Date: Fri, 28 Oct 94 07:03:59 EST Errors-To: Comp-privacy Error Handler From: Computer Privacy Digest Moderator To: Comp-privacy@uwm.edu Subject: Computer Privacy Digest V5#054 Computer Privacy Digest Fri, 28 Oct 94 Volume 5 : Issue: 054 Today's Topics: Moderator: Leonard P. Levine Re: How to Verify Your Phone Number Re: A Tempest Paper Re: MCI Employee Charged in $50 Million Calling Card Fraud Re: The Crypto Dilemma License Plates Is Anyone Tracking H.R. 5199? Re: Planting "Mistakes" to Guard Copyright. Press release for VTW Voters Guide Info on CPD, Contributions, Subscriptions, FTP, etc. ---------------------------------------------------------------------- From: fd@wwa.com (Glen L. Roberts) Date: 26 Oct 94 16:44 CDT Subject: Re: How to Verify Your Phone Number Organization: WorldWide Access - Chicago Area Internet Services 312-282-8605 708-367-1871 1 800 MY-ANI-IS yields the correct number from here in 301-land. Try 10555-1-708-356-9646 from most places it reads back your number. Tyr it with *67 as well.... Two 10228 or 10222 for AT&T for MCI... see the different... 10555 places your call through Wiltel... -- Glen L. Roberts, Editor, Full Disclosure Host Full Disclosure Live (WWCR 5,065 khz - Sundays 7pm central) email fd@sashimi.wwa.com for catalog on privacy & surveillance. Does 10555-1-708-356-9646 give you an "ANI" readback? email for uuencoded .TIF of T-Shirt Honoring the FBI Remember, fd _IS FOR_ Full Disclosure! ------------------------------ From: gt0212f@prism.gatech.edu (Brad Waugh) Date: 26 Oct 1994 21:03:41 -0400 Subject: Re: A Tempest Paper Organization: Georgia Institute of Technology david.m.kennedy@CEORD-PM.mail.usace.army.mil writes: TEMPEST.TXT states, I believe correctly, that it is illegal to posess some types of specialized electronic evesdropping equipment necessary to intercept tempest-type, e.g. Van Echt, emanations. *If* Winn states it is illegal to protect your equipment, that is derived from the inability to legally check your own equipment due to above limitation, or that the US government's standards for emanations is classified. To I believe that the US government's standards for tempest-type emanations _are_ classified, from talking to acquaintances in the military C3I biz. -- Brad Waugh gt0212f@prism.gatech.edu ------------------------------ From: ewl@panix.com (Emery Lapinski) Date: 27 Oct 1994 00:21:08 -0400 Subject: Re: MCI Employee Charged in $50 Million Calling Card Fraud Organization: Panix Public Access Internet & Unix, NYC Monty Solomon writes: Computer crime is growing expotentially. I think it is time to have another massive crackdown, similar to Operation Sun Devil a few years ago. Let's start getting really tough on hackers and phreaks. I would have preferred if you had written "Let's start getting really tough on criminals". Not all (perhaps few?) hackers and phreaks are necessarily criminals. I think we can do without OSD2. -- Boycott the CIX; refrain from using the Internet November 1, 1994. "My shirt is plastic." -- James Burke "Clothes make the spam" -- Dr. Fun (written by David Farley) ------------------------------ From: rj.mills@pti-us.com (Dick Mills) Date: 27 Oct 94 07:09:57 EDT Subject: Re: The Crypto Dilemma Shayne Weyker's essay "Clipper:How much privacy can we afford? How much security do we need?" left me unconvinced. More and more of our life will take place over the wires, so it is no surprise that more and more crime will take place there as well. If all communication is by wire then all fraud will by definition be by wire also. The inference is that there will be more crime because of wires. That would be an unsubtatiated assumption. Mr. Wayker's attitude on "illegal" communications is chilling. Our constitution prevents governments from putting any _prior_ restraint on speech. The main purpose of the 1st amendment was to protect unpopular speech that others might consider undesirable, illegal or terrorist. Civil law makes us liable for the consequences of our speech, like shouting FIRE! in a theater, but _prior_ restraints are forbidden. Even terrorists can not be forbidden to communicate with each other. Why assume that legislation or regulation can effectively suppress secret communication? I'm afraid the cat is out of the bag. All the laws in the world can't stop it. I believe there are some equally silly laws on the books making it illegal to use radio to communicate in code. For example, if you and I agree that "rain in Spain" actually is code for "Chase Manhattan Bank", it would be illegal to say rain in Spain over the radio. Try to imagine enforcement of such a law. The Soviet Union and China both discovered in the 1980's that it was no longer within their power to impede the flow of information. Attempts to do so via laws only promotes disrespect for the law. ------------------------------ From: twallace@mason1.gmu.edu (Todd A Wallace) Date: 27 Oct 1994 14:08:11 GMT Subject: License Plates Organization: George Mason University, Fairfax, Virginia, USA I have been curious about this for a long time: How much can the average Joe (not affiliated with law enforcement) find out about be by using my license plate number on my car? ---------------------------------------------------------------- | Todd Wallace | "A pessimist is surprised | | twallace@mason1.gmu.edu | as often as an optimist, | |-------------------------------| but always pleasantly." | | Expatriate Midwesterner (tm) | - Robert Heinlein | ---------------------------------------------------------------- ------------------------------ From: Carl Ellison Date: 27 Oct 94 10:20:24 EDT Subject: Is Anyone Tracking H.R. 5199? On July 13, 1994, Tony Clark (staff of the House Committee on Science, Space and Technology) wrote a memo detailing a bill to back up Clipper/Capstone. I neglected to provide him with comments (got tied up at work), so I called him this a.m. It's no longer a memo. ---------------------------------------- "Encryption Standards and Procedures Act of 1994" HON. GEORGE E. BROWN, JR. OF CALIFORNIA IN THE HOUSE OF REPRESENTATIVES Thursday, October 6, 1994 Mr. Speaker, today I am introducing H.R. 5199, the Encryption Standards and Procedures Act of 1994. The purpose of this legislation is to establish Federal policy governing the development and use of encryption technology for unclassified information that strikes the proper balance between the public's right to private and secure communications and the government's need to decipher information through lawful electronic surveillance. ---------- etc. ---------------- I just got off the phone with Tony Clark who pointed out to me some advantages for this bill. It might even be the proper vehicle for what Cantwell was trying to do. It is an attempt to put into law the gov't's policy on encryption, taking it out of the hands of policy-setting office staff at State and NSA. I have trouble with the Bill and its cover letter, which I will detail in a letter to them and a CC: to the net (mention of "preserving the gov't's ability to decrypt", suggesting that it had that ability, for example; and of course, there's my soap box issue: that civilian crypto is 4000 years old :-). My copy of the bill is a FAX and I have no scanner. Does anyone out there have a way to get the bill scanned and posted? -- Carl ------------------------------ From: dpaulson@cpdsc.com Date: 27 Oct 1994 20:37:02 GMT Subject: Re: Planting "Mistakes" to Guard Copyright. Organization: CP DSC Communications, Plano TX "/DD.ID=OVMAIL1.WZR014/G=DANIEL/S=STICKA/"@EDS.DIAMONDNET.sprint.com writes: The practice of planting addresses in a mailing list to guard against unauthorized re-use is similar to the map publishing trick of printing fictitious cities that would be recognized on an illegal copy. Assuming the point of this is to have the fictitious city appear on the illegal copy... How does one tell an illegal copy from a legitimate one, when the legitimate copy contains the fictitious city? __ Dean Paulson Phantom City, USA ------------------------------ From: "Shabbir J. Safdar" Date: 27 Oct 1994 00:55:27 -0400 (EDT) Subject: Press release for VTW Voters Guide [This is the last posting about the Voters Guide. Further postings will go to the appropriate newsgroups. -Shabbir] October 24, 1994 PRIVACY GROUP RELEASES LEGISLATIVE REPORT CARD FOR 1994 CONGRESS For Immediate Release NEW YORK - The Voters Telecomm Watch (VTW) an organization dedicated to monitoring civil liberties in telecommunications, has just announced its 1993/1994 legislative report cards -- and the news isn't good. Almost the entire Congress received a grade of 'D' for failing to recognize several threats to American privacy that presented themselves to the legislature this year, and one opportunity. "A few legislators distinguished themselves, recognizing the bills that threatened privacy this year, but on the whole, Congress was asleep at the wheel," stated Alexis Rosen, VTW board member. This year VTW monitored two pieces of legislation, Rep. Maria Cantwell's (D-WA) cryptographic exports bill (HR 3627) and the FBI's Wiretap/Digital Telephony bill (S.2375/HR.4922). Representative Cantwell received VTW's Legislator of the Year Award for her attempts to bring laws governing the export of encryption more in line with the current state and availability of that technology overseas. Rep. Cantwell's export bill would have made practical the incorporation of encryption into systems and application programs. Currently, such technology is not included because of government regulations restricting the export of such software. Embedded encryption is essential to expand business use of electronic mail and other transmission of sensitive data, such as credit card information. It is therefore necessary for on-line shopping and banking. Software manufacturing currently one of America's strongest exporting industries is threatened by foreign competition not subject to the same constraints. Representatives Melvin Watt (D-NC) and Elizabeth Furse (D-OR), both first-term legislators, received VTW's Rookie of the Year awards for their stated opposition to the Digital Wiretap bill, on privacy and fiscal