{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}
{} {}
{} ** PUSH BUTTON FELONIES ** {}
{} {}
{} KPFA-FM RADIO BROADCAST JULY 26, 1990 AT 12:00 NOON {}
{} {}
{} ELECTRONIC TEXT -- PUBLIC INFORMATION FILE {}
{} {}
{} ** SPECIAL EDITION ** {}
{} from {}
{} THE EPIC PROJECT {}
{} a nonprofit public electronic publishing corporation {}
{} {}
{} {}
{} P.O. Box 5080-341 Electronic Netmail Address {}
{} Fairfield, Ca. 94533 jefrich@well.sf.ca.us {}
{} Jeff Aldrich, Contact: Voice: (707)425-6813 {}
{} Data: (707)429-1545 Fax: (707)425-9811 {}
{} {}
{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}
NOTICE
This text file contains copies of press releases by government
agencies, citizen action organizations, and transcripts of events received
by The EPIC Project. They example both the personal information power of
telecommunication technology and the current threat to our basic civil
liberties -- our rights to privacy and to protection against unwarranted
searches and seizures. Panelists on the KPFA-FM "Push Button Felonies"
broadcast are responsible for some of these documents. This electronic text
information is provided to KPFA listeners by The EPIC Project to increase
understanding of the issues discussed in this broadcast. The EPIC
Project makes no warranty as to document accuracy, expressed or implied.
==========================================================================
KPFA-FM Studio Panelists:
Assistant Arizona Attorney General Gail Thackery.
Marc Rotenberg of Computer Professionals for Social Responsibility
A Telecommunication Industry Service Provider Representative
KPFA-FM Telephone Panelist:
Jeff Aldrich, Founder of The EPIC Project Electronic Publishing Corp.
===========================================================================
CONTENTS
Line 75: Operation Sun Devil: Press Release
Line 162: Operation Sun Devil: Secret Service Statement
Line 230: News Excerpts about Operation Sun Devil
Source: Computer Underground Digest Issue #1.09
Line 393: Letter from the Director of the Secret Service to Rep. Don Edwards
Line 692: CPSR FOIA Request to the FBI Regarding BBS Surveillance
Line 804: CPSR letter to Congressman Don Edwards regarding FOIA request
Line 901: Chronology of events
Source: Computer Professionals for Social Responsibility (CPSR)
Line 1048: Sun Devil gives birth to the Electronic Frontier Foundation
Line 1141: Electronic Frontier Foundation: Mission Statement
Line 1190: Electronic Frontier Article by John Perry Barlow and Mitchell Kapor
Line 1374: CPSR Expands Civil Liberties Program
Line 1464: EFF Supported Legal Case Summary
Line 1801: The Electronic Frontier and The Bill of Rights
Source: Electronic Frontier Foundation (EFF)
Line 2036: U.S. Attorney Visits The EPIC Project Online After July 5th
KPFA Electronic Citizen Broadcast: A Sysop Chat with the Feds
Source: The EPIC Project
NOTE: Line numbers are approximate
********************************************************************
********************************************************************
U.S. Department of Justice
United States Attorney
District of Arizona
4000 United States Courthouse
Phoenix, Arizona 82505
602-379-3011 /FTS/261-3011
PRESS RELEASE
FOR IMMEDIATE RELEASE: CONTACT: Wendy Harnagel
Wednesday, May 9, 1990 United States Attorney's Office
(602) 379-3011
PHOENIX--Stephen M. McNamee, United States Attorney for the District of
Arizona, Robert K. Corbin, Attorney General for the state of Arizona, and
Henry R. Potosky, Acting Special Agent in Charge of the United States
Secret Service Office in Phoenix, today announced that approximately
twenty-seven search warrants were executed on Monday and Tuesday, May 7 and
8, 1990, in various cities across the nation by 150 Secret Service agents
along with state and local law enforcement officials. The warrants were
issued as a part of Operation Sundevil, which was a two year investigation
into alleged illegal computer hacking activities.
The United States Secret Service, in cooperation with the United States
Attorney's Office, and the Attorney General for the State of Arizona,
established an operation utilizing sophisticated investigative techniques,
targeting computer hackers who were alleged to have trafficked in and abuse
stolen credit card numbers, unauthorized long distance dialing codes, and
who conduct unauthorized access and damage to computers. While the total
amount of losses cannot be calculated at this time, it is
(MORE)
estimated that the losses may run into the millions of dollars. For
example, the unauthorized accessing of long distance telephone cards have
resulted in uncollectible charges. The same is true of the use of stolen
credit card numbers. Individuals are able to utilize the charge accounts to
purchase items for which no payment is made.
Federal search warrants were executed in the following cities:
Chicago, IL
Cincinnati, OH
Detroit, MI
Los Angeles, CA
Miami, FL
Newark, NJ
New York, NY
Phoenix, AZ
Pittsburgh, PA
Plano, TX
Richmond, VA
San Diego, CA
San Jose, CA
Unlawful computer hacking imperils the health and welfare of individuals,
corporations and government agencies in the United States who rely on
computers and telephones to communicate.
Technical and expert assistance was provided to the United States Secret
Service by telecommunication companies including Pac Bel, AT&T, Bellcore,
Bell South, MCI, U.S. Sprint, Mid-American, Southwestern Bell, NYNEX, U.S.
West, and by the many corporate victims. All are to be commended for their
efforts in researching intrusions and documenting losses.
McNamee and Corbin expressed concern that the improper and alleged illegal
use of computers may become the White Collar crime of the
(MORE)
1990's. McNamee and Corbin reiterated that the state and federal government
will vigorously pursue criminal violations of statutes under their
jurisdiction. Three individuals were arrested yesterday in other
jurisdictions on collateral or independent state charges. The
investigations surrounding the activities of Operation Sundevil are
continuing.
The investigations are being conducted by agents of the United States
Secret Service and Assistant United States Attorney Tim Holtzen, District
of Arizona, and **Assistant Arizona Attorney General Gail Thackery.
END STORY
**KPFA-FM Panelist
**************************************************************
Assistant Director Garry M. Jenkins' Prepared Remarks
Operation Sun Devil
Today, the Secret Service is sending a clear message to those computer
hackers who have decided to violate the laws of this nation in the mistaken
belief that they can successfully avoid detection by hiding behind the
relative anonymity of their computer terminals.
In 1984, Congress enacted the Comprehensive Crime Control Act which
prohibits, among other things, credit card fraud and computer fraud. Since
1984, the Secret Service has been aggressively enforcing these laws and has
made over 9,000 arrests nationwide.
Recently we have witnessed an alarming number of young people who, for a
variety of sociological and psychological reasons, have become attached to
their computers and are exploiting thier potential in a criminal manner.
Often, a progression of criminal activity occurs which involves
telecommunications fraud (free long distance phone calls), unauthorized
access to other computers (whether for profit, fascination, ego, or the
intellectual challenge), credit card fraud (cash advances and unauthorized
purchases of goods), and then move on to other destructive activities like
computer viruses.
Some computer abusers form close associations with other people having
similar interests. Underground groups have been formed for the purpose of
exchanging information relevant to their criminal activities. These groups
often communicate with each other through message systems between computers
called "bulletin boards."
Operation Sun Devil was an investigation of potential computer fraud
conducted over a two-year period with the use of sophisticated
investigative techniques.
This investigation exemplifies the commitment and extensive cooperation
between federal, state and local law enforcement agencies and private
governmental industries which have been targeted by computer criminals.
While state and local law enforcement agencies successfully investigate and
prosecute technological crimes in specific geographical locations, federal
intervention is clearly called for when the nature of these crimes becomes
interstate and international.
(PAGE 1)
On May 8, 1990, over 150 Special Agents of the United States Secret
Service, teamed with numerous local and state law enforcement agencies,
served over two dozen search warrants in approximately fifteen (15) cities
across this nation.
Several arrests and searches were made during the investigation to protect
the public from impending dangers. In one situation, computer equipment
was seized after unauthorized invasion into a hospital computer.
Our experience shows that many computer hacker suspects are no longer
misguide teenagers mischievously playing games with their computers in
their bedrooms. Some are now high tech computer operators using computers
to engage in unlawful conduct.
The losses to the american public in this case are expected to be
significant. The Secret Service takes computer crime very seriously, and
we will continue to investigate aggressively those crimes which threaten
our nation's businesses and government services.
END
***************************************************************
OPERATION SUN DEVIL NEWS ARTICLES
Probe Focuses on Entry, Theft by Computers
(From: CHICAGO TRIBUNE, May 10, 1990: p. I-6)
PHOENIX--An interstate probe of computer invasions has uncovered losses
that may reach millions of dollars and could be "just the tip of the
iceberg," federal law enforcement officials said Wednesday.
The investigation is focused on illegal entry into computer systems and
unauthorized use of credit-card numbers and long-distance codes, said Garry
Jenkins, assistant Secret Service director for investigations.
No arrests for computer crime resulted, however, when 27 search warrants
were served in 12 cities, including Chicago, by 150 Secret Service agents
and police on Tuesday, officials said.
In Chicago, federal agents seized computers and information disks at a
business and a private home, said Tim McCarthey, chief of the Secret
Service's criminal enforcement division in Chicago. Nationwide, some 40
computers and 23,000 disks of computer information were seized.
Secret Service officials declined to release an specifics, including the
number of people targeted, saying the two-year investigation, code-named
"Operation Sun Devil," is continuing.
"The losses that we estimate on this may run to the millions of dollars,"
said Stephen McNamee, U.S. Atty. for Arizona.
Much of the alleged loss stems from unpaid telephone and computer access
charges, officials said.
They said it was possible that computer hackers had obtained goods or cash
through use of unauthorized credit cards, but could not cite any instance
of it.
In addition to misuse of credit cards and phone lines the hackers are
believed to have gained access to computers that store medical and
financial histories, officials said.
