Date:       Wed, 03 May 95 07:01:17 EST
Errors-To:  Comp-privacy Error Handler <owner-comp-privacy@uwm.edu>
From:       Computer Privacy Digest Moderator  <comp-privacy@uwm.edu>
To:         Comp-privacy@uwm.edu
Subject:    Computer Privacy Digest V6#042

Computer Privacy Digest Wed, 03 May 95              Volume 6 : Issue: 042

Today's Topics:			       Moderator: Leonard P. Levine

                    Re: Monitoring USENET Downloads
                 Re: California Digital Signature Bill
            Re: Could What You Post be Used to Profile You?
                        Email/VoiceMail Privacy
                       Re: Junk Mail Nominations
                              ID Microchip
                    Law Enforcement Digital Imaging
               Clinton Administration Online Town Meeting
                        What are the VISA Codes?
                  Re: Censorship and Freedom of Speech
          "Audience Tracking System" for Electronic Newspapers
                     A Hot Newsgroup: Privacy Helps
                      CFP - Advanced Surveillance
                 Info on CPD [unchanged since 12/29/94]

----------------------------------------------------------------------

From: dbohland@epix.net (David Bohlander)
Date: 28 Apr 1995 15:28:27 GMT
Subject: Re: Monitoring USENET Downloads
Organization: epix.net

Is it possible for someone (system admin, govt agencies, etc) to
monitor donwloads from USENET groups?  If so, how do you prevent this
capability?


------------------------------

From: Peter Marshall <rocque@eskimo.com>
Date: 29 Apr 1995 21:19:20 GMT
Subject: Re: California Digital Signature Bill 
Organization: Eskimo North (206) For-Ever

    On 26 Apr 1995, Privacy Rights Clearinghouse wrote: Those
    interested in on-line privacy should be aware of a bill in the
    California Legislature.  A.B. 1577, sponsored by Debra Bowen,
    addresses the issue of digital signatures.  There are versions of
    the same bill under consideration in Oregon, Washington, and Utah
    as well.

It is not clear that a version of this same bill, or a substantially
similar measure is "under consideration" in WA.

A bill of this topic was intro'd in the '95 regular session of the WA
Leg., and had one informational hearing. The bill's prime sponsor
explained he had no intent in this session beyond just that, and the
measure has gone no further, with the regular Leg. session just
concluded here in WA. Wait 'til next year....

For now, further explanation of the point as to "versions of the same
bill" would be helpful.

--
Peter Marshall
KSER Public Affairs


------------------------------

From: bo774@freenet.carleton.ca (Kelly Bert Manning)
Date: 30 Apr 1995 06:26:32 GMT
Subject: Re: Could What You Post be Used to Profile You?
Organization: The National Capital FreeNet, Ottawa, Ontario, Canada

    Paul Hanssen (phanssen@uniwa.uwa.edu.au) writes: Isn't it possible
    for somone (e.g. the government or a private database provider) to
    get an internet site with a news feed and write a program to sort
    all incoming articles by person? This information could then be
    used to make up a profile of likes/dislikes and opinions of that
    person, whether true or not. This profile could then be used by
    corporations for marketing purposes or by the government to add to
    a file they may or may not have on you.  Am I sounding a bit
    paranoid ??

Have you had an ID for long? Every few months I get some sort of
solicitiation based on postings to technical newsgroups, ranging from
wannabe programmers who think that I'd pay them to grind micro code for
me, to solictations for products.

This is not only possible, it's been going on for years.


------------------------------

From: Zackdawg@aol.com
Date: 30 Apr 1995 20:32:54 -0400
Subject: Email/VoiceMail Privacy

Check out McDonalds.  (yeah, the chain) I just read something about
McD's executive types were caught listening to employees voice mail in
one of my Internet Mags.

May be worth a look for you.

I am interested in bosses perusing employees computers looking for
"stuff" (read that as inappropriate personal writings) that the boss
may not approve off and using that information to have the employee
fired, prosecuted, etc.  If you run across any good treatises on
privacy and computer files in the workplace point me that away.

