========================================================================= ________________ _______________ _______________ /_______________/\ /_______________\ /\______________\ \\\\\\\\\\\\\\\\\/ ||||||||||||||||| / //////////////// \\\\\________/\ |||||________\ / /////______\ \\\\\\\\\\\\\/____ |||||||||||||| / ///////////// \\\\\___________/\ ||||| / //// \\\\\\\\\\\\\\\\/ ||||| \//// ========================================================================= EFFector Online Volume 08 No. 16 Oct. 7, 1995 editors@eff.org A Publication of the Electronic Frontier Foundation ISSN 1062-9424 IN THIS ISSUE: ALERT: Congress Action Resumes on Internet Censorship Legislation The Latest News What You Can Do Now Letter from Senator Russ Feingold (D-WI) to Committee Chronology of the CDA For More Information List Of Participating Organizations Crypto Export Controls on Trial - Come on Down! Council of Europe Issues Anti-Privacy Policy Recommendations Newsbytes EFF Update EFF's Farber Wins ACM SIGCOMM Award for Lifelong Contribution to Networking Clinton Administration Lied About Clipper Being Voluntary - Proof! Hints of "OzClipper"? Australian Atty. General's Dept. Wants Key Escrow Church of Scientology Cases - Update ALERT: SEC EDGAR Database Endangered by Lobbyists Coming Next Issue... Upcoming Events Quote of the Day What YOU Can Do Administrivia * See http://www.eff.org/Alerts/ or ftp.eff.org, /pub/Alerts/ for more information on current EFF activities and online activism alerts! * ---------------------------------------------------------------------- Subject: ALERT: Congress Action Resumes on Internet Censorship Legislation -------------------------------------------------------------------------- CAMPAIGN TO STOP THE EXON/COATS COMMUNICATIONS DECENCY ACT (SEE THE LIST OF CAMPAIGN COALITION MEMBERS AT THE END) Update: -Latest News: Feingold releases letter to Committee members identifying First Amendment issues with CDA legislation. -What You Can Do Now: Send a letter to Feingold congratulating him for speaking up for free speech. Put your business or bulletin board on record as supporting free speech and opposing censorship for cyberspace! CAMPAIGN TO STOP THE UNCONSTITUTIONAL COMMUNICATIONS DECENCY ACT Oct 1, 1995 PLEASE WIDELY REDISTRIBUTE THIS DOCUMENT WITH THIS BANNER INTACT REDISTRIBUTE ONLY UNTIL November 25, 1995 REPRODUCE THIS ALERT ONLY IN RELEVANT FORUMS Distributed by the Voters Telecommunications Watch (vtw@vtw.org) ________________________________________________________________________ CONTENTS The Latest News What You Can Do Now Letter from Senator Russ Feingold (D-WI) to Committee Chronology of the CDA For More Information List Of Participating Organizations ________________________________________________________________________ THE LATEST NEWS Many people who have been following the attempts to censor the Internet may have seen the Senate floor debate. If you did, you were treated to the sight of Senators Leahy (D-VT) and Feingold (D-WI) passionately attempting to explain to 84 members of the Senate exactly just what the Internet was, and why passing laws against indecency are inappropriate in this medium. Both Senators spoke passionately, and for those that understand this technology, something clicked. The 16 members that voted against the censorship legislation will be rewarded by reminders to their voters about their rational, non-hysterical, positions on free speech at the end of the year. In the meantime, we believe that you should congratulate Senators Feingold on his stand for free speech, and for sticking up for the net. Quite often Senator Leahy gets most of the credit for this position. Let's be honest, he deserves it because of his long standing rational approach to our issues. However it's a big tent, and free speech can always use another defender. (Directions for contacting Feingold's office below) Last week Senator Feingold sent a letter to several committee members outlining the First Amendment problems with the measures passed by the Senate (the Communications Decency Act) and the House (the Manager's Amendment) and asked that these be deleted. A copy of that letter is enclosed below, and we thank Senator Feingold's office for making available an electronic copy (so we didn't have to type it in!). Remember, send Senator Feingold a thank you. He's earned it. [What comes below is unchanged from the last alert] The House and Senate have passed a total of four different pieces of legislation aimed at dealing with children's access to information on the Internet. Each of the four was profiled in BillWatch #13 which you can retrieve from URL:http://www.vtw.org/billwatch/issue.13.html. Here are the four pieces of legislation and a short summary of each of them. HR1978: "Internet Freedom and Family Empowerment Act" (Cox/Wyden) This bill takes the approach of encouraging industry to provide parents with tools to restrict their childrens' access to the net. It contains no new criminal provisions. This approach was affirmed by the House 421-4 on August 4, 1995. (Yes, that's a landslide) S314: "The Communications Decency Act" (Exon/Coats) This bill makes many types of constitutionally-protected speech (including lewd, lascivious, and indecent speech) criminal when used through a telecommunications device. This provision was affirmed by the Senate 84-16 on June 14, 1995. House amendment to HR1555: "Child Protection, User Empowerment, and Free Expression in Interactive Media Study Act" (Klink/Leahy) This bill directs the Department of Justice to study and see if there are places in current law where existing obscenity laws are unenforcible on computer networks. This approach was affirmed by a committee voice vote. House amendment to HR1555: This amendment was submitted at the last minute through the Manager's Mark, a collection of several amendments to HR1555 that were voted on as a block. This amendment takes constitutionally-protected speech and criminalizes it when it is expressed online. Most legislators had no idea that they voted on this last amendment; the summary of the Manager's Mark did not mention these new criminal provisions. There was no applicable House vote on *just this* provision. The House-Senate conference committee now has the task of deciding which of these are allowed into the final Telecommunications Deregulation bill for the last floor vote. ________________________________________________________________________ WHAT YOU CAN DO NOW 1. Send Senator Feingold a letter telling him you appreciate him standing up for free speech in cyberspace. Be polite and check your spelling. Most importantly, READ HIS LETTER FIRST before you send mail. He took the time to write it, shouldn't you take the time to read it? Email or paper mail are recommended, since they will have the least impact on the staff. Telephone calls are less desirable, but certainly appropriate if that is the only way that is convenient for you. The Senator can be reached at: P ST Name and Address Phone Fax = == ======================== ============== ============== D WI Feingold, Russell 1-202-224-5323 na 502 HSOB russell_feingold@feingold.senate.gov Washington, D.C. 20510 [This is from the last alert. We are still collecting signons to the letter though, and we don't have nearly enough Internet Service Providers. -Shabbir] 2. It's crucial that we tell Congress how their decision in the conference committee will affect businesses and bulletin boards in cyberspace. We're coordinating a letter from Internet businesses and bulletin boards to explain to Congress just what these poorly-drafted regulations will mean to them. Read the electronic business and bulletin board letter below. You can also find it at: Gopher: gopher -p1/vtw/exon gopher.panix.com WWW URL: http://www.vtw.org/cdaletter/ Email : Send mail to files@vtw.org with "send cdaletter" in the subject line. 3. If you work for a business that uses bulletin boards or public networks, convince the owners to sign onto the letter. Companies that should sign this include Internet service providers, Web designers (big and small), Internet consultants and trainers, Internet restaurants and bars, software companies that develop Internet-related software, companies that advertise or publish through the Internet or bulletin boards, writers who publish through the Internet, and many others! If you belong to a bulletin board, ask the sysop if he or she will sign onto the letter. 