Path: gmdzi!unido!mcsun!uunet!lll-winken!decwrl!pa.dec.com!src.dec.com!denning From: den...@src.dec.com (Dorothy Denning) Newsgroups: comp.org.eff.talk Subject: Computers, Freedom & Privacy Conference Keywords: Please copy, post & circulate! Message-ID: <1991Jan10.144856.465@src.dec.com> Date: 10 Jan 91 22:48:56 GMT Sender: ne...@src.dec.com (News) Organization: DEC Systems Research Center Lines: 495 Originator: den...@jumbo.pa.dec.com ********************************************************* * THE FIRST CONFERENCE ON COMPUTERS, FREEDOM & PRIVACY * ********************************************************* Pursuing Policies for the Information Age in the Bicentennial Year of the Bill of Rights Tutorials & Invitational Conference, Limited to 600 Participants Monday-Thursday, March 25-28, 1991 Airport SFO Marriott Hotel, Burlingame, California (San Francisco Peninsula) Co-sponsors & cooperating organizations include Institute of Electrical and Electronics Engineers-USA Association for Computing Machinery Electronic Networking Association Electronic Frontier Foundation Videotex Industry Association Cato Institute American Civil Liberties Union ACM Special Interest Group on Software IEEE-USA Intellectual Property Committee ACM Special Interest Group on Computers and Society ACM Committee on Scientific Freedom and Human Rights IEEE-USA Committee on Communications and Information Policy Autodesk, Inc. The WELL Portal Communications Sponsored by the Computer Professionals for Social Responsibility A nonprofit educational corporation (415)322-3778, e-mail: c...@well.sf.ca.us. fax: (415)851-2814 ABOUT COMPUTERS, FREEDOM & PRIVACY ---------------------------------- We are at a crossroads as individuals, organizations and governments depend more and more on computers and computer networks. Within ten years, most global information will be collected and utilized electronically. The 1990's are the pivotal decade in which statutes, policies and judicial precedents will be developed for controlling access, use -- and abuse -- of computerized information and electronic mail. Current government and private-sector policies are an uncoordinated jumble, created as each group evolves ways to collect, manipulate, extract, share and protect computerized and networked information and services. Data on individuals and groups is being computerized by numerous agencies, organizations and special interests, often without the knowledge or approval of those it concerns, and with varying degrees of accuracy. Computers can greatly assist individuals, organizations and government in making sound decisions based on efficient access to adequate information -- for personal benefit, business improvement and national well-being. Or, inappropriate use and regulation can seriously threaten fundamental freedoms, personal privacy, and the democratic processes that are at the very foundation of this nation and of any free society. ABOUT THE CONFERENCE SESSIONS (Tuesday-Thursday, March 26th-28th) ----------------------------------------------------------------- PLENARY SPEAKERS: * Laurence H. Tribe, Professor of Constitutional Law, Harvard Law School, offering major policy proposals in the opening Conference session, "The Constitution in Cyberspace: Law & Liberty Beyond the Electronic Frontier". * Eli M. Noam, Director of the Center for Telecommunications and Information Studies, Columbia University, and a recognized leader in telecommunications regulation, international communications policies and economics, will discuss, "Network Environments of the Future: Reconciling Free Speech and Freedom of Association." * William A. Bayse, Assistant Director, FBI Technical Services Division, Washington DC, providing perspectives on "Balancing Computer Security Capabilities with Privacy and Integrity" at the Wednesday evening banquet. THE CONFERENCE SESSIONS offer diverse speakers & panel discussions: Trends in Computers & Networks. Overview and prognosis of computing capabilities and networking as they impact personal privacy, confidentiality, security, one-to-one & many-to-one communications, and access to information about government, business and society. International Perspectives & Impacts. Other nationsU models for protecting personal information and communications, and granting access to government information; existing and developing laws; requirements for trans-national dataflow and their implications; impacts on personal expression; accountability. Personal Information & Privacy. Government and private collection, sharing, marketing, verification, use, protection of, access to and responsibility for personal data, including buying patterns, viewing habits, lifestyle, work, health, school, census, voter, tax, financial and consumer information. Law Enforcement Practices & Problems. Issues relating to investigation, prosecution, due process and deterring computer crimes, now and in the future; use of computers to aid law enforcement. Law Enforcement & Civil Liberties. Interaction of computer crime, law enforcement and civil liberties; issues of search, seizure and sanctions, especially as applied to shared or networked information, software and equipment. Legislation & Regulation. Legislative and regulatory roles in protecting privacy and insuring access; legal problems posed by computing and computer networks; approaches to improving related government processes. Computer-based Surveillance of Individuals. Monitoring electronic-mail, public & private teleconferences, electronic bulletin boards, publications and subscribers; monitoring individuals, work performance, buying habits and lifestyles. Electronic Speech, Press & Assembly. Freedoms and responsibilities regarding electronic speech, public and private electronic assembly, electronic publishing, prior restraint and chilling effects of monitoring. Access to Government Information. Implementing individual and corporate access to federal, state & local information about communities, corporations, legislation, administration, the courts and public figures; allowing access while protecting confidentiality. Ethics & Education. Ethical principles for individuals, system administrators, organizations, corporations and government; copying of data, copying of software, distributing confidential information; relations to computer education and computer law. Where Do We Go From Here? [closing session] Perspectives, recommendations and commitments of participants from the major interest groups, proposed next steps to protect personal privacy, protect fundamental freedoms and encourage responsible policies and action. Also: Tuesday and Wednesday will include structured opportunities for attendees to identify groups with whom they want to establish contact and, if they wish, announce topics they would like to discuss, one on one. ABOUT THIS PREMIER EVENT ------------------------ This is an intensive, multi-disciplinary survey Conference for those concerned with computing, teleconferencing, electronic mail, computerized personal information, direct marketing information, government data, etc. -- and those concerned with computer-related legislation, regulation, computer security, law enforcement and national and international policies that impact civil liberties, responsible exercise of freedom and equitable protection of privacy in this global Information Age. For the first time, this four-day invitational event will bring together representatives from all of these groups and more, all in one place, all at one time. Many of the recognized leaders and strongest advocates representing the various groups having an interest in the issues of the conference will discuss their concerns and proposals. A maximum of 600 applicants will be invited to attend. Balanced representation from the diverse groups interested in these issues is being encouraged. Please see the enclosed Invitation Application for details. To inform participants about topics beyond their specialties, half-day seminars are scheduled for the first day (Monday, March 25th). These parallel tutorials will explore relevant issues in computing, networking, civil liberties, regulation, the law and law enforcement. Each tutorial is designed for those who are experienced in one area, but are less knowledgeable in the subject of that tutorial. To explore the interactions and ramifications of the issues, conference talks and panel discussions are scheduled for the remaining three days (Tuesday-Thursday, March 26th-28th). These will emphasize balanced representation of all major views, especially including probing questions and discussion. Explicit Conference events to foster communication across disciplines are planned. Working luncheons, major breaks and two evening banquets will further encourage individual and small-group discussions. ABOUT JUST *SOME* OF THE SPEAKERS IN THE 3-DAY CONFERENCE --------------------------------------------------------- Ken Allen, Senior Vice President for Governmental Relations, Information Industries Association (IIA). Sharon Beckman, civil rights and criminal defense attorney and Electronic Frontier Foundation litigation counsel, Silverglate & Good. Jerry Berman, Director of the ACLU's Project on Information Technology and Communications Policy Fellow, Benton Foundation. Paul Bernstein, columnist, Trial magazine; Electronic Bar Assn. Legal Info. Network administrator; LawMUG BBS sysop; edits on-line lawyers' newsletter. Sally Bowman, promotes responsible computing practices through school teaching units; Director, Computer Learning Foundation. David Burnham, author, *Rise of the Computer State*; former *New York Times* investigative reporter; specialist in IRS & Freedom of Information Act. Mary Culnan, co-authored major credit reporting policies presented to Congress; School of Business Administration, Georgetown University. Peter Denning, Editor, 1990 *Computers Under Attack*; past Pres., ACM; founding Director, RIACS; editor, *Communications of the ACM*. Dorothy Denning, received Aerospace's 1990 Distinguished Lecturer in Computer Security award; author, *Cryptography & Data Security*. Dave Farber, co-founder, CSNET; member, National Research Council's Computer Science & Telecommunications Board; University of Pennsylvania. Cliff Figallo, Chief Executive Officer and Director of the WELL (the Whole Earth 'Lectronic Link). David Flaherty, Canadian surveillance expert, Professor of History & Law at the University of Western Ontario. John Ford, Public Relations Director for Equifax, one of the nation's largest maintainers of information on individuals. Bob Gellman, Chief Counsel, U.S. House of Representatives Governmental Information Subcommittee. Janlori Goldman, Director, ACLU Project on Privacy & Technology, Washington, DC. Harry Hammit, Editor, *Access Reports*, focusing on access to information. Martin Hellman, identified potential hazards in federal DES national encryption standard; co-invented public-key encryption; Stanford University. Evan Hendricks, Editor & Publisher of *Privacy Times* newsletter. Lance Hoffman, public policy researcher and Professor of Electrical Engineering & Computer Science at George Washington University. Don Ingraham, wrote the first-ever search warrant for magnetic media, computer crime prosecutor; Asst. District Attorney, Alameda County. Bob Jacobson, former Principal Consultant, Calif. State Assembly Utilities and Commerce Committee; drafted landmark comp. communications legislation. Mitch Kapor, co-founder, Electronic Frontier Foundation; founder, Lotus Corp.; received DPMA's 1990 Distinguished Information Science Award. Tom Mandel, Director of the Leading Edge Values & Lifestyles Program at SRI International. John McMullen, well-known on-line journalist; co-authors "Newsbytes" column on GEnie and Online America. Peter Neumann, member, National Research Council's 1990 *Computers at Risk* committee; Chair, ACM Comm.on Computers & Public Policy; hosts RISKS Forum. Donn Parker, perhaps the best-known international consultant and author on information security and computer crime, SRI International. Ron Plesser, former majority party congressional committee counsel; privacy expert; attorney, Piper & Marbury. John Quarterman, author, Digital Press' definitive *The Matrix: Computer Networks and Conferencing Systems Worldwide*; networking consultant. Jack Rickard, Editor of *Boardwatch* magazine, perhaps the best news source about computer bulletin boards; Online Information Service. Tom Riley, Canadian specialist in international computing and privacy issues; Riley & Associates. Lance Rose, co-author of *Syslaw*, about the law applied to on-line situations; attorney, Wallace & Rose. Marc Rotenberg, expert in federal computer and privacy law; Computer Professionals for Social Responsibility, Washington office Director. Noel Shipman, attorney for plaintiffs in electronic-mail privacy landmark 1990 litigation against Epson America. Harvey Silverglate, Electronic Frontier Foundation litigation counsel, specialist in criminal defense and civil rights, Silverglate & Good. Gail Thackeray, computer crime prosecutor; involved in Secret Service's 1990 "Operation Sun Devil", Arizona Asst. State Attorney General. Robert Veeder, Acting Chief, Information Policy Branch, Office of Information Regulatory Affairs, OMB (Office of Management & Budget). Willis Ware, computer security expert; Fellow, RAND Corporation. Sheldon Zenner, former federal prosecutor in Chicago; defended *Phrack* electronic publisher, Craig Neidorf; Katten, Muchin & Zavis. ABOUT THE LOW-COST TUTORIALS (Monday, March 25th) ------------------------------------------------- Seminars on the first day offer introductions to the different disciplines that intersect in this conference. These are surveys for individuals not already expert in the topics presented. These half-day tutorials are scheduled in four parallel tracks: Global Communications & the Worldwide Computer Matrix. [morning*] Survey of electronic-mail & teleconferencing services, global information access, remote services and the matrix of networks. Low-Cost Computer Networking & Computer Bulletin Board Systems. [afternoon*] Reviews e-mail, bulletin board and teleconferencing alternatives on personal computers; outlines low-cost PC-based networks and their gateways to the global matrix. -- Mark Graham*, co-founder of Institute for Global Communications, PeaceNet and EcoNet; Pandora Systems Current & Proposed International Policies. [morning*] Law and regulation that will or may impact trans-border data-flow and computer communications, impacting U.S. information practices and international business. Federal Legislation Impacting Computer Use. [afternoon*] Detailed review of landmark federal statutes impacting access to information, privacy of information, computer security and computer crime. -- Marc Rotenberg*, former congressional counsel and expert on federal legislation, CPSR, Washington DC. How Computer Crackers Crack! [morning*] Suggested by a deputy district attorney specializing in high-tech crime, this is for law enforcement officials, prosecutors, systems administrators and Bulletin Board System (BBS) sysops. -- Russell Brand*, computer security specialist; programmer with Reasoning Systems, Palo Alto CA. How Computer Crime is Investigated. [afternoon*] This reviews investigation, search, seizure and evidence requirements for pursuing computer crime. It is for computer users, computer owners, BBS sysops and investigators unfamiliar with computer crime practices. Information Security. [afternoon*] Survey for systems managers of internal and external threats, security measures, alternatives and other computer and data security issues. -- Donn Parker*, a leading consultant in information security and computer crime, SRI International. * - Lecturers, descriptions and times were confirmed as of 1/8/91, but may be subject to change. CONFERENCE CHAIR Jim Warren, Autodesk, Inc. & *MicroTimes* 415-851-7075, jwa...@well.sf.ca.us / e-mail PROGRAM COMMITTEE Dorothy Denning, Digital Equipment Corporation Peter Denning, Research Institute for Advanced Computer Science Les Earnest, SF Peninsula ACLU & Stanford University, ret. Elliot Fabric, Attorney at Law Mark Graham, Pandora Systems Don Ingraham, Alameda County District AttorneyUs Office Bruce Koball, Motion West Marc Rotenberg, Computer Professionals for Social Responsibility Glenn Tenney, Fantasia Systems & Hacker's Conference ADVISORS Ron Anderson, ACM SIGCAS & University of Minnesota John Perry Barlow, Electronic Frontier Foundation Jerry Berman, ACLU & Benton Foundation Dave Caulkins, USSR GlasNet Vint Cerf, Corporation for National Research Initiatives Margaret Chambers, Electronic Networking Association Steve Cisler, Apple Computer, Inc. Whit Diffie, Northern Telecom Mary Eisenhart, *MicroTimes* Dave Farber, University of Pennsylvania Cliff Figallo, The WELL John Gilmore, Cygnus Support Adele Goldberg, ParcPlace Systems Terry Gross, Rabinowitz, Boudin, Standard, et al Keith Henson, consultant & Alcor Lance Hoffman, George Washington University Dave Hughes, Chariot Communications Bob Jacobson, Human Interface Technology Laboratory Mitch Kapor, Electronic Frontier Foundation Roger Karraker, Santa Rosa College Tom Mandel, SRI International John McMullen, NewsBytes Peter Neumann, SRI International Dave Redell, Digital Equipment Corporation Ken Rosenblattt, Santa Clara County District Attorney's Office Paul Saffo, Institute for the Future Gail Thackeray, Arizona Attorney GeneralUs Office Jay Thorwaldson, Palo Alto Medical Foundation Terry Winograd, CPSR & Stanford University Sheldon Zenner, Katten, Muchin, & Zavis Affiliations listed only for identification ============================ = Request for Invitation = ============================ First Conference on Computers, Freedom & Privacy March 25-28, 1991 Monday: Tutorials, Tuesday-Thursday: Conference Sessions SFO Marriott Hotel, 1800 Old Bayshore Hwy., Burlingame CA 94010 For hotel reservations at Conference rates, call: (800)228-9290 #3 ** Invitational Conference, limted to 600 participants. ** To facilitate useful dialogue and balanced participation by representatives from all of the diverse groups interested in these issues, attendance is limited. (The capacity of the Conference facility is similarly limited). All interested individuals are encouraged to request an invitation. Invitations will be primarily issued on a first-come, first-served basis within each major interest group. Fees if payment is received: by Jan.31 Feb.1-Mar.15 after Mar.15 Tutorials (full day) $ 95 $ 145 $ 195 Conference (3 days) $ 295 $ 350 $ 400 Conference Registration fee includes three luncheons, two banquet meetings and selected handouts: Please make checks payable to "Computers, Freedom & Privacy/CPSR". Please don't send cash. Invitations will be promptly issued, or the uncashed check will be voided and promptly returned. Please type or print. Thank ye, kindly. name: title: organization: mailing address: city, state ZIP: phone(s): fax: e-mail: Comments to assist in evaluating this request: To aid in balancing participation among groups, please check all significantly applicable items. [ ] user of computers or computer networking [ ] user of electronic-mail services [ ] user of teleconferencing services [ ] user of direct marketing services [ ] user of computerized personal information [ ] user of government information [ ] computer professional [ ] BBS sysop (bulletin board system operator) [ ] systems administrator / infosystems manager [ ] network administrator [ ] computer / communications security specialist [ ] provider of data communications services [ ] provider of electronic-mail services [ ] provider of teleconferencing services [ ] provider of direct marketing services [ ] provider of computerized personal information [ ] provider of government information [ ] legislative official [ ] federal [ ] state [ ] regulatory official or staff [ ] federal [ ] state [ ] law enforcement official [ ] federal [ ] state [ ] local [ ] prosecutor [ ] federal [ ] state [ ] local [ ] judicial representative [ ] federal [ ] state [ ] local [ ] criminal defense attorney [ ] corporate or litigation attorney [ ] civil liberties specialist [ ] journalist [ ] newspaper [ ] television [ ] radio [ ] other [ ] other: [ ] other: <<1/7/91>> Please mail form and payment to: CFP Conference, 345 Swett Road, Woodside CA 94062 Privacy Notice: This information will not be sold, rented, loaned, exchanged or used for any purpose other than official CPSR activity. CPSR may elect to send information about other activities, but such mailings will always originate with CPSR. Sponsor: Computer Professionals for Social Responsibility, (415)322-3778 A nonprofit, educational corporation [ Internal Revenue Code 501(c)(3) ] e-mail: c...@well.sf.ca.us; fax: (415)851-2814 Chair: Jim Warren, (415)851-7075 Please copy, post & circulate!
Path: gmdzi!unido!mcsun!uunet!unisoft!hoptoad!gnu From: gnu@hoptoad.uucp (John Gilmore) Newsgroups: sci.crypt Subject: First Conference on Computers, Freedom & Privacy Message-ID: <15041@hoptoad.uucp> Date: 30 Jan 91 08:57:25 GMT Organization: Cygnus Support, Palo Alto Lines: 549 I encourage everyone from the crypto community to attend. We have a vital role to play in shaping the future of freedom and privacy in the presence of computers. Let's not let the tunnel-visioned computer nerds, rabid prosecutors, ignorant lawmakers, and "irrational security" control freaks blow the most open society in the world just yet. Come tell them what's possible and what's reasonable, and let them tell you what needs and desires they wish cryptography could fill. This is a way to step out of mathematically oriented crypto conferences and into a realm that brings together a programmer who was threatened with an "espionage" prosecution for having encrypted data on disk when the cops came calling -- with the prosecutors who made that threat -- and the lawmakers who wrote the unconstitutional laws about computer security. You might think of it as a battleground but it is really an attempt at helping us all to understand the other side's concerns, without guns or charges or lawsuits in the way. Bring the concerns of the theory community, and find out what crazy things people will do with the theories. And maybe fix a few of these things. John Gilmore Please copy, post & circulate! [version 2.7, updated 1/26/91] ************************************ * The First Conference * * on * * COMPUTERS, FREEDOM & PRIVACY * ************************************ Pursuing Policies for the Information Age in the Bicentennial Year of the Bill of Rights Tutorials & Conference, Limited to 600 Participants Monday-Thursday, March 25-28, 1991 SFO Airport Marriott Hotel, Burlingame, CA, On the San Francisco Peninsula Co-sponsors & cooperating organizations include: Institute of Electrical and Electronics Engineers-USA Association for Computing Machinery Electronic Networking Association Electronic Frontier Foundation Videotex Industry Association American Civil Liberties Union Cato Institute IEEE Intellectual Property Committee ACM SIG on Software ACM Special Interest Group on Computers & Society ACM Committee on Scientific Freedom and Human Rights IEEE-USA Committee on Communications and Information Policy Autodesk, Inc. Apple Computer, Inc. The WELL Portal Communications Sponsored by Computer Professionals for Social Responsibility A nonprofit, educational corporation (415)322-3778 e-mail: c...@well.sf.ca.us fax: (415)851-2814 The sponsoring & cooperating organizations support this project to enhance communication, understanding and consensus about these crucial issues, but do not necessarily endorse views that may be expressed by participants. ABOUT COMPUTERS, FREEDOM & PRIVACY -- We are at a crossroads as individuals, organizations and governments increasingly use and depend on computers and computer networks. Within ten years, most information will be utilized and exchanged electronically. We are in the pivotal decade when computer facilities and policies, worldwide, will mature. They can allow and encourage mass access to and use of great information processing and networking power, and control potential abuse. For potent personal benefit, business improvement and national well-being, information and its efficient access are becoming economically available to individuals, organizations and governments. Such access can greatly enhance sound decisions based on timely access to essential knowledge. Data on individuals and groups is being collected, computerized and exchanged at an exponentially increasing rate within numerous agencies and organizations.This has great legitimate value, but has also prompted increasing concerns regarding issues of personal privacy. To assure sound and equitable decisions, the public, the press and a broad range of policy-makers must understand and openly discuss these issues, their interactions and their implications for the future. To protect the fundamental freedoms and personal privacy that are the foundation of any free people, all parties must be informed, and all must share in shaping and enhancing the great potential of the Information Age. ABOUT THE TUTORIALS (Monday) -- Seminars on March 25th offer parallel introductions to different disciplines that converge in this conference. These are surveys for individuals not already expert in the topics presented. They are half-day tutorials, a.m. and p.m. Lecturers, topics, descriptions and times were confirmed as of a late January press deadline, but may be subject to change. HOW COMPUTER CRIME IS INVESTIGATED This reviews investigation, search, seizure and evidence requirements for pursuing computer crime. It is for computer users, computer owners, BBS sysops and investigators and attorneys unfamiliar with computer crime practices. [p.m.] - -- Don Ingraham, nationally-known computer crime prosecutor, Asst. District Attorney, Alameda County, California. INFORMATION SECURITY A primer for managers, lawyers and educators, this surveys computer crime, risks, due care, trusted systems, safeguards & other security issues.[p.m.] - -- Donn Parker, a leading consultant in information security and computer crime, SRI International. HOW COMPUTER CRACKERS CRACK! Reviews real cases and how to recognize, prevent and investigate computer security breaches. For computer center managers, administrators, sysops, law enforcement and press . [a.m.] - -- Russell Brand, computer security specialist; programmer, Reasoning Sys.. COMPUTER COMMUNICATIONS & THE GLOBAL MATRIX Survey of electronic-mail and teleconferencing services, access to networked information services and remote computing applications, and an overview of the worldwide computer matrix. [a.m.] - -- John Quarterman, author of, *The Matrix: Computer Networks & Conferencing Systems Worldwide*; Texas Internet Consulting. LOW-COST NETWORKS & COMPUTER BULLETIN BOARD SYSTEMS (BBS) Electronic-mail, bulletin board systems and tele-conferencing alternatives with personal computers; outlines low-cost PC networks and gateways to the global matrix. [p.m.] - -- Mark Graham, co-founder of Institute for Global Communications, PeaceNet and EcoNet; Pandora Systems; and - -- Tim Pozar, well-known expert on the 10,000-computer FidoNet. FEDERAL LEGISLATION IMPACTING COMPUTER USE Detailed review of landmark federal statutes impacting access to information, privacy of personal information, computer security and computer crime. [p.m.] - -- Marc Rotenberg, former congressional counsel and expert on federal computer legislation, CPSR, Washington DC. COMPUTER-RELATED LEGISLATION WITHIN STATES Survey of states' differing statutes that impact access to information, privacy of information, computer security and computer crime. [a.m.] - -- Buck Bloombecker, nationally-known researcher, lecturer and consultant on computer security, crime & legislation. IMPACTS ON THE U.S. OF OTHER NATIONS' PRIVACY INITIATIVES European Economic Community and other international privacy and data protection plans affecting trans-border data-flow and computer communications, greatly impacting U.S. information practices and international business. [a.m.] - -- Ron Plesser, former General Counsel, U.S. Privacy Protection Study Commission; attorney, Piper & Marbury, Washington, DC. ABOUT THE CONFERENCE SESSIONS (Tuesday-Thursday) -- Single-track Conference & banquet sessions Mar.26th through Mar.28th offer diverse speakers & panel discussions including: Key speakers include: * Laurence H. Tribe, Professor of Constitutional Law, Harvard Law School [Tuesday morning]: "The Constitution in Cyberspace: Law & Liberty Beyond the Electronic Frontier". * Eli M. Noam, Director, Center for Telecommunications & Information Studies, Columbia University [Tuesday banquet]: "Network Environments of the Future: Reconciling Free Speech and Freedom of Association". * William A. Bayse, FBI's Assistant Director, Technical Services Division [Wednesday banquet]: "Balancing Computer Security Capabilities with Privacy and Integrity". THE CONSTITUTION IN THE INFORMATION AGE [opening session] Introductory remarks. Major policy proposals regarding electronic communications and Constitutional protections, by Prof. Laurence Tribe. ELECTRONIC SPEECH, PRESS & ASSEMBLY Freedoms and responsibilities regarding electronic speech, public and private electronic assembly, electronic publishing; issues of prior restraint and chilling effects of monitoring. COMPUTER-BASED SURVEILLANCE OF INDIVIDUALS Monitoring electronic-mail, public & private teleconferences, electronic bulletin boards, publications and subscribers; monitoring individuals, work performance, buying habits and lifestyles. PERSONAL INFORMATION & PRIVACY Government and private collection, sharing, marketing, verification, use, protection of, access to and responsibility for personal data, including buying patterns, viewing habits, lifestyle, work, health, school, census, voter, tax, financial and consumer information. ETHICS & EDUCATION Ethical principles for individuals, system administrators, organizations, corporations and government; copying of data, copying of software, distributing confidential information; relations to computer education and computer law. TRENDS IN COMPUTER NETWORKS Overview and prognosis of computing capabilities and networking as they impact personal privacy, confidentiality, security, one-to-one and many-to-one communications, and access to information about government, business and society. LAW ENFORCEMENT PRACTICES & PROBLEMS Issues relating to investigation, prosecution, due process and deterring computer crimes, now and in the future; use of computers to aid law enforcement. LAW ENFORCEMENT & CIVIL LIBERTIES Interaction of computer crime, law enforcement and civil liberties; issues of search, seizure and sanctions, especially as applied to shared or networked information, software and equipment. LEGISLATION & REGULATION Legislative and regulatory roles in protecting privacy and insuring access; legal problems posed by computing and computer networks; approaches to improving related government processes. ACCESS TO GOVERNMENT INFORMATION Implementing individual and corporate access to federal, state & local information about communities, corporations, legislation, administration, the courts and public figures; allowing access while protecting confidentiality. INTERNATIONAL PERSPECTIVES & IMPACTS Other nationsU models for protecting personal information and communications, and for granting access to government information; existing and developing laws including EC'92; requirements for trans-national data-flow and their potential impacts; implications for personal expression; accountability issues. WHERE DO WE GO FROM HERE? [closing session] Perspectives, recommendations and commitments of participants from the major interest groups, proposed next steps to protect personal privacy, protect fundamental freedoms and encourage responsible policies and action. ALSO: Tuesday and Wednesday will include structured opportunities for attendees to identify groups with whom they want to establish contact and, if they wish, announce topics they would like to discuss, one on one. ABOUT JUST SOME OF THE CONFERENCE SPEAKERS -- Ken Allen, Senior Vice President for Governmental Relations, Information Industries Association (IIA). Sharon Beckman, civil rights and criminal defense attorney and Electronic Frontier Foundation litigation counsel, Silverglate & Good. Jerry Berman, Director of the ACLU's Project on Information Technology and Communications Policy Fellow, Benton Foundation. Paul Bernstein, columnist, *Trial* mag.; Electronic Bar Assn. Legal Info. Network administrator; LawMUG BBS sysop; edits on-line lawyers' newsletter. Sally Bowman, promotes responsible computing practices through school teaching units; Director, Computer Learning Foundation. David Burnham, author, *Rise of the Computer State*; former New York Times investigative reporter; specialist in IRS & Freedom of Information Act. Mary Culnan, co-authored major credit reporting policies presented to Congress; School of Business Administration, Georgetown University. Dorothy Denning, received Aerospace's 1990 Distinguished Lecturer in Computer Security award; author, *Cryptography & Data Security*. Peter Denning, Editor, 1990 *Computers Under Attack*; past President, ACM; founding Director, RIACS; editor, *Communications of the ACM*. Dave Farber, co-founder, CSNET; member, National Research Council's Computer Science & Telecommunications Board; University of Pennsylvania. Cliff Figallo, Director of the WELL (the Whole Earth 'Lectronic Link), one of the best-reputed of the public teleconferencing systems. David Flaherty, Canadian surveillance expert, Professor of History and Law at the University of Western Ontario. John Ford, Public Relations Director for Equifax, one of the nation's largest providers of personal and credit information. Bob Gellman, Chief Counsel, U.S. House of Representatives Governmental Information Subcommittee. Janlori Goldman, Director of the ACLU's Project on Privacy and Technology, Washington, DC. Harry Hammit, Editor, Access Reports, focusing on access to and freedom of information, Washington, DC. Martin Hellman, identified potential hazards in federal DES national encryption standard; co-invented public-key encryption; Stanford. Evan Hendricks, Editor/Publisher *Privacy Times* newsletter, Washington, DC. Lance Hoffman, public policy researcher and Professor of Electrical Engineering & Computer Science at George Washington University. Don Ingraham, wrote the first-ever search warrant for magnetic media, computer crime prosecutor; Asst. District Attorney, Alameda County. Bob Jacobson, former Prin. Consultant, California State Assembly Utilities & Commerce Committee; drafted landmark computer communications legislation. Mitch Kapor, co-founder, Electronic Frontier Foundation; founder, Lotus Corp.; received DPMA's 1990 Distinguished Information Science Award. Tom Mandel, Director of the Leading Edge Values & Lifestyles Program at SRI International. John McMullen, well-known on-line journalist; co-authors "Newsbytes" column on GEnie and Online America. Peter Neumann, member, National Research Councils's 1990 *Computers at Risk* comm.; Chair, ACM Comm.on Computers & Public Policy; moderates RISKS Forum. Donn Parker, perhaps the best-known international consultant and author on information security and computer crime, SRI International. Ron Plesser, former General Counsel, U.S. Privacy Protection Study Commission; attorney, Piper & Marbury, Washington DC. John Quarterman, author of the definitive study, *The Matrix: Computer Networks and Conferencing Systems Worldwide*; Texas Internet Consulting. Jack Rickard, Editor of *Boardwatch* magazine, perhaps the best news source about computer bulletin boards; runs online information service. Tom Riley, Canadian specialist in international computer communications and privacy issues; Riley Information Services, Inc. Lance Rose, co-author of *Syslaw*, about the law applied to on-line situations; attorney, Wallace & Rose. Marc Rotenberg, expert in federal computer and privacy law; Computer Professionals for Social Responsibility, Washington office Director. Noel Shipman, attorney for plaintiffs in electronic-mail privacy landmark 1990 litigation against Epson America. Harvey Silverglate, Electronic Frontier Foundation litigation counsel, specialist in criminal defense and civil rights, Silverglate & Good. Gail Thackeray, computer crime prosecutor; involved in Secret Service's "Operation Sun Devil", former Arizona Asst. State Attorney General. Robert Veeder, Acting Chief, Information Policy Branch, Office of Information Regulatory Affairs, U.S. Office of Management & Budget (OMB). Willis Ware, Chair, U.S. Computer Systems Security & Privacy Advisory Board established by Congress in 1987; Fellow, RAND Corporation. Alan Westin, leader in early privacy legislation; co-authored landmark *Equifax Report on Consumers in the Information Age*; Columbia University. Sheldon Zenner, former federal prosecutor in Chicago; defended *Phrack* electronic publisher, Craig Neidorf; Katten, Muchin & Zavis. CONFERENCE CHAIR Jim Warren, Autodesk, Inc. & MicroTimes 415-851-7075, jwa...@well.sf.ca.us / e-mail PROGRAM COMMITTEE Dorothy Denning, Digital Equipment Corporation Peter Denning, Research Inst. for Advanced Comp.Sci. Les Earnest, Midpeninsula ACLU & Stanford U., ret. Elliot Fabric, Attorney at Law Mark Graham, Pandora Systems Don Ingraham, Alameda County District AttyUs Office Bruce Koball, Motion West Marc Rotenberg, Comp. Prof. for Social Responsibility Glenn Tenney, Fantasia Systems & The Hackers Conf. ADVISORS Ron Anderson, ACM SIGCAS & Univ. of Minnesota John Perry Barlow, Electronic Frontier Foundation Jerry Berman, ACLU & Benton Foundation Dave Caulkins, USSR GlasNet Vint Cerf, Corp.for National Research Initiatives Margaret Chambers, Electronic Networking Assn. Steve Cisler, Apple Computer, Inc. Whit Diffie, Northern Telecom Mary Eisenhart, MicroTimes Dave Farber, University of Pennsylvania Cliff Figallo, The WELL John Gilmore, Cygnus Support Adele Goldberg, ParcPlace Systems Terry Gross, Rabinowitz, Boudin, Standard, et al Keith Henson, consultant & Alcor Lance Hoffman, George Washington University Dave Hughes, Chariot Communications Bob Jacobson, Human Interface Technology Lab. Mitch Kapor, Electronic Frontier Foundation Roger Karraker, Santa Rosa College Tom Mandel, SRI International John McMullen, NewsBytes Peter Neumann, SRI International Dave Redell, Digital Equipment Corporation Ken Rosenblattt, Santa Clara Cnty. Dist. Atty's Office Paul Saffo, Institute for the Future Gail Thackeray, Arizona Attorney GeneralUs Office Jay Thorwaldson, Palo Alto Medical Foundation Terry Winograd, CPSR & Stanford University Sheldon Zenner, Katten, Muchin, & Zavis Affiliations are listed only for identification purposes. **************************** * Application to Attend * **************************** First Conference on Computers, Freedom & Privacy, March 25-28, 1991 Monday: Tutorials, Tuesday-Thursday: Conference Sessions & Banquets SFO Marriott Hotel, 1800 Old Bayshore Hwy., Burlingame CA 94010 For hotel reservations at a special $99 Conference rate, call: (800)228-9290 Due to the size of the facility, Conference registration is limited to 600 people. Tutorials registration is also limited. Balanced participation from all of the diverse interest groups is being actively encouraged. Interested individuals should apply early to assure acceptance. Applications will be accepted primarily on a first-come, first-served basis, while encouraging balanced participation. REGISTRATION FEES: If payment received: by Feb.8 2/8-3/15 after 3/15 Conference (3 days, incl.luncheons, banquets) $295 $350 $400 Tutorials (full day, 1 or 2 seminars) $95 $145 $195 Please circle fee and date selections. Please make checks payable to "Computers, Freedom & Privacy / CPSR". Please do not send cash. (If space is sold out, the uncashed check will be voided and promptly returned.) Check the "[x]" if information should NOT appear in the published Attendee Roster. (Roster will greatly assist ongoing communications.) [ ] name: [ ] title: [ ] organization: [ ] mailing address: [ ] city ST Zip: [ ] phone(s): [ ] fax: [ ] e-mail: Name-tag name: Name-tag title: Name-tag organization: Expect to stay at SFO Marriott? [ ]yes [ ]no To aid in balancing participation among groups, please check all significantly applicable items. [ ] user of computers or computer networking [ ] user of electronic-mail services [ ] user of teleconferencing services [ ] user of direct marketing services [ ] user of computerized personal information [ ] user of government information [ ] computer professional [ ] BBS sysop (bulletin board system operator) [ ] systems administrator / infosystems manager [ ] network administrator [ ] computer / communications security specialist [ ] provider of data communications services [ ] provider of electronic-mail services [ ] provider of teleconferencing services [ ] provider of direct marketing services [ ] provider of computerized personal information [ ] provider of government information [ ] legislative official or staffqfederalqstate [ ] regulatory official or staff [ ]federal [ ]state [ ] law enforcement [ ]federal [ ]state [ ]local [ ] prosecutor [ ]federal [ ]state [ ]local [ ] judicial representative [ ]federal [ ]state [ ]local [ ] criminal defense attorney [ ] corporate or litigation attorney [ ] civil liberties specialist [ ] journalist [ ]newspaper [ ]television [ ]radio [ ]other [ ] other: [ ] other: Privacy Notice: This information will not be sold, rented, loaned, exchanged or used for any purpose other than official CPSR activity. CPSR may elect to send information about other activities, but such mailings will always originate with CPSR. Please mail form and payment to Conference office: CFP Conference, 345 Swett Road, Woodside CA 94062 e-mail: c...@well.sf.ca.us; fax: (415)851-2814 Conference Chair: Jim Warren, (415)851-7075 Sponsor: Computer Professionals for Social Responsibility, (415)322-3778 a nonprofit, educational corporation [Internal Revenue Code 501(c)(3)] OTHER INFORMATION ABOUT THIS PREMIER CONFERENCE -- This is an intensive, multi-disciplinary survey Conference for those concerned with computing, teleconferencing, electronic mail, computerized personal information, direct marketing information, government data, etc. - -- and those concerned with computer-related legislation, regulation, computer security, law enforcement and national and international policies that impact civil liberties, responsible exercise of freedom and equitable protection of privacy in this global Information Age. For the first time, this 4-day event will bring together representatives from all of these groups and more, all in one place, all at one time. Many of the recognized leaders and strongest advocates among the various groups interested in the issues of the conference will discuss their concerns and proposals. Attendance will be limited to 600 people. Balanced representation from the diverse groups interested in these issues is being encouraged. Please see the enclosed application for details. To inform participants about topics beyond their specialties, a number of half-day seminars are scheduled in parallel for the first day (Monday, March 25th). These tutorials will explore relevant issues in computing, networking, civil liberties, regulation, the law and law enforcement. Each tutorial is designed for those who are experienced in one area, but are less expert in the tutorials' topics. To explore the interactions and ramifications of the issues, conference talks and panel discussions are scheduled in a single track for the remaining three days (Tuesday-Thursday, March 26th-28th). These will emphasize balanced representation of all major views, especially including probing questions and discussion. Explicit Conference events to foster communication across disciplines are planned. Working luncheons, major breaks and two evening banquets will further encourage individual and small-group discussions. Please copy, post & circulate! [version 2.7, updated 1/26/91] -- John Gilmore {sun,pacbell,uunet,pyramid}!hoptoad!gnu g...@toad.com Just say no to thugs. The ones who lock up innocent drug users come to mind.