Copy Link
Add to Bookmark
Report
Computer Undergroud Digest Vol. 08 Issue 57
Computer underground Digest Fri Aug 2, 1996 Volume 8 : Issue 57
ISSN 1004-042X
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
Archivist: Brendan Kehoe
Shadow Master: Stanton McCandlish
Field Agent Extraordinaire: David Smith
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
CONTENTS, #8.57 (Fri, Aug 2, 1996)
File 1--: ACT NOW! freedom & privacy trashed in grab for police-state power
File 2--Cu Digest Header Info (unchanged since 7 Apr, 1996)
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
---------------------------------------------------------------------
Date: Fri, 2 Aug 1996 11:05:43 -0700
From: jwarren@WELL.COM(Jim Warren)
Subject: File 1--Freedom & privacy trashed in grab for police-state power
((This CuD special issue is devoted to two combined posts from
Jim Warren, a long-time Net activist))
This is not a drill! We ARE under direct attack, NOW!
I would not normally broadcast (spam) this so widely, especially of such
length, unedited.
But this effort by federal enforcers and the President, to massively
demolish much of what's left of our nation's civil liberties and whatever
little we have of privacy protection is SO CAPRICIOUS and MOVING SO FAST
THROUGH CONGRESS that it requires INSTANT RESPONSE in the form of IMMEDIATE
phone calls and faxes to *our* "representatives" -- if there is any *hope*
to turn this appalling stampede to Big Brotherhood by Congress critters.
--jim
Jim Warren, GovAccess list-owner/editor, advocate & columnist (jwarren@well.com)
345 Swett Rd., Woodside CA 94062; voice/415-851-7075; fax/<# upon request>
[puffery FWIW: Hugh M. Hefner First-Amendment Award, Playboy Foundation;
James Madison Freedom-of-Information Award, Soc.of Prof.Journalists-Nor.Cal.;
Pioneer Award, Electronic Frontier Foundation (its first year, 1992);
founded InfoWorld, DataCast, Computers, Freedom & Privacy confs, etc. :-).]
&&&&&&&&&&&&&&&&&&&&
Date: Thu, 1 Aug 1996 10:15:15 -0800
From: telstar@wired.com (--Todd Lappin-->)
Subject--ALERT: Clinton's Wiretap Gambit
** RED ALERT **
The Clinton administration is exploiting the TWA crash and the Atlanta
Olympics blast to secure a massive expansion of FBI wiretap authority --
RIGHT NOW -- without public hearings, and without requiring the FBI to
publicly disclose evidence that it needs the increased snooping power.
The administration wants Congress to approve the new measures before the
recess which begins Friday (tomorrow!), so that the president can sign them
into law Monday.
Congress is prepared to back the plan.
An agreement the administration reached with Congress last night would
authorize:
-- emergency wiretap authority under which a "suspected
terrorist's" calls could be tapped for 48 hours WITHOUT a judge's order, and
-- roving, multi-point wiretaps that cover a suspect instead of just one
telephone.
This is happening so quickly that we have very little opportunity to mount
a response.
Moreover, all this is probably a curtain-raiser for the next phase of the
Clinton administration's assault on privacy. Come September, brace
yourself for increased calls for full funding for the Digital Telephony
wiretap provisions, AND the introduction of crypto key escrow legislation.
More detail on the current situation below.
--Todd Lappin-->
WIRED Magazine
------------------------------------------------
From: http://www.yahoo.com/headlines/960801/news/stories/terrorism_19.html
(Similar story at http://www.cnn.com)
Accord Reached on U.S. Anti-Terrorism Bill
WASHINGTON (Reuter) - U.S. lawmakers reached broad accord with the
Clinton administration Wednesday on the shape of possible new
anti-terrorism legislation following the crash of TWA Flight 800 and a
pipe-bomb blast at the Olympic Games.
Announcement of the agreement followed a series of negotiating sessions
between House and Senate members of both parties and White House chief
of staff Leon Panetta.
``I am very confident that we are going to be able to put a bill
together that hopefully will be adopted by the House and Senate and
passed on to the president,'' Panetta told reporters.
Clinton had sought swift action on areas where agreement could be found
before Congress leaves town at the end of the week for a month's recess.
``We're looking for some immediate help,'' Clinton said Tuesday.
Congressional staff were to work through much of the night to work on
legislative language.
The announcement by Panetta and the leader of the congressional task
force, Larry Craig, an Idaho Republican, followed earlier signals by
Republican leaders casting doubt on whether Congress could act this
week.
In a letter to Clinton, Republican leaders had said that more
information was needed before any final decisions could be made, and
expressed concern that anti-terorrism money and authority already
provided was was not being used.
The letter, signed by House Speaker Newt Gingrich, Senate Leader Trent
Lott and House Leader Dick Armey, requested a briefing by Attorney
General Janet Reno, FBI Director Louis Freeh and Panetta Thursday.
