Copy Link
Add to Bookmark
Report
Computer Undergroud Digest Vol. 04 Issue 16
Computer underground Digest Sun Apr 5, 1992 Volume 4 : Issue .16
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
Associate Editor: Etaion Shrdlu
Arcmeisters: Brendan Kehoe and Bob Kusumoto
CONTENTS, #4.16 (Apr 5, 1992)
File 1--Article on Software Patents
File 2--Why form is as important as content
File 3--The FBI Needs Industry's Help--OpEd in NYT
File 4--ACLU's Janlori Goldman's Reply to FBI Proposal (Risks Reprint)
Issues of CuD can be found in the Usenet alt.society.cu-digest news
group, on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG,
and DL0 and DL12 of TELECOM, on Genie, on the PC-EXEC BBS at (414)
789-4210, and by anonymous ftp from ftp.eff.org (192.88.144.4),
chsun1.spc.uchicago.edu, and ftp.ee.mu.oz.au. To use the U. of
Chicago email server, send mail with the subject "help" (without the
quotes) to archive-server@chsun1.spc.uchicago.edu.
European distributor: ComNet in Luxembourg BBS (++352) 466893.
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted as long as the source
is cited. Some authors do copyright their material, and they should
be contacted for reprint permission. It is assumed that non-personal
mail to the moderators may be reprinted unless otherwise specified.
Readers are encouraged to submit reasoned articles relating to
computer culture and communication. Articles are preferred to short
responses. Please avoid quoting previous posts unless absolutely
necessary.
DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.
----------------------------------------------------------------------
Date: Sat, 28 Mar 92 17:35:31 CST
From: Net Wrider <nwrider@uanonymous.uunet.uu.net>
Subject: File 1--Article on Software Patents
The following is available by anonymous FTP from prep.ai.mit.edu
in the pub/lpf directory.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
This article by Brian Kahin appears in the April 1990 issue of
Technology Review (Building W59, MIT, Cambridge MA 02139,
(617)253-8250). It may be copied for noncommercial purposes
provided that it is copied, along with this statement and the bio
at the end of the article, without any modification whatsoever.
(Copyright (C) 1990 by Brian Kahin)
The Software Patent Crisis
An explosion of patents on software processes may radically
change the programming industry--and our concept of human
expression in the computer age.
Last August, Refac International, Ltd., sued six major spreadsheet
publishers, including Lotus, Microsoft, and Ashton-Tate, claiming they
had infringed on U.S. Patent No. 4,398,249. The patent deals with a
technique called "natural order recalc," a common feature of
spreadsheet programs that allows a change in one calculation to
reverberate throughout a document. Refac itself does not have a
spreadsheet program and is not even in the software industry. Its
business is acquiring, licensing, and litigating patents.
Within the last few years, software developers have been surprised to
learn that hundreds, even thousands, of patents have been awarded for
programming processes ranging from sequences of machine instructions
to features of the user interface. Many of the patents cover
processes that seem conventional or obvious, and developers now fear
that any of the thousands of individual processes in their programs
may be subject to patent-infringement claims.
The Refac suit demonstrates the vulnerability of the industry to such
claims. Patent no. 4,398,249 was applied for in 1970, granted in
1983, and only recently acquired by Refac. In the meantime, software
developers have been busily creating spreadsheets and other new
products unmindful of patents. The industry accepted copyright and
trade secret as adequate protection for its products, and most
programmers assumed that patents were not generally available for
software.
Never before has an industry in which copyright was widely established
suddenly been subjected to patenting. As it is, only a few companies
that create microcomputer software have the resources to try to defend
against patent infringement claims. Most small firms will be forced
to pay license fees rather than contest the claims, even though many
software patents may not stand up in court.
In the long run, the costs of doing business in a patent environment
will radically restructure the industry. Many small companies will
fold under the costs of licensing, avoiding patent infringement, and
pursuing patents defensively. The individual software entrepreneur
and inventor may all but disappear. There will be fewer publishers
and fewer products, and the price of software will rise to reflect the
costs.
Especially disturbing is that the broad claims of many recent software
patents appear to establish monopolies on the automation of such
common functions as generating footnotes and comparing documents.
Some claims even cover processes for presenting and communicating
information, raising troubling questions about the effect of patents
on the future of computer-mediated expression.
