Tech Insider					     Technology and Trends


			      USENET Archives

Path: gmdzi!unido!mcsun!uunet!lll-winken!decwrl!pa.dec.com!src.dec.com!denning
From: den...@src.dec.com (Dorothy Denning)
Newsgroups: comp.org.eff.talk
Subject: Computers, Freedom & Privacy Conference
Keywords: Please copy, post & circulate!
Message-ID: <1991Jan10.144856.465@src.dec.com>
Date: 10 Jan 91 22:48:56 GMT
Sender: ne...@src.dec.com (News)
Organization: DEC Systems Research Center
Lines: 495
Originator: den...@jumbo.pa.dec.com


         *********************************************************
         *  THE FIRST CONFERENCE ON COMPUTERS, FREEDOM & PRIVACY *
         *********************************************************

             Pursuing Policies for the Information Age in the
                 Bicentennial Year of the Bill of Rights

     Tutorials & Invitational Conference, Limited to 600 Participants
                   Monday-Thursday, March 25-28, 1991

Airport SFO Marriott Hotel, Burlingame, California (San Francisco Peninsula)

Co-sponsors & cooperating organizations include
  Institute of Electrical and Electronics Engineers-USA
  Association for Computing Machinery      Electronic Networking Association
  Electronic Frontier Foundation           Videotex Industry Association
  Cato Institute                           American Civil Liberties Union
  ACM Special Interest Group on Software
  IEEE-USA Intellectual Property Committee
  ACM Special Interest Group on Computers and Society
  ACM Committee on Scientific Freedom and Human Rights
  IEEE-USA Committee on Communications and Information Policy
  Autodesk, Inc.        The WELL           Portal Communications

Sponsored by the Computer Professionals for Social Responsibility
  A nonprofit educational corporation
(415)322-3778,  e-mail: c...@well.sf.ca.us.  fax: (415)851-2814


ABOUT COMPUTERS, FREEDOM & PRIVACY
----------------------------------

We are at a crossroads as individuals, organizations and governments depend
more and more on computers and computer networks.  Within ten years, most
global information will be collected and utilized electronically.

The 1990's are the pivotal decade in which statutes, policies and judicial
precedents will be developed for controlling access, use -- and abuse -- of
computerized information and electronic mail.

Current government and private-sector policies are an uncoordinated jumble,
created as  each group evolves ways  to collect, manipulate, extract,
share and protect computerized and networked information and services.

Data on individuals and groups is being computerized by numerous agencies,
organizations and special interests, often without the knowledge or approval
of those it concerns, and with varying degrees of accuracy.

Computers can greatly assist individuals, organizations and government in
making sound decisions based on efficient access to adequate information --
for personal benefit, business improvement and national well-being.

Or, inappropriate use and regulation can seriously threaten fundamental
freedoms, personal privacy, and the democratic processes that are at the
very foundation of this nation and of any free society.


ABOUT THE CONFERENCE SESSIONS (Tuesday-Thursday, March 26th-28th)
-----------------------------------------------------------------

PLENARY SPEAKERS:

*  Laurence H. Tribe,
Professor of Constitutional Law, Harvard Law School,
offering major policy proposals in the opening Conference session,  "The
Constitution in Cyberspace: Law & Liberty Beyond the Electronic Frontier".

*  Eli M. Noam,
Director of the Center for Telecommunications and Information Studies,
Columbia University, and a recognized leader in telecommunications
regulation, international communications policies and economics, will
discuss, "Network Environments of the Future: Reconciling Free Speech and
Freedom of Association."

*  William A. Bayse,
Assistant Director, FBI Technical Services Division, Washington DC,
providing perspectives on "Balancing Computer Security Capabilities with
Privacy and Integrity" at the Wednesday evening banquet.


THE CONFERENCE SESSIONS offer diverse speakers & panel discussions:

Trends in Computers & Networks.
  Overview and prognosis of computing capabilities and networking as they
impact personal privacy, confidentiality, security, one-to-one & many-to-one
communications, and access to information about government, business and
society.

International Perspectives & Impacts.
  Other nationsU models for protecting personal information and
communications, and granting access to government information; existing
and developing laws; requirements for trans-national dataflow and their
implications; impacts on  personal expression; accountability.

Personal Information & Privacy.
  Government and private collection, sharing, marketing, verification, use,
protection of, access to and responsibility for personal data, including
buying patterns, viewing habits, lifestyle, work, health, school, census,
voter, tax, financial and consumer information.

Law Enforcement Practices & Problems.
  Issues relating to investigation, prosecution, due process and deterring
computer crimes, now and in the future; use of computers to aid law
enforcement.

Law Enforcement & Civil Liberties.
  Interaction of computer crime, law enforcement and civil liberties; issues
of search, seizure and sanctions, especially as applied to shared or
networked information, software and equipment.

Legislation & Regulation.
  Legislative and regulatory roles in protecting privacy and insuring
access; legal problems posed by computing and computer networks; approaches
to improving related government processes.

Computer-based Surveillance of Individuals.
  Monitoring electronic-mail, public & private teleconferences, electronic
bulletin boards, publications and subscribers; monitoring individuals, work
performance, buying habits and lifestyles.

Electronic Speech, Press & Assembly.
  Freedoms and responsibilities regarding electronic speech, public and
private electronic assembly, electronic publishing, prior restraint and
chilling effects of monitoring.

Access to Government Information.
  Implementing individual and corporate access to federal, state & local
information about communities, corporations, legislation, administration,
the courts and public figures; allowing access while protecting
confidentiality.

Ethics & Education.
  Ethical principles for individuals, system administrators, organizations,
corporations and government; copying of data, copying of software,
distributing confidential information; relations to computer education
and computer law.

Where Do We Go From Here?  [closing session]
  Perspectives, recommendations and commitments of participants from the
major interest groups, proposed next steps to protect personal privacy,
protect fundamental freedoms and encourage responsible policies and action.

Also:
  Tuesday and Wednesday will include structured opportunities for attendees
to identify groups with whom they want to establish contact and, if they
wish, announce topics they would like to discuss, one on one.


ABOUT THIS PREMIER EVENT
------------------------

This is an intensive, multi-disciplinary survey Conference for those
concerned with computing, teleconferencing, electronic mail, computerized
personal information, direct marketing information, government data, etc. --
and those concerned with computer-related legislation, regulation, computer
security, law enforcement and national and international policies that
impact civil liberties, responsible exercise of freedom and equitable
protection of privacy in this global Information Age.

For the first time, this four-day invitational event will bring together
representatives from all of these groups and more, all in one place, all at
one time.

Many of the recognized leaders and strongest advocates representing the
various groups having an interest in the issues of the conference will
discuss their concerns and proposals.

A maximum of 600 applicants will be invited to attend.  Balanced
representation from the diverse groups interested in these issues is being
encouraged.  Please see the enclosed Invitation Application for details.

To inform participants about topics beyond their specialties, half-day
seminars are scheduled for the first day (Monday, March 25th).  These
parallel tutorials will explore relevant issues in computing, networking,
civil liberties, regulation, the law and law enforcement.  Each tutorial
is designed for those who are experienced in one area, but are less
knowledgeable in the subject of that tutorial.

To explore the interactions and ramifications of the issues, conference
talks and panel discussions are scheduled for the remaining three days
(Tuesday-Thursday, March 26th-28th).  These will emphasize balanced
representation of all major views, especially including probing questions
and discussion.

Explicit Conference events to foster communication across disciplines are
planned.  Working luncheons, major breaks and two evening banquets will
further encourage individual and small-group discussions.


ABOUT JUST *SOME* OF THE SPEAKERS IN THE 3-DAY CONFERENCE
---------------------------------------------------------

Ken Allen, Senior Vice President for Governmental Relations, Information
Industries Association (IIA).

Sharon Beckman, civil rights and criminal defense attorney and Electronic
Frontier Foundation litigation counsel, Silverglate & Good.

Jerry Berman, Director of the ACLU's Project on Information Technology and
Communications Policy Fellow, Benton Foundation.

Paul Bernstein, columnist, Trial magazine; Electronic Bar Assn. Legal Info.
Network administrator; LawMUG BBS sysop; edits on-line lawyers' newsletter.

Sally Bowman, promotes responsible computing practices through school
teaching units; Director, Computer Learning Foundation.

David Burnham, author, *Rise of the Computer State*; former *New York Times*
investigative reporter; specialist in IRS & Freedom of Information Act.

Mary Culnan, co-authored major credit reporting policies presented to
Congress; School of Business Administration, Georgetown University.

Peter Denning, Editor, 1990 *Computers Under Attack*; past Pres., ACM;
founding Director, RIACS; editor, *Communications of the ACM*.

Dorothy Denning, received Aerospace's 1990 Distinguished Lecturer in
Computer Security award; author, *Cryptography & Data Security*.

Dave Farber, co-founder, CSNET; member, National Research Council's
Computer Science & Telecommunications Board; University of Pennsylvania.

Cliff Figallo, Chief Executive Officer and Director of the WELL
(the Whole Earth 'Lectronic Link).

David Flaherty, Canadian surveillance expert, Professor of History & Law at
the University of Western Ontario.

John Ford, Public Relations Director for Equifax, one of the nation's
largest maintainers of information on individuals.

Bob Gellman, Chief Counsel, U.S. House of Representatives Governmental
Information Subcommittee.

Janlori Goldman, Director, ACLU Project on Privacy & Technology,
Washington, DC.

Harry Hammit, Editor, *Access Reports*, focusing on access to information.

Martin Hellman, identified potential hazards in federal DES national
encryption standard; co-invented public-key encryption; Stanford University.

Evan Hendricks, Editor & Publisher of *Privacy Times* newsletter.

Lance Hoffman, public policy researcher and Professor of Electrical
Engineering  & Computer Science at George Washington University.

Don Ingraham, wrote the first-ever search warrant for magnetic media,
computer crime prosecutor; Asst. District Attorney, Alameda County.

Bob Jacobson, former Principal Consultant, Calif. State Assembly Utilities
and Commerce Committee; drafted landmark comp. communications legislation.

Mitch Kapor, co-founder, Electronic Frontier Foundation; founder, Lotus
Corp.; received DPMA's 1990 Distinguished Information Science Award.

Tom Mandel, Director of the Leading Edge Values & Lifestyles Program at
SRI International.

John McMullen, well-known on-line journalist; co-authors "Newsbytes" column
on GEnie and Online America.

Peter Neumann, member, National Research Council's 1990 *Computers at Risk*
committee; Chair, ACM Comm.on Computers & Public Policy; hosts RISKS Forum.

Donn Parker, perhaps the best-known international consultant and author on
information security and computer crime, SRI International.

Ron Plesser, former majority party congressional committee counsel; privacy
expert; attorney, Piper & Marbury.

John Quarterman, author, Digital Press' definitive *The Matrix: Computer
Networks and Conferencing Systems Worldwide*; networking consultant.

Jack Rickard, Editor of *Boardwatch* magazine,  perhaps the best news source
about computer bulletin boards; Online Information Service.

Tom Riley, Canadian specialist in international computing and privacy
issues; Riley & Associates.

Lance Rose, co-author of *Syslaw*, about the law applied to on-line
situations; attorney, Wallace & Rose.

Marc Rotenberg, expert in federal computer and privacy law; Computer
Professionals for Social Responsibility, Washington office Director.

Noel Shipman, attorney for plaintiffs in electronic-mail privacy landmark
1990 litigation against Epson America.

Harvey Silverglate, Electronic Frontier Foundation litigation counsel,
specialist in criminal defense and civil rights, Silverglate & Good.

Gail Thackeray, computer crime prosecutor; involved in Secret Service's
1990 "Operation Sun Devil", Arizona Asst. State Attorney General.

Robert Veeder, Acting Chief, Information Policy Branch, Office of
Information Regulatory Affairs, OMB (Office of Management & Budget).

Willis Ware, computer security expert; Fellow, RAND Corporation.

Sheldon Zenner, former federal prosecutor in Chicago; defended *Phrack*
electronic publisher, Craig Neidorf; Katten, Muchin & Zavis.


ABOUT THE LOW-COST TUTORIALS (Monday, March 25th)
-------------------------------------------------

Seminars on the first day offer introductions to the different disciplines
that intersect in this conference.  These are surveys for individuals not
already expert in the topics presented.  These half-day tutorials are
scheduled in four parallel tracks:

Global Communications & the Worldwide Computer Matrix.  [morning*]
  Survey of electronic-mail & teleconferencing services, global information
access, remote services and the matrix of networks.

Low-Cost Computer Networking & Computer Bulletin Board Systems. [afternoon*]
  Reviews e-mail, bulletin board and teleconferencing alternatives on
personal computers; outlines low-cost PC-based networks and their gateways
to the global matrix.
  -- Mark Graham*, co-founder of Institute for Global Communications,
PeaceNet and EcoNet; Pandora Systems

Current & Proposed International Policies.  [morning*]
  Law and regulation that will or may impact trans-border data-flow and
computer communications, impacting U.S. information practices and
international business.

Federal Legislation Impacting Computer Use.  [afternoon*]
  Detailed review of landmark federal statutes impacting access to
information, privacy of information, computer security and computer crime.
  -- Marc Rotenberg*, former congressional counsel and expert on federal
legislation, CPSR, Washington DC.

How Computer Crackers Crack!  [morning*]
  Suggested by a deputy district attorney specializing in high-tech crime,
this is for law enforcement officials, prosecutors, systems administrators
and Bulletin Board System (BBS) sysops.
  -- Russell Brand*, computer security specialist; programmer with
Reasoning Systems, Palo Alto CA.

How Computer Crime is Investigated.
  [afternoon*]  This reviews investigation, search, seizure and evidence
requirements for pursuing computer crime.  It is for computer users,
computer owners, BBS sysops and investigators unfamiliar with computer
crime practices.

Information Security.  [afternoon*]
  Survey for systems managers of internal and external threats, security
measures, alternatives and other computer and data security issues.
  -- Donn Parker*, a leading consultant in information security and
computer crime, SRI International.

* - Lecturers, descriptions and times were confirmed as of 1/8/91, but may
be subject to change.


CONFERENCE CHAIR
Jim Warren, Autodesk, Inc. & *MicroTimes*
  415-851-7075,  jwa...@well.sf.ca.us / e-mail

PROGRAM COMMITTEE
Dorothy Denning, Digital Equipment Corporation
Peter Denning, Research Institute for Advanced Computer Science
Les Earnest, SF Peninsula ACLU & Stanford University, ret.
Elliot Fabric, Attorney at Law
Mark Graham, Pandora Systems
Don Ingraham, Alameda County District AttorneyUs Office
Bruce Koball, Motion West
Marc Rotenberg, Computer Professionals for Social Responsibility
Glenn Tenney, Fantasia Systems & Hacker's Conference

ADVISORS
Ron Anderson, ACM SIGCAS & University of Minnesota
John Perry Barlow, Electronic Frontier Foundation
Jerry Berman, ACLU & Benton Foundation
Dave Caulkins, USSR GlasNet
Vint Cerf, Corporation for National Research Initiatives
Margaret Chambers, Electronic Networking Association
Steve Cisler, Apple Computer, Inc.
Whit Diffie, Northern Telecom
Mary Eisenhart, *MicroTimes*
Dave Farber, University of Pennsylvania
Cliff Figallo, The WELL
John Gilmore, Cygnus Support
Adele Goldberg, ParcPlace Systems
Terry Gross, Rabinowitz, Boudin, Standard, et al
Keith Henson, consultant & Alcor
Lance Hoffman, George Washington University
Dave Hughes, Chariot Communications
Bob Jacobson, Human Interface Technology Laboratory
Mitch Kapor, Electronic Frontier Foundation
Roger Karraker, Santa Rosa College
Tom Mandel, SRI International
John McMullen, NewsBytes
Peter Neumann, SRI International
Dave Redell, Digital Equipment Corporation
Ken Rosenblattt, Santa Clara County District Attorney's Office
Paul Saffo, Institute for the Future
Gail Thackeray, Arizona Attorney GeneralUs Office
Jay Thorwaldson, Palo Alto Medical Foundation
Terry Winograd, CPSR & Stanford University
Sheldon Zenner, Katten, Muchin, & Zavis

  Affiliations listed only for identification

                   ============================
                   =  Request for Invitation  =
                   ============================
         First Conference on Computers, Freedom & Privacy
                       March 25-28, 1991
     Monday: Tutorials,  Tuesday-Thursday: Conference Sessions
  SFO Marriott Hotel, 1800 Old Bayshore Hwy., Burlingame CA 94010
For hotel reservations at Conference rates, call:   (800)228-9290 #3

** Invitational Conference, limted to 600 participants. **
  To facilitate useful dialogue and balanced participation by
representatives from all of the diverse groups interested in these issues,
attendance is limited.  (The capacity of the Conference facility is
similarly limited).
  All interested individuals are encouraged to request an invitation.
Invitations will be primarily issued on a first-come, first-served basis
within each major interest group.

  Fees if payment is received:    by Jan.31    Feb.1-Mar.15    after Mar.15
    Tutorials (full day)          $  95           $ 145           $ 195
    Conference (3 days)           $ 295           $ 350           $ 400
Conference Registration fee includes three luncheons, two banquet meetings
and selected handouts:
  Please make checks payable to "Computers, Freedom & Privacy/CPSR".
Please don't send cash.  Invitations will be promptly issued, or the
uncashed check will be voided and promptly returned.

Please type or print.  Thank ye, kindly.
name:
title:
organization:
mailing
	address:
city, state ZIP:
phone(s):
fax:
e-mail:

Comments to assist in evaluating this request:



To aid in balancing participation among groups,
  please check all significantly applicable items.
[ ]  user of computers or computer networking
[ ]  user of electronic-mail services
[ ]  user of teleconferencing services
[ ]  user of direct marketing services
[ ]  user of computerized personal information
[ ]  user of government information
[ ]  computer professional
[ ]  BBS sysop (bulletin board system operator)
[ ]  systems administrator / infosystems manager
[ ]  network administrator
[ ]  computer / communications security specialist
[ ]  provider of data communications services
[ ]  provider of electronic-mail services
[ ]  provider of teleconferencing services
[ ]  provider of direct marketing services
[ ]  provider of computerized personal information
[ ]  provider of government information
[ ]  legislative official            [ ] federal    [ ] state
[ ]  regulatory official or staff    [ ] federal    [ ] state
[ ]  law enforcement official        [ ] federal    [ ] state    [ ] local
[ ]  prosecutor                      [ ] federal    [ ] state    [ ] local
[ ]  judicial representative         [ ] federal    [ ] state    [ ] local
[ ]  criminal defense attorney
[ ]  corporate or litigation attorney
[ ]  civil liberties specialist
[ ]  journalist  [ ] newspaper    [ ] television    [ ] radio    [ ] other
[ ]  other:
[ ]  other:
<<1/7/91>>

Please mail form and payment to:
  CFP Conference, 345 Swett Road, Woodside CA 94062

Privacy Notice:  This information will not be sold, rented, loaned,
exchanged or used for any purpose other than official CPSR activity.
CPSR may elect to send information about other activities, but such
mailings will always originate with CPSR.

Sponsor:  Computer Professionals for Social Responsibility, (415)322-3778
A nonprofit, educational corporation  [ Internal Revenue Code 501(c)(3) ]
e-mail: c...@well.sf.ca.us;            fax: (415)851-2814
Chair: Jim Warren, (415)851-7075

                                           Please copy, post & circulate!

Path: gmdzi!unido!mcsun!uunet!unisoft!hoptoad!gnu
From: gnu@hoptoad.uucp (John Gilmore)
Newsgroups: sci.crypt
Subject: First Conference on Computers, Freedom & Privacy
Message-ID: <15041@hoptoad.uucp>
Date: 30 Jan 91 08:57:25 GMT
Organization: Cygnus Support, Palo Alto
Lines: 549

I encourage everyone from the crypto community to attend.  We have a
vital role to play in shaping the future of freedom and privacy in the
presence of computers.  Let's not let the tunnel-visioned computer
nerds, rabid prosecutors, ignorant lawmakers, and "irrational security"
control freaks blow the most open society in the world just yet.  Come
tell them what's possible and what's reasonable, and let them tell you
what needs and desires they wish cryptography could fill.

This is a way to step out of mathematically oriented crypto conferences
and into a realm that brings together a programmer who was threatened
with an "espionage" prosecution for having encrypted data on disk when
the cops came calling -- with the prosecutors who made that threat -- and 
the lawmakers who wrote the unconstitutional laws about computer security.
You might think of it as a battleground but it is really an attempt at
helping us all to understand the other side's concerns, without guns
or charges or lawsuits in the way.  Bring the concerns of the theory
community, and find out what crazy things people will do with the theories.
And maybe fix a few of these things.

	John Gilmore

                                              Please copy, post & circulate!
                                              [version 2.7, updated 1/26/91]


                    ************************************
                    *       The First Conference       *
                    *                on                *
                    *   COMPUTERS, FREEDOM & PRIVACY   *
                    ************************************


               Pursuing Policies for the Information Age in the
                   Bicentennial Year of the Bill of Rights

              Tutorials & Conference, Limited to 600 Participants
                     Monday-Thursday, March 25-28, 1991

SFO Airport Marriott Hotel, Burlingame, CA, On the San Francisco Peninsula

Co-sponsors & cooperating organizations include:
  Institute of Electrical and Electronics Engineers-USA
  Association for Computing Machinery      Electronic Networking Association
  Electronic Frontier Foundation           Videotex Industry Association
  American Civil Liberties Union           Cato Institute
  IEEE Intellectual Property Committee     ACM SIG on Software
  ACM Special Interest Group on Computers & Society
  ACM Committee on Scientific Freedom and Human Rights    
  IEEE-USA Committee on Communications and Information Policy
  Autodesk, Inc.   Apple Computer, Inc.   The WELL   Portal Communications

Sponsored by Computer Professionals for Social Responsibility
  A nonprofit, educational corporation          (415)322-3778
  e-mail: c...@well.sf.ca.us                fax: (415)851-2814

The sponsoring & cooperating organizations support this project to enhance 
communication, understanding and consensus about these crucial issues, but
do not necessarily endorse views that may be expressed by participants.



ABOUT COMPUTERS, FREEDOM & PRIVACY --

  We are at a crossroads as individuals, organizations and governments 
increasingly use and depend on computers and computer networks.  Within ten 
years, most information will be utilized and exchanged electronically.

  We are in the pivotal decade when computer facilities and policies,
worldwide, will mature.  They can allow and encourage mass access to and use
of great  information processing and networking power, and control potential
abuse.

  For potent personal benefit, business improvement and national well-being,
information and its efficient access are becoming economically available to 
individuals, organizations and governments.  Such access can greatly enhance
sound decisions based on timely access to essential knowledge.

  Data on individuals and groups is being collected, computerized and
exchanged at an exponentially increasing rate within numerous agencies and 
organizations.This has great legitimate value, but has also prompted 
increasing concerns regarding issues of personal privacy.

  To assure sound and equitable decisions, the public, the press and a 
broad range of policy-makers must understand and openly discuss these 
issues, their interactions and their implications for the future.

  To protect the fundamental freedoms and personal privacy that are the 
foundation of any free people, all parties must be informed, and all must 
share in shaping and enhancing the great potential of the Information Age.



ABOUT THE TUTORIALS (Monday) --

  Seminars on March 25th offer parallel introductions to different 
disciplines that converge in this conference.  These are surveys for 
individuals not already expert in the topics presented.  They are half-day 
tutorials, a.m. and p.m.  Lecturers, topics, descriptions and times were 
confirmed as of a late January press deadline, but may be subject to change.

HOW COMPUTER CRIME IS INVESTIGATED
  This reviews investigation, search, seizure and evidence requirements for 
pursuing computer crime.  It is for computer users, computer owners, BBS 
sysops and investigators and attorneys unfamiliar with computer crime 
practices. [p.m.]
- -- Don Ingraham, nationally-known computer crime prosecutor,
Asst. District  Attorney, Alameda County, California.

INFORMATION SECURITY
  A primer for managers, lawyers and educators, this surveys computer crime,
risks, due care, trusted systems, safeguards & other security issues.[p.m.]
- -- Donn Parker, a leading consultant in information security
and computer crime, SRI International.

HOW COMPUTER CRACKERS CRACK!
  Reviews real cases and how to recognize, prevent and investigate computer 
security breaches.  For computer center managers, administrators, sysops,
 law enforcement and press .  [a.m.]
- -- Russell Brand, computer security specialist; programmer, Reasoning Sys..

COMPUTER COMMUNICATIONS & THE GLOBAL MATRIX
  Survey of electronic-mail and teleconferencing services,  access to 
networked information services and remote computing applications, and an 
overview of the worldwide computer matrix.  [a.m.]
- -- John Quarterman, author of, *The Matrix: Computer Networks & 
Conferencing Systems Worldwide*; Texas Internet Consulting.

LOW-COST NETWORKS & COMPUTER BULLETIN BOARD SYSTEMS (BBS)
  Electronic-mail, bulletin board systems and tele-conferencing alternatives
with personal computers; outlines low-cost PC networks and gateways to the 
global matrix.  [p.m.]
- -- Mark Graham, co-founder of Institute for Global Communications, 
PeaceNet and EcoNet; Pandora Systems; and 
- -- Tim Pozar, well-known expert on the 10,000-computer FidoNet.

FEDERAL LEGISLATION IMPACTING COMPUTER USE
  Detailed review of landmark federal statutes impacting access to 
information, privacy of personal information, computer security and 
computer crime.  [p.m.]
- -- Marc Rotenberg, former congressional counsel and expert on federal 
computer legislation, CPSR, Washington DC.
 
COMPUTER-RELATED LEGISLATION WITHIN STATES
  Survey of states' differing statutes that impact access to information, 
privacy of information, computer security and computer crime.  [a.m.]
- -- Buck Bloombecker, nationally-known researcher, lecturer and consultant 
on computer security, crime & legislation.

IMPACTS ON THE U.S. OF OTHER NATIONS' PRIVACY INITIATIVES
  European Economic Community and other international privacy and data 
protection  plans affecting trans-border data-flow and computer 
communications, greatly impacting U.S. information practices and 
international business.  [a.m.]
- -- Ron Plesser, former General Counsel,  U.S. Privacy Protection Study 
Commission; attorney, Piper & Marbury, Washington, DC.



ABOUT THE CONFERENCE SESSIONS (Tuesday-Thursday) --

  Single-track Conference & banquet sessions Mar.26th through Mar.28th 
offer diverse speakers & panel discussions including:

Key speakers include:

*    Laurence H. Tribe,
Professor of Constitutional Law, Harvard Law School    [Tuesday morning]:
"The Constitution in Cyberspace:  Law & Liberty Beyond the Electronic 
Frontier".

*    Eli M. Noam, 
Director, Center for Telecommunications & Information Studies, Columbia 
University    [Tuesday banquet]:
"Network Environments of the Future: Reconciling Free Speech and Freedom of 
Association".

*    William A. Bayse,
FBI's Assistant Director, Technical Services Division   [Wednesday banquet]:
"Balancing Computer Security Capabilities with Privacy and Integrity".


THE CONSTITUTION IN THE INFORMATION AGE    [opening session]
  Introductory remarks.  Major policy proposals regarding electronic 
communications and Constitutional protections, by Prof. Laurence Tribe.  

ELECTRONIC SPEECH, PRESS & ASSEMBLY
  Freedoms and responsibilities regarding electronic speech, public and 
private electronic assembly, electronic publishing; issues of prior 
restraint and chilling effects of monitoring.

COMPUTER-BASED SURVEILLANCE OF INDIVIDUALS
  Monitoring electronic-mail, public & private teleconferences, electronic 
bulletin boards, publications and subscribers; monitoring individuals, work 
performance, buying habits and lifestyles.

PERSONAL INFORMATION & PRIVACY
  Government and private collection, sharing, marketing, verification, use, 
protection of, access to and responsibility for personal data, including 
buying patterns, viewing habits, lifestyle, work, health, school, census, 
voter, tax, financial and consumer information.

ETHICS & EDUCATION
  Ethical principles for individuals, system administrators, organizations, 
corporations and government; copying of data, copying of software, 
distributing confidential information; relations to computer education and 
computer law.

TRENDS IN COMPUTER NETWORKS
  Overview and prognosis of computing capabilities and networking as they 
impact personal privacy, confidentiality, security, one-to-one and 
many-to-one communications, and access to information about government, 
business and society.

LAW ENFORCEMENT PRACTICES & PROBLEMS
  Issues relating to investigation, prosecution, due process and deterring 
computer crimes, now and in the future; use of computers to aid law 
enforcement.

LAW ENFORCEMENT & CIVIL LIBERTIES
  Interaction of computer crime, law enforcement and civil liberties; 
issues of search, seizure and sanctions, especially as applied to shared or 
networked information, software and equipment.

LEGISLATION & REGULATION
  Legislative and regulatory roles in protecting privacy and insuring 
access; legal problems posed by computing and computer networks; approaches 
to improving related government processes.

ACCESS TO GOVERNMENT INFORMATION
  Implementing individual and corporate access to federal, state & local 
information about communities, corporations, legislation, administration, 
the courts and public figures; allowing access while protecting 
confidentiality.

INTERNATIONAL PERSPECTIVES & IMPACTS
  Other nationsU models for protecting personal information and 
communications, and for granting access to government information; existing 
and developing laws including EC'92; requirements for trans-national 
data-flow and their potential impacts; implications for personal 
expression; accountability issues.

WHERE DO WE GO FROM HERE?    [closing session]
  Perspectives, recommendations and commitments of participants from the 
major interest groups, proposed next steps to protect personal privacy, 
protect fundamental freedoms and encourage responsible policies and action.

ALSO:  Tuesday and Wednesday will include structured opportunities for 
attendees to identify groups with whom they want to establish contact and, 
if they wish, announce topics they would like to discuss, one on one.


ABOUT JUST SOME OF THE CONFERENCE SPEAKERS --

Ken Allen, Senior Vice President for Governmental Relations, Information 
Industries Association (IIA).

Sharon Beckman, civil rights and criminal defense attorney and Electronic 
Frontier Foundation litigation counsel, Silverglate & Good.

Jerry Berman, Director of the ACLU's Project on Information Technology and 
Communications Policy Fellow, Benton Foundation.

Paul Bernstein, columnist, *Trial* mag.; Electronic Bar Assn. Legal Info. 
Network administrator; LawMUG BBS sysop; edits on-line lawyers' newsletter.

Sally Bowman, promotes responsible computing practices through school 
teaching units; Director, Computer Learning Foundation.

David Burnham, author, *Rise of the Computer State*; former New York Times 
investigative reporter; specialist in IRS & Freedom of Information Act.

Mary Culnan, co-authored major credit reporting policies presented to 
Congress; School of Business Administration, Georgetown University.

Dorothy Denning, received Aerospace's 1990 Distinguished Lecturer in 
Computer Security award; author, *Cryptography & Data Security*.

Peter Denning, Editor, 1990 *Computers Under Attack*; past President, ACM; 
founding Director, RIACS; editor, *Communications of the ACM*.

Dave Farber, co-founder, CSNET; member, National Research Council's 
Computer Science & Telecommunications Board; University of Pennsylvania.

Cliff Figallo, Director of the WELL (the Whole Earth 'Lectronic Link), one 
of the best-reputed of the public teleconferencing systems.

David Flaherty, Canadian surveillance expert, Professor of History and Law 
at the University of Western Ontario.

John Ford, Public Relations Director for Equifax, one of the nation's 
largest providers of personal and credit information.

Bob Gellman, Chief Counsel, U.S. House of Representatives Governmental 
Information Subcommittee.

Janlori Goldman, Director of the ACLU's  Project on Privacy and Technology, 
Washington, DC.

Harry Hammit, Editor, Access Reports, focusing on access to and freedom of 
information, Washington, DC.

Martin Hellman, identified potential hazards in federal DES national 
encryption standard; co-invented public-key encryption; Stanford.

Evan Hendricks, Editor/Publisher *Privacy Times* newsletter, Washington, DC.

Lance Hoffman, public policy researcher and Professor of Electrical 
Engineering  & Computer Science at George Washington University.

Don Ingraham, wrote the first-ever search warrant for magnetic media, 
computer crime prosecutor; Asst. District Attorney, Alameda County.

Bob Jacobson, former Prin. Consultant, California State Assembly Utilities 
& Commerce Committee; drafted landmark computer communications legislation.

Mitch Kapor, co-founder, Electronic Frontier Foundation; founder, Lotus 
Corp.; received DPMA's 1990 Distinguished Information Science Award.

Tom Mandel, Director of the Leading Edge Values & Lifestyles Program at SRI 
International.

John McMullen, well-known on-line journalist; co-authors "Newsbytes" column 
on GEnie and Online America.

Peter Neumann, member, National Research Councils's 1990 *Computers at Risk*
comm.; Chair, ACM Comm.on Computers & Public Policy; moderates RISKS Forum.

Donn Parker, perhaps the best-known international consultant and author on 
information security and computer crime, SRI International.

Ron Plesser, former General Counsel, U.S. Privacy Protection Study 
Commission; attorney, Piper & Marbury, Washington DC.

John Quarterman, author of the definitive study, *The Matrix: Computer 
Networks and Conferencing Systems Worldwide*; Texas Internet Consulting.

Jack Rickard, Editor of *Boardwatch* magazine,  perhaps the best news 
source about computer bulletin boards; runs online information service.

Tom Riley, Canadian specialist in international computer communications and 
privacy issues; Riley Information Services, Inc.

Lance Rose, co-author of *Syslaw*, about the law applied to on-line 
situations; attorney, Wallace & Rose.

Marc Rotenberg, expert in federal computer and privacy law; Computer 
Professionals for Social Responsibility, Washington office Director.

Noel Shipman, attorney for plaintiffs in electronic-mail privacy landmark 
1990 litigation against Epson America.

Harvey Silverglate, Electronic Frontier Foundation litigation counsel, 
specialist in criminal defense and civil rights, Silverglate & Good.

Gail Thackeray, computer crime prosecutor; involved in Secret Service's 
"Operation Sun Devil", former Arizona Asst. State Attorney General.

Robert Veeder, Acting Chief, Information Policy Branch, Office of 
Information Regulatory Affairs, U.S. Office of Management & Budget (OMB).

Willis Ware, Chair, U.S. Computer Systems Security & Privacy Advisory Board 
established by Congress in 1987; Fellow, RAND Corporation.

Alan Westin, leader in early privacy legislation; co-authored landmark 
*Equifax Report on Consumers in the Information Age*; Columbia University.

Sheldon Zenner, former federal prosecutor in Chicago; defended
 *Phrack* electronic publisher, Craig Neidorf; Katten, Muchin & Zavis.

  CONFERENCE CHAIR
Jim Warren, Autodesk, Inc. & MicroTimes
  415-851-7075,  jwa...@well.sf.ca.us / e-mail

  PROGRAM COMMITTEE
Dorothy Denning, Digital Equipment Corporation
Peter Denning, Research Inst. for Advanced Comp.Sci.
Les Earnest, Midpeninsula ACLU & Stanford U., ret.
Elliot Fabric, Attorney at Law
Mark Graham, Pandora Systems
Don Ingraham, Alameda County District AttyUs Office
Bruce Koball, Motion West
Marc Rotenberg, Comp. Prof. for Social Responsibility
Glenn Tenney, Fantasia Systems & The Hackers Conf.

  ADVISORS
Ron Anderson, ACM SIGCAS & Univ. of Minnesota
John Perry Barlow, Electronic Frontier Foundation
Jerry Berman, ACLU & Benton Foundation
Dave Caulkins, USSR GlasNet
Vint Cerf, Corp.for National Research Initiatives
Margaret Chambers, Electronic Networking Assn.
Steve Cisler, Apple Computer, Inc.
Whit Diffie, Northern Telecom
Mary Eisenhart, MicroTimes
Dave Farber, University of Pennsylvania
Cliff Figallo, The WELL
John Gilmore, Cygnus Support
Adele Goldberg, ParcPlace Systems
Terry Gross, Rabinowitz, Boudin, Standard, et al
Keith Henson, consultant & Alcor
Lance Hoffman, George Washington University
Dave Hughes, Chariot Communications
Bob Jacobson, Human Interface Technology Lab.
Mitch Kapor, Electronic Frontier Foundation
Roger Karraker, Santa Rosa College
Tom Mandel, SRI International
John McMullen, NewsBytes
Peter Neumann, SRI International
Dave Redell, Digital Equipment Corporation
Ken Rosenblattt, Santa Clara Cnty. Dist. Atty's Office
Paul Saffo, Institute for the Future
Gail Thackeray, Arizona Attorney GeneralUs Office
Jay Thorwaldson, Palo Alto Medical Foundation
Terry Winograd, CPSR & Stanford University
Sheldon Zenner, Katten, Muchin, & Zavis
  Affiliations are listed only for identification purposes.


                        ****************************
                        *   Application to Attend  *
                        ****************************

First Conference on Computers, Freedom & Privacy,        March 25-28, 1991
Monday: Tutorials,        Tuesday-Thursday: Conference Sessions & Banquets
SFO Marriott Hotel, 1800 Old Bayshore Hwy., Burlingame CA 94010
For hotel reservations at a special $99 Conference rate, call: (800)228-9290

  Due to the size of the facility, Conference registration is limited to 
600  people.  Tutorials registration is also limited.  Balanced 
participation from all of the diverse interest groups is being actively 
encouraged.
  Interested individuals should apply early to assure acceptance.
Applications will be accepted primarily on a first-come, first-served 
basis, while encouraging balanced participation.


REGISTRATION FEES: If  payment received:  by Feb.8  2/8-3/15  after 3/15
Conference (3 days, incl.luncheons, banquets) $295      $350        $400
Tutorials (full day, 1 or 2 seminars)          $95      $145        $195
Please circle fee and date selections.
Please make checks payable to "Computers, Freedom & Privacy / CPSR".  
Please do not send cash.  (If space is sold out, the uncashed check will be 
voided and promptly returned.)

  Check the "[x]" if information should NOT appear in the published 
Attendee Roster.  (Roster will greatly assist ongoing communications.)
[ ]  name:
[ ]  title:
[ ]  organization:
[ ]  mailing address:
[ ]  city ST Zip:
[ ]  phone(s):
[ ]  fax:
[ ]  e-mail:
Name-tag name:
Name-tag title:
Name-tag organization:
Expect to stay at SFO Marriott?     [ ]yes     [ ]no

To aid in balancing participation among groups,
please check all significantly applicable items.
[ ]  user of computers or computer networking
[ ]  user of electronic-mail services
[ ]  user of teleconferencing services
[ ]  user of direct marketing services
[ ]  user of computerized personal information
[ ]  user of government information
[ ]  computer professional
[ ]  BBS sysop (bulletin board system operator)
[ ]  systems administrator / infosystems manager
[ ]  network administrator
[ ]  computer / communications security specialist
[ ]  provider of data communications services
[ ]  provider of electronic-mail services
[ ]  provider of teleconferencing services
[ ]  provider of direct marketing services
[ ]  provider of computerized personal information
[ ]  provider of government information
[ ]  legislative official or staffqfederalqstate
[ ]  regulatory official or staff  [ ]federal  [ ]state
[ ]  law enforcement               [ ]federal  [ ]state  [ ]local
[ ]  prosecutor                    [ ]federal  [ ]state  [ ]local
[ ]  judicial representative       [ ]federal  [ ]state  [ ]local
[ ]  criminal defense attorney
[ ]  corporate or litigation attorney
[ ]  civil liberties specialist
[ ]  journalist  [ ]newspaper  [ ]television  [ ]radio  [ ]other
[ ]  other:
[ ]  other:

Privacy Notice: 
This information will not be sold, rented, loaned, exchanged or used for 
any purpose other than official CPSR activity.  CPSR may elect to send 
information about other activities, but such mailings will always originate 
with CPSR.

  Please mail form and payment to Conference office:
CFP Conference, 345 Swett Road, Woodside CA 94062
  e-mail: c...@well.sf.ca.us;  fax: (415)851-2814
  Conference Chair: Jim Warren,    (415)851-7075

Sponsor:  Computer Professionals for Social Responsibility, (415)322-3778
a  nonprofit, educational corporation  [Internal Revenue Code 501(c)(3)]


OTHER INFORMATION ABOUT THIS PREMIER CONFERENCE --

  This is an intensive, multi-disciplinary survey Conference for those 
concerned with computing, teleconferencing, electronic mail, computerized 
personal information, direct marketing information, government data, etc. 
- -- and those concerned with computer-related legislation, regulation, 
computer security, law enforcement and national and international policies 
that impact civil liberties, responsible exercise of freedom and equitable 
protection of privacy in this global Information Age.

  For the first time, this 4-day event will bring together representatives 
from all of these groups and more, all in one place, all at one time.

  Many of the recognized leaders and strongest advocates among the various 
groups interested in the issues of the conference will discuss their 
concerns and proposals.

  Attendance will be limited to 600 people.  Balanced representation from 
the diverse groups interested in these issues is being encouraged.  Please
see the enclosed application for details.

  To inform participants about topics beyond their specialties, a number of 
half-day seminars are scheduled in parallel for the first day (Monday, 
March 25th).  These tutorials will explore relevant issues in computing, 
networking, civil liberties, regulation, the law and law enforcement.  Each 
tutorial is designed for those who are experienced in one area, but are 
less expert in the tutorials' topics.

  To explore the interactions and ramifications of the issues, conference 
talks and panel discussions are scheduled in a single track for the 
remaining three days (Tuesday-Thursday, March 26th-28th).  These will 
emphasize balanced representation of all major views, especially including 
probing questions and discussion.

  Explicit Conference events to foster communication across disciplines are 
planned.  Working luncheons, major breaks and two evening banquets will 
further encourage individual and small-group discussions.

                                              Please copy, post & circulate!
                                              [version 2.7, updated 1/26/91]

-- 
John Gilmore      {sun,pacbell,uunet,pyramid}!hoptoad!gnu        g...@toad.com
Just say no to thugs.  The ones who lock up innocent drug users come to mind.

			        About USENET

USENET (Users’ Network) was a bulletin board shared among many computer
systems around the world. USENET was a logical network, sitting on top
of several physical networks, among them UUCP, BLICN, BERKNET, X.25, and
the ARPANET. Sites on USENET included many universities, private companies
and research organizations. See USENET Archives.

		       SCO Files Lawsuit Against IBM

March 7, 2003 - The SCO Group filed legal action against IBM in the State 
Court of Utah for trade secrets misappropriation, tortious interference, 
unfair competition and breach of contract. The complaint alleges that IBM 
made concentrated efforts to improperly destroy the economic value of 
UNIX, particularly UNIX on Intel, to benefit IBM's Linux services 
business. See SCO vs IBM.

The materials and information included in this website may only be used
for purposes such as criticism, review, private study, scholarship, or
research.

Electronic mail:			       WorldWideWeb:
   tech-insider@outlook.com			  http://tech-insider.org/