But Lott, who had told reporters earlier he did not see how a bill could
be approved by the weekend and sent to Clinton, told the Senate in
mid-evening: ``We believe we can take up an agreed-to package on the
anti-terrorism issue hopefully tomorrow or Friday.''
Craig said that seven or eight areas had been under discussion and
agreement reached on five that would be examined. ``Both sides had to
swallow hard on several issues,'' he said.
The accord includes expansion of wiretap authority linked, as a
tradeoff, to strengthening of privacy laws. This would include
multi-point wiretaps that would cover a suspect instead of just one
telephone, and emergency wiretap authority under which a suspected
terorist's calls could be tapped for 48 hours without a judge's order.
Craig said the accord included a new capital offense for murder by
bombing ``specific to the Olympics.'' It also includes a blue ribbon
presidential commission to look at the long-term terrorism threat.
Apparently out of the deal is the controversial question of placing a
distinctive chemical in black powder, which might have been the
explosive used in the Olympic pipe-bomb, to help trace it.
&&&&&&&&&&&&&&&&&&&&
Date: Thu, 1 Aug 1996 10:00:30 -0400
From: editor@cdt.org (Bob Palacios)
Subject--Policy Post 2.29 - Administration, Congress Propose Sweeping
Anti-Terrorism Initiatives
-----------------------------------------------------------------------------
_____ _____ _______
/ ____| __ \__ __| ____ ___ ____ __
| | | | | | | | / __ \____ / (_)______ __ / __ \____ _____/ /_
| | | | | | | | / /_/ / __ \/ / / ___/ / / / / /_/ / __ \/ ___/ __/
| |____| |__| | | | / ____/ /_/ / / / /__/ /_/ / / ____/ /_/ (__ ) /_
\_____|_____/ |_| /_/ \____/_/_/\___/\__, / /_/ \____/____/\__/
The Center for Democracy and Technology /____/ Volume 2, Number 29
----------------------------------------------------------------------------
A briefing on public policy issues affecting civil liberties online
----------------------------------------------------------------------------
CDT POLICY POST Volume 2, Number 29 August 1, 1996
CONTENTS: (1) Clinton Administration, Congress Propose Sweeping
Anti-Terrorism Initiatives
(2) How to Subscribe/Unsubscribe
(3) About CDT, contacting us
** This document may be redistributed freely with this banner intact **
Excerpts may be re-posted with permission of <editor@cdt.org>
** This document looks best when viewed in COURIER font **
-----------------------------------------------------------------------------
(1) CLINTON ADMINISTRATION, CONGRESS PROPOSE SWEEPING ANTI-TERRORISM
INITIATIVES
In the wake of the recent bombing at the Olympics and the suspected
terrorist involvement in the TWA crash, the Clinton Administration and
members of Congress are proposing a set of sweeping counter-terrorism
initiatives. If enacted into law, these proposals will dramatically
increase law enforcement surveillance authority over the Internet and other
advanced communications technologies. An outline of the Administration's
proposal was circulated on Capitol Hill on Monday July 29.
President Clinton has urged Congress to pass new counter-terrorism
legislation before the Congressional recess at the end of this week. While
several prominent Republican members of Congress, including House Speaker
Newt Gingrich (R-GA), have said publicly that Congress should not rush into
any new counter-terrorism legislation, most observers believe there is a
strong possibility that some or all of the Administration's proposal will
be enacted before the August recess.
The draft proposal contains several measures which were rejected by
Congress as part of the previous counter-terrorism initiative proposed
last year after the Oklahoma City bombing, as well as several new measures
including as-yet unspecified changes to U.S. encryption policy and funding
for the Communications Assistance for Law Enforcement Act (CALEA, a.k.a.
Digital Telephony).
CDT is concerned that the latest counter-terrorism efforts on Capitol Hill
are occurring without appropriate deliberation. Major policy decisions
expanding the surveillance powers of law enforcement should not be made
without careful consideration of the necessity of such proposals and the
relative benefit to society. In the coming days and weeks, CDT will work
with Congressional leaders, privacy advocates, and the net.community to
ensure that constitutional civil liberties and the openness of the Internet
are protected as Congress considers counter-terrorism measures.
________________________________________________________________________
MAJOR POINTS OF THE COUNTER-TERRORISM PROPOSALS CIRCULATING ON THE HILL
The administration's new counter-terrorism initiative and other amendments
circulating this week in Congress contain numerous provisions, but four
are of particular concern to the net.community:
* New Threats to Encryption, Opposition to the Pro-CODE Bill
* Funding for Digital Telephony Without Public Accountability
* Amendment to Criminalize 'Bomb-Making' Information on the Internet
* Expanded Authority for Multi-Point, "Roving" Wiretaps
The full text of the Administration's proposal and background information
are available at CDT's counter-terrorism Web Page:
http://www.cdt.org/policy/terrorism/
--------------------------------------------------------
I. NEW THREATS TO ENCRYPTION, OPPOSITION TO THE PRO-CODE BILL
The Administration's outline contains the following statement on encryption:
"* Encryption -- We will seek legislation to strengthen our ability to
prevent terrorists from coming into the possession of the technology
to encrypt their communications and data so that they are beyond the
reach of law enforcement. We oppose legislation that would eliminate
current export barriers and encouraging the proliferation of encryption
which blocks appropriate access to protect public safety and the
national security."
