Skip to main content
Podcast Episode: Chronicling Online Communities

EFFector - Volume 9, Issue 12 - ALERT: Crypto Action Week Sep. 3-10; Pro-Crypto Petition


EFFector - Volume 9, Issue 12 - ALERT: Crypto Action Week Sep. 3-10; Pro-Crypto Petition

     ________________          _______________        _______________
    /_______________/\        /_______________\      /\______________\
    \\\\\\\\\\\\\\\\\/        |||||||||||||||||     / ////////////////
     \\\\\________/\          |||||________\       / /////______\
      \\\\\\\\\\\\\/____      ||||||||||||||      / /////////////
       \\\\\___________/\     |||||              / ////
        \\\\\\\\\\\\\\\\/     |||||              \////

EFFector Online Volume 09 No. 12      Sept. 7, 1996
A Publication of the Electronic Frontier Foundation        ISSN 1062-9424


ALERT: Crypto Action Week Sep. 3-10; Pro-Crypto Petition
  News from the frontlines
  What you must do
  Concluding the meeting
  Tips on how to conduct your visit
  Angles on encryption
  Questions about encryption you might be asked
  Participating Organizations / More Information
Online Civil Liberties Groups Condemn Singaporean Net Censorship
Alert: UK in Throes of Newspaper-Generated "Cyberporn" Hysteria
  Chinese Government on a "spiritual pollution" Net Censorship Rampage
  Pseudonymous Remailer Closed; No Online Privacy in Finland
  Anti-Terrorism Bill's Fallout Looks Suspiciously Orwellian
  AOL's Attempt to Block "Spam" Halted by Court
Upcoming Events
Quote of the Day
What YOU Can Do

* See or, /pub/Alerts/ for more
information on current EFF activities and online activism alerts! *


Subject: ALERT: Crypto Action Week Sep. 3-10; Pro-Crypto Petition

Please gear up for "Crypto Action Week", Sept. 3-10. Time to contact your 
legislators and make your views heard loud and clear.  In the interim,
*please sign the petition in support of the encryption deregulation bills.*
See for the petition.


  ___ _____   _____ _____ ___  
 / __| _ \ \ / / _ \_   _/ _ \     JOIN THOUSANDS OF OTHER NET.AMERICANS AS
| (__|   /\ V /|  _/ | || (_) |	 THEY WORK FOR BETTER PRIVACY AND ENCRYPTION
 \___|_|_\ |_| |_|   |_| \___/ 	  	     September 3-10, 1996
  ___   ___ _____ ___ ___  _  _  __      _____ ___ _  __
 / _ \ / __|_   _|_ _/ _ \| \| | \ \    / / __| __| |/ /
|  _  | (__  | |  | | (_) | .` |  \ \/\/ /| _|| _|| ' <
|_| |_|\___| |_| |___\___/|_|\_|   \_/\_/ |___|___|_|\_\


      Reproduce this where appropriate until September 15, 1996


Table of Contents
	News from the frontlines
	What you must do
	Concluding the meeting
	Tips on how to conduct your visit
	Angles on encryption
	Questions about encryption you might be asked
	Participating Organizations / More Information



Congress as a whole is beginning to focus on encryption - bills moving
through both House and Senate would improve availability of privacy and
security for the Net.  With three hearings in the Senate and one
scheduled in House Judiciary Committee for early September -
pro-encryption bills have a chance of passing, or at least helping to
lay the groundwork for the next Congress.

Recently in a live chat from the Republican Convention in San Diego,
Senator Conrad Burns (R-MT) said he believed he had enough votes to
pass Pro-CODE out of the Senate Sub-Committee and Committee.  This
is the farthest encryption activists will have come in the crypto fight
in years.

We need your help to make the case to Congress that encryption is
important to privacy and security online, as well as the future potential
of the Internet to create jobs and promote US competitiveness.  Here's what
you can do:
	-sign the petition at
	-make an appointment with your legislator's local office

With the directions below, visit your Congressperson - urge them to
support the two bills: Pro-CODE "Promotion of Commerce Online in the
Digital Era" (S.1726) & SAFE "Security and Freedom Through Encryption"
(HR 3011).

Now is the time to tell your member of Congress that government
restrictions on encryption are unacceptable to the future of the
Internet.  In recent months, the FBI and the White House have been
using local sheriffs to lobby members of Congress on this issue.  If
you don't tell your member of Congress our side of the story, they
won't hear it from anyone.


Here's what you need to do:

1. Make an appointment with your Senators'/Representative's local office.
   It's probably best to make an appointment with the local office manager.
   It's great if you can get an appointment with your legislator, but 
   don't worry if your legislator cannot be there.