Patent vs. Copyright
Software patents, like all patents, give an inventor the right to
exclude all others from making, selling, or using an invention for 17
years. In return, the patentee discloses his or her "best method" of
implementing the invention, thereby relinquishing trade secrets that
might otherwise be enforced forever (like the formula for Coca-Cola).
To obtain a patent, an applicant must convince Patent Office examiners
that the invention would not be obvious to a "person of ordinary skill
in the art" who is familiar with all the "prior art," which includes
previous patents and publications. In contrast, copyright inheres in
books, poems, music, and other works of authorship, including computer
programs, from the moment they are created. Registering one's work
with the Copyright Office is a simple, inexpensive procedure that has
important benefits (it is a precondition for filing suit, for
example), but the copyright itself is automatic when the work is fixed
on paper or on disk.
Copyright and patent protect different things. Copyright
protects expression but not underlying ideas. Patents protect
useful processes, machines, and compositions of matter.
Traditionally "processes" have included methods of physically
transforming materials but not business methods or mental steps.
Thus, computer programs fall somewhere between the traditional
territories of copyright and patent.
>From the 1960s to the early 1980s, the Patent Office and the
courts grappled with the question of whether algorithms--the
elemental processes on which computer programs are built--are
patentable as either processes or machines. Early on, the
Patent Office granted some patents for processes built into
computer hardware that today would be contained in software, but
it was reluctant to grant patents for programs per se. As the
1966 Report of the President's Commission on the Patent System
pointed out, the Patent Office had no system for classifying
programs. The report also noted that even if this were remedied,
the volume of programs being created was so enormous that
reliable searches of "prior art" would not be feasible or
economical.
However, the Court of Customs and Patent Appeals (CCPA)
maintained that computer programs were patentable and overturned
numerous Patent Office decisions denying patentability. The
Supreme Court vindicated the Patent Office in two decisions,
Gottschalk v. Benson (1972) and Parker v. Flook (1978), holding
that mathematical algorithms were not patentable subject matter.
Still, the CCPA continued to uphold patentability in other cases.
Finally, in Diamond v. Diehr (1981), a sharply divided Supreme
Court upheld the patentability of a process for curing rubber
that included a computer program. The majority concluded that
programs that did not preempt all uses of a computer algorithm
could be patented--at least when used in a traditional process
for physically transforming materials.
That case has been the Supreme Court's last word on the subject.
But despite the narrowness of the ruling, the Patent Office
underwent a radical change of heart. Until very recently, there
were no reported appeals of adverse Patent Office decisions,
leading observers to conclude that the office was eventually
granting almost all applications for software patents. Although
articles began appearing in legal periodicals a few years ago
noting that patents were being routinely granted for many
software processes, not until 1988 did the industry realize that
the rulBY':. +)c{asp|3oz5&%bhqXG=Rz86JAUWdVR*`3Irdle of
the game. By the spring of 1989, the patents that entered the
pipeline after Diamond v. Diehr were starting to flow out in
significant numbers--by one count, nearly 200 in the first four
months of that year.
Processing Problems
Unfortunately, the Patent Office classification system remains
unchanged, and the volume of software being created has grown
exponentially. This makes searching for prior art--processes
already in public use--time-consuming and expensive.
The search is extraordinarily difficult because the field's
printed literature is thin and unorganized. Software documents
its own design, in contrast to physical processes, which require
written documentation. Also, software is usually distributed
without source code under licenses that forbid reverse
engineering. This may amount to suppressing or concealing the
invention and therefore prevent the program from qualifying as
prior art. The search for prior art may require securing oral
testimony from people who developed software at universities many
years ago, an expensive proposition.
Many programmers suspect that patent examiners lack knowledge of
the field, especially since the Patent Office does not accept
computer science as a qualifying degree for patent practice (it
accepts degrees in electrical engineering). Moreover, attracting
and holding individuals with expertise in a field like software,
where industry demand is high, is not easy for a government
agency. Less qualified examiners create problems because they
naturally have a lower standard in determining the hypothetical
"person having ordinary skill in the art," and are thus more apt
to grant patents for obvious processes. Since the examination
process is conducted ex parte (as a private matter between the
Patent Office and the applicant), less qualified personnel are
also more likely to be influenced by sophisticated patent
attorneys and the apparent expertise of the applicant.
The quality of software patents being awarded has aroused
concern even among patent lawyers and other advocates of the new
regime. But it will be left to firms being sued for infringement
to prove that a process should not have been patented because it
was obvious in view of the prior art. Meanwhile, software
patents stand as intimidating weapons for those who hold them.
