Date:       Thu, 02 Dec 93 07:00:10 EST
Errors-To:  Comp-privacy Error Handler <owner-comp-privacy@uwm.edu>
From:       Computer Privacy Digest Moderator  <comp-privacy@uwm.edu>
To:         Comp-privacy@uwm.edu
Subject:    Computer Privacy Digest V4#001

Computer Privacy Digest Thu, 02 Dec 93              Volume 4 : Issue: 001

Today's Topics:			             Moderator: Leonard P. Levine

                                 Hello
             New Docs Reveal NSA Role in Telephony Proposal
                   Re: Right To Search Floppy Disks?
                   Re: Right To Search Floppy Disks?
                   Re: Right To Search Floppy Disks?
                     Re: Privacy of cellular phones
           Computers Freedom and Privacy '94, Chi. Mar 23-26
                        DIAC Call for Proposals

   The Computer Privacy Digest is a forum for discussion on the effect 
  of technology on privacy.  The digest is moderated and gatewayed into 
  the USENET newsgroup comp.society.privacy (Moderated).  Submissions 
  should be sent to comp-privacy@uwm.edu and administrative requests 
  to comp-privacy-request@uwm.edu.  Back issues are available via 
  anonymous ftp on ftp.cs.uwm.edu [129.89.9.18].  Login as "ftp" 
  with password "yourid@yoursite".  The archives are in the directory 
  "pub/comp-privacy".   Archives are also held at ftp.pica.army.mil
  [129.139.160.133].
----------------------------------------------------------------------

From levine@blatz.cs.uwm.edu  Thu Dec  2 06:32:34 1993
From: "Prof. L. P. Levine" <levine@blatz.cs.uwm.edu>
Date: Thu, 2 Dec 1993 06:32:31 -0600 (CST)
Subject: Hello

I am Professor Leonard P. Levine, your new moderator.  I work in the
Electrical Engineering and Computer Science Department of the
University of Wisconsin-Milwaukee and have long had a personal and
professional interest in questions of privacy.  This is my first
experience at moderationg a group so please bear with me during this
transition.  Dennis has been very helpful during this time and has
promised to lurk and will continue to offer suggestions to me.  I look
forward to his help.  And now let us continue...


------------------------------

From @cor3.pica.army.mil:washofc!banisar@uu5.psi.com  Wed Dec  1 19:00:15 1993
From: Dave Banisar <banisar@washofc.cpsr.org>
Date: Wed, 1 Dec 1993 14:54:51 EST    
Subject: New Docs Reveal NSA Role in Telephony Proposal

  New Docs Reveal NSA Role in Telephony Proposal
>From the CPSR Alert 2.06 (Dec. 1, 1993)

New Docs Reveal NSA Involvement in Digital Telephony Proposal

  A series of memoranda received by CPSR from the Department of
Commerce last week indicate that the National Security Agency was
actively involved in the 1992 FBI Digital Telephony Proposal. Two weeks
ago, documents received by CPSR indicated that the FBI proposal, code
named "Operation Root Canal," was pushed forward even after reports
from the field found no cases where electronic surveillance was
hampered by new technologies. The documents also revealed that the
Digital Signature Standard was viewed by the FBI as "[t]he first step
in our plan to deal with the encryption issue."
  
  The earliest memo is dated July 5, 1991, just a few weeks after the
Senate withdrew a Sense of Congress provision from S-266, the Omnibus
Crime Bill of 1991, that encouraged service and equipment providers to
ensure that their equipment would "permit the government to obtain the
plain text contents of voice, data and other communications...." The
documents consist of a series of fax transmittal sheets and memos from
the Office of Legal Counsel in the Department of Commerce to the
National Security Agency. Many attachments and drafts, including more
detailed descriptions of the  NSA's proposals, were withheld or
released with substantial deletions.
  
Also included in the documents is a previously released public
statement by the National Telecommunications and Information
Administration entitled "Technological Competitiveness and Policy
Concerns."  The document was requested by Rep. Jack Brooks and states
that the proposal
  
  could obstruct or distort telecommunications technology development
  by limiting fiber optic transmission, ISDN, digital cellular services
  and other technologies until they are modified, ... could impair the
  security of business communications ... that could facilitate not
  only lawful government interception, but unlawful interception by
  others, [and] could impose industries ability to offer new services
  and technologies.
  
  CPSR is planning to appeal the Commerce Department's decision to
withhold many of the documents.

To subscribe to the Alert, send the message:

"subscribe cpsr <your name>" (without quotes or brackets) to
listserv@gwuvm.gwu.edu.  Back issues of the Alert are available at the
CPSR Internet Library FTP/WAIS/Gopher cpsr.org /cpsr/alert

Computer Professionals for Social Responsibility is a national,
non-partisan, public-interest organization dedicated to understanding
and directing the impact of computers on society. Founded in 1981, CPSR
has 2000 members from all over the world and 22 chapters across the
country. Our National Advisory Board includes a Nobel laureate and
three winners of the Turing Award, the highest honor in computer
science. Membership is open to everyone.

For more information, please contact: cpsr@cpsr.org or visit the CPSR
discussion conferences on The Well (well.sf.ca.us) or Mindvox
(phantom.com).


------------------------------

From news@mbvlab.wpafb.af.mil  Wed Dec  1 20:41:23 1993
From: pjoslin@mbvlab.wpafb.af.mil (Paul Joslin (Sverdrup))
Date: 2 Dec 1993 02:41:31 GMT
Subject: Re: Right To Search Floppy Disks?

In article <comp-privacy3.84.6@pica.army.mil>, Justin Fidler (jfidler@cap.gwu.edu) wrote:

: Does anyone know of the legal issues involved when a public high school 
: searches the floppy disks of a student?  I have witnessed an incident
: where a school administration has gone to the effort of undeleting files
: and then using the information found in these undeleted files against a
: student.  It seems to me this would be comparable to the police searching
: through a person's garbage.  Any ideas?

I'm not a lawyer, and all that...

It may be just like the police searching your garbage.... The Supreme Court
has ruled that you have no expectation of privacy once you throw something
away.  Hence, the police can search, and can use evidence obtained in 
the search against you.  For the particulars, try a real lawyer.

--
Paul R. Joslin +1 513 255 1115


------------------------------

From @cor3.pica.army.mil,@rutgers.edu:news@gboro.rowan.edu  Wed Dec  1 20:57:43 1993
From: cassidy@elan.rowan.edu (Kyle Cassidy)
Date: Thu, 2 Dec 1993 02:52:14 GMT
Subject: Re: Right To Search Floppy Disks?

In article <comp-privacy3.84.6@pica.army.mil> Justin Fidler <jfidler@cap.gwu.edu> writes:
>
>Does anyone know of the legal issues involved when a public high school 
>searches the floppy disks of a student?  I have witnessed an incident
>where a school administration has gone to the effort of undeleting files
>and then using the information found in these undeleted files against a
>student.  It seems to me this would be comparable to the police searching
>through a person's garbage.  Any ideas?
>
back in 1986 my college roommate was arrested for various computer crimes 
against the state -- they took his computers, his disks, his pink floyd 
tapes, his letters, his papers, his pillow cases (okay, not the pillow 
cases). at least at that time and in this state, information on computer 
disks could not be used as evidence in court. the only thing they could do 
was say 'we found computer disks in his room, therefore we believe that he 
is a computer hacker."

i would think that the police might have a right to take a student's disks, 
but that a HS doesn't have the legal authority.


------------------------------

From abc@arl.army.mil  Wed Dec  1 22:20:44 1993
From: Brinton Cooper <abc@arl.army.mil>
Date:     Thu, 2 Dec 93 4:20:41 GMT
Subject: Re: Right To Search Floppy Disks?

This seems comparable to searching lockers.  In at least some cases, the
rights of school authorities to search student lockers looking for
"drugs" or "stolen property" has been upheld; and these administrators
aren't even police!  They have also exercised their right to require
students to empty the contents of their pockets for the principal;
again, no police are involved.  So-called suspension hearings in Harford
County, Maryland, have been held before an administrative assistant who
reads the charges made by a principal and hears testimony from the
student and his/her parents.  All this is recorded on mag tape for
playback to the Superintendent who actually makes the suspension
decision.  Note that the accused is given no right to cross-examine the
accuser.  

Forget the issue.  Public school students don't have rights.

For that matter, the teachers don't have too many, either.  Lower your
expectations; send the kid to private school where you know,  for sure,
that the authorities are THE authority.

_Brint

 ----- Forwarded message # 1:

Date: Tue, 30 Nov 1993 21:08:53 -0500 (EST)
From: Justin Fidler <jfidler@cap.gwu.edu>
Subject: Right To Search Floppy Disks?