   If you don't know who your Representative and two Senators are, simply
   call the local League of Women Voters office and ask!  You might also
   try using the Zipper at

2. Sign the petition at
   A petition has been setup to help show Congress that encryption policy
   must be driven by the market's concerns.
3. Setting up the meeting
   When making the appointment, you should say that the topic is
   privacy and encryption on the Internet.  Ensure they know you are a
   constituent.  If possible, take a friend who owns a small Internet
   business (web design, ISP, whatever) who also lives in the

   It's crucial that you do not wait to get someone to go before making the
   appointment.  Make the appointment, then go looking for someone to go
   with you.

4. Carry the following message as a theme through your meeting.

   Encryption is important to privacy - the Internet is vulnerable
   and the future of American competitiveness is at stake.  Encryption
   is NOT a terrorist weapon any more than a hammer is a terrorist
   weapon.  While there are difficult national security issues,
   these should not be the driving force of this debate.

   The future of the Internet should not be held hostage by a cold-war
   era world view.

5. Send us mail at when you've made your appointment.  Check
   back at for progress and tips on Crypto Action



There are a few things you should remember as you finish your meeting.

If talking to a member, find out if we can count on his/her support for the
PRO-CODE/SAFE bill.  If talking to a staffer, make it their mission to
find out the answer to this question.

As you leave the meeting, run, don't walk, to the nearest card shop and
buy a thank you card.  Write a thank you and address it immediately.
Stick it in the nearest mailbox.

Send us mail at, letting us know how it went.



Always be polite.  Never threaten.  Never lose your cool.

Many staffers have no idea what encryption is.  Moreover, they might have
never used the Internet.  You should view this as an opportunity: 
you will get the chance to define the debate and educate them.
You may even want to bring a laptop with a modem and take the member/staff
on a breif Internet tour.  (Be careful about what you show them.)

Remember we're all taxpayers, so the phrase "I'm a taxpayer" is

Be brief.  If you're going in a group, plan out the topics each person
will hit.  Appoint someone to act as a spokesperson for the group, so there
can be a central contact.

Remember the first law of Real Estate: LOCATION LOCATION LOCATION. It's
crucial that everyone at the meeting be a potential vote for the

Remind yourself that your legislator probably hasn't yet made a decision
on this issue yet; you're there to educate as much as anything.

Go as *individuals* or *business owners* who have a stake in the debate
on encryption issue.



Internet business angle: When speaking from the point of view of an Internet
Service Provider or Web design firm, you have available several arguments,
such as:

	"The popularity of the Net has created a gold rush which has
	 benefitted my business and the local voters I employ.  Concerns
  	 about security on the net could dampen that excitement, and
	 diminish the potential for industry"

	"Many types of services that I would like to offer online cannot
	 be done without strong security.  The current level of security
   	 is too weak to engender public trust, and will diminish the
	 types of business people will put on the net."

Clipper angle: If someone brings up the issue of Clipper and the idea that
government should be trusted to hold your private encryption key, you have
several options available to you:

	"It's not clear that the Administration can be trusted to hold 
	 any information secret, after incidents like the FBI Filegate

	"Handing over one's encryption keys to the gov't is just like giving
	 the local police station a copy of your house key, just in case they
 	 need to search your apartment.  Of course they would promise never
	 to use it unless authorized."



There are a number of questions you will probably be asked by the staff
or member that you should be prepared to answer.  Here's a few of them
and some answers you should feel comfortable with.


Encryption is a method of scrambling information with one or more "keys"
so that only the sender and receiver can read it, and an eavesdropper
cannot.  Your bank card PIN, telephone conversations, love letters, health
records, and business correspondence are all things that might need to
be encrypted.


Perhaps. But criminals and terrorists already have access to strong
encryption from overseas, and are unlikely to use encryption technologies
which they know are breakable by the US government.  Would you send
sensitive information using a code that you knew your adversaries could

Criminals and terrorists will, for better or worse, have access to strong
encryption regardless of U.S. efforts to restrict its availability.
Meanwhile, current U.S. policy leaves sensative personal and business
communications vulnerable and actually creates opportunities for crimes like
industrial espionage.


Quite often the strength of an encryption system is measured by the
size of the key.  Forty bits is about the same as a five or six letter
word, such as "apple".  The US government has stated that American
companies that wish to sell products with encryption can only implement
encryption whose keys are forty bits long.

At one time it was quite difficult to attack and recover messages that
were encrypted with 40 bit encryption.  Because of advances in computer
power and research, it has become much easier to do this.   As recently
as last year, a graduate student in France broke 40-bit encryption using
University resources he had available in his spare time.


No. The idea that export restrictions actually keep encryption out of the
hands of non-U.S. citizens implies that all encryption products come
from the U.S.  This is simply untrue, and the plethora of products 
available from non-U.S. sources now shows how absurd it is to continue
to keep such regulations intact.  


Yes. American hardware and software companies compete globally with products
from around the world.  For many companies, a majority of their business
comes from international sales.  In the crowded marketplace of this fast-
paced business, developing a product with a single feature that outshines a 
competitor's product can often be deciding factor in a consumer's mind.

Yet, American hardware and software businesses are at a disadvantage, as
many competing non-U.S. products can offer stronger encryption than they
can.  This places American products at a distinct competitive disadvantage.


