💾 Archived View for spam.works › mirrors › textfiles › politics › cfp1-sum captured on 2024-02-05 at 13:45:43.
⬅️ Previous capture (2023-06-16)
-=-=-=-=-=-=-
Date: Mon, 1 Apr 91 22:56:31 EST [not an April Fool's joke] From: mercuri@grad1.cis.upenn.edu (Rebecca Mercuri) Subject: Computers, Freedom, Privacy Trip Report The following constitutes my trip report for the Computers, Freedom and Privacy Conference held March 26-28, Airport Marriott Hotel, Burlingame, California. Although I have made a sincere attempt to relate the events of the conference in a fair and unbiased manner, the nature of the material covered entails a certain amount of emotion and it is difficult, if not impossible, to separate one's own feelings from the subject matter. I therefore apologize for any inadvertent mistakes, omissions, or philosophical commentary. Readers are encouraged to send corrections to me at the email address below. No flames please! Respectfully submitted, R. T. Mercuri mercuri@gradient.cis.upenn.edu No portion of this document may be copied or distributed for commercial purposes without the prior express written permission of the author. Non-commercial uses are permitted, but the author and source must be credited. Copyright (C) 1991 R. T. Mercuri. All Rights Reserved. [Edited lightly by PGN and included in RISKS with permission of the author.] This work was partially supported by the University of Pennsylvania's Distributed Systems Laboratory as a part of its promotion of the professional activities of its students. Matching funds were also provided by Election Watch, a division of the Urban Policy Research Institute, a non-profit organization. ====================================================================== The First Conference on Computers, Freedom and Privacy was organized and chaired by Jim Warren, and sponsored by the Computer Professionals for Social Responsibility (CPSR). Numerous other organizations also lent their support to the conference, which was attended by approximately 400 individuals (described by Terry Winograd as ranging >from the sandals of Silicon Valley to the dark suits of Washington) covering the fields of law, investigation, programming, engineering, computer science, hacking, industry, media, academics, government, law enforcement, and civil rights. The crowd was about 75% male, with very few minorities in evidence (only ~10% of the speakers were female, and none were minorities). Attendees formed a veritable who's who of hacking with key figures such as Captain Crunch, Phiber Optik, Steve Jackson, Craig Neidorf, and other notables there, some accompanied by an entourage of defense and prosecuting attorneys. Cliff Stoll and Ted Nelson (separately) took the opportunity to distribute copies of their books and give autos. (Cliff was fond of playing with a brightly- colored yo-yo and writing memos to himself on his hand, Ted appeared to be creating a video record of the conference by filming each speaker with a small hand-held camera for a few seconds as each talk began.) A list of attendees was distributed, providing all information that each participant marked as "open". The vast majority of participants provided their name, company, address, phone number and email address. Some people remarked privately that had they been more aware of the manner in which such information is currently being used, they likely would have "closed" more of their own data. (The list was printed in name-alphabetical order so it was unfortunately possible to derive the names of individuals who elected not to be listed.) Jim Warren, who described himself as a self-made multi-millionaire, entrepreneur, futures columnist, and member of the board of directors of MicroTimes and Autodesk, Inc., took a severe loss on the conference. He had estimated break-even at 500 participants, but had only achieved around 300 paid admissions as most of the media and some staff members attended for free. To his credit, he organized a fast-paced, well-run (on-time) conference which allowed many of the key figures in this field to present their thoughts and ideas. Audio and videotapes, as well as the conference proceedings (published by Springer-Verlag) will be available shortly [write to CFP Proceedings, 345 Swett Road, Woodside, CA 94062]. The conference was preceded by a day of tutorial sessions, but I was unable to attend those activities. My major criticism regarding the conference was that the sheer volume of speakers (over 20 per day) allowed little time for questioning from the audience. Many of those who were not wearing red speaker's badges began feeling like second-class citizens whose opinions were neither wanted nor recognized. If someone managed to obtain a microphone and used it to make a statement rather than to ask a question, they were routinely hissed by a large portion of the audience. The unresolved tension became most obvious on the last day of the conference when, during the panel discussion on Electronic Speech, Press & Assembly, a loud altercation broke out in the front of the room. This panel had a representative from Prodigy Services, but the person who was supposed to give opposing commentary (apparently regarding the email privacy issue) had been unable to appear. Certain attendees were prepared to present their views, but were informed that they would not be permitted to do so. A private meeting was arranged for those who wished to discuss the Prodigy matter, but many found this to be unacceptable. An oft-heard word describing the material revealed during the conference was "chilling". After the second day of the conference I became aware of how invasive the monitoring systems have become. As I returned to my room within the hotel, I realized that my use of the electronic pass-key system could alert the hotel staff of my entry and exit times. People could leave messages for me, which would be reported on my television screen, all of this being recorded in some database somewhere, possibly not being erased after my departure. My entire hotel bill, including phone calls and meal charges could also be displayed on my television screen, along with my name, for anyone to access (without a password) if they were in my room. Chilling indeed. Pondering all of this, I left the room, lured to the hotel lobby by the sound of what I assumed to be a cocktail piano player. When I located the baby grand piano I realized that, through the high-tech wonders of Yamaha, no human sat at the keyboard. A sophisticated computerized unit rendered a seemingly- endless sequence of expertly arranged tunes, with no requests allowed from the audience. This ghostly image reemphasized, to me, the silent pervasion of computers into our daily lives, and the potential erosion of personal freedom and privacy. Throughout the conference, many problems were posed, few answers were given. Factions developed --- some people felt we needed more laws, some people felt we needed fewer laws, some felt that all data (including program code) should be free and accessible to everyone, some felt that everything is personal property and should be specifically released by the owner(s) prior to general use. Certain people felt that all problems could be resolved by tightly encrypting everything at all times (the issue of password distribution and retention was ignored). What was resolved was to form an organization called the US Privacy Council which "will attempt to build a consensus on privacy needs, means, and ends, and will push to educate the industry, legislatures, and citizens about privacy issues." The first thing this organization did was form a newsgroup, called alt.privacy. I observed that at least 50 messages were posted to this newsgroup within the 3 days following the conference, most pertaining to privacy of emails. This was disappointing, to say the least. Presumably people will use the mailing list and the newsgroup to disseminate information, but whether this is merely a duplication of other existing newsgroups (such as RISKS), and whether the Privacy Council will have any impact at all, shall be left to be seen. The conference opened with a comment by Jim Warren that this meeting could be "the first Constitutional Convention of the new frontier". He then introduced Harvard Law Professor Lawrence Tribe who used the analogy of cyberspace to describe some of the problems of a "virtual constitutional reality". He quoted Eli Noam as saying that "networks become political entities" and that there could conceivably be "data havens", private networks much like Swiss bank accounts, which are virtual governments in themselves. He asserted that a bulletin board sysop is not a publisher, in the same way that a private bookstore owner is not a publisher. The individual merely makes the products available, and has the responsibilities of a seller, not a publisher. Tribe then went on to delineate five major points. First, there is a vital difference between governmental (public) and private actions. Second, ownership is an issue that goes beyond that which may be technologically feasible. Property encourages productivity. You have a constitutional right to inhabit your own body. Free speech may be a luxury we can't afford (like yelling "fire" in a crowded theater, or viruses roaming the network). Third, the government cannot control speech as such. Recently it was ruled that answers to very simple questions (such as your name, age) are considered testimonial, as they require the use of the human mind. Fourth, the Constitution was founded on a normative understanding of humanity, and should not be subject to disproof by science and technology. The words of the 4th Amendment apply to material things, it defends people, not places. It is the task of law to inform and project an evolutionary reading of the bill of rights to new situations. Fifth, Constitutional principles should not vary with accidents of technology. In conclusion, Tribe proposed an additional amendment to the constitution which asserted that "this Constitution's protection for freedom of speech, press, assembly...shall be construed as fully applicable without regard to the technological medium used." The first panel discussion of the conference was titled: Trends in Computers and Networks. Peter Denning of NASA Ames introduced the panel by stating that computers are now under attack due to security being added on as an afterthought. John Quarterman of Texas Internet Consulting then discussed the manner in which user/host names could be made more readable (accessable) on the network. Peter Neumann of SRI overviewed general issues surrounding the authorship of the "Computers at Risk" book, stating that the group involved with the text was primarily interested in motivating efforts towards evaluating safe, secure, reliable systems (and that they only proposed general guidelines in the text). He warned the listeners "don't wait for the catastrophe". Neumann also mentioned the issue of disenfranchization of the poor and lower class who will be unable to access the new technology, stating that "gaps are getting much bigger". Martin Hellman of Stanford University discussed cryptography. He stated that the 56 bit DES standard was set not by technology, but instead by economics. He mentioned a study at Bell Labs that indicated that 70% of all passwords there could be cracked using a dictionary technique. He believes that technology will not solve all of our problems, and that persons who are concerned about social responsibility are not (necessarily) anti-technical. David Chaum of DigiCash spoke about informational rights and secure channels with regard to electronic money transactions. He believes that with an adequately encrypted system there is no necessity for a central, mutually trusted party. The problem is in finding a practical encryption protocol, or a distributed, mutually-trusted tamper-proof box solution. David Farber of the University of Pennsylvania expressed the view that protection schemes might not be "retrofittable" and should be part of the fundamental design of computer architecture, protocols and technology, rather than being tacked on, but he worried that people may not be willing to pay for these design features. Farber also mentioned the possibility of retroactive wiretapping, where archived data could be obtained through invasive means. The second panel session was titled: International Perspectives and Impacts. Ronald Plesser of the Washington D.C. law firm of Piper & Marbury first mentioned that these issues impact on how international business is conducted. Many countries, particularly in Europe, have already established standards with which we must comply. Databases feeding Europe must be concerned with the processing of personal data of individuals. Certain directives have been authored that are so general in scope as to be difficult to apply ("to all files located in its territory" was one example). Tom Riley, of Riley Information Services in Canada, continued this discussion regarding data protection policies. He urged the authoring of a harmonized directive, similar to that for other exports. The United States, by lagging behind in establishing standards of its own, risks the possibility of losing the opportunity to affect these policies as they are being written. David Flaherty entertained the crowd with his "George Bush" speech, stressing that "privacy begins at home". Robert Veeder of the D.C. Office of Information Regulatory Affairs discussed the impact of the 30,000+ messages to Lotus which effectively stopped the production of their CD- ROM database. This electronic lobbying had never been used to such great effect prior to that time. He believes the electronic forum will provide larger access to public concerns. (The impression I was left with was that certain governmental agencies are not wholly enthusiastic about this powerful method of expression, and that they are monitoring the situation.) Next, we heard from a variety of speakers on the subject of Personal Information and Privacy. Janlori Goldman, of the ACLU, discussed the "library lending" project by the FBI. This was an attempt to track library usage habits of foreign nationals. The ACLU objects to this sort of surveillance as well as other similar broad-based methods. An audience member criticized the ACLU's own release of membership data, to which Janlori replied that she did not agree with her organization's policy to allow such releases, but was currently unable to do more than protest against it. John Baker, Senior Vice President of Equifax, described the benefits of information with regard to improved goods, services, prices, convenience and wider choices. (Equifax is an organization which supplies marketplace data with specific information about consumers.) He stressed that people need to understand their rights, responsibilities and opportunities with regard to their published data. He believes that the Lotus Marketplace product was flawed because of the delay involved when customers wanted to "opt-out" of the database. He portrayed a spectrum of controls over data usage, ranging from no restrictions (free speech), through some restrictions (based on impact, sensitivity, access, security and confidentiality), to absolute restrictions (where the available information would have little value). Equifax took a survey on consumer interest in availability of data for direct marketing purposes which revealed that 75% would find it acceptable as long as there is a facility to opt-out. An audience member raised the point that the default is opt-out rather than opt-in. These two speakers were followed by a debate between Marc Rotenberg, Washington Office Director of the Computer Professionals for Social Responsibility, and Alan Westin, Professor of Public Law and Government at Columbia University, with the subject "should individuals have absolute control over secondary use of their personal information?" Marc argued in favor of the statement, using an eloquent oratorial style, and Alan spoke in opposition with the demeanor of a seasoned litigator. Marc made such statements as "we are all privacy advocates about something in our personal lives", "it is the most fragile freedom" and "protect privacy, change the default", stressing that the individual should have the right to control the value and use of their personal information. Alan outlined four major issues: 1. Nature of the secondary use; 2. Society should decide on fair uses, not a nihilistic veto; 3. Underpinning of constitutional democracy; 4. Adequate control protects against potential misuse. He believes that the consumer benefits from the advantages of a knowledge society. No winner/loser of the debate was declared. Speakers continued on the subject of Personal Information and Privacy. Lance Hoffman, of the EE & CS department at George Washington University, mentioned that Japan will be instituting a system of personal phone number calling --- basically you can send and receive calls at your "own" phone number wherever you happen to be situated. This permits very close tracking of individual movements and is a potential further invasion of privacy. He noted that no one has ever received the ACM Turing Award for a socially responsible system, and encouraged positive recognition of achievements along these lines. He also recommended that a "dirty dozen" list of worst systems be compiled and distributed. Evan Hendricks, editor and publisher of Privacy Times, listed many records that are and are not currently protected by law from distribution. Interestingly, video rental records are protected, but medical records are not. He cited an interesting example of a circumstance where a man and woman living in the same home (but with different last names) were sent copies of each other's bills, urging them to encourage their "roommate" to pay. It turned out that the individuals were landlady and tenant. Another interesting fact that Evan revealed was that studies indicate ~30% of social security numbers in some databases are inaccurate. Lists of persons having filed Workmen's Compensation claims have, in some cases, been used to blacklist people from jobs. Hendricks urged people to ban the recording and distribution of human genome information --- some parents voluntarily provide cellular test results in case their child is later missing or kidnapped. There is no way to know how these records are likely to be used in the future. Tom Mandel, director of the Values and Lifestyles Program (VALS) at SRI, spoke in favor of the Lotus Marketplace product. He felt that the 30K response was not representative of the general public, and believes that a small percentage of "media sophisticates" can have apply greater leverage. He noted that VALS is currently involved with a joint venture with Equifax, who is currently involved with a joint venture with Lotus. Willis Ware, of the RAND Corporation, chaired the HEW committee that led to the 1980 privacy act (a reporter preparing materials for publication can not be searched). He felt that the government previously was considered to be a threat to privacy, not a protector, and considers the privacy issue as one of social equity. He indicated that personal information should not be considered to be private property, and should be shared in an equitable manner. To apply royalties for usage would place a tremendous impact on costs. He noted that the databases behind airline, pharmacy and point-of-sale systems may be open to access by various groups including the Internal Revenue Service and Drug Enforcement personnel. Simon Davies, a member of the law faculty at Australia's University of New South Wales, provided a sobering criticism of this conference and the United States' policy making processes, stating that the conference was too "nice" and "conciliatory" and that the "US is an embarrassment to the privacy issue". He used the term "pragvocate" (pragmatic advocate) to describe policy-makers who are well-trained, say the right things, and denounce extremes, giving environmentalists as an example. He reminded us that the basis of the US system is not to "opt-out" --- no one would write to the LA police asking "don't beat me up". Davies alerted us to the fact that Thailand, an oppressive military government, is currently purchasing US technology to provide smart ID cards for their citizens. He noted that the Smithsonian Institute awarded them a trophy for their use of technology. He stated that the United States is encouraging similar activities in the Philippines and Indonesia. A somewhat light-hearted after-dinner talk was delivered by Eli Noam, of Columbia University's School of Business, on the subject of "reconciling free speech and freedom of association". He suggested that phone systems be established whereby individuals can provide their friends and associates with special access codes so that they can dial them. Others can call, but at a higher rate. (Note that this would likely have an adverse impact on legitimate business and social calls as well as possibly reducing undesirable calls.) He stated that presently "no computer can write the 4-line plot capsules that appear in TV Guide", with regard to the failure of AI systems. Noam questioned the lack of policies concerning what happens to an information data base after an individual's death. He concluded with the statement that for "all digital systems --- 0's and 1's are created equal." The second day of the conference opened with a session on Law Enforcement Practices & Problems. Glenn Tenney, well known as the organizer of the Hacker's Conference, chaired this panel with little comment. Don Ingraham, Assistant DA of Alameda County, Calif. (who, during a tutorial earlier in the week, distributed information on the writing of search warrants), gave a fantastically humorous presentation. He spoke of the "pernicious myth of cyberspace" and declared "you ARE the country". He mentioned that systems exist with "the security built in of a sieve" and that people have their information on these systems, but not necessarily because they want it to be there. He feels that the attitude of "don't worry, we don't need standards" is a poor one, and that laws should be written to let the people know what the rules are. He would rather see an organization formed called Sociable Professionals for Responsible Computing (instead of CPSR). He finished his talk by saying "if you don't do it, who will -- if not now, when" (a Talmudic quotation that he used without citation). Robert Snyder, of the Columbus Ohio Police Department, presented the view of the "cop on the street". He spoke of his naivete when first entering the field of computer law, and how much evidence was destroyed at first by listening to suspects who told him to type things like "format c:" in order to access the hard disk. He has encountered situations where the suspect actually does not know what is on the system --- some of these are cases where a parent is running a business and a child is using the machine for illicit hacking purposes. In these cases, even though he has a warrant to obtain all of the computer equipment, he often will not shut down a legitimate business. He brought up the issue of unregistered software sitting on a confiscated system. There are liability problems dealing with the return of such materials. Basically he stated that the law enforcement personnel require further education and training, and should operate within guidelines but with prudence. Donald Delaney, Senior Investigator with the New York State Police, began his talk by relating how when his home was burglarized in 1985, he experienced a feeling of violation. This feeling is much the same with computer crime. Many firms experience a loss of income from such activities. In his experience, many of the people caught are engaged in more crimes than the ones they are charged with. Dale Boll, Deputy Directory of the Fraud Division of the U.S. Secret Service, spoke of the various forms of access device fraud (credit card, ATM, passwords, phone access, frequent flyer numbers, etc.). He stated that it is illegal to posses counterfeit access devices and that if you have 15+ illegal access devices or numbers in your possession, you may be a subject of federal investigation. They have a 96% conviction rate. ATM cards can be manufactured illegally using cardboard and regular audio tape. The credit card industry is now losing $1 Billion per year. An audience member asked if they are using programs like Gofer (grep for UNIX hackers) to search for information they want on bulletin boards and networks. He replied that although they own this program, they use it personally and not for investigation purposes. The next session, on Law Enforcement and Civil Liberties, had seven participants, none of whom were given much time to present their views. I will briefly highlight what they said here. Sheldon Zenner, the Attorney for Craig Neidorf said that the prosecutors had originally sought a 2-year sentence, and that thanks to many of the people at this conference who rallied to Craig's support, they were able to get him off. Mark Rasch who defended the internet worm case stated that the expectation of privacy is changed because of the technology employed -- - technology affects behavior. Cliff Figallo, manager of the WELL (Whole Earth 'Lectronic Link, popular among many Bay Area participants as an alternative means of accessing the Internet) addressed his concerns about overuse of law enforcement. He wants his users to feel safe. Sharon Beckman, Litigation Council to the Electronic Freedom Foundation (EFF) and Attorney for Steve Jackson Games (whose computers were seized, when one of his fantasy games was perceived as being capable of training users to "hack" into computers) stated that underlying values of the constitution should be interpreted in terms of today's technology. Ken Rosenblatt, a District Attorney covering the Silicon Valley area, stated that he is charged with upholding civil liberties and feels that the laws are presently adequate. Mike Gibbons, Special Agent for the FBI, mentioned that he worked various white collar cases, including the 75 cent case (described in Cliff Stoll's book), and the Robert Morris case. He feels that there are various classes of computer crime, including impairment, data theft, and intrusion. Mitch Kapor, founder of EFF, stated that the "electronic frontier hasn't been settled yet" and that we should not stifle the "network petri dish inventing the future". He questioned the nature of reasonable search, stating that there haven't been enough cases yet to establish a meaning for this in computer law. Everyone should be protected from tyranny, not only hackers. He looks at the EFF as a means of civilizing cyberspace. The matter of free speech was discussed in the questioning session with the panel -- much speculation was directed towards the legality of discussions of bomb-making, system hacking, and the publication of other potentially lawless activities on the net or in technical papers. Other comments included the fact that law enforcement cannot seize an entire post office, their search must be limited to the mailbox of the suspect. This analogy applies to computer networks as well, although the volatility (ease of total destruction of evidence) of computer data is of concern to investigators. As I had an extended and quite insightful conversation with Russ Brand over lunch, I returned a tad late to the next session, on Legislation and Regulation, and was only able to catch two of the speakers. Elliot Maxwell, Assistant Vice President at Pacific Telesis stated that it is "difficult to have simple and specific rules". Paul Bernstein, whose LawMUG BBS and Electronic Bar Association is well known among the legal community, stated that one should "use mediums that exist -- participate in fashioning the laws." The most eye-opening session of the entire conference, in my opinion, was the following one on Computer-Based Surveillance of Individuals. It opened with Judith King describing the FBI Library Surveillance Program, where the reading habits of foreign nationals were investigated. She stated that many librarians want laws to protect the confidentiality of users, and some statutes have been passed. Karen Nussbaum, Executive Director of 9 to 5 (on which the film was based), gave an accounting of the monitoring of employees in the workplace. Currently over 26 Million employees are having their work tracked electronically, and over 10 Million have their pay based on computer evaluations. The personal habits of the worker can be monitored, one can look into a user's screen and see what they are doing or even send them messages. She described the "corporate plantation" as a place of stress, humiliation and harassment. Gary Marx, Sociology Professor at MIT, gave a whirlwind assessment of the importance of privacy, some technofallacies (like the Wizard of Oz "pay no attention to the little man behind the curtain"), and steps you can use to protect privacy (the bulk of these useful lists are published in the proceedings). He related how a telephone can be made "hot on the hook" so that you can silently monitor your babysitter, your children or your spouse, when you are not at home. Most devices, such as this one, are perfectly legal within your own house. David Flaherty spoke again, this time in a more serious vein, saying "we are living in a surveillant society" and "you have to make daily choices about what you are willing to give up about yourself." The second day's after-dinner speaker was William Bayse, Assistant Director, Technical Services Division of the FBI, who discussed a newly created national system called the NCIC-2000, under the topic of "balancing computer security capabilities with privacy and integrity". He began by asserting that crime has become more mobile and that conventional crime-tracking methods are inadequate. For example, he said, many missing persons actually want to remain missing. He feels that the accuracy of records is imperative. Various information bases have been formed, including lists of stolen items, vehicles, and wanted persons. Presently 65,000 officers are using this system, with 360M transactions annually, at a cost of 3 cents a transaction. For an example of effectiveness, over $1.1 Billion in vehicles have been recovered. Proposed, but not yet implemented is the portion of the system which provides a live scan of fingerprints at the scene of an arrest (or when someone is stopped for a motor vehicle violation) [with the intended purpose of considerably reducing false identifications... PGN]. Much criticism was generated from the audience regarding the potential misuse of this system for harassment, and the retention of fingerprints for future use. Marc Rotenberg addressed Bayse questioning why documents requested under the freedom of information act from his agency have still not been supplied, and stating that currently a lawsuit is pending to obtain their policies regarding monitoring of computer bulletin boards. Bayse refused comment. The final day of the conference opened with a session on Electronic Speech, Press and Assembly. Jack Rickard of Boardwatch Magazine mentioned that bulletin boards are highly specialized, primarily funded by individuals, and are in their embrionic stage. David Hughes, Managing General Partner of Old Colorado City Communications, added some color to the conference with his western garb (10-gallon hat, bolo tie) and use of his laptop for the notes of his speech. He described himself as a "Citizen of the Western Frontier of the Information Age" and drawled, "Read my Cursor". He described electronic speech as "fingers of the tongue with the ear for the eye --- but it is still speech". In describing US history, were it to have occurred today, Jefferson would have used a Macintosh, Adams would have used a PC, but "Tom Paine would have put Common Sense on a private BBS with a Commodore 64". "Don't tread on my cursor!" he cried. George Perry, Vice President of Prodigy, began by saying that he did not want to engage in discussion on the dispute, but then stated that "Prodigy does not read private email". Prodigy is a privately owned and operated company which believes that the market should be allowed to decide what services need to be provided. The Constitution regulates free speech with respect to the government, Prodigy thinks of itself as a publisher. Lance Rose, a NY Attorney, enumerated the types of rights afforded to individuals and companies with regard to ownership, including trade secrets, confidentiality, trademark, copyright and patent. There is currently a great diversity of laws which service providers must adhere to, making the provider, in some instances, a law enforcement agent. During the open comment section, Hughes noted that very few legislators are currently on-line, and he thanked Prodigy for preparing the NAPLPS market (for his products). The notable talk in the Access to Government Information session was David Burnham's (Co-Director and Writer with the Transactional Records Access Clearinghouse [TRAC] in D.C.). He stated that "badly administered agencies are more damaging than rogue operations". The objectives of TRAC are to obtain transactional data >from federal enforcement agencies, such as the IRS, NRC, and Justice Department. He demonstrated how the raw statistics could be combined with additional figures regarding inflation, population, and margin of error, showing that the so-called "trends" of increasing crime, or increased non-compliance with tax law, were actually flat lines when the mitigating factors were added in. The final panel discussion was on Ethics and Education. Richard Hollinger, Sociology Professor with the University of Florida, asserted that the "same officers who are investigating computer crimes are the ones who are protesting computers in their patrol cars because they feel it would be oppressive." He is concerned with the industry's encouragement of the use of computers in schools, before rules for their ethical use have been written. Donn Parker with SRI stated that laws are needed in order to convict hackers. Convictions have a "very good effect on our whole problem", he said. He referred back to the 60's when the ACM and IEEE drafted codes of conduct, and said that these should be popularized. He believes that one can not teach ethics, that it comes from interpersonal relationships, and (for him) the Christian religion and the Bible. One can teach, he believes, the application of ethics, beyond the golden rule. He delineated three rules: 1. The Owner's Rule - you choose to issue your property into the public domain, or not; 2. The User's Rule - you assume everything belongs to something else, unless otherwise informed; 3. The Hacker's Rule - systems are free, everything should go to the people (which he rejected as childish, not worth considering). He suggested that we consider the dilemma of Descartes -- if it is OK to start by stealing pencils, where then can we draw the line? Dorothy Denning spoke briefly regarding the network uses by children (Kids Net). She speculated that we should teach them something about hacking in order to take the mystery out of it. She compared telephone fraud by children as a more sophisticated version of the "is your refrigerator running" prank. The Education and Ethics panel continued with the softspoken John Gilmore, a "generalist" with Cygnus Support. He warned that we are losing the larger open society. The US is currently #1 in percentage of population in jail. He spoke of drug usage as a victimless crime. John asked the audience "who has not broken a law in the past month?" Only a few raised their hands. He then asked "who here has all their disks clean -- free from something you would not want them to find if you were investigated?" About 15% raised their hands, but after pondering it, a number of them lowered them (the person behind me muttered that he had some shareware for which he had not paid). Gilmore said "privacy is a means -- what is the end we are looking for? Tolerance." He urged real privacy of personal communications, financial transactions, things should be as "private as that thought held in our minds." He demanded that we stop building fake systems -- laws that dictate that you "can't listen to cellular phone calls" -- and instead build real protections into your systems and buy them from others. His talk received a standing ovation from the vast majority of the audience members. The remaining panel speaker, Sally Bowman, a Child Psychologist with the Computer Learning Foundation, stated that her organization is working to raise awareness and solve a number of problem areas. The problems she outlined were: 1. Lack of awareness of the magnitude of the problem. Software industry is being hurt by piracy; 2. Many misimpressions -- confusion, lack of information; 3. Lack of teeth in software copying policies; 4. Lack of strategies in teaching ethics; 5. School budgets are too small to allow legal procurement of software. Her organization is presently educating parents as to the "tell-tale" signs which indicate whether a child is "abusing" computer systems. The concluding session, entitled "Where Do We Go From Here" was staffed by a number of the conference speakers. They overviewed their feelings regarding the issues raised during the sessions and made general comments with respect to what they might do to raise awareness and resolve some of the problems. Throughout the conference many pamphlets, brochures and newsletters were distributed. Although it is infeasible for me to provide copies of this literature, interested parties can contact me or Jim Warren (jwarren@well.sf.ca.us) to provide source names and addresses. Some of the more interesting items (in no particular order, just how they happened to come out of my briefcase) included: - Brochures from the Cato Institute "Toward a Moral Drug Policy", "America's Counter-revolution", "The Semiconductor Industry and Foreign Competition", "The Promise of High-Definition Television: The Hype and the Reality", and their publication catalog. - Matrix Information and Directory Services Newsletter. - The Manifesto of Militant Humanism. - "Are you a Hacker?" by Robert Bickford, reprinted from MicroTimes. - Call for formation of a World Privacy Network. - An advertisement for SafeWord Software (password checking/protection). - Condom distributed by Anterior Technology (they market a system whereby you can retrieve the first 80 characters of emails while out of town). - "The Bill of Rights is Under Attack" from Committee for the Bill of Rights. - Hollywood Hacker Info, reprinted from Computer Underground Digest. - Calif. State Assembly Bill #1168 on Personal Information Integrity. - Computer Learning Month - from the Computer Learning Foundation. - The Equifax Report on Consumers in the Information Age - A reprint of John Barlow's article "Crime and Puzzlement" from Whole Earth Review, Fall 1990. - Various brochures from the First Amendment Congress, an organization providing educational materials on the First Amendment. - Policy papers from the League for Programming Freedom including "Against Software Patents", "Lotus Disinformation Forewarned is Forearmed", and the Effector (its newsletter). - CPSR reprints of newsarticles regarding the Lotus database. - Promotional literature for Ted Nelson's Xanadu. - Brochure for the Community Memory BBS, and its newsletter. - Brochure for the Art Com Electronic Network. - Brochure for the International Society for Individual Liberty. - Various copies of MicroTimes. - Application forms for CPSR and the League for Programming Freedom. - Rel-EAST, the east-west high-tech business report. - Suggested reading on how computer crime is investigated from Don Ingraham. - Book promotional literature including: "Rogue Programs" edited by Lance Hoffman, Van Nostrand Reinhold "Protecting Privacy in Surveillance Societies", David Flaherty, University of North Carolina Press "Spectacular Computer Crimes", Buck Bloombecker, Dow Jones-Irwin "Using the Public Library in the Computer Age", Westin & Finger, ALA. Directions & Implications of Advanced Computing, Vol. 1 and Proceedings >from 88 and 90, CPSR. - Flyer announcing "The Privacy Project" an NPR series (for which I was interviewed) to be broadcast in the Fall of 1991. - Flyer advertising "Your Expanding Infosphere" an NPR ComputerTalk Program. - Reason, a magazine for "free minds and free markets" whose cover story was on cryogenics. - Flyer on the National Apple Users Group Conference, June 7-9, 1991. - Flyer on the Silicon Valley Networking Conference, April 23-25, 1991. - Flyer on the third Chugach Conference, University of Alaska, Oct. 3-5, 1991. Plus Center for Information Technology News from U. Alaska. - Flyer on the Calif. Forum of the First Amendment Congress, May 6, 1991, Stanford University (free to the public). - Flyer for the Electronic Democracy Conference, Sept 4-5, 1991. - Calls for Papers from: The National Conference on Computing and Values (Aug. 12-16, 1991) Directions & Implications of Advanced Computing (May 2-3, 1992) I returned home with a broader idea of the many facets of the computer freedom and privacy issue. I must now admit to being more worried than I was before I attended this conference, as to the lack of solutions being offered by my colleagues. Perhaps this meeting of the minds is a first start. More work needs to be done. R. Mercuri mercuri@gradient.cis.upenn.edu The following are some addenda & corrections to my trip report on the Computers, Freedom and Privacy Conference, with thanks to the individuals who provided additional details and insights. 1. A second CFP conference has been scheduled for Spring 1992 in Washington, D.C. -- the general chairman will be Lance J. Hoffman. 2. Later figures for the first conference indicate that Jim Warren's losses may not have been as severe as he had indicated when I spoke with him. 3. Although the formation notice for alt.privacy indicated that the US Privacy Council was created AT the CFP conference, Lance Hoffman has informed me that this organization was actually formed PRIOR to the conference. Its first public meeting was held during the conference period but otherwise had no official conference involvement. 4. Robert Veeder works at the Office of Information Regulatory Affairs IN D.C., a branch of the federal Office of Management and Budget. 5. Mark Rasch prosecuted (not defended) the internet worm case. 6. Dorothy Denning wrote to me, mentioning that "the main point I tried to make in my talk was that we are letting our young people down by not taking responsibility for bringing them into the computing and network community as responsible users." My brief comments of her talk could lead a reader to believe that she was somewhat cavalier about the issue, which was certainly not the case. 7. The "sandals of Silicon Valley to the dark suits of Washington" quote should be accredited to Terry Winograd. 8. Judith Krug (not King) spoke in behalf of the American Library Association. 9. In Dave Hughes' talk, he had Franklin using an Apple and Jefferson using Word Perfect running under Windows (far more comical than what I had recalled). Considering the length of the conference and quantity of speakers, I am relieved that my errors and omissions were so few. Yours in good journalism, R. Mercuri mercuri@gradient.cis.upenn.edu --