Copy Link
Add to Bookmark
Report

Computer Undergroud Digest Vol. 06 Issue 61

  


Computer underground Digest Wed July 6, 1994 Volume 6 : Issue 61
ISSN 1004-042X

Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
Archivist: Brendan Kehoe
Retiring Shadow Archivist: Stanton McCandlish
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Copper Ionizer: Ephram Shrustleau

CONTENTS, #6.61 (Wed, July 6, 1994)

File 1--USACM Calls for Clipper Withdrawal
File 2--Standards
File 3--Re: Ghost in the Modem
File 4--Closure on "Ghost in the Modem" Discussion
File 5--"Repetitive Strain Injury" by Pascarelli
File 6--Response to "Egalitarianism as Irrational" (CuD 5.51)
File 7--Proposed New Zealand legislation
File 8--nonviolent action against Clipper
File 9--Some thoughts on the AA BBS

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send a one-line message: SUB CUDIGEST your name
Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
In ITALY: Bits against the Empire BBS: +39-461-980493

UNITED STATES: etext.archive.umich.edu (141.211.164.18) in /pub/CuD/
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)

JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.

----------------------------------------------------------------------

Date: Thu, 30 Jun 1994 16:35:37 +0000
From: "US ACM, DC Office" <usacm_dc@ACM.ORG>
Subject: File 1--USACM Calls for Clipper Withdrawal

U S A C M

Association for Computing Machinery, U.S. Public Policy Committee

* PRESS RELEASE *

Thursday, June 30, 1994

Contact:
Barbara Simons (408) 463-5661, simons@acm.org (e-mail)
Jim Horning (415) 853-2216, horning@src.dec.com (e-mail)
Rob Kling (714) 856-5955, kling@ics.uci.edu (e-mail)

COMPUTER POLICY COMMITTEE CALLS FOR WITHDRAWAL OF CLIPPER

COMMUNICATIONS PRIVACY "TOO IMPORTANT" FOR
SECRET DECISION-MAKING

WASHINGTON, DC - The public policy arm of the oldest and
largest international computing society today urged the White
House to withdraw the controversial "Clipper Chip" encryption
proposal. Noting that the "security and privacy of electronic
communications are vital to the development of national and
international information infrastructures," the Association for
Computing Machinery's U.S. Public Policy Committee (USACM) added
its voice to the growing debate over encryption and privacy
policy.

In a position statement released at a press conference on
Capitol Hill, the USACM said that "communications security is too
important to be left to secret processes and classified
algorithms." The Clipper technology was developed by the National
Security Agency, which classified the cryptographic algorithm that
underlies the encryption device. The USACM believes that Clipper
"will put U.S. manufacturers at a disadvantage in the global
market and will adversely affect technological development within
the United States." The technology has been championed by the
Federal Bureau of Investigation and the NSA, which claim that
"non-escrowed" encryption technology threatens law enforcement and
national security.

"As a body concerned with the development of government
technology policy, USACM is troubled by the process that gave rise
to the Clipper initiative," said Dr. Barbara Simons, a computer
scientist with IBM who chairs the USACM. "It is vitally important
that privacy protections for our communications networks be
developed openly and with full public participation."

The USACM position statement was issued after completion of a
comprehensive study of cryptography policy sponsored by the ACM
(see companion release). The study, "Codes, Keys and Conflicts:
Issues in U.S Crypto Policy," was prepared by a panel of experts
representing various constituencies involved in the debate over
encryption.

The ACM, founded in 1947, is a 85,000 member non-profit
educational and scientific society dedicated to the development
and use of information technology, and to addressing the impact of
that technology on the world's major social challenges. USACM was
created by ACM to provide a means for presenting and discussing
technological issues to and with U.S. policymakers and the general
public. For further information on USACM, please call (202) 298-
0842.

=============================================================


USACM Position on the Escrowed Encryption Standard


The ACM study "Codes, Keys and Conflicts: Issues in U.S Crypto
Policy" sets forth the complex technical and social issues
underlying the current debate over widespread use of encryption.
The importance of encryption, and the need for appropriate
policies, will increase as networked communication grows.
Security and privacy of electronic communications are vital to
the development of national and international information
infrastructures.

The Clipper Chip, or "Escrowed Encryption Standard" (EES)
Initiative, raises fundamental policy issues that must be fully
addressed and publicly debated. After reviewing the ACM study,
which provides a balanced discussion of the issues, the U.S.
Public Policy Committee of ACM (USACM) makes the following
recommendations.

1. The USACM supports the development of public policies and
technical standards for communications security in open forums in
which all stakeholders -- government, industry, and the public --
participate. Because we are moving rapidly to open networks, a
prerequisite for the success of those networks must be standards
for which there is widespread consensus, including international
acceptance. The USACM believes that communications security is
too important to be left to secret processes and classified
algorithms. We support the principles underlying the Computer
Security Act of 1987, in which Congress expressed its preference
for the development of open and unclassified security standards.

2. The USACM recommends that any encryption standard adopted by
the U.S. government not place U.S. manufacturers at a disadvantage
in the global market or adversely affect technological development
within the United States. Few other nations are likely to adopt a
standard that includes a classified algorithm and keys escrowed
with the U.S. government.

3. The USACM supports changes in the process of developing
Federal Information Processing Standards (FIPS) employed by the
National Institute of Standards and Technology. This process is
currently predicated on the use of such standards solely to
support Federal procurement. Increasingly, the standards set
through the FIPS process directly affect non-federal organizations
and the public at large. In the case of the EES, the vast
majority of comments solicited by NIST opposed the standard, but
were openly ignored. The USACM recommends that the standards
process be placed under the Administrative Procedures Act so that
citizens may have the same opportunity to challenge government
actions in the area of information processing standards as they do
in other important aspects of Federal agency policy making.

4. The USACM urges the Administration at this point to withdraw
the Clipper Chip proposal and to begin an open and public review
of encryption policy. The escrowed encryption initiative raises
vital issues of privacy, law enforcement, competitiveness and
scientific innovation that must be openly discussed.

5. The USACM reaffirms its support for privacy protection and
urges the administration to encourage the development of
technologies and institutional practices that will provide real
privacy for future users of the National Information
Infrastructure.



------------------------------

Date: Mon, 4 Jul 94 11:15:16 EDT
From: Jerry Leichter <leichter@LRW.COM>
Subject: File 2--Standards

Thousands of years ago, King Canute is said to have ordered that the tides
stop coming in; he wanted a standard shoreline. The tides continue to come
in and out as before.

In the early 1980's, the US government, tired of "incompatible" input/output
devices whose cost was much higher than they would have been had the market
not be segmented by connector type, proposed to establish a standard I/O
connection interface for all devices henceforth to be purchased by government
agencies. They chose a well-defined, widely used industrial standard: The
IBM channel connection architecture. Even IBM opposed the establishment of
this standard, on the grounds that it was already on its way to obsolesence.

Starting some time in the late 1970's or early 1980's, the International
Standards Organization, representing many of the worlds governments, began
the development of a series of networking standards intended to define a
future truly open network architecture. Many governments subscribed to
this vision of a soon-to-arrive new world, and established policies that
would require their agencies to purchase only OSI-compatible networking
systems once they became available. The US government was among these.
The standards, however, took many years to arrive - and the implementations,
for the most part, have still not arrived. It's hard to find anyone who
believes that OSI networking will ever play a significant role in the real
world. A few months ago, the US government, tired of granting exceptions to
its OSI requirements so that government agencies could buy equipment actually
available on the market, canceled its OSI mandates.

Undeterred by a history of failures, Wade Riddick, "graduate student ... in
the Department of Government at the University of Texas.... B.A. in English
from Louisiana State University", a computer expert as a result of his reading
of such publications as Byte magazine, proposes in an open letter to Vice
President Gore published in a recent CuD, that the US government establish
a standard for computers, operating systems, user interfaces, compilers, and
who can tell what else. Mr. Riddick, unsatisfied with existing system
architectures, doesn't even propose selecting one of those as the basis for
this standard. No, based on his years of experience in, ahem, English and
government and the reading of Byte magazine, Mr. Riddick even sketches out a
new design of his own. Well aware of the importance of acronyms in his
adopted field, he has gone so far as to choose one: DNA.

But let's ignore Mr. Riddick's credentials, or lack thereof. Let's look at
some of the "facts" he bases his proposals on:

- John Udell, a the senior technical editor of *BYTE*, is quoted
from the January, 1994, issue as saying that "the battle
is no longer about whether to layer object-oriented services
and emulation systems . . . on a small kernel . . . nor
whether to build an operating system in this style but how to
do the job right."

