💾 Archived View for gemini.spam.works › mirrors › textfiles › politics › eff-hist captured on 2022-04-29 at 00:08:50.

View Raw

More Information

⬅️ Previous capture (2020-10-31)

-=-=-=-=-=-=-



A Not Terribly Brief History 
of the Electronic Frontier Foundation

by John Perry Barlow

Thursday, November 8, 1990


The Electronic Frontier Foundation was started by a visit from the FBI.

In late April of 1990, I got a call from Special Agent Richard Baxter of the 
Federal Bureau of Investigation.  He asked if he could come by the next 
day and discuss a certain investigation with me.  His unwillingness to 
discuss its nature over the phone left me with a sense of global guilt, but I 
figured turning him down would probably send the wrong signal.

On Mayday, he drove to Pinedale, Wyoming, a cow town 100 miles north 
of his Rock Springs office (where he ordinarily investigates livestock theft 
and other regional crimes).  He brought with him a thick stack of 
documents from the San Francisco office and a profound confusion about 
their contents.

He had been sent to find out if I might be a member of the NuPrometheus 
League, a dread band of info-terrorists (or maybe just a disaffected former 
Apple employee) who had stolen and wantonly distributed source code 
normally used in the Macintosh ROMs.  Agent Baxter's errand was 
complicated by a fairly complete unfamiliarity with computer technology.  
I realized right away that before I could demonstrate my innocence, I 
would first have to explain to him what guilt might be.

The three hours I passed doing this were surreal for both of us. Whatever 
this source code stuff was, and whatever it was that happened to it, had 
none of the cozy familiarity of a few yearling steers headed across the 
Wyoming border in the wrong stock truck.

What little he did know, thanks to the San Francisco office, was also pretty 
well out of kilter.  He had been told, for example, that Autodesk, the 
publisher of AutoCAD, was a major Star Wars defense contractor and that 
its CEO was none other than John Draper, the infamous phone phreak 
also known as Cap'n Crunch.  As soon as I quit laughing, I started to 
worry.

I realized in the course of this interview that I was seeing, in microcosm, 
the entire law enforcement structure of the United States. Agent Baxter 
was hardly alone in his puzzlement about the legal, technical, and 
metaphorical nature of datacrime.

I also found in his struggles a framework for understanding a series of 
recent Secret Service raids on some young hackers I'd met in a Harper's 
magazine forum on computers and freedom.  And it occurred to me that 
this might be the beginning of a great paroxysm of governmental 
confusion during which everyone's liberties would become at risk.

When Agent Baxter had gone, I wrote an account of his visit and placed it 
on the WELL, a computer BBS in Sausalito which is  digital home to a 
large collection of technically hip folks, including Mitch Kapor, the father 
of Lotus 1-2-3.

Turns out Mitch had also been visited by the FBI, owing to his having 
unaccountably received of one of the source code disks which 
NuPrometheus scattered around.  Mitch's experience had been as 
dreamlike as mine.  He had, in fact, filed the whole thing under General 
Inexplicability until he read my tale on the WELL.  Now he had enough 
corroboration for his own strange sense of alarm to begin acting on it.

Several days later, he found his bizjet about to fly over Wyoming on its 
way to San Francisco.  He called me from somewhere over South Dakota 
and asked if he might literally drop in for a chat about Agent Baxter and 
related matters.

So, while a late spring snow storm swirled outside my office, we spent 
several hours hatching what became the Electronic Frontier Foundation. I 
told him about the sweep of Secret Service raids which had taken place 
several months before and their apparent disregard for the Bill of Rights.

Alarmed, he gave me the phone number of Harvey Silverglate, whose 
willingness to champion unpopular causes was demonstrated by his 
current defense of Leona Helmsley.  He said that Harvey would probably 
know if this were as bad as it was starting to sound.  He also said that he 
would be willing to pay the bills that generally start to appear whenever 
you call a lawyer.

I finally found Harvey in the New York offices of Rabinowitz, Boudin, 
Standard, Krinsky and Lieberman, a firm whose long list of successfully 
defended liberties includes the Pentagon Papers case.  I told him and Eric 
Lieberman what I knew about recent government flailings against 
cybercrime.  They were even less sanguine than I had been.

The next day a trio code-named Acid Phreak, Phiber Optik, and Scorpion 
entered the walnut-panelled chambers of Rabinowitz, Boudin and told 
their tales to a young lawyer there named Terry Gross.  While EFF as a 
formal organization would not exist for another two months, its legal arm 
was already flexing its muscle.

A few days later I received a phone call from the technology writer for the 
Washington Post.  He was interested in following up on the Harper's 
forum, and knew nothing of Mitch's and my joint endeavors.  I filled him 
in, hoping to expose the Secret Service.  Several days later, the Post 
published the first of many newspaper stories, all of which could have 
shared the same headline: LOTUS FOUNDER DEFENDS HACKERS.

While this was an irritating misrepresentation...we were more interested 
in defending the Constitution than any digital miscreants...the publicity 
produced a couple of major supporters:  Steve Wozniak, who called and 
offered an unlimited match to Mitch's contributions, and John Gilmore 
(Sun Microsystems employee #5) who e-mailed me a six figure offer of 
support.

Meanwhile, the list of apparent outrages lengthened.  We learned about 
an Austin role-playing games publisher named Steve Jackson whose office 
equipment had been confiscated by the Secret Service in an apparent effort 
to restrain his publication of a game called Cyberpunk which they thought, 
with ludicrous inaccuracy, to be " a handbook for computer crime.

All over the country computer bulletins being confiscated, undelivered e-
mail and all.  A Secret Service dragnet called Operation Sundevil seized 
more than 40 computers and 23,000 data disks from teenagers in 14 
American cities, using levels of force and terror which would have been 
more appropriate to the apprehension of urban guerrillas than barely post-
pubescent computer nerds.

And there was the Craig Neidorf case.  Neidorf, also known by the nom de 
crack Knight Lightning, had published an internal BellSouth document in 
his electronic magazine Phrack.  For this constitutionally protected act, 
Neidorf was being charged with interstate transport of stolen property 
with a possible sentence of 60 years in jail and a $122,000 in fines.

I wrote a piece about these events called Crime & Puzzlement.  Although I 
did so at the request of the Whole Earth Review...it made its first print 
appearance in the Fall 1990 issue of WER...I " published"  it on the Net in 
June and was astonished by the response.  It was like planting a fence-post 
and discovering that the " ground"  into which you've driven it is actually 
the back of a giant animal which quivers and heaves at the irritation.

By July, I was receiving up to 100 e-mail messages a day.  They came from 
all over the planet and expressed nearly universal indignation.  I began to 
experience datashock, but I also realized that Mitch and I were not alone in 
our concerns.  We had struck a chord.

In Cambridge, Mitch was having something like the same experience. 
Since the Washington Post story, he found himself bathed in media glare.  
However, the more he learned about ambiguous nature of law in 
Cyberspace, the more of his considerable intellectual and financial 
resources he became willing to devote to the subject.

In late June, Mitch and I threw several dinners in San Francisco, to which 
we invited major figures from the computer industry.  We weren't 
surprised to learn than many of them had exploits in their past which, 
undertaken today, would arouse plenty of Secret Service interest.  It 
appeared possible that one side-effect of current government practices 
might be the elimination of the next generation of computer 
entrepreneurs and digital designers.

It also became clear that we were dealing with a set of problems which was 
a great deal more complex and far-reaching than a few cases of 
governmental confusion. The actions of the FBI and Secret Service were 
symptoms of a growing social crisis: Future Shock.  America was entering 
the Information Age with neither laws nor metaphors for the appropriate 
protection and conveyance of information itself.

We realized that our legal actions on behalf of a few teen-age crackers 
would go on indefinitely without much result unless something were 
done to ease social tensions along the electronic frontier.  The real task at 
hand was the civilization of Cyberspace.  Such an undertaking would 
require more juice and stamina than two men could muster, even 
amplified by the Net and a solid financial supply.  We would need some 
kind of organizational identity.

With this in mind, we hired a press coordinator, Cathy Cook (who had 
formerly done PR for Steve Jobs), set a squad of lawyers to work on 
investigating the proper organizational tax status, and, over a San 
Francisco dinner with Stewart Brand, Nat Goldhaber, Jaron Lanier, and 
Chuck Blanchard, we selected a name and defined a mission.

We announced the formation of the Electronic Frontier Foundation at the 
National Press Club on July 10.  Mitch and I were joined for the 
announcement by Harvey Silverglate, Terry Gross, and Steve Jackson.

