* THE FIRST CONFERENCE ON COMPUTERS, FREEDOM & PRIVACY * (submitted by Tom Jennings, fidonet 1:125/111 uucp ...hoptoad!kumr!anomaly!tom.jennings) Pursuing Policies for the Information Age in the Bicentennial Year of the Bill of Rights Tutorials & Invitational Conference, Limited to 600 Participants Monday-Thursday, March 25-28, 1991 Airport SFO Marriott Hotel, Burlingame, California (San Francisco Ť Peninsula) Co-sponsors & cooperating organizations include Institute of Electrical and Electronics Engineers-USA Association for Computing Machinery Electronic Networking Association Electronic Frontier Foundation Videotex Industry Association Cato Institute American Civil Liberties Union ACM Special Interest Group on Software IEEE-USA Intellectual Property Committee ACM Special Interest Group on Computers and Society ACM Committee on Scientific Freedom and Human Rights IEEE-USA Committee on Communications and Information Policy Autodesk, Inc. The WELL Portal Communications Sponsored by the Computer Professionals for Social Responsibility A nonprofit educational corporation (415)322-3778, e-mail: cfp@well.sf.ca.us. fax: (415)851-2814 ABOUT COMPUTERS, FREEDOM & PRIVACY ---------------------------------- We are at a crossroads as individuals, organizations andŤ governments depend more and more on computers and computerŤ networks. Within ten years, most global information will beŤ collected and utilized electronically. The 1990's are the pivotalŤ decade in which statutes, policies and judicial precedents willŤ be developed for controlling access, use -- and abuse -- ofŤ computerized information and electronic mail. Current government and private-sector policies are anŤ uncoordinated jumble, created as each group evolves ways toŤ collect, manipulate, extract, share and protect computerized andŤ networked information and services. Data on individuals and groups is being computerized by numerousŤ agencies, organizations and special interests, often without theŤ knowledge or approval of those it concerns, and with varyingŤ degrees of accuracy. Computers can greatly assist individuals, organizations andŤ government in making sound decisions based on efficient access toŤ adequate information -- for personal benefit, businessŤ improvement and national well-being. Or, inappropriate use and regulation can seriously threatenŤ fundamental freedoms, personal privacy, and the democraticŤ processes that are at the very foundation of this nation and ofŤ any free society. ABOUT THE CONFERENCE SESSIONS (Tuesday-Thursday, March 26th-28th) ----------------------------------------------------------------- PLENARY SPEAKERS: * Laurence H. Tribe, Professor of Constitutional Law, Harvard LawŤ School, offering major policy proposals in the opening ConferenceŤ session, "The Constitution in Cyberspace: Law & Liberty BeyondŤ the Electronic Frontier". * Eli M. Noam, Director of the Center for Telecommunications andŤ Information Studies, Columbia University, and a recognized leaderŤ in telecommunications regulation, international communicationsŤ policies and economics, will discuss, "Network Environments ofŤ the Future: Reconciling Free Speech and Freedom of Association." * William A. Bayse, Assistant Director, FBI Technical ServicesŤ Division, Washington DC, providing perspectives on "BalancingŤ Computer Security Capabilities with Privacy and Integrity" at theŤ Wednesday evening banquet. THE CONFERENCE SESSIONS offer diverse speakers & panelŤ discussions: Trends in Computers & Networks. Overview and prognosis of computing capabilities and networkingŤ as they impact personal privacy, confidentiality, security, one-to-one & many-to-one communications, and access toŤ information about government, business and society. International Perspectives & Impacts. Other nationsU models for protecting personal information andŤ communications, and granting access to government information;Ť existing and developing laws; requirements for trans-nationalŤ dataflow and their implications; impacts on personal expression;Ť accountability. Personal Information & Privacy. Government and private collection, sharing, marketing,Ť