EFFector Online Volume org Publicati

Found at: gopher.meulie.net:70/EFFector/effector8.16

     ________________          _______________        _______________
    /_______________/\        /_______________\      /\______________\
    \\\\\\\\\\\\\\\\\/        |||||||||||||||||     / ////////////////
     \\\\\________/\          |||||________\       / /////______\
      \\\\\\\\\\\\\/____      ||||||||||||||      / /////////////
       \\\\\___________/\     |||||              / ////
        \\\\\\\\\\\\\\\\/     |||||              \////

EFFector Online Volume 08 No. 16      Oct. 7,  1995       editors@eff.org
A Publication of the Electronic Frontier Foundation        ISSN 1062-9424

ALERT: Congress Action Resumes on Internet Censorship Legislation
  The Latest News
  What You Can Do Now
  Letter from Senator Russ Feingold (D-WI) to Committee
  Chronology of the CDA
  For More Information
  List Of Participating Organizations
Crypto Export Controls on Trial - Come on Down!
Council of Europe Issues Anti-Privacy Policy Recommendations  
  EFF Update
  EFF's Farber Wins ACM SIGCOMM Award for Lifelong Contribution to Networking
  Clinton Administration Lied About Clipper Being Voluntary - Proof!
  Hints of "OzClipper"?  Australian Atty. General's Dept. Wants Key Escrow
  Church of Scientology Cases - Update
  ALERT: SEC EDGAR Database Endangered by Lobbyists
  Coming Next Issue...
Upcoming Events
Quote of the Day
What YOU Can Do

* See http://www.eff.org/Alerts/ or ftp.eff.org, /pub/Alerts/ for more
nformation on current EFF activities and online activism alerts! *


Subject: ALERT: Congress Action Resumes on Internet Censorship Legislation


        Update: -Latest News:
                        Feingold releases letter to Committee members
                        identifying First Amendment issues with CDA

                -What You Can Do Now:
                        Send a letter to Feingold congratulating him
                        for speaking up for free speech.

                        Put your business or bulletin board on record
                        as supporting free speech and opposing censorship
                        for cyberspace!

                           Oct 1, 1995

                REDISTRIBUTE ONLY UNTIL November 25, 1995

      Distributed by the Voters Telecommunications Watch (vtw@vtw.org)


        The Latest News
        What You Can Do Now
        Letter from Senator Russ Feingold (D-WI) to Committee
        Chronology of the CDA
        For More Information
        List Of Participating Organizations



Many people who have been following the attempts to censor the Internet
may have seen the Senate floor debate.  If you did, you were treated to
the sight of Senators Leahy (D-VT) and Feingold (D-WI) passionately
attempting to explain to 84 members of the Senate exactly just what the
n this medium.

Both Senators spoke passionately, and for those that understand this
technology, something clicked.  The 16 members that voted against the
censorship legislation will be rewarded by reminders to their voters
about their rational, non-hysterical, positions on free speech at the
end of the year.

Feingold on his stand for free speech, and for sticking up for the
net.  Quite often Senator Leahy gets most of the credit for this
Feingold's office below)

Last week Senator Feingold sent a letter to several committee members
outlining the First Amendment problems with the measures passed by the
Senate (the Communications Decency Act) and the House (the Manager's
Amendment) and asked that these be deleted.  A copy of that letter is
enclosed below, and we thank Senator Feingold's office for making
available an electronic copy (so we didn't have to type it in!).

Remember, send Senator Feingold a thank you.  He's earned it.

[What comes below is unchanged from the last alert]

The House and Senate have passed a total of four different pieces of
legislation aimed at dealing with children's access to information on
the Internet.

Each of the four was profiled in BillWatch #13 which you can retrieve
from URL:http://www.vtw.org/billwatch/issue.13.html.  Here are the four

HR1978: "Internet Freedom and Family Empowerment Act" (Cox/Wyden) This
bill takes the approach of encouraging industry to provide parents with
tools to restrict their childrens' access to the net.  It contains no
new criminal provisions.  This approach was affirmed by the House

S314: "The Communications Decency Act" (Exon/Coats) This bill makes
many types of constitutionally-protected speech (including lewd,
lascivious, and indecent speech) criminal when used through a
telecommunications device.  This provision was affirmed by the Senate

House amendment to HR1555: "Child Protection, User Empowerment, and
Free Expression in Interactive Media Study Act" (Klink/Leahy) This bill
n current law where existing obscenity laws are unenforcible on computer
networks.  This approach was affirmed by a committee voice vote.

House amendment to HR1555:   This amendment was submitted at
the last minute through the Manager's Mark, a collection of several
amendments to HR1555 that were voted on as a block.  This amendment
takes constitutionally-protected speech and criminalizes it when it is
expressed online.  Most legislators had no idea that they voted on this
last amendment; the summary of the Manager's Mark did not mention
these new criminal provisions.  There was no applicable House vote on
*just this* provision.

The House-Senate conference committee now has the task of deciding
bill for the last floor vote.



   up for free speech in cyberspace.  Be polite and check your spelling.

   Most importantly, READ HIS LETTER FIRST before you send mail.  He
   took the time to write it, shouldn't you take the time to read it?

   Email or paper mail are recommended, since they will have the least
   impact on the staff.  Telephone calls are less desirable, but
   certainly appropriate if that is the only way that is convenient
   for you.

