EFFector Online Volume May org Publ

Found at: gopher.meulie.net:70/EFFector/effect07.09

  ________________             _______________          _______________
 /_______________/\           /_______________\        /\______________\
 \\\\\\\\\\\\\\\\\ \          |||||||||||||||||       / ////////////////  
  \\\\\\\\\\\\\\\\\/          |||||||||||||||||      / ////////////////
   \\\\\\_______/\            ||||||_______\        / //////_____\  
    \\\\\\\\\\\\\ \           ||||||||||||||       / /////////////
     \\\\\\\\\\\\\/____       ||||||||||||||      / ///////////// 
      \\\\\___________/\      |||||              / ////   
       \\\\\\\\\\\\\\\\ \     |||||             / ////  
        \\\\\\\\\\\\\\\\/     |||||             \////

EFFector Online Volume 07 No. 09       May 11, 1994        editors@eff.org
A Publication of the Electronic Frontier Foundation        ISSN 1062-9424

EFF Urges Support for Brock Meeks Defense Fund
EFF's Kapor Announces New Cyberspace TV Show
Announcemennt of OTA Wireless study and the NII
Name Change for the "Big Dummy's Guide to the Internet"
Errata - Correction to EFFector 07.08 Ratcliffe Nat'l. ID article
Note About EFFector - New Frequency, What to Do If You Are Moving
What YOU Can Do


Subject: PGP 2.5 available from Electronic Frontier Foundation ftp site

With the early May announcement of the availability of the new version of 
files, EFF has decided to provide PGP and other cryptographic material to
users of the Internet.  EFF applauds and congratulates the PGP development
team, MIT (who initially made PGP 2.5 available), and RSA Data Security
(patent holders of the RSA and RSAREF encryption code) for coming to an
agreement and providing this new version of the most popular email encryption

exception of ViaCrypt's commercial PGP 2.4, but the new 2.5 is built upon
the free RSAREF encryption functions, rather than the previous RSA functions
like PGP.  

Despite the patent & licensing issues being resolved, PGP is still not legally
exportable from the United States (except to Canada), due to ITAR export
Thus, EFF can only make PGP and other crypto tools and source code available
to US and Canadian nationals currently residing in the US or Canada and
connecting to EFF's site from a US or Canadian site.

can be obtained by reading and following the instructions in the README.Dist
file at:

ftp.eff.org, /pub/Net_info/Tools/Crypto/

access to the material itself is not supported at this time.

Only the DOS and Unix versions of PGP 2.5 have been released so far.
The Unix version is in source code form, and so can be readily ported to
VMS, NeXT and many other operating systems.  A Macintosh version has yet to
be released. 

HR3627) to cantwell@eff.org, ask your Representatives to co-sponsor this
bill, and ask your Senators to co-sponsor Sen. Murray's companion bill
(S1846) in the US Senate.  Congress contact information is available from
ftp.eff.org, /pub/EFF/Issues/Activism/govt_contact.list


Subject: EFF Urges Support for Brock Meeks Defense Fund

The Electronic Frontier Foundation urges its members and supporters
to contribute to the defense fund for Brock Meeks, the online
Cyberwire Dispatch. EFF is in touch with Meeks's attorneys, and
Amendment issues arise as it develops.

As we enter a world in which users of the networks increasingly
are able to act as producers of information as well as consumers,
t is vital that we stand united against those who would use
litigation to chill the full expression of individual First Amendment
a dollar (or more) to the vindication of freedom of speech on the Net.

--Mike Godwin
  EFF Online Counsel

     * * * 

Date: Wed, 11 May 1994 13:38:30 -0400 (EDT)
From: Meeks Defense Fund 

 Dear Net Citizen:

 How do you put a price on free and open dialogue on the Net?

 How much are you willing to spend to preserve the concept of roboust
 and open debate that have become a part of the Internet's culture?
 $100? $50?  $20?

 What if the cost of helping to preserve an open and robust Net was
 no more than $1.29?  That's right, less than the cost of a fast
 food hamburger.  Freedom on the Internet for only $1.29... cheap
 at twice the price.

 A joke?  Hardly.  The free and open speech, indeed the First Amendment
 rights of the Internet -- rights we've all enjoyed for decades -- are now
 being challenged in court.