Under new computer crime laws, the Secret Service has jurisdiction to
investigate allegations of electronic fraud through the use of access
devices such as credit-card numbers and long-distance codes.
Defendants convicted of unauthorized use of such devices can be sentenced
up to 10 years in prison if they commit fraud of more than $,100.
A similar investigation supervised by federal prosecutors in Chicago has
resulted in several indictments.
********************************************************************
AT&T NEWS BRIEFS via Consultant's Liason Program
Wednesday, May 9, 1990
HACKER WHACKER -- The Secret Service is conducting a coast-to-coast
investigation into the unauthorized use of credit-card numbers and
long-distance dialing as well as illegal entry into computer systems
by hackers, according to sources. ... AP ... Authorities fanned out
with search warrants in fourteen cities Tuesday in an investigation of
a large nationwide computer hacker operation. Officials of the Secret
Service, U.S. Attorney's Office and Arizona Attorney General's office
scheduled a news conference Wednesday to release details of the
operation.
UPI, 5/8 ... A Long Island [NY] teen, caught up in [the investigation],
dubbed Operation Sun Devil, has been charged ... with computer
tampering and computer trespass. State Police, who said [Daniel
Brennan, 17], was apparently trying to set up a surreptitious
messaging system using the [computer system of a Massachusetts firm]
and 800 numbers, raided his home Monday along with security officials
of AT&T. ... [A State Police official] said that in tracing phone
calls made by Brennan ... AT&T security people found that he was
regularly calling one of the prime targets of the Sun Devil probe, a
... hacker who goes by the handle "Acid Phreak." ... New York
Newsday, p. 31.
****************************************************************************
>EXCERPTED From The Detroit News, Thursday, May 10, 1990, Section B, p.1:
FEDS PULL PLUG ON HACKERS
Computer-fraud raid hits two homes in Michigan
By Joel J. Smith, Detroit News Staff Writer
Secret Service agents got a big surprise when they raided a Jackson-area
home as part of an investigation of a nationwide computer credit card and
telephone fraud scheme. They found a manual that details how almost
anybody can use a computer to steal. It also describes how to avoid
detection by federal agents. On Wednesday, James G. Huse, Jr., special
agent in charge of the Secret Service office in Detroit, said the manual
was discovered when his agents and Michigan State Police detectives broke
into a home in Clark Lake, near Jackson, on Tuesday. Agents, who also
raided a home in Temperance, Mich., near the Ohio border, confiscated
thousands of dollars in computer equipment suspected of being used by
computer buffs -- known as hackers -- in the scheme.
The raids were part of a national computer fraud investigation called
Operation Sundevil in which 150 agents simultaneously executed 28 search
warrants in 16 U.S. cities. Forty-two computer systems and 23,000 computer
disks were seized across the country. The nationwide network reportedly
has bilked phone companies of $50 million. Huse said the Secret Service
has evidence that computers in both of the Michigan homes were used to
obtain merchandise with illegally obtained credit card numbers. He said
long-distance telephone calls from the homes also were billed to
unsuspecting third parties.
There were no arrests, because it was not known exactly who was using the
computers at the homes. Huse also said there was no evidence that the
suspects were working together. Rather, they probably were sharing
information someone had put into a national computer "bulletin board".
*****************************************************************************
"Computer Hacker Ring with a Bay Area Link"
(From: San Francisco Chronical, May 9, 1990: A-30)
The Secret Service yesterday searched as many as 29 locations in 13 cities,
including the family home of an 18-year-old San Jose State University
student, in an investigation of alleged fraud by computer hackers, law
enforcement sources said.
The 6 a.m. search on Balderstone Drive in San Jose sought computer
equipment allegedly used to "deal in pirate software and electronic fraud,"
San Jose police Seargeant Richard Saito said in a prepared statement.
The nationwide investigation, code-named "Operation Sun Devil," concerns
the unauthorized use of credit card numbers and long-distance dialing codes
as well as illegal entry into computer systems by hackers, said sources.
Saito said the probe centered on the "Billionaire Boys Cub computer
bulletin board" based in Phoenix. A press conference on the probe is
scheduled today in Phoenix.
The investigation in Phoenix is also focusing on incidents in which
copmputer hackers allegedly changed computerized records at hospitals and
police 911-emergency lines, according to one source.
The San Jose suspect was identified as Frank Fazzio Jr., whom neighors said
was a graduate of Pioneer High School and lives at home with his younger
sister and parents. Neither he nor his family could be reached for comment.
"I've never thought him capable of that sort of thing," said one neighbor
in the block-long stret located in the Almaden Valley section of south San
Jose.
Warrants were obtained by the Secret Service to conduct the search in San
Jose, as well as in Chicago; Cincinnati; Detroit; Los Angeles; Miami;
Newark, N.J.; New York City; Pittsburgh; Richmond, Va.; Plano Texas; and
San Diego.
Under new computer crime laws, the Secret Service has jurisdiction to
investigate allegations of electronic fraud through the use of access
devices such as credit card numbers and codes that long-distance companies
issue to indivdual callers. Defendants convicted of unauthorized use of
such "access devaices" can be sentenced to 10 years in prison if they
commit fraud of more than $1,000.
END
*************************************************
======================================================================
From Marc Rotenberg of Computer Professionals for Social Responsibility
Fri, Jun 15, '90 266 lines
Here is a letter from the Director of the Secret Service to Don Edwards in
response to questions raised by Edwards' Subcommittee. It is quite long as are
the postings which follow it.
[This letter follows from a FOIA request sent by CPSR to the FBI in
August, 1989]
------------------------------------------
DEPARTMENT OF TREASURY
UNITED STATES SECRET SERVICE
WASHINGTON, DC 20223
APR 30 1990
The Honorable Don Edwards
Chairman
Subcommittee on Civil and Constitutional Rights
Committee on the Judiciary
House of Representatives
Washington, D.C. 20515
Dear Mr. Chairman:
Thank you for your letter of April 3, 1990, concerning your
committee's interest in computer fraud. We welcome the
opportunity to discuss this issue with your committee and I
hope the following responses adequately answer your
questions.
Question 1:
Please describe the Secret Service's process for investigating
computer related crimes under Title 18, United States Code,
Section 1030 and any other related statutes.
Response:
The process by which the Secret Service investigates
computer related crimes is similar to the methods we use to
investigate other types of criminal investigations. Most of the
investigative techniques are the same; surveillances, record
checks, witness and suspect interviews, etc. the primary
difference is we had to develop resources to assist in the
collection and review of computer evidence.
To provide our agents with this expertise, the secret service
developed a computer fraud investigation course which, as of
this date, has trained approximately 150 agents in the proper
methods for conducting a computer fraud investigation.
Additionally, we established a computer Diagnostics center,
staffed with computer professional, to review evidence on
computer systems.
Referrals of computer related criminal investigations occur in
much the same manner as any other case. A victim sustains a
loss and reports the crime, or, a computer related crime is
discovered during the course of another investigation.
In the investigations we do select, it is not our intention to
attempt to supplant local or state law enforcement. We
provide enforcement in those cases that are interstate or
international in nature and for one reason or another are
beyond the capability of state and local law enforcement
agencies.
When computer related crimes are referred by the various
affected industries to the local field offices, the Special
Agent in Charge (SAIC) determines which cases will be
investigated based on a variety of criteria. Each SAIC must
consider the economic impact of each case, the prosecutive
guidelines of the United States Attorney, and the investigative
resources available in the office to investigate the case .
In response to the other portion of your question, the other
primary statute we use to investigate computer related crimes
is Title 18, United States Code, Section 1029 ( Access Device
Fraud). This service has primary jurisdiction in those cases
which are initiated outside a bank and do not involve
organized crime, terrorism, or foreign counterintelligence
(traditional responsibilities of the FBI).
The term "access device" encompasses credit cards, debit
cards, automatic teller machines (ATM) cards, personal
identification numbers (PIN's) used to activate ATM machines,
credit or debit card account numbers, long distance telephone
access codes, computer passwords and logon sequences, and
among other things the computer chips in cellular car phones
which assign billing.
Additionally, this Service has primary jurisdiction in cases
involving electronic fund transfers by consumer (individuals)
under Title 15, U. S. code, section 169n (Electronic Fund
Transfer Act). This could involve any scheme designed to
defraud EFT systems used by the public, such as pay by phone
systems, home banking, direct deposit, automatic payments,
and violations concerning automatic teller machines. If the
violations can be construed to be a violation of the banking
laws by bank employee, the FBI would have primary
jurisdiction.
There are many other statutes which have been used to
prosecute computer criminals but it is within the purview of
the U.S. Attorney to determine which statute will be used to
prosecute an individual.
Question 2:
Has the Secret Service ever monitored any computer bulletin
boards or networks? Please describe the procedures for
initiating such monitoring, and list those computer bulletin
boards or networks monitored by the Secret Service since
January 1988.
Response:
Yes, we have occasionally monitored computer bulletin boards.
The monitoring occurred after we received complaints
concerning criminal activity on a particular computer bulletin
board. The computer bulletin boards were monitored as part of
an official investigation and in accordance with the directives
of the Electronic Communications Privacy Act of 1986 (Title
18 USC 2510)
The procedures used to monitor computer bulletin boards
during an official investigation have involved either the use of
an informant (under the direct supervision of the investigating
agent) or an agent operating in an undercover capacity. In
either case, the informant or agent had received authorization
from the computer bulletin board's owner/operator to access
the system.
We do not keep records of the bulletin boards which we have
monitored but can provide information concerning a particular
board if we are given the name of the board.
Question 3:
Has the Secret Service or someone acting its direction ever
opened an account on a computer bulletin board or network?
Please describe the procedures for opening such an account and
list those bulletin boards or networks on which such accounts
have been opened since January 1988.
Response:
Yes, the U.S. Secret Service has on many occasions, during the
course of a criminal investigation, opened accounts on
computer bulletin boards or networks.
The procedure for opening an account involves asking the
system administrator/operator for permission to access to the
system. Generally, the system administrator/operator will
grant everyone immediate access to the computer bulletin
board but only for lower level of the system. The common
"pirate" computer bulletin boards associated with most of
computer crimes have many different level in their systems.
The first level is generally available to the public and does not
contain any information relation to criminal activity. Only
after a person has demonstrated unique computer skills, been
referred by a known "hacker," or provided stolen long-distance
telephone access codes or stolen credit card account
information, will the system administrator/operator permit a
person to access the higher levels of the bulletin board system
which contains the information on the criminal activity.
As previously reported in our answer for Question 2, we do not
keep records of the computer bulletin boards on which we have
established accounts.
Question 4:
Has the Secret Service or someone acting under its direction
ever created a computer bulletin board or network that was
offered to the public? Please describe any such bulletin board
or networks.
Response:
No, the U. S. Secret Service has not created a computer bulletin
board nor a network which was offered to members of the
public. We have created an undercover bulletin board which
was offered to a select number of individuals who had
demonstrated an interest in conducting criminal activities.
This was done with the guidance of the U.S. Attorney's office
and was consistent with the Electronic Communications
Privacy Act.
Question 5:
Has the Secret Service ever collected, reviewed or
"downloaded" transmissions or information from any computer
network or bulletin board? What procedures does the Secret
Service have for obtaining information from computer bulletin
boards or networks? Please list the occasions where
information has been obtained since January 1988, including
the identity of the bulletin boards or networks, the type of
information obtained, and how that information was obtained
(was it downloaded, for example).
Response:
Yes, during the course of several investigations, the U. S.
Secret Service has "down loaded" information from computer
bulletin boards. A review of information gained in this manner
(in an undercover capacity after being granted access to the
system by it's system administrator) is performed in order to
determine whether or not that bulletin board is being used to
traffic in unauthorized access codes or to gather other
information of a criminal intelligence nature. At all times,
our methods are in keeping with the procedures as outlined in
the Electronic Communications Privacy Act (ECPA).
If a commercial network was suspected of containing
information concerning a criminal activity, we would obtain
the proper court order to obtain this information in keeping
with the ECPA.
The U. S. Secret Service does not maintain a record of the
bulletin boards we have accessed.
Question 6:
Does the Secret Service employ, or is it considering employing,
any system or program that could automatically review the
contents of a computer file, scan the file for key items,
phrases or data elements, and flag them or recommend further
investigative action? If so, what is the status of any such
system. Please describe this system and research being
conducted to develop it.
Response:
The Secret Service has pioneered the concept of a Computer
Diagnostic Center (CDC) to facilitate the review and
evaluation of electronically stored information. To streamline
the tedious task of reviewing thousands of files per
investigation, we have gathered both hardware and software
tools to assist our search of files for specific information or
characteristics. Almost all of these products are
commercially developed products and are available to the
public. It is conceivable that an artificial intelligence process
may someday be developed and have application to this law
enforcement function but we are unaware if such a system is
being developed.
The process of evaluating the information and making
recommendations for further investigative action is currently
a manual one at our CDC. We process thousands of computer
disks annually as well as review evidence contained in other
types of storage devices (tapes, hard drives, etc.). We are
constantly seeking ways to enhance our investigative mission.
The development of high tech resources like the CDC saved
investigative manhours and assist in the detection of criminal
activity.
Again, thank you for your interest. Should you have any further
questions, we will be happy to address them.
Sincerely,
/s/
John R. Simpson, Director
cc: Honorable Charles E. Schumer
=============================================================================
For those of you who have considered submitting an FOIA information request,
Marc submits the following cautionary tale:
On August 18, 1989 CPSR submitted a Freedom of Information Act request to the
FBI asking for information about BBS surveillance. After four follow-up
letters, a series of phone calls, and Congressional testimony that discussed
the CPSR request, the FBI has failed to respond to our request. (The
statutory
time limit for the FOIA is ten days).
If any one has information about possible FBI surveillance of bulletin boards
or networks, please send it to me. Specific dates, locations, BBSs are
important. (You can send information to me
anonymously by land mail, if you need to protect your identity).
Thanks for your assistance,
Marc Rotenberg, Director
CPSR Washington Office
1025 Connecticut Ave., NW, Suite 1015
Washington, DC 20036
202/775-1588 (voice)
202/775-1941 (Data)
rotenberg@csli.stanford.edu or
cdp!mrotenberg@arisia.xerox.com
---------------------------------------
[CPSR FOIA Request to the FBI Regarding BBS Surveillance]
CPSR Washington Office
1025 Connecticut Avenue, NW
Suite 1015
Washington, DC 20036
202 775-1588
202 775-1941 (fax)
Director
Marc Rotenberg
August 18, 1989
FOIA Officer
FBI
9th St. & Penn. Ave., NW
Washington, DC 20535
Dear FOIA Officer,
This is a request under the Freedom of Information Act, 5 U.S.C. 552.
Part I: I write to request a copy of all materials relating to the FBI's
collecf information from computer networks and bulletin boards, such as
PeaceNet (San Francisco CA) or The Well (Berkeley CA), that are used
frequently by political or advocacy organizations. In particular, I would
like any records which would indicate whether the Bureau is intercepting,
collecting, reviewing, or "downloading" computer transmissions from any of the
following networks and conferences: Action Southern Africa, AIDS Coalition
Network, The American Peace Test, Amnesty International, Association for
Progressive Communications, Beyond Containment, Center for Innovative
Diplomacy, Central America Resource Center, Central America Resource Network
(CARNet), The Christic Institute, Citizen Diplomacy, Community Data
Processing, EcoNet, Friends of the Earth, Friends Committee on National
Legislation, HandsNet, Institute for Peace and International Security, Media
Alliance, Meiklejohn Civil Liberties Institute, National Execution Alert
Network, Palo Alto Friends Peace and Social Action Committee, PeaceNet. Quaker
Electronic Project, Web, The Well.
This request includes public communications that take place through a
bulletin board. For example, this would include both transmissions that are
available for public perusal, a "conference" or "posting," as well as
transmissions that are directed from one party to one or more other specific
parties and intended as private, "electronic mail."
Part II: I also request any records that would indicate whether the
FBI, or anyoe acting at the behest or direction of the FBI, has any computer
accounts on any computer bulletin boards operated by an advocacy or political
organization, and, if so, the names of the bulletin boards, and whether the
Bureau has indicated the actual organizational affiliation of the account
holders to the system operators.
Part III: I also request any records that would indicate whether the
Bureau has er operated, is currently operating, is involved in the operation
of, or is planning to operate, a computer bulletin board that is intended for
public use.
Part IV: I would also like any records which would indicate the
circumstances unr which it would be appropriate for an agent or authorized
representative, asset, informant, or source of the Bureau to intercept,
collect, review, or "download" the contents of computer bulletin boards.
Part V: I would like any records relating to the FBI's development,
research, or assessment of computer systems for automated review of
information stored in an electronic format, obtained from a computer bulletin
board or network.
Part VI: Finally, I request any records that would indicate whether
the FBI has developed, or is planning to develop, a system that could
automatically review the contents of a computer file, scan the file for key
terms or phrases, and then recommend the initiation of an investigation based
upon this review.
I ask that you check with your regional offices in San Francisco, San Jose,
Austin, Phoenix, Los Angeles, and New York, in addition to the files that are
available in Washington, DC. I also ask that you consult with those agents
involved in the investigation of computer crime to determine whether they
might be aware of the existence of such records. You should also check any
documents relating to John Maxfield, who was employed by the Bureau to
investigate computer bulletin boards.
Under the Freedom of Information Act, you may withhold all properly exed
materials. However, you must disclose all non-exempt portions that are
reasonably segregable. I reserve the right to appeal the withholding or
deletion of any information.
Under the Freedom of Information Act, CPSR is entitled to a waiver of as for
this request because the "disclosure of this information is likely to
contribute significantly to the public understanding of the operations or
activities of the government and is not primarily in the commercial interest
of the requester." CPSR is a non-profit, educational organization of computer
scientists. Our work has been cited in scholarly journals, trade publications,
and the national media. CPSR has particular expertise on the use of computer
technology by the FBI, having prepared an extensive report on the proposed
expansion of the NCIC at the request of Congressman Don Edwards. For these
reasons, CPSR is entitled to a waiver of all fees.
If you have any questions regarding this request, please telephone me ae
above number. I will make all reasonable efforts to narrow the request if you
determine that it has been too broadly framed.
As provided in the Freedom of Information Act, I will expect to receivea
response within ten working days.
Sincerely yours,
Marc Rotenberg, Director
Washington Offfice,
Computer Professionals
for Social Responsibility
***************************************
[CPSR letter to Congressman Don Edwards regarding FOIA request]
February 27, 1990
Representative Don Edwards
Subcommittee on Civil and
Constitutional Rights
House Judiciary Committee
806 House Annex 1
Washington, DC 20515
Dear Chairman Edwards:
I am writing to you about a particular FOIA request that CPSR
has pursued since August of last year. We asked the FBI for
information about the monitoring of computer networks and bulletin
boards. We initiated this request because of the obvious civil
liberties interests -- speech, associational, and privacy -- that
would be endangered if the FBI's examination of the contents of
computer systems failed to satisfy appropriate procedural
safeguards.
After six months of delay, five certified letters to the
Bureau's FOIA/Privacy Act office, and many phone calls with the
FBI's FOIA officers, we have not received even a partial response to
our request.