Mr. Riddick might want to look at a more recent Byte - the
June issue, I think - whose cover-page leadin to a story
starts out "With the death of object-oriented programming..."

The fact of the matter is that "object-oriented services ...
build on a small kernel" describes a completely insignificant
portion of systems in use today. The two operating systems
*actually available now* that are closest to fitting this
description are Mach - by design, an academic experiment -
and NextStep, a much-admired commercial failure. Whether
they will play a significant role in the systems of tomorrow
remains to be seen. The very question of what "object-
oriented" and "microkernel" *mean*, much less how useful
they are as design and implementation approaches, remain
the subject of debate among serious system designers, both
in academia and in industry.

Mr. Riddick, like most non-specialists (and all-too-many
specialists who should know better) is mislead into believing
that buzzwords represent significant advances. "Microkernel"
and "object-oriented" are the buzzwords of today. What ever
happened to "(artificially) intelligent machines"? "User
friendliness?" "Closing the semantic gap?" "Fourth-genera-
tion languages"? "*Fifth* generation systems"? "Pure rela-
tional models?" Somewhere there must be a warehouse full of
the dust-covered, mouldering remains of yesterday's computer
industry buzz-concepts.

- Mr. Riddick says that "...proprietary standards have acted as unfair
exchange standards, making it unnecessarily expensive for
consumers to move their investments in data-and particularly
software-around from one platform (operating system) to
another. This deters investment, just as the asset-trapping
nature of a command economy or non-convertible currency was
for many years a substantial deterrent to foreign investment
in Eastern Europe." A remarkable stream of words with little
attempt at justification - but a great deal of emotional
content. "Unfair exchange standards." "Unnecessarily expen-
sive". Has Mr. Riddick been learning his economics from
Marxist textbooks? Or perhaps very old Catholic writings on
"fair" business practices? In free market economics, the
market-clearing price is the only relevent measure of price;
there's no room for appeals to emotion.

Ah, but Mr. Riddick isn't a Marxist - like all good buzz-word
followers, he, too, knows that contrasting a proposal to the
"command economies" of Eastern Europe - which we all know
failed miserably, though go back 15, 20 years and see how
those who attacked such economies were derided as short-
sighted - is the best way of strengthening a proposal. Any
proposal. Of course, he seems not to notice that the problem
with command economies is not *what* they commanded, but
*that* they commanded. What is Mr. Riddick's proposal but an
attempt to have the government dictate to an industry that
forms a large and growing portion of our economy just how they
should do things? If industry fails to go along with the
standards he'd like to see, will his next step be to order
them to build the machines he likes? If consumers fail to buy
them, what then?

If Mr. Riddick had actually ever tried to start a high-tech
company, he'd know that the first thing investors want to hear
about is what the company will have that is *unique* and not
readily copied by the competition. Besides, he himself talks
elsewhere about what happened to IBM, which invested R&D
dollars in developing the PC standard only to watch as others
made money by cloning IBM products. Ah, but of course, the
standard Mr. Riddick wants developed will be developed by
the *government*. That makes it *different*. (Besides, we
all know that getting stuff done by the government doesn't
cost any money.)

Mr. Riddick also believes that the non-standardized nature
of the computer business has "deterred investment". Given
the many, many billions of dollars spent on computer equipment
over the last two decades, I'd really love to see the analysis
that justifies that claim. Perhaps if Mr. Riddick had had
his way, by now we'd be fulfilling the old dream of "a PC
on every desk, a Newton in every hand".

Really, I can't go on with a point-by-point analysis. There's just too much
verbiage, too much half-digested industry self-praise (the Macintosh is
successful because it relies on interpretation?), too many quotes from people
who don't deserved to be believed (John Scully comments that decisions about
computers can no longer be left to the technologists - an arguable claim, but
it rings false coming from someone whose basic failure to understand the
technology on which his company was built led to the failure of the Newton,
which Scully saw as the future of Apple). Mr. Riddick actually gives examples
(Japanese HDTV) of the dangers of imposing a standard too early - but, like
all those who live by the buzzword, he is somehow convinced that *now* things
have finally reached a point where we can safely put down roots. I will give
Mr. Riddick credit for one thing: At least he looks at the near-future
buzzwords (multiple-personality OS's, for example - though really only the
name is new; systems like this have existed for at least 20 years); he doesn't
make the mistake of believing that what he can buy in the store today is going
to be *it* for the next 20 years. Of course, in doing so he ignores the
lessons of the OSI experience: Standardizing what *is* sometimes works;
standardizing what *may later be* is a recipe for disaster.

