From <@vm42.cso.uiuc.edu:owner-cudigest@VMD.CSO.UIUC.EDU> Wed Jun 29 01:57:33 1994
Date:         Wed, 29 Jun 1994 00:08:00 CDT
Reply-To: TK0JUT2@MVS.CSO.NIU.EDU
Sender: CU-DIGEST list <CUDIGEST%UIUCVMD.bitnet@vm42.cso.uiuc.edu>
Subject:      Cu Digest, #6.58
To: Multiple recipients of list CUDIGEST <CUDIGEST%UIUCVMD.bitnet@vm42.cso.uiuc.edu>

Computer underground Digest    Tue  June 28, 1994   Volume 6 : Issue 58
                           ISSN  1004-042X

       Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
       Archivist: Brendan Kehoe
       Retiring Shadow Archivist: Stanton McCandlish
       Shadow-Archivists: Dan Carosone / Paul Southworth
                          Ralph Sims / Jyrki Kuoppala
                          Ian Dickinson
       Coptic Idolator:       Ephram Shrewdlieu

CONTENTS, #6.58 (Tue, June 28, 1994)

File 1--Re: E-Mail Female for a Day (CuD 6.57)
File 2--Re: "Ghost in the Modem" (CuD 6.51)
File 3--Cryptography export legislation in need of help!
File 4--Terisa_Systems.html

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send a one-line message:  SUB CUDIGEST  your name
Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at:  Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on  internet);
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

EUROPE:   from the ComNet in LUXEMBOURG BBS (++352) 466893;
          In ITALY: Bits against the Empire BBS: +39-461-980493

  UNITED STATES:  etext.archive.umich.edu (141.211.164.18)  in /pub/CuD/
                  ftp.eff.org (192.88.144.4) in /pub/Publications/CuD
                  aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
                  world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
                  uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
                  wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
  EUROPE:         nic.funet.fi in pub/doc/cud/ (Finland)
                  ftp.warwick.ac.uk in pub/cud/ (United Kingdom)

  JAPAN:          ftp.glocom.ac.jp /mirror/ftp.eff.org/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.  CuD material may  be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission.  It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified.  Readers are encouraged to submit reasoned articles
relating to computer culture and communication.  Articles are
preferred to short responses.  Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
            the views of the moderators. Digest contributors assume all
            responsibility for ensuring that articles submitted do not
            violate copyright protections.

----------------------------------------------------------------------

Date: Mon, 27 Jun 1994 10:06:54 -0500
From: Anonymous <remailer-admin@CHAOS.BSU.EDU>
Subject: File 1--Re: E-Mail Female for a Day (CuD 6.57)

> It begins to dawn on me that Jeff is simply not going to leave me alone.
> "Stop being a weenie, Jeff," I growl at the terminal.  More than just
> annoy, he's really beginning to piss me off.  He is _only_ acting this
> way because he thinks I'm female.  If there was a "male" designation on
> the screen beside my name, Jeff would not bothered me after the second
> ignore, if he would have noticed me at all.

Guys who impersonate females on the net are called 'she-males'.  There
are *lots* of them around...

What many of these macho hetboys out there don't realise is that there's
a large gay and bi subculture that gets off on hanging out on the net,
irc, and bbs's, using female handles in order to hit on het guys like
this.

There's a great deal of satisfaction to be had from having hot netsex
with one of these bozos, then while he's relaxing and wiping the cum
off his keyboard you tell him 'Yo, that was fun.  Say, next time,
call me Danny...'

That's one reason guys pretend to be females; another group talks to
women to get them to talk dirty, thinking they're talking to other
women, especially on the lesbian and bisexual female channels on IRC.
(The lesbian channels are hilarious, where the women ask you questions
that the men 'couldn't possibly' know the answers to, like the small
print on a packet of tampons.  Also you have to string off a list
of very right-on lesbian-friendly music that you're supposed to like...
They seem to think this will keep the she-males out.  Bwahahaha!)

I remember one time on #bifem last year when there were 5 people on
the channel and *every one* of us was either male or m->f transsexual...
not a real woman among us!  (I'm not sure the other 4 guys realised
this...)

Watch out guys, the next woman you molest might be a 6'2'' programmer
from Silverado California!

