EFFector Online Volume July org Pub

Found at: gopher.meulie.net:70/EFFector/effect07.12

  ________________             _______________          _______________
 /_______________/\           /_______________\        /\______________\
 \\\\\\\\\\\\\\\\\ \          |||||||||||||||||       / ////////////////  
  \\\\\\\\\\\\\\\\\/          |||||||||||||||||      / ////////////////
   \\\\\\_______/\            ||||||_______\        / //////_____\  
    \\\\\\\\\\\\\ \           ||||||||||||||       / /////////////
     \\\\\\\\\\\\\/____       ||||||||||||||      / ///////////// 
      \\\\\___________/\      |||||              / ////   
       \\\\\\\\\\\\\\\\ \     |||||             / ////  
        \\\\\\\\\\\\\\\\/     |||||             \////

EFFector Online Volume 07 No. 12      July 22, 1994       editors@eff.org
A Publication of the Electronic Frontier Foundation        ISSN 1062-9424

EFF Analysis of Vice-President Gore's Letter on Cryptography Policy
EFF Reactions to Encryption Standards & Procedures Act (07/12/94 Draft)
NSA Letter to Sen. Hollings Re: Clipper Appropriation Draft Bill
EFF Congratulates Rep Markey on Passage of Open Platform Bill HR3636
US ACM Calls for Clipper Withdrawal, Releases Crypto Policy Report
New Faces at EFF - Robin Abner (Membership), Darby Costello (Finance)
What YOU Can Do


Subject: EFF Analysis of Vice-President Gore's Letter on Cryptography Policy

July 22, 1994

Two days ago, Vice-President Al Gore signaled a major setback in the
Administration's Clipper program, and a willingness to engage in serious
negotiations leading to a comprehensive new policy on digital privacy and
certain: Clipper is a dead end, and those of us who are concerned about

The Vice-President's letter to Rep. Maria Cantwell (D-WA) made it clear
that while Clipper might have a small place in the telephone security
market, it has no future in the digital world.  "...[T]he Clipper Chip is
an approved federal standard for telephone communications and not for
computer networks and video networks.  For that reason, we are working with
ndustry to investigate other technologies for those applications....  We
less expensive system.  Such a key escrow system would be implementable in
upon a classified algorithm, would be voluntary, and would be exportable." 
Clipper does not meet most of these criteria, so, according to the Vice-


The premise of the Clipper program was that the government could drive the
market toward use of encryption products which incorporated
thus preserving law enforcement access to encrypted communications. 
Clipper was originally announced as the first element of a family of
Clipper itself was purely a voice and low-speed data product, but other
members of the Skipjack family, including Tessera and Capstone, were to be
compatible with Clipper and were intended to lead the way from escrowed
encryption in voice to escrowed encryption for data.  Plans are already
announced, in fact, to use Tessera and Capstone in large government email
networks.  At the time, the hope was that government use of this technology

Now, the announcement that the Administration is re-thinking plans for data
encryption standards leaves Clipper a stranded technology.  No one wants to
buy, or worse yet, standardize on, technology which has no upgrade path. 
As a long-run effort to force the market toward government-escrowed
encryption standards, Clipper is a failure.


The fight for privacy and security in digital media is by no means over. 
Though the Administration has backed away from Clipper, and expressed
on the following issues:

        * Improved telephone encryption standards

For the reasons listed by the Vice-President, in addition to the inherent
choice for telephone encryption.  Industry should develop a standard for
truly secure and private telephones, make them available from multiple
manufacturers worldwide, and make them interoperate securely with audio
conferencing software on multimedia PC's.

        * Truly voluntary standards

Any cryptographic standard adopted by the government for private sector use
must be truly voluntary.  Voluntary means, to us, that there are statutory
a particular standard, especially if it involves government or private key

        * Open standards

Standards chosen must be developed in an open, public process, free from
classified algorithms.  The worldwide independent technical community must
be able to create and evaluate draft standards, without restriction or
the international cryptographic community.

        * No government escrow systems

Any civilian encryption standard which involves government getting copies
of all the keys poses grave threats to privacy and civil liberties, and is
not acceptable in a free society.