 CyberWire Dispatch, the well-respected online newswire written and
 developed for the Internet community by journalist Brock Meeks, is
 the subject of a libel suit.  CyberWire Dispatch has been at the
 forefront of bringing the Net community timely and insightful

 This suit was highlighted in a _Wall St. Journal_ article (April
 22, page B1).  The subject of a Dispatch investigation is suing
 Meeks for simply doing what journalists in the traditional print
 medium have done since the founding of newspapers:  Print the
 facts and let the public decide the outcome.

 Brock and the Cyperwire Dispatch are examples of the "bottom up"
 journalism that charachterizes the Net, where anyone with a modem can
 compete with the traditional press.  Of course, most of us don't come
 to the Net with a lawyer in tow, or the resources to defend a legal
 action taken against us in courts located hundreds of miles from our

 This libel action is one of the earliest cases of libel involving
 alleged defamatory statements published over a computer network.
 It raises the extremely important legal and policy issues.  It's impact
 may well determine how and to what extent anyone feels free to express
 strong opinions on the Net, wihtout being put at risk of legal action.

 It is crucial that Brock have a strong defense and that the principles
 that  come out of this case provide the maximum protection to the
 exercise of free and open speech as possible.

 CyberWire Dispatch is unique because it's distributed solely in
 electronic form.  A service for the Net community at large.  And
 all CyberWire Dispatch articles are free.  Meeks neither charges
 anyone for receiving them;  he gets paid nothing to write them.

 For all these efforts, he's being sued.  And being sued by a
 company with a large financial backing.  Meeks, on the other hand,
 has no such resources.  His attorney, Bruce Sanford of Baker &
 Hostetler is arguably the finest First Amendment lawyer in the

 And although he has agreed to represent Meeks at a reduced rate,
 the cost of defending against this unmerited suit will not be

 We have formed this committee to lend our support in helping him
 raise money for his legal defense.  And all we're asking you to
 send is $1.29.  That's it.  Why that price?  The math is easy: $1
 in an envelope with a 29 cent stamp applied.

 Who can't afford $1.29 to help save the great freedoms we all
 enjoy here today?

 Can you send more?  Of course.  Any contributions will be
 welcomed and accepted.  Tax deductible donations also are
 possible by following the instructions below.

 All money sent for Meeks' legal defense fund will be go to that
 purpose.  All the administrative services for administering the
 fund are being donated;  100% of your money goes to defer the
 legal costs of this case.

 You are encouraged to repost this message.  But please, we urge
 you to keep proper Net protocol in mind when reposting or cross
 posting this message.

 Thanks for your time.  On behalf of Brock and for future
 generations of electronic journalists, we appreciate your
 contributions and support.


 Samuel A. Simon
 President, Issue Dynmics, Inc.*

 Mitch Kapor
 Chair, Electronic Frontier Foundation*

 David Farber
 The Alfred Fitler Moore Professor of Telecommunications Systems
 University of Pennsylvania*

 Philip Elmer-DeWitt
 Senior Writer
 TIME Magazine*

 Marc Rotenberg
 Electronic Infomation Privacy Center*

 Nicholas Johnson
 Former FCC Commissoner*

 Jerry Berman
 Electronic Frontier Foundation*

 Mike Godwin
 Electronic Frontier Foundation*


  For Tax Deductible Donations:

 Make Checks out to "Point Foundation" and clearly annotate on the check:
  "For Legal Defense Fund."

  Send those checks to:

  Meeks Defense Fund
  c/o Point Foundation
  27 Gate Five Road
  Sausalito, CA 94965

 For those who don't care about the tax deductible status, send
  contributions to:

 Meeks Defense Fund

 c/o IDI
 901 15th St. NW
 Suite 230
 Washington, DC 20005

#      Meeks Defense Fund       |   Internet:   fund@idi.net       #
# ---------------------------------------------------------------- #
#  c/o  IDI                     c/o Point Foundation               #
#  901 15th St. NW              27 Gate Five Road                  #
#  Suite 230                    Sausalito, CA  9465                #
#  Washington, DC  20005                                           #


Subject: IITF Privacy Working Group Request for Comments on Principles

From: CMATTEY@ntia.doc.gov
Date: Wed, 04 May 1994 14:53:26 -0400

[...]this is indeed time sensitive, and we want people to have ample
opportunity to review it and react.  Please disseminate it

are two separate bodies in government examining privacy issues.
Some background explanation for you: the Privacy Working Group
(part of the interagency NII task force) is trying to develop a
broad framework for dealing with privacy issues that span all
telecommunications policy) is examining privacy issues affecting
the telecommunications and media industries. [...] (I am involved in both
efforts, as I am NTIA's representative to the interagency Privacy Working
Group.  As such, I obviously am trying to make sure both efforts are in sync

Feel free to contact me if you have any questions.