------------------------------

Date:         15 Jun 94 13:03:24 CDT
From: A02DAG1@NOC.NIU.EDU
Subject: File 2--Re: "Ghost in the Modem" (CuD 6.51)

In Cu Digest #6.51, Bryce Wilcox wrote:

-=> In CuD 6.50 I read an article entitled "Ghost in the Modem (Loka Alert
-=> 1:6 Wash.  Post)".  In this article, authors Richard Sclove and
-=> Jeffrey Scheuer deliver several warnings about the possible effects of
-=> the developement of the Information Superhighway and conclude by
-=> suggesting three restrictions that, they assert, should be placed on
-=> information service developement.
-=>
-=>   While I find myself in more or less complete disagreement with the
-=> authors, I am not going to argue about the thesis of their article
-=> today.  Instead, I would like to draw attention to a statement made
-=> earlier in the article which I believe indicates an underlying false
-=> assumption.
-=>
-=>   The statement is: "And the risk of inequity in contriving and
-=> distributing electronic services [...] is clear."
-=>
-=>   This statement seems to assume that access to information technology
-=> should be equally distributed among individuals.  The reason that I
-=> find this assumption disturbing enough to write about is because I
-=> often see variations on such a theme echoed in Computer underground
-=> Digest, but I rarely if ever see a contradictory opinion stated.
-=>
-=>      I would like to take this opportunity to state that I
-=>      believe egalitarianism, in regard to information technology
-=>      as elsewhere, is an irrational, immoral, and dangerous
-=>      ideal.
-=>
-=>   As a denizen of cyberspace and a long-time reader of CuD, I would
-=> like others to know that I will not assist anyone in his or her
-=> attempt to enact policies which, I believe, would be vastly
-=> destructive to the cyber-society, and the real society which I
-=> inhabit.
-=>   I am sure that many of my fellow Net citizens have similar ideals
-=> and ideologies, but I would not know it from reading CuD!
-=>
-=> commentary and criticism is welcome

You don't leave much to comment on, but I'm curious what your
reasoning is for your position. I agree with you on the second to
last paragraph, that policies and programs that are, or could be,
destructive should be opposed, but I don't understand the connection
between the ideal that every citizen that cares to connect up and
start surfing the net should be allowed to and a policy that's
destructive to either the "cyberspace" that we keep hearing about or
the real society in which we live.

Maybe I'm misunderstanding your position, but you seem to favour a
"status quo" position that only the technologically knowledgable
should be allowed to use the networks. A sort of nerd-priesthood, if
you will, paying homage to the net.gods. If this is, in fact, your
position, how would one go about joining this priesthood? What sort
of controls will have to be implemented to keep out the
non-initiated?

------------------------------

Date: Tue, 28 Jun 1994 12:40:10 -0400 (EDT)
From: "Shabbir J. Safdar" <shabbir@PANIX.COM>
Subject: File 3--Cryptography export legislation in need of help!

[URGENT ACTION REQUIRED BEFORE 10:30AM JUNE 30TH, 1994]
[PLEASE CHECK THE "WHAT YOU CAN DO RIGHT NOW" SECTION!]
*********************************************************************

                        DISTRIBUTE WIDELY

*********************************************************************

Table of contents:
Introduction & Alert
Status of the bill
What you can do right now
List of legislators supporting HR 3937 (formerly HR 3627)
List of legislators wavering on HR 3937 (formerly HR 3627)
List of legislators opposing HR 3937 (formerly HR 3627)
What is the Cantwell bill?

 ---------------------------------------------------------------
INTRODUCTION & ALERT

Voters Telecomm Watch keeps scorecards on legislators' positions on
legislation that affects telecommunications and civil liberties.
If you have updates to a legislator's positions, from either:

-public testimony,
-reply letters from the legislator,
-stated positions from their office,

please send them to vtw@panix.com so they can be added to this list.

General questions: vtw@panix.com
Mailing List Requests: vtw-list-request@panix.com
Press Contact: stc@panix.com
Gopher URL: gopher://gopher.panix.com:70/1/1/vtw
WWW URL:Be patient; we're working on it. :-)
 ---------------------------------------------------------------
STATUS OF THE BILL (updated 6/28/94)

The Cantwell bill, that allows for fewer restrictions exports of
cryptography, has an interesting history.  It was rolled into the
General Export Administration Act HR 3937.  The House Foreign Affairs
Committee passed the full strength version out of committee after
open, public hearings.  The House Intelligence Committee took the
bill and gutted it after a day of closed, secret hearings.  The
gutted version is making its way to the House floor.

There is a crucial stop-off point, however.  The House Rules Committee
will hold a hearing on Thursday June 30th, 10:30am in D.C. (Room H-13)
to determine if the bill can be amended on the House floor (an "open"
bill) or not (a "closed" bill).

If they mark the bill as "open", then the Cantwell bill could be restored
to its previous version, removing the language put in by the House Select
Intelligence Committee which gutted it without a public hearing.

It is crucial that you call of the members of the House Rules Committee
before 10:30am Thursday June 30th and urge them to mark the bill as
"open".

This may be the last thing you can do for the cryptographic export
legislation.  Take the time to make a call!

Chronology of the bill
Jun 30, 94  House Rules Comm. decides whether to allow amendments
    on the bill when it reaches the House floor
Jun 14, 94  Gutted by the House Select Committee on Intelligence
May 20, 94  Referred to the House Select Committee on Intelligence
May 18, 94  Passed out of the House Foreign Affairs Committee on May 18
    attached to HR 3937, the General Export Administration Act
Dec  6, 93  Referred to the Subcommittee on Economic Policy, Trade and
Nov 22, 93  Referred to the House Committee on Foreign Affairs.

 ---------------------------------------------------------------
WHAT YOU CAN DO RIGHT NOW

Estimated time to do this good deed: Two minutes

Show your support for HR 3937 (formerly HR 3627) by contacting a member
of the House Rules Committee and ask them to mark the bill as "open"
(allowing amendments) when it reaches the House floor.

The phone numbers of the members of the House Rules Committee are listed
below.  Please pick one from your state and call them.  If your state
isn't listed please call the Chairman, Rep. Joe Moakley.

Feel free to use the following sample communique:

The Honorable ____________
address
Washington DC, 20515

Dear Congressman or Congresswoman,

Please mark the General Export Administration Act (HR 3937) as
"open" (allowing amendments on the House floor).

Recently the House Intelligence Committee removed several provisions
of the General Export Administration Act, HR 3937, dealing with
the export of cryptographic technology.

The House Intelligence Committee did this in a closed, secret hearing
which provided for no public input.  The House Foreign Affairs
Committee previously held an open hearing on the same issue and
received a flood of people testifying in favor of the bill, which the
committee then reported out in full.

I urge you to allow the democratic process to take its course
on the House floor and mark the bill as "open".

Sincerely,

_________________________________


Phone/Fax/Addresses of members of the House Rules Committee


103rd United States Congress, 1993-1994

All addresses are Washington, D.C. 20515

   Dist ST Name, Address, and Party       Phone            Fax
   ==== == ========================       ==============   ==============
      9 MA Moakley, John Joseph (D)       1-202-225-8273   1-202-225-7304
             235 Cannon
      3 SC Derrick, Butler (D)            1-202-225-5301   1-202-225-5383
             221 Cannon
     24 CA Beilenson, Anthony (D)         1-202-225-5911   1-818-999-2258
             2465 RHOB   (might not answer)

     24 TX Frost, Martin (D)              1-202-225-3605   1-202-225-4951
             2459 RHOB
     10 MI Bonior, David E. (D)           1-202-225-2106   1-202-226-1169
             2207 RHOB
      3 OH Hall, Tony P. (D)              1-202-225-6465   1-202-225-6766
             2264 RHOB
      5 MO Wheat, Alan (D)                1-202-225-4535   1-202-225-5990
             2334 RHOB
      6 TN Gordon, Bart (R)               1-202-225-4231   1-202-225-6887
             103 Cannon
     28 NY Slaughter, Louise M. (D)       1-202-225-3615   1-202-225-7822
             2421 RHOB
     22 NY Solomon, Gerald B. (R)         1-202-225-5614   1-202-225-1168
             2265 RHOB
      1 TN Quillen, James H. (R)          1-202-225-6356   1-202-225-7812
             102 Cannon
     28 CA Dreier, David (R)              1-202-225-2305   1-202-225-4745
             411 Cannon
     14 FL Goss, Porter J. (R)            1-202-225-2536   1-202-225-6820
             330 Cannon

 --------------------------------------------------------

LIST OF LEGISLATORS SUPPORTING CRYPTOGRAPHY EXPORT LEGISLATION

The following legislators have formally registered support for
cryptography export legislation.  Call them with your cheers.

All addresses are Washington, D.C. 20515

   Dist ST Name, Address, and Party       Phone            Fax
   ==== == ========================       ==============   ==============
      1 WA Cantwell, Maria (D)            1-202-225-6311   1-202-225-2286
             1520 LHOB
HR 3627's sponsor; thank her for her work!

     16 IL Manzullo, Donald (R)           1-202-225-5676   1-202-225-5284
             506 Cannon
Cosponsored HR 3627 on 11/22/93

      3 UT Orton, William H. (D)          1-202-225-7751   1-202-226-1223
             1122 LHOB
Cosponsored HR 3627 on 03/22/94

      3 OR Wyden, Ronald (D)              1-202-225-4811   1-202-225-8941
             1111 LHOB
Cosponsored HR 3627 on 03/22/94

     16 CA Edwards, Donald (D)            1-202-225-3072   1-202-225-9460
             2307 RHOB
Cosponsored HR 3627 on 03/22/94

     19 OH Fingerhut, Eric D. (D)         1-202-225-5731   1-202-225-9114
             431 Cannon
Cosponsored HR 3627 on 03/22/94

      4 MA Frank, Barney (D)              1-202-225-5931   1-202-225-0182
             2404 RHOB
Cosponsored HR 3627 on 03/22/94

      2 UT Shepherd, Karen (D)            1-202-225-3011   1-202-226-0354
             414 Cannon
Cosponsored HR 3627 on 03/22/94

      3 WA Unsoeld, Jolene (D)            1-202-225-3536   1-202-225-9095
             1527 LHOB
Cosponsored HR 3627 on 03/22/94

     19 FL Johnston II, Harry (D)         1-202-225-3001   1-202-225-8791
             204 Cannon
Cosponsored HR 3627 on 03/22/94

      9 WA Kreidler, Mike (D)             1-202-225-8901   1-202-226-2361
             1535 LHOB
Cosponsored HR 3627 on 03/22/94

      4 WA Inslee, Jay (D)                1-202-225-5816   1-202-226-1137
             1431 LHOB
Cosponsored HR 3627 on 03/22/94

      7 WA McDermott, James A. (D)        1-202-225-3106   1-202-225-9212
             1707 LHOB
Cosponsored HR 3627 on 03/22/94

      8 IN McCloskey, Frank (D)           1-202-225-4636   1-202-225-4688
             306 Cannon
Cosponsored HR 3627 on 03/22/94

     14 CA Eshoo, Anna G. (D)             1-202-225-8104   1-202-225-8890
             1505 LHOB
Cosponsored HR 3627 on 03/22/94

     10 NC Ballenger, Thomas C. (R)       1-202-225-2576   1-202-225-0316
             2238 RHOB
Cosponsored HR 3627 on 05/04/94

      2 WA Swift, Al (D)                  1-202-225-2605   1-202-225-2608
             1502 LHOB
Cosponsored HR 3627 on 05/04/94

 ---------------------------------------------------------------
LIST OF LEGISLATORS WAVERING ON CRYPTOGRAPHY EXPORT LEGISLATION
[Feel free to use the sample communique at the end of the FAQ when calling
 or writing a legislator.]

     26 NY Hinchey, Maurice D. (D)        1-202-225-6335   1-202-226-0774
             1313 LHOB
Recently told a constituent that he is taking the Cantwell bill
under consideration, but has "national security concerns" about
allowing encryption to be exported outside the United States.

      1 IA Leach, James (R)               1-202-225-6576   1-202-226-1278
             2186 RHOB
Has yet to answer a constituent letter with a stated position.

     13 NY Molinari, Susan (D)            1-202-225-3371   1-202-226-1272
             123 Cannon
Has yet to answer a constituent letter with a stated position.
(has taken inordinately long)

      8 NY Nadler, Jerrold (D)            1-202-225-5635   1-202-225-6923
             424 Cannon
Met with lobbying constituent in April '94; no position taken yet

     25 CA McKeon, Howard P. (R)          1-202-225-1956   1-202-226-0683
             307 Cannon
Responded to a constituent with a "non-position", May '94
Had a favorable meeting with a constituent and a VTW volunteer
in May '94.

-------------------------------------------------------------------------------
LIST OF LEGISLATORS OPPOSING CRYPTOGRAPHY EXPORT LEGISLATION
[Feel free to use the sample communique at the end of the FAQ when calling
 or writing a legislator.]

   Dist ST Name, Address, and Party       Phone            Fax
   ==== == ========================       ==============   ==============
      5 AL Cramer Jr, Robert E. (D)       1-202-225-4801   1-202-225-4392
             1318 LHOB

        FAILED Cryptography exports:
                Voted to kill Rep. Cantwell's export provisions in the
                House Intelligence Committee on 6/15/94.

      8 CA Pelosi, Nancy (D)              1-202-225-4965   1-202-225-8259
             240 Cannon

        FAILED Cryptography exports:
                Voted to kill Rep. Cantwell's export provisions in the
                House Intelligence Committee on 6/15/94.

     32 CA Dixon, Julian C. (D)           1-202-225-7084   1-202-225-4091
             2400 RHOB

        FAILED Cryptography exports:
                Voted to kill Rep. Cantwell's export provisions in the
                House Intelligence Committee on 6/15/94.

     40 CA Lewis, Jerry (R)               1-202-225-5861   1-202-225-6498
             2312 RHOB

        FAILED Cryptography exports:
                Voted to kill Rep. Cantwell's export provisions in the
                House Intelligence Committee on 6/15/94.

     46 CA Dornan, Robert K. (R)          1-202-225-2965   1-202-225-3694
             2402 RHOB

        FAILED Cryptography exports:
                Voted to kill Rep. Cantwell's export provisions in the
                House Intelligence Committee on 6/15/94.

      2 CO Skaggs, David E. (D)           1-202-225-2161   1-202-225-9127
             1124 LHOB

        FAILED Cryptography exports:
                Voted to kill Rep. Cantwell's export provisions in the
                House Intelligence Committee on 6/15/94.

     10 FL Young, C. W. (R)               1-202-225-5961   1-202-225-9764
             2407 RHOB

        FAILED Cryptography exports:
                Voted to kill Rep. Cantwell's export provisions in the
                House Intelligence Committee on 6/15/94.

      4 KS Glickman, Daniel (D)           1-202-225-6216   1-202-225-5398
             2371 RHOB

        FAILED Cryptography exports:
                Voted to kill Rep. Cantwell's export provisions in the
                House Intelligence Committee on 6/15/94.

      1 NE Bereuter, Douglas (R)          1-202-225-4806   1-202-226-1148
             2348 RHOB

        FAILED Cryptography exports:
                Voted to kill Rep. Cantwell's export provisions in the
                House Intelligence Committee on 6/15/94.

      9 NJ Torricelli, Robert (D)         1-202-224-5061   1-202-225-0843
             2159 RHOB

        FAILED Cryptography exports:
                Voted to kill Rep. Cantwell's export provisions in the
                House Intelligence Committee on 6/15/94.

      3 NM Richardson, William (D)        1-202-225-6190   1-202-225-1950
             2349 RHOB

        FAILED Cryptography exports:
                Voted to kill Rep. Cantwell's export provisions in the
                House Intelligence Committee on 6/15/94.

      1 NV Bilbray, James H. (D)          1-202-225-5965   1-202-225-8808
             2431 RHOB

        FAILED Cryptography exports:
                Voted to kill Rep. Cantwell's export provisions in the
                House Intelligence Committee on 6/15/94.

     17 PA Gekas, George W. (R)           1-202-225-4315   1-202-225-8440
             2410 RHOB

        FAILED Cryptography exports:
                Voted to kill Rep. Cantwell's export provisions in the
                House Intelligence Committee on 6/15/94.

      2 RI Reed, John F. (D)              1-202-225-2735   1-202-225-9580
             1510 LHOB

        FAILED Cryptography exports:
                Voted to kill Rep. Cantwell's export provisions in the
                House Intelligence Committee on 6/15/94.

     14 TX Laughlin, Gregory H. (D)       1-202-225-2831   1-202-225-1108
             236 Cannon

        FAILED Cryptography exports:
                Voted to kill Rep. Cantwell's export provisions in the
                House Intelligence Committee on 6/15/94.

     16 TX Coleman, Ronald D. (D)         1-202-225-4831   None
             440 Cannon

        FAILED Cryptography exports:
                Voted to kill Rep. Cantwell's export provisions in the
                House Intelligence Committee on 6/15/94.

     19 TX Combest, Larry (R)             1-202-225-4005   1-202-225-9615
             1511 LHOB

        FAILED Cryptography exports:
                Voted to kill Rep. Cantwell's export provisions in the
                House Intelligence Committee on 6/15/94.

      1 UT Hansen, James V. (R)           1-202-225-0453   1-202-225-5857
             2466 RHOB

        FAILED Cryptography exports:
                Voted to kill Rep. Cantwell's export provisions in the
                House Intelligence Committee on 6/15/94.

      6 WA Dicks, Norman D. (D)           1-202-225-5916   1-202-226-1176
             2467 RHOB

        FAILED Cryptography exports:
                Voted to kill Rep. Cantwell's export provisions in the
                House Intelligence Committee on 6/15/94.

 --------------------------------------------------------------
What is the Cantwell bill?

The Cantwell bill would permit companies to export products with
encryption technology in them.  US companies are currently
not permitted to export products (hardware or software) with this
technology in them.


What is encryption technology?

Encryption technology, or cryptography, is the art of scrambling
a conversation so that only the people communicating can decode
it.  Other people (such as eavesdroppers) cannot learn about
the conversation.


Where is cryptography being used?

Cryptography is used to encrypt electronic mail to protect its confidentiality
in transit.  It's used by bank automatic teller machines to protect
sensitive data (such as your account number, your Personal Identification
Number, and your bank balance).  It can be implemented into software
(such as electronic mail programs and word processors) as well as hardware
(such as telephones and "walkie-talkies") to ensure your privacy.


Why is there a restriction on exporting products with technology
in them?

For many years the United States was a leading researcher in
cryptography.  High quality cryptographic technology was available only
within the United States.  The US government thought that if they did
not let this technology be exported, foreign individuals would not be able
to obtain it and use it against us (by keeping US intelligence agencies
from eavesdropping on their communications)

Since then, cryptography research has been published in international
journals.  Companies have been created throughout the world who
export cryptographic technology from countries that do not have
these restrictions.  You can now buy the same, high-quality cryptographic
technology from many international firms.  Although the marketplace
has changed, the regulations have not.


Why should the regulations be changed?

US companies compete in a global marketplace.  Because of the export
regulations, they often compete alongside products with superior
cryptographic capabilities built into them.

The result is that US companies build their products with
an inferior encryption technology.  The result of this is that
you, as an American consumer, have great difficulty obtaining
products with strong encryption in them.

Because US products cannot compete against products with better
privacy features, and because the laws are outdated, the regulations
should be changed.  The Cantwell bill fixes these regulations to more
accurately resemble the current situation of the world marketplace.


How can I help encourage more privacy-enhanced products and
pass the Cantwell bill?

Call or write your representative and ask them to support or cosponsor
Rep. Cantwell's export provisions (formerly HR 3627) in the General
Export Administration Act, HR 3937.  You can base your letter on the
sample communication below.


SAMPLE LETTER OR PHONE CALL

The Honorable ____________
address
Washington DC, 20515

Dear Congressman or Congresswoman,

As a citizen concerned for my privacy, as well as a supporter of
American business, I urge you to cosponsor the Rep. Cantwell's
cryptographic export provisions (formerly HR 3627) in the General
Export Administration Act, HR 3937.

The bill would allow US companies to produce and export products with
cryptographic privacy-enhancing technology in them.  These products
are already available from firms throughout the world.  US companies
lose nearly $100 million per year in exports to them.

By encouraging this industry, ordinary citizens like you and me would
be able to purchase products with better privacy features.

Please support or co-sponsor HR 3937.

Sincerely,

                 ___________________________________

------------------------------

Date: Fri, 24 Jun 94 23:26:47 MDT
From: adunkin@NYX.CS.DU.EDU(Alan Dunkin)
Subject: File 4--Terisa_Systems.html

       RSA AND EIT JOINT VENTURE WILL MAKE INTERNET TRANSACTIONS SECURE

   PRESS CONTACTS:

Kurt Stammberger                                   Nancy Teater
RSA Data Security Inc.                  Hamilton Communications
Phone: (415) 595-8782                     Phone: (415) 321-0252
Internet: kurt@rsa.com               Internet: nrt@hamilton.com

FOR IMMEDIATE RELEASE

   PALO ALTO, Calif., June 13, 1994 -- RSA Data Security Inc. (RSA) and
   Enterprise Integration Technologies Corp. (EIT) today announced the
   formation of Terisa Systems, a joint venture that will market, license
   and support technologies that make secure Internet transactions
   possible. The new company will provide toolkits and support to
   developers of Internet applications for the World Wide Web (WWW) and
   NCSA Mosaic.

   RSA is the world leader in commercial cryptography and principal
   source of public key cryptosystems; EIT is a leading developer of
   software supporting commercial use of the Internet. Terisa Systems
   will combine the strengths of both companies to provide developers of
   Internet applications with a complete, consistent, and well-supported
   solution to their security needs.

   Initial toolkits from Terisa Systems will support the development of
   secure WWW clients and servers. The World Wide Web is a popular
   Internet application architecture that enables easy access to
   multimedia information distributed across the thousands of computers
   that comprise the Internet. However, use of the WWW in commerce
   requires features such as authentication, authorization, encryption
   and payment that are currently not well supported.

   Terisa Systems will provide an integrated solution to all of these
   needs based on RSA's public key cryptography and EIT's Secure-HTTP
   (HyperText Transfer Protocol), an enhanced version of the World Wide
   Web's internal communications language. Secure-HTTP ensures the
   authenticity of transactions and the confidentiality of information
   exchanged via HTTP. With a Secure-HTTP enabled application, a user can
   affix digital signatures that cannot be repudiated, permitting digital
   contracts that are legally binding and auditable. In addition,
   sensitive information such as credit card numbers and bid amounts can
   be encrypted and securely exchanged.

   Secure-HTTP can incorporate a variety of cryptographic standards and
   support interoperation between programs using different cryptographic
   algorithms. This is particularly useful for interaction between
   domestic and foreign users, where foreign users may not have access to
   the same algorithms as domestic users.

   Allan M. Schiffman, chief technical officer of EIT, said, "We've had
   tremendous interest on the part of developers in Secure-HTTP, but
   haven't been able to address their needs for a fully integrated
   package. Terisa Systems will provide 'one-stop shopping' for
   developers and give them the technology and support they need to get
   their applications to the market quickly."

   According to John Young, chairman of Smart Valley Inc., "The Internet
   has been evolving quickly as a medium where businesses can interact,
   but it is weak in key areas, such as security, which is critically
   important to business. Terisa Systems is taking a significant step
   forward in enabling electronic commerce by providing a standard
   security implementation for software developers in this market."

RSA Technology

   Terisa Systems' Secure-HTTP toolkits will use RSA public key
   cryptography technology to permit spontaneous, secure communications
   between unfamiliar correspondents over non-secure, open, public
   networks. RSA's technology provides privacy through encryption and
   authentication through digital signatures. Terisa Systems will be the
   one source from which WWW application developers can obtain RSA
   security technology, complete with Secure-HTTP integration and
   support.

   Public key cryptography is a security technique that uses a matched
   pair of encryption keys. Data encrypted with an RSA public key can
   only be decrypted with the corresponding RSA secret key, and
   vice-versa. In contrast, traditional shared-key cryptography requires
   correspondents to agree on a secret encryption key before they can
   communicate. Public key cryptography avoids the need for prior
   agreement on keys, thus assuring security between unfamiliar
   correspondents.

   James Bidzos, president of RSA, said, "Rapidly growing interest in
   business use of the Internet is producing a lot of interest in our
   security technologies. Developers, however, have been looking for a
   consistent, interoperable, and quick way to incorporate these
   technologies. Terisa Systems will meet these needs by delivering RSA
   cryptography wrapped in a high-value Web security system."

NCSA Mosaic

   NCSA Mosaic, one of the most popular World Wide Web browsers, was
   developed by the National Center for Supercomputing Applications
   (NCSA) at the University of Illinois. Mosaic is a multi-platform
   program with a point-and-click user interface for accessing the
   Internet and is primarily known for its ability to view multimedia
   World Wide Web information. NCSA also distributes NCSA HTTPD, a WWW
   server software package that makes information available to Mosaic and
   other WWW browsers. The first toolkits from Terisa Systems will
   include support for implementation of Secure-HTTP in NCSA Mosaic and
   NCSA HTTPD.

   In April, EIT, RSA, and NCSA announced an agreement to jointly develop
   and distribute secure versions of NCSA Mosaic and NCSA HTTPD based on
   RSA's public key cryptography and EIT's Secure-HTTP software. The
   enhancements are to be made available to NCSA for widespread public
   distribution for non-commercial use; Terisa Systems will now assume
   the responsibility of providing these versions. Terisa Systems'
   commercial line of toolkits and support systems will further enhance
   the secure Mosaic and HTTPD implementations with additional
   performance, functions and support options.

   According to Joseph Hardin, director of the group that developed NCSA
   Mosaic, "Mosaic's growth in the marketplace has been explosive, and
   has positioned it as the application of choice for users of the World
   Wide Web. With Secure-HTTP, Mosaic can become a framework for
   companies to engage easily in routine commerce on the Internet. By
   providing a standard source for toolkits and support, Terisa Systems
   will address the need of developers to implement Secure-HTTP
   applications quickly so they can compete in the World Wide Web
   marketplace."

Products and Services

   Terisa Systems will deliver a full line of toolkits and services.



   SecureWeb Viewer Developer's Toolkit
          Intended for developers of World Wide Web clients, this toolkit
          is used to create viewers and other applications that can
          communicate with Secure-HTTP enhanced WWW servers. In addition,
          the toolkit will include a facility for managing multiple
          certificates and keys, enabling, for example, the automatic
          selection of an appropriate key through negotiation with the
          server. User interface components will provide
          easy-to-understand control over secure communications, using
          icons to make clear the status of confidential or digitally
          signed documents and other information.

   SecureWeb Server Developer's Toolkit
          Intended for developers of World Wide Web servers, this toolkit
          facilitates the creation of WWW servers that communicate with
          Secure-HTTP enhanced viewers. The toolkit addresses the more
          demanding server aspects of key and certificate administration.
          It includes tools for storing and managing multiple keys and
          certificates, associating appropriate keys with requests for
          particular documents, and managing the revocation of
          certificates and keys. It also will provide a stronger and more
          manageable document access control system.

   Certificates
          Certificates are central to the use of public keys, for they
          guarantee public key authenticity. While Secure-HTTP works with
          hierarchical public key certificates issued by major
          institutions, in the future, Terisa Systems plans to provide
          toolkits that allow organizations to issue their own
          certificates. These certificates, called "lightweight" because
          they may not be supported by rigorous user validation, enable
          businesses to manage the certification process and issue their
          own certificates.

   Availability
          Initial implementations of Secure-HTTP and Secure-HTTPD will be
          provided to NCSA in September, 1994 for subsequent
          non-commercial distribution. Fully-supported Terisa Systems
          commercial security products will be available in the fourth
          quarter of 1994.

   In addition to toolkits, Terisa Systems will provide full support
   services, including technical support, tutorials, training, an on-line
   information service and custom consulting.

   RSA Data Security Inc., Redwood City, Calif., invented the leading
   public key cryptography system and performs basic research and
   development in cryptography. RSA markets software that facilitates the
   integration of their technology into applications.

   Enterprise Integration Technologies Corp. (EIT), of Palo Alto, Calif.,
   is an R&D and consulting organization, developing software and
   services that help companies do business on the Internet. EIT is also
   the project manager for CommerceNet, the first large-scale market
   trial of electronic commerce on the Internet.

   Additional information on Terisa Systems can be obtained by sending
   e-mail to terisa@eit.com. Telephone (415) 617-1836. Additional
   information on Secure-HTTP is available by sending e-mail to
   shttp-info@eit.com; additional RSA Data Security information is
   available by sending e-mail to info@rsa.com.


     _________________________________________________________________

    Copyright (C) 1994 RSA Data Security, Inc. All rights reserved.

   (Go to Overview of RSA Press Releases)
   (Go to Recent Press Releases)
   (Go to RSA's Home Page)

        Last modified: Sun, 12 Jun 1994 19:26:02 -0700, <webmaster@rsa.com>

------------------------------

End of Computer Underground Digest #6.58
************************************