verification, use, protection of, access to and responsibilityŤ for personal data, including buying patterns, viewing habits,Ť lifestyle, work, health, school, census, voter, tax, financialŤ and consumer information. Law Enforcement Practices & Problems. Issues relating to investigation, prosecution, due process andŤ deterring computer crimes, now and in the future; use ofŤ computers to aid law enforcement. Law Enforcement & Civil Liberties. Interaction of computer crime, law enforcement and civilŤ liberties; issues of search, seizure and sanctions, especially asŤ applied to shared or networked information, software andŤ equipment. Legislation & Regulation. Legislative and regulatory roles in protecting privacy andŤ insuring access; legal problems posed by computing and computerŤ networks; approaches to improving related government processes. Computer-based Surveillance of Individuals. Monitoring electronic-mail, public & private teleconferences,Ť electronic bulletin boards, publications and subscribers;Ť monitoring individuals, work performance, buying habits andŤ lifestyles. Electronic Speech, Press & Assembly. Freedoms and responsibilities regarding electronic speech,Ť public and private electronic assembly, electronic publishing,Ť prior restraint and chilling effects of monitoring. Access to Government Information. Implementing individual and corporate access to federal, state &Ť local information about communities, corporations, legislation,Ť administration, the courts and public figures; allowing accessŤ while protecting confidentiality. Ethics & Education. Ethical principles for individuals, system administrators,Ť organizations, corporations and government; copying of data,Ť copying of software, distributing confidential information;Ť relations to computer education and computer law. Where Do We Go From Here? [closing session] Perspectives, recommendations and commitments of participantsŤ from the major interest groups, proposed next steps to protectŤ personal privacy, protect fundamental freedoms and encourageŤ responsible policies and action. Also: Tuesday and Wednesday will include structured opportunities forŤ attendees to identify groups with whom they want to establishŤ contact and, if they wish, announce topics they would like toŤ discuss, one on one. ABOUT THIS PREMIER EVENT ------------------------ This is an intensive, multi-disciplinary survey Conference forŤ those concerned with computing, teleconferencing, electronicŤ mail, computerized personal information, direct marketingŤ information, government data, etc. -- and those concerned withŤ computer-related legislation, regulation, computer security, lawŤ enforcement and national and international policies that impactŤ civil liberties, responsible exercise of freedom and equitableŤ protection of privacy in this global Information Age. For the first time, this four-day invitational event will bringŤ together representatives from all of these groups and more, allŤ in one place, all at one time. Many of the recognized leaders and strongest advocatesŤ representing the various groups having an interest in the issuesŤ of the conference will discuss their concerns and proposals. A maximum of 600 applicants will be invited to attend. BalancedŤ representation from the diverse groups interested in these issuesŤ is being encouraged. Please see the enclosed InvitationŤ Application for details. To inform participants about topics beyond their specialties,Ť half-day seminars are scheduled for the first day (Monday, MarchŤ 25th). These parallel tutorials will explore relevant issues inŤ computing, networking, civil liberties, regulation, the law andŤ law enforcement. Each tutorial is designed for those who areŤ experienced in one area, but are less knowledgeable in theŤ subject of that tutorial. To explore the interactions and ramifications of the issues,Ť conference talks and panel discussions are scheduled for theŤ remaining three days (Tuesday-Thursday, March 26th-28th). TheseŤ will emphasize balanced representation of all major views,Ť especially including probing questions and discussion. Explicit Conference