Does anyone know of the legal issues involved when a public high school 
searches the floppy disks of a student?  I have witnessed an incident
where a school administration has gone to the effort of undeleting files
and then using the information found in these undeleted files against a
student.  It seems to me this would be comparable to the police searching
through a person's garbage.  Any ideas?

Justin
jfidler@cap.gwu.edu

 ----- End of forwarded messages


------------------------------

From abc@arl.army.mil  Wed Dec  1 22:10:51 1993
From: Brinton Cooper <abc@arl.army.mil>
Date:     Thu, 2 Dec 93 4:10:48 GMT
Subject:  Re: Privacy of cellular phones 

Percival Wendel Wippenheimer <wef4m@galen.med.virginia.edu> writes:

> The answer to this is simple:  Do not use Cellular Phones until
> proper scrambling becomes widespread.  

This is quite unsatisfactory; I should deny my spouse the security that
comes with a cellular phone just so the cops can continue to gather
evidence illegally?  To what end?  How about not employing police who
cannot understand and submit their  wills to the Constitution and the
law?

_Brint


------------------------------

From @cor3.pica.army.mil,@rutgers.edu:root@zeus.ieee.org  Wed Dec  1 19:05:33 1993
From: Al <al@netcom.com>
Date: Wed, 1 Dec 1993 20:26:23 GMT
Subject: Computers Freedom and Privacy '94, Chi. Mar 23-26

               COMPUTERS, FREEDOM, AND PRIVACY '94
                    Conference Announcement
            Scholarships, Writing Competition Notice
                 23-26 March 1994, Chicago, Il.

     The fourth annual conference, "Computers, Freedom, and
Privacy," (CFP'94) will be held in Chicago, Il., March 23-26, 1994.
The conference is hosted by The John Marshall Law School; George B.
Trubow, professor of law and director of the Center for Informatics
Law at John Marshall, is general chair of the conference.  The
program is sponsored jointly by these Association for Computing
Machinery (ACM) Special Interest Groups: Communications (SIGCOMM);
Computers and Society (SIGCAS); Security, Audit and Control
(SIGSAC).

     The advance of computer and communications technologies holds
great promise for individuals and society.  From conveniences for
consumers and efficiencies in commerce to improved public health
and safety and increased participation in government and community,
these technologies are fundamentally transforming our environment
and our lives.

     At the same time, these technologies present challenges to the
idea of a free and open society.  Personal privacy and corporate
security is at risk from invasions by high-tech surveillance and
monitoring; a myriad of personal information data bases expose
private life to constant scrutiny; new forms of illegal activity
may threaten the traditional barriers between citizen and state and
present new tests of Constitutional protection; geographic
boundaries of state and nation may be recast by information
exchange that knows no boundaries in global data networks.

     CFP'94 will assemble experts, advocates and interest groups
from diverse perspectives and disciplines to consider freedom and
privacy in today's Information Society.  Tutorials will be offered
on March 23, 1994, from 9:00 a.m. - noon and 2:00 - 500 p.m. The
conference program is Thursday, March 24, through Saturday, March
26, 1994, and will examine the potential benefits and burdens of
new information and communications technologies and consider ways
in which society can enjoy the benefits while minimizing negative
implications.

                    STUDENT PAPER COMPETITION

     Full time college or graduate students may enter the student
paper competition.  Papers must not exceed 3000 words and should
address the impact of computer and telecommunications technologies
on freedom and privacy in society.  Winners will receive financial
support to attend the conference and present their papers.  All
papers should be submitted by December 15, 1993, (either as
straight text via e-mail or 6 printed copies) to: Prof. Eugene
Spafford, Department of Computer Science, Purdue University, West
Lafeyette, IN 47907-2004.  E-Mail: spaf@cs.purdue.edu; Voice:
317-494-7825


                          SCHOLARSHIPS

     The Chair for scholarships is Prof. James Thomas, Dept. of
Sociology, Northern Illinois University, DeKalb, IL. 60115-2854
(email: tk0jut1@mvs.cso.niu.edu). Scholarships will cover only the
cost of the registration fee, which includes 3 luncheons, 2
receptions, 2 dinners and conference materials.

               CONFERENCE REGISTRATION INFORMATION

     Registration fees are as follows:
     If paid by:    1/31/94   3/15/94   4/23/94
                     Early    Regular    Late

       Tutorial      $145      $175      $210
       Conference     315       370       420

NOTE: ACM members (give membership number) and John Marshall Alumni
(give graduation date) receive a $10 discount from Tutorial and $15
discount from Conference fees.

CONFERENCE REGISTRATION: Inquiries regarding registration should be
directed to RoseMarie Knight, Registration Chair, at the JMLS
address above; her voice number is 312-987-1420;  E-mail,
6rknight@jmls.edu.

CONFERENCE INFORMATION: Communications regarding the conference
should be sent to: CFP'94,  The John Marshall Law School, 315 S.
Plymouth Ct., Chicago, IL 60604-3907
(Voice: 312-987-1419; Fax: 312-427-8307; E-mail: CFP94@jmls.edu)

ROOM RESERVATIONS: The Palmer House Hilton, located in Chicago's
"loop," and only about a block from The John Marshall Law School,
is the conference headquarters.  Room reservations only should be
made directly with the hotel, mentioning "CFP'94" to get the
special conference rate of $99.00, plus tax. (17 E. Monroe.,
Chicago, Il., 60603, Tel: 312-726-7500;  1-800-HILTONS;  Fax
312-263-2556)


     NOTE: More specific information about conference program
content will be available December 1, 1993.

***********
George B. Trubow, Professor of Law
Director, Center for Informatics Law
The John Marshall Law School
315 S. Plymouth Ct.
Chicago, IL 60604-3907
Fax: 312-427-8307; Voice: 312-987-1445
E-mail: 7trubow@jmls.edu
***********


------------------------------

From news@delphi.bc.edu  Wed Dec  1 15:54:36 1993
From: kelloggj@bcvax1.bc.edu
Date: 1 Dec 93 16:55:46 EDT
Subject: DIAC Call for Proposals

Please post and distribute to interested colleagues.

                         Call for Workshop Proposals

       Developing an Effective and Equitable Information Infrastructure

    Directions and Implications of Advanced Computing (DIAC-94) Symposium
                           Cambridge, MA, USA     
	                   April 23 - 24, 1994

The National Information Infrastructure (NII) is being proposed as the next-
generation "information superhighway" for the 90's and beyond.  Academia,
libraries, government agencies, as well as media and telecommunication
companies are involved in the current development. Computer Professionals for
Social Responsibility (CPSR) and other organizations believe that critical
issues regarding the use of the NII deserve increased public visibility and
participation and is using the DIAC Symposium to help address this concern.

The DIAC-94 symposium is a two-day symposium and will consist of
presentations on the first day and workshops on the second day.  The DIAC
Symposia are held biannually and DIAC-94 will be CPSR's fifth such
conference.  We encourage your participation both through attending and
through conducting a workshop. We are currently soliciting workshop
proposals. We suggest proposals on the following themes but any topic
relating to the symposium theme is welcome.

 Systems and Services              Policy
   + Community networks              + Funding
   + Information services            + Role of government
   + Delivery of social services     + Economic modeling of networks
   + Privacy (including medical)     + Commercialization of the NII
   + Educational support             + Universal access
   + Meeting diverse needs           + Freedom of expression and 
				 	community standards

 Electronic Democracy              Directions and Implications
   + Access to information           + Ubiquitous computing
   + Electronic town meetings        + Global hypertext and multimedia
   + Threats to democracy            + Computing in the workplace
   + Economic and class disparities  + Computing and the environment

 International Issues              Traditional and Virtual Communities
   + Language differences            + MUDs
   + Cultural diversity              + Communication ethics, values, and styles
   + National and international      + Gender relations in cyberspace
       priorities  
   + Cooperative projects            + Networking for indigenous peoples

Workshops will be an hour and half in length.  The proposal should include
title, presenter, purpose of workshop, references, and plan.  Workshops
should substantially involve the audience and proposals in which some group
product or action plan is created are preferred.  As the proposals may be
collected into a book, workshop proposals should be clear and informative to
people who don't participate in the workshop.  Proposals are due February 15,
1994 and acceptance and rejection notices will be sent by March 15, 1994.  To
discuss workshops or to submit proposals for workshops contact the program
chair, Doug Schuler, doug.schuler@cpsr.org.  Electronic submissions are
encouraged but paper versions are also acceptable (send them to CPSR/Seattle
- DIAC '94 Workshop Submission, P.O. Box 85481, Seattle, WA 98145-1481).

        Sponsored by Computer Professionals for Social Responsibility

Potential co-sponsors are being sought.  Please contact us if your
organization would like to help with this event.  For more information on
co-sponsorship or on general issues, contact conference chair, Coralee
Whitcomb, cwhitcom@bentley.edu, 617-356-4309.

------------------------------



End of Computer Privacy Digest V4 #001
******************************
.