1040 lines
54 KiB
Plaintext
1040 lines
54 KiB
Plaintext
July 1992 Vol. 4; Issue 5
|
|
|
|
ELECTRIFYING SPEECH
|
|
New Communications Technologies and Traditional Civil Liberties
|
|
|
|
=------------------------------------------------------------=
|
|
|This document is Copyright (c) 1992 by Human Rights Watch. |
|
|
|It is reproduced in electronic form by permission of Human |
|
|
|Rights Watch. For printed versions of this document, contact|
|
|
|Human Rights Watch Publications, 485 Fifth Avenue, New York,|
|
|
|NY 10017. Printed copies are $3.00 with quantity discounts |
|
|
|available. This electronic copy of the document is being |
|
|
|made available as a service of Human Rights Watch and |
|
|
|The Electronic Frontier Foundation (eff.org). It originated |
|
|
|in the eff.org ftp library. Redistribution of this document |
|
|
|should always be accompanied by this header. |
|
|
=------------------------------------------------------------=
|
|
|
|
|
|
INTRODUCTION: NEW COMMUNICATION TECHNOLOGIES
|
|
|
|
Since the personal computer ushered in a communication revolution
|
|
about 15 years ago, the accompanying technology has been likened to
|
|
everything from the printing press to Hyde Park Corner, from the
|
|
postal system to talk radio. Pungent as these analogies are, their
|
|
limitations point up the essential uniqueness of computer-mediated
|
|
communication. While the printing press made possible the mass
|
|
dissemination of information, computers can individualize information
|
|
and increase its flow a thousandfold. In the process, they change the
|
|
nature of communication itself.
|
|
|
|
Few Americans are unaffected by this revolution, whether they
|
|
rely on computers to do their taxes, write a novel, serve up money
|
|
from a bank machine, or make airplane reservations -- and then guide
|
|
the plane safely back to land. Those who are "on-line" "talk" to
|
|
people whom they may never meet face-to-face and form "virtual
|
|
communities" in "Cyberspace" -- a place without physical dimensions,
|
|
but with the capacity to store vast amounts of facts, conversation,
|
|
messages, written or voice mail and graphic images.
|
|
|
|
While it is axiomatic that these new capabilities can open up
|
|
faster, easier and more inclusive communication, they also call into
|
|
question long held assumptions about individual and communal rights.
|
|
Some are old questions in a new context: What, if any, is the role of
|
|
the government in regulating electronic communication? As more and
|
|
more information is recorded and stored automatically, how can the
|
|
right of privacy be balanced with the right to know? What happens to
|
|
individual protections when information is a salable commodity? Does
|
|
the form in which information is kept change the government's
|
|
obligation to inform its citizens?
|
|
|
|
Other questions arise from the new technologies: When borders can
|
|
be breached by a keystroke and texts and images can be reproduced and
|
|
modified without ever being published, what happens to definitions of
|
|
intellectual property, scholarship, conversation, publication,
|
|
community, even knowledge itself?
|
|
|
|
In 1983, Ithiel de Sola Pool began his seminal book, Technologies
|
|
of Freedom, with the warning that "Civil liberty functions today in a
|
|
changing technological context." As if to prove him right, the
|
|
government is now proposing a $2 billion investment in computer
|
|
networking technologies which will radically alter the way American
|
|
communicate. Because the technological context changes more rapidly
|
|
than the laws regulating it, the debate about how we want to live in
|
|
an electronic world is both volatile and urgent.
|
|
|
|
ELECTRONIC COMMUNICATION AND THE LAW
|
|
|
|
United States law has not treated all communication technology
|
|
alike. As Pool notes, regulatory policy is based on different
|
|
assumptions and varies among print, common carriage and broadcasting,
|
|
which were the three prominent modes of mass communication when he
|
|
wrote. Thus, lawmakers and jurists delineating free speech sought to
|
|
minimize traditional controls on printed speech by rejecting the types
|
|
of censorship associated with it, such as prior restraint, taxation
|
|
and seditious libel. But early regulators, with an eye to the social
|
|
good, had no qualms about requiring common carriers, such as the
|
|
postal and telegraph systems, to provide universal service without
|
|
discrimination. Their successors, assuming that the broadcast spectrum
|
|
was a scarce commodity, designed a regulatory system for radio and TV
|
|
based on government licensing, business advertising and a limited
|
|
number of channels. Later regulations included the Fairness Doctrine
|
|
(imposing on licensed broadcasters an obligation to cover issues
|
|
fairly), which regulated the content of speech. But as technologies
|
|
merge, traditional distinctions among the modes are no longer
|
|
applicable. Today, for instance, anyone regulating electronic bulletin
|
|
boards is looking at a cross between a publisher and a bookstore that
|
|
operates by means of the telephone, a common carrier.
|
|
|
|
Historically, the law has responded to, not anticipated,
|
|
technological changes, often reacting repressively when a new
|
|
technology challenges the status quo. As in the past, regulation of
|
|
electronic communication has been influenced more by market and
|
|
political forces than constitutional principles or legal issues. But
|
|
electronic communication policy is still fluid enough to allow for
|
|
questions about who should set the policy and to what end.
|
|
|
|
The Constitution
|
|
|
|
Among the most active participants in the policy discussion is
|
|
Computer Professionals for Social Responsibility (CPSR), a public
|
|
interest group formed to explore the impact of computers on society.
|
|
In March 1991, CPSR held the First Conference on Computers, Freedom &
|
|
Privacy in Burlingame, California. The concerns addressed at the
|
|
conference fell into three broad civil liberty categories: protecting
|
|
speech, protecting privacy, and gaining access to government
|
|
information.
|
|
|
|
In an opening address, constitutional scholar Laurence Tribe
|
|
posed a question of his own: "When the lines along which our
|
|
Constitution is drawn warp or vanish, what happens to the Constitution
|
|
itself?" The sections of the Constitution Tribe was referring to in
|
|
relation to electronic communication are:
|
|
|
|
# the First Amendment, with its prohibition against laws
|
|
abridging freedom of speech, assembly, or the press;
|
|
|
|
# the Fourth Amendment, protecting people and their property from
|
|
unreasonable government intrusion;
|
|
|
|
# the Fifth Amendment, guaranteeing due process of law and
|
|
exemption from self-incrimination;
|
|
|
|
# the Ninth and Fourteenth Amendments, which reinforce other
|
|
rights and provisions in the Constitution.
|
|
|
|
In applying these long-standing guarantees in the burgeoning
|
|
electronic forum, Tribe recommends that policy makers look not at what
|
|
technology makes possible, but at the core values the Constitution
|
|
enshrines. The overarching principles of that document, he maintains,
|
|
are its protection of people rather than places, and its regulation of
|
|
the actions of the government, not of private individuals. Other
|
|
central values Tribe notes are the ban on governmental control of the
|
|
content of speech; the principle that a person's body and property
|
|
belong to that person and not the public; and the invariability of
|
|
constitutional principles despite accidents of technology.
|
|
|
|
To insure that these values prevail as technology changes, Tribe
|
|
proposes adding a 27th amendment to the Constitution to read:
|
|
"This Constitution's protections for the freedoms of speech,
|
|
press, petition and assembly, and its protections against unreasonable
|
|
searches and seizures and the deprivation of life, liberty or property
|
|
without due process of law, shall be construed as fully applicable
|
|
without regard to the technological method or medium through which
|
|
information content is generated, stored, altered, transmitted or
|
|
controlled."
|
|
|
|
Who Regulates and How
|
|
|
|
Speakers at the conference did not argue with Tribe's goal of an
|
|
enlightened electronic communication policy on the part of the
|
|
government, but some disagreed over who should be responsible for
|
|
formulating that policy and whatever regulations accompany it.
|
|
|
|
Jerry Berman, a longtime privacy advocate who is now Director of
|
|
the Washington office of the Electronic Frontier Foundation, warned
|
|
that, in light of the courts' current record on civil liberties, any
|
|
strategy giving them primary power to settle electronic speech
|
|
disputes was dangerous. He argued instead for legislative controls.
|
|
|
|
Others worried that lawmakers, misunderstanding or
|
|
misinterpreting existing electronic speech problems, would push
|
|
through harsh and intrusive regulations. Steve McLellan, a special
|
|
assistant to the Washington Utilities Commission, cited efforts in his
|
|
state by phone companies wanting to institute caller ID systems. The
|
|
companies lobbied for authorization of that technology by portraying
|
|
it as customer protection, a way to combat obscene and crank phone
|
|
calls. The constitutional privacy issues got buried in politics until
|
|
the utilities commission announced that it would approve caller-ID
|
|
tariffs only if they provided for blocking mechanisms provided free
|
|
and at the discretion of the customer.
|
|
|
|
Yet another potential regulatory force was posited by Eli Noam,
|
|
Director of the Center for Telecommunications and Information Studies
|
|
at Columbia University. Noam suggested that computer- based
|
|
information networks will become quasi-political entities, not
|
|
subordinated to other jurisdictions, as they tax, set standards of
|
|
behavior and mediate conflicts among their members, and band together
|
|
to influence economic and social policy. Current Regulation
|
|
|
|
There are myriad laws on the federal and state levels with
|
|
potential impact in the electronic forum: the Privacy Protection Act,
|
|
Freedom of Information Act, Wiretap Act, Paperwork Reduction Act,
|
|
sunshine laws, obscenity laws, and laws regulating copyright,
|
|
trademark, interstate commerce, and product liability. As New York
|
|
attorney Lance Rose points out, this proliferation of laws tends to
|
|
reinforce the most restrictive standard -- because computer users and
|
|
service providers cannot inform themselves about all potentially
|
|
relevant rules, they are well-advised to stay within the boundaries of
|
|
the strictest regulation that may apply.
|
|
|
|
Congress has also passed legislation aimed directly at electronic
|
|
communication within the government, including:
|
|
# the Computer Matching and Privacy Protection Act of 1988,
|
|
which prohibits government agencies from combining discrete
|
|
computerized personal records as a basis for taking adverse action
|
|
against an individual until the results of the match have been
|
|
verified independently;
|
|
# the Computer Security Act of 1987, designed to improve the
|
|
security and privacy of federal computer systems;
|
|
# the Electronic Communication Protection Act of 1986, which
|
|
safeguards electronic communication from interception, disclosure and
|
|
random monitoring without a court order; and stipulates that a court
|
|
order must be time-limited and must specify the information sought;
|
|
# the Computer Fraud and Abuse Act of 1984 (revised in 1986),
|
|
which criminalizes unauthorized entry, and taking or alteration of
|
|
information from computers; authorizes fines and imprisonment up to 20
|
|
years under certain circumstances; and gives the Secret Service
|
|
authority to investigate potential offenses. In an effort to balance
|
|
the punitive aspects of the Act, Sen. Patrick Leahy (D-VT) introduced
|
|
an amendment to the 1991 crime bill that defines criminal liability in
|
|
electronic communication cases as intent to damage, rather than as the
|
|
technical concept of unauthorized access. The bill (S. 1322) will come
|
|
up for a vote again in 1992.
|
|
|
|
Both the Computer Fraud and Electronic Communication Protection
|
|
Acts include exceptions to their non-disclosure provisions for service
|
|
providers who "may divulge" the content of a communication to a law
|
|
enforcement agency if the contents "appear to pertain to the
|
|
commission of a crime." Bulletin board operators have voiced concern
|
|
over the ambiguity of this provision, questioning if it implies a duty
|
|
on their part to report on the content of their boards.
|
|
|
|
THE ELECTRONIC FRONTIER: SOME SKIRMISHES
|
|
|
|
It is by no means a foregone conclusion among potential
|
|
regulators of electronic speech that it is wholly protected by the
|
|
First Amendment, but even if that were agreed upon, the issue of how
|
|
to determine the limits of what is permissible, desirable and
|
|
necessary would still loom large. The discussion has been framed by a
|
|
set of paradigms, in which the electronic forum is portrayed as a mix
|
|
of the past - - the American frontier -- and a wholly new phenomenon,
|
|
Cyberspace.
|
|
|
|
The term Cyberspace comes from William Gibson's novel,
|
|
Neuromancer. It is the "place" telephone conversations and most
|
|
financial transactions exist, the home of cyberpunks, and the bane of
|
|
those who prefer to keep personal information private. Though subject
|
|
to legal and social pressures, there is still something untamed about
|
|
it, and so, a writer in Wyoming named John Perry Barlow coined the
|
|
term "the electronic frontier."
|
|
|
|
Hoping to seize the initiative in taming this territory, Barlow
|
|
teamed up with computer entrepreneur Mitch Kapor to create the
|
|
Electronic Frontier Foundation (EFF). Since it began in July 1990, the
|
|
EFF has provided guidance to legislators and courts about civil
|
|
liberties on the frontier, and legal assistance to those whose
|
|
liberties have been threatened.
|
|
|
|
Frontier Law
|
|
|
|
Even with much of its territory up for grabs, Cyberspace has been
|
|
populated for some time, albeit by groups with widely divergent
|
|
perceptions of the communal good. On one side are "hackers," a
|
|
sometimes pejorative term, but used neutrally here to describe people
|
|
who gain unauthorized access to computers for whatever purpose. These
|
|
hackers see themselves as unfettered, adventuresome cowboys who, in
|
|
keeping with the frontier myth, are being fenced in by the settlers --
|
|
the business interests who have staked claim to the terrain -- and by
|
|
the law that tends to protect these established interests.
|
|
|
|
The cowboys defend computer hacking as a harmless pastime, as a
|
|
pioneering activity that expands the boundaries of what is
|
|
electronically possible, or as a political response to proprietary
|
|
interests and individual profit. The settlers attack it as criminal,
|
|
antisocial and malicious activity that costs everyone in money and
|
|
security. By some estimates, computer crime accounts for as much as $5
|
|
billion in losses to government and business yearly.
|
|
|
|
One of the most publicized cases of computer crime involved a
|
|
virus (a software program that can alter data or erase a computer's
|
|
memory) that was unleashed in 1988 over InterNet, an international
|
|
computer network. The virus, known as the Worm, was written by Robert
|
|
Morris, a graduate student at Cornell University, who claimed that he
|
|
had created it as a prank before it got loose and infected thousands
|
|
of government and academic computers. As a first-time offender, Morris
|
|
was given a light sentence, but the principle established by the case
|
|
has been allowed to remain: to get a conviction for computer abuse,
|
|
the government need only prove unauthorized access, not intent to
|
|
harm. This ruling has been compared to punishing a trespasser for the
|
|
more serious offense of burglary or arson.
|
|
|
|
The Morris virus not withstanding, the bulk of computer crime is
|
|
not committed by hackers, but involves credit card fraud or theft by
|
|
people within large companies, which are often reluctant to report it
|
|
and publicize their vulnerability. In setting up the Electronic
|
|
Frontier Foundation, Barlow and Kapor were reacting most directly to
|
|
Operation Sun Devil, a part of a federal effort to combat computer
|
|
crime, which had as its most visible targets young computer hackers
|
|
and their systems of communication.
|
|
|
|
On May 8, 1990, armed with 28 search warrants in 14 cities,
|
|
Secret Service agents seized at least 40 computers and over 50,000
|
|
disks of data from individuals they suspected of possessing illegally-
|
|
obtained information. Only seven arrests resulted, although the
|
|
government kept and searched the computers and software of more who
|
|
were not charged. Information obtained by CPSR under a Freedom of
|
|
Information request reveals that the Secret Service had been
|
|
monitoring on-line communication and keeping files on individuals who
|
|
had committed no crime for several years prior to the raids.
|
|
|
|
Steve Jackson Games
|
|
|
|
The February before the Sun Devil raids, a grand jury indicted
|
|
Craig Neidorf, a student and the publisher of an electronic magazine
|
|
called Phrack, for reprinting a document stolen from a Bell South
|
|
computer. Three hackers had already been sentenced to prison for
|
|
stealing the document, which concerned a 911 emergency system. The
|
|
phone company claimed the document was highly sensitive and set its
|
|
value at $79,499. When Neidorf's case came to trial that July,
|
|
however, it was revealed that the document was publicly available at a
|
|
cost of $30. The government dropped the charges, but the magazine had
|
|
already ceased publication, and Neidorf had incurred about $100,000 in
|
|
legal costs.
|
|
|
|
The Bell South file had been made available to bulletin board
|
|
systems (BBSs) around the country, including one operated by an
|
|
employee of Steve Jackson Games (SJG), a creator and publisher of
|
|
computer games in Austin, Texas. While looking for evidence against
|
|
the employee, Secret Service agents searched the bulletin board run by
|
|
Jackson and found the draft of a rule book for a fantasy game called
|
|
GURPS Cyberpunk. They decided it was a manual for breaking into
|
|
computers.
|
|
|
|
On March 1, 1990, agents raided SJG and seized computers, drafts
|
|
of the game, and all the information and private communication stored
|
|
on the computer used for the bulletin board. Jackson was never charged
|
|
with a crime, but none of his equipment or files was returned until
|
|
nearly four months later. He was forced to lay off half of his
|
|
employees and estimates that the raid cost him $125,000 in publishing
|
|
delays. This is a small-scale equivalent of seizing the printing
|
|
presses and files of The New York Times because the Pentagon papers
|
|
were found on their premises; such raids are expressly forbidden by
|
|
the Privacy Protection Act.
|
|
|
|
With the help of the Electronic Frontier Foundation, Jackson is
|
|
suing the Secret Service for violating his Constitutional rights.
|
|
Specifically, his lawyers are arguing that the request for the search
|
|
warrant caused a prior restraint of a publication, was misleading
|
|
because it did not tell the judge that SJG was a publisher, did not
|
|
meet the specificity requirement of the Fourth Amendment, and failed
|
|
to establish probable cause that criminal activity was taking place.
|
|
The case is in litigation.
|
|
|
|
Meanwhile, the EFF has been working on model search and seizure
|
|
guidelines, which they hope to persuade the American Bar Association
|
|
to adopt in place of its current guidelines for the issuance of search
|
|
warrants relating to business records. In an attempt to make searches
|
|
less intrusive and destructive, EFF recommends that:
|
|
|
|
1. computers used for publishing or electronic bulletin boards be
|
|
afforded the same First Amendment protections as other means of
|
|
publication;
|
|
2. in determining if just cause for seizure of equipment and
|
|
software exists, judges shift the emphasis from what is
|
|
technologically possible (e.g. an electronic trip wire that can erase
|
|
all data) to what is likely to happen;
|
|
3. the search of computer disks take place on a business's
|
|
premises, whenever possible;
|
|
4. under most circumstances, computers be seized only when they
|
|
are the instruments of a crime.
|
|
|
|
Bulletin Boards
|
|
|
|
Electronic bulletin board systems are an increasingly pervasive
|
|
mode of electronic communication and probably the most vulnerable to
|
|
censorship. Part of the problem stems from a lack of definition. Are
|
|
bulletin boards publishers, common carriers, broadcasters, electronic
|
|
file cabinets, owners of intellectual property, private forums,
|
|
libraries, newsstands, a combination, or none of the above? How they
|
|
are categorized will determine if and how they are regulated.
|
|
|
|
BBSs are relatively new, dating from about 1978; today, as many
|
|
as 60,000 may be operating in the U.S. Though most are small and
|
|
specialized, the government operates several big ones, such as
|
|
InterNet, and businesses run others, including the two largest:
|
|
Prodigy (owned by IBM and Sears) and CompuServe (a subsidiary of H & R
|
|
Block). These BBSs allow individuals to "log on" to a host computer by
|
|
use of a modem and telephone lines. Once they are hooked up, users can
|
|
participate in electronic conferences, or conversations, send
|
|
electronic or E-mail to specific individuals, and "post" messages
|
|
directed at a general audience.
