Copy Link
Add to Bookmark
Report
Computer Undergroud Digest Vol. 10 Issue 15
Computer underground Digest Sun Mar 1, 1998 Volume 10 : Issue 15
ISSN 1004-042X
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
Archivist: Brendan Kehoe
Shadow Master: Stanton McCandlish
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Field Agent Extraordinaire: David Smith
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
CONTENTS, #10.15 (Sun, Mar 1, 1998)
File 1--Privacy groups tell FCC to deep-six wiretap law
File 2--SLAC Bulletin, February 14, 1998
File 3--Thoughts on the Coaltion of ISPs and the Usenet Blockade
File 4--Cu Digest Header Info (unchanged since 7 May, 1997)
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
---------------------------------------------------------------------
Date: Wed, 11 Feb 1998 17:33:17 -0800 (PST)
From: Declan McCullagh <declan@well.com>
Subject: File 1--Privacy groups tell FCC to deep-six wiretap law
Seems as though even the folks (not the undersigned) who lauded the virtues
of the Digital Telephony wiretapping law and cut a deal to ensure its
passage are now claiming it's gone astray. Attached below are comments
filed (I believe today) with the FCC on the law.
Even if you don't care about wiretapping, consider this: the Digital
Telephony law requires technology firms to make communications readily
snoopable by law enforcement agents. Think of this as a precedent for
requiring technology firms to make //encrypted// communciations readily
snoopable by law enforcement agents.
Trust me, even if you haven't thought about that precedent and its value
when lobbying members of Congress, Louis Freeh has.
-Declan
******
Before the
Federal Communications Commission
Washington, D.C. 20554
In the Matter of )
) CC Docket No. 97-213
Communications Assistance for )
Law Enforcement Act )
Surreply Comments of
The American Civil Liberties Union
The Electronic Privacy Information Center
The Electronic Frontier Foundation
Computer Professionals for Social Responsibility
The American Civil Liberties Union (ACLU), Electronic Privacy
Information Center (EPIC), Electronic Frontier Foundation (EFF), and
Computer Professionals for Social Responsibility (CPSR) respectfully
submit these surreply comments in the above referenced proceeding. Our
organizations represent a broad perspective of public interest, privacy and
civil liberties interests.
ACLU, EPIC and EFF jointly filed comments with the Federal
Communications Commission in response to the Notice of Proposed
Rulemaking (NPRM) on implementation of the Communications Assistance
for Law Enforcement Act (CALEA) on December 12, 1997. In our
previous comments, we urged the Commission to exercise its statutorily
conferred authority to delay compliance with the Act until October, 2000.
However, after reviewing the comments filed by the Federal Bureau
of Investigation (FBI), public interest groups, and industry; and in light of
the FBI's four year delay in releasing to the public the statutorily required
Notice of Capacity; and the FBI's obstruction of the adoption of industry
compliance standards that are feasible and technically possible, we are
convinced that the Commission must indefinitely delay the implementation
of CALEA. We call on the Commission to report to Congress on the
serious legal, technical, and policy obstacles that have thwarted CALEA's
implementation. Our organizations also request that the Commission
require the FBI to provide comment-- on the public record-- explaining their
failure to meet the statutory Notice of Capacity Requirement imposed by
Congress nearly four years ago.
Our requests in this proceeding are based on several provisions for
government accountability and privacy protection incorporated in CALEA
and its legislative history, which has thus far been largely ignored.
Section
107 of CALEA provides that any person(s), including public interest
groups, concluding that any standard issued on the implementation of the
Act is deficient, may petition the Commission for review. This section
provides that one factor for judging the acceptability of standards is whether
they protect the privacy of communications that are not permitted to be
intercepted under the law.