On September 20, 1989 a FOIA officer at the FBI assured us
that information would be forthcoming "in a couple of weeks." A
letter from the FBI FOIA/PA office on December 22 indicated that
information responsive to our request "has been located and will be
assigned for processing soon." But when I spoke with a FBI FOIA
Officer on February 15, less than two weeks ago, I was told that
they "haven't even started" to process the request and that the FBI
couldn't say when we would receive a response. (Please see
enclosed chronology and attachments).
The need for this information is truly urgent. Further delay
will constitute a denial. Congress is now considering several
computer crime bills, such as H.R. 55 and H.R. 287, that could
broaden the authority of federal agents to examine the contents of
computer systems across the country. There is a good chance that a
bill will pass before the end of this session.
Before opening the door to new forms of criminal
investigation, Congress and the public should have a complete
picture of the FBI's current practices. Computer communications are
particularly vulnerable to surveillance and routine monitoring.
Computer mail unrelated to a particularized investigation could be
swept up in the government's electronic dragnet if the law is not
carefully tailored to a well defined purpose. Without a clear
understanding of the civil liberties problems associated with the
investigation of computer crime, Congress may be exacerbating a
problem it does not yet fully know about.
CPSR's Freedom of Information Act request could provide
answers to these questions. The FOIA establishes a presumption
that the activities of government should be open to public review
and that agency records should be disclosed upon request. But the
Bureau failed to comply with the statutory requirements of the FOIA
and frustrated our effort to obtain information that should be
disclosed. Without this information computer users, the public, and
the Congress, may be unable to assess whether the Bureau's current
activities conform to appropriate procedural safeguards.
Computer crime is a serious problem in the United States. One
auditing firm places the annual loss between $3 billion and $5
billion. Nonetheless, it is necessary to ensure that new criminal
law does not undermine the civil liberties of computer users across
the country. We requested information from the FBI under the FOIA
to help assess the adequacy of current safeguards. The Bureau failed
to respond. The result is that the public is left in the dark at a time
when significant legislation is pending.
We would appreciate whatever assistance with this request
you might be able to provide.
Sincerely yours,
Marc Rotenberg,
Director
CPSR Washington
Office
Enclosure
Chronology of CPSR's FOIA Request regarding
FBI Monitoring of Computer Networks with attachments
cc: Representative Charles Schumer
Representative Wally Herger
FBI FOIA/PA Office
********************************************
[Chronology of events]
CPSR FOIA Request
FBI Monitoring of Computer Networks
CHRONOLOGY
Aug. 18, 1989
CPSR sends FOIA request to FBI seeking agency
records regarding the FBI's monitoring of computer
networks and computer bulletin boards used by
political and advocacy organizations. The FOIA
request seeks information about:
% the FBI's surveillance of computer bulletin
boards and networks used by political
organizations;
% the FBI's creation of clandestine accounts on
computer bulletin boards and networks operated
by political organizations;
% the FBI's creation of secret accounts on public
bulletin boards;
% the FBI's procedures regarding the downloading
of information contained on a computer bulletin
board;
% the FBI's research on the automated review of
the contents of information contained on
computer bulletin board and networks; and
% the FBI's research on the automation of the
decision to initiate a criminal investigation,
based on the contents of a computer
communication.
The letter requests a fee waiver based on the
public interest standard. The letter indicates that
CPSR has particular expertise in the evaluation of
the civil liberties implications of law enforcement
computer systems, having completed an extensive
report for the House Judiciary Committee on the
proposed expansion of the FBI's computer system,
the NCIC. The letter further states that CPSR
would work with the FOIA/PA office to facilitate
the processing of the request.
Aug. 31, 1989
FBI response #1. FBI sends a letter to CPSR
acknowledging receipt of the FOIA request and
designating the request "FBI's Computer Networks
and Bulletin Board Collection," request no. 319512.
Sept. 20, 1989
CPSR speaks with FOIA Officer Keith Gehle
regarding status of request. Mr. Gehle states that
he can not send a response "until he receives
responses from various agencies." It is "difficult
to go to computing indices." He says that he
expects to have information "in a couple of
weeks,"and will have a response "by October 5, at
the latest."
Oct. 16, 1990
CPSR Follow-up letter #1. CPSR confirms
conversation with Mr. Gehle regarding Oct. 5 target
date and asks FOIA Officer to call to indicate the
status of the FBI's response to the request.
Oct. 26, 1989
CPSR speaks with Mr. Gehle. He says, "we are
working on your request." "We should have
something soon. Hate to give a specific date, but
should have a letter for you within two weeks."
Nov. 22, 1989
CPSR follow-up letter #2. CPSR writes to Mr.
Gehle, notes that Mr. Gehle said he was working on
the request, and the that response should have been
sent by Nov. 9. CPSR requests that FOIA officer
call CPSR by Dec. 1 to indicate the status of the
request.
Dec. 22, 1989
FBI response #2. FBI sends letter,
acknowledging receipt of Oct. 16 and Nov. 22
letters. The letter states that "[i]nformation which
may be responsive to your request has been located
and will be assigned for processing soon." The
letter indicates that the FOIA/PA office receives a
large number of requests and that delays are likely.
Jan. 9 , 1990
CPSR follow-up letter #3. CPSR writes to Mr.
Moschella, chief of the FOIA/PA office at the FBI,
acknowledges Dec. 22 letter and location of
responsive information. Requests that records be
sent by Feb 18, 1990.
Jan. 19, 1990
FBI response #3. FBI sends letter stating that
the Bureau has allocated many agents to FOIA
processing, that a large number of requests are
received. The letter further states that "a delay of
several months or more may be anticipated before
your request is handled in turn."
Feb. 2, 1990
CPSR follow-up letter #4. CPSR writes to Mr.
Moschella, acknowledges Jan. 19, expresses
concern about delay. Letter notes that CPSR was
assured by a FOIA officer in the fall that "request
would be answered within 'a couple of weeks.'"
Feb. 15, 1990
CPSR receives call from Mr. Boutwell. According to
Mr. Boutwell, FBI can't say when request will be
processed. "Haven't even started. Backlogs and lay-
offs during past year . . ." CPSR: FOIA Officer
indicated information had been located. FBI: Too
optimistic. "Request not yet assigned to an analyst
. . . working now on 1988 requests . . . Litigation is
taking up time . . . analyst is taking time away
from document review for litigation . . . increased
requests, fewer personnel, lots of other factors.
Would expedite for life and death or due process,
pursuant to agency regulations." CPSR: so when do
we receive a response? FBI: "Can't say."
=============================================================================
Sun Devil gives birth to the Electronic Frontier Foundation
THE ELECTRONIC FRONTIER FOUNDATION
One Cambridge Center, Suite 300
Cambridge, MA 02142
617/577-1385
617/225-2347 fax
eff@well.sf.ca.us
FOR IMMEDIATE RELEASE
Contact: Cathy Cook (415) 759-5578
NEW FOUNDATION ESTABLISHED TO ENCOURAGE COMPUTER-BASED
COMMUNICATIONS POLICIES
Washington, D.C., July 10, 1990 -- Mitchell D. Kapor, founder of Lotus
Development Corporation and ON Technology, today announced that he,
along with colleague John Perry Barlow, has established a foundation to
address social and legal issues arising from the impact on society of
the increasingly pervasive use of computers as a means of communication
and information distribution. The Electronic Frontier Foundation (EFF)
will support and engage in public education on current and future
developments in computer-based and telecommunications media. In
addition, it will support litigation in the public interest to preserve,
protect and extend First Amendment rights within the realm of computing
and telecommunications technology.
Initial funding for the Foundation comes from private contributions by
Kapor and Steve Wozniak, co-founder of Apple Computer, Inc. The
Foundation expects to actively raise contributions from a wide
constituency.
As an initial step to foster public education on these issues, the
Foundation today awarded a grant to the Palo Alto, California-based
public advocacy group Computer Professionals for Social Responsibility
(CPSR). The grant will be used by CPSR to expand the scope of its
on-going Computing and Civil Liberties Project (see attached).
Because its mission is to not only increase public awareness about civil
liberties issues arising in the area of computer-based communications,
but also to support litigation in the public interest, the Foundation
has recently intervened on behalf of two legal cases.
The first case concerns Steve Jackson, an Austin-based game manufacturer
who was the target of the Secret Service's Operation Sun Devil. The EFF
has pressed for a full disclosure by the government regarding the
seizure of his company's computer equipment. In the second action, the
Foundation intends to seek amicus curiae (friend of the court) status
in the government's case against Craig Neidorf, a 20-year-old University
of Missouri student who is the editor of the electronic newsletter
Phrack World News (see attached).
"It is becoming increasingly obvious that the rate of technology
advancement in communications is far outpacing the establishment of
appropriate cultural, legal and political frameworks to handle the
issues that are arising," said Kapor. "And the Steve Jackson and Neidorf
cases dramatically point to the timeliness of the Foundation's mission.
We intend to be instrumental in helping shape a new framework that
embraces these powerful new technologies for the public good."
The use of new digital media -- in the form of on-line information and
interactive conferencing services, computer networks and electronic
bulletin boards -- is becoming widespread in businesses and homes.
However, the electronic society created by these new forms of digital
communications does not fit neatly into existing, conventional legal and
social structures.
The question of how electronic communications should be accorded the
same political freedoms as newspapers, books, journals and other modes
of discourse is currently the subject of discussion among this country's
lawmakers and members of the computer industry. The EFF will take an
active role in these discussions through its continued funding of
various educational projects and forums.
An important facet of the Foundation's mission is to help both the
public and policy-makers see and understand the opportunities as well as
the challenges posed by developments in computing and
telecommunications. Also, the EFF will encourage and support the
development of new software to enable non-technical users to more easily
use their computers to access the growing number of digital
communications services available.
The Foundation is located in Cambridge, Mass. Requests for information
should be sent to Electronic Frontier Foundation, One Cambridge Center,
Suite 300, Cambridge, MA 02142, 617/577-1385, fax 617/225-2347; or it
can be reached at the Internet mail address eff@well.sf.ca.us.
