, that's the hard drive.  Ah, thanks.  And they want to do 
multimedia.. you know sound, graphics, computer games... the latest -- 
so we'll add on a new super VGA monitor..

Bob: Something else?

Norm: A CD ROM drive..

Bob: Something else? More stuff?

Norm: Yeah, we have a sound board and special speakers if you want that 
great sound.

Bob: This .. this isn't so simple anymore!

Norm: Well,  we're just about ready to go.  That's about it.

Bob: All right now, with all this preparation Norm, this had better be 
great.

Norm: Well, I hope so, let's (sound of drive grinding) load up Word 
Perfect, Lotus 1.-2-3, Excel, and FileMaker Pro and watch her rip!  
(beep.. crash).  Oh-oh.

Bob: What happened?  What happened?

Norm: Well, it looks like a system crash.

Bob: Oh no!

Norm: Don't worry! We can fix this thing.  We can fix it.

Bob: What do we do now, give up?

Norm: No, Never! We drop everything and start over.  That's the American 
Way.  You keep changing stuff until you find what's wrong.

Bob: Now, how long is this gonna take?  I haven't got all weeks to..?

Norm:  Don't worry! We'll I'll have this thing running like top, Bob.  
In the mean time you can go back in my shop there and use my Mac.

Bob: All right, you keep working at it Norm.  We're out of time folks.  
Join us tomorrow  for the start of our new 50-part series:  "How to 
install and maintain a Local Area Network."  Until then, bye bye for 
This Old DOS!

(c) Copyright National Public Radio (R) 1992. The segment by NPR's Ira 
Plato was originally broadcast on National Public Radio's "Talk of the 
Nation" on September 11, 1992 and is used with permission of National 
Public Radio.  Any unauthorized duplication is prohibited.


                   -==--==--==-<>-==--==--==-


         MEMBERSHIP IN THE ELECTRONIC FRONTIER FOUNDATION

If you support our goals and our work, you can show that support by
becoming a member now. Members receive our bi-weekly electronic
newsletter, EFFector Online, the @eff.org newsletter
and special releases and other notices on our activities.  But because
we believe that support should be freely given, you can receive these
things even if you do not elect to become a member.

Our memberships are $20.00 per year for students, $40.00 per year for
regular members.  You may, of course, donate more if you wish.

Our privacy policy: The Electronic Frontier Foundation will never, under
any circumstances, sell any part of its membership list.  We will, from
time to time, share this list with other non-profit organizations whose
work we determine to be in line with our goals. If you do not grant
explicit permission, we assume that you do not wish your membership
disclosed to any group for any reason.

---------------- EFF MEMBERSHIP FORM ---------------

Mail to: The Electronic Frontier Foundation, Inc.
    155 Second St. #39
    Cambridge, MA 02141

I wish to become a member of the EFF  I enclose:$__________
    $20.00 (student or low income membership)
    $40.00 (regular membership)
    $100.00(Corporate or company membership.
    This allows any organization to
    become a member of EFF. It allows
    such an organization, if it wishes
    to designate up to five individuals
    within the organization as members.)

    I enclose an additional donation of $

Name:

Organization:

Address:

City or Town:

State:     Zip:    Phone:(    )     (optional)

FAX:(    )    (optional)

Email address:

I enclose a check [  ]   .
Please charge my membership in the amount of $
to my Mastercard [  ]     Visa [  ]    American Express [ ]

Number:

Expiration date:

Signature:

Date:

I hereby grant permission to the EFF to share my name with
other non-profit groups from time to time as it deems
appropriate   [  ]  .
      Initials:

Your membership/donation is fully tax deductible.
=====================================================================
     EFFector Online is published by
     The Electronic Frontier Foundation
     155 Second Street, Cambridge MA 02141
     Phone: +1 617 864 0665 FAX: +1 617 864 0866
     Internet Address: eff@eff.org
 Reproduction of this publication in electronic media is encouraged.
 Signed articles do not necessarily represent the view of the EFF.
 To reproduce signed articles individually, please contact the authors
 for their express permission.
=====================================================================
     This newsletter is printed on 100% recycled electrons.









Comments

Popular posts from this blog

BOTTOM LIVE script

Evidence supporting quantum information processing in animals

ARMIES OF CHAOS