4. Ask the BBS sysop or the business owner to mail in the following information to vtw@vtw.org: Business name Owner or officer name Address Email address Phone number Description of business and anything else relevant Here's an example: $ Mail vtw@vtw.org My business would like to signon to the business and bbs letter. We are: Ed's Xcellent Online Node (EXON) J.J. Exon, Owner 2323 Decency Road, Nebraska 10000-0000 (402) 555-1212 jj@exon.net Ed's Xcellent Online Node is based in Nebraska and provides Internet service to many thoughtful and free-speech loving Nebraskans. We provide Internet access to over 1,500 residents and 400 businesses. We employ 35 full time employees. -James ^D Mail sent! $ 5. If you don't subscribe to a BBS or have an affiliation with a business that uses public networks, but belong to a professional organization or an advocacy group, consider sending Congress the ACLU letter included below with your local group's name on it. Simply replace the material in parentheses with your own information. 6. Relax! You just did a lot of good with only email as a tool. Isn't that great? ________________________________________________________________________ LETTER FROM SENATOR RUSS FEINGOLD (D-WI) [NOTE: This letter was sent to: Sen. Larry Pressler Sen. Fritz Hollings Rep. Thomas Bliley Rep. John Dingell House Committee on Commerce Senate Committee on Commerce, Science, & Technology All of these individuals have a hand in the shaping of the conference committee process that will define the outcome of the Telecommunications Deregulation bill, and therefore, the Internet censorship legislation. Each letter was identical, so we have only included one here. -Shabbir] Tuesday September 26, 1995 The Honorable Thomas Bliley Chairman, Committee on Commerce U.S. House of Representatives Washington, D.C. 20515 Dear Chairman Bliley, Soon your Committee will begin Conference deliberations on H.R. 1555 and S.652, telecommunications reform legislation, with members of the Senate Committee on Commerce, Science and Transportation. During those deliberations, I urge you to strike the potentially unconstitutional provisions regarding on-line indecency contained in both the Senate and House versions of this legislation. The Exon-Coats amendment, added to S. 652 on the Senate floor, included provisions which I believe would violate the First Amendment rights of Internet users and have a chilling effect on further economic and technological development of this exciting new form of telecommunications. Specifically I have objected to the indecency provisions of S. 652 for the following reasons: 1) Indecent speech, unlike obscenity, is protected under the First Amendment to the U.S. Constitution; 2) An outright ban on indecent speech on computer networks is not the "least restrictive means" of protecting children from exposure to such speech on the Internet. There are a number of existing tools available today to allow parents to protect their children from materials which they find inappropriate; 3) A ban on indecent speech to minors on the Internet will unnecessarily require adults to self censor their communications on the Internet; 4) Since "indecency" will be defined by community standards, protected speech by adults will be diminished to what might be considered decent in the most conservative community in the United States and to what might be appropriate for very young children; 5) The "on-line indecency" provisions will establish different standards for the same material that appears in print and on the computer screen. Works that are completely legal in the bookstore or on the library shelf would be criminal if transmitted over computer networks; 6) The Supreme Court has ruled that the degree to which content can be regulated depends on the characteristics of the media. The unique nature of interactive media must be considered when determining how best to protect children. S. 652 ignores the degree to which users have control over the materials to which they are exposed as well as the decentralized nature of interactive technology which liken it more to print media than broadcast media. Section 403 of H.R. 1555, known as the Hyde amendment, raises equally serious concerns with respect to the First Amendment and appears antithetical to other provisions contained in the House Bill. The prohibitions against on-line indecency contained in the Hyde language will have a similar chilling effect on the on-line communications of adults. The Hyde amendment is also inconsistent with the more market-oriented and less intrusive provisions of Sec. 104 of H.R. 1555, the On-Line Family Empowerment Act introduced by Congressmen Cox and Wyden, as adopted by the House. Section 104 recognizes that First Amendment protections must apply to on-line communications by prohibiting FCC content regulation of the Internet. The Cox/Wyden provisions also promote the use of existing technology to empower parents to protect their children from objectionable materials on the Internet, and encourages on-line service providers to self-police offensive communications over their private services. In addition, the Hyde amendment is incompatible with Section 110 of H.R. 1555, which demands a report by the Department of Justice (DOJ) on existing criminal obscenity and child pornography statutes and their applicability to cyber-crime. Sec. 110 also requires an evaluation of the technical means available to enable parents to exercise control over the information that their children receive on the Internet. Perhaps most significantly, Sec. 110 embraces the application of First Amendment speech protections to interactive media. H.R. 1555, while embracing the principles of restraint with respect to new criminal sanctions on protected speech and the promotion of a free-market parental empowerment approach, simultaneously ignores both of those axioms with the Hyde provision. By imposing new criminal sanctions on indecent speech and amending existing criminal statutes, the Hyde amendment rushes to judgement before the DOJ study has even begun. Recently, the Senate Judiciary Committee held the first-ever Congressional hearing on the issue of cyberporn. Based on the testimony of the witnesses, which included parents as well as victims of cyberporn, it became clear that the objectionable communications on the Internet are already covered by existing criminal statutes. The concerns raised at the hearing centered upon trafficking of child pornography, the proliferation of obscenity, and the solicitation and victimization of minors via the Internet. However, those offenses are already violations of criminal law. Indeed, recent press accounts indicate that law enforcement officers are already aggressively prosecuting on-line users for violations of criminal law relating to obscenity and child pornography. It is critical that we use law enforcement resources to prosecute criminal