   The Senator can be reached at:

      P ST Name and Address           Phone           Fax
      = == ========================   ==============  ==============
      D WI Feingold, Russell          1-202-224-5323  na
            502 HSOB                    russell_feingold@feingold.senate.gov
            Washington, D.C. 20510

[This is from the last alert.  We are still collecting signons to the
 letter though, and we don't have nearly enough Internet Service Providers.

   committee will affect businesses and bulletin boards in cyberspace.
   We're coordinating a letter from Internet businesses and bulletin
   boards to explain to Congress just what these poorly-drafted regulations
   will mean to them.

   Read the electronic business and bulletin board letter below.  You
   can also find it at:

        Gopher:  gopher -p1/vtw/exon gopher.panix.com
        WWW URL: http://www.vtw.org/cdaletter/
        Email  : Send mail to files@vtw.org with "send cdaletter" in the
                 subject line.
   convince the owners to sign onto the letter.  Companies that should sign
   this include Internet service providers, Web designers (big and small),
   Internet consultants and trainers, Internet restaurants and bars,
   software companies that develop Internet-related software, companies
   that advertise or publish through the Internet or bulletin boards, writers
   who publish through the Internet, and many others!

   If you belong to a bulletin board, ask the sysop if he or she will sign
   onto the letter.

   information to vtw@vtw.org:

        Business name
        Owner or officer name
        Email address
        Phone number
        Description of business and anything else relevant

   Here's an example:

   $ Mail vtw@vtw.org

   My business would like to signon to the business and bbs letter.
   We are:

        Ed's Xcellent Online Node (EXON)
        J.J. Exon, Owner
        2323 Decency Road, Nebraska 10000-0000
        (402) 555-1212

        Ed's Xcellent Online Node is based in Nebraska and provides Internet
        service to many thoughtful and free-speech loving Nebraskans.
        We provide Internet access to over 1,500 residents and 400
        businesses.  We employ 35 full time employees.

   Mail sent!

   that uses public networks, but belong to a professional organization
   or an advocacy group, consider sending Congress the ACLU letter included
   below with your local group's name on it.  Simply replace the material
   in parentheses with your own information.

   that great?



[NOTE: This letter was sent to:

        Sen. Larry Pressler
        Sen. Fritz Hollings
        Rep. Thomas Bliley
        Rep. John Dingell
        House Committee on Commerce
        Senate Committee on Commerce, Science, & Technology

 All of these individuals have a hand in the shaping of the conference
 committee process that will define the outcome of the Telecommunications
 Deregulation bill, and therefore, the Internet censorship legislation.

 Each letter was identical, so we have only included one here.


Tuesday September 26, 1995

The Honorable Thomas Bliley
Chairman, Committee on Commerce
U.S. House of Representatives
Washington, D.C. 20515

Dear Chairman Bliley,

Soon your Committee will begin Conference deliberations on H.R. 1555
and S.652, telecommunications reform legislation, with members of the
Senate Committee on Commerce, Science and Transportation.  During those
House versions of this legislation.

The Exon-Coats amendment, added to S. 652 on the Senate floor, included
technological development of this exciting new form of
telecommunications.  Specifically I have objected to the indecency

    Amendment to the U.S. Constitution;

    "least restrictive means" of protecting children from exposure to
    such speech on the Internet. There are a number of existing tools
    available today to allow parents to protect their children from
    materials which they find inappropriate;

    require adults to self censor their communications on the Internet;

    speech by adults will be diminished to what might be considered decent
    in the most conservative community in the United States and to what
    might be appropriate for very young children;

    for the same material that appears in print and on the computer screen.
    Works that are completely legal in the bookstore or on the library shelf
    would be criminal if transmitted over computer networks;

    regulated depends on the characteristics of the media.  The unique
    nature of interactive media must be considered when determining how
    best to protect children.  S. 652 ignores the degree to which users
    have control over the materials to which they are exposed as well as
    the decentralized nature of interactive technology which liken it more
    to print media than broadcast media.

Section 403 of H.R. 1555, known as the Hyde amendment, raises equally
antithetical to other provisions contained in the House Bill.  The
adults.  The Hyde amendment is also inconsistent with the more
market-oriented and less intrusive provisions of Sec. 104 of H.R. 1555,
the On-Line Family Empowerment Act introduced by Congressmen Cox and
Wyden, as adopted by the House.  Section 104 recognizes that First
Amendment protections must apply to on-line communications by
offensive communications over their private services.

H.R. 1555, which demands a report by the Department of Justice (DOJ) on
existing criminal obscenity and child pornography statutes and their
applicability to cyber-crime.  Sec. 110 also requires an evaluation of
the technical means available to enable parents to exercise control
over the information that their children receive on the Internet.
Amendment speech protections to interactive media.  H.R. 1555, while
embracing the principles of restraint with respect to new criminal
axioms with the Hyde provision.  By imposing new criminal sanctions on
ndecent speech and amending existing criminal statutes, the Hyde
amendment rushes to judgement before the DOJ study has even begun.