Restructuring the Industry
Perhaps because of some of these problems, applications for
software patents take an average of 32 months to be approved and
published. That's significantly longer than the overall average
of 20 months, and a very long time given the short product cycles
of the software business.
Unlike copyright, independent creation is irrelevant to patent
infringement. Every developer is charged with knowledge of all
patents. Even if someone is not aware of a patent, he or she can
still infringe against it. Furthermore, patent applications and
the examination process are confidential, so there are ordinarily
several years of patents in the pipeline that no search will
reveal. Although no infringement occurs until the patent issues,
an inventor may find that a newly awarded patent covers a feature
he or she has already incorporated and marketed in a finished
product. While this is a problem for the patent system as a
whole, it is intolerable for software developers because of the
industry's rapid pace of innovation and long patent-processing
period.
The problem is compounded by the fact that a modern software
package may contain thousands of separately patentable processes,
each of which adds to the risk of infringing patents that are
already in the pipeline. Since software functions are
interdependent and must be carefully integrated, developers can
find it difficult to excise a process built into the original
program.
The patent system exacts a high penalty in an industry as
decentralized as software. Programming requires no special
materials, facilities, or tools: to design software is to build
it. Because barriers to entry are low, the industry attracts
many small players, including hundreds of thousands of
individuals who work as consultants or short-term employees.
Rather than a handful of competitors working on the same problem,
there are likely to be dozens, hundreds, even thousands. Since
under the patent system one winner takes all, many
others--including developers without lawyers--are deprived of
the fruits of their independent labor and investments.
Patent proponents argue that this uninhibited duplication of
effort wastes resources. But the "waste" could be cut only by
reducing the number of players and slowing the pace of
development to fit the cycles of the patent system. The result
would be a handful of giants competing on a global scale, bidding
for the ideas and loyalty of inventive individuals.
However, many programmers believe that there are diseconomies of
scale in software development--that the best programs are
authored rather than assembled. The success of Visicalc, Lotus
1-2-3, WordPerfect, and other classic programs testifies to the
genius of individuals and small teams. Certainly there has been
no evidence that they need more incentives. Quite the contrary,
the freewheeling U.S. software industry has been a model of
creative enterprise.
A Costly System
Even software developers and publishers who do not wish to patent
their products must bear the costs of operating under a patent
system. While these costs may initially come out of the software
industry's operating margins, in the long run, they will be borne
by users.
At the first level is the expense of analyzing prior art to avoid
patent infringement. A precautionary search and report by
outside patent counsel can run about $2,000--that's per process,
not per program.
Next are the direct costs of the patent monopoly--the license
fees that must be paid to patent holders. If the patent holder
refuses to license at a reasonable fee, developers must design
around the patent, if that is possible. Otherwise, they must
reconceive or even abandon the product.
The third set of costs are those incurred in filing for patents.
Searching for prior art, plus preparing, filing, negotiating, and
maintaining a patent, can total $10,000 to $25,000, not including
internal staff time. Seeking foreign patents can make the bill
substantially higher.
The notoriously high costs of patent litigation must be borne by
both sides. Just the discovery phase of a lawsuit is likely to
cost each side a minimum of $150,000, and a full trial can cost
each from $250,000 to millions. Again, these figures do not
include internal staff time, which could easily double the real
cost. While a small patent holder may be able to secure a law
firm on a contingency basis or sell an interest in the patent to
speculators, the defendant has no such options.
Litigation also involves the possibility and further expense of
an appeal. All appealed patent cases now go directly to the
Court of Appeals for the Federal Circuit (CAFC, successor to the
CCPA), where panels in patent cases are usually led by patent
lawyers turned judges. Whereas patents once fared poorly on
appeal, the CAFC has found patents to be both valid and infringed
in over 60 percent of the cases that have come before it. The
CAFC has greatly strengthened the presumption of patent validity
and upheld royalties ranging from 5 to 33 percent.
While a large software company may be able to absorb these costs,
they will disproportionately burden smaller companies. The first
to suffer will be independent developers who cannot afford to
market their own products. These developers typically receive
royalties of 10 to 15 percent from publishers who serve as their
distributors. Such modest margins, out of which developers must
recoup their own costs, would be wiped out by the need to pay
royalties to a few patent holders.
The high costs of a patent environment give patentees
considerable leverage over small firms who will, as a practical
necessity, pay a license fee rather than contest a dubious claim.
