This message was forwarded to you from ZDNet (http://www.zdnet.com) by [EMAIL PROTECTED] Comment from sender: Also related to the WIPO treaty proposal. It's already passed in the Senate, contact your representative today!! --------------------------------------------------------------------- This article is from ZDNN (http://www.zdnet.com/zdnn/). Visit this page on the Web at: http://www.zdnet.com/zdnn/content/inwk/0523/326948.html --------------------------------------------------------------------- House Bill Would Ban Crucial Crypto Research By Will Rodger, Inter@ctive Week June 16, 1998 11:05 AM PDT House Bill Would Ban Crucial Crypto Research Research crucial to producing secure computer systems in the U.S. could be banned outright if wording in proposed legislation to extend copyright law to cyberspace becomes law, experts warned last week. "This is scary. Everything we've worked for could go away," said Bruce Schneier, author of the seminal text Applied Cryptography. With just days to go before the House Telecommunications Subcommittee votes on the measure, industry lobbyists and cryptographers are scrambling to convince drafters of the House World Intellectual Property Organization Copyright Treaties Implementation Act to strike language that would ban devices "primarily" designed to circumvent copyright protections such as digital watermarks and validation codes. Those protections are crucial to preventing online counterfeiting. But making sure they remain secure requires that computer technologists try to break them in the first place, rendering nonsensical distinctions between legitimate software used to test computer security and the hacking tools the bill would attempt to ban. Satan, a freely available software tool used for network analysis by computer security specialists, for instance, also is a favorite tool of network vandals. In a June 4 letter, the Association for Computing Machinery urged Telecommunications Subcommittee Chairman Billy Tauzin, R-La., to drop anti-circumvention language affecting cryptographic research as well as basic network operations. "Often, the exact same technology [encryption] is used to control access both to a copyrighted digital work and to certain components of a computer security system," wrote Barbara Simons, ACM Public Policy Chair. "System operators have important, legitimate reasons to circumvent such access control technologies to confirm the security of the password file or other vulnerable elements of the system." Senate (www.senate.gov) drafters dealt with the same issues before passing a companion bill last month, but left their clarifications to a report accompanying the bill rather than the bill itself. This time, computer groups want language in the bill itself. --------------------------------------------------------------------- Copyright (c) 1998 ZDNet. All rights reserved. Reproduction in whole or in part in any form or medium without express written permission of ZDNet is prohibited. ZDNet and the ZDNet logo are trademarks of Ziff-Davis Inc. --------------------------------------------------------------------------- Send administrative requests to [EMAIL PROTECTED]