________________ _______________ _______________
/_______________/\ /_______________\ /\______________\
\\\\\\\\\\\\\\\\\ \ ||||||||||||||||| / ////////////////
\\\\\\\\\\\\\\\\\/ ||||||||||||||||| / ////////////////
\\\\\\_______/\ ||||||_______\ / //////_____\
\\\\\\\\\\\\\ \ |||||||||||||| / /////////////
\\\\\\\\\\\\\/____ |||||||||||||| / /////////////
\\\\\___________/\ ||||| / ////
\\\\\\\\\\\\\\\\ \ ||||| / ////
\\\\\\\\\\\\\\\\/ ||||| \////
EFFector Online Volume 07 No. 14 November 23, 1994 firstname.lastname@example.org
A Publication of the Electronic Frontier Foundation ISSN 1062-9424
EFF Urges X9 Committee to Adopt Triple-DES Standard
Aerosmith & EFF Rock the Net
Statement of Rep. Brown on Encryption Standards and Procedures Act
DoC Telecom & Info Infrastructure Assistance Program Grants
Digital Library Study - Call for Participation
FCC Crackdown on Free Radio Berkeley
Calendar of Events
What YOU Can Do
Subject: EFF Urges X9 Committee to Adopt Triple-DES Standard
EFF sent a letter to 37 members of the Accredited Standards Committee (ASC)
based on triple-DES, a strengthened and upgraded form of the popular DES
(data encryption standard). The balloting process, which allows members
one month to cast their vote, closes on November 19.
The vote has important implications on the future of cryptographic
adoption of a standard based on triple-DES would pose a major setback to
the NSA's efforts to push Clipper or similar government key-escrow based
The NSA, which is a voting member of the X9 committee, has urged members to
vote against the triple-DES standard.
The ASC X9 committee is charged with setting data security standards for
the US banking and financial services industries. Its membership is
comprised of representatives from the banking, financial services, computer
and communications industries, software manufacturers, and government,
ncluding the NSA, the Federal Reserve, and NIST.
Encryption is widely used by banks and other financial institutions to
flow every day across the world's communications networks.
Currently, the prevailing encryption standard used in the banking industry
s based on DES (Data Encryption Standard). DES has been available since
the early 1970's, and is popular because it has been repeatedly tested and
s considered unbreakable except by brute force (trying every possible
key). DES is also popular because the US government has allowed banks and
financial institutions to use it overseas -- a limited but important
exception to the strong controls placed on other forms of cryptography.
Despite its enormous popularity and widespread use, the banking and
financial services industries are searching for a new standard because DES
s reaching the end of its useful life.
Although DES can only be cracked through brute force, the increasing speed
and sophistication of computer processing power will soon render the
using a machine which cost less than $1 million to build.
Triple-DES, a strengthened version of the reliable and trusted DES
ndustries. In basic terms, the triple-DES standard is based on the
existing DES, but has been enhanced by tripling the key length. The longer
key will make it more difficult to use brute force to crack the code.
Supporters of triple-DES view it as a temporary, stop-gap solution, which
that virtually all users are familiar with, it is argued that developing
and using triple-DES will not be a burden to current designers and users
of data security systems.
* NSA ATTEMPTS TO PUSH X9 TO ADOPT CLIPPER STANDARD
Members of the X9 committee agree that an alternative to DES must be found,
the question is what that standard will be. The committee is currently
considering a recommendation to develop a standard based on triple-DES.
Although there appears to be general support for the recommendation (it
July), the NSA has lobbied the committee to reject the proposal to create a
triple-DES standard. They have circulated a letter to committee members
(attached below) urging them to vote against the triple-DES recommendation.
Without offering specific alternatives, the NSA letter stresses national
The NSA appears to believe that the rejection of triple-DES by the X9
committee would create an opportunity to push for the only current
alternative -- Clipper.
By agreeing to develop a triple-DES based standard, the X9 committee can
efforts to ensure that all cryptography contains government-escrowed back
The final balloting closes on Saturday, November 19. EFF is tracking the
committee vote, and will update this story as soon as further information
* EFF LETTER TO X9 COMMITTEE MEMBERS
November 18, 1994
Dear Accredited Standards Committee-X9 Member:
The X9 Committee is currently voting as to whether to recommend the
Electronic Frontier Foundation (EFF) strongly urges you to vote in favor of
the triple-DES standard.
EFF supports the development of a variety of new data security standards
and alternatives to DES. We believe the triple-DES standard provides the
best immediate short term alternative because:
* The basic algorithm, DES, is strong and has been tested repeatedly.
