Computer underground Digest Tue June 7, 1994 Volume 6 : Issue 50 ISSN 1004-042X Editors: J
Computer underground Digest Tue June 7, 1994 Volume 6 : Issue 50
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
Archivist: Brendan Kehoe
Retiring Shadow Archivist: Stanton McCandlish
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Copy Dittoer: Etaoian Shrdlu
CONTENTS, #6.50 (June 7, 1994)
File 1--Ghost in the Modem (Loka Alert 1:6 Wash. Post) (fwd)
File 2--VR evidence in court cases
File 3--Electronic Privacy Petition (Texas)
File 4--Re: "Problems at TCOE" (CuD 6.47)
File 5--Trade-secrets case (Schrader/Hauser) dropped - Summary
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.
CuD is available as a Usenet newsgroup: comp.society.cu-digest
Or, to subscribe, send a one-line message: SUB CUDIGEST your name
Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.
EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
In ITALY: Bits against the Empire BBS: +39-461-980493
UNITED STATES: etext.archive.umich.edu (220.127.116.11) in /pub/CuD/
ftp.eff.org (18.104.22.168) in /pub/Publications/CuD
aql.gatech.edu (22.214.171.124) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.
DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.
Date: Sun, 29 May 1994 21:01:06
From: Phil Agre
Subject: File 1--Ghost in the Modem (Loka Alert 1:6 Wash. Post) (fwd)
Date--Sun, 29 May 1994 22:40:43 -0500 (EST)
Loka Alert 1:6 (May 29, 1994)
>From the Sunday _Washington Post_:
IF INFORMATION HIGHWAYS ARE ANYTHING LIKE
INTERSTATE HIGHWAYS--WATCH OUT!
Friends and Colleagues:
This is one in an occasional series of e-mail postings on
democratic politics of science and technology, issued by The Loka
Institute. You are welcome to post it anywhere you feel is
appropriate. The following essay, written by Loka Institute
members, is reprinted from the Outlook Section of _The Washington
Post_, Sunday, May 29, 1994.
Executive Director, The Loka Institute, P.O. Box 355,
Amherst, MA 01004-0355, USA
Tel. 413 253-2828; Fax 413 253-4942
THE GHOST IN THE MODEM
For Architects of the Info-Highway, Some Lessons
From the Concrete Interstate
By Richard Sclove and Jeffrey Scheuer
Vice President Gore envisions the information superhighway as the
second coming of the interstate highway system championed by his
father, former U.S. Senator Al Gore, a generation ago. Let us hope
that the junior Gore is proven wrong. Rush-hour fatality rates, air
pollution, global warming, depletion of world oil reserves--have we
forgotten all of the interstate highway system's most familiar
It's not that Gore's analogy is wrong, only that his enthusiasm
is misplaced. Comparing the electronic and asphalt highways is
useful--but mostly as a cautionary tale. Building the new information
infrastructure will not entail the degree of immediate, physical
disruption caused by the interstate highway system. But sweeping
geographic relocations, and accompanying social transformations, seem
probable. And the risk of inequity in contriving and distributing
electronic services--or, conversely, imposing them where they are not
Indeed, disparities in access to new information systems have
already begun to surface. A study released this past week by a group
of public interest organizations, including the National Association
for the Advancement of Colored People and the Center for Media
Education, notes that low-income and minority communities are
underrepresented in U.S. telephone companies's initial plans for
installing advanced communications networks.
Unequal access is only the most obvious among many social
repercussions that may lie in store for us. The real history of the
interstate highway system suggests how we can think about and control
the vast implications of new technologies and a new national public
It is widely assumed that Americans' infatuation with cars led to
the construction of America's superhighways. But actually when
Congress passed the Interstate Highway Act in 1956, car sales were
slack, and there was no popular clamor for building a new road system.
At the time only about half of American families owned an automobile;
everyone else depended on public transportation. Congress was
responding to aggressive lobbying by auto makers and road builders,
plus realtors who saw profits in developing suburban subdivisions.
The act's key provisions included support for bringing freeways
directly into city centers and earmarking gasoline tax revenues for
highway construction. As the interstate highways were built, city and
suburban development adapted to the quickening proliferation of autos.
Soon more Americans found themselves forced to buy a car in order to
be able to shop or hold a job. The Highway Trust Fund, by assuring
the rapid atrophy of competing public transit systems, bolstered this
Thus the asphalt highways--and the society around them--are a
reflection of successful lobbying by powerful business interests and
external compulsion, not simply the free choices of consumers. There
is no guarantee that the process of wiring consumers and employees
into the electronic highway system will be different.