--
Zackdawg 
aka  mmelko@wsnet.com


------------------------------

From: Beth Givens <bgivens@pwa.acusd.edu>
Date: 28 Apr 1995 16:01:15 -0700 (PDT)
Subject: Re: Junk Mail Nominations

This might be of interest to CPD readers.

Beth Givens	
Privacy Rights Clearinghouse	

    ---------- Forwarded message ----------
    Date: 28 Apr 1995 10:39:34 -0700 (PDT)
    From: Tom Watson <twatson@eskimo.com>
    To: bgivens@acusd.edu
    Subject: Re: junk mail nominations

 		NOMINATIONS SOUGHT FOR JUNK MAIL AWARDS
 
 Unwanted direct mail -- known as JUNK MAIL -- often goes directly into 
 the trash can or recycling bin, unopened.  Local governments, businesses 
 and the public must pay for the disposal or recycling of this waste.  
 Businesses and residents also waste time dealing with junk mail.
 
 In conjunction with the 25th anniversary of Earth Day this spring, the 
 National Waste Prevention Coalition (NWPC) announces the opening of 
 nominations for its first JUNK MAIL AWARDS.  This is an opportunity for 
 people to express their opinions about the actual direct mail they 
 receive.  Do you know of a company or organization that sets a good 
 example by keeping waste to a minimum in its mailings?  Do you know of a 
 company or organization that has wasteful mailing practices?
 
 Nominations for the Junk Mail Awards are open to anyone.  Categories are:
 --  Worst Direct-Mailer (mailer refers to the business or organization
 	sending direct mail)
 --  Best Direct-Mailer
 --  Worst Single Example of Direct Mail (wasteful, deceptive, etc.)
 --  Best Single Example of Environmentally Responsible Direct Mail
 
 The goals of the awards program are to educate the public about wasteful 
 junk mail, and to encourage direct-mailers to be more environmentally 
 responsible.  Any companies or organizations that receive negative 
 nominations will be contacted by the NWPC, if possible, and provided with 
 information on making their mailings less wasteful.
 
 Nominations for the Junk Mail Awards are due by June 15, 1995. 
 Send nominations to:  NWPC, P.O. Box 24545, Seattle, WA, 98124-0545.  
 You may also e-mail nominations to:   cu-waste-mgmt-mailbox@cornell.edu
 
 For nominations for best or worst single example, please include the 
 piece of mail.  Persons submitting nominations will not be placed on a 
 mailing list.  The NWPC will announce the winners (and losers) of the 
 Junk Mail Awards in fall of 1995.  
 
 The National Waste Prevention Coalition includes representatives of local 
 and state governments, university faculty, consultants and others.  It 
 was formed in 1994 to develop national waste prevention projects.
 
 For more information on the NWPC or the Junk Mail Awards, contact Tom 
 Watson, King County (WA) Solid Waste Division, at (206) 296-4481 or by 
 e-mail at:  twatson@eskimo.com
 
 SUGGESTED CRITERIA FOR NOMINATIONS FOR THE NWPC JUNK MAIL AWARDS
 
 --  Does a company or organization send out excessive catalogs or 
 requests for donations?  
 --  Is paper wasted in mailings and catalogs?  For example, is only one 
 side of a sheet of paper used for letters, instead of both sides?
 --  Does a company or organization provide a place on their order or 
 response form for you to say, "Do not sell my name" to other direct-mailers?
 --  Does a company or organization provide a place on their order or 
 response form for you to say, "Do not send me any more mail"?
 --  Does a company send out orders with an excessive amount of packaging, 
 or with unwanted extra catalogs and enclosures?
 --  Does a company or organization use recycled paper?
 --  Is unrecyclable plastic or foil used in the mailing?
 
 For best or worst single example of direct mail, also consider:
 --  Is a piece of mail deceptive (disguised as a check, or an urgent 
 express-mail letter, for example)?
 --  Does a direct-mailer use innovative methods to reduce waste in its 
 mailings?
 
