💾 Archived View for gemini.spam.works › mirrors › textfiles › magazines › CUD › cud0828.txt captured on 2022-06-12 at 11:01:34.
-=-=-=-=-=-=-
Computer underground Digest Sun Apr 7, 1996 Volume 8 : Issue 28 ISSN 1004-042X Editor: Jim Thomas (cudigest@sun.soci.niu.edu) News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu) Archivist: Brendan Kehoe Shadow Master: Stanton McCandlish Field Agent Extraordinaire: David Smith Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Cu Digest Homepage: http://www.soci.niu.edu/~cudigest CONTENTS, #8.28 (Sun, Apr 7, 1996) File 1--Singapore leader condemns Net as porn, bomb-building haven File 2--Computers, Porn, the Law and the Media (One day in the UK) File 3--German Internet Update (3/29/96) File 4--Re: Australia's New South Wales tries net-censorship File 5--Letter to the Minister of Justice (Canada) File 6--ACM/IEEE Letter on Crypto File 7--NETRADIO--"CYBERSPACE LAW for NONLAWYERS" E-Mail Seminar (fwd) File 8--Formal FCC Complaint Filed Against I-Phone File 9--Re: Formal FCC Complaint Filed Against I-Phone File 10--IMPACT: U. Penn on CDA File 11--Cu Digest Header Info (unchanged since 7 Apr, 1996) CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN THE CONCLUDING FILE AT THE END OF EACH ISSUE. --------------------------------------------------------------------- Date: Fri, 8 Mar 1996 02:57:14 -0500 (EST) From: "Declan B. McCullagh" <declan+@CMU.EDU> Subject: File 1--Singapore leader condemns Net as porn, bomb-building haven ASEAN members include Malaysia, the Philippines, Thailand, Singapore, Brunei, Indonesia and Vietnam. So if I'm keeping track properly, China, the U.S., the E.C., Middle Eastern nations, and ASEAN all have said they want greater controls on the Net. The unanimity is amazing. Also today, Reuters reports that the first Sri Lankan cybercafes are opening up... -Declan ---------- Forwarded message begins here ---------- March 7, 1996 SINGAPORE (Reuter) - ASEAN information ministers warned Thursday there was a dark side to the information technology revolution and agreed to establish a regulatory body to oversee the Internet invasion. A joint press statement issued by the ministers said they would set up the regulatory body by the end of the year to come up with ``appropriate responses'' to the Internet. [...] The ministers earlier expressed concern about pornographic content in cyberspace and information on the Internet that could spread racial and religious tension within their countries. ------------------------------ Date: Tue, 2 Apr 1996 14:39:14 -0600 From: David G. Bell <dbell@zhochaka.demon.co.uk> Subject: File 2--Computers, Porn, the Law and the Media (One day in the UK) Computers, Pornography, the Law, and the Media -- One Day in the UK. Today, the 2nd of April 1996, British Police forces raided 40 houses looking for child pornography. In a court in Birmingham, two men plead guilty when a judge ruled that computer images were photographs. And, somehow, BBC Radio News managed to combine these two stories into the usual 'Internet Pornography' story, despite a police denial that computers were involved in the first story. In fact, it was said by one police officer that video recordings were the most common sort of material they encountered. Oddly enough, the only recording medium mentioned in the news bulletins were 'computer disks', while a longer report managed to bring in the Internet and involve the 'usual suspects'. ------------------------------ Date: Mon, 1 Apr 1996 19:13:29 -0800 (PST) From: Declan McCullagh <declan@EFF.ORG> Subject: File 3--German Internet Update (3/29/96) I'm cleaning out my mailbox now that I'm back from CFP, and found this. I heard a common theme from the non-Americans at CFP -- if America, the world's "freest" country, can engage in online censorship, then so can they... -Declan ---------- Forwarded message ---------- Date--Sat, 30 Mar 1996 07:08:14 -0800 (PST) From--Jay Holovacs <holovacs@styx.ios.com> Subject--News From Germany The following is excerpted from Nando News Website, check it out for more info. _________________________________________________________________ GERMANY PLANS BILL TO PUNISH INTERNET INDECENCY ___________________________________________________________ Copyright © 1996 Nando.net Copyright © 1996 Reuter Information Service BONN (Mar 29, 1996 10:27 a.m. EST) - Germany's justice minister is planning a new law making clear companies who provide access to the Internet are not expected to police cyberspace on the lookout for pornography or neo-Nazi propaganda. Edzard Schmidt-Jortzig told reporters on Thursday night that firms who offer a link to the worldwide computer network would only be punished if they discovered illegal material was available via their service and did nothing about it. "Someone who opens a door cannot know what the people who walk through it are going to be carrying," he said. "And if there were body searches for everyone going through your door, people would simply choose to go through another." ... Internet regulation has been a particularly prickly issue in Germany. Child pornography investigators searched the Munich offices of access provider CompuServe in November and found several Internet pages they considered illegal. Authorities are also investigating several other online services as part of a probe into pornographic and neo-Nazi material found on the Internet. But so far prosecutors have not been able to bring any charges, partly because legal experts are unsure where new companies stand under laws drafted long before they existed. ----------------------------------------------------------------------- Jay Holovacs <holovacs@ios.com> ------------------------------ Date: Sat, 6 Apr 1996 10:03:30 -0500 (EST) From: "Declan B. McCullagh" <declan+@CMU.EDU> Subject: File 4--Re: Australia's New South Wales tries net-censorship My growing collection of international Net-censorship attempts is at: http://www.cs.cmu.edu/~declan/zambia/ -Declan ---------- Forwarded message begins here ---------- SYDNEY, April 3 (UPI) -- People will face a maximum penalty of one year in jail or fines of $7,800 ($10,000 Australian) if caught transmitting or advertising pornographic material on the Internet, the New South Wales government announced Tuesday. Corporations would face stiffer penalties, Attorney General Jeff Shaw said at a press conference. Under the state government's tough new legislation soon to be introduced, it will be illegal to transmit, advertise, permit access to and retrieve of pornographic material on-line. The new laws will also cover computer games that include violence and sexual activity, Shaw said. He said the move to penalize people who peddle and download porn was necessary to protect children, but he admitted policing the legislation could be ``difficult.'' ------------------------------ Date: Sun, 17 Mar 1996 23:19:17 -0500 From: Dov Wisebrod <sherlock@io.org> Subject: File 5--Letter to the Minister of Justice (Canada) Folks, The following letter is in the mail. It is a response to a pending amendment to the Canadian Criminal Code revising the law of search and seizure of computer systems and data. While not a Canadian Communications Decency Act, the legislative Bill reflects as much misunderstanding of computers and computer mediated communication as the infamous American Act. The letter was prepared through the combined efforts of Dov Wisebrod, Daniel Shap, David Fruitman, and John Kingdon. It has been sent to the Minister of Justice (Hon. Allan Rock), the Department of Justice's advisor on computer law (Donald Piragoff), the Federal Privacy Commissioner (Bruce Phillips), and the local Member of Parliament (Tony Ianno). Please distribute widely. Dov ---------------------------------------------- The Legal Group for the Internet in Canada 206 St. George St., Suite 603 Toronto, Ontario, Canada M5R 2N6 http://www.io.org/~logic logic@io.org - (416) 963-9434 March 18, 1996 The Honourable Allan Rock Minister of Justice Attorney General of Canada Department of Justice 239 Wellington Street Ottawa, Ontario K1A 0H8 Dear Mr. Rock: Re: Bill C-118 "An Act to amend the Criminal Code and to amend certain other Acts" The Legal Group for the Internet in Canada ("LoGIC") is a conduit for the exchange of information and ideas about policies concerning emerging communication and information technologies. We are devoted to ensuring informed public, legislative, and regulatory responses to these technologies, which at present are manifest most profoundly in the Internet. We want to ensure that new laws and regulations have no detrimental effects on the free and interactive communication of information. We are concerned about certain proposed amendments to the Criminal Code contained within Bill C-118 (as it was identified while passing First Reading during the last complete session of the Legislature). Our concerns relate to section 41 of the Bill. Section 41 proposes to amend the existing Criminal Code section 487, which sets out information required for search warrants. For your immediate reference, we have attached to this letter the text of section 487 as it would appear after being amended. The proposed amendments are highlighted by capitalization. Our comments and recommendations with respect to the substance of these provisions follow. Comments -------- The proposed amendments would introduce new subsections 487(2.1) and 487(2.2) providing for the search and seizure of computer systems and data. Our primary concern is that the provisions do not adequately reflect the complexities of computer use and communication. In particular, the provisions do not accord with the distributed nature of the medium, including the distribution of users of a particular computer system and the distribution of data accessible by the system. The proposed amendments ignore the globally distributed nature of data and its users. The new subsection 487(2.1)(a) would provide that a person authorized to search a computer system for data may use any computer system in the building "to search any data contained in or available to the computer system." The quoted language does not distinguish between the two sources of data. However, there is good reason to treat data available to the computer system differently from data contained within it. Data available to the system may be physically located outside of the jurisdiction of the issuer of the warrant, potentially bringing the persons authorizing and conducting the search into conflict with foreign law. A similar concern is identified and addressed in the existing subsection 487(2), which provides for modified search warrants in circumstances where the subject of the search "is believed to be in any other territorial division" within Canada. In the context of the search of a computer system, it is quite probable that the data available to the computer system includes data located in jurisdictions outside of Canada. The international nature of the difficulty calls for a solution beyond that offered by subsection 487(2). It is necessary to have two distinct sets of provisions, one of which governs the search of data "contained in" a computer system and another specifically designed to address the difficulty of searching data "available to" a computer system. The words "or available to" should be removed from the proposed amendment to both subsections 487(2.1)(a) and 487(2.2)(a). In addition, the proposed amendments do not respect the privacy rights of persons whose data may be contained in or available to the computer system subject to the search. The disregard for privacy rights may be seen in two related ways. First, data available to the system may include data contained in other computer systems and available only by password access to those other systems. The other computer systems may be within the control, ownership, and reasonable expectation of privacy of persons unrelated to the subject and purpose of the search warrant. The provisions thus create a "backdoor" to search computer systems for which a warrant has not directly been issued. Similarly, data contained in the computer system may be subject to the control, ownership, and reasonable expectation of privacy of other persons. For instance, if the computer system subject to the search is used to provide an online service to subscribers, it may contain the private data of those subscribers. This data may include electronic correspondence or other information sent by the subscribers to others, as well as electronic information sent by others to the subscribers. Again, a "backdoor" is created by the new provisions to infringe the reasonable expectation of privacy of both the sender and the recipient of this electronic information. These concerns are intensified by the language of the proposed subsection 487(2.2). The subsection would provide that any warrant authorizing the search of any building or place also authorizes the search of "any data contained in or available to" any computer system at that location. The proposed language explicitly authorizes the search of computer data without requiring any information to be sworn in support of the reasons for the search. There is no requirement of any substantive review by a judge authorizing the search of data. In effect, the proposed subsection creates a default authorization to search data. Given the problems inherent in any search involving a computer system, a judicial review of the information justifying the search of data is essential in all cases. The authorizing judge must be presented with clear and reasonably precise reasons and guidelines for the intended search and seizure. This is necessary to ensure that both the purpose and conduct of the search is justified. In order to maintain these protective measures in the procedure for authorizing a search, the proposed default authority must be removed. Finally, we are concerned about the potential for self-incriminatory activity by the person whose property is the subject of a search. Subsection 487(2.1) would authorize the person conducting the search to use the computer system in order to search, reproduce, and seize data. Subsection 487(2.2), while similar, would add that the person whose property is being searched "shall, on presentation of the warrant, permit the person carrying out the search" to use the computer system. It is unclear from this language whether the person whose property is being searched is required to take positive steps to assist the person carrying out the search. Our concern is that the inherent vagueness of the proposed provision allows for such an interpretation. If the computer system is accessible only by first supplying a password, the person may have to supply it. If the data being searched is encrypted, the person may have to provide the decryption key. This would amount to being compelled to assist in the discovery of evidence against oneself, which is inconsistent with the most fundamental principles of criminal law. The proposed amendment should be rewritten to remedy its potentially dangerous vagueness. Recommendations --------------- o Remove the words "or available to" from the proposed amendment. o Require a search warrant for a computer system to describe the type of data authorized to be searched. o Require a search warrant for data to limit the computer systems authorized to be searched. o Do not provide for default authorization to search computer systems. o Do not compel potentially self-incriminatory activity from the person whose property is being searched. Thank you for the time taken to consider our comments and recommendations. We would be pleased to confer with you further. Daniel Shap, a co-founder of The Legal Group for the Internet in Canada, has previously commented at length on this subject. His 1993 paper, entitled "Search and Seizure of Canadian Computer Environments," was prepared for, and is in the possession of, Donald Piragoff of the Department of Justice. It is also available on the Internet's World Wide Web at: http://www.io.org/~logic/papers/ds-search.htm The Legal Group for the Internet in Canada may be contacted at the above street and Internet addresses and telephone number. We look forward to hearing from you. Yours very truly, [Signed] Dov Wisebrod L o G I C The Legal Group for the Internet in Canada c.c. Donald Piragoff Department of Justice Bruce Phillips Federal Privacy Commissioner Tony Ianno Member of Parliament SECTION 41: INFORMATION FOR SEARCH WARRANTS ----------------------------------------------- 487 --- (1) A justice who is satisfied by information on oath in Form 1 that there are reasonable grounds to believe that there is in a building, receptacle or place (a) anything on or in respect of which any offence against this Act or any other Act of Parliament has been or is suspected to have been committed, (b) anything that there are reasonable grounds to believe will afford evidence with respect to the commission of an offence, or will reveal the whereabouts of a person who is believed to have committed an offence, against this Act or any other Act of Parliament, or (c) anything that there are reasonable grounds to believe is intended to be used for the purpose of committing any offence against the person for which a person may be arrested without warrant, may at any time issue a warrant under his hand authorizing a person named therein or a peace officer (d) to search the building, receptacle or place for any such thing and to seize it, and (e) subject to any other Act of Parliament, to, as soon as practicable, bring the thing seized before, or make a report in respect thereof to, the justice or some other justice for the same territorial division in accordance with section 489.1. (2) Where the building, receptacle or place in which anything mentioned in subsection (1) is believed to be is in any other territorial division, the justice may issue his warrant in like form modified according to the circumstances, and the warrant may be executed in the other territorial division after it has been Endorsed, in Form 28, by a justice having jurisdiction in that territorial division. (2.1) A PERSON AUTHORIZED UNDER THIS SECTION TO SEARCH A COMPUTER SYSTEM IN A BUILDING OR PLACE FOR DATA MAY (A) USE OR CAUSE TO BE USED ANY COMPUTER SYSTEM AT THE BUILDING OR PLACE TO SEARCH ANY DATA CONTAINED IN OR AVAILABLE TO THE COMPUTER SYSTEM; (B) REPRODUCE OR CAUSE TO BE REPRODUCED ANY DATA IN THE FORM OF A PRINT-OUT OR OTHER INTELLIGIBLE OUTPUT; (C) SEIZE THE PRINT-OUT OR OTHER OUTPUT FOR EXAMINATION OR COPYING; AND (D) USE OR CAUSE TO BE USED ANY COPYING EQUIPMENT AT THE PLACE TO MAKE COPIES OF THE DATA. (2.2) EVERY PERSON WHO IS IN POSSESSION OR CONTROL OF ANY BUILDING OR PLACE IN RESPECT OF WHICH A SEARCH IS CARRIED OUT UNDER THIS SECTION SHALL, ON PRESENTATION OF THE WARRANT, PERMIT THE PERSON CARRYING OUT THE SEARCH (A) TO USE OR CAUSE TO BE USED ANY COMPUTER SYSTEM AT THE BUILDING OR PLACE TO SEARCH ANY DATA CONTAINED IN OR AVAILABLE TO THE COMPUTER SYSTEM FOR DATA THAT THE PERSON IS AUTHORIZED BY THIS SECTION TO SEARCH FOR; (B) TO OBTAIN A HARD COPY OF THE DATA AND TO SEIZE IT; AND (C) TO USE OR CAUSE TO BE USED ANY COPYING EQUIPMENT AT THE PLACE TO MAKE COPIES OF THE DATA. (3) A search warrant issued under this section may be in the form set out as Form 5 in Part XXVIII, varied to suit the case. (4) An endorsement that is made on a warrant as provided for in subsection (2) is sufficient authority to the peace officers or the persons to whom it was originally directed and to all peace officers within the jurisdiction of the justice by whom it is endorsed to execute the warrant and to deal with the things seized in accordance with section 489.1 or as otherwise provided by law. (6) Subsections 487(2) and (4) apply, with such modifications as the circumstances require, to a warrant issued under subsection (1). ------------------------------ Date: 1 Apr 1996 16:25:03 -0500 From: "Dave Banisar" <banisar@EPIC.ORG> Subject: File 6--ACM/IEEE