Copy Link
Add to Bookmark
Report

EFFector Online Volume 8 Number 18

eZine's profile picture
Published in 
EFFector
 · 5 years ago

 
=========================================================================
________________ _______________ _______________
/_______________/\ /_______________\ /\______________\
\\\\\\\\\\\\\\\\\/ ||||||||||||||||| / ////////////////
\\\\\________/\ |||||________\ / /////______\
\\\\\\\\\\\\\/____ |||||||||||||| / /////////////
\\\\\___________/\ ||||| / ////
\\\\\\\\\\\\\\\\/ ||||| \////

=========================================================================
EFFector Online Volume 08 No. 18 Nov. 6, 1995 editors@eff.org
A Publication of the Electronic Frontier Foundation ISSN 1062-9424

IN THIS ISSUE:

ALERT: Net Censorship: Christian Coalition Tops Even Exon
The Latest News
What You Can Do Now
The letter & suggested legislation from Ed Meese and the Christian Right
Chronology of the CDA
For More Information
List Of Participating Organizations
ALERT: Digital Telephony Action - Nov. 15 Deadline!
Background: FBI Draft Capacity Requirements
What You Can Do Now
Congress May Just Not Buy It
House Rejects First DT/CALEA Funding Attempt
Sen. Leahy Definitely Not Buying It
Canadian Law Enforcement Taking the FBI Hint
The Text of the FBI's Federal Register Notice
Newsbytes
EFF Relocation Complete
EFF Rated in Top 5% of the Net by Point Survey
Commerce Dept. IPWG Report on Online Intellectual Property Meets Resistance
IPWG Report's Suggested Legislation: Passed and Pending (+ Canada Tie-In)
Upcoming Articles
Upcoming Events
Quote of the Day
What YOU Can Do
Administrivia

* See http://www.eff.org/Alerts/ or ftp.eff.org, /pub/Alerts/ for more
information on current EFF activities and online activism alerts! *

----------------------------------------------------------------------


Subject: ALERT: Net Censorship, and Christian Coalition v. Human Rights Watch
-----------------------------------------------------------------------------


CAMPAIGN TO STOP THE EXON/COATS COMMUNICATIONS DECENCY ACT
(SEE THE LIST OF CAMPAIGN COALITION MEMBERS AT THE END)

Update: -Latest News:
The Christian Coalition is pushing Congress to censor
the net more heavily than even Sen. J.J. Exon ever imagined.
There is the very real possibility that they may succeed.

You should be very worried. We are.

-What You Can Do Now:
Follow the directions below and call House Speaker
Gingrich and Senate Leader Dole. Implore them
to allow parents to make choices for their children,
instead of government censors.

Volunteer to join the fight by helping organize in your
home town.

CAMPAIGN TO STOP THE UNCONSTITUTIONAL COMMUNICATIONS DECENCY ACT
Nov 2, 1995

PLEASE WIDELY REDISTRIBUTE THIS DOCUMENT WITH THIS BANNER INTACT
REDISTRIBUTE ONLY UNTIL December 1, 1995
REPRODUCE THIS ALERT ONLY IN RELEVANT FORUMS

________________________________________________________________________

CONTENTS
The Latest News
What You Can Do Now
The letter & suggested legislation from Ed Meese and the Christian Right
Chronology of the CDA
For More Information
List Of Participating Organizations

________________________________________________________________________

THE LATEST NEWS

Since the very first day that Senator J.J. Exon (D-NE) proposed censorship
legislation for the Internet, the Christian Right has pushed for the most
restrictive regulations they could think of.

The Religious Right (which does not necessarily speak for all religious
people concerned with this issue) recently tipped their hand in a letter
to Sen. Larry Pressler (R-SD) and Rep. Thomas Bliley (R-VA) requesting
a new and more restrictive net censorship proposal.

There are essentially three new dangerous elements of their campaign
to shut down cyberspace:


INTERNET PROVIDERS, ONLINE SERVICES, AND LIBRARIES CRIMINALLY LIABLE FOR
EXPRESSION ONLINE
The Religious Right has proposed to hold anyone who provides access to the
Internet or other interactive media, including online services providers,
ISP's, BBS's, Libraries, and Schools, criminally liable for all speech
carried on the network.

In order to avoid liability under this provision, service providers would be
forced to monitor user's electronic communications to be assured that
no "indecent" material is transmitted across their networks.

This proposal is MORE RESTRICTIVE than the Exon Communications Decency Act,
or any other net censorship legislation currently in Congress.

In their letter to Congress, the Religious Right says:

[Providers] would simply be required to avoid KNOWING violations of
the law. [emphasis added]

However, the "knowing" standard is vague enough that the mere knowledge
that such material exists could be sufficient to trigger criminal liability.
A single complaint or even a news report could force a service provider to
take down a web page, remove posts to chat rooms or other discussion
forums, or shut down listservs in order to avoid going to jail and facing
huge fines.


A STANDARD FOR INDECENCY
The proposals pushed by the Christian Coalition relies on the
unconstitutional "indecency standard". Like the Exon Communications
Decency Act, the Christian Coalition seeks to regulate all indecent
speech online.

Indecency is a broad category that includes everything from George Carlin's
"seven dirty words" to such classic novels and "The Catcher in the Rye" and
"Lady Chatterly's Lover".

The Supreme Court has ruled that restrictions on indecent speech are
Constitutional only if they rely on the "least restrictive means". Broad
indecency restrictions on interactive media do not satisfy the "least
restrictive means" test, because interactive media allows users and
parents tremendous control over the information they receive.

Any legislation which attempts to apply an indecency restriction to the
Internet is unconstitutional on its face.

The Christian Coalition's proposal that relies on an indecency
restriction contemplates dumbing down every conversation, web page,
newsgroup, and mailing list on the Internet to the level of what is
not offensive to children.

What kind of discussions between adults are possible in an arena
where everything has been reduced to the level of the Lion King?


UNPRECEDENTED CONTROL OVER ONLINE SPEECH FOR THE FCC
The Christian Coalition would give the FCC broad jurisdiction over
cyberspace. It would allow the FCC jurisdiction over your online
speech, and over the design Internet software, such as web browsers and
filtering programs that parents can use to control their children's
access to the Internet.

The Internet has developed from a government project to a market-driven
economic boom for thousands of businesses. Giving the FCC authority over
this medium would significantly hinder the growth of this new industry.

________________________________________________________________________

WHAT YOU CAN DO NOW

1. The proposals from the Religious Right will literally destroy online
speech as we know it. The odds of stopping this are not certain.

There is a very real chance that this legislation will pass, and
we will experience a period of uncertainty and chilling of speech
while an appropriate test case attempts to reach the Supreme Court
(should it even get there!)

The Religious Right has a strong grass-roots network. We need to
counter their energy and ensure cyberspace is not lost due to them.

IMMEDIATELY CALL House Speaker Gingrich (R-GA) and Senate Leader
Dole (R-KS) and urge them to oppose the Christian Coalition's
proposal.

Name, Address, and Party Phone Fax
======================== ============== ==============
R GA Gingrich, Newt 1-202-225-4501 1-202-225-4656
R KS Dole, Robert 1-202-224-6521 1-202-224-8952

If you're at a loss for words, try one of the following:

Please oppose the recent proposal from the Religious Right to
censor the Internet. The only effective way to address children's
access to the Internet is through parental control tools outlined
by the Cox/White/Wyden approach.
or
As a religious person and a parent, I oppose the Religious Right's
attempts to censor the Internet. I am the best person to monitor
my child's access to the Internet using parental control tools
as outlined in the Cox/White/Wyden approach.

2. Join the online fight by becoming a volunteer for your district!

Check to see if your legislator is in the list below. If they are
not, consult the free ZIPPER service that matches Zip Codes to
Congressional districts with about 85% accuracy at:

URL:http://www.stardot.com/~lukeseem/zip.html

The conference committee legislators are:
House: Barr (R-GA), Barton (R-TX), Berman (R-CA), Bliley (R-VA),
Boucher (D-VA), Brown (D-OH), Bryant (D-TX), Buyer (R-IN),
Conyers (D-MI), Dingell (D-MI), Eshoo (D-CA), Fields (R-TX),
Flanagan (R-IL), Frisa (R-NY), Gallegly (R-CA), Goodlatte (R-VA),
Gordon (D-TN), Hastert (R-IL), Hoke (R-OH), Hyde (R-IL),
Jackson-Lee (D-TX), Klug (R-WI), Lincoln (D-AR), Markey (D-MA),
Moorhead (R-CA), Oxley (R-OH), Paxon (R-NY), Rush (D-IL),
Schaefer (R-CO), Schroeder (D-CO), Scott (D-VA), Stearns (R-FL),
White (R-WA)
Senate: Burns (R-MT), Exon (D-NE), Ford (D-KY), Gorton (R-WA),
Hollings (D-SC), Inouye (D-HI), Lott (R-MS), McCain (R-AZ),
Pressler (R-SD), Rockefeller (D-WV), Stevens (R-AK)

If your legislator is on the conference committee, you have a chance
to influence their vote on this issue with your power as a constituent.
Volunteer to help educate your legislator by sending mail to
volunteer@vtw.org. A coalition volunteer will be in touch with you.

You can starting working to help spread the word in your district by
sending this letter to five friends. Ask them to call Dole and Gingrich
as well.

3. The People for the American Way (PFAW) and the American Civil Liberties
Union are organizing a letter from ORGANIZATIONS to the Conference
Committee to oppose the censorship provisions.