grounds. Most Congressional actions this year on telecommunications and privacy issues have been on voice votes, making it difficult to score individual performance. A network of hundreds of VTW volunteers have called and written their own legislators to ascertain their positions. "Our legislators really don't seem to want to be held accountable," stated volunteer Josh Hendrix. "The breakfast food of the day is still waffles at Sen. Feinstein's office," stated a California volunteer, expressing his frustration after literally hundreds of faxes and called had been received by Senator Feinstein without a change in her position. Senator Feinstein received a special award this year from VTW -- the 'Duck of the Year'. "She received hundreds of constituent calls and faxes asking her to oppose the FBI Wiretap bill," said VTW Press contact Steven Cherry, "and she still voted for the bill, despite the wishes of the very people she was elected to represent. We've purchased a rubber duck for her, and it will arrive in the mail soon." Voters Telecommunications Watch is hoping Rep. Cantwell's bill will be reintroduced in the 104th Congress. Perhaps the biggest issue of the next session will be the continued legality of strong private encryption without key escrow. FBI Director Louis Freeh has been quoted as saying that, according to cyberjournalist Brock Meeks, "if the Administration's Escrowed Encryption System, otherwise known as the Clipper Chip, failed to gain acceptance, giving way to private encryption technologies, he would have no choice but to press Congress to pass legislation that provided law enforcement access to all encrypted communications." The Voters Telecomm Watch legislative report card can be found on the Internet in their gopher at gopher.panix.com. You can also send them email requesting a copy (or information about the organization) at vtw@vtw.org. Finally, you can request a copy until November 15th via US Mail by leaving a message in their voice mail at (718) 596-2851. You must leave your entire address (including zip code). VTW's efforts to garner grass-roots opposition to the FBI Wiretap/Digital Telephony bill were reported upon by such publications as the New York Times and Wired magazine. It's legislative report card has also been distributed onto the Internet, where it will quickly reach hundreds of thousands of readers within the first week of distribution. Concerned citizens can reach Voters Telecommunications Watch by writing to vtw@vtw.org or checking their gopher at gopher.panix.com. -- Steven Cherry Media contact Voters Telecommunications Watch (718) 596-2851 gopher -p 1/vtw gopher.panix.com ------------------------------ From: "Prof. L. P. Levine" Date: 26 Sep 1994 12:45:51 -0500 (CDT) Subject: Info on CPD, Contributions, Subscriptions, FTP, etc. Organization: University of Wisconsin-Milwaukee The Computer Privacy Digest is a forum for discussion on the effect of technology on privacy or vice versa. The digest is moderated and gatewayed into the USENET newsgroup comp.society.privacy (Moderated). Submissions should be sent to comp-privacy@uwm.edu and administrative requests to comp-privacy-request@uwm.edu. If you read this from the comp.society.privacy newsgroup and wish to contribute a message, you should simply post your contribution. As a moderated newsgroup, attempts to post to the group are normally turned into eMail to the submission address below. On the other hand, if you read the digest eMailed to you, you generally need only use the Reply feature of your mailer to contribute. If you do so, it is best to modify the "Subject:" line of your mailing. Contributions generally are acknowledged within 24 hours of submission. An article is printed if it is relevant to the charter of the digest. If selected, it is printed within two or three days. The moderator reserves the right to delete extraneous quoted material. He may change the subject line of an article in order to make it easier for the reader to follow a discussion. He will not, however, alter or edit or append to the text except for purely technical reasons. A library of back issues is available on ftp.cs.uwm.edu [129.89.9.18]. Login as "ftp" with password identifying yourid@yoursite. The archives are in the directory "pub/comp-privacy". People with gopher capability can most easily access the library at gopher.cs.uwm.edu. Mosaic users will find it at gopher://gopher.cs.uwm.edu. Older archives are also held at ftp.pica.army.mil [129.139.160.133]. ---------------------------------+----------------------------------------- Leonard P. Levine | Moderator of: Computer Privacy Digest Professor of Computer Science | and comp.society.privacy University of Wisconsin-Milwaukee | Post: comp-privacy@uwm.edu Box 784, Milwaukee WI 53201 | Information: comp-privacy-request@uwm.edu | Gopher: gopher.cs.uwm.edu levine@cs.uwm.edu | Mosaic: gopher://gopher.cs.uwm.edu ---------------------------------+----------------------------------------- ------------------------------ End of Computer Privacy Digest V5 #054 ****************************** .