Yes. Although it is possible to sell two versions of a product, one with
strong encryption for sale domestically and one with weak encryption
for sale abroad, most companies find this schizophrenic product
development approach to be too burdensome and risky.  The result is that
companies that produce hardware and software products that require security
tend to omit such features entirely, or weaken them so that the same product
can be used for export as for domestic use.

The end result of this is that Americans end up with products that are
becoming increasingly incapable of protecting their privacy, hampered by
regulations that can longer accomplish their goal.



For more information on the encryption issue, check these important
organizations' WWW sites:

	Center for Democracy and Technology (CDT):
	Electronic Frontier Foundation (EFF):
	Electronic Privacy Information Center (EPIC):
	Voters Telecommunications Watch (VTW):
	Wired Ventures Ltd.:

Also check these great educational sites:
	Encryption Policy Resource Page (
	Internet Privacy Coalition (



Subject: Online Civil Liberties Groups Condemn Singaporean Net Censorship

                          *** GLOBAL ACTION BRIEF ***

	FOR IMMEDIATE RELEASE                     August 28, 1996

* Please redistribute this document widely with this banner intact
* Redistribute only in appropriate places & only until 30 September 1996

Singapore Government Curtails Online Freedoms

The government of Singapore recently established strict controls on all
Internet Service Providers and many World Wide Web pages. ISPs and content
providers will be licensed, and required to adhere to a rigid set of content
guidelines which apply to political speech, ethnic and religious remarks
including satire, and public morals including "contents which propagate
permissiveness or promiscuity."

We believe that the licensing policy and broad content guidelines will
effectively chill the free flow of information not only in Singapore, but
worldwide.  Because the Internet is global, transcending geographical
bounds, we are convinced that censorship within any nation or state, whether
implicit or explicit, poses a threat to all users of the global network.  We
therefore encourage the government of Singapore, and other governments
implementing or considering policies of content control, to stress education
rather than regulation.

Singapore's approach, like the Communications Decency Act that was passed
but quickly rescinded in the U.S., applies a broadcast regulatory standard
to the Internet.

The application of broadcast-inspired, "one-to-many" regulation to this new
*many-to-many* medium indicates a fundamental misunderstanding of the nature
of the Internet.

Unlike television and radio broadcasting, the Internet does not push
material at the viewer, but simply makes material available on demand - not
unlike a rapid inter-library loan.  And unlike broadcasting, the Internet
does not present the views of a limited few privileged speakers, but allows
all participants to publish, comment on, and even refute, what they read.

Recognizing that every culture has its own standards regarding what is or is
not appropriate, the undersigned organizations recommend that Singapore's
government allow its citizens to use Internet filtering tools, with which
they can block out any material that is offensive to them, rather than
embark upon a closed-border approach that will cut Singapore off from the
new global online library.

Support of individually customizable filtration services, instead of a broad
top-down censorship effort, would enable Singapore to participate in a more
positive and effective way in the evolution of this new open medium, and
would indicate trust in the ability of Singaporeans to choose what is right
for Singapore and for themselves.



For more information on the Singapore censorship situation, and other global
efforts to abridge the flow of information over the net, see these web sites:

Human Rights Watch's letter to George Yeo, Singapore Minister for
Information and the arts, is located on HRW's gopher, at


The following organizations have issued this advisory:

Press Contacts:

ALCEI - Electronic Frontiers Italy *
American Civil Liberties Union (ACLU) *
Center for Democracy and Technology (CDT) *
CITADEL-Electronic Frontier France *
CommUnity (UK) *
EFF-Austin *
Electronic Frontiers Australia *
Electronic Frontier Canada *
Elektronisk Forpost Norge (Electronic Frontier Norway) *
Electronic Frontier Foundation *
Electronic Privacy Information Center (EPIC) *
Fronteras Electronicas Espan~a (Electronic Frontiers Spain) *
HotWired *
Voters Telecommunication Watch (VTW) *

Please choose an organization above and visit their web site for contact

A copy of this advisory is available on the World Wide Web, at



Subject: Alert: UK in Throes of Newspaper-Generated "Cyberporn" Hysteria

                      *** GLOBAL ALERT ***

FOR IMMEDIATE RELEASE                       SEPT. 6, 1996

-  Please redistribute this document widely
   with this banner intact
-  Redistribute only in appropriate places 
   & only until 30 September 1996

Global Alert: Hysteria in the UK Threatens Free Speech on the Net

The Sunday, August 25 issue of the London Observer splashed across its 
front page a sensationalized account of child pornography on the Internet, 
falsely accusing two Internet Service Providers, Clive Feather of Demon UK 
(a full service site) and Johan Helsingius of (an anonymous 
remailer) of involvement in the distribution of child pornography.  Why 
were these accusations made? Demon UK had refused to remove a broad 
range of sexually-oriented newsgroups identified by UK authorities as 
possible sources of child pornography, and was identified 
without substantiation as a source for `90% of child pornography on the 

In fact, Demon UK was simply acknowledging that Internet Service 
Providers (ISPs) cannot police the data that traverses their systems, or 
assume responsibility for it, any more than the post office can assume 
responsiblity for content that is sent through traditional mail.  And 
Helsingius, contrary to allegations in the London Observer, had long before 
restricted the size of files that could be transferred through, 
effectively eliminating the possibility that binary files containing pictures 
could be exchanged.
This story was extreme, but not without precedent: much has been written 
associating the Internet with those who make and distribute child porn, and 
there have been many attempts to hold ISPs responsible for objectionable or 
illegal content.