        * Liberalization of export controls

Lifting export controls on cryptography will make the benefits of strong
cryptography widely available to our own citizens. U.S. hardware, software
and consumer electronics manufacturers will build encryption into
affordable products once they are given access to a global marketplace. 
Today's widespread availability of "raw" cryptographic technology both
nside and outside the United States shows that the technology will always
be available to "bad guys".

The real question is whether our policies will allow encryption to be built
nto the fabric of our national and international infrastructure, to
ncreased individual control over identity, improved security and integrity
of documents, contracts, and licenses, reduced fraud and counterfeiting,
the creation of significant new markets for buying and selling of
ntellectual property, and a lessened ability to detect and prosecute
victimless crimes.

These benefits are not free, however.  EFF does recognize that new
communications technologies pose real challenges to the work of law
enforcement.  Just as the automobile, the airplane, and even the telephone
created new opportunities for criminal activity, and new difficulties for
law enforcement, encryption technology will certainly require changes in
traditional investigative techniques.  We also recognize that encryption
We further believe that these technologies will create new investigative
tools for law enforcement, even as they obsolete old ones.  Entering this
new environment, private industry, law enforcement, and private citizens
must work together to balance the requirements of both liberty and

Finally, the export controls used today to attempt to control this
technology are probably not Constitutional under the First Amendment; if
the problems of uncontrolled export are too great, a means of control must
be found which does not restrict free expression.


The efforts of Congresswoman Maria Cantwell, Senator Patrick Leahy, and
other members of Congress, show that comprehensive policies on privacy,
be achieved with the active involvement of Congress.  Unilateral policy
efforts by the Executive branch, such as Clipper and misguided export
control policies, will not serve the broad interests of American citizens
and businesses.  So, we are pleased to see that the Vice-President has
forward-looking policy.  We see the Vice-President's letter to
Congresswoman Cantwell as an important opening for dialogue on these

The principles of voluntariness and open standards announced in the Vice-
nto legislation.  We believe that under the leadership of Senator Leahy,
Reps. Cantwell, Valentine, Brooks and others, this will be possible in the
next congress.  EFF is eager to work with the Congress, the Administration,
along with other private sector organizations to help formulate a new
activism, industry lobbying, and public interest advocacy which has yielded


Jerry Berman, Executive Director 
Daniel J. Weitzner, Deputy Policy Director 

For the full text of the Gore/Cantwell letter, see:

ftp.eff.org, /pub/Alerts/gore_clipper_retreat_cantwell_072094.letter


Subject: EFF Reactions to Encryption Standards & Procedures Act (Draft)

The staff of the House Science, Space, and Technology Committee has just
establishment of Clipper-like escrowed encryption systems.  Entry of the
Congress into this policy debate is a welcome change after 18 months of
one-sided Executive Branch edicts.  However, considerable changes would be
federal encryption policy which preserves the right of private individuals
to use any form of encryption, without restriction or penalty.  

Despite its promise of an open process, this bill is by no means a
authority now to spend federal funds on escrow encryption systems.

Overview of the bill:

The bill directs the Department of Commerce, through the National Institute
of Standards and Technology, to issue escrowed encryption standards.  The
opportunity for judicial review under the terms of the Administrative

Several aspects of the Clinton Administration's approach to cryptography

By this bill, any encryption standards adopted must "preserve the
functional ability of the government to interpret, in a timely manner,
electronic information that has been obtained pursuant to an electronic

The bill specifies that standards adopted should advance the development of
the NII, but offers only qualified support for privacy.  Standards should
are only required to go so far as to not "diminish existing privacy

The bill establishes a permanent role for the National Security Agency in
the creation of privacy and security standards for use by the private
consult with the NSA on matters of federal systems security and to draw
"computer system technical security guidelines developed by the National
Security Agency to the extent that the National Bureau of Standards
explicitly extend the NSA role from federal systems to systems intended for
Security Act.

To create a truly open policy process, to protect privacy, and to ensure
the development of the best privacy-protecting technology possible, the
bill should be augmented with the following provisions:

Any legislation on encryption standards must guarantee that no one will be
be curtailed by law.  Furthermore, federal encryption policy should
ability to communicate with the government, should never be conditioned on
the use of any escrowed encryption standard.  From the first announcement
of the Clipper program, the Clinton Administration has assured the public
that escrowed encryption would remain voluntary.  This promise must be
ncluded in legislation.

