home *** CD-ROM | disk | FTP | other *** search
Text File | 1994-07-17 | 51.3 KB | 1,109 lines |
-
- ************************************************************
- ************************************************************
- *** EFF News #1.02 (February 1, 1991) ***
- *** The Electronic Frontier Foundation, Inc. ***
- ************************************************************
- ************************************************************
-
-
- IN THIS ISSUE:
-
- Article 1: SEARCHES AND SEIZURES: A DIALOG ON THE WELL
-
- Article 2: PRODIGY RESPONSES AND LETTER TO THE TIMES
-
- Article 3: COMPUTERS, FREEDOM, & PRIVACY--A CONFERENCE
- ------------------------------------------------------------
-
-
- Editors: Mitch Kapor (mkapor@eff.org)
- Mike Godwin (mnemonic@eff.org)
-
- REPRINT PERMISSION: Material in EFF News may be reprinted if you
- cite the source. Where an individual author has asserted copyright in
- an article, please contact her directly for permission to reproduce.
-
- E-mail subscription requests: effnews-request@eff.org
- Editorial submissions: effnews@eff.org
-
- We can also be reached at:
-
- Electronic Frontier Foundation
- 155 Second St.
- Cambridge, MA 02141
-
- (617) 864-0665
- (617) 864-0866 (fax)
-
- USENET readers are encouraged to read this publication in the moderated
- newsgroup comp.org.eff.news. Unmoderated discussion of topics discussed
- here is found in comp.org.eff.talk.
-
- This publication is also distributed to members of the mailing list
- eff@well.sf.ca.us.
-
-
- ************************************************************
- *** Art. 1: SEARCHES AND SEIZURES: A DIALOG ON THE WELL ***
- ************************************************************
-
- [Editors' Note: The EFF believes it is important to establish a dialog
- between the law enforcement community and those who are concerned that
- law enforcement's investigation and prosecution of computer crimes
- properly acknowledges our civil liberties.
- A step toward such a dialog was taken recently on The Well (Whole
- Earth 'Lectronic Link), the Sausalito-based BBS/conferencing system
- associated with the Whole Earth Review. Gail Thackeray, an assistant
- attorney general from Arizona who has been central to Operation Sun
- Devil, initiated an exchange about search-and-seizure procedures that
- highlighted the different perspectives on this issue.
- Although Thackeray was bound by the confidentiality obligations of
- her position not to discuss specific cases, she was more than willing to
- offer her position on several general issues raised by computer searches
- and seizures.]
-
-
- #191: Gail Thackeray (gailt) Sat, Dec 1, '90 (11:23) 23 lines
-
- A general comment on search warrants: from some of the mail I've
- received, there seems to be a press-fostered (?) misconception that
- there have been "no-knock" warrants in hacker cases. I do not know of
- ANY, served by ANY agency. A "no-knock" warrant requires special
- permission of the court, and is very unusual. Standard search procedure
- (and I have witnessed more than I can count, both state & fed.) is to
- try to time it so that someone (preferably a grownup) is home, often a
- LOCAL unformed officer goes to the door, so that the occupants will
- recognize a uniform they know. This avoids the strangers-at-mydoor
- problem so well publicized by a late-60's FBI incident. The officers
- knock, explain that they are there to serve a search warrant, and the
- next step is to let the person read the warrant and ask questions.
-
- The first thing which happens inside is called "securing the scene" --
- the people in the residence/business are gathered together away from the
- possible evidence locations (computers, etc.). Hate to spoil the
- stories, but in the vast majority of cases, (and all the ones I have
- personally witnessed), everything is really quite calm. The teams I work
- with, once the scene is secure, will sit down and answer questions about
- procedure, what comes next, whether arrests are also being made
- (preferably not, in high-volume white-collar cases -- the search is
- usually NOT done at the "end" of an investigation, but is part of the
- overall investigation.)
-
- People have asked why in a white-collar case, the cops carry/use guns.
- Most departments have established policies governing this issue. Until
- the "scene is secure" the cops may have their guns out -- this phase
- usually takes about 2 minutes in the usual residence search -- it
- doesn't take long to find out who's in the house and establish that
- there is no danger. The single most dangerous police function (greatest
- number of police deaths) is the traffic stop: the lowest level of
- offense, in most states not really a crime, even. The second most
- dangerous is the domestic complaint -- not necessarily any crime
- involved.
-
- People are most secure in their own homes & cars -- and that's where
- they have the readiest access to weapons. That's when most danger to
- cops & bystanders arises. Miami Vice has it all backwards -- hardly any
- shootouts, statistically, in those cases, compared with traffic stops.
-
- Contrary to the underground-board chatter, it is not S.O.P. to hold
- shotguns to people's heads during the entire period of the search -- for
- one thing, their arms would get tired! I know of one incident where an
- adult who wouldn't calm down and sit and talk had to be physically
- restrained briefly, but the goal is just that -to get everybody in the
- place as quickly as possible away from the evidence and into an area
- where they can read the warrant and ask questions.
-
- Then the search team goes to work, while the people either leave or
- wait. Obviously, we prefer to have a responsible adult stay (if there
- isn't one there, we try to reach them and get them to come over) and
- read the warrant, receive the inventory of items taken, etc.
-
- Another commonly-asked question is, why was it necessary to have 5, 10
- etc. people on the search team? Usually, as soon as the scene has been
- secured, any extra people, like the uniformed officer who helps
- detectives with the entry, leave. In a typical residence search, there
- will remain enough officers to "find" and "record" the items to be
- taken, and others to pack them up and put them in the vehicles.
-
- There will also be someone, usually, with the occupants, identifying
- them and answering questions. If we brought only two officers, the
- intrusion into the home would last longer than it does when we have half
- a dozen. The search teams in our office (led by very experienced)
- officers) generally complete a residence search in somewhere around
- three hours -- from knocking on the door to leaving a copy of the
- inventory of items seized. Every case is different, and we never know
- who/what we will encounter until we get there, but all of the above is
- standard, with minor variations between agencies. The goal is to go in,
- do the job as quickly as possible, and leave as soon as possible.
-
- When everything works well, that's it. It is a good idea not to throw
- things at the officers -- it makes them nervous, and they make more
- mistakes when they're nervous...
-
- And finally, we really, truly, do a certain amount of "counselling" --
- especially where the likely target is a juvenile, whose parents have no
- idea what he's been up to. We explain the nature of the investigation,
- usually have to explain how the crime under investigation occurred, and
- answer lots of questions like, "what happens next?" Yes, we do,
- definitely, allow them to call their attorneys if they want (I actively
- encourage this, as it reassures them about the process). We answer as
- many questions as we can and refer them to available services.
- Obviously, no one enjoys the experience of having their home/office
- searched, but our teams are regularly thanked by parents for the way
- they handled the situation. (Cross my heart & hope to die, it's true.)
-
- Of course it doesn't always work this smoothly. But then, I am fortunate
- in working with outstanding officers, who are very good at this aspect
- of their jobs.
-
-
- #194: Bob Bickford (rab) Sat, Dec 1, '90 (13:28) 29 lines
-
- I respectively submit that your very interesting description of the
- process is contradicted by reliable testimony of numerous witnesses both
- in the Sun Devil cases and in many other sets of cases. You may protest
- that these examples are "atypical" but as far as those people are
- concerned the only thing that was 'typical' was what happened to them.
- Your perspective is that of someone who sees these frequently, and is
- probably quite used to the routine, and thus you have the benefit of
- seeing lots of "smooth" ones. The people who experience "non-smooth"
- invasions of their homes have a very different story to tell.
-
- Some of the most egregious examples of such "non-smooth" searches happen
- in drug cases, where it always seems that the officers in question
- entirely forget such niceties as the Constitutional rights of the
- accused, or indeed even those of the property owner or his/her guests.
- Even if we assume, arguendo, that there is some rational basis for the
- existing and rather extreme anti-drug laws, still there ought to be some
- respect in these procedures. I can only hope that a few of the injured
- parties will win multi-million dollar lawsuits against the government
- AND against the responsible officers and officials; that might tend to
- force the problem people back into line.
-
- (Uh, none of the latter is directed at Gail; I have no particular reason
- to think that she has had any unusual involvement in drug cases, nor to
- think that she would have behaved in the grossly unConstitutional ways I
- allude to even if she was involved.)
-
- (I hate having to make disclaimers, you know that?)
-
-
- #196: Gail Thackeray (gailt) Sat, Dec 1, '90 (16:04) 30 lines
-
- DEFINING TERMS:
-
- SUNDEVIL: a primarily-Secret-Service investigation into financial crimes
- (fraud, credit-card fraud, communications service losses, etc.) led by
- the Phoenix Secret Service office, with task force participation by the
- Arizona U.S. Attorney's office and the Arizona Attorney General's
- office.
-
- The Neidorf case was an independent investigation handled by the Secret
- Service and the U.S. Attorney's office in Chicago; the L.O.D.(BellSouth)
- cases were handled by the Secret Service/U.S. Atty in Atlanta. Other
- non-Sun Devil cases are several separate investigations centering around
- New York (NY State police, et al.), California, and points in between.
- You would never figure this out from the mainstream press, because no
- matter how many times they're told, they go for the sound bite (sound
- byte?) and not the facts. What I described above in my "search warrant"
- responses is everything I have witnessed, which includes Arizona and the
- Sundevil group of cases -and, if you check with your local P.D.,
- standard textbook procedure in most agencies.
-
- As to last comment, I can't think offhand what is meant by "forced
- entry" -- most search warrants permit that if all else fails, but since
- we usually try to find/get someone home first, it's rare -especially in
- the kind of cases we're especially interested in here. If by "forced
- entry" is meant the "sorry, don't want any" reaction to salesmen, then I
- guess we'd have to call most of them that. The only truly "reliable"
- accounts of anything are those tested in court & passed on by the trier
- of fact (jury, judge) -- in legalsystem terms. (Within that system,
- until it's been so tested, it's only opinion, no matter whose.)
-
- I guess I was right in assuming that raising the UGLY SPECTRE of search
- warrant procedure would get the conversation moving... :-)
-
-
- #199: Craig M. Neidorf (knight) Sat, Dec 1, '90 (19:58) 23 lines
-
- I'm glad that somebody official points out which cases were and were not
- Operation Sun-Devil. However, I personally doubt that any kid's parents
- are thanking the Secret Service for raiding their homes or wherever.
-
- Even if they appear to thank you, it is probably just their way of
- trying to make it look like they are being cooperative and hoping the
- gov will be cool with them, like thanking a cop that pulls you over for
- speeding and trying to be real nice so you don't get a ticket.
-
- Believe me, my parents do not thank Foley or Bill Cook for the hell they
- put us all through, and I think that I stand as a representative victim
- for all involved.
-
- Even the Secret Service admits that their standard operating procedures
- like restraining everyone involved and shoving their faces into the
- floor are out of place when dealing with these computer kids, but they
- have done little to adjust their tactics -- mostly I imagine because
- they don't care and a bunch of middle class kids who are more worried
- about convictions are not going to start a fight over being man-handled
- when they are hoping for the government to drop charges and so forth.
- They just want to be left alone.
-
-
- #200: Glenn S. Tenney (tenney) Sat, Dec 1, '90 (23:43) 24 lines
-
- I think that once you start looking objectively from the other side of
- the fence (regardless of which side you are on) you will understand the
- other side.
-
- Sure, every young cracker you (generic you) know isn't going to pull a
- gun, but standard procedures are in place to protect the lives of folks
- who do this day in and day out and *DO* face the odd life threatening
- situation. That does not mean that it would be a comfortable, relaxing
- situation to be a young cracker served with a warrant, but do try to see
- things from the other side. If it were you putting your life on the
- line, all it takes is once.