activity conducted via the Internet and not be distracted by the issue of indecency which has not been identified as a serious concern by users or parents. It was clear, during our recent Senate Hearing, that the witnesses' concerns about the Internet did not relate to indecent speech or the so-called "seven dirty words". It is incumbent upon Congress to wait for the results of the study required by H.R. 1555 before embracing overly restrictive, potentially unnecessary and possibly unconstitutional prohibitions on indecent speech contained in both versions of telecommunications reform legislation. I urge the Conference Committee to reject the Exon/Coats and Hyde provisions during your deliberations and to maintain the Cox/Wyden amendment adopted overwhelmingly by the House of Representatives. If the United States is to ever fully realize the benefits of interactive telecommunications technology, we cannot allow the heavy hand of Congress to unduly interfere with communications on this medium. Thank you for your consideration of this very important matter. Sincerely, Russell D. Feingold United States Senator cc: Members, Committee on Commerce ________________________________________________________________________ CHRONOLOGY OF THE COMMUNICATIONS DECENCY ACT Sep 26, '95 Sen. Russ Feingold urges committee members to drop Managers Amendment and the CDA from the Telecommunications Deregulation bill Aug 4, '95 House passes HR1555 which goes into conference with S652. Aug 4, '95 House votes to attach Managers Amendment (which contains new criminal penalties for speech online) to Telecommunications Reform bill (HR1555). Aug 4, '95 House votes 421-4 to attach HR1978 to Telecommunications Reform bill (HR1555). Jun 30, '95 Cox and Wyden introduce the "Internet Freedom and Family Empowerment Act" (HR 1978) as an alternative to the CDA. Jun 21, '95 Several prominent House members publicly announce their opposition to the CDA, including Rep. Newt Gingrich (R-GA), Rep. Chris Cox (R-CA), and Rep. Ron Wyden (D-OR). Jun 14, '95 The Senate passes the CDA as attached to the Telecomm reform bill (S 652) by a vote of 84-16. The Leahy bill (S 714) is not passed. May 24, '95 The House Telecomm Reform bill (HR 1555) leaves committee in the House with the Leahy alternative attached to it, thanks to Rep. Ron Klink of (D-PA). The Communications Decency Act is not attached to it. Apr 7, '95 Sen. Leahy (D-VT) introduces S.714, an alternative to the Exon/Gorton bill, which commissions the Dept. of Justice to study the problem to see if additional legislation (such as the CDA) is necessary. Mar 23, '95 S314 amended and attached to the telecommunications reform bill by Sen. Gorton (R-WA). Language provides some provider protection, but continues to infringe upon email privacy and free speech. Feb 21, '95 HR1004 referred to the House Commerce and Judiciary committees Feb 21, '95 HR1004 introduced by Rep. Johnson (D-SD) Feb 1, '95 S314 referred to the Senate Commerce committee Feb 1, '95 S314 introduced by Sen. Exon (D-NE) and Gorton (R-WA). ________________________________________________________________________ FOR MORE INFORMATION Web Sites URL:http://www.vtw.org/exon/ URL:http://epic.org/ URL:http://www.eff.org/pub/Alerts/ URL:http://www.cdt.org/cda.html URL:http://outpost.callnet.com/outpost.html FTP Archives URL:ftp://ftp.cdt.org/pub/cdt/policy/freespeech/00-INDEX.FREESPEECH URL:ftp://ftp.eff.org/pub/Alerts/ Gopher Archives: URL:gopher://gopher.panix.com/11/vtw/exon URL:gopher://gopher.eff.org/11/Alerts Email: vtw@vtw.org (put "send alert" in the subject line for the latest alert, or "send cdafaq" for the CDA FAQ) cda-info@cdt.org (General CDA information) cda-stat@cdt.org (Current status of the CDA) ________________________________________________________________________ LIST OF PARTICIPATING ORGANIZATIONS In order to use the net more effectively, several organizations have joined forces on a single Congressional net campaign to stop the Communications Decency Act. American Communication Association * American Council for the Arts * Arts & Technology Society * Association of Alternative Newsweeklies * biancaTroll productions * Boston Coalition for Freedom of Expression * Californians Against Censorship Together * Center For Democracy And Technology * Centre for Democratic Communications * Center for Public Representation * Citizen's Voice - New Zealand * Cloud 9 Internet *Computer Communicators Association * Computel Network Services * Computer Professionals for Social Responsibility * Cross Connection * Cyber-Rights Campaign * CyberQueer Lounge * Dutch Digital Citizens' Movement * ECHO Communications Group, Inc. * Electronic Frontier Canada * Electronic Frontier Foundation * Electronic Frontier Foundation - Austin * Electronic Frontiers Australia * Electronic Frontiers Houston * Electronic Frontiers New Hampshire * Electronic Privacy Information Center * Feminists For Free Expression * First Amendment Teach-In * Florida Coalition Against Censorship * FranceCom, Inc. Web Advertising Services * Friendly Anti-Censorship Taskforce for Students * Hands Off! The Net * Human Rights Watch * Inland Book Company * Inner Circle Technologies, Inc. * Inst. for Global Communications * Internet On-Ramp, Inc. * Internet Users Consortium * Joint Artists' and Music Promotions Political Action Committee * The Libertarian Party * Marijuana Policy Project * Metropolitan Data Networks Ltd. * MindVox * MN Grassroots Party * National Bicycle Greenway * National Campaign for Freedom of Expression * National Coalition Against Censorship * National Gay and Lesbian Task Force * National Public Telecomputing Network * National Writers Union * Oregon Coast RISC * Panix Public Access Internet * People for the American Way * Republican Liberty Caucus * Rock Out Censorship * Society for Electronic Access * The Thing International BBS Network * The WELL * Voters Telecommunications Watch (Note: All 'Electronic Frontier' organizations are independent entities, not EFF chapters or divisions.) ________________________________________________________________________ End Alert ------------------------------ Subject: Crypto Export Controls on Trial - Come on Down! -------------------------------------------------------- On October 20th in San Francisco, we'll have the first public hearing in the EFF/Bernstein lawsuit, which seeks to have the export laws on cryptography declared unconstitutional. You are invited! Meet at the Federal Building in San Francisco, 450 Golden Gate Avenue. The first "oral arguments" in the Bernstein crypto export case will happen there, starting at 10:30am PST, in Judge Marilyn Hall Patel's courtroom, upstairs. We've been FedExing legalese back and forth for months; now we get to explain the case in person. You can meet our intrepid lawyers, who are slaving away without pay, _in_durance_vile_, to protect our rights! Shake hands with an NSA lawyer specially flown in for the occasion! Meet some local journalists! And watch the wheels of justice grind as the judge first explores our case. In this case, Dan Bernstein, ex-grad-student from UC Berkeley, is suing the State Department, NSA, and other agencies, with help from EFF. Our main argument is that the export controls on crypto software are a "prior restraint on publication" which is unconstitutional under the First Amendment unless handled very delicately by a court (not just by an agency acting on its own). These agencies restrained Dan's ability to publish a paper, as well as source code, for the crypto algorithm that he invented. There are additional arguments along the lines that the State Department and NSA take a lot more liberties during the export process