About
Community
Bad Ideas
Drugs
Ego
Erotica
Fringe
Society
Technology
Hack
Hacker Zines
CERT
CHAL
CHAOS
CIAC
CPD
CPSR
CRH
CWD
CuD
CuD/A
EFF
LOL
MOD
Miscellaneous Phreak and Hacker Zines
NIA
RISKS
UXU
register | bbs | search | rss | faq | about
meet up | add to del.icio.us | digg it

EPIC On Gov't Guidelines, Lorrie Faith Cranor's CF


NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.
From <@uga.cc.uga.edu:[email protected]> Thu Apr 27 03:41:46 1995
Return-Path: <<@uga.cc.uga.edu:[email protected]>>
Received: from uga.cc.uga.edu by netcom15.netcom.com (8.6.12/Netcom)
id DAA00540; Thu, 27 Apr 1995 03:41:25 -0700
Received: from UGA.CC.UGA.EDU by uga.cc.uga.edu (IBM VM SMTP V2R2)
with BSMTP id 6889; Thu, 27 Apr 95 06:36:31 EDT
Received: from UGA.CC.UGA.EDU (NJE origin LISTSERV@UGA) by UGA.CC.UGA.EDU (LMail V1.2a/1.8a) with BS id 5236; Thu, 27 Apr 1995 01:35:36 -0400
Received: from UIUCVMD.BITNET by VMD.CSO.UIUC.EDU (LISTSERV release 1.8a) with
NJE id 7954 for [email protected]; Thu,
27 Apr 1995 00:36:45 -0500
Received: from UIUCVMD (NJE origin SMTP@UIUCVMD) by VMD.CSO.UIUC.EDU (LMail
V1.2a/1.8a) with BSMTP id 1316; Thu, 27 Apr 1995 00:36:44 -0500
Received: from MVS.CSO.NIU.EDU by vmd.cso.uiuc.edu (IBM VM SMTP V2R2) with TCP;
Thu, 27 Apr 95 00:36:33 CDT
Received: from MVS.CSO.NIU.EDU by MVS.CSO.NIU.EDU (IBM MVS SMTP V2R2.1) with
BSMTP id 3183; Thu, 27 Apr 95 00:34:27 LCL
Date: Thu, 27 Apr 95 00:33 CDT
To: [email protected]
From: Cu Digest ([email protected]) <[email protected]>
Subject: Cu Digest, #7.33
Message-ID: <CUDIGEST%[email protected]>
Sender: [email protected]
Status: RO

Computer underground Digest Wed Apr 26, 1995 Volume 7 : Issue 33
ISSN 1004-042X

Editors: Jim Thomas and Gordon Meyer ([email protected])
Archivist: Brendan Kehoe
Shadow Master: Stanton McCandlish
Field Agent Extraordinaire: David Smith
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Copy Desecrator: Emo Shrdlu

CONTENTS, #7.33 (Wed, Apr 26, 1995)

File 1--EPIC On Gov't Guidelines
File 2-- Lorrie Faith Cranor's CFP95 Conference Report
File 3--DEATH ROW INMATE GETS HOME PAGE ON INTERNET (fwd)
File 4--Cu Digest Header Info (unchanged since 19 Apr, 1995)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

---------------------------------------------------------------------

Date: 26 Apr 1995 16:32:35 -0400
From: "Marc Rotenberg" <[email protected]>
Subject: FIle 1--EPIC On Gov't Guidelines

Electronic Privacy Information Center
666 Pennsylvania Avenue, S.E.
Washington, DC 20003
(202) 544-9240
[email protected]

* P R E S S R E L E A S E *

April 27, 1995

EPIC URGES SPECTER TO PROCEED CAUTIOUSLY

WASHINGTON -- In a letter sent today to Senator Arlen Specter,
the Electronic Privacy Information Center, a leading civil
liberties organization, urged the Congress to proceed cautiously
in the wake of the tragic bombing incident in Oklahoma. EPIC
said that "any expansion of federal authority to investigate
political activity could have a profound impact upon
communication networks and the future of electronic democracy."
Senator Specter is holding hearings tomorrow on counter-terrorism
proposals.

