* THE FIRST CONFERENCE ON COMPUTERS, FREEDOM & PRIVACY * (submitted by Tom Jennings, fidonet 1:125/111 uucp ...hoptoad!kumr!anomaly!tom.jennings) Pursuing Policies for the Information Age in the Bicentennial Year of the Bill of Rights Tutorials & Invitational Conference, Limited to 600 Participants Monday-Thursday, March 25-28, 1991 Airport SFO Marriott Hotel, Burlingame, California (San Francisco ¨ Peninsula) Co-sponsors & cooperating organizations include Institute of Electrical and Electronics Engineers-USA Association for Computing Machinery Electronic Networking Association Electronic Frontier Foundation Videotex Industry Association Cato Institute American Civil Liberties Union ACM Special Interest Group on Software IEEE-USA Intellectual Property Committee ACM Special Interest Group on Computers and Society ACM Committee on Scientific Freedom and Human Rights IEEE-USA Committee on Communications and Information Policy Autodesk, Inc. The WELL Portal Communications Sponsored by the Computer Professionals for Social Responsibility A nonprofit educational corporation (415)322-3778, e-mail: cfp@well.sf.ca.us. fax: (415)851-2814 ABOUT COMPUTERS, FREEDOM & PRIVACY ---------------------------------- We are at a crossroads as individuals, organizations and¨ governments depend more and more on computers and computer¨ networks. Within ten years, most global information will be¨ collected and utilized electronically. The 1990's are the pivotal¨ decade in which statutes, policies and judicial precedents will¨ be developed for controlling access, use -- and abuse -- of¨ computerized information and electronic mail. Current government and private-sector policies are an¨ uncoordinated jumble, created as each group evolves ways to¨ collect, manipulate, extract, share and protect computerized and¨ networked information and services. Data on individuals and groups is being computerized by numerous¨ agencies, organizations and special interests, often without the¨ knowledge or approval of those it concerns, and with varying¨ degrees of accuracy. Computers can greatly assist individuals, organizations and¨ government in making sound decisions based on efficient access to¨ adequate information -- for personal benefit, business¨ improvement and national well-being. Or, inappropriate use and regulation can seriously threaten¨ fundamental freedoms, personal privacy, and the democratic¨ processes that are at the very foundation of this nation and of¨ any free society. ABOUT THE CONFERENCE SESSIONS (Tuesday-Thursday, March 26th-28th) ----------------------------------------------------------------- PLENARY SPEAKERS: * Laurence H. Tribe, Professor of Constitutional Law, Harvard Law¨ School, offering major policy proposals in the opening Conference¨ session, "The Constitution in Cyberspace: Law & Liberty Beyond¨ the Electronic Frontier". * Eli M. Noam, Director of the Center for Telecommunications and¨ Information Studies, Columbia University, and a recognized leader¨ in telecommunications regulation, international communications¨ policies and economics, will discuss, "Network Environments of¨ the Future: Reconciling Free Speech and Freedom of Association." * William A. Bayse, Assistant Director, FBI Technical Services¨ Division, Washington DC, providing perspectives on "Balancing¨ Computer Security Capabilities with Privacy and Integrity" at the¨ Wednesday evening banquet. THE CONFERENCE SESSIONS offer diverse speakers & panel¨ discussions: Trends in Computers & Networks. Overview and prognosis of computing capabilities and networking¨ as they impact personal privacy, confidentiality, security, one-to-one & many-to-one communications, and access to¨ information about government, business and society. International Perspectives & Impacts. Other nationsU models for protecting personal information and¨ communications, and granting access to government information;¨ existing and developing laws; requirements for trans-national¨ dataflow and their implications; impacts on personal expression;¨ accountability. Personal Information & Privacy. Government and private collection, sharing, marketing,¨ verification, use, protection of, access to and responsibility¨ for personal data, including buying patterns, viewing habits,¨ lifestyle, work, health, school, census, voter, tax, financial¨ and consumer information. Law Enforcement Practices & Problems. Issues relating to investigation, prosecution, due process and¨ deterring computer crimes, now and in the future; use of¨ computers to aid law enforcement. Law Enforcement & Civil Liberties. Interaction of computer crime, law enforcement and civil¨ liberties; issues of search, seizure and sanctions, especially as¨ applied to shared or networked information, software and¨ equipment. Legislation & Regulation. Legislative and regulatory roles in protecting privacy and¨ insuring access; legal problems posed by computing and computer¨ networks; approaches to improving related government processes. Computer-based Surveillance of Individuals. Monitoring electronic-mail, public & private teleconferences,¨ electronic bulletin boards, publications and subscribers;¨ monitoring individuals, work performance, buying habits and¨ lifestyles. Electronic Speech, Press & Assembly. Freedoms and responsibilities regarding electronic speech,¨ public and private electronic assembly, electronic publishing,¨ prior restraint and chilling effects of monitoring. Access to Government Information. Implementing individual and corporate access to federal, state &¨ local information about communities, corporations, legislation,¨ administration, the courts and public figures; allowing access¨ while protecting confidentiality. Ethics & Education. Ethical principles for individuals, system administrators,¨ organizations, corporations and government; copying of data,¨ copying of software, distributing confidential information;¨ relations to computer education and computer law. Where Do We Go From Here? [closing session] Perspectives, recommendations and commitments of participants¨ from the major interest groups, proposed next steps to protect¨ personal privacy, protect fundamental freedoms and encourage¨ responsible policies and action. Also: Tuesday and Wednesday will include structured opportunities for¨ attendees to identify groups with whom they want to establish¨ contact and, if they wish, announce topics they would like to¨ discuss, one on one. ABOUT THIS PREMIER EVENT ------------------------ This is an intensive, multi-disciplinary survey Conference for¨ those concerned with computing, teleconferencing, electronic¨ mail, computerized personal information, direct marketing¨ information, government data, etc. -- and those concerned with¨ computer-related legislation, regulation, computer security, law¨ enforcement and national and international policies that impact¨ civil liberties, responsible exercise of freedom and equitable¨ protection of privacy in this global Information Age. For the first time, this four-day invitational event will bring¨ together representatives from all of these groups and more, all¨ in one place, all at one time. Many of the recognized leaders and strongest advocates¨ representing the various groups having an interest in the issues¨ of the conference will discuss their concerns and proposals. A maximum of 600 applicants will be invited to attend. Balanced¨ representation from the diverse groups interested in these issues¨ is being encouraged. Please see the enclosed Invitation¨ Application for details. To inform participants about topics beyond their specialties,¨ half-day seminars are scheduled for the first day (Monday, March¨ 25th). These parallel tutorials will explore relevant issues in¨ computing, networking, civil liberties, regulation, the law and¨ law enforcement. Each tutorial is designed for those who are¨ experienced in one area, but are less knowledgeable in the¨ subject of that tutorial. To explore the interactions and ramifications of the issues,¨ conference talks and panel discussions are scheduled for the¨ remaining three days (Tuesday-Thursday, March 26th-28th). These¨ will emphasize balanced representation of all major views,¨ especially including probing questions and discussion. Explicit Conference events to foster communication across¨ disciplines are planned. Working luncheons, major breaks and two¨ evening banquets will further encourage individual and small­ group discussions. ABOUT JUST *SOME* OF THE SPEAKERS IN THE 3-DAY CONFERENCE --------------------------------------------------------- Ken Allen, Senior Vice President for Governmental Relations,¨ Information Industries Association (IIA). Sharon Beckman, civil rights and criminal defense attorney and¨ Electronic Frontier Foundation litigation counsel, Silverglate &¨ Good. Jerry Berman, Director of the ACLU's Project on Information¨ Technology and Communications Policy Fellow, Benton Foundation. Paul Bernstein, columnist, Trial magazine; Electronic Bar Assn.¨ Legal Info. Network administrator; LawMUG BBS sysop; edits on­ line lawyers' newsletter. Sally Bowman, promotes responsible computing practices through¨ school teaching units; Director, Computer Learning Foundation. David Burnham, author, *Rise of the Computer State*; former *New¨ York Times* investigative reporter; specialist in IRS & Freedom¨ of Information Act. Mary Culnan, co-authored major credit reporting policies¨ presented to Congress; School of Business Administration,¨ Georgetown University. Peter Denning, Editor, 1990 *Computers Under Attack*; past Pres.,¨ ACM; founding Director, RIACS; editor, *Communications of the¨ ACM*. Dorothy Denning, received Aerospace's 1990 Distinguished Lecturer¨ in Computer Security award; author, *Cryptography & Data¨ Security*. Dave Farber, co-founder, CSNET; member, National Research¨ Council's Computer Science & Telecommunications Board; University¨ of Pennsylvania. Cliff Figallo, Chief Executive Officer and Director of the WELL¨ (the Whole Earth 'Lectronic Link). David Flaherty, Canadian surveillance expert, Professor of¨ History & Law at the University of Western Ontario. John Ford, Public Relations Director for Equifax, one of the¨ nation's largest maintainers of information on individuals. Bob Gellman, Chief Counsel, U.S. House of Representatives¨ Governmental Information Subcommittee. Janlori Goldman, Director, ACLU Project on Privacy & Technology,¨ Washington, DC. Harry Hammit, Editor, *Access Reports*, focusing on access to¨ information. Martin Hellman, identified potential hazards in federal DES¨ national encryption standard; co-invented public-key encryption;¨ Stanford University. Evan Hendricks, Editor & Publisher of *Privacy Times* newsletter. Lance Hoffman, public policy researcher and Professor of¨ Electrical Engineering & Computer Science at George Washington¨ University. Don Ingraham, wrote the first-ever search warrant for magnetic¨ media, computer crime prosecutor; Asst. District Attorney,¨ Alameda County. Bob Jacobson, former Principal Consultant, Calif. State Assembly¨ Utilities and Commerce Committee; drafted landmark comp.¨ communications legislation. Mitch Kapor, co-founder, Electronic Frontier Foundation; founder,¨ Lotus Corp.; received DPMA's 1990 Distinguished Information¨ Science Award. Tom Mandel, Director of the Leading Edge Values & Lifestyles¨ Program at SRI International. John McMullen, well-known on-line journalist; co-authors¨ "Newsbytes" column on GEnie and Online America. Peter Neumann, member, National Research Council's 1990¨ *Computers at Risk* committee; Chair, ACM Comm.on Computers &¨ Public Policy; hosts RISKS Forum. Donn Parker, perhaps the best-known international consultant and¨ author on information security and computer crime, SRI¨ International. Ron Plesser, former majority party congressional committee¨ counsel; privacy expert; attorney, Piper & Marbury. John Quarterman, author, Digital Press' definitive *The Matrix:¨ Computer Networks and Conferencing Systems Worldwide*; networking¨ consultant. Jack Rickard, Editor of *Boardwatch* magazine, perhaps the best¨ news source about computer bulletin boards; Online Information¨ Service. Tom Riley, Canadian specialist in international computing and¨ privacy issues; Riley & Associates. Lance Rose, co-author of *Syslaw*, about the law applied to on-line situations; attorney, Wallace & Rose. Marc Rotenberg, expert in federal computer and privacy law;¨ Computer Professionals for Social Responsibility, Washington¨ office Director. Noel Shipman, attorney for plaintiffs in electronic-mail privacy¨ landmark 1990 litigation against Epson America. Harvey Silverglate, Electronic Frontier Foundation litigation¨ counsel, specialist in criminal defense and civil rights,¨ Silverglate & Good. Gail Thackeray, computer crime prosecutor; involved in Secret¨ Service's 1990 "Operation Sun Devil", Arizona Asst. State¨ Attorney General. Robert Veeder, Acting Chief, Information Policy Branch, Office of¨ Information Regulatory Affairs, OMB (Office of Management &¨ Budget). Willis Ware, computer security expert; Fellow, RAND Corporation. Sheldon Zenner, former federal prosecutor in Chicago; defended¨ *Phrack* electronic publisher, Craig Neidorf; Katten, Muchin &¨ Zavis. ABOUT THE LOW-COST TUTORIALS (Monday, March 25th) ------------------------------------------------- Seminars on the first day offer introductions to the different¨ disciplines that intersect in this conference. These are surveys¨ for individuals not already expert in the topics presented. ¨ These half-day tutorials are scheduled in four parallel tracks: Global Communications & the Worldwide Computer Matrix. ¨ [morning*] Survey of electronic-mail & teleconferencing services, global¨ information access, remote services and the matrix of networks. Low-Cost Computer Networking & Computer Bulletin Board Systems. ¨ [afternoon*] Reviews e-mail, bulletin board and teleconferencing alternatives¨ on personal computers; outlines low-cost PC-based networks and¨ their gateways to the global matrix. -- Mark Graham*, co-founder¨ of Institute for Global Communications, PeaceNet and EcoNet;¨ Pandora Systems Current & Proposed International Policies. [morning*] Law and regulation that will or may impact trans-border data-flow and computer communications, impacting U.S. information¨ practices and international business. Federal Legislation Impacting Computer Use. [afternoon*] Detailed review of landmark federal statutes impacting access to¨ information, privacy of information, computer security and¨ computer crime. -- Marc Rotenberg*, former congressional counsel¨ and expert on federal legislation, CPSR, Washington DC. How Computer Crackers Crack! [morning*] Suggested by a deputy district attorney specializing in high-tech crime, this is for law enforcement officials,¨ prosecutors, systems administrators and Bulletin Board System¨ (BBS) sysops. -- Russell Brand*, computer security specialist;¨ programmer with Reasoning Systems, Palo Alto CA. How Computer Crime is Investigated. [afternoon*] This reviews investigation, search, seizure and¨ evidence requirements for pursuing computer crime. It is for¨ computer users, computer owners, BBS sysops and investigators¨ unfamiliar with computer crime practices. Information Security. [afternoon*] Survey for systems managers of internal and external threats,¨ security measures, alternatives and other computer and data¨ security issues. -- Donn Parker*, a leading consultant in¨ information security and computer crime, SRI International. * - Lecturers, descriptions and times were confirmed as of¨ 1/8/91, but may be subject to change. CONFERENCE CHAIR Jim Warren, Autodesk, Inc. & *MicroTimes* 415-851-7075, jwarren@well.sf.ca.us / e-mail PROGRAM COMMITTEE Dorothy Denning, Digital Equipment Corporation Peter Denning, Research Institute for Advanced Computer Science Les Earnest, SF Peninsula ACLU & Stanford University, ret. Elliot Fabric, Attorney at Law Mark Graham, Pandora Systems Don Ingraham, Alameda County District AttorneyUs Office Bruce Koball, Motion West Marc Rotenberg, Computer Professionals for Social Responsibility Glenn Tenney, Fantasia Systems & Hacker's Conference ADVISORS Ron Anderson, ACM SIGCAS & University of Minnesota John Perry Barlow, Electronic Frontier Foundation Jerry Berman, ACLU & Benton Foundation Dave Caulkins, USSR GlasNet Vint Cerf, Corporation for National Research Initiatives Margaret Chambers, Electronic Networking Association Steve Cisler, Apple Computer, Inc. Whit Diffie, Northern Telecom Mary Eisenhart, *MicroTimes* Dave Farber, University of Pennsylvania Cliff Figallo, The WELL John Gilmore, Cygnus Support Adele Goldberg, ParcPlace Systems Terry Gross, Rabinowitz, Boudin, Standard, et al Keith Henson, consultant & Alcor Lance Hoffman, George Washington University Dave Hughes, Chariot Communications Bob Jacobson, Human Interface Technology Laboratory Mitch Kapor, Electronic Frontier Foundation Roger Karraker, Santa Rosa College Tom Mandel, SRI International John McMullen, NewsBytes Peter Neumann, SRI International Dave Redell, Digital Equipment Corporation Ken Rosenblattt, Santa Clara County District Attorney's Office Paul Saffo, Institute for the Future Gail Thackeray, Arizona Attorney GeneralUs Office Jay Thorwaldson, Palo Alto Medical Foundation Terry Winograd, CPSR & Stanford University Sheldon Zenner, Katten, Muchin, & Zavis Affiliations listed only for identification ============================ = Request for Invitation = ============================ First Conference on Computers, Freedom & Privacy March 25-28, 1991 Monday: Tutorials, Tuesday-Thursday: Conference Sessions SFO Marriott Hotel, 1800 Old Bayshore Hwy., Burlingame CA 94010 For hotel reservations at Conference rates, call: (800)228-9290¨ #3 ** Invitational Conference, limted to 600 participants. ** To¨ facilitate useful dialogue and balanced participation by¨ representatives from all of the diverse groups interested in¨ these issues, attendance is limited. (The capacity of the¨ Conference facility is similarly limited). All interested individuals are encouraged to request an¨ invitation. Invitations will be primarily issued on a first-come,¨ first-served basis within each major interest group. Fees if payment is received by: Jan.31 -Mar.15 after Mar.15 Tutorials (full day) $ 95 $ 145 $ 195 Conference (3 days) $ 295 $ 350 $ 400 Conference Registration fee includes three luncheons, two banquet¨ meetings and selected handouts. Please make checks payable to¨ "Computers, Freedom & Privacy/CPSR". Please don't send cash. ¨ Invitations will be promptly issued, or the uncashed check will¨ be voided and promptly returned. Please type or print. Thank ye, kindly. name: title: organization: mailing address: city, state ZIP: phone(s): fax: e-mail: Comments to assist in evaluating this request: To aid in balancing participation among groups, please check all significantly applicable items. [ ] user of computers or computer networking [ ] user of electronic-mail services [ ] user of teleconferencing services [ ] user of direct marketing services [ ] user of computerized personal information [ ] user of government information [ ] computer professional [ ] BBS sysop (bulletin board system operator) [ ] systems administrator / infosystems manager [ ] network administrator [ ] computer / communications security specialist [ ] provider of data communications services [ ] provider of electronic-mail services [ ] provider of teleconferencing services [ ] provider of direct marketing services [ ] provider of computerized personal information [ ] provider of government information [ ] legislative official [ ] federal [ ] state [ ] regulatory official or staff [ ] federal [ ] state [ ] law enforcement offi [ ] federal [ ] state [ ] local [ ] prosecutor [ ] federal [ ] state [ ] local [ ] judicial representat [ ] federal [ ] state [ ] local [ ] criminal defense attorney [ ] corporate or litigation attorney [ ] civil liberties specialist [ ] journalist [ ] newspaper [ ] television [ ] radio [ ] other [ ] other: [ ] other: <<1/7/91>> Please mail form and payment to: CFP Conference, 345 Swett Road, Woodside CA 94062 Privacy Notice: This information will not be sold, rented,¨ loaned, exchanged or used for any purpose other than official¨ CPSR activity. CPSR may elect to send information about other¨ activities, but such mailings will always originate with CPSR. Sponsor: Computer Professionals for Social Responsibility,¨ (415)322-3778 A nonprofit, educational corporation [ Internal¨ Revenue Code 501(c)(3) ] e-mail: cfp@well.sf.ca.us; fax: (415)851-2814 Chair: Jim Warren, (415)851-7075 Please copy, post & circulate!