________________          _______________        _______________
  /_______________/\        /_______________\      /\______________\
  \\\\\\\\\\\\\\\\\/        |||||||||||||||||     / ////////////////
   \\\\\________/\          |||||________\       / /////______\
    \\\\\\\\\\\\\/____      ||||||||||||||      / /////////////
     \\\\\___________/\     |||||              / ////
      \\\\\\\\\\\\\\\\/     |||||              \////   e  c  t  o  r
_________________________________________________________________________
EFFector        Vol. 10, No. 05       June 18, 1997        [email protected]
A Publication of the Electronic Frontier Foundation        ISSN 1062-9424

IN THIS ISSUE:

ALERT: Senate vote on mandatory key escrow as early as Thu June 19!
 Intro - Bernstein Case News
 ALERT - Senate Committee Set to Vote on Key Escrow
 What's Happening Now
 What YOU CAN DO NOW!
 Background On The Encryption Issue
 How to start or stop receiving crypto-news
 About This Alert
NICB Crime Database Raises Privacy Concerns & Congressional Hackles
 Congress Takes Action
 Background
 What YOU Can Do
Upcoming Events
Quote of the Day
What YOU Can Do
Administrivia

* See http://www.eff.org/hot.html for more information
  on current EFF activities and online activism alerts! *

----------------------------------------------------------------------


Subject:  ALERT: Senate vote on mandatory key escrow; Bernstein crypto case
---------------------------------------------------------------------------

* Intro - Bernstein Case News

June 18, San Francisco:  The final District-level arguments were heard in
Bernstein v. Dept. of State, an EFF-sponsored case challenging the US
encryption export restrictions as unconstitutional.  As in previous
rounds, the government had a very difficult time attempting to justify
the ITAR restrictions on encryption software, which treat PGP, word
processors that protect confidentiality, and any other tools that protect
privacy as if they are weapons of war.  We expect a favorable order
from Judge Marilyn Hall Patel, against the ITAR crypto restrictions, very
soon.

Practially on the eve of this landmark court battle, Congress introduced
yet another piece of encryption legislation, this one aimed at making the
legal case moot (or at least weaker) and at generating a mood of
Congressional compromise.  We urge all EFF members to respond to the alert
below and urge defeat of this new anti-crypto, anti-privacy legislation.


*************************************************************************

[begin crypto.com alert]

       SENATE COMMERCE COMMITTEE SET TO VOTE ON MANDATORY KEY ESCROW
           LEGISLATION AS EARLY AS THURSDAY JUNE 19TH!  CALL NOW!

    Date: June 17, 1997                            Expires July 1, 1997

        URL:http://www.crypto.com/            [email protected]
          Redistribution of crypto-news is allowed in its entirety.


Table of Contents

       ALERT - Senate Committee Set to Vote on Key Escrow
       What's Happening Now
       What YOU CAN DO NOW!
       Background On The Encryption Issue
       How to start or stop receiving crypto-news
       About This Alert


* ALERT - SENATE COMMITTEE SET TO VOTE ON BILL TO GUARANTEE GOVERNMENT
 ACCESS TO YOUR PRIVATE ONLINE COMMUNICATIONS

On Tuesday June 17, Senators John McCain (R-AZ) and Bob Kerrey (D-NE)
introduced legislation which would all but mandate that Americans provide
guaranteed government access to their private online communications and
stored files.

The bill, known as "The Secure Public Networks Act of 1997" (S.909)
represents a full scale assault on your right to protect the privacy and
confidentiality of your online communications. Please take a moment to read
the instructions below and, if your Senator is a member of the Commerce
Committee, please take a moment to call your Senator TODAY!

Though offered on Capitol Hill as a compromise, the McCain-Kerrey bill is
virtually identical to draft legislation proposed earlier this year by the
Clinton Administration while doing nothing to protect the privacy and
security of Internet users. The bill closely mirrors  draft legislation
proposed by the Clinton Administration earlier this Spring.

Specifically, the bill would:

* Compel Americans to Use Government-Approved Key Recovery Systems
* Make Key Recovery a Condition Of Participation in E-Commerce
* Allow Government Carte Blanche Access to Sensitive Encryption Keys
  Without a Court Order
* Create New Opportunities for Cybercrimes
* Codify a low 56-bit Key Length Limit on Encryption Exports
* Create Broad New Criminal Penalties for the Use of Encryption

The full text of the bill, along with a detailed analysis, is available
online at http://www.cdt.org/crypto/


* WHAT'S HAPPENING NOW

On Thursday June 19, the Senate Commerce Committee is scheduled to hold a
vote on S. 377, the Promotion of Commerce Online in the Digital Era
(Pro-CODE) Act - an Internet-friendly encryption reform bill sponsored by
Senators Burns (R-MT) and Leahy (D-VT).

Senator McCain, the Commerce Committee Chairman, is expected to try and
substitute his proposal for Pro-CODE - gutting the proposal and inserting
provisions which would all but mandate guaranteed government access to your
private communications.

Please take a few moments to help protect your privacy and security in the
Information Age by following the simple instructions below.

________________________________________________________________________
* WHAT YOU CAN DO NOW

  ** THE COMMITTEE IS EXPECTED TO VOTE AT 9:30 AM Eastern JUNE 19 **
        ** IT IS CRITICAL THAT YOU CALL YOUR SENATOR TODAY **

A list of Senate Commerce Committee members is printed below. If your
Senator is on the list, please call TODAY.

 NOTE - If your Senator is not on the list, please visit
        http://www.crypto.com/adopt and ADOPT YOUR LEGISLATOR. You will
        receive targeted alerts next time your Representatives or
        Senators are poised to vote on this and other critical Internet
        Related issues.

1. If your Senator's name is on the list below, pick up the phone and
  call them at 202-224-3121.  Ask for your Senator's office.

 Order: Frist, Abraham, Snowe, Stevens, Browe, Bryan.

 * = has publicly stated opposition to the McCain-Kerrey bill.
 + = has publicly stated support to the McCain-Kerrey bill.

  William Harrison Bill Frist, R-TN
  Spencer Abraham, R-MI                        ALL THESE SENATORS ARE
  Olympia Snowe, R-ME                       TELEPHONABLE AT 202-224-3121
  Ted Stevens, R-AK
  John B. Breaux, D-LA
  Richard H. Bryan, D-NV

  +John McCain, R-AZ, Chairman
  *Conrad R. Burns, R-MT
  Slade Gorton, R-WA
  *Trent Lott, R-MS
  Kay Bailey Hutchison, R-TX
  *John Ashcroft, R-MO
  *Sam Brownback, R-KS

  +Ernest F. Hollings, D-SC, Ranking minority member
  Daniel K. Inouye, D-HI
  Wendell H. Ford, D-KY
  +John D. Rockefeller, IV, D-WV
  +John F. Kerry, D-MA
  *Byron L. Dorgan, D-ND
  *Ron Wyden, D-OR

2. Ask for the staffer that handles the encryption issue

3. Urge your Senator to OPPOSE THE McCAIN-KERREY BILL (S. 909)
  at the Commerce Committee Markup on June 19:

SAY
THIS -> I am a constituent calling to urge the Senator to oppose the
       McCain-Kerrey "Secure Public Networks Act" at the Committee
       markup on June 19.

       The bill all but mandates key-recovery encryption and represents
       a grave threat to privacy and electronic commerce on the
       Internet.

       We need a solution to this issue that protects privacy and
       security on the Internet, and the solution being offered by
       Senators McCain and Kerrey isn't it. I hope you will take a
       strong stand on this important issue.

4. IMPORTANT! -- PLEASE LET US KNOW HOW IT WENT!

  Go to the feedback page for your member of Congress at
  http://www.crypto.com/feedback/ and let us know how it went. This
  will help us coordinate our strategy on the ground in DC.

5. Please forward this alert to your friends and colleagues
  who live in your congressional district (do not forward after
  June 25)

6. Finally, relax! You have done more to help fight for privacy and
  security on the Internet in 5 minutes than most people do in a year!
  We appreciate your support!

* BACKGROUND ON THE ENCRYPTION POLICY ISSUE

Complete background information, including:

* A down-to-earth explanation of why this debate is important to
  Internet users
* Analysis and background on the issue
* An analysis of the Risks of Key-Recovery by leading cryptographers
* Text of the Administration draft legislation
* Text of Congressional proposals to reform US encryption policy
* Audio transcripts and written testimony from recent Congressional
  Hearings on encryption policy reform
* And more!

are all available at http://www.crypto.com/


* WHAT'S AT STAKE

Encryption technologies are the locks and keys of the Information age,
enabling individuals and businesses to protect sensitive information
as it is transmitted over the Internet. As more and more individuals
and businesses come online, the need for strong, reliable, easy-to-use
encryption technologies has become a critical issue to the health and
viability of the Net.

Current US encryption policy, which limits the strength of encryption
products US companies can sell abroad, also limits the availability of
strong, easy-to-use encryption technologies in the United States. US
hardware and software manufacturers who wish to sell their products on
the global market must either conform to US encryption export limits or
produce two separate versions of the same product, a costly and
complicated alternative.

The export controls, which the NSA and FBI argue help to keep strong
encryption out of the hands of foreign adversaries, are having the
opposite effect. Strong encryption is available abroad, but because of
the export limits and the confusion created by nearly four years of
debate over US encryption policy, strong, easy-to-use privacy and
security technologies are not widely available off the shelf or "on the
net" here in the US.

A recently discovered flaw in the security of the new digital telephone
network exposed the worst aspects of the Administration's encryption
policy.  Because the designers needed to be able to export their
products, the system's security was "dumbed down".  Researchers
subsequently discovered that it is quite easy to break the security of the
system and intrude on what should be private conversations.

This incident underscores the larger policy problem: US companies are
at a competitive disadvantage in the global marketplace when competing
against companies that do not have such hindrances.  And now, for the first
time in history, the Clinton Administration and members of the US Senate
have proposed DOMESTIC RESTRICTIONS on the ability of Americans to protect
their privacy and security online.

All of us care about our national security, and no one wants to make it
any easier for criminals and terrorists to commit criminal acts. But we
must also recognize encryption technologies can aid law enforcement
and protect national security by limiting the threat of industrial
espionage and foreign spying, promote electronic commerce and protecting
privacy.

What's at stake in this debate is nothing less than the future of
privacy and the fate of the Internet as a secure and trusted medium for
commerce, education, and political discourse.

* HOW TO START OR STOP RECEIVING CRYPTO-NEWS

To subscribe to crypto-news, sign up from our WWW page (http://www.crypto.com)
or send mail to [email protected] with "subscribe crypto-news" in the
body of the message.  To unsubscribe, send a letter to [email protected]
with "unsubscribe crypto-news" in the body.

Requests to unsubscribe that are sent to [email protected] will be ignored.


* ABOUT THIS ALERT

This message was brought to you by the Center for Democracy and
Technology (http://www.cdt.org) and the Voters Telecommunications Watch
(http://www.vtw.org/), who have joined together to create the Adopt Your
Legislator Campaign - a unique and effective way of creating dialogue
between members of Congress and their Constituents on critical
Internet-related issues.

For more information on the Adopt Your Legislator Campaign, please visit
http://www.crypto.com/adopt/

end alert 06.17.97

------------------------------


Subject: NICB Crime Database Raises Privacy Concerns & Congressional Hackles
----------------------------------------------------------------------------

*  Congress Takes Action

  This year, bi-partisan legislation has been introduced by Rep. Ed
  Towns (D-NY) to preclude a commercial insurance "crime bureau" from
  establishing an "all-claims" database to which law enforcement officers
  have easy access for privacy-invasive "fishing expeditions" in which
  data on all insurance claimants is treated as if it belonged to crime
  suspects. This legislation is H.R.1029, the Insurance Claims Privacy
  Protection Act (ICPPA).

  Bill text:  ftp://ftp.loc.gov/pub/thomas/c105/h1029.ih.txt

  Following Rep. Towns's invitation, 20 co-sponsors have signed up to
  back the legislation, and a Senate version of the bill is expected to
  be introduced soon.

  Towns and ICPPA co-sponsors Rep. John Duncan (R-TN) and Rep. John Mica
  (R-FL) have asked selected state insurance commissioners/superintendants
  for input, in several letters, available from the WWW version of this
  article at:
  http://www.eff.org/Privacy/Medical/ICPPA/HTML/icppa./html

  EFF commends Rep. Towns and other other ICPPA co-sponsors for
  introducing such timely and well-considered legislation. Though EFF
  would prefer to see disclosure by data support organizations be
  permissible only in response to court orders, not subpoenas, we
  otherwise support this legislation as a much-needed loophole closure
  in American privacy law.

*  Background

  The National Insurance Crime Bureau (NICB) has started to build an
  "all-claims" database to hold all property and casualty insurance
  claims, without appropriate privacy protections.

  Originally, this NICB data base only held "suspicious" claims, to be
  examined closely for possible fraud. Because of this history, federal,
  state and local law enforcement officials have rapid, direct, and
  nearly unlimited access to the NICB database. This easy law
  enforcement access can lead to privacy-invasive "fishing expeditions"
  in the files of innocent policyholders, even where there is no
  suspicion of fraud or illegal activity.

  The federal Fair Credit Reporting Act (FCRA), Title 15 of the US Code
  (Chap. 41, Subchap. III) Sect. 1681, places strict limits on law
  enforcement access (in recently added Sect. 1681u), and requires
  procedures to be in place to permit persons to see their own files,
  and, if they are inaccurate, correct them.

  FCRA text: http://www.law.cornell.edu/uscode/15/1681.html
  Sect. 1681u: http://www.eff.org/pub/Privacy/Surveillance/15usc1681u.law

  The American Insurance Services Group (AISG), which operates an
  "all-claims" property and casualty insurance claims database, and the
  Medical Information Bureau (MIB), which operates a large database of
  health and medical insurance information, both follow the requirements
  of the FCRA.

  The NICB claims that it is not subject to the FCRA, and does not
  follow its requirements.

  The new legislation's sponsors note also that NICB does not follow the
  requirements of the Insurance Information and Privacy Protection Model
  Act (IIPPMA) advanced by the National Association of Insurance
  Commissioners (NAIC), and adopted in only 15 states.

  A close examination of the IIPPMA, which was drafted ca. 1980, shows
  that, despite its name, its privacy protections are woefully
  inadequate. [Text of the IIPPMA not available online as of this
  writing.]

    * For instance, the requirements for law enforcement access to files
      are not very strict, and the NICB's interpretation of the IIPPMA
      permits too easy access to files by law enforcement authorities.

    * Further, the IIPPMA permits consumer access to "personal
      information that is not privileged"; however, "privileged
      information" is separately defined as "information supplied in
      relation to claims". Since most or all of the information
      collected by the NICB for their "all-claims" data base is in
      relation to claims, and therefore could be considered
      "privileged", the NICB could block consumer's access to their own
      files.

  NAIC has responded to queries from Rep. Towns regarding such matters,
  but not substantively.

  NAIC response:
  http://www.eff.org/Privacy/Medical/ICPPA/musser_towns_19970414.letter

  Finally, it is offensive to innocent policy holders to have routine
  claims made in good faith (i.e. in relation to losses incurred under
  the insurance policy for which they have made premium payments) to be
  placed in a "Crime Bureau" database.

*  What YOU Can Do

  If you are troubled by the NICB's "all-claims" database, please write
  to or email one or more of the following Senators and Representatives
  stating your concerns and supporting the Towns legislation:
  US Senators (Mailing Address: [Name], U.S. Senate, Washington, D.C.
  10510)
    * Senator Orrin Hatch (R-UT), Chairman, Senate Judiciary Cmte.
      Email: [email protected]
    * Senator Patrick J. Leahy (D-VT), Ranking Member, Senate Judiciary
      Cmte.
      Email: [email protected]
    * Senator John McCain (R-AZ), Chairman, Senate Commerce Cmte.
      Email: [email protected]
    * Senator Ernest F. Hollings (D-SC),Ranking Member, Senate Commerce
      Cmte.
      Email: [email protected]
    * Senator Dianne Feinstein (D-CA),Member, Senate Judiciary Cmte.
      Email: [email protected]
    * Senator Barbara Boxer (D-CA), Member, Appropriations Cmte.
      Email: [email protected]


  US Representatives (Mailing Address: [Name], U.S. House of
  Representatives, Washington, D.C. 10515)
    * Representative Henry Hyde (R-IL) Chairman, House Judiciary
      Committee
      Email: (not yet on system; use WriteRep)
    * Representative John Conyers, Jr. (D-MI) Ranking Member, House
      Judiciary Cmte.
      Email: [email protected]
    * Representative Thomas Bliley, Jr. (R-VA) Chairman, House Commerce
      Cmte.
      Email: (not yet on system; use WriteRep)
    * Representative John Dingell (D- MI) Ranking Member, House Commerce
      Cmte.
      Email: (not yet on system; use WriteRep)
    * Representative Ed Towns (D-NY), Member, Commerce Cmte. (Sponsor of
      H.R. 1029)
      Email: (not yet on system; use WriteRep)

    WriteRep System: http://www.house.gov/writerep/



 For an fully-linked HTML version of this article, see:
 http://www.eff.org/pub/Privacy/Medical/ICPPA/HTML/icppa.html

------------------------------


Subject: Upcoming Events
------------------------

This schedule lists EFF events, and those we feel might be of interest to
our members.  EFF events (those sponsored by us or featuring an EFF speaker)
are marked with a "*" instead of a "-" after the date.  Simlarly, government
events (such as deadlines for comments on reports or testimony submission,
or conferences at which government representatives are speaking) are marked
with "!" in place of the "-" ("!?" means a govt. speaker may appear, but
we don't know for certain yet.)  And likewise, "+" in place of "-"
indicates a non-USA event.  If it's a foreign EFF event with govt. people,
it'll be "*!+" instead of "-".  You get the idea. To let us know about an
event, please send details to Dennis Derryberry, [email protected], with a
subject line containing "CALENDAR:" followed by the name of the event.

The latest version of the full EFF calendar is available from:

ftp: ftp.eff.org, /pub/EFF/calendar.eff
gopher: gopher.eff.org, 1/EFF, calendar.eff
http://www.eff.org/pub/EFF/calendar.eff

See also our new Now-Up-to-Date HTML calendar at:
http://events.eff.org

1997

June 19-
    20 - WASHINGTON, DC - CyberPayments '97
         Conference will investigate issues of online commerce including
         electronic cash and checks, credit cards, encryption systems
         and security products; Sheraton Washington Hotel, Washington, DC
         For more information contact:
         email: [email protected]
         tel: +1 216 464 2618 x228
              +1 800 529 7375

June 20-
    21 + GLASGOW, SCOTLAND - International Symposium on Technology and
         Society 1997 (ISTAS'97): Technology and Society at a Time of
         Sweeping Change; University of Strathclyde in Glasgow, Scotland
         ISTAS '97 aims to tackle questions of how advancements in
         technology are affecting the social and natural landscape;
         ISTAS '97 Secretariat
         Conference Services Department
         The Institution of Electrical Engineers
         Savoy Place
         London WC2R 0BL
         UK
         Tel: + 44(0)171 344 5469/8425
         Fax: +44 (0)171 240 8830
         E-mail: [email protected]
         URL: http://www.iee.org.uk/LSboard/Conf/call_for/istas97.htm

June 22-
    25 + TORONTO - GLOBAL KNOWLEDGE '97; given the vital role of
         knowledge in economic and social development, and the
         opportunities and challenges posed by new information
         and communication technologies, how can developing countries,
         and particularly the world's poor, access and harness knowledge
         for development, so as to promote empowerment, enable life-long
         learning, and reduce poverty?
         URL: http://www.bvx.ca/ict/gk97.htm
         Conference Secretariat
         The World Bank Economic Development Institute
         1818 H Street, NW, M7-075
         Washington, DC 20433 USA
         Tel: 202-473-6442
         Fax: 202-676-0858
         E-mail: [email protected]
         Alain Brousseau
         Phone: (819) 997-6849
         Fax: (819) 953-6356
         E-mail: [email protected]

July 13-
    17 - ACUTA 26th Annual Conference; Atlanta, Georgia.
         Contact: +1 606 278 3338 (voice)

Aug. 24 + NAGOYA, JAPAN - IJCAI-97 Workshop on AI in Digital Libraries:
         Moving From Chaos to (More) Order; Nagoya Congress Center,
         Nagoya, Japan;
         URL: http://www.dlib.com/people/innes/aiindl/cfp.html

Sep. 7 -
    11 + LANCASTER, UK - ECSCW'97, the Fifth European Conference on
         Computer Supported Cooperative Work; deadline for paper
         submissions is January 13, 1997; papers must contain an abstract
         of not more than 100 words and not exceed 16 pages in length; full
         formatting instructions are available from
         http://www.comp.lancs.ac.uk/computing/research/cseg/ecscw97/papers/
         queries: [email protected]
         for more information:
         snail mail: ECSCW'97 Conference Office
                     Computing Department
                     Lancaster University
                     Lancaster  LA1 4YR  UK
         URL: http://www.comp.lancs.ac.uk/computing/research/cseg/ecscw97/
         email: [email protected]

Sep. 12-
    14   SAN DIEGO - Association of Online Professionals Annual
         Conference; sysop trade association's yearly gathering to
         discuss issues of relevance to the industry
         URL: http://www.aop.org/confrnc.html

Sep. 25-
    27 + PRAGUE, CZECHOSLOVAKIA - RUFIS'97: Role of Universities in the
         Future Information Society; Czech Technical University, Prague,
         Czechoslovakia; to obtain a registration form, please, send an
         empty e-mail message to:
         [email protected]
         Karel Kveton
         UNESCO International Centre for Scientific Computing
         Czech Technical University - Prague
         Computing Centre
         Zikova 4, 166 35 Prague 6
         Phone: + 42 2 2431 0369, fax: + 42 2 311 7529
         e-mail: [email protected]
         URL: http://www.cvut.cz/RUFIS97

Oct. 7-
    10 + BEIJING, CHINA - '97 China Database: Electronic Publications
         & Software Exhibition; Beijing International Convention Center
         Contact: Mr. Cheng Bin and Ms. Hu Yongning
         Beijing Evertrust Exposition Co. Ltd.
         15 Fuxing Road, Beijing, China
         Post code: 100038
         Tel: +86-10-68514007
         Fax: +86-10-68537092
         URL: http: // www.sti.ac. cn/Exhibition/ invi.htm
         E-mail: [email protected]

Oct. 28-
    31 - EDUCOM '97; Minneapolis-St. Paul, Minnesota.
         Contact: +1 202 872 4200 (voice)
         Email: [email protected]

Dec. 1  - Computer Security Day (started by Washington DC chapter of the
         Assoc. for Computing Machinery, to "draw attention to computer
         security during the holdiay season when it might otherwise become
         lax."

1998
----

July 12-
    16 - ACUTA 27th Annual Conference; San Diego, California.
         Contact: +1 606 278 3338 (voice)

Oct. 13-
    16 - EDUCOM '98; Orlando, Florida.
         Contact: +1 202 872 4200 (voice)
         Email: [email protected]

Dec. 1  - Computer Security Day (started by Washington DC chapter of the
         Assoc. for Computing Machinery, to "draw attention to computer
         security during the holdiay season when it might otherwise become
         lax."

------------------------------


Subject: Quote of the Day
-------------------------

"There is nothing more frightful than ignorance in action."
 - Goethe

Find yourself wondering if your privacy and freedom of speech are safe
when bills to censor the Internet are swimming about in a sea of of
surveillance legislation and anti-terrorism hysteria?  Worried that in
the rush to make us secure from ourselves that our government
representatives may deprive us of our essential civil liberties?
Concerned that legislative efforts nominally to "protect children" will
actually censor all communications down to only content suitable for
the playground?  Alarmed by commercial and religious organizations abusing
the judicial and legislative processes to stifle satire, dissent and
criticism?

Join EFF!
http://www.eff.org/join (or send any message to [email protected]).

You *know* privacy, freedom of speech and ability to make your voice heard
in government are important. You have probably participated in our online
campaigns and forums.  Have you become a member of EFF yet?  The best way
to protect your online rights is to be fully informed and to make your
opinions heard.  EFF members are informed and are making a difference.
Join EFF today!

Even if you don't live in the U.S., the anti-Internet hysteria will soon
be visiting a legislative body near you.  If it hasn't already.

------------------------------


Subject: What YOU Can Do
------------------------

* Keep an eye on your local legislature/parliament!
All kinds of wacky censorious legislation is turning up at the US state
and non-US national levels.  Don't let it sneak by you - or by the
online activism community. Without locals on the look out, it's very
difficult for the Net civil liberties community to keep track of what's
happening locally as well as globally.


* Inform your corporate government affairs person or staff counsel
if you have one. Keep them up to speed on developments you learn of,
and let your company's management know if you spot an issue that warrants
your company's involvement.


* Find out who your legislators are

Writing letters to, faxing, and phoning your representatives in Congress
is one very important strategy of activism, and an essential way of
making sure YOUR voice is heard on vital issues.

If you are having difficulty determining who your US legislators are,
try contacting your local League of Women Voters, who maintain a great
deal of legislator information, or consult the free ZIPPER service
that matches ZIP Codes to Congressional districts with about 85%
accuracy at:
http://www.stardot.com/~lukeseem/zip.html
This can be double-checked with the House's own lookup service, at:
http://www.house.gov/writerep/

Computer Currents Interactive has provided Congress contact info, sorted
by who voted for and against the Communications Decency Act:
http://www.currents.net/congress.html (NB: Some of these folks have,
fortunately, been voted out of office.)

We are not presently aware of servers that provide contact info for US
state-level legislators, or non-US lawmakers.

------------------------------


Administrivia
=============

EFFector is published by:

The Electronic Frontier Foundation
1550 Bryant St., Suite 725
San Francisco CA 94103 USA
+1 415 436 9333 (voice)
+1 415 436 9993 (fax)
Membership & donations: [email protected]
Legal services: [email protected]
General EFF, legal, policy or online resources queries: [email protected]

Editor: Stanton McCandlish, Program Director/Webmaster ([email protected])

This newsletter is printed on 100% recycled electrons.

Reproduction of this publication in electronic media is encouraged.  Signed
articles do not necessarily represent the views of EFF.  To reproduce
signed articles individually, please contact the authors for their express
permission. Press releases and EFF announcements may be reproduced individ-
ually at will.

To subscribe to EFFector via email, send message body of "subscribe
effector-online" (without the "quotes") to [email protected], which will add
you to a subscription list for EFFector.

Back issues are available at:
ftp.eff.org, /pub/EFF/Newsletters/EFFector/
http://www.eff.org/pub/EFF/Newsletters/EFFector/

To get the latest issue, send any message to [email protected] (or
[email protected]), and it will be mailed to you automagically.  You can also get
the file "current" from the EFFector directory at the above sites at any
time for a copy of the current issue.

------------------------------





End of EFFector Online v10 #05 Digest
*************************************

$$