To establish credibility, the patentee will settle for small fees
from the initial licensees. The patent holder can then move on
to confront other small firms, pointing to such licensings as
acknowledgments of the patent's validity and power. This tactic
has a snowballing effect that can give the patent holder the
momentum and resources to take on larger companies.
Cross-licensing--where firms secure patents to trade for the
right to other patents--seems to work reasonably well in many
industries and has been touted as the answer to these problems.
However, cross-licensing is of little value to smaller companies,
which have little to bring to the table. And cross-licensing may
prove of limited value even to large companies, since it does not
protect against companies like Refac that have no interest in
producing software and therefore no need to cross-license.
Of course, the power that software patents afford may induce some
venture capitalists to invest in them. But investing in software
patents is one thing; investing in robust, complex products for a
mass market is another.
In fact, software publishers hold very few patents. The vast
majority are held by large hardware companies, computer
manufacturers that have in-house patent counsel and considerable
experience in patenting and cross-licensing. Nearly 40 percent
of the software patents that the U.S. Patent and Trademark Office
now issues go to Japanese hardware companies. It is quite
possible that the separate software publishing industry may cease
to exist as companies find that they need the patent portfolios
and legal resources that the hardware giants can provide. The
result will be a loss of diversity in software products, reduced
competition, and, many believe, a less productive software
industry.
Protecting Ideas and Information
A deeper, more disturbing problem in patenting programs was
barely evident before computers became ubiquitous personal tools
and software became infinitely versatile. More than a
"universal machine," the computer has developed into a medium for
human expression and a mediator of human experience. Software is
designed to satisfy specific needs for shaping and delivering
information. Thus, what is increasingly at stake in software
patents is the generation and flow of information. This becomes
more threatening when the claims in a patent extend far beyond
the disclosed means of implementation to cover general ideas.
Broad patent claims covering abstract processes are not limited
to software, or even to computer hardware. Consider patent no.
4,170,832, granted in 1979 for an "interactive teaching machine."
The patent discloses a clumsy-looking combined videotape deck and
television with a set of push buttons.
The patent includes a process claim for a procedure commonly used
in interactive video: showing an introductory video segment,
presenting the viewer with a limited number of choices,
registering the viewer's decision, and then revealing the likely
outcome of that decision. The disclosed machine, which was never
marketed, contributes nothing to the public domain: it simply
reveals one person's way of implementing a basic instructional
technique.
In a notorious 1983 case, a federal district court upheld the
patentability of Merrill Lynch's Cash Management Account system,
a procedure for moving investment funds among different types of
accounts. Acknowledging that the system--essentially a method of
doing business--would not be patentable if executed with pencil
and paper, the court nevertheless upheld the patent because it
made use of a computer.
The Patent Office has taken this principle one step further.
Besides granting monopolies on new procedures such as the Cash
Management Account system, the office is also awarding patents
merely for automating familiar processes such as generating
footnotes (patent no. 4,648,067) and comparing documents (patent
no. 4,807,182). But software developers have been routinely
automating such common office functions, bookkeeping procedures,
learning strategies, and modes of human interaction for years.
The principle that patents are granted to induce inventors to
disclose trade secrets has no relevance here. These processes
are part of everyday life, and can and should be computerized in
a number of ways.
What's more, information per se is traditionally the substance
and territory of copyright. The intelligent ordering of
information is the very heart of grammar, rhetoric, and graphic
design.
Why should information be subject to the pervasive restraints of
patent simply because it is interactive rather than linear?
Should human expression that is assembled, communicated, or
assimilated with the aid of a computer be restrained by patents?
If the computer is seen as an extension of the human mind rather
than vice versa, the answer is no.
Changing Patent Policy
Software developers who understand the impact of patents are
demoralized. Lawyers assure them that patents are here to stay,
and that programmers must seek new patents to protect against
other patents. These lawyers point to the growing torrent of
software patents, the presumption of patent validity, and the
fervidly pro-patent record of the Court of Appeals for the
Federal Circuit. Smaller companies that cannot afford this
advice can only hope that companies with deeper pockets will
afford more visible and attractive targets for patent holders
bringing suit.
But the narrowness of the Supreme Court decision in Diamond v.
Diehr remains. The Court never explicitly rejected the
traditional doctrines against the patentability of mental steps
and business methods, doctrines that may yet defeat many of the
patents that have issued. If the hue and cry grows, Congress
could amend the Patent Act to make it clear that the scope of
patenting is still limited to physical processes.