======================================================
ELECTRONIC FRONTIER FOUNDATION
MISSION STATEMENT
A new world is arising in the vast web of digital, electronic media
which connect us. Computer-based communication media like electronic
mail and computer conferencing are becoming the basis of new forms of
community. These communities without a single, fixed geographical
location comprise the first settlements on an electronic frontier.
While well-established legal principles and cultural norms give
structure and coherence to uses of conventional media like newspapers,
books, and telephones, the new digital media do not so easily fit into
existing frameworks. Conflicts come about as the law struggles to
define its application in a context where fundamental notions of speech,
property, and place take profoundly new forms. People sense both the
promise and the threat inherent in new computer and communications
technologies, even as they struggle to master or simply cope with them
in the workplace and the home.
The Electronic Frontier Foundation has been established to help civilize
the electronic frontier; to make it truly useful and beneficial not just
to a technical elite, but to everyone; and to do this in a way which is
in keeping with our society's highest traditions of the free and open
flow of information and communication.
To that end, the Electronic Frontier Foundation will:
1. Engage in and support educational activities which increase
popular understanding of the opportunities and challenges posed by
developments in computing and telecommunications.
2. Develop among policy-makers a better understanding of the issues
underlying free and open telecommunications, and support the creation of
legal and structural approaches which will ease the assimilation of
these new technologies by society.
3. Raise public awareness about civil liberties issues arising from
the rapid advancement in the area of new computer-based communications
media. Support litigation in the public interest to preserve, protect,
and extend First Amendment rights within the realm of computing and
telecommunications technology.
4. Encourage and support the development of new tools which will
endow non-technical users with full and easy access to computer-based
telecommunications.
======================================================
ACROSS THE ELECTRONIC FRONTIER
by
John Perry Barlow and Mitchell Kapor
Electronic Frontier Foundation
Washington, DC
July 10,1990
Over the last 50 years, the people of the developed world have begun to
cross into a landscape unlike any which humanity has experienced before. It
is
a region without physical shape or form. It exists, like a standing wave, in
the vast web of our electronic communication systems. It consists of electron
states, microwaves, magnetic fields, light pulses and thought itself.
It is familiar to most people as the "place" in which a long-distance
telephone
conversation takes place. But it is also the repository for all digital or
electronically transferred information, and, as such, it is the venue for most
of what is now commerce, industry, and broad-scale human interaction. William
Gibson called this Platonic realm "Cyberspace," a name which has some currency
among its present inhabitants.
Whatever it is eventually called, it is the homeland of the Information Age,
the place where the future is destined to dwell.
In its present condition, Cyberspace is a frontier region, populated by the
few
hardy technologists who can tolerate the austerity of its savage computer
interfaces, incompatible communications protocols, proprietary barricades,
cultural and legal ambiguities, and general lack of useful maps or metaphors.
Certainly, the old concepts of property, expression, identity, movement, and
context, based as they are on physical manifestion, do not apply succinctly in
a world where there can be none.
Sovereignty over this new world is also not well defined. Large institutions
already lay claim to large fiefdoms, but most of the actual natives are
solitary and independent, sometimes to the point of sociopathy. It is,
therefore, a perfect breeding ground for both outlaws and vigilantes.
Most of society has chosen to ignore the existence of this arising domain.
Every day millions of people use ATM's and credit cards, place telephone
calls,
make travel reservations, and access information of limitless variety...all
without any perception of the digital machinations behind these transactions.
Our financial, legal, and even physical lives are increasingly dependent on
realities of which we have only dimmest awareness. We have entrusted the basic
functions of modern existence to institutions we cannot name, using tools
we've
never heard of and could not operate if we had.
As communications and data technology continues to change and develop at a
pace
many times that of society, the inevitable conflicts have begun to occur on
the
border between Cyberspace and the physical world.
These are taking a wide variety of forms, including (but hardly limited to)
the following:
I. Legal and Constitutional Questions
What is free speech and what is merely data? What is a free press without
paper
and ink? What is a "place" in a world without tangible dimensions? How does
one protect property which has no physical form and can be infinitely and
easily reproduced? Can the history of one's personal business affairs properly
belong to someone else? Can anyone morally claim to own knowledge itself?
These are just a few of the questions for which neither law nor custom can
provide concrete answers. In their absence, law enforcement agencies like the
Secret Service and FBI, acting at the disposal of large information
corporations, are seeking to create legal precedents which would radically
limit Constitutional application to digital media.
The excesses of Operation Sun Devil are only the beginning of what threatens
to become a long, difficult, and philosophically obscure struggle between
institutional control and individual liberty.
II. Future Shock
Information workers, forced to keep pace with rapidly changing technology, are
stuck on "the learning curve of Sisyphus." Increasingly, they find their
hard-acquired skills to be obsolete even before they've been fully mastered.
To
a lesser extent, the same applies to ordinary citizens who correctly feel a
lack of control over their own lives and identities.
One result of this is a neo-Luddite resentment of digital technology from
which
little good can come. Another is a decrease in worker productivity ironically
coupled to tools designed to enhance it. Finally, there is a spreading sense
of
alienation, dislocation, and helplessness in the general presence of which no
society can expect to remain healthy.
III. The "Knows" and the "Know-Nots"
Modern economies are increasingly divided between those who are comfortable
and
proficient with digital technology and those who neither understand nor trust
it. In essence, this development disenfranchises the latter group, denying
them
any possibility of citizenship in Cyberspace and, thus, participation in the
future.
Furthermore, as policy-makers and elected officials remain relatively ignorant
of computers and their uses, they unknowingly abdicate most of their authority
to corporate technocrats whose jobs do not include general social
responsibility. Elected government is thus replaced by institutions with
little real interest beyond their own quarterly profits.
We are founding the Electronic Frontier Foundation to deal with these and
related challenges. While our agenda is ambitious to the point of audacity,
we don't see much that these issues are being given the broad social attention
they deserve. We were forced to ask, "If not us, then whom?"
In fact, our original objectives were more modest. When we first heard about
Operation Sun Devil and other official adventures into the digital realm, we
thought that remedy could be derived by simply unleashing a few highly
competent Constitutional lawyers upon the Government. In essence, we were
prepared to fight a few civil libertarian brush fires and go on about our
private work.
However, examination of the issues surrounding these government actions
revealed that we were dealing with the symptoms of a much larger malady, the
collision between Society and Cyberspace.
We have concluded that a cure can lie only in bringing civilization to
Cyberspace. Unless a successful effort is made to render that harsh and
mysterious terrain suitable for ordinary inhabits, friction between the two
worlds will worsen. Constitutional protections, indeed the perceived
legitimacy of representative government itself, might gradually disappear.
We could not allow this to happen unchallenged, and so arises the Electronic
Frontier Foundation. In addition to our legal interventions on behalf of those
whose rights are threatened, we will:
* Engage in and support efforts to educate both the general public and policy-
makers about the opportunities and challenges posed by developments in
computing and telecommunications.
* Encourage communication between the developers of technology, government and
corporate officials, and the general public in which we might define the
appropriate metaphors and legal concepts for life in Cyberspace.
* And, finally, foster the development of new tools which will endow non-
technical users with full and easy access to computer-based
telecommunications.
One of us, Mitch Kapor, had already been a vocal advocate of more accessible
software design and had given considerable thought to some of the challenges
we now intend to meet.
The other, John Perry Barlow, is a relative newcomer to the world of
computing (though not to the world of politics) and is therefore well- equipped
to act
as
an emissary between the magicians of technology and the wary populace who must
incorporate this magic into their daily lives.
While we expect the Electronic Frontier Foundation to be a creation of some
longevity, we hope to avoid the sclerosis which organizations usually develop
in their efforts to exist over time. For this reason we will endeavor to
remain
light and flexible, marshalling intellectual and financial resources to meet
specific purposes rather than finding purposes to match our resources. As is
appropriate, we will communicate between ourselves and with our constituents
largely over the electronic Net, trusting self- distribution and
self-organization to a much greater extent than would be possible for a more
traditional organization.
We readily admit that we have our work cut out for us. However, we are
greatly
encouraged by the overwhelming and positive response which we have received
so
far. We hope the Electronic Frontier Foundation can function as a focal point
for the many people of good will who wish to settle in a future as abundant
and free as the present.
======================================================
FOR IMMEDIATE RELEASE
Contact: Marc Rotenberg (202) 775-1588
CPSR TO UNDERTAKE EXPANDED CIVIL LIBERTIES PROGRAM
Washington, D.C., July 10, 1990 -- Computer Professionals for Social
Responsibility (CPSR), a national computing organization, announced
today that it would receive a two-year grant in the amount of $275,000
for its Computing and Civil Liberties Project. The Electronic Frontier
Foundation (EFF),founded by Mitchell Kapor, made the grant to expand
ongoing CPSR work on civil liberties protections for computer users.
At a press conference in Washington today, Mr. Kapor praised CPSR's
work, "CPSR plays an important role in the computer community. For the
last several years, it has sought to extend civil liberties protections
to new information technologies. Now we want to help CPSR expand that
work."
Marc Rotenberg, director of the CPSR Washington Office said, "We are
obviously very happy about the grant from the EFF. There is a lot of
work that needs to be done to ensure that our civil liberties
protections are not lost amidst policy confusion about the use of new
computer technologies."
CPSR said that it will host a series of policy round tables in
Washington, DC, during the next two years with lawmakers, computer
users, including (hackers), the FBI, industry representatives, and
members of the computer security community. Mr. Rotenberg said that the
purpose of the meetings will be to "begin a dialogue about the new uses
of electronic media and the protection of the public interest."
CPSR also plans to develop policy papers on computers and civil
liberties, to oversee the Government's handling of computer crime
investigations, and to act as an information resource for organizations
and individuals interested in civil liberties issues.