than their own regulations and laws really permit. Like Phil Karn's case, this lawsuit really has the potential to outlaw the whole NSA crypto export scam. We could make your right to publish and export crypto software as well-protected by the courts as your right to publish and export books. Of course, the government would appeal any such decision, and it will take years and probably an eventual Supreme Court decision to make it stick. But you can be there at the very beginning. Please make a positive impression on the judge. Show her -- by showing up -- that this case matters to more people than just the plaintiff and defendant. That how it gets decided will make a difference to society. That the public and the press are watching, and really do care that it gets handled well. We'll have to be quiet and orderly while we're in the courthouse. There will be no questions from the audience (that's us), but the session will be tape-recorded, and you can take notes if you like. Banners and inflamatory t-shirts are probably not a good idea. Consider this a dress-up day. The particular issue in front of Judge Patel on the 20th is whether the case should be thrown out. The government is arguing that it should. It's a mess of legal details about whether the Judicial Branch has the right to decide questions like this, and over whether we have really properly claimed a Constitutional rights violation. It will teach most observers something about how the courts work, and how the NSA and State Dept use bureaucratic tricks to avoid facing the real issues. We have managed to drag in some of these issues, like whether there is sufficient "expression" in software that the First Amendment should protect publishers of software. It's possible, but unlikely, that the judge will decide then-and-there. We will get some clues to how she is leaning, based on her questions and comments. Her written decision will come out some days or weeks later. Don't bring any interesting devices unless you're willing to check them with the lobby guards for the duration. They seem to want to hold onto guns, "munitions", and even small pocketknives, before they'll let you go upstairs to the courtrooms. Full background and details on the case are in the EFF archives at: ftp.eff.org, /pub/Privacy/ITAR_export/Bernstein_case/ gopher.eff.org, 1/Privacy/ITAR_export/Bernstein_case http://www.eff.org/pub/Privacy/ITAR_export/Bernstein_case/ ------------------------------ Subject: Council of Europe Issues Anti-Privacy Policy Recommendations --------------------------------------------------------------------- Sept. 11, 1995, the Committee of Ministers to Member States of the Council of Europe, a European Union advisory body, issued "Recommendation No. R (95) 13: Concerning Problems of Criminal Procedure Law Connected with Information Technology". The recommendation states in part: The Committee of Ministers, under the terms of Article 15.b of the Statute of the Council of Europe. [...] Concerned at the risk that electronic information systems and electronic information may also be used for committing criminal offenses; Considering that evidence of criminal offenses may be stored and transferred by these systems; Noting that criminal procedure laws of members states often do not yet provide for appropriate powers to search and collect evidence in these systems in the course of criminal investigations; [...] Recalling Recommendation No. R (81) 20 of the Committee of Ministers on the harmonisation of laws relating to the requirement of written proof and to the admissibility of reproductions of documents and recordings on computers, Recommendation No. R. (85) 10 on letters rogatory for the interception of telecommunications, Recommendations No. R (87) 15 [sic] regulating the use of personal data in the police state and Recommendations No. R (89) 9 on computer-relating crime, Recommends the governments of member states: i. when reviewing their internal legislation and practice, to be guided by the principles appended to this recommendation [...] The appended principles contain, in part, the following: [...] 3. During execution of a search, investigating authorities should have the power, subject to appropriate safeguards, to extend the search of other computer systems within their jurisdiction which are connected by means of a network and seize the data therein, provided immediate action is required. [...] 5. in view of the convergence of information technology and telecommunications, law pertaining to technical surveillance for the purpose of criminal investigations, such as interception of telecommunications, should be reviewed and amended, where necessary, to ensure their applicability. 6. The law should permit investigating authorities to avail themselves of all necessary technical measures that enable the collection of traffic data in the investigation of crimes. [...] 8. Criminal procedure laws should be reviewed with a view to making possible the interception of telecommunications and the collection of traffic data in the investigation of serious offenses against the confidentiality, integrity and availability of telecommunications or computer systems. [...] 9. Subject to legal privileges or protection, most legal systems permit investigating authorities to order persons to hand over objects under their control that are required to serve as evidence. In a parallel fashion, provisions should be made for the power to order persons to submit any specified data under their control in a computer system in the form required by the investigating authority. 10. Subject to legal privileges or protection, investigating authorities should have the power to order persons who have data in a computer system under their control to provide all necessary information to enable access to a computer system and the data theirin. Criminal procedure law should ensure that a similar order can be given to other persons who have knowledge about the functioning of the computer system or measures applied to secure the data therein. 11. Specific obligations should be imposed on operators of public and private networks that offer telecommunications services to the public to avail themselves of all necessary technical measures that enable the interception of telecommunications by the investigating authorities. 12. Specific obligations should be imposed on service providers who offer telecommunications services to the public, either through public or private networks, to provide information to identify the user, when so ordered by the compentant investigating authority. 14. Measures should be considered to minimise the negative effects of the use of cryptography on the investigation of criminal offenses, without affecting its legitimate use more than is strictly necessary. [...] 17. The power to extend a search to other computer systems should also be applicable when the system is located in a foreign jurisdiction, provided that immediate action is required. In order to avoid possible violations of state sovereignity or international law, an unambigious legal basis for such extended search and seizure should be established. Therefore, there is an urgent need for negotiating international agreements as to how, when and to what extent such search and seizure should be permitted. 18. Expedited and adequate procedures as well as a system of liason should be available according to which the investigating authorities may request the foreign authorities to promptly collect evidence. For that purpose the requested authorities should be authorized to search a computer system and seize data with a view to its subsequent transfer. The requested authorities should also be authorized to provide trafficking data rtelated to a specific telecommunication, intercept a specific telecommunication or identify its source. For that purpose, the existing mutual legal assistance instruments need to be supplemented. [...] The document does also include a few less ominous points, such as: 2. Criminal procedure laws should permit investigating authorities to search computer systems and seize data under similar conditions as under traditional powers of search and seizure. The person in charge of the system should be informed that the system has been searched and of the kind of data that has been siezed. The legal remedies that are provided for in general against search and seizure should be equally applicable in case of search in computer systems and in case of seizure of data therein. But, in general, the document appears almost as if written to be a police and intelligence agency wishlist, assaulting encryption and several other aspects of privacy. The proposal amounts to a call for a pan-European "Digital Telephony"-style surveillance network, where no system is secure, where no parties are unidentified, and in which all participant actions are logged and trackable, with all system operators required to yield such information to authorities, even foreign police or intelligence agencies. How did this happen? Unconfirmed reports indicate that many representatives on this advisory body, such as the Finnish assistant director of Criminal Police (a rather Freudian title...), support "extremely broad powers for the police" according to one commentator, and shouted down more moderate members of the panel, such as the Norwegian representative, while representing their personal pro-police-state views as typical of their entire government - even though the matter is currently, and has been for two years, under debate in the Finnish government, for example, and is hardly a settled policy issue. An EFF boardmember was told by a White House official that the Clinton Administration is leaning heavily on foreign governments, especially those in Europe, to implement restictions on strong encryption and to push for key "escrow". This is not really news - other Executive Branch statements have said as much in the past, but it is clear that the demise of Clipper as a workable system has done little to slow down the Administration's ardent desire to wiretap the world. It seems likely that the European recommendations may be due in part to this pressure. It is not presently clear how much, if any, real weight with European policy makers the Committee of Ministers' recommendations will have. The Council of Europe has no legislative power, either in members' individual nations, or at the European Union level, unlike the European Commission. However, Peter Csonka, the chairman of the committee that drafted the document (and an administrative officer at the Council's division of crime problems) says, "it is rare for countries to reject Council of Europe recommendations", according to an article in _Communications_Week_International_. The article also suggests that the Council recommendations were intended to roughly coincide with a Commission proposal for a pan-European encryption standard. We currently do not have any information on any such standard proposal, and the _CWI_ article had several errors in it, so this is to be taken with a grain of salt. Contrary to the _CWI_ report, the Council recommendations do not call directly for a crypto ban, or key "escrow", only for weak encryption and some kind of law enforcement access to keys (and only if you interpret it that way.) The _CWI_ article, for whatever it might be worth, also reports that opposition to this measure was expressed by Mike Strezbek, VP responsible for European telecomms at JP Morgan, who said that his organization "will challenge any attempt to limit the power of our network encryption technologies very strongly". It also noted that "Czonka said that the Council had given consideration to business interests but had tried to strike a balance between privacy and justice." However, "it remains possible that cryptography is available to the public which cannot be deciphered. This might lead to the conclusion to put restrictions on the possession, distribution, or use of cryptography." The source document of these statements is not current know to us. A correspondent, Ross Anderson, warns that apparently another international organization, the OECD, has called a conference of its members in December to devise a strategy on encryption. It's clear that many pieces are missing from this picture. Any info our readers might have that can shed some light on the dark spots will be appreciated. What news we do have is fairly disturbing and certainly cause for concern. You can examine the full text of the recommendations at: ftp.eff.org, /pub/Global/Multinational/Privacy/ gopher.eff.org, 1/Global/Multinational/Privacy http://www.eff.org/pub/Global/Multinational/Privacy/ ------------------------------ Subject: Newsbytes ------------------ * EFF Update We apologize for any delays that new members experience in having their memberships processed. We'll be catching up on the backlog shortly! We've also made a shorter and more convenient membership form (available at http://www.eff.org/pub/EFF/join.eff). Other membership changes include expansion of the sysop membership category to include others who want to do EFF membership recruiting, and expansion of the student membership category to also include those with low incomes. Sysop/recruiter members may renew at sysop/recruiter rates for the time being, regardless of whether they can show that they've fulfilled the recruiting requirement. We did not have a workable system in place to keep track of sysop member recruitment, so until we do, we'll just take your word for it. We furthermore apologize for an error in one of our site indexes. As a visitor noted, we had improperly identified "militia" and "terrorist" in a file description. This has been fixed. EFF has no position on militia issues (other than attempts to broaden censorship and surveillance on the pretext of alleged links between militias and terrorism. For more information on such moves by legislators and agencies, keep an eye on http://www.eff.org/pub/Censorship/Terrorism_militias.) As noted in the index file, materials on both topics are housed in the same directory since the tactics and rhetoric of regulators pushing for censorship using "terrorism" on the one hand, or "militias" on the other is remarkably similar. * EFF's Farber Wins ACM SIGCOMM Award for Lifelong Contribution to Networking Professor David Farber is the winner of this year's ACM SIGCOMM (Special Interest Group in Data Communications) award for lifelong contribution to data networking. He was presented this award during the ACM SIGCOMM 1995 conference to held Aug 28 to Sep 1 1995. David J. Farber has been a Professor in the Computer and Information Science Department at the University of Pennsylvania since 1987. He received his B.S. in Electrical Engineering and an M.S in Mathematics from the Stevens Institute of Technology in 1956 and 1962 respectively. He is a member of the American Association for the Advancement of Science (AAAS); Association for Computing Machinery (ACM) and the Institute of Electrical and Electronics Engineers (IEEE). He is also on the Board of Directors of the Electronic Frontier Foundation. Prof. Farber is a co-founder of the CSNET national research network. He worked in the early 1970's on ring networks and in the early 80's proposed MEMNET, one of the first distributed shared memory networks. He is one of the Principal Investigators on the AURORA gigabit testbed. Prof. Farber's current research interests are in high speed communication networks, distributed computing, operating systems, distributed collaboration, and microprocessor architecture. * Clinton Administration Lied About Clipper Being Voluntary - Proof! Newly-released government documents show that key federal agencies concluded more than two years ago that the "Clipper Chip" encryption initiative will only succeed if alternative security techniques are outlawed. The Electronic Privacy Information Center (EPIC) obtained the documents from the Federal Bureau of Investigation under the Freedom of Information Act. EPIC, a non-profit research group, received hundreds of pages of material from FBI files concerning Clipper and cryptography. The conclusions contained in the documents appear to conflict with frequent Administration claims that use of Clipper technology will remain "voluntary." Critics of the government's initiative, including EPIC and EFF, have long maintained that the Clipper "key-escrow encryption" technique would only serve its stated purpose if made mandatory. According to the FBI documents, that view is shared by the Bureau, the National Security Agency (NSA) and the Department of Justice (DOJ) as a whole. In a "briefing document" titled "Encryption: The Threat, Applications and Potential Solutions," and sent to the National Security Council in February 1993, the FBI, NSA and DOJ concluded that: Technical solutions, such as they are, will only work if they are incorporated into *all* encryption products. To ensure that this occurs, legislation mandating the use of Government-approved encryption products or adherence to Government encryption criteria is required. Likewise, an undated FBI report titled "Impact of Emerging Telecommunications Technologies on Law Enforcement" observes that "[a]lthough the export of encryption products by the United States is controlled, domestic use is not regulated." The report concludes that "a national policy embodied in legislation is needed." Such a policy, according to the FBI, must ensure "real- time decryption by law enforcement" and "prohibit[] cryptography that cannot meet the Government standard." The FBI conclusions stand in stark contrast to public assurances that the government does not intend to prohibit the use of non-escrowed encryption. EPIC has recently also filed a brief in support of CPSR's FOIA lawsuit against NSA, seeking allegedly improperly classified NSA documents on Clipper. EFF boardmember John Gilmore and his attorney, Lee Tien have also filed related FOIA requests and lawsuits against NSA and other agencies. [Largely excerpted with minor edits from EPIC press releases.] The full version of the EPIC statements & Brief, and documents from the CPSR and Gilmore/Tien cases, are available at: ftp.eff.org, /pub/Activism/FOIA/Clipper_FOIA/ gopher.eff.org, 1/Activism/FOIA/Clipper_FOIA http://www.eff.org/pub/Activism/FOIA/Clipper_FOIA/ For more information, see also: http://www.epic.org/crypto/ban/fbi_dox/ * Hints of "OzClipper"? Australian Atty. General's Dept. Wants Key Escrow An attendee, Ross Anderson, of the Queensland U. of Tech. Cryptography Policy and Algorithms Conference in July of this year, reports that Steve Orlowski, Assistant Director, Australian attorney general's department, stated in a presentation, "the needs of the majority of users of the infrastructure for privacy and smaller financial transactions can be met by lower level encryption which could withstand a normal but not sophisticated attack against it. Law enforcement agencies could develop the capability to mount such sophisticated attacks. Criminals who purchased the higher level encryption products would immediately attract attention to themselves." Orlowski also indicated that the Attorney General's office would be intersted in serving as the central federal decryption agency, that banks and other entities using strong encryption should have their crypto keys "escrowed", and that the OECD countries will hold a meeting later this year on cryptography policy. Orlowski, however, curiously noted that encryption has yet to become any kind of problem for law enforcement and that police actually, and effectively, use transactional records and other "traffic analysis" information to nab the bad guys. Anderson also reports that he learned at the conference that the intelligence agencies of several nations have already held a classified crypto-policy meeting in Germany in March, and have agreed to press their governments for laws requiring key escrow and banning strong encryption. * Church of Scientology Cases - Update CoS organizations Religious Technology Center and Bridge Publications continue to pursue legal sanctions against critics, who claim they are posting CoS documents in a fair-use manner. Early this year, RTC and Bridge filed suit against Dennis Erlich, a former Scientology minister, his BBS operator, Tom Klemesrud, and Klemesrud's ISP, Netcom, and convinced a judge to issue a temporary restraining order (TRO) and writ of seizure that allowed CoS to raid the Erlich's home and confiscate what it said were infringing materials and their method of dissemination (Erlich's computer equipment). Later, after instigating a raid on a Finnish anonymous remailer and sending a series of almost identical legal threats to critics posting CoS documents, which the church claims both copyright and trade secret protection for, Bridge and RTC filed similar suits against anti-cult group FACTNet and two of its directors in Colorado, while Bridge separately filed a similar suit against another FACTNet director, Arnie Lerma, on the East Coast, naming the Washington Post and two Post employees as co-defendants. Using the original writ of seizure against Erlich as evidence of the "emergency" nature of their request, CoS convinced both of the other judges to issue similar search-and-seize orders. The FACTNet and Post defendants are all charged with copyright and trade secret violation, just like the Erlich and the other California defendant, but in the more recent cases, the documents in question came from *publicly-accessible court records* from a previous case (CoS Int'l. v. Fishman & Geertz). Aug. 30, Judge Brinkema, presiding over the Virginia case, appeared wrathful at the church's misuse of the writ of seizure, deciding plaintiffs had "unclean hands" in a "dirty search" according to an unofficial transcript (we hope to provide the official court documents shortly). Brinkema rescinded the writ and temporary restraining order against the defendants, and was particularly concerned about the First Amendment implications of the actions against the Washington Post. The judge explicitly permitted fair use by defendants of the documents at issue, and expressed skepticism that CoS would win the larger case itself on the merits of either copyright or trade secret claims. Brinkema also ordered the return of all seized materials. Sept. 12, Judge Kane, presiding over the Colorado case, vacated the writ a judge under him had issued, and he too ruled that until the case begins in earnest, defendants may use the documents within fair use guidelines. Kane found it highly unlikely that CoS would succeed on the merits of its case, and found that the trade secret arguments were particularly weak. Kane reinforced this decision with an order issue 3 days later, after CoS had appealed to a Supreme Court Justice (appeal denied). CoS failed to return all of the seized materials, citing First Amendment religious freedom, but Kane has appointed defense's computer expert witness, at plaintiffs' expense, to examine the