The effects of the interstate highway system on American
communities were profound, especially in the cities. As historian
James Flink notes, "Ambitious programs for building urban freeways
resulted in the massive destruction of once viable poor and minority
neighborhoods." In other cases, new highways encircled poor
neighborhoods, physically segregating minorities into marginalized
Gradually, a black and Hispanic middle-class did emerge. Its
members too fled along the interstate to the suburbs, further draining
economic and cultural resources from the inner city. This contributed
to the emergence of a new social phenomenon: today's desperately
deprived, urban underclass.
Elsewhere the effects were subtler but still significant. The
noise and danger from growing numbers of autos drove children's games
out of the street, and neighbors and families off their front porches.
Before long, suburbs without sidewalks came to signal an unprecedented
paucity of local destinations worth walking to. Suburban housewives
found themselves leading increasingly isolated daytime lives at home.
Highways made shopping malls possible, enabling franchise and
chain store sales to boom. But this sapped downtown centers.
For some teenagers and senior citizens, today's anonymous,
consumption-mad expanses provide a semblance of community
space--having swallowed up the general store, the soda fountain, the
Main Street sidewalk, and the town square. There is ample danger of
the new electronic technology extending these losses.
Remember too that it is easy to romanticize new technology. The
popular arts glorified life on the highway. People read Jack
Kerouac's "On the Road," watched "Route 66" on television, and recall
the Merry Pranksters' psychedelic bus-capades during the '60s. In
fusing alienation and rebellion with youthful exuberance, each of
these foreshadows contemporary cyberpunk culture. Yet real-life
experience on the interstate is mostly banal and uneventful.
McDonald's, Pizza Hut, and Wal-Mart look about the same wherever you
There are also political ramifications of a vast new public
infrastructure. Interstate highways contributed to national and even
international economic integration. But while GNP soared, mom-and-pop
production and retailing declined. That meant greater local
dependence on national and global market forces and on distant
corporate headquarters--powers that communities simply couldn't
control. The locus of effective political intervention thus shifted
toward more distant power centers. But because those are realms in
which everyday citizens cannot be as effectual as in smaller political
settings, democracy was impaired.
If the growth of the highways is revealing, so too is the
opposition to freeway construction that emerged. As citizens became
more politically mobilized during the 1960's and early '70s,
opposition to relentless highway expansion arose from
environmentalists and from local communities, both rich and poor.
Transportation engineers reeled at the specter of upright citizens
rejecting their good works. Many current telecommunications engineers
and true-believing entrepreneurs are no less convinced of the
unalloyed beneficence of their art.
The importance of the analogy between the information and asphalt
highways lies in the political procedures that create them. What if a
wider range of people, including non-car owners, had been involved in
transportation planning all along? Considering the alternatives
envisioned by critics such as Lewis Mumford, it seems likely we would
have a smaller and different road system today. As in Europe and
Japan, there probably would have been greater investment in public
transit. Modern America might exhibit less sprawl, less dependence on
foreign oil, and more cohesive urban neighborhoods.
Three lessons for the construction of the information
superhighway suggest themselves:
o _No Innovation Without Evaluation_: To help reduce adverse
social impact, the federal government should mandate evaluated social
trials of alternative electronic services. Analogous to environmental
impact statements, these trials should precede full-scale deployment
of any major components of new information infrastructures.
o _No Innovation Without Regulation_: We should conserve
cultural space for face-to-face social engagement, traditional forms
of community life, off-screen leisure activities and time spent in
nature. How about a modest tax on electronic home shopping and
consumer services, rebating the revenue to support compensatory, local
o _No Innovation Without Participation_: A number of European
nations are out-competing America in including lay people in
technology decision-making. For instance, the Danish government
appoints panels of everyday citizens to cross-examine a range of
experts, deliberate among themselves and then publish their own social
assessments of technological alternatives. Sweden, Norway and Germany
have pioneered processes for involving workers directly in designing
new production systems.
The coming revolution in information systems is going to change
life for everyone--including the multitude who, by circumstance or
choice, never use computers. It is imperative to develop mechanisms
for involving all segments of our society in designing, evaluating and
governing these new systems.
Data highway enthusiasts may see such measures as wasteful
obstructions of market forces. But what entrepreneurs call red tape
is really democracy in action.
Richard Sclove is executive director of the Loka Institute in
Amherst, Mass., a public interest research organization concerned with
science, technology and democracy. He also directs the Public
Interest Technology Policy Project at the Institute for Policy
Studies. Jeffrey Scheuer, a New York writer, is a fellow of the Loka
If you would like to be added to, or removed from, the Loka
Institute e-mail list, please send an e-mail message to that
effect to: email@example.com
The Loka Institute is currently raising funds to produce
Technology Watch, a national newsletter on opportunities for
developing more environmentally sound and socially responsive
post-Cold War science and technology policies. Technology Watch
will be used, in turn, to help organize a nationwide network of
public interest and grassroots activists: FASTnet (Federation of
Activists on Science and Technology).
These activities represent a collaborative undertaking of
the Loka Institute and the Institute for Policy Studies (IPS) in
Washington, DC. To support the Loka Institute's work, please
write a check to "IPS--Technology Project," and send it to: IPS,
1601 Connecticut Ave., NW, Washington, DC 20009. Contributions
are tax deductible. Thank you!
Please note: Loka Institute members will be travelling
during much of June 1994. Please forgive us if we are
consequently slow in replying to your comments, queries or
Date: 2 Jun 1994 17:32:22 -0400
From: firstname.lastname@example.org (Stanton McCandlish)
Subject: File 2--VR evidence in court cases
This is simply an informational forward, and does not reflect the policy
or positions of EFF.]
Full text of the article is available from the Venable law firm WWW server
at http://venable.com/vbh.htm, or from EFF's ftp site at ftp.eff.org,
Virtual Reality Evidence -- Summary
By: Jeffrey A. Dunn
In Stephenson v. Honda , (n. 1) the jury viewed a three-dimensional
virtual reality film of terrain over which the plaintiff drove her
motorcycle, from the perspective of the rider of the motorcycle. The
defense argued that the plaintiff should not have attempted to traverse
the terrain, and that a three-dimensional view was necessary to accurately
portray the treacherous nature of the terrain, for which purpose a
two-dimensional photograph or video would have been inadequate. The jury
apparently agreed with the argument that the plaintiff's conduct
constituted comparative negligence, returning a verdict for the defendant.
In view of this kind of result and the potentially explosive impact a
virtual reality presentation might have upon the senses of a jury, virtual
reality may become increasingly popular with attorneys as a means of
presenting evidence in a vivid, realistic, and highly persuasive manner.
Virtual reality has the potential to literally place a jury in another
place -- in its most complete form, virtual reality would include
three-dimensional motion pictures or computer-generated images projected
through special goggles, stereo sound, and a special body suit providing
temperature and pressure. The virtual reality experience could also
include wind, dampness or dryness, and the use of simulators that alter
body-orientation, provide a sense of motion, and create g-forces.
No one suggests that the use of such a complete version of virtual reality
is likely to be permitted by a court at any time in the near future, if
ever, but it is likely that attorneys will attempt to make use of some mix
of the components of virtual reality in cases where such evidence is
likely to be persuasive. However, any attorney attempting to use virtual
reality must first convince the court that the virtual reality evidence
will provide the jury with information that is relevant to the case and
useful to the jury in its deliberations, and that the experience of
virtual reality will not create a likelihood of confusing, misleading, or
inflaming the jury that outweighs its value as evidence. Attorneys may
also have to argue that, in a given case, the virtual reality evidence
will provide information that either is not offered, or not presented as
effectively, by alternative forms of evidence, such as oral testimony,
still photographs, or videos.
There are several types of legal requirements which virtual reality
evidence would have to meet in order to be admitted in a court of law. All
questions of admissibility would be subject to the discretion of the trial
court, not to be reversed absent an abuse of discretion.
First, as with all evidence, virtual reality evidence would have to
provide information to a jury that is relevant. In order to be relevant,
the information must make it more or less likely that some fact of
consequence to the outcome of the litigation is true. In addition, even if
the information were relevant, it must be shown that the degree to which
the information assists the jury in its deliberations is not outweighed by
a tendency to confuse or mislead the jury, or a potential for inflaming
the fears and biases of the jury. In this regard, it may be the case that
the actual information conveyed by a piece of evidence is admissible, but
that the means by which the information is conveyed to the jury is
confusing, misleading, or prejudicial, so that the form of the evidence is
excluded but an alternative form of evidence, such as oral testimony, is
permitted for presenting the same basic information to the jury.
One of the fundamental aspects of virtual reality that may set it apart
from other forms of evidence and create a potential for prejudicing a jury
is that the goal would be to simulate for the jury the experience of
sensing the subject of the presentation first-hand. As a result, jurors
may begin to consciously or subconsciously judge the subject of the
presentation from the perspective of experiencing it themselves, rather
than forming a more objective analysis based upon a consideration of the
relevant party as the participant in the type of events being depicted. As
a result, whatever personal biases the jurors have may be brought to the
forefront to a greater degree than if the evidence were presented in
another manner. For example, a juror experiencing the simulation of an
off-road motorcycle ride may come to think that the ride was overly
dangerous because it would be dangerous and frightening for her, rather
than giving due consideration to the experience, age, reflexes, and other
relevant characteristics of a party who attempted a similar ride.
When demonstrative evidence, such as photographs, tape recordings, or
videotapes, is used, additional concerns are raised over the reliability
and accuracy of the evidence. The degree of accuracy required depends upon
the purpose of the evidence, the degree of accuracy needed to accomplish
that purpose, and the potential for misleading the jury. Similar issues
will undoubtedly be raised by virtual reality evidence.
Additional concerns are raised by some of the possible subjects of
demonstrative evidence, such as reenactments, tests, and jury views.
Reenactments must be substantially similar to the actual events which the
proponent is attempting to recreate. Even the conditions under which tests
are conducted may be required to simply be similar to the conditions
existing at the time that the events which are the subject of the
litigation occurred. On the other hand, tests conducted to demonstrate
principles upon which expert testimony is based may not need to meet the
A jury view is not necessarily an attempt to recreate any particular
events. A view is simply an opportunity for a jury to see a particular
location where relevant events occurred, either to gain additional
information or to help the jury better understand evidence that has
already been presented in the courtroom, such as by means of oral
testimony. A view might also include the observation of such things as the
operation of machinery. Generally, efforts are made before a view takes
place to make the site of the view look as similar as possible to its
appearance at the time that events relevant to the litigation occurred,
and to exclude extraneous information. Nonetheless, a court, as well as
attorneys, lose some control over the information that is presented to a
jury on a view, and each juror is able to take in virtually whatever he
wishes, using all of his senses.
One alternative to a live view that is less disruptive to court
proceedings is a videotaped view. Another alternative would be a virtual
reality view. Advantages of a virtual reality view include the ability to
better control the information presented to the jury, and to exclude
extraneous but potentially inflammatory aspects of the view; less
disruption to court proceedings; a more realistic and therefore more
informative experience than a videotaped view; and, in some cases, greater
safety for the jury.
Virtual reality is a diverse and multi-faceted medium. It cannot be
predicted which types of virtual reality evidence, and which mix of
components of virtual reality, might become useful in all of the many
different types of litigation. Attorneys wishing to admit virtual reality
evidence will have to argue that, in a particular case, the use of virtual
reality will provide relevant information to a jury that cannot be
presented as well, or that cannot be presented at all, by alternative
forms of evidence. Proponents of virtual reality evidence will also have
to argue against assertions that the virtual reality medium will arouse
fears and prejudices not stirred as much by other forms of evidence.
Those who argue for the exclusion of virtual reality evidence in a
particular case should focus on its potential for creating prejudicial
effect. That is, opponents of the evidence should argue that, while the
evidence may be persuasive because it offers useful information, it will
also arouse biases on the part of the jury that could cause the jury to
lean inordinately in one direction in deciding a particular issue. For
example, a virtual reality simulation of a motorcycle ride may cause some
jurors to find that the ride was too dangerous because they think all
motorcycles are dangerous. While a juror might be able to overcome this
bias otherwise, actually being made to see and feel what it is like to
ride a motorcycle on a given course might consciously or subconsciously
frighten the juror to the point of believing that the course was too
dangerous, precisely because of the sensory impact of the presentation,
even though the course may have been perfectly safe for an experienced rider.
Some opponents of virtual reality evidence may also argue that it is novel
scientific evidence, so that, in the majority of federal courts, it should
be subjected to the Frye test requiring that, prior to its admissibility,
novel scientific evidence must have gained general acceptance in its
relevant scientific field. However, while virtual reality evidence is
novel, it is not clear that the evidence it would present should be termed
scientific evidence. If virtual reality were used only to present a jury
with a view of terrain, then the only concern should be that the
representations were accurate, as is the case with other forms of
demonstrative evidence. The information being presented by such evidence
would not include any kind of scientific theories or conclusions. On the
other hand, to the extent that virtual reality would be used in any given
case to present findings of a scientific nature, then the Frye test might
be applicable. The issue of whether virtual reality is novel scientific
evidence may also be clouded by the fact that the determination of the
kind of accuracy and reliability issues raised by all forms of
demonstrative evidence would, in the context of virtual reality evidence,
involve a consideration of the use of a new technology and questions over
whether that new technology had gained acceptance within relevant
scientific or other types of fields as being accurate and reliable.
This summary is not intended to provide legal advice or opinion. Such
advice may only be given when related to specific fact situations.
Note 1: Carolyn Stephenson v. Honda Motors Ltd. of America, No. 81067
(Cal. Sup. Ct. Placer County June 25, 1992). Honda offered the video into
evidence, represented by McKenroth, Seley & Ryan of Sacramento, California.
The full text of this article (59926 bytes) is also available.
Date: Sat, 28 May 1994 21:05:20 -0500 (CDT)
From: David Smith
Subject: File 3--Electronic Privacy Petition (Texas)
Attached is an electronic petition by Nathan Zook (email@example.com) who is
a delegate to the Texas Republican Convention that is happening in the
middle of June. Nathan has drafted seven resolutions concerning
encryption and privacy. He is attempting to collect electronic
signatures in order to approach the Resolutions Committee and have these
resolutions incorporated into the state platform, backed by the support
of Internet support. You need not be from Texas to have your signature
attached. This message consists of the resolutions, the reasons Nathan
drafted these resolutions, and a letter of support. Those who wish to
participate may mark the appropriate spaces and send the form to
Since Nathan thanks me in the text for providing guidance, I feel I
should make a brief note on my participation. I had absolutely no input
on the content of this petition. What guidance I provided was limited to
the mechanics of conducting an electronic petition campaign, and even
then this is not much to my liking, but rather a kludge Nathan thrown
together under deadline pressure. Nonetheless, I strongly support any
attempt to use the political process to open up debate over the future of
thanks, | Even my *mother* is on the Internet now. She wants
| to know why I don't send her e-mail more often.
David Smith |
President, EFF-Austin | -- Keith Goolsbey
---------- Forwarded message ----------
Date--Sat, 28 May 94 10:09:14 -0500
Subject-- Privacy Project, may be a repeat
I just posted this to the newsgroups. Care to participate? ;-))
Sorry for the delay, folks!
I need your signatures by 2100 hrs, 08 June 94. You will notice that
I have broken things down considerably. Thanks to David Smith of
Austin EFF for guidance, and Realtime Communications for technical
support! This is an e-mail petition drive. Please crosspost to all
who may be interested!!
I shall not use this list for solicitation, nor shall I release this
list to anyone who does not agree not to release this list, and not to
use it for solicitation. Exception: I shall present this list to
every elected official I can access.
You shall not receive a confirmation notice. A report will be sent to
the newsgroups. Please fill in the support statement with X's in the
appropriate positions. Do _NOT_ delete part of the statement. Please
include the line of astericks in your letter.
You may retrieve the resolutions list, with form letter, my reasons
list, and the Mass bill by anonymous ftp.
Which ever suits your fancy.
To add your name to the petition, snip the form letter at the bottom of
PrResolutions or of this note. Fill it out, and e-mail it to firstname.lastname@example.org.
DO NOT TRIM THE LETTER!!! PLEASE!!!
Just because you are a 16-year old from Brazil doesn't mean that your
signature doesn't count. Please, everyone that supports this, send it
If you want to use this list to influence _your_ state government,
e-mail me at email@example.com.
I, the undersigned, hearby request that the following resolutions be
added to the platform of the Republican party in the state of Texas,
and that Republican officeholders undertake all legal means to
implement these resolutions:
1) Resolved, that no governmental trapdoor encription standards be
advanced for use in any civilian communication systems. (Clipper
chip, Digital Telephony Act)
2) Resolved, that the Republican party in the state of Texas
petitions Congress that encryption systems or algorithms publicly
available outside the US not be classified as munitions.
3) Resolved, that the Republican party in Texas petitions the US
patent office to reconsider the RSA patent, to narrow its scope to be
in line with the contribution of the authors, and to further the
national interest, in privacy and in commerce.
4) Resolved, that the Republican party in Texas urges the appropriate
agencies to develop and advance a system for secure communications
which fully preserves the privacy of the communicators.
5) Resolved, that the Republican party in Texas petitions Congress
that it adopt a bill patterned after House Bill No. 4491 of the
Massachusetts 179th General Court, 1994 Regular Session by Mr Cohen of
Newton to reduce the chance of records being inadvertently made
available to persons without proper authorization.
6) Resolved, that the Republican party in Texas petitions Congress
that it adopt a bill to prohibit the cross-use of ID numbers between
legal entities, except for those purposes in which the use of such a
number is necessary; and that entities requesting or using such
numbers without being able to produce proof of their authority to do
so shall be liable for damages--both in small claims court, and by
federal agency; and that specifically the use of SSNs for driver's
licenses, school IDs, or military IDs shall be prohibited.
7) Resolved, that the Republican party in Texas petitions the Texas
legislature to adopt bills to these effects, adjusted as appropriate.
For reasons roughly including, but not limited to the following:
1) Note: The RSA encryption scheme is widely considered to be the
best currently available encryption scheme.
A) The primary reason advanced for such a standard is "to be able to
catch crooks". Crooks are a particular type of criminal, and
criminals are criminals because the disobey the law. Since the RSA
algorithm is globally know, any serious criminal has the capability to
layer, via RSA or PGP, any incriminating messages with this superior
system, rendering the utility of the backdoor useless against the
people the government really should be tracking.
B) Most civilians are cryptographically naive, and believe that a
"security standard" would in fact be secure. But the greatest threat
to our rights is, in fact, the government--as witnessed by the Bill of
Rights. These standards are equivalent to the government keeping a
copy of every key you own, locked in a safe, with the promise never
EVER to use them without a proper warrant. If one is unwilling to
turn over one's physical keys to the government, one should be
unwilling to turn over one's cryptographic keys to the government.
C) We live in a global environment. This statement itself will
probably make its way into every country in Europe, and every
industrialized nation not pointed closed to outsiders. Our industries
compete for sales in practically every country on the globe. No
sovereign state would allow devices programmed with such a standard to
be sold in its country. The adoption of such standards would cripple
exports of secure communications systems. The response by industry
would probably be to develop two models-one for export, one for
internal use. Such a division in the economy would be damaging, and
is a hallmark of a colonial economy. And domestic demand itself would
likely attempt to move to the non-trapdoor systems.
D) If such systems ever became generic within the US, it would hinder
global secure communications, as any conversion between trapdoor and
secure systems would likely entail intermediate decryption. The US
could be cutting itself off by such standards. In fact, this may be
occurring now, with the new PGP standard.
E) The acceptance of such standards in the US could lead to the
adoption of such standards in nations with repressive governments
throughout the world. They could tell their people that from now on,
their private conversations will be every bit as private as any in the
US. I do not believe that we wish such a situation to develop.
2-4) These measures are designed to forward a GLOBAL private secure
communications protocol. An ever-growing segment of our economy will
be dependent upon such standards.
2) This law is forcing support of popular programs outside of the US.
We now have a situation where people are calling servers in Europe in
order to get current copies of these products.
3) Note: The RSA encryption scheme is widely considered to be the
best currently available encryption scheme. A) The patented is not
broadly recognized outside the US. Development of RSA-dependent
products is likely to occur by non-US entities, and demand is growing
B) The RSA patent is _very_ broad, encompassing potential systems
never dreamt of by its authors.
C) The RSA patent is widely not supported by the mathematics
community. The RSA system follows directly and easily from work that
is more than a hundred years old. The RSA authors, by many accounts,
contributed little original work to the process, compared to earlier
D) Extending patents to the RSA system could likely lead to extending
patents to a whole class of mathematical theorems, should any have
commercial value. Such an extension may well chill basic research in
E) Due to the simplicity of the process, the RSA patent is like a
patent for folding a paper airplane: once explained, most programmers
can implement it independently.
4) Note: Such protocols already exist. All that is needed it to
develop an implementing system.
4-5,7) The specific reasons for these resolution should be apparent
from the resolutions themselves.
6) We are dangerously close to turning the SSN into a national ID
number. While this seems innocuous enough, the results are to be
A) Persons, from store clerks to government bureaucrats, who have
contact with someone can retain such a number, and use it to access
all types of information to which they have no right--a clear
violation of privacy, and an open invitation for criminal tampering.
