💾 Archived View for gemini.spam.works › mirrors › textfiles › magazines › JAUC › jauc1-2.phk captured on 2022-06-12 at 13:01:55.

View Raw

More Information

-=-=-=-=-=-=-


  THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING / Published Periodically
  ======================================================================
  ISSN 1074-3111           Volume One, Issue Two           April 4, 1994
  ======================================================================
    
      Editor-in-Chief:         Scott Davis      (dfox@fennec.com)
      Technology Editor:       Max Mednick      (kahuna@bga.com)
      Consipracy Editor:       Gordon Fagan     (dolphin@bga.com)
      Network Security:        George Phillips  (ice9@bga.com)

      ** ftp site: etext.archive.umich.edu    /pub/Zines/JAUC

      U.S. Mail:
      The Journal Of American Underground Computing 
      10111 N. Lamar #25
      Austin, Texas 78753-3601

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

 To Subscribe to "TJOAUC", send mail to:              sub@fennec.com
 All questions/comments about this publication to:    comments@fennec.com
 Send all articles/info that you want published to:   submit@fennec.com
 Commercial Registration for Profitable Media:        form1@fennec.com

 "The underground press serves as the only effective counter to a growing
 power, and more sophisticated techniques used by establishment mass media
 to falsify, misrepresent, misquote, rule out of consideration as a priori
 ridiculous, or simply ignore and blot out of existence: data, books,
 discoveries that they consider prejudicial to establishment interest..."

 (William S. Burroughs and Daniel Odier, "The Job", Viking, New York, 1989)
 
  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

 Contents Copyright (C) 1994 The Journal Of American Underground Computing
 and/or the author of the articles presented herein. All rights reserved. 
 Nothing may be reproduced in whole or in part without written permission 
 of the Editor-In-Chief and/or the author of the article. This publication
 is made available quarterly to the amateur computer hobbyist free of
 charge.  Any commercial usage (electronic or otherwise) is strictly
 prohibited without prior consent of the Editor, and is in violation of
 applicable US Copyright laws. To subscribe, send email to sub@fennec.com

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

 DISCLAIMER AND NOTICE TO DISTRIBUTORS -

 NOTE: This electronic publication is to be distributed free of charge
 without modifications to anyone who wishes to have a copy. Under NO
 circumstances is any issue of this publication, in part or in whole, 
 to be sold for money or services, nor is it to be packaged with other 
 computer software, including, but not limited to CD Rom disks, without 
 the express written or verbal consent of the author and/or editor.
 To obtain permission to distribute this publication under any of the
 certain circumstances stated above, please contact the editor at one of
 the addresses above. If you have intentions of publishing this journal
 in any of the ways described above, or you are in doubt about whether or
 not your intentions conflict with the restrictions, please contact the
 editor. FOR A COPY OF THE REGISTRATION FORM, MAIL - form1@fennec.com
 This publication is provided without charge to anyone who wants it.
 This includes, but is not limited to lawyers, government officials,
 cops, feds, hackers, social deviants, and computer hobbyists. If anyone
 asks for a copy, please provide them with one, or mail the subscription
 list so that you may be added.

 The articles and information printed herein are the property of the author
 and / or The Journal Of American Underground Computing. An electronic mail
 address of the author will be provided when made available to us so that you
 can contact the author with your comments. No article in this publication
 can be reprinted without the permission of the author / editor. Any attempt
 to do so will be in direct violation of United States Copyright laws.
 Any attempt to sell this publication in part or in whole, on CD Rom or
 while packaged with any other software bundle without the express consent
 of the editor is also a direct violation of United States Copyright laws.

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

     THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING - Volume 1, Issue 2

                          TABLE OF CONTENTS

  1)  A note from the Editor                               Scott Davis
  2)  Comments from our readers                            Readers
  3)  Paul and Karla Hit The Net                           Wired Online
  4)  AT&T Cellular Privacy Systems                        David Arneke
  5)  Clipper / From "The Guardian"                        Mike Holderness
  6)  Privacy: Notes from Cyberspace                       Various
  7)  Kidnapped By The State / Internet Not Safe           Matthew Mihaly
  8)  Legion Of Doom - Internet T-Shirts                   Chris Goggans
  9)  Public vs. Mass Media: The Case of The Internet      Jim O'Loughlin
  10) Bruce Sterling's Comments at CFP '94                 Bruce Sterling
  11) Book Review - Doing Business On The Internet         Steve Brock
  12) Generic Usenet Flame Form                            [Humor]
  13) McDonnell Douglas Warranty Card                      [Humor]
  14) Social Contract Between Us and Them                  [Humor]
  15) Electronic Petition Against Clipper                  Editors
  16) Form letter againt Clipper for the President         Editors
  17) Official Government press release: Clipper           Editors
  18) ISDN Information (RBOCS)                             Max Mednick
  19) A catalog of national ISDN solutions                 Max Mednick
  20) Sprint expands presence in China                     News
  21) SSN FAQ / Social Security Number info                Chris Hibbert
  22) The Clipper Chip is your friend                      Bob Davis (WSJ)
  
  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                        A NOTE FROM THE EDITOR

 It is my pleasure to welcome aboard to the editing staff Mr. Max Mednick
 as the Technology Editor. Max is a technical trainer and network support
 specialist for a Fortune 500 company, and has several years of experience
 in the field of networking and communications. Everyone send him a message
 welcoming him. (kahuna@bga.com).  Also, we are welcoming Carl Guderian
 as Director of Information Systems. He is currently employed by big-brother.
 His email address is bjacques@cypher.com

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                           COMMENTS FROM OUR READERS


 From: jim@rsa.com (Jim Bidzos)
 To: comments@fennec.com
 Subject: TJOAUC-1.1

 Great! I'm honored to have contributed to TJOAUC! Thanks, and keep up
 the good work.

  =-=-=-=-=-=-=-=-=-=-=-=-=-=

 From: Anonymous@some.government.agency
 To: comments@fennec.com
 Subject: Thanks!

 I checked your archived 'Journal of American Underground Computing'
 at extext.archive.umich.edu.

 I found the quality and content to be high.  

 If you could also subscribe me, I would be grateful.  Sorry about
 the skepticism (with reservations to Mark Lanes allegations that
 the CIA murdered JFK).

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                        PAUL AND KARLA HIT THE NET

 Posted By Dennis R. Hilton (drhilton@kaiwan.com)
 Copyright 1993,4 Wired Ventures, Ltd.  All Rights Reserved
 For complete copyright information, please see the end of this file

  WIRED 2.04
  Electric Word
  *************

 Recent events in Canada have proven once again that - for better or worse -
 the information genie has escaped into cyberspace and can't be put back in
 the bottle. When an Ontario judge issued an order barring media coverage of
 a sensationalized murder trial, Canadians used the Net to break the ban.

 The case concerns Paul "Bernardo" Teale and his wife, Karla Homolka Teale,
 who were each charged in the grisly murders of two teenagers. Paul Teale
 now stands accused of 48 sex-related charges, while Karla Homolka entered
 into a plea bargain: She pleaded guilty to manslaughter and is expected to
 testify against Paul.

 The nonstop press coverage prompted Paul Teale's lawyer to ask for a media
 gag order until the conclusion of his trial, on the grounds that it would
 be impossible to impanel an impartial jury. Despite legal intervention by
 several major Canadian media outlets, the court imposed a ban on the
 publication of the details of the crimes.

 At first the ban had its desired effect. When the US television show
 A Current Affair featured the case, it was banned in Canada, and Canadian
 cable stations blacked out CNN coverage of the case.

 With the conventional media halted, the infosphere took over. First, two
 BBSes in Toronto began to post daily details of the trial. In August, a
 group of McGill University students created a Usenet group, alt.fan.karla-
 homolka, to discuss the case. By December, after phone calls by law-abiding
 Net surfers to systems managers, the Usenet group had been banned by
 systems managers and university officials at sites all over Canada.

 After the banning of alt.fan.karla-homolka, two new Usenet groups were
 created: alt.pub-ban and alt.pub-ban.homolka.

 Some Net users theorized that if they cross-posted all over the Net, the
 Royal Canadian Mounted Police would be in the impossible position of
 scrambling through cyberspace plugging leaks. One Net dweller jokingly
 proposed the ideal tactic: "The solution is obvious. Take the discussion to
 rec.sport.hockey. You silly Canadians would never ban that group."

 Other curious Canadians searched the pay-per-view news and magazine
 databases on Nexis and CompuServe for stories published by US newspapers.
 Most of the banned articles were re-posted verbatim to alt.true-crime, a
 group overlooked by the Mounties.

 As the infosphere grows to encompass the planet, the question is no longer
 whether certain information is too sensitive to be made public. The real
 question becomes whether it is even possible to keep certain information
 out of cyberspace. In the Teale-Homolka case, the ban was not so much
 broken as rendered irrelevant by the voracious online community: It is
 estimated that one in four Canadians knows the banned facts.

 Anita Susan Brenner and B. Metson


  %%%%%%%%%%%%%%%%%%%% WIRED Online Copyright Notice %%%%%%%%%%%%%%%%%%%%%%

        Copyright 1993,4 Wired Ventures, Ltd.  All rights reserved.

 This article may be redistributed provided that the article and this
 notice remain intact. This article may not under any circumstances
 be resold or redistributed for compensation of any kind without prior
 written permission from Wired Ventures, Ltd.
 If you have any questions about these terms, or would like information
 about licensing materials from WIRED Online, please contact us via
 telephone (+1 (415) 904 0660) or email (info@wired.com).

       WIRED and WIRED Online are trademarks of Wired Ventures, Ltd.

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                        AT&T CELLULAR PRIVACY SYSTEMS
         AMERITECH CELLULAR PRIVACY SERVICE USES AT&T TECHNOLOGY

 By David R. Arneke (darneke@attmail.com)

 AT&T SECURE COMMUNICATIONS SYSTEMS NEWS RELEASE
 Reprinted with permission

    GREENSBORO, N.C. -- Ameritech Cellular Services in Chicago has
 become the first cellular telephone system in the country to offer
 voice privacy service using the AT&T Advanced Cellular Privacy System.

    Ameritech launched its Enhanced Voice Privacy service in Chicago
 this month.

    "This technology adds to the productivity and value that
 Ameritech cellular service provides to its customers," said Thomas A.
 Brooks, AT&T Paradyne senior vice president, Secure Communications
 Systems.

    "And, by helping the carrier provide value to the cus- tomer,
 AT&T cellular privacy technology adds value to the carrier as well."

    The AT&T technology scrambles the cellular telephone's
 over-the-air signal.  The signal is descrambled at Ameritech's
 cellular switch, transmitting a conventional phone signal to the
 recipient.

    If the scrambled over-the-air signal is intercepted, the
 eavesdropper will hear only a chirping sound.  AT&T's advanced privacy
 technology renders the over-the-air signal unintelligible.

    The system already is in wide use in Japan in the cellular system
 of one of the two major Japanese telephone companies.

    The AT&T Cellular Privacy System offers cellular users a variety
 of benefits.

    -- Its technology is small enough and light enough to be
 embeddable in today's small, portable phones.

    -- The system features an unmatched combination of high voice
 quality and an advanced level of privacy.

    -- It is applicable to all three types of cellular telephones --
 portable, transportable ("bag phones") and mobile (car phones).

    The system has two components.  The AT&T privacy unit attaches to
 the phone and scrambles the phone's signal.  Voice privacy modules are
 available for several brands of cellular telephones, among them AT&T
 models, including the AT&T Privacy-Capable Portable Telephone 9000;
 the Audiovox 3200 series; Mitsubishi models using the Model 1200
 transceiver; the Motorola 2600; the NEC 3800B and 4800; the Oki 800
 series; and the Toshiba 3200 series.

    Modules for other brands and models are in development.

    The Mobile Telephone Office Switch (MTSO) unit is installed at
 the cellular carrier's switch and descrambles the signal.

    Because the privacy system scrambles only the over-the-air
 portion of the call, no matching unit or special equipment is required
 at the receiving phone.

    The AT&T Paradyne Cellular Privacy System was developed by AT&T
 Secure Communications Systems, a world leader in the design,
 manufacture and integration of encryption and privacy products.  It is
 a primary supplier of secure products to the governments of the United
 States and other nations as well as corporations around the world.

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                        CLIPPER (From The Guardian)

 By Mike Holderness (mikeh@gn.apc.org)

 This piece on the Clipper controversy appeared in the London, UK
 _Guardian_ on 3 March 1994. My apologies for the delay in circulating
 this to all of you who helped with advice and comments or expressed
 an interest; and to a couple people whose attributions got cut for space.

 Some Netizens may find the piece a bit wishy-washy. Better that than
 the _Independent_'s coverage, which was full of unsubstantiated claims --
 if they _know_ the NSA has a back-door, I wish they'd publish
 the evidence...

 I _know_ the description of the technology ended up inexact. Anyone
 who can give an exact description in fewer words gets a bottle of
 champagne next time you're in London...

 If you re-distribute this, please do so in its entirety and un-cut.
 Contact me to discuss terms before you publish it on paper: I have
 a freelance living to earn and a landlord to feed.

 (C)opyright 1994 Mike Holderness
 mikeh@gn.apc.org
 London, UK

 HED: Are these men a threat to freedom?
 PIC: (4-column): Gore & Clinton

 YOUR COMPANY is, at last, connected to the Internet. You can swap memos
 with branch offices around the world within minutes. But you naturally
 don't want your competitors, or their governments, siphoning the details
 of your bid for that dam contract in the Philippines out of the net.
 What do you do?

 On the other hand, when you receive an electronic message announcing a
 call for tenders, how do you know it's genuine? You've heard that it's
 possible to fake electronic mail, and you're worried about all the
 possibilities for creative industrial espionage which this opens up.

 Then again, you might be a Cabinet minister, setting up a meeting with
 your boyfriend on the mobile phone. Wouldn't it be good to know that
 no-one could tap the message?

 The answer to all these problems lies in encryption technology. The
 solution the US government proposed earlier this month, however, has
 generated a furious row in the "on-line community" about the government
 interfering in citizens' right to communicate in private. The disturbing
 implications for people outside the US have gone largely unremarked.

 Computer programs that can do practically unbreakable encryption are
 available to the public in the US and elsewhere. One, named PGP for
 Pretty Good Privacy, is increasingly being used to authenticate
 electronic messages (Computer Guardian, Nov ?? 1993). It can encrypt the
 whole message, or send the main text "in clear", followed by an
 encrypted block containing a mathematical "fingerprint" of the message
 and the sender's name and address. The program can thus verify whether a
 signature belongs to the purported sender and whether the message
 arrives as it left.

 Encryption has long worried law-enforcement agencies. What if drug- dealers
 and terrorists start using unbreakable encryption? The US government's
 Key Escrow Encryption system -- commonly known by its working title,
 Clipper -- is its answer.

 Clipper uses an encryption chip suitable for building into a mobile 
 phone or a modem. Its method of encryption, developed by the US National
 Security Agency (NSA), depends on "keys". These are codes which are used
 mathematically to mangle the text or speech. The receiver can only get
 the original back out if they have the key and can use it to un-mangle
 -- decrypt -- the message.

 PGP depends on a "public-key" system. Users sending signed messages
 encrypt the signature with keys known only to them. They also issue
 public keys. These are mathematically derived from the private key, and
 allow anyone to verify the signature. If someone sends them a message
 encrypted with their public key, only the private key will extract it.
 By contrast, each Clipper chip will have an encryption key built in.
 When the chip is manufactured, two parts of the key will be lodged with
 two separate US government agencies. (In legal jargon, this is like
 "holding the keys in escrow".) A secret "super-key" allows law
 enforcement agencies to retrieve the serial number of the chip used on
 the link they're tapping.