materials and provide for return off all seized items, minus the documents at issue in the case, which are to be held in the custody of the court rather than plaintiffs' attorneys. Sept. 22, Judge Whyte finally issued his own ruling in the California case against Erlich, Netcom and Klemesrud. He too vacated the writ of seizure and TRO against the defendants, and did something very uncommon: he questioned the constitutionality of his own orders! Nevertheless, alone of the three judges, Whyte appears to believe that CoS will succeed in its suit on the merits of their copyright argument, though remains skeptical about the merits of the trade secret claim. Whyte was also critical of the internet itself, stating: "The court is troubled by the notion that any Internet user, including those using "anonymous remailers" to protect their identity, can destroy valuable intellectual property rights by posting them over the Internet, especially given the fact that there is little opportunity to screen postings before they are made...The anonymous (or judgment proof) defendant can permanently destroy valuable trade secrets, leaving no one to hold liable for the misappropriations...Computer files can be easily uploaded and copied from one location to another and are easy to transport, conceal or delete. The ability of users to post large amounts of protected works nearly instantaneously over the Internet makes it a rather dangerous haven for copyright infringers." But this isn't all that's been happening. CoS-unfriendly posts to the Usenet newsgroup alt.religion.scientology (and many other newsgroups including comp.org.eff.talk) are being cancelled frequently by an anonymous person or persons, dubbed the "CancelPoodle". Some critics allege that CoS itself is doing this. One a.r.s. participant who received a legal threat from CoS lawyers also alleges that CoS private investigator Gene Ingram, wanted in at least one state on felony charges, attempted to frame him for "terrorist acts". Others report dissimilar but equally strange harassment. Worse yet, the raid have not only not stopped, but spread back across the Atlantic. Dutch Internet access provider XS4All was raided after the same documents central to the FACTnet and Washington Post cases were posted to an XS4All user's WWW pages. CoS had demanded the removal of the material, and XS4All complied, but somehow they were able to convince the Netherlands authorities to permit search and seizure of XS4All's computers anyway. Dutch journalist Karin Spaink suggests in a recent article that the real reason for the raid "probably was that a former XS4ALL-based remailer had been used to post anonymously in a.r.s." Dutch Internetters appear to be almost uniformly outraged at the CoS seizure action, and copies of the documents that sparked the raid, the "Fishman Declaration", which contains copies of "secret" CoS religious works, have spread like wildfire among Dutch WWW pages and other sites around the world, from China to Australia. This protest action has even been joined by noted European author Marcel Moring, Dutch Member of Parliament Oussama Cherribi, and a national television network, among at least 70 other sites in Holland. Oussama compared the situation to the Salman Rushdie affair, and a newpaper reported that he "will not remove the documents from his homepage until a Dutch court rules that he has to." Another Parliament Member has sent queries to the Dutch Justice Dept. asking if they are aware of the events, and whether Justice agrees that system operators need extra legal protection, and will work to "remedy the currently unclear legal position of Internet providers". CoS continues to mail legal threats to the Dutch users and their service providers, to date without much apparent effect. For every "Fishman" site that goes down, several more pop up. For more information on these increasinly convoluted cases and events, see: ftp.eff.org, /pub/Legal/Cases/Scientology_cases/ gopher.eff.org, 1/Legal/Cases/Scientology_cases http://www.eff.org/pub/Legal/Cases/Scientology_cases/ * ALERT: SEC EDGAR Database Endangered by Lobbyists September 28, the Securities and Exchange Commission (SEC) began providing Internet access to the EDGAR database, at http://www.sec.gov/ - the datbase was oringially administered by the Internet Multicasting Service, but SEC has finally agreed to make it's own records avialable to the public. Early in August, Internet Multicasting Service (IMS) announced that it was ending its NSF-funded free dissemination of EDGAR filings from its town.hall.org site on October 1, 1995. On July 27, 1995 a bill was introduced in the House of Representatives to privatize the EDGAR system. On Aug. 14th, the SEC held a meeting on the future of EDGAR, and there was a great deal of support for the free NYU/IMS EDGAR dissemination project. To their credit, SEC announced that it would find a way to continue a free Internet dissemination program for the EDGAR data, and did just that, establishing the www.sec.gov system. Lobbyists for the Information Industry Association (IIA) have actively opposed this project and are working actively to have it killed. If you have opinions on the issue, it is crucial that you make your views known by writing to Chairman Levitt of the SEC in care of: sec@town.hall.org EDGAR on the Internet began two years ago as a trial project with New York University and the non-profit Internet Multicasting Service. Over 3 million documents were distributed and the current rate of access is over 17,000 documents per day. The Internet database makes key financial information available to people who did not have it before: students, public interest groups, senior citizen investment clubs, and many others. Lobbyists contend that free access to simple keyword searches and unprocessed bulk databases threatens the retail information industry. Those concerned about public access to governement information believe that the opposite is true: free access to raw data expands the market of potential users. Evidence of this is that Moody's, RR Donnelley, and Disclosure all signed contracts offering to help the Internet Multicasting Service, provide the EDGAR material. There is still a crucial role for the information industries. They provide value added in the form of real- time access, extensive historical databases, consulting, re-formatted documents, and extracts of key portions of documents. However, putting raw data on the Internet 24 hours after publication is *not* value added and the companies that will thrive in the information age do not view this as a threat. This issue is a key test of the Republican "Contract With America". The Paperwork Reduction Act, which took effect on October 1, was a key part of the "Contract" and stated that government data should not be made available at inflated prices to a few special interests. The SEC EDGAR project carries out the provisions of that law that state that data *must* be available through a "diversity of public and private sources" and the public must get access to key government databases in a "timely and equitable manner." The EDGAR database is not a product to be auctioned off to the highest bidder: it is fuel for the information economy. The non-profit public interest group Taxpayer Assets Project (TAP) calls EDGAR "the world's most important and valuable database of financial information." If you feel strongly for or against this project, you should let your views be known now. [Largely excerpted, with minor edits, from a Internet Multicasting Service action alert by Carl Malamud, and a TAP update.] * Coming Next Issue... Cincinnati BBSers Fight Back Stratton Oakmont & Porush v. Prodigy - Update International Online Child-Porn "Ring" Target of "Operation Starburst" Canadian Prosecutions for Textual & Faked "Child Pornography" Canadian Exon-alike on the Way? Commerce Dept. IPWG Report on Online Intellectual Property Meets Resistance Canada & Holland Ratchet-up Privacy pgp.net - New World-Wide PGP Keyservice Swiss Data Protection Commish Warns About Lack of Security Bulgarian TV Censorship and more of course. ------------------------------ Subject: Upcoming events ------------------------ This schedule lists events that are directly EFF-related. A much more detailed calendar of events likely to be of interest to our members and supporters is maintained at: ftp.eff.org, /pub/EFF/calendar.eff gopher.eff.org, 1/EFF, calendar.eff http://www.eff.org/pub/EFF/calendar.eff Oct. 10- 11 * US NII Advisory Council meeting; Pittsburgh, Penn. Open to the public; members of this civilian council include EFF board members Esther Dyson and David Johnson. Contact: +1 212 482 1835 (voice) Oct. 13 * Seminar on Forecasting the Technological Future in Information Systems; Annenberg School of Communication Public Policy Center, U. of Pennsylvania. Speakers include EFF co-founder Mitch Kapor. Contact: +1 215 898 7041 (voice; ask for Oscar Gandy) Oct. 19 * Library Fair 95: Information Access at the Smithsonian Institution Libraries; Smithsonian Ripley Center, Washington DC. Speakers include Shari Steele (EFF Staff Counsel) Email: libem011@sivm.si.edu Nov. 3- 4 * Innovation and the Information Environment Conf.; U. of Oregon School of Law, Eugene, Or. Speakers include Shari Steele (EFF Staff Counsel). Email: kaoki@law.uoregon.edu ------------------------------ Subject: Quote of the Day ------------------------- "Technical solutions, such as they are, will only work if they are incorporated into *all* encryption products. To ensure that this occurs, legislation mandating the use of Government-approved encryption products or adherence to Government encryption criteria is required." - FBI, NSA and Justice Department secret briefing document to the National Security Council, Feb. 1993, "Encryption: The Threat, Applications and Potential Solutions", obtained by Freedom of Information Act lawsuit by EPIC. Find yourself wondering if your privacy and freedom of speech are safe when bills to censor the Internet are swimming about in a sea of of surveillance legislation and anti-terrorism hysteria? Worried that in the rush to make us secure from ourselves that our government representatives may deprive us of our essential civil liberties? Concerned that legislative efforts nominally to "protect children" will actually censor all communications down to only content suitable for the playground? Join EFF! Even if you don't live in the U.S., the anti-Internet hysteria will soon be visiting a legislative body near you. If it hasn't already. ------------------------------ Subject: What YOU Can Do ------------------------ * The Communications Decency Act & Other Censorship Legislation The Communications Decency Act and similar legislation pose serious threats to freedom of expression online, and to the livelihoods of system operators. The legislation also undermines several crucial privacy protections. Business/industry persons concerned should alert their corporate govt. affairs office and/or legal counsel. Everyone should write to their own Representatives and Senators, asking them to oppose Internet censorship legislation, and everyone should write to the conference committee to support the reasonable approaches of Leahy, Klink, Cox and Wyden, and to oppose the unconstitutional proposals of Exon, Gorton and others. For more information on what you can do to help stop this and other dangerous legislation, see: ftp.eff.org, /pub/Alerts/ gopher.eff.org, 1/Alerts http://www.eff.org/pub/Alerts/ If you do not have full internet access, send your request for information to ask@eff.org. * The Anti-Electronic Racketeering Act This bill is unlikely to pass in any form, being very poorly drafted, and without much support. However, the CDA is just as bad and passed with flying colors [the jolly roger?] in the Senate. It's better to be safe than sorry. If you have a few moments to spare, writing to, faxing, or calling your Congresspersons to urge opposition to this bill is a good idea. If you only have time to do limited activism, please concentrate on the CDA instead. That legislation is far more imminent that the AERA. * Find Out Who Your Congresspersons Are Writing letters to, faxing, and phoning your representatives in Congress is one very important strategy of activism, and an essential way of making sure YOUR voice is heard on vital issues. EFF has lists of the Senate and House with contact information, as well as lists of Congressional committees. (A House list is included in this issue of EFFector). These lists are available at: ftp.eff.org, /pub/Activism/Congress_cmtes/ gopher.eff.org, 1/EFF/Issues/Activism/Congress_contact/ http://www.eff.org/pub/Activism/Congress_contact/ The full Senate and House lists are senate.list and hr.list, respectively. Those not in the U.S. should seek out similar information about their own legislative bodies. EFF will be happy to archive any such information provided. If you are having difficulty determining who your Representatives are, try contacting your local League of Women Voters, who maintain a great deal of legislative information. * Join EFF! You *know* privacy, freedom of speech and ability to make your voice heard in government are important. You have probably participated in our online campaigns and forums. Have you become a member of EFF yet? The best way to protect your online rights is to be fully informed and to make your opinions heard. EFF members are informed and are making a difference. Join EFF today! For EFF membership info, send queries to membership@eff.org, or send any message to info@eff.org for basic EFF info, and a membership form. ------------------------------ Administrivia ============= EFFector Online is published by: The Electronic Frontier Foundation P.O. Box 170190 San Francisco CA 94117 USA +1 415 668 7171 (voice) +1 415 668 7007 (fax) Membership & donations: membership@eff.org Legal services: ssteele@eff.org Hardcopy publications: pubs@eff.org General EFF, legal, policy or online resources queries: ask@eff.org Editor: Stanton McCandlish, Online Services Mgr./Activist/Archivist (mech@eff.org) This newsletter printed on 100% recycled electrons. Reproduction of this publication in electronic media is encouraged. Signed articles do not necessarily represent the views of EFF. To reproduce signed articles individually, please contact the authors for their express permission. Press releases and EFF announcements may be reproduced individ- ually at will. To subscribe to EFFector via email, send message body of "subscribe effector-online" (without the "quotes") to listserv@eff.org, which will add you to a subscription list for EFFector. Back issues are available at: ftp.eff.org, /pub/EFF/Newsletters/EFFector/ gopher.eff.org, 1/EFF/Newsletters/EFFector http://www.eff.org/pub/EFF/Newsletters/EFFector/ To get the latest issue, send any message to effector-reflector@eff.org (or er@eff.org), and it will be mailed to you automagically. You can also get the file "current" from the EFFector directory at the above sites at any time for a copy of the current issue. HTML editions available at: http://www.eff.org/pub/EFF/Newsletters/EFFector/HTML/ at EFFweb. HTML editions of the current issue sometimes take a day or longer to prepare. ------------------------------ End of EFFector Online v08 #16 Digest ************************************* $$