* THE FIRST CONFERENCE ON COMPUTERS, FREEDOM & PRIVACY *

(submitted by Tom Jennings, fidonet 1:125/111 
uucp ...hoptoad!kumr!anomaly!tom.jennings)

Pursuing Policies for the Information Age in the
Bicentennial Year of the Bill of Rights

Tutorials & Invitational Conference, Limited to 600 Participants

Monday-Thursday, March 25-28, 1991

Airport SFO Marriott Hotel, Burlingame, California (San Francisco Ť
Peninsula)

Co-sponsors & cooperating organizations include
 Institute of Electrical and Electronics Engineers-USA
 Association for Computing Machinery 
 Electronic Networking Association
 Electronic Frontier Foundation 
 Videotex Industry Association
 Cato Institute 
 American Civil Liberties Union
 ACM Special Interest Group on Software
 IEEE-USA Intellectual Property Committee
 ACM Special Interest Group on Computers and Society
 ACM Committee on Scientific Freedom and Human Rights
 IEEE-USA Committee on Communications and Information Policy
 Autodesk, Inc. 
 The WELL 
 Portal Communications

Sponsored by the Computer Professionals for Social Responsibility
 A nonprofit educational corporation
(415)322-3778, e-mail: cfp@well.sf.ca.us. fax: (415)851-2814


ABOUT COMPUTERS, FREEDOM & PRIVACY
----------------------------------

We are at a crossroads as individuals, organizations andŤ
governments depend more and more on computers and computerŤ
networks. Within ten years, most global information will beŤ
collected and utilized electronically. The 1990's are the pivotalŤ
decade in which statutes, policies and judicial precedents willŤ
be developed for controlling access, use -- and abuse -- ofŤ
computerized information and electronic mail.

Current government and private-sector policies are anŤ
uncoordinated jumble, created as each group evolves ways toŤ
collect, manipulate, extract, share and protect computerized andŤ
networked information and services. 

Data on individuals and groups is being computerized by numerousŤ
agencies, organizations and special interests, often without theŤ
knowledge or approval of those it concerns, and with varyingŤ
degrees of accuracy. 

Computers can greatly assist individuals, organizations andŤ
government in making sound decisions based on efficient access toŤ
adequate information -- for personal benefit, businessŤ
improvement and national well-being.

Or, inappropriate use and regulation can seriously threatenŤ
fundamental freedoms, personal privacy, and the democraticŤ
processes that are at the very foundation of this nation and ofŤ
any free society.

ABOUT THE CONFERENCE SESSIONS (Tuesday-Thursday, March 26th-28th)
-----------------------------------------------------------------

PLENARY SPEAKERS:

* Laurence H. Tribe, Professor of Constitutional Law, Harvard LawŤ
School, offering major policy proposals in the opening ConferenceŤ
session, "The Constitution in Cyberspace: Law & Liberty BeyondŤ
the Electronic Frontier".

* Eli M. Noam, Director of the Center for Telecommunications andŤ
Information Studies, Columbia University, and a recognized leaderŤ
in telecommunications regulation, international communicationsŤ
policies and economics, will discuss, "Network Environments ofŤ
the Future: Reconciling Free Speech and Freedom of Association."

* William A. Bayse, Assistant Director, FBI Technical ServicesŤ
Division, Washington DC, providing perspectives on "BalancingŤ
Computer Security Capabilities with Privacy and Integrity" at theŤ
Wednesday evening banquet.


THE CONFERENCE SESSIONS offer diverse speakers & panelŤ
discussions:

Trends in Computers & Networks.
 Overview and prognosis of computing capabilities and networkingŤ
as they impact personal privacy, confidentiality, security, 
one-to-one & many-to-one communications, and access toŤ
information about government, business and
society.

International Perspectives & Impacts.
 Other nationsU models for protecting personal information andŤ
communications, and granting access to government information;Ť
existing and developing laws; requirements for trans-nationalŤ
dataflow and their implications; impacts on personal expression;Ť
accountability.

Personal Information & Privacy.
 Government and private collection, sharing, marketing,Ť
verification, use, protection of, access to and responsibilityŤ
for personal data, including buying patterns, viewing habits,Ť
lifestyle, work, health, school, census, voter, tax, financialŤ
and consumer information.

Law Enforcement Practices & Problems.
 Issues relating to investigation, prosecution, due process andŤ
deterring computer crimes, now and in the future; use ofŤ
computers to aid law enforcement.

Law Enforcement & Civil Liberties.
 Interaction of computer crime, law enforcement and civilŤ
liberties; issues of search, seizure and sanctions, especially asŤ
applied to shared or networked information, software andŤ
equipment.

Legislation & Regulation.
 Legislative and regulatory roles in protecting privacy andŤ
insuring access; legal problems posed by computing and computerŤ
networks; approaches to improving related government processes.

Computer-based Surveillance of Individuals.
 Monitoring electronic-mail, public & private teleconferences,Ť
electronic bulletin boards, publications and subscribers;Ť
monitoring individuals, work performance, buying habits andŤ
lifestyles.

Electronic Speech, Press & Assembly.
 Freedoms and responsibilities regarding electronic speech,Ť
public and private electronic assembly, electronic publishing,Ť
prior restraint and chilling effects of monitoring.

Access to Government Information.
 Implementing individual and corporate access to federal, state &Ť
local information about communities, corporations, legislation,Ť
administration, the courts and public figures; allowing accessŤ
while protecting confidentiality.

Ethics & Education.
 Ethical principles for individuals, system administrators,Ť
organizations, corporations and government; copying of data,Ť
copying of software, distributing confidential information;Ť
relations to computer education and computer law.

Where Do We Go From Here? [closing session]
 Perspectives, recommendations and commitments of participantsŤ
from the major interest groups, proposed next steps to protectŤ
personal privacy, protect fundamental freedoms and encourageŤ
responsible policies and action.

Also:
 Tuesday and Wednesday will include structured opportunities forŤ
attendees to identify groups with whom they want to establishŤ
contact and, if they wish, announce topics they would like toŤ
discuss, one on one.


ABOUT THIS PREMIER EVENT
------------------------

This is an intensive, multi-disciplinary survey Conference forŤ
those concerned with computing, teleconferencing, electronicŤ
mail, computerized personal information, direct marketingŤ
information, government data, etc. -- and those concerned withŤ
computer-related legislation, regulation, computer security, lawŤ
enforcement and national and international policies that impactŤ
civil liberties, responsible exercise of freedom and equitableŤ
protection of privacy in this global Information Age.

For the first time, this four-day invitational event will bringŤ
together representatives from all of these groups and more, allŤ
in one place, all at one time.

Many of the recognized leaders and strongest advocatesŤ
representing the various groups having an interest in the issuesŤ
of the conference will discuss their concerns and proposals.

A maximum of 600 applicants will be invited to attend. BalancedŤ
representation from the diverse groups interested in these issuesŤ
is being encouraged. Please see the enclosed InvitationŤ
Application for details.

To inform participants about topics beyond their specialties,Ť
half-day seminars are scheduled for the first day (Monday, MarchŤ
25th). These parallel tutorials will explore relevant issues inŤ
computing, networking, civil liberties, regulation, the law andŤ
law enforcement. Each tutorial is designed for those who areŤ
experienced in one area, but are less knowledgeable in theŤ
subject of that tutorial.

To explore the interactions and ramifications of the issues,Ť
conference talks and panel discussions are scheduled for theŤ
remaining three days (Tuesday-Thursday, March 26th-28th). TheseŤ
will emphasize balanced representation of all major views,Ť
especially including probing questions and discussion.

Explicit Conference events to foster communication acrossŤ
disciplines are planned. Working luncheons, major breaks and twoŤ
evening banquets will further encourage individual and small­
group discussions.


ABOUT JUST *SOME* OF THE SPEAKERS IN THE 3-DAY CONFERENCE
---------------------------------------------------------

Ken Allen, Senior Vice President for Governmental Relations,Ť
Information Industries Association (IIA).

Sharon Beckman, civil rights and criminal defense attorney andŤ
Electronic Frontier Foundation litigation counsel, Silverglate &Ť
Good.

Jerry Berman, Director of the ACLU's Project on InformationŤ
Technology and Communications Policy Fellow, Benton Foundation.

Paul Bernstein, columnist, Trial magazine; Electronic Bar Assn.Ť
Legal Info. Network administrator; LawMUG BBS sysop; edits on­
line lawyers' newsletter.

Sally Bowman, promotes responsible computing practices throughŤ
school teaching units; Director, Computer Learning Foundation.

David Burnham, author, *Rise of the Computer State*; former *NewŤ
York Times* investigative reporter; specialist in IRS & FreedomŤ
of Information Act.

Mary Culnan, co-authored major credit reporting policiesŤ
presented to Congress; School of Business Administration,Ť
Georgetown University.

Peter Denning, Editor, 1990 *Computers Under Attack*; past Pres.,Ť
ACM; founding Director, RIACS; editor, *Communications of theŤ
ACM*.

Dorothy Denning, received Aerospace's 1990 Distinguished LecturerŤ
in Computer Security award; author, *Cryptography & DataŤ
Security*.

Dave Farber, co-founder, CSNET; member, National ResearchŤ
Council's Computer Science & Telecommunications Board; UniversityŤ
of Pennsylvania.

Cliff Figallo, Chief Executive Officer and Director of the WELLŤ
(the Whole Earth 'Lectronic Link).

David Flaherty, Canadian surveillance expert, Professor ofŤ
History & Law at the University of Western Ontario.

John Ford, Public Relations Director for Equifax, one of theŤ
nation's largest maintainers of information on individuals.

Bob Gellman, Chief Counsel, U.S. House of RepresentativesŤ
Governmental Information Subcommittee.

Janlori Goldman, Director, ACLU Project on Privacy & Technology,Ť
Washington, DC.

Harry Hammit, Editor, *Access Reports*, focusing on access toŤ
information.

Martin Hellman, identified potential hazards in federal DESŤ
national encryption standard; co-invented public-key encryption;Ť
Stanford University.

Evan Hendricks, Editor & Publisher of *Privacy Times* newsletter.

Lance Hoffman, public policy researcher and Professor ofŤ
Electrical Engineering & Computer Science at George WashingtonŤ
University.

Don Ingraham, wrote the first-ever search warrant for magneticŤ
media, computer crime prosecutor; Asst. District Attorney,Ť
Alameda County.

Bob Jacobson, former Principal Consultant, Calif. State AssemblyŤ
Utilities and Commerce Committee; drafted landmark comp.Ť
communications legislation.

Mitch Kapor, co-founder, Electronic Frontier Foundation; founder,Ť
Lotus Corp.; received DPMA's 1990 Distinguished InformationŤ
Science Award.

Tom Mandel, Director of the Leading Edge Values & LifestylesŤ
Program at SRI International.

John McMullen, well-known on-line journalist; co-authorsŤ
"Newsbytes" column on GEnie and Online America.

Peter Neumann, member, National Research Council's 1990Ť
*Computers at Risk* committee; Chair, ACM Comm.on Computers &Ť
Public Policy; hosts RISKS Forum.

Donn Parker, perhaps the best-known international consultant andŤ
author on information security and computer crime, SRIŤ
International.

Ron Plesser, former majority party congressional committeeŤ
counsel; privacy expert; attorney, Piper & Marbury.

John Quarterman, author, Digital Press' definitive *The Matrix:Ť
Computer Networks and Conferencing Systems Worldwide*; networkingŤ
consultant.

Jack Rickard, Editor of *Boardwatch* magazine, perhaps the bestŤ
news source about computer bulletin boards; Online InformationŤ
Service.

Tom Riley, Canadian specialist in international computing andŤ
privacy issues; Riley & Associates.

Lance Rose, co-author of *Syslaw*, about the law applied to 
on-line situations; attorney, Wallace & Rose.

Marc Rotenberg, expert in federal computer and privacy law;Ť
Computer Professionals for Social Responsibility, WashingtonŤ
office Director.

Noel Shipman, attorney for plaintiffs in electronic-mail privacyŤ
landmark 1990 litigation against Epson America.

Harvey Silverglate, Electronic Frontier Foundation litigationŤ
counsel, specialist in criminal defense and civil rights,Ť
Silverglate & Good.

Gail Thackeray, computer crime prosecutor; involved in SecretŤ
Service's 1990 "Operation Sun Devil", Arizona Asst. StateŤ
Attorney General.

Robert Veeder, Acting Chief, Information Policy Branch, Office ofŤ
Information Regulatory Affairs, OMB (Office of Management &Ť
Budget).

Willis Ware, computer security expert; Fellow, RAND Corporation.

Sheldon Zenner, former federal prosecutor in Chicago; defendedŤ
*Phrack* electronic publisher, Craig Neidorf; Katten, Muchin &Ť
Zavis.


ABOUT THE LOW-COST TUTORIALS (Monday, March 25th)
-------------------------------------------------

Seminars on the first day offer introductions to the differentŤ
disciplines that intersect in this conference. These are surveysŤ
for individuals not already expert in the topics presented. Ť
These half-day tutorials are scheduled in four parallel tracks:

Global Communications & the Worldwide Computer Matrix. Ť
[morning*]
 Survey of electronic-mail & teleconferencing services, globalŤ
information access, remote services and the matrix of networks.

Low-Cost Computer Networking & Computer Bulletin Board Systems. Ť
[afternoon*]
 Reviews e-mail, bulletin board and teleconferencing alternativesŤ
on personal computers; outlines low-cost PC-based networks andŤ
their gateways to the global matrix. -- Mark Graham*, co-founderŤ
of Institute for Global Communications, PeaceNet and EcoNet;Ť
Pandora Systems

Current & Proposed International Policies. [morning*]
 Law and regulation that will or may impact trans-border 
data-flow and computer communications, impacting U.S. informationŤ
practices and international business.

Federal Legislation Impacting Computer Use. [afternoon*]
 Detailed review of landmark federal statutes impacting access toŤ
information, privacy of information, computer security andŤ
computer crime. -- Marc Rotenberg*, former congressional counselŤ
and expert on federal legislation, CPSR, Washington DC.

How Computer Crackers Crack! [morning*]
 Suggested by a deputy district attorney specializing in 
high-tech crime, this is for law enforcement officials,Ť
prosecutors, systems administrators and Bulletin Board SystemŤ
(BBS) sysops. -- Russell Brand*, computer security specialist;Ť
programmer with Reasoning Systems, Palo Alto CA.

How Computer Crime is Investigated.
 [afternoon*] This reviews investigation, search, seizure andŤ
evidence requirements for pursuing computer crime. It is forŤ
computer users, computer owners, BBS sysops and investigatorsŤ
unfamiliar with computer crime practices.

Information Security. [afternoon*]
 Survey for systems managers of internal and external threats,Ť
security measures, alternatives and other computer and dataŤ
security issues. -- Donn Parker*, a leading consultant inŤ
information security and computer crime, SRI International.

* - Lecturers, descriptions and times were confirmed as ofŤ
1/8/91, but may be subject to change.


CONFERENCE CHAIR
Jim Warren, Autodesk, Inc. & *MicroTimes*
 415-851-7075, jwarren@well.sf.ca.us / e-mail

PROGRAM COMMITTEE
Dorothy Denning, Digital Equipment Corporation
Peter Denning, Research Institute for Advanced Computer Science
Les Earnest, SF Peninsula ACLU & Stanford University, ret.
Elliot Fabric, Attorney at Law
Mark Graham, Pandora Systems
Don Ingraham, Alameda County District AttorneyUs Office
Bruce Koball, Motion West
Marc Rotenberg, Computer Professionals for Social Responsibility
Glenn Tenney, Fantasia Systems & Hacker's Conference

ADVISORS
Ron Anderson, ACM SIGCAS & University of Minnesota
John Perry Barlow, Electronic Frontier Foundation
Jerry Berman, ACLU & Benton Foundation
Dave Caulkins, USSR GlasNet
Vint Cerf, Corporation for National Research Initiatives
Margaret Chambers, Electronic Networking Association
Steve Cisler, Apple Computer, Inc.
Whit Diffie, Northern Telecom
Mary Eisenhart, *MicroTimes*
Dave Farber, University of Pennsylvania
Cliff Figallo, The WELL
John Gilmore, Cygnus Support
Adele Goldberg, ParcPlace Systems
Terry Gross, Rabinowitz, Boudin, Standard, et al
Keith Henson, consultant & Alcor
Lance Hoffman, George Washington University
Dave Hughes, Chariot Communications
Bob Jacobson, Human Interface Technology Laboratory
Mitch Kapor, Electronic Frontier Foundation
Roger Karraker, Santa Rosa College
Tom Mandel, SRI International
John McMullen, NewsBytes
Peter Neumann, SRI International
Dave Redell, Digital Equipment Corporation
Ken Rosenblattt, Santa Clara County District Attorney's Office
Paul Saffo, Institute for the Future
Gail Thackeray, Arizona Attorney GeneralUs Office
Jay Thorwaldson, Palo Alto Medical Foundation
Terry Winograd, CPSR & Stanford University
Sheldon Zenner, Katten, Muchin, & Zavis

 Affiliations listed only for identification

 ============================
 = Request for Invitation =
 ============================
 First Conference on Computers, Freedom & Privacy
 March 25-28, 1991
 Monday: Tutorials, Tuesday-Thursday: Conference Sessions
 SFO Marriott Hotel, 1800 Old Bayshore Hwy., Burlingame CA 94010
For hotel reservations at Conference rates, call: (800)228-9290Ť
#3

** Invitational Conference, limted to 600 participants. ** ToŤ
facilitate useful dialogue and balanced participation byŤ
representatives from all of the diverse groups interested inŤ
these issues, attendance is limited. (The capacity of theŤ
Conference facility is similarly limited).

 All interested individuals are encouraged to request anŤ
invitation. Invitations will be primarily issued on a first-come,Ť
first-served basis within each major interest group.

Fees if payment is received by: Jan.31 -Mar.15 after Mar.15
Tutorials (full day) $ 95 $ 145 $ 195
Conference (3 days) $ 295 $ 350 $ 400

Conference Registration fee includes three luncheons, two banquetŤ
meetings and selected handouts. Please make checks payable toŤ
"Computers, Freedom & Privacy/CPSR". Please don't send cash. Ť
Invitations will be promptly issued, or the uncashed check willŤ
be voided and promptly returned.

Please type or print. Thank ye, kindly.
name:
title:
organization:
mailing address:
city, state ZIP:
phone(s):
fax:
e-mail:

Comments to assist in evaluating this request:



To aid in balancing participation among groups,
 please check all significantly applicable items.
[ ] user of computers or computer networking
[ ] user of electronic-mail services
[ ] user of teleconferencing services
[ ] user of direct marketing services
[ ] user of computerized personal information
[ ] user of government information
[ ] computer professional
[ ] BBS sysop (bulletin board system operator)
[ ] systems administrator / infosystems manager
[ ] network administrator
[ ] computer / communications security specialist
[ ] provider of data communications services
[ ] provider of electronic-mail services
[ ] provider of teleconferencing services
[ ] provider of direct marketing services
[ ] provider of computerized personal information
[ ] provider of government information
[ ] legislative official      [ ] federal  [ ] state
[ ] regulatory official or staff  [ ] federal  [ ] state
[ ] law enforcement offi [ ] federal  [ ] state  [ ] local
[ ] prosecutor      [ ] federal  [ ] state  [ ] local
[ ] judicial representat [ ] federal  [ ] state  [ ] local
[ ] criminal defense attorney
[ ] corporate or litigation attorney
[ ] civil liberties specialist
[ ] journalist [ ] newspaper [ ] television [ ] radio [ ] other
[ ] other:
[ ] other:
<<1/7/91>>

Please mail form and payment to:
 CFP Conference, 345 Swett Road, Woodside CA 94062

Privacy Notice: This information will not be sold, rented,Ť
loaned, exchanged or used for any purpose other than officialŤ
CPSR activity. CPSR may elect to send information about otherŤ
activities, but such mailings will always originate with CPSR.

Sponsor: Computer Professionals for Social Responsibility,Ť
(415)322-3778 A nonprofit, educational corporation [ InternalŤ
Revenue Code 501(c)(3) ] 
e-mail: cfp@well.sf.ca.us;      fax: (415)851-2814
Chair: Jim Warren, (415)851-7075

Please copy, post & circulate!