The software industry was not broke, but it is in the process of
being "fixed." The question is whether the fixing will be done
by the gush of awards from private proceedings in the Patent
Office--or by a public decision about whether software patents
serve "to promote the Progress of Science and useful Arts," as
the Constitution requires.
+++++++++++++++
Brian Kahin is an attorney specializing in information technology
and policy. An adjunct research fellow in the Science,
Technology and Public Policy Program at Harvard University's
Kennedy School of Government, he was formerly affiliated with the
MIT Research Program on Communications Policy and the MIT
Communications Forum. He is a graduate of Harvard College and
Harvard Law School.
------------------------------
Date: Thu, 26 Mar 92 11:20:08 EST
From: ulowell!p30.f30.n231.z1.fidonet.org!Dave.Appel%harvard@HARVUNXW.BITNET
Subject: File 2--Why form is as important as content
I'd like to pass a message on to authors who write for electronic
newsletters: If you make your article easy to read, you will get
more people to read it.
I've been reading electronic news in the form of computer
bulletin boards and electronic newsletters since 1986. At first
I mainly saw technical and hobbyist communication, but BBS and
Usenet readership has changed. Your communications can no longer
be directed solely to tech-weenies and computer-nerds. You must
include a wide cross section of non-technical society as well.
Your audience is wider than you think. For example, I get CUD
from a BBS with a Usenet feed, and then distribute it to 4 other
bulletin boards in town. When I see something very important,
I'll post a message in the city-wide echo conference (25 BBSs)
referring people to an article in CUD###.ZIP on such-an-such BBS.
And, I know other folks in other cities do this too.
QUESTION:
What can you do to get more people to read what you write?
ANSWER:
****----> MAKE IT EASIER TO READ <----****
QUESTION:
How do you make it easier to read?
ANSWER:
Form, format (pretty-printing and line length), good
sentence structure, short well-constructed paragraphs,
correct grammar, correct spelling, syntax ... all those
things that made you hate your high school sophomore
English teacher.
Yes, this stuff does make an article easier to read. And, an
article that is easy to read has a better chance of being read.
One key segment of your audience consists of people, such as
executives or other non-technicals, who won't read "news" on a
monitor or VDT. (Believe it or not, there are a lot of people
who don't work in front of a computer screen.) These people need
to see a hard copy.
Therefore, your article not only has to look good on the screen,
it also has to look good on *PAPER* without reformatting. (You
might come back and say "research has shown that X percent
of readers read it online." But 100 minus X percent don't. And
VIPs, the ones you want to convince and motivate the most, don't.
To those people hard copy is not only easier but carries more
impact than the ethereal electronic version.)
Additionally, those who read the hardcopy version probably don't
have access to e-mail to easily respond to surveys about how and
where they read it. There is a vast silent readership out there.
And the better your article looks on paper, the larger that
readership will be.
Here we go.
LINE LENGTH:
Long lines are harder to read than short lines. Just because you
have 80 columns on the screen doesn't mean that line length has
to extend that far. Printed magazines usually have three columns
per page, sometimes more, always at least two.
I suggest a maximum of 65 characters for line length. It's
easier to read on the screen, and will give a print-out big 1"
margins when printed on standard 8.5" x 11" paper in a standard
pica (10 pitch, 12 point) font. BIG margins make it easier to
read.
Magazine editors have a formula for determining the optimum line
length:
O = lca x 1.5
Mn = O - 25%
Mx = O + 50%
Where O= optimum line length and lca = lower case alphabet length.
In essence, this formula says that a the best length for a line
is one and one half times the length of all of the lower case
letters printed next to each other, give 50% or take 25%.
Example:
I see your article online. I like it, believe it, and want to
act on it. You've convinced me. But I'm staff, not management.
I have to make a hard copy of your article, or the whole
newsletter, and present it to management. Anyone who has
presented reports to management knows that looks count.
But I can't just shoot it out to the printer in a nice 11 or 12
point font and maintain decent margins. I have to remove the
hard carriage returns, but not all of them, to reformat
paragraphs. Headers, quotes, tables, outlines, and indented
paragraphs need the hard returns left in. So neither standard
search-and-replace nor conversion programs will work 100%. It's
a hand job. Now it's going to take me 15 to 20 minutes in a
word-processor before I can print it out and hand it to my boss.
