803 lines
40 KiB
Plaintext
803 lines
40 KiB
Plaintext
COMPUTERS, FREEDOM, AND PRIVACY-2: A REPORT
|
|
by Steve Cisler (sac@apple.com)
|
|
|
|
|
|
[The opinions and views expressed are those of the author, Steve Cisler,
|
|
and not necessarily those of Apple Computer, Inc. Misquotes of people's
|
|
statements are my responsibility. Permission is granted for re-posting
|
|
in electronic form or printing in whole or in part by non-profit
|
|
organizations or individuals. Transformations or mutations into
|
|
musicals, docudramas, morality plays, or wacky sitcoms remain the right
|
|
of the author. This file may be found on the Internet in ftp.apple.com
|
|
in the alug directory.
|
|
-Steve Cisler, Apple Computer Library.
|
|
Internet address: sac@apple.com ]
|
|
|
|
The Second Conference on Computers, Freedom, and Privacy, (March
|
|
18-20, 1992. Washington,D.C.).was sponsored by the Association for
|
|
Computing Machinery and thirteen co-sponsors including the American
|
|
Library Association and a wide variety of advocacy groups.
|
|
|
|
The diversity of the attendees, the scope of the topics covered,
|
|
and the dynamism of the organized and informal sessions gave me a
|
|
perspective I had lost in endless conferences devoted only to library,
|
|
information, and network issues. I can now view the narrower topics of
|
|
concern to me as a librarian in new ways. Because of that it was one of
|
|
the best conferences I have attended. But there's a danger of these
|
|
issues being re-hashed each year with "the usual suspects" invited each
|
|
time to be panelists, so I urge you, the readers, to become involved and
|
|
bring your own experiences to the next conference in 1993 in the San
|
|
Francisco Bay Area.
|
|
|
|
++====================================================================++
|
|
|
|
Wednesday, March 18
|
|
|
|
The day began with concurrent tutorials on the following topics:
|
|
Getting on the Net (Mitchell Kapor, Electronic Frontier
|
|
Foundation);
|
|
Making Information Law and Policy (Jane Bortnick, Congressional
|
|
Research Service);
|
|
Communications and Network Evolution (Sergio Heker, JVNCNet),
|
|
Private Sector Privacy (Jeff Smith, Georgetown University);
|
|
Constitutional Law for Non-lawyers (Mike Godwin, EFF);
|
|
Computer Crime (Don Ingraham, Alameda County (CA) District Attorney);
|
|
Modern Telecommunications: Life After Humpty- Dumpty (Richard
|
|
Wolff, Bellcore);
|
|
International Privacy Developments (David Flaherty, Univ. of
|
|
Western Ontario);
|
|
|
|
and the one I attended...
|
|
Information Law and Policy: Jane Bortnick,
|
|
Congressional Research Service (CRS)
|
|
|
|
In Bortnick's tutorial, she covered the following points:
|
|
1)Setting information policy is not a linear process, and it's
|
|
not clear how or when it is made because of many inputs to the process.
|
|
2) Many policies sit on the shelf until a crisis, and the right
|
|
technology is either in place, or certain people grab it.
|
|
3)Events create renewed interest in information policy.
|
|
4)Industry, academic, or non-governmental groups play an
|
|
important role by testifying before committees studying policy and by
|
|
lobbying.
|
|
5)CRS is the institutional memory for Congress because of the
|
|
rapid turnover in the staff on the Hill.
|
|
6) The challenge is to develop policy that does not hinder or
|
|
hold things up, but there is a high degree of uncertainty, change, and
|
|
lack of data. The idea is to keep things as open as possible throughout
|
|
the process.
|
|
|
|
Bortnick said that the majority of laws governing information
|
|
policy were written in an era of paper; now electronic access is being
|
|
added, and Congress is trying to identify fundamental principles, not
|
|
specific changes.
|
|
Because of the economic factors impinging on the delivery of
|
|
information, members of Congress don't want to anger local cable, phone,
|
|
or newspaper firms.
|
|
To get sensible legislation in a rapidly changing environment you
|
|
have to, paradoxically, slow down the legislative processes to avoid
|
|
making bad laws. Nevertheless, in a crisis, Congress can sometimes work
|
|
very quickly.
|
|
We have to realize that Congress can't be long term because of
|
|
annual budget cycles and because of the hard lobbying by local
|
|
interests.
|
|
In making good policy and laws, building consensus is the key.
|
|
|
|
The current scope of information policy:
|
|
-spans broad range of topics dealing with information
|
|
collection, use, access, and dissemination
|
|
-global warming has a component because new satellites will dump
|
|
a terabyte a day: who is responsible for storage, access, adding value
|
|
to all of this data?
|
|
-many bills have the phrase: "and they will establish a
|
|
clearinghouse of information on this topic"
|
|
-information policy has increasingly become an element within
|
|
agency programs
|
|
-impact of information technologies further complicates debate
|
|
-result=more interested players from diverse areas.
|
|
|
|
Congress has many committees that deals with these issues. CRS
|
|
gets 500,000 requests for information a year: 1700 in one day. After
|
|
"60 minutes" is broadcast CRS gets many requests for information. from
|
|
Congress.
|
|
|
|
Jim Warren asked several questions about access to government
|
|
information. There was a general discussion about how the Library of
|
|
Congress would be digitized (size, cost, copyright barriers). It was
|
|
noted that state level experiments affected federal activity, especially
|
|
the states that are copyrighting their information (unlike the federal
|
|
government).
|
|
|
|
The discussion about Congressional reluctance to communicate via
|
|
electronic mail with constituents: a new directory does not even list
|
|
some fax numbers that had been quasi-public before some offices felt
|
|
inundated with fax communications.
|
|
|
|
++====================================================================++
|
|
|
|
|
|
Keynote Address:
|
|
Al Neuharth, The Freedom Forum and founder of USA Today
|
|
"Freedom in cyberspace: new wine in old flasks"
|
|
|
|
Lunch, following the tutorials, was followed by an address by Al
|
|
Neuharth. The high points were:
|
|
1. First amendment freedoms are for everyone. Newspaper publishers
|
|
should not relegate anyone to 2nd class citizenship or the back of the
|
|
bus.
|
|
2. The passion for privacy may make our democracy falter.
|
|
3. Publishing of disinformation is the biggest danger, not
|
|
information-glut.
|
|
|
|
Commenting on American Newspaper Publishers Assn. to keep RBOCs
|
|
out of information business, Neuharth noted that the free press clause in
|
|
the Bill of Rights does not only apply to newspapers. Telcos have first
|
|
amendment rights too. "ANPA is spitting into the winds of change", he
|
|
said, and some newspaper publishers are not happy with this stance, so
|
|
there is a lot of turmoil. People should get their news when, how and
|
|
where they want it: on screen or tossed on the front porch. Telcos have
|
|
yet to demonstrate expertise in information gathering and dissemination;
|
|
they have an outmoded allegiance to regulation .
|
|
|
|
He strongly criticized the use of anonymous sources by newspapers.
|
|
Anonymous sources, he said, provide misinformation that does irreparable
|
|
harm. The Washington Post is the biggest user of confidential sources.
|
|
Withholding of names encourages fabricating and misinformation. Opinions
|
|
and style should not be hidden in news pages but kept on the editorial
|
|
page.
|
|
|
|
|
|
++====================================================================++
|
|
|
|
Wednesday Afternoon Session: Who Logs On?
|
|
Given by Robert Lucky of Bell Labs:
|
|
|
|
Speaking personally, Lucky covered the following points:
|
|
1. Fiber to the home: who pays for it?
|
|
The consumers will pay and the consumer will benefit. How much
|
|
they will pay and how much they will benefit is what matters.
|
|
We must to install wideband switching and we will.The drama is
|
|
mainly economic and political, not technical. It will happen in 40
|
|
years. Asked what fiber will bring that copper will not, Lucky took the
|
|
Field of Dreams approach: supply of bandwidth will create demand.
|
|
2. Access and privacy.
|
|
This is a personal quandary for Lucky. Intimate communications
|
|
will be coming-- individual cells on each pole and an individual number
|
|
for each person. "I like to call anybody from my wrist, but I hate
|
|
having people calling me."
|
|
If you have access, you can't have privacy. The right to be
|
|
left alone takes away from the 'right' from other people. Lucky was the
|
|
first of many to raise the problems of the FBI recommend legislation,
|
|
the Digital Telephony Amendment, that would require re-design of present
|
|
network so that surveillance could take place, and that the cost of
|
|
doing this would be 20 cents a month per subscriber. It will be hard to
|
|
find conversations, but you will pay for this. He viewed this with
|
|
grave concern; it's a bad idea. He is all for getting drug kings but he
|
|
wants his privacy.
|
|
|
|
3. Lucky's observations on the Internet/NREN:
|
|
One of the wonderful things is the sense of freedom on the
|
|
Internet. Anonymous ftp. There are programs and bulletin boards. Sense
|
|
of freedom of information and freedom of communication, but nobody seems
|
|
to pay for it. It just comes. As a member of AT&T, this needs to be
|
|
transitioned to a commercial enterprise. Government is not good at this;
|
|
intellectual property lawyers will build walls, and hackers may screw
|
|
it up too. "I still want all the freedom in the commercial enterprise."
|
|
|
|
Linda Garcia of the OTA (Office of Technology Assessment) spoke
|
|
about access issues and said it was a cost/benefit problem. Rural areas
|
|
should be able construct a rural area network (RAN). Take small
|
|
businesses, educators, hospitals and pool their demand for a broadband
|
|
network. Government could act as a broker or community organizer and
|
|
transfer the technology. Rural communities should not be treated the
|
|
same way as urban areas. The regulatory structure should be different for
|
|
rural Maine than for lower Manhattan. See her OTA reports "Critical
|
|
Connections and Rural America at the Crossroads" for in-depth
|
|
treatments of these issues.
|
|
|
|
Al Koppe of New Jersey Bell outlined the many new services being
|
|
rolled out in NJ at the same time they are maintaining low basic rates.
|
|
--In 1992 there will be narrowband digital service for low
|
|
quality video conferencing; in 1994 wideband digital service.
|
|
--Video on demand, entertainment libraries and distance learning
|
|
applications will be coming along soon after.
|
|
--Koppe predicted a 99% penetration by 1999 with complete fiber
|
|
by 2010. This will be a public network and not a private one. It will
|
|
still be a common carrier.
|
|
This is a very aggressive and optimistic plan, an important one
|
|
for all of us to watch. Lucky said he had never seen a study that shows
|
|
video on demand services can be competitive with video store prices. The
|
|
big question remains: how does a business based on low-bandwidth voice
|
|
services charge for broadband services? It remains a paradox.
|
|
|
|
Brian Kahin, Kennedy School of Government, discussed the growth of
|
|
the Internet and policy issues:
|
|
--points of access for different users
|
|
--network structure and current NSFNet controversy
|
|
He said the NREN debate is one between capacity (enabling high end
|
|
applications) and connectivity (number of resources and users online).
|
|
|
|
++====================================================================++
|
|
|
|
Afternoon Session: Ethics, Morality, and Criminality
|
|
|
|
Mike Gibbons of the FBI chaired this session which was one of the
|
|
central themes for all present. In the same room we had law enforcement
|
|
(LE) representatives from state, local, and federal governments, civil
|
|
libertarians, and convicted computer criminals, as well as some victims.
|
|
|
|
The FBI views the computer as a tool, and Gibbons told a story
|
|
about the huge raid on Lyndon LaRouche's data center in Virginia where
|
|
400 LE types took part. I had the feeling that Gibbons was telling his
|
|
own hacker story because the audience would appreciate the challenges
|
|
that faced him more than LE supervisors without a technical knowledge of
|
|
computers would appreciate it. He was also involved in the Robert Morris
|
|
case.
|
|
|
|
Mike Godwin of EFF agrees that it is not ethical to access other
|
|
people's computer without permission, but Mike represents those who may
|
|
have acted unethically but still have rights.
|
|
|
|
Case involving Craig Neidorf of _phrack_ who felt that his
|
|
publication of a Bell South document was within the 1st amendment .
|
|
Bell South pegged the Document cost was $70K because it included the Vax
|
|
workstation and the software in the cost! There was a question whether
|
|
that document was property at all. LE folks can make good faith
|
|
mistakes, but Craig had to spend $100,000 and that the prosecutor and
|
|
Secret Service never admitted they were wrong.
|
|
|
|
Jim Settle from FBI sets policy on computer crime and supervisor
|
|
of computer crime squad. Background in Univacs in 1979. There is not a lot
|
|
of case law on computer crimes. LE was computer stupid and is not out
|
|
there to run over people's rights. They discuss moral issues even when
|
|
an action was legal.
|
|
|
|
Don Delaney of the New York State Police: He has been dealing with
|
|
PBX and calling card fraud; he talks to students about perils of
|
|
computer crime, and works with companies who have been hit. Every day at
|
|
least one corporation has called him. $40,000 to $400K loss in a short
|
|
time. He has found glitches in the PBX software; he complained that few
|
|
PBX salespeople tell the customers about remote access units through
|
|
which criminals gain access. Once this happens the number is sold on the
|
|
street in New York at about $10 for 20 minutes. Even Westchester County
|
|
Library was hit. People used binoculars to read the PIN numbers on
|
|
caller's cards as they dialed in Grand Central Station. Delaney called
|
|
this 'shoulder surfing' and noted that cameras, camcorders, and
|
|
binoculars are being used regularly.
|
|
|
|
Mitch Kapor raised the issue of the Digital Telephony Amendment.
|
|
It is proposed legislation to amend 18 USC 2510 (government can intercept
|
|
communications on showing probable cause as they did with John Gotti)
|
|
Settle of the FBI asked: "What happens if the technology says you can't
|
|
do it? You change the tech. to allow it or you repeal the law that
|
|
allows wire tap. Don Parker of SRI said it is essential to have
|
|
wiretap ability as a tool for LE.
|
|
|
|
The FBI under the Department of Justice has authority to use
|
|
wiretaps in its operations. This has been one of the most effective
|
|
tools that law enforcement has, but with the advent of digital telephony
|
|
such as ISDN, the LE community is worried that no capability exists to
|
|
intercept these digital signals, and this will preclude the FBI and
|
|
other LE officials from intercepting electronic communications.
|
|
|
|
The FBI proposes an amendment to the Communications Act of 1934 to
|
|
require electronic services providers to ensure that the government will
|
|
e able to intercept digital communications. There are a number of parts
|
|
to the bill:
|
|
1. the FCC shall determine the interception needs of the DOJ and
|
|
issue regulations 120 days after enactment.
|
|
2. Service providers and pbx operators to modify existing telecom
|
|
systems within 180 days and prohibit use of non-conforming equipment
|
|
thereafter, with penalties of $10,000 per day for willful offenders.
|
|
3. Gives FCC the authority to compensate the system operators by
|
|
rate structure adjustment for required modifications. That is, the user
|
|
will pay for this decreased security desired by the government.
|
|
|
|
Godwin said he believes that wiretap is okay when procedures are
|
|
followed, but you have to decide what kind of society you want to live
|
|
in. The FBI asked, "Are you going to say that crime is okay over the
|
|
phones and that it should not be controlled?" He implied that not making
|
|
changes to the law would leave cyberspace open to sophisticated
|
|
criminals, many of whom have more resources for technology that does the
|
|
LE community. For more information on this there is a 10 page
|
|
legislative summary.
|
|
|
|
++====================================================================++
|
|
|
|
The Evening of Day One:
|
|
|
|
There were Birds of a Feather (BOF) sessions that were less formal
|
|
and with less attendance. Nevertheless, they were some of the high
|
|
points of the conference.
|
|
|
|
Where else would one find the law enforcement types switching
|
|
roles with computer intruders who had to defend a system against an attack?
|
|
Kudos to Mike Gibbons for setting this up.
|
|
|
|
There was also a panel of hackers (I use the term in the broadest
|
|
and non-pejorative sense) including "Emmanuel Goldstein"--the nom de
|
|
plume for the editor of 2600: The Hacker's Weekly; Craig Neidorf,
|
|
founder of phrack; Phiber Optik, a young man who recently plea bargained to
|
|
a couple of charges; and Dorothy Denning, chair of the CS department at
|
|
Georgetown University.
|
|
|
|
Goldstein (this was a character in Orwell's 1984 who was a front
|
|
for the establishment!) sees hackers as intellectuals on a quest for
|
|
bugs which, when corrected, help the system owner.He is extremely
|
|
frustrated over media treatment of hackers, yet he was open to a
|
|
Japanese camera crew filming the casual meetings of 2600 readers that
|
|
took place in the hotel lobby throughout the conference. He said that
|
|
hackers and system administrators work together with each other in
|
|
Holland.
|
|
|
|
As an example of lax system management there was a military
|
|
computer during the middle east war had a password of Kuwait'. Don
|
|
Parker of SRI believes that Goldstein should not continually blame the
|
|
victim.
|
|
|
|
Many of the hackers and publishers strongly believed that
|
|
"knowing how things work is not illegal." The current publisher of Phrack
|
|
said, "I believe in Freedom of Speech and want to tell people about new
|
|
technology."
|
|
|
|
Most librarians would agree, but much of the problem was what some
|
|
people did with that knowledge. An interesting discussion followed about
|
|
who was responsible for security: vendors, system administrators, or
|
|
public law enforcement personnel. Phiber Optik is now maintaining a Next
|
|
machine on the Net and complained that answers to technical questions
|
|
cost $100 per hour on the Next hotline.
|
|
|
|
++====================================================================++
|
|
|
|
Electronic Money: Principles and Progress
|
|
Eric Hughes, DigiCash
|
|
|
|
Electronic money uses public key encryption. People can recognize
|
|
your digital signature, but cannot read it. The goal is to create a bank
|
|
on the Internet that only uses software and affords the user complete
|
|
anonymity. There is the bank, the buyer, and the seller. Money flows
|
|
from the bank in a money loop. Bank does not know what is signs but it
|
|
knows that it did sign it and will honor the electronic check. This would
|
|
allow financial transactions and privacy for the buyer.
|
|
|
|
In a library setting this would mean I could buy an item
|
|
electronically (a document, image, code) and nobody could link it with
|
|
my name. My buying habits would be private, and a person roaming through
|
|
the transactions might see that someone purchased the computer simulation
|
|
"Small furry animals in pain" but would not know the name of the
|
|
purchaser.
|
|
|
|
Doing private database queries will become more and more important
|
|
as the network is used for more business activities. The DigiCash scheme
|
|
has multi-party security and is a safe way of exchanging files and
|
|
selling them in complete privacy. It's also very cheap and the
|
|
unlinkability is very important.
|
|
|
|
In the discussion session the issue of drug lords using the system
|
|
was raised. DigiCash has limited its transactions to less than $10,000,
|
|
and most would be far less. A British attendee said that stores had to
|
|
keep extensive records for VAT tax audits, so EEC and US regulations
|
|
would conflict with the goals of DigiCash.
