home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Hackers Underworld 2: Forbidden Knowledge
/
Hackers Underworld 2: Forbidden Knowledge.iso
/
LEGAL
/
EFF516.TXT
< prev
next >
Wrap
Text File
|
1994-07-17
|
25KB
|
592 lines
******************************************************************
////////////// ////////////// //////////////
/// /// ///
/////// /////// ///////
/// /// ///
////////////// /// ///
******************************************************************
EFFector Online Volume 5 No. 16 9/3/1993 editors@eff.org
A Publication of the Electronic Frontier Foundation ISSN 1062-9424
-==--==--==-<>-==--==--==-
In this issue:
Changes to EFFector Online 5.15
Outline of Testimony Before NIST Advisory Board
Telecommunications Radio Project Returns
Coming Soon: Commercial Version of PGP!
O'Reilly Announces the Global Network Navigator
ASIS 1994 Mid Year Call for Papers
Yet *Another* Job Opening at EFF!
Donate Your Old Computers
-==--==--==-<>-==--==--==-
*******************************
Changes to EFFector Online 5.15
*******************************
Please note the following changes from EFFector Online 5.15.
Professor Spafford's address for the CFP'94 student paper competition is
(e-mail and phone were correct):
Professor Eugene Spafford
Department of Computer Sciences
1398 Computer Science Building
Purdue University
West Lafayette, IN 47907-1398
_____
EFF t-shirts are $10 with a $3 charge for shipping and handling. The
shirts are only currently available in extra large.
_____
The ASCII version of the Big Dummy's Guide to the Internet has already been
updated. The updated version is available by anonymous ftp from
ftp.eff.org. The location is still
***********************************************
Outline of Testimony Before NIST Advisory Board
***********************************************
On September 2, 1993, Jerry Berman and Bruce Heiman of the Digital Privacy
and Security Working Group, a coalition of over 50 telecommunications,
computer and public interest organizations chaired by EFF, testified before
the Computer System Security and Privacy Advisory Board to NIST on the
Administration's Clipper/Skipjack proposal. Here is an outline of the
testimony.
_____
Before the
COMPUTER SYSTEM SECURITY AND PRIVACY ADVISORY BOARD
Baltimore, MD
Comments of the
DIGITAL PRIVACY AND SECURITY WORKING GROUP
September 2, 1993
The Digital Privacy and Security Working Group has been meeting for almost
half a year discussing options for a new policy on cryptography, privacy,
and security. These comments represent a summary of the Working Group's
progress and will be presented in more complete form in a report to be made
public early in the fall.
GOALS
A. The Digital Privacy & Security Working Group shares the Clinton
Administration's goal of promoting the development of the National and
International Information Infrastructure
B. Critical attributes of the emerging information infrastructure are:
o Interoperability across a network of networks
o Adherence to national and international standards
o Security
o Privacy
C. DPSWG conclusions regarding security and privacy policy
o Strong encryption must be widely available in the market for the
NII and the III to succeed as new pathways for commerce and communication.
o Encryption used must be TRUSTED and must accommodate FLEXIBLE
IMPLEMENTATIONS.
o Encryption policy must assure compliance with constitutional
privacy guarantees while meeting the legitimate needs of law enforcement
and national security.
A PUBLIC POLICY AGENDA
We are aware that the Clinton Administration is in the process of
completing a comprehensive policy review in this area. Based on our common
goal of developing the National Information Infrastructure, we are hopeful
that we can reach agreement with the Administration on the following
principles as a framework for a new public policy on cryptography, privacy,
and security.
A. The private sector could accept Clipper/Slipjack as one of many
cryptographic systems, provided its use remains truly voluntary.
The user market must be allowed to pick the most appropriate cryptographic
tools, without undue interference of government purchasing power or
domestic legal barriers.
B. In order to promote the use and development of strong encryption
critical to the NII, the Administration should act swiftly to relax current
export controls on cryptography.
A critical indication of the voluntariness of Slipjack will be the
willingness of the Administration to relax export controls.
C. Even if a truly voluntary escrow system is proposed, many questions
must be answered by the Administration before any escrow system could be
accepted.
o Who will act as escrow agents?
o What public policy mechanism will guaranty that key escrow remains
a voluntary option?
o What public policy mechanism will guarantee the privacy and
security of escrowed keys?
o Who will be liable in the event of a security breach?
D. Before making a final decision on Clipper/Skipjack, a more complete
evaluation of law enforcement concerns must be presented publicly.
o No quantitative, cost-benefit analysis has yet been presented.
o No explanation of how a voluntary escrow system solves law
enforcement problems, given the continued availability of other
non-escrowed cryptography systems, has been offered.
o No public consideration of alternatives to escrow systems has been
undertaken.
E. Digital Telephony
o Documented problems have been rectified.
o There is a general willingness to establish a more formal
government-private sector consultation process to resolve any other
identifiable problems now or in the future.
o No justification for legislation exists at this time.
CONCLUSION
****************************************
Telecommunications Radio Project Returns
****************************************
The Telecommunications Radio Project at KPFA-FM in Berkeley is delighted
to announce the returen of our award-winning series "The Communications
Revolution."
Your support and participation with last year's series was fundamental
to its success both as it aired and afterwards as listeners called to
request tapes, transcripts, and resource guides in unprecedented
numbers. I hope that you will help us once again by sharing
information about "The Communications Revolution" with your friends,
colleagues, members, etc.
Following please find a list of this year's programs:
November 3, 1993 9am PST
Technophobia: The Social Disease of the '90s
Who invents these gadgets that come with a fifty page operator's manual?
Why is it that "user friendly" usaully isn't? Why do I need an
engineering degree to operate my VCR? And why aren't humane,
environmentally conscious values considered in the R&D of telecommunications?
November 10, 1993 9am PST
The New Sweatshops: The Glamour-less Electronics Industry
The popular image of hi-tech jobs doesn't include the segregated
workplace of immigrant workers in low pay, high stress, repetitive
and hazardous labor--all the ones who create the new gadgets and
gizmos of the computer age.
November 17, 1993 9am PST
Nintendo Over Baghdad: The Future of War
Will new hi-tech weaponry make the unthinkable thinkable? Can war now
be presented to the American public as a clean, sanitary affair,
causing minimal (and therefore acceptable) "collateral damage"? How are
telecommunications technologies contributing to a new mass
psychology regarding war?
November 24, 1993
When Your Health History Becomes Public Record
The federal government is talking about creating a centralized national
database for all our health records. They're already available to your
future employer, landlord, ne