Recently, the Senate Judiciary Committee held the first-ever
Congressional hearing on the issue of cyberporn.  Based on the
testimony of the witnesses, which included parents as well as victims
of cyberporn, it became clear that the objectionable communications on
the Internet are already covered by existing criminal statutes.  The
concerns raised at the hearing centered upon trafficking of child
victimization of minors via the Internet.  However, those offenses are
already violations of criminal law.  Indeed, recent press accounts
ndicate that law enforcement officers are already aggressively
obscenity and child pornography.

criminal activity conducted via the Internet and not be distracted by
the issue of indecency which has not been identified as a serious
concern by users or parents.  It was clear, during our recent Senate
Hearing, that the witnesses' concerns about the Internet did not relate
to indecent speech or the so-called "seven dirty words".  It is
ncumbent upon Congress to wait for the results of the study required
by H.R. 1555 before embracing overly restrictive, potentially
unnecessary and possibly unconstitutional prohibitions on indecent

amendment adopted overwhelmingly by the House of Representatives.  If
the United States is to ever fully realize the benefits of interactive
telecommunications technology, we cannot allow the heavy hand of
Congress to unduly interfere with communications on this medium.

Thank you for your consideration of this very important matter.


Russell D. Feingold
United States Senator

cc:  Members, Committee on Commerce



Sep 26, '95     Sen. Russ Feingold urges committee members to drop
                Managers Amendment and the CDA from the Telecommunications
                Deregulation bill
Aug  4, '95     House passes HR1555 which goes into conference with S652.
Aug  4, '95     House votes to attach Managers Amendment (which contains
                new criminal penalties for speech online) to
                Telecommunications Reform bill (HR1555).
Aug  4, '95     House votes 421-4 to attach HR1978 to Telecommunications
                Reform bill (HR1555).
Jun 30, '95     Cox and Wyden introduce the "Internet Freedom and Family
                Empowerment Act" (HR 1978) as an alternative to the CDA.
Jun 21, '95     Several prominent House members publicly announce their
                opposition to the CDA, including Rep. Newt Gingrich (R-GA),
                Rep. Chris Cox (R-CA), and Rep. Ron Wyden (D-OR).
Jun 14, '95     The Senate passes the CDA as attached to the Telecomm
                reform bill (S 652) by a vote of 84-16.  The Leahy bill
                (S 714) is not passed.
May 24, '95     The House Telecomm Reform bill (HR 1555) leaves committee
                in the House with the Leahy alternative attached to it,
                thanks to Rep. Ron Klink of (D-PA).  The Communications
                Decency Act is not attached to it.
Apr  7, '95     Sen. Leahy (D-VT) introduces S.714, an alternative to
                the Exon/Gorton bill, which commissions the Dept. of
                Justice to study the problem to see if additional legislation
                (such as the CDA) is necessary.
Mar 23, '95     S314 amended and attached to the telecommunications reform
                bill by Sen. Gorton (R-WA).  Language provides some provider
                protection, but continues to infringe upon email privacy
                and free speech.
Feb 21, '95     HR1004 referred to the House Commerce and Judiciary committees
Feb 21, '95     HR1004 introduced by Rep. Johnson (D-SD)
Feb  1, '95     S314 referred to the Senate Commerce committee
Feb  1, '95     S314 introduced by Sen. Exon (D-NE) and Gorton (R-WA).



Web Sites

FTP Archives

Gopher Archives:

        vtw@vtw.org (put "send alert" in the subject line for the latest
                alert, or "send cdafaq" for the CDA FAQ)
        cda-info@cdt.org (General CDA information)
        cda-stat@cdt.org (Current status of the CDA)



Communications Decency Act.

American Communication Association * American Council for the Arts *
Arts & Technology Society * Association of Alternative Newsweeklies *
biancaTroll productions * Boston Coalition for Freedom of Expression *
Californians Against Censorship Together * Center For Democracy And
Technology * Centre for Democratic Communications * Center for Public
Representation * Citizen's Voice - New Zealand * Cloud 9 Internet
*Computer Communicators Association * Computel Network Services *
Computer Professionals for Social Responsibility * Cross Connection *
Cyber-Rights Campaign * CyberQueer Lounge * Dutch Digital Citizens'
Movement * ECHO Communications Group, Inc. * Electronic Frontier Canada
* Electronic Frontier Foundation * Electronic Frontier Foundation -
Austin * Electronic Frontiers Australia * Electronic Frontiers Houston
* Electronic Frontiers New Hampshire * Electronic Privacy Information
Center * Feminists For Free Expression * First Amendment Teach-In *
Florida Coalition Against Censorship * FranceCom, Inc. Web Advertising
Services * Friendly Anti-Censorship Taskforce for Students * Hands
Off!  The Net * Human Rights Watch * Inland Book Company * Inner Circle
Technologies, Inc. * Inst. for Global Communications * Internet
On-Ramp, Inc. * Internet Users Consortium * Joint Artists' and Music
Marijuana Policy Project * Metropolitan Data Networks Ltd. * MindVox *
MN Grassroots Party * National Bicycle Greenway * National Campaign for
Freedom of Expression * National Coalition Against Censorship *
National Gay and Lesbian Task Force * National Public Telecomputing
Network * National Writers Union * Oregon Coast RISC * Panix Public
Access Internet * People for the American Way * Republican Liberty
Caucus * Rock Out Censorship * Society for Electronic Access * The
Thing International BBS Network * The WELL * Voters Telecommunications

(Note: All 'Electronic Frontier' organizations are independent entities,
 not EFF chapters or divisions.)