The draft bill does call for an open process for formation of encryption
that no classified algorithms or technologies may be included.  Though
there was public comment on the Escrowed Encryption FIPS (the Clipper
Federal Information Processing Standard), public process in that case was
meaningless because the core technology remained behind a veil of secrecy.

As drafted, the proposal drastically limits the liability of federal escrow
agents for all but "willful" abuse by federal employees.  The escrow
agents must also be responsible for unauthorized release of keys because of
the actions of private individuals or because of negligent practices by

Finally, if the government is going to adopt a government-based escrow

The full text of the draft bill is available from EFF's archives:

ftp.eff.org, /pub/EFF/Policy/Crypto/encryp_stds_procedures_94_bill.draft


Subject: NSA Letter to Sen. Hollings Re: Clipper Appropriations Draft Bill

Fort George G. Meade, Maryland 20755

Honorable Ernest P. Hollings
Chairman, Subcommittee on Commerce,
        Justice, State and Judiciary
Committee on Appropriations
United States Senate
Washington, DC  20510-6027

Dear Senator Hollings:

        We recently received a copy of a draft amendment that Senator Leahy
key escrow encryption (including the CLIPPER Chip) on satisfaction of
Administration's overall key escrow strategy.

        We are very concerned about several aspects of the proposal.  Most
mportantly, this language would cause significant delays (perhaps two
years or more) in the introduction and use of escrowed key encryption
abroad as well.  Widespread use of non-escrowed encryption could
rretrievably damage our ability to encourage the use of key escrow
encryption, putting at risk law enforcement effectiveness and critical
foreign intelligence activities.

        Another very significant concern is the impact of delays on major
Defense Department programs to secure its information systems that process
nformation regarding funds transfers, personnel data, medical files,
logistics support, and much more.  Since most of that information today is
computing and telecommunications systems, it is extremely vulnerable.

        The threat to these systems is real.  Already, some of our systems
believe potential threats include foreign intelligence activities,
criminals, terrorists, and hackers.  In addition to potential threats from
external entities, network/computer attacks could also be initiated by
"insiders".  Network/computer protection within DoD is a fundamental
military readiness issue and the need for security products is immediate.

        The DoD is implementing a major program to help protect
unclassified but sensitive information in the Defense Messaging System
(DMS) through the use of key escrow technology.  Programming has already
begun on the first set of over 22,000 protection devices for this
application.  Key escrow products will provide privacy, authentication, and
organizations to access these systems when lawfully authorized, e.g., in
connection with investigations of possible fraud.  Delays in the process
could have sever, negative consequences for DMS.

        In summary, key escrow encryption technology is vital to the
Defense Department's operational readiness and its ability to conduct
these critical security products.

        I recognize that you may have other questions and we are prepared
to meet with you at your convenience on this matter.  I have sent a similar
letter to Senator Domenici.

/s/  J.M. McConnell
Vice Admiral, U.S. Navy
Director, NSA


Subject: Interoperability Demo - ISDN and Internet PPP

                    PRESS RELEASE

GAITHERSBURG, MD, JUNE 24, 1994 -- Today at the NIUF, seven
network connectivity using Point-to-Point Protocol (PPP) over ISDN.

This crucial step opens the way to grand-scale interoperability of ISDN
LAN connection equipment.  "National ISDN 1 and 2 worked on
Users need applications to launch connections, and remote LAN access
applications are standardizing around PPP.  This interoperability
better get with it or get left out" (according to Jay Batson, Senior Analyst

Seven leading US, Canadian and European vendors demonstrated
nteroperable ISDN remote access to LANs:

AccessWorks Communications Inc.
Cisco Systems, Inc.
DigiBoard, Inc.
Gandalf Technologies, Inc.
netCS Informationstechnik GmbH
Network Express

Vendors and end-users accessed Internet, read their e-mail, and sent files
back home as part of the demonstration.

"For the first time, telecommuters and branch office users can choose the
equipment that they prefer.  Everyone can get their equipment from
of Advanced Communication Laboratories at JPL.

