Date: Wed, 14 Apr 93 15:51:29 PDT Reply-To: Return-Path: Message-ID: Mime-Version: 1.0 Content-Type: text/plain From: surfpunk@osc.versant.com (Ernqvat guvf FHESCHAX vzcyvrf hfref pbafrag gb fhpu zbavgbevat) To: surfpunk@osc.versant.com (SURFPUNK Technical Journal) Subject: [surfpunk-0079] USCONGRESS: Vinton G. Cerf Speaks # You may have seen this already; I don't know where it's been. It seems # like this information shows up in comp.risks every once in a while, but # it's nice to have handy, anyway. # # Mike Mitten - gnome@pd.org ________________________________________________________________________ ________________________________________________________________________ Written Testimony of Dr. Vinton G. Cerf Vice President Corporation for National Research Initiatives and President Internet Society US House of Representatives Committee on Science, Space and Technology Subcommittee on Technology, Environment and Aviation March 23, 1993 Corporation for National Research Initiatives 1895 Preston White Drive, Suite 100 Reston, VA 22091 +1 703-620-8990 +1 703-620-0913 National Information Infrastructure INTRODUCTION Mr. Chairman, distinguished members of the subcommittee and guests, my name is Vinton G. Cerf and I am Vice President of the non-profit Corporation for National Research Initiatives (CNRI). I also have the honor to serve as President of the Internet Society (ISOC), which is a professional society of individuals who are users, developers or operators of the Internet. My remarks today are personal in nature, but they are colored by my past and present professional experiences which form the backdrop against which my opinions and ob- servations have evolved. I worked on the ARPANET project while a graduate student at UCLA in the early 1970s, helping to develop the protocols used to support communication between the computers (hosts) on the network. The highly successful ARPANET experience with packet switching technology led to additional satellite, mobile radio and local area packet networks, developed under Advanced Research Projects Agency (ARPA) sponsorship and, in the case of Ethernet, at the Palo Alto Research Center of the Xerox Corporation. Dr. Robert Kahn, now the president of CNRI, initiated an ARPA internetting research program to ex- plore techniques to connect different packet networks in such a way that the host computers did not have to know anything about the intermediate networks linking them together. Dr. Kahn and I developed the idea of gateways and wrote the first specification for the basic TCP/IP protocols now used in the Internet. The idea behind Internet was the seamless linking of many different kinds of packet switched networks. I came to ARPA in 1976 to manage the Internetting research program and by the time I left ARPA in 1982, the TCP/IP protocols were widely used and the Department of Defense had declared them stan- dards for military use. The Internet has blossomed in the sub- sequent 10 years, particularly after the National Science Foundation (NSF) introduced the NSFNet as part of the Internet in the mid-1980s. In 1982, there were about 100 computers on the ARPANET and a few score others were part of the NSF-sponsored CSNET which also used the Telenet public data network. In 1993 there are over 1.5 million of them. The system links over 10,000 networks in roughly 50 countries. Although it is not known for certain how many users there are, we believe there are well over 5 million. The system is tied into most public and many private electronic messaging services and this expands the population able to exchange email to some 15 million. They include business people, academics, government workers, scientists, engineers, librarians, schoolteachers, astronomers, oceanographers, biol- ogists, historians, reporters, attorneys, homemakers, and sec- ondary school students . The system is doubling annually in users, networks, hosts and traffic. In some parts of the Internet, such as the NSFNet backbone, traffic growth rates as high as 15% per month have been measured. Internet is growing faster than any other telecommunications systems ever built, including the tele- phone network. Today, over half of the networks registered are associated with business users. Of course, these rates of growth cannot continue indefinitely, but there is reason to ex- pect that the user population will exceed 100M by 1998. Perhaps even more important, this federal investment in re- search has created new industries revolving at first around the hardware and software of Internet technology, and more re- cently, around network and information services supported by the Internet. The new businesses (such as Sun Microsystems, 3COM and Cisco Systems) have highly positive international trade balances and phenomenal growth, commensurate with the rapid growth of the Internet itself. The growth rate is ex- tremely strong in Europe, South America and the Pacific Rim creating major export markets for the US firms offering Internet products and services. In 1975, operational management of the ARPANET was trans- ferred to the Defense Communication Agency (now the Defense Information Systems Agency - DISA). In the mid-80s, the National Science Foundation (NSF), the Department of Energy (DOE), and the National Aeronautics and Space Administration (NASA) joined in supporting the evolution of the Internet and developing and applying its technologies. In addition to developing their own networks (that became inte- gral components of the Internet), these agencies participated in the development and standardization of the Internet proto- cols (TCP/IP Protocol Suite) and provided support to the sec- retariats of the Internet Architecture Board (IAB) and Internet Engineering and Research Task Forces (IETF and IRTF). This included support for the Internet Assigned Number Authority (IANA), document editor (RFC Editor), and Network Information Centers which provide information and assistance to users and deal with Internet network address assignments. ARPA, NSF, DISA, DOE and NASA now make up part of the Federal Networking Council which continues to oversee the development of networks used in government-sponsored re- search and education. Formed at the beginning of 1992, the non-profit, professional membership Internet Society provides an institutional frame- work for carrying out a variety of activities intended to foster the continued growth, evolution and application of the Internet. Included in this undertaking is the responsibility for the technical standards used in the Internet. Along with mem- bers of the Federal Networking Council, the Internet Society supports the IETF Secretariat. It sponsors conferences and workshops on the Internet and its technology, is establishing liaison relationships with the International Telecommunication Union (ITU) and Organization for International Standardization (ISO), works with various United Nations agencies (e.g. UN Development Program) to encourage the acquisition and use of Internet facilities in technologically-emerging countries, and participates in efforts to extend Internet services from univer- sity and research library communities to secondary school systems. The Internet Society does not operate any of the thousands of networks that make up the Internet, but it assists service providers by providing information to prospective users and involves product developers and researchers in the evolution of Internet technical standards. Corporate and individual, pro- fessional support for this organization is widespread and in- ternational in scope. High Performance Computing and Communication The High Performance Computing Act was signed into law late in 1991. The original impetus for this legislation came from then-Senator and now-Vice President Gore whose vision of information superhighways limned the potential of a comput- ing and communications infrastructure which would permeate and stimulate the government, business and private sectors of the US economy. The promise of a vast new economic engine equal to or larger than the engine sparked by the National Highway Act of 1956 was a powerful incentive for this bill and lies at the heart of the motivation for creating a new National Information Infrastructure. One of the key elements of the HPC initiative is its National Research and Education Network (NREN) program. Designed to extend the performance envelope of networking into billion bit per second (gigabit) territory and to extend the scope of access to a larger segment of the research and education communities, the effort spawned a major research program on gigabit networking. ARPA and NSF jointly funded an effort, or- ganized by the Corporation for National Research Initiatives, to establish multiple gigabit testbeds across the United States. The program is highly leveraged, involving major contributions from the computing and communications industries as well as several of the national laboratories and major research uni- versities . An important focus of the gigabit testbed program is to dis- cover by experimentation which technologies and applications are likely to form the core of the high performance communi- cation systems of the future. The deep involvement of industry is intended, in part, to assure that the results take into ac- count the plans and capabilities of the private sector. Such partnerships among government, industry and academic insti- tutions form a bedrock upon which new national infrastruc- ture can be founded. The vision of the NREN component of the HPC effort begins with the existing US component of the global Internet. Under the NREN program, key parts of the US Internet have been extended to operate at 45 million bits per second (in particular the NSFNet) and procurement of higher speed services by DOE and NASA is in progress. The gigabit testbed program is en- abling the early availability of very high speed network tech- nology and the results of the program will help to determine the architecture and technology of even higher capacity ser- vices. The NSFNet initiative, which began in 1986, has also led to the creation of dozens of new Internet service providers, in- cluding a number of for-profit networks offering unrestricted Internet service to all who desire it. Another fundamental motivation for the high performance networking component of HPC is the intense investment by the principal interexchange and local exchange telecommunica- tions carriers in the US in the use of optical fiber in their net- works. Capable of supporting operation in the billions of bits per second, the optical networks form the strands from which a national gigabit fabric can be woven. Investments by local exchange carriers and cable companies to increase the capac- ity of the lines reaching business and residential customers make it possible to envision a time when very high capacity services can be supported on an end-to-end basis. The far-sighted vision of the HPC effort, together with the ex- plosive growth of the Internet and basic communications fa- cilities resulting from private sector initiatives, have set the stage for a dramatic new step in the evolution and convergence of computing and communication: the creation of a National Information Infrastructure. INFRASTRUCTURE Information Infrastructure is the Rcommon groundS on which computer-based products and services depend to achieve commonality and interoperability. Included in infrastructure are technical standards and the organizations and procedures through which they are developed; communication services and the physical, human and organizational resources needed to deploy, maintain and operate them; legal and regulatory frameworks which encourage cooperative development of pre- competitive technology, foster the protection of computer-ac- cessible intellectual property, the protection of privacy, and support the conduct of electronic commerce; widely available computer software for many hardware and operating system platforms establishing ubiquitous and interoperable comput- ing environments in which applications can be embedded. Infrastructure supplies the raw material out of which limitless applications may be constructed. Some of the characteristics which mark elements of infrastruc- ture include: ubiquity, expandable capacity, simplicity of use, applicability to many uses and broad affordability. A function- ing information infrastructure will lower technical and eco- nomic barriers to the introduction of computer-based products and services. It will simplify the discovery and ordering of products and services as well as billing for their use or acqui- sition. It will also facilitate the day-to-day operation of busi- nesses, government, education, health care and all the myriad activities that rely increasingly on the use of computer and communication technology to accomplish their objectives. Infrastructure has an enabling character. The highway system enabled the suburban housing boom and convenient, door to door delivery of goods. Of course, it also stimulated the auto- mobile industry and travel. The power generation and distri- bution system enabled the facile application of fractional horsepower motors and a vast array of other electrical appli- ances wherever they were needed. Infrastructure development is almost always preceded by criti- cal inventions which motivate the need for the infrastructure. The light bulb preceded and motivated the need for power gen- eration and distribution. The invention of the internal com- bustion engine and its application in automobiles motivated the need for better roads, service stations, gasoline refining and distribution. Once the roads were in place, their ubiquity and easy accessibility stimulated the production of a vast ar- ray of different vehicles, all designed to conform to certain common constraints (size, height, weight) so as to be usable on most of the roads in the system. The computer is the automobile of the information infrastruc- ture. Laptops are the sports cars; desktops are the sedans; supercomputers are the formula 1 racing engines; and gigantic mainframe data storagesystems are the 18 wheelers. The local access networks form the neighborhood streets; high capacity computer networks are the superhighways; and circuit, cell and packet switching systems form the complex interchanges. Just as vehicles on the road can be filled with an endless variety of people and products performing a multitude of services, software applications fill the empty computing vessels to create the new products and services of the information infrastructure. Communication protocols and standards form the rules of the road. When traffic jams and accidents occur, we call on emergency services to assist. The same may prove true for the information infrastructure when viruses infect the system or other software and/or hardware failures occur; we will need comparable emergency assistance to restore critical services and functions. The Electronic Frontier Foundation speaks of computers and computer networking as a frontier in cyberspace. This is an interesting and apt analogy, given the relative immaturity of both technologies. Despite the apparent sophistication of to- dayUs computers, networks and software, their application has barely scratched the surface of the latent possibilities. The no- tion of frontier raises images of boundaries and limits. But cy- berspace is a virtual place. It is created out of software, mak- ing cyberspace an endlessly expandable environment. Information is, itself, an infinitely renewable resource to be harvested, shaped, applied and recycled. The products and services which can be built atop the computer and communi- cation infrastructure simply have no logical limits. It is this ceaselessly changing, growing, transmuting information re- source which will fuel the economic engine of the information infrastructure. INFORMATION INFRASTRUCTURE FORMATION The technical challenges to be overcome in creating a national information infrastructure may only be overshadowed by some of the legal and policy problems. Taking the easier ones, first, it should be apparent that standards for the exchange of a va- riety of types of information (data) are essential. The value of infrastructure is that providers of two services which must in- terwork do not have to make bilateral agreements with every partner if appropriate technical standards are developed which enable such interworking. In the case of program (software) interworking, common representations of shared information must be agreed upon so that software developers can be reasonably assured that, if they follow the protocols, their application programs will interwork with each other. A variety of high and low-level standards are needed for representation of digital documents; information retrieval queries and responses;remote program interactions; financial or other commercial transactions; privacy, integrity and authenticity preservation; and a plethora of application- specific standards for information interchange. These representations need to include the capability for a wide range of media, including sound and pictures. There are a number of representations available for encoding these various media, but there is not yet widespread agreement on a common set. Consequently, we are still some distance away from a workable information infrastructure. The applications that can be supported on a suitable information infrastructure are limited only by imagination and creativity. Examples include health care support (e.g., patient information, prescription databases, digitized X-Rays and MRI scans), remote consultation); education (classrooms without walls, using the information infrastructure to receive instruction, explore digital libraries and work with distant partners), manufacturing, provision of government information, and support for electronic commerce (e.g., order entry, electronic or physical delivery of products, electronic payments, product specifications). An important element of Internet growth is the typical pricing strategy of service providers: flat rates based on the bandwidth of the lines used to access the Internet. Unlike some commercial email and other public data network service providers, Internet service providers have not charged by the Rpacket.S Many believe that this policy has had a major, positive effect on the growth of the network because users had little uncertainty with respect to annual costs for use of the system. ANECDOTES FROM THE 21ST CENTURY Those of us who have lived with the Internet since its inception have been living in what will be common in the next century. In preparation for this testimony, I sent a brief message out on the Internet to hundreds of thousands of people who make daily use of the network. I asked them to offer their thoughts on points they considered important to make. Within hours, I had thousands of responses, not just from domestic sources but from all over the world. Without the infrastructure of the Internet, such a question would not have been worth asking since the answers would have taken far too long to receive, and I could not have applied available computer cycles to sort and sift the resulting responses. My correspondents were al- most uniformly enthusiastic about the prospects for national and global information infrastructure. The following were some of the points they made: o The Internet Society newsletter is created by correspondents all over the globe who email their stories to the editors in Los Angeles, California and Reston, Virginia. The whole process takes places over a few days, with all the editing taking place on-line. Each issue is available on-line within minutes of completion through a variety of information services on the Internet. o A professor at the University of Southern Louisiana offered to teach a class on Internet use through email on the Internet. 15,000 people applied to take the class! This is distance-learning with clout!! o A blind student of Shakespeare asked on the net, where can I get on-line copies of the plays, itUs the only convenient way for me to read them. He uses a text-to-speech and text-to-Braille device. He got back many pointers to on-line archives around the world. o When President Clinton and Vice President Gore were visit- ing Silicon Graphics in CaliforniaUs Silicon Valley, the audio and video of the speeches were packetized and multicast on the Internet to hundreds of participating sites. This is an example of the nascent potential in combining all forms of communication in computer-mediated form. o Internet Talk Radio recently made the front page of the New York Times - it is another example of the convergence of digital computer communications and mass media. o When I needed information about the Spratley Islands, I just turned to the CIA World Fact Book made available on the Internet by the University of Minnesota. o A technical problem arose with an application running on an Apple Macintosh. The user sent an email message to several distribution lists and news groups and got back helpful responses, some in minutes, from France, Germany, Italy, Australia, India, Singapore, Canada, England, Norway, United States, Finland, ... well, you get the idea. Cyberspace has common interest groups that transcend national boundaries. o The city of Wellington, New Zealand, has a computer on the Internet. It has placed there a wide range of information of interest to potential visitors and tourists, local residents, and Internet explorers. There is strong historical evidence that the rich personal interactions that take place on the Internet contribute to a marked increase in face-to-face meetings requiring travel, so the local government is to be commended for its foresight. IMPORTANT THINGS THE US GOVERNMENT CAN DO Offered below is a representative set of comments and sugges- tions received over the course of a few days from the Internet community. Because of its source, it has an obvious Internet bias to it, but despite that, I think these ideas are worthy of serious consideration. 1. Invest in the development of pre-competitive software and technology which is made available to industry for competitive productizing. Historically, universities have developed sample implementations of new Internet software which is then used as the basis for product and service development in industry. Occasionally, industry will sponsor development of freely available software which can be readily distributed throughout the network, creating a kind of mini-infrastructure on which more elaborate, for-profit products and services may be based. In both cases, new businesses are often created to service the market created. 2. Foster and facilitate the development of technical informa- tion standards through cooperative efforts among industry, academia and government. The procedures of the Internet Engineering Task Force are a model for expeditious and effective development because the standards must be im- plemented by multiple parties and shown to interoperate be- fore they are eligible for standardization. 3. Revisit COCOM and US-specific policy on the application, use, and export of the RSA and DES cryptographic technology. Present policies inhibit the creation of particular aspects of global information infrastructure and, in some cases, US companies are placed at a severe disadvantage relative to competitors. These technologies are key elements [no pun intended] in solving problems of intellectual property protec- tion and management and electronic commerce in an on-line environment. 4. Adopt the TCP/IP protocols as coequal with the OSI proto- cols in the US GOSIP specifications (which describe the profile of protocols that are recommended for use in Government pro- curements). The TCP/IP protocols are already in wide-spread use within the government, so this change would merely acknowledge reality. 5. Move aggressively to support library access to Internet ser- vices, with particular attention to rural community access. 6. Institute training programs to educate the nationUs sec- ondary school teachers and support staff on the use of com- puter and communication technology in the classroom. Subsidize access where this is necessary. Involve state educa- tional infrastructure in this effort. Review highly successful state-level programs as input to national policy development. 7. Stimulate the development of quality software for use in curricula at all levels. Consider programs to develop pre-pro- duction software and make it available at no charge, leveraging the creativity of national laboratories, universities and individ- uals. 8. Mandate public, on-line availability of government-produced or sponsored information and allow the private sector to add value and resell it. For example, the White House is providing on-line access to unclassified executive orders and text of speeches by senior administration officials within hours (and sometimes minutes) of their release. 9. Foster programs to explore and experiment with the use of information infrastructure to support telecommuting. Not only as an energy-saving, pollution-reducing step, but a major tool for implementing the Americans with Disabilities Act provi- sions. It was noted that home-employment and suburban satellite offices illustrate that electronic communication infras- tructure is approaching the importance of the more concrete (pun intended) traffic highways. 10. Make use of the Internet to harvest information from its tens of thousands of public databases as an adjunct to intelli- gence gathering and analysis by various agencies of the federal government. Make available government unclassified information and analysis via the Internet as a contribution to the community (e.g. CIA World Fact Book). 11. Get all branches of the government on electronic mail and support the ability to exchange email with the public. 12. Encourage the deployment of ISDN services. 13 Foster the development of shared scientific databases and collaboration tools which can be used to enhance the utility of research results and provide access to raw as well as analyzed data to support corroborating research. 14. Make use of the Internet to build bridges among the scientific, research, academic and educational communities. 15. Link the museums of the world on the Internet. 16. Avoid the unintentional creation of a gap between information rich and poor. The concern here is that private sector entrepreneurship may conflict with freedom of access to public information. Note that the potential gap problem applies equally as well to individuals and to large and small cor- porations! 17. Position national policy so that the government need not subsidize network service providers. Rather, subsidize users, where this is appropriate. By this means, remove most of the Appropriate Use Policy dilemmas from consideration at the network level. It is not technically possible today, using exist- ing capabilities, to distinguish different classes of traffic at the network level. [There were a few people who thought the gov- ernment should build the National Information Infrastructure but the vast majority who commented on this preferred private sector service provision, albeit under government policies which assure ubiquity of service, full interconnection of all service providers and reasonable costs]. 18. Find a way to make advertising permissible and useful in the National Information Infrastructure. ________________________________________________________________________ Subject: Letter to Congress/RSA + DES Date: Tue, 13 Apr 93 20:26:01 -0400 Sender: cprince From: "Vinton G. Cerf" Message-Id: <9304132026.aa01197@IETF.CNRI.Reston.VA.US> Dr. Vinton G. Cerf 3614 Camelot Drive Annandale, VA 22003-1302 11 April 1993 The Honorable Timothy Valentine Committee on Science, Space and Technology Subcommittee on Technology, Environment and Aviation House of Representatives Rayburn House Office Building Dear Chairman Valentine: I recently had the honor of testifying before the Subcommittee on Technology, Environment and Aviation during which time Representative Rohrabacher (R, California) made the request that I prepare correspondence to the committee concerning the present US policy on the export of hardware and software implementing the Data Encryption Standard (DES) and the RSA Public Key encryption algorithm (RSA). As you know, the DES was developed by the National Institute for Standards and Technology (NIST) in the mid-1970s, based on technology developed by Internatonal Business Machines (IBM). The details of the algorithm were made widely available to the public and considerable opportunity for public comment on the technology was offered. In the same general time period, two researchers at Stanford University (Martin Hellman and Whitfield Diffie) published a paper describing the possible existence of mathematical functions which, unlike the symmetric DES algorithm, could act in a special, pairwise fashion to support encryption and decryption. These so-called "public key algorithms" had the unusual property that one function would encrypt and the other decrypt -- differing from the symmetric DES in which a single function performs both operations. The public key system uses a pair of keys, one held private and the other made public. DES uses one key which is kept secret by all parties using it. Three researchers at MIT (Rivest, Shamir and Adelman) discovered an algorithm which met Hellman and Diffie's criteria. This algorithm is now called "RSA" in reference to its inventors. The RSA technology was patented by Stanford and MIT and a company, Public Key Partners (PKP), created to manage licensing of the RSA technology. A company called RSA Data Security, Inc., was also formed, which licensed the technology from PKP and markets products to the public based on the technology. The current policy of the United States places DES and RSA technology under export control. Because cryptography falls into the category of munitions, it is controlled not only by the Commerce Department but also by the State Department under the terms of the International Traffic in Arms regulations. Despite the public development of both of these technologies and their documented availability outside the United States over the last 15 years, US policy has been uniformly restrictive concerning export licensing. As the United States and the rest of the world enter more fully into the Information Age in which digital communications plays a critical role in the global infrastructure, the "digital signature" capability of public key cryptography is a critical necessity for validating business transactions and for identifying ownership of intellectual property expressed in digital electronic forms. Registration and transfer of intellectual property rights in works which can be represented in digital form will be cenral factors in the national and global information infrastructure. A number of parties are exploring technical means for carrying out rights registration and transfer, making use of public key cryptography as a basic tool. In addition, there is a great deal of current work on electronic mail systems which support privacy by means of encryption and support authenticity by means of digital signatures. One of these systems, developed in the Internet environment I mentioned in my testimony, is called Privacy-enhanced Mail (PEM) and makes use of DES, RSA and some other special "hash" functions which are integral to the production of digital signatures. For these various systems to be compatible on an international basis, it would be very helpful for the cryptographic components to be exportable on a world-wide basis. A number of vendors make produces relying on these technologies within the United States but often find it very difficult to engage in international commerce owing to the export licensing required for these technologies. Ironically, the technology appears to be widely available outside the US and also outside the COCOM countries, so US firms face both competition outside the US and export inhibitions in their attempts to develop worldwide markets. There are many valid national security reasons for limiting the export of cryptographic capabilities, since these technologies may aid an opponent in time of war or other conflict. Perhaps just as important, US intelligence gathering capability can be eroded by the availability of high grade cryptography on a worldwide basis. Recently, it has also been alleged that the world-wide availability of cryptography would also seriously impede US drug enforcement and anti-crime efforts. While these reasons seem sufficient, many have pointed out that the widespread accessibility to the detailed specifications of DES and RSA and availability and existence of software and hardware outside the US have long since done whatever damage is going to be done in respect of warfighting, crime or drug potential. This line of reasoning leads to the conclusion that our policies only inhibit legitimate commerce, but have little impact on the other concerns expressed. As in all such controversy, there is often some truth on both sides. The National Institutes of Standards and Technology (NIST), has offered alternative digital signature capability. Technical assessments of the alternative have turned up weaknesses, in the opinions of some experts. There is not yet an alternative to DES, unless it is to be found in NSA's Commercial Crypto Evaluation Program (CCEP) in which NSA proposes to provide algorithms which are implemented in hardware by industry and made available for civilian use. As I understand this program, NSA does not intend to release any details of the algorithms, leaving open questions about the nature and strength of the technology. Some experts will persist in the belief that such offerings have weaknesses which are deliberately built in and hidden (so-called "Trojan Horses") which will allow the agency to "break" any messages protected by this means. The critics complained loudly that the reasoning behind the design of certain parts of the DES algorithm (specifically the "S-boxes") was never made public and therefore that the algorithm was suspect. In fact, the DES has proven to be very strong - indeed, it may be that very fact which makes it so unpalatable in some quarters to permit its unrestricted export. It may be that the CCEP technology offered is satisfactory, but this is hard to tell without knowing more about its provenance. Presuming the wide availability of both DES and RSA technology, it seems to me appropriate and timely to re-examine US export control policy regarding these two algorithms. In all probability, any such review will require some classified testimony which will have to be heard in confidence by cleared members of your committee. I sincerely hope that the outcome will be favorable to use by US industry in international commerce, but even if the outcome results in continuation of present policy, it is timely to make such a review, in my opinion. Sincerely, Vinton G. Cerf ________________________________________________________________________ ________________________________________________________________________ The SURFPUNK Technical Journal is a dangerous multinational hacker zine originating near BARRNET in the fashionable western arm of the northern California matrix. Quantum Californians appear in one of two states, spin surf or spin punk. Undetected, we are both, or might be neither. ________________________________________________________________________ Send postings to , subscription requests to . MIME encouraged. Xanalogical archive access soon. Call the Helpdesk at 404-894-7173. ________________________________________________________________________ ________________________________________________________________________ atdt 8942195 CONNECT 2400 Checking authorization, Please wait... Welcome to Georgia Tech's TCP Service. This network system is for the use of authorized users only. Individuals using this network system without authority, or in excess of their authority, are subject to having all of their activities on this system monitored and recorded by system personnel. In the course of monitoring individuals improperly using this system, or during system maintenance, the activities of authorized users may also be monitored. Usage of this network implies the user's consent to such monitoring, The user hereby is advised that if such monitoring reveals possible evidence of criminal activity, system personnel may provide the evidence of the monitored activity to law enforcement officials. To get a menu type Help or ? If you have any difficulty call the Helpdesk at 894-7173.