        End Alert


Subject: Crypto Export Controls on Trial - Come on Down!

On October 20th in San Francisco, we'll have the first public hearing
n the EFF/Bernstein lawsuit, which seeks to have the export laws on
cryptography declared unconstitutional.  You are invited!

Meet at the Federal Building in San Francisco, 450 Golden Gate Avenue.
The first "oral arguments" in the Bernstein crypto export case will
courtroom, upstairs.  We've been FedExing legalese back and forth for
months; now we get to explain the case in person.  You can meet our
ntrepid lawyers, who are slaving away without pay, _in_durance_vile_,
to protect our rights!  Shake hands with an NSA lawyer specially flown
n for the occasion!  Meet some local journalists!  And watch the

EFF.  Our main argument is that the export controls on crypto software 
are a "prior restraint on publication" which is unconstitutional under 
the First Amendment unless handled very delicately by a court (not just 
by an agency acting on its own). These agencies restrained Dan's ability 
to publish a paper, as well as source code, for the crypto algorithm that 
State Department and NSA take a lot more liberties during the export 

Like Phil Karn's case, this lawsuit really has the potential to outlaw
the whole NSA crypto export scam.  We could make your right to publish
and export crypto software as well-protected by the courts as your
appeal any such decision, and it will take years and probably an
eventual Supreme Court decision to make it stick.  But you can be
there at the very beginning.

and really do care that it gets handled well.  We'll have to be quiet
and orderly while we're in the courthouse.  There will be no questions
from the audience (that's us), but the session will be tape-recorded,
and you can take notes if you like.  Banners and inflamatory t-shirts are 

The particular issue in front of Judge Patel on the 20th is whether the
case should be thrown out.  The government is arguing that it should.
most observers something about how the courts work, and how the NSA and
State Dept use bureaucratic tricks to avoid facing the real issues.
We have managed to drag in some of these issues, like whether there is

Don't bring any interesting devices unless you're willing to check
them with the lobby guards for the duration.  They seem to want to
they'll let you go upstairs to the courtrooms.

Full background and details on the case are in the EFF archives at:

ftp.eff.org, /pub/Privacy/ITAR_export/Bernstein_case/


Subject: Council of Europe Issues Anti-Privacy Policy Recommendations

Sept. 11, 1995, the Committee of Ministers to Member States of the 
Council of Europe, a European Union advisory body, issued "Recommendation 
No. R (95) 13: Concerning Problems of Criminal Procedure Law Connected 

The recommendation states in part:

        The Committee of Ministers, under the terms of Article 15.b of the
 Statute of the Council of Europe.


        Concerned at the risk that electronic information systems and
 electronic information may also be used for committing criminal offenses;

        Considering that evidence of criminal offenses may be stored and
 transferred by these systems;

        Noting that criminal procedure laws of members states often do not
 yet provide for appropriate powers to search and collect evidence in these
 systems in the course of criminal investigations;


        Recalling Recommendation No. R (81) 20 of the Committee of
 Ministers on the harmonisation of laws relating to the requirement of
 written proof and to the admissibility of reproductions of documents and
 recordings on computers, Recommendation No. R. (85) 10 on letters rogatory
 for the interception of telecommunications, Recommendations No. R (87) 15
 [sic] regulating the use of personal data in the police state and
 Recommendations No. R (89) 9 on computer-relating crime,

        Recommends the governments of member states:

 i.      when reviewing their internal legislation and practice, to be
 guided by the principles appended to this recommendation


The appended principles contain, in part, the following:


 3. During execution of a search, investigating authorities should have the
 power, subject to appropriate safeguards, to extend the search of other
 computer systems within their jurisdiction which are connected by means of
 a network and seize the data therein, provided immediate action is


 5. in view of the convergence of information technology and
 telecommunications, law pertaining to technical surveillance for the
 purpose of criminal investigations, such as interception of
 telecommunications, should be reviewed and amended, where necessary, to
 ensure their applicability.

 6. The law should permit investigating authorities to avail themselves of
 all necessary technical measures that enable the collection of traffic
 data in the investigation of crimes.


 8. Criminal procedure laws should be reviewed with a view to making
 possible the interception of telecommunications and the collection of
 traffic data in the investigation of serious offenses against the
 confidentiality, integrity and availability of telecommunications or
 computer systems.


 9. Subject to legal privileges or protection, most legal systems permit
 investigating authorities to order persons to hand over objects under
 their control that are required to serve as evidence. In a parallel
 fashion, provisions should be made for the power to order persons to
 submit any specified data under their control in a computer system in the
 form required by the investigating authority.

 10. Subject to legal privileges or protection, investigating authorities
 should have the power to order persons who have data in a computer system
 under their control to provide all necessary information to enable access
 to a computer system and the data theirin. Criminal procedure law should
 ensure that a similar order can be given to other persons who have
 knowledge about the functioning of the computer system or measures applied
 to secure the data therein.

 11. Specific obligations should be imposed on operators of public and
 private networks that offer telecommunications services to the public to
 avail themselves of all necessary technical measures that enable the
 interception of telecommunications by the investigating authorities.

 12. Specific obligations should be imposed on service providers who offer
 telecommunications services to the public, either through public or
 private networks, to provide information to identify the user, when so
 ordered by the compentant investigating authority.