Using Basic Rate ISDN lines and LAN attachments provided by the US
National Institute for Standards and Technology (NIST), vendors
nterconnected their devices and attached to local and remote LANs. As
their e-mail, and sent files back home. End users and vendors alike agreed
that this will greatly promote rapid expansion of telecommuting, remote

"The European ISDN Users Forum has also sanctioned PPP as the official
nteroperability standard" said Rick Kuhlbars of netCS, Berlin, Germany

Force (IETF) that allows LAN connection equipment to negotiate which
features and protocols will be supported by both ends of a connection.
for a particular connection.

Some reactions:

"Global trade requirements and business relationships compel us to
nteroperate using these kinds of standards based procedures." - Stan
Kluz, Lawrence Livermore National Laboratory.

"This allows us to have students, faculty and staff select a wider array of
equipment and maintain interoperability with both Ameritech's switches
as well as the University's emerging ISDN dial in pools." - Dory Leifer,
University of Michigan.

"For the first time, users now have ISDN networking plug and play.
Vendors' network products which support these specifications assure that
they can access networks without concern as to what ISDN networking
equipment is in use on the network end." - Jeff Fritz, West Virginia
University, Chairman of the Enterprise Network Data Interconnectivity
Family (ENDIF), a working group of NIUF.

NIUF - the North American ISDN User's Forum is an association of
and improve the use of ISDN in North America.

Contacts for additional information:

Reggie Best, AccessWorks Communications Inc., (800) 248-8204,

Kevin Dickson, Cisco Systems, (415) 326-1941, kdickson@cisco.com.

Bob Downs, ENDIF liaison to IETF, Combinet, (408) 522-9020,

Jeff Fritz, ENDIF Chairman, West Virginia Univ., (304) 293-2060,

Douglas Frosst, Gandalf, Ontario, Canada, (613) 723-6500,

Rick Kuhlbars, netCS, Berlin, Germany, 49.30/856 999-0,

Randy Sisto, Network Express, (313) 761-5005, rsisto@nei.com.

Julie Thomtez, DigiBoard, (612) 943-9020, juliet@digibd.com.

Respectfully Submitted,

Gerry Hopkins, ENDIF ViceChair acting for the Secretary


Subject: EFF Congratulates Rep Markey on Passage of Open Platform Bill HR3636

Earlier this month, the House of Representatives has passed both HR 3636
and 3626.  HR 3636, the Markey/Fields bill, is based on EFF's Open
HR 3636 passed on a vote of 423 to 4 (8 not voting).  No amendments were
offered to either bill on the Floor.

After the votes, the bills were ordered to be combined into one bill, which

Electronic Frontier Foundation praises passage of House Telecommunications
Bill (HR 3636), in combination with the Antitrust Reform Act (HR 3626).

Key provisions of the bill will provide affordable access to multimedia
network services for the American public


        The Electronic Frontier Foundation (EFF) is pleased that the US
House of Representatives has passed major telecommunications legislation,
and commends all who have worked on the bill, especially Chairman Ed Markey
(D-MA).  Key provisions of the legislation ensure that Open Platform
n the development of an interactive, multimedia information

        "Under the Open Platform services sections, the Federal
Communications Commission is required to issue regulations which make
the American public in the near term," explained Daniel J. Weitzner, Deputy
ncrease educational opportunity in our schools, provide access to library
telecommunications carriers have been slow in offering these services to
the public.  While an interactive broadband network should be our long term
of digital technologies such as ISDN available in the network today.  

        "Guided by Congress, FCC action to cause deployment and tariffing
of Open Platform services will dramatically enhance American's access to
multimedia information sources, " said Weitzner.

        Mitchell Kapor, Chairman of the Board of the Foundation, praised
the efforts of Chairman Markey (D-MA) and said that an information
nfrastructure "built based on Open Platform principles will be a vibrant

        HR 3636 recognizes that advanced telecommunications services are
becoming more important for individuals and public institutions and that
the definition of universal service should evolve over time to ensure
affordable access to such advanced services for all Americans.  The bill
n the evolution of universal service.  We can hope that in many
circumstances a more competitive market will provide high quality access at
low prices for many parts of the country.  A flexible definition of
universal service will help ensure that where the market fails to provide
minimum acceptable levels of service, careful tailored regulation will help
fill the void.

        For all of these reasons, the Open Platform sections have been
enthusiastically supported by a diverse coalition of public interest groups
and key players in the computer and communications industries.  "The job of
ensuring openness and access to the NII is only just beginning, but the
Open Platform services that made possible by the bill take a decisive first


Jerry Berman, Executive Director,  Internet:
Daniel J. Weitzner, Deputy Policy Director,  Internet:
Telephone: v: 202-347-5400      f: 202-393-5509 


June 28, 1994

Hon. Edward Markey, Chairman
House Telecommunications & Finance Subcommittee
Washington, DC  20150

Dear Chairman Markey,

        We want to congratulate you and Representative Fields on the
the Open Platform sections of the bill.  Built based on Open Platform
that enhance free speech and democratic discourse.  Such an open
environment will also enable the NII to be the site of innovation, economic

        Under the Open Platform services sections, the Federal
Communications Commission is required to issue regulations which make
the American public in the near term.  As you know, many of the multimedia
telecommuting, can be delivered over network services that are available
today.  Yet, telecommunications carriers have been slow in offering these
our long term policy goal, there is no reason to wait for broadband to reap
the benefits of digital technologies such as ISDN available in the network
today.  Guided by Congress, FCC action to cause deployment and tariffing of
Open Platform services will dramatically enhance American's access to
multimedia information sources. Widely available Open Platform services
market place.

        HR 3636 recognizes that advanced telecommunications services are
becoming more important for individuals and public institutions and that
the definition of universal service should evolve over time to ensure
affordable access to such advanced services for all Americans.  The bill,
thus, provides that Open Platform service should be considered as the next
circumstances a more competitive market will provide high quality access at
low prices for many parts of the country.  Your work in creating a flexible
fails to provide minimum acceptable levels of service, careful tailored

        For all of these reasons, the Open Platform sections have been
enthusiastically supported by a diverse coalition of public interest groups
and key players in the computer and communications industries.  The job of
ensuring openness and access to the NII is only just beginning, but the
Open Platform services that you have made possible take a decisive first
legislation with strong Open Platform provisions this year.


Jerry Berman
Executive Director


Subject: US ACM Calls for Clipper Withdrawal, Releases Crypto Policy Report

From: US ACM, DC Office 

                              U S A C M

 Association for Computing Machinery, U.S. Public Policy Committee

                          * PRESS  RELEASE *
Thursday, June 30, 1994

Barbara Simons (408) 463-5661, simons@acm.org (e-mail)
Jim Horning  (415) 853-2216, horning@src.dec.com (e-mail)
Rob Kling (714) 856-5955, kling@ics.uci.edu (e-mail)


                     SECRET DECISION-MAKING

     WASHINGTON, DC   The public policy arm of the oldest and
largest international computing society today urged the White
House to withdraw the controversial "Clipper Chip" encryption
communications are vital to the development of national and
nternational information infrastructures," the Association for
Computing Machinery's U.S. Public Policy Committee (USACM) added
ts voice to the growing debate over encryption and privacy

     In a position statement released at a press conference on
Capitol Hill, the USACM said that "communications security is too
mportant to be left to secret processes and classified
algorithms."  The Clipper technology was developed by the National
Security Agency, which classified the cryptographic algorithm that
underlies the encryption device.  The USACM believes that Clipper
"will put U.S. manufacturers at a disadvantage in the global
market and will adversely affect technological development within
the United States."   The technology has been championed by the
Federal Bureau of Investigation and the NSA, which claim that
"non-escrowed" encryption technology threatens law enforcement and
national security.