Carol Mattey

The following file is posted at the request of the
Group, chaired by Robert Veeder, Office of Management and

Request for Comments on the draft Principles for Providing
and Using Personal Information and their Commentary.

The draft Principles for Providing and Using Personal
Working Group on Privacy.  They are intended to update the
Code of Fair Information Practices that was developed in the
early 1970s.  While many of the Code's principles are still
valid, the Code itself was developed in an era when paper

The advent of the National Information Infrastructure has
caused two things to change dramatically.  No longer is
nformation usage bound by the limitations of paper -- the
creating an interactive environment in which all of the
non-governmental usage rivals the government's, and is
largely unregulated.

The following Principles were developed with the goal of
nteractive world. The Working Group recognizes that the
be carefully adapted to specific circumstances.
Nevertheless, the developers believe that the
are basic ones. As such, they are intended to assist
legislators, regulators, and companies as they develop codes
of practice. 

The Working Group invites public comment on the Principles
and Commentary. We are especially interested in
understanding how the Principles would work in this new
nteractive electronic environment and particularly in non-

The Comment period will close on June 13, 1994.  Comments
Secretariat, National Telecommunications and Information
Administration, US Department of Commerce, Room 4892,
Washington, D.C. 20230.  The Principles and Commentary can be
telnet to iitf.doc.gov and login as gopher.  Electronic comments
may be sent to nii@ntia.doc.gov.


               DRAFT: April 21, 1994          

The United States is committed to building a National Information
citizens.  This infrastructure, essentially created by advances
n technology, is expanding the level of interactivity, enhancing
communication, and allowing easier access to services. As a
unimagined uses for personal information.  In this environment,
n the NII in the fair use of personal information.

Traditional fair information practices, developed in the age of
nformation and communications are sent and received over
networks on which users have very different capabilities,
objectives and perspectives.  Specifically, new principles must
acknowledge that all members of our society (government,
ndustry, and individual citizens), share responsibility for
ensuring the fair treatment of individuals in the use of personal
nformation, whether in paper or electronic form.  Moreover, the
NII will empower individuals to participate in protecting
nformation about themselves.  The new principles should also
make it clear that this is an active responsibility requiring
openness about the process, a commitment to fairness and
accountability, and continued attention to security.  Finally,
about the new information infrastructure and how it will affect
their lives.

These "Principles for Providing and Using Personal Information"
nformation collection and use.   Thus they are intended to be
equally applicable to public and private entities that collect
and use personal information.  However, these Principles are not
ntended to address all information uses and protection concerns
for each segment of the economy or function of government. 
Rather, they should provide the framework from which specialized


A.  Information Privacy Principle

     1.   Individuals are entitled to a reasonable expectation of

          information privacy.

B.  Information Integrity Principles

nformation it contains. It is therefore the responsibility of
all participants to ensure that integrity. In particular,

     1.   Ensure that information is secure, using whatever means 
          are appropriate;

     2.   Ensure that information is accurate, timely, complete,  
          and relevant for the purpose for which it is given.

collect personal information directly from the individual)

A.  Collection Principle

Before individuals make a decision to provide personal
nformation, they need to know how it is intended to be used, how
t will be protected, and what will happen if they provide or
nformation should:

     1.   Tell the individual why they are collecting the         
          information, what they expect it will be used for, what 
          steps they will take to protect its confidentiality and 
          integrity, the consequences of providing or withholding 
          information, and any rights of redress.