 Under US guidelines released on February 4, if a law enforcement agency
 wants to eavesdrop on encrypted communications, it should send details
 of a search warrant to the agencies holding the key components.

 This is a red rag to the inhabitants of Internet discussion forums,
 "the world's largest functioning anarchy". There, discussions of the
 right (under the First Amendment to the Constitution) to unrestricted
 free speech can and do slip effortlessly into the belief that, as one
 participant put it, "The People must be allowed to discuss anything,
 including revolution."

 According to Brian Yoder, president of California company Networxx,
 "The US Constitution doesn't grant the government the power to maintain
 this kind of surveillance capability over the population. Period. The
 assumption is that anything that enhances the ability of the police to
 catch criminals is OK, but that is not what the Constitution says, and
 that's not the kind of country I want to live in."

 Cryptology specialist Dr Dorothy Denning at Georgetown University in
 Washington DC, who was part of a team reviewing the NSA's design
 process, points out that Clipper "will not make it any easier to tap
 phones, let alone computer networks. All it will do is make it
 technically possible to decrypt communications that are encrypted with
 the standard, assuming the communications are not super-encrypted with
 something else. Law enforcers still need to get a court order."

 But who trusts the NSA? The Clipper design is secret. Many assume that
 the Agency has built in a "trap-door" allowing it to break encryption
 without the keys.

 No-one has proposed making non-Clipper encryption illegal, but the US
 government clearly hopes to establish it as an industry standard. For
 example, while it's usually illegal to export any form of encryption
 technology from the US, it will be legal to export Clipper.

 Non-US companies using it to protect their communications will have to 
 live with the uneasy knowledge that the NSA could be listening in -- and
 the NSA, like its UK sibling organisation GCHQ in Cheltenham, has a long
 history of intercepting foreign commercial messages for the benefit of
 home companies. (GCHQ declined to say whether it had been involved in
 any discussions over Clipper.)

 The protests have started. A petition organised by Computer
 Professionals for Social Responsibility against Clipper, and in favour
 of a Bill to permit export of competing encryption systems, gathered
 more than 20,000 electronic signatures in its first two weeks. Wired
 magazine has proclaimed that ``This is a pivotal moment in history'',
 accusing ``the Clinton-Gore administration'' of ``attempting a stealth
 strike on our rights''. It has asked readers to sign the CPSR petition
 against Clipper and to ``call or write your Congressional
 representatives and let them know how you feel''.

 Encryption and authentication are important for much more than the 
 privacy of the frequently obscure or banal discussions on the Net.
 Medical and financial records are now commonly held on computers, and a
 growing proportion of business transactions take place on line.
 Cyberspace is where your money is.

 For private communications, Emma Nicholson MP takes a relaxed view: "In
 communicating, we should start from a belief that everyone listens to
 everything. Gossip is what makes the world go round. I have very few
 secrets. I would be deeply concerned if a device were marketed that
 could stop interception -- I would support the FBI completely."

 Computer-law barrister Alistair Kelman, however, believes that any
 attempt to enforce the Clipper chip as a worldwide standard would meet
 stiff opposition. The European Commission could be expected to object
 that it fell foul of Treaty of Rome provisions against misuse of a
 dominant position. "If you want to have a world standard for encryption,
 fine," Kelman said, but the EC could respond: "let's all get together
 and settle on something that meets our requirements as well."

 <ufpoints>

 Wired articles on Clipper can be obtained via the Internet by putting
 the following three lines into the body of an electronic mail message
 addressed to infobot@wired.com:
  send clipper/privacy.meeks
  send clipper/privacy.barlow
  end

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                      PRIVACY: NOTES FROM CYBERSPACE

 These are just little tidbits picked up from here and there...feel free to 
 comment on them.   -Editors


 NOTES FROM CYBERSPACE - ARTICLE 1
 By Arthur Entlich (ua107@freenet.victoria.bc.ca)
 Subject: Privacy in Canada

 Over the last several years there has been a feeding frenzy in the private
 sector toward collection of private information.  Currently, to my know-
 ledge there is only one province in Canada that has legislation on the
 books which protects individual's private information within the 
 private sector, and that is Quebec, which may not be a province of
 Canada for long, if things continue.

 Anyway, recently a few provinces have developed Offices of Privacy and
 Freedom of Information (Ontario and British Columbia) both of which have
 "left of center" parties in power.  However, these government offices
 only regulate the issues of freedom of information and privacy within the 
 public sector (governmental agencies).  These is also a similar
 office on a federal basis.   Ther eis much to be  done here to roll
 back the amount and connectivity of information in the public and
 private sector.  For instance, our SIN number (Social Insurance Number)
 which was legislated originally for only about 6 programs, all relating
 to employment, has been expanded to uses such as banking, (required by law
 now) medical plans, etc,  Also, the private sector has a field day with
 this number and it has basically become a national identity number.

 Some changes are occurring, such as in British Columbia, we were issued
 a separate and unique medical plan number after many complaints, however
 on several occasions I have by phone or in person requested information
 about my coverage and claimed I did not have my medical number handy,
 and was asked for my SIN, at which point they crossreferenced to my
 medical number, so obviously they are still connected internally.

 More  recently, the government of B.C. has indicated that in two months
 a new program called PharmaNet will be put in place.  This will hook up
 all pharmacies in the province so that ones drug profile is available
 to each pharmacist if they use a keyword you provide (the keyword was
 demanded by the office of privacy, originally it didn't even have this).
 You must provide this keyword and your medical plan number in order
 to purchase the drugs.  The government claims it is becaus ethey
 have a problem with drug interactions, especially amongst the
 elderly who see numerous doctors and don't remember what they are taking.

 They also claim it is to prevent the practice of people seeing several 
 doctors for one prescription type, then go to several pharmacies to buy
 multiple prescriptions, and then sell the drugs on the street.

 The government does have some justification, in that they do pay for
 the partial cost of drugs to people over 65 and they also pay for
 all drug costs over $600 per family per year.  However, the vast
 majority of the population does not fit into these groups.

 In the private sector things are much worse.  Most video stores re-
 quire D.L.# plus SIN, and they can sell this info to anyone at
 the present state of the law.  Banks have gotten really nasty of
 late, and are requiring a credit card number just to open a chequing
 (or checking if you are south of the border) account.  I was required
 to sign a statement when opening a simple chequing/savings account
 at a credit union which gave them permission to "acquire any information
 deemed necessary to verify the information provided, or to protect the
 credit union", and that such information could be transmitted to
 other financial institutions, branches of their company, and other
 companies they own (which includes and investment and insurance
 division).  I am fighting to change this now, as the next shareholders
 meeting is in mid-April and i have submitted several resolutions to
 change the current constitution of the credit union.

 Anyway, I know this has been long winded... sorry.  I would be most 
 interested in anyone who can provide inform
 anyone who can provide information on laws in the states or elsewhere
 which deal with issues such as these.  I would like to know what other
 legislation is out there to protect the privacy of personal information
 in either the public or private sector.

 Thanks... please E-Mail me.

 %%%%%%%%%%%%%%%%%%%

 NOTES FROM CYBERSPACE - ARTICLE 2
 By Anonymous
 Subject: What is being done about Privacy???

 I have been doing some reading about the available databases, I was
 shoked at some of the services that are listed. Just to name a 
 few .... 

       * Searches for SSN's, lists name, address, last transaction
       * Searches for Mass Mailings and magazine subscriptions
       * change of address, (someone also mentioned PO Box info!!)
       * for most states - car ownership and Drivers lisc history
       * Top of Credit reports (name, address, SSN, employer)
       * neighborhood searches, demographics (income, ect ..)
       * National Phone listings
       * Airplane and Boat ownership
       * Professional Lisc's
       * ect, ect, ......

 I have seen alot of talk about not giving out a SSN, but whats the point?
 It seems like it is already too late. I haven't seen the info in all of 
 these datbases, but it seems as though Big Brother is already here. 

 I am sure many people in this group already knew about alot of this. I
 am curious if anything is actually being done about this? I have seen
 the EFF do alot against clipper; are they doing anything against these
 databases that are open to the public (for a price)??? The clipper
 petition got alot of names, couldn't the same be done about these
 databases. I would bet most people have no idea all this personal
 information is available. They would be just as shocked as I was and
 you could get more signatures than the clipper petition.

 %%%%%%%%%%%%%%%%%%

 NOTES FROM CYBERSPACE - ARTICLE 3
 By Anonymous
 Subject: Comments on Wall Street Journal /  NSA 'cryptomathematician'

 In the Tuesday March 22, 1994 issue of the Wall Street Journal appeared
 an interview by reporter Bob Davis of Clinton Brooks the head of the
 NSA effort for an Escrow Encryption system commonly associated with
 Clipper.  In the article Mr. Brooks relates there efforts to produce
 such as system came to fruition in a timely fashion with respect to
 AT&T desiring to sell secure voice systems.

 Having spoken with several people marketing AT&T Surety Communications
 products, it appears that indeed, NSA 'balked', and not just over the
 point of export licensing for DES based products.  AT&T also sells several
 proprietary encryption algorithms, including one approved for export
 under ITAR.  These all predate clipper.  One of the marketing types
 at AT&T Surety indicated that NSA didn't want DES in secure voice
 products and hinted at international agreements to limit proliferation
 of DES applications, although apparently no evidence of this has arisen 
 through John Gilmores FOIA requests.

 If AT&T was ready to sell two tier products domestic/overseas, why
 the jump to clipper?  They offered a captive market, the Justice Department,
 which has paid in the neighborhood of $8 million dollars from asset siezures
 for a couple thousand clipper phone units probably at a higher price
 than they would sell for on the open market.  They have also gained the
 promise of a single tiered product, although the rest of the STUIII
 compatible products are still available.  AT&T appears hard pressed to
 find a nongovernment related market place for secure voice, without
 significant non-Justice shipping.  Part of this may be cost, a Telephone
 Security Device costs more than an AT&T videophone while having a lower
 complexity.  A popular MODEM manufacturer Paradyne, a subsidiary of
 AT&T, sells a MODEM with more than half the complexity of the Telephone
 Security Device for $179 retail.  The videophone is selling for around
 $940 while the TSD 3600, a unit sitting between your phone and the wall
 sells for $1050.

 AT&T appears to have had a hard time waiting for MYK-78e chip shipments
 from Mykotronx.  They received the initial production lot in October or
 November, following a protracted nonreassuring rubber stamp review
 process and a NIST Encryption Escrow non Standard release, which from
 the WSJ article was staged simple for AT&Ts benefit.

 That and we get a secretive governmental agency starting an unprecedented
 propaganda effort.  Is this a case of our government doing more for us than
 we would possibly ask?  Perhaps we should ask why.

 %%%%%%%%%%%%%%%%%%%%

 NOTES FROM CYBERSPACE - ARTICLE 4
 By Anonymous
 Subject: Creative Freedom / Restrictions on Free Communcication

 I am aware of a case where a student made significant headway
 in development of techniques which accelerate convergence of
 algorithms used in computer arbitrage. The advisor told
 the student that this was amazing and great! But then the
 advisor tried to get the student to change the name of the
 technique to something that would make it sound like the
 advisor thought of it. Then, on the second idea the student
 mentioned, the advisor exclaimed how great it was and then
 suddenly turned around and began to try to talk the student
 out of the idea. But, the student had already convinced his/herself
 of the validity and value and stood ground on the second idea.

 When the student began to e-mail others in the community, the
 advisor had an irrational reaction. The advisor required the
 student to consult with (the advisor) before discussing his/her
 results vi e-mail with others in the community. Also, the advisor
 said that such discussions should not leave the local research
 group.  
 
 TELL ME, IS THIS AN ETHICAL REQUIREMENT??
 WHAT DO  YOU THINK IS GOING ON HERE?

 %%%%%%%%%%%%%%%%%%%%%

 NOTES FROM CYBERSPACE - ARTICLE 5
 From: James Ebright (jebright@magnus.acs.ohio-state.edu)
 Subject: Re: Wall Street Journal Interview with NSA 'cryptomathematician'

 My response to AT&T:  I switched to MCI today... (Who else is listening
 to my true voice?)  You can switch too... call 800-624-8030.

 My response to NSA:  I still don't think folks are going to buy
 many guaranteed tapable 'secure' phones.  

 But this shows the power of entrenched bureacuracies who have a vested
 interest in intrusive government.  If the Cantwell bill passes, this
 mugging of US businesses via ITARs would be impossible.

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                 KIDNAPPED BY THE STATE / INTERNET NOT SAFE

 By Matthew A. Mihaly (mam6@cornell.edu)

 O.k., here is the situation.  I had been contemplating suicide and 
 posted my situation on alt.romance.chat (lot's of nice people replied,
 btw.) I also posted something on alt.drugs (under the name "Matt" asking
 for some useful drugs for the purpose of killing myself (which, for any
 of you fu*king ass-sucking cops out there: I am not saying I want to).

 The Internet is not safe.  Two days (on 3/14) after I posted it, a couple
 of cops show up at my door, along with some nut from the mental health
 department of Tompkins County (that's this county obviously) and tell me
 I have to come with them to the hospital for "an hour, maybe an hour and
 a half."  I said "What if I don't choose to go."  They replied that I
 don't have a choice.  They informed me that I'm going with them because
 some people read my internet message and were concerned.  I was in the
 middle of conducting some business on the phone and asked if I could make
 a couple of phone calls first but the pigs replied that no, I couldn't. 
 In effect, they kidnapped me.  

 So, they drive me to Tompkins County Hospital where I am forced to sit in
 a room for 2 hours (with a couple of goons waiting outside to make sure I
 don't try to run).  Finally, some bitch comes in and talks to me for all
 of 4 or 5 minutes.  I explicity told her that I am not planning on
 killing myself (partly due to the 20 or 30 supportive e-mail messages I
 got from people).  She said it's not here decision whether I'm held or
 not but that she would go give the doctor her opinion (she left me with
 the impression that she would tell me to let me go.)  The doctor came in,
 after another 45 minutes of waiting) and talked to me for maybe 2
 minutes.  I said I wanted a lawyer.  He said "Sure, you can always have a
 lawyer." and walked away mumbling something about always being able to
 have a lawyer.  Apparently he was being sarcastic because no lawyer ever
 showed up.  After another 20 minutes or so, some guy pokes his head in
 the room and asks me who I am.  I didn't tell me of course, but 2 minutes
 later, some little geek walks in, sits down and says "I don't know if
 you've heard yet, but you are being transfered to a mental health ward." 
 I say something to the effect of f*ck you I'm not going anywhere.  By
 this time, there were a couple of goons in the room also.  They told me
 that I could either go of my own free will or they would drag me there. 
 Noticing that there were about six other guys standing out in the hall
 way I said I'd go.  I then stood up, told the little geek that I hope he
 goes home tonight and suffers the worst kind of hell (or something to
 that effect).  Then, one of the goons grabs me and drags me out into the
 hallway where I see one of those portable beds for ambulances with
 restraining devices on them.

 AT this point I was absolutely livid with rage.  No way are you f*ckers
 restraining me I said.  Well, they said I had to be restrained because I
 had just threatened the little geek with violence (not true, I just
 wished hell on him).  So, they strap me down (I cooperated but was
 berating them the whole time) and put me in the ambulance and left a guy
 in the back to watch me.  I was telling him what a dick he is and how big
 a violation of my human rights this was and he just told me to shut up. 
 After a period of silence I apologized to him and told him I didn't mean
 anything personal.  He responded with something to the effect of "Well
 f*ck you, I dont' like your tone of voice."  I asked him, very
 sarcastically, if he was pleased with how well he was doing his job.  He
 said "Look, I'm just doing my job here."  Yeah, yeah I replied, so were
 the Nazi death-camp guards.

 Anyhow, they get me to this hospital (Soldiers and Sailors Memorial in
 Penn Yan, NY).  They made me strip and put on stupid hospital clothes. 
 By this time it was 8:30 at night (I got picked up at about 4:30) and no
 one had given me anything to eat.  They gave me some graham crackers at
 this point.  Whoopee.  

 So anyhow, I wait for an hour or so and some guy named Tom Rice (yeah, I
 hope you're reading this you cocksucker) comes in and talks to me for
 about 3 minutes and says "o.k., I'm admitting you."  Well, I was pretty
 pissed as you might imagine.

 So, they bring me upstairs, give me a room, etc., etc. and expect me to
 go to sleep until morning. Yeah, whatever.  Like I can sleep when I'm a
 prisoner.  I spent the whole night planning a way to escape (pathetic
 security cause I was in the wing where people with things like depression
 are kept, not the criminally insane wing).  At 6:30 in the morning, they
 come in and tell me they are going to take blood from me.  When I said no
 they said they were going to anyhow.

 Well, the long and short of this all is that I ended up spending two
 nights in a f*cking mental hospital because A) some f*ckers at Cornell
 University are idiots (I know at least one of their names so far... Leeza
 Casinelli, a therapist at our health services.. she is a fascist pig,
 don't go see her) and B) the idiot psychiatrist I saw the next morning
 said they have to keep me another night for observation.  Nevermind the
 fact that I was obviously fine and the rest of the staff knew it.  The
 food there sucked, I was confined in EXTREME boredom (what, they expect
 me to read 2 year old Time magazines all day???), missed many classes, a
 test, and some papers.  Furthermore, I do alot of investing and lost a
 significant sum during this time.

 I guess my point in all this is that the Internet is definitely not safe,
 even if you aren't breaking the law.  I got back about 2 hours ago from
 that f*cking place.  I'm thinking about suing Cornell U (they are the
 ones who started all this) and maybe the state of New York.  The way I
 look at it, I was held without indictement, without warrant, and without
 legal representation based on evidence contained on a Usenet posting.  I
 mean c'mon.  Like even 1/8 of the stuff posted here should be taken
 seriously.  Take a look at alt.devilbunnies for instance.  A completely
 amusing group, but not something to take seriously.  Anyhow, I go to
 Cornell and live in Ithaca.  I keep on trying to contact the ACLU here
 but no one ever answers. I've only gotten a busy signal once too.  Also,
 are there any lawyers around here that someone can recommend for me?  

 I was kidnapped and imprisoned for two days by the state.  The state, not
 just of America, but the state of the world must be destroyed.  Power,
 concentrated like this is absolutely tyrannical.  I am not suicidial
 (although I was at one point) and these morons should have realized this.
  Be careful what you post and look into PGP encryption. F*ck the
 government and f*ck you you Cornell U. bastards. I hope you rot in the
 worst part of hell for what you put me through.  If you want me to be
 depressed, go ahead, do it again.  Make me miss classes, tests, and lose
 money. 

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
 
                     LEGION OF DOOM T-SHIRTS!! Get 'em

 By Chris Goggans <phrack@well.sf.ca.us>

 After a complete sellout at HoHo Con 1993 in Austin, TX this past
 December, the official Legion of Doom t-shirts are available
 once again.  Join the net luminaries world-wide in owning one of
 these amazing shirts.  Impress members of the opposite sex, increase
 your IQ, annoy system administrators, get raided by the government and
 lose your wardrobe!
 
 Can a t-shirt really do all this?  Of course it can!
 
--------------------------------------------------------------------------
 
 "THE HACKER WAR  --  LOD vs MOD"
 
 This t-shirt chronicles the infamous "Hacker War" between rival
 groups The Legion of Doom and  The Masters of Destruction.  The front
 of the shirt displays a flight map of the various battle-sites
 hit by MOD and tracked by LOD.  The back of the shirt
 has a detailed timeline of the key dates in the conflict, and
 a rather ironic quote from an MOD member.
 
 (For a limited time, the original is back!)
 
 "LEGION OF DOOM  --  INTERNET WORLD TOUR"
 
 The front of this classic shirt displays "Legion of Doom Internet World
 Tour" as well as a sword and telephone intersecting the planet
 earth, skull-and-crossbones style.  The back displays the
 words "Hacking for Jesus" as well as a substantial list of "tour-stops"
 (internet sites) and a quote from Aleister Crowley.
 
--------------------------------------------------------------------------
 
 All t-shirts are sized XL, and are 100% cotton.
 
 Cost is $15.00 (US) per shirt.  International orders add $5.00 per shirt for
 postage.
 
 Send checks or money orders.  Please, no credit cards, even if
 it's really your card.
 
 
 Name:       __________________________________________________
 
 Address:    __________________________________________________
 
 City, State, Zip:   __________________________________________
 
 
 I want ____ "Hacker War" shirt(s)
 
 I want ____ "Internet World Tour" shirt(s)
 
 Enclosed is $______ for the total cost.
 
 
    Mail to:   Chris Goggans
               603 W. 13th #1A-278
               Austin, TX 78701
 
 
 These T-shirts are sold only as a novelty items, and are in no way
 attempting to glorify computer crime.

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

              PUBLIC vs. MASS MEDIA: THE CASE OF THE INTERNET

 By Jim O'Loughlin (v049lnwe@ubvms.cc.buffalo.edu)

       In its initial configuration, the Internet was designed to be 
 neither a public or a mass media.  Twenty years ago, the ARPAnet, as 
 it was then called, was a U.S. Department of Defense research experiment 
 into how to create a computer network that could withstand partial 
 outages, as from a bomb attack.  (Krol 11)  In the mid 1980s, the National 
 Science Foundation created a network built on the ARPAnet technology that 
 for the first time expanded access beyond computer researchers and 
 government employees. The NSF promoted universal access by connecting 
 universities only if they had plans to promote Internet use. (12)  
 The Internet, as a network of networks, began expanding rapidly, becoming 
 international and spawning commercial imitators such as Prodigy, CompuServe,
 and America Online.
      
       Currently, strictly commercial ventures are banned on the Internet, 
 which is still officially only used for research purposes.  However, its 
 growing popularity and commercial potential have whetted the appetite of 
 business. Much of the current discussion about the "information 
 superhighway" revolves around how to turn the Internet into a source of 
 commercial profit.  Lost in much of the information superhighway rhetoric 
 is the nature of most of the "traffic" on the Internet.  For while media 
 discussion often portrays the Internet as a science fiction version of 
 Cable TV, much of its current popularity is due to its ability to 
 facilitate discussions between people throughout the globe. To understand 
 what is at stake in the transition from the Internet to the information 
 superhighway, it is necessary to consider the cultural position of the 
 Internet, or, to use C. Wright Mills terminology from *The Power Elite*, 
 the extent to which the Internet is a public vs. a mass media.  
  
      Though Mills's model focuses on the extent to which a population is a 
 public or a mass, I believe it can be applied to media and its use.  
 First, the formal media of communication need to be examined for the 
 proportion of expressed to received opinions.  In a public, "virtually 
 as many people express opinions as receive them." (303)  In essence, 
 opinions would be communicated through direct discussions.  In a mass, 
 "far fewer people express opinions than receive them." (304)  The extreme 
 of the latter state would be a case in which "one person talks impersonally 
 through a network of communications to millions of listeners and viewers." 
 (302)
 
       The second standard is the extent to which an opinion can be 
 responded to without "internal or external reprisals being taken." (302)  
 Public communications would be organized to facilitate the immediate and 
 effective response to any publicly expressed opinion without fear of 
 retribution.  The conditions of mass communications make it impossible for 
 any individual to "answer back immediately or with any effect." (304)
 
       The third term of measurement would be the degree to which the 
 formation of opinions can lead to social action.  In a public realm, 
 opinions can readily lead to effective action, even against the powers 
 that be. Authorities retain tight control over opinion in a mass sphere 
 and can organize and control any attempts at such action.
       
       Finally, there is the extent to which "institutionalized authority, 
 with its sanctions and controls, penetrates the public." (303)  Is a 
 particular media one in which the public has true autonomy?  In an ideal 
 public, "authoritative institutions do not penetrate the public," (304) while 
 in a mass, people have no autonomy from institutions of power and are 
 frequently manipulated.
 
       The limitations of these terms need to be understood.  They represent 
 extreme types, "social reality is always some sort of mixture of the two.  
 Yet we cannot readily understand just how much of which is mixed into our 
 situation if we do not first understand, in terms of explicit dimensions, 
 the clear-cut and extreme types." (302)  The Internet functions in a 
 combination of mass and public roles.  Importantly, however, this paper 
 will argue that much of what is involved in the creation of the information 
 superhighway will turn the Internet into more of a mass media, to the 
 detriment of the extent to which the Internet is currently a public media.

       The Internet is probably most noteworthy as a public media for the 
 extent to which people have equal access to expressing and receiving 
 opinions.  Though large parts of the Internet exist to disperse information 
 (tools such as GOPHER and MOSAIC are designed to facilitate access to 
 databases and other information banks), much of the Internet is made up of 
 bulletin boards, salons, or discussion groups around cultural, political or 
 leisure topics (such as alt.cyberspace, soc.politics or 
 rec.food.veg.cooking). Though some groups are controlled by moderators, 
 the majority have no limitations on what can be posted.  In a newsgroup, 
 there are usually a number of parallel conversations (or threads) going 
 on at any one time. In a recent overview of commercial on-line services 
 in *Newsweek*, it was noted that people seem more interested in 
 communication than services.  "People want to talk to one another." 
 (Meyer 39)  On-line shopping and banking facilities have had a less than 
 stellar reception, however, discussion groups have been hugely popular. 
 More than 100,000 messages are posted on the Prodigy system every day.  
 On the Internet, the equivalent of dozens of full-length novels are 
 written on a daily basis.  This interchange, or the extent to which 
 authorship has become a public role, is perhaps the Internet's most 
 important feature.
 
       A concern with the coming of the information superhighway is the 
 extent to which these discussion groups will be affected.  As the Internet 
 becomes increasingly privatized, it comes questionable whether or not these 
 groups will retain their current form.  Some businesses have attempted to 
 capitalize on their popularity.  Microsoft is launching a Complete Baseball 
 newsgroup that features discussions, fantasy-baseball leagues, and access to 
 a wealth of statistical information.  According to Barry Berkov of 
 CompuServe, "this is where the growth is... Anything addictive is good." 
 (quoted in Meyer 39)  Groups based on entertainment or leisure topics 
 (particularly ones in which certain people have an obsessive interest) may 
 attract capital.  It remains questionable what would happen to less 
 "addictive" or more politically inclined groups.
 
       At its best, discussion on the Internet operates on a civil 
 libertarian model. One is free to post whatever one wishes and free to 
 participate in any of the discussions.  However, the computer technology 
 upon which the Internet relies also makes surveillance and reprisals a 
 simple matter. It is relatively easy for any group to monitor a conversation 
 (some on the Internet have suggested that governmental agencies do just 
 that), and a simple matter for systems operators at any computer site to 
 tap into one's account or to withdraw one's Internet privileges. 
 Though cases of direct governmental intervention so far are few, there 
 are cases such as the 18 year old who was arrested for threatening the 
 president's life over electronic mail (president@whitehouse.gov).

       However, one of the most ominous recent developments has been the 
 proposed "Clipper chip."  A Clinton administration proposal to standardize 
 encryption chips was recently developed in consultation with the National 
 Security Agency.  Telephones containing the Clipper chip would send out "a 
 string of bits called a law enforcement field.  Its purpose is to enable the 
 police and the FBI to decode conversations that they wiretap pursuant to 
 court order." (Wallich 116)  Both computer civil libertarians and major 
 software companies have been opposed to this proposal (the former for 
 reasons of privacy, the latter for reasons of international competitiveness).  
 The Clinton administration is currently rethinking the policy, nevertheless, 
 the technology and means does exist to give the government an exclusive 
 "back-door" into cellular telephones.
 
       The third criterion for measurement, the extent to which the 
 formation of opinions can lead to social action, is the one in which the 
 jury is still out on the Internet.  Few traditional political groups are 
 entirely "online," and the physical distance between Internet participants 
 raises serious questions as to its use in organizing.  Is cyberspace a 
 locale within which social action is likely or possible?  Has it become 
 a medium of a public sphere in which people can engage public authorities 
 "in a debate over the general rules governing relations in the basically 
 privatized but publicly relevant sphere of commodity exchange and social 
 labor?" (Habermas 27) Computer Professionals for Social Responsibility 
 circulated an electronic petition in opposition to the Clipper Chip 
 proposal.  This petition was distributed to a wide variety of newsgroups 
 and eventually forwarded to the president.  Such examples, however, are 
 the exception rather than the rule. Calls to action are rare on the 
 Internet.  The question would be whether that is a carry over from the 
 state of the world outside of cyberspace or endemic to shifting populations 
 of the Internet.
      
       The final issue to consider is the role of institutionalized 
 authority. No single authority governs the Internet.  A council of elders 
 (called the Internet Architecture Board) from the Internet Society has 
 responsibility for the technical management and direction of the Internet. 
 (Krol 14)  However, this group has almost no control over the actual content 
 of materials over the Internet.  Often the metaphor used to describe the 
 rules of the Internet is "frontier justice."  "The two overriding premises 
 of network ethics are: Individualism is honored and fostered.   
 The network is good and must be protected." (35)  Such a definition seems 
 a bit romanticized but it does capture the suspicion of any authorial 
 intrusion into cyberspace.  Many recognize that the computer technology 
 which brought about the Internet also makes stricter governmental control 
 a possibility.
  
      As the Internet slowly becomes repaved into the Information 
 superhighway, it will be important to watch the extent to which people are 
 assumed to be either a mass or a public.  In the former case, we can expect 
 governmental concern about consumer rights, or the ability of people to have
 the ability to obtain as much information as possible for a reasonable price. 
 Such a mindset governs most federal discussions about cable television 
 regulation.  However, if the people are considered to constitute a public, 
 then concern will be raised about what Jurgen Habermas has termed 
 "participatory rights" (229)  These are not simply rights which protect 
 people from something (often the intrusion of government), but rights which, 
 in this case, ensure people's ability to partake in freedom of assembly and 
 association through the medium of the Internet.

 Works Cited

 Habermas, Jurgen.  *The Structural Transformation of the Public Sphere: An 
 Inquiry into a Category of Bourgeois Society*  Cambridge: MIT Press, 
 1993 (1962).

 Krol, Ed.  *The Whole Internet: User's Buide & Catalog*  Sebastopal, CA: 
 O'Reilly & Associates, Inc., 1992.

 Meyer, Michael.  "The 'On-Line' War Heats Up."  *Newsweek*  28 March 
 1994: 38-9.

 Mills, C. Wright.  *The Power Elite*  New York: Oxford University Press,
 1956.

 Wallich Paul.  "Clipper Runs Aground."  *Scientific American*  August 1993: 
 116.