     "As a body concerned with the development of government
technology policy, USACM is troubled by the process that gave rise
to the Clipper initiative," said Dr. Barbara Simons, a computer
that privacy protections for our communications networks be

     The USACM position statement was issued after completion of a
comprehensive study of cryptography policy sponsored by the ACM
(see companion release).  The study, "Codes, Keys and Conflicts:

     The ACM, founded in 1947, is a 85,000 member non-profit
educational and scientific society dedicated to the development
and use of information technology, and to addressing the impact of
that technology on the world's major social challenges.  USACM was
created by ACM to provide a means for presenting and discussing
technological issues to and with U.S. policymakers and the general

       USACM Position on the Escrowed Encryption Standard

The ACM study "Codes, Keys and Conflicts: Issues in U.S Crypto
underlying the current debate over widespread use of encryption.
The importance of encryption, and the need for appropriate
Security and privacy of electronic communications are vital to
the development of national and international information

The Clipper Chip, or "Escrowed Encryption Standard" (EES)
addressed and publicly debated.  After reviewing the ACM study,

  1.  The USACM supports the development of public policies and
technical standards for communications security in open forums in
for which there is widespread consensus, including international
acceptance.  The USACM believes that communications security is
too important to be left to secret processes and classified
algorithms.  We support the principles underlying the Computer
Security Act of 1987, in which Congress expressed its preference
for the development of open and unclassified security standards.

  2.  The USACM recommends that any encryption standard adopted by
the U.S. government not place U.S. manufacturers at a disadvantage
n the global market or adversely affect technological development

  3.  The USACM supports changes in the process of developing
Federal Information Processing Standards (FIPS) employed by the
National Institute of Standards and Technology.  This process is
currently predicated on the use of such standards solely to
through the FIPS process directly affect non-federal organizations
and the public at large.  In the case of the EES, the vast
majority of comments solicited by NIST opposed the standard, but
citizens may have the same opportunity to challenge government
actions in the area of information processing standards as they do
n other important aspects of Federal agency policy making.

  4.  The USACM urges the Administration at this point to withdraw
the Clipper Chip proposal and to begin an open and public review
of encryption policy.  The escrowed encryption initiative raises
vital issues of privacy, law enforcement, competitiveness and

  5.  The USACM reaffirms its support for privacy protection and
urges the administration to encourage the development of
technologies and institutional practices that will provide real


                Association for Computing Machinery

                           PRESS RELEASE

Thursday, June 30, 1994


Joseph DeBlasi, ACM Executive Director (212) 869-7440
Dr. Stephen Kent, Panel Chair (617) 873-3988
Dr. Susan Landau, Panel Staff (413) 545-0263



     WASHINGTON, DC   A panel of experts convened by the nation's
foremost computing society today released a comprehensive report
on U.S. cryptography policy.  The report, "Codes, Keys and
Conflicts: Issues in U.S Crypto Policy," is the culmination of a
ten-month review conducted by the panel of representatives of the
computer industry and academia, government officials, and
attorneys.  The 50-page document explores the complex technical
and social issues underlying the current debate over the Clipper
Chip and the export control of information security technology.

     "With the development of the information superhighway,
cryptography has become a hotly debated policy issue," according
to Joseph DeBlasi, Executive Director of the Association for
Computing Machinery (ACM), which convened the expert panel.  "The
ACM believes that this report is a significant contribution to the
ongoing debate on the Clipper Chip and encryption policy.  It cuts
through the rhetoric and lays out the facts."

     Dr. Stephen Kent, Chief Scientist for Security Technology
crypto policy, and we hope that it will serve as a foundation for
further public debate on this topic." 

     The ACM report addresses the competing interests of the
various stakeholders  in  the  encryption debate  --  law
enforcement agencies,  the intelligence community, industry and
users of communications services.  It reviews the recent history
of U.S. cryptography policy and identifies key questions that

     The ACM cryptography panel was chaired by Dr. Stephen Kent. 
Dr. Susan Landau, Research Associate Professor in Computer Science
at the University of Massachusetts, co-ordinated the work of the
Clinton Brooks, Advisor to the Director, National Security Agency;
Scott Charney, Chief of the Computer Crime Unit, Criminal
Division, U.S. Department of Justice; Dr. Dorothy Denning,
Computer Science Chair, Georgetown University; Dr. Whitfield
Diffie, Distinguished Engineer, Sun Microsystems; Dr. Anthony
Lauck, Corporate Consulting Engineer, Digital Equipment
Corporation; Douglas Miller, Government Affairs Manager, Software
SRI International; and David Sobel, Legal Counsel, Electronic

     The ACM, founded in 1947, is a 85,000 member non-profit
educational and scientific society dedicated to the development
and use of information technology, and to addressing the impact of
that technology on the world's major social challenges.  For

     Information on accessing the report electronically will be


Subject: IITF Intellectual Property Draft Report - Request for Comments

The Information Infrastructure Task Force (IITF) working group on Intellectual
Office via anonymous FTP from ftp.uspto.gov in /pub/nii-ip or on the Web
at URL http://www.uspto.gov/  

Comments may be sent electronically to nii-ip@uspto.gov; the deadline for
comments is September 7, 1994.


Subject: New Faces at EFF: Robin Abner (Membership), Darby Costello (Finance)

Robin Abner  - Director of Membership

Robin Abner is the Director of Membership for the Electronic Frontier
Foundation.  Robin works with EFF's Board and staff to plan membership
to joining EFF, Robin was Director of Membership and Marketing at
Non-Profit Management Associates, Inc. in Washington, DC, where she
organizations.  In addition, she served as Deputy Director of the Friends
of the National Library of Medicine.  Robin majored in Computer Science at
George Washington University and is currently studying Technology and
Management at the University of Maryland in College Park. Robin is a member
of the American Society of Association Executives (ASAE) and is co-chair of
ASAE's Roundtable Steering Committee.  In 1993, she was appointed to the
Membership Council of ASAE's Board and was awarded their Diversity Career
Development Scholarship. 


Darby Costello  - Director of Finance & Administration

Darby Costello, EFF's new Director of Finance and Administration,
and office management.  Darby is a long-time Washingtonian, has worked in the
non-profit world  for over 10 years, and earned a BSBA in Accounting from
George Washington University.  

She is partial to cats and has two Burmese, Juan and Flor, who share their
Kalorama apartment with Darby.  She is devoted to the arts (opera in
Ms. Costello is a rabid, nearly indiscriminate, reader.  


Subject: What YOU Can Do

"The net poses a fundamental threat not only to the authority of the
think, and influence one another without any institutional supervision
  - John Seabrook, "My First Flame", _New_Yorker_ 06/06/94

Who will decide how much privacy is "enough"?

The Electronic Frontier Foundation believes that individuals should be
able to ensure the privacy of their personal communications through any
technological means they choose.  However, the government's current
Now, more than ever, EFF is working to make sure that you are the one that
makes these decisions for yourself.  Our members are making themselves heard
on the whole range of issues.  EFF collected over 5000 letters
of support for Rep. Maria Cantwell's bill to liberalize restrictions on
cryptography.  We also gathered over 1400 letters supporting Sen. Leahy's
open hearings on the proposed Clipper encryption scheme, which were held in
May 1994.  And EFF collected over 90% of the public comments that were
federal standard.

You KNOW privacy is important. You have probably participated in our online
campaigns.  Have you become a member of EFF yet?  The best way to protect
your online rights is to be fully informed and to make your opinions heard.
EFF members are informed and are making a difference.  Join EFF today!

For EFF membership info, send queries to membership@eff.org, or send any
message to info@eff.org for basic EFF info, and a membership form.



EFFector Online is published by:

The Electronic Frontier Foundation
Washington DC 20001 USA
+1 202 347 5400 (voice)
+1 202 393 5509 (fax)
+1 202 638 6119 (BBS - 16.8k ZyXEL)
+1 202 638 6120 (BBS - 14.4k V.32bis)

     Coordination, production and shipping by:
     Stanton McCandlish, Online Activist/SysOp/Archivist 

Reproduction of this publication in electronic media is encouraged.  Signed
articles do not necessarily represent the views of EFF.  To reproduce

To subscribe to EFFector via email, send message body of "subscribe
effector-online" (no quotes) to listserve@eff.org, which will add you a

To get the latest issue, send any message to er@eff.org, and it will be
mailed to you automagically.  You can also get ftp.eff.org,



Membership & donations: membership@eff.org
Legal services: ssteele@eff.org
Hardcopy publications: pubs@eff.org
Technical questions/problems, access to mailing lists: eff@eff.org
General EFF, legal, policy or online resources queries: ask@eff.org

End of EFFector Online v07 #12