Multiply that by the 100 or 1000 people around the world who
might want to show your important article to their boss.
SENTENCE LENGTH:
Sentence length needs to be varied similar to how a story-teller
or a comedian varies the pace. This keeps the audience or reader
from getting bored. If all the sentences are of equal length it
gets rhythmic and monotonous. Very long sentences are hard to
understand.
PARAGRAPH LENGTH:
Long paragraphs make a page look gray, and make it harder to
read. Long paragraphs are visually unpleasant. White space is
needed to break it up.
A paragraph should contain just one thought and be small enough
to be easily understood. If your thought takes too long to
explain, break it up into smaller pieces. More complex material
needs shorter elements to be easily understood. Paragraph length
affects the eye-strain, attention span and fatigue level of your
reader, which in turn affects whether he will finish reading it.
ORGANIZATION:
Good organization can be summarized in three easy steps:
1) Thesis
2) Body
3) Conclusion
Tell the reader what you're going to tell him. Expound upon it
and make your points. Then recap what you said. The reader
should not have to read three or four paragraphs down to find out
what you are writing about. Most people just read the first
paragraph to find out if they want to read the rest of article.
If you don't hook them in the first paragraph, you've lost them.
SPELLING, GRAMMAR, ETC:
Just between us, I don't care if you make typos. You don't care
if I make typos. However, errors stick out like a sore thumb to
scholars, businessmen and management types.
Spelling and obvious grammar or usage errors give the
impression that you aren't serious about what you are writing.
Such errors indicate that you didn't take the time to give your
piece a professional appearance. These errors give people who
don't know you the impression that you aren't as intelligent as
you really are.
Besides, a four star restaurant does not serve haute cuisine on
paper plates. You don't package a diamond ring in an old cigar
box. If your piece is important, you need to make it look
important.
HOW TO DO IT:
First, check your work yourself, keeping in mind the above
suggested guidelines. Proof it two or three times, then run it
through spelling and grammar checkers if possible.
If your piece is very important, ask a friend to look it over.
If your piece is of the utmost importance, ask someone with
professional editing or proofreading experience to look it over.
Even professional writers admit that proofing and final editing
one's work is best done by someone else. Other people can point
out things in your writing that you don't see.
Most spelling and grammar checkers don't point out such usage
errors as "there" instead of "their" or "they're." It takes
careful proofreading two or three times.
An occasional comma splice or run-on sentence will not bother
most readers. But complicated, poorly constructed, or hard to
understand sentences will have the reader shaking his head
wondering what you meant.
If you don't have friends or associates who are good at
proofreading and editing, you can try professional services.
Many editors, proofreaders, typesetters, etc. have started their
own desktop publishing businesses. Even if all you need is
electronic editing, not hardcopy output, those people can help
you polish your work. This will help you get your points across,
and even increase the number of people who read your article.
One such business in Indianapolis is The Electronic Editor BBS at
(317)293-8395, 293-1863 voice. They allow you to upload your raw
copy in practically any format and from any word processor.
Making files "sysop only" insures privacy. Encryption with
PKZIP's password facility prior to upload can guarantee privacy.
Their editors make the edited version of your file available in
encrypted format for download or mail the file back to you on
diskette. Hardcopy laser printer output is optional.
CONCLUSION:
I think that many of the issues discussed in electronic
newsletters such as CUD are important. I'd like to see those
issues taken to the power holders, the movers and shakers, the
corporate executives and the middle managers who run the
institutions in our society.
I see many articles that might be described as diamonds in the
rough. Polishing your articles and formatting them nicely will
go a long way towards:
- increasing your readership
- reaching the important people
- assisting your current readership in re-distributing your
work beyond the electronic community.
You may send comments, questions, flames, to:
Fidonet: Dave Appel @ 1:231/30
RIME: Dave Appel -> IBMNET
Internet: Dave.Appel@f30.n231.z1.fidonet.org
------------------------------
Date: Fri, 27 Mar 92 8:01:39 EST
From: Lance J. Hoffman <hoffman@seas.gwu.edu>
Subject: File 3--FBI OpEd in NYT (Risks Digest Reprint, #3.31)
The debate on (son of) S. 266 and on whether and how to "dumb down"
computer technology to satisfy law enforcement needs is joined in The
New York Times of Friday, March 27, 1992 with articles by William
Sessions, FBI director, and Janlori Goldman, director of the privacy
and technology project of the American
Civil Liberties Union. RISKS readers with an interest (or stake)
should read these articles carefully, and consider responding with
letters to the editor of the New York Times of their own if they have
anything to add. If the technical community wishes to be heard, it
should speak up now. (Letters to their congressional representatives
may not hurt either ;-) ).