Then, of course, there's the long section in which Mr. Riddick sketches out
his view of how his proposed standards would work on a technical level. What
Mr. Riddick makes clear in this section is that (a) he knows nothing about
the history of computer science; many of the idea he presents have been
proposed, and tried without notable success, repeatedly since the 1950's;
(b) he's never actually designed or built a system, and has no idea where the
difficulties and tradeoffs actually lie.

Since I've attacked Mr. Riddick's credentials, I suppose I should quote
my own: Jerrold Leichter (Phd, Computer Science, Yale University) is an
assistant professor of computer science at Rutgers University, specializing in
parallel processing, programming languages, and operating systems. He was an
employee of Digital Equipment Corporation for 12 years, working on diverse
projects ranging from the automation of Digital's in-house manufacturing
operations to the design of Digital's terminals. He holds three patents,
assigned to Digital. Dr. Leichter is also the founder and president of
LRW Systems, a supplier of software for the development of distributed
peer-to-peer applications.

------------------------------

Date: Sun, 3 Jul 94 18:39:21 PDT
From: mvp@LSIL.COM(Mike Van Pelt)
Subject: File 3--Re: Ghost in the Modem

>I'm certain other people will make this point to you also -
>> And *definitely* don't turn it into some kind of welfare-statist
>> entitlement where making a profit is forbidden. That will turn it
>> into the information equivalent of Cabrini-Green.
>
>Excuse me, but the .com sites are the newcomers. It was built as an
>environment where making a profit was forbidden. The jury is still out
>on whether letting the moneygrubbers in was a good idea.
>
>(My own views aren't quite a strident as that, but I do want to take
>issue with your understanding of history. All commercial traffic is
>a new thing on the internet, new within the last several years.)

True, to some extent. But before the commercial traffic appeared, the
net was not the information equivalent of Cabrini-Green. It was, for
better or worse, the information equivalent of the Government funded
research project of your choice. It *was* a government-funded research
project. The companies of the ever-popular Military-Industrial Complex
doing Government research using the ARPAnet were making a profit, or
trying to, and the free flow of information fostered by ARPAnet,
including the presence of the educational institutions on ARPAnet,
helped them to do so.

It was a mix of good features and bad features. The current net is
a mix of different good and bad features.

Obviously, as the net continues to grow, it will have to keep
changing. But like any other good thing, there are a lot more ways
to screw it up than to improve it.

What I really want to see is a lot of diverse approaches, and what I
fear most is the whole thing turned into One Big Government Public
Works Project, which must all be done The One Government Way. That One
Way will almost certainly be unusable. With a lot of diverse ad-hoc
approaches to the problem, the bad ones will die, and the better ones
will flourish. (Hmmm... this reminds me of something...)

------------------------------

Date: Fri, 1 Jul 1994 08:22:02 -0600
From: Bryce <wilcoxb@NAG.CS.COLORADO.EDU>
Subject: File 4--Closure on "Ghost in the Modem" Discussion

In CuD 6.58 David Gersic, "a02dag1@noc.niu.edu" wrote:

> [...] I agree with you on the second to
> last paragraph, that policies and programs that are, or could be,
> destructive should be opposed, but I don't understand the connection
> between the ideal that every citizen that cares to connect up and
> start surfing the net should be allowed to and a policy that's
> destructive to either the "cyberspace" that we keep hearing about or
> the real society in which we live.
>
> Maybe I'm misunderstanding your position, but you seem to favour a
> "status quo" position that only the technologically knowledgable
> should be allowed to use the networks. A sort of nerd-priesthood, if
> you will, paying homage to the net.gods. If this is, in fact, your
> position, how would one go about joining this priesthood? What sort
> of controls will have to be implemented to keep out the
> non-initiated?

(Note: David Gersic sent a copy of this message to me privately
before it was published in CuD, and I have already responded to him.
In the interests of the public dialogue, however, I will respond
publicly here.)

This certainly is a misunderstanding of my position and I'm sorry I
wasn't more clear! I, too, envision a future where billions of
individuals frequent the net for uses ranging from the casual to the
sublime. The difference is that in *my* daydream each of these users
has *earned* and *paid for* their access.