We were also joined by Marc Rotenberg of the Washington office of 
Computer Professionals for Social Responsibility.  One of our first official 
acts had been to grant that organization $275,000 for a project on 
computing and civil liberties.  CPSR would keep a wary eye on 
developments " inside the Beltway"  and work in conjunction with 
congressional staffers to see that any legislation dealing with access to 
information was sensibly drafted.

While in Washington, we also took inventory of the terrain, meeting 
with congressional staffers, the Washington civil liberties establishment, 
and officials from the Library of Congress and the White House.  The area 
to be covered, from intellectual property to telecommunications policy to 
law enforcement technique, was daunting, as were the ambient levels of 
confusion and indifference.

We also generated an enormous amount of press.  And it became apparent 
that not everyone was persuaded of our cause.  Business Week called Mitch 
naive for his willingness to believe that computer crackers were somehow 
less dangerous that drug kingpins.  Various burghers of the computer 
establishment, ranging from the executive director of the Software 
Publishers Association to a columnist for ComputerWorld, called us fools 
at best and, more likely, dangerous fools.

The Wall Street Journal printed a particularly hysterical piece which alleged 
that the document Craig Neidorf (into whose case we had entered a 
supporting amicus brief) had published was a computer virus capable of 
bringing down the emergency phone system for the entire country.  In fact, 
the text file which Neidorf distributed dealt with the bureaucratic 
procedures of 911 administration in the BellSouth region and contained 
nothing which could be used to crack a system.  Indeed, it contained 
nothing which could not be easily obtained through by legal means.

We persevered.  Our first major break came in late July.  Thanks in part to 
the expertise of John Nagel, a witness we introduced to  Neidorf's lawyer, 
the government was forced to abandon its case against Neidorf after 4 days 
in Chicago's Federal Court.

Although our briefs supporting Neidorf's activities under the 1st 
Amendment were not admitted, it became apparent, before such loftier 
matters could even be broached, that the Secret Service had indicted him 
with no clear understanding of the purpose or availability of the 
document he had distributed.  Like Agent Baxter, they knew too little to 
critically examine the misinformation they had been given by the 
corporate masters, in this case, officials at Bellcore.

Following the resolution of the Neidorf case, and, to some extent because 
of it, skepticism of EFF has moderated considerably.  If anything, the most 
recent press accounts of our activities have been almost fulsome in their 
praise.  Recent favorable coverage has appeared in the New York Times, 
The Economist, Infoworld, Information Week, PCweek, and Boston 
Magazine.

Since July, we have been absurdly busy on numerous fronts:  We've 
worked on raising public awareness of the issues at stake.  We are 
organizing legal responses to the original and continuing intemperance of 
law enforcement. We have worked on the political front, developing and 
lobbying for rational computer security legislation. We have started to 
create a network of interested experts on computer security, intellectual 
property, telecommunications policy, and international information 
rights.  And lately we've been attending to the organizational demands of 
the non-profit equivalent of a hyper-successful computer startup.

The following is a cursory digest of these activities.


The EFF in Public

We believe that critical to taming the electronic frontier is creating a sense 
of the stakes among both the computer literate and the general public.  We 
have combined public appearances, that incredibly blunt instrument, the 
Media, and electronic interaction to cover a lot of consciousness since July.  
It's a good thing Mitch has that airplane.

We have continued to build a constituency within the computing 
community, convening small gatherings of computer professionals from 
across the hacker/suit spectrum.  Mitch, Harvey, and I have also addressed 
larger forums such as the CPSR Annual Meeting, the International 
Information Integrity Institute meeting on computer security, the 
Computer Science and Telecommunications Board of the National 
Academy of Science and Engineering, Stewart Alsop's Agenda '91, 
MacHack, the Boston Computer Society, Ars Electronica, the Kennedy 
School of Government, and numerous others.

We have done more press interviews and call-in radio shows than I can 
remember.  Woz appeared on Good Morning America with Assistant 
Arizona AG (and Operation Sundevil architect) Gail Thackeray.  EFF has 
appeared prominently in national publications ranging from Newsweek to 
Spin, most of the major daily newspapers, and nearly every computer trade 
publication from Information Week to Mondo 2000.  A writer for The New 
York Times Magazine is currently at work on a major piece about EFF.

I have agreed to write a regular column on the Electronic Frontier for the 
Communications of the ACM.  And Mitch and I have been invited to 
submit pieces to Scientific American, Issues in Science and Technology, and 
Whole Earth Review.

We set up two Usenet newsgroups, comp.org.eff.news and 
comp.org.eff.talk. eff.news is moderated by Glenn Tenney and contains a 
selection of the best articles posted in eff.talk.  We began an EFF forum on 
the WELL (which soon became among the most active conferences there, 
right behind Sex and the Grateful Dead). We are setting up our own 
USENET node on the Net, eff.org,  with a Sun IV in our Cambridge office 
and the guidance of volunteer sysop Spike Ilacqua.  When fully 
operational, the machine will run the Caucus conferencing system and 
should have a 56kb Internet connection.  Finally, we are investigating the 
possibility of setting up an EFF conference on Compuserve.

We have read and personally generated over 4 megabytes of e-mail since 
June.  Lately, Jef Poskanzer has been maintaining  the EFF's electronic 
mailing list, which is now approaching 1000 names.  Information 
distributed through eff.news is also sent to the mailing list.

Concerned that our approach is a little too electronic, we are now trying to 
connect more directly with folks who might be interested in EFF but who 
are not online.  Our newsletter, the first edition of which you now have in 
your hands, is part of that effort.  Primarily the work of Rick Doherty and 
Dan Sokol, we intend to publish The EFFector a minimum of 4 times a 
year.

Finally, we are working with Jim Warren and a variety of groups to 
organize a major international conference on Communications, Privacy, 
and Freedom to be held in San Francisco in March of 1991.  This gathering 
is being designed to include citizens who are not technologically 
sophisticated.


Legal Issues

In the beginning, we had thought that most of our activities would either 
take place in court or on the way there.  While this hasn't quite been the 
case, legal matters still require much of our time and by far the lion's share 
of our expenditures.

Since the Neidorf case, most of our legal activity has been, of necessity, 
low-profile.  It is not strategically sound to announce lawsuits well in 
advance of filing them, and, while there remains a lot of dubiously 
confiscated equipment in constabulary storage, we are not going to 
jeopardize our ends by telegraphing their means.  We are currently 
preparing cases on a variety of fronts, proceeding at the deliberate pace 
characteristic of both geology and the law.

We remain primarily interested in those cases in which constitutional 
issues are at stake.  We are investigating incidents in which the First 
Amendment rights of computer users may have been abridged, where 
searches and seizures appear to have exceeded the authority of the Fourth 
Amendment, where the government seems to have violated the 
Electronic Communications Privacy Act, and where warrants have been 
issued with insufficient cause.  There is no shortage of legal opportunities 
here.  The problem is picking the best ones.

We are still working with two law firms, Silverglate and Good of Boston 
and Rabinowitz, Boudin, Standard, Krinsky, and Lieberman of New York. 
We also have dealings with Katten, Muchin & Zavis, the Chicago firm of 
Craig Neidorf's attorney, Sheldon Zenner, and are considering offers of pro 
bono assistance from a number of other firms around the country.

We recently hired Mike Godwin, a freshly minted Texas lawyer and 
USENET adept, to sort through the factual and legal details of the many 
cases we are being asked to intervene in.  In his short time with us, he has 
investigated several cases to determine their fit with EFF's constitutional 
mission, their winnability, and their likelihood of producing clear legal 
precedent.

We have a conference call of the EFF Legal Committee every other 
Wednesday to discuss the current state of our cases and any new 
possibilities we might wish to take on.  The Legal Committee includes 
Mitch, Mike Godwin, Harvey Silverglate, Sharon Beckman (of Silverglate 
& Good), Terry Gross (of Rabinowitz, Boudin), and myself.  We also have 
a private conference on the WELL to distribute briefs, documents, and 
other legal information among the members of the committee.

Mike Godwin is also EFF's liaison with a committee of the American Bar 
Association which is investigating government actions in Operation 
Sundevil.  Chaired by Judge William McMahon of Ohio, the committee is 
devising ABA guidelines for computer searches and seizures.  EFF will 
have an important role in establishing the committee's recommendations.


The Art of the Possible

Despite the patience it requires, the political process offers many 
opportunities to pursue EFF's agenda.  We have been working on two 
different fronts to promote government rationality toward computer use, 
in Washington, where we are working closely with the CPSR Civil 
Liberties and Computing Project which we funded, and in Massachusetts 
where we have been successful in developing model legislation.