The EPIC letter focused on the history of the Attorney
General guidelines which permit the government to conduct
investigations of domestic organizations. The original
guidelines were issued in 1976 by Attorney General Edward Levi.
The "Levi Guidelines," as they came to be known, recognized the
FBI's legitimate investigative needs while seeking to protect the
First Amendment rights of dissident politic organizations. The
Guidelines were promulgated in the wake of Watergate and the
revelations of the Senate's Church Committee investigation.
According to EPIC, the Levi Guidelines reflected the post-
Watergate consensus that the investigation of controversial or
unpopular political groups had at times been overzealous and had
violated fundamental constitutional rights.

In 1983 President Reagan's Attorney General, William French
Smith, issued a new set of guidelines that replaced the Levi
Guidelines. The "Smith Guidelines" were far less restrictive
than the Levi Guidelines. As President Reagan's FBI Director
William Webster said, the Smith Guidelines "should eliminate any
perceptions that actual or imminent commission of a violent crime
is a prerequisite to investigation."

The critical section of the Smith Guidelines cited in the
EPIC letter provides that "[a] domestic security/terrorism
investigation may be initiated when facts or circumstances
reasonably indicate that two or more persons are engaged in an
enterprise for the purpose of furthering political or social
goals wholly or in part through activities that involve force or
violence and a violation of the criminal laws of the United
States."

EPIC said that "the current guidelines provide the FBI with
ample authority to initiate investigations of organizations and
individuals similar to those alleged to have been involved in the
Oklahoma City bombing." EPIC noted that public information
concerning paramilitary right-wing organizations in general --
and the Michigan Militia in particular -- has been readily
available to the FBI and other law enforcement agencies for some
time. EPIC also noted that former Attorney General Griffin Bell
and former Assistant Attorney General Victoria Toensing have
recently expressed the view that the FBI possessed sufficient
authority under the Smith Guidelines to investigate and monitor
the activities of this organization and affiliated individuals.

Finally, EPIC urged Senator Specter to give similar careful
consideration to any proposals for the modification of the
wiretap statute or privacy statutes that would diminish the
freedoms that all American currently enjoy.

Earlier this year, EPIC recommended that Congress not
appropriate $500 million for a national wiretap program developed
by the FBI. EPIC said that the program would increase the
vulnerability of the nation's communications infrastructure.
EPIC said today that it will continue to oppose funding of the
program.


-30-

ELECTRONIC PRIVACY INFORMATION CENTER
WASHINGTON, DC
[email protected]

April 26, 1995

Honorable Arlen Specter
Chairman
Judiciary Subcommittee on Terrorism,
Intelligence and Gov't Information
United States Senate
161 Dirksen Office Building
Washington, DC 20510

Dear Senator Specter:

We write on behalf of the Electronic Privacy Information
Center ("EPIC"), a non-profit research organization concerned with
the protection of privacy and civil liberties. We are particularly
interested in the preservation of Constitutional freedoms in the
evolving communications infrastructure. Increasingly, the Internet
and other digital systems facilitate the expression of political
opinions and have, in effect, become the electronic town squares
of our information society. For this reason, EPIC believes that
any expansion of federal authority to investigate political
activity and/or expression could have a profound impact upon those
networks and the future of electronic democracy.

As the Committee begins its examination of the tragic events
in Oklahoma City, we urge careful and deliberate consideration of
any proposal that would alter current guidelines governing the
investigation and monitoring of domestic political activity or the
collection and use of personal information. The Congress must be
careful not to compromise fundamental constitutional values as it
seeks to address the obvious security concerns in the wake of
recent events. As Justice Powell observed in the Keith case:

History abundantly documents the tendency of Government
-- however benevolent and benign its motives -- to view
with suspicion those who most fervently dispute its
policies. [Constitutional] protections become the more
necessary when the targets of official surveillance may
be those suspected of unorthodoxy in their political
beliefs. The danger to political dissent is acute where
the Government attempts to act under so vague a concept
as the power to protect "domestic security." Given the
difficulty of defining the domestic security interest,
the danger of abuse in acting to protect that interest
becomes apparent.

United States v. United States District Court, 407 U.S. 297, 314
(1972).

In order to assess whether it is necessary to make changes in
the current policies concerning the investigation of domestic
organizations, we believe it is necessary to look closely at the
history of federal investigative authority. As you know, the
evolution of the current requirements governing the FBI's conduct
of domestic security investigations dates back to 1976. In that
year, President Ford's Attorney General, Edward Levi, issued
"Guidelines on Domestic Security Investigation," which came to be
known as the "Levi Guidelines." This directive, which recognized
the FBI's legitimate investigative needs while seeking to protect
the First Amendment rights of dissident politic organizations, was
promulgated in the wake of Watergate and the revelations of the
Senate's Church Committee investigation./1/ The Levi Guidelines
reflected the post-Watergate consensus that the investigation of
controversial or unpopular political groups had at times been
overzealous and had violated fundamental constitutional rights./2/

Seven years later, in 1983, the Levi Guidelines were
superseded by the "Attorney General's Guidelines on General
Crimes, Racketeering Enterprise and Domestic Security/Terrorism
Investigations," issued by Attorney General William French Smith
(the "Smith Guidelines"). The revised guidelines were generally
considered to be far less restrictive than the Levi Guidelines.
As FBI Director William Webster noted at the time of their
issuance, the Smith Guidelines "should eliminate any perceptions
that actual or imminent commission of a violent crime is a
prerequisite to investigation."/3/

The guidelines provide, in pertinent part, that

[a] domestic security/terrorism investigation may be
initiated when facts or circumstances reasonably indicate
that two or more persons are engaged in an enterprise for
the purpose of furthering political or social goals wholly
or in part through activities that involve force or
violence and a violation of the criminal laws of the
United States.

Smith Guidelines (reprinted in 32 Crim. L. Rep. (BNA) 3087
(1983)), Section III (B)(1). The standard of "reasonable
indication" is

substantially lower than probable cause. In determining
whether there is reasonable indication of a federal
criminal violation, a Special Agent may take into account
any facts or circumstances that a prudent investigator
would consider. However, the standard does require
specific facts indicating a past, current, or impending
violation. There must be an objective, factual basis for
initiating the investigation; a mere hunch is insufficient.

Id., Section II (C)(1).

Given the constitutional command that the government may not
suppress or punish statements advocating criminal activity unless
they pose an immediate and substantial danger to public safety,
Brandenburg v. Ohio, 395 U.S. 444 (1969), the Smith Guidelines
afford the FBI considerable leeway in pursuing investigations of
potential violent crime. In a 1984 en banc opinion interpreting
the Smith Guidelines, the Seventh Circuit Court of Appeals found
that the directive strikes an appropriate balance between First
Amendment rights and legitimate law enforcement. As Judge Posner
wrote for the court,

[the FBI] may not investigate a group solely because
the group advocates [an unpopular cause]; but it may
investigate any group that advocates the commission, even
if not immediately, of terrorist acts in violation of
federal law. It need not wait until the bombs begin to
go off, or even until the bomb factory is found.

Alliance to End Repression v. City of Chicago, 742 F.2d 1007, 1015
(7th Cir. 1984).

Thus, the current guidelines provide the FBI with ample
authority to initiate investigations of organizations and
individuals similar to those alleged to have been involved in the
Oklahoma City bombing. In reaching this conclusion, we note that
a good deal of public source material concerning paramilitary
right-wing organizations in general -- and the Michigan Militia in
particular -- has been readily available to the FBI and other law
enforcement agencies for some time. For instance, a front page
article about the Michigan Militia in the Detroit Free Press last
fall reported:

Their goal is to keep the U.S. government in check,
through threat of armed rebellion if need be. Gun control
advocates, federal firearms agents and the United Nations
are among the perceived threats. ...

Federal officials are aware of these groups, but "we
are not monitoring their growth," said Stanley Zimmerman,
head of the Detroit office of the federal Bureau of Alcohol,
Tobacco and Firearms. "It would be our preference that the
militia groups would use the power of the vote rather than
the threat of armed violent confrontation to accomplish
their goals."

"They Cite their Disgust with Government," Detroit Free Press,
October 13, 1994, at 1A.

Indeed, the Justice Department was specifically alerted to
the activities of the Michigan Militia. Morris Dees, director of
the Southern Poverty Law Center, disclosed in a recent interview
that:

We warned Attorney General Reno in a letter last October
concerning this Militia of Michigan, the one that's
involved in this case, and pointed out that they should
be checking on them. ... [T]hese people, like Mark Koernke,
are out actually advocating the overthrow of the United
States government with individuals who are practicing and
training with explosives, with assault weapons.

ABC News, "This Week with David Brinkley," April 23, 1995.

In recent comments concerning the adequacy of the Smith
Guidelines, former Attorney General Griffin Bell and former
Assistant Attorney General Victoria Toensing have expressed the
view that the FBI possessed sufficient authority to investigate
and monitor the activities of this organization and affiliated
individuals. This conclusion is consistent with the observation
of former FBI Director Webster, noted above, that the current
guidelines "should eliminate any perceptions that actual or
imminent commission of a violent crime is a prerequisite to
investigation." As you commence your review into this matter, we
strongly urge you to consider the views of many experts who share
the opinion of these former officials.

We urge you also to give similar careful consideration to any
proposals for the modification of the wiretap statute or privacy
statutes that would diminish the freedoms that all Americans
currently enjoy. Any such proposal must be carefully drafted to
address specific and identifiable harms. We urge you also to
proceed cautiously in the area of electronic communications. Our
country is in the process of developing the communication tools
that will take us into the next century. While we share the
President's belief that irresponsible speech should be opposed by
responsible speech, we do not believe that enhanced surveillance
of lawful activity by American citizens will serve the country
well.

Political and associational rights form the foundation of our
democratic society. As the Committee and Congress examine the
nation's contemporary security needs, the temptation to find
expedient quick fixes must be resisted. Issues as fundamental as
the ones you propose to address deserve and demand a thorough and
open national debate. We look forward to working with you and the
Committee as you consider these difficult questions.

Sincerely,



Marc Rotenberg, Director David L. Sobel, Legal Counsel



cc: Sen. Fred Thompson
Sen. Spencer Abraham
Sen. Strom Thurmond
Sen. Herbert Kohl
Sen. Patrick Leahy
Sen. Dianne Feinstein

==================================================================

Notes

/1/ See, generally, Final Report of the Senate Select
Committee to Study Governmental Operations with Respect to
Intelligence Activities, S. Rep. 755, 94th Cong., 2d Sess. (1976).

/2/ Although some critics maintained that the guidelines were
unduly restrictive, Attorney General Levi explained that they
authorized the initiation of an investigation on the basis of a
relatively benign statement such as "The rulers have set the time
for the party; let us bring the fireworks," delivered by a group
with no known propensity for violence. Alliance to End Repression
v. City of Chicago, 742 F.2d 1007, 1012 (7th Cir. 1984) (quoting
Congressional testimony of Attorney General Levi).

/3/ Alliance to End Repression v. City of Chicago, 561 F.
Supp. 575, 578 n.5 (N.D. Ill. 1983) (quoting internal FBI
memorandum).
====================
Marc Rotenberg ([email protected]) * 202-544-9240 (tel)
Electronic Privacy Information Center * 202-547-5482 (fax)
666 Pennsylvania Ave, SE, Suite 301 * ftp/gopher/wais cpsr.org
Washington, DC 20003 * HTTP://epic.digicash.com/epic

------------------------------

Date: Mon, 24 Apr 1995 01:22:02 -0500
From: jim thomas <[email protected]>
Subject: FIle 2-- Lorrie Faith Cranor's CFP95 Conference Report

Lorrie Faith Cranor's CFP95 Conference Report

-----------------------------------------------------------------
Copyright 1995 by Lorrie Faith Cranor. Permission to distribute this
report electronically is granted, provided you do not distribute it
for direct commercial advantage. This report is a description of
CFP95 as I experienced it. The unattributed opinions liberally
sprinkled throughout are, of course, my own.
-------------------------------------------------------------------

I attended the Fifth Conference on Computers, Freedom and Privacy
(http://www-techlaw.stanford.edu/CFP95.html) March 28 through 31 at
the San Francisco Airport Marriott Hotel. Having thoroughly enjoyed
the previous two CFP conferences, I had been looking forward to CFP95
for quite some time -- and I was not disappointed.

The conference began on March 28 with a full day of tutorial programs.
I arrived too late to attend the tutorials, but in time to enjoy an
evening ice cream reception and meet some of the other attendees. The
informal discussions I began that evening and which I continued
between sessions throughout the conference proved to be as valuable as
the formal sessions.

The main part of the CFP95 program got off to a slow start on March
29 with keynote speaker John Morgridge, chairman of the board of Cisco
systems. Morgridge described the current status of computer networks
as "the era of use," in which we will have to address more difficult
issues than we faced while we were just concentrating on "the
plumbing." But he failed to shed much light on what these issues are
or how we might face them.

The next session, "Student Databases: For Education and For Life,"
proved more enlightening and quite controversial. Barbara Clements,
Council of Chief State School Officers, outlined the advantages of
electronic student records databases over the traditional paper filing
systems. She argued that electronic systems are more accurate, take
up less space, and are more secure. In addition, if these systems
follow standard conventions they can make it much easier for
information to be transfered between schools. But panelist Anita
Hoge, was quite critical of standardized student information
databases, especially those that contain information obtained through
standardized tests. She described an exam given to her son in a
Pennsylvania public school. Hoge said this "Educational Quality
Assessment" was designed to measure predispositions of students
towards certain types of behaviors. For example, the exam described a
hypothetical situation in which the student's friends were planning an
outing to spray paint graffiti around town. The student is asked
whether he or she would go along. A negative response is interpreted
as a predisposition towards anti-social behavior. According to Hoge,
the results of this exam can be used to identify students with mental
and behavioral disorders, classify them as special education students,
send this information to the government, and make the students
eligible for Medicaid. While most of the audience probably agreed
with Hoge that such exams are inappropriate, many people were not
convinced by Hoge's conclusion that the use of standardized exams and
standardized student information databases was the first step in the
government's effort to sneak socialized health care through the back door.

Stanford Law Professor Margaret Jane Radin gave an interesting lunch
time presentation that inspired fish jokes throughout the rest of the
conference. Radin described two property rights paradigms and
discussed the advantages and disadvantages of applying them in
cyberspace. Traditionally, intellectual property has been considered
a form of economic property that could be bought and sold in a free
market. However, land (especially the land on which the family home
is built) has been considered a form of property that has
personal value beyond the monetary value that can be obtained by
selling it. She also speculated that as more people flock to
cyberspace, the Internet may evolve into something similar to what
broadcast TV has become. She described the TV audience as "potential
customers delivered to advertisers for a fee." Thus, she explained,
the TV broadcast industry is a giant commercial fishing industry. "It
would be good if cyberspace doesn't turn us into fish," she concluded.

A panel discussion on Intelligent Transportation Systems raised some
important privacy considerations, but was not nearly as provocative as
the next two sessions of the day: "Transaction Records In Interactive
Services" and "A Case Against Computers." The transaction records
panelists debated a variety of issues including who owns personal
information records (the person who provides them or the organization
that collects them), the merits of "opt-in" and "opt-out" privacy
protection systems, and where the responsibility for privacy
violations should rest.

The Case Against Computers session, dubbed the "luddite session,"
featured four panelists critical of computer technology. Jerry Mander
began by reminding everyone that people used to get along just fine
without computers. He suggested that contrary to what electronic
activists claim, computers help people feel more powerful, but are not
actual instruments of empowerment. Rather, he argued, computers
enforce centralized power structures that take power out of the hands
of individuals. In addition he was critical of the fact that computer
professionals do not receive training on how to critique computers.
Finally, he expressed dismay at the way computers and other new
technologies have been accepted by the public without debate or
consideration of their downsides. Panelist Ted Roszak then discussed
the fact that most computer users are not computer experts -- and
don't wish to be. He urged computer experts to remember that when
designing computer systems. Panelist Chet Bowers gave a very academic
presentation that was probably lost on most of the audience. The
point of his presentation seemed to be that we were not properly
considering the cultural impact of computers. Richard Sclove, the
only panelist with an email address (or at least the only one who
mentioned it), reminded us that information technology effects
everyone, even people who don't use computers. Although the panelists
raised some excellent points, I don't think this panel did a very good
job of addressing their audience. The panelists came across as a
bunch of middle-aged (or older) academic luddites, a characterization
that won them little respect or credibility with the techies in the
audience. In fact, during the Q & A period one audience member (who
seemed to have missed the point of the presentation entirely) asked
the panel, "Are you guys not getting it? What are you missing?"

The day's panel discussions were followed by the Electronic Frontier
Foundation (http://www.eff.org) Pioneer Awards presentation, an
EFF-sponsored reception, and dinner. At dinner each table was given a
question to discuss and answer, with prizes being awarded for the best
answers. Some tables took this quite seriously while others resented
being told what to talk about and submitted answers more humorous than
insightful (my own table taking the latter approach).

The next day of conference sessions began with a panel titled "Defining
Access Paradigms: Libraries, Rural Areas, and International Aspects."
While not particularly controversial, the panel addressed some
interesting problems. Karen Coyle of the University of California
described the free lending library as a product of the print
world. She explained that libraries generally purchase books but
lease electronic materials -- sometimes on a per-use basis. If
libraries had to pay per-use fees on all their materials, they would
likely have to pass some of these fees onto their patrons. In
addition libraries face problems in distributing electronic
information to patrons who want to take the information with them.
Panelist Christine Borgman's warning against causing a situation in
which only the elite have access to knowledge, led one audience member
to question whether technology really widens the knowledge gap. He
cited as evidence the fact that he as access to as much information as
a millionaire has. Apparently it didn't occur to this gentleman
(probably a member of the middle class) that he is a member of the
information elite, not the information poor.

The next session, "A Net for All: Where Are the Minorities?", featured
an interesting discussion of efforts to bring the Net to minority and
underprivledged populations. Art McGee of the Institute for Global
Communications described the famous New Yorker cartoon featuring one
dog introducing another dog to the Internet. The cartoon caption
reads, "On the Internet, nobody knows you're a dog." This led McGee to
comment that the second dog should have asked, "What's wrong with
being a dog?". He added that technology gives people the power to
express themselves in their own voices, without having their messages
spun by the media. But he reminded the audience that there are still
a lot of illiterate people and "all the computers in the world won't
help them if they can't read." Panelist Barbara Simons added that the
computer revolution has had a negative impact on uneducated people
because there are now fewer unskilled jobs.

An afternoon of discussion on "Freedom and Responsibility of Electronic
Speech" followed lunch, an address by Esther Dyson, and a panel
discussion on online activism. The electronic speech discussion began
with presentations from three individuals who have been involved in
freedom of electronic speech disputes. Brock Meeks, who was sued for
defamation because of something he posted as part of an online
newsletter (http://cyberwerks.com:70/1/cyberwire), discussed his case.
Because the case was settled out of court, it sets no legal precedent,
but Meeks proposed that people who enter into a discussion on the
Internet should be considered "public figures" who cannot be easily
libeled. He suggested the public figure characterization is
appropriate because Internet discussion participants have easy access
to the same public forum as those who might try to defame them. Jean
Camp (http://www.cs.cmu.edu/afs/cs/user/jeanc/www/home.html), a
doctoral student at Carnegie Mellon University discussed CMU's
censorship of sexually explicit Usenet newsgroups
(http://www.cs.cmu.edu/afs/cs/user/kcf/www/censor/index.html). Roger
Karraker, a journalism professor who maintained an electronic
conferencing system at Santa Rosa Junior College, described a case in
which a female student filed a sex discrimination complaint against
him after hearing that derogatory remarks had been made against her on
a men-only discussion group. Karraker said one of the mistakes he
made with the conferencing system was in describing it as an extension
of the student newspaper, because newspaper publishers are responsible
for their content. Karraker said individuals should be responsible
for their own speech in electronic discussion groups.

The second half of the electronic speech discussion took the form of a
"Socratic forum" (somewhat like a TV talk show) led by Stanford Law
Professor Kim Taylor-Thompson. Taylor-Thompson described hypothetical
situations and posed questions to the nine panelists. The discussion
was animated and brought out some interesting ideas. However, too
much of the debate was between the lawyers on the panel. CMU student
Donna Riley -- whose introduction as the founder of the feminist
Clittoral Hoods
(http://www.cs.cmu.edu/afs/cs/user/kcf/www/censor/misc/clitoral-hoods-announ
ce.html)
organization brought a startled reaction from the audience -- and Ira
Kaufman of the Anti-Defamation League could hardly get a word in.

The second day of the conference concluded with a dinner speech by
Roger Wilkins and an evening of Birds of a Feather sessions. Probably
the most well-attended BOF was the public forum on cryptography
policy. Members of the National Research Council cryptography
committee listened and took notes as conference attendees expressed
their concerns.

The final day of CFP95 began too early in the morning with an 8 am
talk by Willis Ware. The audience was sparse and sleepy from two
nights of BOFs which ran until midnight (followed by informal
discussions which ended early in the morning). Most of the conference
attendees had dragged themselves out of bed in time for the next
session: Can We Talk Long Distance? Removing Impediments to Secure
International Communications. This panel was of particular
interest to many of the audience members. While most of the
discussion centered around issues which have been brought up
repeatedly over the past few years, Cypherpunk Tim May summed things
up nicely by characterizing the encryption controversy as a debate
between those who feel that their communication is "none of your
damn business" versus those who ask, "What have you got to hide?".

A session on copyright and the Net included an interesting discussion
about how copyright should be enforced in cyberspace. In response to
often-repeated claims that it is not possible to enforce copyright
laws on the Net, Attorney Lance Rose pointed out that intelligent
software agents that can be programmed to search the Net for certain
types of news can also be programmed to search the Net for copyright
infringements. Michael Kepplinger of the U.S. Patent and Trademark
Office and Law Professor Pamela Samuelson debated the "Green Paper"
produced by the Working Group on Intellectual Property Rights.
Samuelson criticized the Green Paper authors for assuming that there
will not be any useful content on the Internet until Congress passes
strict intellectual property laws. However, she said that people are
already finding useful information on the Internet. She was also
critical of the Green Paper for suggesting that online service
providers should be held strictly liable for copyright infringement.
Kepplinger denied that the Green Paper included strict liability
language. Brad Templeton of ClariNet Communications Corp. followed up
by asserting that most people respect copyright, regardless of whether
or not it is enforced. Templeton, whose company provides Associated
Press and other news feeds over the Internet, said that ClariNet
has been profitable under the current copyright laws.

Lenny Foner (http://foner.www.media.mit.edu/people/foner/), a graduate
student at the MIT Media Lab and the winner of the CFP95 Student Paper
Competition, presented his research on agents during lunch. Foner
described a "matchmaker" system he is developing that is designed to
demonstrate the feasibility of a large scale distributed system in
which it is essential to build in privacy. Lenny's research is
interesting for its technological goals as well as its political
goals.

By the afternoon of the last day of the conference, a large portion of
conference attendees had migrated from their chairs to the floor in
the back of the conference hall. Students, journalists, long-haired
hackers, and libertarians camped out with backpacks and laptops on
the audio platform and the surrounding floor space. One gentleman
fell asleep, but was woken by a journalist when he started to snore.
At one point Conference Chair Carey Heckman pointed out that there
were plenty of empty seats towards the front, but nobody in the back
moved forward.

A session titled "It Oughta Be a Crime" kicked off an afternoon filled
with some of the most interesting sessions of the conference. Scott
Charney of the Justice Department opened his remarks by reminding the
audience that "there is always a percentage of the population up to no
good." Although only a small percentage of those up to no good are
currently computer literate, 30 years from now everyone is likely to
be computer literate, he said. He added that there are some types of
behavior -- such as extortion and wire fraud -- that is clearly
criminal conduct, however, there are other types of behavior that fall
into grey areas. For example, some people don't think breaking into a
computer system to look at files should be considered criminal if the
intruder does not change or remove any of the files. However, Charney
pointed out that companies that discover break-ins end up spending a
lot of time checking all their files to make sure none have been
changed or removed. This can be both inconvenient and quite
expensive. Santa Clara District Attorney Ken Rosenblatt discussed
statements by some people (including writer Bruce Sterling) that
police have no business on the Net because electronic conflicts are
more a "cultural war" than criminal behavior. However, Rosenblatt
said that all laws are an expansion of cultural norms. Panelist Mark
Traphagan of the Software Publishers Association concluded the session
with a discussion of copyright infringement. He claimed that China
has a 99 percent piracy rate making it "virtually a one-copy country."
This session brought much disagreement from the audience members, some
of whom interrupted the speakers. This prompted CFP founder Jim Warren
to remind the audience that all sides need to be heard.

Many conference attendees anticipated that the session titled "Who
Owns the Law? The Debate Over Legal Citation Form and What It Means"
would only be interesting to lawyers. However this session proved to
be the most animated of the entire conference. After the four
panelists gave their opening statements, Glenn Tenney of Fantasia
Systems Inc. gave each of them five minutes in which to question the
other panelists. This format provoked a lively debate about the
U.S. legal citation system. Jamie Love of the Taxpayers Assets
Project complained that West Publishing's page numbers must be
used when citing most court opinions. Because one cannot determine
the West pagination from the official court documents, one must visit
a law library or pay online charges to West to find the complete
citations. With an increasing amount of legal research being
conducted online, this can get very expensive. However, West argues
that they spend a lot of time verifying the accuracy of the opinions
they publish and should be compensated for their work. Besides, they
say, it is not their fault that the courts do not provide accurate
copies of their opinions that can be cited in legal proceedings.

The final CFP95 session featured several presentations about
anonymity, pseudonyms, and the technologies that make such things
possible. To illustrate the use of pseudonyms, some of the panelists
replaced the names on their name badges and exchanged name cards.
Leading moderator Roger Clarke to introduce panelists Gary Marx and
Kent Walker as "Kent and or Gary." David Chaum described the
electronic cash products being developed by his company, DigiCash.
Writer Steven Levy then gave an excellent presentation on anonymous
remailers. Science Fiction Writer David Brin wrapped things up with
some thoughts on the conference as a whole. After this session, the
chairs of all five CFP conferences commented on the past and future of
CFP.

Plans are already underway for CFP96 (http://web.mit.edu/cfp96) to be
held March 27-30, 1996 in Boston.

-- Lorrie Faith Cranor ([email protected])
April 3, 1995

/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\

Lorrie Faith Cranor Engineering and Policy, Computer Science
Washington University http://dworkin.wustl.edu/~lorracks/
1 Brookings Dr Box 1045
St. Louis, MO 63130 "UNLESS someone like you cares a whole awful lot,
[email protected] nothing is going to get better. It's not." -Dr.Seuss

Look for the Crossroads special issue on computers and society,
available May 1 from http://info.acm.org/crossroads/

Students: Are you doing interdisciplinary research related to
computers and society? Are you interested in joining an
online discussion group to exchange ideas with other students?
Send me email for more information.

------------------------------

Date: Wed, 26 Apr 1995 00:10:14 -0500 (CDT)
From: David Smith <[email protected]>
Subject: FIle 3--DEATH ROW INMATE GETS HOME PAGE ON INTERNET (fwd)

---------- Forwarded message ----------

DEATH ROW INMATE GETS HOME PAGE ON THE INTERNET

Illinois death row inmate Girvies Davis, who is scheduled to
be executed by lethal injection on May 17, 1995, has become the first
death row prisoner in the United States to take his case directly to
the people on the Internet. Girvies' home page went online April 24,
1995.

For the first time since Illinois re-enacted the death
penalty in 1977, the State is faced with the very real likelihood of
executing a man for a crime he did not commit. Internet users can
learn more about the facts surrounding Girvies' conviction and death
sentencing by accessing his home page at:

http://www.mcs.net/~bkmurph/girvies.htm

Girvies was convicted and sentenced to death in 1980 for a crime
in which -- in all probability -- he had no involvement at all.
Girvies' home page contains links to his clemency petition to the
Governor, articles written about his plight, "evidence" that Internet
users can examine for themselves, pictures and audio of Girvies, and
the e-mail address of Illinois Governor Jim Edgar, who holds Girvies'
fate in his hands.

For more information, contact Mr. Davis' attorneys via
electronic mail at [email protected] or contact Brian Murphy or David
Schwartz at (312) 222-9350.

------------------------------

Date: Sun, 19 Apr 1995 22:51:01 CDT
From: CuD Moderators <[email protected]>
Subject: FIle 4--Cu Digest Header Info (unchanged since 19 Apr, 1995)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send a one-line message: SUB CUDIGEST your name
Send it to [email protected]
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

To UNSUB, send a one-line message: UNSUB CUDIGEST <your name>
Send it to [email protected]
(NOTE: The address you unsub must correspond to your From: line)

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
Brussels: STRATOMIC BBS +32-2-5383119 2:291/[email protected]
In ITALY: Bits against the Empire BBS: +39-464-435189
In LUXEMBOURG: ComNet BBS: +352-466893

UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)

JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD
ftp://www.rcac.tdi.co.jp/pub/mirror/CuD

The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
URL: http://www.soci.niu.edu:80/~cudigest/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.

------------------------------

End of Computer Underground Digest #7.33
************************************
 
To the best of our knowledge, the text on this page may be freely reproduced and distributed.
If you have any questions about this, please check out our Copyright Policy.

 

totse.com certificate signatures
 
 
About | Advertise | Bad Ideas | Community | Contact Us | Copyright Policy | Drugs | Ego | Erotica
FAQ | Fringe | Link to totse.com | Search | Society | Submissions | Technology
Hot Topics
R. A. Salvatore
Reading childrens books weird?
What are you currently reading?
How often do you read?
Would you let your novel become a movie?
Penguin and Barnes and Noble, fleecing customer?
Chuck Palahniuk
What does reading mean for you?
 
Sponsored Links
 
Ads presented by the
AdBrite Ad Network

 

TSHIRT HELL T-SHIRTS

 
www.pigdog.org