  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                  BRUCE STERLING'S REMARKS AT CFP '94

 Posted By Carl Kadie (kadie@eff.org)
 Comments to Bruce Sterling (bruces@well.sf.ca.us)

 LITERARY FREEWARE:  NOT FOR COMMERCIAL USE

       I've been asked to explain why I don't worry much about the
 topics of privacy threat raised by this panel.  And I don't.  One reason
 is that these scenarios seem to assume that there will be large,
 monolithic bureaucracies (of whatever character, political or
 economic)  that are capable of harnessing computers for one-way
 surveillance of an unsuspecting populace.  I've come to feel that
 computation just doesn't work that way.  Being afraid of monolithic
 organizations especially when they have computers, is like being
 afraid of really big gorillas especially when they are on fire.

       The threat simply doesn't concur with my historical
 experience.  None of the large organizations of my youth that
 compelled my fear and uneasy respect have prospered.  Let me just
 roll off a few acronyms here.  CCCP.  KGB.  IBM.  GM.  AEC.  SAC.

       It was recently revealed that the CIA has been of actual
 negative worth -- literally worse than useless -- to American
 national security.  They were in the pockets of the KGB during our
 death struggle with the Soviet Union -- and yet we still won.
 Japanese zaibatsus -- Japan Inc. -- the corporate monoliths of Japan
 -- how much hype have we heard about that lately?   I admit that
 AT&T has prospered, sort of -- if you don't count the fact that
 they've hollowed themselves out by firing a huge percentage of their
 personnel.

       Suppose that, say, Equifax, turned into an outright fascist
 organization and stated abusing privacy in every way they could.
 How could they keep that a secret?  Realistically, given current
 employment practices in the Western economies, what kind of
 loyalty could they command among their own personnel?  The low
 level temps have no health insurance and no job security; the high 
 level people are ready to grab their golden parachutes and bail at any
 time.  Where is the fanatically loyal army of gray flannel
 organization men who will swear lifelong allegiance to this
 organization, or *any* organization in this country with the possible
 exception of the Mafia?

       I feel that the real threat to our society isn't because people
 are being surveilled but because people are being deliberately
 ignored.  People drop through the safety nets.  People stumble
 through the streets of every city in this country absolutely wrapped
 in the grip of demons, groping at passersby for a moment's attention
 and pity and not getting it.  In parts of the Third World people are
 routinely disappeared, not because of high-tech computer
 surveillance but for the most trivial and insane reasons -- because
 they wear glasses, because they were seen reading a book -- and if
 they survive, it's because of the thin thread of surveillance carried
 out by Amnesty International.

       There may be securicams running 24 hours a day all around us,
 but mechanical surveillance is not the same as people actually
 getting attention or care.  Sure, rich people, like most of us here, are
 gonna get plenty of attention, probably too much, a poisonous
 amount, but in the meantime life has become so cheap in this society
 that we let people stagger around right in front of us exhaling
 tuberculosis without treatment.  It's not so much information haves
 and have-nots and watch and watch-nots.

       I wish I could speak at greater length more directly to the
 topic of this panel.  But since I'm the last guy to officially speak at
 CFP IV, I want the seize the chance to grandstand and do a kind of
 pontifical summation of the event.  And get some irrepressible
 feelings off my chest.

       What am I going to remember from CFP IV?  I'm going to
 remember the Chief Counsel of NSA and his impassioned insistence
 that key escrow cryptography represents normality and the status
 quo, and that unlicensed hard cryptography is a rash and radical leap
 into unplumbed depths of lawlessness.  He made a literary reference
 to BRAVE NEW WORLD.  What he said in so many words was, "We're
 not the Brave New World, Clipper's opponents are the Brave New
 World."

       And I believe he meant that.  As a professional science fiction
 writer I remember being immediately struck by the deep conviction
 that there was plenty of Brave New World to go around.

       I've been to all four CFPs, and in my opinion this is the darkest
 one by far.  I hear ancestral voices prophesying war.  All previous
 CFPs had a weird kind of camaraderie about them.  People from the
 most disparate groups found something useful to tell each other.
 But now that America's premiere spookocracy has arrived on stage
 and spoken up, I think the CFP community has finally found a group of
 outsiders that it cannot metabolize.  The trenchworks are going up
 and I see nothing but confrontation ahead.

       Senator Leahy at least had the elementary good sense to
 backpedal and temporize, as any politician would when he saw the
 white-hot volcano of technological advance in the direct path of a
 Cold War glacier that has previously crushed everything in its way.

       But that unlucky flak-catcher the White House sent down here
 -- that guy was mousetrapped, basically.  That was a debacle!  Who
 was briefing that guy?  Are they utterly unaware?  How on earth
 could they miss the fact that Clipper and Digital Telephony are
 violently detested by every element in this community -- with the
 possible exception of one brave little math professor this high?
 Don't they get it that everybody from Rush Limbaugh to Timothy
 Leary despises this initiative?  Don't they read newspapers?   The
 Wall Street Journal, The New York Times?  I won't even ask if they
 read their email.

       That was bad politics.  But that was nothing compared to the
 presentation by the gentleman from the NSA.  If I can do it without
 losing my temper, I want to talk to you a little bit about how
 radically unsatisfactory that was.

       I've been waiting a long time for somebody from Fort Meade to
 come to the aid of Dorothy Denning in Professor Denning's heroic and
 heartbreaking solo struggle against twelve million other people with
 email addresses.  And I listened very carefully and I took notes and I
 swear to God I even applauded at the end.

       He had seven points to make, four of which were disingenuous,
 two were half-truths, and the other was the actual core of the
 problem.

       Let me blow away some of the smoke and mirrors first, more
 for my own satisfaction than because it's going to enlighten you
 people any.  With your indulgence.

       First, the kidporn thing.  I am sick and tired of hearing this
 specious blackwash.  Are American citizens really so neurotically
 uptight about deviant sexual behavior that we will allow our entire
 information infrastructure to be dictated by the existence of
 pedophiles?  Are pedophiles that precious and important to us?  Do
 the NSA and the FBI really believe that they can hide the structure of
 a telephone switch under a layer of camouflage called child
 pornography?   Are we supposed to flinch so violently at the specter
 of child abuse that we somehow miss the fact that you've installed a
 Sony Walkman jack in our phones?

       Look, there were pedophiles before NII and there will be
 pedophiles long after NII is just another dead acronym.  Pedophiles
 don't jump out of BBSes like jacks in the box.  You want to impress
 me with your deep concern for children?  This is Chicago!  Go down
 to the Projects and rescue some children from being terrorized and
 recruited by crack gangs who wouldn't know a modem if it bit them
 on the ass!  Stop pornkidding us around!  Just knock it off with that
 crap, you're embarrassing yourselves.

       But back to the speech by Mr. Baker of the NSA.  Was it just me,
 ladies and gentlemen, or did anyone else catch that tone of truly
 intolerable arrogance?  Did they guy have to make the remark about
 our missing Woodstock because we were busy with our
 trigonometry?  Do spook mathematicians permanently cooped up
 inside Fort Meade consider that a funny remark?  I'd like to make an
 even more amusing observation -- that I've seen scarier secret
 police agencies than his completely destroyed by a Czech hippie
 playwright with a manual typewriter.

       Is the NSA unaware that the current President of the United
 States once had a big bushel-basket-full of hair?  What does he
 expect from the computer community?  Normality?  Sorry pal, we're
 fresh out!   Who is it, exactly, that the NSA considers a level-headed
 sober sort, someone to sit down with and talk to seriously?  Jobs?
 Wozniak?  Gates?  Sculley?  Perot -- I hope to God it's not Perot.
 Bob Allen -- okay, maybe Bob Allen, that brownshoe guy from AT&T.
 Bob Allen seems to think that Clipper is a swell idea, at least he's
 somehow willing to merchandise it.  But Christ, Bob Allen just gave
 eight zillion dollars to a guy whose idea of a good time is Microsoft
 Windows for Spaceships!

       When is the NSA going to realize that Kapor and his people and
 Rotenberg and his people and the rest of the people here are as good
 as people get in this milieu?  Yes they are weird people, and yes they
 have weird friends (and I'm one of them), but there isn't any
 normality left for anybody in this society, and when it comes to
 computers, when the going got weird the weird turned pro!  The
 status quo is *over!*  Wake up to it!  Get used to it!

       Where in hell does a crowd of spooks from Fort Meade get off
 playing "responsible adults" in this situation?  This is a laugh and a
 half!  Bobby Ray Inman, the legendary NSA leader, made a stab at
 computer entrepreneurism and rapidly went down for the third time.
 Then he got out of the shadows of espionage and into the bright
 lights of actual public service and immediately started gabbling like
 a daylight-stricken vampire.  Is this the kind of responsive public
 official we're expected to blindly trust with the insides of our
 phones and computers?  Who made him God?

       You know, it's a difficult confession for a practiced cynic like
 me to make, but I actually trust EFF people.  I do; I trust them;
 there, I've said it.   But I wouldn't trust Bobby Ray Inman to go down
 to the corner store for a pack of cigarettes.

       You know, I like FBI people.  I even kind of trust them, sort of,
 kind of, a little bit.  I'm sorry that they didn't catch Kevin Mitnick
 here.  I'm even sorry that they didn't manage to apprehend Robert
 Steele, who is about one hundred times as smart as Mitnick and ten
 thousand times as dangerous.   But FBI people, I think your idea of
 Digital Telephony is a scarcely mitigated disaster, and I'll tell you
 why.

       Because you're going to be filling out your paperwork in
 quintuplicate to get a tap, just like you always do, because you don't
 have your own pet court like the NSA does.  And for you, it probably
 is going to seem pretty much like the status quo used to be.  But in
 the meantime, you will have armed the enemies of the United States
 around the world with a terrible weapon.  Not your court-ordered,
 civilized Digital Telephony -- their raw and tyrannical Digital
 Telephony.

       You're gonna be using it to round up wiseguys in streetgangs,
 and people like Saddam Hussein are gonna be using it to round up
 democratic activists and national minorities.  You're going to
 strengthen the hand of despotism around the world, and then you're
 going to have to deal with the hordes of state-supported
 truckbombers these rogue governments are sending our way after
 annihilating their own internal opposition by using your tools.  You
 want us to put an axe in your hand and you're promising to hit us
 with only the flat side of it, but the Chinese don't see it that way;
 they're already licensing fax machines and they're gonna need a lot
 of new hardware to gear up for Tiananmen II.

       I've talked a long time, but I want to finish by saying
 something about the NSA guy's one real and actual argument.  The
 terrors of the Brave New World of free individual encryption.  When
 he called encryption enthusiasts "romantic" he was dead-on, and
 when he said the results of spreading encryption were unpredictable
 and dangerous he was also dead-on, because people, encryption is not
 our friend.  Encryption is a mathematical technique, and it has about
 as much concern for our human well-being as the fact that seventeen
 times seventeen equals two hundred and eighty-nine.  It does, but
 that doesn't make us sleep any safer in our beds.

       Encrypted networks worry the hell out of me and they have
 since the mid 1980s.  The effects are very scary and very 
 unpredictable and could be very destabilizing.  But even the Four
 Horsemen of Kidporn, Dope Dealers, Mafia and Terrorists don't worry
 me as much as totalitarian governments.  It's been a long century,
 and we've had enough of them.

       Our battle this century against totalitarianism has left
 terrible scars all over our body politic and the threat these people
 pose to us is entirely and utterly predictable.   You can say that the
 devil we know is better than the devil we don't, but the devils we
 knew were ready to commit genocide, litter the earth with dead, and
 blow up the world.  How much worse can that get?  Let's not build
 chips and wiring for our police and spies when only their police and
 spies can reap the full benefit of them.

       But I don't expect my arguments to persuade anyone in the NSA.
 If you're NSA and I do somehow convince you, by some fluke, then I
 urge you to look at your conscience -- I know you have one -- and
 take the word to your superiors and if they don't agree with you --
 *resign.*  Leave the Agency.  Resign now, and if I'm right about
 what's coming down the line, you'll be glad you didn't wait till later.

       But even though I have a good line of gab, I don't expect to
 actually argue people out of their livelihood.  That's notoriously
 difficult.

       So CFP people, you have a fight on your hands.  I'm sorry that a
 community this young should have to face a fight this savage, for
 such terribly high stakes, so soon.   But what the heck;  you're
 always bragging about how clever you are; here's your chance to
 prove to your fellow citizens that you're more than a crowd of net-
 nattering MENSA dilettantes.  In cyberspace one year is like seven
 dog years, and on the Internet nobody knows you're a dog, so I figure
 that makes you CFP people twenty-eight years old.   And people, for
 the sake of our society and our children you had better learn to act
 your age.

       Good luck.  Good luck to you.  For what it's worth, I think you're
 some of the best and brightest our society has to offer.  Things look
 dark but I feel hopeful.  See you next year in San Francisco.

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

     [BOOK REVIEW] DOING BUSINESS ON THE INTERNET: HOW THE ELECTRONIC
              HIGHWAY IS TRANSFORMING AMERICAN COMPANIES

 By Steve Brock (sbrock@teal.csn.org)

 DOING BUSINESS ON THE INTERNET: HOW THE ELECTRONIC HIGHWAY IS
 TRANSFORMING AMERICAN COMPANIES by Mary J. Cronin.  Van Nostrand
 Reinhold, 115 Fifth Avenue, N.Y., NY 10003, (800) 544-0550, (212)
 254-9499 FAX.  Index, bibliography, list of service providers.  320
 pp., $29.95 paper.  0-442-01770-7

                            REVIEW

    Buying and selling on the Internet?  Deals being made?  Call
 the net police!  Seriously, commercial traffic is only forbidden on
 the NSFnet - the Internet backbone, and restrictions there are
 scheduled to disappear by the end of this year, when the National
 Science Foundation (NSF) turns its administration of NSFnet over to
 commercial organizations.  Sensing this transition, companies are
 flocking to the Internet.  In a recent survey, 63% of Internet
 traffic worldwide is by businesses or their research labs.

    What can businesses get from the Internet?  Mary Cronin, in
 her new book "Doing Business on the Internet," has many answers. 
 After an overview of the mother of all networks and tips for
 choosing a service provider, she outlines strategies for seeking
 and exchanging information, increasing productivity, and increasing
 communications between departments and with customers.
 
    Another asset for businesses is that information can be
 retrieved swiftly.  While the Internet has gone through many
 permutations, businesses have business to do right now, and Cronin
 says that companies with an Internet connection can "receive the
 advantages of high-speed telecommunications and continuously
 evolving technology while learning invaluable lessons about the
 management of networked organizations."
 
    While a few may desire more information than the non-technical
 overview Cronin provides, "Doing Business on the Internet" is a
 solid introduction to networked communication and information
 retrieval - the way business is going to be conducted from now on.

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                         GENERIC FLAME FORM

  This form is a generic-all-purpose Flame Form (tm). Don't you just hate it
  when you are reading Usenet and can't filter through all of the crap
  posted by people who simply do not have a clue! Well, maybe this form 
  will cut down on some of that. If someone pisses you off on Usenet, 
  fill it out and mail it to 'em.

 ---------cut here-------------cut here-------------cut here-------------

 *************************************************************************
                       GENERIC FLAME FORM
 *************************************************************************

 Dear Sir/Madam

 I took exception to your recent post to alt.insert.newsgroup.here

 MESSAGE CONTENT SECTION

 It was (check all that apply):

 ___ lame.
 ___ stupid.
 ___ much longer than any worthwhile thought of which you may be capable.

 Your attention is drawn to the fact that:

 ___ What you posted/said has been done before.
 ___ Not only that, it was also done better the last time.
 ___ Your post was a pathetic imitation of   ______________________.
 ___ Your post contained commercial advertising.
 ___ Your post contained numerous spelling errors.
 ___ Your post contained multiple grammatical errors.
 ___ YOUR POST CONTAINED EXCESSIVE CAPITALIZATION AND/OR PUNCTUATION!!!!!
 ___ Your post was an obvious forgery.
 ___ It was done clumsily.
 ___ You quoted an article in followup and added no new text.
 ___ You quoted an article in followup and only added ___ lines of text.
 ___ You quoted an article in followup and only added the line "Me, too!!!"
 ___ You flamed someone who has been around far longer than you.
 ___ You flamed someone who is far more intelligent and witty than you.
 ___ Your lines are 80 columns wide or wider.

 SIGNATURE SECTION

 ___ Your .sig is longer than four lines.
        ___ And your mailer truncated it.
        ___ Your .sig is ridiculous because (check all that apply):
        ___ You listed ___ snail mail address(es).
        ___ You listed a nine-digit ZIP code.
        ___ You listed ___ phone numbers for people to use in prank calls.
        ___ You included a stupid disclaimer.

 ___ Your pathetic attempt at being witty in the disclaimer failed.
     ___ Miserably.
 
       You included:
        ___ a stupid self-quote.
        ___ a stupid quote from a net.nobody.
        ___ a Rush Limbaugh quote.
        ___ a Dan Quayle joke.
        ___ a Hitler reference
        ___ a reference to the world being 6000 years old
        ___ a reference to Beavis & Butthead.
        ___ lame ASCII graphic(s) (Choose all that apply):
            ___ USS Enterprise
            ___ Australia
            ___ The Amiga logo
            ___ Company logo
            ___ and you stated that you don't speak for your employer.
            ___ Bicycle
            ___ Bart Simpson

 Furthermore:

 ___ You have greatly misunderstood the purpose of alt.insert.newsgroup.here
 ___ You have greatly misunderstood the purpose of the net.
 ___ You are a loser.
 ___ You must have spent your entire life on a milk carton to be this dumb!
 ___ This has been pointed out to you before.

 ___ It is recommended that you:
     ___ Stick to FidoNet and come back when you've grown up.
     ___ Find a volcano and throw yourself in.
     ___ Get a gun and shoot yourself.
     ___ Stop reading alt.censorship and get a life.
     ___ Stop sending email and get a life.
     ___ Learn the concepts of cross-posting and follow-ups
     ___ Try reading a newsgroup for a week (or more than an hour) before
         posting

 Additional comments:
 Follow-ups to: /dev/null


  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                           McDonnell Douglas
                    AIRCRAFT-SPACE SYSTEMS-MISSILES
 
                         Important! Important!

 Please fill out and mail this form within 10 days of purchase

 Thank you for purchasing a McDonnell Douglas military aircraft.  In
 order to protect your new investment, please take a few moments to
 fill out the warranty registration card below.  Answering the survey
 questions is not required, but the information will help us to develop new  
 products that best meet your needs and desires.

 1. _Mr.  _Mrs.  _Ms.  _Lt.  _Gen.  _Comrade  _Classified _Other

 First Name________________Initial____Last Name_______________________

 Latitude________________________Longitude____________________________

 Altitude____________________Password, Code Name, Etc.________________

 2. Which model aircraft did you purchase?

  _F-15 Eagle  _F-16 Falcon  _F-117A Stealth  _Classified

 3. Date of purchase:  Month___________Day___________Year____________

 4. Serial Number____________________

 5. Please check where this product was purchased:

 _Received as Gift/Aid Package
 _Catalog Showroom
 _Sleazy Arms Broker
 _Mail Order
 _Discount Store
 _Government Surplus
 _Classified
 
 6. Please check how you became aware of the McDonnell Douglas product
    you have just purchased:

 _Heard loud noise, looked up
 _Store Display
 _Espionage
 _Recommended by friend/relative/ally
 _Political lobbying by Manufacturer
 _Was attacked by one

 7.  Please check the three (3) factors which most influenced your
 decision to purchase this McDonnell Douglas product:

 _Style/Appearance
 _Kickback/Bribe
 _Recommended by salesperson
 _Speed/Maneuverability
 _Comfort/Convenience
 _McDonnell Douglas Reputation
 _Advanced Weapons Systems
 _Price/Value
 _Back-Room Politics
 _Negative experience opposing one in combat

 8. Please check the location(s) where this product will be used:

 _North America
 _Central/South America
 _Aircraft Carrier
 _Europe
 _Middle East
 _Africa
 _Asia/Far East
 _Misc. Third-World Countries
 _Classified

 9. Please check the products that you currently own, or intend to purchase in  
 the near future:

 Product                 Own     Intend to purchase
 Color TV
 VCR
 ICBM
 Killer Satellite
 CD Player
 Air-to-Air Missiles
 Space Shuttle
 Home Computer
 Nuclear Weapon
 
 10. How would you describe yourself or your organization?  Check all
 that apply:

 _Communist/Socialist
 _Terrorist
 _Crazed (Islamic)
 _Crazed (Other)
 _Neutral
 _Democratic
 _Dictatorship
 _Corrupt (Latin American)
 _Corrupt (Other)
 _Primitive/Tribal

 11. How did you pay for your McDonnell Douglas product?

 _Cash
 _Suitcases of Cocaine
 _Oil Revenues
 _Deficit Spending
 _Personal Check
 _Credit Card
 _Ransom Money
 _Traveler's Check
 
 12. Occupation          You     Your Spouse

 Homemaker
 Sales/Marketing
 Revolutionary
 Clerical
 Mercenary
 Tyrant
 Middle Management
 Eccentric Billionaire
 Defense Minister/General
 Retired
 Student

 13. To help us understand our Customers' lifestyles, please indicate
 the interests and activities in which you and your spouse enjoy
 participating on a regular basis:

 Activity/Interest               You     Your Spouse
 Golf
 Boating/Sailing
 Sabotage
 Running/Jogging
 Propaganda/Disinformation
 Destabilizing/Overthrow
 Default on Loans
 Gardening
 Crafts
 Black Market/Smuggling
 Collectibles/Collections
 Watching Sports on TV
 Wines
 Interrogation/Torture
 Household Pets
 Crushing Rebellions
 Espionage/Reconnaissance
 Fashion Clothing
 Border Disputes
 Mutually Assured Destruction

 Thanks for taking the time to fill out this questionnaire.  Your
 answers will be used in market studies that will help McDonnell
 Douglas serve you better in the future -- as well as allowing you to
 receive mailings and special offers from other companies, governments,  
 extremist groups, and mysterious consortia.

 Comments or suggestions about our fighter planes?  Please write to:

 McDONNELL DOUGLAS CORPORATION
 Marketing Department
 Military Aerospace Division
 P.O. Box 800
 St. Louis, MO 55500
 
  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                             SOCIAL CONTRACT 
          between an individual and the United States Government

 WHEREAS  I wish to reside on the North American continent, and
 WHEREAS  the United States Government controls the area of the
          continent on which I wish to reside, and
 WHEREAS  tacit or implied contracts are vague and therefore
          unenforceable,

 I agree to the following terms:

 SECTION 1: I will surrender a percentage of my property to the
 Government. The actual percentage will be determined by the Government and
 will be subject to change at any time.  The amount to be surrended may be
 based on my income, the value of my property, the value of my purchases, or
 any other criteria the Government chooses.  To aid the Government in
 determining the percentage, I will apply for a Government identification
 number that I will use for all of my major financial transactions.

 SECTION 2:  Should the Government demand it, I will surrender my liberty for
 a period of time determined by the Government and typically no shorter than
 two years.  During that time, I will serve the Government in any way it
 chooses, including military service in which I may be called upon to
 sacrifice my life.

 SECTION 3:  I will limit my behavior as demanded by the Government.  I will
 consume the drugs only permitted by the Government.  I will limit my sexual
 activities to those permitted by the Government.  I will forsake religious
 beliefs that conflict with the Government's determination of propriety.
 More limits may be imposed at any time.

 SECTION 4:  In consideration of the above the Government will allow me to
 find employment, subject to limits that will be subject to the Government.
 These limits may restrict my choice of career or the wages I may accept.

 SECTION 5:  The Government will permit me to reside in the area of North
 America that it controls.  Also the Government will permit me to speak
 freely, subject to limits determined by the Government's Congress and
 Supreme Court.

 SECTION 6:  The Government will attempt to protect my life and my claim to
 the property that it has allowed me to keep.  I agree not to hold the
 Government liable if it fails to protect me or my property.

 SECTION 7:  The Government will offer various services to me.  The nature
 and extent of these services will be determined by the Government and are
 subject to change at any time.

 SECTION 8:  The Government will determine whether I may vote for certain
 Government officials.  The influence of my vote will vary inversely with the
 number of voters, and I understand that it will be typically miniscule.  I
 agree not to hold any elected Government officials liable for acting against
 my best interests or for breaking promises, even if those promises motivated
 me to vote for them.

 SECTION 9:  I agree that the Government may hold me fully liable if I fail
 to abide by the above terms.  In that event, the Government may confiscate
 any property that I have not previously surrended to it, and may imprison me
 for a period of time determined by the Government. I also agree that the
 Government may alter the terms of this contract at any time.


 ______________________________________    ______________________________
 SIGNATURE                                 DATE

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                Electronic Petition to Oppose Clipper
                      Please Distribute Widely

 On January 24, many of the nation's leading experts in cryptography
 and computer security wrote President Clinton and asked him to
 withdraw the Clipper proposal.

 The public response to the letter has been extremely favorable,
 including coverage in the New York Times and numerous computer and
 security trade magazines.

 Many people have expressed interest in adding their names to the
 letter.  In  response to these requests, CPSR is organizing an
 Internet petition drive to oppose the Clipper proposal.  We will
 deliver the signed petition to the White House, complete with the
 names of all the people who oppose Clipper.

 To sign on to the letter, send a message to:

    Clipper.petition@cpsr.org

 with the message "I oppose Clipper" (no quotes)

 You will receive a return message confirming your vote.

 Please distribute this announcement so that others may also express
 their opposition to the Clipper proposal.

 CPSR is a membership-based public interest organization.  For
 membership information, please email cpsr@cpsr.org.  For more
 information about Clipper, please consult the CPSR Internet Library -
 FTP/WAIS/Gopher CPSR.ORG /cpsr/privacy/crypto/clipper


  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

 The President
 The White House
 Washington, DC  20500

 Dear Mr. President:

    We are writing to you regarding the "Clipper" escrowed encryption
 proposal now under consideration by the White House.  We wish to
 express our concern about this plan and similar technical standards
 that may be proposed for the nation's communications infrastructure.

    The current proposal was developed in secret by federal agencies
 primarily concerned about electronic surveillance, not privacy
 protection.  Critical aspects of the plan remain classified and thus
 beyond public review.

    The private sector and the public have expressed nearly unanimous
 opposition to Clipper.  In the formal request for comments conducted
 by the Department of Commerce last year, less than a handful of
 respondents supported the plan.  Several hundred opposed it.

    If the plan goes forward, commercial firms that hope to develop
 new products will face extensive government obstacles. Cryptographers
 who wish to develop new privacy enhancing technologies will be
 discouraged.  Citizens who anticipate that the progress of technology
 will enhance personal privacy will find their expectations
 unfulfilled.

    Some have proposed that Clipper be adopted on a voluntary basis
 and suggest that other technical approaches will remain viable.  The
 government, however, exerts enormous influence in the marketplace, and
 the likelihood that competing standards would survive is small.  Few
 in the user community believe that the proposal would be truly
 voluntary.

    The Clipper proposal should not be adopted.  We believe that if
 this proposal and the associated standards go forward, even on a
 voluntary basis, privacy protection will be diminished, innovation
 will be slowed, government accountability will be lessened, and the
 openness necessary to ensure the successful development of the
 nation's communications infrastructure will be threatened.

    We respectfully ask the White House to withdraw the Clipper
 proposal.


  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                         THE WHITE HOUSE
                  Office of the Press Secretary

   For Immediate Release

                 STATEMENT BY THE PRESS SECRETARY

 The President today announced a new initiative that will bring 
 the Federal Government together with industry in a voluntary 
 program to improve the security and privacy of telephone 
 communications while meeting the legitimate needs of law 
 enforcement.

 The initiative will involve the creation of new products to 
 accelerate the development and use of advanced and secure 
 telecommunications networks and wireless communications links.

 For too long, there has been little or no dialogue between our 
 private sector and the law enforcement community to resolve the 
 tension between economic vitality and the real challenges of 
 protecting Americans.  Rather than use technology to accommodate 
 the sometimes competing interests of economic growth, privacy and 
 law enforcement, previous policies have pitted government against 
 industry and the rights of privacy against law enforcement.

 Sophisticated encryption technology has been used for years to 
 protect electronic funds transfer.  It is now being used to 
 protect electronic mail and computer files.  While encryption 
 technology can help Americans protect business secrets and the 
 unauthorized release of personal information, it also can be used 
 by terrorists, drug dealers, and other criminals.

 A state-of-the-art microcircuit called the "Clipper Chip" has 
 been developed by government engineers.  The chip represents a 
 new approach to encryption technology.  It can be used in new, 
 relatively inexpensive encryption devices that can be attached to 
 an ordinary telephone.  It scrambles telephone communications 
 using an encryption algorithm that is more powerful than many in 
 commercial use today.

 This new technology will help companies protect proprietary 
 information, protect the privacy of personal phone conversations 
 and prevent unauthorized release of data transmitted 
 electronically.  At the same time this technology preserves the 
 ability of federal, state and local law enforcement agencies to 
 intercept lawfully the phone conversations of criminals. 

 A "key-escrow" system will be established to ensure that the 
 "Clipper Chip" is used to protect the privacy of law-abiding 
  Americans.  Each device containing the chip will have two unique
 "keys," numbers that will be needed by authorized government 
 agencies to decode messages encoded by the device.  When the 
 device is manufactured, the two keys will be deposited separately 
 in two "key-escrow" data bases that will be established by the 
 Attorney General.  Access to these keys will be limited to 
 government officials with legal authorization to conduct a 
 wiretap.

 The "Clipper Chip" technology provides law enforcement with no 
 new authorities to access the content of the private 
 conversations of Americans.

 To demonstrate the effectiveness of this new technology, the 
 Attorney General will soon purchase several thousand of the new 
 devices.  In addition, respected experts from outside the 
 government will be offered access to the confidential details of 
 the algorithm to assess its capabilities and publicly report 
 their findings.

 The chip is an important step in addressing the problem of 
 encryption's dual-edge sword:  encryption helps to protect the 
 privacy of individuals and industry, but it also can shield 
 criminals and terrorists.  We need the "Clipper Chip" and other 
 approaches that can both provide law-abiding citizens with access 
 to the encryption they need and prevent criminals from using it 
 to hide their illegal activities.  In order to assess technology 
 trends and explore new approaches (like the key-escrow system), 
 the President has directed government agencies to develop a 
 comprehensive policy on encryption that accommodates:

   the privacy of our citizens, including the need to 
   employ voice or data encryption for business purposes;

   the ability of authorized officials to access telephone 
   calls and data, under proper court or other legal 
   order, when necessary to protect our citizens;

   the effective and timely use of the most modern 
   technology to build the National Information 
   Infrastructure needed to promote economic growth and 
   the competitiveness of American industry in the global 
   marketplace; and 

   the need of U.S. companies to manufacture and export 
   high technology products.

 The President has directed early and frequent consultations with 
 affected industries, the Congress and groups that advocate the 
 privacy rights of individuals as policy options are developed.

 The Administration is committed to working with the private 
 sector to spur the development of a National Information 
 Infrastructure which will use new telecommunications and computer 
 technologies to give Americans unprecedented access to 
 information.  This infrastructure of high-speed networks 
 ("information superhighways") will transmit video, images, HDTV 
 programming, and huge data files as easily as today's telephone 
 system transmits voice.

 Since encryption technology will play an increasingly important 
 role in that infrastructure, the Federal Government must act 
 quickly to develop consistent, comprehensive policies regarding 
 its use.  The Administration is committed to policies that 
 protect all American's right to privacy while also protecting 
 them from those who break the law.

 Further information is provided in an accompanying fact sheet.  
 The provisions of the President's directive to acquire the new 
 encryption technology are also available.  

 For additional details, call Mat Heyman, National Institute of 
 Standards and Technology, (301) 975-2758.

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                          ISDN Contacts (RBOCS)

 Editor's Note:
 This is a list sent to us regarding getting more info on ISDN from the
 RBOCS. We claim no accuracy to this info. I am sure that most, if not
 all of it is valid. If you need ISDN info, feel free to contact one
 of the organizations below.


 COMPANY             CONTACT                             TELEPHONE NO.

 AMERITECH           National ISDN Hotline               1-800-543-ISDN
 BELL ATLANTIC       ISDN Sales & Technology Center      1-800-570-ISDN
 BELL SOUTH          National ISDN  HotLine              1-800-428-ISDN
 CINCINNATI BELL     ISDN Service Center                 1-513-566-DATA
 NYNEX               ISDN Information Hotline            1-800-GET-ISDN
                     or Roy Ray                          1-914-644-5152
 PACIFIC BELL        ISDN Information or Wayne Purves,   1-800-622-0735
                     NI-1 Product Mgr.                   1-510-823-5118
 SNET                Donovan Dillon                      1-203-553-2369
 STENTOR (Canada)    Steve Finlay                        1-604-432-3527
 SOUTHWESTERN BELL   Cyd McInerney                       1-314-235-1567
 U S WEST            Louise Walsh                        1-303-965-7073

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

  BELLSOUTH ANNOUNCES LARGEST GEOGRAPHIC DEPLOYMENT OF ISDN IN THE NATION

 Advanced telecommuting telemedicine and education applications will become
 the most widely available in the nation as a result of a technology
 deployment plan announced today by BellSouth Telecommunications.

 The nine-state introduction of a new way to provide Integrated Services
 Digital Network (ISDN), which combines voice, data and video services,
 begins in June 1994.  ISDN can use advanced fiber optic cable or
 traditional copper cable to transmit multiple services.

 Until now, a customer who wished to use ISDN needed to be served by a
 telephone office that was ISDN capable.  With the innovative approach by
 BellSouth, a customer can obtain the benefits of ISDN through an alternate
 serving arrangement which eradicates geographic boundaries.

 "Expanded access to ISDN will facilitate customer-oriented applications
 since there are fewer technological and geographic limitations on
 availability," said Larry Carter, assistant vice president of product
 management for BellSouth Telecommunications.

 This announcement is the latest in a very aggressive deployment strategy
 for ISDN.

 -- In July 1992, Bellsouth announced the nation's first metropolitan-wide
 deployment of ISDN in the cities of Huntsville and Madison, Ala.

 -- Six months later, South Central Bell customers throughout the state
 of Tennessee were offered ISDN Individual Line Service and now ISDN
 availability is being expanded region wide.

 This announcement significantly increases the percentage of customers
 with access to ISDN capabilities and will ultimately lead to 100% of
 BellSouth customers.  Until now, 50% of BellSouth's customers in major
 metropolitan areas had direct access to ISDN and 320 central offices were
 equipped with ISDN.  The expanded access applies to ISDN Individual Line
 (2B+D) and MegaLink (SM) ISDN Service which is BellSouth's primary rate
 (23B+D) offering.

 "Previously, you had to be served directly by a central office switch
 equipped with ISDN capability.  Under this new alternate serving
 arrangement, ISDN capabilities can be routed from a nearby ISDN-capable
 switch to your home or office -- at no additional charge.  This
 arrangement is a cost-effective and expeditious method of deploying
 ISDN region wide," Carter said.

 ISDN availability is an important part of the information superhighway
 providing access at lower speeds.  For example, through distance 
 learning, advanced classes could be transported at very high speeds
 to a customer's city on the information highway from a university in
 another city.  This high speed signal is then divided into lower speeds
 and redistributed within the city.  ISDN would make these classes
 available to any school anywhere. 

 Dr. Ira Denton, chief surgeon at Crestwood Hospital in Huntsville, Ala.,
 has used ISDN to send, receive and annotate X-rays and video images
 while talking to other physicians.  Because ISDN is available citywide
 and there are no geographic restrictions, physicians can communicate
 through ISDN from any of their offices and even their homes. 

 "Health care specialists as well as any other businesses that have
 multiple locations within a metropolitan area can benefit from this new
 capability," Carter added.  "The education industry will especially benefit
 from applications including distance learning, security and truancy
 monitoring." 

 To aid in marketing ISDN, last year BellSouth announced the "ISDN
 Applications and Solutions Plus" (IAS+) initiative where strategic
 marketing alliances are formed in major metropolitan areas to provide
 customers with complete and innovative solutions.  This initiative in
 addition to the expanded access will make ISDN applications more readily
 available for BellSouth customers. 

 BellSouth Telecommunications, Inc., with headquarters in Atlanta, provides
 telecommunications services in the BellSouth (NYSE: BLS) region.  BellSouth
 Telecommunications, Inc. does business as Southern Bell in North Carolina,
 South Carolina, Georgia and Florida, and as South Central Bell in
 Kentucky, Tennessee, Alabama, Mississippi and Louisiana.  These
 companies serve more than 19 million local telephone lines and provide
 local exchange and intraLATA long distance service over one of the most
 modern telecommunications networks in the world. 

 CONTACT:  
           Karen M. Roughton of BellSouth Telecommunications, 404-529-6514
           BellSouth National ISDN HotLine, 1-800-428-4736

 Posted by:
 Bellcore ISDN Hotline 1-800-992-ISDN

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                A CATALOG OF NATIONAL ISDN SOLUTIONS ...

 The files in this directory compose the final draft 
 of "A Catalog of National ISDN Solutions for Selected NIUF 
 Applications, Second Edition."  This document was 
 approved as an official product of the North American ISDN Users' 
 Forum on February 11, 1994.

 The Catalog is intended for anyone who needs detailed 
 information on how ISDN can be used today to support a wide 
 variety of applications.  Each of the 61 solution guides includes a 
 description, picture, details on what to look for in end-systems, and 
 what to ask for from the ISDN provider.  A separate chapter 
 presents one page summaries of over 200 products and services 
 from over 100 companies.  The new Catalog goes far beyond the First 
 Edition.  For the decision maker, example "feasibility studies" are 
 included to help support a business' decision to use ISDN.  Each 
 solution is rewritten to be more accessible.  The solutions cover 
 National ISDN-1, National ISDN-2, BRI, and PRI.  Applications 
 range from multipoint videoconferencing to point of sale, 
 telecommuting to PBX interflow.  For the more technical reader, 
 additional detailed information is included on a variety of topics.

 CONTENTS

 0.ps          Title page, Preface, Table of Contents, etc.
 1.ps          Introduction
 2.ps          ISDN - A Decision Maker's Perspective
 3.0.ps        National ISDN Solutions
 3.1.A.ps      NI-1 BRI Local Area Network (LAN) Solutions
               Integrating telephones and workstations
               Access on demand to local-area networks
               High performance access on demand to local-area 
               networks Linking workstations with supercomputers
               Leased line replacement
 3.1.B.ps      NI-1 BRI Screen Sharing Solutions
               Screen sharing for two users
               Screen sharing for many users
               Screen sharing with workstations connected to a 
               remote LAN
 3.1.C.ps      NI-1 BRI Video Solutions
               Desktop videoconferencing
               Centralized management of video images
               Videoconferencing facilities
 3.1.D.ps      NI-1 BRI Voice & Data Solutions
               Caller identification
               Call coverage
               ACD agent at home
 3.1.E.ps      NI-1 BRI File Transfer Solutions
               Flexible bandwidth allocation
               File transfer between personal computers
               File transfer between a personal computer and a host 
               computer
               High speed transfer of large text and image files
 3.1.F.ps      NI-1 BRI Work-At-Home Solutions
               Telecommuting with casual data requirements
               Telecommuting and transferring files
               Telecommuting accessing interactive services
               High performance telecommuting (interactive 
               graphics and text)
 3.1.G.        NI-1 BRI Facsimile and Imaging Solutions
               Group 3 facsimile
               Receiving faxes as electronic documents
               High speed access to electronic document image 
               systems
               Multimedia real estate listings
               Medical document imaging
 3.1.H.ps      NI-1 BRI Transaction Services Solutions
               Credit card authorization at the point of sale
               Electronic Data Interchange (EDI)
               Insurance verification at the point of service
               Supermarket checkout
 3.1.I.ps      Other NI-1 BRI Solutions
               Access to IBM mainframes and compatibles
               Remote access to minicomputers
               Integrating voice and data communications
               Integrated communications and messaging
               Automatic utility meter reading
               University dormitory
               Access to frame relay services
               Switched access to frame relay services
               High fidelity voice transmission systems
 3.2.ps        National ISDN-2 BRI Solutions
               Roll about videoconferencing
               X.25 backup
               Packet mode screen sharing for many users
               Home office
 3.3.0.ps      National ISDN-2 PRI Solutions
 3.3.A.ps      NI-2 PRI Local Area Network (LAN) Solutions
               Local-area network interconnection
               File transfer and LAN access in PBX environment
               Private line overflow and disaster recovery
               ISDN concentrator for campus connectivity
 3.3.B.ps      NI-2 PRI Video Solutions
               PRI Videoconferencing
               Multimedia desktop video via Ethernet and 
               Multirate ISDN
               Multipoint videoconferencing
               Videoconferencing facilities
 3.3.C.ps      NI-2 PRI Voice & Data Solutions
               Caller identification to PBXs and other devices
               Emergency-services call management
               Call by Call Service Selection
 3.3.D.ps      NI-2 PRI Facsimile and Imaging Solutions
               Fax mail
               Teleradiology
 3.3.E.ps      Other NI-2 PRI Solutions
               High quality audio transmission
               Access to litigation support system
               Call center load balancing
               Networked voice messaging systems
 4.0&1.ps      National ISDN Product Information and Industry 
               Contacts
 4.2.1.ps      Basic Rate Terminal Adapters
 4.2.2.ps      Basic Rate Interface Cards for Personal Computers, 
               Workstations,  and Minicomputers; Workstations 
               with Built-in ISDN
 4.2.3.ps      Attendant Consoles
 4.2.4.ps      ISDN Phones
 4.2.5.ps      Single Port ISDN LAN Bridges
 4.2.6.ps      Communications Servers, Routers, Bridges, and 
               Multiport ISDN LAN Bridges and Routers
 4.2.7.ps      Inverse Multiplexers, Multiplexers, and 
               Communications Controllers
 4.2.8.ps      PRI Adapters
 4.2.9.ps      Videoconferencing Systems and Multipoint Control 
               Units
 4.2.10.ps     Other Products
 4.2.11.ps     Network Terminations (NT-1s)
 4.2.12.ps     Power Supplies
 4.2.13.ps     Software and Services
 4.2.14.ps     Private Network Solutions and Private Branch 
               Exchanges(PBXs)
 4.2.15.ps     Service Providers 
 4.3.ps        Supplier Contact Information
 5.1.ps        Selected Topics in ISDN
               Call Types and Bearer Capabilites
               Terminal Endpoint Identifiers (TEIs)
               Service Profile Identifiers (SPIDs)
               Rate Adaptation: V.110/V.120
               Lower Layer Compatibility (LLC) and Higher Layer 
               Compatibility (HLC) Information Elements
               Signaling System 7 (SS7) Interconnection
               Multiline Hunt Group
               Powering and Wiring of Customer Equipment
               Configurations for High Bandwidth Applications
               Communications Server Alternatives
               NIUF ISDN Interface Groups (NIIGs) and Parameter 
               Groups (NIPGs)
               Additional Information Applicable to Many ISDN 
               Solutions
               Conformance Testing
 5.2.ps        ISDN Signaling Diagrams
 6.ps          Bibliography
 7.ps          Glossary of Terms
 8.ps          Acronym List
 A.ps          Annex: How the NIUF is making real the promise of 
 ISDN          An Overview of the North American ISDN Users' 
               Forum (NIUF)
               Relevance of this NIUF Catalog
               Application Profiles
               Implementation Agreements
               Versions
               Conformance Criteria and ISDN Testing
               Application Software Interfaces
               Cost Justification Worksheet
 I.ps          Index


 All of the above files are uncompressed PostScript files and may 
 be FTPed using the text/ASCII option.

 The Catalog is a publicly available document and may be 
 distributed and used freely with proper recognition of the source.

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
    
         SPRINT EXPANDS PRESENCE IN CHINA, INTRODUCES NEW SERVICES


  Interesting press release I thought you might like.

    THIS RELEASE WAS DISTRIBUTED IN CHINA ONLY.
    Contacts: Janis Langley, (O) 202-828-7427
    
         BEIJING, March 21, 1994 -- Sprint today announced a
significant expansion of its presence, and product and service
offerings, in China.  Sprint also announced the immediate availability
of three of those services -- a toll-free Sprint Express(R) number for
calling worldwide and for collect calling to the United States, a
prepaid calling card, and CLEARLINE(R) international private-line
service.

         Sprint made the announcements today at a press briefing and
two-day seminar to inform customers and leading Chinese organizations
of the company's expanded local capabilities.

         Sprint is one of the largest telecommunications carriers in
the United States, providing innovative calling services to nearly 8
million customers in that country alone.  Sprint offers voice, video
and data communications services worldwide via some of the world's
largest and most advanced networks.

         Sprint is a pioneer and innovator in technology.  It built
the first nationwide (40,000 kilometer) all-digital, fiber-optic
network in the United States.  It also is the first carrier to offer
such advanced services as Asynchronous Transfer Mode -- a broadband
service that simultaneously carries voice, data and image -- and a
voice-recognition calling card that automatically dials frequently
called numbers with a single-word command, such as "home" or "office."

         Sprint has operated locally in China since 1992 through an
office in Beijing that primarily offered data communications systems
support for the company's growing customer base.  Its Beijing office
now has expanded to 15 employees who represent the company's
increasingly diverse capabilities in consumer services, including the
Sprint Prepaid Calling Card and Sprint FONCARD(SM); international
network solutions for large-scale multinational users; data
communications systems and services; and international carrier
services to provide transit and capacity for telecommunications
carriers worldwide.

         Sprint China will immediately begin to offer several of
Sprint's versatile and cost-effective calling products: a toll-free
Sprint Express number for global calling and collect calls to the
United States; Sprint's Prepaid Calling Card; and its CLEARLINE
international private line service.
         
          o Sprint Express -- By dialing "108-13," callers in China can 
place collect calls to family and colleagues in the United States, 
and also charge calls to the United States and worldwide using 
their major credit card or Sprint FONCARD.  Operator assistance is 
available in English, with Mandarin support planned.
 
         o Sprint's Prepaid Calling Card, which initially will be 
available only through a limited market test, lets consumers pre-
purchase calling credits that they can use from any telephone 
without needing exact change.  The card carries attractive 
designer graphics -- suitable for collectors -- and offers the 
added convenience of operator assistance.
    
         Callers can use the prepaid calling card from nearly 30
countries for calls to virtually any other country worldwide --
including the United States.  Mandarin-language instructions are
available for calls from China (by dialing 108-16).  The card can also
be used in more than 28 countries worldwide to make calls back to
China or to virtually anywhere in the world.
    
         o CLEARLINE international private-line service lets
large-scale users consolidate their international calling to receive
volume discounts.  The service is provided via Sprint's worldwide
network, which extends from the United States through its
participation in virtually every major submarine fiber-optic cable
system project.
         
         "Sprint has been active in China for several years, and we
are delighted to be able to expand our commitment to users in this
important market by offering some of the other feature-rich, cost
effective products popular in the United States and worldwide," said
Herb Bradley, China country manager for Sprint International, Sprint's
global telecommunications subsidiary.

         "We believe that businesses and consumers will benefit from
these innovative services as much in China as they have in the United
States, and we look forward to building on strong relationships we
have formed with many Chinese organizations in delivering these new
services," he said.

         Elsewhere in the Pacific Rim, Sprint has data network points
of presence in Hong Kong, Indonesia, Japan, Korea, Taiwan, Singapore,
Australia and New Zealand.  It also has an office in Hong Kong, which
provides sales and technical support for Sprint's business interests
in Hong Kong, Indochina, Indonesia, Malaysia, the Philippines, Taiwan,
Thailand and Singapore.

         Sprint operates fiber-optic and value-added networks that are
 among the world's largest, offering voice services to over 290 
 countries and locations, packet-switched data links to more than 
 120 countries and international locations, and video services via 
 one of the world's largest videoconferencing networks, serving 
 nearly 40 countries. Sprint also has U.S. cellular operations that 
 serve 42 metropolitan markets and more than 50 rural service 
 areas.  The company has more than 50,000 employees and has 
 operations in six continents through more than 50 subsidiaries, 
 joint ventures and distributors.  Sprint's customers include 80 
 percent of the 500 largest U.S. industrial corporations (the 
 "Fortune 500"), and the U.S. federal government, which awarded 
 Sprint a contract to provide 40 percent of the government's total 
 long distance services, and data and video services, over a
 10-year period. 

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                              SOCIAL SECURITY FAQ
              HOW TO GET INFORMATION AND HOW TO PROTECT YOUR OWN

 By Chris Hibbert (hibbert@netcom.com)
 Computer Professionals For Social Responsibility
 
 Many people are concerned about the number of organizations asking for their
 Social Security Numbers.  They worry about invasions of privacy and the
 oppressive feeling of being treated as just a number.  Unfortunately, I 
 can't offer any hope about the dehumanizing effects of identifying you with 
 your numbers.  I *can* try to help you keep your Social Security Number 
 from being used as a tool in the invasion of your privacy.
 
 Surprisingly, government agencies are reasonably easy to deal with; private
 organizations are much more troublesome.  Federal law restricts the agencies
 at all levels of government that can demand your number and a fairly 
 complete disclosure is required even if its use is voluntary.  There are no 
 comparable Federal laws restricting the uses non-government organizations 
 can make of it, or compelling them to tell you anything about their plans.  
 Some states have recently enacted regulations on collection of SSNs by 
 private entities. With private institutions, your main recourse is refusing 
 to do business with anyone whose terms you don't like.  They, in turn, are 
 allowed to refuse to deal with you on those terms.
 
 
                                Short History
 
 Social Security numbers were introduced by the Social Security Act of 1935.
 They were originally intended to be used only by the social security 
 program. In 1943 Roosevelt signed Executive Order 9397 which required 
 federal agencies to use the number when creating new record-keeping systems.  
 In 1961 the IRS began to use it as a taxpayer ID number. The Privacy Act of 
 1974 required authorization for government agencies to use SSNs in their 
 data bases and required disclosures (detailed below) when government 
 agencies request the number.  Agencies which were already using SSN as an 
 identifier before January 1, 1975 were allowed to continue using it.  The 
 Tax Reform Act of 1976 gave authority to state or local tax, welfare, 
 driver's license, or motor vehicle registration authorities to use the 
 number in order to establish identities.  The Privacy Protection Study 
 Commission of 1977 recommended that the Executive Order be repealed after 
 some agencies referred to it as their authorization to use SSNs.  I don't 
 know whether it was repealed, but no one seems to have cited EO 9397 as 
 their authorization recently.
 
 Several states use the SSN as a driver's license number, while others record
 it on applications and store it in their database.  Some states that
 routinely use it on the license will make up another number if you insist.
 According to the terms of the Privacy Act, any that have a space for it on
 the application forms should have a disclosure notice.  Many don't, and 
 until someone takes them to court, they aren't likely to change.  (Though 
 New York recently agreed to start adding the notice on the basis of a letter 
 written by a reader of this blurb.)
 
 The Privacy Act of 1974 (Pub. L. 93-579) requires that any federal, state, 
 or local government agency that requests your Social Security Number has to 
 tell you four things:
 
 1:  Whether disclosure of your Social Security Number is required or
     optional,
 
 2:  What statute or other authority they have for asking for your number,
 
 3:  How your Social Security Number will be used if you give it to them, and
 
 4:  The consequences of failure to provide an SSN.
 
 In addition, the Act says that only Federal law can make use of the Social
 Security Number mandatory.  So anytime you're dealing with a government
 institution and you're asked for your Social Security Number, just look for
 the Privacy Act Statement.  If there isn't one, complain and don't give your
 number.  If the statement is present, read it.  If it says giving your 
 Social Security Number is voluntary, you'll have to decide for yourself 
 whether to fill in the number.
 
 
                            Private Organizations
 
 The guidelines for dealing with non-governmental institutions are much more
 tenuous.  Most of the time private organizations that request your Social
 Security Number can get by quite well without your number, and if you can
 find the right person to negotiate with, they'll willingly admit it.  The
 problem is finding that right person.  The person behind the counter is 
 often told no more than "get the customers to fill out the form completely."
 
 Most of the time, you can convince them to use some other number.  Usually
 the simplest way to refuse to give your Social Security Number is simply to
 leave the appropriate space blank.  One of the times when this isn't a 
 strong enough statement of your desire to conceal your number is when 
 dealing with institutions which have direct contact with your employer.  
 Most employers have no policy against revealing your Social Security Number; 
 they apparently believe that it must be an unintentional slip when an 
 employee doesn't provide an SSN to everyone who asks.
 
 Public utilities (gas, electric, phone, etc.) are considered to be private
 organizations under the laws regulating SSNs.  Most of the time they ask for
 an SSN, and aren't prohibited from asking for it, but they'll usually relent
 if you insist.  Ask to speak to a supervisor, insist that they document a
 corporate policy requiring it, ask about alternatives, ask why they need it
 and suggest alternatives.
 
  Lenders and Borrowers
  (those who send reports to the IRS)
 
 Banks and credit card issuers and various others are required by the IRS to
 report the SSNs of account holders to whom they pay interest or when they
 charge interest and report it to the IRS.  If you don't tell them your 
 number you will probably either be refused an account or be charged a 
 penalty such as withholding of taxes on your interest.
 
 Most banks send your name, address, and SSN to a company called ChexSystem
 when you open an account.  ChexSystem keeps a database of people whose
 accounts have been terminated for fraud or chronic insufficient funds in the
 past 5 years.  ChexSystems is covered by the Fair Credit Reporting Act, and
 the bank is required to let you know if it refuses to open your account 
 and a report from ChexSystems was a factor.  You can also send a letter to
 ChexSystems directly and request a copy of your report.
 
 Many Banks, Brokerages, and other financial institutions have started
 implementing automated systems to let you check your balance. All too often,
 they are using SSNs as the PIN that lets you get access to your personal
 account information.  If your bank does this to you, write them a letter
 pointing out how common it is for the people with whom you have financial
 business to know your SSN.  Ask them to change your PIN, and if you feel 
 like doing a good deed, ask them to stop using the SSN as a default 
 identifier for their other customers.  Some customers will believe that 
 there's some security in it, and be insufficiently protective of their 
 account numbers.
 
 Sometimes banks provide for a customer-supplied password, but are reluctant
 to advertise it.  The only way to find out is to ask if they'll let you
 provide a password.  (This is reportedly true of Citibank Visa, e.g.  They
 ask for a phone number but are willing to accept any password.)
 
 When buying (and possibly refinancing) a house, most banks will now ask for
 your Social Security Number on the Deed of Trust.  This is because the
 Federal National Mortgage Association recently started requiring it.  The
 fine print in their regulation admits that some consumers won't want to give
 their number, and allows banks to leave it out when pressed.  [It first
 recommends getting it on the loan note, but then admits that it's already on
 various other forms that are a required part of the package, so they already
 know it.  The Deed is a public document, so there are good reasons to refuse
 to put it there, even though all parties to the agreement already have 
 access to your number.]
 
  Insurers, Hospitals, Doctors
 
 No laws require medical service providers to use your Social Security Number
 as an ID number (except for Medicare, Medicaid, etc.)  They often use it
 because it's convenient or because your employer uses it to identify
 employees to its groups health plan.  In the latter case, you have to get
 your employer to change their policies.  Often, the people who work in
 personnel assume that the employer or insurance company requires use of the
 SSN when that's not really the case.  When a previous employer asked for my
 SSN for an insurance form, I asked them to try to find out if they had to 
 use it.  After a week they reported that the insurance company had gone 
 along with my request and told me what number to use.  Blood banks also ask 
 for the number but are willing to do without if pressed on the issue.  
 After I asked politely and persistently, the blood bank I go to agreed that 
 they didn't have any use for the number. They've now expunged my SSN from 
 their database, and they seem to have taught their receptionists not to 
 request the number.
 
 Most insurance companies share access to old claims through the Medical
 Information Bureau.  If your insurance company uses your SSN, other 
 insurance companies will have a much easier time finding out about your 
 medical history.  You can get a copy of the file MIB keeps on you by writing 
 to Medical Information Bureau, P.O. Box 105, Essex Station, Boston, MA 
 02112. Their phone number is (617)426-3660.

 If an insurance agent asks for your Social Security Number in order to 
 "check your credit", point out that the contract is invalid if your check 
 bounces or your payment is late.  They don't need to know what your credit 
 is like, just whether you've paid them.
 
  Children
 
 The Family Support Act of 1988 (Pub. L. 100-485) requires states to require
 parents to give their Social Security Numbers in order to get a birth
 certificate issued for a newborn.  The law allows the requirement to be
 waived for "good cause", but there's no indication of what may qualify.
 
 The IRS requires taxpayers to report SSNs for dependents over one year of
 age, but the requirement can be avoided if you're prepared to document the
 existence of the child by other means if challenged.  The law on this can be
 found at 26 USC 6109.  The penalty for not giving a dependant's number is
 only $5.  Several people have reported that they haven't provided SSNs for
 their dependents for several years, and haven't been challenged by the IRS.
 
  Universities and Colleges
 
 Universities that accept federal funds are subject to the Family Educational
 Rights and Privacy Act of 1974 (the "Buckley Amendment"), which prohibits
 them from giving out personal information on students without permission.
 There is an exception for directory information, which is limited to names,
 addresses, and phone numbers, and another exception for release of
 information to the parents of minors.  There is no exception for Social
 Security Numbers, so covered Universities aren't allowed to reveal students'
 numbers without their permission.  In addition, state universities are bound
 by the requirements of the Privacy Act, which requires them to provide the
 disclosures mentioned above.  If they make uses of the SSN which aren't
 covered by the disclosure they are in violation.
 
            Why SSNs are a bad choice for UIDs in data bases
 
 Database designers continue to introduce the Social Security Number as the
 key when putting together a new database or when re-organizing an old one.
 Some of the qualities that are (often) useful in a key and that people think
 they are getting from the SSN are Uniqueness, Universality, Security, and
 Identification.  When designing a database, it is instructive to consider
 which of these qualities are actually important in your application; many
 designers assume unwisely that they are all useful for every application,
 when in fact each is occasionally a drawback.  The SSN provides none of 
 them, so designs predicated on the assumption that it does provide them will 
 fail in a variety of ways.
 
  Uniqueness
 
 Many people assume that Social Security Numbers are unique.  They were
 intended by the Social Security Administration to be unique, but the SSA      
 didn't take sufficient precautions to ensure that it would be so.  They have
 several times given a previously issued number to someone with the same name
 and birth date as the original recipient, thinking it was the same person
 asking again.  There are a few numbers that were used by thousands of people
 because they were on sample cards shipped in wallets by their manufacturers.
 (One is given below.)
 
 The passage of the Immigration reform law in 1986 caused an increase in the
 duplicate use of SSNs.  Since the SSN is now required for employment, 
 illegal immigrants must find a valid name/SSN pair in order to fool the INS, 
 and IRS long enough to collect a paycheck.  Using the SSN when you can't 
 cross-check your database with the SSA means you can count on getting some 
 false numbers mixed in with the good ones.
 
  Universality
 
 Not everyone has a Social Security Number.  Foreigners are the primary
 exception, but many children don't get SSNs until they're in school.  They
 were only designed to be able to cover people who were eligible for Social
 Security.
 
  Identification
 
 Few people ever ask to see an SSN card; they believe whatever you say.  The
 ability to recite the number provides little evidence that you're associated
 with the number in anyone else's database.
 
 There's little reason to carry your card with you anyway.  It isn't a good
 form of identification, and if your wallet is lost or stolen, it provides
 another way for the thief to hurt you, especially if any of your banks use
 the SSN as your PIN.
 
  Security
 
 The card is not at all forgery-resistant, even if anyone did ever ask for 
 it. The numbers don't have any redundancy (no check-digits) so any 9-digit 
 number in the range of numbers that have been issued is a valid number.  
 It's relatively easy to copy the number incorrectly, and there's no way to 
 tell that you've done so.
 
 In most cases, there is no cross-checking that a number is valid.  Credit
 card and checking account numbers are checked against a database almost 
 every time they are used.  If you write down someone's phone number 
 incorrectly, you find out the first time you try to use it.
 
 
 
              Why you should resist requests for your SSN
 
 When you give out your number, you are providing access to information about
 yourself.  You're providing access to information that you don't have the
 ability or the legal right to correct or rebut.  You provide access to data
 that is irrelevant to most transactions but that will occasionally trigger
 prejudice.  Worst of all, since you provided the key, (and did so
 "voluntarily") all the info discovered under your number will be presumed to
 be true, about you, and relevant.
 
 A major problem with the use of SSNs as identifiers is that it makes it hard
 to control access to personal information.  Even assuming you want someone 
 to be able to find out some things about you, there's no reason to believe 
 that you want to make all records concerning yourself available.  When 
 multiple record systems are all keyed by the same identifier, and all are 
 intended to be easily accessible to some users, it becomes difficult to 
 allow someone access to some of the information about a person while 
 restricting them to specific topics.
 
 Unfortunately, far too many organizations assume that anyone who presents
 your SSN must be you.  When more than one person uses the same number, it
 clouds up the records.  If someone intended to hide their activities, it's
 likely that it'll look bad on whichever record it shows up on.  When it
 happens accidentally, it can be unexpected, embarrassing, or worse.  How do
 you prove that you weren't the one using your number when the record was
 made?
 
 
                 What you can do to protect your number
 
 If despite your having written "refused" in the box for Social Security
 Number, it still shows up on the forms someone sends back to you (or worse,
 on the ID card they issue), your recourse is to write letters or make phone
 calls.  Start politely, explaining your position and expecting them to
 understand and cooperate.  If that doesn't work, there are several more
 things to try:
 
 1: Talk to people higher up in the organization.  This often works
         simply because the organization has a standard way of dealing
         with requests not to use the SSN, and the first person you deal
         with just hasn't been around long enough to know what it is.
 
 2: Enlist the aid of your employer.  You have to decide whether talking
         to someone in personnel, and possibly trying to change
         corporate policy is going to get back to your supervisor and
         affect your job.
 
 3: Threaten to complain to a consumer affairs bureau.  Most newspapers
         can get a quick response.  Ask for their "Action Line" or
         equivalent.  If you're dealing with a local government agency,
         look in the state or local government section of the phone book
         under "consumer affairs."  If it's a federal agency, your
         congressmember may be able to help.
 
 4: Insist that they document a corporate policy requiring the number.
         When someone can't find a written policy or doesn't want to
         push hard enough to get it, they'll often realize that they
         don't know what the policy is, and they've just been following
         tradition.
 
 5: Ask what they need it for and suggest alternatives.  If you're
         talking to someone who has some independence, and they'd like
         to help, they will sometimes admit that they know the reason
         the company wants it, and you can satisfy that requirement a
         different way.
 
 6: Tell them you'll take your business elsewhere (and follow through if
         they don't cooperate.)
 
 7: If it's a case where you've gotten service already, but someone
         insists that you have to provide your number in order to have a
         continuing relationship, you can choose to ignore the request
         in hopes that they'll forget or find another solution before
         you get tired of the interruption.
 
 If someone absolutely insists on getting your Social Security Number, you 
 may want to give a fake number.  There are legal penalties for providing 
 a false number when you expect to gain some benefit from it.  A federal 
 court of appeals ruled that using a false SSN to get a Driver's License 
 violates the federal law.
 
 There are a few good choices for "anonymous" numbers.  Making one up at
 random is a bad idea, as it may coincide with someone's real number and 
 cause them some amount of grief. It's better to use a number like 
 078-05-1120, which was printed on "sample" cards inserted in thousands of 
 new wallets sold in the 40's and 50's.  It's been used so widely that both 
 the IRS and SSA recognize it immediately as bogus, while most clerks haven't
 heard of it.
 
 There are several patterns that have never been assigned, and which 
 therefore don't conflict with anyone's real number.  They include numbers 
 with any field all zeroes, and numbers with a first digit of 8 or 9.  
 For more details on the structure of SSNs and how they are assigned, use 
 anonymous ftp to retrieve the file: 
 /cpsr/privacy/ssn/SSN-structure from the machine cpsr.org.
  
 Giving a number with an unused patterns rather than your own number isn't
 very useful if there's anything serious at stake since they're likely to be
 noticed .  The Social Security Administration recommends that people showing
 Social Security cards in advertisements use numbers in the range 987-65-4320
 through 987-65-4329.
 
 If you're designing a database or have an existing one that currently uses
 SSNs and want to use numbers other than SSNs, you should make your
 identifiers use some pattern other than 9 digits.  You can make them longer
 or shorter than that, or include letters somewhere inside.  That way no one
 will mistake the number for an SSN.
 
 The Social Security Administration recommends that you request a copy of 
 your file from them every few years to make sure that your records are 
 correct (your income and "contributions" are being recorded for you, and 
 no one else's are.)  As a result of a recent court case, the SSA has agreed 
 to accept corrections of errors when there isn't any contradictory evidence,
 SSA has records for the year before or after the error, and the claimed 
 earnings are consistent with earlier and later wages.  (San Jose Mercury 
 News, 5/14, 1992 p 6A) Call the Social Security Administration at 
 (800) 772-1213 and ask for Form 7004, (Request for Earnings and Benefit 
 Estimate Statement.)  
 
                              When All Else Fails
                        (Getting a Replacement Number)
 
 The Social Security Administration (SSA) will occasionally issue a
 replacement SSN.  The most common justification is that the SSA or the IRS
 has mixed together earnings records from more than one person, and since one
 of the people can't be located, it's necessary to issue a new number to the
 other.  The SSA tries very hard to contact the person who is using the 
 number incorrectly before resorting to this process.
 
 There are a few other situations that the SSA accepts as justifying a new
 number.  The easiest is if the number contains the sequences 666 or 13.  The
 digits need to be consecutive according to SSA's policy manual, but may be
 separated by hyphens. You apparently don't have to prove that your religious
 objection is sincere. Other commonly accepted complaints include harassment,
 sequential numbers assigned to family members, or serious impact on your
 credit history that you've tried to clear up without success.
 
 In all cases, the process includes an in-person interview at which you have
 to establish your identity and show that you are the original assignee of 
 the number.  The decision is normally made in the local office. If the 
 problem is with a credit bureau's records, you have to show that someone 
 else continues to use your number, and that you tried to get the credit 
 bureau to fix your records but were not successful. When they do issue a 
 new number, the new recoreds are linked to the old ones. (Unless you can 
 convince them that your life might be endangered by such a link.)
 
 There are a few justifications that they don't accept at all: attempting to
 avoid legal responsibilities, poor credit record which is your own fault,
 lost SSNm card (without evidence that someone else has used it), or use of
 the number by government agencies or private companies.
 
 The only justification the SSA accepts for cancelling the issuance of an SSN
 is that the number was assigned under their Enumeration at Birth (wherein
 SSNs are assigned when birth certificates are issued) program without the
 parent's consent.  In this case, the field officer is instructed to try very
 hard to convince the parent that getting the number revoked is futile, but 
 to give in when the parent is persistent.
 
                              US Passports
 
 The application for US Passports (DSP-11 12/87) requests a Social Security
 Number, but gives no Privacy Act notice.  There is a reference to "Federal
 Tax Law" and a misquotation of Section 6039E of the 1986 Internal Revenue
 Code, claiming that the section requires that you provide your name, mailing
 address, date of birth, and Social Security Number.  The referenced section
 only requires TIN (SSN), and it requires that it be sent to the IRS and not
 to the Passport office.  It appears that when you apply for a passport, you
 can refuse to reveal your SSN to the passport office, and instead mail a
 notice to the IRS, giving only your SSN (other identifying info optional) 
 and notifying them that you are applying for a passport. [Copies (in 
 postscript) of the letter that was used by one contributor (The measure of 
 his success is that he didn't hear back from any with complaints.) are 
 available by anonymous ftp from cpsr.org in /cpsr/privacy/ssn/passport.ps.Z.  
 I'd be interested in hearing how the State department and the Post Office 
 (which processes passport applications) react.]
 
 
              Results from Some Recent Legal Cases (3/24/93)
 
 CPSR joined two legal cases in 1992 which concerned Social Security Numbers
 and privacy.  One of them challenged the IRS practice of printing Social
 Security Numbers on mailing labels when they send out tax forms and related
 correspondence.  The other challenged Virginia's requirement of a Social
 Security Number in order to register to vote.
 
 Dr. Peter Zilahy Ingerman filed suit against the IRS in Federal District
 Court in 1991, and CPSR filed a friend of the court brief in August '91. The
 case was decided in favor of the IRS.  According to "Privacy Journal", the
 IRS plans to start covering the SSNs on its mailing labels, but they made 
 the decision too late to affect this year's returns. Some people got a 
 version that hid their numbers, but it was apparently a pilot project in 
 limited areas.                                                                        |
 
 The Virginia case was filed by a resident who refused to supply a Social
 Security Number when registering to vote.  When the registrar refused to
 accept his registration, he filed suit.  He also challenged Virginia on two
 other bases: the registration form lacked a Privacy Act notice, and the 
 voter lists they publish include Social Security Numbers.  The Federal court 
 of appeals ruled that Virginia may not require the disclosure of Social 
 Security numbers as a condition of registering to vote. The court said that 
 the Virginia requirement places an "intolerable burden" on the right to 
 vote. The case is officially referred to as Greidinger v. Davis, No. 
 92-1571, Fourth Circuit Court of Appeals, March 22, 1993.
 
 
 If you have suggestions for improving this document please send them to me
 at:
                                        Chris Hibbert
 hibbert@netcom.com        or           1195 Andre Ave.
                                        Mountain View, CA 94040
 
 
 
 New versions of this posting are always available using any of the
 following mechanisms.  You can use anonymous ftp from the following
 sites: 
 
     Site                    Location                                      
 
    rtfm.mit.edu         /pub/usenet-by-hierarchy/news/answers/ssn-privacy
    ftp.pica.army.mil    /pub/privacy/ssn-privacy.faq                     
    ftp.cpsr.org         /cpsr/privacy/ssn/Social_Security_Number_FAQ

 Gopher can retrieve it from gopher.cpsr.org.  World Wide Web (www) can
 find it using the following locator (and probably several others you
 could construct from the other directions I've given):
 
    http://polar.pica.army.mil/ssn_faq.html
 
 You can also retrieve it by sending email to
 
     Address                  Command (omit the quotes)
 
    listserv@cpsr.org    "GET cpsr/privacy/ssn Social_Security_Number_FAQ"
    mail-server@rtfm.mit.edu                                              
                         "send usenet-by-hierarchy/news/answers/ssn-privacy"
 
 You can also ask for general help from either of these email servers by
 sending a message to the same address with just "help" in the body.

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                CLIPPER CHIP IS YOUR FRIEND, NSA CONTENDS
         NSA Seeks to Dispel Misgivings of Public About Clipper Chip

 By Bob Davis
 
 Staff Reporter of The Wall Street Journal.
 (C)1994 Wall Street Journal
 
 FORT MEADE, Md. --- The National Security Agency wants everyone to know
 that its new computer-security system will protect individual privacy.
 But as the spy agency knows, hardly anyone believes that.
 
 Critics fear the government will use the NSA technology, designed in
 secret, to spy on Americans.  The project "is a focal point for the
 distrust of government," acknowledges Clinton Brooks, the NSA scientist
 who led the so-called Clipper Chip project, in the agency's first
 interview on the subject.
 
 The Clinton administration last month adopted the NSA plan for a series
 of computer chips that would protect telephones and computers.  Use
 of the technology would be voluntary.  Federal agencies would adopt it
 first, and public use is expected to spread gradually.
 
 Under the plan, cryptographic "keys" that could unscramble the
 communications would be split in two and held separately at the Treasury
 Department and the National Institute of Standards and Technology.  That
 way, law-enforcement agents could tap the communications by getting court
 authorization to obtain the two halves.  The idea is to boost security
 but to keep the technology out of the hands of criminals and spies.
 
 The NSA is the world's biggest eaves-dropper.  Equipped with the latest
 in super-computers and satellite receivers, it targets communications by
 foreign governments.  The agency shuns publicity but agreed to the
 interview to explain its role in the Clipper controversy and try to
 dispel fears.  Mr. Brooks, a 26-year veteran of the NSA, says the project
 began in 1989 and cost more than $2.5 million.
 
 He says the NSA is consumed with what it calls the "equities problem" ---
 how to balance privacy rights against the needs of law enforcement,
 national security and private industry.  In 1989, he and Raymond Kammer,
 deputy director of NIST, began discussions about how to improve computer
 security without making it impenetrable to police.  NIST is a Commerce
 Department agency with formal responsibility for unclassified computer
 security.
 
 Before the interview, Mr. Brooks takes a look around a small cryptographic
 museum just outside the NSA's gates.  He stands before an exhibit of
 Enigma machines, used by the Germans during World War II to encrypt
 messages --- and later broken by Allied intelligence.  Enigma started as
 a commercial product; recognizing its military value, the Nazis pulled
 it off the market.  "That was the concern we're wrestling with today,"
 Mr. Brooks says --- commercial encryption technology becoming so good that
 U.S. spy agencies can't crack it.
 
 In 1989, NIST and the NSA put together an eight-person team, split evenly
 between the agencies, to quietly work out security concepts.  The team
 decided against using a weak encryption code --- "Roman Numeral One is
 that it had to be good security," says Mr. Brooks.  And it also rejected
 a so-called trapdoor approach, in which the computer code would be
 designed so it would have a weak spot --- a trapdoor --- that federal
 agencies could enter via computer to tap the communications.  Someone else
 could discover the trapdoor, they decided.
 
 The team settled on a system with a powerful encryption formula, called
 an algorithm, and encryption keys that would be held by outsiders.  Law-
 enforcement agencies could get copes of the keys when they needed to bug
 the conversations.  The toughest decision, both Mr. Brooks and Mr. Kammer
 say, was to keep the algorithm, dubbed the Skipjack, secret.  That meant
 the public wouldn't know for sure whether the NSA had inserted a trapdoor
 or some other eavesdropping device.
 
 "It would defeat the purpose [of the project] if we gave the knowledge
 of how the algorithm worked" to the public, says the 56-year-old Mr.
 Brooks.  "It was going to have to be kept classified."  Otherwise, he
 explains, engineers could use the algorithm to design computer-security
 systems that the government's encryption keys couldn't unlock.
 
 By 1990, he says, as many as 30 NSA "cryptomathematicians" and other
 employees were working to perfect the algorithm and other features.  A
 year later, the NSA launched what it called the Capstone Project to build
 the algorithm into a computer chip.  The NSA contracted with Mykotronx
 Inc., a small company in Torrance, Calif., to do much of the development.
 By September 1992, the NSA was confident the system would work.
 
 None too early for the NSA.  Earlier that year, Mr. Brooks says, American
 Telephone & Telegraph Co. informed the NSA that it wanted to sell a
 phone using a popular encryption technology to scramble conversations.
 The NSA balked.  "We said it probably wouldn't get an export license
 from this country," Mr. Brooks says.  Instead, AT&T was told of the
 Capstone work and agreed to use the technology if it became a federal
 standard and was exportable, he says.  The NSA then took some of the
 functions of the Capstone chip and tailored it to phone equipment, calling
 the resulting product the Clipper Chip.  For computers, Capstone was
 encased on a computer card that became known as Tessera.
 
 The the Bush administration, enmeshed in a re-election bid, never pushed
 Capstone.  So shortly after the election, National-security heavyweights
 importuned the Clinton transition team to move quickly on Capstone.  Just
 weeks after the inauguration, the new administration's national-security
 team was debating the NSA proposal and in April announced to the public
 that it would adopt the scheme.
 
 Last month, the administration gave the final go-ahead --- despite
 withering criticism from industry.  Vice President Gore called encryption
 a "law and order issue."  NIST's Mr. Kammer says the new administration
 was also trying to line up backing among national-security officials to
 liberalize export controls on computer equipment and other high-tech
 gear.
 
 The high-tech industry was stunned at the decision.  David Peyton, vice
 president of the Information Technology Association of America, a trade
 group of computer companies, says the scheme will dangerously centralize
 power in the federal government and will limit exports.  James Bidzos,
 president of a computer-security firm, RSA Data Security Inc., goes
 further.  He posted a letter on the Internet computer network arguing
 that Clipper may be the "visible portion of a large-scale covert
 operation on U.S. soil by NSA."
 
 Nonsense, responds Mr. Brooks, who says he is distressed by the
 "emotionalism" of the arguments.  "The only reason we're involved is
 that we have the best cryptomathematicians in the country."

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

        In the super-state, it really does not matter at all what
        actually happened.  Truth is what the government chooses 
        to tell you.  Justice is what it wants to happen. 
                    --Jim Garrison, New Orleans District Attorney

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%