CPSR, through the able efforts of Marc Rotenberg, has filed a lawsuit in 
federal district court in the District of Columbia to obtain information 
from the FBI about the monitoring of computer bulletin boards.  This 
follows similar efforts which forced the Treasury Department to admit 
that the Secret Service was in fact monitoring BBS's.

Marc also testified before the Subcommittee on Technology and Law of the 
Senate Judiciary Committee on S. 2476, the Computer Abuse 
Amendments Act of 1990.  CPSR supported the proposed addition of a 
recklessness misdemeanor provision, calling attention to problems 
surrounding Operation Sun Devil and the civil liberties issues raised by 
the investigation of computer crime.  The testimony was well received 
and widely reported in the press, but Congress adjourned before passing 
the amendments.

In Massachusetts, we headed off a misguided computer crime bill which 
had made it all the way to the desk of Governor Dukakis.  Not only did we 
persuade the Governor not to sign it, we organized an effort to rewrite the 
bill for re-submission to the Massachusetts Legislature.

Sharon Beckman of Silverglate and Good drafted much of the new 
legislation, which, if it passes, will serve as a model law for other states to 
emulate.  The new bill draws a clear distinction between computer trespass 
and actual malice, proposing appropriate penalties for each.  It also 
instructs law enforcement agencies to be aware of the constitutional issues 
involved in the investigation of computer crime.


Intellectual Property

This phrase has always sounded like an oxymoron to me.  " Property"  
seems to imply something more tangible than the mysterious stuff to 
which the term applies, and it is from this ambiguity that arises much of 
the difficulty along the electronic frontier.  Just as limited bandwidth was 
the excuse for applying censorship to broadcast media, it appears that the 
zealous protection of intellectual property presents the greatest threat to 
free digital expression.

For this reason, the definition and regulation of intellectual property is a 
matter of great concern to EFF.  However, we recognize that the 
established canon of copyright and patent law is so fundamentally 
inadequate to the demands of the Information Age that any effort to made 
a significant difference in this area could consume all of EFF's resources.

Nevertheless, both Mitch and I intend to devote a lot of our personal time 
to this issue.  Mitch is especially well situated to make a difference.  As the 
author of the most successful (as well the most pirated) piece of software 
in history, he has an important and credible voice amid the babble of 
obsolete legalisms which surrounds the discussion of intellectual property.

Marc Rotenberg is also working in this area.  He attended the first meeting 
of the Office of Technology Assessment panel on intellectual property.  
Marc recommended that the OTA give careful consideration to the public 
interest issues that might be raised by various forms of intellectual 
property protection.  The OTA has agreed to host a workshop on this topic 
and has asked CPSR to prepare a short report.


Designing the Future Net

Sometimes it seems as if all of humanity is engaged in a Great 
Work...which I imagine to be the hard-wiring of human consciousness.  It 
is as if we must literally connect ourselves electronically before we can 
appreciate the connections which have always existed.  

As exalted as such an undertaking might sound, the actual wiring process 
is as tedious as any endeavor I can imagine.  In addition to building hard 
infrastructure...fiber optic cabling, link stations, and microwave 
towers...the policy process surrounding telecommunications and 
information delivery is arcane and convoluted beyond ability of any but 
the most dedicated student to understand it.  As a consequence, those large 
institutions with a clear financial stake are the only entities which have 
taken the trouble.

This leaves the average citizen with no voice in the some of the most 
important decisions about how his future will be designed.  Fortunately, 
Mitch is also willing to take these issues on.  Working with Jerry Berman 
of the ACLU, Mitch and the EFF intend to create an " information 
consumers communications policy forum"  to bring together the Baby 
Bells, AT&T, other telcos, the FCC, newspaper publishers, online 
information services, and other stakeholders to discuss how their vision 
of the future of the Net serves the public interest.  

Mitch is also meeting with Net hackers and visionaries to begin to 
develop a sense of where we want to go and how we might get there.  His 
own vision:  " a reliable digital network available to everyone with no 
restrictions on content and policies which promote information 
entrepreneurship.S He will be devoting a lot of his time to this issue.  
Again, EFF will support his efforts to the extent it can do so without 
diminishing its effectiveness on the civil liberties front.
 

An Information Bill of Rights

When we first defined the mission of the Electronic Frontier Foundation, 
we saw our task as assuring the application of the U.S. Constitution to 
digital media.  And this remains much of what we are about.

However, information has little natural regard for national borders or 
local ordinances.  Cyberspace is transnational.  During the tsunami of e-
mail which Crime & Puzzlement elicited, there were many items from 
foreign countries.  Their authors wanted to know how they could protect 
or establish their rights of free expression.  And I had no idea what to tell 
them.

The question arose again at Esther Dyson's recent East-West Technology 
Conference in Budapest which Mitch and I attended.  EFF was well-known 
among the Soviets at this meeting, some of whom were already involved 
in drafting what they called an Information Bill of Rights. (One young 
Moscow programmer had managed to hack together an Internet 
connection through Finland in order to contact me.)

Like intellectual property and telecom policy, the development of 
international principles of free digital speech is a large angel to wrestle 
with.  We will have to be careful not to allow this immense task to divert 
EFF from its specific legal agenda.  But neither can we ignore the fact that 
Cyberspace is hardly an American territory.


Nuts and Bolts

The Electronic Frontier Foundation grew from an effort to fight a specific 
legal brushfire into a full-fledged Cause much faster than we could have 
imagined.  And, like any explosive start-up, it spends a lot of time playing 
catch-up.

Electronically amplified, Mitch and I were able to personally conduct 
much of EFF's business in the first few months of operations.  But 
gradually we had to confront the fact that while the Net is very broad, it is 
also quite shallow.  Without even a sense of their physical location, we 
have been unable to marshal the hundreds of people who have e-mailed 
us with their volunteered services.  Also, we found ourselves 
administering a significant cash-flow in both donations and expenditures.  
(By year's end, EFF will have spent around $220,000. Our tentative 1991 
budget predicts expenses of almost half a million.)

So, despite a mutual terror of bureaucracy and organizational sclerosis, we 
have started to adopt some institutional trappings.

First, in order to satisfy the requirements for a 501c3 tax status (which we 
should have in about six months), we found that we needed something 
more substantial than two guys with modems.  Thus, on October 9, we 
held our first official board meeting and formally elected Stewart Brand, 
Steve Wozniak, and John Gilmore to join us as board members.

And we have started to take on staff.  In addition to the aforementioned 
Mike Godwin, we have contracted Judith Nies to come in to the office 
once a week and work on correspondence the requests for information 
which come in via the telephone and mail.

We have also advertised for an Executive Director (see notice elsewhere in 
this issue).  We hope to hire this individual soon and expect him/her to 
attend to the many administrative details which have begun to gobble our 
time.  (Mitch has been especially swamped.) Upon his/her arrival, we will 
be able to devise policies regarding membership, coordination of 
volunteers, local chapters, and other organizational dimensions.

Finally, after many months as eff@well.sf.ca.us, we have established a 
location in the material world.  Our office is at:

The Electronic Frontier Foundation
155 Second St.
Cambridge, MA     02141
(617)864-0665
(617)864-0866 fax

We are determined that EFF will remain an agile, swift-moving sort of 
outfit.  We will adopt any new bureaucratic manifestations with the 
greatest skepticism.  But we are being bombarded with many legitimate 
requests for assistance, advice, and information.  In order to respond 
rapidly and appropriately, the Electronic Frontier Foundation has had to 
become an institution. One method by which we hope to maintain 
organizational lightness involves keeping a clear distinction between 
strategy and tactics.

On the strategic level, EFF has a very broad mission involving such 
amorphous endeavors as defining intellectual property, helping establish 
a transnational culture of information, designing telecommunications 
policy, sponsoring humane software design... civilizing Cyberspace.  With 
an appropriate sense of their limitations, the board members will remain 
responsible for these matters.

This will prevent the staff's losing tactical focus on more tangible action 
items like litigation, political action, communicating through the press 
and across the Net, and organizational care and feeding.


The Kicker

The problem with history is that it keeps happening.  Today, as I was 
working on this EFF mini-biography, I learned that Mitch has just had his 
fingerprints subpoenaed by the FBI.  Turns out they are now examining 
the NuPrometheus distribution disks for fingerprints and want to be able 
to sort his out.  Or, perhaps, search for their appearance on other disks...  

So the Wheels of Justice grind blindly on.  And we will go on trying to 
prevent anyone's being ground up in them.