[CONTACT]

[ABOUT]

[POLICY]

EFFECTOR ONLINE First Anniversary Ed

Found at: gopher.meulie.net:70/EFFector/effector1.08

########## | Volume I                                   Number 8 |
########## |                                                     |
###        |                  EFFECTOR ONLINE                    |
#######    |                                                     |
#######    |             First Anniversary Edition               |
###        |                                                     |
########## |            The Electronic Newsletter of             |
########## |         The Electronic Frontier Foundation          |
           |                                                     |
########## |                                                     |
########## |                                                     |
###        |                      Editors:                       |
#######    |          Gerard Van der Leun (van@eff.org)          |
#######    |           Mike Godwin (mnemonic@eff.org)            |
###        |           Mitchell Kapor (mkapor@eff.org)           |
###        |                   Managing Editors:                 |
###        |Chris Davis (ckd@eff.org), Helen Rose (hrose@eff.org)|
           |                                                     |
########## |       Reproduction of EFFector Online via all       |
########## |            electronic media is encouraged           |
###        |      To reproduce signed articles individually      |
#######    |     please contact the authors for their express    |
#######    |                       permission.                   |
###        |                                                     |
###        |               Published Fortnightly by              |
###        |    The Electronic Frontier Foundation (eff.org)     |

effector n, Computer Sci. A device for producing a desired change
                      -==--==--==-<>-==--==--==-

                           In this issue:

THE FIRST YEAR IN THE LIFE OF THE EFF: A SCORECARD
EFF SEEKS AMICUS STATUS IN TWO KEY COMPUTER-CRIME CASES
UPDATE ON THE STEVE JACKSON CASE
EFF PRESENTATIONS ABOUT COMPUTER SEARCHES
REPORT ON THE CRYPTOGRAPHY AND PRIVACY CONFERENCE
WHAT TO TELL PEOPLE WHO STILL THINK EFF IS A HACKER DEFENSE FUND
MEMBERSHIP INFORMATION



******************************************************************

THE FIRST YEAR IN THE LIFE OF THE EFF

We wrote our mission statement in June of 1990 and began to build the
foundation in June of that year. Here's what we said about what we would
begin to do a little more than a year ago.


EFF Mission Statement -- April, 1990

A new world is arising in the vast web of digital, electronic media
mail and computer conferencing are becoming the basis of new forms of
community. These communities without a single, fixed geographical
location comprise the first settlements on an electronic frontier.

While well-established legal principles and cultural norms give
books, and telephones, the new digital media do not so easily fit into
existing frameworks. Conflicts come about as the law struggles to define
ts application in a context where fundamental notions of speech,
technologies, even as they struggle to master or simply cope with them
n the work place and the home.

The Electronic Frontier Foundation has been established to civilize the
electronic frontier; to make it useful and beneficial not just to a
technical elite, but to everyone; and to do this in keeping with our
and communication.


A LOOK BACK -- June, 1991
=========================

When we began in 1990 there was a void separating the pioneers of
computer networking and the rest of the world. The technologies were
ll-understood outside of a small, technically minded part of the
these groups.



Legal
----

*Filed suit against the Secret Service for the unlawful search and
Jackson Games in Austin, Texas.

*Helped defend Craig Neidorf, unjustly accused of publishing purloined

*Filed friend of the court briefs challenging unjust prohibitions of
computer use as part of computer crime sentencing

*Lobbied effectively at the state level to change legislation inimical
to computer networking.


Communications and Public Education
-------------- --- ------ ---------

*Inspired and helped to organize and present the first Computers,
Freedom and Privacy Conference. CFP was a four day event that brought
together, in search of knowledge and common ground,representatives from
computer networking, law enforcement and privacy advocate groups.

*Distributed the first eight issues of our electronic newsletter,
EFFector Online, throughout the net.

*Published the first issue of our quarterly print newsletter, EFFector.

*Become a presence on the Internet with our node, eff.org.

*Created an FTP archive on eff.org for documents on computer networking
and privacy law.

*Given a net home at eff.org to groups like Computer Professionals for
Social Responsibility and the new Computers and Academic Freedom group.

*Spoke to numerous groups nationwide on the issues of civil liberties
and computer networking.

*Developed a network of relationships with the local and national media
that has affected the climate of opinion about computer networking and
begun to reverse the slide into "hacker hysteria" that was beginning to

*Established a fully staffed operational headquarters in Cambridge,
Massachusetts.


------

*Worked with Senator Leahy's Privacy Task Force in Washington,D.C. in
order to advance the concerns of the computer networking community in
the formation of legislation in this critical area.

*Argued successfully for the removal of anti-encryption provisions in
S.266, the Senate Crime bill

*Testified before the Federal Communications Committee concerning the
network.

*Made grants in aid to Computer Professionals for Social Responsibility
as well as joining them in numerous policy projects and workshops around
the nation.

*Created a voice that is listened to in Washington on issues concerning
computer networking.

*Launched the Open Road program in order to make sure that the needs of
the public in the building of the National Public Network are addressed
at the beginning of the project.

*Helped define the issues of protecting nodes and carriers from
unwarranted risks and liabilities in providing information services from
the producer to the consumer.

And
---

*Begun research and development into creating the tools that will allow
non-technical individuals using PCs to access the net over voice-grade
telephone lines in a simple and straightforward fashion.

We are proud that we have been able to accomplish so much in such a

At the same time, we see more clearly than we did a year ago just how
far we have to go,and how much work lies ahead of us. The issues that
those of us in the computer, telecommunications, and computer networking
fields can see clearly now will affect every American and
much of the entire world within the next ten years. The opportunities
are immense and the potential for an increase in human knowledge, wisdom
and well-being beyond our calculation.

We now know that we cannot know all of what lies ahead. Instead, we can
try to prepare as best we can, and to protect the legitimate interests
of the individual and society as best we can, for the full dawn of the
Global Information Age.

We hope that we can count on you for your continuing good will and


************************************************************

EFF SEEKS AMICUS STATUS IN TWO KEY COMPUTER-CRIME CASES

The Electronic Frontier Foundation has sought to intervene as an amicus
curiae in two important computer-crime cases.

of part of sentence imposed upon Riggs, who was a member of the so-
called "Legion of Doom" and, at one time, a co-defendant of Craig
Neidorf. We have gone on record as opposing the sentencing restriction
on Rigg's private computer-use and ownership after Riggs is released
from prison.

We believe that the judge's decision to forbid Riggs to own or privately
use a computer during the supervisory period following his release is a
federal sentencing statute. In addition, we believe such restrictions
tend to promote the notion that computers are inherently dangerous
nstrumentalities, the access to which falls properly within the scope
of governmental action. We hope here to lessen the momentum behind these
the country.

We are also seeking amicus curiae status in United States v. Robert
Morris. Morris, who was prosecuted under the Computer Fraud and Abuse
Court review of his case, and we are about to file an amicus curiae

Our goal in this case is not to defend or justify Morris's actions, but
to establish that the law used to prosecute him was interpreted too
broadly. As it now stands, the law would make no distinction between
ntentionally to cause damage to remote computers.


******************************************************************

TRACKING THE STEVE JACKSON CASE

Our major case, the Steve Jackson Games case, is proceeding as expected.
The next stage in our ongoing effort in that case will be the
June 21, the government has sought a 30-day extension of the deadline
for its response. Such extensions are routinely granted with the
agreement of the plaintiff, and we have agreed in this case. The
extended deadline will mean that the government's response will be due
the first week of August.


******************************************************************

EFF PRESENTATIONS ABOUT COMPUTER SEARCHES

As part of our effort to raise public and government consciousness about
the overkill of searches and seizures in computer-crime investigations,
Mike Godwin has been conducting presentations for a wide variety of
audiences on the civil-liberties issues raised by such cases. Audiences
meeting of the Federal Computer Investigators Committee (FCIC) in
Scottsdale, Arizona. We are planning for the presentational materials to
be a resource document for the next CPSR Roundtable in Washington, and
Mike is scheduled to deliver the presentation before an assembly of Ohio

Of the presentations mentioned above, the FCIC meeting was of particular
agencies has been one of the principal policy-making and information-
meeting included representatives of the FBI, the Secret Service, the
Department of Justice, and other law-enforcement agencies. A key
accomplishment of the meeting was our forging of valuable personal
contacts with members of these agencies. Although the FCIC was in some
Arizona prosecutor Gail Thackeray already has asked to use our materials
at other law-enforcement meetings.

******************************************************************

REPORT ON THE CRYPTOGRAPHY AND PRIVACY CONFERENCE

On June 10th, EFF, CPSR, and RSA Data Security Inc. sponsored a one day
conference on cryptography and privacy. The meeting had two motivations:
to express opposition to the cryptography restrictions of Senate bill
S.266 and, more generally, to bring together technologists and policy-
makers to show broad based support for a redirection of our country's
John Podesta, was able to persuade Senator Leahy to prevail upon Senator
Biden to remove the offensive provision from S.266, so by the time of
the conference this was a moot issue.

One outcome of the conference was the adoption of a statement in support
of communications privacy which recommends that the United States
and to promote the availability of privacy-enhancing technologies. Among
ts recommendations are the following:

First, proposals regarding cryptography should be moved beyond the

Second, any proposal to facilitate government eavesdropping should be
critically reviewed.

Third, government agencies with appropriate expertise should work free
of NSA influence to promote the availability of cryptography so as to
ensure communications privacy for the general public.

Fourth, the export control restrictions for computer network technology
and cryptography should be substantially relaxed.

As a follow-up John Podesta met with representatives of several
companies to lay the ground-work for continuing coordination on these
ssues.


******************************************************************

THE ORIGIN OF THE EFF AND THE CRACKING OF COMPUTER SYSTEMS

(You may want to pass this on to friends and associates.--The Editors)

There is a persistent view in some quarters that the EFF exists
This is an understandable perception but it is false.

The Electronic Frontier Foundation has never condoned the unauthorized
entry into computer systems for any reason.There is absolutely no
question that uninvited computer intrusions represent a major problem on
the electronic frontier; and one which we, and thousands of others,

to seek out and punish legitimate users of computer systems.  We have
opposed this since our inception and will continue to do so to the limit
of our ability and resources.

Throughout 1990, law enforcement activities which were ostensibly aimed
at "cracking down on crackers" were, in fact, seizing the computer
bulletin boards used by hundreds of utterly innocent people.  Whether
through ignorance or malice, these actions were depriving many of their
legitimate rights under the Constitution, and chilling the free
expression and growth of the Net.

The EFF was formed in response to these injustices. Our mission was to
unreasonable search and seizure. This remains the core of our mission
today.  We believe that these fundamental civil liberties must apply to
all users of computer networks. A threat to the rights of anyone is a
threat to the rights of all. Experience has taught us that these
freedoms must be fought for if they are to be given a firm foundation
n the online world.  Constitutional guarantees, as we have seen by
actions such as Operation Sun Devil, are not the default state online,
but must be "designed" in from the start.  To do nothing risks setting
a series of precedents which will be difficult if not impossible to

These beliefs struck a chord with many users of computer networks who
understood the importance of an open, public process by which this

Today the EFF has evolved to become an advocacy organization, with broad
concerns in the area of information technology policy, including, but
not limited to civil liberties, which represent the interests of its
members and serve as a bridge between "Cyberspace" and other exotic
locales, like Washington, D.C.

******************************************************************

BECOME A MEMBER OF THE ELECTRONIC FRONTIER FOUNDATION

our efforts and activities into other realms of the electronic frontier,

becoming a member now. Members receive our quarterly newsletter,
EFFECTOR, our bi-weekly electronic newsletter, EFFector Online (if you
believe that support should be freely given, you can receive these
things even if you do not elect to become a member.

Your membership/donation is fully tax deductible.

Our memberships are $20.00 per year for students, $40.00 per year for

Our privacy policy: The Electronic Frontier Foundation will never, under
any circumstances, sell any part of its membership list. We will, from
time to time, share this list with other non-profit organizations whose
explicit permission, we assume that you do not wish your membership


>>>---------------- EFF@eff.org MEMBERSHIP FORM ---------------<<<

Mail to: The Electronic Frontier Foundation, Inc.
Online Office
Cambridge,MA 02141

$20.00 (student or low income membership)
$40.00 (regular membership)

[ ] I enclose an additional donation of $___________

Name:______________________________________________________

Organization:______________________________________________

Address: __________________________________________________

State:_______Zip:________Phone:( )_____________(optional)

FAX:( )____________________(optional)

Email address: ______________________________

Mastercard [ ] Visa [ ] American Express [ ]

Number:____________________________________________________

Expiration date: ____________

Signature: ________________________________________________

Date:______________________


The EFF is a non-profit, 501c3 organization.
Donations to the EFF are tax-deductible.


******************************************************************

editors@eff.org


COMING ATTRACTIONS:

HIGHLIGHTS OF THE EFF FTP ARCHIVE
MAKING IT EASIER TO GET ON THE NET
CONTINUING LEGAL UPDATES
SYSOP LIABILITY ISSUES

******************************************************************






AD: