💾 Archived View for spam.works › mirrors › textfiles › politics › cfp1-sum captured on 2024-02-05 at 13:45:43.

View Raw

More Information

⬅️ Previous capture (2023-06-16)

-=-=-=-=-=-=-

Date: Mon, 1 Apr 91 22:56:31 EST

[not an April Fool's joke] 

From: mercuri@grad1.cis.upenn.edu (Rebecca Mercuri)

Subject: Computers, Freedom, Privacy Trip Report

The following constitutes my trip report for the Computers, Freedom and 
Privacy Conference held March 26-28, Airport Marriott Hotel, 
Burlingame, California. Although I have made a sincere attempt to 
relate the events of the conference in a fair and unbiased manner, the 
nature of the material covered entails a certain amount of emotion and 
it is difficult, if not impossible, to separate one's own feelings from 
the subject matter. I therefore apologize for any inadvertent mistakes, 
omissions, or philosophical commentary. Readers are encouraged to send 
corrections to me at the email address below. No flames please!

Respectfully submitted, R. T. Mercuri

mercuri@gradient.cis.upenn.edu


No portion of this document may be copied or distributed for commercial 
purposes without the prior express written permission of the author. 
Non-commercial uses are permitted, but the author and source must be 
credited. 
Copyright (C) 1991 R. T. Mercuri. All Rights Reserved. [Edited lightly 
by PGN and included in RISKS with permission of the author.]

This work was partially supported by the University of Pennsylvania's 
Distributed Systems Laboratory as a part of its promotion of the 
professional activities of its students. Matching funds were also 
provided by Election Watch, a division of the Urban Policy Research 
Institute, a non-profit organization.


======================================================================
The First Conference on Computers, Freedom and Privacy was organized 
and chaired by Jim Warren, and sponsored by the Computer Professionals 
for Social Responsibility (CPSR). Numerous other organizations also 
lent their support to the conference, which was attended by 
approximately 400 individuals (described by Terry Winograd as ranging 
>from the sandals of Silicon Valley to the dark suits of Washington) 
covering the fields of law, investigation, programming, engineering, 
computer science, hacking, industry, media, academics, government, law 
enforcement, and civil rights. The crowd was about 75% male, with very 
few minorities in evidence (only ~10% of the speakers were female, and 
none were minorities). Attendees formed a veritable who's who of 
hacking with key figures such as Captain Crunch, Phiber Optik, Steve 
Jackson, Craig Neidorf, and other notables there, some accompanied by 
an entourage of defense and prosecuting attorneys. Cliff Stoll and Ted 
Nelson (separately) took the opportunity to distribute copies of their 
books and give autos. (Cliff was fond of playing with a brightly-
colored yo-yo and writing memos to himself on his hand, Ted appeared to 
be creating a video record of the conference by filming each speaker 
with a small hand-held camera for a few seconds as each talk began.) A 
list of attendees was distributed, providing all information that each 
participant marked as "open". The vast majority of participants 
provided their name, company, address, phone number and email address. 
Some people remarked privately that had they been more aware of the 
manner in which such information is currently being used, they likely 
would have "closed" more of their own data. (The list was printed in 
name-alphabetical order so it was unfortunately possible to derive the 
names of individuals who elected not to be listed.) 

Jim Warren, who described himself as a self-made multi-millionaire, 
entrepreneur, futures columnist, and member of the board of directors 
of MicroTimes and Autodesk, Inc., took a severe loss on the conference. 
He had estimated break-even at 500 participants, but had only achieved 
around 300 paid admissions as most of the media and some staff members 
attended for free. To his credit, he organized a fast-paced, well-run 
(on-time) conference which allowed many of the key figures in this 
field to present their thoughts and ideas. Audio and videotapes, as 
well as the conference proceedings (published by Springer-Verlag) will 
be available shortly [write to CFP Proceedings, 345 Swett Road, 
Woodside, CA 94062]. The conference was preceded by a day of tutorial 
sessions, but I was unable to attend those activities. 

My major criticism regarding the conference was that the sheer volume 
of speakers (over 20 per day) allowed little time for questioning from 
the audience. Many of those who were not wearing red speaker's badges 
began feeling like second-class citizens whose opinions were neither 
wanted nor recognized. If someone managed to obtain a microphone and 
used it to make a statement rather than to ask a question, they were 
routinely hissed by a large portion of the audience. The unresolved 
tension became most obvious on the last day of the conference when, 
during the panel discussion on Electronic Speech, Press & Assembly, a 
loud altercation broke out in the front of the room. This panel had a 
representative from Prodigy Services, but the person who was supposed 
to give opposing commentary (apparently regarding the email privacy 
issue) had been unable to appear. Certain attendees were prepared to 
present their views, but were informed that they would not be permitted 
to do so. A private meeting was arranged for those who wished to 
discuss the Prodigy matter, but many found this to be unacceptable.

An oft-heard word describing the material revealed during the 
conference was "chilling". After the second day of the conference I 
became aware of how invasive the monitoring systems have become. As I 
returned to my room within the hotel, I realized that my use of the 
electronic pass-key system could alert the hotel staff of my entry and 
exit times. People could leave messages for me, which would be reported 
on my television screen, all of this being recorded in some database 
somewhere, possibly not being erased after my departure. My entire 
hotel bill, including phone calls and meal charges could also be 
displayed on my television screen, along with my name, for anyone to 
access (without a password) if they were in my room. Chilling indeed. 
Pondering all of this, I left the room, lured to the hotel lobby by the 
sound of what I assumed to be a cocktail piano player. When I located 
the baby grand piano I realized that, through the high-tech wonders of 
Yamaha, no human sat at the keyboard. A sophisticated computerized unit 
rendered a seemingly- endless sequence of expertly arranged tunes, with 
no requests allowed from the audience. This ghostly image reemphasized, 
to me, the silent pervasion of computers into our daily lives, and the 
potential erosion of personal freedom and privacy.

Throughout the conference, many problems were posed, few answers were 
given. Factions developed --- some people felt we needed more laws, 
some people felt we needed fewer laws, some felt that all data 
(including program code) should be free and accessible to everyone, 
some felt that everything is personal property and should be 
specifically released by the owner(s) prior to general use. Certain 
people felt that all problems could be resolved by tightly encrypting 
everything at all times (the issue of password distribution and 
retention was ignored). What was resolved was to form an organization 
called the US Privacy Council which "will attempt to build a consensus 
on privacy needs, means, and ends, and will push to educate the 
industry, legislatures, and citizens about privacy issues." The first 
thing this organization did was form a newsgroup, called alt.privacy. I 
observed that at least 50 messages were posted to this newsgroup within 
the 3 days following the conference, most pertaining to privacy of 
emails. This was disappointing, to say the least. Presumably people 
will use the mailing list and the newsgroup to disseminate information, 
but whether this is merely a duplication of other existing newsgroups 
(such as RISKS), and whether the Privacy Council will have any impact 
at all, shall be left to be seen.

The conference opened with a comment by Jim Warren that this meeting 
could be "the first Constitutional Convention of the new frontier". He 
then introduced Harvard Law Professor Lawrence Tribe who used the 
analogy of cyberspace to describe some of the problems of a "virtual 
constitutional reality". He quoted Eli Noam as saying that "networks 
become political entities" and that there could conceivably be "data 
havens", private networks much like Swiss bank accounts, which are 
virtual governments in themselves. He asserted that a bulletin board 
sysop is not a publisher, in the same way that a private bookstore 
owner is not a publisher. The individual merely makes the products 
available, and has the responsibilities of a seller, not a publisher. 
Tribe then went on to delineate five major points. First, there is a 
vital difference between governmental (public) and private actions. 
Second, ownership is an issue that goes beyond that which may be 
technologically feasible. Property encourages productivity. You have a 
constitutional right to inhabit your own body. Free speech may be a 
luxury we can't afford (like yelling "fire" in a crowded theater, or 
viruses roaming the network). Third, the government cannot control 
speech as such. Recently it was ruled that answers to very simple 
questions (such as your name, age) are considered testimonial, as they 
require the use of the human mind. Fourth, the Constitution was founded 
on a normative understanding of humanity, and should not be subject to 
disproof by science and technology. The words of the 4th Amendment 
apply to material things, it defends people, not places. It is the task 
of law to inform and project an evolutionary reading of the bill of 
rights to new situations. Fifth, Constitutional principles should not 
vary with accidents of technology. In conclusion, Tribe proposed an 
additional amendment to the constitution which asserted that "this 
Constitution's protection for freedom of speech, press, 
assembly...shall be construed as fully applicable without regard to the 
technological medium used."

The first panel discussion of the conference was titled: Trends in 
Computers and Networks. Peter Denning of NASA Ames introduced the panel 
by stating that computers are now under attack due to security being 
added on as an afterthought. John Quarterman of Texas Internet 
Consulting then discussed the manner in which user/host names could be 
made more readable (accessable) on the network. Peter Neumann of SRI 
overviewed general issues surrounding the authorship of the "Computers 
at Risk" book, stating that the group involved with the text was 
primarily interested in motivating efforts towards evaluating safe, 
secure, reliable systems (and that they only proposed general 
guidelines in the text). He warned the listeners "don't wait for the 
catastrophe". Neumann also mentioned the issue of disenfranchization of 
the poor and lower class who will be unable to access the new 
technology, stating that "gaps are getting much bigger". Martin Hellman 
of Stanford University discussed cryptography. He stated that the 56 
bit DES standard was set not by technology, but instead by economics. 
He mentioned a study at Bell Labs that indicated that 70% of all 
passwords there could be cracked using a dictionary technique. He 
believes that technology will not solve all of our problems, and that 
persons who are concerned about social responsibility are not 
(necessarily) anti-technical. David Chaum of DigiCash spoke about 
informational rights and secure channels with regard to electronic 
money transactions. He believes that with an adequately encrypted 
system there is no necessity for a central, mutually trusted party. The 
problem is in finding a practical encryption protocol, or a 
distributed, mutually-trusted tamper-proof box solution. David Farber 
of the University of Pennsylvania expressed the view that protection 
schemes might not be "retrofittable" and should be part of the 
fundamental design of computer architecture, protocols and technology, 
rather than being tacked on, but he worried that people may not be 
willing to pay for these design features. Farber also mentioned the 
possibility of retroactive wiretapping, where archived data could be 
obtained through invasive means.

The second panel session was titled: International Perspectives and 
Impacts. Ronald Plesser of the Washington D.C. law firm of Piper & 
Marbury first mentioned that these issues impact on how international 
business is conducted. Many countries, particularly in Europe, have 
already established standards with which we must comply. Databases 
feeding Europe must be concerned with the processing of personal data 
of individuals. Certain directives have been authored that are so 
general in scope as to be difficult to apply ("to all files located in 
its territory" was one example). Tom Riley, of Riley Information 
Services in Canada, continued this discussion regarding data protection 
policies. He urged the authoring of a harmonized directive, similar to 
that for other exports. The United States, by lagging behind in 
establishing standards of its own, risks the possibility of losing the 
opportunity to affect these policies as they are being written. David 
Flaherty entertained the crowd with his "George Bush" speech, stressing 
that "privacy begins at home". Robert Veeder of the D.C. Office of 
Information Regulatory Affairs discussed the impact of the 30,000+ 
messages to Lotus which effectively stopped the production of their CD-
ROM database. This electronic lobbying had never been used to such 
great effect prior to that time. He believes the electronic forum will 
provide larger access to public concerns. (The impression I was left 
with was that certain governmental agencies are not wholly enthusiastic 
about this powerful method of expression, and that they are monitoring 
the situation.)
Next, we heard from a variety of speakers on the subject of Personal 
Information and Privacy. Janlori Goldman, of the ACLU, discussed the 
"library lending" project by the FBI. This was an attempt to track 
library usage habits of foreign nationals. The ACLU objects to this 
sort of surveillance as well as other similar broad-based methods. An 
audience member criticized the ACLU's own release of membership data, 
to which Janlori replied that she did not agree with her organization's 
policy to allow such releases, but was currently unable to do more than 
protest against it. John Baker, Senior Vice President of Equifax, 
described the benefits of information with regard to improved goods, 
services, prices, convenience and wider choices. (Equifax is an 
organization which supplies marketplace data with specific information 
about consumers.) He stressed that people need to understand their 
rights, responsibilities and opportunities with regard to their 
published data. He believes that the Lotus Marketplace product was 
flawed because of the delay involved when customers wanted to "opt-out" 
of the database. He portrayed a spectrum of controls over data usage, 
ranging from no restrictions (free speech), through some restrictions 
(based on impact, sensitivity, access, security and confidentiality), 
to absolute restrictions (where the available information would have 
little value). Equifax took a survey on consumer interest in 
availability of data for direct marketing purposes which revealed that 
75% would find it acceptable as long as there is a facility to opt-out. 
An audience member raised the point that the default is opt-out rather 
than opt-in.

These two speakers were followed by a debate between Marc Rotenberg, 
Washington Office Director of the Computer Professionals for Social 
Responsibility, and Alan Westin, Professor of Public Law and Government 
at Columbia University, with the subject "should individuals have 
absolute control over secondary use of their personal information?" 
Marc argued in favor of the statement, using an eloquent oratorial 
style, and Alan spoke in opposition with the demeanor of a seasoned 
litigator. Marc made such statements as "we are all privacy advocates 
about something in our personal lives", "it is the most fragile 
freedom" and "protect privacy, change the default", stressing that the 
individual should have the right to control the value and use of their 
personal information. Alan outlined four major issues: 1. Nature of the 
secondary use; 2. Society should decide on fair uses, not a nihilistic 
veto; 3. Underpinning of constitutional democracy; 4. Adequate control 
protects against potential misuse. He believes that the consumer 
benefits from the advantages of a knowledge society. No winner/loser of 
the debate was declared.

Speakers continued on the subject of Personal Information and Privacy. 
Lance Hoffman, of the EE & CS department at George Washington 
University, mentioned that Japan will be instituting a system of 
personal phone number calling --- basically you can send and receive 
calls at your "own" phone number wherever you happen to be situated. 
This permits very close tracking of individual movements and is a 
potential further invasion of privacy. He noted that no one has ever 
received the ACM Turing Award for a socially responsible system, and 
encouraged positive recognition of achievements along these lines. He 
also recommended that a "dirty dozen" list of worst systems be compiled 
and distributed.

Evan Hendricks, editor and publisher of Privacy Times, listed many 
records that are and are not currently protected by law from 
distribution. Interestingly, video rental records are protected, but 
medical records are not. He cited an interesting example of a 
circumstance where a man and woman living in the same home (but with 
different last names) were sent copies of each other's bills, urging 
them to encourage their "roommate" to pay. It turned out that the 
individuals were landlady and tenant. Another interesting fact that 
Evan revealed was that studies indicate ~30% of social security numbers 
in some databases are inaccurate. Lists of persons having filed 
Workmen's Compensation claims have, in some cases, been used to 
blacklist people from jobs. Hendricks urged people to ban the recording 
and distribution of human genome information --- some parents 
voluntarily provide cellular test results in case their child is later 
missing or kidnapped. There is no way to know how these records are 
likely to be used in the future.

Tom Mandel, director of the Values and Lifestyles Program (VALS) at 
SRI, spoke in favor of the Lotus Marketplace product. He felt that the 
30K response was not representative of the general public, and believes 
that a small percentage of "media sophisticates" can have apply greater 
leverage. He noted that VALS is currently involved with a joint venture 
with Equifax, who is currently involved with a joint venture with 
Lotus.

Willis Ware, of the RAND Corporation, chaired the HEW committee that 
led to the 1980 privacy act (a reporter preparing materials for 
publication can not be searched). He felt that the government 
previously was considered to be a threat to privacy, not a protector, 
and considers the privacy issue as one of social equity. He indicated 
that personal information should not be considered to be private 
property, and should be shared in an equitable manner. To apply 
royalties for usage would place a tremendous impact on costs. He noted 
that the databases behind airline, pharmacy and point-of-sale systems 
may be open to access by various groups including the Internal Revenue 
Service and Drug Enforcement personnel.

Simon Davies, a member of the law faculty at Australia's University of 
New South Wales, provided a sobering criticism of this conference and 
the United States' policy making processes, stating that the conference 
was too "nice" and "conciliatory" and that the "US is an embarrassment 
to the privacy issue". He used the term "pragvocate" (pragmatic 
advocate) to describe policy-makers who are well-trained, say the right 
things, and denounce extremes, giving environmentalists as an example. 
He reminded us that the basis of the US system is not to "opt-out" --- 
no one would write to the LA police asking "don't beat me up". Davies 
alerted us to the fact that Thailand, an oppressive military 
government, is currently purchasing US technology to provide smart ID 
cards for their citizens. He noted that the Smithsonian Institute 
awarded them a trophy for their use of technology. He stated that the 
United States is encouraging similar activities in the Philippines and 
Indonesia. 

A somewhat light-hearted after-dinner talk was delivered by Eli Noam, 
of Columbia University's School of Business, on the subject of 
"reconciling free speech and freedom of association". He suggested that 
phone systems be established whereby individuals can provide their 
friends and associates with special access codes so that they can dial 
them. Others can call, but at a higher rate. (Note that this would 
likely have an adverse impact on legitimate business and social calls 
as well as possibly reducing undesirable calls.) He stated that 
presently "no computer can write the 4-line plot capsules that appear 
in TV Guide", with regard to the failure of AI systems. Noam questioned 
the lack of policies concerning what happens to an information data 
base after an individual's death. He concluded with the statement that 
for "all digital systems --- 0's and 1's are created equal."

The second day of the conference opened with a session on Law 
Enforcement Practices & Problems. Glenn Tenney, well known as the 
organizer of the Hacker's Conference, chaired this panel with little 
comment. Don Ingraham, Assistant DA of Alameda County, Calif. (who, 
during a tutorial earlier in the week, distributed information on the 
writing of search warrants), gave a fantastically humorous 
presentation. He spoke of the "pernicious myth of cyberspace" and 
declared "you ARE the country". He mentioned that systems exist with 
"the security built in of a sieve" and that people have their 
information on these systems, but not necessarily because they want it 
to be there. He feels that the attitude of "don't worry, we don't need 
standards" is a poor one, and that laws should be written to let the 
people know what the rules are. He would rather see an organization 
formed called Sociable Professionals for Responsible Computing (instead 
of CPSR). He finished his talk by saying "if you don't do it, who will 
-- if not now, when" (a Talmudic quotation that he used without 
citation). 

Robert Snyder, of the Columbus Ohio Police Department, presented the 
view of the "cop on the street". He spoke of his naivete when first 
entering the field of computer law, and how much evidence was destroyed 
at first by listening to suspects who told him to type things like 
"format c:" in order to access the hard disk. He has encountered 
situations where the suspect actually does not know what is on the 
system --- some of these are cases where a parent is running a business 
and a child is using the machine for illicit hacking purposes. In these 
cases, even though he has a warrant to obtain all of the computer 
equipment, he often will not shut down a legitimate business. He 
brought up the issue of unregistered software sitting on a confiscated 
system. There are liability problems dealing with the return of such 
materials. Basically he stated that the law enforcement personnel 
require further education and training, and should operate within 
guidelines but with prudence.

Donald Delaney, Senior Investigator with the New York State Police, 
began his talk by relating how when his home was burglarized in 1985, 
he experienced a feeling of violation. This feeling is much the same 
with computer crime. Many firms experience a loss of income from such 
activities. In his experience, many of the people caught are engaged in 
more crimes than the ones they are charged with.

Dale Boll, Deputy Directory of the Fraud Division of the U.S. Secret 
Service, spoke of the various forms of access device fraud (credit 
card, ATM, passwords, phone access, frequent flyer numbers, etc.). He 
stated that it is illegal to posses counterfeit access devices and that 
if you have 15+ illegal access devices or numbers in your possession, 
you may be a subject of federal investigation. They have a 96% 
conviction rate. ATM cards can be manufactured illegally using 
cardboard and regular audio tape. The credit card industry is now 
losing $1 Billion per year. An audience member asked if they are using 
programs like Gofer (grep for UNIX hackers) to search for information 
they want on bulletin boards and networks. He replied that although 
they own this program, they use it personally and not for investigation 
purposes. 

The next session, on Law Enforcement and Civil Liberties, had seven 
participants, none of whom were given much time to present their views. 
I will briefly highlight what they said here. Sheldon Zenner, the 
Attorney for Craig Neidorf said that the prosecutors had originally 
sought a 2-year sentence, and that thanks to many of the people at this 
conference who rallied to Craig's support, they were able to get him 
off. Mark Rasch who defended the internet worm case stated that the 
expectation of privacy is changed because of the technology employed --
- technology affects behavior. Cliff Figallo, manager of the WELL 
(Whole Earth 'Lectronic Link, popular among many Bay Area participants 
as an alternative means of accessing the Internet) addressed his 
concerns about overuse of law enforcement. He wants his users to feel 
safe. Sharon Beckman, Litigation Council to the Electronic Freedom 
Foundation (EFF) and Attorney for Steve Jackson Games (whose computers 
were seized, when one of his fantasy games was perceived as being 
capable of training users to "hack" into computers) stated that 
underlying values of the constitution should be interpreted in terms of 
today's technology. Ken Rosenblatt, a District Attorney covering the 
Silicon Valley area, stated that he is charged with upholding civil 
liberties and feels that the laws are presently adequate. Mike Gibbons, 
Special Agent for the FBI, mentioned that he worked various white 
collar cases, including the 75 cent case (described in Cliff Stoll's 
book), and the Robert Morris case. He feels that there are various 
classes of computer crime, including impairment, data theft, and 
intrusion. Mitch Kapor, founder of EFF, stated that the "electronic 
frontier hasn't been settled yet" and that we should not stifle the 
"network petri dish inventing the future". He questioned the nature of 
reasonable search, stating that there haven't been enough cases yet to 
establish a meaning for this in computer law. Everyone should be 
protected from tyranny, not only hackers. He looks at the EFF as a 
means of civilizing cyberspace. The matter of free speech was discussed 
in the questioning session with the panel -- much speculation was 
directed towards the legality of discussions of bomb-making, system 
hacking, and the publication of other potentially lawless activities on 
the net or in technical papers. Other comments included the fact that 
law enforcement cannot seize an entire post office, their search must 
be limited to the mailbox of the suspect. This analogy applies to 
computer networks as well, although the volatility (ease of total 
destruction of evidence) of computer data is of concern to 
investigators.  As I had an extended and quite insightful conversation 
with Russ Brand over lunch, I returned a tad late to the next session, 
on Legislation and Regulation, and was only able to catch two of the 
speakers. Elliot Maxwell, Assistant Vice President at Pacific Telesis 
stated that it is "difficult to have simple and specific rules". Paul 
Bernstein, whose LawMUG BBS and Electronic Bar Association is well 
known among the legal community, stated that one should "use mediums 
that exist -- participate in fashioning the laws."

The most eye-opening session of the entire conference, in my opinion, 
was the following one on Computer-Based Surveillance of Individuals. It 
opened with Judith King describing the FBI Library Surveillance 
Program, where the reading habits of foreign nationals were 
investigated. She stated that many librarians want laws to protect the 
confidentiality of users, and some statutes have been passed. Karen 
Nussbaum, Executive Director of 9 to 5 (on which the film was based), 
gave an accounting of the monitoring of employees in the workplace. 
Currently over 26 Million employees are having their work tracked 
electronically, and over 10 Million have their pay based on computer 
evaluations. The personal habits of the worker can be monitored, one 
can look into a user's screen and see what they are doing or even send 
them messages. She described the "corporate plantation" as a place of 
stress, humiliation and harassment. Gary Marx, Sociology Professor at 
MIT, gave a whirlwind assessment of the importance of privacy, some 
technofallacies (like the Wizard of Oz "pay no attention to the little 
man behind the curtain"), and steps you can use to protect privacy (the 
bulk of these useful lists are published in the proceedings). He 
related how a telephone can be made "hot on the hook" so that you can 
silently monitor your babysitter, your children or your spouse, when 
you are not at home. Most devices, such as this one, are perfectly 
legal within your own house. David Flaherty spoke again, this time in a 
more serious vein, saying "we are living in a surveillant society" and 
"you have to make daily choices about what you are willing to give up 
about yourself." The second day's after-dinner speaker was William 
Bayse, Assistant Director, Technical Services Division of the FBI, who 
discussed a newly created national system called the NCIC-2000, under 
the topic of "balancing computer security capabilities with privacy and 
integrity". He began by asserting that crime has become more mobile and 
that conventional crime-tracking methods are inadequate. For example, 
he said, many missing persons actually want to remain missing. He feels 
that the accuracy of records is imperative. Various information bases 
have been formed, including lists of stolen items, vehicles, and wanted 
persons. Presently 65,000 officers are using this system, with 360M 
transactions annually, at a cost of 3 cents a transaction. For an 
example of effectiveness, over $1.1 Billion in vehicles have been 
recovered. Proposed, but not yet implemented is the portion of the 
system which provides a live scan of fingerprints at the scene of an 
arrest (or when someone is stopped for a motor vehicle violation) [with 
the intended purpose of considerably reducing false identifications... 
PGN]. Much criticism was generated from the audience regarding the 
potential misuse of this system for harassment, and the retention of 
fingerprints for future use. Marc Rotenberg addressed Bayse questioning 
why documents requested under the freedom of information act from his 
agency have still not been supplied, and stating that currently a 
lawsuit is pending to obtain their policies regarding monitoring of 
computer bulletin boards. Bayse refused comment.

The final day of the conference opened with a session on Electronic 
Speech, Press and Assembly. Jack Rickard of Boardwatch Magazine 
mentioned that bulletin boards are highly specialized, primarily funded 
by individuals, and are in their embrionic stage. David Hughes, 
Managing General Partner of Old Colorado City Communications, added 
some color to the conference with his western garb (10-gallon hat, bolo 
tie) and use of his laptop for the notes of his speech. He described 
himself as a "Citizen of the Western Frontier of the Information Age" 
and drawled, "Read my Cursor". He described electronic speech as 
"fingers of the tongue with the ear for the eye --- but it is still 
speech". In describing US history, were it to have occurred today, 
Jefferson would have used a Macintosh, Adams would have used a PC, but 
"Tom Paine would have put Common Sense on a private BBS with a 
Commodore 64". "Don't tread on my cursor!" he cried. George Perry, Vice 
President of Prodigy, began by saying that he did not want to engage in 
discussion on the dispute, but then stated that "Prodigy does not read 
private email". Prodigy is a privately owned and operated company which 
believes that the market should be allowed to decide what services need 
to be provided. The Constitution regulates free speech with respect to 
the government, Prodigy thinks of itself as a publisher. Lance Rose, a 
NY Attorney, enumerated the types of rights afforded to individuals and 
companies with regard to ownership, including trade secrets, 
confidentiality, trademark, copyright and patent. There is currently a 
great diversity of laws which service providers must adhere to, making 
the provider, in some instances, a law enforcement agent. During the 
open comment section, Hughes noted that very few legislators are 
currently on-line, and he thanked Prodigy for preparing the NAPLPS 
market (for his products). The notable talk in the Access to Government 
Information session was David Burnham's (Co-Director and Writer with 
the Transactional Records Access Clearinghouse [TRAC] in D.C.). He 
stated that "badly administered agencies are more damaging than rogue 
operations". The objectives of TRAC are to obtain transactional data 
>from federal enforcement agencies, such as the IRS, NRC, and Justice 
Department. He demonstrated how the raw statistics could be combined 
with additional figures regarding inflation, population, and margin of 
error, showing that the so-called "trends" of increasing crime, or 
increased non-compliance with tax law, were actually flat lines when 
the mitigating factors were added in.

The final panel discussion was on Ethics and Education. Richard 
Hollinger, Sociology Professor with the University of Florida, asserted 
that the "same officers who are investigating computer crimes are the 
ones who are protesting computers in their patrol cars because they 
feel it would be oppressive." He is concerned with the industry's 
encouragement of the use of computers in schools, before rules for 
their ethical use have been written. Donn Parker with SRI stated that 
laws are needed in order to convict hackers. Convictions have a "very 
good effect on our whole problem", he said. He referred back to the 
60's when the ACM and IEEE drafted codes of conduct, and said that 
these should be popularized. He believes that one can not teach ethics, 
that it comes from interpersonal relationships, and (for him) the 
Christian religion and the Bible. One can teach, he believes, the 
application of ethics, beyond the golden rule. He delineated three 
rules: 1. The Owner's Rule - you choose to issue your property into the 
public domain, or not; 2. The User's Rule - you assume everything 
belongs to something else, unless otherwise informed; 3. The Hacker's 
Rule - systems are free, everything should go to the people (which he 
rejected as childish, not worth considering). He suggested that we 
consider the dilemma of Descartes -- if it is OK to start by stealing 
pencils, where then can we draw the line? Dorothy Denning spoke briefly 
regarding the network uses by children (Kids Net). She speculated that 
we should teach them something about hacking in order to take the 
mystery out of it. She compared telephone fraud by children as a more 
sophisticated version of the "is your refrigerator running" prank.

The Education and Ethics panel continued with the softspoken John 
Gilmore, a "generalist" with Cygnus Support. He warned that we are 
losing the larger open society. The US is currently #1 in percentage of 
population in jail. He spoke of drug usage as a victimless crime. John 
asked the audience "who has not broken a law in the past month?" Only a 
few raised their hands. He then asked "who here has all their disks 
clean -- free from something you would not want them to find if you 
were investigated?" About 15% raised their hands, but after pondering 
it, a number of them lowered them (the person behind me muttered that 
he had some shareware for which he had not paid). Gilmore said "privacy 
is a means -- what is the end we are looking for? Tolerance." He urged 
real privacy of personal communications, financial transactions, things 
should be as "private as that thought held in our minds." He demanded 
that we stop building fake systems -- laws that dictate that you "can't 
listen to cellular phone calls" -- and instead build real protections 
into your systems and buy them from others. His talk received a 
standing ovation from the vast majority of the audience members.

The remaining panel speaker, Sally Bowman, a Child Psychologist with 
the Computer Learning Foundation, stated that her organization is 
working to raise awareness and solve a number of problem areas. The 
problems she outlined were: 1. Lack of awareness of the magnitude of 
the problem. Software industry is being hurt by piracy; 2. Many 
misimpressions -- confusion, lack of information; 3. Lack of teeth in 
software copying policies; 4. Lack of strategies in teaching ethics; 5. 
School budgets are too small to allow legal procurement of software. 
Her organization is presently educating parents as to the "tell-tale" 
signs which indicate whether a child is "abusing" computer systems.

The concluding session, entitled "Where Do We Go From Here" was staffed 
by a number of the conference speakers. They overviewed their feelings 
regarding the issues raised during the sessions and made general 
comments with respect to what they might do to raise awareness and 
resolve some of the problems. 

Throughout the conference many pamphlets, brochures and newsletters 
were distributed. Although it is infeasible for me to provide copies of 
this literature, interested parties can contact me or Jim Warren 
(jwarren@well.sf.ca.us) to provide source names and addresses. Some of 
the more interesting items (in no particular order, just how they 
happened to come out of my briefcase) included:
  - Brochures from the Cato Institute "Toward a Moral Drug Policy", 
"America's Counter-revolution", "The Semiconductor Industry and Foreign 
Competition", "The Promise of High-Definition Television: The Hype and 
the Reality", and their publication catalog.
  - Matrix Information and Directory Services Newsletter.
  - The Manifesto of Militant Humanism.
  - "Are you a Hacker?" by Robert Bickford, reprinted from MicroTimes.
  - Call for formation of a World Privacy Network.
  - An advertisement for SafeWord Software (password 
checking/protection).
  - Condom distributed by Anterior Technology (they market a system 
whereby you can retrieve the first 80 characters of emails while out of 
town).
  - "The Bill of Rights is Under Attack" from Committee for the Bill of 
Rights.
  - Hollywood Hacker Info, reprinted from Computer Underground Digest.
  - Calif. State Assembly Bill #1168 on Personal Information Integrity.
  - Computer Learning Month - from the Computer Learning Foundation.
  - The Equifax Report on Consumers in the Information Age - A reprint 
of John Barlow's article "Crime and Puzzlement" from Whole Earth 
Review, Fall 1990.
  - Various brochures from the First Amendment Congress, an 
organization providing educational materials on the First Amendment.
  - Policy papers from the League for Programming Freedom including 
"Against Software Patents", "Lotus Disinformation Forewarned is 
Forearmed", and the Effector (its newsletter).
  - CPSR reprints of newsarticles regarding the Lotus database.
  - Promotional literature for Ted Nelson's Xanadu.
  - Brochure for the Community Memory BBS, and its newsletter.
  - Brochure for the Art Com Electronic Network.
  - Brochure for the International Society for Individual Liberty.
  - Various copies of MicroTimes.
  - Application forms for CPSR and the League for Programming Freedom.
  - Rel-EAST, the east-west high-tech business report.
  - Suggested reading on how computer crime is investigated from Don 
Ingraham.
  - Book promotional literature including: "Rogue Programs" edited by 
Lance Hoffman, Van Nostrand Reinhold "Protecting Privacy in 
Surveillance Societies", David Flaherty, University of North Carolina 
Press "Spectacular Computer Crimes", Buck Bloombecker, Dow Jones-Irwin  
"Using the Public Library in the Computer Age", Westin & Finger, ALA.  
Directions & Implications of Advanced Computing, Vol. 1 and Proceedings   
>from 88 and 90, CPSR.
  - Flyer announcing "The Privacy Project" an NPR series (for which I 
was interviewed) to be broadcast in the Fall of 1991.
  - Flyer advertising "Your Expanding Infosphere" an NPR ComputerTalk 
Program.
  - Reason, a magazine for "free minds and free markets" whose cover 
story was on cryogenics.
  - Flyer on the National Apple Users Group Conference, June 7-9, 1991.
  - Flyer on the Silicon Valley Networking Conference, April 23-25, 
1991.
  - Flyer on the third Chugach Conference, University of Alaska, Oct. 
3-5, 1991. Plus Center for Information Technology News from U. Alaska.
  - Flyer on the Calif. Forum of the First Amendment Congress, May 6, 
1991, Stanford University (free to the public).
  - Flyer for the Electronic Democracy Conference, Sept 4-5, 1991.
  - Calls for Papers from:  The National Conference on Computing and 
Values (Aug. 12-16, 1991)  Directions & Implications of Advanced 
Computing (May 2-3, 1992)

I returned home with a broader idea of the many facets of the computer 
freedom and privacy issue. I must now admit to being more worried than 
I was before I attended this conference, as to the lack of solutions 
being offered by my colleagues. Perhaps this meeting of the minds is a 
first start. More work needs to be done. 

R. Mercuri mercuri@gradient.cis.upenn.edu The following are some 
addenda & corrections to my trip report on the Computers, Freedom and 
Privacy Conference, with thanks to the individuals who provided 
additional details and insights.

1. A second CFP conference has been scheduled for Spring 1992 in 
Washington, D.C. -- the general chairman will be Lance J. Hoffman.

2. Later figures for the first conference indicate that Jim Warren's 
losses may not have been as severe as he had indicated when I spoke 
with him.

3. Although the formation notice for alt.privacy indicated that the US 
Privacy Council was created AT the CFP conference, Lance Hoffman has 
informed me that this organization was actually formed PRIOR to the 
conference. Its first public meeting was held during the conference 
period but otherwise had no official conference involvement.

4. Robert Veeder works at the Office of Information Regulatory Affairs 
IN D.C., a branch of the federal Office of Management and Budget.

5. Mark Rasch prosecuted (not defended) the internet worm case.

6. Dorothy Denning wrote to me, mentioning that "the main point I tried 
to make in my talk was that we are letting our young people down by not 
taking responsibility for bringing them into the computing and network 
community as responsible users." My brief comments of her talk could 
lead a reader to believe that she was somewhat cavalier about the 
issue, which was certainly not the case.

7. The "sandals of Silicon Valley to the dark suits of Washington" 
quote should be accredited to Terry Winograd.

8. Judith Krug (not King) spoke in behalf of the American Library 
Association.

9. In Dave Hughes' talk, he had Franklin using an Apple and Jefferson 
using Word Perfect running under Windows (far more comical than what I 
had recalled).

 Considering the length of the conference and quantity of speakers, I 
am relieved that my errors and omissions were so few.

Yours in good journalism, R. Mercuri mercuri@gradient.cis.upenn.edu
 --