|
|
|
|
|
|
++====================================================================++
|
|
|
|
Thursday Morning Sessions
|
|
|
|
For Sale: Government Information
|
|
|
|
This was staged as a role playing advisory panel where a grad
|
|
student made a broad and complicated request for information in a
|
|
particular format. The panelist made short statements about their
|
|
interests and then tried to answer the pointed questions from George
|
|
Trubow of John Marshall Law School.
|
|
|
|
Dwight Morris (LA Times):
|
|
His job is to get government data and turn it into news stories.
|
|
He noted that the FOIA is a joke; it's a last resort. Vendors are foia-ing
|
|
the agencies and then trying to sell those foia requesters software to
|
|
read the data tapes!
|
|
|
|
Ken Allen of the Information Agency Association:
|
|
The government should not elude the appropriations process by
|
|
selling information, nor should the agency control content. The IIA is
|
|
against exclusive contracts.
|
|
|
|
Mitch Freedman,Westchester Co. Library ALA Coordinator for Access to
|
|
Information:
|
|
Are many people asking for access for this information, or will
|
|
the coding benefit many users in the long run? He mentioned of WINDO
|
|
program, freedom of access, and its link to informed democracy.
|
|
|
|
Franklin Reeder, Office of management and Budget:
|
|
He observed that unusable databases in raw form mean that choice
|
|
of format is irrelevant. There may be broader demand for this information,
|
|
and the database should be provided with interfaces for many users.
|
|
Government agencies should not turn to information provision for
|
|
revenues; it becomes an impediment to access. "I don't think the public
|
|
sector should be entrepreneurial. "
|
|
|
|
Costin Toregas, Public Technology, Inc.--owned by cities and counties in
|
|
U.S. and Canada:
|
|
We should re-examine our language when discussing information and
|
|
access. How do you recover the costs of providing the new technological
|
|
access mechanisms. The provision of this should be high priority.
|
|
|
|
Robert Belair, Kirkpatrick and Lockhart, deals in FOIA and privacy
|
|
issues:
|
|
Choice of format is an issue, and in general we are doing a bad
|
|
job. Belair notes that FOIA requests are not cheap. There are $2-4,000
|
|
fees from government agencies--even more than the lawyer fees!
|
|
|
|
Questions:
|
|
|
|
Denning: no view of where technology is taking us. Why not put the
|
|
FOIA information online?
|
|
Freedman says the Owens bill handles this.
|
|
Weingarten says that one agency is planning for a db that has no
|
|
equipment to handle it yet.
|
|
Belair: we will get change in FOIA and the Owens bill is good.
|
|
Toregas: A well-connected community is crucial.
|
|
|
|
Harry Goodman asked Ken Allen if he still believed that "libraries
|
|
be taken off the dole."
|
|
Allen denied he said this but Goodman had it on tape! Allen said
|
|
privatization is a red herring. Government agencies might not be the
|
|
best way to provide the access to information. Allen says it should be by
|
|
diverse methods.
|
|
|
|
Glenn Tenney, running for Congress in San Mateo County (CA), said
|
|
he had trouble getting information on voting pattern of the members of
|
|
Congress and to buy it would have cost thousands of dollars.(
|
|
Ken Allen replied that a private company had developed the
|
|
information from raw material, but others thought this was basic
|
|
information that should be available to all citizens. Other people
|
|
wanted the Congressional Records online (and cheap); others wanted the
|
|
private sector to do it all and to get the government to partner in such
|
|
projects.
|
|
|
|
++====================================================================++
|
|
|
|
Free Speech and the Public Telephone Network
|
|
|
|
Jerry Berman of the EFF:
|
|
--Do telcos have the right to publish over their own networks?
|
|
--What are the implications of telcos as newspapers vs. telcos
|
|
as common carrier? Aren't safeguards needed to compel free access for all
|
|
players?
|
|
--There is already discrimination on the 900 services (provision
|
|
or billing for porno businesses).
|
|
--When the public finds out what is on the network, there will
|
|
be a big fight.
|
|
--Will we follow the print model or the broadcasting model?
|
|
--How can a new infrastructure secure a diversity of speech and
|
|
more participants, and how we can break the deadlock between cable,
|
|
papers, and telcos.
|
|
|
|
Henry Geller, Markle Foundation (FCC/NTIA) :
|
|
-- The key is the common carrier nature of the telephone
|
|
networks and that they should carry all traffic without determining what is
|
|
appropriate.
|
|
--Congress can't chose between warring industries, so it won't
|
|
act on some of these telecomm issues.
|
|
--Broadband area: if the bits flowing are TV programming, the
|
|
telco is forbidden to provide. Print model is a good one to follow, not
|
|
the cable or broadcast model. He mentioned CNN's squelching of NBC
|
|
cable channel.
|
|
|
|
John Podesta (Podesta Associates):
|
|
--There are forces that are trying to push messengers off the
|
|
road and keep the network from being diverse.
|
|
--We need a network with more voices, not just those of the
|
|
owners.
|
|
--We will be faced with censorship by the government and network
|
|
owners (MCI, US West);
|
|
--There will be more invasion of privacy
|
|
Six things have to happen:
|
|
1. More competition via open platform. Personal ISDN at low
|
|
tariffs.
|
|
2. Structural safeguards
|
|
3. Common carriers should be content neutral when providing access
|
|
4. Originators should bear responsibility for obscene or salacious
|
|
postings.
|
|
5. Protect net against invasion of privacy. Debate is whether it
|
|
will be easier or harder to wiretap in the future.
|
|
6. Don't adopt broadcast or cable model for network; both are more
|
|
restrictive with regards to First Amendment issues.
|
|
|
|
Bob Peck (ACLU):
|
|
--Government ban on RBOCs providing information is a first
|
|
amendment issue, but there is also an issue of access. How do we make
|
|
sure that everyone gets charged the same rates?
|
|
--The Rust vs. Sullivan decision could affect network use;
|
|
abortion clinics could not answer any questions about the topic. US
|
|
Govt. claimed: "We paid for the microphone; we just want to be able to
|
|
control what is said." This is being argued in other cases by DOJ
|
|
and should be resisted.
|
|
|
|
Eli Noam (NYU):
|
|
--Coming from state government he tried to be an oxymoron, a
|
|
"forward-looking state utility commissioner".
|
|
--Telcos say: If anyone can use the common carrier, why not
|
|
themselves.
|
|
--Free speech is rooted in the idea of scarcity and restraints
|
|
to access.
|
|
--When you have 9000 channels, who cares?
|
|
--There will be no scarcity. He predicts people will be video
|
|
literate. Video will have new obscene phone calls.
|
|
--We are over-optimistic about the short term and too cautious
|
|
about long term effects.
|
|
--Telecommuting is already happening on a significant scale.
|
|
--We will have telecommunities, subcultures of special interest
|
|
groups.
|
|
--Our political future is based on jurisdiction. Is there a new
|
|
form of political entity emerging that transcends time zones?
|
|
--Information glut: The key issue will be how you filter and
|
|
screen it.
|
|
--Handling the information will be a big issue.The user's brain
|
|
is the ultimate bottleneck.
|
|
--Internet news is about 18 MB a day.
|
|
--Screening will be by the network itself or by user groups and
|
|
telecommunities.
|
|
--Rights of individuals vs. the governments. Is the first
|
|
amendment a local ordinance?
|
|
--We need power over international interconnection. Fly the flag
|
|
of teledemocracy.
|
|
|
|
++====================================================================++
|
|
|
|
Lunch with Bruce Sterling
|
|
|
|
Bruce Sterling, author of The Difference Engine (with William
|
|
Gibson) and a new title, The Hacker Crackdown, gave an outstanding
|
|
performance/speech entitled "Speaking the Unspeakable" in which he
|
|
represented three elements of the so- called computer community who were
|
|
not at CFP-2.
|
|
|
|
--The Truly Malicious Hacker:
|
|
"Your average so-called malicious user -- he's a dweeb! He
|
|
can't keep his mouth shut! ....Crashing mainframes-- you call that
|
|
malice? Machines can't feel any pain! You want to crash a machine, try
|
|
derailing a passenger train. Any idiot can do that in thirty minutes,
|
|
it's pig-easy, and there's *nothing* in the way of security. Personally
|
|
I can't understand why trains aren't de-railed every day."
|
|
|
|
--A narco-general who has discovered the usefulness of his
|
|
contacts with the North American law enforcement communities--and their
|
|
databases:
|
|
"These databases that you American police are maintaining.
|
|
Wonderful things....The limited access you are granting us only whets
|
|
our appetite for more. You are learning everything about our
|
|
criminals....However, we feel that it is only just that you tell us
|
|
about your criminals.....Let us get our hands on your Legions of Doom. I
|
|
know it would look bad if you did this sort of thing yourselves. But you
|
|
needn't."
|
|
|
|
--A data pirate from Asia:
|
|
"The digital black market will win, even if it means the
|
|
collapse of your most cherished institutions....Call it illegal, call it
|
|
dishonest, call it treason against the state; your abuse does not
|
|
matter; those are only words and words are not as real as bread. The only
|
|
question is how much suffering you are willing to inflict on yourselves,
|
|
and on others, in the pursuit of your utopian dream."
|
|
|
|
Sterling's speech was a hilarious, yet half-serious departure from
|
|
the usual fare of conferences and is well worth obtaining the audio or
|
|
video cassette. I also recommend you attend the American Library
|
|
Association conference in late June 1992 when Sterling will address the
|
|
LITA attendees.
|
|
|
|
++====================================================================++
|
|
|
|
Who's in Your Genes
|
|
|
|
Who's in Your Genes was an overview of genetic data banking, and a
|
|
discussion of the tension between an individual's right to privacy and
|
|
the interests of third parties. DNA forensic data banks and use of
|
|
genetic records by insurers were explored. Madison Powers was
|
|
chair. Panelists included John Hicks, FBI Lab; Paul Mendelsohn,
|
|
Neurofibromatosis, Inc.; Peter Neufeld, Esq.; Madison Powers,
|
|
Kennedy Center for Ethics, Georgetown University.
|
|
|
|
++====================================================================++
|
|
|
|
|
|
Private Collection of Personal Information
|
|
|
|
This was another role-playing session where the participants took
|
|
positions close to those they would hold in real life. Ron Plessor of
|
|
Piper and Marbury acted as the 'scene setter and facilitator'. It was he
|
|
who posed the broad question "Should the government have a role in the
|
|
privacy debate?" and asked the panelists to debate about the
|
|
establishment of a data protection board (as proposed by Congressman
|
|
Wise in H.R. 685d).
|
|
|
|
Janlori Goldman of the ACLU enthusiastically embraced the role of
|
|
general counsel to the Data Board. She questioned the representatives
|
|
from the fictitious private enterprises who were planning a supermarket
|
|
discount shoppers' program where all items are matched with the
|
|
purchaser and mailing lists would be generated with this fine-grained
|
|
information.
|
|
|
|
"It would be good to come to the board before you start the
|
|
service." Her tone was very ominous, that of a friendly but all powerful
|
|
bureaucrat. "Bring your papers and come on in to discuss your project.
|
|
Let's keep it informal and friendly this time to prevent the more formal
|
|
meeting." She even alluded to making subpoenas and getting phone
|
|
records of the direct marketeers. She would not offer the marketeers
|
|
assurances of confidentiality in their discussion, and even though this
|
|
was role playing, several people around me who had thought the idea of a
|
|
board would be useful, changed their mind by the end, partly because of
|
|
her fervor.
|
|
|
|
At the Q&A session about 25 people dashed for the microphones,
|
|
making this session the most provocative of all. At least it touched a
|
|
chord with everyone.
|
|
|
|
++====================================================================++
|
|
|
|
On the evening of March 19, the Electronic Frontier Foundation
|
|
presented the EFF Pioneer awards to those individuals who have done the
|
|
most to advance liberty, responsibility, and access to computer-based
|
|
communications. I was honored to serve as a judge and read the large
|
|
number of nominations. Each person or institution made a strong
|
|
impression on me, and it was difficult to narrow it down to five people.
|
|
The recipients each made a very moving statement after they were called
|
|
to the podium by Mitchell Kapor of the EFF.
|
|
|
|
++====================================================================++
|
|
|
|
March 20
|
|
|
|
Privacy and Intellectual Freedom in the Digital Library
|
|
Bob Walton of CLSI, Inc.
|
|
|
|
Walton discussed the transformation of libraries as collections of
|
|
books into digital libraries with falling technological costs and
|
|
volatile questions of intellectual property and reimbursement.
|
|
|
|
Gordon Conable, Monroe (MI) County Library system, spoke of
|
|
libraries as First Amendment institutions, ones where Carnegie saw the
|
|
provision of free information as a public good. However, the economics
|
|
of digital information are quite different, and this causes problems, as
|
|
does the government using the power of the purse to control speech (Rust
|
|
vs. Sullivan).
|
|
|
|
I spoke about the case of Santa Clara County (CA) Library
|
|
defending its open access policy when a citizen complained about
|
|
children checking out videos he thought should be restricted. It was a
|
|
good example of how the whole profession from the branch librarian on up
|
|
to the California State Librarian presented a unified front in the face
|
|
of opposition from some parts of the community and the San Jose Mercury
|
|
News, the local paper that waffled somewhat on its own stance.
|
|
|
|
Jean Polly of Liverpool Public Library spoke about the problems
|
|
running a library BBS where religious fundamentalists dominated the
|
|
system, but outlined her library's many activities (smallest public
|
|
library as an Internet node) and her plans for the future.
|
|
|
|
++====================================================================++
|
|
|
|
|
|
Who Holds the Keys?
|
|
|
|
In a sense the cryptography discussion was one of the most
|
|
difficult to follow, yet the outlines of a very large battlefield came
|
|
into view by the end of the session. The two sides are personal privacy
|
|
and national security. Should the government be allowed to restrict the
|
|
use of cryptography? (Only weakened schemes are allowed to be legally
|
|
exported.) What legal protections should exist for enciphered
|
|
communications?
|
|
|
|
David Bellin of the Pratt Institute stood up and spoke in code. He
|
|
thought encrypted speech was protected and that he should have the right
|
|
to associate with his peers through encryption (to prevent snooping). He
|
|
did not believe the technology is controllable, nor that there is safety
|
|
and one end and freedom at the other.
|
|
|
|
Jim Bidzos of RSA Data Security said we need a review of
|
|
cryptographic policy. The long term effects of the current
|
|
confrontational relationship will be bad. John Gilmore of Cygnus Support
|
|
felt that the public should discuss cryptographic issues and not behind
|
|
closed doors. This is a good time for network people, manufacturers, and
|
|
the government to work together. John Perry Barlow sees encryption as an
|
|
answer to the problem of having lots of privacy. Using the drug war
|
|
rationale to prohibit export is a bad idea. Whitfield Diffie, of Sun
|
|
Microsystems gave an excellent overview of the philosophy of encryption
|
|
and why it's important as we move from face-to-face communications to
|
|
electronic. There are a number of policy problems:
|
|
--a bad person might be able to protect information against all
|
|
assaults. In a free society a person is answerable for your actions,
|
|
but a totalitarian society uses prior restraint. What will ours become?
|
|
--Can a so-called 'free society' tolerate unrestricted use of
|
|
cryptography? Because cryptography can be done on standard processors
|
|
with small programs, and because covert channels are hard to detect,
|
|
enforcement of a strong anti-crypto law would require drastic measures.
|
|
|
|
I asked Jim Bidzos about the government agencies beating their
|
|
swords into plowshares by looking for new roles in a world without a
|
|
Soviet threat. He thought NSA could use budget hearings to say that with
|
|
a lean/mean military budget, a modest increase in crypto capability
|
|
might give the government more lead time in an emergency.
|
|
|
|
One member of the audience challenged Bidzos to go ahead and
|
|
export RSA outside of the US. Barlow responded "Come on, Jim. The
|
|
Russians are already using RSA in their <missile> launch codes." To
|
|
which Bidzos replied, "My revenue forecasts are being revised downward!"
|
|
<laughter> Barlow answered, "You would not have gotten any royalties
|
|
from them anyway." <more laughter> Bidzos: "Maybe..." <even more
|
|
laughter>
|
|
|
|
With only a partial understanding of some of the technology
|
|
involved (cryptography is a special field peopled mainly by
|
|
mathematicians and intelligence officials), I think that this will be
|
|
the issue of the 90s for libraries. It may be a way to protect both privacy
|
|
and intellectual property in the digital libraries of the future.
|
|
|
|
|
|
++====================================================================++
|
|
|
|
Final Panel:
|
|
Public Policy for the 21st Century,
|
|
moderated by Mara Liasson, National Public Radio
|
|
|
|
"How will information technologies alter work, wealth, value,
|
|
political boundaries?... What will the world be like in a decade or
|
|
two?... What public policies now exist that may pull the opposite
|
|
direction from the economic momentum and will lead to social tension and
|
|
breakage if not addressed properly?"
|
|
|
|
Peter Denning, George Mason University:
|
|
People used to have faith that strong governments would bring
|
|
salvation through large programs (he named failures). The poor track
|
|
record of government and changes in comms technology have accelerated
|
|
the decline of the faith.
|
|
|
|
Mitchell Kapor:
|
|
He sees digital media as the printing press of the 21st century.
|
|
The WELL and others make us realize we are not prisoners of geography,
|
|
so our religious, hobby, or academic interests can b shared by the enabling
|
|
technologies of computers. "Individuals flourish from mass society with
|
|
this technology" Openness, freedom, inclusiveness will help us make a
|
|
society that will please our children and grandchildren.
|
|
|
|
Simon Davies, Privacy International:
|
|
"There is possibly a good future, but it's in the hands of
|
|
greedy men. I see a world with 15 billion beings scrambling for life,
|
|
with new frontiers stopping good things. For 14 billion they are very
|
|
pissed off, and that our wonderful informational community (the other
|
|
billion) becomes the beast. It will be something most of the world will
|
|
do without. If we recognize the apocalypse now we can work with the
|
|
forces."
|
|
|
|
Esther Dyson, EDventure Holding, Inc.:
|
|
She thinks that cryptography is a defensive weapon. The free-
|
|
flow of cryptic information is dangerous to the powerful. She want more
|
|
markets and less government. Large concentrations of power makes her
|
|
suspicious. Global protected networks will help those in the
|
|
minority(disagreeing with Davies). We don't have one global villages but
|
|
many. How do we avert tribalism of class?
|
|
|
|
Roland Homet, Executive Inc.:
|
|
Homet was more conciliatory. America has a penchant for ordered
|
|
liberty. It uses toleration and restraint to keep forces working
|
|
together.
|
|
|
|
++====================================================================++
|
|
|
|
Lance Hoffman, of the George Washington University and organizer of the
|
|
conference, deserves a great deal of credit for a smooth running yet
|
|
exciting three days.
|
|
|
|
There will be a CFP-3 in the San Francisco area next year. If you find
|
|
these issues to be a major force in your professional life, we hope you
|
|
will be able to attend next year. Traditionally, there have been
|
|
scholarships available, but these depend on donations from individuals
|
|
and firms.
|
|
|
|
End of Report/ Steve Cisler sac@apple.com
|
|
|
|
|
|
|
|
|