If you are a representative of an organization that would like to
signon to this letter, you should contact jlesser@pfaw.org IMMEDIATELY.

4. We can't suggest relaxing at this point. The stakes are too high, and
the risk is too great. Everything now hangs in the balance.

________________________________________________________________________

THE LETTER & SUGGESTED LEGISLATION FROM ED MEESE AND THE CHRISTIAN RIGHT

October 16, 1995

The Honorable Thomas J. Bliley, Jr. Chairman
Committee on Commerce
United States House of Representatives
Washington, DC 20515

The Honorable Larry Pressler, Chairman
Committee on Commerce, Science, and Transportation
United States Senate
Washington, DC 20510

Re: Computer Pornography Provisions in Telecommunications Bill

Dear Mr. Chairmen:

We are writing to urge the conference committee seeking to reconcile the
telecommunications bills passed by the House and Senate include in the
final bill the strongest possible criminal law provisions to address the
growing and immediate problem of computer pornography without any
exemptions, defenses, or political favors of any kind accorded to those
who knowingly participate in the distribution of obscenity to anyone or
indecency to children. While there is no perfect solution to the problem
of computer pornography, Congress could not hope to solve this problem by
holding liable only some who are responsible for the problem.

The recent Justice Department prosecution project targeting those who
violated federal child pornography law using America On-Line is
instructive in this regard. More than ninety individuals were targeted for
prosecution although many others, perhaps as many as 3,000 according to
one press report, were originally targeted by the Department of Justice as
potential violators of child pornography laws. Apparently due to a
shortage of investigative and prosecutorial resources, the project was
limited. Since there are insufficient resources to investigate and
prosecute but a fraction of those that are trafficking in child
pornography by computer, then there will likely be even fewer resources
available to investigate and prosecute those involved in obscenity and
indecency.

Thousands of individuals both in this country and abroad are regularly
placing obscenity and indecency on the Internet. It is not possible to
make anything more than a dent in the serious problem of computer
pornography if Congress is willing to hold liable only those who place
such material on the Internet while at the same time giving legal
exemptions or defenses to service or access providers who profit from and
are instrumental to the distribution of such material. The Justice
Department normally targest the major offenders of laws. In obscenity
cases prosecuted to date, it has targeted large companies which have been
responsible for the nationwide distribution of obscenity and who have made
large profits by violating federal laws. Prosecution of such companies has
made a substantial impact in curbing the distribution of obscenity, with
many such offenders going out of business altogether. So too will
prosecution of access providers which _knowingly_ traffic in obscenity
have a substantial impact, a far greater impact than just the prosecution
of a person who places one or a few prohibited images on the Internet.
Such a person could not traffic in pornography without the aid or
facilitation of the service or access providers. Indeed, if Congress
includes provisions protecting access or service providers in whatever
bill is finally passed, it is likely that most in this country who are
trafficking in indecency to children or obscenity would continue to do so
since the threat of prosecution would be minuscule, given the numbers of
those currently involved in this activity. It is also likely that those
outside our country who are engaged in these activities would continue to
do so since it would be nearly impossible to extradite them to the United
States for prosecution. Thus, unless all who knowingly participate in such
matters are subject to the law, the Internet will remain the same and
Congress will have failed in its responsibilities to the children and
families of America.

Federal law has traditionally assigned equal liability both for those who
commit a crime and those who aid and abet a crime. See Title 18 U.S.C.
Code Section 2: "(a) whoever [sic] commits an offense against the United
States or aids, abets, councils [sic], commands, induces, or procures its
commission, is punishable as a principle [sic]." Service or access
providers who knowingly participate in the distribution of indecency to
children or in obscenity to anyone are aiders and abettors in the
commission of those crimes and thus should have liability under any law
Congress passes. Current federal law on child pornography provides no no
exemption or defense for access providers. Thus, the child pornography law
provides a strong deterrent against trafficking in child pornography for
those who would otherwise knowingly participate in its distribution by
computer whether pedophile or access provider.

The changes in law which we support would not hold an access provider
criminally liable for all illegal pornography on the Internet which their
services may be used to obtain. Nor would it require that access providers
check all communications to ensure that no violations of the law are
occurring. They would simply be required to avoid knowing violations of
the law. This is an obligation imposed on all citizens. Technology exists
today for access providers, through a simple process, to target or flag
and remove files containing objectionable material.

We support the House-passed language insofar as it addresses obscenity by
amendment Title 18, Sections 1462, 1465, and 1467 of the United States
Code. The provision restricting transmission of indecency in the House-passed
bill, an amendment to Section 1465, is inadequate, and we urge that it be
substantially revised.

Attached is the specific language we support which includes the House
passed language on obscenity and includes revisions on both the House
passed language on indecency, which would amend Title 18 and the
Senate-passed language on indecency, which would amend Title 47. The
combination of these provisions, we believe, would provide effective laws
to curb obscenity and indecency on the Internet by establishing that all
who knowingly participate in the distribution or facilitation of obscenity
to anyone or indecency to children would be subject to the law.

Thank you for your concern and attention to this matter.


[signed]

Edwin Meese III

Ralph Reed
Christian Coalition

Donald E. Wildmon
American Family Association

Alan Sears, Former Executive Director
Atty General's Commission on Pornography

Phyllis Shafly
Eagle Forum

Beverly LaHaye
Concerned Women for America

Reverend Louis P. Sheldon
Traditional Values Coalition

Jay Sekulow
American Center for Law and Justice

Paul Weyrich
Free Congress Foundation

Paul McGeady
Morality in Media

Len Munsil
National Family Legal Foundation

Robert Peters
Morality in Media

Kenneth Sukhia
Former United States Attorney, N.D., FL
Former Chairman, Atty General's Advisory Committee
Subcommittee on Child Exploitation and Obscenity

__________________________

Section 1465 of Title 18, United States Code, is amended to punish
distribution by computer of indecent material to minors by adding at the
end the following:

Whoever knowingly communicates, transmits, or makes available for
communication or transmission, in or effecting interstate or foreign
commerce an indecent communication by computer to any person the
communicator or transmitter believes has not attained the age of 18 years
of age, knowing that such communication will be obtained by a person
believed to be under 18 years of age, shall be fined under this title or
imprisoned not more than five years, or both.

TITLE IV -- OBSCENE, HARASSING, AND WRONGFUL UTILIZATION OF
TELECOMMUNICATIONS FACILITY

SEC. 401. SHORT TITLE
This title may be cited as the "Communications Decency Act of
1995".

Sec. 402. OBSCENE OR HARASSING USE OF TELECOMMUNICATIONS FACILITIES UNDER
THE COMMUNICATIONS ACT OF 1934

Section 223 (47 U.S.C. 223) is amended --
(1) by striking subsection (a) and inserting in lieu of [sic]:
``(a) Whoever--
``(1) in the District of Columbia or in interstate or foreign
communications --
``(A) by means of telecommunications device knowingly--
``(i) makes, creates, or solicits, and
``(ii) initiates the transmission of,
any comment, request, suggestion, proposal, image, or other
communication which is obscene, lewd, lascivious, filthy, or
indecent, with intent to annoy, abuse, threaten, or harass
another person;
``(B) makes a telephone call or utilizes a
telecommunications device, whether or not conversation or
communication ensues, without disclosing his identity and
with intent to annoy, abuse, threaten, or harass any person
at the called number or who receives the communication;
``(C) makes or causes the telephone of another repeatedly
or continuously to ring, with intent to harass any person at
the called number; or
``(D) makes repeated telephone calls or repeatedly
initiates communication with a telecommunications device,
during which conversation or communication ensues, solely to
harass any person at the called number or who receives the
communication;
``(2) knowingly permits any telecommunications facility
under his control to be used for any activity prohibited by
paragraph (1) with the intent that it be used for
such activity,

shall be fined not more than $100,000 or imprisoned not more
than two years, or both.''; and

(2) by adding at the end the following new subsections:

``(d) Whoever--
``(1) knowingly within the United States or in foreign
communications with the United States by means of
telecommunications device makes or makes available any
indecent communication in any form including any comment,
request, suggestion, proposal, or image, to any person under
18 years of age regardless of whether the
maker of such communication placed the call or initiated the
communication; or
``(2) knowingly permits any telecommunications facility
under such person's control to be used for an activity
prohibited by paragraph (1) with the intent that it be
used for such activity,
shall be fined not more than $100,000 or imprisoned not more
than two years or both.
``(e) Defenses to subsections (a) and (d), restrictions on
access, judicial remedies respecting restrictions for
persons providing information services and
access to information services--
"(1) It is a defense to prosecution that a person has complied
with regulations designed to restrict access to indecent
communications to those 18 years old or older as enacted by the
Federal Communications Commission which shall prepare final
regulations within 120 days of the passage of this bill. Until
such regulations become effective, it is a defense to
prosecution that the person has blocked or restricted access
to indecent communications to any person under 18 years
of age through the use of verified credit card, adult access
code, or adult personal identification number (PIN).
Nothing in this subsection shall be construed to treat
enhanced information services as common carriage."
"(2) No cause of action may be brought in any
court or any administrative agency against any person on account
of any activity which is not in violation of any law punishable
by criminal or civil penalty, which activity the person has taken in
good faith to implement a defense authorized under this section or
otherwise to restrict or prevent the transmission of, or access to,
a communication specified in this section.
(f) Nothing in this subsection shall preclude any State or
local government from enacting and enforcing laws and regulations
which do not result in the imposition of inconsistent obligations on
the provision of interstate services. Nothing in this subsection
shall preclude any State or local government from governing conduct
not covered by subsection (d)(2)."
(g) Nothing in subsection (a), (d), or (e) or in the
defenses to prosecution under (e) shall be construed
to affect or limit the application or enforcement of any other
Federal law.
(h) The use of the term 'telecommunications device' in this
section shall not impose new obligations on (one-way) broadcast
radio or (one-way) broadcast television operators licensed by the
Commission or (one-way) cable services registered with the
Federal Communications Commission and covered by obscenity and
indecency provisions elsewhere in this Act.

Sec. 403. OBSCENE PROGRAMMING ON CABLE TELEVISION.

Section 639 (47 U.S.C. 559) is amended by striking "10,000" and
inserting "$100,000"

Sec. 404. BROADCASTING OBSCENE LANGUAGE ON THE RADIO.

Section 1466 of Title 18, United States Code, is amended by
striking out "$10,000" and inserting "$100,000".

Sec. 405 SEPARABILITY

"(a) If any provision of this Title, including amendments to this
Title of [sic] the application thereof to any person or circumstance is
held invalid, the remainder of this Title and the application of such
provision to other persons or circumstances shall not be affected
thereby."

________________________________________________________________________

CHRONOLOGY OF THE COMMUNICATIONS DECENCY ACT

Sep 26, '95 Sen. Russ Feingold urges committee members to drop
Managers Amendment and the CDA from the Telecommunications
Deregulation bill
Aug 4, '95 House passes HR1555 which goes into conference with S652.
Aug 4, '95 House votes to attach Managers Amendment (which contains
new criminal penalties for speech online) to
Telecommunications Reform bill (HR1555).
Aug 4, '95 House votes 421-4 to attach HR1978 to Telecommunications
Reform bill (HR1555).
Jun 30, '95 Cox and Wyden introduce the "Internet Freedom and Family
Empowerment Act" (HR 1978) as an alternative to the CDA.
Jun 21, '95 Several prominent House members publicly announce their
opposition to the CDA, including Rep. Newt Gingrich (R-GA),
Rep. Chris Cox (R-CA), and Rep. Ron Wyden (D-OR).
Jun 14, '95 The Senate passes the CDA as attached to the Telecomm
reform bill (S 652) by a vote of 84-16. The Leahy bill
(S 714) is not passed.
May 24, '95 The House Telecomm Reform bill (HR 1555) leaves committee
in the House with the Leahy alternative attached to it,
thanks to Rep. Ron Klink of (D-PA). The Communications
Decency Act is not attached to it.
Apr 7, '95 Sen. Leahy (D-VT) introduces S.714, an alternative to
the Exon/Gorton bill, which commissions the Dept. of
Justice to study the problem to see if additional legislation
(such as the CDA) is necessary.
Mar 23, '95 S314 amended and attached to the telecommunications reform
bill by Sen. Gorton (R-WA). Language provides some provider
protection, but continues to infringe upon email privacy
and free speech.
Feb 21, '95 HR1004 referred to the House Commerce and Judiciary committees
Feb 21, '95 HR1004 introduced by Rep. Johnson (D-SD)
Feb 1, '95 S314 referred to the Senate Commerce committee
Feb 1, '95 S314 introduced by Sen. Exon (D-NE) and Gorton (R-WA).

________________________________________________________________________

FOR MORE INFORMATION

Web Sites
URL:http://www.vtw.org/exon/
URL:http://epic.org/
URL:http://www.eff.org/pub/Alerts/
URL:http://www.cdt.org/cda.html
URL:http://outpost.callnet.com/outpost.html

FTP Archives
URL:ftp://ftp.cdt.org/pub/cdt/policy/freespeech/00-INDEX.FREESPEECH
URL:ftp://ftp.eff.org/pub/Alerts/

Gopher Archives:
URL:gopher://gopher.panix.com/11/vtw/exon
URL:gopher://gopher.eff.org/11/Alerts

Email:
vtw@vtw.org (put "send alert" in the subject line for the latest
alert, or "send cdafaq" for the CDA FAQ)
cda-info@cdt.org (General CDA information)
cda-stat@cdt.org (Current status of the CDA)

________________________________________________________________________

LIST OF PARTICIPATING ORGANIZATIONS

In order to use the net more effectively, several organizations have
joined forces on a single Congressional net campaign to stop the
Communications Decency Act.


American Civil Liberties Union * American Communication Association *
American Council for the Arts * Arts & Technology Society * Association
of Alternative Newsweeklies * biancaTroll productions * Boston
Coalition for Freedom of Expression * Californians Against Censorship
Together * Center For Democracy And Technology * Centre for Democratic
Communications * Center for Public Representation * Citizen's Voice -
New Zealand * Cloud 9 Internet *Computer Communicators Association *
Computel Network Services * Computer Professionals for Social
Responsibility * Cross Connection * Cyber-Rights Campaign * CyberQueer
Lounge * Dutch Digital Citizens' Movement * ECHO Communications Group,
Inc. * Electronic Frontier Canada * Electronic Frontier Foundation *
Electronic Frontier Foundation - Austin * Electronic Frontiers
Australia * Electronic Frontiers Houston * Electronic Frontiers New
Hampshire * Electronic Privacy Information Center * Feminists For Free
Expression * First Amendment Teach-In * Florida Coalition Against
Censorship * FranceCom, Inc. Web Advertising Services * Friendly
Anti-Censorship Taskforce for Students * Hands Off! The Net * Inland
Book Company * Inner Circle Technologies, Inc. * Inst. for Global
Communications * Internet On-Ramp, Inc. * Internet Users Consortium *
Joint Artists' and Music Promotions Political Action Committee * The
Libertarian Party * Marijuana Policy Project * Metropolitan Data
Networks Ltd. * MindVox * MN Grassroots Party * National Bicycle
Greenway * National Campaign for Freedom of Expression * National
Coalition Against Censorship * National Gay and Lesbian Task Force *
National Public Telecomputing Network * National Writers Union * Oregon
Coast RISC * Panix Public Access Internet * People for the American Way
* Republican Liberty Caucus * Rock Out Censorship * Society for
Electronic Access * The Thing International BBS Network * The WELL *
Voters Telecommunications Watch

(Note: All 'Electronic Frontier' organizations are independent entities,
not EFF chapters or divisions.)

________________________________________________________________________

End Alert

------------------------------


Subject: ALERT: Digital Telephony Action - Nov. 15 Deadline!
------------------------------------------------------------

In Oct. 16's Federal Register, the FBI published a request for public
comments *due November 15 1995* and a request for surveillance capacity.
This is the first major step, since passage of the Digital Telephony
legislation in 1994, in setting up the FBI's dream and our nightmare:
forced compliance with law enforcement and intellegence demands to make
all communications networks wiretappable.


* Background: FBI Draft Capacity Requirements

The 1994 "Digital Telephony and Privacy Improvement Act" (DT), passed as the
more honestly-titled "Communications Assistance to Law Enforcement Act"
(CALEA), did add significant statutory privacy protections and public
oversight provisions for surveillance actions, but in essence requires
telecommunications carriers including "plain old telephone service"
companies and related telphonic services, to make their networks
wiretap-friendly. There are several steps to implementation:

1) Approval of capability requirements (can the network be tapped?)
2) Approval of capacity requirements (how many wiretaps can be done?)
3) Approval of funding to pay for this mess

The subject of the FBI's request, reproduced below, is capacity. The
capacity request specifies the number of simultaneous wiretaps (by which
term we simplify a bit: it includes actual communications intercepts, pen
register (dialed number) information captures, and trap-and-trace actions)
the government estimates that it will need to conduct authorized
surveillance. Telecom companies will have 6 months to respond to this
final notice published after the public comment period, and outline what
part of their systems are not wiretap-friendly, at which point the
government may opt to pay for a system to be "upgraded" or decide to let
it slide.

The demanded capacities range from .05% of "engineered capacity" (which
according to the FBI initially means the maximum number of subscribers to a
particular service or facility) to a full 1% of engineered capacity. In a
worst-case scenario this could mean that 1 person on every residential
city block could be wiretapped at all times - or, enough to wiretap 20,000
people at the same time in New York City alone - one of the cities
targetted for the higher capacity. According to industry executives,
there have never been more than 7 simultaneous wiretaps conducted from a
single US telco location. Current wiretapping activity is roughly one
tap per 170,000 phone lines. Isn't increasing wiretapping capacity more
than a thousand times over a just a wee bit excessive? Clark Matthews,
writing for _The_Spotlight_ estimates that under the current proposal, as
many as 500,000 to 1,500,000 simultaneous wiretaps could be conducted
nation-wide, given sufficient law enforcement resources. Compare this to
the average of less than 1000 court-authorized wiretaps annually (though
up to 1730 in 1994), less than half of them done for federal law enforcement.

Recent reports indicate that there may have been an error in someone's
figures somewhere (perhaps even in the Fed. Register notice, which pretty
clearly states "1%"), and that the real number is 1 out of 1000 *lines*,
but 1 out of 100 phone *calls*. Even if this is true, that's a
staggering increase in wiretapping capacity.

Considerably after-the-fact, the FBI revised its statements of what
"engineered capacity" means, saying it means "total number of
simultaneous phone calls" rather than subscriber lines. This appears to
be a smokescreen, and is irrelevant anyway: the capacity to tap 1% of all
ongoing phone calls is still frighteningly Big-Brotherish. And EPIC claims
that the FBI's estimate of how many calls correspond to how many lines may
be at least 100% less than the real figures.

Even using the lowest of the percentages, .05% in rural areas until 1998
(five times that, later), the Bureau wants the capacity to conduct
surveillance on 1 out of every 20000 lines, and one out of every 2000
calls. Again, the current ratio is 1 to 170,000 or thereabouts. Even in
the deepest woods of Maine or the deserts of Nevada, the FBI wants to
tap more than 8 times as many people as it currently can spy on -
40 times as many in 1999.

FBI director Louis Freeh continues to deny, deny, deny, saying "We have not
and are not asking for the ability to monitor 1 out of every 100
telephone numbers or any other ridiculous number like that. To obtain
that many court orders and conduct that extent of wiretapping would be
nearly impossible." His denials, however, simply don't match the Fed.
Register notice, and furthermore ignore the fact that warrants only need
be sought when the evidence to be gained from the surveillance is to be
used in court (to quote from the statute itself: wiretaps conducted
"pursuant to a court order *or other legal authorization*", emphasis
added.) Not to mention that this legislation isn't for this year,
it's for the future. Who knows what will be possible under a bloated FBI
budget in future years?

An AP article quotes Deputy Attorney General Jamie Gorelick as saying,
"There is no intention to expand the number of wiretaps or the extent of
wiretapping ... . I don't think the American people should be worried
about that."

Well, please forgive us if we "worry". The capability to tap one out of
every 100 or 1000 phone lines simultaneously, even in "high crime areas", is
truly wretched excess, even presuming that wiretaps are a good idea in
the first place. As Brock Meeks reported ("Riding a Straw Horse",
_Cyberwire_Dispatch_, Sept. 13 1994), "In 1991, the latest year figures
are available, most Americans, across all age groups, disapproved when
asked the question: 'Everything considered, would you say that you
approve or disapprove of wiretapping?' Some 67% of all 18-20 year olds
gave the thumbs down, as did 68% of the Gen[eration]-X crowd...Boomers
disapproved of wiretapping almost 3-to-1 while 67% of those 50 and over
disapproved."

The _New_York_Times_ reports that the FBI refuses to elaborate on its
internally perceived need to increase wiretapping capacity to this
extent, saying only that "The full implementation is absolutely essential
for law enforcement and public safety. We are in ongoing discussions with
the communications industry. Therefore it would be inappropriate to
comment further at this point." Apparently the FBI considers their
discussions more imporant than your rights. And those discussions may
even be on the subject of negotiating, outside of public review, for even
*more* wiretapping capacity that the Bureau has already asked for in the
Federal Register. Enough is enough.

DT/CALEA's *capability* requirements are still under development. In short,
the FBI will state what it wants, and the industry must try to comply with
this, within certain limits, including the right of members of the public
to challenge the requirments before the FCC.

The funding issue: Congress authorized but did not appropriate US$500million
to implement CALEA in 1994. The Justice dept. has proposed that a 30%-40%
extra fine ("surcharge") be attached to all civil and criminal penalties
and fines to pay for this, and has attached this proposal to both the
stalled and in many cases unconsitutional anti-terrorism legislation,
and a pending appropriations bill.

EFF is committed to opposing any such funding efforts for the wiretap
bill's provisions.


* What You Can Do Now

See the FBI Federal Register notice below. It includes instructions on
how to submit comments. Remember, these comments are part of the public
record. The FBI cannot hide them, and they *do* matter. THE DEADLINE IS
NOV. 15! Act now, or perhaps forever hold thy peace!

Remember that FBI director Louis Freeh himself states:

"There is no intention to expand the number of wiretaps or the
extent of wiretapping. Those who use the public comment notice
to argue the contrary are wrong."

If your comments focus on a the (nonetheless quite reasonable)
proposition that the FBI intends to wiretap an order of magnitude more
people that they do now, your comments may end up being disregarded.
Instead, criticize the ridiculous draft requirement for this much wiretap
capacity in the first place if the FBI doesn't intend to use it.
Remember, you have them, either way. The current proposal is simply
senseless.

Next steps: Contact your legislators, and keep an eye on the progress of
bills that the FBI has attached DT/CALEA funding language to - sending
letters to the members of committess examining such legislation is important.

In your letter to your own Senators and Representatives, please stress
that

* the FBI has not shown that it effectively uses wiretapping to
prevent domestic terrorism, despite its claims and despite this being
the prime reason the FBI has expressed for this legislation;

* the FBI has not provided the public or Congress any of the information
that it claims supports its outrageous requests for wiretapping capacity,
orders of magnitude greater than present-day capacity in some areas;

* the FBI may be, counter to the specifications of CALEA, entering into
negotiations with telecom industry leaders that are hidden from the public;

* the FBI has shown no evidence to back up its claims that digital
telephone technology is actually thwarting effective law enforcement;

* FOIA-obtained documents from the FBI itself indicate that the
above-mentioned Bureau claim is a complete fabrication anyway;

* Citizen privacy is not to be stripped for the convenience of law
enforcement.

Congress contact information is available at:

ftp.eff.org, /pub/Activism/Congress_contact/
gopher.eff.org, 1/Activism/Congress_contact
http://www.eff.org/pub/Activism/Congress_contact/

A list of Congress-member email addresses is available at:
gopher://una.hh.lib.umich.edu:70/00/socsci/poliscilaw/uslegi/conemail


* Congress May Just Not Buy It

The FBI did not once seek a warrant for a wiretap in cases involving
"weapons, arson, or explosives" since the 1980s. Yet they claim that one
of the main motivations for CALEA is to combat domestic terrorism. Where
were they when the Oklahoma City federal building was blown up?

Investigations are also underway into the decidely poor law
enforcement handling of several cases, such as the Waco incident and the
Randy Weaver seige.

In the wake of CIA honcho Aldrich Ames's rooting-out as a traitor, the
same _NYT_ issue that covered the FBI Fed. Register notice also reveals
that the CIA and other intelligence agencies - the same national security
interests behind DT and crypto key "escrow" - have lied consistently to
the President and Congress, and have been riddled with Soviet and other
double agents for decades. The article suggests that the CIA is a
"laughingstock" in Washington right now.

The new Congress may at times be only too willing to censor, but we can
hope they won't fall for this surveillance rigamarole.


* House Rejects First DT/CALEA Funding Attempt

On Oct. 25, the House of Representatives voted to *not* include the FBI's
CALEA funding language in the Omnibus Budget Bill (which is expected to
be vetoed anyway). This version of the measure called for a 40%
"surcharge" to be added to all criminal fines, to raise US$500mil. to pay
for implementation of the "upgrades" to telephonic equipment that the FBI
hopes to require. Other versions of the FBI legislation are, however,
still appended to various appropriations and terrorism bills - the Bureau
can be said to be hedging its bets.

The Electronic Privacy Information Center reported this event as a
victory, though others have suggested that the reason the measure was
rejected was not because of privacy concerns, but rather because some
arch-conservatives consider the suggested funding measure to be a form of
tax increase. The anti-tax conservatives may have been "thrown a bone"
on a bill expected to die anyway, so they'll have already played their
cards when the issue comes up in other bills.

Whatever's really going on in Congressional minds, (and a _New_York_Times_
article tends to, believe it or not, support *both* viewpoints), the FBI's
loss here certainly remains cause for very guarded celebration. But the
issue *will* be back.


* Sen. Leahy Definitely Not Buying It

Nov. 3, Senator Patrick Leahy (D-VT) sent a public letter to FBI Director
Louis Freeh. It stated in part:

The Federal Bureau of
Investigation recently published in the Federal Register a proposed notice
of law enforcement's capacity demands predicated upon an historical
baseline of electronic surveillance activity and an analysis of that
activity. The Federal Register notice did not include publication of those
two documents.

Please provide me with copies of those two documents, which I also urge you
to release to the public and publish in the Federal Register to ensure the
fullest dissemination of the information.

I appreciate your prompt attention to this matter.


EFF joins CDT in commending Sen. Leahy for his no-nonsense approach, and
for his consideration of the public interest in making this request.
EFF, EPIC, or any other organization could obtain this information via
Freedom of Information Act lawsuits, but that could take years, and it'd
be much better if the FBI released the information voluntarily.

The full text of Sen. Leahy's letter is available at:

ftp.eff.org, /pub/Privacy/Digital_Telephony_FBI/leahy_freeh_110395.letter
gopher.eff.org, 1/Privacy/Digital_Telephony_FBI, leahy_freeh_110395.letter
http://www.eff.org/pub/Privacy/Digital_Telephony_FBI/leahy_freeh_110395.letter


* Canadian Law Enforcement Taking the FBI Hint

Electronic Frontier Canada reports that Canadian police chiefs are
clamoring for some kind of "back door" into citizen communications, right
on the heels of many other governments put under pressure by the US
Administration to support its privacy-invasive policies.

Canadian law enforcement may be shying away from Clipper-like crypto key
"escrow" (possibly because they realize what a ridiculous idea it is?),
but are already considering a ban on cellular phones that prevent
eavesdropping.

The 90th Annual Conference of the Canadian Association of Chiefs of Police
(Regina, Saskatchewan, August 24, 1995) produced numerous policy
recommendations and resolutions, including an unsupported decision that
"violent" media programming has "no" value at all and should be banned
(including an explict recommendation that online material that "exploits
violence" be attacked); that "the Internet System [sic] is devoid of any
standards and controls necessary to regulate the nature of information being
disseminated worldwide", that anonymity should be banned, and that the
Canadian government should "enact legislation that will effectively
control and regulate the Internet System" [sic]; that roadway video
surveillance be instituted; that crime *suspect* be subject to "DNA
warrants" and have their genetic information added to a federal database;
and (surprised?) that "new communications technology is threatening the
ability of...police agencies to conduct court-approved electronic
surveillance". This is the same, unsubstantiated, claim being made by the
US Federal Bureau of Investigation.

The Canadian proposal continues: "the telecommunications systems and
networks are often used to further serious criminal activities, including
drug trafficking, terrorism, organized crime, extortion, corruption,
and money laundering" [not unlike cars, fingers, shoes, etc. And they
forgot that favorite buzzphrase: "child molestation and pornography".]

The rest of the recommendations regarding police surveillance and modern
communications is all but plagiarized from the FBI's statements and
legislation, and concludes, "the Canadian Association of Chiefs of Police
urges the Government of Canada to enact the appropriate legislation
requiring that all present and new telecommunications technologies
contain capabilities that will provide law enforcement agencies with the
technical assistance necessary to accomplish court-authorized
interceptions pursuant to the applicable sections of the Criminal Code of
Canada (s.184.2, 184.3, 186, 188, 487.01, 492.1, 492.2)."

To our northern neighbors: Be afaid.

The full text of the CACP recommendations can be found at:

http://insight.mcmaster.ca/org/efc/pages/law/doc/cacp.24aug95.html


* The Text of the FBI's Federal Register Notice

[Federal Register: October 16, 1995 (Volume 60, Number 199)]
[Notices]
[Page 53643-53646]
>From the Federal Register Online via GPO Access [wais.access.gpo.gov]

DEPARTMENT OF JUSTICE

Federal Bureau of Investigation

Implementation of the Communications Assistance for Law
Enforcement Act

AGENCY: Federal Bureau of Investigation (FBI).

ACTION: Initial notice and requests for comments.

_________________________________________________________

SUMMARY: The FBI is providing initial notification of law enforcement
capacity requirements as mandated in section 104 of the Communications
Assistance for Law Enforcement Act. Comments regarding this initial
notice will be considered in the development of the final capacity
notice.

DATES: Written comments must be received on or before November 15,
1995.

ADDRESSES: Comments should be submitted in triplicate to the
Telecommunications Industry Liaison Unit (TILU), Federal Bureau of
Investigation, P.O. Box 220450, Chantilly, VA 22022-0450.

FOR FURTHER INFORMATION CONTACT:
Contact TILU at (800) 551-0336. Please refer to your question as a
capacity notice question.

I. Background

On October 25, 1994, the President signed into law the Communications
Assistance for Law Enforcement Act (CALEA) (Public Law 103-414; 47 U.S.C.
1001-1010). This law presents law enforcement's requirements for the
surveillance of wire or electronic communications. The primary purpose of
the CALEA is to clarify a telecommunications carrier's duty to assist law
enforcement agencies with the lawful interception of communications and
the acquisition of call-identifying information in an ever-changing
telecommunications environment. To ensure that law enforcement agencies can
continue to conduct authorized surveillance of wire or electronic
communications, the CALEA states that telecommunications carriers must meet
the assistance capability requirements set forth in section 103 of the
Act (and restated in Appendix A of this notice).

Section 104 of the CALEA mandates that the Attorney General of the
United States provide notice of estimates for the actual and maximum
number of pen register, trap and trace, and communication intercepts
that law enforcement agencies may conduct and use simultaneously.

The definitions for ``actual capacity'' and ``maximum capacity''
are included below:

Actual Capacity--``notice of the actual number of communication
interceptions. pen registers, and trap and trace devices, representing
a portion of the maximum capacity that the Attorney General estimates
that government agencies authorized to conduct electronic surveillance
may conduct and use simultaneously by the date that is 4 years after
the date of enactment of the CALEA'' (CALEA, section 104(a)(1)(A)).

Maximum Capacity--``notice of the maximum capacity required to
accommodate all of the communication interceptions, pen registers, and
trap and trace devices that the Attorney General estimates that
government agencies authorized to conduct electronic surveillance may
conduct and use simultaneously after the date that is 4 years after of
enactment of the CALEA'' (CALEA, section 104(a)(1)(B)).

This Federal Register announcement serves as the initial notice of
the government's actual and maximum capacity requirements. These
requirements will aid telecommunications carriers in developing and
deploying solutions to meet the assistance capability requirements set
forth in section 103 of the CALEA. A final notice will be issued in
accordance with the CALEA requirements after considering comments to
this initial notice.

The actual and maximum capacity requirements were developed by the
FBI in coordination with law enforcement. By order of the Attorney
General of the United States, as codified in 28 CFR 0.85 (o),
government implementation responsibilities under the CALEA were
delegated to the FBI. The FBI, in turn, is establishing TILU to carry
out the government's implementation responsibilities, including the
publication of capacity notices.

For the purposes of this document, the terms defined in section
2510 of title 18, United States Code, and section 102 of the CALEA
(section 1001 of title 47, United States Code) have, respectively, the
meanings stated in those sections. Additional clarification of terms is
provided in Appendix B of this notice.

II. Introduction

The capacity figures in this notice reflect the combined number of
simultaneous pen register, trap and trace, and communication
interceptions that law enforcement may conduct by October 25, 1998. All
telecommunications carriers must, within 3 years after the publication
of the final notice of capacity requirements or within 4 years after
the date of enactment of the CALEA, whichever is longer, ensure that
their systems are capable of accommodating simultaneously the number of
pen register, trap and trace, and communication interceptions
identified in the actual capacity requirements. Furthermore, all
telecommunications carriers shall ensure capabilities exist to
expeditiously accommodate any increase in the actual number of pen
register, trap and trace, and communication interceptions that
authorized agencies may seek to conduct and use, up to the maximum
capacity requirement. Some carriers may not need to make modifications
to their equipment, facilities, and services in response to this notice
because they currently meet all law enforcement capacity and capability
requirements for electronic surveillance.

The capacity requirements are not intended to specify, required or
prohibit adoption of any particular system design or configuration by a
telecommunications carrier, equipment manufacturer, or support services
provider. These entities must develop an appropriate solution to comply
with the capacity requirements set forth in this notice and with the
assistance capability requirements found in section 103 of the CALEA.
In developing solutions, carriers should consider the effect that
particular services and features may have on capacity requirements. For
example, the required number of ports, lines, or other network
resources may vary depending upon the use of particular services and
features by an intercept subject. The FBI, along with other law
enforcement agencies, will be available, through the consultative
process, to discuss these engineering issues.

In accordance with the intent of the CALEA, carriers must ensure
that their equipment, facilities, or services that provide a customer
or subscriber with the ability to originate, terminate, or direct
communications are capable of meeting the capability and capacity
requirements mandated by the CALEA. These requirements apply to
existing and future telecommunications carriers.

III. Capacity Requirements Derivation

The capacity figures that are presented in this initial notice were
derived as a result of a thorough analysis of electronic surveillance
needs. Information regarding electronic surveillance activities for a
specific time period was obtained from telecommunications carriers, law
enforcement, U.S. District Courts, State Courts, State Attorneys
General, and State District Attorneys to establish a historical
baseline of activity.

The historical baseline of electronic surveillance activity was
determined after examination of both the location and occurrence of
each electronic surveillance reported. The historical baseline was then
analyzed to derive the total and simultaneous electronic surveillance
activity by switch and within specific geographic areas. Future
capacity needs were then determined after consideration of the impact
of demographics, market trends, and other factors on the historical
baseline.

The analysis indicates that electronic surveillance activity varies
by geographic area. Therefore, the capacity requirements will vary by
geographic area. The capacity requirements are reported by category,
with each geographic area being assigned to one of three distinct
categories. The use of categories enables capacity requirements to be
stated in a manner that reasonably represents law enforcement
electronic surveillance needs in all geographic areas, yet does not
overburden the telecommunications industry by holding all carriers to
the same level of capacity.

Category I (the highest category) and Category II (the intermediate
category) represent those geographic areas where the majority of
electronic surveillance activity occurs. Only a few of the most densely
populated areas, which have historically been areas of high electronic
surveillance activity, are grouped into Category I. Other densely
populated areas and some suburban areas, with moderate electronic
surveillance activity, are grouped into Category II. The numbers for
these categories were derived based on the analysis described above.
Category I and Category II apply to approximately 25 percent of the
equipment, facilities, and services covered by the survey over the time
period.

Category III (the lowest category) represents law enforcement's
minimum acceptable capacity requirements for electronic surveillance
activity. This category covers all other geographic areas. The numbers
for Category III were derived by analyzing areas of historically low
electronic surveillance activity and projecting future needs in order
to establish a requirement for a minimum level of capacity for
electronic surveillance.

All telecommunications carriers are expected to meet the minimum
capacity requirements of Category III. Carriers will be individually
notified of those specific geographic areas within the areas they serve
that exceed Category III and warrant a Category I or Category II
capacity requirement. The individual carrier notifications will occur
contemporaneously with the publication of the final notice. It is
anticipated that the majority of the area served by a carrier will fall
into Category III; however, if Category I and Category II capacity
requirements are necessary, they are likely to affect only a small
portion of their area served.

This initial capacity notice includes the actual and maximum
capacity requirements for Categories I, II, and III. After considering
comments to this initial notice, a final notice will be published.
Future changes to the maximum capacity requirements issued in the final
notice will be published in the Federal Register, as necessary, in
accordance with section 104(c).

IV. Initial Statement of Actual and Maximum Capacity

The actual and maximum capacity requirements are presented as a
percentage of the engineered capacity of the equipment, facilities, and
services that provide a customer or subscriber with the ability to
originate, terminate, or direct communications. Engineered capacity
refers to the maximum number of subscribers that can be served by that
equipment, facility, or service. Frequently, the percentage is applied
to the engineered subscriber capacity of a switch, however, the
percentage can also apply to nonswitch equipment (i.e., network
peripherals) involved in the origination, termination, or direction of
communications. Percentages are being used rather than fixed numbers
due to the dynamics and diversity of the telecommunications industry.
The use of percentages allows telecommunications carriers the
flexibility to adjust to changes in marketplace conditions or changes
in the number of subscribers, access lines, equipment, facilities,
etc., and still know the required level of capacity.

As a result of extensive consultation with federal, State, and
local law enforcement agencies, telecommunications carriers, providers
of telecommunications support services, and manufacturers of
telecommunications equipment, the FBI proposes the following capacity
requirements for Categories I, II, and III:

Category I

Actual Capacity

Each telecommunications carrier must provide the ability to meet
the capability assistance requirements defined in section 103 of the
CALEA for a number of simultaneous pen register, trap and trace, and
communication interceptions equal to 0.5% of the engineered capacity of
the equipment, facilities, or services that provide a customer or
subscriber with the ability to originate, terminate, or direct
communications.

Maximum Capacity

Each telecommunications carrier must ensure that it can
expeditiously increase its capacity to meet the assistance capability
requirements defined in section 103 of the CALEA for a number of
simultaneous pen register, trap and trace, and communication
interceptions equal to 1% of the engineered capacity of the equipment,
facilities, or services that provide a customer or subscriber with the
ability to originate, terminate, or direct communications.

Category II

Actual Capacity

Each telecommunications carrier must provide the ability to meet
the capability assistance requirements defined in section 103 of the
CALEA for a number of simultaneous pen register, trap and trace, and
communication interceptions equal to 0.25% of the engineered capacity
of the equipment, facilities, or services that provide a customer or
subscriber with the ability to originate, terminate, or direct
communications.

Maximum Capacity

Each telecommunications carrier must ensure that it can
expeditiously increase its capacity to meet the assistance capacity
requirements defined in section 103 of the CALEA for a number of
simultaneous pen register, trap and trace, and communication
interceptions equal to 0.5% of the engineered capacity of the
equipment, facilities, or services that provide a customer or
subscriber with the ability to originate, terminate, or direct
communications.

Category III

Actual Capacity

Each telecommunications carrier must provide the ability to meet
the capability assistance requirements defined in section 103 of the
CALEA for a number of simultaneous pen register, trap and trace, and
communication interceptions equal to 0.05% of the engineered capacity
of the equipment, facilities, or services that provide a customer or
subscriber with the ability to originate, terminate, or direct
communications.

Maximum Capacity

Each telecommunications carrier must ensure that it can
expeditiously increase its capacity to meet the assistance capability
requirements defined in section 103 of the CALEA for a number of
simultaneous pen register, trap and trace, and communication
interceptions equal to 0.25% of the engineered capacity of the
equipment, facilities, or services that provide a customer or
subscriber with the ability to originate, terminate, or direct
communications.

When translated from percentages to numbers, capacity requirements
should be rounded up to the nearest whole number.

V. Carrier Statements and Consultation

As set forth in section 104(d) of the CALEA, each telecommunications
carrier is required to provide within 180 days after publication of the
final capacity notice a statement identifying any of its systems or
services that do not have the capacity to meet the assistance capability
requirements stated in section 103 of the CALEA. These carrier statements
will be used in conjunction with law enforcement priorities and other
factors to determine the specific equipment, facilities, and services that
require immediate modification and that may be eligible for cost
reimbursement. The FBI will consult with telecommunications carriers to
establish a template for responding to the capability and capacity
requirements.

 
Dated: October 10, 1995.

Louis J. Freeh,
Director.

[FR Doc. 95-25562 Filed 10-13-95; 8:45 am]
BILLING CODE 4410-02-M

[editor's note -- Appendicies have been deleted to save space. The entire
text of this document can be found at EFF's and CDT's Digital Telephony Web
Pages. See "For More Information", below.]


* For More Information

See the following Internet sites:

ftp.eff.org, /pub/EFF/Privacy/Digital_Telephony_FBI/
gopher.eff.org, 1/EFF/Privacy/Digital_Telephony_FBI
http://www.eff.org/pub/EFF/Privacy/Digital_Telephony_FBI/

http://www.epic.org/privacy/wiretap/

http://www.cdt.org/digtel.html


[Portions of this alert based on material from CDT, EPIC and VTW, various
articles, and several independent reports.]

------------------------------


Subject: Newsbytes
------------------

* EFF Relocation Complete

Our new, permanent contact info is:

The Electronic Frontier Foundation
1550 Bryant St., Suite 725
San Francisco CA 94103 USA

+1 415 436 9333 (voice) <-- That's 436 9EFF
+1 415 436 9993 (fax)

ask@eff.org (or, for "canned" general info, info@eff.org).

Bernstein- or Scientology-case queries should go to EFF Staff Counsel
Shari Steele (ssteele@eff.org), +1 301 375 8856.

Other Press and legal queries should go to EFF Staff Counsel Mike Godwin
(mnemonic@eff.org), +1 510 548 3290.


* EFF Rated in Top 5% of the Net by Point Survey

Point Survey, one of the most comprehensive WWW site review
services on the net, http://www.pointcom.com, rated EFFWeb as one of the
top 5% net sites. Their review calls us a "great resource for those who
want to protect cyberspace." The full review is available at:

http://www.pointcom.com/gifs/reviews/10_29038.htm


* Commerce Dept. IPWG Report on Online Intellectual Property Meets Resistance

The Information Infrastructure Task Force (IITF) of the National
Telecommunications and Information Administration (NTIA) was created by the
executive branch of the U.S. government to recommend policy and
legislation on the "Information Superhighway". In the wake of the
LaMacchia case, The IITF set up a working group to make recommendations
on copyright law and intellectual property. The "White Paper" is the
report of this working group. The legislation recommended in the White
Paper was sent to Congress on Thursday, September 28, 1995. The White
Paper is based on a 1994 draft, the "Green Paper", both strongly
influenced by the Intellectual Property Rights Working Group chair,
Patent & Trademark Office Commissioner Bruce Lehman.

The recent White Paper version is available at:

ftp.eff.org, /pub/Intellectual_property/ipwg_nii_ip_lehman.report
gopher.eff.org, 1/Intellectual_property, ipwg_nii_ip_lehman.report
http://www.eff.org/pub/Intellectual_property/ipwg_nii_ip_lehman.report

The Green Paper version was the subject of strong criticism from many sides,
including Prof. Pamela Samuelson, who opposed the attempt to pass off
sweeping recommended changes as "minor". Samuelson, in her critique,
states that the Green Paper's recommendations "would abolish longstanding
rights that the public has enjoyed to make use of copyrighted works,
rights that have been consistently upheld in courts and in the copyright
statute."

The draft (Green Paper) version, and Prof. Samuelson's critique are
available at (respectively):

ftp.eff.org, /pub/Intellectual_property/ipwg_nii_ip_lehman_report.draft
gopher.eff.org, 1/Intellectual_property, ipwg_nii_ip_lehman_report.draft
http://www.eff.org/pub/Intellectual_property/ipwg_nii_ip_lehman_report.draft

and

ftp.eff.org, /pub/Intellectual_property/ipwg_nii_ip_report_samuelson.comments
gopher.eff.org, 1/Intellectual_property, ipwg_nii_ip_report_samuelson.comments
http://www.eff.org/pub/Intellectual_property/
ipwg_nii_ip_report_samuelson.comments

EFF Board of Directors Chair Esther Dyson and Vice-Chair John Perry Barlow
have written forward-looking pieces on online "i-p", both pointing in
directions strongly at odds with IITF's vision of intellectual property's
future. These articles can be found at (respectively):

ftp.eff.org, /pub/Publications/Esther_Dyson/ip_on_the_net.article
gopher.eff.org, 1/Publications/Esther_Dyson, ip_on_the_net.article
http://www.eff.org/pub/Publications/Esther_Dyson/HTML/ip_on_the_net.html

and

ftp.eff.org, /pub/Publications/John_Perry_Barlow/idea_economy.article
gopher.eff.org, 1/Publications/John_Perry_Barlow, idea_economy.article
http://www.eff.org/pub/Publications/John_Perry_Barlow/HTML/
idea_economy_article.html

The new "White Paper" version of the IITF report doesn't seem to have
fixed anything. Most criticisms that applied to the Green Paper draft
hold for the final version. The National Writers Union says of the
report, "We are struck by the remote character of the report in that it
misses the daily realities of the individual writer, artist or other
creator...we must voice concerns that favor the rights of information
users at the same time that we seek fair compensation for our work."
NWU suggests that the report points fingers at individuals and libraries
for copyright infringement, when the real culprits are media conglomerates,
and calls the working group's bias against the public interest and toward
media centralization "a disconnection from reality", and a failure to
uphold the public's fair use rights. NWU closes by saying, "Legislation
and regulatory action on intellectual property and the National Information
Infrastructure must do a more complete job than has been done by this
report to include the concerns of the creators of intellectual property
and of the general public."

The full NWU comments can be found at:

ftp.eff.org, /pub/Intellectual_property/nwu_ipwg_paper.comments
gopher.eff.org, 1/Intellectual_property, nwu_ipwg_paper.comments
http://www.eff.org/pub/Intellectual_property/nwu_ipwg_paper.comments

The Commercial Internet eXchange (CIX) has criticised the white paper as
well, in a draft position statement, pointing out that IPWG would criminalize
all service providers for the illegal actions of their users.

CIX's response paper states in part, "CIX members transmit nearly half a
billion messages each day, and cannot realistically be expected to
monitor the content of those transmissions. Moreover, the instantaneous
nature of digital communications precludes access providers from viewing,
judging, monitoring or editing the content of most messages posted or
accessed by their subscribers. Finally, [Internet Access Providers] are
similar to common carriers in that they have no control over which
members of the public use their facilities or the content members of the
public choose to transmit. For these reasons, access providers should not
be treated as a publisher [sic] for copyright purposes. Unfortunately,
that is precisely what the Working Group has proposed by including in its
suggested revisions to the Copyright Act the undefined word 'transmit' as
part of the definition of 'publish.'"

The full CIX comments can be found at:

ftp.eff.org, /pub/Intellectual_property/cix_ipwg_paper.comments
gopher.eff.org, 1/Intellectual_property, cix_ipwg_paper.comments
http://www.eff.org/pub/Intellectual_property/cix_ipwg_paper.comments


The IITF report recommended that the Copyright Act "be amended to
expressly recognize that copies or phonorecords of works can be
distributed to the public by transmission, and that such transmissions
fall within the exclusive distribution right of the copyright owner."
This portion of the suggested legislation has already been passed by both
houses of Congress.

Whether other aspects will find their way into law remains to be seen.
They probably will, though. Criticism of the White Paper is common and
solid, but this does not seem to be dissuading legislators from taking
the Report's conclusions and recommendations at face value and running
with them.


* IPWG Report's Suggested Legislation: Passed and Pending (+ Canada Tie-In)

Samuelson, CIX, Barlow, NWU, Dyson, Jessica Littman, and numerous others
have pointed out, in articles and at conferences, an almost uncountable
number of flaws in the IITF NII intellectual property report. Some have
labelled it "a wolf in sheep's clothing", which systematically ignores
cases which don't support its extreme positions in order to make its
radical proposals look more reasonable. At this early stage, the White
Paper's endorsement of criminalizing traditionally protected behaviors
such as private, non-commercial copying is not well understood. Nor is
it well understood how biased a document it is, or how it supposes a
view of the world in which every information transaction can be subject
to a private tax with the threat of criminal sanction behind it.

Critics of the report suggest that its drafting process is heavily
dominated by special interests to such an extent that a fair outcome is
unlikely - the lobbyists (and former lobbyists like PTO Commissioner
Lehman), may be motivated by fear that digitalization will mark the end
of the economic hegemony of certain media interests, who seek to bend the
law to their exclusive advantage with no regard for the tranditional
balance in intellectual property law between i-p rights holders and the
public.

Then again, others, such as the Software Publisher Association complain
loudly of lost profits in the billions due to online copyright violation,
and even the NWU supports major changes to current intellectual property law.

Few seem to doubt that current law is quite right for the state of modern
communications. The disagreement seems largely about what changes must
be made, and perhaps more to the point - whether now is a good time to
change them or on the other hand whether anyone proposing immediate changes
has any idea what they are doing.

Senators Orrin Hatch and Pat Leahy think they do, and introduced S. 1284,
the "Information Infrastructure Copyright Act of 1995" in September.
the IICA is based heavily on the IITF White Paper, and comprises sections.
The first, the "NII Copyright Protection Act of 1995", explicitly covers
digital transmission of copyrighted works, as one might expect. It also
makes it a crime to alter or provide false "copyright management
information" on someone else's intellectual property, or to
circumvent copy protection schemes or provide software or hardware to do
so ("copyright management information" being author and copyright holder
name and contact info, terms & conditions of use),

Not particularly disturbing? Until you consider that reverse-analysis of
software, including copy protection, is useful and legitimate, as are
utilities to update one's own information stored by the copy protection
features in software. Or until you consider that many copy protection
schemes are poorly designed, and essentially require one to break the
copy protection to make backups or to install a new copy of the software
from backup disks. Or until you get to the section that lays the
burden of proving innocence on the accused. Or until you realize that
the only way to enforce these provisions would be for system operators
(and libraries and other services) to act as "net cops" and spy on
users continuously and in great detail. Fines are up to half a million
dollars and/or 5 years in prison.

The bill panders to large-scale copyright holders, and fails to balance
their rights with those of authors & creators, not to mention the public's
right of fair use. A coalition of organizations, individuals and a
companies, the Digital Future Coalition, further criticizes the bill as
hindrance to the development of tele-education and general market innovation.
EFF is considering joining DFC and endorsing their upcoming letter to the
sponsors of this bill.

Ironically, it was Sen. Leahy who said (referring to the Digital
Telephony bill) in April 1994, "The part that frightens the hell out of
me is the goverment deciding where technology goes."

Should this legislation pass, it is likely that the actual authors and
creators (as opposed to corporate copyright holders) will make less money
than ever from their works, and that information vendors (and access
providers - unless and until we have a common-carrier-like liability
protection for them) will have to make redoubled efforts to check the
copyright and royalty/licensing situation of any information their
services provide. This could be the next step on one of two paths:
increasing "net.cop" behavior on the part of access providers, or
increased civil disobedience of unenforceable laws that are almost
physically impossible to abide by for system operators.


Senator Leahy, this time with Sen. Feingold, is interested in even more
changes to intellectual property law. They introduced S.1122,
the "Criminal Copyright Improvement Act of 1995" in August, making it an
offense to assist others in the reproduction or distribution of an
infringed work, and allowing prosecutors to go after bulletin board
operators and other service providers when the end-user cannot be
tracked down. Leahy's bill, the inspiration for which appears to be
highly questionable statistics from software manufacturers' trade
associations, poses fairly clear threats to all system operators that do
not track users and get a variety of verified personal information from
all customers. In a speech at a conference, Leahy tied S.1122 into his
and Sen. Orrin Hatch's new bill to combat the counterfeiting of goods,
S.1136, proposing fines up to US$1,000,000. S.1122 has language related
to faked goods, including software, as well. It may be that the two
bills are intended to be merged.

S. 1122 is intended to snare system operators whose systems are used for
software piracy by customers. One section states"

SEC. 2. CRIMINAL INFRINGEMENT OF COPYRIGHTS.
(a) DEFINITION OF FINANCIAL GAIN- Section 101 of title 17, United
States Code, is amended by inserting after the undesignated
paragraph relating to the term `display', the following new
paragraph:
`The term `financial gain' includes receipt of anything of
value, including the receipt of other copyrighted works.'.
(b) CRIMINAL OFFENSES- Section 506(a) of title 17, United States
Code, is amended to read as follows:
`(a) CRIMINAL INFRINGEMENT- Any person who infringes a copyright
willfully either--
`(1) for purposes of commercial advantage or private
financial gain; or
`(2) by the reproduction or distribution, including by
transmission, or assisting others in such reproduction or
distribution, of 1 or more copies, of 1 or more copyrighted
works, which have a total retail value of $5,000 or more,
shall be punished as provided under section 2319 of title 18.'.


EFF currently has no position on this legislation, but may take one. The
Center for Democracy and Technology will support the bill, provided it is
modified (See CDT Policy Post for more info.)

On the one hand, few doubt that allowing a system to be used as a sort of
"pirated software clearinghouse" should be illegal even if the sysop does
not profit from this activity (Cf. the LaMacchia case). However, this
bill would appear to be insufficiently narrow, and may hold criminally
liable system operators whose users exchange software, audio files or
other material copyrighted by others, even without the permission or
knowledge of the system operator. EFF remains committed to establishing
a form of common-carrier-like liability protection for online service
operators so that sysadmins and BBS sysops are not fined or imprisoned
for crimes committed by users. The bill also does not appear to
adequately take into account the people's rights of fair use.


At a conference, Borland Sr. VP Robert Kohn and author of a
treatise on online music licensing, pointed out for the audience Internet
sites devoted to recording artists such as Frank Sinatra, and noting that
they probably were not licensed to have the copies of song lyrics they
offered from their sites. As if mirroring Kohn's sentiments, SOCAN,
roughly the Canadian equivalent of US music intellectual property
clearinghouses BMI and ASCAP, have filed a proposed tariff which will
allow licensing of music transmitted over the Internet or BBSs, so that
SOCAN can collect royalities for online uses of sound clips or lyric
texts. The Society of Composers, Authors and Music Publishers of
Canada's Tariff 22 is entitled "Transmission of Musical Subscribers [sic]
via a Telecommunications Service not Licensed Under Tariff 16 or 17". The
proposed Tariff provides a licence fee of $0.25 for every subscriber on
a service that does not earn advertising revenue. For services that do
earn revenue from advertising, the licence is based on 3.2% of gross
revenues, with a minimum fee of $0.25 per subscriber. A correspondent,
John Lax, contacted SOCAN for more details, and found that SOCAN plans
that anyone wanting to make online use of songs controlled by SOCAN would
have to be licensed by the organization, and be subject to audits and
inspection by SOCAN.

While some note that sites like IUMA, providing online but copyrighted music
information such as song lyrics, should have to pay royalties, the
administrator of one such site says that the artists involved are, in at
least some cases, not at all pleased by moves like SOCAN's, and will end up
paying any SOCAN fees *themselves* because the Internet music sites
provide free advertising for them, resulting in far more income from new
sales than incoming lost from uncollected penny-ante royalities for
online lyric reading or soundclip downloads. This is fairly interesting
in light of NWU's criticism of the Lehman paper, that the report
reflects not the interests of creators at all, but rather the interests
of media mega-corporations who thrive on royalty percentages.

While there's no direct tie-in between SOCAN's proposed tarrif and the
IETF i-p report, there's an indirect one, in the form of a bill which
recently passed both the US Senate and, unanimously, the House of
Representatives. H.R.1506, the Digital Performance Right in Sound
Recordings Act of 1995", gives copyright holders the authority to collect
royalties each time a sound recording is transmitted in digital form.
Measures that were suggested independently by both SOCAN and IITF are
about to be the law of the land in the US, despite the fact that little
debate on this matter has occurred, and some content producers think this
will cost, not save, them money.

The bills referred to above are available at:

ftp.eff.org, /pub/Legislation/Bills_by_number/
gopher.eff.org, 1/Legislation/Bills_by_number
http://www.eff.org/pub/Legislation/Bills_by_number/



NOTE: IITF is not to be confused with IETF, the Internet Engineering Task
Force, which is a non-governmental volunteer standards body.


[Some text in the above two articles borrowed from CIX, SOCAN, and NWU
statements; Computer Law Report #11 was also used as source material, as
were several action alerts and posts by participants on EFF and EFC
mailing lists.]


* Upcoming Articles

Bernstein Case - Update
Public Govt. Info Online - Update
Scientology v. Critics - Update
A Look at Internet Domain Name Fees and Alternatives to InterNIC
EFC Opposes Bell Canada Trademark on "The Net"
Arthur Halavais Censored from Internet by Judge
Minnesota v. the Whole Wide World
PROFS Case - Update
Tony Davis Case - Update
Lorne Shantz Case - Update

Some of these were expected this issue, but have been put off due to the
size of the artices in the current issue.

------------------------------


Subject: Upcoming events
------------------------

This schedule lists events that are directly EFF-related. A much more
detailed calendar of events likely to be of interest to our members and
supporters is maintained at:

ftp: ftp.eff.org, /pub/EFF/calendar.eff
gopher: gopher.eff.org, 1/EFF, calendar.eff
http://www.eff.org/pub/EFF/calendar.eff


Nov. 7 * European Summit on the Information Superhighway; Amsterdam,
Netherlands. Speakers include EFF co-founder John Perry Barlow.

Nov. 9 * Doors of Perception Conference; Amsterdam, Netherlands. Speakers
include EFF co-founder John Perry Barlow.

Nov. 23-
25 * HyperMedia Conference; Oita Japan. Speakers include
EFF boardmember David Farber.

Nov. 27 * Internet Society Japan Conference; Kobe Japan. Speakers include
EFF boardmember David Farber.

Nov. 29 * Japan Ministry of Posts and Telecom. Annual Conference on
Advances in Communications; Tokyo Japan. Foreign Keynote speech
by EFF boardmember, David Farber.

Jan. 17-
18 * Innovation Now; Oregon Convention Center, Portland Oregon.
Sponsored by American Electronics Association's Oregon Council,
et al. Speakers include EFF chair of the board Esther Dyson.
URL: http://www.innovationnow.org/

------------------------------


Subject: Quote of the Day
-------------------------

"You are all optimizing against the imaginable, not the probable. And the
imaginable, especially the imaginable evil, has no inertia at all. There
is no limit to what it might do and therefore, there is no limit to what one
must do to prevent it...If we are to design all of our policies around the
worst thing that could possibly happen, if we are trying to achieve a
world of such absolute safety that no one in power can ever be blamed for
a human-caused catastrophe, we will have to endow law enforcement with
powers of surveillance which will make a police state not just imaginable
but probable."
- EFF co-founder John Perry Barlow, in a letter to Administration staffers
regarding the Clipper and Digital Telephony surveillance scheme, on
which the Administration refused to back down, citing fear of terrorists
using untappable communications to plan a nuclear bombing of the
World Trade Center, and the reaction the voting public would have
toward the Adminstration in the event of such terrorism.

Find yourself wondering if your privacy and freedom of speech are safe
when bills to censor the Internet are swimming about in a sea of of
surveillance legislation and anti-terrorism hysteria? Worried that in
the rush to make us secure from ourselves that our government
representatives may deprive us of our essential civil liberties?
Concerned that legislative efforts nominally to "protect children" will
actually censor all communications down to only content suitable for
the playground?

Join EFF!

Even if you don't live in the U.S., the anti-Internet hysteria will soon
be visiting a legislative body near you. If it hasn't already.

------------------------------


Subject: What YOU Can Do
------------------------

* The Communications Decency Act & Other Censorship Legislation

The Communications Decency Act and similar legislation pose serious
threats to freedom of expression online, and to the livelihoods of system
operators. The legislation also undermines several crucial privacy
protections.

Business/industry persons concerned should alert their corporate govt.
affairs office and/or legal counsel. Everyone should write to their own
Representatives and Senators, asking them to oppose Internet censorship
legislation, and write to the conference committee members to support
the reasonable approaches of Leahy, Klink, Cox and Wyden, and to oppose
the unconstitutional proposals of Exon, Gorton and others. See the first
article in this newsletter for more detailed info.

For more information on what you can do to help stop this and other
dangerous legislation, see:

ftp.eff.org, /pub/Alerts/
gopher.eff.org, 1/Alerts
http://www.eff.org/pub/Alerts/

If you do not have full internet access, send your request
for information to ask@eff.org.


* Digital Telephony/Comms. Assistance to Law Enforcement Act

The FBI is now seeking both funding for the DT/CALEA wiretapping provisions,
and preparing to require that staggering numbers of citizens be
simultaneously wiretappable.

To oppose the funding, write to your own Senators and Representatives
urging them to vote against any appropriations for wiretapping.
To oppose the FBI's wiretapping capacity demands, see the FBI Federal
Register notice at the end of the second article in this newsletter, which
contains instructions on how to submit formal comments on the ludicrous
and dangerous proposal.


* Anti-Terrorism Bills

Numerous bills threatening your privacy and free speech have been introduced
this year. None of them are close to passage at this very moment, but
this status may change. Urge your Congresspersons to oppose these
unconstitutional and Big-Brotherish bills.


* The Anti-Electronic Racketeering Act

This bill is unlikely to pass in any form, being very poorly drafted, and
without much support. However, the CDA is just as bad and passed with
flying colors [the jolly roger?] in the Senate. It's better to be safe
than sorry. If you have a few moments to spare, writing to, faxing, or
calling your Congresspersons to urge opposition to this bill is a good
idea. If you only have time to do limited activism, please concentrate
on the CDA instead. That legislation is far more imminent that the AERA.


* Find Out Who Your Congresspersons Are

Writing letters to, faxing, and phoning your representatives in Congress
is one very important strategy of activism, and an essential way of
making sure YOUR voice is heard on vital issues.

EFF has lists of the Senate and House with contact information, as well
as lists of Congressional committees. (A House list is included in this
issue of EFFector). These lists are available at:
ftp.eff.org, /pub/Activism/Congress_cmtes/
gopher.eff.org, 1/EFF/Issues/Activism/Congress_cmtes
http://www.eff.org/pub/Activism/Congress_cmtes/

The full Senate and House lists are senate.list and hr.list, respectively.
Those not in the U.S. should seek out similar information about their
own legislative bodies. EFF will be happy to archive any such
information provided.

If you are having difficulty determining who your Representatives are,
try contacting your local League of Women Voters, who maintain a great
deal of legislative information.


* Join EFF!

You *know* privacy, freedom of speech and ability to make your voice heard
in government are important. You have probably participated in our online
campaigns and forums. Have you become a member of EFF yet? The best way to
protect your online rights is to be fully informed and to make your
opinions heard. EFF members are informed and are making a difference. Join
EFF today!

For EFF membership info, send queries to membership@eff.org, or send any
message to info@eff.org for basic EFF info, and a membership form.

------------------------------


Administrivia
=============

EFFector Online is published by:

The Electronic Frontier Foundation
1550 Bryant St., Suite 725
San Francisco CA 94103 USA
+1 415 436 9333 (voice)
+1 415 436 9993 (fax)
Membership & donations: membership@eff.org
Legal services: ssteele@eff.org
General EFF, legal, policy or online resources queries: ask@eff.org

Editor:
Stanton McCandlish, Online Services Mgr./Activist/Archivist (mech@eff.org)

This newsletter is printed on 100% recycled electrons.

Reproduction of this publication in electronic media is encouraged. Signed
articles do not necessarily represent the views of EFF. To reproduce
signed articles individually, please contact the authors for their express
permission. Press releases and EFF announcements may be reproduced individ-
ually at will.

To subscribe to EFFector via email, send message body of "subscribe
effector-online" (without the "quotes") to listserv@eff.org, which will add
you to a subscription list for EFFector.

Back issues are available at:
ftp.eff.org, /pub/EFF/Newsletters/EFFector/
gopher.eff.org, 1/EFF/Newsletters/EFFector
http://www.eff.org/pub/EFF/Newsletters/EFFector/

To get the latest issue, send any message to effector-reflector@eff.org (or
er@eff.org), and it will be mailed to you automagically. You can also get
the file "current" from the EFFector directory at the above sites at any
time for a copy of the current issue. HTML editions available at:
http://www.eff.org/pub/EFF/Newsletters/EFFector/HTML/
at EFFweb. HTML editions of the current issue sometimes take a day or
longer to prepare after issue of the ASCII text version.

------------------------------





End of EFFector Online v08 #18 Digest
*************************************

$$

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT