778 lines
38 KiB
Plaintext
778 lines
38 KiB
Plaintext
|
|
Computer underground Digest Sun Dec 16, 1997 Volume 7 : Issue 97
|
|
ISSN 1004-042X
|
|
|
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU
|
|
Archivist: Brendan Kehoe
|
|
Shadow Master: Stanton McCandlish
|
|
Field Agent Extraordinaire: David Smith
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
|
|
|
CONTENTS, #7.97 (Sun, Dec 16, 1997)
|
|
|
|
File 1--CuD is Changing Servers - RESUBS ARE NECESSARY
|
|
File 2-- ALERT: The Net rocks the capitol;still time to call (fwd)
|
|
File 3-- Last Stop Before the Censorship State (Reprint)
|
|
File 4--Re: Child Pornography and Beastiality
|
|
File 5--Response to "Bestiality on the Net (Re: CuD 7.96)
|
|
File 6--Privacy: What is it?
|
|
File 7--Computer, Freedom and Privacy 1996
|
|
File 8--Cu Digest Header Info (unchanged since 5 Nov, 1995)
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
---------------------------------------------------------------------
|
|
|
|
Date: Sun, 16 Dec, 1995 16:19:32 CST
|
|
From: CuD Moderators <tk0jut2@mvs.cso.niu.edu>
|
|
Subject: File 1--CuD is Changing Servers - RESUBS ARE NECESSARY
|
|
|
|
** CuD IS CHANGING SERVERS **
|
|
|
|
In about mid-January, Cu Digest will be moving to a new server at
|
|
weber.ucsd.edu. We're following the strong consensus of readers and
|
|
requiring that, to continue to receive CuD after mid-January, you must
|
|
RE-SUBSCRIBE.
|
|
|
|
Although the move will not take place for a few weeks, you can enter
|
|
your subscribtion before then, so WE STRONGLY URGE YOU TO SUB NOW.
|
|
|
|
Re-subbing is easy. Just send a message with this in the
|
|
"Subject:" line
|
|
SUBSCRIBE CU-DIGEST
|
|
|
|
send it to:
|
|
|
|
cu-digest-request@weber.ucsd.edu
|
|
|
|
Issues will still be sent out from the older server for a few weeks,
|
|
so the strategy is to collect the resubs first, and then make the
|
|
transition.
|
|
|
|
If you prefer to access CuD from Usenet, use
|
|
comp.society.cu-digest
|
|
|
|
If you prefer archives, you can use the ftp/www site at
|
|
ftp.eff.org (or www.eff.org) or the CuD archives at:
|
|
http://www.soci.niu.edu/~cudigest.
|
|
|
|
We also hope to have a mail archive set up soon as well.
|
|
|
|
You can still contact the moderators at:
|
|
cudigest@sun.soci.niu.edu
|
|
or tk0jut2@mvs.cso.niu.edu
|
|
|
|
Please *DO NOT* send inquiries to the server at UIUC.
|
|
|
|
Jim and Gordon
|
|
|
|
------------------------------
|
|
|
|
Date: Wed, 13 Dec 1995 23:33:11 -0500 (EST)
|
|
From: "Shabbir J. Safdar" <shabbir@VTW.ORG>
|
|
Subject: File 2-- ALERT: The Net rocks the capitol;still time to call (fwd)
|
|
|
|
========================================================================
|
|
CAMPAIGN TO STOP THE NET CENSORSHIP LEGISLATION IN CONGRESS
|
|
|
|
THE NET ROCKS AMERICA'S CAPITOL - NEARLY 20,000 PARTICIPANTS
|
|
THURSDAY DECEMBER 14, 1995
|
|
|
|
SENATE CONFEREES COULD STILL VOTE THIS WEEK
|
|
RALLIES HAPPENING IN AUSTIN, NEW YORK, SF, & SEATTLE
|
|
|
|
PLEASE WIDELY REDISTRIBUTE THIS DOCUMENT WITH THIS BANNER INTACT
|
|
REDISTRIBUTE ONLY UNTIL December 25, 1995
|
|
________________________________________________________________________
|
|
|
|
RECAP: INTERNET DAY OF PROTEST: TUESDAY DECEMBER 12, 1995
|
|
|
|
The net came into its own as a political force on Tuesday. The
|
|
press release has more details. If you haven't taken a moment to
|
|
call, fax, or email, do so now. We're still keeping track and only
|
|
need a few more to break 20,000.
|
|
|
|
VTW had someone onhand in DC monitoring the response at the Congressional
|
|
offices. The feedback was amazing; Congress got the message. We need to
|
|
sustain that by continuing to tell them we're not happy with the options
|
|
being offered to us at this time.
|
|
|
|
Directions for calling Congress can still be found at http://www.vtw.org/
|
|
and the many other sites listed at the end of this message. Take a moment
|
|
to call! Don't forget to mail us a note at protest@vtw.org to let us
|
|
know you took part in the Day Of Protest (and Day 2, and Day 3, and Day 4).
|
|
|
|
|
|
FOR IMMEDIATE RELEASE December 13, 1995
|
|
Contact: Steven Cherry
|
|
(718) 596-2851
|
|
stc@vtw.org
|
|
Shabbir Safdar
|
|
(718) 596-2851
|
|
shabbir@vtw.org
|
|
|
|
New York, NY
|
|
|
|
Are 20,000 phone calls a lot? 30,000? 50,000? They are if you're one of a
|
|
handful of Congressional staffers trying to field them. Tuesday, December
|
|
12th was the Internet's Day of Protest. A variety of net-activists and
|
|
telecommunications-related services exhorted the on-line community to call
|
|
a selected group of Senators and Representatives to declare their
|
|
opposition to the threat of Internet censorship. And call they did.
|
|
|
|
As the Senate members of the Telecommunications Reform conference
|
|
committee contemplated portions of legislation that would censor
|
|
"indecent" material on-line, their staffers were being overwhelmed with
|
|
phone calls. Senator Inouye's office said they were "getting lots and lots
|
|
of calls and faxes." Senator Lott's said they were "flooded with calls."
|
|
At Senator Stevens' office there were so many calls they couldn't keep
|
|
a complete tally.
|
|
|
|
At Senator Exon's office, the fax machine was "backed up." And at one
|
|
point, activists couldn't even get through to Senator Gorton's office to
|
|
ask. Exon is the Senator whose Communications Decency Act started the
|
|
nearly year-long struggle between those who would create special
|
|
regulations to restrict speech on-line (even, in certain instances,
|
|
private email between two individuals) to a greater extent than even
|
|
traditional broadcast media; regulations that, according to the ACLU and
|
|
many other civil liberties groups, will certainly be proven to be
|
|
unconstitutional if passed into law.
|
|
|
|
"We've never seen anything like it," said Stanton McCandish of the
|
|
Electronic Frontier Foundation (EFF). The EFF is one member of the on-line
|
|
coalition that has been fighting an array of censorship legislation since
|
|
this spring, when Senator Exon introduced his Communications Decency Act.
|
|
|
|
"We may have almost overwhelmed our provider," said Shabbir Safdar, head
|
|
of Voter's Telecommunications Watch (VTW). VTW is the organization that
|
|
organized the on-line coalition. Their on-line connectivity is provided by
|
|
Panix.com, a New York-area Internet service provider. "Panix has been
|
|
doing some maintenance work today, so it's hard to tell," Safdar
|
|
continued. "But we think it's actually made a dent in their connection
|
|
to the rest of the Net."
|
|
|
|
How many calls were actually made? No one can tell. For Leslie Miller, a
|
|
reporter for USA Today, it took much of the afternoon to get some counts
|
|
from Congressional staffers, and she couldn't get any report from the
|
|
Senate's Sergeant-At-Arms, the office nominally responsible for the
|
|
Senate's telephone system. VTW may be the only organization that can
|
|
really make an educated guess.
|
|
|
|
"In our Alerts we ask that people drop us an email note after they call,"
|
|
explained VTW board member Steven Cherry. "The message count peaked in the
|
|
late afternoon at over 70 per minute. Many of those were from people who
|
|
called several offices. By 7:30 P.M. (EST) we had gotten 14,000 messages.
|
|
By Wednesday morning the count was over 18,000. And of course there are
|
|
the people who called but didn't send us email. So all told, our very
|
|
rough guess is there were well over 50,000 phone calls and faxes made on
|
|
the one day."
|
|
|
|
"The Net is coming of age, politically," said Jerry Berman, Director of
|
|
the Center for Democracy and Technology (CDT), another member of the
|
|
on-line coalition. Safdar, of VTW, concurred, saying, "I think Washington
|
|
got the message today that there's a new grass-roots interest group
|
|
around, and we're going to be a big part of the 1996 elections." (VTW's
|
|
initial election activities can be found at http://www.vtw.org/pledge.)
|
|
|
|
In addition to the Day of Protest, rallies are scheduled on Thursday,
|
|
December 14th, in San Francisco and Seattle, and a protest will be held
|
|
that day at 2:00 in New York City.
|
|
|
|
The New York rally will be at the Cyber-Cafe, 273A Lafayette St from 2-3pm
|
|
on Thursday, Dec 14th. Contact Steven Cherry or Shabbir J. Safdar for
|
|
details.
|
|
|
|
The Austin rally is planned for Tue. Dec 19th. No more information is
|
|
available at this time.
|
|
|
|
Information about the San Francisco rally can be obtained from
|
|
http://www.hotwired.com/staff/digaman/.
|
|
|
|
Information about the Seattle rally can be obtained from
|
|
http://www.wnia.org/WNIA/hap/rally.html.
|
|
|
|
Voters Telecommunications Watch is a volunteer organization, concentrating
|
|
on legislation as it relates to telecommunications and civil liberties.
|
|
VTW publishes a weekly BillWatch that tracks relevant legislation as it
|
|
progresses through Congress. It publishes periodic Alerts to inform the
|
|
about immediate action it can take to protect its on-line civil liberties
|
|
and privacy.
|
|
|
|
More information about VTW can be found on-line at
|
|
|
|
gopher -p 1/vtw gopher.panix.com
|
|
www: http://www.vtw.org
|
|
|
|
or by writing to vtw@vtw.org. The press can call (718) 596-2851 or
|
|
contact:
|
|
|
|
Shabbir Safdar Steven Cherry
|
|
shabbir@vtw.org stc@vtw.org
|
|
|
|
------------------------------
|
|
|
|
Date: Sun, 17 Dec 1995 16:47:19 -0600
|
|
From: jthomas@SUN.SOCI.NIU.EDU(Jim Thomas)
|
|
Subject: File 3-- Last Stop Before the Censorship State (Reprint)
|
|
|
|
From: Howard Rheingold (hlr@well.com)
|
|
Date: Fri Dec 15 '95 (14:52)
|
|
|
|
Last Stop Before the Censorship State
|
|
|
|
By Howard Rheingold
|
|
|
|
|
|
Americans have one last chance before we lose the Net. If
|
|
American citizens write, call, and fax the President now and urge him to
|
|
veto the telecommunications deregulation bill, we might not lose an
|
|
opportunity to revitalize the democratic process and grow hundreds of
|
|
thousands of small Net-based businesses. And we might not hand over a
|
|
nascent native industry - the industry of the twenty first century - to
|
|
international competitors.
|
|
The effects of this legislation [BILL NUMBERS TK] go far beyond
|
|
the Internet, reaching into every aspect of American lives, undoubtedly
|
|
influencing the shape of the democracy our children will grow up in. This
|
|
telecommunications bill encourages the concentration of ownership of all
|
|
news, entertainment, and communication media, institutes censorship
|
|
provisions that will put online service providers out of business, cut
|
|
off universities from the worldwide network, and turn American
|
|
scientists, engineers, educators, entrepreneurs into a nation of
|
|
Net-morons in an increasingly online world. This bill allows rates to
|
|
rise too high and too fast, is generous with megacorporations and stingy
|
|
with education, and it completely ignores the widening gap between
|
|
information-rich and information-poor.
|
|
Through months of committee debates and decisions, censors and
|
|
monopolists have won every battle over the future of the Internet. By
|
|
shamelessly exploiting legislators' and citizens' ignorance of the nature
|
|
of the Internet, a small group who are intent upon imposing their brand
|
|
of morality on everyone else,are about to silence a potentially powerful
|
|
medium for citizen-to-citizen communication, cripple American industries
|
|
trying to compete in global markets, and create a Federal bureaucracy
|
|
with the power to determine what is decent for citizens to say.
|
|
Congress will almost certainly send to the President a
|
|
telecommunications reform bill that can send people to jail for two years
|
|
and fine them $100,000 for mentioning the seven words that are forbidden
|
|
from radio and television. Mention of abortion, condoms or safe sex are
|
|
almost certain to be the next items forbidden. American universities, on
|
|
the advice of their attorneys will turn off all Internet access for their
|
|
students as soon as the law goes into effect.
|
|
American citizens don't have to be electrical engineers to
|
|
understand the nature of the new communication media. But we do need to
|
|
have the truth told and the complexities explained, and that has not
|
|
happened. Computer BBSs, e-mail, citizen networks, mean that you no
|
|
longer have to own a press to benefit from freedom of the press: every
|
|
desktop connected to the Net is a printing press, a place of assembly, a
|
|
broadcasting station. The idea that ordinary taxpayers should have the
|
|
power to publish eyewitness reports, argue policy, distribute information
|
|
threatens the old power structures. Politicians and corporations whose
|
|
fortunes are based on control of mass media fear their power will erode
|
|
to the citizens.
|
|
Legislators have failed to uphold their oath to defend the
|
|
Constitution by pursuing such nonsense as flag-burning amendments to the
|
|
Constitution while at the same time destroying the liberties that flag
|
|
symbolizes. Internet censorship legislation is not about pornography on
|
|
the Internet - that will easily move offshore. It's about who will have
|
|
the power and control to broadcast words, images, and sounds, to everyone
|
|
else. Citizens? Or cartels?
|
|
A trillion-dollar pie is being cut up. We, the people, are
|
|
getting cut out. Speak up. We still have the right to communicate with
|
|
the President and demand that he hold the line. Tell him to send this
|
|
back to Congress. We've been living for sixty years under the rules set
|
|
forth in the Communications Act of 1934. Now the Congress is changing the
|
|
rules again, determining the way our nation and its industries will
|
|
communicate, educate, and do business for decades to come. We deserve
|
|
better than this. Tell Clinton to tell Congress to try again, to cut the
|
|
citizens of this country into the deal, and to keep their hands off the
|
|
Bill of Rights.
|
|
|
|
------------------------------
|
|
|
|
From: glaze@RCLSGI.ENG.OHIO-STATE.EDU(Larry Glaze)
|
|
Subject: File 4--Re: Child Pornography and Beastiality
|
|
Date: Thu, 14 Dec 1995 10:48:04 -0500 (EST)
|
|
Content-Length: 7350
|
|
|
|
Patrick A. Townson <ptownson@LCS.MIT.EDU> wrote in File 5--Child
|
|
Pornography and beastiality, Cu Digest, #7.96:
|
|
|
|
>No sysadmin is required to carry any alt group not of his (or his
|
|
>employer's) liking. No explanation required, it simply does not
|
|
>appear on his news spool. Some sites don't carry ANY alt groups
|
|
>period. Some sites have even violated the (long-ago) gentlemen's
|
|
>agreement of Usenet that for widest possible propogation, each
|
|
>site carry all groups, i.e. as a courtesy I display messages from
|
|
>your users and in return you display messages from my users.
|
|
|
|
Very true.
|
|
|
|
>So if the sysadmin at your site carries alt.sex.whatever.variations
|
|
>on his spool, it is because he *wants* to carry it there. It
|
|
>might be a business decision (lots of subscribers paying good money
|
|
>to have this available to read) or a personal decision (he wants
|
|
>to read it himself). Don't believe him if he rationalizes it
|
|
>by claiming 'we have to carry all newsgroups'. He can make the
|
|
>needed changes in the system .newsrc file, and that, as they say,
|
|
>will be that. It is doubtful these days he has to carry all of
|
|
>the Usenet groups and he never was required to carry alt groups.
|
|
|
|
Due to the size of Usenet, you are not required to carry anything you
|
|
don't want to. There are thousands of newsgroups related to only one
|
|
city, or one country. We do not have to carry any of these newsgroups,
|
|
nor do we have to carry any of the more traditional ones. The
|
|
bandwidth and disk space required for a full newsfeed has gotten
|
|
so large that it is impossible for most sites to carry a full
|
|
feed.
|
|
|
|
>If you do NOT want to have such a newsgroup, then you tell your
|
|
>syadmin about it. You tell him in your opinion it cheapens and
|
|
>harms the reputation of his site by having those groups available.
|
|
>You ask him to remove them (or not make them available for public
|
|
>reading) and perhaps you offer to take your business elsewhere
|
|
>to a site you feel is better operated, or with higher quality.
|
|
>If the sysadmin gets enough comments on a newsgroup, he will take
|
|
>action on that group.
|
|
|
|
Oh, come on now. This is the equivalent of 'I don't like this
|
|
channel on my cable services so I am going to try to get the
|
|
cable services to drop it so nobody can watch it.' That is
|
|
totally uncalled for. If someone doesn't like a newsgroup, then
|
|
they don't have to subscribe to it. Like you say, it is as
|
|
simple as that. If you don't like it personally and feel strongly
|
|
enought about it then the best thing to do would be to leave. But
|
|
lets not keep everyone else using the services from reading a
|
|
particular newsgroup you don't like. It is as much their right to
|
|
choose to read a newsgroup as it is yours to choose not to.
|
|
|
|
> After all, there are people who read {The New York Times} specifically
|
|
> because they do not fill up their pages with the likes of columnists
|
|
> like Ann Slanders or her sister Scabby Van Buren, and I believe
|
|
> sites which carry only a limited subset of the news, picking the
|
|
> groups which meet their taste requirements have a place also.
|
|
|
|
I agree.
|
|
|
|
> Just because 'child porn may be legal in some countries in Europe' (I
|
|
> hear that one a lot) and just because the {New York Times} is sold and
|
|
> distributed regularly in Europe and a lot of the readers are European
|
|
> there still is no requirement that the {New York Times} print child
|
|
> porn under some vaugely thought out line of reasoning which says 'well
|
|
> it came here on our newsfeed from someplace in Europe where it is
|
|
> legal so how can the authorities here punish us for printing it?' ...
|
|
> Very easily ... that is what editors are for. If you carry
|
|
> Usenet/altnet/*net news on your site, then the sysadmin becomes an
|
|
> editor by default.
|
|
>
|
|
> Remember, a 'news' group without any news spools to sit on really
|
|
> doesn't exist. Self-censorship is the best censorship of all ... it
|
|
> works, is far more effective than anything the government tries to
|
|
> legislate, and even the ACLU has not yet been able to figure out
|
|
> how to force people to like it who in reality are totally opposed to
|
|
> the actual/perceived or encouraged abuse of children/animals in this way.
|
|
|
|
You said it right here, self-censorship is the best censorship of all.
|
|
If I do not want to see or read something, then it is *my* choice not
|
|
to see or read it. *I* make the decision, not the government or any
|
|
other person forcing me not to read or see it by completely keeping it
|
|
off of the system. Also, I highly doubt the ACLU is condoning any
|
|
"actual/perceived or encouraged abuse of children/animals". They are
|
|
just trying to protect our freedom of speech so I can say "You don't have
|
|
a damn clue what you are talking about" and not get thrown in jail for it.
|
|
|
|
> So sysadmins, start acting more like responsible publishers/editors.
|
|
> If you want that garbage at your site, hey -- just say so and
|
|
> carry it. If you don't, then get rid of it and block it out of
|
|
> your accepted newsfeed.
|
|
|
|
News admins *are not editors or publishers*. PERIOD! This has already
|
|
been proven in court. Prodigy lost their court case because they
|
|
monitored a chat room and, therefore, the courts said that they were
|
|
a publisher because of that fact. If they had not been
|
|
monitoring the chat room then they would have been found innocent.
|
|
News admins do not monitor content of the newsgroups and it would
|
|
be very difficult to do so due to hardware/software requirements
|
|
needed to scan *every* news article that comes through the site.
|
|
Besides all of that, I have better things to do with my time than
|
|
to go reading through all of the articles my users post. I am
|
|
*not* an editor and I do not want to be one. Nor am I a publisher.
|
|
I am the equivalent of the phone company. I provide a gateway for
|
|
people to send out their messages to Usenet.
|
|
|
|
Adults have to start taking responsibility for what their children see.
|
|
If you don't want your child coming into contact with certain segments
|
|
of the net community then you take the time to monitor their activity.
|
|
Just because you are too lazy to take the time to monitor your
|
|
child while they surf the net is no reason to limit what *everyone*
|
|
else can see, say or do on the net. If you would rather the government
|
|
ban "indecent" images/language, then you have just forced your moral
|
|
standards upon everyone else in the country. What will you do
|
|
when someone decides they don't like a particular activity that you
|
|
enjoy? I suppose you will just say "Oh, they think it is too dangerous
|
|
for me or too 'indecent' for me so I will just go along with it.
|
|
Never mind the fact that I have every right to choose for myself
|
|
what I do." And no, I am not advocating child pornography or
|
|
beastiality. My response is directed towards all of the people who,
|
|
because they deem something inappropriate, feel they have the right
|
|
to impose their views or opinions on me.
|
|
|
|
------------------------------
|
|
|
|
From: tallthin@IRS.COM(Tall Thin Jones)
|
|
Subject: File 5--Response to "Bestiality on the Net (Re: CuD 7.96)
|
|
Date: Sun, 17 Dec 1995 11:49:00 -0500
|
|
|
|
* Carbons Sent to: Alt.sex.bestiality
|
|
|
|
In File 5, CuD #7.96, Patrick A. Townson spoke against "bestiality"
|
|
on the net. I believe he was wrong on several points, and I want to
|
|
submit a rebuttal here.
|
|
|
|
Bestiality, in its definition of "humans having sex with animals"
|
|
is not inherently cruelty. It's not illegal in all fifty states, as
|
|
even under humane laws, harm has to be real. Animals do form romantic,
|
|
loving relationships, they do experience sex for pleasure, they do
|
|
exercise discretion in their choice of mates, and they do consent or
|
|
withhold consent, to the point of using deadly force. Anyone who is
|
|
literate can learn these things from the scholarly literature. If Mr.
|
|
Townson wants to discuss it further, he can go to alt.sex.bestiality.
|
|
Try to keep it rational, please, we do have standards.
|
|
|
|
Mr. Townson urged that providers be encouraged to drop groups like
|
|
alt.sex.bestiality and others he doesn't like. I'm sure they have a
|
|
right to choose what they will carry, but it is also a principled stand
|
|
to carry all of the USENET groups if one is a USENET provider. This is
|
|
the support of the larger principle that the Constitution protects
|
|
everyone or it protects no one. If it worked otherwise I'd be on the
|
|
bandwagon against the pedophiles in an instant. But maybe hatred is
|
|
still hatred even against the right targets... But I ramble.
|
|
|
|
The hyenas are at our door. Our situation as users of the Internet
|
|
will not improve if we give them a little of what they want, taken from
|
|
our neighbors who we don't like or approve of. The hyenas see us all as
|
|
meat. In plainer English, the Christian Coalition that is pushing the
|
|
decency laws has already labelled all users of the Internet as potential
|
|
pedophiles who must be restricted for our own good. Pointing fingers at
|
|
each other will weaken us and strengthen them, then they will take all
|
|
of our freedoms. Patrick L. Townson's proposals will make it much
|
|
easier for them to do this.
|
|
|
|
We have to decide which is worse. Having a few newsgroups some of
|
|
us can't stand reading, and a few websites some of us won't use, or
|
|
allowing the Christian Coalition to filter all of human knowledge for
|
|
the rest of us. They didn't do too well when they were able to do this
|
|
before.
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 14 Dec 1995 15:16:44 -0500
|
|
From: Galkin@AOL.COM
|
|
Subject: File 6--Privacy: What is it?
|
|
|
|
THE COMPUTER LAW REPORT
|
|
*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+
|
|
December 14, 1995 [#14]
|
|
|
|
SORRY FOR THE DELAY SINCE THE LAST ISSUE. THIS ISSUE BEGINS A SERIES
|
|
DISCUSSING PRIVACY RIGHTS IN THE DIGITAL AGE.
|
|
=====================================
|
|
GENERAL INFO: The Computer Law Report is distributed (usually) weekly for
|
|
free and is prepared by William S. Galkin, Esq. The Report is designed
|
|
specifically for the non-lawyer. To subscribe, send e-mail to galkin@aol.com.
|
|
All information contained in The Computer Law Report is for the benefit of
|
|
the recipients, and should not be relied on or considered as legal advice.
|
|
Copyright 1995 by William S. Galkin.
|
|
=====================================
|
|
ABOUT THE AUTHOR: Mr. Galkin is an attorney in private practice in Owings
|
|
Mills, Maryland (which is a suburb of Baltimore), and has been an adjunct
|
|
professor of Computer Law at the University of Maryland School of Law. Mr.
|
|
Galkin has concentrated his private practice in the Computer Law area since
|
|
1986. He represents small startup, midsized and large companies, across the
|
|
U.S. and internationally, dealing with a wide range of legal issues
|
|
associated with computers and technology, such as developing, marketing and
|
|
protecting software, purchasing and selling complex computer systems, and
|
|
launching and operating a variety of online business ventures. He also enjoys
|
|
writing about computer law issues!
|
|
|
|
===> Mr. Galkin is available for consultation with individuals and companies,
|
|
wherever located, and can be reached as follows: E-MAIL:
|
|
galkin@aol.com/TELEPHONE: 410-356-8853/FAX: 410-356-8804/MAIL: 10451 Mill Run
|
|
Circle, Suite 400, Owings Mills, Maryland 21117
|
|
|
|
^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^
|
|
Articles in The Report are available to be published as columns in both print
|
|
and electronic publications. Please contact Mr. Galkin for the terms of such
|
|
usage.
|
|
^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^
|
|
|
|
*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+
|
|
PRIVACY: WHAT IS IT?
|
|
*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+
|
|
|
|
[This is the first of a series of articles discussing privacy rights in the
|
|
digital age.]
|
|
|
|
As the Information Age reaches maturity, its tentacles seem to stretch into
|
|
every aspect of our lives. These fiber optic tentacles gather information
|
|
from us often without our knowledge. Vast amounts of personal information is
|
|
collected, sorted, organized by both government and private entities, and
|
|
then used for a wide variety of purposes. Do we have any right to control the
|
|
uses made of "our" information? Is there a right to privacy that provides us
|
|
with some protection?
|
|
|
|
I remember once calling an 800 number. The person who answered the phone knew
|
|
my name and address immediately without my giving this information. Through
|
|
use of a caller identification system linked to a data base sorted by phone
|
|
numbers, they had personal information available instantaneously when
|
|
people called. I was disturbed by the knowledge that making a telephone call
|
|
could no longer be done with anonymity. I wondered how much information they
|
|
had about me, where it was gleaned from, and whether I could have any control
|
|
over how this information would be used.
|
|
|
|
It is important to identify what is meant by a right to privacy in the
|
|
context of personal information. In 1928, the Supreme Court in Olmstead v.
|
|
United States, explained the right to privacy as the right to be "left
|
|
alone." While many will agree with this description, it will need to be much
|
|
further refined to be useful for applying it in the many different situations
|
|
where this right will arise.
|
|
|
|
Rather than trying to define the right to privacy at this point, it is better
|
|
to look at some circumstances where such a right might arise:
|
|
|
|
(1) Where the government unlawfully seizes evidence of a crime and the
|
|
evidence is then inadmissible in court. One example of this is where the
|
|
unlawful seizure occurs in a location where the possessor of the information
|
|
had a "reasonable expectation of privacy." Where a car is lawfully stopped by
|
|
the police for a simple traffic violation, illegal objects that are in plain
|
|
view from outside the car may be seized because there cannot be a reasonable
|
|
expectation of privacy, but , without probable cause for suspicion, objects
|
|
seized from the glove compartment would not be admissible because there is a
|
|
reasonable expectation of privacy applicable to the glove compartment.
|
|
|
|
(2) Where government agencies or private entities are lawfully collecting
|
|
personal data, but more data is collected than is needed to accomplish the
|
|
purpose of the data collection. The collection of this excess data might
|
|
amount to an invasion of privacy, even though the data is never misused.
|
|
|
|
(3) Where information that has been lawfully collected is then disclosed
|
|
(e.g., disclosure to the public under the Freedom of Information Act (FOIA)
|
|
or disclosure to other entities). The courts have determined that since the
|
|
purpose of the FOIA is to allow the public to monitor the activities of
|
|
government, disclosure of personal data about individuals does not further
|
|
this purpose, and therefore is not subject to disclosure under the FOIA. This
|
|
conclusion results from balancing the public's right to access to government
|
|
records and the privacy interests of individuals. Disclosure to third parties
|
|
might be data transfer or data matching between government agencies or a
|
|
business selling customer lists.
|
|
|
|
(4) Where information lawfully collected is not disclosed, but rather used
|
|
for a purpose different than the purpose for which it was originally
|
|
collected. For example, information collected pursuant to an application for
|
|
a mortgage might be used for trying to sell other products or services
|
|
offered by the same company.
|
|
|
|
(5) Where data lawfully collected is inaccurate. The classic case of this is
|
|
the credit report. In this context, the right to privacy might be the right
|
|
to examine and correct these records.
|
|
|
|
The "Right to Privacy" is a battle cry we often hear these days as we see our
|
|
cherished realm of privacy being invaded by the onslaught of technology.
|
|
However, legal scholars and the courts have had difficulty identifying the
|
|
specific source of this right and defining its scope and application.
|
|
|
|
Many believe that this right emanates from the Constitution. While it may,
|
|
the U.S. Supreme Court has never expressly recognized a
|
|
constitutionally-based right to privacy relating to collection and use of
|
|
personal data, except as regards disclosure in criminal law proceedings. In
|
|
1965, in the case of Griswald v. Connecticut, the Supreme Court recognized a
|
|
right to privacy relating to birth control counseling. This and subsequent
|
|
cases identified the right to privacy relating to controlling an individual's
|
|
life as relates to personal decisions. However, this does not provide a
|
|
foundation for a right to privacy of personal information.
|
|
|
|
Others prefer to view the right to privacy as a property right, similar to
|
|
the accepted corresponding property right found in the commercial context:
|
|
trade secrets. As a property right, the owner of this information would have
|
|
the right not to disclose the information and to restrict others who received
|
|
this information through a permitted disclosure from further disclosure in a
|
|
manner that is not inconsistent with the "owner's" expressed instructions.
|
|
|
|
The comparison of trade secrets law with a right to privacy of personal
|
|
information is difficult to take too far because the primary requirements for
|
|
establishing a trade secret are not usually present in personal data. These
|
|
requirements are (1) the secret information has value because it provides an
|
|
economic advantage over competitors and (2) the information is actually
|
|
secret, and the owner made reasonable efforts to maintain the secrecy of the
|
|
information.
|
|
|
|
First, in the personal information context, the information itself has no
|
|
value to the "owner," rather it is the disclosure of the information that
|
|
has a negative value, though usually in a noneconomic sense. Second, much of
|
|
the information that people would like to keep secret is already lawfully in
|
|
the possession of some company or government entity, and what we want is to
|
|
stop further disclosure without our authorization.
|
|
|
|
When viewing the current legal landscape relating to the right to privacy of
|
|
personal information, it is useful to consider that there may be no such
|
|
single "right". Rather privacy rights will take different forms depending
|
|
upon the type of personal information involved, how it was gathered, and
|
|
what it is being used for.
|
|
|
|
These different forms, may often have little to do with each other, and
|
|
therefore need to be distinguished from one another. Some of these rights may
|
|
actually emanate from the U.S. Constitution, others from state constitutions,
|
|
and yet others from federal and state statutes and common law. In each
|
|
context, the right is not absolute, but must be balanced against other
|
|
competing interests of the public, law enforcement, government agencies and
|
|
private commercial interests.
|
|
|
|
In future issues, we will examine various places that these rights are found.
|
|
The following federal statutes are an example of the diversity: the Freedom
|
|
of Information Act, the Electronic Communication Privacy Act of 1986, the
|
|
Privacy Act of 1974, the Paperwork Reduction Act of 1980, the Fair Credit
|
|
Reporting Act, and the Family Educational Rights and Privacy Act.
|
|
|
|
The purpose of this series is not to come up with a definition of the right
|
|
to privacy or to identify its ultimate source. Rather, we will explore
|
|
various legal sources of these rights along with examining vulnerable areas
|
|
where no clear rights have yet become manifest. It will be left up to the
|
|
readers to determine what definition might be appropriate in different
|
|
circumstances, taking into account relevant competing interests.
|
|
|
|
------------------------------
|
|
|
|
Date: Wed, 13 Dec 1995 00:32:02 -0600
|
|
From: Stephen Smith <libertas@COMP.UARK.EDU>
|
|
Subject: File 7--Computer, Freedom and Privacy 1996
|
|
|
|
****************************************
|
|
Please redistribute widely
|
|
****************************************
|
|
|
|
The Sixth Conference on Computers, Freedom, and Privacy will take
|
|
place at the Massachusetts Institute of Technology on March 27-30,
|
|
1996. CFP96 is hosted by MIT and by the World Wide Web Consortium.
|
|
|
|
You can register for CFP96 by US Mail, by fax, or via the World Wide
|
|
Web.
|
|
|
|
Conference attendance will be limited. Due to the enormous public
|
|
interest in CFP issues over the past year, we encourage you to
|
|
register early.
|
|
|
|
SPECIAL NOTE TO STUDENTS: There are a limited number of places
|
|
available at a special student rate. These will be allotted on a
|
|
first-come first-served basis, so register as soon as possible.
|
|
|
|
For more information, see the CFP96 Web page at
|
|
|
|
http://web.mit.edu/cfp96
|
|
|
|
or send a blank email message to
|
|
|
|
cfp96-info@mit.edu
|
|
|
|
Since its inception in 1991, the series of CFP conferences has brought
|
|
together experts and advocates from the fields of computer science,
|
|
law, business, public policy, law enforcement, government, and many
|
|
other areas to explore how computer and telecommunications
|
|
technologies are affecting freedom and privacy.
|
|
|
|
Events planned for this year's conference include:
|
|
|
|
- Federal prosecutors square off against civil-liberties lawyers
|
|
in a mock Supreme Court test of the "Cryptography Control Act of
|
|
1996", which criminalizes non-escrowed encryption.
|
|
|
|
- Authors Pat Cadigan, Tom Maddox, Bruce Sterling,
|
|
and Vernor Vinge divine the future of privacy.
|
|
|
|
- College administrators, students, lawyers, and journalists
|
|
role-play scenarios that plumb the limits of on-line expression
|
|
on campus networks.
|
|
|
|
- Panels on international issues in privacy and encryption; on the
|
|
struggle to control controversial content on the Internet; on
|
|
tensions between copyright of digital information and freedom of
|
|
expression; on threats posed by electronic money to law
|
|
enforcement, privacy, and freedom; on mass communication versus
|
|
mass media.
|
|
|
|
------------------------------
|
|
|
|
Date: Sun, 5 Nov 1995 22:51:01 CDT
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: File 8--Cu Digest Header Info (unchanged since 5 Nov, 1995)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send a one-line message: SUB CUDIGEST your name
|
|
Send it to LISTSERV@VMD.CSO.UIUC.EDU
|
|
|
|
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
|
|
|
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
To UNSUB, send a one-line message: UNSUB CUDIGEST
|
|
Send it to LISTSERV@VMD.CSO.UIUC.EDU
|
|
(NOTE: The address you unsub must correspond to your From: line)
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
|
Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
|
|
In ITALY: ZERO! BBS: +39-11-6507540
|
|
In LUXEMBOURG: ComNet BBS: +352-466893
|
|
|
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
|
|
The most recent issues of CuD can be obtained from the
|
|
Cu Digest WWW site at:
|
|
URL: http://www.soci.niu.edu/~cudigest/
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #7.97
|
|
************************************
|
|
|