While no specific legislative language has yet been proposed, this
represents the first statement by the Administration that they will seek
legislation to further restrict encryption. Even more troubling, the
Administration is clearly attempting to use the recent suspected terrorist
incidents to push for a new and more restrictive encryption policy.
This new proposal comes as Congress is finally beginning to seriously
consider major changes in U.S. encryption policy. Bipartisan legislation
in both the House and Senate to relax encryption export controls is gaining
momentum. The Senate Commerce Committee has held 3 hearings in the last 6
weeks, and is preparing to vote to send the Burns/Leahy "Pro-CODE" bill (S.
1726) to the floor of the Senate. The Administration's attempt to leverage
the public's concern about terrorism to block passage of the Pro-CODE bill
is disturbing, and poses a significant threat to privacy and security on the
Internet.
CDT is working with members of Congress, privacy advocates, and the
communications and computer industries to oppose any attempt by the
Administration to impose new restrictions on encryption, and we continue to
work to move the bipartisan export relief legislation through Congress.
--------------------------------------------------------
II. FUNDING FOR DIGITAL TELEPHONY WITHOUT PUBLIC ACCOUNTABILITY
The Administration is also seeking to override the public accountability
provisions of the Communications Assistance for Law Enforcement Act (CALEA
- a.k.a. 'Digital Telephony') by providing a funding for the law in a way
that prevents public oversight of the FBI's surveillance ability.
Enacted in October of 1994, granted law enforcement new authority to
influence the design of telecommunications networks (the Internet,
Commercial online services, and BBS's were exempted) in order to preserve
their ability to conduct court authorized electronic surveillance.
Congress balanced this new authority with a number of mechanisms to ensure
public accountability over law enforcement surveillance ability.
While complicated, the public accountability mechanisms are designed to
work as follows:
* Law enforcement provides telecommunications carriers, the Congress,
and the public with notice of its surveillance capacity needs (i.e.,
the number of simultaneous wiretaps in a given geographic location)
with an opportunity for public comment.
* Based on an assessment of the reasonableness of the law enforcement
surveillance capacity request, Congress appropriates money to cover
the cost of modifications. If Congress does not believe law
enforcement has adequately justified its request, money will not be
appropriated.
* Telecommunications carriers are not obligated to comply with the
statute or make any capacity modifications without government
reimbursement.
In October 1995, the FBI published its first notice of surveillance
capacity (see CDT Policy Post Vol. 1, No. 26). The telecommunications
industry and privacy advocates used the public accountability provisions of
CALEA to respond to the FBI's request and argued that the FBI had not
adequately justified the extensive surveillance capability contained in the
request. As a result, Congress has not yet appropriated funds and no
modifications have been made.
The FBI clearly believes that the public accountability provisions of CALEA
are working **too well**, and appears to be using the recent focus on
terrorism to push for a new funding mechanism which does not contain public
oversight.
CDT is fighting hard to ensure that the public accountability provisions of
CALEA, which have until now prevented the FBI from acquiring unnecessary
surveillance capacity, remain a part of the law, and will vigorously oppose
any effort by the FBI and the Clinton Administration to remove the last
opportunity for public oversight over law enforcement power.
--------------------------------------------------------
III. THE AVAILABILITY OF 'BOMB-MAKING' INFORMATION ON THE INTERNET
Senator Dianne Feinstein (D-CA) has reintroduced an amendment to make it
illegal to disseminate information on how to construct explosives knowing
that the information will be used in furtherance of a federal crime. The
amendment was adopted by the Senate earlier this month as part of a
Department of Defense Appropriations bill. CDT believes that the vague
provisions of the Feinstein amendment could have a chilling effect on online
speech, needlessly duplicate existing criminal statutes, and should be
removed.
Feinstein first proposed the amendment as part of the 1995
counter-terrorism bill. The initial Feinstein amendment was extremely broad
and would have resulted in a flat ban on certain constitutionally protected
speech online. After civil liberties advocates objected, Feinstein
narrowed her amendment substantially, although it was ultimately dropped
from the final terrorism bill signed in April 1996.
--------------------------------------------------------
IV. EXPANDED WIRETAP AUTHORITY
The Administration's proposal would also significantly expand current
wiretapping authority to allow multi-point (or "roving") wiretaps. This
would dramatically change surveillance authority to include wiretaps of
INDIVIDUALS instead of LOCATIONS.
This proposal would do away with the delicate balance between privacy and
law enforcement that Congress has struck over 30 years of wiretapping
legislation. Federal law has always required that wiretaps issue for a
specific location, to meet Fourth Amendment requirements. In 1986 Congress
introduced a narrow exception to this rule, only for cases where it could
be shown that the target was intentionally evading wiretaps by changing
facilities. The Administration proposal would completely remove this
standard, allowing so-called "roving taps" for any persons whose behavior
makes wiretapping difficult for law enforcement.