events to foster communication acrossŤ disciplines are planned. Working luncheons, major breaks and twoŤ evening banquets will further encourage individual and small group discussions. ABOUT JUST *SOME* OF THE SPEAKERS IN THE 3-DAY CONFERENCE --------------------------------------------------------- Ken Allen, Senior Vice President for Governmental Relations,Ť Information Industries Association (IIA). Sharon Beckman, civil rights and criminal defense attorney andŤ Electronic Frontier Foundation litigation counsel, Silverglate &Ť Good. Jerry Berman, Director of the ACLU's Project on InformationŤ Technology and Communications Policy Fellow, Benton Foundation. Paul Bernstein, columnist, Trial magazine; Electronic Bar Assn.Ť Legal Info. Network administrator; LawMUG BBS sysop; edits on line lawyers' newsletter. Sally Bowman, promotes responsible computing practices throughŤ school teaching units; Director, Computer Learning Foundation. David Burnham, author, *Rise of the Computer State*; former *NewŤ York Times* investigative reporter; specialist in IRS & FreedomŤ of Information Act. Mary Culnan, co-authored major credit reporting policiesŤ presented to Congress; School of Business Administration,Ť Georgetown University. Peter Denning, Editor, 1990 *Computers Under Attack*; past Pres.,Ť ACM; founding Director, RIACS; editor, *Communications of theŤ ACM*. Dorothy Denning, received Aerospace's 1990 Distinguished LecturerŤ in Computer Security award; author, *Cryptography & DataŤ Security*. Dave Farber, co-founder, CSNET; member, National ResearchŤ Council's Computer Science & Telecommunications Board; UniversityŤ of Pennsylvania. Cliff Figallo, Chief Executive Officer and Director of the WELLŤ (the Whole Earth 'Lectronic Link). David Flaherty, Canadian surveillance expert, Professor ofŤ History & Law at the University of Western Ontario. John Ford, Public Relations Director for Equifax, one of theŤ nation's largest maintainers of information on individuals. Bob Gellman, Chief Counsel, U.S. House of RepresentativesŤ Governmental Information Subcommittee. Janlori Goldman, Director, ACLU Project on Privacy & Technology,Ť Washington, DC. Harry Hammit, Editor, *Access Reports*, focusing on access toŤ information. Martin Hellman, identified potential hazards in federal DESŤ national encryption standard; co-invented public-key encryption;Ť Stanford University. Evan Hendricks, Editor & Publisher of *Privacy Times* newsletter. Lance Hoffman, public policy researcher and Professor ofŤ Electrical Engineering & Computer Science at George WashingtonŤ University. Don Ingraham, wrote the first-ever search warrant for magneticŤ media, computer crime prosecutor; Asst. District Attorney,Ť Alameda County. Bob Jacobson, former Principal Consultant, Calif. State AssemblyŤ Utilities and Commerce Committee; drafted landmark comp.Ť communications legislation. Mitch Kapor, co-founder, Electronic Frontier Foundation; founder,Ť Lotus Corp.; received DPMA's 1990 Distinguished InformationŤ Science Award. Tom Mandel, Director of the Leading Edge Values & LifestylesŤ Program at SRI International. John McMullen, well-known on-line journalist; co-authorsŤ "Newsbytes" column on GEnie and Online America. Peter Neumann, member, National Research Council's 1990Ť *Computers at Risk* committee; Chair, ACM Comm.on Computers &Ť Public Policy; hosts RISKS Forum. Donn Parker, perhaps the best-known international consultant andŤ author on information security and computer crime, SRIŤ International. Ron Plesser, former majority party congressional committeeŤ counsel; privacy expert; attorney, Piper & Marbury. John Quarterman, author, Digital Press' definitive *The Matrix:Ť Computer Networks and Conferencing Systems Worldwide*; networkingŤ consultant. Jack Rickard, Editor of *Boardwatch* magazine, perhaps the bestŤ news source about computer bulletin boards; Online InformationŤ Service. Tom Riley, Canadian specialist in international computing andŤ privacy issues; Riley & Associates. Lance Rose, co-author of *Syslaw*, about the law applied to on-line situations; attorney, Wallace & Rose. Marc Rotenberg, expert in federal computer and privacy law;Ť Computer Professionals for Social Responsibility, WashingtonŤ office Director. Noel Shipman, attorney for plaintiffs in electronic-mail privacyŤ landmark 1990 litigation against Epson America. Harvey Silverglate, Electronic Frontier Foundation litigationŤ counsel, specialist in criminal defense and civil rights,Ť Silverglate & Good. Gail Thackeray, computer crime prosecutor; involved in SecretŤ Service's 1990 "Operation Sun Devil", Arizona Asst. StateŤ Attorney General. Robert Veeder, Acting Chief, Information Policy Branch, Office ofŤ Information Regulatory Affairs, OMB (Office of Management &Ť Budget). Willis Ware, computer security expert; Fellow, RAND Corporation. Sheldon Zenner, former federal prosecutor in Chicago; defendedŤ *Phrack* electronic publisher, Craig Neidorf; Katten, Muchin &Ť Zavis. ABOUT THE LOW-COST TUTORIALS (Monday, March 25th) ------------------------------------------------- Seminars on the first day offer introductions to the differentŤ disciplines that intersect in this conference. These are surveysŤ for individuals not already expert in the topics presented. Ť These half-day tutorials are scheduled in four parallel tracks: Global Communications & the Worldwide Computer Matrix. Ť [morning*] Survey of electronic-mail & teleconferencing services, globalŤ information access, remote services and the matrix of networks. Low-Cost Computer Networking & Computer Bulletin Board Systems. Ť [afternoon*] Reviews e-mail, bulletin board and teleconferencing alternativesŤ on personal computers; outlines low-cost PC-based networks andŤ their gateways to the global matrix. -- Mark Graham*, co-founderŤ of Institute for Global Communications, PeaceNet and EcoNet;Ť Pandora Systems Current & Proposed International Policies. [morning*] Law and regulation that will or may impact trans-border data-flow and computer communications, impacting U.S. informationŤ practices and international business. Federal Legislation Impacting Computer Use. [afternoon*] Detailed review of landmark federal statutes impacting access toŤ information, privacy of information, computer security andŤ computer crime. -- Marc Rotenberg*, former congressional counselŤ and expert on federal legislation, CPSR, Washington DC. How Computer Crackers Crack! [morning*] Suggested by a deputy district attorney specializing in high-tech crime, this is for law enforcement officials,Ť prosecutors, systems administrators and Bulletin Board SystemŤ (BBS) sysops. -- Russell Brand*, computer security specialist;Ť programmer with Reasoning Systems, Palo Alto CA. How Computer Crime is Investigated. [afternoon*] This reviews investigation, search, seizure andŤ evidence requirements for pursuing computer crime. It is forŤ computer users, computer owners, BBS sysops and investigatorsŤ unfamiliar with computer crime practices. Information Security. [afternoon*] Survey for systems managers of internal and external threats,Ť security measures, alternatives and other computer and dataŤ security issues. -- Donn Parker*, a leading consultant inŤ information security and computer crime, SRI International. * - Lecturers, descriptions and times were confirmed as ofŤ 1/8/91, but may be subject to change. CONFERENCE CHAIR Jim Warren, Autodesk, Inc. & *MicroTimes* 415-851-7075, jwarren@well.sf.ca.us / e-mail PROGRAM COMMITTEE Dorothy Denning, Digital Equipment Corporation Peter Denning, Research Institute for Advanced Computer Science Les Earnest, SF Peninsula ACLU & Stanford University, ret. Elliot Fabric, Attorney at Law Mark Graham, Pandora Systems Don Ingraham, Alameda County District AttorneyUs Office Bruce Koball, Motion West Marc Rotenberg, Computer Professionals for Social Responsibility Glenn Tenney, Fantasia Systems & Hacker's Conference ADVISORS Ron Anderson, ACM SIGCAS & University of Minnesota John Perry Barlow, Electronic Frontier Foundation Jerry Berman, ACLU & Benton Foundation Dave Caulkins, USSR GlasNet Vint Cerf, Corporation for National Research Initiatives Margaret Chambers, Electronic Networking Association Steve Cisler, Apple Computer, Inc. Whit Diffie, Northern Telecom Mary Eisenhart, *MicroTimes* Dave Farber, University of Pennsylvania Cliff Figallo, The WELL John Gilmore, Cygnus Support Adele Goldberg, ParcPlace Systems Terry Gross, Rabinowitz, Boudin, Standard, et al Keith Henson, consultant & Alcor Lance Hoffman, George Washington University Dave Hughes, Chariot Communications Bob Jacobson, Human Interface Technology Laboratory Mitch Kapor, Electronic Frontier Foundation Roger Karraker, Santa Rosa College Tom Mandel, SRI International John McMullen, NewsBytes Peter Neumann, SRI International Dave Redell, Digital Equipment Corporation Ken Rosenblattt, Santa Clara County District Attorney's Office Paul Saffo, Institute for the Future Gail Thackeray, Arizona Attorney GeneralUs Office Jay Thorwaldson, Palo Alto Medical Foundation Terry Winograd, CPSR & Stanford University Sheldon Zenner, Katten, Muchin, & Zavis Affiliations listed only for identification ============================ = Request for Invitation = ============================ First Conference on Computers, Freedom & Privacy March 25-28, 1991 Monday: Tutorials, Tuesday-Thursday: Conference Sessions SFO Marriott Hotel, 1800 Old Bayshore Hwy., Burlingame CA 94010 For hotel reservations at Conference rates, call: (800)228-9290Ť #3 ** Invitational Conference, limted to 600 participants. ** ToŤ facilitate useful dialogue and balanced participation byŤ representatives from all of the diverse groups interested inŤ these issues, attendance is limited. (The capacity of theŤ Conference facility is similarly limited). All interested individuals are encouraged to request anŤ invitation. Invitations will be primarily issued on a first-come,Ť first-served basis within each major interest group. Fees if payment is received by: Jan.31 -Mar.15 after Mar.15 Tutorials (full day) $ 95 $ 145 $ 195 Conference (3 days) $ 295 $ 350 $ 400 Conference Registration fee includes three luncheons, two banquetŤ meetings and selected handouts. Please make checks payable toŤ "Computers, Freedom & Privacy/CPSR". Please don't send cash. Ť Invitations will be promptly issued, or the uncashed check willŤ be voided and promptly returned. Please type or print. Thank ye, kindly. name: title: organization: mailing address: city, state ZIP: phone(s): fax: e-mail: Comments to assist in evaluating this request: To aid in balancing participation among groups, please check all significantly applicable items. [ ] user of computers or computer networking [ ] user of electronic-mail services [ ] user of teleconferencing services [ ] user of direct marketing services [ ] user of computerized personal information [ ] user of government information [ ] computer professional [ ] BBS sysop (bulletin board system operator) [ ] systems administrator / infosystems manager [ ] network administrator [ ] computer / communications security specialist [ ] provider of data communications services [ ] provider of electronic-mail services [ ] provider of teleconferencing services [ ] provider of direct marketing services [ ] provider of computerized personal information [ ] provider of government information [ ] legislative official [ ] federal [ ] state [ ] regulatory official or staff [ ] federal [ ] state [ ] law enforcement offi [ ] federal [ ] state [ ] local [ ] prosecutor [ ] federal [ ] state [ ] local [ ] judicial representat [ ] federal [ ] state [ ] local [ ] criminal defense attorney [ ] corporate or litigation attorney [ ] civil liberties specialist [ ] journalist [ ] newspaper [ ] television [ ] radio [ ] other [ ] other: [ ] other: <<1/7/91>> Please mail form and payment to: CFP Conference, 345 Swett Road, Woodside CA 94062 Privacy Notice: This information will not be sold, rented,Ť loaned, exchanged or used for any purpose other than officialŤ CPSR activity. CPSR may elect to send information about otherŤ activities, but such mailings will always originate with CPSR. Sponsor: Computer Professionals for Social Responsibility,Ť (415)322-3778 A nonprofit, educational corporation [ InternalŤ Revenue Code 501(c)(3) ] e-mail: cfp@well.sf.ca.us; fax: (415)851-2814 Chair: Jim Warren, (415)851-7075 Please copy, post & circulate!