* There are no known attacks that succeed against triple-DES.
* It is clearly no less secure than DES.
* It eliminates the brute-force problem completely by tripling the
* It runs at high speeds in easy-to-build chips.
* It can be easily incorporated into existing systems.
NSA's opposition to triple-DES appears to be an indirect attempt to push
Clipper by eliminating credible alternatives. Clipper is not a viable
alternative to triple-DES, and carries substantial liabilities. There has
been no evidence of foreign acceptance of the standard and the skipjack
algorithm is classified. The likelihood of any government accepting secret
Administration efforts, through the NSA, to push Clipper as a domestic
We urge you to carefully consider the alternatives before you cast your
ballot. We believe that the triple-DES issue should be decided on its own
Board of Directors
Electronic Frontier Foundation
Daniel J. Weitzner
Deputy Policy Director
Electronic Frontier Foundation
* NSA LETTER TO X9 COMMITTEE MEMBERS
I will be casting a NO vote of the NWI proposal for triple-DES,
Letter Ballot X9/94-LB#28. The reasons are set forth below. You may find
these useful as you determine your position.
NSA REASONS FOR NEGATIVE VOTE
While NSA supports the use of DES in the global financial sector,
The financial community should be planning to transition to a new
authentication, key management, and secure hashing applications. With a
broader interest in security, the market can now support optimized
algorithms by application. Going through the expense of installing a
universal appropriate solutions.
While we understand the appeal of a snap-in upgrade, our experience
upgrading to more appropriate technology
Tripling of any algorithm is cryptographically unsound. Notice
that tripling DES, at best, only doubles the length of the cryptovariable
(key). Phrased another way, the DES was optimized for security at 56 bits.
We cannot vouch that any of the schemes for doubling the cryptovariable
length of DES truly squares the security.
We understand the financial community has concerns with current key
escrow based encryption, however, we are committed to searching for answers
to those concerns. But the government is also committed to key escrow
encryption, and we do not believe that the proposal for triple DES is
consistent with this objective.
US export control policy does not allow for general export of DES
for encryption, let alone triple-DES. Proceeding with this NWI would place
accepted X9 cryptographic policy.
The US government has not endorsed triple-DES; manufacturers and
users may be reluctant to use triple-DES products for fear of possible
Finally, further proliferation of triple-DES is counter to national
Subject: Aerosmith & EFF Rock the Net
Aerosmith Press Release
America's premier rock band, Aerosmith, today announced details of a unique
frontiers into new realms of Cyberspace.
making "Cyberspace Tour," scheduled to take place over four days (December
CompuServe, Prodigy, America Online and the Internet.
Never before has a band utilized four online services in this way, and
never before have so many people been brought together at one time for an
nteractive gathering of this kind.
"Aerosmith Cyberspace Tour" T-shirts (specially designed in support of the
event by graphic artists at Wired Magazine and manufactured by Giant
Merchandising) will benefit the Electronic Frontier Foundation (EFF) -- a
civil liberties organization dedicated to advancing free speech on the
networks. In addition, Aerosmith has secured substantial cash donations
for the Foundation from Geffen Records, EMI Music Publishing and Columbia
Founded in July 1990, over the past four years, the EFF has sponsored
litigation and legislation to protect the privacy rights of computer users,
to ensure that electronic publishers are treated equally under the law and
to guarantee that all speech, no matter how controversial, has a forum
Fourth Amendments, Aerosmith hopes to focus worldwide attention on these
mportant issues through the instigation of this event.
band members, those participating will stand to win an exciting array of
Aerosmith prizes, ranging from the band's latest, collectible Columbia
and home video, to their first interactive CD-ROM game, "Virtual Guitar:
Quest for Fame, Featuring Aerosmith" and the CD-ROM-based music video
Kicking off on Sunday, Dec. 4, at 7 p.m. (EST) Aerosmith will first
for an hour-long interchange. The following night, at 10 p.m. (EST), they
America Online on Tuesday, Dec. 6, between 8:15 p.m. and 9 p.m. (EST). For
their final appearance (10 p.m. EST Dec. 7), the band will log on to a
linked collection of live electronic gathering places, called MOOs,
accessible through the Internet. This last stop on the tour will see an
unprecedented number of users accessing the system -- making this a
For two of the online events, the band will be set up backstage, with
Macintosh Powerbooks courtesy of Apple Computers, prior to their shows at
the Palace of Auburn Hills in Detroit (Dec. 4) and the United Center in
Chicago (Dec. 6). For the other two nights, utilizing the same equipment,
they will take time out of their hectic schedules, to link up with their
fans en route between gigs.
Anyone with a computer, a modem and access to one of the four online
through any of the commercial services' 800 numbers) will be able to dial
n and participate in this exciting tour of Cyberspace.
For directions to these online 'gigs' users should contact either the
Electronic Frontier Foundation at 202-347-5400 (voice) or email@example.com
(internet e-mail). Alternatively, details will be available on each of the
Subject: Statement of Rep. Brown on Encryption Standards and Procedures Act
On October 6, Rep. George Brown (D-CA), Chairman of the House Committee on
Science, Space, and Technology, introduced the "Encryption Standards and
Brown introduced this bill at the end of this Congress inorder to send a
Congress is likely to begin to consider this issue early in the next
and reactions to the bill. But, inorder to keep you informed about
mportant developments in Congress, we thought you should see this as soon
as we did.
nitial analysis and summary (see URLs at the end of this document), and
let us know what you think.
"ENCRYPTION STANDARDS AND PROCEDURES ACT OF 1994"
HON. GEORGE E. BROWN, JR.
THURSDAY OCTOBER 6, 1994
Mr. Speaker, today I am introducing H.R. 5199, the Encryption Standards and
Federal policy governing the development and use of encryption technology
for unclassified information that strikes the proper balance between the
need to decipher information obtained through lawful electronic
The legislation would authorize the National Institute of Standards and
Technology (NIST) to develop and issue, by regulation, federal encryption
and international electronic communications in a way that preserves privacy
electronic surveillance. The development of such standards under a
nfluence the final program. With respect to policy, the bill would permit
new legal requirements on escrow agents that may be part of an encryption
encryption technology, and would authorize the use of available
appropriations to implement the legislation.
Mr. Speaker, this Administration has placed a high priority on promoting
the National Information Infrastructure (NII) and in realizing the economic
and social benefits of that infrastructure. To achieve those goals, which
and we will not realize its vast potential benefits. Encryption technology
During the Cold War, the Federal Government pursued a de facto policy of
technology for national security reasons. Recent advancements in
encryption technology and its proliferation make enforcement of that policy
ncreasingly difficult. Moreover, fulfilling the goals of the National
can only be achieved with encryption technology. The widespread use of
that technology, however, threatens to impede the government's ability to
conduct lawful electronic surveillance.
adopting a voluntary federal Escrowed Encryption Standard (EES) for
electronic voice communications known as "Clipper". The standard would be
mplemented in computer chips that use a classified mathematical formula to
encrypt unclassified telephone conversations and computer data transmitted
over public telephone networks. Authorized government agencies can decode
those communications by presenting a legal request to tow escrow agents,
The purposes of Clipper are two fold -- first, to provide a means to
enable government law enforcement authorities and intelligence gathering
agencies to decipher such communications that have been lawfully
ntercepted. Similar voluntary standards for electronic data
communications are under development by the government and may soon be
ssued. The Administration contends that it has authority under the
Computer Security Act to issue such standards. Others, however, have
The Computer Security Act, which the Committee on Science, Space, and
Technology reported and the Congress enacted in 1987, authorizes NIST, in
consultation with other appropriate federal agencies, to develop and issue
nformation" in "federal computer systems". The Act did not explicitly
contemplate the development or issuance of standards for safeguarding
enforcement and the intelligence community. Such communications are
considered private property subject to separate and distinct constitutional
Computer Security Act to cover such matters appears to go beyond the
original intent of the Act and may be inconsistent with other law
of encryption technology. They argued the program will hamper business
opportunities for United States firms, may infringe on individual privacy
ntends to proceed with the initiative arguing that it is essential for
unless there is legislation or third party intervention.
The Administration has publicly stated that it does not intend to seek
legislation expressly authorizing Clipper or any other federal encryption
for flexibility, however, contributes to the public's mistrust and
opposition to Clipper. The proposal was developed under an administrative
might be construed to diminish privacy rights without giving the public
adequate opportunity to affect the program. For this reason alone, the
for an initiative like Clipper is legislation to codify federal encryption
mplementation would be under the rule of law. It may well be that only
under these circumstances would the public accept a federal encryption
compromising privacy rights.
The Office of Technology Assessment (OTA) issued in September an extensive
that is consistent with this view. The report concluded that "appropriate
nstitutional and technical safeguards are required for a broad range of
of networked information may limit the usefulness and acceptance of the
can only be developed successfully through an "open process" and with
congressional involvement so the views of all affected parties can be
considered properly in arriving at a final outcome. Public trust in
achieved through such a process. The sentiment was shared by most
Mr. Speaker, the bill I have introduced today has been drafted, not as a
nformation age, but as a means for getting the various factions to talk to
each other in an open process to reach a sensible and effective resolution
of this critical issue. I invite all interested parties to comment on the
bill. My intention is to modify the bill to reflect comments made and to
ntroduce it again early in the 104th Congress for consideration by this
* For a copy of the bill and EFF comments regarding this legislation, see:
ftp.eff.org, /pub/EFF/Legislation/Bills_by_number/, hr5199*
[Note: material will soon be moved to .../Bills_by_number/Old/]
Subject: DoC Telecom & Info Infrastructure Assistance Program Grants
FOR IMMEDIATE RELEASE: CONTACT: Stephanie Schoumacher
PUBLIC INSTITUTIONS RECEIVE MILLIONS TO DEPLOY INFORMATION
Washington, DC -- Today, Secretary of Commerce Ronald H. Brown announced
the public institutions that will receive millions of dollars from the
Department of Commerce's National Telecommunications and Information
Administration (NTIA). The awards, which will help deploy a nationwide,
the information superhighway for every American.
The grants require matching funds and will generate millions of dollars
toward the development of the National Information Infrastructure (NII) in
organizations, museums, and state and local governments.
"The Telecommunications and Information Infrastructure Assistance (TIIAP)
efficiently," said Secretary Brown. "In addition, they will serve as
catalysts for further developing the NII by providing models for communities
throughout the nation to follow," he continued.
Nearly 100 grants throughout the nation will be awarded. Grants will be
awared for both planning and demonstration projects. Key elements include
collaboration at the local and state levels, improving social services
through technology, and serving diverse segments of society.
"Funding a program such as TIIAP, which is built on the concept of public/
communications and information of the U.S. Department of Commerce and
administrator of NTIA.
TIIAP program objectives include reinforcing the values of American
Examples of grants that were awarded include:
o a telemedicine project that will deliver health services to
underserved rural areas;
o an environmental education project that will collect data and
o an inner city development project that will use telecommunications
technologies to forge links between community building organizations that
nner city residents; and
o a project that will provide school children and citizens of the
classrooms, libraries, neighborhood and senior centers, shelters, and
The National Telecommunications and Information Administrations serves as
the President's principal advisor on telecommunications policies pertaining
to the nation's economic and technological advancement and to the
October 12, 1994
Subject: Digital Library Study - Call for Participation
Institutional and Organizational Dimensions
of the Effective Use of Digital Libraries
Professor Rob Kling
Department of Information and Computer Science
University of California
Irvine, CA 92717
Brief Project Description (10/19/94)
There has been recent rapid growth of diverse digital
library (DL) services such as: on-line bibliographic
(including Gopher, World wide web), scholarly and
However, there has been little systematic investigation into
the conditions that foster their effective use. This project
examines how university faculty and students use relevant
DL resources, and the institutional and organizational
university teaching and research. Institutions and
organizations vary in their ability to provide materials to
These services are now provided by librarians, academic
computing support and booksellers. By identifying the
nstitutional practices that can boost DL access and
effective use, we are developing guidelines for planning and
We are conducting a multi-tiered study including: (1) a
comparative institutional analysis of 6-8 university digital
library and network information services and (2) an
ntensive field study of DL providers and 50 faculty and
at one institution.
Some key research questions
availability of resources, services, contents, and
formats of electronic materials?
these resources, and how do they fit their
informational preferences and work practices?
electronic information to be available in specific
forms? For example, when do faculty and students
prefer ASCII text, bitmapped text, annotated text,
multimedia, or print formats? Under what conditions
do faculty and students want networked versus
CD-ROM or downloadable resources? Under what
conditions can librarians, departments and academic
computing support provide these formats?
where they have assistance from skilled help such as
reference librarians, colleagues or computing support
with different disciplinary traditions, institutional
pressures and values and working conditions?
between higher quality and less quality
delivery/support of digital library services at a campus
This study is funded by the U.S. Department of Education
and is administered by the Center for Research in
of California, Irvine. For more information, contact:
Professor Rob Kling
714-856-5160 [824-5160 after Nov 5, 1994]
Ms. Lisa Covi
Department of Information and Computer
University of California
Irvine, CA 92717-3425
Subject: FCC Crackdown on Free Radio Berkeley
For immediate release: Thursday, October 13 - 2 pages
Contact: Stephen Dunifer, Free Radio Berkeley - (510) 644-3779, 464-3041
Luke Hiken, Attorney At Law, NLGCDC - (415) 705-6460
FCC SEEKS INJUNCTION TO
GAG MICRO POWER BROADCASTER
On Tuesday, October 10 attorneys for Stephen Dunifer and Free
Radio Berkeley received notice, 80 pages worth, of the FCC's intention to
Berkeley. Stephen Dunifer is named as the responsible party. Free Radio
Berkeley is part of a rapidly growing movement which uses inexpensive and
low power radio transmitters (1/2 watt to 30 watts) to reach local
communities. Called micro power broadcasting, this movement sees simple,
easy to use transmitters as the leaflet of the 90's. In an era of
multinational controlled mass media, micro power broadcasting is the voice
of the community; the voice of the people. For four years the government
fines. Clearly, it sees broadcasting which anyone can do as a threat to
centralized control of information, ideas and culture. Intimidation
Last July the FCC served a notice of apparent liability on Stephen
Dunifer in the amount of $20,000 for alleged illegal broadcasts. This
case has been pending before an FCC administrative panel for over a year.
that the FCC's current fine structure was invalid. This action, at the
very least, places the FCC fine process into a state of limbo until new
Luke Hiken, attorney for Stephen Dunifer, stated, "This is a
totally unprecedented move on the part of the FCC. It appears they have
Court System on an ever expanding community of broadcasters who are
challenging the FCC's ban on micro power broadcasting.". (continued)
"They can kiss my Bill of Rights" was Stephen Dunifer's response,
and reclaim the airwaves from corporate control will be deterred one bit
by the FCC's latest action. It is a matter of free speech and human
come forth, other than the FCC, to assert damage or harm. FCC, in my
opinion, stands for fostering corporate control. Free Radio Berkeley has
been on vacation for the last few months in order to allow time to put
together new equipment. Broadcasts will resume shortly at a new
frequency, 104.1 FM, and continue until the date of the first court
banner of Free Radio Berkeley. We shall not be moved nor stymied by a
Another member of the legal defense team, Allen Hopper, put it
this way, "It is utterly amazing that the FCC would seek a TRO, which is
only sought for emergency situations where the threat of immediate and
rreparable harm requires the intervention of the Court. The fact that
the FCC has had this case pending before its own administrative panel for
over a year contradicts any notion of emergency or injury. Further, their
actions clearly demonstrate the fear they hold for the kind of public
Luke Hiken and the National Lawyers Guild Committee on Democratic
Communications are committed to defending the rights of micro broadcasters
under the US Constitution and principles of international law.
At this moment, a hearing on this matter is scheduled to take
AM. A Free Speech Solidarity Support Rally will be held outside the
Oakland Federal Building prior to the hearing. On the following evening
(Saturday, December 3) a public forum flying the banner of - Seizing the
Space, Media and Communications Free Speech Activism - will be held in
Berkeley at the Unitarian Fellowship (Cedar & Bonita). Starting time will
be 8 PM. Simultaneous forums on this topic will be taking place in a
number of other cities around the US, and perhaps internationally as well,
on this date.
Complete media packets will be sent out upon request. Please
contact Free Radio Berkeley, (510) 644-3779, (510) 464-3041.
Subject: Calendar of Events
Dec. 6 - Window in the Net Conference and Exhibits, Berlin, Germany,
Nov. 26 - EF-Canada/U. Waterloo Free Speech & Privacy in the Information
Age Symposium, Waterloo, Ontario, 8am-6pm.
Contact: Wendy Rush, +1 519 885 1211 ext. 3688, or Prof. Jeffrey
Shallit, +1 519 888 4804; fax: +1 519 885 1208; internet:
30 - CAUSE 94 Conference and CNI Task Force Meeting. Contact:
Paul Even Peters, Coalition for Networked Information, +1 202
296 5098, firstname.lastname@example.org
Dec. 3 - EFF-Austin Sysop Liability Workshop, 1pm-6pm CST, featuring
EFF's Mike Godwin, Ed Cavazos of EF-Houston, Pete Kennedy (counsel
in the Steve Jackson Games case), Steve Ryan (Houston attorney),
Garry Kissiah (high-tech law consultant and author).
Info: David Smith (email@example.com).
Dec. 4 - EFF/Aerosmith Conference, CompuServe Auditorium, 7pm EST
Contact: 1-800-848-8199 for CIS access; firstname.lastname@example.org for info
See article in this issue for background
Dec. 5 - Colorado University--Boulder's NII Summit, featuring EFF co-founder
John Perry Barlow, Sens. Hank Brown & Ben Campbell, TCI's John
Mallone, and US West's Richard McCormick.
- EFF/Aerosmith Conference, Prodigy Auditorium, 10pm EST
Contact: 1-800-776-3449 for Prodigy access;
email@example.com for info
Dec. 6 - EFF/Aerosmith Conference, America On-Line Auditorium, 8:15pm EST
Contact: 1-800-827-6364 for AOL access; firstname.lastname@example.org for info
Dec. 7 - EFF/Aerosmith Conference, Internet Meta-MOO, 10pm EST
Info: email@example.com; even will be hosted simultaneously by
many MOO hosts (reachable via telnet or MOO client), including
BayMOO, Chiba/Sprawl, MetaVerse and others. See your sysadmin
for technical assistance with telnet and MOO access. This historic
Event will for the first time link a number of MOO servers in
realtime, for the largest single organized live event in Internet
history. Even may also be "simulcast" via email and WWW.
Send any message to firstname.lastname@example.org for periodic updates.
Dec. 16 - 4th Annual Loebner Prize Competition in Aritificial Intelligence,
Calif. State U. - San Marcos. Contact: Dr. Robert Epstein,
+1 619 436 4400, fax: +1 619 436 4490, internet:
Dec. 31 - Deadline for proposals for ISEA 95 (see below).
24 - International Symposium on Electronic Art, Montreal, Quebec, Canada.
Information: +1 514 990 0229, fax: +1 514 842 7459, internet:
Subject: What YOU Can Do
"The net poses a fundamental threat not only to the authority of the
think, and influence one another without any institutional supervision
- John Seabrook, "My First Flame", _New_Yorker_ 06/06/94
Ensuring the democratic potential of the technologies of computer-mediated
communication requires active participation in the political processes that
are accustomed to making decisions about the future of technology, media,
education, and public access to information, with far-reaching and
long-lasting effects on citizens and their lives, but are accustomed to
corporations, and other government representatives.
Now, more than ever, EFF is working to make sure that you can play an
active role in making these choices. Our members are making themselves heard
on the whole range of issues. EFF collected over 5000 letters of support
for Rep. Maria Cantwell's bill to liberalize restrictions on cryptography.
We also gathered over 1400 letters supporting Sen. Leahy's open hearings on
the proposed Clipper encryption scheme, which were held in May 1994. And
EFF collected over 90% of the public comments that were submitted to NIST
Additionally, EFF has worked for the passage of legislation that would
ensure open access to the information infrastructure of today and tomorrow,
and continues to provide some of the best online resources on privacy,
ntellectual freedom, the legalities of networking, and public access to
You *know* privacy, freedom of speech and ability to make your voice heard
n government are important. You have probably participated in our online
campaigns and forums. Have you become a member of EFF yet? The best way to
opinions heard. EFF members are informed and are making a difference. Join
For EFF membership info, send queries to email@example.com, or send any
message to firstname.lastname@example.org for basic EFF info, and a membership form.
EFFector Online is published by:
The Electronic Frontier Foundation
Washington DC 20001 USA
+1 202 347 5400 (voice)
+1 202 393 5509 (fax)
+1 202 638 6119 (BBS - 16.8k ZyXEL)
+1 202 638 6120 (BBS - 14.4k V.32bis)
Coordination, production and shipping by:
Stanton McCandlish, Online Activist/SysOp/Archivist
Reproduction of this publication in electronic media is encouraged. Signed
articles do not necessarily represent the views of EFF. To reproduce
ually at will.
To subscribe to EFFector via email, send message body of "subscribe
effector-online" (no quotes) to email@example.com, which will add you to
a subscription list for EFFector.
To get the latest issue, send any message to firstname.lastname@example.org, and it will be
mailed to you automagically. You can also get ftp.eff.org,
/pub/EFF/Newsletters/EFFector/current at any time.
Membership & donations: email@example.com
Legal services: firstname.lastname@example.org
Hardcopy publications: email@example.com
Technical questions/problems, access to mailing lists: firstname.lastname@example.org
General EFF, legal, policy or online resources queries: email@example.com
End of EFFector Online v07 #14