Pance Hoffman
Department of Electrical Engineering and Computer Science, The George
Washington University, Washington, D. C. 20052 (202) 994-4955
++++++++++++++++++++++++++++++
>Date: Fri, 27 Mar 92 07:54:31 CST
>From: ks@stat.tamu.edu (Kurt F. Sauer)
>Subject: The FBI Needs Industry's Help--OpEd in NYT
FBI Director William Sessions wrote an interesting op-ed piece in
today's New York Times (Vol. CXLI, No. 48,918, Fri., Mar. 27, 1992, p.
A15) dealing with the problems which federal law enforcement expects
to encounter when placing court-ordered wiretaps on data circuits.
When I read between the lines, it sounds as if Mr. Sessions doesn't
want us to use data security which employs end-to-end encryption;
perhaps other RISKS-DIGEST readers will draw different conclusions.
[Under the rubric "Dialogue/High-Tech Wiretaps"]
Keeping an Ear on Crime: The F.B.I. Needs Industry's Help
By William S. Sessions
Advances in telecommunications technology promise to deprive
Federal, state and local law enforcement officers and the public of
the incalculable benefits that can be obtained only by
court-authorized wire-tapping.
Wiretapping is one of the most effective means of combating drug
trafficking, organized crime, kidnapping and corruption in government.
The Federal Bureau of Investigation does not want the new digital
technology that is spreading across America to impair this crucial
law-enforcement technique. Thus, after consulting with the
telecommunications industry, members of Congress and executive branch
agencies, the Justice Department has proposed legislation that is
intended to preserve the ability of law enforcement officers to
intercept conversations of people engaged in serious crimes.
This bill is consistent with legislation passed in 1968 after
Congress debated the constitutional problem posed by the Government's
need to address both serious criminal conduct and the individual's
right to privacy. Congress struck a balance by passing the Omnibus
Crime Control and Safe Streets Act.
That law and later amendments created the meticulous procedure by
which law enforcement officers obtain judicial authorization for
electronic surveillance. Wiretaps can be used to address only the
most serious criminal, sometimes violent, threats facing society.
Only when a judge is satisfied that all statutory safeguards have been
met and all other reasonable investigative steps have failed or will
likely fail, are taps permitted.
Digital technology makes possible the simultaneous transmission
of multiple conversations and other data over the same lines. The
problem is that voice transmission will soon be replaced by an
endless, inseparable stream of electronic emissions, making it
virtually impossible to capture criminal conversations.
The Federal Bureau of Investigation is not complaining. As the
telecommunications industry develops digital technology, new services
such as Caller ID are becoming available to business and private
customers. The new technology already has provided benefits for the
F.B.I.--for example, it helped solve the bombing of Pan Am Flight 103.
But if digital technology is fully introduced with insufficient
attention to public safety, the effectiveness of law enforcement
officers will be greatly impaired.
As society and technology evolve, so do government's needs and
responsibilities. And, yes, the burden of helping to safeguard the
public often falls on those who make profits from regulated goods and
services. It is reasonable for the telecommunications industry to
come to the aid of law enforcement. The proposed legislation relies
on it to find technical solutions that are cost effective while
permitting the development of its technology. Surely it can do both
in a way that insures its competitiveness.
Indisputably, there will be financial costs associated with
whatever technical solutions the private sector might develop. These
costs cannot be measured only in dollars; consider the price society
would pay if the ability to solve complex crimes were thwarted by an
end to wiretapping. In a recent large-scale military-procurement
fraud case-- which was successful because of wiretaps--the fines,
restitutions, forfeitures and savings to taxpayers exceeded $500
million.
The cost to telecommunications companies would not be so
substantial as to outweigh the consequences of an inability of law
enforcement to act. But if nothing is done soon, as technology
advances and the digital systems become more widespread, the cost of
addressing the issue down the road will undoubtedly increase
dramatically.
The proposed legislation does not expand the authority of the
F.B.I. or any other criminal justice agency. It simply preserves
what Congress authorized in 1968--nothing more.
In recent years, Congress has expanded the Federal criminal
activities for which wiretapping may be obtained. As in 1968, it must
decide if law enforcement should have this invaluable tool available.
I am confident that congress will again support law enforcement by
approving the necessary legislation.
------------------------------
Date: Tue, 31 Mar 92 18:23:41 PST
From: central office <9958@service.com
Subject: File 4--ACLU's Janlori Goldman's Reply to FBI Proposal (Risks Reprint)
>Date: Mon, 30 Mar 92 20:40:26 EST
>From: "Daniel B. Dobkin" <dbd@ans.net>
>Subject: Dumbing down the FBI
Lance Hoffman's posting on Friday mentioned the New York Times Op-Ed
dialogue between FBI Director William Sessions and Janlori Goldman,
director of the ACLU Privacy and Technology Project. Kurt Sauer
posted Director Session's article; at the risk of preaching to the
choir, herewith is Ms. Goldman's reply.
Keeping an Ear on Crime: Why Cater To Luddites?
By Janlori Goldman
The Federal Bureau of Investigation says advances in the
telecommunications industry are likely to make it difficult to use its
old-fashioned wiretapping techniques to listen in on telephone
conversations. The F.B.I.'s solution, in legislation the Justice
Department is asking Congress to pass, is to force the
telecommunications and computer industries to redesign their
modernized systems to accommodate the bureau's needs. Unfairly, the
F.B.I. wants consumers to pay for it through rate increases and higher
equipment costs. The telecommunications and computer industries both
oppose a bill that would mandate such sweeping regulations.
The proposal makes the bureau look like Luddites, the 19th century
English weavers who smashed new machines that they claimed put them
out of work. Instead of keeping up with new developments, the F.B.I.
wants to freeze progress.
It is wrongheaded and dangerous to require the industry to put
surveillance first by slowing innovation and retarding efficiency. How
can the F.B.I. justify this policy at home while the White House is
wringing its hands over U.S. competitiveness in the international
market?
The F.B.I. fears that new digital technology will make it difficult,
even impossible, to listen in on conversations by using traditional
wiretapping equipment. The new technology converts voices and data
into electronic blips and reconverts the blips into voices and data
near the receiving end on high-speed fiberoptic lines.
The bureau overstates its concern. The telecommunications industry
says it is not aware of a single instance in which the F.B.I. has been
unable to tap a line because of the widespread new technology. Even
the Director, William S. Sessions, admitted in a Congressional
hearing last week that no warrant has been issued that could not be
executed.
At issue is the F.B.I.'s ability to wiretap in the future. But the
answer is not a legislative fix that freezes technology. The F.B.I. is
not only asking the industry to dumb down existing software, it wants
to prohibit it from developing new technologies that might interfere
with the Government's ability to intercept various oral and electronic
communications. The proposed restrictions not only cover phone
companies but also on-line computer services (such as as Prodigy and
Compuserve), electronic mail systems and bulletin boards, and
switchboards.
The F.B.I. says its proposal only seeks to preserve its legal
authority to wiretap. Actually, it wants to expand the power of the
Federal Communications Commission, which regulates the
telecommunications industry, to make the F.B.I.'s needs a priority in
designing new technologies. In its legislation, the Government
threatens to impose a $10,000-a-day fine on companies that develop
technologies that exceed the F.B.I.'s technical competence. The
F.B.I. has it backward. If the Government wants to engage in
surveillance, it must bear the burden of keeping pace with new
developments. Last year, Congress appropriated $80 million for a
five-year F.B.I. research effort focused on telecommunications
advances.
There is a serious risk that rollbacks in advances may make
telecommunications networks more vulnerable to unauthorized intrusion.
One of the industry's main goals is to design secure systems that
thwart illegal interception of electronic funds transfers, proprietary
information and other sensitive data.
The F.B.I. is not the only agency trying to block progress. The
National Security Agency has tried to put a cap on the private
development of technology in encryption, the electronic encoding of
data to guard against unauthorized use.
As the private sector develops more effective encryption codes to
protect information in its data bases, the N.S.A. worries that it may
have trouble breaking such codes in its intelligence gathering
overseas. The agency is denying export licenses for certain encryption
codes, thus inhibiting the private sector's development and use of the
technology. Congress should defeat the proposal. Otherwise, we may be
prohibited from erecting sturdy buildings if the thick walls prevent
an F.B.I. agent from eavesdropping on a conversation through a cup
pressed to a wall.
------------------------------
End of Computer Underground Digest #4.16
************************************