The fact is that net access doesn't grow on trees. The money,
technology,
and effort that is going in to creating this future cyberspace is
staggering. *Someone* has to pay for it. Currently corporations that
are developing the future-net are paying for it with the intention of
making money off of it from paying subscribers when it is
up-and-running. This is the way that it should be. There is only one
alternative to having each user pay his or her own way. That
alternative is to take money from other people (including from people
who can't afford or who don't care about net access) through taxes and
pay for those users who can't or won't pay for themselves. It is this
approach which I call "immoral", and which I believe poses a great
threat to the cyberspace that we all want to inhabit.

There are many dangers associated with this egalitarian ideal of
cyberspace. One danger that is perhaps especially interesting to CuD
readers is the fact that asking for government subsidy for net access
is tantamount to asking for control and censorship! If one expects
the tax-payers of America to pay for one's access, then one gives them
the right, via majority vote and representative government, to control
what information one has access *to*. The Loka Institute's implicit
assumptions about the proper funding of and access to cyberspace are
contradictory to the ideals of privacy and freedom of speech which CuD
rightly champions.

I hope this makes my concerns more understandable. "Thank you" to
Jim Thomas and Gordon Meyer for encouraging this important public
dialogue.

------------------------------

Date: Sat, 02 Jul 1994 23:41:05 -0600 (MDT)
From: "Rob Slade, Ed. DECrypt & ComNet, VARUG rep, 604-984-4067"
Subject: File 5--"Repetitive Strain Injury" by Pascarelli

((MODERATORS' NOTE: The follow review of "repetitive strain injury"
may seem to some a bit beyond CuD's normal interests. But, over the
past few years we've encountered an increasing number of active
computer users who've developed apparent typing-related injuries
ranging from tolerable soreness to incapacitating symptoms. We are
convinced that RSI is both real, serious, and growing. So, we find
the following both relevant and helpful)).

BKRSI.RVW 940401

Wiley
5353 Dundas Street West, 4th Floor
Etobicoke, ON
M9B 6H8
416-236-4433
fax: 416-236-4448
or
22 Worchester Road
Rexdale, Ontario
M9W 9Z9
800-263-1590
800-567-4797
fax: 800-565-6802
or
605 Third Avenue
New York, NY 10158-0012
USA
800-263-1590
800-CALL-WILEY
212-850-6630
Fax: 212-850-6799
jdemarra@wiley.com
aponnamm@jwiley.com
"Repetitive Strain Injury", Pascarelli, 1994, 0-471-59533-0, U$18.50

My first actual case of repetitive strain injury (or RSI), as a first
aid attendant, was not in the logging camps, railway gangs or spacing
crews, but with a young student athlete at an outdoor school. He had,
literally, outdone himself the day before on a steep downhill hike.
He was one of the best jocks in the school and had no problems with
stairs and hill climbs--none of which had prepared him for the
repeated extension of his foot which downhill walking required.

Work-related repetitive strain injury has been known for a long time
now. Writer's cramp shows up in an Italian treatise almost three
hundred years old. Research and treatment, however, has lagged. For
one thing, RSI generally involves soft tissue damage which does not
show up on x-rays (or, indeed, on anything much besides microscopic
examination of the tissue). For another, few jobs up until this
century have required the kind of environment where actions had to be
repeated so often without variation. Until very recently, the most
common repetitive strain situations involved gross motor activities,
where strains showed up early and responded well to exercise. With
the advent of the computer keyboard and data entry as major factors in
job situations, RSI has become a serious issue in the workforce.

This is a comprehensive, factual and practical guide to RSI. It is
directed primarily to the computer user or repetitive strain injury
sufferer, covering facts about RSI, symptoms and warning signs,
diagnosis, choosing a physician, recovery, legal aspects, maintenance
and prevention. A major emphasis is to put users/sufferers in charge
of, and responsible for, their own health.

The book continually counsels patience. My student athlete, when
asked if he could walk out with the rest of the group, visibly tried
to calculate how much better he could be in the three days before they
had to leave. I had to ask him if he could do it right then, since I
knew it wasn't going to heal very fast, and he had to admit he
couldn't. His case was actually extremely mild, after only a few
hours, and would have faded within a week or so of reduced activity.
Most RSI cases, however, traumatize the area for months or even years,
and the healing process is correspondingly lengthy.