ISPs are not content providers; they channel content provided by their users.  
It is outside the scope of the ISP to monitor, evaluate, and attempt to remove 
objectionable content. In fact, any attempt by an ISP to block particular 
kinds of content will ultimately be fruitless, as providers of that content
will simply find alternate channels of distribution.

Moreover, it is wrong to assume that the Internet has no rules, and is 
friendly to the exchange of objectionable materials.  In fact the Internet is a 
`virtual community' of users with a distinct culture incorporating  diverse 
views but finding consensus in opposition to censorship and access control.  
There is also strong opposition to the exploitation of children; in fact, many 
Internet users have cooperated in attempts to identify those who create and 
distribute child pornography.

Summary: The physical abuse and exploitation of children is a very real 
problem demanding a proactive response; however we vigorously oppose
attempts to stifle the free and open exchange of information over the 
Internet in the mistaken belief that overbroad restrictions on the flow 
of information will protect children from abuse.  We support Demon UK 
and (which Helsingius has shut down), and deplore the 
Observer's lurid attempt to make respectable Internet providers the 
"cause" of a problem for which they have no responsibility.

The Observer story is not the first of its kind: it represents an ongoing 
confusion about a complex new medium.  Unfortunately this 
misunderstanding has become a global problem, represented in proposed or 
enacted restrictive legislation as well as negative press.

Consider these possible analogies to the Internet:

- The Internet is a vast mail system, like a post office.  Would you favor a 
  law that required postal authorities to open each piece of mail and 
  evaluate its acceptability?

- The Internet is a huge library system.  Would you favor a law that 
  would restrict information a library can provide?

- The Internet is a collection of virtual communities. Would you favor a 
  law that required routine searches of your community?

Our position: These measures constrain everyone because of the misdeeds 
of a few. It is more sensible to find and deal with the sources of child 
pornography than to impede the flow of data over the Internet. The 
imposition of censorship and additional constraints applied to ISPs will not 
solve the existing problem, but will create a new problem, a barrier to the 
free and democratic exchange of ideas.

For press contacts, and for more information about the Internet, see 
homepages for the signatories to this message:

ALCEI - Electronic Frontiers Italy *
American Civil Liberties Union (ACLU) *
CITADEL-Electronic Frontier France *
CommUnity (UK) *
Electronic Frontier Foundation (USA) *
EFF-Austin (USA) *
Electronic Frontier Canada *
Electronic Frontiers Australia *
Electronic Frontiers Houston (USA) *
Elektronisk Forpost Norge (Electronic Frontier  Norway) *
Fronteras Electronicas Espan~a (Electronic Frontiers Spain) *
HotWired *


Subject: NewsNybbles

* Chinese Government on a "spiritual pollution" Net Censorship Rampage

Furthering previous moves to limit Western news distribution, by piping it
through the government-controlled Xinhua news agency, Beijing has announced
blockage of as many as 100 Web sites around the world, prevening those in
China from reaching these sites.  The "blacklist" includes US new media
(CNN, Wall Street Journal), Taiwanese and Hong Kongese news and commentary,
sites critical of Chinese policy, and a few (but hardly all) sites
providing sexually explicit material, such as Playboy.

[Sources: Wall Street Journal, 960905.]

* Pseudonymous Remailer Closed; No Online Privacy in Finland

Losing a year-long battle with the Church of Scientology, Johan "Julf" 
Helsingius has closed his popular privacy-protecting remailer service
at  A preliminary court ruling in a case brought under 
Finnish law by representatives of the Church of Scientology has concluded 
that under current Finnish law, there is essentially no privacy online.

Helsingius predicts a rapid change to his country's privacy laws to fix 
the loophole, has kept the system operational for it's 
500,000+ users' non-pseudonymous communications, and brushes off claims 
that he is shutting the system down due to the child pornography 
allegations of UK newspaper _The_Observer_.  "Julf" says he will be 
filing a defamation suit against the newspaper, and will appeal the 
Finnish court ruling, but is taking the system down to prevent a repeat 
of an earlier CoS victory: the court ordered Helsingius to produce the 
identifying information of person who had allegedly used the remailer to 
violate CoS intellectual property rights.

In a press release, Helsingius wrote, "I will close down the remailer for 
the time being because the legal issues governing the whole Internet in 
Finland are yet undefined. The legal protection of the users needs to be 
clarified. At the moment the privacy of Internet messages is judicially 

Though some Net users feel distraught at the closure of, 
others point out that the remailer system was intentionally designed to
avoid government censorship and privacy invasion. Nodes in this 
meta-network are expendable, with others, in different jurisdictions, 
popping up to replace those that go down.  And may have 
gone down just in time. Noting the Scientology cases' preliminary 
ruling, the government of Singapore (busy aren't they?) has begun 
demanding that Helsingius tell the the real identity of a person who has 
posted messages critical of Singaporean regulation policies.

Internet security thinkers point out that cryptographically-protected and 
truly anonymous "Type II" remailers do not keep databases that translate 
pseudonym to real email address, but instead strip the real address out 
entirely.  This precludes being able to reply to anonymous messages, but 
also precludes seizure of the email address database, or court-ordered
release of information on those who have used the system.

Related information: 

 hysterical London _Observer_ article

 Helsingius' press release 

[Source: Reuters, 960830; Hotwired "Netizen", 960906; Helsingius press
release, 960830.]

* Anti-Terrorism Bill's Fallout Looks Suspiciously Orwellian

In the wake of the House Anti-Terrorism Bill's demands for increased 
airport security, various proposals have been floated, including a 
particularly disturbing one from an aviation commission led by US Vice 
President Al Gore.  The commission recommends computerized background 
checks on all airline passengers, seeking travel "irregularities" that 
supposedly indicate possibility of terrorist activity, to determine 
whose luggage should be searched!  Such background checks might include 
travel histories, financial records, and contact information.

[Source: New York Times, 960901]

* AOL's Attempt to Block "Spam" Halted by Court

For some time, America Online has been running an e-blockade to prevent the 
"spamming" (junk e-mailing) of AOL subscribers by Cyber Promotions and 
other online marketing companies who have aroused the ire of, well, just 
about everyone with an email address.  CP says AOL is being 
hypocritical, since the online service sends AOL-sponsored unsolicited 
ads to the same subscribers (and, though CP didn't point this out, much 
of the "spam" that's hit Usenet and a thousands of mailing lists was 
sent by people abusing free temporary AOL trial accounts).  CP also 
claims the filtration violates AOL users' right to read what they want, 
and CP's rights to publish and disribute what it wants.

Some numbers: AOL receives 1.8 million junk emails per day (not counting 
the internally generated ones.)  CP accounts for about 900,000 of them, and
sends an additional mass-mailing of 400,000 ads to non-AOL Internet 
addresses daily, according to CP president Sanford Wallace.

CP, filing suit against AOL in March, moved in the Philadelphia district 
courtroom of Judge Charles Weiner for a temporary restraining order 
against AOL interfering with Cyber Promo's advertising emailings. The 
judge granted the order (which does not affect AOL's block against 
two other "spammers") on Sept. 5, pending a civil trial set for November.

AOL may appeal the order, according to AOL counsel David Phillips.

How does the online community feel about all of this?  A majority appear
to detest e-junkmailing, but an increasinly vocal minority criticize
attempts to cancel or block "spam" as a violation of advertisers' free
speech rights, at least in a philosophical if not legal sense. And opinions
on AOL's actions range from considering the AOL blockade to be a kind of
imperialism on the online service's part, to another example of AOL trying
to give back to and participate more fully in the Internet.  

The eventual solution to the problem of swelling, ad-filled email boxes 
and increasingly unreadable newsgroups filled with virtual billboards may 
rely on technical changes to various Usenet and Internet protocols that 
make massmailing more difficult, improvements to personal filtration 
software, and/or tighter online service contracting.  Marketers' viewpoints
tend toward preserving the ability to broadly advertise while narrowing
target audiences by profiling and other direct marketing techniques, many 
of which raise user privacy concerns. However this plays out over the 
next few years, whether online adverts follow postal models, are 
illegalized via extension of junk fax laws, or subject to some other 
outcome, it's going to be "interesting", in more ways than one.

Related information: 
  Full text of Judge Weiner's TRO

[Source: New York Times, 060905; Philadelphia Inquirer, 960906.]


Upcoming Events

This schedule lists EFF events, and those we feel might be of interest to
our members.  EFF events (those sponsored by us or featuring an EFF speaker)
are marked with a "*" instead of a "-" after the date.  Simlarly, government
events (such as deadlines for comments on reports or testimony submission,
or conferences at which government representatives are speaking) are marked
with "!" in place of the "-" ("!?" means a govt. speaker may appear, but
we don't know for certain yet.)  And likewise, "+" in place of "-"
indicates a non-USA event.  If it's a foreign EFF event with govt. people,
it'll be "*!+" instead of "-".  You get the idea.

The latest version of the full EFF calendar is available from:

ftp:, /pub/EFF/calendar.eff
gopher:, 1/EFF, calendar.eff

See also our new Now-Up-to-Date HTML calendar at:


Sep. 9-   INTERNET LAW SYMPOSIUM 96 (ILS96); second annual international
     10 - law and policy summit for the global Internet; experts on and
          delegates from business, education, public policy, legislation,
          security, and justice will examine places where technology and
          law converge; Seattle, Washington, USA

Sep. 9-
     10 - "The Communications Act of 1996 - Deriving Order from Chaos";
        ! Two-day conference Washington, DC, conference will examine the
        * sweeping changes in store for the telecommunications industry and
          public with the implentation of the Telecoomunications Reform Act;
          Congressmen Rick Boucher, Jack Fields and Senator Conrad Burns are
          scheduled to participate; sponsored by Bell Atlantic. Similar
          programs to take place in Chicago, IL (Sep. 11-12), Dallas, TX
          (Sep. 16-17), San Francisco, CA (Sep. 19-20; EFF Board Member
          Louise Velazquez will join a panel discussion here).
          Contact:   Bell Atlantic
          Telephone: 1-800-242-7675
          Fax:       1-609 452-1288

Sep. 9-
     11 - Connect 96: The Global Summit on Building Electronic
          Communities; information society leaders will discuss the 
          challenges of developing electronic infrastructures; hosted by 
          Smart Valley, Inc., and Stanford University (event is on campus);
          contact: Leslie Kareckas (408) 562 7747 or email:

Sep. 10 * Workshop on Digital Cash and Public Policy sponsored by the
        ! Institute for Technology Assessment; EFF Staff Counsel Shari
        - Steele will speak on legal issues surrounding online banking
          and commerce; Members of Congress will attend and participate
          in discussions; U.S. House of Representatives' Cannon Office
          Email for more infomration

Sep. 17 +  Advanced Surveillance Technologies II; Ottowa, Ontario, Canada.

Sep. 18-
     19 +! Data Protection and Privacy Commissioners, Ottawa, Ontario,
           Canada. No Contact Info.
           Contact: Conference Coordinator, 112 Ketn St., Ottawa,
                    Ontario, Canada, K1A 1H3
           Phone: +1 613 995 2410
           Fax: +1 613 947 6850

Sep. 24-
     26 - Electronic Publishing 1996; an international conference in Palo
          Alto (USA) organized by Xerox Palo Alto Research Center;
          Contact: EP96; Xerox Corporation; XSoft Division;
          3400 Hillview Avenue PAHV-127; Palo Alto, California 94304; USA
          tel: +1 415/813-7293; fax: +1 415/813-7188

Sep. 27 * American Bar Association Forum on Communications Law; EFF Staff
        - Counsel Shari Steele will speak on issues of trademark online,
          including the recent Georgia law which has greatly chilled free
          speech online; New York City.
          American Bar Association
          740 15th St., NW
          Washington, DC 20061-0001
          Phone: (202) 331-2200

Oct. 8-
     11 - EDUCOM '96; Philadelphia, PA
          Contact: +1 202 872 4200 (voice)

Oct. 11 * American Bar Association Forum on Communications Law; EFF Staff
        - Counsel Shari Steele will speak on issues of trademark online,
          including the recent Georgia law which has greatly chilled free
          speech online; San Francisco
          American Bar Association
          740 15th St., NW
          Washington, DC 20061-0001
          Phone: (202) 331-2200

Oct. 12-
     13 - Supreme Law Seminars - Freedom Law and Internet Technology:
          The Full Faith and Credit Clause; Holiday Inn Palo Verde in
          Tucson, Arizona; focus of the seminar  will be  the  constitutional
          law  of  freedom,  and available Internet  technologies for
          teaching and  learning this law, and making freedom a reality.
          Richard McDonald of Canoga  Park, California will be the featured
          guest speaker; Advanced tickets  are available by sending  $100 in
          cash or blank U.S. Postal Money order to  Paul Andrew Mitchell,
          Supreme Law Seminars,  c/o 2509  North Campbell,  Apartment 1776,
          Tucson, Arizona. For more info, Email to:
          Paul Andrew Mitchell 

Oct. 16-
     19 - Web Net-96: World Conference of The Web Society, organized by
          the Association of Computing in Education; San Francisco, CA.
          Contact: +1 804 973 3987
          Fax: +1 804 978 7449

Oct. 19-
     20 - Computer Professionals for Social Reponsibility (CPSR) -
          Two-day conference at Georgetwon University (Washington, D.C.,
          USA) will investigate the role of computers in political
          activism, election processes, and rights of access to information.
          Invited keynote speaker is Ralph Nader. More info contact CPSR:
          tel: 415-322-3778, 703-739-9320

Oct. 19-
     24 - ASIS 1996 Annual Meeting - Global Complexity: Information, Chaos
          and Control; meeting will consider the complexity of the working
          world of information professionals as well as theoretical
          perspectives involving the nature and use of information;
          Baltimore, Maryland, USA; more information, registration...
          see under Conferences

Oct. 23 + International Bar Association's Media Law Seminar - Berlin;
          Seminar discussion of Internet freedom of expression issues;
          part of IBA annual conference drawing 4,000+ lawyers from all
          acround the globe.

Oct. 29-
     30 ! "The First 100 Feet: Options for Internet and Broadband
        - Access," sponsored by the Freedom Forum, the Harvard Information
          Infrastructure Project, the National Economic Council, and the U.S.
          Dept. of Energy; The Freedom Forum Building, Arlington, Va.;
          submission deadline: June 20
          Contact: Tim Leshan, Coordinator, Information Infrastructure
          Project, Kennedy School of Government, Harvard University, 79 JFK
          St., Cambridge, MA 02138
          Phone: +1 617 496 1389
          Fax: +1 617 495 5776

Nov. 6-
     8 + ETHICOMP96: Ethical Issues of Information Technology; Universidad
         Pontificia de Salamanca - Madrid, Spain; seeks to provide practical
         guidance on socially and ethically sensitive applications of IT --
         the social benefits and drawbacks of using IT; will include the
         presentation of case studies which raise or illustrate significant
         ethical problems of IT usage (1) in the workplace, (2) in education,
         (3) at home and (4) in leisure.  Nov. 6-8, 1996

         For further general information contact:
         Centre for Computing and Social Responsibility
         School of Computing Sciences
         De Montfort University
         The Gateway
         LE1 9BH UK
         Telephone: +44 116 257 7475
         Fax +44 116 254 1891

Nov. 13-
     15 - Fourth Biennial Participatory Design Conference, sponsored by
          Computer Professionals for Social Responsibility; Cambridge, MA.
          Submission deadline: May 3.

Nov. 15-
     22 + Communication and the Empowerment of Civil Society in Africa,
          10th Biennial Conference; Cape Town, South Africa.
          Tel. 25~2-216135 /227043

Dec. 1  - Computer Security Day (started by Washington DC chapter of the
          Assoc. for Computing Machinery, to "draw attention to computer
          security during the holdiay season when it might otherwise become

Dec. 5-
     8  + Tel*Ed/Multimedia '96, "a conference where communication
          technology is used to create learning experiences for the
          participants...where participants show, not tell, how
          telecommunication can bridge distances"; Tampa, FL and
          Monterrey, Mexico.


Subject: Quote of the Day

"Indeed, the Government's asserted 'failure' of the Internet rests on the
implicit premise that too much speech occurs in that medium, and that
speech there is too available to the participants.  This is exactly the
benefit of Internet communication, however.  The Government, therefore,
implicitly asks this court to limit both the amount of speech on the
Internet and the availability of that speech.  This argument is profoundly
repugnant to First Amendment principles."
  - Judge Stewart Dalzell, ACLU v. Reno, 1996.

Find yourself wondering if your privacy and freedom of speech are safe 
when bills to censor the Internet are swimming about in a sea of of 
surveillance legislation and anti-terrorism hysteria?  Worried that in 
the rush to make us secure from ourselves that our government 
representatives may deprive us of our essential civil liberties? 
Concerned that legislative efforts nominally to "protect children" will 
actually censor all communications down to only content suitable for 
the playground?  Alarmed by commercial and religious organizations abusing
the judicial and legislative processes to stifle satire, dissent and 

Join EFF! (or send any message to

Even if you don't live in the U.S., the anti-Internet hysteria will soon 
be visiting a legislative body near you.  If it hasn't already.


Subject: What YOU Can Do

* New Crypto-Privacy Legislation

Urge your Represenatitives to support the Pro-CODE crypto export bill 
(and to fix the few remaining bugs in it).  

For years US export controls on encryption have hampered the development
of secure communications online. This technology is vital for online 
commerce, for national security, and for YOUR electronic privacy.

The new Pro-CODE legislation will go a long way to rectifying the situation.

Join Crypto Action Week - see lead article in this issue for more info.

Join in the Golden Key Campaign - see


Support the EFF Cyberspace Legal Defense Fund:

See also:
for more info.

* Digital Telephony/Comms. Assistance to Law Enforcement Act

The FBI has been seeking both funding for the DT/CALEA wiretapping 
provisions, and preparing to require that staggering numbers of citizens be 
simultaneously wiretappable.  

To oppose the funding, write to your own Senators and Representatives 
urging them to vote against any appropriations for wiretapping. 

In the wake of the Olympics bomb, the US government, both legislative and 
executive branches, are hot to pass new wiretapping laws, and fund the 
DT/CALEA wiretapping provisions.  SPEAK OUT NOW. There is not a moment to 
lose! See lead article in this issue for more information.

See for background 

* Anti-Terrorism Bills

Several bills threatening your privacy and free speech have been introduced
recently. Urge your Congresspersons to oppose these unconstitutional and 
Big-Brotherish bills, which threaten freedom of association, free press, 
free speech, and privacy. One such bill passed some time ago, stripped 
of some of the more onerous provisions.  It could have been worse, and 
could yet still be worse: A new anti-terrorism bill posing many threats 
to YOUR privacy may arise this month. SPEAK OUT NOW. There is 
not a moment to lose! 

Keep up the pressure. Write to your legislators: No 
secret trials and deportations, no expansion of wiretapping scope or 
authority, no national or "smart-card" ID systems!

For more information on some of this legislation, see

* The Communications Decency Act & Other Censorship Legislation

The Communications Decency Act and similar legislation pose serious 
threats to freedom of expression online, and to the livelihoods of system 
operators.  The legislation also undermines several crucial privacy 

Business/industry persons concerned should alert their corporate govt.
affairs office and/or legal counsel.  Everyone should write to their own
Representatives and Senators, letting them know that such abuses of 
public trust will not be tolerated, that legislators who vote against
your free speech rights will be voted against by you in the next elections.

Join in the Blue Ribbon Campaign - see


Support the EFF Cyberspace Legal Defense Fund:

For more information on what you can do to help stop this and other 
dangerous legislation, see:, /pub/Alerts/, 1/Alerts

If you do not have full internet access (e.g. WWW), send your request
for information to

censorious legislation is turning up at the US state and non-US 
national levels.  Don't let it sneak by you - or by the online activism 
community. Without locals on the look out, it's very difficult for the 
Net civil liberties community to keep track of what's happening locally 
as well as globally.

* The Anti-Electronic Racketeering Act

This bill is unlikely to pass in any form, being very poorly drafted, and 
without much support.  However, the CDA is just as bad and passed with 
flying colors [the jolly roger?] in Congress. It's better to be safe 
than sorry. If you have a few moments to spare, writing to, faxing, or 
calling your Congresspersons to urge opposition to this bill is a good 

* Medical Privacy Legislation

Several bills relating to medical privacy issues are floating in Congress 
right now. Urge your legislators to support only proposals that *truly* 
enhance the medical privacy of citizens.

More information on this legislation will be available at soon.  Bug to make 
it appear there faster. :)

* Child Privacy Legislation

A new bill to protect children from unethical marketing practices (e.g. 
tricking kids into revealing personal information by offering prizes or 
games) has been introduced.  EFF and other civil liberties organizations
like, and dislike, various points in this bill.  The legislators 
sponsoring the bill appear interested in resolving the problems in the 
statutory language they have proposed.  More information on this will be 
provided soon.

* Find Out Who Your Congresspersons Are

Writing letters to, faxing, and phoning your representatives in Congress
is one very important strategy of activism, and an essential way of
making sure YOUR voice is heard on vital issues.

EFF has lists of the Senate and House with contact information, as well
as lists of Congressional committees. These lists are available at:, /pub/Activism/Congress_cmtes/, 1/EFF/Issues/Activism/Congress_cmtes

The full Senate and House lists are senate.list and hr.list, respectively.
Those not in the U.S. should seek out similar information about their
own legislative bodies.  EFF will be happy to archive any such
information provided to us, so pass it on!

If you are having difficulty determining who your US legislators are,
try contacting your local League of Women Voters, who maintain a great 
deal of legislator information, or consult the free ZIPPER service
that matches Zip Codes to Congressional districts with about 85%
accuracy at:

Computer Currents Interactive has provided Congress contact info, sorted 
by who voted for and against the Communcations Decency Act:

* Join EFF!

You *know* privacy, freedom of speech and ability to make your voice heard
in government are important. You have probably participated in our online
campaigns and forums.  Have you become a member of EFF yet?  The best way to
protect your online rights is to be fully informed and to make your
opinions heard.  EFF members are informed and are making a difference.  Join
EFF today!

For EFF membership info, send queries to, or send any
message to for basic EFF info, and a membership form.



EFFector Online is published by:

The Electronic Frontier Foundation
1550 Bryant St., Suite 725
San Francisco CA 94103 USA
+1 415 436 9333 (voice)
+1 415 436 9993 (fax)
Membership & donations:
Legal services:
General EFF, legal, policy or online resources queries:

Editor: Stanton McCandlish, Online Activist, Webmaster (

This newsletter is printed on 100% recycled electrons.

Reproduction of this publication in electronic media is encouraged.  Signed
articles do not necessarily represent the views of EFF.  To reproduce
signed articles individually, please contact the authors for their express
permission. Press releases and EFF announcements may be reproduced individ-
ually at will.

To subscribe to EFFector via email, send message body of "subscribe
effector-online" (without the "quotes") to, which will add
you to a subscription list for EFFector.

Back issues are available at:, /pub/EFF/Newsletters/EFFector/, 1/EFF/Newsletters/EFFector

To get the latest issue, send any message to (or, and it will be mailed to you automagically.  You can also get
the file "current" from the EFFector directory at the above sites at any 
time for a copy of the current issue.  HTML editions available at: 
at EFFweb.  HTML editions of the current issue sometimes take a day or 
longer to prepare after issue of the ASCII text version.


End of EFFector Online v09 #12 Digest


Back to top

JavaScript license information