-
- Beyond the initial phase, the evidence has to be gathered. Now you might
- think, for example, why take a laser printer or a fax machine or an
- answering machine? Come on, open your view and see that during an
- investigation your computer might not start up properly if the printer
- isn't attached (I've known some gear that way), or the fax machine might
- have nasty numbers stored in it, or the answering machine might have a
- nasty message... Again, I'd hate to be on the wrong side of a seizure,
- but much of what happens makes sense.
-
- Sheesh! Am I sounding conservative? Uh, oh -- better turn in my old ACLU
- card :-)
-
-
- #201: Emmanuel Goldstein (emmanuel) Sun, Dec 2, '90 (02:47) 61 lines
-
- Almost EVERY case I've been acquainted with over the years involves some
- miscarriage of justice somewhere along the line. We simply cannot ignore
- the plain and simple fact that the punishment inflicted in these cases
- far outweighs whatever offense has been committed, if any. And that
- punishment begins the moment the knock on your door comes. Police
- officers do not pull their guns every time they pull over a motorist.
- They don't have guns drawn when they respond to a domestic argument. I
- see no reason therefore to employ such tactics when investigating a kid
- making free calls. It tells me that law enforcement has absolutely no
- idea what they're getting into when they encounter such a case. Is it a
- 14 year old kid or the leader of a terrorist group? Come on. I really
- think law enforcement is capable of telling the difference.
-
- Why was it necessary in the summer of 1987 for agents to pretend they
- were the United Parcel Service, complete with a truck? Did they really
- think they'd be refused entry if it was known they were the law? Or were
- they just having a good time playing with the perpetrators? How come it
- was necessary in that same year to completely break down a door in New
- York City with a battering ram? The family came home to find their door
- leaning against the wall! Is that a proper way to carry out a search
- warrant when people aren't home? Seems a bit heavy-handed to me.
-
- But that's minor compared to the numerous cases of guns being pulled.
- In one case, a kid awoke to find guns pointed at him. In another, guns
- were pulled on a kid coming out of the shower! In the ZOD case in New
- York this past summer, the kid's mother was terrified when a dozen
- strange men pushed by her waving guns and not bothering to clearly
- identify themselves. She thought they were about to be murdered and
- cried out to her neighbors to call the police before someone finally
- thought to say, "We ARE the police." This kind of treatment is
- inexcusable. Sooner or later somebody is going to get killed because of
- such a misunderstanding.
-
- Then there are the countless cases of equipment being mishandled,
- abused, and damaged. I'm sure Steve Jackson can fill in some of those
- details. I have firsthand accounts of agents dropping equipment on the
- floor and then saying "So sue me" to the suspect. There are so many more
- cases but I really think I've made the point. That being that law
- enforcement is handling this all wrong. You must remember the different
- perspectives at work here. Young teenagers have a completely different
- view of the world than most of us. They believe themselves to be
- invincible much of the time. They do not respond well to "messages"
- beamed at them through the media. It does not apply to them, in their
- view. To break through this, you have to reach them on a personal level,
- to show them that they are in very real danger. There are many ways of
- doing this. Currently, law enforcement seems to be using the most
- extreme methods.
-
- What do you think happens to someone who has been through a traumatic
- experience like the above? Do they suddenly fall into step and become
- good citizens? No. They become bitter and cynical. They believe the
- legal system is full of hypocrisies and double standards. You cannot
- possibly know the fear that is permanently etched into somebody when
- they undergo such an experience. I am thankful that I don't. But too
- many young kids today know this fear -- it's becoming almost normal in
- the hacker world. By using this approach, and by pledging to send
- hackers to jail, an opportunity is being lost. It IS possible to reach
- these people, but intimidation and incarceration are two strikes against
- that goal.
-
- --End of Article 1--
-
-
-
- ************************************************************
- *** Art. 2: PRODIGY RESPONSES AND A LETTER TO THE TIMES ***
- ************************************************************
-
-
- [Editors' Note: In EFF News 1.00, we editorialized about the Sears/IBM-
- sponsored information service, Prodigy. We criticized Prodigy's
- editorial policies and suggested that Prodigy's problems signify a need
- for government policies that promote the establishment by private
- entities of more responsive information services. The following are two
- responses to the editorial, as well as a letter to the New York Times by
- Jerry Berman of the American Civil Liberties Union and Marc Rotenberg of
- Computer Professionals for Social Responsibility.]
-
-
- Response 1: FROM JOHN AHRENS:
-
- I have just received the first issue of EFF News. Let me be among the
- first to congratulate you on the quality of both the layout and the
- writing. I was beginning to fear that Cyberspace would be a realm
- without formatting and without grammar. EFF News sets a standard.
-
- In the spirit of the frontier that EFF wants to "civilize" (surely you
- don't really mean this), I would like to comment on one of the articles.
- Article 6 observes that the Prodigy debacle "illustrates the fallacy
- that 'pure' market forces always can be relied upon to move
- manufacturers and service providers in the direction of open
- communication," and calls for a national network-access policy. But
- surely this has it backwards.
-
- The market *is* providing open communications. Only ten years after the
- appearance of personal computers, we have thousands of BBSs, the fidonet
- which connects many of them and is gatewayed to the Internet, and
- systems such as the Cleveland Free-net. Virtually every self-respecting
- institution of higher education is connected to BitNet or the Internet,
- and provides more or less unrestricted access to faculty, and slightly
- more limited access to students. Soon, children in elementary and
- secondary schools will be joining the network in large numbers. And
- there are all of the abuses and crimes and generally rowdy activities
- that one would expect in such a situation.
-
- A national network-access policy, would regulate services offered to the
- public to ensure that they met certain standards of reliability and
- confidentially, and to ensure that everyone was charged a fair price.
- Such regulations would have a chilling effect on the emerging Cyberspace
- free zones. They would ensure that we get what the bureaucrats think we
- need, rather than what we want.
-
- I suggest that EFF and its supporters should give priority to resisting
- the emergence of any policy--national, state, or local--on networking.
- Let's not civilize the frontier. Let's push back its boundaries, all the
- way to the edge of the world.
-
- --John Ahrens
- | Internet: AHRENS%UHAVAX.DECNET@UHASUN.HARTFORD.EDU |
- ------------------------------------------------------------------------
- | BitNet: ahrens@hartford | Snail: Department of Philosophy |
- | ahrensj@sjc | University of Hartford |
- | Phone: 203-243-4743 | West Hartford, CT 06117 |
- | 203-236-6891 | |
- ------------------------------------------------------------------------
-
- Response 2: FROM BRAD TEMPLETON:
-
- Subject: EFF and Prodigy
-
- In article <1990Dec10.211625.9536@eff.org> mkapor@eff.org (Mitch Kapor)
- writes:
-
- >Although EFF is not involved at the moment in any activities
- >directly relating to the Prodigy dispute, we believe that the dispute
- >touches some basic issues with which we are very concerned, and that it
- >illustrates the potential dangers of allowing private entities such as
- >large corporations to try and dictate the market for online electronic
- >services.
-
- My personal opinion is that the EFF can do little but stand (almost)
- wholly behind Prodigy on this one, as distasteful as that may sound to
- some.
-
- It is my impression that one of the EFF's goals is to get lawmakers to
- realize that electronic publication deserves all the rights and
- protections that more traditional forms get.
-
- That means full first amendment protection for electronic publication,
- and no government interference. We must realize that the 1st amendment
- to your constitution is a double-edge sword, however. You must be
- prepared to vigourously defend the right to publish in ways you don't
- like.
-
- Prodigy has made it clear from day 1 that they view themselves as an
- edited publication. I feel it goes against what I feel are the EFF's
- principles to even suggest to them what they should or should not
- publish. The EFF should be fighting for their right to publish and
- operate as they see fit. Only the market and the will of Prodigy's
- owners should influence it.
-
- (I do not say that Mitch was attempting to tell Prodigy what to publish
- and what not to. I merely say that I think the EFF's role should be to
- defend their right to make that decision.)
-
- The one mitigating factor here is that Prodigy made a serious mistake
- and actually told people to take discussions into E-mail. They did not
- realize how much traffic that would generate, with some users sending
- thousands of messages per day. So we can sympathise with those users who
- were told to go to E-mail and later told that this avenue would only be
- open to them at a high added cost. But this was a bad business decision,
- and nothing more, in my opinion. It will lose them customers.
-
- Many people don't realize the economics of offering flat-rate service.
- Flat-rate services only pretend to offer unlimited use. They do this
- under the assumption that few, if anybody, we really take them to the
- limit. If too many people take you up on it (as happened with PC
- Pursuit and now Prodigy) you just can't offer flat rate any more. It's a
- fact of business life.
-
- The problem is that computers magnify this difficulty. With a computer
- you can use far more of a flat rate service than a human being could
- alone. Thus PC-Pursuit broke down when people started making permanent
- connections or running USENET feeds.
-
- We can, of course, encourage Prodigy to offer a more unrestricted
- service. In fact GEnie, where I am a SYSOP, is getting a lot of mileage
- out of the fact that their new flat-rate service offers things that are
- more a forum than a magazine. But it must be up to the market, in the
- end, to decide between Prodigy, GEnie and a zillion other forum services
- of all kinds. -Brad Templeton, ClariNet Communications Corp. Waterloo,
- Ontario 519/884-7473
-
-
- Letter to The New York Times: JERRY BERMAN AND MARC ROTENBERG:
-
- Marc Rotenberg writes:
-
- Jerry Berman (ACLU) and I wrote a short article that appeared in the New
- York Times this morning (Sunday, 1/6/91, business section). It was a
- response to the article by Prodigy's Geoff Moore. Comments/criticisms
- would be welcome/appreciated.
-
- Here's the NYT article:
-
- "Business Forum: Free Speech in an Electronic Age", The New York Times,
- January 6, 1991
-
- - Three weeks ago, Geoffrey E. Moore, director of marketing and
- communications at Prodigy Services Company, wrote in the Forum that
- Prodigy has no First Amendment obligation to carry every message its
- subscribers post on the company's electronic bulletin board. Jerry
- Berman of the American Civil Liberties Union and Marc Rotenberg of
- Computer Professionals for Social Responsibility argue that there is
- more to the controversy.
-
- "Prodigy's Forum article on its electronic service and the First
- Amendment tells only part of the story. The recent criticism that
- brought Prodigy into the national spotlight was not about Prodigy's
- decision to curtail public postings about suicide, crime, sex or
- pregnancy, as Prodigy suggests. It was rather Prodigy's effort to
- suppress a consumer protest that began when Prodigy announced a hefty
- increase in the cost of electronic mail.
-
- "When some of Prodigy's subscribers learned of the proposed rate
- hike, they posted public messages on the Prodigy bulletin board
- available to other subscribers. In early November, Prodigy told
- subscribers that they would no longer allow the public posting of
- messages about Prodigy's fee policy. So Prodigy subscribers turned to
- the private electronic mail to continue their protest. Besides sending
- private messages to each other, these subscribers also sent private
- messages to businesses which sell or advertise products on Prodigy.
- Then prodigy stepped in and ended the protesters' memberships without
- notice. Recently, Prodigy instituted a rule prohibiting all electronic-
- mail communications with merchants except those directly related to
- orders and purchase.
-
- "The Prodigy dispute resembles some of the free speech cases
- involving shopping centers. Although shopping centers are private
- property and established for commercial activity, state courts have
- recognized that they may also be a public forum where free speech may be
- exercised. As services like Prodigy attract more and more people to
- shop in their electronic mall, they are also creating a new way for
- people to communicate with each other. The courts may some day hold
- that electronic shopping networks like Prodigy are the public forums of
- the 21st century.
-
- "Prodigy contends that there are many other electronic forums to
- satisfy free speech needs. Most of these services are small mom-and-pop
- operations that can hardly compete with Prodigy which has invested about
- one billion dollars to reach a mass market with its easy-to-use service.
- Prodigy also says that it is not a common carrier, like the local phone
- companies, required to carry all messages. That may be true, but it
- raises further concerns about free speech. If the big electronic
- networks are run on Prodigy's "family hour" principles, and if the
- networks are carved-up among private providers with no common carrier
- obligations, electronic free speech and public debate will be
- significantly limited.
-
- "Prodigy's dispute with its subscribers show why, to protect
- First Amendment rights in the electronic age, we need to press Congress
- to establish the infrastructure for an accessible public form and
- electronic mail service operating under common carrier principles."
-
-
- --End of Article 2--
-
-
- ************************************************************
- *** Art. 3: COMPUTERS, FREEDOM, & PRIVACY--A CONFERENCE ***
- ************************************************************
-
- ************************************
- * The First Conference *
- * on *
- * COMPUTERS, FREEDOM & PRIVACY *
- ************************************
-
-
- Pursuing Policies for the Information Age in the
- Bicentennial Year of the Bill of Rights
-
- Tutorials & Conference, Limited to 600 Participants
- Monday-Thursday, March 25-28, 1991
-
- SFO Airport Marriott Hotel, Burlingame, CA, On the San Francisco
- Peninsula
-
- Co-sponsors & cooperating organizations include:
- Institute of Electrical and Electronics Engineers-USA
- Association for Computing Machinery Electronic Networking
- Association
- Electronic Frontier Foundation Videotex Industry Association
- American Civil Liberties Union Cato Institute
- IEEE Intellectual Property Committee ACM SIG on Software
- ACM Special Interest Group on Computers & Society
- ACM Committee on Scientific Freedom and Human Rights
- IEEE-USA Committee on Communications and Information Policy
- Autodesk, Inc. Apple Computer, Inc. The WELL Portal
- Communications
-
- Sponsored by Computer Professionals for Social Responsibility
- A nonprofit, educational corporation (415)322-3778
- e-mail: cfp@well.sf.ca.us fax: (415)851-2814
-
- The sponsoring & cooperating organizations support this project to
- enhance communication, understanding and consensus about these crucial issues,
- but do not necessarily endorse views that may be expressed by participants.
-
-
-
- ABOUT COMPUTERS, FREEDOM & PRIVACY --
-
- We are at a crossroads as individuals, organizations and governments
- increasingly use and depend on computers and computer networks. Within
- ten years, most information will be utilized and exchanged
- electronically.
-
- We are in the pivotal decade when computer facilities and
- policies,worldwide, will mature. They can allow and encourage mass
- access to and useof great information processing and networking power,
- and control potential
- abuse.
-
- For potent personal benefit, business improvement and national well-
- being,information and its efficient access are becoming economically
- available to individuals, organizations and governments. Such access
- can greatly enhancesound decisions based on timely access to essential
- knowledge.
-
- Data on individuals and groups is being collected, computerized
- andexchanged at an exponentially increasing rate within numerous
- agencies and organizations.This has great legitimate value, but has also
- prompted increasing concerns regarding issues of personal privacy.
-
- To assure sound and equitable decisions, the public, the press and a
- broad range of policy-makers must understand and openly discuss these
- issues, their interactions and their implications for the future.
-
- To protect the fundamental freedoms and personal privacy that are the
- foundation of any free people, all parties must be informed, and all
- must share in shaping and enhancing the great potential of the
- Information Age.
-
-
-
- ABOUT THE TUTORIALS (Monday) --
-
- Seminars on March 25th offer parallel introductions to different
- disciplines that converge in this conference. These are surveys for
- individuals not already expert in the topics presented. They are half-
- day tutorials, a.m. and p.m. Lecturers, topics, descriptions and times
- were confirmed as of a late January press deadline, but may be subject
- to change.
-
- HOW COMPUTER CRIME IS INVESTIGATED
- This reviews investigation, search, seizure and evidence requirements
- for pursuing computer crime. It is for computer users, computer owners,
- BBS sysops and investigators and attorneys unfamiliar with computer
- crime practices. [p.m.]
- -- Don Ingraham, nationally-known computer crime prosecutor,
- Asst. District Attorney, Alameda County, California.
-
- INFORMATION SECURITY
- A primer for managers, lawyers and educators, this surveys computer
- crime,risks, due care, trusted systems, safeguards & other security
- issues.[p.m.]
- -- Donn Parker, a leading consultant in information security
- and computer crime, SRI International.
-
- HOW COMPUTER CRACKERS CRACK!
- Reviews real cases and how to recognize, prevent and investigate
- computer security breaches. For computer center managers,
- administrators, sysops, law enforcement and press . [a.m.]
- -- Russell Brand, computer security specialist; programmer, Reasoning
- Sys..
-
- COMPUTER COMMUNICATIONS & THE GLOBAL MATRIX
- Survey of electronic-mail and teleconferencing services, access to
- networked information services and remote computing applications, and an
- overview of the worldwide computer matrix. [a.m.]
- -- John Quarterman, author of, *The Matrix: Computer Networks &
- Conferencing Systems Worldwide*; Texas Internet Consulting.
-
- LOW-COST NETWORKS & COMPUTER BULLETIN BOARD SYSTEMS
- (BBS)
- Electronic-mail, bulletin board systems and tele-conferencing
- alternatives with personal computers; outlines low-cost PC networks and
- gateways to the global matrix. [p.m.]
- -- Mark Graham, co-founder of Institute for Global Communications,
- PeaceNet and EcoNet; Pandora Systems; and
- -- Tim Pozar, well-known expert on the 10,000-computer FidoNet.
-
- FEDERAL LEGISLATION IMPACTING COMPUTER USE
- Detailed review of landmark federal statutes impacting access to
- information, privacy of personal information, computer security and
- computer crime. [p.m.]
- -- Marc Rotenberg, former congressional counsel and expert on federal
- computer legislation, CPSR, Washington DC.
-
- COMPUTER-RELATED LEGISLATION WITHIN STATES
- Survey of states' differing statutes that impact access to
- information, privacy of information, computer security and computer
- crime. [a.m.]
- -- Buck Bloombecker, nationally-known researcher, lecturer and
- consultant on computer security, crime & legislation.
-
- IMPACTS ON THE U.S. OF OTHER NATIONS' PRIVACY INITIATIVES
- European Economic Community and other international privacy and data
- protection plans affecting trans-border data-flow and computer
- communications, greatly impacting U.S. information practices and
- international business. [a.m.]
- -- Ron Plesser, former General Counsel, U.S. Privacy Protection Study
- Commission; attorney, Piper & Marbury, Washington, DC.
-
-
-
- ABOUT THE CONFERENCE SESSIONS (Tuesday-Thursday) --
-
- Single-track Conference & banquet sessions Mar.26th through Mar.28th
- offer diverse speakers & panel discussions including:
-
- Key speakers include:
-
- * Laurence H. Tribe,
- Professor of Constitutional Law, Harvard Law School [Tuesday morning]:
- "The Constitution in Cyberspace: Law & Liberty Beyond the Electronic
- Frontier".
-
- * Eli M. Noam,
- Director, Center for Telecommunications & Information Studies, Columbia
- University [Tuesday banquet]:
- "Network Environments of the Future: Reconciling Free Speech and
- Freedom of Association".
-
- * William A. Bayse,
- FBI's Assistant Director, Technical Services Division [Wednesday
- banquet]:
- "Balancing Computer Security Capabilities with Privacy and Integrity".
-
-
- THE CONSTITUTION IN THE INFORMATION AGE [opening session]
- Introductory remarks. Major policy proposals regarding electronic
- communications and Constitutional protections, by Prof. Laurence Tribe.
-
- ELECTRONIC SPEECH, PRESS & ASSEMBLY
- Freedoms and responsibilities regarding electronic speech, public and
- private electronic assembly, electronic publishing; issues of prior
- restraint and chilling effects of monitoring.
-
- COMPUTER-BASED SURVEILLANCE OF INDIVIDUALS
- Monitoring electronic-mail, public & private teleconferences,
- electronic bulletin boards, publications and subscribers; monitoring
- individuals, work performance, buying habits and lifestyles.
-
- PERSONAL INFORMATION & PRIVACY
- Government and private collection, sharing, marketing, verification,
- use, protection of, access to and responsibility for personal data,
- including buying patterns, viewing habits, lifestyle, work, health,
- school, census, voter, tax, financial and consumer information.
-
- ETHICS & EDUCATION
- Ethical principles for individuals, system administrators,
- organizations, corporations and government; copying of data, copying of
- software, distributing confidential information; relations to computer
- education and computer law.
-
- TRENDS IN COMPUTER NETWORKS
- Overview and prognosis of computing capabilities and networking as
- they impact personal privacy, confidentiality, security, one-to-one and
- many-to-one communications, and access to information about government,
- business and society.
-
- LAW ENFORCEMENT PRACTICES & PROBLEMS
- Issues relating to investigation, prosecution, due process and
- deterring computer crimes, now and in the future; use of computers to
- aid law enforcement.
-
- LAW ENFORCEMENT & CIVIL LIBERTIES
- Interaction of computer crime, law enforcement and civil liberties;
- issues of search, seizure and sanctions, especially as applied to shared
- or networked information, software and equipment.
-
- LEGISLATION & REGULATION
- Legislative and regulatory roles in protecting privacy and insuring
- access; legal problems posed by computing and computer networks;
- approaches to improving related government processes.
-
- ACCESS TO GOVERNMENT INFORMATION
- Implementing individual and corporate access to federal, state & local
- information about communities, corporations, legislation,
- administration, the courts and public figures; allowing access while
- protecting confidentiality.
-
- INTERNATIONAL PERSPECTIVES & IMPACTS
- Other nations' models for protecting personal information and
- communications, and for granting access to government information;
- existing and developing laws including EC'92; requirements for trans-
- national data-flow and their potential impacts; implications for
- personal expression; accountability issues.
-
- WHERE DO WE GO FROM HERE? [closing session]
- Perspectives, recommendations and commitments of participants from the
- major interest groups, proposed next steps to protect personal privacy,
- protect fundamental freedoms and encourage responsible policies and
- action.
-
- ALSO: Tuesday and Wednesday will include structured opportunities for
- attendees to identify groups with whom they want to establish contact
- and, if they wish, announce topics they would like to discuss, one on
- one.
-
-
- ABOUT JUST SOME OF THE CONFERENCE SPEAKERS --
-
- Ken Allen, Senior Vice President for Governmental Relations, Information
- Industries Association (IIA).
-
- Sharon Beckman, civil rights and criminal defense attorney and
- Electronic Frontier Foundation litigation counsel, Silverglate & Good.
-
- Jerry Berman, Director of the ACLU's Project on Information Technology
- and Communications Policy Fellow, Benton Foundation.
-
- Paul Bernstein, columnist, *Trial* mag.; Electronic Bar Assn. Legal
- Info. Network administrator; LawMUG BBS sysop; edits on-line lawyers'
- newsletter.
-
- Sally Bowman, promotes responsible computing practices through school
- teaching units; Director, Computer Learning Foundation.
-
- David Burnham, author, *Rise of the Computer State*; former New York
- Times investigative reporter; specialist in IRS & Freedom of Information
- Act.
-
- Mary Culnan, co-authored major credit reporting policies presented to
- Congress; School of Business Administration, Georgetown University.
-
- Dorothy Denning, received Aerospace's 1990 Distinguished Lecturer in
- Computer Security award; author, *Cryptography & Data Security*.
-
- Peter Denning, Editor, 1990 *Computers Under Attack*; past President,
- ACM; founding Director, RIACS; editor, *Communications of the ACM*.
-
- Dave Farber, co-founder, CSNET; member, National Research Council's
- Computer Science & Telecommunications Board; University of
- Pennsylvania.
-
- Cliff Figallo, Director of the WELL (the Whole Earth 'Lectronic Link),
- one of the best-reputed of the public teleconferencing systems.
-
- David Flaherty, Canadian surveillance expert, Professor of History and
- Law at the University of Western Ontario.
-
- John Ford, Public Relations Director for Equifax, one of the nation's
- largest providers of personal and credit information.
-
- Bob Gellman, Chief Counsel, U.S. House of Representatives Governmental
- Information Subcommittee.
-
- Janlori Goldman, Director of the ACLU's Project on Privacy and
- Technology, Washington, DC.
-
- Harry Hammit, Editor, Access Reports, focusing on access to and freedom
- of information, Washington, DC.
-
- Martin Hellman, identified potential hazards in federal DES national
- encryption standard; co-invented public-key encryption; Stanford.
-
- Evan Hendricks, Editor/Publisher *Privacy Times* newsletter, Washington,
- DC.
-
- Lance Hoffman, public policy researcher and Professor of Electrical
- Engineering & Computer Science at George Washington University.
-
- Don Ingraham, wrote the first-ever search warrant for magnetic media,
- computer crime prosecutor; Asst. District Attorney, Alameda County.
-
- Bob Jacobson, former Prin. Consultant, California State Assembly
- Utilities & Commerce Committee; drafted landmark computer
- communications legislation.
-
- Mitch Kapor, co-founder, Electronic Frontier Foundation; founder, Lotus
- Corp.; received DPMA's 1990 Distinguished Information Science Award.
-
- Tom Mandel, Director of the Leading Edge Values & Lifestyles Program at
- SRI International.
-
- John McMullen, well-known on-line journalist; co-authors "Newsbytes"
- column on GEnie and Online America.
-
- Peter Neumann, member, National Research Councils's 1990 *Computers at
- Risk* comm.; Chair, ACM Comm.on Computers & Public Policy; moderates
- RISKS Forum.
-
- Donn Parker, perhaps the best-known international consultant and author
- on information security and computer crime, SRI International.
-
- Ron Plesser, former General Counsel, U.S. Privacy Protection Study
- Commission; attorney, Piper & Marbury, Washington DC.
-
- John Quarterman, author of the definitive study, *The Matrix: Computer
- Networks and Conferencing Systems Worldwide*; Texas Internet Consulting.
-
- Jack Rickard, Editor of *Boardwatch* magazine, perhaps the best news
- source about computer bulletin boards; runs online information service.
-
- Tom Riley, Canadian specialist in international computer communications
- and privacy issues; Riley Information Services, Inc.
-
- Lance Rose, co-author of *Syslaw*, about the law applied to on-line
- situations; attorney, Wallace & Rose.
-
- Marc Rotenberg, expert in federal computer and privacy law; Computer
- Professionals for Social Responsibility, Washington office Director.
-
- Noel Shipman, attorney for plaintiffs in electronic-mail privacy
- landmark 1990 litigation against Epson America.
-
- Harvey Silverglate, Electronic Frontier Foundation litigation counsel,
- specialist in criminal defense and civil rights, Silverglate & Good.
-
- Gail Thackeray, computer crime prosecutor; involved in Secret Service's
- "Operation Sun Devil", former Arizona Asst. State Attorney General.
-
- Robert Veeder, Acting Chief, Information Policy Branch, Office of
- Information Regulatory Affairs, U.S. Office of Management & Budget
- (OMB).
-
- Willis Ware, Chair, U.S. Computer Systems Security & Privacy Advisory
- Board established by Congress in 1987; Fellow, RAND Corporation.
-
- Alan Westin, leader in early privacy legislation; co-authored landmark
- *Equifax Report on Consumers in the Information Age*; Columbia
- University.
-
- Sheldon Zenner, former federal prosecutor in Chicago; defended *Phrack*
- electronic publisher, Craig Neidorf; Katten, Muchin & Zavis.
-
- CONFERENCE CHAIR
- Jim Warren, Autodesk, Inc. & MicroTimes
- 415-851-7075, jwarren@well.sf.ca.us / e-mail
-
- PROGRAM COMMITTEE
- Dorothy Denning, Digital Equipment Corporation
- Peter Denning, Research Inst. for Advanced Comp.Sci.
- Les Earnest, Midpeninsula ACLU & Stanford U., ret.
- Elliot Fabric, Attorney at Law
- Mark Graham, Pandora Systems
- Don Ingraham, Alameda County District AttyUs Office
- Bruce Koball, Motion West
- Marc Rotenberg, Comp. Prof. for Social Responsibility
- Glenn Tenney, Fantasia Systems & The Hackers Conf.
-
- ADVISORS
- Ron Anderson, ACM SIGCAS & Univ. of Minnesota
- John Perry Barlow, Electronic Frontier Foundation
- Jerry Berman, ACLU & Benton Foundation
- Dave Caulkins, USSR GlasNet
- Vint Cerf, Corp.for National Research Initiatives
- Margaret Chambers, Electronic Networking Assn.
- Steve Cisler, Apple Computer, Inc.
- Whit Diffie, Northern Telecom
- Mary Eisenhart, MicroTimes
- Dave Farber, University of Pennsylvania
- Cliff Figallo, The WELL
- John Gilmore, Cygnus Support
- Adele Goldberg, ParcPlace Systems
- Terry Gross, Rabinowitz, Boudin, Standard, et al
- Keith Henson, consultant & Alcor
- Lance Hoffman, George Washington University
- Dave Hughes, Chariot Communications
- Bob Jacobson, Human Interface Technology Lab.