 	For tips on how individuals can get off mailing lists, see the 
 	Aug/Sept 1994 issue of "Mother Earth News" or the Nov/Dec 1993
 	issue of "E Magazine," or ask your local recycling program if 
 	they have information.
 
Forwarder's note: Also visit the Privacy Rights Clearinghouse gopher
and see the fact sheet on junk mail. Gopher to gopher.acusd.edu, and
go into "USD Campuswide Information."


------------------------------

From: eg350aaf@csulb.edu (Sharlene MacKay)
Date: 02 May 1995 01:10:31 GMT
Subject: ID Microchip
Organization: Cal State Long Beach

Recently, I heard about an identification microchip for pets.  The chip
is implanted under the pet's skin and is used to identify lost
animals.

Since it is in use for pets, I was wondering if anyone had thought
about the idea of using a similar type chip for humans??

Any thoughts....


------------------------------

From: "Prof. L. P. Levine" <levine@blatz.cs.uwm.edu>
Date: 01 May 1995 10:18:56 -0700
Subject: Law Enforcement Digital Imaging

Taken from 2020world Digest Monday, 1 May 1995 Volume 01 : Number 113

SUNDAY, APRIL 30, 1995, 2020WORLD COLUMN
Copyright 1995 Seattle Times Company

       ~~  Smile!  Soon, you'll be on candid, digital camera  ~~

It's the year 2020.  A string of armed robberies has left several people
dead in the Midwest.  To apprehend two gunmen, authorities have hired
Danny "Boone" Roberts, one of the best "Trackers" in the business.  Within
hours, Danny has picked up the trail.  A digital tracker, Danny uses the
Net to discover even the faintest of digital tracks -- a glimpse of a
person on a parking lot camera, or a pattern of play at a virtual casino. 
Danny has a hundred tricks and a thousand sources. 

"There is no place to hide.  Nobody can hide anyplace in this country,
nobody can hide anyplace in this world." 

President Clinton spoke those words recently to describe the manhunt for
the bombers in the Oklahoma City tragedy.  He's right.  It is very hard to
live in this world without leaving digital tracks. 

From credit card transactions to a convenience store surveillance camera,
we can be tracked digitally. 

But in today's world much of that information is inaccessible.  The video
pieces are analog, not digital.  The amount of information from all those
cameras is simply too much to save and organize. 

However, the coming digital era will change all that.  By 2020, those
cameras will all be digital.  We will be able to both store and scan all
of the information on every video.  Pattern recognition software will
allow automated searches of faces in the crowd or license plates on the
road.  And every access to the Net has the potential of leaving tracks. 

Will we have finally reached the "1984" society that George Orwell so
depressingly predicted? 

Probably not.  It is hard to imagine that we would let our government
operate in an Orwellian manner. 

The private sector, however, is a different matter. 

How can we prevent private companies from using surveillance cameras?  And
what's to prevent private citizens from video taping all the people
passing by at a busy corner?  In the future, with all the digital tools
available to search the video, who knows what valuable information might
turn up? 

And that is how our 21st century cowboy, Danny "Boone" Roberts, found his
prey.  He had a network of private databases -- hundreds of citizen
vigilante digital camera toters from around the country who could match a
face in the crowd.  By putting it all together, Danny eventually
pinpointed the bad guys. 

Smile, you too are on a candid (digital) camera database.  What do you
think?  Is this a great way to nab criminals or just another version of
Orwell's "1984"?  Send us your thoughts; we'll save them in our database. 