Collectors and entities that obtain, process, send or store

A.  Acquisition and Use Principles

Users of personal information must recognize and respect the
Therefore, users of personal information should:

     1.   Assess the impact on personal privacy of current or     
          planned activities before obtaining or using personal   

     2.   Obtain and keep only information that could reasonably  
          be expected to support current or planned activities    
          and use the information only for those or compatible    

     3.   Assure that personal information is as accurate,        
          timely, complete and relevant as necessary for the      
          intended use;

B.  Protection Principle

Users of personal information must take reasonable steps to
mproperly. Such users should:

     1.   Use appropriate managerial and technical controls to    
          protect the confidentiality and integrity of personal   

C.  Education Principle

The full effect of the NII on both data use and personal privacy
s not readily apparent, and individuals may not recognize how
their lives can be affected by networked information.  Therefore,
nformation users should:

     1.   Educate themselves, their employees, and the public     
          about how personal information is obtained, sent,       
          stored and protected, and how these activities affect   

D.  Fairness Principles

Because information is used to make decisions that affect
ndividuals, those decisions should be fair.  Information users

     1.   Provide individuals a reasonable means to obtain,       
          review, and correct their own information;

     2.   Inform individuals about any final actions taken        
          against them and provide individuals with means to      
          redress harm resulting from improper use of personal    

     3.   Allow individuals to limit the use of their personal    
          information if the intended use is incompatible with    
          the original purpose for which it was collected, unless 
          that use is authorized by law.

A.  Awareness Principles

While information collectors have a responsibility to tell
ndividuals why they want information about them, individuals
also have a responsibility to understand the consequences of

     1.   Planned primary and secondary uses of the information;

     2.   Any efforts that will be made to protect the            
          confidentiality and integrity of the information;

     3.   Consequences for the individual of providing or         
          withholding information;

     4.   Any rights of redress the individual has if harmed by   
          improper use of the information.

B.  Redress Principles

naccurate or improperly used personal information. Therefore,
ndividuals should, as appropriate:

     1.   Be given means to obtain their information and be       
          provided opportunity to correct inaccurate information  
          that could harm them;

     2.   Be informed of any final actions taken against them and 
          what information was used as a basis for the decision;

     3.   Have a means of redress if harmed by an improper use of 
          their personal information.

A document of IITF commentary on and detailed description of these
ftp.eff.org, /pub/EFF/Policy/Privacy/iitf_principles.comments


Subject: EFF's Kapor Announces New Cyberspace TV Show

From: mkapor@kei.com (Mitchell Kapor)

New Cyberspace TV Program

of computer networks for the television viewer, whose point of  view is
that the world of on-line communications is interesting because of what
We will be focusing on the human aspects of networking and the individual
and social aspects of being on-line.  Cyberspace will be portrayed as a
not-so-really strange territory after all, where all of us will
ncreasingly come to live and work.  My role is to guide people through
this new territory, introducing the audience to its native culture, its

We assume our audience is motivated by curiosity to learn more about what

We will give the show a look and feel which is approachable and
from the net community itself.   There will be plenty of demos of cool net

We are taping two test shows in mid-June which will be shown in Boston and
other cities and hope to have some sort of national distribution (to be

An Invitation:

We would like to include some video clips of net citizens expressing their
nto an on-air piece for our regular feedback session.

already on the net.  This is an opportunity for those  of us who enjoy
appreciate the decentralized and democratic character to express that


Since an individual on-air clip will run at most 20-30 seconds, please keep
your statement succinct.

We can accept Quicktime movies, VHS cassettes,  or 8mm tapes.  If you
enclose a mailer, we will return your tape.   We can also pick up digital

Contact Information:

email:  cybertv@kei.com

c/o Kapor Enterprises, Inc.
Cambridge MA 02142


Subject: Announcemennt of OTA Wireless study and the NII

From: Todd LaPorte 

Your readers may be interested in this announcement.  Please feel free to 

March 27, 1994


New OTA Study on Wireless Technology and the National

     We are pleased to announce that the Office of
Technology Assessment's study of the implications of
Congressional Technology Assessment Board at its February
Boucher, and the proposal for the study, which outlines the
ssues we will be considering during the next 14 months, are
all available via ftp at otabbs.ota.gov.  Look in

     The objective of this study is to provide a
comprehensive analysis of the problems and promises of
ntegrating wireless technologies into the NII.  Wireless
technologies and systems--such as TV and radio broadcasting,
new personal communications services, and many kinds of
NII, but the role they will play and the implications of
their widespread adoption are not yet clear.  In particular,
ntegrating the many wireless and wireline systems that will
comprise the NII will prove a difficult challenge for
Federal, State, and local regulators. Many factors,
ncluding standards development, interconnection and pricing
arrangements, and differing industry regulation, must be
addressed before radio-based technologies and systems can
become an effective part of the NII.

     This study will:  identify and discuss the various
more efficient use of radio-based systems, and explore the
economic, regulatory, and social implications of the
convergence of wireline and wireless technologies in the
NII.  The study will also present policy options addressing

     Over the course of the study, we will try to talk to as
many people as we can in order to understand the wide range
of interests and concerns surrounding these complex and
announced as far in advance as possible. If you would like
more information, please feel free to contact the study team
at our project e-mail address, wireless@ota.gov.  Any
other sources of data and information will be greatly

David Wye, Todd La Porte, Alan Buzacott, Greg Wallace
Wireless Project Team
Telecommunications and Computing Technologies Program
Office of Technology Assessment
U.S. Congress
(202) 228-6760


From: wireless 
Date: Thu, 05 May 94 11:26:00 PDT

Regarding your expressed interest in the Wireless Study, I have enclosed a 
copy of the agenda for the first meeting of the Advisory Panel along with 
the memorandum sent via regular mail to other interested persons.

Greg Wallace
Research Analyst

                              May 2, 1994


To:  Interested persons

Fr:  David Wye
     Project Director

Re:  First Advisory Panel Meeting for Wireless/NII study

     The first meeting of the Advisory Panel for OTA+s study of wireless 
technologies and the National Information Infrastructure (NII) will be held 
on May 12, 1994 from
Washington, DC.  The meeting is open to the public, and you are welcome to 
attend as an observer, but only a small amount of time will be set aside for 
observer comments.

     The Advisory Panel is composed of 19 individuals chosen to represent 
the broad mix of stakeholder interests in this study.  A list of the members 
s enclosed for your information.

     The purpose of the the Advisory Panel is to help the project staff 
understand the broad range of issues and concerns surrounding the deployment 
of wireless technologies in the NII, and to identify appropriate 
methodologies and strategies for analyzing these issues.  The panel will 
also help ensure that the final report is as balanced, accurate, and 
objective as possible.


Office of Technology Assessment
Telecommunication and Computing Technologies Program

Wireless Technologies and the NII
Advisory Panel Meeting Agenda

May 12, 1994

          Welcome to OTA:  Jim Curlin, Program Manager
          Administrative announcements:  Liz Emanuel, Office Administrator
          Plans for the day:  Rob Kling, Chair

     This study grew out of our belief that wireless technologies were not 
being adequately considered in discussions of the National Information 
telecommunication and information technologies of all sorts--including 
technological changes. In this first session, we would like to examine the 
communications infrastructure of the United States.

o Does the study include all the issues it should?  What topics are missing? 
 What issues are not so important?

o What specific characteristics or capabilities make wireless systems 
mportant for the NII?  Are wireless technologies different from other
components of the NII? What special benefits can wireless offer? 
 Conversely, what special problems does wireless present for the development 
of the infrastructure?

o Do policies that are adopted for the NII need to be +technology neutral?+ 
 Is this approach possible or even a good idea?  Will this concept help or 
of wireless?

     Wireless technologies being developed today will bring new 
technologies with existing services may be difficult in many cases, but may 
also offer significant benefits for expanding access to and providing 
competition for NII services.  In this session we would like to discuss the 
opportunities and economic and regulatory issues associated with the 

o What types of wireless applications are being developed?  How might 
education, health care, and the provision of government services benefit 
from the wider use of wireless?  How do consumers view wireless services 

o What types of technologies are now being investigated in trials or in the 
lab that might contribute to the NII?  What are the implications for 

o What does +interoperability+ mean in the context of wireless systems?  Is 
concern about the standards process for wireless justified?  Where and how 

o What are the key regulatory issues associated with wireless technologies? 
 What are the implications of wireless for local loop competition?

     The widespread adoption of wireless technologies will affect peoples' 
lives in many ways--most of which are still unknown.  Some of the effects 
are unlikely to be noticed until the technology has been deployed widely. 
 The impacts that wireless technologies may have appear to fall into several 
broad categories:  ubiquity, mobility, access, control.  In this session we 
lives--at home and at work.

o How might wireless technologies affect personal or societal security? 
 Personal privacy and autonomy?

o What are the health effects of wireless technologies?  If there are 
uncertainties, what research needs to be done to answer remaining questions?

o How might wireless technologies change work or business organizations, and 

     What else do you think is important that we haven+t talked about today? 
 What is the one thing that we should remember?
     Suggestions for workshops or more in-depth study.