Although the book is written for users, I would strongly recommend
that every manager get a copy. Averaged over all employees, RSI
accounts for about $200 expense per year and per person. If you have
four people working for you, using computers, it is almost certain
that at least one will develop RSI at some point. RSI is almost
entirely preventable, and is almost entirely caused by ignorance.
Most of you reading this are probably nodding your heads and muttering
something about carpal tunnel syndrome--unaware that this
over-diagnosed syndrome actually accounts for only one percent of RSI,
according to one study cited in the book.

Highly recommended. A very minor investment in keeping free of an
ailment which could severely affect your job--not to mention
everything else you do with your hands and body.

copyright Robert M. Slade, 1994 BKRSI.RVW 940401

------------------------------

Date: Sun, 3 Jul 1994 00:49:59 -0700
From: jonpugh@NETCOM.COM(Jon Pugh)
Subject: File 6--Response to "Egalitarianism as Irrational" (CuD 5.51)

> The statement is: "And the risk of inequity in contriving and
> distributing electronic services [...] is clear."
>
> This statement seems to assume that access to information technology
> should be equally distributed among individuals. The reason that I
> find this assumption disturbing enough to write about is because I
> often see variations on such a theme echoed in Computer underground
> Digest, but I rarely if ever see a contradictory opinion stated.

I think the reason contradictory opinions do not appear is that most people
understand the issues. It's not about giving every person a modem and a
computer and making them use the net or even about paying them so that they
can. It's simply allowing them to use it if they want to and can afford
it. Some people also mean "cheap" so that more people can use it, but
there will always be people who cannot afford to.

It appears to me that some people believe that "equal access" means
funding. While there are phone company programs, for example, which reduce
the cost of basic phone service for the low income contingent, I do not
think that anyone is trying to build that notion into the coming network
laws.

Equal Access just means that you cannot be denied access. Unfortunately, I
think it implies that spammers like Canter & Siegel cannot be denied access
though. Even if we allow individual service providers like Netcom to
refuse them service, I think this will promote the ever popular blacklist,
which is already in use by many sysops. I think spamming them back is much
more effective. ;)

------------------------------

Date: Tue, 5 Jul 1994 14:03:06 +1200
From: Nathan Torkington <Nathan.Torkington@VUW.AC.NZ>
Subject: File 7--Proposed New Zealand legislation

In response to problems with foolhardy minors injuring themselves with
recipes found on bulletin board systems, one of New Zealand's more
right-wing politicians drafted a piece of legislation called the
"Technology and Crimes Reform Bill" which was intended to provide a
means for prosecution of BBS operators.

Unfortunately, the legislation was hijacked along the way and it was
extended to cover live sex shows (!) and raunchy 0900 telephone
services. These sidetracks make the fundamental problems of the bill
harder to identify, but make no mistake: there are problems.

The bill expects New Zealand telecommunications companies to prevent
NZ citizens accessing foreign telecommunications services (eg,
pornography BBS, hot sex numbers, etc) which is impossible.
Furthermore, the bill piggybacks onto old (1989) legislation that
makes no allowance for services provided over telephone lines (eg,
BBS, CompuServe, ...). These problems, and others, make the bill
unfeasable.

Possibly the biggest problem is that because of the failure to
acknowledge multilayered network services like CompuServe or bulletin
boards, the bill makes the service provider liable for the actions of
their users. This is obviously unreasonable, and stands to jeopardise
everyone from CompuServe to universities and other Internet providers.

I have been informally speaking to people about this, and several
large telecommunications companies are preparing their own submissions
on the bill, and various government departments as well. The bill has
to be approved by a committee, who will hear the submissions, before
it becomes law. From the number and size of the groups making
submissions, I don't believe it will become law (thank goodness).

The text of the bill is available on the World Wide Web as
http://www.vuw.ac.nz/~gnat/law/tech-crime/
and the text of my (draft) submission is available as
http://www.vuw.ac.nz/~gnat/law/tech-crime/commentary.html

------------------------------

Date: 5 Jul 1994 14:06:20 +1100
From: "Brian Martin" <Brian_Martin@UOW.EDU.AU>
Subject: File 8--nonviolent action against Clipper

Methods of nonviolent action provide a way to challenge
government-sponsored encryption. It's important to make a careful
assessment of these methods and to develop a sound strategy.