The CPSR Computing and Civil Liberties project began in 1985 after
President Reagan attempted to restrict access to government computer
systems through the creation of new classification authority. In 1988,
CPSR prepared a report on the proposed expansion of the FBI's computer
system, the National Crime Information Center. The report found serious
threats to privacy and civil liberties. Shortly after the report was
issued, the FBI announced that it would drop a proposed computer feature
to track the movements of people across the country who had not been
charged with any crime.
"We need to build bridges between the technical community and the policy
community," said Dr. Eric Roberts, CPSR president and a research
scientist at Digital Equipment Corporation in Palo Alto, California.
"There is simply too much misinformation about how computer networks
operate. This could produce terribly misguided public policy."
CPSR representatives have testified several times before Congressional
committees on matters involving civil liberties and computer policy.
Last year CPSR urged a House Committee to avoid poorly conceived
computer activity. "In the rush to criminalize the malicious acts of
the few we may discourage the beneficial acts of the many," warned
CPSR. A House subcommittee recently followed CPSR's recommendations
on computer crime amendments.
Dr. Ronni Rosenberg, an expert on the role of computer scientists and
public policy, praised the new initiative. She said, "It's clear that
there is an information gap that needs to be filled. This is an
important opportunity for computer scientists to help fill the gap."
CPSR is a national membership organization of computer professionals,
based in Palo Alto, California. CPSR has over 20,000 members and 21
chapters across the country. In addition to the civil liberties project,
CPSR conducts research, advises policy makers and educates the public
about computers in the workplace, computer risk and reliability, and
international security.
For more information contact:
Marc Rotenberg
CPSR Washington Office
1025 Connecticut Avenue, NW
Suite 1015
Washington, DC 20036 202/775-1588
Gary Chapman
CPSR National Office
P.O. Box 717
Palo Alto, CA 94302
415/322-3778
======================================================
(The following is a discussion of legal issues currently engaged by the
Electronic Frontier Foundation)
ELECTRONIC FRONTIER FOUNDATION
LEGAL CASE SUMMARY
July 10, 1990
The Electronic Frontier Foundation is currently providing litigation
support in two cases in which it perceived there to be substantial civil
liberties concerns which are likely to prove important in the overall
legal scheme by which electronic communications will, now and in the
future, be governed, regulated, encouraged, and protected.
Steve Jackson Games
Steve Jackson Games is a small, privately owned adventure game
manufacturer located in Austin, Texas. Like most businesses today,
Steve Jackson Games uses computers for word processing and bookkeeping.
In addition, like many other manufacturers, the company operates an
electronic bulletin board to advertise and to obtain feedback on its
product ideas and lines.
One of the company's most recent products is GURPS CYBERPUNK, a science
fiction role-playing game set in a high-tech futuristic world. The
rules of the game are set out in a game book. Playing of the game is
not performed on computers and does not make use of computers in any
way. This game was to be the company's most important first quarter
release, the keystone of its line.
On March 1, 1990, just weeks before GURPS CYBERPUNK was due to be
released, agents of the United States Secret Service raided the premises
of Steve Jackson Games. The Secret Service:
* seized three of the company's computers which were used in the
drafting and designing of GURPS CYBERPUNK, including the computer used
to run the electronic bulletin board,
* took all of the company software in the neighborhood of the computers
taken,
* took with them company business records which were located on the
computers seized, and
* destructively ransacked the company's warehouse, leaving many items
in disarray.
In addition, all working drafts of the soon-to-be-published GURPS
CYBERPUNK game book -- on disk and in hard-copy manuscript form -- were
confiscated by the authorities. One of the Secret Service agents told
Steve Jackson that the GURPS CYBERPUNK science fiction fantasy game book
was a, "handbook for computer crime."
Steve Jackson Games was temporarily shut down. The company was forced
to lay-off half of its employees and, ever since the raid, has operated
on relatively precarious ground.
Steve Jackson Games, which has not been involved in any illegal activity
insofar as the Foundation's inquiries have been able to determine, tried
in vain for over three months to find out why its property had been
seized, why the property was being retained by the Secret Service long
after it should have become apparent to the agents that GURPS CYBERPUNK
and everything else in the company's repertoire were entirely lawful and
innocuous, and when the company's vital materials would be returned. In
late June of this year, after attorneys for the Electronic Frontier
Foundation became involved in the case, the Secret Service finally
returned most of the property, but retained a number of documents,
including the seized drafts of GURPS CYBERPUNKS.
The Foundation is presently seeking to find out the basis for the search
warrant that led to the raid on Steve Jackson Games. Unfortunately, the
application for that warrant remains sealed by order of the court. The
Foundation is making efforts to unseal those papers in order to find out
what it was that the Secret Service told a judicial officer that
prompted that officer to issue the search warrant.
Under the Fourth Amendment to the United States Constitution, a search
warrant may be lawfully issued only if the information presented to the
court by the government agents demonstrates "probable cause" to believe
that evidence of criminal conduct would be found on the premises to be
searched. Unsealing the search warrant application should enable the
Foundation's lawyers, representing Steve Jackson Games, to determine the
theory by which Secret Service Agents concluded or hypothesized that
either the GURPS CYBERPUNK game or any of the company's computerized
business records constituted criminal activity or contained evidence of
criminal activity.
Whatever the professed basis of the search, its scope clearly seems to
have been unreasonably broad. The wholesale seizure of computer
software, and subsequent rummaging through its contents, is precisely
the sort of general search that the Fourth Amendment was designed to
prohibit.
If it is unlawful for government agents to indiscriminately seize all of
the hard-copy filing cabinets on a business premises -- which it surely
is -- that the same degree of protection should apply to businesses
that store information electronically.
The Steve Jackson Games situation appears to involve First Amendment
violations as well. The First Amendment to the United States
Constitution prohibits the government from "abridging the freedom of
speech, or of the press". The government's apparent attempt to prevent
the publication of the GURPS CYBERPUNK game book by seizing all copies
of all drafts in all media prior to publication, violated the First
Amendment. The particular type of First Amendment violation here is the
single most serious type, since the government, by seizing the very
material sought to be published, effectuated what is known in the law as
a "prior restraint" on speech. This means that rather than allow the
material to be published and then seek to punish it, the government
sought instead to prevent publication in the first place. (This is not
to say, of course, that anything published by Steve Jackson Games could
successfully have been punished. Indeed, the opposite appears to be the
case, since SJG's business seems to be entirely lawful.) In any effort
to restrain publication, the government bears an extremely heavy burden
of proof before a court is permitted to authorize a prior restraint.
Indeed, in its 200-year history, the Supreme Court has never upheld a
prior restraint on the publication of material protected by the First
Amendment, warning that such efforts to restrain publication are
presumptively unconstitutional. For example, the Department of Justice
was unsuccessful in 1971 in obtaining the permission of the Supreme
Court to enjoin The New York Times, The Washington Post, and The Boston
Globe from publishing the so-called Pentagon Papers, which the
government strenuously argued should be enjoined because of a perceived
threat to national security. (In 1979, however, the government sought
to prevent The Progressive magazine from publishing an article
purporting to instruct the reader as to how to manufacture an atomic
bomb. A lower federal court actually imposed an order for a temporary
prior restraint that lasted six months. The Supreme Court never had an
opportunity to issue a full ruling on the constitutionality of that
restraint, however, because the case was mooted when another newspaper
published the article.)
Governmental efforts to restrain publication thus have been met by
vigorous opposition in the courts. A major problem posed by the
government's resort to the expedient of obtaining a search warrant,
therefore, is that it allows the government to effectively prevent or
delay publication without giving the citizen a ready opportunity to
oppose that effort in court.
The Secret Service managed to delay, and almost to prevent, the
publication of an innocuous game book by a legitimate company -- not by
asking a court for a prior restraint order that it surely could not have
obtained, but by asking instead for a search warrant, which it obtained
all too readily.
The seizure of the company's computer hardware is also problematic, for
it prevented the company not only from publishing GURPS CYBERPUNK, but
also from operating its electronic bulletin board. The government's
action in shutting down such an electronic bulletin board is the
functional equivalent of shutting down printing presses of The New York
Times or The Washington Post in order to prevent publication of The
Pentagon Papers. Had the government sought a court order closing down
the electronic bulletin board, such an order effecting a prior restraint
almost certainly would have been refused. Yet by obtaining the search
warrant, the government effected the same result.
This is a stark example of how electronic media suffer under a less
stringent standard of constitutional protection than applies to the
print media -- for no apparent reason, it would appear, other than the
fact that government agents and courts do not seem to readily equate
computers with printing presses and typewriters. It is difficult to
understand a difference between these media that should matter for
constitutional protection purposes. This is one of the challenges
facing the Electronic Frontier Foundation.
The Electronic Frontier Foundation will continue to press for return of
the remaining property of Steve Jackson Games and will take formal
steps, if necessary, to determine the factual basis for the search.
The purpose of these efforts is to establish law applying the First and
Fourth Amendments to electronic media, so as to protect in the future
Steve Jackson Games as well as other individuals and businesses from
the devastating effects of unlawful and unconstitutional government
intrusion upon and interference with protected property and speech
rights.
United States v. Craig Neidorf
Craig Neidorf is a 20-year-old student at the University of Missouri who
has been indicted by the United States on several counts of interstate
wire fraud and interstate transportation of stolen property in
connection with his activities as editor and publisher of the
electronic magazine, Phrack.
The indictment charges Neidorf with: (1) wire fraud and interstate
transportation of stolen property for the republication in Phrack of
information which was allegedly illegally obtained through the accessing
of a computer system without authorization, though it was obtained not
by Neidorf but by a third party; and (2) wire fraud for the publication
of an announcement of a computer conference and for the publication of
articles which allegedly provide some suggestions on how to bypass
security in some computer systems.
