Copy Link
Add to Bookmark
Report

The Journal of American Underground Computing Issue 2

  


THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING / Published Periodically
======================================================================
ISSN 1074-3111 Volume One, Issue Two April 4, 1994
======================================================================

Editor-in-Chief: Scott Davis (dfox@fennec.com)
Technology Editor: Max Mednick (kahuna@bga.com)
Consipracy Editor: Gordon Fagan (dolphin@bga.com)
Network Security: George Phillips (ice9@bga.com)

** ftp site: etext.archive.umich.edu /pub/Zines/JAUC

U.S. Mail:
The Journal Of American Underground Computing
10111 N. Lamar #25
Austin, Texas 78753-3601

%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

To Subscribe to "TJOAUC", send mail to: sub@fennec.com
All questions/comments about this publication to: comments@fennec.com
Send all articles/info that you want published to: submit@fennec.com
Commercial Registration for Profitable Media: form1@fennec.com

"The underground press serves as the only effective counter to a growing
power, and more sophisticated techniques used by establishment mass media
to falsify, misrepresent, misquote, rule out of consideration as a priori
ridiculous, or simply ignore and blot out of existence: data, books,
discoveries that they consider prejudicial to establishment interest..."

(William S. Burroughs and Daniel Odier, "The Job", Viking, New York, 1989)

%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

Contents Copyright (C) 1994 The Journal Of American Underground Computing
and/or the author of the articles presented herein. All rights reserved.
Nothing may be reproduced in whole or in part without written permission
of the Editor-In-Chief and/or the author of the article. This publication
is made available quarterly to the amateur computer hobbyist free of
charge. Any commercial usage (electronic or otherwise) is strictly
prohibited without prior consent of the Editor, and is in violation of
applicable US Copyright laws. To subscribe, send email to sub@fennec.com

%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

DISCLAIMER AND NOTICE TO DISTRIBUTORS -

NOTE: This electronic publication is to be distributed free of charge
without modifications to anyone who wishes to have a copy. Under NO
circumstances is any issue of this publication, in part or in whole,
to be sold for money or services, nor is it to be packaged with other
computer software, including, but not limited to CD Rom disks, without
the express written or verbal consent of the author and/or editor.
To obtain permission to distribute this publication under any of the
certain circumstances stated above, please contact the editor at one of
the addresses above. If you have intentions of publishing this journal
in any of the ways described above, or you are in doubt about whether or
not your intentions conflict with the restrictions, please contact the
editor. FOR A COPY OF THE REGISTRATION FORM, MAIL - form1@fennec.com
This publication is provided without charge to anyone who wants it.
This includes, but is not limited to lawyers, government officials,
cops, feds, hackers, social deviants, and computer hobbyists. If anyone
asks for a copy, please provide them with one, or mail the subscription
list so that you may be added.

The articles and information printed herein are the property of the author
and / or The Journal Of American Underground Computing. An electronic mail
address of the author will be provided when made available to us so that you
can contact the author with your comments. No article in this publication
can be reprinted without the permission of the author / editor. Any attempt
to do so will be in direct violation of United States Copyright laws.
Any attempt to sell this publication in part or in whole, on CD Rom or
while packaged with any other software bundle without the express consent
of the editor is also a direct violation of United States Copyright laws.

%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING - Volume 1, Issue 2

TABLE OF CONTENTS

1) A note from the Editor Scott Davis
2) Comments from our readers Readers
3) Paul and Karla Hit The Net Wired Online
4) AT&T Cellular Privacy Systems David Arneke
5) Clipper / From "The Guardian" Mike Holderness
6) Privacy: Notes from Cyberspace Various
7) Kidnapped By The State / Internet Not Safe Matthew Mihaly
8) Legion Of Doom - Internet T-Shirts Chris Goggans
9) Public vs. Mass Media: The Case of The Internet Jim O'Loughlin
10) Bruce Sterling's Comments at CFP '94 Bruce Sterling
11) Book Review - Doing Business On The Internet Steve Brock
12) Generic Usenet Flame Form [Humor]
13) McDonnell Douglas Warranty Card [Humor]
14) Social Contract Between Us and Them [Humor]
15) Electronic Petition Against Clipper Editors
16) Form letter againt Clipper for the President Editors
17) Official Government press release: Clipper Editors
18) ISDN Information (RBOCS) Max Mednick
19) A catalog of national ISDN solutions Max Mednick
20) Sprint expands presence in China News
21) SSN FAQ / Social Security Number info Chris Hibbert
22) The Clipper Chip is your friend Bob Davis (WSJ)

%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

A NOTE FROM THE EDITOR

It is my pleasure to welcome aboard to the editing staff Mr. Max Mednick
as the Technology Editor. Max is a technical trainer and network support
specialist for a Fortune 500 company, and has several years of experience
in the field of networking and communications. Everyone send him a message
welcoming him. (kahuna@bga.com). Also, we are welcoming Carl Guderian
as Director of Information Systems. He is currently employed by big-brother.
His email address is bjacques@cypher.com

%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

COMMENTS FROM OUR READERS


From: jim@rsa.com (Jim Bidzos)
To: comments@fennec.com
Subject: TJOAUC-1.1

Great! I'm honored to have contributed to TJOAUC! Thanks, and keep up
the good work.

=-=-=-=-=-=-=-=-=-=-=-=-=-=

From: Anonymous@some.government.agency
To: comments@fennec.com
Subject: Thanks!

I checked your archived 'Journal of American Underground Computing'
at extext.archive.umich.edu.

I found the quality and content to be high.

If you could also subscribe me, I would be grateful. Sorry about
the skepticism (with reservations to Mark Lanes allegations that
the CIA murdered JFK).

%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

PAUL AND KARLA HIT THE NET

Posted By Dennis R. Hilton (drhilton@kaiwan.com)
Copyright 1993,4 Wired Ventures, Ltd. All Rights Reserved
For complete copyright information, please see the end of this file

WIRED 2.04
Electric Word
*************

Recent events in Canada have proven once again that - for better or worse -
the information genie has escaped into cyberspace and can't be put back in
the bottle. When an Ontario judge issued an order barring media coverage of
a sensationalized murder trial, Canadians used the Net to break the ban.

The case concerns Paul "Bernardo" Teale and his wife, Karla Homolka Teale,
who were each charged in the grisly murders of two teenagers. Paul Teale
now stands accused of 48 sex-related charges, while Karla Homolka entered
into a plea bargain: She pleaded guilty to manslaughter and is expected to
testify against Paul.

The nonstop press coverage prompted Paul Teale's lawyer to ask for a media
gag order until the conclusion of his trial, on the grounds that it would
be impossible to impanel an impartial jury. Despite legal intervention by
several major Canadian media outlets, the court imposed a ban on the
publication of the details of the crimes.

At first the ban had its desired effect. When the US television show
A Current Affair featured the case, it was banned in Canada, and Canadian
cable stations blacked out CNN coverage of the case.

With the conventional media halted, the infosphere took over. First, two
BBSes in Toronto began to post daily details of the trial. In August, a
group of McGill University students created a Usenet group, alt.fan.karla-
homolka, to discuss the case. By December, after phone calls by law-abiding
Net surfers to systems managers, the Usenet group had been banned by
systems managers and university officials at sites all over Canada.

After the banning of alt.fan.karla-homolka, two new Usenet groups were
created: alt.pub-ban and alt.pub-ban.homolka.

Some Net users theorized that if they cross-posted all over the Net, the
Royal Canadian Mounted Police would be in the impossible position of
scrambling through cyberspace plugging leaks. One Net dweller jokingly
proposed the ideal tactic: "The solution is obvious. Take the discussion to
rec.sport.hockey. You silly Canadians would never ban that group."

Other curious Canadians searched the pay-per-view news and magazine
databases on Nexis and CompuServe for stories published by US newspapers.
Most of the banned articles were re-posted verbatim to alt.true-crime, a
group overlooked by the Mounties.

As the infosphere grows to encompass the planet, the question is no longer
whether certain information is too sensitive to be made public. The real
question becomes whether it is even possible to keep certain information
out of cyberspace. In the Teale-Homolka case, the ban was not so much
broken as rendered irrelevant by the voracious online community: It is
estimated that one in four Canadians knows the banned facts.

Anita Susan Brenner and B. Metson


%%%%%%%%%%%%%%%%%%%% WIRED Online Copyright Notice %%%%%%%%%%%%%%%%%%%%%%

Copyright 1993,4 Wired Ventures, Ltd. All rights reserved.

This article may be redistributed provided that the article and this
notice remain intact. This article may not under any circumstances
be resold or redistributed for compensation of any kind without prior
written permission from Wired Ventures, Ltd.
If you have any questions about these terms, or would like information
about licensing materials from WIRED Online, please contact us via
telephone (+1 (415) 904 0660) or email (info@wired.com).

WIRED and WIRED Online are trademarks of Wired Ventures, Ltd.

%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

AT&T CELLULAR PRIVACY SYSTEMS
AMERITECH CELLULAR PRIVACY SERVICE USES AT&T TECHNOLOGY

By David R. Arneke (darneke@attmail.com)

AT&T SECURE COMMUNICATIONS SYSTEMS NEWS RELEASE
Reprinted with permission

GREENSBORO, N.C. -- Ameritech Cellular Services in Chicago has
become the first cellular telephone system in the country to offer
voice privacy service using the AT&T Advanced Cellular Privacy System.

Ameritech launched its Enhanced Voice Privacy service in Chicago
this month.

"This technology adds to the productivity and value that
Ameritech cellular service provides to its customers," said Thomas A.
Brooks, AT&T Paradyne senior vice president, Secure Communications
Systems.

"And, by helping the carrier provide value to the cus- tomer,
AT&T cellular privacy technology adds value to the carrier as well."

The AT&T technology scrambles the cellular telephone's
over-the-air signal. The signal is descrambled at Ameritech's
cellular switch, transmitting a conventional phone signal to the
recipient.

If the scrambled over-the-air signal is intercepted, the
eavesdropper will hear only a chirping sound. AT&T's advanced privacy
technology renders the over-the-air signal unintelligible.

The system already is in wide use in Japan in the cellular system
of one of the two major Japanese telephone companies.

The AT&T Cellular Privacy System offers cellular users a variety
of benefits.

-- Its technology is small enough and light enough to be
embeddable in today's small, portable phones.

-- The system features an unmatched combination of high voice
quality and an advanced level of privacy.

-- It is applicable to all three types of cellular telephones --
portable, transportable ("bag phones") and mobile (car phones).

The system has two components. The AT&T privacy unit attaches to
the phone and scrambles the phone's signal. Voice privacy modules are
available for several brands of cellular telephones, among them AT&T
models, including the AT&T Privacy-Capable Portable Telephone 9000;
the Audiovox 3200 series; Mitsubishi models using the Model 1200
transceiver; the Motorola 2600; the NEC 3800B and 4800; the Oki 800
series; and the Toshiba 3200 series.

Modules for other brands and models are in development.

The Mobile Telephone Office Switch (MTSO) unit is installed at
the cellular carrier's switch and descrambles the signal.

Because the privacy system scrambles only the over-the-air
portion of the call, no matching unit or special equipment is required
at the receiving phone.

The AT&T Paradyne Cellular Privacy System was developed by AT&T
Secure Communications Systems, a world leader in the design,
manufacture and integration of encryption and privacy products. It is
a primary supplier of secure products to the governments of the United
States and other nations as well as corporations around the world.

%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

CLIPPER (From The Guardian)

By Mike Holderness (mikeh@gn.apc.org)

This piece on the Clipper controversy appeared in the London, UK
_Guardian_ on 3 March 1994. My apologies for the delay in circulating
this to all of you who helped with advice and comments or expressed
an interest; and to a couple people whose attributions got cut for space.

Some Netizens may find the piece a bit wishy-washy. Better that than
the _Independent_'s coverage, which was full of unsubstantiated claims --
if they _know_ the NSA has a back-door, I wish they'd publish
the evidence...

I _know_ the description of the technology ended up inexact. Anyone
who can give an exact description in fewer words gets a bottle of
champagne next time you're in London...

If you re-distribute this, please do so in its entirety and un-cut.
Contact me to discuss terms before you publish it on paper: I have
a freelance living to earn and a landlord to feed.

(C)opyright 1994 Mike Holderness
mikeh@gn.apc.org
London, UK

HED: Are these men a threat to freedom?
PIC: (4-column): Gore & Clinton

YOUR COMPANY is, at last, connected to the Internet. You can swap memos
with branch offices around the world within minutes. But you naturally
don't want your competitors, or their governments, siphoning the details
of your bid for that dam contract in the Philippines out of the net.
What do you do?

On the other hand, when you receive an electronic message announcing a
call for tenders, how do you know it's genuine? You've heard that it's
possible to fake electronic mail, and you're worried about all the
possibilities for creative industrial espionage which this opens up.

Then again, you might be a Cabinet minister, setting up a meeting with
your boyfriend on the mobile phone. Wouldn't it be good to know that
no-one could tap the message?

The answer to all these problems lies in encryption technology. The
solution the US government proposed earlier this month, however, has
generated a furious row in the "on-line community" about the government
interfering in citizens' right to communicate in private. The disturbing
implications for people outside the US have gone largely unremarked.

Computer programs that can do practically unbreakable encryption are
available to the public in the US and elsewhere. One, named PGP for
Pretty Good Privacy, is increasingly being used to authenticate
electronic messages (Computer Guardian, Nov ?? 1993). It can encrypt the
whole message, or send the main text "in clear", followed by an
encrypted block containing a mathematical "fingerprint" of the message
and the sender's name and address. The program can thus verify whether a
signature belongs to the purported sender and whether the message
arrives as it left.

Encryption has long worried law-enforcement agencies. What if drug- dealers
and terrorists start using unbreakable encryption? The US government's
Key Escrow Encryption system -- commonly known by its working title,
Clipper -- is its answer.

Clipper uses an encryption chip suitable for building into a mobile
phone or a modem. Its method of encryption, developed by the US National
Security Agency (NSA), depends on "keys". These are codes which are used
mathematically to mangle the text or speech. The receiver can only get
the original back out if they have the key and can use it to un-mangle
-- decrypt -- the message.