Subject: Name Change for the "Big Dummy's Guide to the Internet"

EFF's tutorial, "Big Dummy's Guide to the Internet," has been renamed
"EFF's Guide to the Internet."  EFF recently signed a deal to have the
for Dummies" series, expressed their concern that the name similarity
between the two guides would cause confusion to purchasers.  We agreed and
"Everybody's Guide to the Internet" and should be available at a bookstore
near you by the end of the summer.  The ASCII text file version of "EFF's
Guide to the Internet" can be found at:

ftp.eff.org, /pub/Net_info/Guidebooks/EFF_Net_Guide/netguide.eff

Updates will be at

ftp.eff.org, /pub/Net_info/Guidebooks/EFF_Net_Guide/Updates/

Updates will have a filespec of netupdate.??? where ??? is the issue number
(e.g., netupdate.001, netupdate.002, etc.)


Subject: Errata - Correction to EFFector 07.08 Ratcliffe Nat'l. ID article

From: godsdog@netcom.com (Mitch Ratcliffe)
Date: Wed, 11 May 1994 14:42:09 -0700

During the editorial process, the statement that NASA Ames carried out the
Clipper R&D was inadvertantly added to the story. NASA Ames did provide
R&D for the US Card project, but played no known role in the Clipper devel-
opment. Digital Media is sorry if this mistake caused any confusion.

Mitch Ratcliffe


Subject: Note About EFFector - New Frequency, What to Do If You Are Moving

EFFector is no longer bi-weekly.  Due to the fact that things are moving
more frequently.  Whenever we have time-sensitive material, and/or enough
material for an issue of EFFector, a new issue will be released.  We hope
this will get news to you faster, allow us to include more information,
and keep the issue size down to something that most mail systems can

you can do so by sending a message with "unsubscribe effector-online" (no
quotes) to listserv@eff.org - IF you joined the EFFector mailing list by
(which is most of you), you can unsubscribe by sending a request to be

Thank you, and hope to see you back on the list soon!  Note that if you


Subject: What YOU Can Do

Experience should teach us to be most on our guard to protect liberty when
the Government's purposes are beneficent. Men born to freedom are naturally
alert to repel invasion of their liberty by evil-minded rulers. The

  - Justice Louis D. Brandeis, dissenting, Olmstead v. United States,
    277 U.S. 479 (1928)

Who will decide how much privacy is "enough"?

The Electronic Frontier Foundation believes that individuals should be
able to ensure the privacy of their personal communications through any
technological means they choose.  However, the government's current
Now, more than ever, EFF is working to make sure that you are the one that
makes these decisions for yourself.  Our members are making themselves heard
on the whole range of issues.  To date, EFF has collected over 4800 letters
of support for Rep. Cantwell's bill (HR3627 - Sen. Murray's companion bill
s S1846) to liberalize restrictions on cryptography.  The bill will need
your vocal support to succeed.  We also gathered over 1400 letters

email to cantwell@eff.org, Subject: I support HR 3627

Your letters will be printed out and hand delivered to Rep. Cantwell by EFF.

You KNOW privacy is important. You have probably participated in our online
campaigns.  Have you become a member of EFF yet?  The best way to protect
your online rights is to be fully informed and to make your opinions heard.
EFF members are informed and are making a difference.  Join EFF today!

For EFF membership info, send queries to membership@eff.org, or send any
message to info@eff.org for basic EFF info, and a membership form.



EFFector Online is published by:

The Electronic Frontier Foundation
Washington DC 20001 USA
+1 202 347 5400 (voice)
+1 202 393 5509 (fax)
+1 202 638 6120 (BBS)

     Coordination, production and shipping by:
     Stanton McCandlish, Online Activist/SysOp/Archivist 

Reproduction of this publication in electronic media is encouraged.  Signed
articles do not necessarily represent the views of EFF.  To reproduce

To subscribe to EFFector via email, send message body of "subscribe
effector-online" (no quotes) to listserve@eff.org, which will add you a



Membership & donations: membership@eff.org
Legal services: ssteele@eff.org
Hardcopy publications: pubs@eff.org
Technical questions/problems, access to mailing lists: eff@eff.org
General EFF, legal, policy or online resources queries: ask@eff.org

End of EFFector Online v07 #09