Date: Sat, 09 Jan 93 16:58:33 EST Errors-To: Comp-privacy Error Handler From: Computer Privacy Digest Moderator To: Comp-privacy@PICA.ARMY.MIL Subject: Computer Privacy Digest V2#004 Computer Privacy Digest Sat, 09 Jan 93 Volume 2 : Issue: 004 Today's Topics: Moderator: Dennis G. Rears CFP'93 Electronic Brochure The Computer Privacy Digest is a forum for discussion on the effect of technology on privacy. The digest is moderated and gatewayed into the USENET newsgroup comp.society.privacy (Moderated). Submissions should be sent to comp-privacy@pica.army.mil and administrative requests to comp-privacy-request@pica.army.mil. Back issues are available via anonymous ftp on ftp.pica.army.mil [129.139.160.133]. ---------------------------------------------------------------------- Date: Tue, 5 Jan 1993 18:53:05 -0800 From: Bruce R Koball Subject: CFP'93 Electronic Brochure The Third Conference on Computers, Freedom and Privacy -- CFP'93 9-12 March 1993, San Francisco Airport Marriott Hotel, Burlingame, CA Sponsored by: Association for Computing Machinery, Special Interest Groups on: Communications (SIGCOMM) Computers and Society (SIGCAS) Security, Audit and Control (SIGSAC) Co-Sponsors and Cooperating Organizations: American Civil Liberties Union American Library Association Asociacion de Technicos de Informatica Commission for Liberties and Informatics Computer Professionals for Social Responsibility Electronic Frontier Foundation Freedom to Read Foundation IEEE Computer Society IEEE-USA Committee on Communications and Information Policy Internet Society Library and Information Technology Association Privacy International USD Center for Public Interest Law U.S. Privacy Council The WELL (Whole Earth 'Lectronic Link) Patrons and Supporters (as of 24 December 1992): American Express Corp. Apple Computer, Inc. Dun & Bradstreet Corp. Equifax, Inc. Information Resource Service Company Mead Data Central, Inc. National Science Foundation (pending) RSA Data Security, Inc. CFP'93 Electronic Brochure 1.3 SCOPE: The advance of computer and telecommunications technologies holds great promise for individuals and society. From convenience for consumers and efficiency in commerce to improved public health and safety and increased participation in democratic institutions, these technologies can fundamentally transform our lives. At the same time these technologies pose threats to the ideals of a free and open society. Personal privacy is increasingly at risk from invasion by high-tech surveillance and eavesdropping. The myriad databases containing personal information maintained in the public and private sectors expose private life to constant scrutiny. Technological advances also enable new forms of illegal activity, posing new problems for legal and law enforcement officials and challenging the very definitions of crime and civil liberties. But technologies used to combat these crimes can pose new threats to freedom and privacy. Even such fundamental notions as speech, assembly and property are being transformed by these technologies, throwing into question the basic Constitutional protections that have guarded them. Similarly, information knows no borders; as the scope of economies becomes global and as networked communities transcend international boundaries, ways must be found to reconcile competing political, social and economic interests in the digital domain. The Third Conference on Computers, Freedom and Privacy will assemble experts, advocates and interested people from a broad spectrum of disciplines and backgrounds in a balanced public forum to address the impact of computer and telecommunications technologies on freedom and privacy in society. Participants will include people from the fields of computer science, law, business, research, information, library science, health, public policy, government, law enforcement, public advocacy and many others. General Chair ------------- Bruce R. Koball CFP'93 2210 Sixth Street Berkeley, CA 94710 510-845-1350 (voice) 510-845-3946 (fax) bkoball@well.sf.ca.us Steering Committee ------------------ John Baker Mitch Ratcliffe Equifax MacWeek Magazine Mary J. Culnan Peter G. Neumann Georgetown University SRI International Dorothy Denning David D. Redell Georgetown University DEC Systems Research Center Les Earnest Marc Rotenberg GeoGroup, Inc. Computer Professionals for Social Responsibility Mike Godwin Electronic Frontier Foundation C. James Schmidt San Jose State University Janlori Goldman American Civil Liberties Union Barbara Simons IBM Mark Graham Pandora Systems Lee Tien Attorney Lance J. Hoffman George Washington University George Trubow John Marshall Law School Donald G. Ingraham Office of the District Attorney Willis Ware Alameda County, CA Rand Corp. John McMullen Jim Warren NewsBytes MicroTimes & Autodesk, Inc. Simona Nass Student - Cardozo Law School Affiliations are listed for identification only. Pre-Conference Tutorials: On Tuesday 9 March, the day before the formal conference begins, CFP'93 is offering a number of in-depth tutorials on a wide variety of subjects on four parallel tracks. These presentations will range from interesting and informative to thought-provoking and controversial. The tutorials are available at a nominal additional registration cost. Conference Reception: Following the Tutorials on Tuesday evening, you are invited to meet new and old friends and colleagues at an opening reception. Single Track Main Program: The technological revolution that is driving change in our society has many facets and we are often unaware of the way they all fit together, especially the parts that lie outside of our own expertise and interest. The primary goal of CFP'93 is to bring together individuals from disparate disciplines and backgrounds, and engage them in a balanced discussion of all CFP issues. To this end our main program, starting on Wednesday 10 March, is on a single track enabling our attendees to take part in all sessions. Registration is Limited: CFP'93 registration will be limited to 550 attendees, so we advise you to register as early as possible and take advantage of the early registration discounts. Luncheons and Banquets: A key component of the CFP conferences has been the interaction between the diverse communities that constitute our attendees. To promote this interaction CFP'93 is providing three luncheons and evening two banquets with the cost of conference registration. EFF Pioneer Awards All conference attendees are invited to the Awards Reception sponsored by the Electronic Frontier Foundation (EFF) on Wednesday evening, 10 March. These, the second annual EFF Pioneer Awards, will be given to individuals and organizations that have made distinguished contributions to the human and technological realms touched by computer-based communications. Birds of a Feather Sessions: CFP'93 will provide a limited number of meeting rooms to interested individuals for special Birds of a Feather sessions after the formal program each evening. These sessions will provide an opportunity for special interest discussions that were not included in the formal program and will be listed in the conference materials. For further information contact CFP'93 BoF Chair: C. James Schmidt University Librarian San Jose State University One Washington Square San Jose, CA 95192-0028 voice 408-924-2700 voice mail 408-924-2966 e-mail schmidtc@sjsuvm1.sjsu.edu CFP'93 Featured Speakers: Nicholas Johnson Nicholas Johnson was appointed head of the Federal Communications Commission by President Johnson in 1966, serving a seven year term. In his role as commissioner, he quickly became an outspoken consumer advocate, attacking network abuses and insisting that those who use the frequencies under the FCC license are the public's trustees. He has been a visiting professor of law at the College of Law at the University of Iowa since 1981 and is currently co-director of the Institute for Health, Behavior and Environmental Policy at the University of Ohio. Willis H. Ware Willis H. Ware has devoted his career to all aspects of computer science--hardware, software, architectures, software development, public policy and legislation. He chaired the "HEW committee" whose report was the foundation for the Federal Privacy Act of 1974. President Ford appointed him to the Privacy Protection Study Commission whose report remains the most extensive examination of private sector record-keeping practices. Dr. Ware is a member of the National Academy of Engineering, a Fellow of the Institute of Electronic and Electrical Engineers, and a Fellow of the American Association for Advancement of Science. John Perry Barlow John Perry Barlow is a retired Wyoming cattle rancher, a lyricist for the Grateful Dead, and a co-founder of the Electronic Frontier Foundation. He graduated from Wesleyan University with an honors degree in comparative religion. He writes and lectures on subjects relating to digital technology and society, and is a contributing editor of numerous publications, including Communications of the ACM, NeXTworld, MicroTimes, and Mondo 2000. Cliff Stoll Cliff Stoll is best known for tracking a computer intruder across the international networks in 1987; he told this story in his book, "The Cuckoo's Egg" and on a Nova television production. He is less known for having a PhD in planetary science, piecing quilts, making plum jam, and squeezing lumps of bituminous coal into diamonds. CFP'93 Tutorials: Tuesday 9 March - Morning Tutorials Information Use in the Private Sector Jack Reed, Information Resource Service Company Diane Terry, TransUnion Corp. Dan Jones, D.Y. Jones & Assoc. This tutorial will deal with the use of personal information from the point of view of some private sector information vendors and users. It will include a discussion of the Fair Credit Reporting Act and the "Permissible Purposes" for obtaining a consumer credit report. Information used for purposes outside the FCRA will be discussed in relationship to privacy and societal needs for businesses and individuals. Access to Government Information: James Love, Director, Taxpayer Assets Project The tutorial will examine a wide range of problems concerning citizen access to government information, including how to ask for and receive information under the federal Freedom of Information Act, what types of information government agencies store on computers, what the barriers are to citizen access to these information resources, and how citizens can change government information policy to expand access to taxpayer- funded information resources. Exploring the Internet -- a guided journey Mark Graham, Pandora Systems Tim Pozar, Late Night Software This tutorial will give participants a practical introduction to the most popular and powerful applications available via the world's largest computer network, the Internet. There will be hands-on demonstrations of communications tools such as e-mail, conferencing, Internet Relay Chat, and resource discovery and navigation aids such as Gopher, WAIS, Archie and World Wide Web. Extensive documentation will be provided. Constitutional Law for Non-lawyers (1/2 session): Mike Godwin, Staff Counsel, Electronic Frontier Foundation This tutorial is designed to inform non-lawyers about the Constitutional issues that underlie computer-crime and computer civil-liberties cases. The tutorial focuses on the First and Fourth Amendments, but includes a discussion of the Fifth Amendment and its possible connection to the compelled disclosure of cryptographic keys. It also includes a discussion of the appropriateness of "original intent" as a method for applying the Constitution in the modern era. Civil Liberties Implications of Computer Searches & Seizures (1/2 ses.): Mike Godwin, Staff Counsel, Electronic Frontier Foundation This tutorial assumes only a very basic knowledge of Constitutional law (the prior tutorial provides an adequate background), and outlines how searches and seizures of computers may raise issues of First and Fourth Amendment rights, as well as of federal statutory protections. It includes a discussion of what proper search-and-seizure techniques in such cases may be. Tuesday 9 March - Afternoon Tutorials Practical Data Inferencing: What we THINK we know about you. Russell L. Brand, Senior Computer Scientist, Reasoning Systems What do your transaction trails reveal about you? Are you a good risk to insure? Are you worth kidnapping, auditing or suing? Which products should I target at you? Are you a member of one of those groups that I would want to harass or discriminate against? This tutorial will be a hands-on approach to digging for data and to piecing it back together. Time will be divided between malicious personal invasions and sweeping searches that seek only profit, followed by a brief discussion about improper inferences and their practical impact on innocent files and lives. Legal and moral issues will not be addressed. Telecommunications Fraud Donald P. Delaney, Senior Investigator, New York State Police Illegal call sell operations in New York City are estimated to be a billion dollar industry. This tutorial will provide an overview of the problem, from finger hacking to pay phone enterprises, and will include an up-to-date assessment of the computer cracker/hacker/phone phreak impact on telephone company customer losses. Also discussed will be unlawful access of telephone company switches; unlawful wiretapping and monitoring; cards, codes and 950 numbers; New York State law and police enforcement; methods of investigation and case studies. Private Sector Marketplace and Workplace Privacy Ernest A. Kallman, Bentley College, H. Jeff Smith, Georgetown University This tutorial will give participants a general overview of privacy issues affecting uses of personal information (e.g., medical information, financial information, purchase histories) in the marketplace as well as privacy concerns in the workplace (e.g., privacy of electronic and voice mail, work monitoring). The tutorial will also set the boundaries for privacy arguments in the middle and latter 1990s. SysLaw Lance Rose, Attorney and Author "SysLaw" The SysLaw tutorial session will explore in depth the freedom and privacy issues encountered by computer bulletin boards (BBS), their system operators and their users. BBSs are estimated to number over 45,000 today (not counting corporate systems), and range from small, spare-time hobby systems to systems with thousands of users, grossing millions of dollars. BBSs are a grassroots movement with an entry cost of $1,000 or less, and the primary vehicles for new forms of electronic communities and services. Subjects covered will include: First Amendment protection for the BBS as publisher/distributor; data freedom and property rights on the BBS; how far can sysops control BBS user activities?; and user privacy on BBSs today. Note: Tutorial presenters will offer expert opinions and information. Some may advocate particular viewpoints and thus may put their own "spin" on the issues. Caveat Listener. CFP'93 Main Program Sessions: Wednesday 10 March Electronic Democracy Chair - Jim Warren, MicroTimes and Autodesk, Inc. The effects of computer and telecommunications technologies on democratic processes and institutions are increasing dramatically. This session will explore their impacts on political organizing, campaigning, access to representatives and agencies, and access to government information that is essential for a free press and an informed electorate. Electronic Voting -- Threats to Democracy Chair - Rebecca Mercuri, University of Pennsylvania This panel session will invite representatives covering a broad spectrum of involvement with the controversial subject of electronic vote tallying to address such issues as: Is a secure and reliable electronic voting system feasible? What threats to these systems are identifiable? Should electronic voting systems be open for thorough examination? Can auditability be assured in an anonymous ballot setting? Can voting by phone be practical and confidential? Did Congress exempt voting machines from the Computer Security Act? Censorship and Free Speech on the Networks Chair - Barbara Simons, IBM As online forums become increasingly pervasive, the notion of "community standards" becomes harder to pin down. Networks and BBSs will link--or create--diverse, non-geographic communities with differing standards, laws, customs and mores. What may be frank discussion in one forum may be obscenity or defamation or sexual harassment in another. This session will explore the questions of what kinds of freedom-of-speech problems face us on the Net and what kinds of legal and social solutions we need. Portrait of the Artist on the Net Chair - Anna Couey, Arts Wire Computer forums and networks make possible both new artforms and new ways of remote collaboration and exhibition. The growth of the Net creates opportunities for the blossoming of dynamic and interactive artforms and of artistic cultures -- provided that networks become widely accessible and remain open to artistic expression without political interference. This session will examine the potentials and the problems of art and artists on the Net. Thursday 11 March Digital Telephony and Crypto Policy Chair - John Podesta, Podesta and Associates The increasingly digital nature of telecommunications potentially threatens the ability of law enforcement agencies to intercept them when legally authorized to do so. In addition, the potential widespread use of cryptography may render the ability to intercept a communication moot. This session will examine these issues and the proposals that have been put before Congress by law enforcement agencies to address these perceived problems. Health Records and Confidentiality Chair - Janlori Goldman, American Civil Liberties Union As the new Administration and Congress consider proposals to reform the United States health care system, it is imperative that confidentiality and security safeguards be put in place to protect personal information. Currently, no comprehensive legislation exists on the confidentiality of health information. This session will explore the current and potential uses of health care information, and proposals to safeguard the information. The Many Faces of Privacy Chair - Willis Ware, Rand Corp. Privacy at any cost is foolish, unwise and an untenable position, and privacy at zero cost is a myth. This two-part session will explore the balancing act between the two extremes and the costs and benefits that accrue. The first part will present several examples of systems and applications in the public and private sectors that stake out a position in this continuum. The second part will be a panel discussion exploring the issues raised by the examples previously presented. The Digital Individual Chair - Max Nelson-Kilger, San Jose State University We are all represented by personal records in countless databases. As these records are accumulated, disseminated and coalesced, each of us is shadowed by an ever larger and more detailed data alter-ego, which increasingly stands in for us in many situations without our permission or even awareness. How does this happen? How does it affect us? How will it develop in the future? What can we do? This session will investigate these questions. Friday 12 March Gender Issues in Computing and Telecommunications Chair - Judi Clark, Bay Area Women in Telecommunications Online environments are largely determined by the viewpoints of their users and programmers, still predominantly white men. This panel will discuss issues of freedom and privacy that tend to affect women -- such as access, identity, harassment, pornography and online behavior -- and provide recommendations for gender equity policies to bulletin board operators and system administrators. The Hand That Wields the Gavel Chair - Don Ingraham, Asst. District Attorney, Alameda County, CA An inevitable result of the settlement of Cyberspace is the adaptation of the law to its particular effects. In this session a panel of criminal lawyers addresses the fallout from a hypothetical computer virus on the legal responsibilities of system managers and operators. The format will be a simulated court hearing. Attendees will act as advisory jurors in questioning and in rendering a verdict. The Power, Politics, and Promise of Internetworking Chair- Jerry Berman, Electronic Frontier Foundation This session will explore the development of internetworking infrastructures, domestically and worldwide. How will this infrastructure and its applications be used by the general public? What will the global network look like to the average user from Kansas to Kiev? How will politics, technology and legislation influence the access to, and cost of, the Net? How can the potential of this powerful medium be fully realized? International Data Flow Chair - George Trubow, John Marshall Law School The trans-border flow of information on international computer networks has been a concern for governments and the private sector. In addition to concerns for privacy and data security, the economic and national security implications of this free flow of information among scientists, engineers and researchers around the world are also cause for concern. This session will assemble a number of speakers to compare the various perspectives on the problem Some of the Speakers in the CFP'93 Main Program: Philip E. Agre, Dept. of Communication, Univ. of California, San Diego Jonathan P. Allen, Dept. of Information & Computer Science, University of California, Irvine Sheri Alpert, Policy Analyst, author: "Medical Records, Privacy, and Health Care Reform" William A. Bayse, Assistant Director, Federal Bureau of Investigation William Behnk, Coordinator, Legislative Information System, State of California Paul Bernstein, Attorney Kate Bloch, Hastings College of the Law Anita Borg, DEC Network Systems Lab Richard Civille, Computer Professionals for Social Responsibility Roger Clarke, Reader in Information Systems, Department of Commerce, Australian National University Dorothy Denning, Chair, Computer Science Department, Georgetown University Janet Dixon, Stanford Linear Accelerator Center Robert Edgar, Simon and Schuster Technology Group Kathleen Frawley, American Health Information Management Association Emmanuel Gardner, District Manager, Government Affairs, AT&T Mike Godwin, Staff Counsel, Electronic Frontier Foundation Joe Green, University of Minnesota Sarah Grey, Computer Department, We The People, Brown presidential campaign organization (invited) Will Hill, Bellcore Carl Kadie, Co-editor, Computers and Academic Freedom News newsletter Mitch Kapor, Chairman, Electronic Frontier Foundation David Lewis, Deputy Registrar, Department of Motor Vehicles, Commonwealth of Massachusetts James Love, Director, Taxpayers Assets Project Judy Malloy, Associate Editor, Leonardo Electronic News Irwin Mann, Mathematician, New York University David McCown, Attorney Rob Mechaley, Vice President, Technology Development, McCaw Cellular Communications, Inc. Robert Naegele, Granite Creek Technology Inc., Voting Machine Examiner, consultant to NY State Barbara Peterson, Staff Attorney, Joint Committee on Information Technology Resources, Florida Legislature Jack Reed, Chairman, Information Resource Service Company Virginia E. Rezmierski, Assistant for Policy Studies to the Vice Provost for Information Technology, University of Michigan Jack Rickard, Editor, Boardwatch Magazine Randy Ross, American Indian Telecommunications Roy Saltman, National Institute of Standards and Technology Robert Ellis Smith, Publisher, Privacy Journal David Sobel, Computer Professionals for Social Responsibility Ross Stapleton, Research Analyst, Central Intelligence Agency Jacob Sullum, Associate Editor, Reason Magazine Greg Tucker, Coordinator, David Syme Faculty of Business, Monash University, Australia Joan Turek-Brezina, Chair, Health and Human Services Task Force on Privacy of Private-Sector Health Records Registration: Register for the conference by returning the Conference Registration Form along with the appropriate payment. The registration fee includes conference materials, three luncheons (Wednesday, Thursday and Friday), two banquet dinners (Wednesday and Thursday) and evening receptions (Tuesday, Wednesday and Thursday). Payment must accompany registration. Registration Fees are: If mailed by: 7 February 8 March on site Conference Fees: $300 $355 $405 Tutorial Fees: $135 $165 $195 Conference & Tutorial $435 $520 $600 Registration is limited to 550 participants, so register early and save! By Mail: By Fax: (with Check or Credit Card) (with Credit Card only) CFP'93 Registration Send Registration Form 2210 Sixth Street (510) 845-3946 Berkeley, CA 94710 Available 24 hours By Phone: By E-Mail: (with Credit Card only) (with Credit Card only) (510) 845-1350 cfp93@well.sf.a.us 10 am to 5 pm Pacific Time CFP'93 Scholarships: The Third Conference on Computers, Freedom and Privacy (CFP'93) will provide a limited number of full registration scholarships for students and other interested individuals. These scholarships will cover the full costs of registration, including three luncheons, two banquets, and all conference materials. Scholarship recipients will be responsible for their own lodging and travel expenses. Persons wishing to apply for one of these fully-paid registrations should contact CFP'93 Scholarship Chair, John McMullen at: mcmullen@mindvox.phantom.com Hotel Accommodations: The Third Conference on Computers, Freedom and Privacy will be held at the San Francisco Airport Marriott Hotel in Burlingame, CA. This facility is spacious and comfortable, and is easily accessible from the airport and surrounding cities. Because of the intensive nature of the conference, we encourage our attendees to secure their lodging at the conference facility. Special conference rates of $99/night, single or multiple occupancy, are available. Our room block is limited and these conference rates are guaranteed only until 9 February 1993, so we urge you to make your reservations as early as possible. When calling for reservations, please be sure to identify the conference to obtain the conference rate. Hotel Reservations: (415) 692-9100 or (800) 228-9290. Refund Policy: Refund requests received in writing by February 19, 1993 will be honored. A $50 cancellation fee will be applied. No refunds will be made after this date; however, you may send a substitute in your place. Registration Form Name (Please print):__________________________________________________ Title:________________________________________________________________ Affiliation:__________________________________________________________ Mailing Address:______________________________________________________ City, State, Zip:_____________________________________________________ Country:______________________________________________________________ Telephone:_____________________________Fax:___________________________ E-mail:_______________________________________________________________ Privacy Locks: We will not sell, rent, loan, exchange or use this information for any purpose other than official Computers, Freedom and Privacy Conference activities. A printed roster containing this information will be distributed to attendees. Please indicate if you wish any information to be excluded from the roster: __Print only name, affiliation and phone number __Print name only __Omit all information about me in the roster Registration Fees (please indicate your selections): If mailed by: 7 February 8 March on site Conference Fees: $300__ $355__ $405__ Tutorial Fees $135__ $165__ $195__ Conference & Tutorial $435__ $520__ $600__ If you have registered for the Tutorials, select one from each group: 9:00 AM - 12:00 Noon __Information Use in Private Sector __Constitutional Law for Non-lawyers & Civil-liberties Implications of Computer Searches and Seizures __Access to Government Information __Exploring the Internet 1:30 PM - 4:30 PM __Practical Data Inferencing: What we THINK we know about you. __Telecommunications Fraud __Private Sector Marketplace and Workplace Privacy __SysLaw Payments: Total Amount____________ Please indicate method of payment: __Check (payable to CPF'93) (payment must accompany registration) __VISA __MasterCard Credit card #______________________________Expiration date____________ Name on card__________________________________________________________ Signature_____________________________________________________________ ------------------------------ End of Computer Privacy Digest V2 #004 ******************************