- Mitch Kapor, Electronic Frontier Foundation
- Roger Karraker, Santa Rosa College
- Tom Mandel, SRI International
- John McMullen, NewsBytes
- Peter Neumann, SRI International
- Dave Redell, Digital Equipment Corporation
- Ken Rosenblattt, Santa Clara Cnty. Dist. Atty's Office
- Paul Saffo, Institute for the Future
- Gail Thackeray, Arizona Attorney GeneralUs Office
- Jay Thorwaldson, Palo Alto Medical Foundation
- Terry Winograd, CPSR & Stanford University
- Sheldon Zenner, Katten, Muchin, & Zavis
- Affiliations are listed only for identification purposes.
-
-
- ****************************
- * Application to Attend *
- ****************************
-
- First Conference on Computers, Freedom & Privacy, March 25-28, 1991
- Monday: Tutorials, Tuesday-Thursday: Conference Sessions & Banquets
- SFO Marriott Hotel, 1800 Old Bayshore Hwy., Burlingame CA 94010
- For hotel reservations at a special $99 Conference rate, call: (800)228-
- 9290
-
- Due to the size of the facility, Conference registration is limited to
- 600 people. Tutorials registration is also limited. Balanced
- participation from all of the diverse interest groups is being actively
- encouraged.
- Interested individuals should apply early to assure
- acceptance.Applications will be accepted primarily on a first-come,
- first-served basis, while encouraging balanced participation.
-
-
- REGISTRATION FEES: If payment received: by Feb.8 2/8-3/15 after 3/15
- Conference (3 days, incl.luncheons, banquets) $295 $350 $400
- Tutorials (full day, 1 or 2 seminars) $95 $145 $195
- Please circle fee and date selections.
- Please make checks payable to "Computers, Freedom & Privacy / CPSR".
- Please do not send cash. (If space is sold out, the uncashed check will
- be voided and promptly returned.)
-
- Check the "[x]" if information should NOT appear in the published
- Attendee Roster. (Roster will greatly assist ongoing communications.)
- [ ] name:
- [ ] title:
- [ ] organization:
- [ ] mailing address:
- [ ] city ST Zip:
- [ ] phone(s):
- [ ] fax:
- [ ] e-mail:
- Name-tag name:
- Name-tag title:
- Name-tag organization:
- Expect to stay at SFO Marriott? [ ]yes [ ]no
-
- To aid in balancing participation among groups,
- please check all significantly applicable items.
- [ ] user of computers or computer networking
- [ ] user of electronic-mail services
- [ ] user of teleconferencing services
- [ ] user of direct marketing services
- [ ] user of computerized personal information
- [ ] user of government information
- [ ] computer professional
- [ ] BBS sysop (bulletin board system operator)
- [ ] systems administrator / infosystems manager
- [ ] network administrator
- [ ] computer / communications security specialist
- [ ] provider of data communications services
- [ ] provider of electronic-mail services
- [ ] provider of teleconferencing services
- [ ] provider of direct marketing services
- [ ] provider of computerized personal information
- [ ] provider of government information
- [ ] legislative official or staffqfederalqstate
- [ ] regulatory official or staff [ ]federal [ ]state
- [ ] law enforcement [ ]federal [ ]state [ ]local
- [ ] prosecutor [ ]federal [ ]state [ ]local
- [ ] judicial representative [ ]federal [ ]state [ ]local
- [ ] criminal defense attorney
- [ ] corporate or litigation attorney
- [ ] civil liberties specialist
- [ ] journalist [ ]newspaper [ ]television [ ]radio [ ]other
- [ ] other:
- [ ] other:
-
- Privacy Notice:
- This information will not be sold, rented, loaned, exchanged or used for
- any purpose other than official CPSR activity. CPSR may elect to send
- information about other activities, but such mailings will always
- originate with CPSR.
-
- Please mail form and payment to Conference office:
- CFP Conference, 345 Swett Road, Woodside CA 94062
- e-mail: cfp@well.sf.ca.us; fax: (415)851-2814
- Conference Chair: Jim Warren, (415)851-7075
-
- Sponsor: Computer Professionals for Social Responsibility,
- 415)322-3778, a nonprofit, educational corporation [Internal
- Revenue Code 501(c)(3)]
-
-
- OTHER INFORMATION ABOUT THIS PREMIER CONFERENCE --
-
- This is an intensive, multi-disciplinary survey Conference for those
- concerned with computing, teleconferencing, electronic mail,
- computerized personal information, direct marketing information,
- government data, etc. -- and those concerned with computer-related
- legislation, regulation, computer security, law enforcement and national
- and international policies that impact civil liberties, responsible
- exercise of freedom and equitable protection of privacy in this global
- Information Age.
-
- For the first time, this 4-day event will bring together
- representatives from all of these groups and more, all in one place, all
- at one time.
-
- Many of the recognized leaders and strongest advocates among the
- various groups interested in the issues of the conference will discuss
- their concerns and proposals.
-
- Attendance will be limited to 600 people. Balanced representation
- from the diverse groups interested in these issues is being encouraged.
- Please see the enclosed application for details.
-
- To inform participants about topics beyond their specialties, a number
- of half-day seminars are scheduled in parallel for the first day
- (Monday, March 25th). These tutorials will explore relevant issues in
- computing, networking, civil liberties, regulation, the law and law
- enforcement. Each tutorial is designed for those who are experienced in
- one area, but are less expert in the tutorials' topics.
-
- To explore the interactions and ramifications of the issues,
- conference talks and panel discussions are scheduled in a single track
- for the remaining three days (Tuesday-Thursday, March 26th-28th). These
- will emphasize balanced representation of all major views, especially
- including probing questions and discussion.
-
- Explicit Conference events to foster communication across disciplines
- are planned. Working luncheons, major breaks and two evening banquets
- will further encourage individual and small-group discussions.
-
- Please copy, post & circulate! [version 2.7, updated 1/26/91]
-
-
-
- --End of Article 3--
-
- :
-
-
- Downloaded From P-80 International Information Systems 304-744-2253
-