B) Government agencies may currently exchange information about
persons to create extensive records on individuals, indexed by SSN.
Such records could be accessed by law enforcement agencies on fishing
C) Increasingly, businesses are obtaining SSNs, and building even
more detailed records. These records are susceptible to being used in
a manipulative fashion.
Nathan Zook (firstname.lastname@example.org)
Notice of support for the privacy resolutions posted by Nathan Zook in May of
[ ] I support all seven resolutions.
[ ] I support only the following resolutions:
1 [ ] 2 [ ] 3 [ ] 4 [ ] 5 [ ] 6 [ ] 7 [ ]
[ ] I am a US citizen.
[ ] I am not a US citizen.
[ ] I am a legal resident of this state. (two-letter abbrev or XX if not US)
[ ] I am this many years old.
[ ] This is a changed statement, please disregard previous notice.
I understand that falsifying a petition may result in legal charges, and I
have not sent a duplicate signature, under any alias, except as noted above.
Date: 5 Jun 1994 18:51:04 -0400
From: kadie@EFF.ORG(Carl M. Kadie)
Subject: File 4--Re: "Problems at TCOE" (CuD 6.47)
Joel M Snyder writes:
>In any case, the larger problem with this post is a dive into
>"amateur lawyer" which seems to happen so often in USENET news. This
>paragraph begins with "TCOE [Tulare County Office of Education] is
>bound by the First Amendment" (which we know not to be true),
Of course, it is bound by the First Amendment. In the U.S., *all*
government agents are bound by the First Amendment. It is part of
their charter. The only question is what does this
bound entail in this case?
>stomps through a whole series of very complex issues involving use
>of public facilities, with a variety of incorrect statements, ending with
>"The courts have found that publicly funded universities could not remove
>Internet listservs based on objection the content of those listservs..."
>(which we know not to be true)
You are correct that (to the best of my knowledge) no such case has
come up yet, but there has be some legal action:
In _UWM Post v. Board of Regents of University of Wisconsin_, 774 F.
Supp. 1163 (E.D. Wis. 1991)], the University of Wisconsin--Eau Claire
disciplined a student under the UW Hate Speech Rule for sending a
message that stated, "Death to all Arabs ! Die Islamic scumbagsl" on a
university computer system to an Iranian faculty member. The federal
district judge said the university acted illegally because the UW Hate
Speech Rule was unconstitutionally vague and broad.
Also, the November 24, 1993 _Chronicle of Higher Education_ reports
that: "A graduate student at the University of Texas at Dallas has filed a
$2-million lawsuit against the university, charging that its
officials violated his First Amendment rights by barring him
from the Internet and the campus computer network."
And then, of course, in noncomputer media, there are many cases on
what is called the Public Forum Doctrine.
(All these documents are available on-line. Access information follows.)
* Expression -- Hate Speech -- UWM Post v. U Of Wisconsin
The full text of UWM POST v. U. of Wisconsin. This recent district
court ruling goes into detail about the difference between protected
offensive expression and illegal harassment. It even mentions email.
Includes the text of the _Chroncle_ article.
* University Control of Media
q: Since freedom of the press belongs to those who own presses, a
public university (or other government agency) can do anything it
wants with the media that it owns, right?
a: No. Like any organization, the U.S. government must work within its
If you have gopher, you can browse the CAF archive with the command
These document(s) are also available by anonymous ftp (the preferred
method) and by email. To get the file(s) via ftp, do an anonymous ftp
to ftp.eff.org (126.96.36.199), and then:
To get the file(s) by email, send 3 email message to email@example.com
Include the line(s):
Carl Kadie -- I do not represent EFF; this is just me.
=Email: firstname.lastname@example.org, email@example.com =
=URL: , =
Date: Tue, 7 Jun 1994 13:06:29 -0600 (MDT)
From: rcarter@NYX10.CS.DU.EDU(Ron Carter)
Subject: File 5--Trade-secrets case (Schrader/Hauser) dropped - Summary
Charges against Andrew Brian Schrader (Boulder, Colorado, USA),
who was accused of stealing sensitive computer information and
trade secrets from his former employer, Hauser Chemical Research,
were dismissed on Monday (06JUN94). Hauser feared that trade
secrets would have been divulged in a criminal trial, leading to
the request that charges be dropped.
End of Computer Underground Digest #6.50
E-Mail Fredric L. Rice / The Skeptic Tank