 14. Measures should be considered to minimise the negative effects of the
 use of cryptography on the investigation of criminal offenses, without
 affecting its legitimate use more than is strictly necessary.


 17. The power to extend a search to other computer systems should also be
 applicable when the system is located in a foreign jurisdiction, provided
 that immediate action is required. In order to avoid possible violations
 of state sovereignity or international law, an unambigious legal basis for
 such extended search and seizure should be established. Therefore, there
 is an urgent need for negotiating international agreements as to how, when
 and to what extent such search and seizure should be permitted.
 18. Expedited and adequate procedures as well as a system of liason should
 be available according to which the investigating authorities may request
 the foreign authorities to promptly collect evidence.  For that purpose
 the requested authorities should be authorized to search a computer system
 and seize data with a view to its subsequent transfer.  The requested
 authorities should also be authorized to provide trafficking data rtelated
 to a specific telecommunication, intercept a specific telecommunication or
 identify its source. For that purpose, the existing mutual legal
 assistance instruments need to be supplemented.


The document does also include a few less ominous points, such as:

 2. Criminal procedure laws should permit investigating authorities to
 search computer systems and seize data under similar conditions as under
 traditional powers of search and seizure. The person in charge of the
 system should be informed that the system has been searched and of the
 kind of data that has been siezed. The legal remedies that are provided
 for in general against search and seizure should be equally applicable in
 case of search in computer systems and in case of seizure of data therein.

But, in general, the document appears almost as if written to be a police 
and intelligence agency wishlist, assaulting encryption and several other 
aspects of privacy.  The proposal amounts to a call for a pan-European
"Digital Telephony"-style surveillance network, where no system is 
actions are logged and trackable, with all system operators required to 
yield such information to authorities, even foreign police or 
ntelligence agencies.

How did this happen?  Unconfirmed reports indicate that many 
"extremely broad powers for the police" according to one commentator, and
as typical of their entire government - even though the matter is 
currently, and has been for two years, under debate in the Finnish 

An EFF boardmember was told by a White House official that the Clinton 
Administration is leaning heavily on foreign governments, especially 
those in Europe, to implement restictions on strong encryption and to 
Clipper as a workable system has done little to slow down the 
Administration's ardent desire to wiretap the world.  It seems likely 
that the European recommendations may be due in part to this pressure.

The Council of Europe has no legislative power, either in members' 
ndividual nations, or at the European Union level, unlike the European
Commission.  However, Peter Csonka, the chairman of the committee that 
Council of Europe recommendations", according to an article in 
_Communications_Week_International_.  The article also suggests that the 
Council recommendations were intended to roughly coincide with a 
Commission proposal for a pan-European encryption standard.  We currently 
article had several errors in it, so this is to be taken with a grain of 
call directly for a crypto ban, or key "escrow", only for weak encryption 
and some kind of law enforcement access to keys (and only if you 
nterpret it that way.)

The _CWI_ article, for whatever it might be worth, also reports that 
opposition to this measure was expressed by Mike Strezbek, VP
organization "will challenge any attempt to limit the power of our
network encryption technologies very strongly".  It also noted that 
"Czonka said that the Council had given consideration to business
nterests but had tried to strike a balance between privacy and
to the public which cannot be deciphered. This might lead to the 
conclusion to put restrictions on the possession, distribution, or use of 
cryptography."  The source document of these statements is not current 
know to us.

A correspondent, Ross Anderson, warns that apparently another 
nternational organization, the OECD, has called a conference of its
members in December to devise a strategy on encryption.

appreciated.  What news we do have is fairly disturbing and certainly 
cause for concern.

You can examine the full text of the recommendations at:

ftp.eff.org, /pub/Global/Multinational/Privacy/


Subject: Newsbytes

* EFF Update

We apologize for any delays that new members experience in having their 
memberships processed.  We'll be catching up on the backlog shortly!
We've also made a shorter and more convenient membership form (available
at http://www.eff.org/pub/EFF/join.eff).  Other membership changes 
nclude expansion of the sysop membership category to include others who
membership category to also include those with low incomes. Sysop/recruiter
members may renew at sysop/recruiter rates for the time being, regardless 
of whether they can show that they've fulfilled the recruiting requirement.
We did not have a workable system in place to keep track of sysop member 

We furthermore apologize for an error in one of our site indexes.  As a 
visitor noted, we had improperly identified "militia" and "terrorist" in a 
file description. This has been fixed.  EFF has no position on militia 
ssues (other than attempts to broaden censorship and surveillance on the
nformation on such moves by legislators and agencies, keep an eye on
ndex file, materials on both topics are housed in the same directory
"terrorism" on the one hand, or "militias" on the other is remarkably 

* EFF's Farber Wins ACM SIGCOMM Award for Lifelong Contribution to Networking

(Special Interest Group in Data Communications) award for lifelong
contribution to data networking. He was presented this award during the 
ACM SIGCOMM 1995 conference to held Aug 28 to Sep 1 1995. David J. Farber 
at the University of Pennsylvania since 1987.  He received his B.S. in
Electrical Engineering and an M.S in Mathematics from the Stevens Institute
of Technology in 1956 and 1962 respectively.  He is a member of the American
Association for the Advancement of Science (AAAS); Association for Computing
Machinery (ACM) and the Institute of Electrical and Electronics Engineers
(IEEE). He is also on the Board of Directors of the Electronic Frontier

He worked in the early 1970's on ring networks and in the early
He is one of the Principal Investigators on the AURORA gigabit testbed.
networks, distributed computing, operating systems, distributed 
collaboration, and microprocessor architecture.

* Clinton Administration Lied About Clipper Being Voluntary - Proof!

Newly-released government documents show that key federal agencies 
concluded more than two years ago that the "Clipper Chip" encryption 
nitiative will only succeed if alternative security techniques are
outlawed.  The Electronic Privacy Information Center (EPIC) obtained the 

The conclusions contained in the documents appear to conflict
ncluding EPIC and EFF, have long maintained that the Clipper "key-escrow
encryption" technique would only serve its stated purpose if made
mandatory.  According to the FBI documents, that view is shared by
the Bureau, the National Security Agency (NSA) and the Department
of Justice (DOJ) as a whole.

Applications and Potential Solutions," and sent to the National
Security Council in February 1993, the FBI, NSA and DOJ concluded

     Technical solutions, such as they are, will only work if
     they are incorporated into *all* encryption products.
     To ensure that this occurs, legislation mandating the
     use of Government-approved encryption products or
     adherence to Government encryption criteria is required.

Likewise, an undated FBI report titled "Impact of Emerging
Telecommunications Technologies on Law Enforcement" observes that
"[a]lthough the export of encryption products by the United States
s controlled, domestic use is not regulated."  The report
concludes that "a national policy embodied in legislation is
needed."  Such a policy, according to the FBI, must ensure "real-
time decryption by law enforcement" and "prohibit[] cryptography
that cannot meet the Government standard." 

The FBI conclusions stand in stark contrast to public assurances that the 

EPIC has recently also filed a brief in support of CPSR's FOIA lawsuit 
against NSA, seeking allegedly improperly classified NSA documents on 
Clipper.  EFF boardmember John Gilmore and his attorney, Lee Tien have also
filed related FOIA requests and lawsuits against NSA and other agencies.

[Largely excerpted with minor edits from EPIC press releases.]

The full version of the EPIC statements & Brief, and documents from the 
CPSR and Gilmore/Tien cases, are available at: 
ftp.eff.org, /pub/Activism/FOIA/Clipper_FOIA/

For more information, see also:

* Hints of "OzClipper"?  Australian Atty. General's Dept. Wants Key Escrow

An attendee, Ross Anderson, of the Queensland U. of Tech. Cryptography 
Orlowski, Assistant Director, Australian attorney general's department, 
nfrastructure for privacy and smaller financial transactions can be met
by lower level encryption which could withstand a normal but not 
the capability to mount such sophisticated attacks. Criminals who 
attention to themselves."  Orlowski also indicated that the Attorney 
General's office would be intersted in serving as the central federal 
transactional records and other "traffic analysis" information to nab the 
bad guys.  Anderson also reports that he learned at the conference that 
the intelligence agencies of several nations have already held a 
classified crypto-policy meeting in Germany in March, and have agreed to 

* Church of Scientology Cases - Update

CoS organizations Religious Technology Center and Bridge Publications
continue to pursue legal sanctions against critics, who claim they are 
Bridge filed suit against Dennis Erlich, a former Scientology minister, 
a judge to issue a temporary restraining order (TRO) and writ of seizure 
that allowed CoS to raid the Erlich's home and confiscate what it said were
nfringing materials and their method of dissemination (Erlich's computer
equipment). Later, after instigating a raid on a Finnish anonymous 
critics posting CoS documents, which the church claims both copyright 
and trade secret protection for, Bridge and RTC filed similar suits against
anti-cult group FACTNet and two of its directors in Colorado, while Bridge
Lerma, on the East Coast, naming the Washington Post and two Post 
employees as co-defendants.  Using the original writ of seizure against 
Erlich as evidence of the "emergency" nature of their request, CoS convinced
both of the other judges to issue similar search-and-seize orders.
The FACTNet and Post defendants are all charged with copyright and trade 
*publicly-accessible court records* from a previous case (CoS Int'l. v. 
Fishman & Geertz).

Aug. 30, Judge Brinkema, presiding over the Virginia case, appeared 
unofficial transcript (we hope to provide the official court documents 
against the defendants, and was particularly concerned about the First 
Amendment implications of the actions against the Washington Post.
The judge explicitly permitted fair use by defendants of the documents at 
ssue, and expressed skepticism that CoS would win the larger case itself
on the merits of either copyright or trade secret claims.  Brinkema also 
ordered the return of all seized materials.

Sept. 12, Judge Kane, presiding over the Colorado case, vacated the writ
a judge under him had issued, and he too ruled that until the case begins in 
earnest, defendants may use the documents within fair use guidelines. 
Kane found it highly unlikely that CoS would succeed on the merits of 
ts case, and found that the trade secret arguments were particularly weak.
Kane reinforced this decision with an order issue 3 days later, after CoS 
but Kane has appointed defense's computer expert witness, at plaintiffs' 
expense, to examine the materials and provide for return off all seized 
tems, minus the documents at issue in the case, which are to be held in
the custody of the court rather than plaintiffs' attorneys.

Sept. 22, Judge Whyte finally issued his own ruling in the California 
case against Erlich, Netcom and Klemesrud.  He too vacated the writ of 
alone of the three judges, Whyte appears to believe that CoS will succeed 
n its suit on the merits of their copyright argument, though remains
critical of the internet itself, stating: "The court is troubled by the 
notion that any Internet user, including those using "anonymous
fact that there is little opportunity to screen postings before they are 
made...The anonymous (or judgment proof) defendant can permanently 
misappropriations...Computer files can be easily uploaded and copied from 
one location to another and are easy to transport, conceal or delete.
The ability of users to post large amounts of protected works nearly
nstantaneously over the Internet makes it a rather dangerous haven for
copyright infringers."

But this isn't all that's been happening.  CoS-unfriendly posts to the 
Usenet newsgroup alt.religion.scientology (and many other newsgroups 
ncluding comp.org.eff.talk) are being cancelled frequently by an
anonymous person or persons, dubbed the "CancelPoodle". Some critics allege 
that CoS itself is doing this.  One a.r.s. participant who received a 
legal threat from CoS lawyers also alleges that CoS private investigator
Gene Ingram, wanted in at least one state on felony charges, attempted to 
frame him for "terrorist acts".  Others report dissimilar but equally 

Worse yet, the raid have not only not stopped, but spread back across the
Atlantic. Dutch Internet access provider XS4All was raided after the same 
an XS4All user's WWW pages.  CoS had demanded the removal of the material,
and XS4All complied, but somehow they were able to convince the 
Netherlands authorities to permit search and seizure of XS4All's 
computers anyway.  Dutch journalist Karin Spaink suggests in a recent 
article that the real reason for the raid "probably was that a former 

Dutch Internetters appear to be almost uniformly outraged at the CoS 
"Fishman Declaration", which contains copies of "secret" CoS religious 
around the world, from China to Australia.  This protest action has even 
been joined by noted European author Marcel Moring, Dutch Member of 
least 70 other sites in Holland.  Oussama compared the situation to the 
Salman Rushdie affair, and a newpaper reported that he "will not remove 
the documents from his homepage until a Dutch court rules that he has 
to."  Another Parliament Member has sent queries to the Dutch Justice 
Dept. asking if they are aware of the events, and whether Justice agrees 
that system operators need extra legal protection, and will work to 
"remedy the currently unclear legal position of Internet providers".
CoS continues to mail legal threats to the Dutch users and their service

For more information on these increasinly convoluted cases and events, see:
ftp.eff.org, /pub/Legal/Cases/Scientology_cases/

* ALERT: SEC EDGAR Database Endangered by Lobbyists

September 28, the Securities and Exchange Commission (SEC) began
- the datbase was oringially administered by the Internet Multicasting
Service, but SEC has finally agreed to make it's own records avialable to
the public.

Early in August, Internet Multicasting Service (IMS) announced that it 
town.hall.org site on October 1, 1995.  On July 27, 1995 a bill was 
ntroduced in the House of Representatives to privatize the EDGAR
and there was a great deal of support for the free NYU/IMS EDGAR 
find a way to continue a free Internet dissemination program for the
EDGAR data, and did just that, establishing the www.sec.gov system.

Lobbyists for the Information Industry Association (IIA) have actively 
opposed this project and are working actively to have it killed.  If you 
by writing to Chairman Levitt of the SEC in care of:


EDGAR on the Internet began two years ago as a trial project with New York
University and the non-profit Internet Multicasting Service.  Over 3 million
available to people who did not have it before: students, public interest

Lobbyists contend that free access to simple keyword searches and unprocessed
bulk databases threatens the retail information industry.  Those 
concerned about public access to governement information believe that the
opposite is true: free access to raw data expands the market of potential
users.  Evidence of this is that Moody's, RR Donnelley, and Disclosure all
nformation industries.  They provide value added in the form of real-
time access, extensive historical databases, consulting, re-formatted 
and the companies that will thrive in the information age do not view 
this as a threat.

This issue is a key test of the Republican "Contract With America".  The 
of the "Contract" and stated that government data should not be made 
available at inflated prices to a few special interests.  The SEC EDGAR 
*must* be available through a "diversity of public and private sources" 
and the public must get access to key government databases in a "timely 
and equitable manner."  The EDGAR database is not a product to be 
auctioned off to the highest bidder: it is fuel for the information economy.
The non-profit public interest group Taxpayer Assets Project (TAP) calls 
EDGAR "the world's most important and valuable database of financial 

views be known now.

[Largely excerpted, with minor edits, from a Internet Multicasting Service
action alert by Carl Malamud, and a TAP update.]

* Coming Next Issue...
  Cincinnati BBSers Fight Back
  Stratton Oakmont & Porush v. Prodigy - Update
  International Online Child-Porn "Ring" Target of "Operation Starburst"
  Canadian Prosecutions for Textual & Faked "Child Pornography"
  Canadian Exon-alike on the Way?
  Commerce Dept. IPWG Report on Online Intellectual Property Meets Resistance
  Canada & Holland Ratchet-up Privacy
  pgp.net - New World-Wide PGP Keyservice
  Swiss Data Protection Commish Warns About Lack of Security
  Bulgarian TV Censorship
  and more of course.


Subject: Upcoming events

This schedule lists events that are directly EFF-related. A much more 

ftp.eff.org, /pub/EFF/calendar.eff

Oct. 10-
     11 * US NII Advisory Council meeting; Pittsburgh, Penn.  Open to the
          public; members of this civilian council include EFF board members
          Esther Dyson and David Johnson.
          Contact: +1 212 482 1835 (voice)

Oct. 13 * Seminar on Forecasting the Technological Future in
          Information Systems; Annenberg School of Communication Public
          Policy Center, U. of Pennsylvania.  Speakers include EFF
          co-founder Mitch Kapor.
          Contact: +1 215 898 7041 (voice; ask for Oscar Gandy)

Oct. 19 * Library Fair 95: Information Access at the Smithsonian Institution
          Libraries; Smithsonian Ripley Center, Washington DC. Speakers
          include Shari Steele (EFF Staff Counsel)
          Email: libem011@sivm.si.edu

Nov. 3-
     4  * Innovation and the Information Environment Conf.; U. of Oregon
          School of Law, Eugene, Or.  Speakers include Shari Steele (EFF
          Staff Counsel).
          Email: kaoki@law.uoregon.edu


Subject: Quote of the Day

"Technical solutions, such as they are, will only work if they are 
ncorporated into *all* encryption products. To ensure that this occurs,
legislation mandating the use of Government-approved encryption products or
adherence to Government encryption criteria is required."
  - FBI, NSA and Justice Department secret briefing document to the 
    National Security Council, Feb. 1993, "Encryption: The Threat,
    Applications and Potential Solutions", obtained by Freedom of 
    Information Act lawsuit by EPIC.

Find yourself wondering if your privacy and freedom of speech are safe 
the rush to make us secure from ourselves that our government 
Concerned that legislative efforts nominally to "protect children" will 
actually censor all communications down to only content suitable for 
the playground?

Join EFF!

Even if you don't live in the U.S., the anti-Internet hysteria will soon 
be visiting a legislative body near you.  If it hasn't already.


Subject: What YOU Can Do

* The Communications Decency Act & Other Censorship Legislation

The Communications Decency Act and similar legislation pose serious 
threats to freedom of expression online, and to the livelihoods of system 
operators.  The legislation also undermines several crucial privacy 

Business/industry persons concerned should alert their corporate govt.
affairs office and/or legal counsel.  Everyone should write to their own
Representatives and Senators, asking them to oppose Internet censorship 
legislation, and everyone should write to the conference committee 
to support the reasonable approaches of Leahy, Klink, Cox and Wyden, and 
to oppose the unconstitutional proposals of Exon, Gorton and others.

For more information on what you can do to help stop this and other 

ftp.eff.org, /pub/Alerts/

for information to ask@eff.org.

* The Anti-Electronic Racketeering Act

This bill is unlikely to pass in any form, being very poorly drafted, and 
flying colors [the jolly roger?] in the Senate. It's better to be safe 
than sorry. If you have a few moments to spare, writing to, faxing, or 
calling your Congresspersons to urge opposition to this bill is a good 
dea. If you only have time to do limited activism, please concentrate
on the CDA instead. That legislation is far more imminent that the AERA.

* Find Out Who Your Congresspersons Are

Writing letters to, faxing, and phoning your representatives in Congress
s one very important strategy of activism, and an essential way of
making sure YOUR voice is heard on vital issues.

EFF has lists of the Senate and House with contact information, as well
as lists of Congressional committees. (A House list is included in this
ssue of EFFector). These lists are available at:
ftp.eff.org, /pub/Activism/Congress_cmtes/

The full Senate and House lists are senate.list and hr.list, respectively.
Those not in the U.S. should seek out similar information about their
own legislative bodies.  EFF will be happy to archive any such
nformation provided.

try contacting your local League of Women Voters, who maintain a great 

* Join EFF!

You *know* privacy, freedom of speech and ability to make your voice heard
n government are important. You have probably participated in our online
campaigns and forums.  Have you become a member of EFF yet?  The best way to
opinions heard.  EFF members are informed and are making a difference.  Join
EFF today!

For EFF membership info, send queries to membership@eff.org, or send any
message to info@eff.org for basic EFF info, and a membership form.



EFFector Online is published by:

The Electronic Frontier Foundation
San Francisco CA 94117 USA
+1 415 668 7171 (voice)
+1 415 668 7007 (fax)
Membership & donations: membership@eff.org
Legal services: ssteele@eff.org
Hardcopy publications: pubs@eff.org
General EFF, legal, policy or online resources queries: ask@eff.org

Stanton McCandlish, Online Services Mgr./Activist/Archivist (mech@eff.org)

This newsletter printed on 100% recycled electrons.

Reproduction of this publication in electronic media is encouraged.  Signed
articles do not necessarily represent the views of EFF.  To reproduce
ually at will.

To subscribe to EFFector via email, send message body of "subscribe
effector-online" (without the "quotes") to listserv@eff.org, which will add
you to a subscription list for EFFector.

Back issues are available at:
ftp.eff.org, /pub/EFF/Newsletters/EFFector/

To get the latest issue, send any message to effector-reflector@eff.org (or
er@eff.org), and it will be mailed to you automagically.  You can also get
the file "current" from the EFFector directory at the above sites at any 
time for a copy of the current issue.  HTML editions available at:
at EFFweb.  HTML editions of the current issue sometimes take a day or 
longer to prepare.


End of EFFector Online v08 #16 Digest