Letter on Crypto Reply to: ACM/IEEE Letter on Crypto Association For Computing Machinery Office of US Public Policy 666 Pennsylvania Avenue SE Suite 301 Washington, DC 20003 USA (tel) 202/298-0842 (fax) 202/547-5482 Institute of Electronics and Electrical Engineers United States Activities 1828 L Street NW Suite 1202 Washington, DC 20036-5104 USA (tel) 202/785-0017 (fax) 202/785-0835 April 2, 1996 Honorable Conrad Burns Chairman, Subcommittee on Science, Technology and Space Senate Commerce, Science and Transportation Committee US Senate SD-508 Washington, DC 20510 Dear Chairman Burns: On behalf of the nation's two leading computing and engineering associations, we are writing to support your efforts, and the efforts of the other cosponsors of the Encrypted Communications Privacy Act, to remove unnecessarily restrictive controls on the export of encryption technology. The Encrypted Communications Privacy Act sets out the minimum changes that are necessary to the current export controls on encryption technology. However, we believe that the inclusion of issues that are tangential to export, such as key escrow and encryption in domestic criminal activities, is not necessary. The relaxation of export controls is of great economic importance to industry and users, and should not become entangled in more controversial matters. Current restrictions on the export of encryption technology harm the interests of the United States in three ways: they handicap American producers of software & hardware, prevent the development of a secure information infrastructure, and limit the ability of Americans using new online services to protect their privacy. The proposed legislation will help mitigate all of these problems, though more will need to be done to assure continued US leadership in this important hi-tech sector. Technological progress has moved encryption from the realm of national security into the commercial sphere. Current policies, as well as the policy-making processes, should reflect this new reality. The legislation takes a necessary first step in shifting authority to the Commerce Department and removing restrictions on certain encryption products. Future liberalization of export controls will allow Americans to excel in this market. The removal of out-dated restrictions on exports will also enable the creation of a Global Information Infrastructure sufficiently secure to provide seamless connectivity to customers previously unreachable by American companies. The United States is a leader in Internet commerce. However, Internet commerce requires cryptography. Thus American systems have been hindered by cold-war restraints on the necessary cryptography as these systems have moved from the laboratory to the marketplace. This legislation would open the market to secure, private, ubiquitous electronic commerce. The cost of not opening the market may include the loss of leadership in computer security technologies, just at the time when Internet users around the world will need good security to launch commercial applications. For this legislation to fulfill its promise the final approval of export regulations must be based on analysis of financial and commercial requirements and opportunities, not simply on the views of experts in national security cryptography. Therefore, we urge you to look at ways to further relax restrictive barriers. Finally, the legislation will serve all users of electronic information systems by supporting the development of a truly global market for secure desktop communications. This will help establish private and secure spaces for the work of users, which is of particular interest to the members of the IEEE/USA and the USACM. On behalf of the both the USACM and the IEEE/USA we look forward to working with you on this important legislation to relax export controls and promote the development of a robust, secure, and reliable communications infrastructure for the twenty-first century. Please contact Deborah Rudolph in the IEEE Washington Office at (202) 785-0017 or Lauren Gelman in the ACM Public Policy Office at (202) 298-0842 for any additional information. Sincerely, Barbara Simons, Ph.D.3 Chair, U.S. Public Policy Committee of ACM Joel B. Snyder, P.E. Vice President, Professional Activities and Chair, United States Activities Board cc: Members of the Subcommittee on Science, Technology and Space ------------------------------ Date: Fri, 22 Mar 1996 08:43:12 -0600 From: Michael Lazar <d10mhl1@corn.cso.niu.edu> Subject: File 7--NETRADIO--"CYBERSPACE LAW for NONLAWYERS" E-Mail Seminar (fwd) Thought this would be of interest to many of you... ---------- Forwarded message ---------- Date--Wed, 20 Mar 1996 09:11:22 EST -0500 From--Chuck Poulton <poulton@wksu.kent.edu> ------- Forwarded Message Follows ------- Prof. Larry Lessig, University of Chicago Law School Prof. David Post, Georgetown University Law Center Prof. Eugene Volokh, UCLA School of Law and the Cyberspace Law Institute and Counsel Connect present