    *****************************************************************
    *                                                               *
    *  Kurt Dahl is vice president of information technology at     *
    *  The Seattle Times.  The views he expresses here are his      *
    *  own and not necessarily those of The Seattle Times Company.  *
    *                                                               *
    *****************************************************************


    From: Joepilott@aol.com
    Date: 30 Apr 1995 14:39:51 -0400
    Subject: Law Enforcement Digital Imaging

      My name is Joe Heppler, I am a Forensic Specialist with the Tacoma
Police Dept. I have just finished reading your 2020world column for
04/30/95. I thought you would like to know that a Police Department in
your own backyard was on the cutting edge of the technology you describe
in your article. Tacoma P.D. has completed installation of one of the most
sophisticated and one of the only Digital Imaging systems used by law
enforcement on the West Coast. Our system includes Digital
Enhancement/Capture capabilities for video tape and for fingerprints. With
this system we are able to enhance fingerprints to levels that nearly
double the chances of getting a match on a fingerprint lifted at a crime
scene when it is searched against our database of previously stored
fingerprint cards. With video we are able to capture and enhance a wide
variety of surveillance tapes that provide investigators with a greater
ability to identify suspects, vehicles, or whatever they are looking for,
and until now could not see. A database for video is currently in the
design stage. 

  This system has not only created a way for us to identify fingerprints
and individuals that before were unidentifiable, it also has saved us a
great deal of time. By using this technology instead of conventional
photography, a forensic specialist with Tacoma P.D. no longer needs to
spend hours in the lab developing photos of fingerprints or spend a day or
two preparing a display for court. These functions are now done in a
matter of minutes and court displays are created in about one hour. The
system we have designed is portable and can easily be taken into the
field, which again greatly reduces the evidence processing time, which
enhances the detectives ability to catch the suspect. 

   Our system was recently featured on CNN's new Saturday afternoon show
"Computer Connection". Myself and Erik Berg (another forensic specialist
at Tacoma P.D.), will be speaking at the Pacific Northwest Divisions
International Association for Identification conference in Vancouver WA in
May, and Erik will be speaking at the World Conference in California in
July. Our topic is Digital Imaging uses for law enforcement. This
technology is a revolution in Forensics and we at Tacoma P.D. are on the
Bleeding Edge. The world you mention in your article is a lot closer than
the year 2020. If you would like to see our system or have any questions,
I can be reached at E-mail address: Joe Pilott@aol.com or by work phone at
206-591-5540. My work hours are Tuesday-Saturday 0800-1600. Erik Berg can
be reached at e-mail address 73543.47@compuserve.com or 206-591-5939. 

Sincerely,

Joe Heppler 
Tacoma P.D. Forensics


------------------------------

From: Michael Ward <mike@essential.org>
Date: 01 May 1995 20:17:42 -0400
Subject: Clinton Administration Online Town Meeting

 -----------------------------------------------------------------
TAP-INFO - An Internet newsletter available from listproc@tap.org
 -----------------------------------------------------------------
 
TAXPAYER ASSETS PROJECT - INFORMATION POLICY NOTE
May 1, 1995

       National Electronic Open Meeting on Electronic Government
                        - Easy Instructions -
                          Mike Ward, TAP
                                     
The Clinton Administration is sponsoring the National Electronic
Open Meeting from May 1 - 14, 1995.  The meeting is simply 5
Internet discussion groups on how to develop an effective and
efficient "electronic government."  More specifically, the
discussions are on the subjects of:

1.  Government Services 
2.  Government Benefit Programs 
3.  Access to Government Information
4.  Participatory Democracy
5.  Technology Issues related to an Electronic Government
	

          Participating in the Meeting via the Internet

LISTSERVERS

     Send Email to:       join@meeting.fedworld.gov  
     In the body write:   subscribe [topic of interest] your name

     The topic of interest should be either: services, benefits,
     infoaccs (for information access), partdemo (for
     participatory democracy), or techgoal for technology issues.

USENET NEWSGROUPS

     There are five Usenet Newsgroups you can tune into.

     alt.gov.meeting.services
     alt.gov.meeting.benefits
     alt.gov.meeting.infoaccs
     alt.gov.meeting.partdemo
     alt.gov.meeting.techgoal

WORLD WIDE WEB (WWW) Server

     An interactive WWW interface allows you to browse and send
     messages to any of the discussions.

     The URL is:       http://meeting.fedworld.gov

(The same messages are being distributed through listservers,
usenet newsgroups, and WWW.)

    The Administrations' Announcement is archived at gopher 
essential.org in the taxpayer assets project directory.

				Michael Ward
				mike@tap.org

 ---------------------------------------------------------------------
TAP-INFO is an Internet Distribution List provided by the Taxpayer
Assets Project (TAP).  TAP was founded by Ralph Nader to monitor the
management of government property, including information systems and
data, government funded R&D, spectrum allocation and other government
assets.  TAP-INFO reports on TAP activities relating to federal
information policy.  Tap-info is archived at tap.org.
 
Subscription requests to tap-info to listproc@tap.org with
the message:  subscribe tap-info your name
 ---------------------------------------------------------------------
Taxpayer Assets Project; P.O. Box 19367, Washington, DC  20036
v. 202/387-8030; f. 202/234-5176; internet:  tap@tap.org
 ---------------------------------------------------------------------


------------------------------

From: mleach@equity2.sbi.com (Mike Leach)
Date: 02 May 1995 16:14:50 GMT
Subject: What are the VISA Codes?
Organization: Some Data Inc.

Recently, a senior citizen friend of mine  may have been the intended
victim of a phone scam. The caller said my friend had won (at least)
$2500 worth of prizes... The grand prize was a car and she was one of
only 5 finalists.  All that was required was a small ($750) purchase
made with her (my friend's) visa card.

What intrigued me was that the caller wanted to know what code was next
to the expiration date on her visa card!

(I have 2 visa cards, both with different codes there.)

Was this an attempt to figure out her Credit Limit or Rating?

Does anyone have a list of all of these codes and what they mean?  It
might be time to switch to Discover!

Please email any responses as our news feed is not too reliable.

Thanks
---
Michael Leach		mleach@mhnj.sbi.com
( Be Bold -- Be Strong )


------------------------------

From: armando@winternet.com (Armando Menendez III)
Date: 02 May 1995 17:07:56 GMT
Subject: Re: Censorship and Freedom of Speech
Organization: StarNet Communications, Inc

    Leonard A DiMenna (ldimenna@osf1.gmu.edu) wrote: How do you decide
    which is censorship and which is freedom of speech?

If you are telling someone that they "can't" see/read something -
that's censorship!  When you've decided that you know whether or not
someone should be allowed to see/read something, you've overstepped the
boundary.  The possible exceptions will be parents and THEIR children,
and only their children.

    It is very reasonable that certain people shouldn't have access to
    areas that have adult matieral.

And why is it "very reasonable?"  Again, someone is deciding what
someone else can see/read.  This is not only unnecessary, but
potentially dangerous.  Today "pornography" (in it's many definitions),
tomorrow religious beliefs?

    Who descides what is moral and what isn't?

Everyone makes that decision for themselves.  Unfortunately, as a
group, we can't even get everyone to agree with the "universal" moral
beliefs.  As a society, we should be able to dictate and enforce some
"standard" beliefs (ie. "thou shalt not kill") that simply guarantee
everyone some basic standards and give them a "fair" shot at life.  Now
the tough part is to get more than a handful of people to agree what
those "basic standards" should be...

    There is no black and white only shades of gray.

That is both the "problem with," and the "beauty of" life!  It's how
you deal, and cope, with those shades of gray.

+--------------------------------------+-----------------------------------+
|mailto: armando@winternet.com         | It is a poor parent who tries to  |
|  http: //www.winternet.com/~armando/ | child proof the world, instead of |
|                                      | world proofing the child...       |
+--------------------------------------+-----------------------------------+


------------------------------

From: jwarren@well.sf.ca.us (Jim Warren)
Date: 28 Apr 1995 12:14:28 +0800
Subject: "Audience Tracking System" for Electronic Newspapers

    From: PATCLAWSON@delphi.com
    Date: 27 Apr 1995 04:13:11 -0400 (EDT)
    Subject: TeleGrafix News Release
    To: jwarren@well.com

Advanced Internet Publishing
and
Audience Tracking System                <<====== !!!!
Debuts At Newspaper Convention

(NEW ORLEANS) April 25, 1995 -- TeleGrafix Communications Inc. of
Huntington Beach, Calif., and Cykic Software Inc. of San Diego have
announced the first media server systems dedicated to electronic
newspaper publishing and online broadcasting that integrate the
Internet and World Wide Web with advanced database, audiotex,
fax-on-demand, advertising placement and
audience measurement technologies.
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^    <====== !!!

The media servers, which combine TeleGrafix's RIPscrip(TM) 2.0 online
multimedia software with Cykic's MultiBase(TM) Internet networking
platform, were demonstrated today for the 1,500 newspaper publishers
attending the Newspaper Association of America's annual convention in
New Orleans.

<...>

Multibase is a unique multiuser networking system and database
environment for advanced online and Internet media systems. It operates
on 386, 486 and Pentium-based IBM-compatible personal computers.
Programs that run under dBASE, Clipper, FoxBase+ and other popular
systems can be run under MultiBase with few changes. <...>

The media servers combine TeleGrafix's Cybermedia Advertising Research
System(TM) with Internet audience tracking technologies developed by Cykic.
                ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
These tools are ideal for consortia such as the newly announced New Century
Network founded by eight major newspaper publishers, or by any other group
seeking ways to put electronic newspapers before the widest possible audience.
Publishers can now determine exactly who is accessing World Wide Web sites,
           ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
collecting precise individual user information.  Advertisers may also receive
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
live, real-time reports on advertising reach and effectiveness.

<...>

Cykic Software was founded in 1987 and is privately held.  Its
networking and database technologies are widely used in the aerospace,
defense and health care industries, by organizations such as the U.S.
Department of Defense, Martin Marietta, Kaiser Permanente, TEAC of
Korea, and John Deere & Co.

Contact:  Patrick Clawson, TeleGrafix Communications,
Phone: (714) 379-2140.  Fax: (714) 379-2132..  BBS: (714) 379-2133.
Internet: patclawson@delphi.com


------------------------------

From: root@power.stu.rpi.edu (Will Pierce)
Date: 28 Apr 1995 23:40:15 GMT
Subject: A Hot Newsgroup: Privacy Helps
Organization: POWER - Power Operations With Electronic Resources

A hot newsgroup where a LOT of action is taking place is:
	
	alt.religion.scientology

Anonymous remailers are being used by several people to post pertinent
information about the church of scientology.

Because of fears of retribution by the church (already experienced by
several vocal critics), a number of posts to the group have appeared by
people using anonymous remailers.

The church of scientology already obtained the name, address, and
phone number of one lady who was posting vocally against the church.
This information was posted by A. Milne, including the name, address, 
and phone number of this lady's boyfriend.

The raid on anon.penet.fi was also due to the church of scientology.

Many people call this organization a cult, and documentary evidence
(affidavits and court exhibits) also point to that conclusion.

For this reason, I suggest you stop by alt.religion.scientology and
look at what's present, check out some WWW pages, and make yourself
heard.

An set of interesting URLs is:

http://www.xs4all.nl/~fonss/
http://www.mit.edu:8001/people/rnewman/scientology/home.html
http://www.sky.net/~sloth/sci/sci_index.html
http://www.mit.edu:8001/people/rnewman/scientology/home.html
http://mail.bris.ac.uk/~plmlp/scum.html

-Will

--
-- Copyright 1995, Will Pierce  --  root@power.stu.rpi.edu -- pier1@rpi.edu --
-  Only when you care, can you be hurt.  Indifference, the alternative?  No. -
-  When I know I am right,  I do not back down, or wither in adversity--     -
--  I fight.   I fight for what is right.   I fight for my life every day.  --


------------------------------

From: "Dave Banisar" <banisar@epic.org>
Date: 29 Apr 1995 13:22:30 -0400
Subject: CFP - Advanced Surveillance

                         CALL FOR PAPERS

                Advanced Surveillance Technologies

                           Sponsored by

                     Privacy International, and 
               Electronic Privacy Information Center

                        4  September 1995

                       Copenhagen,  Denmark

Overview

Over the past decade, fundamental changes have taken place in the
nature and the environment of surveillance. New information systems
offer an unprecedented ability to identify, monitor and track a
virtually limitless number of individuals. Some leading-edge
technologies are likely to revolutionize the practice of surveillance.
The factors of cost, scale, size, location and distance have, in many
instances,  become largely irrelevant.

The impact of political and economic change throughout the world has
also created unforeseen dimensions to surveillance. The evolution of a
Global Information Infrastructure will have a profound impact on the
scope of potential surveillance of individuals. The end of the cold war
and the privatization of public sector activities has magnified the
impact of change. The merging of technologies has also created new
opportunities for wide-scale surveillance.

The nature of surveillance has changed to the extent that modern
information systems involve a pre-requisite of general surveillance of
populations. The pursuit of perfect identity has created a rush to
develop systems which create an intimacy between people and
technology.  Advanced biometric identification and sophisticated ID
card systems combine with geographic tracking to create the potential
to pinpoint the location of any individual. The use of distributed
databases and data matching programs makes such tracking economically
feasible on a large scale.

Extraordinary advances have recently been made in the field of visual
surveillance. Closed Circuit Television (CCTV) systems can digitally
scan, record, reconfigure and identify human faces, even in very poor
light conditions. Remote sensing through advanced satellite systems can
combine with ground databases and geodemographic systems to create mass
surveillance of human activity.

The globalization of information systems will take information once and
for all away from the protection and jurisdiction of national
boundaries. The development of data havens and rogue data states is
allowing highly sensitive personal information to be processed outside
any legal protection.

At a more intimate level, research is underway in more than a dozen
countries with the aim of implanting microchip technology directly into
the human brain. US and European medical institutes have already
conducted many such operations. The creation of a direct link between
the human brain and computer technology is at an advanced stage. Such
procedures are initially aimed at stimulating dead senses and paralyzed
limbs. Within two decades, it is possible that such implants will be at
a sufficiently advanced stage to enable complex interaction between the
brain and external technology.

The science of nanotechnology, which involves the re-configuration of
individual atoms and molecules, will present the potential for
virtually undetectable covert surveillance.

These and other developments are changing the nature and meaning of
surveillance. Law has scarcely had time to address even the most
visible of these changes. Public policy lags behind the technology by
many years. The repercussions for privacy and for numerous other
aspects of law and human rights need to be considered sooner rather
than later.

This one day conference will present an overview of these leading-edge
technologies, and will assess the impact that they may have in the
immediate future. Experts and analysts will discuss the nature and
application of the new technologies, and the public policy that should
be developed to cope with their use.

The conference theme is unique, and interest in the event has already
been expressed from throughout the world.

Program contents

The first session will assess new dimensions in current surveillance
technologies. The remainder of the day will be devoted to exploring
technologies which are in the formative stage of development.

        Preliminary List of Topics:

        o  Advanced Satellite Surveillance
        o  Microchip Implants
        o  Nanotechnology
        o  Biometrics and perfect identity
        o  Advanced Geodemographic Systems
        o  Data Havens and Rogue Data States
        o  Information Warfare
        o  Cryptography

The conference will be held in Copenhagen, and is timed to coincide
with the 17th annual international meeting of privacy and data 
protection commissioners.

Number of participants :  approximately one hundred

Cost:      US  $75 - Individuals/non-profit organizations
                    $175 - Commercial organizations
                        
Privacy International and the Electronic Privacy Information Center
are now requesting abstracts for papers.  Papers should be directed
at a general audience, and should either present an overview of an
aspect of advanced surveillance technology, or they should discuss
the likely use and impact of the technology.

Abstracts or papers can be emailed to Privacy International at:
pi@privacy.org

Alternatively, they can be sent to :
 
        Privacy International Washington Office
        666 Pennsylvania Ave, SE, Suite 301
        Washington, DC 20003 USA
        1-202-544-9240 (phone)
        1-202-547-5482 (fax)

Web address: http://privacy.org/pi/
gopher/ftp cpsr.org /cpsr/privacy/privacy_international/

======================================================================

_________________________________________________________________________
Subject: CFP - Advanced Surveillance...
_________________________________________________________________________
David Banisar (Banisar@epic.org)       * 202-544-9240 (tel)
Electronic Privacy Information Center * 202-547-5482 (fax)
666 Pennsylvania Ave, SE, Suite 301  * ftp/gopher/wais cpsr.org 
Washington, DC 20003                * HTTP://epic.digicash.com/epic


------------------------------

From: "Prof. L. P. Levine" <levine@blatz.cs.uwm.edu>
Date: 29 Dec 1994 10:50:22 -0600 (CST)
Subject: Info on CPD [unchanged since 12/29/94]
Organization: University of Wisconsin-Milwaukee

The Computer Privacy Digest is a forum for discussion on the effect of
technology on privacy or vice versa.  The digest is moderated and
gatewayed into the USENET newsgroup comp.society.privacy (Moderated).
Submissions should be sent to comp-privacy@uwm.edu and administrative
requests to comp-privacy-request@uwm.edu.  

This digest is a forum with information contributed via Internet
eMail.  Those who understand the technology also understand the ease of
forgery in this very free medium.  Statements, therefore, should be
taken with a grain of salt and it should be clear that the actual
contributor might not be the person whose email address is posted at
the top.  Any user who openly wishes to post anonymously should inform
the moderator at the beginning of the posting.  He will comply.

If you read this from the comp.society.privacy newsgroup and wish to
contribute a message, you should simply post your contribution.  As a
moderated newsgroup, attempts to post to the group are normally turned
into eMail to the submission address below.

On the other hand, if you read the digest eMailed to you, you generally
need only use the Reply feature of your mailer to contribute.  If you
do so, it is best to modify the "Subject:" line of your mailing.

Contributions to CPD should be submitted, with appropriate, substantive
SUBJECT: line, otherwise they may be ignored.  They must be relevant,
sound, in good taste, objective, cogent, coherent, concise, and
nonrepetitious.  Diversity is welcome, but not personal attacks.  Do
not include entire previous messages in responses to them.  Include
your name & legitimate Internet FROM: address, especially from
 .UUCP and .BITNET folks.  Anonymized mail is not accepted.  All
contributions considered as personal comments; usual disclaimers
apply.  All reuses of CPD material should respect stated copyright
notices, and should cite the sources explicitly; as a courtesy;
publications using CPD material should obtain permission from the
contributors.  

Contributions generally are acknowledged within 24 hours of
submission.  If selected, they are printed within two or three days.
The moderator reserves the right to delete extraneous quoted material.
He may change the SUBJECT: line of an article in order to make it
easier for the reader to follow a discussion.  He will not, however,
alter or edit or append to the text except for purely technical
reasons.

A library of back issues is available on ftp.cs.uwm.edu [129.89.9.18].
Login as "ftp" with password identifying yourid@yoursite.  The archives
are in the directory "pub/comp-privacy".

People with gopher capability can most easily access the library at
gopher.cs.uwm.edu.

Mosaic users will find it at gopher://gopher.cs.uwm.edu.

Older archives are also held at ftp.pica.army.mil [129.139.160.133].

 ---------------------------------+-----------------------------------------
Leonard P. Levine                 | Moderator of:     Computer Privacy Digest
Professor of Computer Science     |                  and comp.society.privacy
University of Wisconsin-Milwaukee | Post:                comp-privacy@uwm.edu
Box 784, Milwaukee WI 53201       | Information: comp-privacy-request@uwm.edu
                                  | Gopher:                 gopher.cs.uwm.edu 
levine@cs.uwm.edu                 | Mosaic:        gopher://gopher.cs.uwm.edu
 ---------------------------------+-----------------------------------------


------------------------------

End of Computer Privacy Digest V6 #042
******************************
.