The information obtained without authorization is a file relating to the
provision of 911 emergency telephone services that was allegedly removed
from the BellSouth computer system without authorization. It is
important to note that neither the indictment, nor any briefs filed in
this case by the government, contain any factual allegation or
contention that Neidorf was involved in or participated in the removal
of the 911 file.
These indictments raise substantial constitutional issues which have
significant impact on the uses of new computer communications
technologies. The prosecution of an editor or publisher, under
generalized statutes like wire fraud and interstate transportation of
stolen property, for the publication of information received lawfully,
which later turns out to be have been "stolen," presents an
unprecedented threat to the freedom of the press. The person who should
be prosecuted is the thief, and not a publisher who subsequently
receives and publishes information of public interest. To draw an
analogy to the print media, this would be the equivalent of prosecuting
The New York Times and The Washington Post for publishing the Pentagon
Papers when those papers were dropped off at the doorsteps of those
newspapers.
Similarly, the prosecution of a publisher for wire fraud arising out of
the publication of articles that allegedly suggested methods of
unlawful activity is also unprecedented. Even assuming that the
articles here did advocate unlawful activity, advocacy of unlawful
activity cannot constitutionally be the basis for a criminal
prosecution, except where such advocacy is directed at producing
imminent lawless action, and is likely to incite such action. The
articles here simply do not fit within this limited category. The
Supreme Court has often reiterated that in order for advocacy to be
criminalized, the speech must be such that the words trigger an
immediate action. Criminal prosecutions such as this pose an extreme
hazard for First Amendment rights in all media of communication, as it
has a chilling effect on writers and publishers who wish to discuss the
ramifications of illegal activity, such as information describing
illegal activity or describing how a crime might be committed.
In addition, since the statutes under which Neidorf is charged clearly
do not envision computer communications, applying them to situations
such as that found in the Neidorf case raises fundamental questions of
fair notice -- that is to say, the publisher or computer user has no
way of knowing that his actions may in fact be a violation of criminal
law. The judge in the case has already conceded that "no court has
ever held that the electronic transfer of confidential, proprietary
business information from one computer to another across state lines
constitutes a violation of [the wire fraud statute]." The Due Process
Clause prohibits the criminal prosecution of one who has not had fair
notice of the illegality of his action. Strict adherence to the
requirements of the Due Process Clause also minimizes the risk of
selective or arbitrary enforcement, where prosecutors decide what
conduct they do not like and then seek some statute that can be
stretched by some theory to cover that conduct.
Government seizure and liability of bulletin board systems
During the recent government crackdown on computer crime, the government
has on many occasions seized the computers which operate bulletin board
systems ("BBSs"), even though the operator of the bulletin board is not
suspected of any complicity in any alleged criminal activity. The
government seizures go far beyond a "prior restraint" on the publication
of any specific article, as the seizure of the computer equipment of a
BBS prevents the BBS from publishing at all on any subject. This akin
to seizing the word processing and computerized typesetting equipment
of The New York Times for publishing the Pentagon Papers, simply because
the government contends that there may be information relating to the
commission of a crime on the system. Thus, the government does not
simply restrain the publication of the "offending" document, but it
seizes the means of production of the First Amendment activity so that
no more stories of any type can be published.
The government is allowed to seize "instrumentalities of crime," and a
bulletin board and its associated computer system could arguably be
called an instrumentality of crime if individuals used its private
e-mail system to send messages in furtherance of criminal activity.
However, even if the government has a compelling interest in interfering
with First Amendment protected speech, it can only do so by the least
restrictive means. Clearly, the wholesale seizure and retention of a
publication's means of production, i.e., its computer system, is not the
least restrictive alternative. The government obviously could seize
the equipment long enough to make a copy of the information stored on
the hard disk and to copy any other disks and documents, and then
promptly return the computer system to the operator.
Another unconstitutional aspect of the government seizures of the
computers of bulletin board systems is the government infringement on
the privacy of the electronic mail in the systems. It appears that the
government, in seeking warrants for the seizures, has not forthrightly
informed the court that private mail of third parties is on the
computers, and has also read some of this private mail after the systems
have been seized.
The Neidorf case also raises issues of great significance to bulletin
board systems. As Neidorf was a publisher of information he received,
BBSs could be considered publishers of information that its users post
on the boards. BBS operators have a great deal of concern as to the
liability they might face for the dissemination of information on their
boards which may turn out to have been obtained originally without
authorization, or which discuss activity which may be considered
illegal. This uncertainty as to the law has already caused a decrease
in the free flow of information, as some BBS operators have removed
information solely because of the fear of liability.
The Electronic Frontier Foundation stands firmly against the
unauthorized access of computer systems, computer trespass and computer
theft, and strongly supports the security and sanctity of private
computer systems and networks. One of the goals of the Foundation,
however, is to ensure that, as the legal framework is established to
protect the security of these computer systems, the unfettered
communication and exchange of ideas is not hindered. The Foundation is
concerned that the Government has cast its net too broadly, ensnaring
the innocent and chilling or indeed supressing the free flow of
information. The Foundation fears not only that protected speech will
be curtailed, but also that the citizen's reasonable expectation in the
privacy and sanctity of electronic communications systems will be
thwarted, and people will be hesitant to communicate via these networks.
Such a lack of confidence in electronic communication modes will
substantially set back the kind of experimentation by and communication
among fertile minds that are essential to our nation's development. The
Foundation has therefore applied for amicus curiae (friend of the
court) status in the Neidorf case and has filed legal briefs in support
of the First Amendment issues there, and is prepared to assist in
protecting the free flow of information over bulletin board systems and
other computer technologies.
For further information regarding Steve Jackson Games please contact:
Harvey Silverglate or Sharon Beckman
Silverglate & Good
89 Broad Street, 14th Floor
Boston, MA 02110
617/542-6663
For further information regarding Craig Neidorf please contact:
Terry Gross or Eric Lieberman
Rabinowitz, Boudin, Standard, Krinsky and Lieberman
740 Broadway, 5th Floor
New York, NY 10003
212/254-1111
======================================================
LEGAL OVERVIEW
THE ELECTRONIC FRONTIER AND THE BILL OF RIGHTS
Advances in computer technology have brought us to a new frontier in
communications, where the law is largely unsettled and woefully
inadequate to deal with the problems and challenges posed by electronic
technology. How the law develops in this area will have a direct impact
on the electronic communications experiments and innovations being
devised day in and day out by millions of citizens on both a large and
small scale from coast to coast. Reasonable balances have to be struck
among:
* traditional civil liberties
* protection of intellectual property
* freedom to experiment and innovate
* protection of the security and integrity of computer
systems from improper governmental and private
interference.
Striking these balances properly will not be easy, but if they are
struck too far in one direction or the other, important social and legal
values surely will be sacrificed.
Helping to see to it that this important and difficult task is done
properly is a major goal of the Electronic Frontier Foundation. It is
critical to assure that these lines are drawn in accordance with the
fundamental constitutional rights that have protected individuals from
government excesses since our nation was founded -- freedom of speech,
press, and association, the right to privacy and protection from
unwarranted governmental intrusion, as well as the right to procedural
fairness and due process of law.
The First Amendment
The First Amendment to the United States Constitution prohibits the
government from "abridging the freedom of speech, or of the press," and
guarantees freedom of association as well. It is widely considered to
be the single most important of the guarantees contained in the Bill of
Rights, since free speech and association are fundamental in securing
all other rights.
The First Amendment throughout history has been challenged by every
important technological development. It has enjoyed only a mixed record
of success. Traditional forms of speech -- the print media and public
speaking -- have enjoyed a long and rich history of freedom from
governmental interference. The United States Supreme Court has not
afforded the same degree of freedom to electronic broadcasting,
however.
Radio and television communications, for example, have been subjected to
regulation and censorship by the Federal Communications Commission
(FCC), and by the Congress. The Supreme Court initially justified
regulation of the broadcast media on technological grounds -- since
there were assumed to be a finite number of radio and television
frequencies, the Court believed that regulation was necessary to prevent
interference among frequencies and to make sure that scarce resources
were allocated fairly. The multiplicity of cable TV networks has
demonstrated the falsity of this "scarce resource" rationale, but the
Court has expressed a reluctance to abandon its outmoded approach
without some signal from Congress or the FCC.
Congress has not seemed overly eager to relinquish even
counterproductive control over the airwaves. Witness, for example,
legislation and rule-making in recent years that have kept even
important literature, such as the poetry of Allen Ginsberg, from being
broadcast on radio because of language deemed "offensive" to regulators.
Diversity and experimentation have been sorely hampered by these rules.
The development of computer technology provides the perfect opportunity
for lawmakers and courts to abandon much of the distinction between the
print and electronic media and to extend First Amendment protections to
all communications regardless of the medium. Just as the multiplicity
of cable lines has rendered obsolete the argument that television has to
be regulated because of a scarcity of airwave frequencies, so has the
ready availability of virtually unlimited computer communication
modalities made obsolete a similar argument for harsh controls in this
area. With the computer taking over the role previously played by the
typewriter and the printing press, it would be a constitutional disaster
of major proportions if the treatment of computers were to follow the
history of regulation of radio and television, rather than the history
of freedom of the press.
To the extent that regulation is seen as necessary and proper, it should
foster the goal of allowing maximum freedom, innovation and
experimentation in an atmosphere where no one's efforts are sabotaged by
either government or private parties. Regulation should be limited by
the adage that quite aptly describes the line that separates reasonable
from unreasonable regulation in the First Amendment area: "Your liberty
ends at the tip of my nose."
As usual, the law lags well behind the development of technology. It is
important to educate lawmakers and judges about new technologies, lest
fear and ignorance of the new and unfamiliar, create barriers to free
communication, expression, experimentation, innovation, and other such
values that help keep a nation both free and vigorous.
The Fourth Amendment
The Fourth Amendment guarantees "the right of the people to be secure in
their persons, houses, papers, and effects, against unreasonable
searches and seizures." Judges are not to issue search warrants for
private property unless the law enforcement officer seeking the warrant
demonstrates the existence of "a probable cause, supported by Oath or
affirmation, and particularly describing the place to be searched, and
the persons or things to be seized." In short, the scope of the search
has to be as narrow as possible, and there has to be good reason to
believe that the search will turn up evidence of illegal activity.
The meaning of the Fourth Amendment's guarantee has evolved over time in
response to changing technologies. For example, while the Fourth
Amendment was first applied to prevent the government from trespassing
onto private property and seizing tangible objects, the physical
trespass rationale was made obsolete by the development of electronic
eavesdropping devices which permitted the government to "seize" an
individual's words without ever treading onto that person's private
property. To put the matter more concretely, while the drafters of the
First Amendment surely knew nothing about electronic databases, surely
they would have considered one's database to be as sacrosanct as, for
example, the contents of one's private desk or filing cabinet.
The Supreme Court responded decades ago to these types of technological
challenges by interpreting the Fourth Amendment more broadly to prevent
governmental violation of an individual's reasonable expectation of
privacy, a concept that transcended the narrow definition of one's
private physical space. It is now well established that an individual
has a reasonable expectation of privacy, not only in his or her home
and business, but also in private communications. Thus, for example:
* Government wiretapping and electronic eavesdropping are now limited
by state and federal statutes enacted to effectuate and even to expand
upon Fourth Amendment protections.
* More recently, the Fourth Amendment has been used, albeit with
limited success, to protect individuals from undergoing certain random
mandatory drug testing imposed by governmental authorities.
Advancements in technology have also worked in the opposite direction,
to diminish expectations of privacy that society once considered
reasonable, and thus have helped limit the scope of Fourth Amendment
protections. Thus, while one might once have reasonably expected
privacy in a fenced-in field, the Supreme Court has recently told us
that such an expectation is not reasonable in an age of surveillance
facilitated by airplanes and zoom lenses.
Applicability of Fourth Amendment to computer media
Just as the Fourth Amendment has evolved in response to changing
technologies, so it must now be interpreted to protect the reasonable
expectation of privacy of computer users in, for example, their
electronic mail or electronically stored secrets. The extent to which
government intrusion into these private areas should be allowed, ought
to be debated openly, fully, and intelligently, as the Congress seeks to
legislate in the area, as courts decide cases, and as administrative,
regulatory, and prosecutorial agencies seek to establish their turf.
One point that must be made, but which is commonly misunderstood, is
that the Bill of Rights seeks to protect citizens from privacy invasions
committed by the government, but, with very few narrow exceptions, these
protections do not serve to deter private citizens from doing what the
government is prohibited from doing. In short, while the Fourth
Amendment limits the government's ability to invade and spy upon private
databanks, it does not protect against similar invasions by private
parties. Protection of citizens from the depredations of other citizens
requires the passage of privacy legislation.
The Fifth Amendment
The Fifth Amendment assures citizens that they will not "be deprived of
life, liberty, or property, without due process of law" and that private
property shall not "be taken for public use without just compensation."
This Amendment thus protects both the sanctity of private property and
the right of citizens to be proceeded against by fair means before they
may be punished for alleged infractions of the law.
One aspect of due process of law is that citizens not be prosecuted for
alleged violations of laws that are so vague that persons of reasonable
intelligence cannot be expected to assume that some prosecutor will
charge that his or her conduct is criminal. A hypothetical law, for
example, that makes it a crime to do "that which should not be done",
would obviously not pass constitutional muster under the Fifth
Amendment. Yet the application of some existing laws to new situations
that arise in the electronic age is only slightly less problematic than
the hypothetical, and the Electronic Frontier Foundation plans to
monitor the process by which old laws are modified, and new laws are
crafted, to meet modern situations.
One area in which old laws and new technologies have already clashed and
are bound to continue to clash, is the application of federal criminal
laws against the interstate transportation of stolen property. The
placement on an electronic bulletin board of arguably propriety computer
files, and the "re-publication" of such material by those with access to
the bulletin board, might well expose the sponsor of the bulletin board
as well as all participants to federal felony charges, if the U.S.
Department of Justice can convince the courts to give these federal laws
a broad enough reading. Similarly, federal laws protecting against
wiretapping and electronic eavesdropping clearly have to be updated to
take into account electronic bulletin board technology, lest those who
utilize such means of communication should be assured of reasonable
privacy from unwanted government surveillance.
Summary
The problem of melding old but still valid concepts of constitutional
rights, with new and rapidly evolving technologies, is perhaps best
summed up by the following observation. Twenty-five years ago there was
not much question but that the First Amendment prohibited the government
from seizing a newspaper's printing press, or a writer's typewriter, in
order to prevent the publication of protected speech. Similarly, the
government would not have been allowed to search through, and seize,
one's private papers stored in a filing cabinet, without first
convincing a judge that probable cause existed to believe that evidence
of crime would be found.
Today, a single computer is in reality a printing press, typewriter, and
filing cabinet (and more) all wrapped up in one. How the use and output
of this device is treated in a nation governed by a Constitution that
protects liberty as well as private property, is a major challenge we
face. How well we allow this marvelous invention to continue to be
developed by creative minds, while we seek to prohibit or discourage
truly abusive practices, will depend upon the degree of wisdom that
guides our courts, our legislatures, and governmental agencies entrusted
with authority in this area of our national life.
For further information regarding The Bill of Rights please contact:
Harvey Silverglate
Silverglate & Good
89 Broad Street, 14th Floor
Boston, MA 02110
617/542-6663
========================================================================
U.S. Attorney Visits The EPIC Project Online -- July 6, 1990 --
after EPIC Founder Jeff Aldrich speaks out against government
raids as a panelist on KPFA-FM "Electronic Democracy" broadcast July 5,
1990. The following is an account of that electronic visit.
Libertarian Fedz?
I was interrupted by a "yell for sysop" around noon today. The user's
name was Joe Dew, from the U.S. Attorney's Office in San Francisco. Prior to
yelling, he checked the user list for Mike Yamaguchi.
Mike was in the bbs just after a 4-20-90 half page ad ran in the Wall
Street Journal, "If You Own a Computer You Can Change Congress," asking
those with an interest to login. He checked things out and appeared to
capture, among other things, the text of a proposed Constitutional Amendment
we distributed electronically in California earlier this year. Mike
Yamaguchi's login had that "something fishy" strangeness about it. I found
out why today during a chat with Joe the fed. I didn't capture -"tape" our
conversation. The following is a careful recap from memory.
Rather than trying to hide, Joe Dew wanted to chat and did so with candor.
Joe: I just heard about EPIC. Can I see the government files or are they
private?
Sysop: They're in the file section and everything is public.
Joe: How do I get there?
Sysop: Would you like a tour?
Joe: Yes.
Sysop: Hang on...
Off we went for a peek at Information Age Democracy with his capture wide
open for a screen full or two: OTA Critical Connections summary chapter,
ALA Summary of HR3849, campaign finance disclosure reports on federal, state
and local politicians, county/city meeting agendas, voting records and
approved minutes. I didn't bother with the user list, he'd already been
there.
Back to chat...
Sysop: Was that enough information? Or would you like more?
Joe: Wow! That was enough government information, but I didn't get any
information on EPIC. Is it a government related agency? Why are you
doing this? Are you a group of hackers? Where do I get
information on EPIC?
Sysop: "A bunch of hackers?" Hardly. EPIC is a nonprofit public benefit
corporation; a citizen operated and supported electronic publisher
providing free public access to government documents and
information. Board members include legal eagles, constitutional
scholars and activists. I appreciate your interest. You know who I
am, may I ask who you are? Media or fedz?
Joe: Strange that you ask. I'm with the government.
Sysop: As in fedz?
Joe: Well, both actually. I'm with the U.S. Attorney's Office, but I'm
leaving in a month to work with a media marketing company. I'm
new to this and meant no offense asking about hackers.
Sysop: None taken. It's just that many of us are concerned about "thought
police" because of recent events. Not that we have anything to
hide, but the current climate is, well...tense.
Joe: I haven't been out of college long...and going to work here changed
my mind about fedz. They're some of the most libertarian people
I've met. I understand your uneasiness, but there's no need to be
concerned. Our office concentrates on drug dealers.
Sysop: Don't be a stranger, you're welcome here. And tell Yama...(whatever)
he's welcome too. Thanks for your candor.
Joe: He's out to lunch right now. But I'll tell him, his office is just
down the hall.
Sysop: I'll put some of the information you asked for in the public file
section so you'll be able to grab it at your leisure.
Joe: Thanks, I gott'a go.
Sysop: bb
I took him back to the opening menu for an easy exit. Joe the fed seemed
like a nice guy, a regular person. The fact he didn't fit my picture of
"thought police" ran through my mind. As if I had a Polaroid tucked away in
a dusty album or had seen'em in the "T" volume encyclopedia sitting on the
shelf. His effort to reasure me I had no reason for concern did little to
ease the Orwellian tension of his visit.
I considered asking Joe the fed why he thought EPIC might be a group of
hackers. My social conditioning would give little merit to his answer, so
it wasn't worth asking. I wondered if he was reading the hackers conference
on the Well or heard me on the radio yesterday. As disappointing as it might
be, the local high school kids fix our computer when it decides to act up.
The only hack I'm guilty of is the mess I made in my home directory trying to
automate my conferencing on the Well.
Joe the fed made my day. For a moment he elevated me to genuine computer
literacy. He logged off and it was back to the reality of fumbling with a
label program to get the mail out before five.
============================END OF FILE=======================================
Adsense 3 Column best blogger templates
15 years ago
No comments:
Post a Comment