Date: Thu, 26 Mar 92 18:05:58 -0800 From: Jim Warren Subject: File 10--Electronic CivLib - model candidate's statement & ideas This concerns practical efforts to assure that traditional consteitutional rights and protections remain clearly guaranteed, even in the context of modern technology -- in the "Information Age" and across the "Electronic Frontier." For this 1992 election-year, the following offers possible models for do-it-yourself citizen-based political action. Please "copy, post and circulate" this 3-part document wherever and to whomever you wish. Please feel free to modify Parts 2 and 3 however you wish -- over your own signature. After all, freedom always *has* been a do-it-yourself project. This introduction is PART-1 of three parts. PART-2 provides a model cover-letter & facts you might use: 1. First, it *briefly* mentions the electronic civil liberties issues. 2. Its next part is intended to get the attention of a candidate and/or their campaign staff by illustrating cheap, effective net communications. 3. The next part illustrates that a great number of people (candidate- translation: "voters") are involved. 4. *Very important*: It outlines our ability to communicate with masses of people/voters -- at little or no cost. 5. Equally important -- it requests *specific commitment to act* from a candidate. 6. It offers a matching commitment to publicize their position. PART-3 is a model candidate's statement committing to specific action. Note: All successful politicians have mastered the art of *sounding* like they are supportive of the hundreds or thousands of causes and pleas that are urged upon them. Good-sounding, vaguely-supportive statements are worth virtually nothing. Anything less than their issuing a public position statement committing to explicit action must be considered as meaningless. Election season is the one time when we have our best chance at efficient and effective citizen action. All it takes is time and effort. (And, I walk it like I talk it -- I have forwarded customized versions of the cover-letter and model-statement to several state and federal candidates -- all of whom are seeking re-election or election to higher office.) I would be happy to help others working on these issues, time permitting. The more people who send this cover letter and model statement to candidates -- and phone campaign headquarters and ask questions at candidates' forums; the more sensitized they will become to this constituency and these fundamental issues of a free society. Speak and write, now; speak and write, often. "The price of freedom ..." --Jim Warren, Electronic Civil Liberties Initiative, 345 Swett Road, Woodside CA 94062; fax/415-851-2814 email/ jwarren@well.sf.ca.us [ For identification purposes only: organizer/chair of First Conference on Computers, Freedom & Privacy (1991), first-year recipient of Electronic Frontier Foundation Pioneer Award (1992), MicroTimes contributing editor & columnist, Autodesk Board of Directors member, founding of InfoWorld, founding editor of Dr. Dobb's Journal, past chair of ACM, SIGMICRO and SIGPLAN chnapters, etc., blah blah blah. ] =============== PART-2, MODEL COVER-LETTER TO CANDIDATE(S) ================ Dear [candidate], A growing percentage of the 12-16 million people who are "online" -- using networked computers -- are expressing increasing concern about protecting traditional civil liberties and personal privacy in the "Information Age." (People are "coming online" at a rate much faster than the explosive growth of personal computing since they began in the mid-'70s.) As we use networked computers for electronic-mail, teleconferencing and information exchange, they are reporting rapidly-increasing threats to electronic "speech," "press," "assembly," personal security and privacy. For instance: In 1990, a single notice sent out across computer nets prompted 30,000 complaints about Lotus Corporation's plans to sell personal data on 20-million consumers. Lotus quickly withdrew their "Marketplace" product before sales ever began. Or: In Spring, 1991, a single message sent into the computer nets prompted thousands of complaints to Senators Biden and DeConcini. It concerned legislation they had introduced, reportedly requested by the FBI via Senator Thurmond, that would have crippled secure voice and data communications for U.S. citizens and business. The Senators withdrew the proposal with three weeks of the net-circulated note. How many voters are involved? Almost all users are adults. Most are well-educated. Most have upscale incomes. Most have significant discretion for spending and contributions. Recent published research indicates there are about 14.2-million people sharing 1.3-million "host" computers on the "Internet." This includes about 960,000 people using more than 12,000 home/personal computers as shared BBSs -- networked electronic "bulletin board systems." These offer free or almost-free teleconferencing and electronic-mail. [Matrix News, Feb., 1992, 1120 S. Capitol-of-Texas Hwy., Bldg. 2-300, Austin, TX 78746.] (In addition, there are also the commercial systems such as CompuServe, Prodigy, GEnie and MCImail -- but they have only several million users and are very costly in comparison to the much larger Internet computer matrix.) Mass-discussions of freedom and privacy concerns are escalating. Almost-instant mass-circulated online "newspapers" and "news-groups" plus numerous popular teleconferences increasingly carry reports of electronic civil-liberties and privacy concerns. Credit-data abuses, covert employer surveillance, corporate espionage, seizure of electronic publications, searches of entire electronic post offices, and government opposition to secure communications are greatly escalating these concerns. These issues are rapidly penetrating the public press and television. Example: The First Conference on Computers, Freedom and Privacy (1991), prompted well in excess of 80 pages of press, including the New York Times, Los Angeles Times, Wall Street Journal Time Magazine, Business Week, Scientific American, Germany's Der Spiegel, etc.. [For copies, contact CFP#1 chair, Jim Warren, 345 Swett Road, Woodside CA 94062; 415-851-7075.] Functionally-free, almost-instantaneous mass communication is available. It is trivial for anyone to "broadcast" comments or information across the nets to thousands of people, almost immediately and for free or perhaps costing $15-$20/month. Over a million people read news-groups in USENET, which is just one of thousands of electronic "newspapers." And, system-owners and system-operators -- those often most-deeply concerned about these civil liberties, privacy and content-liability issues -- can have every user of their system receive whatever message they choose, perhaps only once, or perhaps every time each person logs-in. Without cost. Various of these "sysops" are agreeing to inform every one of their users -- often numbering in the thousands -- about candidates who commit to act to protect civil liberties and privacy against new, technology-based threats. We ask for your commitment. A number of people who are well-known across this huge network are asking candidates to commit to specific action, to make clear that constitutional protections unquestionably apply across this new "electronic frontier." We ask that you issue a formal position statement, committing to act on these matters. (We recognize that an informal statement of general principles is of minimal value without specifics or commitment to action.) We ask that you commit to protecting Constitutional freedoms, regardless of technology. Enclosed is a "model" that you might use as a starting point. (It illustrates some of the issues that many people feel are most important.) Commitment is reciprocal. If you commit to act, we will promptly broadcast it far and wide across this massive, high-speed network. And, if your opponent(s) avoid explicit commitment -- by specific refusal or simply by inaction -- we will publicize that with equal vigor. Additionally, some of us are prepared to assist committed candidates to publicize/discuss all of their positions and issues (not just these online issues) via this free, fast, pervasive mass-medium. And finally, candidates who address these issues first can generate notice in the public press and television -- especially re protecting freedom of speech, press, assembly and personal privacy. Numerous reporters have covered these issues, to say nothing of the 300-400 computer trade periodicals. Some of us have lists of lay and trade reporters interested in these issues and would be happy to assist in publicizing your commitment. I appreciate your attention to these comments and requests, and look forward to your timely reply. <> =================== PART-3, MODEL CANDIDATE'S STATEMENT ==================== Guaranteeing Constitutional Freedoms into the 21st Century Preface Harvard Law Professor Laurence H. Tribe, one of the nation's leading Constitutional scholars, views technological threats to our traditional constitutional freedoms and protections as so serious that -- for the first time in his career -- he has proposed a Constitutional Amendment: "This Constitution's protections for the freedoms of speech, press, petition and assembly, and its protections against unreasonable searches and seizures and the deprivation of life, liberty or property without due process of law, should be construed as fully applicable without regard to the technological method or medium through which information content is generated, stored, altered, transmitted or controlled." -- First Conf. on Computers, Freedom & Privacy, 3/27/91, Burlingame CA In the absence of such a constitutional clarification, legislation and regulation are the only alternatives to assure that citizens are protected from technological threats against their constitutional rights and freedoms. Candidate's Commitment to Action (model statement) Preface: It has been over two centuries since our Constitution and Bill of Rights were adopted. The great technological changes in the interim -- especially in computing, telecommunications and electronics -- now pose a clear and present danger to the rights and protections guaranteed in those great documents. Therefore: Commitment: In the first legislative session after I am [re]elected, I will author or co-author legislation reflecting the following specifics, and I will actively support and testify in favor of any similar legislation as may be introduced by others. Further, I will actively seek to include in such legislation, explicit personal civil and/or criminal penalties against any agent, employee or official of the government who violates any of these statutes. And finally, I will keep all citizens who express interest in legislative progress on these matters fully and timely informed. The protections guaranteed in the Constitution and its Amendments shall be fully applicable regardless of the current technology of the time. This particularly includes, but is not limited to: Speech: Freedom of speech shall be equally protected, whether by voice or in written form as in the 18th Century, or by electronic transmission or computer communication as in the 20th Century and thereafter. Press: Freedom of the press shall be equally protected, whether its information is distributed by print as in the 18th Century, or by networked computers or other electronic forms, as in the 20th Century and thereafter. Liability for content: Just as a printer is not liable for content of leaflets printed for a customer, so also shall the owner or operator of a computer or electronic or telecommunications facility be held harmless for the content of information distributed by users of that facility, except as the owner or operator may, by contract, control information content. Those who author statements and those who have contractual authority to control content shall be the parties singularly responsible for such content. Assembly: Freedom of assembly shall be equally protected, whether by face-to-face meeting as in the 18th Century, or by computer-based electronic-conference or other teleconference as in the 20th Century and thereafter. The right to hold confidential meetings shall be equally protected, whether they be by personal meeting in private chambers, or by computer-assisted or electronic-based means. Self-defense: The right of the people to keep and use computers and communications connections shall not be abridged by the government. Search & seizure: The right of the people to be secure in their papers and effects, against unreasonable searches and seizures, shall be fully applicable to their electronic mail, computerized information and personal computer systems. Warrants: No warrants for search or seizure shall issue for computerized information, but upon probable cause, supported by oath or affirmation, and particularly describing the computer system to be searched and the specific information to be seized. Secure information vaults: Just as search and seizure of letters in a post-office, and papers in a bank-vault lock-box, and surveillance of telephone conversations by wire-tap, each require a separate warrant for each postal address, lock-box and telephone line, so also shall a separate warrant be required for each electronic-mail address and/or computer files of each suspect, when stored in a computer facility or archive shared by others. And further, computer files stored in a shared facility or archive by or for a citizen who is neither named in a warrant nor associated with a suspect so-named, may not be used against that un-named citizen, if seized or discovered during legal search of or for files of a suspect. Self-incrimination: No person shall be compelled in any civil or criminal case to be a witness against himself or herself, nor be compelled to provide information retained only in their mind, nor otherwise be compelled to assist the translation or decoding of information that he or she believes may be self-incriminating. Property: Private property shall not be taken for public use without just compensation, nor shall such property be used nor sold by any government agency for less than fair market value, in which case all such proceeds shall promptly derive singularly to its last owner prior to government seizure. Speedy release: Anyone not accused of a crime shall enjoy the right to a speedy release and return of all of their property, as may be seized under any warrant, particularly including their computerized information. The government shall be fully liable for any damage befalling property or information they have seized. [signed] _______________________ ______________ [date] _________________ _________________________ [please print or type] _________________________ title / current office / office sought _________________________ address _________________________ _________________________ _________________________ campaign-office voice-phone number _________________________ campaign-office fax number _________________________ campaign-office electronic-mail address [ Additional copies of this model candidate's position commitment are available from: Jim Warren, Electronic Civil Liberties Initiative, 345 Swett Road, Woodside CA 94062; (415)851-7075, fax/(415)851-2814; electronic-mail/ jwarren@autodesk.com -or- jwarren@well.sf.ca.us . 3/26/92 For identification purposes, only, Warren was the Chair of the First Conference on Computers, Freedom & Privacy held in March, 1991, is a Contributing Editor for MicroTimes and is a member of the Board of Directors of Autodesk, one oief the nation's half-dozen largest software companies.] Downloaded From P-80 International Information Systems 304-744-2253