|
|
|
|
Most BBSs neither monitor nor control E-mail, but many edit or
|
|
otherwise restrict the messages on their bulletin boards. Some, such
|
|
as the Whole Earth 'Lectronic Link (the WELL) in Sausalito, CA, place
|
|
all responsibility for words posted on their system with the author,
|
|
removing only clearly illegal or libelous material. The WELL
|
|
community of about 5,000 members so far has regulated itself
|
|
effectively. Other systems are less tolerant.
|
|
|
|
In 1988, Stanford University attempted to block a jokes section
|
|
of the bulletin board Usenet after becoming aware of an ethnically
|
|
derogatory joke posted on it. The ban, though official policy, could
|
|
not be implemented technically, and the jokes continued to be
|
|
available throughout the campus. After a protest by students and
|
|
faculty, the ban was lifted.
|
|
|
|
Prodigy has been more successful in controlling the content of
|
|
its bulletin board. It claims the right to do so as a private company
|
|
contracting with customers to deliver a service, and as a publisher
|
|
selecting the content of its on-line publication much as an editor
|
|
edits a letters-to-the-editor page. Messages are first scanned by a
|
|
computer to catch words and phrases Prodigy deems offensive, then
|
|
vetted by employees before being posted.
|
|
|
|
This editing has made for considerable controversy in Prodigy's
|
|
three years of existence. In 1989, Prodigy cut out a section of its
|
|
bulletin board called "health spa" after a yeasty exchange between
|
|
homosexuals and fundamentalists. The next year, it banned messages
|
|
from members protesting its pricing and editorial policies. Then this
|
|
past year, the Anti-Defamation League publicly condemned the bulletin
|
|
board for carrying grossly anti-Semitic messages. Prodigy responded
|
|
that the messages were protected speech, but added the puzzling
|
|
explanation that it made a distinction between derogatory messages
|
|
aimed at individuals and those aimed at groups.
|
|
|
|
The question of what legal precedent to apply to bulletin boards
|
|
moved closer to resolution with a court ruling late in 1991. In Cubby
|
|
v. CompuServe, an electronic newsletter called Skuttlebut claimed that
|
|
it had been defamed by a competitor known as Rumorville, which
|
|
CompuServe publishes on its Journalism Forum. A federal judge in New
|
|
York likened electronic bulletin boards neither to publishers nor
|
|
common carriers, but to distributors of information such as
|
|
newsstands, bookstores and libraries to which a lower standard of
|
|
liability applies. He decided, therefore, that CompuServe could not be
|
|
held liable for statements published through its electronic library,
|
|
particularly because it had no reason to know what was contained
|
|
there.
|
|
|
|
|
|
ELECTRONIC INFORMATION AND PRIVACY
|
|
|
|
Private facts about individuals are much easier to gather and
|
|
store on computer than on paper and are much more accessible to
|
|
unauthorized scrutiny. Thus, computer monitoring challenges
|
|
traditional expectations of privacy, exposes nearly every facet of an
|
|
individual's life to potential public view and commercial use, alters
|
|
the relationship between employers and employees, and opens the way
|
|
for unprecedented government surveillance of citizens. For these
|
|
reasons, concerns about the courts' vitiating the Fourth Amendment
|
|
intensify when computer-based communication and surveillance are
|
|
involved.
|
|
|
|
Gary Marx, professor of sociology at MIT, notes ten
|
|
characteristics of new kinds of computer- based monitoring that make
|
|
them particularly intrusive:
|
|
They transcend boundaries...that traditionally protect privacy.
|
|
They permit the inexpensive and immediate sharing and merging
|
|
and reproducing of information.
|
|
They permit combining discrete types of information.
|
|
They permit altering data.
|
|
They involve remote access which complicates accountability issues
|
|
They may be done invisibly
|
|
They can be done without the subject's knowledge or consent.
|
|
They are more intensive.
|
|
They reveal previously inaccessible information.
|
|
They are also more extensive and they cover broader areas.
|
|
|
|
Privacy and Property
|
|
|
|
At a meeting of Computer Professionals for Social Responsibility
|
|
held in Cambridge, MA October 1991, John Shattuck, Vice President for
|
|
Government, Community and Public Affairs at Harvard University, noted
|
|
that when the Bill of Rights was written, personal liberty was closely
|
|
linked to private property. Thus, the Fourth Amendment protected
|
|
concrete things and places from unreasonable government intrusion.
|
|
|
|
This idea was first upheld in relation to electronic technology
|
|
in 1928, when the Supreme Court ruled in Olmstead v. United States
|
|
that the Fourth Amendment did not apply to wiretapping because
|
|
telephone communication was not a material thing. (It was in his
|
|
dissent on this ruling that Justice Brandeis defined privacy as "the
|
|
right to be left alone.")
|
|
|
|
The principle of protection for tangible property remained
|
|
largely unchallenged until 1967. Then, in Katz v. United States, the
|
|
Supreme Court decided that the Fourth Amendment "protects people, not
|
|
places," and was, therefore, applicable to wiretapping and electronic
|
|
eavesdropping. This decision brought a person's ideas, politics and
|
|
communication under the Amendment's protection for the first time, and
|
|
set "reasonable expectation" as the standard by which to measure
|
|
privacy rights. According to Shattuck, it also began a revolution in
|
|
Fourth Amendment law.
|
|
|
|
From 1967 until the Electronic Communication Protection Act was
|
|
passed in 1986, the only electronic communication covered by law was
|
|
what could be heard. Nearly all computer-based communication remained
|
|
outside traditional and legal privacy protections, even as it was
|
|
becoming the dominant technology.
|
|
|
|
Much of digital communication in the U.S., including medical,
|
|
insurance, personnel and retail transactions still lacks firm legal
|
|
protection from intrusion, and the FBI recently proposed legislation
|
|
that would require that all new telephone systems be designed to allow
|
|
wiretapping, an ability the agency fears is endangered by new
|
|
technology. In the privacy arena, the United States still lags far
|
|
behind Canada, Australia and Western Europe, where at least six
|
|
countries have a constitutional right to privacy and data protection.
|
|
Commercial Uses
|
|
|
|
The Fourth Amendment and the Privacy Protection Act apply only to
|
|
the federal government, leaving commercial intrusion to be addressed
|
|
piecemeal over the past two decades. For instance, the Supreme Court
|
|
ruled in 1976 that there was no constitutional protection for personal
|
|
information held by a bank because bank customers do not own these
|
|
documents. In response, Congress passed the Right to Financial Privacy
|
|
Act two years later to create a statutory protection for bank records.
|
|
|
|
In 1977, the federal Privacy Protection Study Commission looked
|
|
at the Privacy Act, seen then as a flawed compromise, and issued over
|
|
100 recommendations, many of which died at birth. However, one
|
|
recommendation -- that the Privacy Act not be extended to the private
|
|
sector, which should be allowed to comply voluntarily -- was more or
|
|
less adopted by default.
|
|
|
|
Other laws have since been passed to control private access to
|
|
personal information, including the Fair Credit Reporting Act (1970),
|
|
the Debt Collection Act (1982), the Cable Communications Policy Act
|
|
(1984) and the Video Privacy Protection Act (1988). Recently, Rep.
|
|
Robert Wise (D- WV), chair of the Subcommittee on Government
|
|
Operations, tried to establish a Data Protection Commission, but
|
|
without giving it regulatory power.
|
|
|
|
As technology makes its easier to match databases and repackage
|
|
personal information in commercially valuable forms, unease increases
|
|
over the amount of information gathered and retained, where it comes
|
|
from, how accurate it is, what use is made of it, and how individuals
|
|
can control that use, especially when it is reused. Again, computers
|
|
exacerbate the problem because they create a pervasive and long-
|
|
lasting information trail that is decreasingly under the control of
|
|
the individual involved.
|
|
|
|
Often there is no direct relationship between individuals and the
|
|
keeper of information about them, as with credit bureaus. Other
|
|
businesses, such as telephone companies and airlines, collect
|
|
information routinely without external regulation of who sees the
|
|
records or how long they are kept. Even when there is an intimate
|
|
connection, as with medical information, the lack of legal protection
|
|
allows genetic information and records of job-related injuries, for
|
|
example, to end up in private databases that are available to
|
|
employers and insurance companies.
|
|
|
|
Control over one's personal facts becomes even more tenuous when
|
|
data collected by one organization are sold to another, which happens
|
|
regularly without the individual's consent. This "second use" takes
|
|
place primarily among businesses, but non-profit groups sell their
|
|
mailing lists, and government agencies compare databases with
|
|
businesses and each other: tax returns with welfare or student-loan
|
|
records, for example. In 1991, Governor William Weld of Massachusetts
|
|
proposed selling computer access to state Registry of Motor Vehicles
|
|
records to private companies, but was dissuaded by vocal legislative
|
|
opposition to the plan.
|
|
|
|
Privacy advocates are also troubled by deceptive data collection
|
|
techniques and inaccurate information that can be difficult and
|
|
expensive to correct. In July 1991, six state attorneys general sued
|
|
TRW, one of the three big credit-reporting companies, for failure to
|
|
correct major reporting errors. TRW eventually agreed to supply
|
|
individuals with free copies of their credit files on request; other
|
|
companies still charge for such reports.
|
|
|
|
Computers also provide a mechanism for fighting this Big Brother
|
|
scenario. In 1990, Lotus Marketplace worked with Equifax, another
|
|
consumer data collector, to put portions of its database onto compact
|
|
disk so that marketing information about individuals could be sold in
|
|
a convenient format to businesses. When the plan became public, it
|
|
occasioned an outcry of surprising proportions -- about 30,000
|
|
responses, many from people who had learned about the project through
|
|
electronic forums, and nearly all negative. In January 1991, Equifax
|
|
and Lotus bowed to the pressure and scrapped the project. Privacy
|
|
Protections
|
|
|
|
For the past several years, privacy advocates have been working
|
|
to pass policies and laws to protect individuals from the unwanted
|
|
intrusions into their personal lives that computers make easy and
|
|
appealing to businesses. The guiding principles for privacy policy are
|
|
well summed up in a 1989 paper written by Jerry Berman and Janlori
|
|
Goldman for the Benton Foundation:
|
|
1. Information collected for one purpose should not be used for a
|
|
different purpose without the individual's consent.
|
|
2. Policy should be developed with an eye towards new advances in
|
|
information technology and telecommunications.
|
|
3. Legal limits should be placed on the collection and use of
|
|
sensitive information -- the more sensitive the information, the more
|
|
rigorous the disclosure standard.
|
|
4. Individuals must be provided with easy access to their
|
|
records, including access to computerized records, for the purpose of
|
|
copying, correcting, or completing information in the records.
|
|
5. Exemptions for non-disclosure should be clearly justified and
|
|
narrowly tailored to suit the requester's need.
|
|
6. Legislation should include enforcement mechanisms, such as
|
|
injunctive relief, damages, criminal penalties, and reimbursement of
|
|
attorney's fees and costs.
|
|
|
|
Watching Employees
|
|
|
|
Also in the private sector, computers are increasingly being used
|
|
to track employees' use of time, productivity, and communication with
|
|
each other and the public. According to Karen Nussbaum, Executive
|
|
Director of 9to5, the national organization of office workers, the
|
|
work of 26 million employees is monitored electronically, and the
|
|
evaluation and pay of 10 million is determined by computer-generated
|
|
statistics. This kind of monitoring is more intrusive than human
|
|
supervision, she points out, because it watches the personal habits of
|
|
employees and because it is constant.
|
|
|
|
As a form of surveillance, employers often reserve the right to
|
|
read the electronic mail of employees and may do so because the
|
|
Electronic Communications Privacy Act protects electronic mail only on
|
|
public networks. The E-mail systems of large corporations, including
|
|
Federal Express and American Airlines, automatically inform workers
|
|
that the company may read mail sent over the systems. Other companies
|
|
do not inform, but read anyway. When an employee of Epson America, a
|
|
California- based computer company, learned that this was the
|
|
company's practice and complained, she was fired the next day. Her
|
|
lawsuit charging wrongful termination is in litigation.
|
|
|
|
In the fall of 1991, Sen. Paul Simon (D-IL) introduced
|
|
legislation (S. 516) which would require that employees and customers
|
|
be notified if their electronic communication and telephone
|
|
conversations are being monitored, either in specific instances or as
|
|
a policy of their employer. Rep. Pat Williams (D-MT) has introduced
|
|
similar legislation in the House (HR. 1218), and both bills are in
|
|
committee. Government Surveillance
|
|
|
|
The United States government is the largest collector of
|
|
information about people in this country and perhaps the largest
|
|
keeper of personal information in the world. This information consists
|
|
mostly of separate records, such as tax and social security files, but
|
|
in a 1986 study, Congress's Office of Technology Assessment determined
|
|
that, because these files can be matched and combined, a de facto
|
|
national database on Americans already exists.
|
|
|
|
Other information is gathered by surveillance. The FBI's National
|
|
Crime Information System (NCIC) is a high-speed, computerized system
|
|
containing criminal justice information, including Secret Service
|
|
investigations, missing person files, and criminal histories or "rap
|
|
sheets." The system began in 1967 and now runs about one million
|
|
transactions each day. Information is maintained on a computer in
|
|
Washington, DC, which is connected to each state and to 60,000 offices
|
|
including those of sheriffs, prosecutors, courts, prisons, and
|
|
military investigators. For instance, a police officer using the NCIC
|
|
system to find out if a driver he or she has stopped is wanted for a
|
|
crime can call up fingerprints and photos on the database to make an
|
|
on-the-spot identification.
|
|
|
|
The NCIC is proud of the efficiency of its system and claims that
|
|
it has built in safeguards against inaccuracy and abuse. Civil
|
|
libertarians, however, have doubts. In addition questioning whether
|
|
arrests for current actions should be made on the basis of past
|
|
behavior, they point out that data on arrests may be stored separately
|
|
from data on convictions, and that computers make it harder to control
|
|
the spread of inaccurate, outdated or ambiguous information. They also
|
|
fear that the ease in using the system will encourage police to be
|
|
less discerning in stopping people for investigation.
|
|
|
|
There is concern too that the system can be used for purposes
|
|
other than criminal justice, with information shared when someone
|
|
applies for a government or military job or a professional license. In
|
|
1988, the FBI suggested connecting the NCIC to the computers of the
|
|
Department of Health and Human Services, the IRS, the Social Security
|
|
Administration and the Immigration and Naturalization Service; the
|
|
plan was eventually defeated. More recently, alarms were raised by
|
|
disclosures that the FBI conducted years of surveillance of political
|
|
opponents of the Reagan administration's Central American policy,
|
|
though they had committed no crime.
|
|
|
|
Library Awareness Program
|
|
|
|
On June 8, 1987, a clerk at Columbia University's Math/ Science
|
|
Library was approached by two FBI agents who asked for information
|
|
about "foreigners" using the library. This was, the agents said, part
|
|
of the Library Awareness Program under which the FBI tried to enlist
|
|
the assistance of librarians in monitoring the reading habits of
|
|
"suspicious" individuals, variously defined as people with Eastern
|
|
European or Russian-sounding names or accents, or coming from
|
|
countries hostile to the U.S.
|
|
|
|
It is still unclear how extensive the program is -- FBI officials
|
|
have given contradictory information -- but the American Library
|
|
Association (ALA) has verified 22 visits in various parts of the
|
|
country that appear to have had the same purpose, and, in one
|
|
statement, the FBI said the program was 25 years old. The FBI has also
|
|
requested computerized check-out records from technical and science
|
|
libraries and has asked private information providers, including Mead
|
|
Data Central and Charles E. Simon Co., to help monitor use of their
|
|
databases. Although public and university libraries do not have
|
|
classified information, the FBI has justified its interest in library
|
|
use by a version of the "information mosaic" theory: that discrete and
|
|
benign pieces of information can be put together to present a danger
|
|
to national security and therefore need to be controlled.
|
|
|
|
Monitoring library usage is illegal in 44 states and the District
|
|
of Columbia and violates an ALA policy, dating from 1970, that
|
|
prohibits the disclosure of information about patrons' reading habits.
|
|
|
|
In July 1987, the ALA wrote the FBI to inquire about the Library
|
|
Awareness Program, and the National Security Archive filed an FOIA
|
|
request asking for records about the program. The FBI responded that
|
|
it had no records under that name, and Quin Shea, who was then Special
|
|
Counsel to the Archive, says they probably didn't, since the real name
|
|
of the program is classified. The Archive filed a second FOIA request
|
|
that September, and the ALA filed its own requests in October and
|
|
December.
|
|
|
|
In September 1988, the ALA Intellectual Freedom Committee met
|
|
with high-level representatives of the FBI. That same month, FBI
|
|
Director William Sessions wrote Rep. Don Edwards (D-CA) that the
|
|
program would be limited to technical libraries in the New York City
|
|
area, presumably where the concentration of spies is greatest, and
|
|
that cooperation of librarians would be voluntary. It was only in the
|
|
summer of 1989, after Edwards and other members of Congress had gotten
|
|
involved and the Archive had sued the FBI, that about 1200 pages of
|
|
documents were released. These showed, among other things, that some
|
|
librarians did cooperate. The Archive is again suing the FBI for the
|
|
release of more material.
|
|
|
|
ACCESS TO GOVERNMENT INFORMATION
|
|
|
|
Privacy advocates and policy makers have long emphasized the
|
|
importance of an individual's right to review information held about
|
|
him or her. But, though the federal government has been collecting
|
|
large amounts of information since the end of the last century, the
|
|
public's right to monitor that information and the government's
|
|
activities, has gained cache only fairly recently.
|
|
|
|
The Freedom of Information Act (FOIA) was passed in 1966, and
|
|
strengthened in 1974, followed in 1976 by the Sunshine Act. These laws
|
|
gave the public greater access to information about government
|
|
practices and decision making. Significantly, this swing toward
|
|
openness in government took place at the same time that technological
|
|
developments provided the government with ever greater information-
|
|
collecting abilities.
|
|
|
|
Information policy, the means by which government information is
|
|
made available, can be divided into three broad categories:
|
|
disclosure, access and dissemination. The past decade has seen
|
|
cutbacks in all three areas: for example, a 10% annual increase in
|
|
classification decisions since 1982; the elimination or privatization
|
|
of one in four government publications since 1981 under the Paperwork
|
|
Reduction Act; and foot dragging or outright hostility on Freedom of
|
|
Information requests. In addition, the computerization of government
|
|
operations has consistently been designed for bureaucratic efficiency
|
|
with little interest in increased openness or access. Electronic
|
|
Access and Freedom of Information
|
|
|
|
One major area of debate in information policy is the effect of
|
|
computerization on the FOIA. Theoretically at least, it is easier to
|
|
search and retrieve records by computer than by hand, thereby
|
|
lessening the burden on the responding agency and making them more
|
|
amenable to FOI requests. But it is also likely that the volume and
|
|
variety of requests will grow as the possibilities of information
|
|
searches become apparent.
|
|
|
|
The Act mandates that records of the executive branch of
|
|
government be available to the public on request, exempting only nine
|
|
narrowly-defined categories, and it is almost universally accepted by
|
|
now that electronic records are covered along with those on paper.
|
|
There have been legal decisions to the contrary, which have placed
|
|
privacy above disclosure concerns, but these have usually involved
|
|
requests for information to be used commercially.
|
|
|
|
However, since the FOIA was written with paper records in mind,
|
|
it left unaddressed the questions of what constitutes a record and a
|
|
reasonable search, and what format is required for making information
|
|
available. These and other disputes are currently being arbitrated by
|
|
the courts, Congress and the agencies involved. The balancing act
|
|
between access and privacy also becomes trickier with electronic
|
|
storage of information. In 1977, the Supreme Court looked at a state's
|
|
records of people who obtained prescription drugs legally and
|
|
determined that this centralized file included sufficient safeguards
|
|
to protect privacy, making it constitutional. Still, the Court found
|
|
that government collection of personal information did pose a threat
|
|
to privacy because "that central computer storage of the data thus
|
|
collected...vastly increases the potential for abuse of that
|
|
information." A similar privacy concern informed a more recent Supreme
|
|
Court decision in which the Reporters Committee for Freedom of the
|
|
Press was denied access to FBI criminal history records in
|
|
computerized form.
|
|
|
|
In addition to arguing against disclosure on privacy grounds, the
|
|
Justice Department has opposed requests for records analyzed and
|
|
combined by computer, maintaining that this is equivalent to creating
|
|
a new record, something the FOIA does not require an agency to do.
|
|
Independent studies, however, tend to conclude that this is more like
|
|
searching through an electronic filing cabinet and suggest that
|
|
disputes be settled by applying a standard of reasonable effort, a
|
|
term yet to be defined satisfactorily.
|
|
|
|
A third major area of dispute is the form in which the requested
|
|
information is made available. This problem arises in two different
|
|
situations: where the data exist in more than one format and a
|
|
requester has a preference, and where they do not exist in the format
|
|
requested. The first is more common and more controversial. In 1984, a
|
|
district court ruled that the government does not have to provide
|
|
information in a requested format in order to fulfill its FOIA
|
|
obligation (Dismukes v. Department of Interior, 603 F. Supp. 760 (DDC
|
|
1984)). But in Department of Justice v. Tax Analysts (492 U.S. 136
|
|
(1989)), the court determined that an agency can withhold a record
|
|
only if it falls under one of the delineated exemptions. This ruling
|
|
suggests that such a rationale would override Dismukes in a new court
|
|
case.
|
|
|
|
In 1989, the Justice Department asked federal agencies how they
|
|
viewed their obligations under FOIA to provide electronic information.
|
|
The survey found wide variation among agencies, but a tendency against
|
|
disclosure:
|
|
# 76% of the respondents did not think the law required them to
|
|
create new, or modify existing, computer programs to search for
|
|
requested information;
|
|
# 47% did not think they had to create new programs to separate
|
|
disclosable from classified information;
|
|
# 59% did not think the FOIA required them to comply with the
|
|
requested format.
|
|
|
|
Sen. Leahy is attempting to codify these requirements through a
|
|
proposed Electronic Freedom of Information Improvement Act (S. 1939),
|
|
which will come up for a hearing this spring. This amendment to the
|
|
FOIA would require agencies to provide records in the form requested
|
|
and make a reasonable effort to provide them in electronic form, if
|
|
requested, even if they are not usually kept that way. It defines
|
|
"record" to include "...computer programs, machine readable materials
|
|
and computerized, digitized, and electronic information, regardless of
|
|
the medium by which it is stored..." "Search" is defined to include
|
|
automated examination to locate records.
|
|
|
|
While many researchers and journalists support Leahy's bill, some
|
|
public interest groups worry that, like other legislation targeting
|
|
electronic communication, this will draw unwelcome scrutiny to the
|
|
issue. Instead, they support an evolutionary process involving
|
|
education and specific appeals to agencies.
|
|
|
|
Transactional Data and the IRS
|
|
|
|
The manipulation of data in a usable format is a useful tool in
|
|
analyzing how government agencies really work. One particularly rich
|
|
vein is transactional information, data recorded by government
|
|
agencies in the course of their work. When this information is matched
|
|
with other statistics, it can be analyzed to reveal what might
|
|
otherwise be obscured about the activities of the government.
|
|
|
|
A successful practitioner of this kind of investigation is
|
|
investigative journalist David Burnham. In A Law Unto Itself: Power,
|
|
Politics and the IRS, Burnham reports that computerized files obtained
|
|
from the IRS revealed that audit rates vary widely among sections of
|
|
the country, as does the likelihood of property seizure for delinquent
|
|
taxes. He also discovered that there had been no increase in non-
|
|
compliance rates over the past 15 years, although the IRS used the
|
|
threat of increasing tax evasion as a basis for requesting new money
|
|
for enforcement. The IRS had failed to adjust for inflation or margin
|
|
of error in their calculations.
|
|
|
|
Burnham drew some of his conclusions from the work of Susan Long,
|
|
Director of the Center for Tax Studies at Syracuse University. Burnham
|
|
and Long founded the Transactional Records Access Clearinghouse (TRAC)
|
|
with the goal of forcing the release of government data not available
|
|
before. Long, who began her siege on the IRS in 1969, filed 13 FOIA
|
|
requests to that agency and frequently took it to court to force it to
|
|
open its records. She won a precedent-setting victory in Long v. IRS
|
|
(596 F. 2nd 362 (9th Cir. 1979), with a ruling that the FOIA
|
|
definition of "record" covered data on computer tapes. Her lawsuit,
|
|
concerned the Taxpayer Compliance Measurement Program (TCMP), which
|
|
measures the effectiveness of the IRS system and determines who will
|
|
be audited. Although the data produced were kept so secret that they
|
|
were withheld even from the Government Accounting Office, Long found
|
|
that the information had little effect on the IRS's audit coverage,
|
|
even when it pointed up regions or classes that were under- audited.
|
|
|
|
ENHANCING FREE EXPRESSION WITHIN THE ELECTRONIC FORUM
|
|
|
|
The dangers of assuming that because a technology is value-free
|
|
and neutral, the uses to which it is put will also be benign are well-
|
|
documented and real. But for all the new or magnified threats to
|
|
individual liberties arising from computer-assisted communication, the
|
|
electronic forum also offers the means to increase those liberties by
|
|
expanding the possibilities for talking and working together and for
|
|
building political and social alliances. Widespread and fairly
|
|
allocated computerized resources can offer: increased citizen
|
|
participation in and oversight of government affairs; assembly,
|
|
organizing and debate unrestricted by geographical distances or
|
|
boundaries; decentralized decision making; a challenge to news and
|
|
publishing monopolies; rapid international exchange of information;
|
|
and individually-tailored, focused information to combat the
|
|
information glut that interferes with communication.
|
|
|
|
Stewart Brand has said that information wants to be free, and
|
|
this may be nowhere more true than in electronic communication, which,
|
|
by its very design, abhors censorship and monopolies (though history
|
|
has proven that technology does not outsmart repression for long). It
|
|
is important that those concerned with civil liberties enter the
|
|
electronic forum with a mixture of optimism and vigilance and take
|
|
part in the debate on its future while that debate is still open.
|
|
|
|
|
|
FOR FURTHER INFORMATION:
|
|
|
|
|
|
Berman, Jerry and Janlori Goldman.
|
|
A Federal Right of Information Privacy: The Need for Reform.
|
|
Washington, DC: Benton Foundation, 1989.
|
|
|
|
Berman, Jerry. "The Right to Know: Public Access to Electronic
|
|
Public Information." Software Law Journal
|
|
Summer 1989:491-530 (reprinted by The Markle Foundation).
|
|
|
|
Burnham, David. A Law Unto Itself: Power, Politics and the IRS. NY:
|
|
Random House, 1989.
|
|
|
|
" " The Rise of the Computer State. NY: Random House, 1983.
|
|
|
|
Demac, Donna A. "The Electronic Book." American Writer Winter 1992.
|
|
|
|
Ermann, M. David et al. Computers, Ethics, & Society. NY: Oxford UP,
|
|
1990.
|
|
|
|
Index on Censorship July 1991. Section on computers and free speech.
|
|
|
|
"Is Computer Hacking a Crime? A Debate From the Electronic
|
|
Underground." Harper's March 1990:45-57.
|
|
|
|
Lacayo, Richard. "Nowhere to Hide." Time 11/11/91: 34-40.
|
|
|
|
Office of Information and Privacy. Department of Justice Report on
|
|
"Electronic Record" Issues Under the Freedom of Information Act.
|
|
Washington, DC, 1990.
|
|
|
|
Perritt, Henry H. Jr. (prepared report). Electronic Public Information
|
|
and the Public's Right to Know.
|
|
Washington, DC: Benton Foundation, 1990.
|
|
|
|
Pool, Ithiel de Sola. Technologies of Freedom. Cambridge, MA:
|
|
Harvard UP, 1983.
|
|
|
|
Proceedings of The First Conference on Computers, Freedom & Privacy.
|
|
Los Alamitos, CA: IEEE Computer
|
|
Society Press, 1991.
|
|
|
|
Reporters Committee for Freedom of the Press.
|
|
Access to Electronic Records. Washington, DC, 1990.
|
|
|
|
Rosenberg, Roni. Selected and Annotated Bibliography on
|
|
Computers and Privacy. Palo Alto: Computer
|
|
Professionals for Social Responsibility.
|
|
|
|
Scientific American. Special issue on communications, computers
|
|
and networks. Sept. 1991.
|
|
|
|
Shattuck, John and Muriel Morisey Spence. Government Information
|
|
Controls: Implications for Scholarship,
|
|
Science and Technology. Association of American Universities
|
|
occasional paper, 1988.
|
|
|
|
Westin, Alan. Privacy and Freedom. NY: Atheneum, 1967.
|
|
|
|
|
|
RESOURCES
|
|
|
|
ACLU Project on Privacy and Technology
|
|
122 Maryland Avenue, NE
|
|
Washington, DC 20002
|
|
(202) 675-2320
|
|
privacy issues
|
|
|
|
Computer Professionals for Social
|
|
Responsibility
|
|
National Office
|
|
P.O. Box 717
|
|
Palo Alto, CA 94302
|
|
415/322-3778
|
|
general political and social issues
|
|
|
|
Electronic Frontier Foundation
|
|
155 Second Street
|
|
Cambridge, MA 02141
|
|
617/864-0665
|
|
general political and legal issues
|
|
|
|
National Writers Union
|
|
13 Astor Place, 7th floor
|
|
New York, NY 10003
|
|
(212) 254-0279
|
|
intellectual property issues
|
|
|
|
Public Citizen
|
|
2000 P Street, Suite 700
|
|
Washington, DC 20036
|
|
(202) 833-3000
|
|
privacy issues
|
|
|
|
Reporters Committee for Freedom of the Press
|
|
1735 Eye Street, NW, suite 504
|
|
Washington, DC 20006
|
|
(202) 466-6312
|
|
access to government information
|
|
|
|
Transactional Records Access Clearinghouse
|
|
478 Newhouse II
|
|
Syracuse, NY 13244
|
|
(315) 443-3563
|
|
access to government information
|
|
|
|
|
|
For more information, contact:
|
|
Gara LaMarche, (212) 972-8400 (o)
|
|
(718) 789-5808 (h)
|
|
* * *
|
|
|
|
|
|
This newsletter is a publication of the Fund for Free Expression,
|
|
which was created in 1975 to monitor and combat censorship around the
|
|
world and in the United States. It was researched and written by Nan
|
|
Levinson,a freelance writer based in Boston and the U.S. correspondent
|
|
for Index on Censorship.
|
|
|
|
The Chair of the Fund for Free Expression is Roland Algrant; Vice
|
|
Chairs, Aryeh Neier and Robert Wedgeworth; Executive Director, Gara
|
|
LaMarche; Associate, Lydia Lobenthal. The members are Alice Arlen,
|
|
Robert L. Bernstein, Tom A. Bernstein, Hortense Calisher, Geoffrey
|
|
Cowan, Dorothy Cullman, Patricia Derian, Adrian DeWind, Irene Diamond,
|
|
E.L. Doctorow, Norman Dorsen, Alan Finberg, Francis FitzGerald, Jack
|
|
Greenberg, Vartan Gregorian, S. Miller Harris, Alice H. Henkin, Pam
|
|
Hill, Joseph Hofheimer, Lawrence Hughes, Ellen Hume, Anne M. Johnson,
|
|
Mark Kaplan, Stephen Kass, William Koshland, Judith F. Krug, Jeri
|
|
Laber, Anthony Lewis, William Loverd, Wendy Luers, John Macro, III,
|
|
Michael Massing, Nancy Meiselas, Arthur Miller, The Rt. Rev. Paul
|
|
Moore, Jr., Toni Morrison, Peter Osnos, Bruce Rabb, Geoffrey Cobb
|
|
Ryan, John G. Ryden, Steven R. Shapiro, Jerome Shestack, Nadine
|
|
Strossen, Rose Styron, Hector Timerman, John Updike, Luisa Valenzuela,
|
|
Nicholas A. Veliotes, Kurt Vonnegut, Jr., Gregory Wallance and Roger
|
|
Wilkins.
|
|
|
|
The Fund for Free Expression is a division of Human Rights Watch,
|
|
which also includes Africa Watch, Americas Watch, Asia Watch, Helsinki
|
|
Watch, Middle East Watch, and special projects on Prisoners' Rights
|
|
and Women's Rights. The Chair is Robert L. Bernstein and the Vice
|
|
Chair is Adrian W. DeWind. Aryeh Neier is Executive Director; Kenneth
|
|
Roth, Deputy Director; Holly J. Burkhalter, Washington Director; Susan
|
|
Osnos, Press Director.
|