1997-02-27 - No Subject

Header Data

From: Voters Telecommunications Watch <shabbir@vtw.org>
To: cypherpunks@toad.com
Message Hash: c9ab10f1db09d7b96f50ac16ee4919e8bd6afc0eb7afd11b6b0df11a991c889d
Message ID: <199702272123.QAA28997@panix3.panix.com>
Reply To: N/A
UTC Datetime: 1997-02-27 21:23:26 UTC
Raw Date: Thu, 27 Feb 1997 13:23:26 -0800 (PST)

Raw message

From: Voters Telecommunications Watch <shabbir@vtw.org>
Date: Thu, 27 Feb 1997 13:23:26 -0800 (PST)
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <199702272123.QAA28997@panix3.panix.com>
MIME-Version: 1.0
Content-Type: text/plain


========================================================================

                     PRO-CODE BILL ANNOUNCED TODAY
    BILL WOULD LIBERATE ENCRYPTION FROM ANTIQUATED COLD-WAR REGULATIONS

                          February 27, 1997

      Please widely redistribute this document with this banner
                    intact until March 15, 1997
		
            From the Center for Democracy and Technology (CDT),
              the Electronic Frontier Foundation (EFF), and
                 the Voters Telecommunication Watch (VTW)

________________________________________________________________________
CONTENTS
        The Latest News
        What You Can Do Now
        Background On Pro-CODE
        What's At Stake
        For More Information / Supporting Organizations

________________________________________________________________________
THE LATEST NEWS

Today, a bi-partisan group of seventeen United States Senators, led by
Conrad Burns (R-MT) and Patrick Leahy (D-VT), introduced the "Promotion
of Commerce Online in the Digital Era (Pro-CODE) Act", a bill designed
to promote privacy and security on the Internet by relaxing government
controls on encryption technologies.

Encryption technologies are the locks and keys of the Information age
-- enabling individuals and businesses to protect sensitive information
as it is transmitted over the Internet. Pro-CODE aims to enable this by
removing some of the regulations that currently prevent Americans from
using this technology.

A short summary of the bill and background on the encryption policy
debate are attached below, along with information on what you can do to
help ensure that Congress takes action on this important issue.

________________________________________________________________________
WHAT YOU CAN DO NOW

1. CALL THE Pro-CODE SPONSORS AND THANK THEM FOR THEIR EFFORTS

   Members of Congress tend to hear from their constituents only when
   they do something constituents don't like.  Today however, several
   Senators have taken a stand on an issue of critical importance to
   Internet users.  It's crucial that we encourage them with phone
   calls of support.

   If you live in any of the states listed below, please take a moment
   to give these Senators a call.

   Allard (R-CO)     Ashcroft (R-MO)     Boxer (D-CA)     Brownback (R-KS)
   Burns (R-MT)      Craig (R-ID)        Dominici (R-NM)  Dorgan (D-ND)
   Faircloth (R-NC)  Grahms (R-MN)       Hutchison (R-TX) Inhoffe (R-OK)
   Kempthorne (R-ID) Leahy (D-VT)        Lott (R-MS)      Murray (D-WA)
   Nickles (R-OK)    Thomas (R-WY)       Wyden (D-OR)

   Please take a moment to give these Senators a call.

	<Dial 1-202-224-3121>
	<ring ring!>
        You:Senator Mojo's office please!
        Sen:Hello, Senator Mojo's office!

        You:

SAY     I heard that the Senator introduced Pro-CODE to add more privacy on
THIS->  the Internet.  Please thank the Senator for me and I support efforts
        to fix antiquated encryption export laws.  I live in <your state>.
	
        Sen:Ok, thanks!<click>

2. ADOPT YOUR LEGISLATOR

   If you were one of the thousands of people that have adopted their
   legislator at http://www.crypto.com/, you would have received a
   personalized letter telling you that your legislator announced his
   or her sponsorship of Pro-CODE today.

   These personalized letters contain all the phone numbers you need,
   and we'll send them to you any time your legislator takes any action
   that would have a significant impact on the net.

   The Adopt Your Legislator campaign is the most effective method of
   mobilizing grass-roots support available today.  Since late last
   year, VTW and CDT have been building a network of thousands of
   Internet users who are active and engaged in the fight for privacy
   and security on the Internet.

   By focusing our efforts on the constituents of specific legislators
   as well as on the net as a whole, we can ensure that members of
   Congress know that they have support within their district as well
   as throughout the Internet community.

   You can adopt your legislator at http://www.crypto.com/adopt/

________________________________________________________________________
BACKGROUND ON THE PRO-CODE BILL

The Promotion of Commerce Online in the Digital Era (Pro-CODE) Act is
similar to a bill introduced by Senators Burns (R-MT) and Leahy (D-VT)
last year (then S.1726).  Pro-CODE enjoyed broad bi-partisan support in
the Senate and was the subject of 3 hearings, including 2 which were
cybercast live on the Internet.

This year's Pro-CODE bill (no bill number yet available) is designed to
encourage the widespread availability of strong, easy-to-use encryption
technologies to protect privacy and security on the Internet.
Specifically, Pro-CODE would:

1. Encourage the widespread availability of strong privacy and security
   products by relaxing export controls on encryption technologies that
   are already available on the mass market or in the public domain.
   This would include popular programs like Pretty Good Privacy (PGP)
   and World Wide Web browsers like those made by Netscape and Microsoft.

   Current US encryption policy restricts export of encryption products
   with key-lengths of more than 40 bits.  A recent study by renowned
   cryptographers including Whit Diffie (one of the fathers of modern
   cryptography), Matt Blaze, and others concluded that 40 bits is
   "woefully inadequate" to protect personal and business communications.
   Over the last eighteen months, several examples of the weakness of
   40-bit encryption have been demonstrated by college students with
   spare personal computers.

2. Prohibit the federal government from imposing mandatory key-escrow or
   key-recovery encryption policies on the domestic market and limit the
   authority of the Secretary of Commerce to set standards for
   encryption products.

3. Require the Secretary of Commerce to allow the unrestricted export of
   other encryption technologies if products of similar strength are
   generally available outside the United States.

For more information on the Pro-CODE bill, background information on
efforts to pass encryption policy reform legislation last year, and
other materials please visit:

For more information, see the Encryption Policy Resource Page at
http://www.crypto.com/

________________________________________________________________________
WHAT'S AT STAKE

Encryption technologies are the locks and keys of the Information age
-- enabling individuals and businesses to protect sensitive information
as it is transmitted over the Internet. As more and more individuals
and businesses come online, the need for strong, reliable, easy-to-use
encryption technologies has become a critical issue to the health and
viability of the Net.

Current US encryption policy, which limits the strength of encryption
products US companies can sell abroad, also limits the availability of
strong, easy-to-use encryption technologies in the United States. US
hardware and software manufacturers who wish to sell their products on
the global market must either conform to US encryption export limits or
produce two separate versions of the same product, a costly and
complicated alternative.

The export controls, which the NSA and FBI argue help to keep strong
encryption out of the hands of foreign adversaries, are having the
opposite effect. Strong encryption is available abroad, but because of
the export limits and the confusion created by nearly four years of
debate over US encryption policy, strong, easy-to-use privacy and
security technologies are not widely available off the shelf or "on the
net" here in the US. Because of this policy problem, US companies are
now at a competitive disadvantage in the global marketplace.

All of us care about our national security, and no one wants to make it
any easier for criminals and terrorists to commit criminal acts. But we
must also recognize encryption technologies can also aid law
enforcement and protect national security by limiting the threat of
industrial espionage and foreign spying.

What's at stake in this debate is nothing less than the future of
privacy and the fate of the Internet as a secure and trusted medium for
commerce, education, and political discourse.

________________________________________________________________________
FOR MORE INFORMATION / SUPPORTING ORGANIZATIONS

This alert was brought to you by the Center for Democracy and
Technology, the Electronic Frontier Foundation, and the Voters
Telecommunications Watch.

http://www.cdt.org           http://www.eff.org       http://www.vtw.org

There are many excellent resources online to get up to speed on the
crypto issue including the following WWW sites:

           http://www.crypto.com       http://www.privacy.org

Please visit them often.    Press inquiries should be directed to:

 Jonah Seiger of CDT at jseiger@cdt.org or +1.202.637.9800
 Stanton McCandlish of EFF at mech@eff.org or  +1.415.436.9333
 Shabbir J. Safdar of VTW at shabbir@vtw.org or +1.917.978.8430 (beeper).

________________________________________________________________________
End alert
========================================================================





Thread