PGP depends on a "public-key" system. Users sending signed messages
encrypt the signature with keys known only to them. They also issue
public keys. These are mathematically derived from the private key, and
allow anyone to verify the signature. If someone sends them a message
encrypted with their public key, only the private key will extract it.
By contrast, each Clipper chip will have an encryption key built in.
When the chip is manufactured, two parts of the key will be lodged with
two separate US government agencies. (In legal jargon, this is like
"holding the keys in escrow".) A secret "super-key" allows law
enforcement agencies to retrieve the serial number of the chip used on
the link they're tapping.

Under US guidelines released on February 4, if a law enforcement agency
wants to eavesdrop on encrypted communications, it should send details
of a search warrant to the agencies holding the key components.

This is a red rag to the inhabitants of Internet discussion forums,
"the world's largest functioning anarchy". There, discussions of the
right (under the First Amendment to the Constitution) to unrestricted
free speech can and do slip effortlessly into the belief that, as one
participant put it, "The People must be allowed to discuss anything,
including revolution."

According to Brian Yoder, president of California company Networxx,
"The US Constitution doesn't grant the government the power to maintain
this kind of surveillance capability over the population. Period. The
assumption is that anything that enhances the ability of the police to
catch criminals is OK, but that is not what the Constitution says, and
that's not the kind of country I want to live in."

Cryptology specialist Dr Dorothy Denning at Georgetown University in
Washington DC, who was part of a team reviewing the NSA's design
process, points out that Clipper "will not make it any easier to tap
phones, let alone computer networks. All it will do is make it
technically possible to decrypt communications that are encrypted with
the standard, assuming the communications are not super-encrypted with
something else. Law enforcers still need to get a court order."

But who trusts the NSA? The Clipper design is secret. Many assume that
the Agency has built in a "trap-door" allowing it to break encryption
without the keys.

No-one has proposed making non-Clipper encryption illegal, but the US
government clearly hopes to establish it as an industry standard. For
example, while it's usually illegal to export any form of encryption
technology from the US, it will be legal to export Clipper.

Non-US companies using it to protect their communications will have to
live with the uneasy knowledge that the NSA could be listening in -- and
the NSA, like its UK sibling organisation GCHQ in Cheltenham, has a long
history of intercepting foreign commercial messages for the benefit of
home companies. (GCHQ declined to say whether it had been involved in
any discussions over Clipper.)

The protests have started. A petition organised by Computer
Professionals for Social Responsibility against Clipper, and in favour
of a Bill to permit export of competing encryption systems, gathered
more than 20,000 electronic signatures in its first two weeks. Wired
magazine has proclaimed that ``This is a pivotal moment in history'',
accusing ``the Clinton-Gore administration'' of ``attempting a stealth
strike on our rights''. It has asked readers to sign the CPSR petition
against Clipper and to ``call or write your Congressional
representatives and let them know how you feel''.

Encryption and authentication are important for much more than the
privacy of the frequently obscure or banal discussions on the Net.
Medical and financial records are now commonly held on computers, and a
growing proportion of business transactions take place on line.
Cyberspace is where your money is.

For private communications, Emma Nicholson MP takes a relaxed view: "In
communicating, we should start from a belief that everyone listens to
everything. Gossip is what makes the world go round. I have very few
secrets. I would be deeply concerned if a device were marketed that
could stop interception -- I would support the FBI completely."

Computer-law barrister Alistair Kelman, however, believes that any
attempt to enforce the Clipper chip as a worldwide standard would meet
stiff opposition. The European Commission could be expected to object
that it fell foul of Treaty of Rome provisions against misuse of a
dominant position. "If you want to have a world standard for encryption,
fine," Kelman said, but the EC could respond: "let's all get together
and settle on something that meets our requirements as well."

<ufpoints>

Wired articles on Clipper can be obtained via the Internet by putting
the following three lines into the body of an electronic mail message
addressed to infobot@wired.com:
send clipper/privacy.meeks
send clipper/privacy.barlow
end

%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

PRIVACY: NOTES FROM CYBERSPACE

These are just little tidbits picked up from here and there...feel free to
comment on them. -Editors


NOTES FROM CYBERSPACE - ARTICLE 1
By Arthur Entlich (ua107@freenet.victoria.bc.ca)
Subject: Privacy in Canada

Over the last several years there has been a feeding frenzy in the private
sector toward collection of private information. Currently, to my know-
ledge there is only one province in Canada that has legislation on the
books which protects individual's private information within the
private sector, and that is Quebec, which may not be a province of
Canada for long, if things continue.

Anyway, recently a few provinces have developed Offices of Privacy and
Freedom of Information (Ontario and British Columbia) both of which have
"left of center" parties in power. However, these government offices
only regulate the issues of freedom of information and privacy within the
public sector (governmental agencies). These is also a similar
office on a federal basis. Ther eis much to be done here to roll
back the amount and connectivity of information in the public and
private sector. For instance, our SIN number (Social Insurance Number)
which was legislated originally for only about 6 programs, all relating
to employment, has been expanded to uses such as banking, (required by law
now) medical plans, etc, Also, the private sector has a field day with
this number and it has basically become a national identity number.

Some changes are occurring, such as in British Columbia, we were issued
a separate and unique medical plan number after many complaints, however
on several occasions I have by phone or in person requested information
about my coverage and claimed I did not have my medical number handy,
and was asked for my SIN, at which point they crossreferenced to my
medical number, so obviously they are still connected internally.

More recently, the government of B.C. has indicated that in two months
a new program called PharmaNet will be put in place. This will hook up
all pharmacies in the province so that ones drug profile is available
to each pharmacist if they use a keyword you provide (the keyword was
demanded by the office of privacy, originally it didn't even have this).
You must provide this keyword and your medical plan number in order
to purchase the drugs. The government claims it is becaus ethey
have a problem with drug interactions, especially amongst the
elderly who see numerous doctors and don't remember what they are taking.

They also claim it is to prevent the practice of people seeing several
doctors for one prescription type, then go to several pharmacies to buy
multiple prescriptions, and then sell the drugs on the street.

The government does have some justification, in that they do pay for
the partial cost of drugs to people over 65 and they also pay for
all drug costs over $600 per family per year. However, the vast
majority of the population does not fit into these groups.

In the private sector things are much worse. Most video stores re-
quire D.L.# plus SIN, and they can sell this info to anyone at
the present state of the law. Banks have gotten really nasty of
late, and are requiring a credit card number just to open a chequing
(or checking if you are south of the border) account. I was required
to sign a statement when opening a simple chequing/savings account
at a credit union which gave them permission to "acquire any information
deemed necessary to verify the information provided, or to protect the
credit union", and that such information could be transmitted to
other financial institutions, branches of their company, and other
companies they own (which includes and investment and insurance
division). I am fighting to change this now, as the next shareholders
meeting is in mid-April and i have submitted several resolutions to
change the current constitution of the credit union.

Anyway, I know this has been long winded... sorry. I would be most
interested in anyone who can provide inform
anyone who can provide information on laws in the states or elsewhere
which deal with issues such as these. I would like to know what other
legislation is out there to protect the privacy of personal information
in either the public or private sector.

Thanks... please E-Mail me.

%%%%%%%%%%%%%%%%%%%

NOTES FROM CYBERSPACE - ARTICLE 2
By Anonymous
Subject: What is being done about Privacy???

I have been doing some reading about the available databases, I was
shoked at some of the services that are listed. Just to name a
few ....

* Searches for SSN's, lists name, address, last transaction
* Searches for Mass Mailings and magazine subscriptions
* change of address, (someone also mentioned PO Box info!!)
* for most states - car ownership and Drivers lisc history
* Top of Credit reports (name, address, SSN, employer)
* neighborhood searches, demographics (income, ect ..)
* National Phone listings
* Airplane and Boat ownership
* Professional Lisc's
* ect, ect, ......

I have seen alot of talk about not giving out a SSN, but whats the point?
It seems like it is already too late. I haven't seen the info in all of
these datbases, but it seems as though Big Brother is already here.

I am sure many people in this group already knew about alot of this. I
am curious if anything is actually being done about this? I have seen
the EFF do alot against clipper; are they doing anything against these
databases that are open to the public (for a price)??? The clipper
petition got alot of names, couldn't the same be done about these
databases. I would bet most people have no idea all this personal
information is available. They would be just as shocked as I was and
you could get more signatures than the clipper petition.

%%%%%%%%%%%%%%%%%%

NOTES FROM CYBERSPACE - ARTICLE 3
By Anonymous
Subject: Comments on Wall Street Journal / NSA 'cryptomathematician'

In the Tuesday March 22, 1994 issue of the Wall Street Journal appeared
an interview by reporter Bob Davis of Clinton Brooks the head of the
NSA effort for an Escrow Encryption system commonly associated with
Clipper. In the article Mr. Brooks relates there efforts to produce
such as system came to fruition in a timely fashion with respect to
AT&T desiring to sell secure voice systems.

Having spoken with several people marketing AT&T Surety Communications
products, it appears that indeed, NSA 'balked', and not just over the
point of export licensing for DES based products. AT&T also sells several
proprietary encryption algorithms, including one approved for export
under ITAR. These all predate clipper. One of the marketing types
at AT&T Surety indicated that NSA didn't want DES in secure voice
products and hinted at international agreements to limit proliferation
of DES applications, although apparently no evidence of this has arisen
through John Gilmores FOIA requests.

If AT&T was ready to sell two tier products domestic/overseas, why
the jump to clipper? They offered a captive market, the Justice Department,
which has paid in the neighborhood of $8 million dollars from asset siezures
for a couple thousand clipper phone units probably at a higher price
than they would sell for on the open market. They have also gained the
promise of a single tiered product, although the rest of the STUIII
compatible products are still available. AT&T appears hard pressed to
find a nongovernment related market place for secure voice, without
significant non-Justice shipping. Part of this may be cost, a Telephone
Security Device costs more than an AT&T videophone while having a lower
complexity. A popular MODEM manufacturer Paradyne, a subsidiary of
AT&T, sells a MODEM with more than half the complexity of the Telephone
Security Device for $179 retail. The videophone is selling for around
$940 while the TSD 3600, a unit sitting between your phone and the wall
sells for $1050.

AT&T appears to have had a hard time waiting for MYK-78e chip shipments
from Mykotronx. They received the initial production lot in October or
November, following a protracted nonreassuring rubber stamp review
process and a NIST Encryption Escrow non Standard release, which from
the WSJ article was staged simple for AT&Ts benefit.

That and we get a secretive governmental agency starting an unprecedented
propaganda effort. Is this a case of our government doing more for us than
we would possibly ask? Perhaps we should ask why.

%%%%%%%%%%%%%%%%%%%%

NOTES FROM CYBERSPACE - ARTICLE 4
By Anonymous
Subject: Creative Freedom / Restrictions on Free Communcication

I am aware of a case where a student made significant headway
in development of techniques which accelerate convergence of
algorithms used in computer arbitrage. The advisor told
the student that this was amazing and great! But then the
advisor tried to get the student to change the name of the
technique to something that would make it sound like the
advisor thought of it. Then, on the second idea the student
mentioned, the advisor exclaimed how great it was and then
suddenly turned around and began to try to talk the student
out of the idea. But, the student had already convinced his/herself
of the validity and value and stood ground on the second idea.

When the student began to e-mail others in the community, the
advisor had an irrational reaction. The advisor required the
student to consult with (the advisor) before discussing his/her
results vi e-mail with others in the community. Also, the advisor
said that such discussions should not leave the local research
group.

TELL ME, IS THIS AN ETHICAL REQUIREMENT??
WHAT DO YOU THINK IS GOING ON HERE?

%%%%%%%%%%%%%%%%%%%%%

NOTES FROM CYBERSPACE - ARTICLE 5
From: James Ebright (jebright@magnus.acs.ohio-state.edu)
Subject: Re: Wall Street Journal Interview with NSA 'cryptomathematician'

My response to AT&T: I switched to MCI today... (Who else is listening
to my true voice?) You can switch too... call 800-624-8030.

My response to NSA: I still don't think folks are going to buy
many guaranteed tapable 'secure' phones.

But this shows the power of entrenched bureacuracies who have a vested
interest in intrusive government. If the Cantwell bill passes, this
mugging of US businesses via ITARs would be impossible.

%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

KIDNAPPED BY THE STATE / INTERNET NOT SAFE

By Matthew A. Mihaly (mam6@cornell.edu)

O.k., here is the situation. I had been contemplating suicide and
posted my situation on alt.romance.chat (lot's of nice people replied,
btw.) I also posted something on alt.drugs (under the name "Matt" asking
for some useful drugs for the purpose of killing myself (which, for any
of you fu*king ass-sucking cops out there: I am not saying I want to).

The Internet is not safe. Two days (on 3/14) after I posted it, a couple
of cops show up at my door, along with some nut from the mental health
department of Tompkins County (that's this county obviously) and tell me
I have to come with them to the hospital for "an hour, maybe an hour and
a half." I said "What if I don't choose to go." They replied that I
don't have a choice. They informed me that I'm going with them because
some people read my internet message and were concerned. I was in the
middle of conducting some business on the phone and asked if I could make
a couple of phone calls first but the pigs replied that no, I couldn't.
In effect, they kidnapped me.

So, they drive me to Tompkins County Hospital where I am forced to sit in
a room for 2 hours (with a couple of goons waiting outside to make sure I
don't try to run). Finally, some bitch comes in and talks to me for all
of 4 or 5 minutes. I explicity told her that I am not planning on
killing myself (partly due to the 20 or 30 supportive e-mail messages I
got from people). She said it's not here decision whether I'm held or
not but that she would go give the doctor her opinion (she left me with
the impression that she would tell me to let me go.) The doctor came in,
after another 45 minutes of waiting) and talked to me for maybe 2
minutes. I said I wanted a lawyer. He said "Sure, you can always have a
lawyer." and walked away mumbling something about always being able to
have a lawyer. Apparently he was being sarcastic because no lawyer ever
showed up. After another 20 minutes or so, some guy pokes his head in
the room and asks me who I am. I didn't tell me of course, but 2 minutes
later, some little geek walks in, sits down and says "I don't know if
you've heard yet, but you are being transfered to a mental health ward."
I say something to the effect of f*ck you I'm not going anywhere. By
this time, there were a couple of goons in the room also. They told me
that I could either go of my own free will or they would drag me there.
Noticing that there were about six other guys standing out in the hall
way I said I'd go. I then stood up, told the little geek that I hope he
goes home tonight and suffers the worst kind of hell (or something to
that effect). Then, one of the goons grabs me and drags me out into the
hallway where I see one of those portable beds for ambulances with
restraining devices on them.

AT this point I was absolutely livid with rage. No way are you f*ckers
restraining me I said. Well, they said I had to be restrained because I
had just threatened the little geek with violence (not true, I just
wished hell on him). So, they strap me down (I cooperated but was
berating them the whole time) and put me in the ambulance and left a guy
in the back to watch me. I was telling him what a dick he is and how big
a violation of my human rights this was and he just told me to shut up.
After a period of silence I apologized to him and told him I didn't mean
anything personal. He responded with something to the effect of "Well
f*ck you, I dont' like your tone of voice." I asked him, very
sarcastically, if he was pleased with how well he was doing his job. He
said "Look, I'm just doing my job here." Yeah, yeah I replied, so were
the Nazi death-camp guards.

Anyhow, they get me to this hospital (Soldiers and Sailors Memorial in
Penn Yan, NY). They made me strip and put on stupid hospital clothes.
By this time it was 8:30 at night (I got picked up at about 4:30) and no
one had given me anything to eat. They gave me some graham crackers at
this point. Whoopee.

So anyhow, I wait for an hour or so and some guy named Tom Rice (yeah, I
hope you're reading this you cocksucker) comes in and talks to me for
about 3 minutes and says "o.k., I'm admitting you." Well, I was pretty
pissed as you might imagine.

So, they bring me upstairs, give me a room, etc., etc. and expect me to
go to sleep until morning. Yeah, whatever. Like I can sleep when I'm a
prisoner. I spent the whole night planning a way to escape (pathetic
security cause I was in the wing where people with things like depression
are kept, not the criminally insane wing). At 6:30 in the morning, they
come in and tell me they are going to take blood from me. When I said no
they said they were going to anyhow.

Well, the long and short of this all is that I ended up spending two
nights in a f*cking mental hospital because A) some f*ckers at Cornell
University are idiots (I know at least one of their names so far... Leeza
Casinelli, a therapist at our health services.. she is a fascist pig,
don't go see her) and B) the idiot psychiatrist I saw the next morning
said they have to keep me another night for observation. Nevermind the
fact that I was obviously fine and the rest of the staff knew it. The
food there sucked, I was confined in EXTREME boredom (what, they expect
me to read 2 year old Time magazines all day???), missed many classes, a
test, and some papers. Furthermore, I do alot of investing and lost a
significant sum during this time.

I guess my point in all this is that the Internet is definitely not safe,
even if you aren't breaking the law. I got back about 2 hours ago from
that f*cking place. I'm thinking about suing Cornell U (they are the
ones who started all this) and maybe the state of New York. The way I
look at it, I was held without indictement, without warrant, and without
legal representation based on evidence contained on a Usenet posting. I
mean c'mon. Like even 1/8 of the stuff posted here should be taken
seriously. Take a look at alt.devilbunnies for instance. A completely
amusing group, but not something to take seriously. Anyhow, I go to
Cornell and live in Ithaca. I keep on trying to contact the ACLU here
but no one ever answers. I've only gotten a busy signal once too. Also,
are there any lawyers around here that someone can recommend for me?

I was kidnapped and imprisoned for two days by the state. The state, not
just of America, but the state of the world must be destroyed. Power,
concentrated like this is absolutely tyrannical. I am not suicidial
(although I was at one point) and these morons should have realized this.
Be careful what you post and look into PGP encryption. F*ck the
government and f*ck you you Cornell U. bastards. I hope you rot in the
worst part of hell for what you put me through. If you want me to be
depressed, go ahead, do it again. Make me miss classes, tests, and lose
money.

%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

LEGION OF DOOM T-SHIRTS!! Get 'em

By Chris Goggans <phrack@well.sf.ca.us>

After a complete sellout at HoHo Con 1993 in Austin, TX this past
December, the official Legion of Doom t-shirts are available
once again. Join the net luminaries world-wide in owning one of
these amazing shirts. Impress members of the opposite sex, increase
your IQ, annoy system administrators, get raided by the government and
lose your wardrobe!

Can a t-shirt really do all this? Of course it can!

--------------------------------------------------------------------------

"THE HACKER WAR -- LOD vs MOD"

This t-shirt chronicles the infamous "Hacker War" between rival
groups The Legion of Doom and The Masters of Destruction. The front
of the shirt displays a flight map of the various battle-sites
hit by MOD and tracked by LOD. The back of the shirt
has a detailed timeline of the key dates in the conflict, and
a rather ironic quote from an MOD member.

(For a limited time, the original is back!)

"LEGION OF DOOM -- INTERNET WORLD TOUR"

The front of this classic shirt displays "Legion of Doom Internet World
Tour" as well as a sword and telephone intersecting the planet
earth, skull-and-crossbones style. The back displays the
words "Hacking for Jesus" as well as a substantial list of "tour-stops"
(internet sites) and a quote from Aleister Crowley.

--------------------------------------------------------------------------

All t-shirts are sized XL, and are 100% cotton.

Cost is $15.00 (US) per shirt. International orders add $5.00 per shirt for
postage.

Send checks or money orders. Please, no credit cards, even if
it's really your card.


Name: __________________________________________________

Address: __________________________________________________

City, State, Zip: __________________________________________


I want ____ "Hacker War" shirt(s)

I want ____ "Internet World Tour" shirt(s)

Enclosed is $______ for the total cost.


Mail to: Chris Goggans
603 W. 13th #1A-278
Austin, TX 78701


These T-shirts are sold only as a novelty items, and are in no way
attempting to glorify computer crime.

%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

PUBLIC vs. MASS MEDIA: THE CASE OF THE INTERNET

By Jim O'Loughlin (v049lnwe@ubvms.cc.buffalo.edu)

In its initial configuration, the Internet was designed to be
neither a public or a mass media. Twenty years ago, the ARPAnet, as
it was then called, was a U.S. Department of Defense research experiment
into how to create a computer network that could withstand partial
outages, as from a bomb attack. (Krol 11) In the mid 1980s, the National
Science Foundation created a network built on the ARPAnet technology that
for the first time expanded access beyond computer researchers and
government employees. The NSF promoted universal access by connecting
universities only if they had plans to promote Internet use. (12)
The Internet, as a network of networks, began expanding rapidly, becoming
international and spawning commercial imitators such as Prodigy, CompuServe,
and America Online.

Currently, strictly commercial ventures are banned on the Internet,
which is still officially only used for research purposes. However, its
growing popularity and commercial potential have whetted the appetite of
business. Much of the current discussion about the "information
superhighway" revolves around how to turn the Internet into a source of
commercial profit. Lost in much of the information superhighway rhetoric
is the nature of most of the "traffic" on the Internet. For while media
discussion often portrays the Internet as a science fiction version of
Cable TV, much of its current popularity is due to its ability to
facilitate discussions between people throughout the globe. To understand
what is at stake in the transition from the Internet to the information
superhighway, it is necessary to consider the cultural position of the
Internet, or, to use C. Wright Mills terminology from *The Power Elite*,
the extent to which the Internet is a public vs. a mass media.

Though Mills's model focuses on the extent to which a population is a
public or a mass, I believe it can be applied to media and its use.
First, the formal media of communication need to be examined for the
proportion of expressed to received opinions. In a public, "virtually
as many people express opinions as receive them." (303) In essence,
opinions would be communicated through direct discussions. In a mass,
"far fewer people express opinions than receive them." (304) The extreme
of the latter state would be a case in which "one person talks impersonally
through a network of communications to millions of listeners and viewers."
(302)

The second standard is the extent to which an opinion can be
responded to without "internal or external reprisals being taken." (302)
Public communications would be organized to facilitate the immediate and
effective response to any publicly expressed opinion without fear of
retribution. The conditions of mass communications make it impossible for
any individual to "answer back immediately or with any effect." (304)

The third term of measurement would be the degree to which the
formation of opinions can lead to social action. In a public realm,
opinions can readily lead to effective action, even against the powers
that be. Authorities retain tight control over opinion in a mass sphere
and can organize and control any attempts at such action.

Finally, there is the extent to which "institutionalized authority,
with its sanctions and controls, penetrates the public." (303) Is a
particular media one in which the public has true autonomy? In an ideal
public, "authoritative institutions do not penetrate the public," (304) while
in a mass, people have no autonomy from institutions of power and are
frequently manipulated.

The limitations of these terms need to be understood. They represent
extreme types, "social reality is always some sort of mixture of the two.
Yet we cannot readily understand just how much of which is mixed into our
situation if we do not first understand, in terms of explicit dimensions,
the clear-cut and extreme types." (302) The Internet functions in a
combination of mass and public roles. Importantly, however, this paper
will argue that much of what is involved in the creation of the information
superhighway will turn the Internet into more of a mass media, to the
detriment of the extent to which the Internet is currently a public media.

The Internet is probably most noteworthy as a public media for the
extent to which people have equal access to expressing and receiving
opinions. Though large parts of the Internet exist to disperse information
(tools such as GOPHER and MOSAIC are designed to facilitate access to
databases and other information banks), much of the Internet is made up of
bulletin boards, salons, or discussion groups around cultural, political or
leisure topics (such as alt.cyberspace, soc.politics or
rec.food.veg.cooking). Though some groups are controlled by moderators,
the majority have no limitations on what can be posted. In a newsgroup,
there are usually a number of parallel conversations (or threads) going
on at any one time. In a recent overview of commercial on-line services
in *Newsweek*, it was noted that people seem more interested in
communication than services. "People want to talk to one another."
(Meyer 39) On-line shopping and banking facilities have had a less than
stellar reception, however, discussion groups have been hugely popular.
More than 100,000 messages are posted on the Prodigy system every day.
On the Internet, the equivalent of dozens of full-length novels are
written on a daily basis. This interchange, or the extent to which
authorship has become a public role, is perhaps the Internet's most
important feature.

A concern with the coming of the information superhighway is the
extent to which these discussion groups will be affected. As the Internet
becomes increasingly privatized, it comes questionable whether or not these
groups will retain their current form. Some businesses have attempted to
capitalize on their popularity. Microsoft is launching a Complete Baseball
newsgroup that features discussions, fantasy-baseball leagues, and access to
a wealth of statistical information. According to Barry Berkov of
CompuServe, "this is where the growth is... Anything addictive is good."
(quoted in Meyer 39) Groups based on entertainment or leisure topics
(particularly ones in which certain people have an obsessive interest) may
attract capital. It remains questionable what would happen to less
"addictive" or more politically inclined groups.

At its best, discussion on the Internet operates on a civil
libertarian model. One is free to post whatever one wishes and free to
participate in any of the discussions. However, the computer technology
upon which the Internet relies also makes surveillance and reprisals a
simple matter. It is relatively easy for any group to monitor a conversation
(some on the Internet have suggested that governmental agencies do just
that), and a simple matter for systems operators at any computer site to
tap into one's account or to withdraw one's Internet privileges.
Though cases of direct governmental intervention so far are few, there
are cases such as the 18 year old who was arrested for threatening the
president's life over electronic mail (president@whitehouse.gov).

However, one of the most ominous recent developments has been the
proposed "Clipper chip." A Clinton administration proposal to standardize
encryption chips was recently developed in consultation with the National
Security Agency. Telephones containing the Clipper chip would send out "a
string of bits called a law enforcement field. Its purpose is to enable the
police and the FBI to decode conversations that they wiretap pursuant to
court order." (Wallich 116) Both computer civil libertarians and major
software companies have been opposed to this proposal (the former for
reasons of privacy, the latter for reasons of international competitiveness).
The Clinton administration is currently rethinking the policy, nevertheless,
the technology and means does exist to give the government an exclusive
"back-door" into cellular telephones.

The third criterion for measurement, the extent to which the
formation of opinions can lead to social action, is the one in which the
jury is still out on the Internet. Few traditional political groups are
entirely "online," and the physical distance between Internet participants
raises serious questions as to its use in organizing. Is cyberspace a
locale within which social action is likely or possible? Has it become
a medium of a public sphere in which people can engage public authorities
"in a debate over the general rules governing relations in the basically
privatized but publicly relevant sphere of commodity exchange and social
labor?" (Habermas 27) Computer Professionals for Social Responsibility
circulated an electronic petition in opposition to the Clipper Chip
proposal. This petition was distributed to a wide variety of newsgroups
and eventually forwarded to the president. Such examples, however, are
the exception rather than the rule. Calls to action are rare on the
Internet. The question would be whether that is a carry over from the
state of the world outside of cyberspace or endemic to shifting populations
of the Internet.

The final issue to consider is the role of institutionalized
authority. No single authority governs the Internet. A council of elders
(called the Internet Architecture Board) from the Internet Society has
responsibility for the technical management and direction of the Internet.
(Krol 14) However, this group has almost no control over the actual content
of materials over the Internet. Often the metaphor used to describe the
rules of the Internet is "frontier justice." "The two overriding premises
of network ethics are: Individualism is honored and fostered.
The network is good and must be protected." (35) Such a definition seems
a bit romanticized but it does capture the suspicion of any authorial
intrusion into cyberspace. Many recognize that the computer technology
which brought about the Internet also makes stricter governmental control
a possibility.

As the Internet slowly becomes repaved into the Information
superhighway, it will be important to watch the extent to which people are
assumed to be either a mass or a public. In the former case, we can expect
governmental concern about consumer rights, or the ability of people to have
the ability to obtain as much information as possible for a reasonable price.
Such a mindset governs most federal discussions about cable television
regulation. However, if the people are considered to constitute a public,
then concern will be raised about what Jurgen Habermas has termed
"participatory rights" (229) These are not simply rights which protect
people from something (often the intrusion of government), but rights which,
in this case, ensure people's ability to partake in freedom of assembly and
association through the medium of the Internet.

Works Cited

Habermas, Jurgen. *The Structural Transformation of the Public Sphere: An
Inquiry into a Category of Bourgeois Society* Cambridge: MIT Press,
1993 (1962).

Krol, Ed. *The Whole Internet: User's Buide & Catalog* Sebastopal, CA:
O'Reilly & Associates, Inc., 1992.

Meyer, Michael. "The 'On-Line' War Heats Up." *Newsweek* 28 March
1994: 38-9.

Mills, C. Wright. *The Power Elite* New York: Oxford University Press,
1956.

Wallich Paul. "Clipper Runs Aground." *Scientific American* August 1993:
116.


%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

BRUCE STERLING'S REMARKS AT CFP '94

Posted By Carl Kadie (kadie@eff.org)
Comments to Bruce Sterling (bruces@well.sf.ca.us)

LITERARY FREEWARE: NOT FOR COMMERCIAL USE

I've been asked to explain why I don't worry much about the
topics of privacy threat raised by this panel. And I don't. One reason
is that these scenarios seem to assume that there will be large,
monolithic bureaucracies (of whatever character, political or
economic) that are capable of harnessing computers for one-way
surveillance of an unsuspecting populace. I've come to feel that
computation just doesn't work that way. Being afraid of monolithic
organizations especially when they have computers, is like being
afraid of really big gorillas especially when they are on fire.

The threat simply doesn't concur with my historical
experience. None of the large organizations of my youth that
compelled my fear and uneasy respect have prospered. Let me just
roll off a few acronyms here. CCCP. KGB. IBM. GM. AEC. SAC.

It was recently revealed that the CIA has been of actual
negative worth -- literally worse than useless -- to American
national security. They were in the pockets of the KGB during our
death struggle with the Soviet Union -- and yet we still won.
Japanese zaibatsus -- Japan Inc. -- the corporate monoliths of Japan
-- how much hype have we heard about that lately? I admit that
AT&T has prospered, sort of -- if you don't count the fact that
they've hollowed themselves out by firing a huge percentage of their
personnel.

Suppose that, say, Equifax, turned into an outright fascist
organization and stated abusing privacy in every way they could.
How could they keep that a secret? Realistically, given current
employment practices in the Western economies, what kind of
loyalty could they command among their own personnel? The low
level temps have no health insurance and no job security; the high
level people are ready to grab their golden parachutes and bail at any
time. Where is the fanatically loyal army of gray flannel
organization men who will swear lifelong allegiance to this
organization, or *any* organization in this country with the possible
exception of the Mafia?

I feel that the real threat to our society isn't because people
are being surveilled but because people are being deliberately
ignored. People drop through the safety nets. People stumble
through the streets of every city in this country absolutely wrapped
in the grip of demons, groping at passersby for a moment's attention
and pity and not getting it. In parts of the Third World people are
routinely disappeared, not because of high-tech computer
surveillance but for the most trivial and insane reasons -- because
they wear glasses, because they were seen reading a book -- and if
they survive, it's because of the thin thread of surveillance carried
out by Amnesty International.

There may be securicams running 24 hours a day all around us,
but mechanical surveillance is not the same as people actually
getting attention or care. Sure, rich people, like most of us here, are
gonna get plenty of attention, probably too much, a poisonous
amount, but in the meantime life has become so cheap in this society
that we let people stagger around right in front of us exhaling
tuberculosis without treatment. It's not so much information haves
and have-nots and watch and watch-nots.

I wish I could speak at greater length more directly to the
topic of this panel. But since I'm the last guy to officially speak at
CFP IV, I want the seize the chance to grandstand and do a kind of
pontifical summation of the event. And get some irrepressible
feelings off my chest.

What am I going to remember from CFP IV? I'm going to
remember the Chief Counsel of NSA and his impassioned insistence
that key escrow cryptography represents normality and the status
quo, and that unlicensed hard cryptography is a rash and radical leap
into unplumbed depths of lawlessness. He made a literary reference
to BRAVE NEW WORLD. What he said in so many words was, "We're
not the Brave New World, Clipper's opponents are the Brave New
World."

And I believe he meant that. As a professional science fiction
writer I remember being immediately struck by the deep conviction
that there was plenty of Brave New World to go around.

I've been to all four CFPs, and in my opinion this is the darkest
one by far. I hear ancestral voices prophesying war. All previous
CFPs had a weird kind of camaraderie about them. People from the
most disparate groups found something useful to tell each other.
But now that America's premiere spookocracy has arrived on stage
and spoken up, I think the CFP community has finally found a group of
outsiders that it cannot metabolize. The trenchworks are going up
and I see nothing but confrontation ahead.

Senator Leahy at least had the elementary good sense to
backpedal and temporize, as any politician would when he saw the
white-hot volcano of technological advance in the direct path of a
Cold War glacier that has previously crushed everything in its way.

But that unlucky flak-catcher the White House sent down here
-- that guy was mousetrapped, basically. That was a debacle! Who
was briefing that guy? Are they utterly unaware? How on earth
could they miss the fact that Clipper and Digital Telephony are
violently detested by every element in this community -- with the
possible exception of one brave little math professor this high?
Don't they get it that everybody from Rush Limbaugh to Timothy
Leary despises this initiative? Don't they read newspapers? The
Wall Street Journal, The New York Times? I won't even ask if they
read their email.

That was bad politics. But that was nothing compared to the
presentation by the gentleman from the NSA. If I can do it without
losing my temper, I want to talk to you a little bit about how
radically unsatisfactory that was.

I've been waiting a long time for somebody from Fort Meade to
come to the aid of Dorothy Denning in Professor Denning's heroic and
heartbreaking solo struggle against twelve million other people with
email addresses. And I listened very carefully and I took notes and I
swear to God I even applauded at the end.

He had seven points to make, four of which were disingenuous,
two were half-truths, and the other was the actual core of the
problem.

Let me blow away some of the smoke and mirrors first, more
for my own satisfaction than because it's going to enlighten you
people any. With your indulgence.

First, the kidporn thing. I am sick and tired of hearing this
specious blackwash. Are American citizens really so neurotically
uptight about deviant sexual behavior that we will allow our entire
information infrastructure to be dictated by the existence of
pedophiles? Are pedophiles that precious and important to us? Do
the NSA and the FBI really believe that they can hide the structure of
a telephone switch under a layer of camouflage called child
pornography? Are we supposed to flinch so violently at the specter
of child abuse that we somehow miss the fact that you've installed a
Sony Walkman jack in our phones?

Look, there were pedophiles before NII and there will be
pedophiles long after NII is just another dead acronym. Pedophiles
don't jump out of BBSes like jacks in the box. You want to impress
me with your deep concern for children? This is Chicago! Go

  
down
to the Projects and rescue some children from being terrorized and
recruited by crack gangs who wouldn't know a modem if it bit them
on the ass! Stop pornkidding us around! Just knock it off with that
crap, you're embarrassing yourselves.

But back to the speech by Mr. Baker of the NSA. Was it just me,
ladies and gentlemen, or did anyone else catch that tone of truly
intolerable arrogance? Did they guy have to make the remark about
our missing Woodstock because we were busy with our
trigonometry? Do spook mathematicians permanently cooped up
inside Fort Meade consider that a funny remark? I'd like to make an
even more amusing observation -- that I've seen scarier secret
police agencies than his completely destroyed by a Czech hippie
playwright with a manual typewriter.

Is the NSA unaware that the current President of the United
States once had a big bushel-basket-full of hair? What does he
expect from the computer community? Normality? Sorry pal, we're
fresh out! Who is it, exactly, that the NSA considers a level-headed
sober sort, someone to sit down with and talk to seriously? Jobs?
Wozniak? Gates? Sculley? Perot -- I hope to God it's not Perot.
Bob Allen -- okay, maybe Bob Allen, that brownshoe guy from AT&T.
Bob Allen seems to think that Clipper is a swell idea, at least he's
somehow willing to merchandise it. But Christ, Bob Allen just gave
eight zillion dollars to a guy whose idea of a good time is Microsoft
Windows for Spaceships!

When is the NSA going to realize that Kapor and his people and
Rotenberg and his people and the rest of the people here are as good
as people get in this milieu? Yes they are weird people, and yes they
have weird friends (and I'm one of them), but there isn't any
normality left for anybody in this society, and when it comes to
computers, when the going got weird the weird turned pro! The
status quo is *over!* Wake up to it! Get used to it!

Where in hell does a crowd of spooks from Fort Meade get off
playing "responsible adults" in this situation? This is a laugh and a
half! Bobby Ray Inman, the legendary NSA leader, made a stab at
computer entrepreneurism and rapidly went down for the third time.
Then he got out of the shadows of espionage and into the bright
lights of actual public service and immediately started gabbling like
a daylight-stricken vampire. Is this the kind of responsive public
official we're expected to blindly trust with the insides of our
phones and computers? Who made him God?

You know, it's a difficult confession for a practiced cynic like
me to make, but I actually trust EFF people. I do; I trust them;
there, I've said it. But I wouldn't trust Bobby Ray Inman to go down
to the corner store for a pack of cigarettes.

You know, I like FBI people. I even kind of trust them, sort of,
kind of, a little bit. I'm sorry that they didn't catch Kevin Mitnick
here. I'm even sorry that they didn't manage to apprehend Robert
Steele, who is about one hundred times as smart as Mitnick and ten
thousand times as dangerous. But FBI people, I think your idea of
Digital Telephony is a scarcely mitigated disaster, and I'll tell you
why.

Because you're going to be filling out your paperwork in
quintuplicate to get a tap, just like you always do, because you don't
have your own pet court like the NSA does. And for you, it probably
is going to seem pretty much like the status quo used to be. But in
the meantime, you will have armed the enemies of the United States
around the world with a terrible weapon. Not your court-ordered,
civilized Digital Telephony -- their raw and tyrannical Digital
Telephony.

You're gonna be using it to round up wiseguys in streetgangs,
and people like Saddam Hussein are gonna be using it to round up
democratic activists and national minorities. You're going to
strengthen the hand of despotism around the world, and then you're
going to have to deal with the hordes of state-supported
truckbombers these rogue governments are sending our way after
annihilating their own internal opposition by using your tools. You
want us to put an axe in your hand and you're promising to hit us
with only the flat side of it, but the Chinese don't see it that way;
they're already licensing fax machines and they're gonna need a lot
of new hardware to gear up for Tiananmen II.

I've talked a long time, but I want to finish by saying
something about the NSA guy's one real and actual argument. The
terrors of the Brave New World of free individual encryption. When
he called encryption enthusiasts "romantic" he was dead-on, and
when he said the results of spreading encryption were unpredictable
and dangerous he was also dead-on, because people, encryption is not
our friend. Encryption is a mathematical technique, and it has about
as much concern for our human well-being as the fact that seventeen
times seventeen equals two hundred and eighty-nine. It does, but
that doesn't make us sleep any safer in our beds.

Encrypted networks worry the hell out of me and they have
since the mid 1980s. The effects are very scary and very
unpredictable and could be very destabilizing. But even the Four
Horsemen of Kidporn, Dope Dealers, Mafia and Terrorists don't worry
me as much as totalitarian governments. It's been a long century,
and we've had enough of them.

Our battle this century against totalitarianism has left
terrible scars all over our body politic and the threat these people
pose to us is entirely and utterly predictable. You can say that the
devil we know is better than the devil we don't, but the devils we
knew were ready to commit genocide, litter the earth with dead, and
blow up the world. How much worse can that get? Let's not build
chips and wiring for our police and spies when only their police and
spies can reap the full benefit of them.

But I don't expect my arguments to persuade anyone in the NSA.
If you're NSA and I do somehow convince you, by some fluke, then I
urge you to look at your conscience -- I know you have one -- and
take the word to your superiors and if they don't agree with you --
*resign.* Leave the Agency. Resign now, and if I'm right about
what's coming down the line, you'll be glad you didn't wait till later.

But even though I have a good line of gab, I don't expect to
actually argue people out of their livelihood. That's notoriously
difficult.

So CFP people, you have a fight on your hands. I'm sorry that a
community this young should have to face a fight this savage, for
such terribly high stakes, so soon. But what the heck; you're
always bragging about how clever you are; here's your chance to
prove to your fellow citizens that you're more than a crowd of net-
nattering MENSA dilettantes. In cyberspace one year is like seven
dog years, and on the Internet nobody knows you're a dog, so I figure
that makes you CFP people twenty-eight years old. And people, for
the sake of our society and our children you had better learn to act
your age.

Good luck. Good luck to you. For what it's worth, I think you're
some of the best and brightest our society has to offer. Things look
dark but I feel hopeful. See you next year in San Francisco.

%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

[BOOK REVIEW] DOING BUSINESS ON THE INTERNET: HOW THE ELECTRONIC
HIGHWAY IS TRANSFORMING AMERICAN COMPANIES

By Steve Brock (sbrock@teal.csn.org)

DOING BUSINESS ON THE INTERNET: HOW THE ELECTRONIC HIGHWAY IS
TRANSFORMING AMERICAN COMPANIES by Mary J. Cronin. Van Nostrand
Reinhold, 115 Fifth Avenue, N.Y., NY 10003, (800) 544-0550, (212)
254-9499 FAX. Index, bibliography, list of service providers. 320
pp., $29.95 paper. 0-442-01770-7

REVIEW

Buying and selling on the Internet? Deals being made? Call
the net police! Seriously, commercial traffic is only forbidden on
the NSFnet - the Internet backbone, and restrictions there are
scheduled to disappear by the end of this year, when the National
Science Foundation (NSF) turns its administration of NSFnet over to
commercial organizations. Sensing this transition, companies are
flocking to the Internet. In a recent survey, 63% of Internet
traffic worldwide is by businesses or their research labs.

What can businesses get from the Internet? Mary Cronin, in
her new book "Doing Business on the Internet," has many answers.
After an overview of the mother of all networks and tips for
choosing a service provider, she outlines strategies for seeking
and exchanging information, increasing productivity, and increasing
communications between departments and with customers.

Another asset for businesses is that information can be
retrieved swiftly. While the Internet has gone through many
permutations, businesses have business to do right now, and Cronin
says that companies with an Internet connection can "receive the
advantages of high-speed telecommunications and continuously
evolving technology while learning invaluable lessons about the
management of networked organizations."

While a few may desire more information than the non-technical
overview Cronin provides, "Doing Business on the Internet" is a
solid introduction to networked communication and information
retrieval - the way business is going to be conducted from now on.

%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

GENERIC FLAME FORM

This form is a generic-all-purpose Flame Form (tm). Don't you just hate it
when you are reading Usenet and can't filter through all of the crap
posted by people who simply do not have a clue! Well, maybe this form
will cut down on some of that. If someone pisses you off on Usenet,
fill it out and mail it to 'em.

---------cut here-------------cut here-------------cut here-------------

*************************************************************************
GENERIC FLAME FORM
*************************************************************************

Dear Sir/Madam

I took exception to your recent post to alt.insert.newsgroup.here

MESSAGE CONTENT SECTION

It was (check all that apply):

___ lame.
___ stupid.
___ much longer than any worthwhile thought of which you may be capable.

Your attention is drawn to the fact that:

___ What you posted/said has been done before.
___ Not only that, it was also done better the last time.
___ Your post was a pathetic imitation of ______________________.
___ Your post contained commercial advertising.
___ Your post contained numerous spelling errors.
___ Your post contained multiple grammatical errors.
___ YOUR POST CONTAINED EXCESSIVE CAPITALIZATION AND/OR PUNCTUATION!!!!!
___ Your post was an obvious forgery.
___ It was done clumsily.
___ You quoted an article in followup and added no new text.
___ You quoted an article in followup and only added ___ lines of text.
___ You quoted an article in followup and only added the line "Me, too!!!"
___ You flamed someone who has been around far longer than you.
___ You flamed someone who is far more intelligent and witty than you.
___ Your lines are 80 columns wide or wider.

SIGNATURE SECTION

___ Your .sig is longer than four lines.
___ And your mailer truncated it.
___ Your .sig is ridiculous because (check all that apply):
___ You listed ___ snail mail address(es).
___ You listed a nine-digit ZIP code.
___ You listed ___ phone numbers for people to use in prank calls.
___ You included a stupid disclaimer.

___ Your pathetic attempt at being witty in the disclaimer failed.
___ Miserably.

You included:
___ a stupid self-quote.
___ a stupid quote from a net.nobody.
___ a Rush Limbaugh quote.
___ a Dan Quayle joke.
___ a Hitler reference
___ a reference to the world being 6000 years old
___ a reference to Beavis & Butthead.
___ lame ASCII graphic(s) (Choose all that apply):
___ USS Enterprise
___ Australia
___ The Amiga logo
___ Company logo
___ and you stated that you don't speak for your employer.
___ Bicycle
___ Bart Simpson

Furthermore:

___ You have greatly misunderstood the purpose of alt.insert.newsgroup.here
___ You have greatly misunderstood the purpose of the net.
___ You are a loser.
___ You must have spent your entire life on a milk carton to be this dumb!
___ This has been pointed out to you before.

___ It is recommended that you:
___ Stick to FidoNet and come back when you've grown up.
___ Find a volcano and throw yourself in.
___ Get a gun and shoot yourself.
___ Stop reading alt.censorship and get a life.
___ Stop sending email and get a life.
___ Learn the concepts of cross-posting and follow-ups
___ Try reading a newsgroup for a week (or more than an hour) before
posting

Additional comments:
Follow-ups to: /dev/null


%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

McDonnell Douglas
AIRCRAFT-SPACE SYSTEMS-MISSILES

Important! Important!

Please fill out and mail this form within 10 days of purchase

Thank you for purchasing a McDonnell Douglas military aircraft. In
order to protect your new investment, please take a few moments to
fill out the warranty registration card below. Answering the survey
questions is not required, but the information will help us to develop new
products that best meet your needs and desires.

1. _Mr. _Mrs. _Ms. _Lt. _Gen. _Comrade _Classified _Other

First Name________________Initial____Last Name_______________________

Latitude________________________Longitude____________________________

Altitude____________________Password, Code Name, Etc.________________

2. Which model aircraft did you purchase?

_F-15 Eagle _F-16 Falcon _F-117A Stealth _Classified

3. Date of purchase: Month___________Day___________Year____________

4. Serial Number____________________

5. Please check where this product was purchased:

_Received as Gift/Aid Package
_Catalog Showroom
_Sleazy Arms Broker
_Mail Order
_Discount Store
_Government Surplus
_Classified

6. Please check how you became aware of the McDonnell Douglas product
you have just purchased:

_Heard loud noise, looked up
_Store Display
_Espionage
_Recommended by friend/relative/ally
_Political lobbying by Manufacturer
_Was attacked by one

7. Please check the three (3) factors which most influenced your
decision to purchase this McDonnell Douglas product:

_Style/Appearance
_Kickback/Bribe
_Recommended by salesperson
_Speed/Maneuverability
_Comfort/Convenience
_McDonnell Douglas Reputation
_Advanced Weapons Systems
_Price/Value
_Back-Room Politics
_Negative experience opposing one in combat

8. Please check the location(s) where this product will be used:

_North America
_Central/South America
_Aircraft Carrier
_Europe
_Middle East
_Africa
_Asia/Far East
_Misc. Third-World Countries
_Classified

9. Please check the products that you currently own, or intend to purchase in
the near future:

Product Own Intend to purchase
Color TV
VCR
ICBM
Killer Satellite
CD Player
Air-to-Air Missiles
Space Shuttle
Home Computer
Nuclear Weapon

10. How would you describe yourself or your organization? Check all
that apply:

_Communist/Socialist
_Terrorist
_Crazed (Islamic)
_Crazed (Other)
_Neutral
_Democratic
_Dictatorship
_Corrupt (Latin American)
_Corrupt (Other)
_Primitive/Tribal

11. How did you pay for your McDonnell Douglas product?

_Cash
_Suitcases of Cocaine
_Oil Revenues
_Deficit Spending
_Personal Check
_Credit Card
_Ransom Money
_Traveler's Check

12. Occupation You Your Spouse

Homemaker
Sales/Marketing
Revolutionary
Clerical
Mercenary
Tyrant
Middle Management
Eccentric Billionaire
Defense Minister/General
Retired
Student

13. To help us understand our Customers' lifestyles, please indicate
the interests and activities in which you and your spouse enjoy
participating on a regular basis:

Activity/Interest You Your Spouse
Golf
Boating/Sailing
Sabotage
Running/Jogging
Propaganda/Disinformation
Destabilizing/Overthrow
Default on Loans
Gardening
Crafts
Black Market/Smuggling
Collectibles/Collections
Watching Sports on TV
Wines
Interrogation/Torture
Household Pets
Crushing Rebellions
Espionage/Reconnaissance
Fashion Clothing
Border Disputes
Mutually Assured Destruction

Thanks for taking the time to fill out this questionnaire. Your
answers will be used in market studies that will help McDonnell
Douglas serve you better in the future -- as well as allowing you to
receive mailings and special offers from other companies, governments,
extremist groups, and mysterious consortia.

Comments or suggestions about our fighter planes? Please write to:

McDONNELL DOUGLAS CORPORATION
Marketing Department
Military Aerospace Division
P.O. Box 800
St. Louis, MO 55500

%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

SOCIAL CONTRACT
between an individual and the United States Government

WHEREAS I wish to reside on the North American continent, and
WHEREAS the United States Government controls the area of the
continent on which I wish to reside, and
WHEREAS tacit or implied contracts are vague and therefore
unenforceable,

I agree to the following terms:

SECTION 1: I will surrender a percentage of my property to the
Government. The actual percentage will be determined by the Government and
will be subject to change at any time. The amount to be surrended may be
based on my income, the value of my property, the value of my purchases, or
any other criteria the Government chooses. To aid the Government in
determining the percentage, I will apply for a Government identification
number that I will use for all of my major financial transactions.

SECTION 2: Should the Government demand it, I will surrender my liberty for
a period of time determined by the Government and typically no shorter than
two years. During that time, I will serve the Government in any way it
chooses, including military service in which I may be called upon to
sacrifice my life.

SECTION 3: I will limit my behavior as demanded by the Government. I will
consume the drugs only permitted by the Government. I will limit my sexual
activities to those permitted by the Government. I will forsake religious
beliefs that conflict with the Government's determination of propriety.
More limits may be imposed at any time.

SECTION 4: In consideration of the above the Government will allow me to
find employment, subject to limits that will be subject to the Government.
These limits may restrict my choice of career or the wages I may accept.

SECTION 5: The Government will permit me to reside in the area of North
America that it controls. Also the Government will permit me to speak
freely, subject to limits determined by the Government's Congress and
Supreme Court.

SECTION 6: The Government will attempt to protect my life and my claim to
the property that it has allowed me to keep. I agree not to hold the
Government liable if it fails to protect me or my property.

SECTION 7: The Government will offer various services to me. The nature
and extent of these services will be determined by the Government and are
subject to change at any time.

SECTION 8: The Government will determine whether I may vote for certain
Government officials. The influence of my vote will vary inversely with the
number of voters, and I understand that it will be typically miniscule. I
agree not to hold any elected Government officials liable for acting against
my best interests or for breaking promises, even if those promises motivated
me to vote for them.

SECTION 9: I agree that the Government may hold me fully liable if I fail
to abide by the above terms. In that event, the Government may confiscate
any property that I have not previously surrended to it, and may imprison me
for a period of time determined by the Government. I also agree that the
Government may alter the terms of this contract at any time.


______________________________________ ______________________________
SIGNATURE DATE

%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

Electronic Petition to Oppose Clipper
Please Distribute Widely

On January 24, many of the nation's leading experts in cryptography
and computer security wrote President Clinton and asked him to
withdraw the Clipper proposal.

The public response to the letter has been extremely favorable,
including coverage in the New York Times and numerous computer and
security trade magazines.

Many people have expressed interest in adding their names to the
letter. In response to these requests, CPSR is organizing an
Internet petition drive to oppose the Clipper proposal. We will
deliver the signed petition to the White House, complete with the
names of all the people who oppose Clipper.

To sign on to the letter, send a message to:

Clipper.petition@cpsr.org

with the message "I oppose Clipper" (no quotes)

You will receive a return message confirming your vote.

Please distribute this announcement so that others may also express
their opposition to the Clipper proposal.

CPSR is a membership-based public interest organization. For
membership information, please email cpsr@cpsr.org. For more
information about Clipper, please consult the CPSR Internet Library -
FTP/WAIS/Gopher CPSR.ORG /cpsr/privacy/crypto/clipper


%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

The President
The White House
Washington, DC 20500

Dear Mr. President:

We are writing to you regarding the "Clipper" escrowed encryption
proposal now under consideration by the White House. We wish to
express our concern about this plan and similar technical standards
that may be proposed for the nation's communications infrastructure.

The current proposal was developed in secret by federal agencies
primarily concerned about electronic surveillance, not privacy
protection. Critical aspects of the plan remain classified and thus
beyond public review.

The private sector and the public have expressed nearly unanimous
opposition to Clipper. In the formal request for comments conducted
by the Department of Commerce last year, less than a handful of
respondents supported the plan. Several hundred opposed it.

If the plan goes forward, commercial firms that hope to develop
new products will face extensive government obstacles. Cryptographers
who wish to develop new privacy enhancing technologies will be
discouraged. Citizens who anticipate that the progress of technology
will enhance personal privacy will find their expectations
unfulfilled.

Some have proposed that Clipper be adopted on a voluntary basis
and suggest that other technical approaches will remain viable. The
government, however, exerts enormous influence in the marketplace, and
the likelihood that competing standards would survive is small. Few
in the user community believe that the proposal would be truly
voluntary.

The Clipper proposal should not be adopted. We believe that if
this proposal and the associated standards go forward, even on a
voluntary basis, privacy protection will be diminished, innovation
will be slowed, government accountability will be lessened, and the
openness necessary to ensure the successful development of the
nation's communications infrastructure will be threatened.

We respectfully ask the White House to withdraw the Clipper
proposal.


%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

THE WHITE HOUSE
Office of the Press Secretary

For Immediate Release

STATEMENT BY THE PRESS SECRETARY

The President today announced a new initiative that will bring
the Federal Government together with industry in a voluntary
program to improve the security and privacy of telephone
communications while meeting the legitimate needs of law
enforcement.

The initiative will involve the creation of new products to
accelerate the development and use of advanced and secure
telecommunications networks and wireless communications links.

For too long, there has been little or no dialogue between our
private sector and the law enforcement community to resolve the
tension between economic vitality and the real challenges of
protecting Americans. Rather than use technology to accommodate
the sometimes competing interests of economic growth, privacy and
law enforcement, previous policies have pitted government against
industry and the rights of privacy against law enforcement.

Sophisticated encryption technology has been used for years to
protect electronic funds transfer. It is now being used to
protect electronic mail and computer files. While encryption
technology can help Americans protect business secrets and the
unauthorized release of personal information, it also can be used
by terrorists, drug dealers, and other criminals.

A state-of-the-art microcircuit called the "Clipper Chip" has
been developed by government engineers. The chip represents a
new approach to encryption technology. It can be used in new,
relatively inexpensive encryption devices that can be attached to
an ordinary telephone. It scrambles telephone communications
using an encryption algorithm that is more powerful than many in
commercial use today.

This new technology will help companies protect proprietary
information, protect the privacy of personal phone conversations
and prevent unauthorized release of data transmitted
electronically. At the same time this technology preserves the
ability of federal, state and local law enforcement agencies to
intercept lawfully the phone conversations of criminals.

A "key-escrow" system will be established to ensure that the
"Clipper Chip" is used to protect the privacy of law-abiding
Americans. Each device containing the chip will have two unique
"keys," numbers that will be needed by authorized government
agencies to decode messages encoded by the device. When the
device is manufactured, the two keys will be deposited separately
in two "key-escrow" data bases that will be established by the
Attorney General. Access to these keys will be limited to
government officials with legal authorization to conduct a
wiretap.

The "Clipper Chip" technology provides law enforcement with no
new authorities to access the content of the private
conversations of Americans.

To demonstrate the effectiveness of this new technology, the
Attorney General will soon purchase several thousand of the new
devices. In addition, respected experts from outside the
government will be offered access to the confidential details of
the algorithm to assess its capabilities and publicly report
their findings.

The chip is an important step in addressing the problem of
encryption's dual-edge sword: encryption helps to protect the
privacy of individuals and industry, but it also can shield
criminals and terrorists. We need the "Clipper Chip" and other
approaches that can both provide law-abiding citizens with access
to the encryption they need and prevent criminals from using it
to hide their illegal activities. In order to assess technology
trends and explore new approaches (like the key-escrow system),
the President has directed government agencies to develop a
comprehensive policy on encryption that accommodates:

the privacy of our citizens, including the need to
employ voice or data encryption for business purposes;

the ability of authorized officials to access telephone
calls and data, under proper court or other legal
order, when necessary to protect our citizens;

the effective and timely use of the most modern
technology to build the National Information
Infrastructure needed to promote economic growth and
the competitiveness of American industry in the global
marketplace; and

the need of U.S. companies to manufacture and export
high technology products.

The President has directed early and frequent consultations with
affected industries, the Congress and groups that advocate the
privacy rights of individuals as policy options are developed.

The Administration is committed to working with the private
sector to spur the development of a National Information
Infrastructure which will use new telecommunications and computer
technologies to give Americans unprecedented access to
information. This infrastructure of high-speed networks
("information superhighways") will transmit video, images, HDTV
programming, and huge data files as easily as today's telephone
system transmits voice.

Since encryption technology will play an increasingly important
role in that infrastructure, the Federal Government must act
quickly to develop consistent, comprehensive policies regarding
its use. The Administration is committed to policies that
protect all American's right to privacy while also protecting
them from those who break the law.

Further information is provided in an accompanying fact sheet.
The provisions of the President's directive to acquire the new
encryption technology are also available.

For additional details, call Mat Heyman, National Institute of
Standards and Technology, (301) 975-2758.

%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

ISDN Contacts (RBOCS)

Editor's Note:
This is a list sent to us regarding getting more info on ISDN from the
RBOCS. We claim no accuracy to this info. I am sure that most, if not
all of it is valid. If you need ISDN info, feel free to contact one
of the organizations below.


COMPANY CONTACT TELEPHONE NO.

AMERITECH National ISDN Hotline 1-800-543-ISDN
BELL ATLANTIC ISDN Sales & Technology Center 1-800-570-ISDN
BELL SOUTH National ISDN HotLine 1-800-428-ISDN
CINCINNATI BELL ISDN Service Center 1-513-566-DATA
NYNEX ISDN Information Hotline 1-800-GET-ISDN
or Roy Ray 1-914-644-5152
PACIFIC BELL ISDN Information or Wayne Purves, 1-800-622-0735
NI-1 Product Mgr. 1-510-823-5118
SNET Donovan Dillon 1-203-553-2369
STENTOR (Canada) Steve Finlay 1-604-432-3527
SOUTHWESTERN BELL Cyd McInerney 1-314-235-1567
U S WEST Louise Walsh 1-303-965-7073

%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

BELLSOUTH ANNOUNCES LARGEST GEOGRAPHIC DEPLOYMENT OF ISDN IN THE NATION

Advanced telecommuting telemedicine and education applications will become
the most widely available in the nation as a result of a technology
deployment plan announced today by BellSouth Telecommunications.

The nine-state introduction of a new way to provide Integrated Services
Digital Network (ISDN), which combines voice, data and video services,
begins in June 1994. ISDN can use advanced fiber optic cable or
traditional copper cable to transmit multiple services.

Until now, a customer who wished to use ISDN needed to be served by a
telephone office that was ISDN capable. With the innovative approach by
BellSouth, a customer can obtain the benefits of ISDN through an alternate
serving arrangement which eradicates geographic boundaries.

"Expanded access to ISDN will facilitate customer-oriented applications
since there are fewer technological and geographic limitations on
availability," said Larry Carter, assistant vice president of product
management for BellSouth Telecommunications.

This announcement is the latest in a very aggressive deployment strategy
for ISDN.

-- In July 1992, Bellsouth announced the nation's first metropolitan-wide
deployment of ISDN in the cities of Huntsville and Madison, Ala.

-- Six months later, South Central Bell customers throughout the state
of Tennessee were offered ISDN Individual Line Service and now ISDN
availability is being expanded region wide.

This announcement significantly increases the percentage of customers
with access to ISDN capabilities and will ultimately lead to 100% of
BellSouth customers. Until now, 50% of BellSouth's customers in major
metropolitan areas had direct access to ISDN and 320 central offices were
equipped with ISDN. The expanded access applies to ISDN Individual Line
(2B+D) and MegaLink (SM) ISDN Service which is BellSouth's primary rate
(23B+D) offering.

"Previously, you had to be served directly by a central office switch
equipped with ISDN capability. Under this new alternate serving
arrangement, ISDN capabilities can be routed from a nearby ISDN-capable
switch to your home or office -- at no additional charge. This
arrangement is a cost-effective and expeditious method of deploying
ISDN region wide," Carter said.

ISDN availability is an important part of the information superhighway
providing access at lower speeds. For example, through distance
learning, advanced classes could be transported at very high speeds
to a customer's city on the information highway from a university in
another city. This high speed signal is then divided into lower speeds
and redistributed within the city. ISDN would make these classes
available to any school anywhere.

Dr. Ira Denton, chief surgeon at Crestwood Hospital in Huntsville, Ala.,
has used ISDN to send, receive and annotate X-rays and video images
while talking to other physicians. Because ISDN is available citywide
and there are no geographic restrictions, physicians can communicate
through ISDN from any of their offices and even their homes.

"Health care specialists as well as any other businesses that have
multiple locations within a metropolitan area can benefit from this new
capability," Carter added. "The education industry will especially benefit
from applications including distance learning, security and truancy
monitoring."

To aid in marketing ISDN, last year BellSouth announced the "ISDN
Applications and Solutions Plus" (IAS+) initiative where strategic
marketing alliances are formed in major metropolitan areas to provide
customers with complete and innovative solutions. This initiative in
addition to the expanded access will make ISDN applications more readily
available for BellSouth customers.

BellSouth Telecommunications, Inc., with headquarters in Atlanta, provides
telecommunications services in the BellSouth (NYSE: BLS) region. BellSouth
Telecommunications, Inc. does business as Southern Bell in North Carolina,
South Carolina, Georgia and Florida, and as South Central Bell in
Kentucky, Tennessee, Alabama, Mississippi and Louisiana. These
companies serve more than 19 million local telephone lines and provide
local exchange and intraLATA long distance service over one of the most
modern telecommunications networks in the world.

CONTACT:
Karen M. Roughton of BellSouth Telecommunications, 404-529-6514
BellSouth National ISDN HotLine, 1-800-428-4736

Posted by:
Bellcore ISDN Hotline 1-800-992-ISDN

%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

A CATALOG OF NATIONAL ISDN SOLUTIONS ...

The files in this directory compose the final draft
of "A Catalog of National ISDN Solutions for Selected NIUF
Applications, Second Edition." This document was
approved as an official product of the North American ISDN Users'
Forum on February 11, 1994.

The Catalog is intended for anyone who needs detailed
information on how ISDN can be used today to support a wide
variety of applications. Each of the 61 solution guides includes a
description, picture, details on what to look for in end-systems, and
what to ask for from the ISDN provider. A separate chapter
presents one page summaries of over 200 products and services
from over 100 companies. The new Catalog goes far beyond the First
Edition. For the decision maker, example "feasibility studies" are
included to help support a business' decision to use ISDN. Each
solution is rewritten to be more accessible. The solutions cover
National ISDN-1, National ISDN-2, BRI, and PRI. Applications
range from multipoint videoconferencing to point of sale,
telecommuting to PBX interflow. For the more technical reader,
additional detailed information is included on a variety of topics.

CONTENTS

0.ps Title page, Preface, Table of Contents, etc.
1.ps Introduction
2.ps ISDN - A Decision Maker's Perspective
3.0.ps National ISDN Solutions
3.1.A.ps NI-1 BRI Local Area Network (LAN) Solutions
Integrating telephones and workstations
Access on demand to local-area networks
High performance access on demand to local-area
networks Linking workstations with supercomputers
Leased line replacement
3.1.B.ps NI-1 BRI Screen Sharing Solutions
Screen sharing for two users
Screen sharing for many users
Screen sharing with workstations connected to a
remote LAN
3.1.C.ps NI-1 BRI Video Solutions
Desktop videoconferencing
Centralized management of video images
Videoconferencing facilities
3.1.D.ps NI-1 BRI Voice & Data Solutions
Caller identification
Call coverage
ACD agent at home
3.1.E.ps NI-1 BRI File Transfer Solutions
Flexible bandwidth allocation
File transfer between personal computers
File transfer between a personal computer and a host
computer
High speed transfer of large text and image files
3.1.F.ps NI-1 BRI Work-At-Home Solutions
Telecommuting with casual data requirements
Telecommuting and transferring files
Telecommuting accessing interactive services
High performance telecommuting (interactive
graphics and text)
3.1.G. NI-1 BRI Facsimile and Imaging Solutions
Group 3 facsimile
Receiving faxes as electronic documents
High speed access to electronic document image
systems
Multimedia real estate listings
Medical document imaging
3.1.H.ps NI-1 BRI Transaction Services Solutions
Credit card authorization at the point of sale
Electronic Data Interchange (EDI)
Insurance verification at the point of service
Supermarket checkout
3.1.I.ps Other NI-1 BRI Solutions
Access to IBM mainframes and compatibles
Remote access to minicomputers
Integrating voice and data communications
Integrated communications and messaging
Automatic utility meter reading
University dormitory
Access to frame relay services
Switched access to frame relay services
High fidelity voice transmission systems
3.2.ps National ISDN-2 BRI Solutions
Roll about videoconferencing
X.25 backup
Packet mode screen sharing for many users
Home office
3.3.0.ps National ISDN-2 PRI Solutions
3.3.A.ps NI-2 PRI Local Area Network (LAN) Solutions
Local-area network interconnection
File transfer and LAN access in PBX environment
Private line overflow and disaster recovery
ISDN concentrator for campus connectivity
3.3.B.ps NI-2 PRI Video Solutions
PRI Videoconferencing
Multimedia desktop video via Ethernet and
Multirate ISDN
Multipoint videoconferencing
Videoconferencing facilities
3.3.C.ps NI-2 PRI Voice & Data Solutions
Caller identification to PBXs and other devices
Emergency-services call management
Call by Call Service Selection
3.3.D.ps NI-2 PRI Facsimile and Imaging Solutions
Fax mail
Teleradiology
3.3.E.ps Other NI-2 PRI Solutions
High quality audio transmission
Access to litigation support system
Call center load balancing
Networked voice messaging systems
4.0&1.ps National ISDN Product Information and Industry
Contacts
4.2.1.ps Basic Rate Terminal Adapters
4.2.2.ps Basic Rate Interface Cards for Personal Computers,
Workstations, and Minicomputers; Workstations
with Built-in ISDN
4.2.3.ps Attendant Consoles
4.2.4.ps ISDN Phones
4.2.5.ps Single Port ISDN LAN Bridges
4.2.6.ps Communications Servers, Routers, Bridges, and
Multiport ISDN LAN Bridges and Routers
4.2.7.ps Inverse Multiplexers, Multiplexers, and
Communications Controllers
4.2.8.ps PRI Adapters
4.2.9.ps Videoconferencing Systems and Multipoint Control
Units
4.2.10.ps Other Products
4.2.11.ps Network Terminations (NT-1s)
4.2.12.ps Power Supplies
4.2.13.ps Software and Services
4.2.14.ps Private Network Solutions and Private Branch
Exchanges(PBXs)
4.2.15.ps Service Providers
4.3.ps Supplier Contact Information
5.1.ps Selected Topics in ISDN
Call Types and Bearer Capabilites
Terminal Endpoint Identifiers (TEIs)
Service Profile Identifiers (SPIDs)
Rate Adaptation: V.110/V.120
Lower Layer Compatibility (LLC) and Higher Layer
Compatibility (HLC) Information Elements
Signaling System 7 (SS7) Interconnection
Multiline Hunt Group
Powering and Wiring of Customer Equipment
Configurations for High Bandwidth Applications
Communications Server Alternatives
NIUF ISDN Interface Groups (NIIGs) and Parameter
Groups (NIPGs)
Additional Information Applicable to Many ISDN
Solutions
Conformance Testing
5.2.ps ISDN Signaling Diagrams
6.ps Bibliography
7.ps Glossary of Terms
8.ps Acronym List
A.ps Annex: How the NIUF is making real the promise of
ISDN An Overview of the North American ISDN Users'
Forum (NIUF)
Relevance of this NIUF Catalog
Application Profiles
Implementation Agreements
Versions
Conformance Criteria and ISDN Testing
Application Software Interfaces
Cost Justification Worksheet
I.ps Index


All of the above files are uncompressed PostScript files and may
be FTPed using the text/ASCII option.

The Catalog is a publicly available document and may be
distributed and used freely with proper recognition of the source.

%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

SPRINT EXPANDS PRESENCE IN CHINA, INTRODUCES NEW SERVICES


Interesting press release I thought you might like.

THIS RELEASE WAS DISTRIBUTED IN CHINA ONLY.
Contacts: Janis Langley, (O) 202-828-7427

BEIJING, March 21, 1994 -- Sprint today announced a
significant expansion of its presence, and product and service
offerings, in China. Sprint also announced the immediate availability
of three of those services -- a toll-free Sprint Express(R) number for
calling worldwide and for collect calling to the United States, a
prepaid calling card, and CLEARLINE(R) international private-line
service.

Sprint made the announcements today at a press briefing and
two-day seminar to inform customers and leading Chinese organizations
of the company's expanded local capabilities.

Sprint is one of the largest telecommunications carriers in
the United States, providing innovative calling services to nearly 8
million customers in that country alone. Sprint offers voice, video
and data communications services worldwide via some of the world's
largest and most advanced networks.

Sprint is a pioneer and innovator in technology. It built
the first nationwide (40,000 kilometer) all-digital, fiber-optic
network in the United States. It also is the first carrier to offer
such advanced services as Asynchronous Transfer Mode -- a broadband
service that simultaneously carries voice, data and image -- and a
voice-recognition calling card that automatically dials frequently
called numbers with a single-word command, such as "home" or "office."

Sprint has operated locally in China since 1992 through an
office in Beijing that primarily offered data communications systems
support for the company's growing customer base. Its Beijing office
now has expanded to 15 employees who represent the company's
increasingly diverse capabilities in consumer services, including the
Sprint Prepaid Calling Card and Sprint FONCARD(SM); international
network solutions for large-scale multinational users; data
communications systems and services; and international carrier
services to provide transit and capacity for telecommunications
carriers worldwide.

Sprint China will immediately begin to offer several of
Sprint's versatile and cost-effective calling products: a toll-free
Sprint Express number for global calling and collect calls to the
United States; Sprint's Prepaid Calling Card; and its CLEARLINE
international private line service.

o Sprint Express -- By dialing "108-13," callers in China can
place collect calls to family and colleagues in the United States,
and also charge calls to the United States and worldwide using
their major credit card or Sprint FONCARD. Operator assistance is
available in English, with Mandarin support planned.

o Sprint's Prepaid Calling Card, which initially will be
available only through a limited market test, lets consumers pre-
purchase calling credits that they can use from any telephone
without needing exact change. The card carries attractive
designer graphics -- suitable for collectors -- and offers the
added convenience of operator assistance.

Callers can use the prepaid calling card from nearly 30
countries for calls to virtually any other country worldwide --
including the United States. Mandarin-language instructions are
available for calls from China (by dialing 108-16). The card can also
be used in more than 28 countries worldwide to make calls back to
China or to virtually anywhere in the world.

o CLEARLINE international private-line service lets
large-scale users consolidate their international calling to receive
volume discounts. The service is provided via Sprint's worldwide
network, which extends from the United States through its
participation in virtually every major submarine fiber-optic cable
system project.

"Sprint has been active in China for several years, and we
are delighted to be able to expand our commitment to users in this
important market by offering some of the other feature-rich, cost
effective products popular in the United States and worldwide," said
Herb Bradley, China country manager for Sprint International, Sprint's
global telecommunications subsidiary.

"We believe that businesses and consumers will benefit from
these innovative services as much in China as they have in the United
States, and we look forward to building on strong relationships we
have formed with many Chinese organizations in delivering these new
services," he said.

Elsewhere in the Pacific Rim, Sprint has data network points
of presence in Hong Kong, Indonesia, Japan, Korea, Taiwan, Singapore,
Australia and New Zealand. It also has an office in Hong Kong, which
provides sales and technical support for Sprint's business interests
in Hong Kong, Indochina, Indonesia, Malaysia, the Philippines, Taiwan,
Thailand and Singapore.

Sprint operates fiber-optic and value-added networks that are
among the world's largest, offering voice services to over 290
countries and locations, packet-switched data links to more than
120 countries and international locations, and video services via
one of the world's largest videoconferencing networks, serving
nearly 40 countries. Sprint also has U.S. cellular operations that
serve 42 metropolitan markets and more than 50 rural service
areas. The company has more than 50,000 employees and has
operations in six continents through more than 50 subsidiaries,
joint ventures and distributors. Sprint's customers include 80
percent of the 500 largest U.S. industrial corporations (the
"Fortune 500"), and the U.S. federal government, which awarded
Sprint a contract to provide 40 percent of the government's total
long distance services, and data and video services, over a
10-year period.

%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

SOCIAL SECURITY FAQ
HOW TO GET INFORMATION AND HOW TO PROTECT YOUR OWN

By Chris Hibbert (hibbert@netcom.com)
Computer Professionals For Social Responsibility

Many people are concerned about the number of organizations asking for their
Social Security Numbers. They worry about invasions of privacy and the
oppressive feeling of being treated as just a number. Unfortunately, I
can't offer any hope about the dehumanizing effects of identifying you with
your numbers. I *can* try to help you keep your Social Security Number
from being used as a tool in the invasion of your privacy.

Surprisingly, government agencies are reasonably easy to deal with; private
organizations are much more troublesome. Federal law restricts the agencies
at all levels of government that can demand your number and a fairly
complete disclosure is required even if its use is voluntary. There are no
comparable Federal laws restricting the uses non-government organizations
can make of it, or compelling them to tell you anything about their plans.
Some states have recently enacted regulations on collection of SSNs by
private entities. With private institutions, your main recourse is refusing
to do business with anyone whose terms you don't like. They, in turn, are
allowed to refuse to deal with you on those terms.


Short History

Social Security numbers were introduced by the Social Security Act of 1935.
They were originally intended to be used only by the social security
program. In 1943 Roosevelt signed Executive Order 9397 which required
federal agencies to use the number when creating new record-keeping systems.
In 1961 the IRS began to use it as a taxpayer ID number. The Privacy Act of
1974 required authorization for government agencies to use SSNs in their
data bases and required disclosures (detailed below) when government
agencies request the number. Agencies which were already using SSN as an
identifier before January 1, 1975 were allowed to continue using it. The
Tax Reform Act of 1976 gave authority to state or local tax, welfare,
driver's license, or motor vehicle registration authorities to use the
number in order to establish identities. The Privacy Protection Study
Commission of 1977 recommended that the Executive Order be repealed after
some agencies referred to it as their authorization to use SSNs. I don't
know whether it was repealed, but no one seems to have cited EO 9397 as
their authorization recently.

Several states use the SSN as a driver's license number, while others record
it on applications and store it in their database. Some states that
routinely use it on the license will make up another number if you insist.
According to the terms of the Privacy Act, any that have a space for it on
the application forms should have a disclosure notice. Many don't, and
until someone takes them to court, they aren't likely to change. (Though
New York recently agreed to start adding the notice on the basis of a letter
written by a reader of this blurb.)

The Privacy Act of 1974 (Pub. L. 93-579) requires that any federal, state,
or local government agency that requests your Social Security Number has to
tell you four things:

1: Whether disclosure of your Social Security Number is required or
optional,

2: What statute or other authority they have for asking for your number,

3: How your Social Security Number will be used if you give it to them, and

4: The consequences of failure to provide an SSN.

In addition, the Act says that only Federal law can make use of the Social
Security Number mandatory. So anytime you're dealing with a government
institution and you're asked for your Social Security Number, just look for
the Privacy Act Statement. If there isn't one, complain and don't give your
number. If the statement is present, read it. If it says giving your
Social Security Number is voluntary, you'll have to decide for yourself
whether to fill in the number.


Private Organizations

The guidelines for dealing with non-governmental institutions are much more
tenuous. Most of the time private organizations that request your Social
Security Number can get by quite well without your number, and if you can
find the right person to negotiate with, they'll willingly admit it. The
problem is finding that right person. The person behind the counter is
often told no more than "get the customers to fill out the form completely."

Most of the time, you can convince them to use some other number. Usually
the simplest way to refuse to give your Social Security Number is simply to
leave the appropriate space blank. One of the times when this isn't a
strong enough statement of your desire to conceal your number is when
dealing with institutions which have direct contact with your employer.
Most employers have no policy against revealing your Social Security Number;
they apparently believe that it must be an unintentional slip when an
employee doesn't provide an SSN to everyone who asks.

Public utilities (gas, electric, phone, etc.) are considered to be private
organizations under the laws regulating SSNs. Most of the time they ask for
an SSN, and aren't prohibited from asking for it, but they'll usually relent
if you insist. Ask to speak to a supervisor, insist that they document a
corporate policy requiring it, ask about alternatives, ask why they need it
and suggest alternatives.

Lenders and Borrowers
(those who send reports to the IRS)

Banks and credit card issuers and various others are required by the IRS to
report the SSNs of account holders to whom they pay interest or when they
charge interest and report it to the IRS. If you don't tell them your
number you will probably either be refused an account or be charged a
penalty such as withholding of taxes on your interest.

Most banks send your name, address, and SSN to a company called ChexSystem
when you open an account. ChexSystem keeps a database of people whose
accounts have been terminated for fraud or chronic insufficient funds in the
past 5 years. ChexSystems is covered by the Fair Credit Reporting Act, and
the bank is required to let you know if it refuses to open your account
and a report from ChexSystems was a factor. You can also send a letter to
ChexSystems directly and request a copy of your report.

Many Banks, Brokerages, and other financial institutions have started
implementing automated systems to let you check your balance. All too often,
they are using SSNs as the PIN that lets you get access to your personal
account information. If your bank does this to you, write them a letter
pointing out how common it is for the people with whom you have financial
business to know your SSN. Ask them to change your PIN, and if you feel
like doing a good deed, ask them to stop using the SSN as a default
identifier for their other customers. Some customers will believe that
there's some security in it, and be insufficiently protective of their
account numbers.

Sometimes banks provide for a customer-supplied password, but are reluctant
to advertise it. The only way to find out is to ask if they'll let you
provide a password. (This is reportedly true of Citibank Visa, e.g. They
ask for a phone number but are willing to accept any password.)

When buying (and possibly refinancing) a house, most banks will now ask for
your Social Security Number on the Deed of Trust. This is because the
Federal National Mortgage Association recently started requiring it. The
fine print in their regulation admits that some consumers won't want to give
their number, and allows banks to leave it out when pressed. [It first
recommends getting it on the loan note, but then admits that it's already on
various other forms that are a required part of the package, so they already
know it. The Deed is a public document, so there are good reasons to refuse
to put it there, even though all parties to the agreement already have
access to your number.]

Insurers, Hospitals, Doctors

No laws require medical service providers to use your Social Security Number
as an ID number (except for Medicare, Medicaid, etc.) They often use it
because it's convenient or because your employer uses it to identify
employees to its groups health plan. In the latter case, you have to get
your employer to change their policies. Often, the people who work in
personnel assume that the employer or insurance company requires use of the
SSN when that's not really the case. When a previous employer asked for my
SSN for an insurance form, I asked them to try to find out if they had to
use it. After a week they reported that the insurance company had gone
along with my request and told me what number to use. Blood banks also ask
for the number but are willing to do without if pressed on the issue.
After I asked politely and persistently, the blood bank I go to agreed that
they didn't have any use for the number. They've now expunged my SSN from
their database, and they seem to have taught their receptionists not to
request the number.

Most insurance companies share access to old claims through the Medical
Information Bureau. If your insurance company uses your SSN, other
insurance companies will have a much easier time finding out about your
medical history. You can get a copy of the file MIB keeps on you by writing
to Medical Information Bureau, P.O. Box 105, Essex Station, Boston, MA
02112. Their phone number is (617)426-3660.

If an insurance agent asks for your Social Security Number in order to
"check your credit", point out that the contract is invalid if your check
bounces or your payment is late. They don't need to know what your credit
is like, just whether you've paid them.

Children

The Family Support Act of 1988 (Pub. L. 100-485) requires states to require
parents to give their Social Security Numbers in order to get a birth
certificate issued for a newborn. The law allows the requirement to be
waived for "good cause", but there's no indication of what may qualify.

The IRS requires taxpayers to report SSNs for dependents over one year of
age, but the requirement can be avoided if you're prepared to document the
existence of the child by other means if challenged. The law on this can be
found at 26 USC 6109. The penalty for not giving a dependant's number is
only $5. Several people have reported that they haven't provided SSNs for
their dependents for several years, and haven't been challenged by the IRS.

Universities and Colleges

Universities that accept federal funds are subject to the Family Educational
Rights and Privacy Act of 1974 (the "Buckley Amendment"), which prohibits
them from giving out personal information on students without permission.
There is an exception for directory information, which is limited to names,
addresses, and phone numbers, and another exception for release of
information to the parents of minors. There is no exception for Social
Security Numbers, so covered Universities aren't allowed to reveal students'
numbers without their permission. In addition, state universities are bound
by the requirements of the Privacy Act, which requires them to provide the
disclosures mentioned above. If they make uses of the SSN which aren't
covered by the disclosure they are in violation.

Why SSNs are a bad choice for UIDs in data bases

Database designers continue to introduce the Social Security Number as the
key when putting together a new database or when re-organizing an old one.
Some of the qualities that are (often) useful in a key and that people think
they are getting from the SSN are Uniqueness, Universa

  
lity, Security, and
Identification. When designing a database, it is instructive to consider
which of these qualities are actually important in your application; many
designers assume unwisely that they are all useful for every application,
when in fact each is occasionally a drawback. The SSN provides none of
them, so designs predicated on the assumption that it does provide them will
fail in a variety of ways.

Uniqueness

Many people assume that Social Security Numbers are unique. They were
intended by the Social Security Administration to be unique, but the SSA
didn't take sufficient precautions to ensure that it would be so. They have
several times given a previously issued number to someone with the same name
and birth date as the original recipient, thinking it was the same person
asking again. There are a few numbers that were used by thousands of people
because they were on sample cards shipped in wallets by their manufacturers.
(One is given below.)

The passage of the Immigration reform law in 1986 caused an increase in the
duplicate use of SSNs. Since the SSN is now required for employment,
illegal immigrants must find a valid name/SSN pair in order to fool the INS,
and IRS long enough to collect a paycheck. Using the SSN when you can't
cross-check your database with the SSA means you can count on getting some
false numbers mixed in with the good ones.

Universality

Not everyone has a Social Security Number. Foreigners are the primary
exception, but many children don't get SSNs until they're in school. They
were only designed to be able to cover people who were eligible for Social
Security.

Identification

Few people ever ask to see an SSN card; they believe whatever you say. The
ability to recite the number provides little evidence that you're associated
with the number in anyone else's database.

There's little reason to carry your card with you anyway. It isn't a good
form of identification, and if your wallet is lost or stolen, it provides
another way for the thief to hurt you, especially if any of your banks use
the SSN as your PIN.

Security

The card is not at all forgery-resistant, even if anyone did ever ask for
it. The numbers don't have any redundancy (no check-digits) so any 9-digit
number in the range of numbers that have been issued is a valid number.
It's relatively easy to copy the number incorrectly, and there's no way to
tell that you've done so.

In most cases, there is no cross-checking that a number is valid. Credit
card and checking account numbers are checked against a database almost
every time they are used. If you write down someone's phone number
incorrectly, you find out the first time you try to use it.



Why you should resist requests for your SSN

When you give out your number, you are providing access to information about
yourself. You're providing access to information that you don't have the
ability or the legal right to correct or rebut. You provide access to data
that is irrelevant to most transactions but that will occasionally trigger
prejudice. Worst of all, since you provided the key, (and did so
"voluntarily") all the info discovered under your number will be presumed to
be true, about you, and relevant.

A major problem with the use of SSNs as identifiers is that it makes it hard
to control access to personal information. Even assuming you want someone
to be able to find out some things about you, there's no reason to believe
that you want to make all records concerning yourself available. When
multiple record systems are all keyed by the same identifier, and all are
intended to be easily accessible to some users, it becomes difficult to
allow someone access to some of the information about a person while
restricting them to specific topics.

Unfortunately, far too many organizations assume that anyone who presents
your SSN must be you. When more than one person uses the same number, it
clouds up the records. If someone intended to hide their activities, it's
likely that it'll look bad on whichever record it shows up on. When it
happens accidentally, it can be unexpected, embarrassing, or worse. How do
you prove that you weren't the one using your number when the record was
made?