Furthermore, the legislative history of CALEA makes clear that the
Commission's authority over this implementation process is designed to
ensure that the following goals are realized: (1) Costs to consumers are kept
low, so that 'gold-plating' by the industry is kept in check; (2) the
legitimate
needs of law enforcement are met, but that law enforcement does not engage
in gold-plating of its demands; (3) privacy interests of all Americans are
protected; (4) the goal of encouraged competition in all forms of
telecommunications is not undermined, and the fact of wiretap compliance is
not used as either a sword or a shield in realization of that goal.
Because our organizations have concluded that these statutory goals
have not been satisfied, we believe it is incumbent on the Commission to
take action with regards to our requests. In these surreply comments we
will also address several issues raised in submissions of other interested
parties that call for an expansion of the CALEA's mandate and that run
counter to Congress' stated goals.
I. The FBI has Disregarded the Congressional Limitations and
Statutory Obligations Imposed on Law Enforcement by CALEA:
CALEA explicitly called on law enforcement to issue a technical
capacity notice by October 25, 1995, one year after the law's enactment.
Carriers were given three years after the notification to install capacity
meeting the notification requirements. Thus, under the statutory timetable,
industry's deadline for compliance was to have been October 1998.
Section 104(a)(2) requires that the technical capacity notice
provide a
numerical estimate of law enforcement's anticipated use of electronic
surveillance for 1998. The notice is required to establish the maximum
interceptions that a particular switch or system must be capable of
implementing simultaneously.
By mandating the publication of numerical estimates of law
enforcement surveillance activity, Congress intended CALEA's notice
requirements to serve as accountability "mechanisms that will allow for
Congressional and public oversight. The bill requires the government to
estimate its capacity needs and publish them in the Federal Register."
In addition to the concerns of privacy advocates, the Public Notice
requirement was based on industry concerns that the cost of providing
intercepts was becoming an undue burden on companies and that the
number of intercepts was growing too rapidly for industry to respond. In
1994, AT&T testified that such law enforcement notice was necessary for
industry to accomplish the following:
-require law enforcement to focus on what it actually requires to accomplish
its legitimate needs thereby freeing resources they do not actually require
for
other purposes;
-provide an essential mechanism for Congress to control both the costs and
level of law enforcement involvement in the development of new services;
-ensure that the fewest taxpayer dollars are spent to address law
enforcement concerns.
As documented in detail in our prior comments, the FBI has yet to
provide the mandated Notice of Capacity. The Bureau has thus far released
two initial notices that were both withdrawn after sharp public criticism over
the FBI's failure to meet the statutory requirements.
The FBI comments also do not explain why the public and Congress
should ignore their failure to meet this statutory obligation. Instead, the
FBI
asserts that public safety should override any technical problems industry
groups may face in complying with CALEA's statutory deadline.
However, we believe that this assertion has also not been justified by the
FBI to date.
According to statistics released by the Administrative Office of the
U.S. Courts and the Department of Justice, the actual number of
interceptions has risen dramatically each year and in 1996 alone 2.2 million
conversations were captured by law enforcement. A total of 1.7 million of
these intercepted conversations were deemed not "incriminating" by
prosecutors. Our organizations believe that these numbers do little to
support the FBI contentions that CALEA should be given broad
interpretation.
Moreover, the FBI comments state that a blanket extension on the
compliance with CALEA should not be granted despite the impasse
between industry and law enforcement because of the potential threat to
public security. While we recognize the importance of protecting the
public, Congress required that there be a balancing of the interests of law
enforcement with the need to protect privacy and develop new technologies.
Specifically, Congress had the following objectives:
(1) to preserve a narrowly focused capability for law enforcement agencies
to carry out properly authorized intercepts;
(2) to protect privacy in the face of increasingly powerful and personally
revealing technologies; and
(3) to avoid impeding the development of new communications services and
technologies.
Hence, we are not persuaded by the FBI's conclusion that there
should not be a blanket extension for compliance with CALEA. Until it is
clear that each of the Congressional objectives is met and there is a public
release by the FBI of its statutorily mandated Notice on Capacity, the
technical compliance with the Act should be postponed.
II. The FBI Has Not Maintained Narrowly Focused Capability for
Law Enforcement Agencies to Carry Out Authorized Intercepts
The FBI's bad faith in the implementation process has prevented the
development of acceptable technical standards that are feasible by industry.
As our prior comments document and industry comments support, the FBI
has repeatedly endeavored to require that industry meet a FBI wish-list of
surveillance capability needs never contemplated by Congress. Indeed,
avoiding such an impasse was precisely why Congress explicitly redrafted
the statute in 1994 to eliminate law enforcement control over industry
standard-setting.
Instead of preserving a narrow focus on surveillance capability, the
FBI has sought an expanded capability by interpreting CALEA to apply to
entities and user services specifically exempt by Congress. The comments
submitted by the FBI underscore the validity of our concerns by presenting
a wish-list of items that go far beyond the authorized electronic surveillance
under the provisions of Title III of the Omnibus Crime Control and Safe
Streets Act of 1968, the Electronic Communications Privacy Act of 1986
and CALEA.. For example, the FBI comments call for CALEA compliance
by carriers providing access to information services, private
communications services, and paging services -- an expansion of
surveillance capabilities never contemplated by Congress.
(a) Information services
In paragraph 29 of its submission, the FBI states that it agrees that
providers of "exclusively information services are excluded from CALEA"
but that "any portion of a telecommunications service provided by a
common carrier that is used to provide transport access to information
services is subject to CALEA."
Such services are explicitly exempt under the statute. Section 103
(4)(b) provides limitations on what services are required to meet assistance
capability requirements under CALEA. It states:
(b) Limitations:
(2)Information services; private networks and interconnection services and
facilities. The requirements of subsection (a) do not apply to--
(A) information services; or
(B) equipment, facilities, or services that support transport or switching of
communications for private networks or for the sole purpose of
interconnecting telecommunications carriers.
Congress explicitly rejected any application of CALEA to
information services including electronic mail and on-line services
recognizing that interception of those communications is the equivalent of
"call content" and is therefore, subject to a much higher degree of protection
under the Constitution. The FBI, and the Commission NPRM, incorrectly
assume there is a distinction between carriers that exclusively provide
information services and common carriers that provide access for
information services. The FBI is simply attempting to gain back-door
access to information services contrary to Congress' intent.
(b) Carriers Providing Private Services:
Paragraph 22 of the FBI comment states that "there may exist
telecommunications companies that do not hold themselves out to serve the
public indiscriminately that should also be treated as 'telecommunications
carriers' by the Commission. Otherwise, companies that hold themselves
out to serve particular groups may, intentionally or inadvertently, undermine
CALEA."
Thus, the FBI's conclusion that private services that do not
indiscriminately provide services to the public fall within CALEA's ambit is
unwarranted. Indeed as the legislative history states:
"...telecommunications services that support or transport switching of
communications for private networks or for the sole purpose of
interconnecting telecommunications carriers...need not meet any wiretap
standards...Earlier digital telephony proposals covered all providers of
electronic communications services, which meant every business and
institution in the country. That broad approach was not practical. Nor was
it justified to meet any law enforcement need."
Indeed the explicit exclusion of private networks was also based on
the potential threats to personal privacy that such could be incurred by
requiring private networks to meet the CALEA configuration requirements.
CALEA's legislative history states that private networks are not the usual
focus of court authorized electronic surveillance and that these networks,
although excluded by CALEA's requirements, may be required to provide
law enforcement with access to information after receiving a court order.
(c) Paging services:
Paragraph 25 of the FBI comments state: "Law enforcement
contends that paging systems should be included in the definition of
"telecommunications carrier" for the purposes of interpreting CALEA
because paging systems generally fall within the definition of common
carrier or, at minimum, rely on common carriers to be activated."
Paging service's reliance on common carriers for activation does not
automatically compel their compliance with CALEA.
III. The FBI Has Ignored Privacy Protection Requirements
The Congress specifically required privacy safeguards to assure that
communications not be made vulnerable to hackers and rogue wiretaps as a
result of CALEA. Section 105 of CALEA, Systems Security and Integrity,
mandates that "telecommunications carriers shall ensure that any
interception of communications or access to call-identifying information
effected within its switching premises can activated only in accordance with
a court order or other lawful authorization...". However, the FBI comments
and FCC NPRM merely reduce privacy concerns to questions of
telecommunication carrier recordkeeping and employee screening measures.
Furthermore, Section V of the FBI comments, which addresses the
carrier security procedures, attempts to undermine the protections against
unlawful government surveillance guaranteed in the Electronic
Communications Privacy Act of 1986. 18 U.S.C. 2510, et. seq. This section
asserts that there is "anecdotal evidence" that carriers have refused to
comply with law enforcement requests for wiretapping where there is
confusion as to the validity of court orders. As a result, the FBI has called
on the Commission to limit the ability of carriers to question the lawfulness
of requests for interception by various law enforcement entities. Similarly,
paragraph 47 states that "[c]arriers are the implementers, not the enforcers,
of lawful intercept orders or certifications under the electronic surveillance
laws."
We strongly disagree with that conclusion. Carriers have an
affirmative obligation under ECPA to ensure that they are not wrongfully
disclosing information to the government or third parties. The failure of
carriers to exercise good faith judgment and carefully scrutinize such
requests for information may expose them to criminal and civil liability
under ECPA. 18 U.S.C. 2520 (d). We believe that a Commission ruling
providing that carrier's lack the ability to scrutinize the validity of
warrants
would require them to abrogate their statutory good faith obligations. In
addition, the Commission lacks authority to limit the rights of carriers to
review such orders and such a requirement would not comport with other
federal and state requirements.
Paragraph 46 of the FBI comments broadly states that carriers may
not question law enforcement authority to conduct wiretapping
investigations where one party has consented to interception. The FBI
broadly states that "[i]n such cases, the electronic surveillance statutes
clearly indicate that no court order is required."
We similarly disagree with this conclusion. Currently, at least 12
states do not permit "one party consent" to interceptions of communications.
Thus, we believe that a Commission rule limiting carrier discretion would
certainly create pre-emption questions where there is no Congressional basis
and where the request comes from state law enforcement.
Conclusion
Congress envisioned CALEA's implementation as an open process
that would ensure accountability and prevent the development of
unprecedented surveillance capabilities. The expanded capabilities sought by
the FBI, along with their non-compliance with CALEA's Public Notice of
Capacity Requirements warrant serious Commission and Congressional
response.
Our organizations believe that given the FBI's failure to meet public
accountability provisions, the Commission must indefinitely delay the
implementation of CALEA and report to the Congress on the serious
obstacles that have thwarted its implementation to date. We also ask that the
Commission require the FBI provide comment on the public record
explaining its failure to meet it unambiguous statutory obligations under
CALEA.
Respectfully Submitted,
_____________________________________
Laura W. Murphy, Director
Greg Nojeim, Legislative Counsel
A. Cassidy Sehgal, William J. Brennan Fellow
American Civil Liberties Union
Washington National Office
122 Maryland Ave, NE
Washington, D.C. 20002
(202) 544-1681
Marc Rotenberg, Director Barry Steinhardt, President
David L. Sobel, Legal Counsel Electronic Frontier Foundation
David Banisar, Staff Counsel 1550 Bryant Street, Suite 725
Electronic Privacy Information Center San Francisco CA 94103
666 Pennsylvania Ave., SE, Suite 301 (415) 436-9333
Washington, D.C. 20003
(202) 544-9240
Computer Professionals for
Social Responsibility
CPSR, P.O. Box 717,
Palo Alto, CA 94302
(650) 322-3778
cc:
Rep. Bob Barr
Sen. Orrin Hatch
Sen. Patrick Leahy
Rep. Henry Hyde
Sen. Ashcroft
Sen. Edward McCain
Sen. Arlen Spector
Rep. Billy Tauzin
Rep. McCollum
Rep. Charles Schumer
The Communications Assistance for Law Enforcement Act, Pub. L. No.
103-414, 108 Stat. 4279 (1994)
(codified as amended in sections of 18 U.S.C. and 47 U.S.C.)
Statement of the AT&T Corporation Before the House Subcommittee on Civil
and Constitutional Rights
and Senate Subcommittee on Technology and Law, reprinted, in Schneier and
Banisar: The Electronic
Privacy Papers, Wiley and Sons, 1997.
See generally, EPIC letter to The Telecommunications Industry Liason
Unit, November 13, 1995,
reprinted in 1996 Electronic Privacy and Information Center, Cryptography
and Privacy Sourcebook, 1996,
discussing the failure of the Initial FBI Notification of Law Enforcement
Capacity Requirements to meet
CALEA's obligations.
---------------------------------------------------------
POLITECH -- the moderated mailing list of politics and technology
To subscribe: send a message to majordomo@vorlon.mit.edu with this text:
subscribe politech
More information is at http://www.well.com/~declan/politech/
------------------------------
Date: Sat, 14 Feb 1998 13:09:56 -0500 (EST)
From: jw@bway.net
Subject: File 2--SLAC Bulletin, February 14, 1998
SLAC Bulletin, February 14, 1998
---------------------------------
The SLAC Bulletin is a low-volume mailer (1-5 messages per month)
on Internet freedom of speech issues from Jonathan Wallace,
co-author of Sex, Laws and Cyberspace (Henry Holt 1996) and
publisher of The Ethical Spectacle (http://www.spectacle.org). To
add or delete yourself:
http://www.greenspun.com/spam/home.tcl?domain=SLAC
NO GATEKEEPERS
Jonathan Wallace jw@bway.net
Our president's latest scandal was broken by Internet columnist
Matt Drudge, who reported that Newsweek had spiked a story about
Monica Lewinsky.
Some people see that as a black eye for the print media and a
victory for the Internet. Not First Lady Hilary Clinton, who was
asked about the Net's role in dissemination of news at a press
conference on February 11.
"As exciting as these new developments are.... there are a number
of serious issues without any kind of editing function or
gate-keeping function. What does it mean to have the right to
defend your reputation, or to respond to what someone says?
"There used to be this old saying that the lie can be
halfway around the world before the truth gets its boots on.
Well, today, the lie can be twice around the world before the
truth gets out of bed to find its boots. I mean, it is just
beyond imagination what can be disseminated."
Clinton was asked whether she favored regulation of the Net. She
said she didn't yet know, but commented:
"Anytime an individual or an institution or an invention leaps
so far out ahead of that balance [contemplated by the Founders]
and throws a system, whatever it might be --political, economic,
technological --out of balance, you've got a problem, because
then it can lead to the oppression of people's rights, it can
lead to the manipulation of information, it can lead to all kinds
of bad outcomes which we have seen historically. So we're going
to have to deal with that."
These are among the most scary words ever said about Net
regulation. Contrast them to the rhetoric we're used to, about
the Net as a hydra-headed pornmonger reaching into your child's
bedroom. Censorship advocates like former Senator Exon at least
have the decency to pretend that all they care about is
"decency." Mrs. Clinton goes a huge step further: she's worried
about information. Not just falsehood. Information. Obviously,
for her the right result was Newsweek's decision to spike the
story, not Drudge's to run it.
We're already far enough along in the Lewinsky scandal to know
something happened. The President and Mrs. Clinton have endured a
lot of falsehood on the Net. I don't remember either of them
calling for Net regulation because of Usenet postings or Web
pages claiming that the military shot down flight 800, or that
Ron Brown or Vincent Foster were assassinated. It took the truth,
not a lie, to make Hilary Clinton say the Net is dangerous.
This recalls the early days of the republic, when laws banning
"seditious libel" were in force. Back then, there were greater
penalties for telling the truth than for lying. People might
disbelieve a lie. The truth was more damaging.
Preserve us from gatekeepers. Their function is highly
overrated. Yes, they filter out some falsehoods, but they also
print some, while blocking some truths. Their sense of what
interests the public is notoriously faulty and unrepresentative.
Most of the time, if I really want to drill down into an issue
and get to to the truth, I get my information from the Net.
I didn't see Hilary Clinton's comments above reported in the
print media; I got them from a posting by Declan McCullagh to his
fight-censorship list. For three years, I've written whatever I
wanted, whenever I felt like, in The Ethical Spectacle and to my
mailing lists. A gatekeeper of any kind would have spiked most of
of the stories I wrote about. An editor might have made some
little contribution to my grammar or, on occasion, my spelling.
In the balance, I've done much better without gatekeepers than I
have with them.
Contrast the experience I've had writing for others. In the past
three years, I've had articles killed by print media, or edited
beyond recognition. Language I never wrote expressing ideas that
aren't mine has been introduced. I even saw scores of
typographical errors crop up in the hardcover of Sex, Laws and
Cyberspace during the editing process. More people read The
Ethical Spectacle in a month than have read that book in the two
years it has been out.
People like Hilary Clinton want gatekeepers for the Net not to
screen for falsehood but to keep the truth within acceptable
parameters. Government censorship isn't necessary when the media
censors itself. Mrs. Clinton appears to hold the "Don't make me
come over there" theory of government.
A much better opinion of the value of a medium without
gatekeepers was expressed by Judge Stewart Dalzell in his opinion
in ACLU v. Reno, invalidating the Communications Decency Act.
Judge Dalzell appreciated the Net's "low barriers to entry",
"astoundingly diverse content" and "relative parity among
speakers." His fascinating conclusion was that the Net is
superior to print media as a "speech-enhancing medium" precisely
because of the lack of gatekeepers:
"It is no exaggeration to conclude that the Internet has
achieved, and continues to achieve, the most participatory
marketplace of mass speech that this country -- and indeed the
world -- has yet seen.... Indeed, the Government's asserted
'failure' of the Internet rests on the implicit premise that too
much speech occurs in that medium, and that speech there is too
available to the participants."
He noted that, if the government were permitted to impose
gatekeepers on the Net, the "Internet would ultimately come to
mirror broadcasting and print, with messages tailored to a
mainstream society" where "economic power has become relatively
coterminous with influence."
Judge Dalzell praised "the autonomy" that the Net "confers to
ordinary people as well as media magnates." This autonomy is
precisely what frightens Hilary Clinton.
------------------------------
Date: Tue, 24 Feb 1998 09:20:53 -0600
From: Richard MacKinnon <spartan@actlab.utexas.edu>
Subject: File 3--Thoughts on the Coaltion of ISPs and the Usenet Blockade
The Usenet Blockade
The Usenet Death Penalty (UDP) is a misnomer because it is not a form of
virtual capital punishment--at least not in the short-term. It is more akin
to a blockade or a seige. A Usenet Blockade may be an effective means of
coercing the Netcom leadership to better address the antisocial activities
originating from the base camp of spammers located within its borders.
Primarily an economic attack, blockades have been used throughout history to
help meatspace governments align their priorities with their neighbors.
Since Usenet consists of several sovereignties, it can be useful to apply
much of what we know about international relations, that is, the theories
relating to national actors interacting in an ungoverned space. As an
ungoverned space, Usenet is learning how to self-govern by way of coalitions
which is the primary way actors move out of the state of nature into
relative civilization.
Competing Illiberalisms
There is no doubt that spam is a major annoyance for the Usenet world, and
for some there is a real economic cost. As a result, users have turned to
their leaders for solutions. These solutions range from personal defense
systems (filtering software), to isolationism (closed systems), to blockades
(the Usenet death penality). Unfortunately, all three categories of
solutions pose serious challenges to the concept of free speech and the free
movement of information--arguably an ideology foundational to Usenet. The
challenge is to determine which solution is less illiberal and to determine
who ought to make this determination.
Analysis of the Competition: Defense systems may be end-user based,
ISP-based, or network-based.
End-User based
1. In the event of bombing (Usenet "spamming" in this example), end-users
may purchase among the many competing brands of poor, mediocre, and barely
satisfactory personal filtering systems on the open market. A functioning,
Reaganesque "Star Wars Defense" system has not yet appeared in the
state-of-the-art efforts--not only do the defense systems screen out
incoming missiles, they often screen out rain, sunlight, and other useful
things causing the otherwise vivacious virtual environment to wilt, dry up,
and become dull.
2. Frustratingly, they also fail in their primary mission and let a lot of
missiles through with varying degrees of casualties reputedly ranging from
exposing children to naked adults and exposing adults to naked children.
This is something that software may never be able to dress/address.
3. There is a lot of political controversy over these inadequacies. Leaders
of various end-user communities have met with representatives of the
moral-military-industrial complex in an attempt to either make better
personal defense systems or eliminate their use altogether. As Bruce
Sterling in Austin observed at last week's Conference on Computers, Freedom
and Privacy, the resolution seemingly lies beyond the grasp of even the
White House Office of Science and Technology which finds it simpler to
tackle the problems posed by theoretical physics and space exploration.
Needless to say, the resolution is out there--way, way, out there--creating
a vacuum of indecision and an opportunity for ad hocractic power.
ISP-based
4. Some ISPs in the past have attempted to close their borders and restrict
the flow of traffic in and out. This has also been frowned upon by many of
the same leaders of end-user communities. Fundamentally, isolationism is an
ostrich approach to making "foreign policy" among CISPs. The Usenet world
continues to spin and the people with their heads in holes just end up
missing out on lots of interesting events.
5. As a result, lots of disgruntled netizens flee from closed systems to
freer systems. Geo-economics has forced many "virtual countries" to loosen
up their border controls. Naturally, this makes them susceptible to bombing
attacks.
Network-based
6. Virtual countries which are loathe to close their borders because that
policy is inherently illiberal are forced to choose between establishing
network-level blockades or placing the burden of defense on the end-users by
way of personal filtering systems--most of which have also been considered
illiberal.
7. Blockading, fundamentally an ad hoc economic attack, has been identified
as a means of coercing a virtual country into policing the activities within
its borders so that its national digital output (NDO) falls within the
bounds of systemically acceptable end-user behavior. The Leviathan rears
its ugly head.
Who decides?
Should Usenet "global" policy be set by individuals, their virtual
communities, isolated ISPs, coalitions of ISPs (CISP), or national
governments? The logic of collective action in Usenet is governed by a set
of social laws which are elusive but as reliable as many physical laws when
properly understood. As a board member of Electronic Frontiers-Texas
(formerly EFF-Austin), I have been participating in the drafting our
position statement on the Usenet Death Penalty and Netcom. My understanding
of the social laws of ungoverned interaction is that any policy
recommendation to the coalition of ISPs requires as strong an element of
coercion if it is going to get their attention. Otherwise, the ad hoc UDP
CISP will continue to pursue its interest and what it perceives is the
interest of its constituents. The coalition wielding the most coercive
power has the most influence over the ungoverned decisionmaking process.
Who decides?
Should Usenet "global" policy be set by individuals, their virtual
communities, isolated ISPs, coalitions of ISPs (CISP), or national
governments? The logic of collective action in Usenet is governed by a set
of social laws which are elusive but as reliable as many physical laws when
properly understood. As a board member of Electronic Frontiers-Texas
(formerly EFF-Austin), I have been participating in the drafting our
position statement on the Usenet Death Penalty and Netcom. My understanding
of the social laws of ungoverned interaction is that any policy
recommendation to the coalition of ISPs requires as strong an element of
coercion if it is going to get their attention. Otherwise, the ad hoc UDP
CISP will continue to pursue its interest and what it perceives is the
interest of its constituents. The coalition wielding the most coercive
power has the most influence over the ungoverned decisionmaking process.
1. The weakest statement:
"We the people of <insert your organization here> deplore the use of the
Usenet Death Penalty" on Netcom because it infringes on the liberties of
Netcom's end-users--liberties and rights which we hold dear and inalienable.
What happens to Netcom today could happen to us tomorrow."
I like and support this statement, but my understanding of the social
physics is that it is anemic and although it may get some media play, it
will have little actual influence on the play of events. It's an example of
critique without action.
2. One might write a statement as follows:
"We the people of <insert your organization here> deplore the use of the
Usenet Death Penalty" on Netcom because it infringes on the liberties of the
Netcom end-users--liberties and rights which we hold dear and inalienable.
What happens to Netcom today could happen to us tomorrow." Therefore, we
are calling for a general strike against all ISPs which intend to
participate in this egregious and illiberal curtailment of free speech. On
February XX, we are encouraging everyone to close their accounts on these
systems and move to ISPs who refuse to participate in the UDP."
I like this statement better because it uses the logic of the blockade
(economic coercion) against the CISP and it carries the satisfaction of
praxis--theory plus action.
3. Or one could write a statement like this:
"We the people of <insert your organization here> deplore the use of the
Usenet Death Penalty" on Netcom because it infringes on the liberties of the
Netcom end-users--liberties and rights which we hold dear and inalienable.
What happens to Netcom today could happen to us tomorrow." Therefore, we
are calling for a general strike against all ISPs which intend to
participate in this egregious and illiberal curtailment of free speech. On
February XX, we are encouraging everyone to close their accounts on these
systems and move to Netcom in an act of solidarity."
This is the strongest statement because it shows conviction. While most of
us have privately condemned Netcom for permitting the spamming, this
statement underlies our belief that the classification of what is spam and
what it isn't is a dangerous and suspect activity. Further, it shows that
we are willing to give up our own access to Usenet in the fight to guarantee
access to everyone. A long roll-call of voluntary conversions would get the
attention and action need to have an effect. In other words, the statement
should be accompanied with a list that looks something like this:
user@netcom.com, formerly user@MAIN.Org
user@netcom.com, formerly user@unforgettable.com
user@netcom.com, formerly user@mail.utexas.edu
user@netcom.com, formerly user@actlab.utexas.edu
...and thousands of others formerly from everywhere.anywhere
This third statement accompanied by such a list, when presented to the CISP
will carry the political and moral weight necessary to work with the laws of
social physics, not against them.
--Richard MacKinnon (http://www.actlab.utexas.edu/~spartan), author of
"Searching for the Leviathan in Usenet" and "Punishing the Persona:
Correctional Strategies for the Virtual Offender." His views are not
necessarily the views of Electronic Frontiers-Texas or the Advanced
Communication Technologies Laboratory.
-------------------------------------------------------------
Richard MacKinnon http://www.actlab.utexas.edu/~spartan
Government Department mailto:spartan@gov.utexas.edu
Advanced Communication Technologies Laboratory (ACTLAB)
The University of Texas at Austin
------------------------------
Date: Thu, 7 May 1997 22:51:01 CST
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 4--Cu Digest Header Info (unchanged since 7 May, 1997)
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.
CuD is available as a Usenet newsgroup: comp.society.cu-digest
Or, to subscribe, send post with this in the "Subject:: line:
SUBSCRIBE CU-DIGEST
Send the message to: cu-digest-request@weber.ucsd.edu
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.
To UNSUB, send a one-line message: UNSUB CU-DIGEST
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
(NOTE: The address you unsub must correspond to your From: line)
Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.
In ITALY: ZERO! BBS: +39-11-6507540
UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
Web-accessible from: http://www.etext.org/CuD/CuD/
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
URL: http://www.soci.niu.edu/~cudigest/
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.
DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.
------------------------------
End of Computer Underground Digest #10.15
************************************