The administration proposed similar provisions in the spring of 1995 in the
wake of the Oklahoma City bombing. These provisions proved controversial in
Congress and were dropped from the final bill.
________________________________________________________________________
FOR MORE INFORMATION
For more information on the counter-terrorism proposals and their impact on
the Internet check out:
CDT's Counter-Terrorism Page: http://www.cdt.org/policy/terrorism/
CDT's Encryption Policy Page: http://www.cdt.org/crypto/
CDT's Digital Telephony Page: http://www.cdt.org/digtel.html
Encryption Policy Resource Page: http://www.crypto.com/
------------------------------------------------------------------------
(4) SUBSCRIPTION INFORMATION
Be sure you are up to date on the latest public policy issues affecting
civil liberties online and how they will affect you! Subscribe to the CDT
Policy Post news distribution list. CDT Policy Posts, the regular news
publication of the Center For Democracy and Technology, are received by
nearly 10,000 Internet users, industry leaders, policy makers and
activists, and have become the leading source for information about
critical free speech and privacy issues affecting the Internet and other
interactive communications media.
To subscribe to CDT's Policy Post list, send mail to
policy-posts-request@cdt.org
with a subject:
subscribe policy-posts
If you ever wish to remove yourself from the list, send mail to the
above address with a subject of:
unsubscribe policy-posts
-----------------------------------------------------------------------
(5) ABOUT THE CENTER FOR DEMOCRACY AND TECHNOLOGY/CONTACTING US
The Center for Democracy and Technology is a non-profit public interest
organization based in Washington, DC. The Center's mission is to develop
and advocate public policies that advance democratic values and
constitutional civil liberties in new computer and communications
technologies.
Contacting us:
General information: info@cdt.org
World Wide Web: URL:http://www.cdt.org/
FTP URL:ftp://ftp.cdt.org/pub/cdt/
Snail Mail: The Center for Democracy and Technology
1634 Eye Street NW * Suite 1100 * Washington, DC 20006
(v) +1.202.637.9800 * (f) +1.202.637.0968
-----------------------------------------------------------------------
End Policy Post 2.29 8/1/96
-----------------------------------------------------------------------
&&&&&&&&&&&&&&&&&&&&
From: shabbir@vtw.org (Shabbir J. Safdar)
Date: Thu, 01 Aug 1996 16:44:06 -0400
please send this to your own lists..
-Shabbir J. Safdar * Online Representative * Voters Telecomm. Watch (VTW)
http://www.vtw.org/ * Defending Your Cyberspace Rights In The Real World *
======================================================================
____ _____ ____ ___ _ _____ ____ _____
| _ \| ____| _ \ / _ \| | | ____| _ \_ _| CONGRESS RUSHING TO
| |_) | _| | | | | | |_| | | | _| | |_) || | ENACT SURVEILLANCE
| _ <| |___| |_| | | _ | |___| |___| _ < | | LEGISLATION. CALL
|_| \_\_____|____/ |_| |_|_____|_____|_| \_\|_| CONGRESS NOW! 8/1/96
REPOST THIS ALERT WHERE APPROPRIATE
DO NOT REDISTRIBUTE AFTER AUGUST 7, 1996
----------------------------------------------------------------------
Table of contents
Introduction
What you can do now
Background
Participating organizations
----------------------------------------------------------------------
INTRODUCTION
Late Wednesday, Congress and the Clinton Administration reached a
preliminary agreement on a sweeping new surveillance initiative. The
President and several Congressional leaders are pushing for a vote on the
measure BEFORE CONGRESS RECESSES ON AUGUST 2.
If enacted, parts of the proposal would dramatically impact privacy and
security on the Internet and other advanced communications technologies.
Of particular concern are provisions which:
1. Allows law enforcement to wiretap "suspected terrorists" for up to
48 hours BEFORE obtaining a court order
2. Provide funding for the Digital Telephony Proposal without any public
accountability over how the FBI spends the funds
Other provisions are also circulating that would:
3. Threaten to impose new restrictions on encryption technologies
4. Seek to criminalize the distribution of 'bomb-making' information on
the Internet that is legal in print.
Congress needs to hear from you. Congress will rush through the passage
of massive new surveillance plans with privacy risks unless you
show them there is support for slow, deliberate, reasoned thought on
the issue.
----------------------------------------------------------------------
WHAT YOU CAN DO NOW
CALL KEY MEMBERS OF CONGRESS IMMEDIATELY!
NO LATER THAN FRIDAY (8/2/96)
Please contact as many elected officials on the list below as you can.
Urge them to "go slow" and carefully consider the impact these
surveillance proposals will have on the privacy and security of
all Internet users.
Tell them while you appreciate their concern about combating terrorism,
the measures being proposed have many potential side effects which must be
carefully considered.
1. Call the key members of Congress below and ask them to "go slow" and
examine the issues before rushing into changing the delicate balance
of law enforcement surveillance and the public.
2. If you are at a loss for words, use the following sample communique:
SAMPLE COMMUNIQUE
Dear _________,
Please do not rush the passage of counter terrorism legislation;
I'm concerned that Congress is rushing without carefully
considering the implications of privacy. I'm from <city, state>.
Thanks, <click>
You should call the following members of Congress because they
are steering this legislation and need to hear there is support
for slow, deliberate, thoughtful consideration of this issue.
Some of thee members *have publicly expressed reservations* about this
legislation, and we should support them in their efforts.
Senate members:
P ST Name and Address Phone Fax
= == ======================== ============== ==============
R MS Lott, Trent 1-202-224-6253 1-202-224-2262
D DE Biden Jr., Joseph R. 1-202-224-5042 1-202-224-0139
D SD Daschle, Thomas A. 1-202-224-2321 1-202-224-2047
R UT Hatch, Orrin G. 1-202-224-5251 1-202-224-6331
R PA Specter, Arlen 1-202-224-4254 1-717-782-4920
D VT Leahy, Patrick J. 1-202-224-4242 1-202-224-3595
House members:
Dist ST Name, Address, and Party Phone Fax
==== == ======================== ============== ==============
6 GA Gingrich, Newt (R) 1-202-225-4501 1-202-225-4656
3 MO Gephardt, Richard A. (D) 1-202-225-2671 1-202-225-7452
6 IL Hyde, Henry J. (R) 1-202-225-4561 1-202-226-1240
14 MI Conyers Jr., John (D) 1-202-225-5126 1-202-225-0072
President William Clinton:
White House Comment Line: 1-202-456-1414
3. If you get a response, take a moment and send mail to vtw@vtw.org
with "feedback" in the subject line.
$ Mail vtw@vtw.org
Subject--my feedback from calling Congress
They said they're not going to pass most of Clinton's package,
because it upsets the delicate balance between law enforcement and
the public.
^D
Mail sent!
----------------------------------------------------------------------
BACKGROUND
Among other things, the law enforcement proposals circulating on Capitol
Hill include provisions which:
o WIRETAPPING WITHOUT COURT ORDER ALLOWED FOR 48 HOURS
Congress and the President have already agreed to provisions which
would dramatically expand law enforcement surveillance authority. Both
of these provisions were proposed by the President as part of the 1995
counter-terrorism legislation, but were dropped from the final bill
after Republicans and civil liberties advocates objected.
The current proposal would expand law enforcement surveillance
authority in two ways:
- Emergency 48 Hour Wiretap Authority: Current law requires law
enforcement officials to get the affirmative consent of a judge
before installing a wiretap.
The current proposal would expand law enforcement authority to
wiretap "suspected terrorists" for up to 48 hours before obtaining a
court order, limiting a critical 4th amendment safeguard.
- Multi-Point "Roving" Wiretaps: Current law allows law enforcement to
tap only specific LOCATIONS (i.e., a telephone number). In certain
very limited circumstances, law enforcement can tap a specific
INDIVIDUAL if it can be shown to a judge that the suspect is moving
from place to place with the specific intent of thwarting law
enforcement.
The current proposal would expand this so-called "roving" wiretap
authority by making it much easier for law enforcement to tap specific
INDIVIDUALS as opposed to specific physical locations. This change
would dramatically effect the balance between 4th Amendment privacy
rights and public safety which has existed for nearly 30 years, and
should not be enacted without careful consideration of the
implications.
o FUNDING FOR DIGITAL TELEPHONY WITHOUT PUBLIC ACCOUNTABILITY
The Administration and Congress are seeking funding to implement the
Digital Telephony Law in a way which eliminates any opportunity for
public oversight of law enforcement surveillance ability.
The controversial law, known officially as the Communications
Assistance for Law Enforcement Act (CALEA), granted the FBI new
authority to influence the design of telecommunications networks. At
the same time, the law provided substantial public oversight over the
FBI's surveillance ability by requiring the FBI to state, on the
public record, what its surveillance needs are.
The FBI has faced stiff resistance from civil liberties groups and some
members of Congress and has not yet been able to obtain funding to
implement the requirements of the law.
As part of the current proposal, the FBI is seeking a mechanism which
will provide funding for CALEA in a way which skirts the public
oversight provisions of the law. This is an extremely troubling move
by law enforcement which, if enacted, would allow law enforcement
essentially unlimited authority to influence the design of
telecommunications networks without any accountability.
Other provisions which could show up in legislation in the next 72 hours are:
o BOMB MAKING MATERIAL ON THE INTERNET
In the wake of the recent public concern about terrorism, Senators
Dianne Feinstein (D-CA) and Joseph Biden (D-DE) have renewed their
efforts to pass legislation to restrict the availability of 'bomb-
making' information on the Internet.
The Feinstein/Biden amendment was added to the Senate Defense
Appropriations bill (S. 1762) in early July, and is not currently part
of the new law enforcement initiative. However, the amendment poses a
serious threat to chill the the free flow of information on the
Internet.
o THREATEN TO IMPOSE NEW RESTRICTIONS ON ENCRYPTION TECHNOLOGIES:
While no specific legislation has been proposed, the Clinton
Administration has circulated an outline to Congress which states:
"We will seek legislation to strengthen our ability to
prevent terrorists from coming into the possession of the technology
to encrypt their communications and data so that they are beyond the
reach of law enforcement."
This statement marks the first time that the Administration has
suggested legislation to restrict encryption. This is especially
troubling because it comes at a time of growing Congressional support
for legislation to promote privacy and security tools for the Net.
Of even more concern, the Administration is clearly attempting to use
the recent suspected terrorist incidents to push for a new and more
restrictive encryption policy.
If the Administration succeeds in passing new restrictions on
encryption as part of the new surveillance legislation, the future
of the Internet as a secure and trusted platform for commerce and
private communication will be threatened.
Some or all of these provisions may be included in a package voted
on by both houses by August 3rd. It is not clear what a final bill
will look like, and some of these provisions may not be considered by
Congress until later this summer.
----------------------------------------------------------------------
PARTICIPATING ORGANIZATIONS
The following organizations all urge you to take this action to combat the
surveillance initiatives. Check their pages for more background
information on these issues.
American Civil Liberties Union (http://www.aclu.org)
American Communication Association
Center for Democracy and Technology (http://www.cdt.org)
Electronic Frontier Foundation (http://www.eff.org)
EF-Austin (http://www.efa.org)
Electronic Privacy Information Center (http://www.epic.org)
Feminists for Free Expression
National Libertarian Party (http://www.lp.org)
National Writers Union (http://www.nwu.org/nwu/)
People For the American Way (http://www.pfaw.org)
Voters Telecommunications Watch (http://www.vtw.org)
Wired Ventures Ltd. (http://www.hotwired.com)
======================================================================
Just processed these additional items on the administration's FAST-moving
efforts to demolish freedom and privacy in Amerika.
--jim
&&&&&&&&&&&&&&&&&&&&
HOUSE VOTE TO ALLOW MASSIVE, ILL-CONTROLLED SURVEILLANCE, LIKELY TODAY!
Date: Fri, 2 Aug 1996 11:07:40 -0400
From: jseiger@cdt.org (Jonah Seiger)
Subject--URGENT: Surveillance Bill Gets New Life - House Vote Likely TODAY!
(please forward where appropriate)
It's not over yet....
The House has scheduled a vote on "suspension" for a 'counter-terrorism'
bill TODAY (Friday).
Despite media reports that the negotiations had stalled out, house
Republicans have apparently worked out their differences and are set to
vote on the bill today. The Senate may or may not vote on the measure on
Saturday.
No one I've talked to knows for sure what's in the bill, though I have
heard that there are no encryption provisions and that some of the wiretap
proposals have been scaled back.
I will post details as I get them. In the mean time, keep those calls
coming into Congress.
Jonah
** THE FIGHT FOR FREE SPEECH ONLINE CONTINUES TO THE SUPREME COURT **
It's not too late to be a part of history -- Join the Lawsuit
<http://www.cdt.org/ciec> -- <ciec-info@cdt.org>
--
Jonah Seiger, Policy Analyst Center for Democracy and Technology
<jseiger@cdt.org> 1634 Eye Street NW, Suite 1100
Washington, DC 20006
PGP Key via finger (v) +1.202.637.9800
http://www.cdt.org/ (f) +1.202.637.0968
http://www.cdt.org/homes/jseiger/
&&&&&&&&&&&&&&&&&&&&
Date: Fri, 2 Aug 1996 12:17:07 -0400
From: jseiger@cdt.org (Jonah Seiger)
Subject--More on the latest Surveillance Bill...
The outline below is from a document produced by the House Republican
Conference. It is ONLY A SUMMARY of the proposed bill and is NOT actual
legislation. No one I have spoken with has seen any specific legislative
language yet.
The outline is confusing on several points, particularly the "FBI DIGITAL
TELEPHONY" Section, which says:
"The bill authorizes the FBI to use enhanced telephone technology to
investigate suspected terrorist activity. Funding for equipment purchase was
provided in the 1996 omnibus appropriations measure enacted earlier this
year."
The first sentence above is not at all clear, and probably won't be until
we can get our hands on the actual text of the bill. It could be additional
wiretap authority (ie, roving wiretaps), or it could be nothing. As far as
the funding goes, the "1996 omnibus appropriations measure" DID NOT contain
funding for implementation of the law - but it did appropriate $37 million
to cover new equipment for the FBI.
The rest looks like it is a scaled back version of a measure the
Administration and members of Congress were pushing earlier this week, but
the scope of the new bill depends a lot on what the actual text says.
I will post additional information as soon as I get it.
Jonah
--
Bipartisan Antiterrorism Initiative
HR__
Committee on the Judiciary
No Report Filed
To Be Introduced
Floor Situation:
The House is scheduled to consider HR__ on Friday August 2, 1996. On
Thursday August 1, the Rules Committee granted a rule to allow the bill to
be considered under suspension of the rules. It is debatable for 40
minutes, may not be amended, and requires a two-thirds vote for passage.
Summary:
HR__ includes several bipartisan initiatives intended to bolster federal
efforts to combat domestic terrorism in addition to those already enacted
earlier this year as part of the 1996 Antiterrorism and Effective Death
Penalty Act (P.L. 104-132). The bill contains the following
counter-terrorism provisions:
Aviation SECURITY MEASURES: The bill enables domestic airports to
aggressively search for and prevent explosives from causing destruction and
harm to individuals or property through enhanced explosive detection
procedures, baggage and passenger screening, and FBI authority to improve
airport security training and standards to ensure that provisions of the
1990 Aviation Security Act (P.L 101-604) are implemented expeditiously.
Specifically, the bill (1) requires the FAA to implement increased
explosives section methods immediately, (2) strengthen the level of
training and expertise possessed by security personnel who are assigned to
domestic airports, (3) allows airports to use available funding to
reinforce such training for security personnel, and (4) extends criminal
background requirements to include a greater number of airport employees.
IMPLEMENTATION OF EXISTING ANTI-TERRORISM LAWS: The bill urges
implementation of provisions enacted in the 1996 Antiterrorism and
Effective Death Penalty Act (P.L. 104-132), such as designating and
freezing the assets of foreign terrorist organizations and implementing
expedited removal procedures for aliens convicted of a crime.
BIPARTISAN "BLUE RIBBON" COMMISSION: The bill establishes a special
commission to review all aspects of U.S. anti-terrorism policy and make
legislative recommendations about methods to most effectively establish a
long-term defense against terrorist threats, including enhancing the
nation's human intelligence capabilities.
PRIVACY ACT AMENDMENTS: The bill includes provisions which grant a cause of
action against the U.S. if in the course of a wiretap investigation
damaging information is willfully disclosed to the detriment of an innocent
party by the federal government. The cause of action includes monetary
damages to the plaintiff if a favorable decision is rendered in federal
court.
EXPLOSIVES STUDY: The bill authorizes a study on black and smokeless powder
by an independent agency selected by the National Institute of Justice.
FEDERAL RACKETEERING STATUTE CRIMES: The bill permits federal prosecutors
to deem those acts determined to be terrorist in nature as substantial
enough to invoke criminal prosecution under existing criminal racketeering
(RICO) statutes.
FBI DIGITAL TELEPHONY: The bill authorizes the FBI to use enhanced
telephone technology to investigate suspected terrorist activity. Funding
for equipment purchase was provided in the 1996 omnibus appropriations
measure enacted earlier this year.
<...>
Jonah Seiger, Policy Analyst Center for Democracy and Technology
<jseiger@cdt.org> 1634 Eye Street NW, Suite 1100
Washington, DC 20006
PGP Key via finger (v) +1.202.637.9800
http://www.cdt.org/ (f) +1.202.637.0968
http://www.cdt.org/homes/jseiger/
&&&&&&&&&&&&&&&&&&&&
ELECTRONIC FRONTIER FOUNDATION ALSO ISSUED A LENGTHY (30KB) ACTION ALERT,
(Excerpted here)
Date: Thu, 1 Aug 1996 21:32:43 -0700 (PDT)
From: Stanton McCandlish <mech@eff.org>
Subject--EFFector Online 09.10: ALERT: Act NOW against wiretapping bill!
Reply-To: editor@eff.org
Organization: Electronic Frontier Foundation
X-EFF_General_Info: info@eff.org
X-URL: http://www.eff.org/pub/EFF/Newsletters/EFFector/
=========================================================================
________________ _______________ _______________
/_______________/\ /_______________\ /\______________\
\\\\\\\\\\\\\\\\\/ ||||||||||||||||| / ////////////////
\\\\\________/\ |||||________\ / /////______\
\\\\\\\\\\\\\/____ |||||||||||||| / /////////////
\\\\\___________/\ ||||| / ////
\\\\\\\\\\\\\\\\/ ||||| \////
=========================================================================
EFFector Online Volume 09 No. 10 Aug. 1, 1996 editors@eff.org
A Publication of the Electronic Frontier Foundation ISSN 1062-9424
IN THIS ISSUE:
ALERT: Congress Rushing to Enact Anti-Privacy Bill - Call Congress NOW!
Introduction
What you can do now
Background
Participating organizations
NewsNybbles
EFF Web Site Now Features "What's Hot" News Updates and Search Engine
Upcoming Events
Quote of the Day
What YOU Can Do
Administrivia
* See http://www.eff.org/Alerts/ or ftp.eff.org, /pub/Alerts/ for more
information on current EFF activities and online activism alerts! *
----------------------------------------------------------------------
Subject--ALERT: Congress Rushing to Enact Anti-Privacy Bill - Call Congress NOW!
--------------------------------------------------------------------------------
**** Last minute update ****
Just before ye editor was about to send this issue out, reports are
filtering in that negotiations on the bill that is the subject of the
alert below, have collapsed.
CNN reports: "Key members of the Senate blamed House conservatives for the
failure, saying they had insisted on linking proposed new
wiretapping authority for the FBI to an expansion of privacy laws."
CNN quotes Rep. Charles Schumer (D-NY) as saying that House Republican
leaders "have come up with this smokescreen called privacy". You may
wish to let Rep. Schumer know how you feel about your right to privacy
being labelled "a smokescreen":
9th Dist. NY Schumer, Charles E. (D)
1-202-225-6616 (voice), 1-202-225-4183 (fax)
The full text of the CNN article is available at:
http://www.cnn.com/US/9608/01/wh.terror.bill/index.html
The article also reports that "lawmakers said there is hope for
agreement after the month long" Congressional recess beginning at the end
of this week.
THIS MEANS THAT THE ALERT BELOW IS STILL URGENT, and still important.
We just have a short breathing space now.
- mech@eff.org
____ _____ ____ ___ _ _____ ____ _____
| _ \| ____| _ \ / _ \| | | ____| _ \_ _| CONGRESS RUSHING TO
| |_) | _| | | | | | |_| | | | _| | |_) || | ENACT SURVEILLANCE
| _ <| |___| |_| | | _ | |___| |___| _ < | | LEGISLATION. CALL
|_| \_\_____|____/ |_| |_|_____|_____|_| \_\|_| CONGRESS NOW! 8/1/96
REPOST THIS ALERT WHERE APPROPRIATE
DO NOT REDISTRIBUTE AFTER AUGUST 7, 1996
______________________________________________________________________
Table of contents
Introduction
What you can do now
Background
Participating organizations
______________________________________________________________________
* INTRODUCTION
<...>
* WHAT YOU CAN DO NOW
CALL KEY MEMBERS OF CONGRESS IMMEDIATELY!
NO LATER THAN FRIDAY (8/2/96)
Please contact as many elected officials on the list below as you can.
Urge them to "go slow" and carefully consider the impact these
surveillance proposals will have on the privacy and security of
all Internet users.
Tell them while you appreciate their concern about combating terrorism,
the measures being proposed have many potential side effects which must be
carefully considered.
1. Call the key members of Congress below and ask them to "go slow" and
examine the issues before rushing into changing the delicate balance
of law enforcement surveillance and the public.
2. If you are at a loss for words, use the following sample communique:
SAMPLE COMMUNIQUE
Dear _________,
Please do not rush the passage of counter terrorism legislation;
I'm concerned that Congress is rushing without carefully
considering the implications of privacy. I'm from <city, state>.
Thanks, <click>
You should call the following members of Congress because they
are steering this legislation and need to hear there is support
for slow, deliberate, thoughtful consideration of this issue.
Some of thee members *have publicly expressed reservations* about this
legislation, and we should support them in their efforts.
Senate members:
P ST Name and Address Phone Fax
= == ======================== ============== ==============
R MS Lott, Trent 1-202-224-6253 1-202-224-2262
D DE Biden Jr., Joseph R. 1-202-224-5042 1-202-224-0139
D SD Daschle, Thomas A. 1-202-224-2321 1-202-224-2047
R UT Hatch, Orrin G. 1-202-224-5251 1-202-224-6331
R PA Specter, Arlen 1-202-224-4254 1-717-782-4920
D VT Leahy, Patrick J. 1-202-224-4242 1-202-224-3595
House members:
Dist ST Name, Address, and Party Phone Fax
==== == ======================== ============== ==============
6 GA Gingrich, Newt (R) 1-202-225-4501 1-202-225-4656
3 MO Gephardt, Richard A. (D) 1-202-225-2671 1-202-225-7452
6 IL Hyde, Henry J. (R) 1-202-225-4561 1-202-226-1240
14 MI Conyers Jr., John (D) 1-202-225-5126 1-202-225-0072
President William Clinton:
White House Comment Line: 1-202-456-1414
3. If you get a response, take a moment and send mail to vtw@vtw.org
with "feedback" in the subject line.
$ Mail vtw@vtw.org
Subject--my feedback from calling Congress
They said they're not going to pass most of Clinton's package,
because it upsets the delicate balance between law enforcement and
the public.
^D
Mail sent!
------------------------------
Date: Thu, 21 Mar 1996 22:51:01 CST
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 2--Cu Digest Header Info (unchanged since 7 Apr, 1996)
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.
CuD is available as a Usenet newsgroup: comp.society.cu-digest
Or, to subscribe, send post with this in the "Subject:: line:
SUBSCRIBE CU-DIGEST
Send the message to: cu-digest-request@weber.ucsd.edu
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.
To UNSUB, send a one-line message: UNSUB CU-DIGEST
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
(NOTE: The address you unsub must correspond to your From: line)
Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
In ITALY: ZERO! BBS: +39-11-6507540
In LUXEMBOURG: ComNet BBS: +352-466893
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
URL: http://www.soci.niu.edu/~cudigest/
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.
DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.
------------------------------
End of Computer Underground Digest #8.57
************************************