What you can do to protect your number

If despite your having written "refused" in the box for Social Security
Number, it still shows up on the forms someone sends back to you (or worse,
on the ID card they issue), your recourse is to write letters or make phone
calls. Start politely, explaining your position and expecting them to
understand and cooperate. If that doesn't work, there are several more
things to try:

1: Talk to people higher up in the organization. This often works
simply because the organization has a standard way of dealing
with requests not to use the SSN, and the first person you deal
with just hasn't been around long enough to know what it is.

2: Enlist the aid of your employer. You have to decide whether talking
to someone in personnel, and possibly trying to change
corporate policy is going to get back to your supervisor and
affect your job.

3: Threaten to complain to a consumer affairs bureau. Most newspapers
can get a quick response. Ask for their "Action Line" or
equivalent. If you're dealing with a local government agency,
look in the state or local government section of the phone book
under "consumer affairs." If it's a federal agency, your
congressmember may be able to help.

4: Insist that they document a corporate policy requiring the number.
When someone can't find a written policy or doesn't want to
push hard enough to get it, they'll often realize that they
don't know what the policy is, and they've just been following
tradition.

5: Ask what they need it for and suggest alternatives. If you're
talking to someone who has some independence, and they'd like
to help, they will sometimes admit that they know the reason
the company wants it, and you can satisfy that requirement a
different way.

6: Tell them you'll take your business elsewhere (and follow through if
they don't cooperate.)

7: If it's a case where you've gotten service already, but someone
insists that you have to provide your number in order to have a
continuing relationship, you can choose to ignore the request
in hopes that they'll forget or find another solution before
you get tired of the interruption.

If someone absolutely insists on getting your Social Security Number, you
may want to give a fake number. There are legal penalties for providing
a false number when you expect to gain some benefit from it. A federal
court of appeals ruled that using a false SSN to get a Driver's License
violates the federal law.

There are a few good choices for "anonymous" numbers. Making one up at
random is a bad idea, as it may coincide with someone's real number and
cause them some amount of grief. It's better to use a number like
078-05-1120, which was printed on "sample" cards inserted in thousands of
new wallets sold in the 40's and 50's. It's been used so widely that both
the IRS and SSA recognize it immediately as bogus, while most clerks haven't
heard of it.

There are several patterns that have never been assigned, and which
therefore don't conflict with anyone's real number. They include numbers
with any field all zeroes, and numbers with a first digit of 8 or 9.
For more details on the structure of SSNs and how they are assigned, use
anonymous ftp to retrieve the file:
/cpsr/privacy/ssn/SSN-structure from the machine cpsr.org.

Giving a number with an unused patterns rather than your own number isn't
very useful if there's anything serious at stake since they're likely to be
noticed . The Social Security Administration recommends that people showing
Social Security cards in advertisements use numbers in the range 987-65-4320
through 987-65-4329.

If you're designing a database or have an existing one that currently uses
SSNs and want to use numbers other than SSNs, you should make your
identifiers use some pattern other than 9 digits. You can make them longer
or shorter than that, or include letters somewhere inside. That way no one
will mistake the number for an SSN.

The Social Security Administration recommends that you request a copy of
your file from them every few years to make sure that your records are
correct (your income and "contributions" are being recorded for you, and
no one else's are.) As a result of a recent court case, the SSA has agreed
to accept corrections of errors when there isn't any contradictory evidence,
SSA has records for the year before or after the error, and the claimed
earnings are consistent with earlier and later wages. (San Jose Mercury
News, 5/14, 1992 p 6A) Call the Social Security Administration at
(800) 772-1213 and ask for Form 7004, (Request for Earnings and Benefit
Estimate Statement.)

When All Else Fails
(Getting a Replacement Number)

The Social Security Administration (SSA) will occasionally issue a
replacement SSN. The most common justification is that the SSA or the IRS
has mixed together earnings records from more than one person, and since one
of the people can't be located, it's necessary to issue a new number to the
other. The SSA tries very hard to contact the person who is using the
number incorrectly before resorting to this process.

There are a few other situations that the SSA accepts as justifying a new
number. The easiest is if the number contains the sequences 666 or 13. The
digits need to be consecutive according to SSA's policy manual, but may be
separated by hyphens. You apparently don't have to prove that your religious
objection is sincere. Other commonly accepted complaints include harassment,
sequential numbers assigned to family members, or serious impact on your
credit history that you've tried to clear up without success.

In all cases, the process includes an in-person interview at which you have
to establish your identity and show that you are the original assignee of
the number. The decision is normally made in the local office. If the
problem is with a credit bureau's records, you have to show that someone
else continues to use your number, and that you tried to get the credit
bureau to fix your records but were not successful. When they do issue a
new number, the new recoreds are linked to the old ones. (Unless you can
convince them that your life might be endangered by such a link.)

There are a few justifications that they don't accept at all: attempting to
avoid legal responsibilities, poor credit record which is your own fault,
lost SSNm card (without evidence that someone else has used it), or use of
the number by government agencies or private companies.

The only justification the SSA accepts for cancelling the issuance of an SSN
is that the number was assigned under their Enumeration at Birth (wherein
SSNs are assigned when birth certificates are issued) program without the
parent's consent. In this case, the field officer is instructed to try very
hard to convince the parent that getting the number revoked is futile, but
to give in when the parent is persistent.

US Passports

The application for US Passports (DSP-11 12/87) requests a Social Security
Number, but gives no Privacy Act notice. There is a reference to "Federal
Tax Law" and a misquotation of Section 6039E of the 1986 Internal Revenue
Code, claiming that the section requires that you provide your name, mailing
address, date of birth, and Social Security Number. The referenced section
only requires TIN (SSN), and it requires that it be sent to the IRS and not
to the Passport office. It appears that when you apply for a passport, you
can refuse to reveal your SSN to the passport office, and instead mail a
notice to the IRS, giving only your SSN (other identifying info optional)
and notifying them that you are applying for a passport. [Copies (in
postscript) of the letter that was used by one contributor (The measure of
his success is that he didn't hear back from any with complaints.) are
available by anonymous ftp from cpsr.org in /cpsr/privacy/ssn/passport.ps.Z.
I'd be interested in hearing how the State department and the Post Office
(which processes passport applications) react.]


Results from Some Recent Legal Cases (3/24/93)

CPSR joined two legal cases in 1992 which concerned Social Security Numbers
and privacy. One of them challenged the IRS practice of printing Social
Security Numbers on mailing labels when they send out tax forms and related
correspondence. The other challenged Virginia's requirement of a Social
Security Number in order to register to vote.

Dr. Peter Zilahy Ingerman filed suit against the IRS in Federal District
Court in 1991, and CPSR filed a friend of the court brief in August '91. The
case was decided in favor of the IRS. According to "Privacy Journal", the
IRS plans to start covering the SSNs on its mailing labels, but they made
the decision too late to affect this year's returns. Some people got a
version that hid their numbers, but it was apparently a pilot project in
limited areas. |

The Virginia case was filed by a resident who refused to supply a Social
Security Number when registering to vote. When the registrar refused to
accept his registration, he filed suit. He also challenged Virginia on two
other bases: the registration form lacked a Privacy Act notice, and the
voter lists they publish include Social Security Numbers. The Federal court
of appeals ruled that Virginia may not require the disclosure of Social
Security numbers as a condition of registering to vote. The court said that
the Virginia requirement places an "intolerable burden" on the right to
vote. The case is officially referred to as Greidinger v. Davis, No.
92-1571, Fourth Circuit Court of Appeals, March 22, 1993.


If you have suggestions for improving this document please send them to me
at:
Chris Hibbert
hibbert@netcom.com or 1195 Andre Ave.
Mountain View, CA 94040



New versions of this posting are always available using any of the
following mechanisms. You can use anonymous ftp from the following
sites:

Site Location

rtfm.mit.edu /pub/usenet-by-hierarchy/news/answers/ssn-privacy
ftp.pica.army.mil /pub/privacy/ssn-privacy.faq
ftp.cpsr.org /cpsr/privacy/ssn/Social_Security_Number_FAQ

Gopher can retrieve it from gopher.cpsr.org. World Wide Web (www) can
find it using the following locator (and probably several others you
could construct from the other directions I've given):

http://polar.pica.army.mil/ssn_faq.html

You can also retrieve it by sending email to

Address Command (omit the quotes)

listserv@cpsr.org "GET cpsr/privacy/ssn Social_Security_Number_FAQ"
mail-server@rtfm.mit.edu
"send usenet-by-hierarchy/news/answers/ssn-privacy"

You can also ask for general help from either of these email servers by
sending a message to the same address with just "help" in the body.

%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

CLIPPER CHIP IS YOUR FRIEND, NSA CONTENDS
NSA Seeks to Dispel Misgivings of Public About Clipper Chip

By Bob Davis

Staff Reporter of The Wall Street Journal.
(C)1994 Wall Street Journal

FORT MEADE, Md. --- The National Security Agency wants everyone to know
that its new computer-security system will protect individual privacy.
But as the spy agency knows, hardly anyone believes that.

Critics fear the government will use the NSA technology, designed in
secret, to spy on Americans. The project "is a focal point for the
distrust of government," acknowledges Clinton Brooks, the NSA scientist
who led the so-called Clipper Chip project, in the agency's first
interview on the subject.

The Clinton administration last month adopted the NSA plan for a series
of computer chips that would protect telephones and computers. Use
of the technology would be voluntary. Federal agencies would adopt it
first, and public use is expected to spread gradually.

Under the plan, cryptographic "keys" that could unscramble the
communications would be split in two and held separately at the Treasury
Department and the National Institute of Standards and Technology. That
way, law-enforcement agents could tap the communications by getting court
authorization to obtain the two halves. The idea is to boost security
but to keep the technology out of the hands of criminals and spies.

The NSA is the world's biggest eaves-dropper. Equipped with the latest
in super-computers and satellite receivers, it targets communications by
foreign governments. The agency shuns publicity but agreed to the
interview to explain its role in the Clipper controversy and try to
dispel fears. Mr. Brooks, a 26-year veteran of the NSA, says the project
began in 1989 and cost more than $2.5 million.

He says the NSA is consumed with what it calls the "equities problem" ---
how to balance privacy rights against the needs of law enforcement,
national security and private industry. In 1989, he and Raymond Kammer,
deputy director of NIST, began discussions about how to improve computer
security without making it impenetrable to police. NIST is a Commerce
Department agency with formal responsibility for unclassified computer
security.

Before the interview, Mr. Brooks takes a look around a small cryptographic
museum just outside the NSA's gates. He stands before an exhibit of
Enigma machines, used by the Germans during World War II to encrypt
messages --- and later broken by Allied intelligence. Enigma started as
a commercial product; recognizing its military value, the Nazis pulled
it off the market. "That was the concern we're wrestling with today,"
Mr. Brooks says --- commercial encryption technology becoming so good that
U.S. spy agencies can't crack it.

In 1989, NIST and the NSA put together an eight-person team, split evenly
between the agencies, to quietly work out security concepts. The team
decided against using a weak encryption code --- "Roman Numeral One is
that it had to be good security," says Mr. Brooks. And it also rejected
a so-called trapdoor approach, in which the computer code would be
designed so it would have a weak spot --- a trapdoor --- that federal
agencies could enter via computer to tap the communications. Someone else
could discover the trapdoor, they decided.

The team settled on a system with a powerful encryption formula, called
an algorithm, and encryption keys that would be held by outsiders. Law-
enforcement agencies could get copes of the keys when they needed to bug
the conversations. The toughest decision, both Mr. Brooks and Mr. Kammer
say, was to keep the algorithm, dubbed the Skipjack, secret. That meant
the public wouldn't know for sure whether the NSA had inserted a trapdoor
or some other eavesdropping device.

"It would defeat the purpose [of the project] if we gave the knowledge
of how the algorithm worked" to the public, says the 56-year-old Mr.
Brooks. "It was going to have to be kept classified." Otherwise, he
explains, engineers could use the algorithm to design computer-security
systems that the government's encryption keys couldn't unlock.

By 1990, he says, as many as 30 NSA "cryptomathematicians" and other
employees were working to perfect the algorithm and other features. A
year later, the NSA launched what it called the Capstone Project to build
the algorithm into a computer chip. The NSA contracted with Mykotronx
Inc., a small company in Torrance, Calif., to do much of the development.
By September 1992, the NSA was confident the system would work.

None too early for the NSA. Earlier that year, Mr. Brooks says, American
Telephone & Telegraph Co. informed the NSA that it wanted to sell a
phone using a popular encryption technology to scramble conversations.
The NSA balked. "We said it probably wouldn't get an export license
from this country," Mr. Brooks says. Instead, AT&T was told of the
Capstone work and agreed to use the technology if it became a federal
standard and was exportable, he says. The NSA then took some of the
functions of the Capstone chip and tailored it to phone equipment, calling
the resulting product the Clipper Chip. For computers, Capstone was
encased on a computer card that became known as Tessera.

The the Bush administration, enmeshed in a re-election bid, never pushed
Capstone. So shortly after the election, National-security heavyweights
importuned the Clinton transition team to move quickly on Capstone. Just
weeks after the inauguration, the new administration's national-security
team was debating the NSA proposal and in April announced to the public
that it would adopt the scheme.

Last month, the administration gave the final go-ahead --- despite
withering criticism from industry. Vice President Gore called encryption
a "law and order issue." NIST's Mr. Kammer says the new administration
was also trying to line up backing among national-security officials to
liberalize export controls on computer equipment and other high-tech
gear.

The high-tech industry was stunned at the decision. David Peyton, vice
president of the Information Technology Association of America, a trade
group of computer companies, says the scheme will dangerously centralize
power in the federal government and will limit exports. James Bidzos,
president of a computer-security firm, RSA Data Security Inc., goes
further. He posted a letter on the Internet computer network arguing
that Clipper may be the "visible portion of a large-scale covert
operation on U.S. soil by NSA."

Nonsense, responds Mr. Brooks, who says he is distressed by the
"emotionalism" of the arguments. "The only reason we're involved is
that we have the best cryptomathematicians in the country."

%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

In the super-state, it really does not matter at all what
actually happened. Truth is what the government chooses
to tell you. Justice is what it wants to happen.
--Jim Garrison, New Orleans District Attorney

%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos from Google Play

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT