724 lines
43 KiB
Plaintext
724 lines
43 KiB
Plaintext
Date: Mon, 1 Apr 91 22:56:31 EST
|
|
|
|
[not an April Fool's joke]
|
|
|
|
From: mercuri@grad1.cis.upenn.edu (Rebecca Mercuri)
|
|
|
|
Subject: Computers, Freedom, Privacy Trip Report
|
|
|
|
The following constitutes my trip report for the Computers, Freedom and
|
|
Privacy Conference held March 26-28, Airport Marriott Hotel,
|
|
Burlingame, California. Although I have made a sincere attempt to
|
|
relate the events of the conference in a fair and unbiased manner, the
|
|
nature of the material covered entails a certain amount of emotion and
|
|
it is difficult, if not impossible, to separate one's own feelings from
|
|
the subject matter. I therefore apologize for any inadvertent mistakes,
|
|
omissions, or philosophical commentary. Readers are encouraged to send
|
|
corrections to me at the email address below. No flames please!
|
|
|
|
Respectfully submitted, R. T. Mercuri
|
|
|
|
mercuri@gradient.cis.upenn.edu
|
|
|
|
|
|
No portion of this document may be copied or distributed for commercial
|
|
purposes without the prior express written permission of the author.
|
|
Non-commercial uses are permitted, but the author and source must be
|
|
credited.
|
|
Copyright (C) 1991 R. T. Mercuri. All Rights Reserved. [Edited lightly
|
|
by PGN and included in RISKS with permission of the author.]
|
|
|
|
This work was partially supported by the University of Pennsylvania's
|
|
Distributed Systems Laboratory as a part of its promotion of the
|
|
professional activities of its students. Matching funds were also
|
|
provided by Election Watch, a division of the Urban Policy Research
|
|
Institute, a non-profit organization.
|
|
|
|
|
|
======================================================================
|
|
The First Conference on Computers, Freedom and Privacy was organized
|
|
and chaired by Jim Warren, and sponsored by the Computer Professionals
|
|
for Social Responsibility (CPSR). Numerous other organizations also
|
|
lent their support to the conference, which was attended by
|
|
approximately 400 individuals (described by Terry Winograd as ranging
|
|
>from the sandals of Silicon Valley to the dark suits of Washington)
|
|
covering the fields of law, investigation, programming, engineering,
|
|
computer science, hacking, industry, media, academics, government, law
|
|
enforcement, and civil rights. The crowd was about 75% male, with very
|
|
few minorities in evidence (only ~10% of the speakers were female, and
|
|
none were minorities). Attendees formed a veritable who's who of
|
|
hacking with key figures such as Captain Crunch, Phiber Optik, Steve
|
|
Jackson, Craig Neidorf, and other notables there, some accompanied by
|
|
an entourage of defense and prosecuting attorneys. Cliff Stoll and Ted
|
|
Nelson (separately) took the opportunity to distribute copies of their
|
|
books and give autos. (Cliff was fond of playing with a brightly-
|
|
colored yo-yo and writing memos to himself on his hand, Ted appeared to
|
|
be creating a video record of the conference by filming each speaker
|
|
with a small hand-held camera for a few seconds as each talk began.) A
|
|
list of attendees was distributed, providing all information that each
|
|
participant marked as "open". The vast majority of participants
|
|
provided their name, company, address, phone number and email address.
|
|
Some people remarked privately that had they been more aware of the
|
|
manner in which such information is currently being used, they likely
|
|
would have "closed" more of their own data. (The list was printed in
|
|
name-alphabetical order so it was unfortunately possible to derive the
|
|
names of individuals who elected not to be listed.)
|
|
|
|
Jim Warren, who described himself as a self-made multi-millionaire,
|
|
entrepreneur, futures columnist, and member of the board of directors
|
|
of MicroTimes and Autodesk, Inc., took a severe loss on the conference.
|
|
He had estimated break-even at 500 participants, but had only achieved
|
|
around 300 paid admissions as most of the media and some staff members
|
|
attended for free. To his credit, he organized a fast-paced, well-run
|
|
(on-time) conference which allowed many of the key figures in this
|
|
field to present their thoughts and ideas. Audio and videotapes, as
|
|
well as the conference proceedings (published by Springer-Verlag) will
|
|
be available shortly [write to CFP Proceedings, 345 Swett Road,
|
|
Woodside, CA 94062]. The conference was preceded by a day of tutorial
|
|
sessions, but I was unable to attend those activities.
|
|
|
|
My major criticism regarding the conference was that the sheer volume
|
|
of speakers (over 20 per day) allowed little time for questioning from
|
|
the audience. Many of those who were not wearing red speaker's badges
|
|
began feeling like second-class citizens whose opinions were neither
|
|
wanted nor recognized. If someone managed to obtain a microphone and
|
|
used it to make a statement rather than to ask a question, they were
|
|
routinely hissed by a large portion of the audience. The unresolved
|
|
tension became most obvious on the last day of the conference when,
|
|
during the panel discussion on Electronic Speech, Press & Assembly, a
|
|
loud altercation broke out in the front of the room. This panel had a
|
|
representative from Prodigy Services, but the person who was supposed
|
|
to give opposing commentary (apparently regarding the email privacy
|
|
issue) had been unable to appear. Certain attendees were prepared to
|
|
present their views, but were informed that they would not be permitted
|
|
to do so. A private meeting was arranged for those who wished to
|
|
discuss the Prodigy matter, but many found this to be unacceptable.
|
|
|
|
An oft-heard word describing the material revealed during the
|
|
conference was "chilling". After the second day of the conference I
|
|
became aware of how invasive the monitoring systems have become. As I
|
|
returned to my room within the hotel, I realized that my use of the
|
|
electronic pass-key system could alert the hotel staff of my entry and
|
|
exit times. People could leave messages for me, which would be reported
|
|
on my television screen, all of this being recorded in some database
|
|
somewhere, possibly not being erased after my departure. My entire
|
|
hotel bill, including phone calls and meal charges could also be
|
|
displayed on my television screen, along with my name, for anyone to
|
|
access (without a password) if they were in my room. Chilling indeed.
|
|
Pondering all of this, I left the room, lured to the hotel lobby by the
|
|
sound of what I assumed to be a cocktail piano player. When I located
|
|
the baby grand piano I realized that, through the high-tech wonders of
|
|
Yamaha, no human sat at the keyboard. A sophisticated computerized unit
|
|
rendered a seemingly- endless sequence of expertly arranged tunes, with
|
|
no requests allowed from the audience. This ghostly image reemphasized,
|
|
to me, the silent pervasion of computers into our daily lives, and the
|
|
potential erosion of personal freedom and privacy.
|
|
|
|
Throughout the conference, many problems were posed, few answers were
|
|
given. Factions developed --- some people felt we needed more laws,
|
|
some people felt we needed fewer laws, some felt that all data
|
|
(including program code) should be free and accessible to everyone,
|
|
some felt that everything is personal property and should be
|
|
specifically released by the owner(s) prior to general use. Certain
|
|
people felt that all problems could be resolved by tightly encrypting
|
|
everything at all times (the issue of password distribution and
|
|
retention was ignored). What was resolved was to form an organization
|
|
called the US Privacy Council which "will attempt to build a consensus
|
|
on privacy needs, means, and ends, and will push to educate the
|
|
industry, legislatures, and citizens about privacy issues." The first
|
|
thing this organization did was form a newsgroup, called alt.privacy. I
|
|
observed that at least 50 messages were posted to this newsgroup within
|
|
the 3 days following the conference, most pertaining to privacy of
|
|
emails. This was disappointing, to say the least. Presumably people
|
|
will use the mailing list and the newsgroup to disseminate information,
|
|
but whether this is merely a duplication of other existing newsgroups
|
|
(such as RISKS), and whether the Privacy Council will have any impact
|
|
at all, shall be left to be seen.
|
|
|
|
The conference opened with a comment by Jim Warren that this meeting
|
|
could be "the first Constitutional Convention of the new frontier". He
|
|
then introduced Harvard Law Professor Lawrence Tribe who used the
|
|
analogy of cyberspace to describe some of the problems of a "virtual
|
|
constitutional reality". He quoted Eli Noam as saying that "networks
|
|
become political entities" and that there could conceivably be "data
|
|
havens", private networks much like Swiss bank accounts, which are
|
|
virtual governments in themselves. He asserted that a bulletin board
|
|
sysop is not a publisher, in the same way that a private bookstore
|
|
owner is not a publisher. The individual merely makes the products
|
|
available, and has the responsibilities of a seller, not a publisher.
|
|
Tribe then went on to delineate five major points. First, there is a
|
|
vital difference between governmental (public) and private actions.
|
|
Second, ownership is an issue that goes beyond that which may be
|
|
technologically feasible. Property encourages productivity. You have a
|
|
constitutional right to inhabit your own body. Free speech may be a
|
|
luxury we can't afford (like yelling "fire" in a crowded theater, or
|
|
viruses roaming the network). Third, the government cannot control
|
|
speech as such. Recently it was ruled that answers to very simple
|
|
questions (such as your name, age) are considered testimonial, as they
|
|
require the use of the human mind. Fourth, the Constitution was founded
|
|
on a normative understanding of humanity, and should not be subject to
|
|
disproof by science and technology. The words of the 4th Amendment
|
|
apply to material things, it defends people, not places. It is the task
|
|
of law to inform and project an evolutionary reading of the bill of
|
|
rights to new situations. Fifth, Constitutional principles should not
|
|
vary with accidents of technology. In conclusion, Tribe proposed an
|
|
additional amendment to the constitution which asserted that "this
|
|
Constitution's protection for freedom of speech, press,
|
|
assembly...shall be construed as fully applicable without regard to the
|
|
technological medium used."
|
|
|
|
The first panel discussion of the conference was titled: Trends in
|
|
Computers and Networks. Peter Denning of NASA Ames introduced the panel
|
|
by stating that computers are now under attack due to security being
|
|
added on as an afterthought. John Quarterman of Texas Internet
|
|
Consulting then discussed the manner in which user/host names could be
|
|
made more readable (accessable) on the network. Peter Neumann of SRI
|
|
overviewed general issues surrounding the authorship of the "Computers
|
|
at Risk" book, stating that the group involved with the text was
|
|
primarily interested in motivating efforts towards evaluating safe,
|
|
secure, reliable systems (and that they only proposed general
|
|
guidelines in the text). He warned the listeners "don't wait for the
|
|
catastrophe". Neumann also mentioned the issue of disenfranchization of
|
|
the poor and lower class who will be unable to access the new
|
|
technology, stating that "gaps are getting much bigger". Martin Hellman
|
|
of Stanford University discussed cryptography. He stated that the 56
|
|
bit DES standard was set not by technology, but instead by economics.
|
|
He mentioned a study at Bell Labs that indicated that 70% of all
|
|
passwords there could be cracked using a dictionary technique. He
|
|
believes that technology will not solve all of our problems, and that
|
|
persons who are concerned about social responsibility are not
|
|
(necessarily) anti-technical. David Chaum of DigiCash spoke about
|
|
informational rights and secure channels with regard to electronic
|
|
money transactions. He believes that with an adequately encrypted
|
|
system there is no necessity for a central, mutually trusted party. The
|
|
problem is in finding a practical encryption protocol, or a
|
|
distributed, mutually-trusted tamper-proof box solution. David Farber
|
|
of the University of Pennsylvania expressed the view that protection
|
|
schemes might not be "retrofittable" and should be part of the
|
|
fundamental design of computer architecture, protocols and technology,
|
|
rather than being tacked on, but he worried that people may not be
|
|
willing to pay for these design features. Farber also mentioned the
|
|
possibility of retroactive wiretapping, where archived data could be
|
|
obtained through invasive means.
|
|
|
|
The second panel session was titled: International Perspectives and
|
|
Impacts. Ronald Plesser of the Washington D.C. law firm of Piper &
|
|
Marbury first mentioned that these issues impact on how international
|
|
business is conducted. Many countries, particularly in Europe, have
|
|
already established standards with which we must comply. Databases
|
|
feeding Europe must be concerned with the processing of personal data
|
|
of individuals. Certain directives have been authored that are so
|
|
general in scope as to be difficult to apply ("to all files located in
|
|
its territory" was one example). Tom Riley, of Riley Information
|
|
Services in Canada, continued this discussion regarding data protection
|
|
policies. He urged the authoring of a harmonized directive, similar to
|
|
that for other exports. The United States, by lagging behind in
|
|
establishing standards of its own, risks the possibility of losing the
|
|
opportunity to affect these policies as they are being written. David
|
|
Flaherty entertained the crowd with his "George Bush" speech, stressing
|
|
that "privacy begins at home". Robert Veeder of the D.C. Office of
|
|
Information Regulatory Affairs discussed the impact of the 30,000+
|
|
messages to Lotus which effectively stopped the production of their CD-
|
|
ROM database. This electronic lobbying had never been used to such
|
|
great effect prior to that time. He believes the electronic forum will
|
|
provide larger access to public concerns. (The impression I was left
|
|
with was that certain governmental agencies are not wholly enthusiastic
|
|
about this powerful method of expression, and that they are monitoring
|
|
the situation.)
|
|
Next, we heard from a variety of speakers on the subject of Personal
|
|
Information and Privacy. Janlori Goldman, of the ACLU, discussed the
|
|
"library lending" project by the FBI. This was an attempt to track
|
|
library usage habits of foreign nationals. The ACLU objects to this
|
|
sort of surveillance as well as other similar broad-based methods. An
|
|
audience member criticized the ACLU's own release of membership data,
|
|
to which Janlori replied that she did not agree with her organization's
|
|
policy to allow such releases, but was currently unable to do more than
|
|
protest against it. John Baker, Senior Vice President of Equifax,
|
|
described the benefits of information with regard to improved goods,
|
|
services, prices, convenience and wider choices. (Equifax is an
|
|
organization which supplies marketplace data with specific information
|
|
about consumers.) He stressed that people need to understand their
|
|
rights, responsibilities and opportunities with regard to their
|
|
published data. He believes that the Lotus Marketplace product was
|
|
flawed because of the delay involved when customers wanted to "opt-out"
|
|
of the database. He portrayed a spectrum of controls over data usage,
|
|
ranging from no restrictions (free speech), through some restrictions
|
|
(based on impact, sensitivity, access, security and confidentiality),
|
|
to absolute restrictions (where the available information would have
|
|
little value). Equifax took a survey on consumer interest in
|
|
availability of data for direct marketing purposes which revealed that
|
|
75% would find it acceptable as long as there is a facility to opt-out.
|
|
An audience member raised the point that the default is opt-out rather
|
|
than opt-in.
|
|
|
|
These two speakers were followed by a debate between Marc Rotenberg,
|
|
Washington Office Director of the Computer Professionals for Social
|
|
Responsibility, and Alan Westin, Professor of Public Law and Government
|
|
at Columbia University, with the subject "should individuals have
|
|
absolute control over secondary use of their personal information?"
|
|
Marc argued in favor of the statement, using an eloquent oratorial
|
|
style, and Alan spoke in opposition with the demeanor of a seasoned
|
|
litigator. Marc made such statements as "we are all privacy advocates
|
|
about something in our personal lives", "it is the most fragile
|
|
freedom" and "protect privacy, change the default", stressing that the
|
|
individual should have the right to control the value and use of their
|
|
personal information. Alan outlined four major issues: 1. Nature of the
|
|
secondary use; 2. Society should decide on fair uses, not a nihilistic
|
|
veto; 3. Underpinning of constitutional democracy; 4. Adequate control
|
|
protects against potential misuse. He believes that the consumer
|
|
benefits from the advantages of a knowledge society. No winner/loser of
|
|
the debate was declared.
|
|
|
|
Speakers continued on the subject of Personal Information and Privacy.
|
|
Lance Hoffman, of the EE & CS department at George Washington
|
|
University, mentioned that Japan will be instituting a system of
|
|
personal phone number calling --- basically you can send and receive
|
|
calls at your "own" phone number wherever you happen to be situated.
|
|
This permits very close tracking of individual movements and is a
|
|
potential further invasion of privacy. He noted that no one has ever
|
|
received the ACM Turing Award for a socially responsible system, and
|
|
encouraged positive recognition of achievements along these lines. He
|
|
also recommended that a "dirty dozen" list of worst systems be compiled
|
|
and distributed.
|
|
|
|
Evan Hendricks, editor and publisher of Privacy Times, listed many
|
|
records that are and are not currently protected by law from
|
|
distribution. Interestingly, video rental records are protected, but
|
|
medical records are not. He cited an interesting example of a
|
|
circumstance where a man and woman living in the same home (but with
|
|
different last names) were sent copies of each other's bills, urging
|
|
them to encourage their "roommate" to pay. It turned out that the
|
|
individuals were landlady and tenant. Another interesting fact that
|
|
Evan revealed was that studies indicate ~30% of social security numbers
|
|
in some databases are inaccurate. Lists of persons having filed
|
|
Workmen's Compensation claims have, in some cases, been used to
|
|
blacklist people from jobs. Hendricks urged people to ban the recording
|
|
and distribution of human genome information --- some parents
|
|
voluntarily provide cellular test results in case their child is later
|
|
missing or kidnapped. There is no way to know how these records are
|
|
likely to be used in the future.
|
|
|
|
Tom Mandel, director of the Values and Lifestyles Program (VALS) at
|
|
SRI, spoke in favor of the Lotus Marketplace product. He felt that the
|
|
30K response was not representative of the general public, and believes
|
|
that a small percentage of "media sophisticates" can have apply greater
|
|
leverage. He noted that VALS is currently involved with a joint venture
|
|
with Equifax, who is currently involved with a joint venture with
|
|
Lotus.
|
|
|
|
Willis Ware, of the RAND Corporation, chaired the HEW committee that
|
|
led to the 1980 privacy act (a reporter preparing materials for
|
|
publication can not be searched). He felt that the government
|
|
previously was considered to be a threat to privacy, not a protector,
|
|
and considers the privacy issue as one of social equity. He indicated
|
|
that personal information should not be considered to be private
|
|
property, and should be shared in an equitable manner. To apply
|
|
royalties for usage would place a tremendous impact on costs. He noted
|
|
that the databases behind airline, pharmacy and point-of-sale systems
|
|
may be open to access by various groups including the Internal Revenue
|
|
Service and Drug Enforcement personnel.
|
|
|
|
Simon Davies, a member of the law faculty at Australia's University of
|
|
New South Wales, provided a sobering criticism of this conference and
|
|
the United States' policy making processes, stating that the conference
|
|
was too "nice" and "conciliatory" and that the "US is an embarrassment
|
|
to the privacy issue". He used the term "pragvocate" (pragmatic
|
|
advocate) to describe policy-makers who are well-trained, say the right
|
|
things, and denounce extremes, giving environmentalists as an example.
|
|
He reminded us that the basis of the US system is not to "opt-out" ---
|
|
no one would write to the LA police asking "don't beat me up". Davies
|
|
alerted us to the fact that Thailand, an oppressive military
|
|
government, is currently purchasing US technology to provide smart ID
|
|
cards for their citizens. He noted that the Smithsonian Institute
|
|
awarded them a trophy for their use of technology. He stated that the
|
|
United States is encouraging similar activities in the Philippines and
|
|
Indonesia.
|
|
|
|
A somewhat light-hearted after-dinner talk was delivered by Eli Noam,
|
|
of Columbia University's School of Business, on the subject of
|
|
"reconciling free speech and freedom of association". He suggested that
|
|
phone systems be established whereby individuals can provide their
|
|
friends and associates with special access codes so that they can dial
|
|
them. Others can call, but at a higher rate. (Note that this would
|
|
likely have an adverse impact on legitimate business and social calls
|
|
as well as possibly reducing undesirable calls.) He stated that
|
|
presently "no computer can write the 4-line plot capsules that appear
|
|
in TV Guide", with regard to the failure of AI systems. Noam questioned
|
|
the lack of policies concerning what happens to an information data
|
|
base after an individual's death. He concluded with the statement that
|
|
for "all digital systems --- 0's and 1's are created equal."
|
|
|
|
The second day of the conference opened with a session on Law
|
|
Enforcement Practices & Problems. Glenn Tenney, well known as the
|
|
organizer of the Hacker's Conference, chaired this panel with little
|
|
comment. Don Ingraham, Assistant DA of Alameda County, Calif. (who,
|
|
during a tutorial earlier in the week, distributed information on the
|
|
writing of search warrants), gave a fantastically humorous
|
|
presentation. He spoke of the "pernicious myth of cyberspace" and
|
|
declared "you ARE the country". He mentioned that systems exist with
|
|
"the security built in of a sieve" and that people have their
|
|
information on these systems, but not necessarily because they want it
|
|
to be there. He feels that the attitude of "don't worry, we don't need
|
|
standards" is a poor one, and that laws should be written to let the
|
|
people know what the rules are. He would rather see an organization
|
|
formed called Sociable Professionals for Responsible Computing (instead
|
|
of CPSR). He finished his talk by saying "if you don't do it, who will
|
|
-- if not now, when" (a Talmudic quotation that he used without
|
|
citation).
|
|
|
|
Robert Snyder, of the Columbus Ohio Police Department, presented the
|
|
view of the "cop on the street". He spoke of his naivete when first
|
|
entering the field of computer law, and how much evidence was destroyed
|
|
at first by listening to suspects who told him to type things like
|
|
"format c:" in order to access the hard disk. He has encountered
|
|
situations where the suspect actually does not know what is on the
|
|
system --- some of these are cases where a parent is running a business
|
|
and a child is using the machine for illicit hacking purposes. In these
|
|
cases, even though he has a warrant to obtain all of the computer
|
|
equipment, he often will not shut down a legitimate business. He
|
|
brought up the issue of unregistered software sitting on a confiscated
|
|
system. There are liability problems dealing with the return of such
|
|
materials. Basically he stated that the law enforcement personnel
|
|
require further education and training, and should operate within
|
|
guidelines but with prudence.
|
|
|
|
Donald Delaney, Senior Investigator with the New York State Police,
|
|
began his talk by relating how when his home was burglarized in 1985,
|
|
he experienced a feeling of violation. This feeling is much the same
|
|
with computer crime. Many firms experience a loss of income from such
|
|
activities. In his experience, many of the people caught are engaged in
|
|
more crimes than the ones they are charged with.
|
|
|
|
Dale Boll, Deputy Directory of the Fraud Division of the U.S. Secret
|
|
Service, spoke of the various forms of access device fraud (credit
|
|
card, ATM, passwords, phone access, frequent flyer numbers, etc.). He
|
|
stated that it is illegal to posses counterfeit access devices and that
|
|
if you have 15+ illegal access devices or numbers in your possession,
|
|
you may be a subject of federal investigation. They have a 96%
|
|
conviction rate. ATM cards can be manufactured illegally using
|
|
cardboard and regular audio tape. The credit card industry is now
|
|
losing $1 Billion per year. An audience member asked if they are using
|
|
programs like Gofer (grep for UNIX hackers) to search for information
|
|
they want on bulletin boards and networks. He replied that although
|
|
they own this program, they use it personally and not for investigation
|
|
purposes.
|
|
|
|
The next session, on Law Enforcement and Civil Liberties, had seven
|
|
participants, none of whom were given much time to present their views.
|
|
I will briefly highlight what they said here. Sheldon Zenner, the
|
|
Attorney for Craig Neidorf said that the prosecutors had originally
|
|
sought a 2-year sentence, and that thanks to many of the people at this
|
|
conference who rallied to Craig's support, they were able to get him
|
|
off. Mark Rasch who defended the internet worm case stated that the
|
|
expectation of privacy is changed because of the technology employed --
|
|
- technology affects behavior. Cliff Figallo, manager of the WELL
|
|
(Whole Earth 'Lectronic Link, popular among many Bay Area participants
|
|
as an alternative means of accessing the Internet) addressed his
|
|
concerns about overuse of law enforcement. He wants his users to feel
|
|
safe. Sharon Beckman, Litigation Council to the Electronic Freedom
|
|
Foundation (EFF) and Attorney for Steve Jackson Games (whose computers
|
|
were seized, when one of his fantasy games was perceived as being
|
|
capable of training users to "hack" into computers) stated that
|
|
underlying values of the constitution should be interpreted in terms of
|
|
today's technology. Ken Rosenblatt, a District Attorney covering the
|
|
Silicon Valley area, stated that he is charged with upholding civil
|
|
liberties and feels that the laws are presently adequate. Mike Gibbons,
|
|
Special Agent for the FBI, mentioned that he worked various white
|
|
collar cases, including the 75 cent case (described in Cliff Stoll's
|
|
book), and the Robert Morris case. He feels that there are various
|
|
classes of computer crime, including impairment, data theft, and
|
|
intrusion. Mitch Kapor, founder of EFF, stated that the "electronic
|
|
frontier hasn't been settled yet" and that we should not stifle the
|
|
"network petri dish inventing the future". He questioned the nature of
|
|
reasonable search, stating that there haven't been enough cases yet to
|
|
establish a meaning for this in computer law. Everyone should be
|
|
protected from tyranny, not only hackers. He looks at the EFF as a
|
|
means of civilizing cyberspace. The matter of free speech was discussed
|
|
in the questioning session with the panel -- much speculation was
|
|
directed towards the legality of discussions of bomb-making, system
|
|
hacking, and the publication of other potentially lawless activities on
|
|
the net or in technical papers. Other comments included the fact that
|
|
law enforcement cannot seize an entire post office, their search must
|
|
be limited to the mailbox of the suspect. This analogy applies to
|
|
computer networks as well, although the volatility (ease of total
|
|
destruction of evidence) of computer data is of concern to
|
|
investigators. As I had an extended and quite insightful conversation
|
|
with Russ Brand over lunch, I returned a tad late to the next session,
|
|
on Legislation and Regulation, and was only able to catch two of the
|
|
speakers. Elliot Maxwell, Assistant Vice President at Pacific Telesis
|
|
stated that it is "difficult to have simple and specific rules". Paul
|
|
Bernstein, whose LawMUG BBS and Electronic Bar Association is well
|
|
known among the legal community, stated that one should "use mediums
|
|
that exist -- participate in fashioning the laws."
|
|
|
|
The most eye-opening session of the entire conference, in my opinion,
|
|
was the following one on Computer-Based Surveillance of Individuals. It
|
|
opened with Judith King describing the FBI Library Surveillance
|
|
Program, where the reading habits of foreign nationals were
|
|
investigated. She stated that many librarians want laws to protect the
|
|
confidentiality of users, and some statutes have been passed. Karen
|
|
Nussbaum, Executive Director of 9 to 5 (on which the film was based),
|
|
gave an accounting of the monitoring of employees in the workplace.
|
|
Currently over 26 Million employees are having their work tracked
|
|
electronically, and over 10 Million have their pay based on computer
|
|
evaluations. The personal habits of the worker can be monitored, one
|
|
can look into a user's screen and see what they are doing or even send
|
|
them messages. She described the "corporate plantation" as a place of
|
|
stress, humiliation and harassment. Gary Marx, Sociology Professor at
|
|
MIT, gave a whirlwind assessment of the importance of privacy, some
|
|
technofallacies (like the Wizard of Oz "pay no attention to the little
|
|
man behind the curtain"), and steps you can use to protect privacy (the
|
|
bulk of these useful lists are published in the proceedings). He
|
|
related how a telephone can be made "hot on the hook" so that you can
|
|
silently monitor your babysitter, your children or your spouse, when
|
|
you are not at home. Most devices, such as this one, are perfectly
|
|
legal within your own house. David Flaherty spoke again, this time in a
|
|
more serious vein, saying "we are living in a surveillant society" and
|
|
"you have to make daily choices about what you are willing to give up
|
|
about yourself." The second day's after-dinner speaker was William
|
|
Bayse, Assistant Director, Technical Services Division of the FBI, who
|
|
discussed a newly created national system called the NCIC-2000, under
|
|
the topic of "balancing computer security capabilities with privacy and
|
|
integrity". He began by asserting that crime has become more mobile and
|
|
that conventional crime-tracking methods are inadequate. For example,
|
|
he said, many missing persons actually want to remain missing. He feels
|
|
that the accuracy of records is imperative. Various information bases
|
|
have been formed, including lists of stolen items, vehicles, and wanted
|
|
persons. Presently 65,000 officers are using this system, with 360M
|
|
transactions annually, at a cost of 3 cents a transaction. For an
|
|
example of effectiveness, over $1.1 Billion in vehicles have been
|
|
recovered. Proposed, but not yet implemented is the portion of the
|
|
system which provides a live scan of fingerprints at the scene of an
|
|
arrest (or when someone is stopped for a motor vehicle violation) [with
|
|
the intended purpose of considerably reducing false identifications...
|
|
PGN]. Much criticism was generated from the audience regarding the
|
|
potential misuse of this system for harassment, and the retention of
|
|
fingerprints for future use. Marc Rotenberg addressed Bayse questioning
|
|
why documents requested under the freedom of information act from his
|
|
agency have still not been supplied, and stating that currently a
|
|
lawsuit is pending to obtain their policies regarding monitoring of
|
|
computer bulletin boards. Bayse refused comment.
|
|
|
|
The final day of the conference opened with a session on Electronic
|
|
Speech, Press and Assembly. Jack Rickard of Boardwatch Magazine
|
|
mentioned that bulletin boards are highly specialized, primarily funded
|
|
by individuals, and are in their embrionic stage. David Hughes,
|
|
Managing General Partner of Old Colorado City Communications, added
|
|
some color to the conference with his western garb (10-gallon hat, bolo
|
|
tie) and use of his laptop for the notes of his speech. He described
|
|
himself as a "Citizen of the Western Frontier of the Information Age"
|
|
and drawled, "Read my Cursor". He described electronic speech as
|
|
"fingers of the tongue with the ear for the eye --- but it is still
|
|
speech". In describing US history, were it to have occurred today,
|
|
Jefferson would have used a Macintosh, Adams would have used a PC, but
|
|
"Tom Paine would have put Common Sense on a private BBS with a
|
|
Commodore 64". "Don't tread on my cursor!" he cried. George Perry, Vice
|
|
President of Prodigy, began by saying that he did not want to engage in
|
|
discussion on the dispute, but then stated that "Prodigy does not read
|
|
private email". Prodigy is a privately owned and operated company which
|
|
believes that the market should be allowed to decide what services need
|
|
to be provided. The Constitution regulates free speech with respect to
|
|
the government, Prodigy thinks of itself as a publisher. Lance Rose, a
|
|
NY Attorney, enumerated the types of rights afforded to individuals and
|
|
companies with regard to ownership, including trade secrets,
|
|
confidentiality, trademark, copyright and patent. There is currently a
|
|
great diversity of laws which service providers must adhere to, making
|
|
the provider, in some instances, a law enforcement agent. During the
|
|
open comment section, Hughes noted that very few legislators are
|
|
currently on-line, and he thanked Prodigy for preparing the NAPLPS
|
|
market (for his products). The notable talk in the Access to Government
|
|
Information session was David Burnham's (Co-Director and Writer with
|
|
the Transactional Records Access Clearinghouse [TRAC] in D.C.). He
|
|
stated that "badly administered agencies are more damaging than rogue
|
|
operations". The objectives of TRAC are to obtain transactional data
|
|
>from federal enforcement agencies, such as the IRS, NRC, and Justice
|
|
Department. He demonstrated how the raw statistics could be combined
|
|
with additional figures regarding inflation, population, and margin of
|
|
error, showing that the so-called "trends" of increasing crime, or
|
|
increased non-compliance with tax law, were actually flat lines when
|
|
the mitigating factors were added in.
|
|
|
|
The final panel discussion was on Ethics and Education. Richard
|
|
Hollinger, Sociology Professor with the University of Florida, asserted
|
|
that the "same officers who are investigating computer crimes are the
|
|
ones who are protesting computers in their patrol cars because they
|
|
feel it would be oppressive." He is concerned with the industry's
|
|
encouragement of the use of computers in schools, before rules for
|
|
their ethical use have been written. Donn Parker with SRI stated that
|
|
laws are needed in order to convict hackers. Convictions have a "very
|
|
good effect on our whole problem", he said. He referred back to the
|
|
60's when the ACM and IEEE drafted codes of conduct, and said that
|
|
these should be popularized. He believes that one can not teach ethics,
|
|
that it comes from interpersonal relationships, and (for him) the
|
|
Christian religion and the Bible. One can teach, he believes, the
|
|
application of ethics, beyond the golden rule. He delineated three
|
|
rules: 1. The Owner's Rule - you choose to issue your property into the
|
|
public domain, or not; 2. The User's Rule - you assume everything
|
|
belongs to something else, unless otherwise informed; 3. The Hacker's
|
|
Rule - systems are free, everything should go to the people (which he
|
|
rejected as childish, not worth considering). He suggested that we
|
|
consider the dilemma of Descartes -- if it is OK to start by stealing
|
|
pencils, where then can we draw the line? Dorothy Denning spoke briefly
|
|
regarding the network uses by children (Kids Net). She speculated that
|
|
we should teach them something about hacking in order to take the
|
|
mystery out of it. She compared telephone fraud by children as a more
|
|
sophisticated version of the "is your refrigerator running" prank.
|
|
|
|
The Education and Ethics panel continued with the softspoken John
|
|
Gilmore, a "generalist" with Cygnus Support. He warned that we are
|
|
losing the larger open society. The US is currently #1 in percentage of
|
|
population in jail. He spoke of drug usage as a victimless crime. John
|
|
asked the audience "who has not broken a law in the past month?" Only a
|
|
few raised their hands. He then asked "who here has all their disks
|
|
clean -- free from something you would not want them to find if you
|
|
were investigated?" About 15% raised their hands, but after pondering
|
|
it, a number of them lowered them (the person behind me muttered that
|
|
he had some shareware for which he had not paid). Gilmore said "privacy
|
|
is a means -- what is the end we are looking for? Tolerance." He urged
|
|
real privacy of personal communications, financial transactions, things
|
|
should be as "private as that thought held in our minds." He demanded
|
|
that we stop building fake systems -- laws that dictate that you "can't
|
|
listen to cellular phone calls" -- and instead build real protections
|
|
into your systems and buy them from others. His talk received a
|
|
standing ovation from the vast majority of the audience members.
|
|
|
|
The remaining panel speaker, Sally Bowman, a Child Psychologist with
|
|
the Computer Learning Foundation, stated that her organization is
|
|
working to raise awareness and solve a number of problem areas. The
|
|
problems she outlined were: 1. Lack of awareness of the magnitude of
|
|
the problem. Software industry is being hurt by piracy; 2. Many
|
|
misimpressions -- confusion, lack of information; 3. Lack of teeth in
|
|
software copying policies; 4. Lack of strategies in teaching ethics; 5.
|
|
School budgets are too small to allow legal procurement of software.
|
|
Her organization is presently educating parents as to the "tell-tale"
|
|
signs which indicate whether a child is "abusing" computer systems.
|
|
|
|
The concluding session, entitled "Where Do We Go From Here" was staffed
|
|
by a number of the conference speakers. They overviewed their feelings
|
|
regarding the issues raised during the sessions and made general
|
|
comments with respect to what they might do to raise awareness and
|
|
resolve some of the problems.
|
|
|
|
Throughout the conference many pamphlets, brochures and newsletters
|
|
were distributed. Although it is infeasible for me to provide copies of
|
|
this literature, interested parties can contact me or Jim Warren
|
|
(jwarren@well.sf.ca.us) to provide source names and addresses. Some of
|
|
the more interesting items (in no particular order, just how they
|
|
happened to come out of my briefcase) included:
|
|
- Brochures from the Cato Institute "Toward a Moral Drug Policy",
|
|
"America's Counter-revolution", "The Semiconductor Industry and Foreign
|
|
Competition", "The Promise of High-Definition Television: The Hype and
|
|
the Reality", and their publication catalog.
|
|
- Matrix Information and Directory Services Newsletter.
|
|
- The Manifesto of Militant Humanism.
|
|
- "Are you a Hacker?" by Robert Bickford, reprinted from MicroTimes.
|
|
- Call for formation of a World Privacy Network.
|
|
- An advertisement for SafeWord Software (password
|
|
checking/protection).
|
|
- Condom distributed by Anterior Technology (they market a system
|
|
whereby you can retrieve the first 80 characters of emails while out of
|
|
town).
|
|
- "The Bill of Rights is Under Attack" from Committee for the Bill of
|
|
Rights.
|
|
- Hollywood Hacker Info, reprinted from Computer Underground Digest.
|
|
- Calif. State Assembly Bill #1168 on Personal Information Integrity.
|
|
- Computer Learning Month - from the Computer Learning Foundation.
|
|
- The Equifax Report on Consumers in the Information Age - A reprint
|
|
of John Barlow's article "Crime and Puzzlement" from Whole Earth
|
|
Review, Fall 1990.
|
|
- Various brochures from the First Amendment Congress, an
|
|
organization providing educational materials on the First Amendment.
|
|
- Policy papers from the League for Programming Freedom including
|
|
"Against Software Patents", "Lotus Disinformation Forewarned is
|
|
Forearmed", and the Effector (its newsletter).
|
|
- CPSR reprints of newsarticles regarding the Lotus database.
|
|
- Promotional literature for Ted Nelson's Xanadu.
|
|
- Brochure for the Community Memory BBS, and its newsletter.
|
|
- Brochure for the Art Com Electronic Network.
|
|
- Brochure for the International Society for Individual Liberty.
|
|
- Various copies of MicroTimes.
|
|
- Application forms for CPSR and the League for Programming Freedom.
|
|
- Rel-EAST, the east-west high-tech business report.
|
|
- Suggested reading on how computer crime is investigated from Don
|
|
Ingraham.
|
|
- Book promotional literature including: "Rogue Programs" edited by
|
|
Lance Hoffman, Van Nostrand Reinhold "Protecting Privacy in
|
|
Surveillance Societies", David Flaherty, University of North Carolina
|
|
Press "Spectacular Computer Crimes", Buck Bloombecker, Dow Jones-Irwin
|
|
"Using the Public Library in the Computer Age", Westin & Finger, ALA.
|
|
Directions & Implications of Advanced Computing, Vol. 1 and Proceedings
|
|
>from 88 and 90, CPSR.
|
|
- Flyer announcing "The Privacy Project" an NPR series (for which I
|
|
was interviewed) to be broadcast in the Fall of 1991.
|
|
- Flyer advertising "Your Expanding Infosphere" an NPR ComputerTalk
|
|
Program.
|
|
- Reason, a magazine for "free minds and free markets" whose cover
|
|
story was on cryogenics.
|
|
- Flyer on the National Apple Users Group Conference, June 7-9, 1991.
|
|
- Flyer on the Silicon Valley Networking Conference, April 23-25,
|
|
1991.
|
|
- Flyer on the third Chugach Conference, University of Alaska, Oct.
|
|
3-5, 1991. Plus Center for Information Technology News from U. Alaska.
|
|
- Flyer on the Calif. Forum of the First Amendment Congress, May 6,
|
|
1991, Stanford University (free to the public).
|
|
- Flyer for the Electronic Democracy Conference, Sept 4-5, 1991.
|
|
- Calls for Papers from: The National Conference on Computing and
|
|
Values (Aug. 12-16, 1991) Directions & Implications of Advanced
|
|
Computing (May 2-3, 1992)
|
|
|
|
I returned home with a broader idea of the many facets of the computer
|
|
freedom and privacy issue. I must now admit to being more worried than
|
|
I was before I attended this conference, as to the lack of solutions
|
|
being offered by my colleagues. Perhaps this meeting of the minds is a
|
|
first start. More work needs to be done.
|
|
|
|
R. Mercuri mercuri@gradient.cis.upenn.edu The following are some
|
|
addenda & corrections to my trip report on the Computers, Freedom and
|
|
Privacy Conference, with thanks to the individuals who provided
|
|
additional details and insights.
|
|
|
|
1. A second CFP conference has been scheduled for Spring 1992 in
|
|
Washington, D.C. -- the general chairman will be Lance J. Hoffman.
|
|
|
|
2. Later figures for the first conference indicate that Jim Warren's
|
|
losses may not have been as severe as he had indicated when I spoke
|
|
with him.
|
|
|
|
3. Although the formation notice for alt.privacy indicated that the US
|
|
Privacy Council was created AT the CFP conference, Lance Hoffman has
|
|
informed me that this organization was actually formed PRIOR to the
|
|
conference. Its first public meeting was held during the conference
|
|
period but otherwise had no official conference involvement.
|
|
|
|
4. Robert Veeder works at the Office of Information Regulatory Affairs
|
|
IN D.C., a branch of the federal Office of Management and Budget.
|
|
|
|
5. Mark Rasch prosecuted (not defended) the internet worm case.
|
|
|
|
6. Dorothy Denning wrote to me, mentioning that "the main point I tried
|
|
to make in my talk was that we are letting our young people down by not
|
|
taking responsibility for bringing them into the computing and network
|
|
community as responsible users." My brief comments of her talk could
|
|
lead a reader to believe that she was somewhat cavalier about the
|
|
issue, which was certainly not the case.
|
|
|
|
7. The "sandals of Silicon Valley to the dark suits of Washington"
|
|
quote should be accredited to Terry Winograd.
|
|
|
|
8. Judith Krug (not King) spoke in behalf of the American Library
|
|
Association.
|
|
|
|
9. In Dave Hughes' talk, he had Franklin using an Apple and Jefferson
|
|
using Word Perfect running under Windows (far more comical than what I
|
|
had recalled).
|
|
|
|
Considering the length of the conference and quantity of speakers, I
|
|
am relieved that my errors and omissions were so few.
|
|
|
|
Yours in good journalism, R. Mercuri mercuri@gradient.cis.upenn.edu
|
|
--
|
|
|
|
|
|
|
|
|