The Clipper chip symbolises the National Security Agency's agenda for
ensuring that encryption of digital communications does not undermine
the power of government police and spy organisations. Because of its
origins and for a number of practical reasons, many people are
strongly opposed to Clipper, Skipjack, Digital Telephony, key escrow,
etc., and favour systems of encryption designed to be impossible for
anyone to break. There is also strong support for free communication
about and dissemination of encryption systems.

So far, enormous effort has been devoted to developing arguments
against Clipper and to applying pressure to government to prevent its
introduction. These efforts are useful, but direct action is worth
considering too.

Nonviolent action includes techniques such as petitions, rallies,
wearing symbols of resistance, boycotts, strikes, sit-ins, fasts, and
setting up alternative institutions. But nonviolent action as an
approach to social change involves more than a collection of methods.
It is an integrated approach designed to build popular support and
undermine systems of oppression.

There are numerous examples of nonviolent action, both successful and
unsuccessful. These include blockades of forest logging and shipments
of nuclear weapons; women's marches against sexual violence;
resistance to the Nazis in many parts of occupied Europe during World
War II; resistance within Soviet prison camps during the 1950s; the
toppling of many Central American dictatorships by nonviolent
insurrection; the collapse of East European regimes in 1989; the US
civil rights movement led by Martin Luther King, Jr.; and the struggle
for independence of India led by Gandhi.

Nonviolent action works by the withdrawal of consent from individuals
and groups in positions of power. Even the most ruthless dictator
cannot rule without acquiescence or support from most of the
population, including the army. Violence against oppression tends to
unify the oppressors and to alienate bystanders. Nonviolent methods,
by contrast, have the potential to undermine the will of the
oppressors and to win support from third parties. The aim of
nonviolent action should be to open up dialogue, to encourage
discussion of solutions that serve the interests of all parties.

In the case of Clipper, the government has a great deal of power. It
does not need to convince critics, since it can use economic
pressures, the legal system and ultimately its police powers to impose
its preferred option. Opponents, by refusing to cooperate, are
essentially insisting that no action be taken until the issue is fully
discussed and a mutually agreeable solution is found.

There are many examples and many writings about nonviolent action, but
not much of this material deals with struggles in cyberspace. Here are
a few suggestions.

* Symbolic actions. A number of methods are already being pursued,
such as petitions. It might be worth developing a symbol or brief
slogan (e.g. "Free encryption") that could be used routinely in
communications. An important thing here is to take the message to
other media besides computer networks, such as newspapers, magazines
and public meetings. This is a challenge. In cyberspace anyone can
speak, and the role of editors and publishers is minimised. Elsewhere
this is not so.

* Boycotts. These are difficult to carry off, but can be effective if
prepared for properly. Possible targets need to be researched and
justified. Notice should be given to the potential target of a
boycott, giving it a chance to change. The boycott should be one that
allows many people to participate and which highlights the principles
involved.

* Noncooperation by workers. The key "production" workers are in the
NSA, other relevant government agencies and factories where Clipper is
produced. Any dissent or noncooperation within these areas is
important, including strikes, go-slows or an open statement of
protest. System administrators and technicians could refuse to install
Clipper.

* Civil disobedience. An obvious possibility here is to export
encryption openly. It would be worthwhile designing the campaign so
that large groups of people challenge laws or procedures collectively.
For example, one hundred or one thousand people could simultaneously
export encryption while circulating widely a well-written account of
why they are doing it.

Another approach is to provide alternative solutions to problems
raised by advocates of Clipper. For example, how can securely
encrypted communication systems be used to challenge organised crime?

Whatever methods are used, it is vital to use them coherently as part
of a well-thought out and agreed-upon set of campaigns. The ultimate
goals of the actions need always to be kept in mind. Short-term
successes are less important than building support and commitment for
unfettered participatory communication and undermining the will of
Clipper advocates. The issue seems urgent now but, if it is like most
other social issues, the struggle will require years of effort and
commitment. Hence, it is crucial to take a principled stand and aim
always to build long-term support. Expedient compromises are likely to
undermine the commitment of supporters.

A crucial part of the struggle is to make cyberspace a people's space.
At the moment, most people in the world know little about it.
Struggles over encryption mainly involve an "information elite",
namely those individuals with the greatest access to and involvement
with computer networks. Improving access and user-friendliness is
vital.

Another important mode of action is to use computer networks to serve
the interests of oppressed people elsewhere: the poor, persecuted
minorities, people under dictatorships, etc. This already happens to a
considerable extent. The more that computer networks serve those who
are oppressed, the more the general population will support arguments
of network activists against threats such as Clipper.

Before collective action is begun, it is essential that there be
extensive discussion of possible campaigns, including what types of
public education should be undertaken, what groups need to be
influenced, what the goals of campaigns should be, and what methods of
nonviolent action should be used. The most effective campaigns are
ones for which there is a high degree of support achieved by extensive
discussion before beginning formal action. Fortunately, cyberspace is
an ideal place for such discussion to occur.

Brian Martin, Department of Science and Technology Studies, University
of Wollongong, NSW 2522, Australia, phone: +61-42-287860 home,
+61-42-213763 work, fax: +61-42-213452, e-mail: b.martin@uow.edu.au.

FURTHER READING Virginia Coover, Ellen Deacon, Charles Esser and
Christopher Moore, Resource Manual for a Living Revolution
(Philadelphia: New Society Publishers, 1981).

Per Herngren, Path of Resistance: The Practice of Civil Disobedience
(Philadelphia: New Society Publishers, 1993).

Brian Martin, Social Defence, Social Change (London: Freedom Press,
1993).

Michael Randle, Civil Resistance (London: Fontana, 1994).

Gene Sharp, The Politics of Nonviolent Action (Boston: Porter Sargent,
1973).

------------------------------

Date: Tue, 5 Jul 1994 19:17:55 -0400 (ADT)
From: The Advocate <tk0jut1@mvs.cso.niu.edu>
Subject: File 9--Some thoughts on the AA BBS

Stuff about the AABBS case. This case is essentially a war of ideas.
Can a backwards, pigheaded state like tennessee set the moral and
cultural standard of a sophisticated state like california?

I say not, and like minded individuals agree with us.

These "Reagan-Jungen" need to be beaten back. The best light is that
of the First Amendment. Bring the press in, point out the vital issues.
The judge will be embarassed if the AP or Court TV is televising
what this action is about.

Has anyone tried contacting the Playboy Foundation or the Guccione
Foundation. Contact people like Spider Robinson or WIlliam Gibson.
Publicity can only help.

Especially given the candy ass tricks the prosecutors are trying out.
Bring heat to Reno and Clinton.

If this case is to be tried, it should be in california.

The Advocate.

------------------------------

End of Computer Underground Digest #6.61
************************************

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

lostcivilizations's profile picture
Lost Civilizations (@lostcivilizations)
6 Nov 2024
Thank you! I've corrected the date in the article. However, some websites list January 1980 as the date of death.

guest's profile picture
@guest
5 Nov 2024
Crespi died i april 1982, not january 1980.

guest's profile picture
@guest
4 Nov 2024
In 1955, the explorer Thor Heyerdahl managed to erect a Moai in eighteen days, with the help of twelve natives and using only logs and stone ...

guest's profile picture
@guest
4 Nov 2024
For what unknown reason did our distant ancestors dot much of the surface of the then-known lands with those large stones? Why are such cons ...

guest's profile picture
@guest
4 Nov 2024
The real pyramid mania exploded in 1830. A certain John Taylor, who had never visited them but relied on some measurements made by Colonel H ...

guest's profile picture
@guest
4 Nov 2024
Even with all the modern technologies available to us, structures like the Great Pyramid of Cheops could only be built today with immense di ...

lostcivilizations's profile picture
Lost Civilizations (@lostcivilizations)
2 Nov 2024
In Sardinia, there is a legend known as the Legend of Tirrenide. Thousands of years ago, there was a continent called Tirrenide. It was a l ...

guest's profile picture
@guest
2 Nov 2024
What is certain is that the first Greek geographer to clearly place the Pillars of Hercules at Gibraltar was Eratosthenes (who lived between ...

guest's profile picture
@guest
1 Nov 2024
Disquieting thc drinks has been quite the journey. As someone keen on unpretentious remedies, delving into the in every respect of hemp has ...

guest's profile picture
@guest
29 Oct 2024
hi Good day I am writing to inform you of recent developments that may impact our ongoing operations. This morning, global news outlets hav ...
Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT