Date: Wed, 03 May 95 07:01:17 EST Errors-To: Comp-privacy Error Handler From: Computer Privacy Digest Moderator To: Comp-privacy@uwm.edu Subject: Computer Privacy Digest V6#042 Computer Privacy Digest Wed, 03 May 95 Volume 6 : Issue: 042 Today's Topics: Moderator: Leonard P. Levine Re: Monitoring USENET Downloads Re: California Digital Signature Bill Re: Could What You Post be Used to Profile You? Email/VoiceMail Privacy Re: Junk Mail Nominations ID Microchip Law Enforcement Digital Imaging Clinton Administration Online Town Meeting What are the VISA Codes? Re: Censorship and Freedom of Speech "Audience Tracking System" for Electronic Newspapers A Hot Newsgroup: Privacy Helps CFP - Advanced Surveillance Info on CPD [unchanged since 12/29/94] ---------------------------------------------------------------------- From: dbohland@epix.net (David Bohlander) Date: 28 Apr 1995 15:28:27 GMT Subject: Re: Monitoring USENET Downloads Organization: epix.net Is it possible for someone (system admin, govt agencies, etc) to monitor donwloads from USENET groups? If so, how do you prevent this capability? ------------------------------ From: Peter Marshall Date: 29 Apr 1995 21:19:20 GMT Subject: Re: California Digital Signature Bill Organization: Eskimo North (206) For-Ever On 26 Apr 1995, Privacy Rights Clearinghouse wrote: Those interested in on-line privacy should be aware of a bill in the California Legislature. A.B. 1577, sponsored by Debra Bowen, addresses the issue of digital signatures. There are versions of the same bill under consideration in Oregon, Washington, and Utah as well. It is not clear that a version of this same bill, or a substantially similar measure is "under consideration" in WA. A bill of this topic was intro'd in the '95 regular session of the WA Leg., and had one informational hearing. The bill's prime sponsor explained he had no intent in this session beyond just that, and the measure has gone no further, with the regular Leg. session just concluded here in WA. Wait 'til next year.... For now, further explanation of the point as to "versions of the same bill" would be helpful. -- Peter Marshall KSER Public Affairs ------------------------------ From: bo774@freenet.carleton.ca (Kelly Bert Manning) Date: 30 Apr 1995 06:26:32 GMT Subject: Re: Could What You Post be Used to Profile You? Organization: The National Capital FreeNet, Ottawa, Ontario, Canada Paul Hanssen (phanssen@uniwa.uwa.edu.au) writes: Isn't it possible for somone (e.g. the government or a private database provider) to get an internet site with a news feed and write a program to sort all incoming articles by person? This information could then be used to make up a profile of likes/dislikes and opinions of that person, whether true or not. This profile could then be used by corporations for marketing purposes or by the government to add to a file they may or may not have on you. Am I sounding a bit paranoid ?? Have you had an ID for long? Every few months I get some sort of solicitiation based on postings to technical newsgroups, ranging from wannabe programmers who think that I'd pay them to grind micro code for me, to solictations for products. This is not only possible, it's been going on for years. ------------------------------ From: Zackdawg@aol.com Date: 30 Apr 1995 20:32:54 -0400 Subject: Email/VoiceMail Privacy Check out McDonalds. (yeah, the chain) I just read something about McD's executive types were caught listening to employees voice mail in one of my Internet Mags. May be worth a look for you. I am interested in bosses perusing employees computers looking for "stuff" (read that as inappropriate personal writings) that the boss may not approve off and using that information to have the employee fired, prosecuted, etc. If you run across any good treatises on privacy and computer files in the workplace point me that away. -- Zackdawg aka mmelko@wsnet.com ------------------------------ From: Beth Givens Date: 28 Apr 1995 16:01:15 -0700 (PDT) Subject: Re: Junk Mail Nominations This might be of interest to CPD readers. Beth Givens Privacy Rights Clearinghouse ---------- Forwarded message ---------- Date: 28 Apr 1995 10:39:34 -0700 (PDT) From: Tom Watson To: bgivens@acusd.edu Subject: Re: junk mail nominations NOMINATIONS SOUGHT FOR JUNK MAIL AWARDS Unwanted direct mail -- known as JUNK MAIL -- often goes directly into the trash can or recycling bin, unopened. Local governments, businesses and the public must pay for the disposal or recycling of this waste. Businesses and residents also waste time dealing with junk mail. In conjunction with the 25th anniversary of Earth Day this spring, the National Waste Prevention Coalition (NWPC) announces the opening of nominations for its first JUNK MAIL AWARDS. This is an opportunity for people to express their opinions about the actual direct mail they receive. Do you know of a company or organization that sets a good example by keeping waste to a minimum in its mailings? Do you know of a company or organization that has wasteful mailing practices? Nominations for the Junk Mail Awards are open to anyone. Categories are: -- Worst Direct-Mailer (mailer refers to the business or organization sending direct mail) -- Best Direct-Mailer -- Worst Single Example of Direct Mail (wasteful, deceptive, etc.) -- Best Single Example of Environmentally Responsible Direct Mail The goals of the awards program are to educate the public about wasteful junk mail, and to encourage direct-mailers to be more environmentally responsible. Any companies or organizations that receive negative nominations will be contacted by the NWPC, if possible, and provided with information on making their mailings less wasteful. Nominations for the Junk Mail Awards are due by June 15, 1995. Send nominations to: NWPC, P.O. Box 24545, Seattle, WA, 98124-0545. You may also e-mail nominations to: cu-waste-mgmt-mailbox@cornell.edu For nominations for best or worst single example, please include the piece of mail. Persons submitting nominations will not be placed on a mailing list. The NWPC will announce the winners (and losers) of the Junk Mail Awards in fall of 1995. The National Waste Prevention Coalition includes representatives of local and state governments, university faculty, consultants and others. It was formed in 1994 to develop national waste prevention projects. For more information on the NWPC or the Junk Mail Awards, contact Tom Watson, King County (WA) Solid Waste Division, at (206) 296-4481 or by e-mail at: twatson@eskimo.com SUGGESTED CRITERIA FOR NOMINATIONS FOR THE NWPC JUNK MAIL AWARDS -- Does a company or organization send out excessive catalogs or requests for donations? -- Is paper wasted in mailings and catalogs? For example, is only one side of a sheet of paper used for letters, instead of both sides? -- Does a company or organization provide a place on their order or response form for you to say, "Do not sell my name" to other direct-mailers? -- Does a company or organization provide a place on their order or response form for you to say, "Do not send me any more mail"? -- Does a company send out orders with an excessive amount of packaging, or with unwanted extra catalogs and enclosures? -- Does a company or organization use recycled paper? -- Is unrecyclable plastic or foil used in the mailing? For best or worst single example of direct mail, also consider: -- Is a piece of mail deceptive (disguised as a check, or an urgent express-mail letter, for example)? -- Does a direct-mailer use innovative methods to reduce waste in its mailings? For tips on how individuals can get off mailing lists, see the Aug/Sept 1994 issue of "Mother Earth News" or the Nov/Dec 1993 issue of "E Magazine," or ask your local recycling program if they have information. Forwarder's note: Also visit the Privacy Rights Clearinghouse gopher and see the fact sheet on junk mail. Gopher to gopher.acusd.edu, and go into "USD Campuswide Information." ------------------------------ From: eg350aaf@csulb.edu (Sharlene MacKay) Date: 02 May 1995 01:10:31 GMT Subject: ID Microchip Organization: Cal State Long Beach Recently, I heard about an identification microchip for pets. The chip is implanted under the pet's skin and is used to identify lost animals. Since it is in use for pets, I was wondering if anyone had thought about the idea of using a similar type chip for humans?? Any thoughts.... ------------------------------ From: "Prof. L. P. Levine" Date: 01 May 1995 10:18:56 -0700 Subject: Law Enforcement Digital Imaging Taken from 2020world Digest Monday, 1 May 1995 Volume 01 : Number 113 SUNDAY, APRIL 30, 1995, 2020WORLD COLUMN Copyright 1995 Seattle Times Company ~~ Smile! Soon, you'll be on candid, digital camera ~~ It's the year 2020. A string of armed robberies has left several people dead in the Midwest. To apprehend two gunmen, authorities have hired Danny "Boone" Roberts, one of the best "Trackers" in the business. Within hours, Danny has picked up the trail. A digital tracker, Danny uses the Net to discover even the faintest of digital tracks -- a glimpse of a person on a parking lot camera, or a pattern of play at a virtual casino. Danny has a hundred tricks and a thousand sources. "There is no place to hide. Nobody can hide anyplace in this country, nobody can hide anyplace in this world." President Clinton spoke those words recently to describe the manhunt for the bombers in the Oklahoma City tragedy. He's right. It is very hard to live in this world without leaving digital tracks. From credit card transactions to a convenience store surveillance camera, we can be tracked digitally. But in today's world much of that information is inaccessible. The video pieces are analog, not digital. The amount of information from all those cameras is simply too much to save and organize. However, the coming digital era will change all that. By 2020, those cameras will all be digital. We will be able to both store and scan all of the information on every video. Pattern recognition software will allow automated searches of faces in the crowd or license plates on the road. And every access to the Net has the potential of leaving tracks. Will we have finally reached the "1984" society that George Orwell so depressingly predicted? Probably not. It is hard to imagine that we would let our government operate in an Orwellian manner. The private sector, however, is a different matter. How can we prevent private companies from using surveillance cameras? And what's to prevent private citizens from video taping all the people passing by at a busy corner? In the future, with all the digital tools available to search the video, who knows what valuable information might turn up? And that is how our 21st century cowboy, Danny "Boone" Roberts, found his prey. He had a network of private databases -- hundreds of citizen vigilante digital camera toters from around the country who could match a face in the crowd. By putting it all together, Danny eventually pinpointed the bad guys. Smile, you too are on a candid (digital) camera database. What do you think? Is this a great way to nab criminals or just another version of Orwell's "1984"? Send us your thoughts; we'll save them in our database. ***************************************************************** * * * Kurt Dahl is vice president of information technology at * * The Seattle Times. The views he expresses here are his * * own and not necessarily those of The Seattle Times Company. * * * ***************************************************************** From: Joepilott@aol.com Date: 30 Apr 1995 14:39:51 -0400 Subject: Law Enforcement Digital Imaging My name is Joe Heppler, I am a Forensic Specialist with the Tacoma Police Dept. I have just finished reading your 2020world column for 04/30/95. I thought you would like to know that a Police Department in your own backyard was on the cutting edge of the technology you describe in your article. Tacoma P.D. has completed installation of one of the most sophisticated and one of the only Digital Imaging systems used by law enforcement on the West Coast. Our system includes Digital Enhancement/Capture capabilities for video tape and for fingerprints. With this system we are able to enhance fingerprints to levels that nearly double the chances of getting a match on a fingerprint lifted at a crime scene when it is searched against our database of previously stored fingerprint cards. With video we are able to capture and enhance a wide variety of surveillance tapes that provide investigators with a greater ability to identify suspects, vehicles, or whatever they are looking for, and until now could not see. A database for video is currently in the design stage. This system has not only created a way for us to identify fingerprints and individuals that before were unidentifiable, it also has saved us a great deal of time. By using this technology instead of conventional photography, a forensic specialist with Tacoma P.D. no longer needs to spend hours in the lab developing photos of fingerprints or spend a day or two preparing a display for court. These functions are now done in a matter of minutes and court displays are created in about one hour. The system we have designed is portable and can easily be taken into the field, which again greatly reduces the evidence processing time, which enhances the detectives ability to catch the suspect. Our system was recently featured on CNN's new Saturday afternoon show "Computer Connection". Myself and Erik Berg (another forensic specialist at Tacoma P.D.), will be speaking at the Pacific Northwest Divisions International Association for Identification conference in Vancouver WA in May, and Erik will be speaking at the World Conference in California in July. Our topic is Digital Imaging uses for law enforcement. This technology is a revolution in Forensics and we at Tacoma P.D. are on the Bleeding Edge. The world you mention in your article is a lot closer than the year 2020. If you would like to see our system or have any questions, I can be reached at E-mail address: Joe Pilott@aol.com or by work phone at 206-591-5540. My work hours are Tuesday-Saturday 0800-1600. Erik Berg can be reached at e-mail address 73543.47@compuserve.com or 206-591-5939. Sincerely, Joe Heppler Tacoma P.D. Forensics ------------------------------ From: Michael Ward Date: 01 May 1995 20:17:42 -0400 Subject: Clinton Administration Online Town Meeting ----------------------------------------------------------------- TAP-INFO - An Internet newsletter available from listproc@tap.org ----------------------------------------------------------------- TAXPAYER ASSETS PROJECT - INFORMATION POLICY NOTE May 1, 1995 National Electronic Open Meeting on Electronic Government - Easy Instructions - Mike Ward, TAP The Clinton Administration is sponsoring the National Electronic Open Meeting from May 1 - 14, 1995. The meeting is simply 5 Internet discussion groups on how to develop an effective and efficient "electronic government." More specifically, the discussions are on the subjects of: 1. Government Services 2. Government Benefit Programs 3. Access to Government Information 4. Participatory Democracy 5. Technology Issues related to an Electronic Government Participating in the Meeting via the Internet LISTSERVERS Send Email to: join@meeting.fedworld.gov In the body write: subscribe [topic of interest] your name The topic of interest should be either: services, benefits, infoaccs (for information access), partdemo (for participatory democracy), or techgoal for technology issues. USENET NEWSGROUPS There are five Usenet Newsgroups you can tune into. alt.gov.meeting.services alt.gov.meeting.benefits alt.gov.meeting.infoaccs alt.gov.meeting.partdemo alt.gov.meeting.techgoal WORLD WIDE WEB (WWW) Server An interactive WWW interface allows you to browse and send messages to any of the discussions. The URL is: http://meeting.fedworld.gov (The same messages are being distributed through listservers, usenet newsgroups, and WWW.) The Administrations' Announcement is archived at gopher essential.org in the taxpayer assets project directory. Michael Ward mike@tap.org --------------------------------------------------------------------- TAP-INFO is an Internet Distribution List provided by the Taxpayer Assets Project (TAP). TAP was founded by Ralph Nader to monitor the management of government property, including information systems and data, government funded R&D, spectrum allocation and other government assets. TAP-INFO reports on TAP activities relating to federal information policy. Tap-info is archived at tap.org. Subscription requests to tap-info to listproc@tap.org with the message: subscribe tap-info your name --------------------------------------------------------------------- Taxpayer Assets Project; P.O. Box 19367, Washington, DC 20036 v. 202/387-8030; f. 202/234-5176; internet: tap@tap.org --------------------------------------------------------------------- ------------------------------ From: mleach@equity2.sbi.com (Mike Leach) Date: 02 May 1995 16:14:50 GMT Subject: What are the VISA Codes? Organization: Some Data Inc. Recently, a senior citizen friend of mine may have been the intended victim of a phone scam. The caller said my friend had won (at least) $2500 worth of prizes... The grand prize was a car and she was one of only 5 finalists. All that was required was a small ($750) purchase made with her (my friend's) visa card. What intrigued me was that the caller wanted to know what code was next to the expiration date on her visa card! (I have 2 visa cards, both with different codes there.) Was this an attempt to figure out her Credit Limit or Rating? Does anyone have a list of all of these codes and what they mean? It might be time to switch to Discover! Please email any responses as our news feed is not too reliable. Thanks --- Michael Leach mleach@mhnj.sbi.com ( Be Bold -- Be Strong ) ------------------------------ From: armando@winternet.com (Armando Menendez III) Date: 02 May 1995 17:07:56 GMT Subject: Re: Censorship and Freedom of Speech Organization: StarNet Communications, Inc Leonard A DiMenna (ldimenna@osf1.gmu.edu) wrote: How do you decide which is censorship and which is freedom of speech? If you are telling someone that they "can't" see/read something - that's censorship! When you've decided that you know whether or not someone should be allowed to see/read something, you've overstepped the boundary. The possible exceptions will be parents and THEIR children, and only their children. It is very reasonable that certain people shouldn't have access to areas that have adult matieral. And why is it "very reasonable?" Again, someone is deciding what someone else can see/read. This is not only unnecessary, but potentially dangerous. Today "pornography" (in it's many definitions), tomorrow religious beliefs? Who descides what is moral and what isn't? Everyone makes that decision for themselves. Unfortunately, as a group, we can't even get everyone to agree with the "universal" moral beliefs. As a society, we should be able to dictate and enforce some "standard" beliefs (ie. "thou shalt not kill") that simply guarantee everyone some basic standards and give them a "fair" shot at life. Now the tough part is to get more than a handful of people to agree what those "basic standards" should be... There is no black and white only shades of gray. That is both the "problem with," and the "beauty of" life! It's how you deal, and cope, with those shades of gray. +--------------------------------------+-----------------------------------+ |mailto: armando@winternet.com | It is a poor parent who tries to | | http: //www.winternet.com/~armando/ | child proof the world, instead of | | | world proofing the child... | +--------------------------------------+-----------------------------------+ ------------------------------ From: jwarren@well.sf.ca.us (Jim Warren) Date: 28 Apr 1995 12:14:28 +0800 Subject: "Audience Tracking System" for Electronic Newspapers From: PATCLAWSON@delphi.com Date: 27 Apr 1995 04:13:11 -0400 (EDT) Subject: TeleGrafix News Release To: jwarren@well.com Advanced Internet Publishing and Audience Tracking System <<====== !!!! Debuts At Newspaper Convention (NEW ORLEANS) April 25, 1995 -- TeleGrafix Communications Inc. of Huntington Beach, Calif., and Cykic Software Inc. of San Diego have announced the first media server systems dedicated to electronic newspaper publishing and online broadcasting that integrate the Internet and World Wide Web with advanced database, audiotex, fax-on-demand, advertising placement and audience measurement technologies. ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ <====== !!! The media servers, which combine TeleGrafix's RIPscrip(TM) 2.0 online multimedia software with Cykic's MultiBase(TM) Internet networking platform, were demonstrated today for the 1,500 newspaper publishers attending the Newspaper Association of America's annual convention in New Orleans. <...> Multibase is a unique multiuser networking system and database environment for advanced online and Internet media systems. It operates on 386, 486 and Pentium-based IBM-compatible personal computers. Programs that run under dBASE, Clipper, FoxBase+ and other popular systems can be run under MultiBase with few changes. <...> The media servers combine TeleGrafix's Cybermedia Advertising Research System(TM) with Internet audience tracking technologies developed by Cykic. ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ These tools are ideal for consortia such as the newly announced New Century Network founded by eight major newspaper publishers, or by any other group seeking ways to put electronic newspapers before the widest possible audience. Publishers can now determine exactly who is accessing World Wide Web sites, ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ collecting precise individual user information. Advertisers may also receive ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ live, real-time reports on advertising reach and effectiveness. <...> Cykic Software was founded in 1987 and is privately held. Its networking and database technologies are widely used in the aerospace, defense and health care industries, by organizations such as the U.S. Department of Defense, Martin Marietta, Kaiser Permanente, TEAC of Korea, and John Deere & Co. Contact: Patrick Clawson, TeleGrafix Communications, Phone: (714) 379-2140. Fax: (714) 379-2132.. BBS: (714) 379-2133. Internet: patclawson@delphi.com ------------------------------ From: root@power.stu.rpi.edu (Will Pierce) Date: 28 Apr 1995 23:40:15 GMT Subject: A Hot Newsgroup: Privacy Helps Organization: POWER - Power Operations With Electronic Resources A hot newsgroup where a LOT of action is taking place is: alt.religion.scientology Anonymous remailers are being used by several people to post pertinent information about the church of scientology. Because of fears of retribution by the church (already experienced by several vocal critics), a number of posts to the group have appeared by people using anonymous remailers. The church of scientology already obtained the name, address, and phone number of one lady who was posting vocally against the church. This information was posted by A. Milne, including the name, address, and phone number of this lady's boyfriend. The raid on anon.penet.fi was also due to the church of scientology. Many people call this organization a cult, and documentary evidence (affidavits and court exhibits) also point to that conclusion. For this reason, I suggest you stop by alt.religion.scientology and look at what's present, check out some WWW pages, and make yourself heard. An set of interesting URLs is: http://www.xs4all.nl/~fonss/ http://www.mit.edu:8001/people/rnewman/scientology/home.html http://www.sky.net/~sloth/sci/sci_index.html http://www.mit.edu:8001/people/rnewman/scientology/home.html http://mail.bris.ac.uk/~plmlp/scum.html -Will -- -- Copyright 1995, Will Pierce -- root@power.stu.rpi.edu -- pier1@rpi.edu -- - Only when you care, can you be hurt. Indifference, the alternative? No. - - When I know I am right, I do not back down, or wither in adversity-- - -- I fight. I fight for what is right. I fight for my life every day. -- ------------------------------ From: "Dave Banisar" Date: 29 Apr 1995 13:22:30 -0400 Subject: CFP - Advanced Surveillance CALL FOR PAPERS Advanced Surveillance Technologies Sponsored by Privacy International, and Electronic Privacy Information Center 4 September 1995 Copenhagen, Denmark Overview Over the past decade, fundamental changes have taken place in the nature and the environment of surveillance. New information systems offer an unprecedented ability to identify, monitor and track a virtually limitless number of individuals. Some leading-edge technologies are likely to revolutionize the practice of surveillance. The factors of cost, scale, size, location and distance have, in many instances, become largely irrelevant. The impact of political and economic change throughout the world has also created unforeseen dimensions to surveillance. The evolution of a Global Information Infrastructure will have a profound impact on the scope of potential surveillance of individuals. The end of the cold war and the privatization of public sector activities has magnified the impact of change. The merging of technologies has also created new opportunities for wide-scale surveillance. The nature of surveillance has changed to the extent that modern information systems involve a pre-requisite of general surveillance of populations. The pursuit of perfect identity has created a rush to develop systems which create an intimacy between people and technology. Advanced biometric identification and sophisticated ID card systems combine with geographic tracking to create the potential to pinpoint the location of any individual. The use of distributed databases and data matching programs makes such tracking economically feasible on a large scale. Extraordinary advances have recently been made in the field of visual surveillance. Closed Circuit Television (CCTV) systems can digitally scan, record, reconfigure and identify human faces, even in very poor light conditions. Remote sensing through advanced satellite systems can combine with ground databases and geodemographic systems to create mass surveillance of human activity. The globalization of information systems will take information once and for all away from the protection and jurisdiction of national boundaries. The development of data havens and rogue data states is allowing highly sensitive personal information to be processed outside any legal protection. At a more intimate level, research is underway in more than a dozen countries with the aim of implanting microchip technology directly into the human brain. US and European medical institutes have already conducted many such operations. The creation of a direct link between the human brain and computer technology is at an advanced stage. Such procedures are initially aimed at stimulating dead senses and paralyzed limbs. Within two decades, it is possible that such implants will be at a sufficiently advanced stage to enable complex interaction between the brain and external technology. The science of nanotechnology, which involves the re-configuration of individual atoms and molecules, will present the potential for virtually undetectable covert surveillance. These and other developments are changing the nature and meaning of surveillance. Law has scarcely had time to address even the most visible of these changes. Public policy lags behind the technology by many years. The repercussions for privacy and for numerous other aspects of law and human rights need to be considered sooner rather than later. This one day conference will present an overview of these leading-edge technologies, and will assess the impact that they may have in the immediate future. Experts and analysts will discuss the nature and application of the new technologies, and the public policy that should be developed to cope with their use. The conference theme is unique, and interest in the event has already been expressed from throughout the world. Program contents The first session will assess new dimensions in current surveillance technologies. The remainder of the day will be devoted to exploring technologies which are in the formative stage of development. Preliminary List of Topics: o Advanced Satellite Surveillance o Microchip Implants o Nanotechnology o Biometrics and perfect identity o Advanced Geodemographic Systems o Data Havens and Rogue Data States o Information Warfare o Cryptography The conference will be held in Copenhagen, and is timed to coincide with the 17th annual international meeting of privacy and data protection commissioners. Number of participants : approximately one hundred Cost: US $75 - Individuals/non-profit organizations $175 - Commercial organizations Privacy International and the Electronic Privacy Information Center are now requesting abstracts for papers. Papers should be directed at a general audience, and should either present an overview of an aspect of advanced surveillance technology, or they should discuss the likely use and impact of the technology. Abstracts or papers can be emailed to Privacy International at: pi@privacy.org Alternatively, they can be sent to : Privacy International Washington Office 666 Pennsylvania Ave, SE, Suite 301 Washington, DC 20003 USA 1-202-544-9240 (phone) 1-202-547-5482 (fax) Web address: http://privacy.org/pi/ gopher/ftp cpsr.org /cpsr/privacy/privacy_international/ ====================================================================== _________________________________________________________________________ Subject: CFP - Advanced Surveillance... _________________________________________________________________________ David Banisar (Banisar@epic.org) * 202-544-9240 (tel) Electronic Privacy Information Center * 202-547-5482 (fax) 666 Pennsylvania Ave, SE, Suite 301 * ftp/gopher/wais cpsr.org Washington, DC 20003 * HTTP://epic.digicash.com/epic ------------------------------ From: "Prof. L. P. Levine" Date: 29 Dec 1994 10:50:22 -0600 (CST) Subject: Info on CPD [unchanged since 12/29/94] Organization: University of Wisconsin-Milwaukee The Computer Privacy Digest is a forum for discussion on the effect of technology on privacy or vice versa. The digest is moderated and gatewayed into the USENET newsgroup comp.society.privacy (Moderated). Submissions should be sent to comp-privacy@uwm.edu and administrative requests to comp-privacy-request@uwm.edu. This digest is a forum with information contributed via Internet eMail. Those who understand the technology also understand the ease of forgery in this very free medium. Statements, therefore, should be taken with a grain of salt and it should be clear that the actual contributor might not be the person whose email address is posted at the top. Any user who openly wishes to post anonymously should inform the moderator at the beginning of the posting. He will comply. If you read this from the comp.society.privacy newsgroup and wish to contribute a message, you should simply post your contribution. As a moderated newsgroup, attempts to post to the group are normally turned into eMail to the submission address below. On the other hand, if you read the digest eMailed to you, you generally need only use the Reply feature of your mailer to contribute. If you do so, it is best to modify the "Subject:" line of your mailing. Contributions to CPD should be submitted, with appropriate, substantive SUBJECT: line, otherwise they may be ignored. They must be relevant, sound, in good taste, objective, cogent, coherent, concise, and nonrepetitious. Diversity is welcome, but not personal attacks. Do not include entire previous messages in responses to them. Include your name & legitimate Internet FROM: address, especially from .UUCP and .BITNET folks. Anonymized mail is not accepted. All contributions considered as personal comments; usual disclaimers apply. All reuses of CPD material should respect stated copyright notices, and should cite the sources explicitly; as a courtesy; publications using CPD material should obtain permission from the contributors. Contributions generally are acknowledged within 24 hours of submission. If selected, they are printed within two or three days. The moderator reserves the right to delete extraneous quoted material. He may change the SUBJECT: line of an article in order to make it easier for the reader to follow a discussion. He will not, however, alter or edit or append to the text except for purely technical reasons. A library of back issues is available on ftp.cs.uwm.edu [129.89.9.18]. Login as "ftp" with password identifying yourid@yoursite. The archives are in the directory "pub/comp-privacy". People with gopher capability can most easily access the library at gopher.cs.uwm.edu. Mosaic users will find it at gopher://gopher.cs.uwm.edu. Older archives are also held at ftp.pica.army.mil [129.139.160.133]. ---------------------------------+----------------------------------------- Leonard P. Levine | Moderator of: Computer Privacy Digest Professor of Computer Science | and comp.society.privacy University of Wisconsin-Milwaukee | Post: comp-privacy@uwm.edu Box 784, Milwaukee WI 53201 | Information: comp-privacy-request@uwm.edu | Gopher: gopher.cs.uwm.edu levine@cs.uwm.edu | Mosaic: gopher://gopher.cs.uwm.edu ---------------------------------+----------------------------------------- ------------------------------ End of Computer Privacy Digest V6 #042 ****************************** .