PRIVACY Forum Archive Document

PRIVACY Forum Home Page

PFIR - "People For Internet Responsibility" Home Page

Vortex Technology Home Page


PRIVACY Forum Digest       Sunday, 26 September 1993       Volume 02 : Issue 31

          Moderated by Lauren Weinstein (lauren@vortex.com)
            Vortex Technology, Woodland Hills, CA, U.S.A.
        
                     ===== PRIVACY FORUM =====

          The PRIVACY Forum digest is supported in part by the 
              ACM Committee on Computers and Public Policy.


CONTENTS 
        Re: consciousness and the DMV (Darren Senn)
        DES is a dead dog... (Alan Wexelblat)
        CPSR Alert 2.01 (Dave Banisar) [Extracts by MODERATOR]
        Recent Journal Articles on Computers and Privacy? (Bruce Jones)
        Wiretap Article (Dorothy Denning)


 *** Please include a RELEVANT "Subject:" line on all submissions! ***
            *** Submissions without them may be ignored! ***

-----------------------------------------------------------------------------
The Internet PRIVACY Forum is a moderated digest for the discussion and
analysis of issues relating to the general topic of privacy (both personal
and collective) in the "information age" of the 1990's and beyond.  The
moderator will choose submissions for inclusion based on their relevance and
content.  Submissions will not be routinely acknowledged.

ALL submissions should be addressed to "privacy@vortex.com" and must have
RELEVANT "Subject:" lines; submissions without appropriate and relevant
"Subject:" lines may be ignored.  Excessive "signatures" on submissions are
subject to editing.  Subscriptions are by an automatic "listserv" system; for
subscription information, please send a message consisting of the word
"help" (quotes not included) in the BODY of a message to:
"privacy-request@vortex.com".  Mailing list problems should be reported to
"list-maint@vortex.com".  All submissions included in this digest represent
the views of the individual authors and all submissions will be considered
to be distributable without limitations. 

The PRIVACY Forum archive, including all issues of the digest and all
related materials, is available via anonymous FTP from site "ftp ftp.vortex.com",
in the "/privacy" directory.  Use the FTP login "ftp" or "anonymous", and
enter your e-mail address as the password.  The typical "README" and "INDEX"
files are available to guide you through the files available for FTP
access.  PRIVACY Forum materials may also be obtained automatically via
e-mail through the listserv system.  Please follow the instructions above
for getting the listserv "help" information, which includes details
regarding the "index" and "get" listserv commands, which are used to access
the PRIVACY Forum archive.  All PRIVACY Forum materials are also
available through the Internet Gopher system via a gopher server on
site "gopher.vortex.com/".

For information regarding the availability of this digest via FAX, please
send an inquiry to privacy-fax@vortex.com, call (818) 225-2800, or FAX
to (818) 225-7203.
-----------------------------------------------------------------------------

VOLUME 02, ISSUE 31

   Quote for the day:

        "Uh, just one more thing..."

                -- Variations on this line were spoken
                   by Columbo (Peter Falk) in virtually 
                   every episode of "Columbo" (1971-1978, 1989-1990).

----------------------------------------------------------------------

Date:    Mon, 30 Aug 1993 08:32:38 -0800 (PDT)
From:    sinster@scintilla.santa-clara.ca.us (Darren Senn)
Subject: Re: consciousness and the DMV

Thus spake Mel Beckman:
> [...] While there may be isolated
> cases of abuse, as there are with most every law, the problem is not the law
> but individuals who overstep their authority.

I disagree.  The problem definately _is_ with the law.  To be specific,
paragraphs (a) and (f) are the problem:

> From:    Henry Unger <hunger@hitech.com>
[...]
>      (a) [...] However, if a
> physician and surgeon reasonably and in good faith believes that
> the reporting of a patient will serve the public interest, he or
> she may report a patient's condition even if it may not be
> required under the state department's definition of disorders
> characterized by lapses of consciousness pursuant to subdivision
> (d).
[...]
>      (f) A physician and surgeon who reports a patient diagnosed
> as a case of a disorder characterized by lapses of consciousness
> pursuant to this section shall not be civilly or criminally
> liable to any patient for making any report required or
> authorized by this section. (Amended by Stats 1987 ch 321 S1;
  ^^^^^^^^^^
> Stats 1990 ch 911 S2, eff. 1/1/91.)

These two prevent any recourse on the part of the patient for dealing with
these overenthusiastic medical staffs.

-- 
Darren Senn          Phone: (408) 988-2640      Snail: 620 Park View Drive #206
sinster@scintilla.santa-clara.ca.us                       Santa Clara, CA 95054

------------------------------

Date:    Wed, 8 Sep 93 13:13:12 -0400
From:    "Alan (Gesture Man) Wexelblat" <wex@media.mit.edu>
Subject: DES is a dead dog...

> From: Philip Zimmermann <prz@columbine.cgd.ucar.EDU>
> Subject: Re: DES Key Search Paper (fwd)
>
> Michael Weiner presented a paper at Crypto93 that describes a fast DES key
> search engine that uses a special inside-out DES chip that he designed.
> This chip takes a single plaintext/ciphertext pair and quickly tries DES
> keys until it finds one that produces the given ciphertext from the given
> plaintext.  Weiner can get these chips made for $10.50 each in quantity, and
> can build a special machine with 57000 of these chips for $1 million.  This
> machine can exhaust the DES key space in 7 hours, finding a key in 3.5 hours
> on the average.  He works for Bell Northern Research in Ottawa, and says
> they have not actually built this machine, but he has the chip fully
> designed and ready for fabrication.
>
> This is a stunning breakthrough in the realization of practical DES
> cracking.  BTW-- note that PEM uses straight 56-bit DES.
>
> -prz

------------------------------

Date:    Mon, 13 Sep 1993 12:55:03 EST
From:    Dave Banisar <banisar@washofc.cpsr.org>
Subject: CPSR Alert 2.01 [Extracts by MODERATOR]


        [ I have extracted items of interest to this forum from 
          the complete CPSR Alert text.  Readers wishing to
          obtain the entire publication should contact
          CPSR directly.  -- MODERATOR ]


  CPSR Alert 2.01
     =============================================================

      @@@@  @@@@   @@@   @@@@        @    @     @@@@  @@@@  @@@@@
      @     @  @  @      @  @       @ @   @     @     @  @    @
      @     @@@     @    @@@       @@@@@  @     @@@   @@@     @
      @     @        @   @  @      @   @  @     @     @  @    @
      @@@@  @     @@@    @   @     @   @  @@@@  @@@@  @   @   @

     =============================================================
     Volume  2.01                               September 10, 1993
     -------------------------------------------------------------

                          Published by the
           Computer Professionals for Social Responsibility
                          Washington Office

                          Editor: Dave Banisar

                               --------

                       CPSR Washington Office Staff:
          Director: Marc Rotenberg (rotenberg@washofc.cpsr.org)
           Legal Counsel: David Sobel (sobel@washofc.cpsr.org)
         Policy Analyst: Dave Banisar (banisar@washofc.cpsr.org)
     -------------------------------------------------------------

  ...

  [3] National Performance Review Highlights.

  The NPR, a massive study on streamlining government headed by Vice
  President Albert Gore, has endorsed the creation of a Privacy
  Protection Board and the development of uniform privacy protection
  practices.  It has also recommended the development of a Digital
  Signature Standard by January 1994.

  Other information technology recommendations include implementing
  nationwide, integrated electronics benefits transfer, developing
  integrated electronic access to government (including information
  kiosks and a government wide electronic bulletin board system), the
  development of a national law enforcement/public safety network,
  government wide electronic mail and indexes for environmental and
  trade data. It also calls for the establishment of a government
  information infrastructure.

  A spokesman in the Vice President's office told the Alert that the
  specifics of the recommendations would be released within a few
  weeks. Government sources have indicated that many of the
  information technology recommendations originated at the National
  Institute of Standards and Technology. An electronic copy of the NPR
  is available from the CPSR Internet Library. See below (#8) for
  details.

     -------------------------------------------------------------

  [4] Gov't Panel Questions Clipper Chip Proposal

  After two days of sometimes tumultuous hearings, a government
  advisory board chartered to advise the administration and Congress
  on computer security and privacy issued two resolutions questioning
  many of the aspects of the Clinton Administration's controversial
  new encryption scheme, the Clipper Chip. The National Institute of
  Standards and Technology's Computer System Security and Privacy
  Advisory Board (CSSPAB) expressed continued concern over many
  aspects of the proposal including the lack of a convincing statement
  expressing the problems that the Clipper is supposed to solve, the
  need to look for possible alternatives to the proposal, the legal,
  economic, export controls issues, and software implementation of the
  proposal. In addition, the board also expressed concern  that the
  Clipper proposal could negatively impact the availability of
  cost-effective security products to the US government and industry
  and that it may not be marketable or usable worldwide.

  In a second resolution, the board unanimously called for a public
  debate of the proposal and recommended that Congress take an active
  role in determining US cryptography policy. It also recommended that
  any new policy must address the interests of law enforcement and
  intelligence, US industry and citizens' privacy and security in the
  US and worldwide.

  At the hearings, Geoff Greiveldinger from the Department of Justice
  reported that the key escrow agents will be announced within a few
  weeks after a briefing for members of  Congress. Sources inside the
  administration indicate that the administration may have decided to
  eliminate from consideration outside organizations holding the keys
  and is leaning towards the Department of the Treasury as one of the
  key holders. In addition, NIST Deputy Director Ray Kammer announced
  that the Data Encryption Standard (DES) will be recertified for
  government, non-classified use for another five years. The paperwork
  has been sent to Secretary of Commerce Ron Brown, who is expected to
  sign it within two weeks.

  The Clipper proposal was introduced April 16, 1993 and has been
  strongly opposed by both civil liberties groups and industry. The
  proposal calls for use of a secret encryption chip designed by the
  National Security Agency for non-classified voice and data
  transmission. The keys for the chip would be split and held in
  escrow by two government agencies. NIST has submitted the Clipper
  proposal for public comment. The FIPS was published in the Federal
  Register at Volume 58, page 40791 (July 30, 1993) and is also
  available in electronic form from the CPSR Internet Library
  FTP/WAIS/Gopher cpsr.org /cpsr/crypto/clipper/call-for-comments.
  Comments are due to NIST by September 28, 1993 to the  Director,
  Computer Systems Laboratory, ATTN: Proposed FIPS for Escrowed
  Encryption Standard, Technology Building, room B-154, National
  Institute of Standards and Technology, Gaithersburg, MD 20899. Other
  background material on the Clipper proposal and other cryptography
  issues is also available from the CPSR Internet Library.

  CPSR has created an archive of comments on the proposal and has
  asked people to electronically submit a copy of their comments to
  clipper@washofc.cpsr.org.

   A 450 page source book of materials on crypto policy is available
  from CPSR for $50.00. Contact banisar@washofc.cpsr.org for more
  information.

     -------------------------------------------------------------

  [5] Public Interest NII Coalition Meets in DC

  The third meeting of the Telecommunications Policy Roundtable took
  place on September 7 at the Carnegie Endowment for International
  Peace in Washington, DC.  Representatives from more than 60 public
  interest organizations gathered to discuss the development of a
  public interest agenda for the NII.  CPSR President Eric Roberts,
  Board member Todd Newman, and Seattle Chapter stalwart Doug Schuler
  flew in from the West Coast to attend the meeting.

  Larry Irving, Assistant Secretary of Commerce and head of the
  National Telecommunication Information Administration spoke to the
  group about the administration's plans for the National Information
  Infrastructure.  Mr. Irving said that he believed that universal
  service will be one of the critical goals.  He also said that the
  administration seeks to development a competitive marketplace for
  information services and to establish necessary consumer safeguards.

  The TPR proposed a set of public interest policy principles and
  prepared a document titled "Renewing the Commitment to Public
  Interest Communications Policy. " The policies covered freedom of
  communication, vital civic sector, universal access, competitive
  markets, privacy protection, equitable workplace, and democratic
  decision-making.  (A copy of the draft document is available from
  the CPSR archive).

  A formal press conference is scheduled for Thursday, October 7 at
  the National Press Club.  The next meeting of the TPR will be
  Tuesday, October 5.  For more information, contact Jeff Chester,
  Center for Media Education (cme@access.digex.net)

     -------------------------------------------------------------

  [6]  California Passes Landmark Information Access Bill

  The California Assembly  on September 8 voted 78 to 0 for a bill to
  make California legislative information available though the
  Internet. The bill (AB1624) was previously approved by the state
  Senate and now goes to Governor Pete Wilson,  who has 12 days to
  veto it before it becomes law.

  The bill requires  electronic distribution of the legislative agenda
  and requires the  " Legislative Council...to make available to the
  public, by means of access by way of the largest non-propriety,
  non-profit cooperative public computer network, specified
  information concerning bills, [and] the proceedings of the houses."
  It goes into effect January 1, 1994.

  The grassroots battle to pass this bill was led by Micro Times
  columnist and CPSR member Jim Warren. Using electronic networks, he
  organized a massive national fax , telephone and letter writing
  campaign to support the bill. It was opposed by LOGI-TECH, an
  information provider that sells legislative data.

     -------------------------------------------------------------

  [7] Wisconsin Looking for Privacy Advocate

  From: oravec@cs.wisc.edu (Jo Ann Oravec)

  Privacy Advocate... Madison, Wisconsin

  The State of Wisconsin is seeking a person responsible for support
  and advocacy in development and implementation of state and local
  government policies that protect personal privacy. This position
  reports to the Privacy Council.  Background in business and
  government application of information technology.  Salary $33,000
  per year plus excellent benefits.  Applicants should submit a
  detailed resume and a statement outlining their perspectives and
  approaches to privacy concerns to Mary Becker (608-266-0058, FAX
  608-264-9500), Department of Administration, 9th Floor, 101 E.
  Wilson, P.O. Box 7869, Madison, WI  53707-7869. Materials must be
  received before 4:30 PM on September 27, 1993.

     -------------------------------------------------------------

  [8] The CPSR Internet Library

  CPSR has set up an archive of materials on privacy, cryptography,
  information access, the National Information Infrastructure and
  other related issues. Recent additions to the archive include the
  entire National Performance Review report, and the full text of the
  Freedom of Information Act and the Federal Privacy Act of 1974.

  NPR /cpsr/clinton/npr
  FOIA /cpsr/foia/foia.txt
  Privacy Act of 1974 /cpsr/privacy_law/privacy_act_1974.txt

  The archive also archives materials from Privacy International,
  the US Privacy Council, the Taxpayers Assets Project and the
  Cypherpunks cryptography group. To access the archive,
  FTP/WAIS/Gopher cpsr.org.

     -------------------------------------------------------------

  [9] Upcoming Events

  International Privacy Roundtable, sponsored by Privacy International
  and the University of Manchester Law School- Manchester, England.
  September 29, 1993. Contact: simon davies
  (davies@privint.demon.co.uk).

  National Computer Security Conference, sponsored by NIST and NSA.
  Baltimore Convention Center, Baltimore, MD. September 20-23, 1993
  Contact NIST 301-975-2762.

  CPSR Annual Meeting,Seattle, WA.  October 16-17,  Contact: Aki
  Namioka (aki@atc.boeing.com)

  Computers Freedom and Privacy 4.  Chicago, Ill. March 1993. Contact:
  George Trubow, 312-987-1445 (cfp94@jmls.edu)

     ==============================================================

  To subscribe to the alert, send a message to listserv@gwuvm.gwu.edu
   "subscribe cpsr <your name>" (without quotes or brackets) to
  listserv@gwuvm.gwu.edu. Back issues of the Alert are available at
  the CPSR Internet Library FTP/WAIS/Gopher cpsr.org /cpsr/alert

  Computer Professionals for Social Responsibility is a national,
  non-partisan, public-interest organization dedicated to
  understanding and directing the impact of computers on society.
  Founded in 1981, CPSR has 2000 members from all over the world and
  22 chapters across the country. Our National Advisory Board includes
  a Nobel laureate and three winners of the Turing Award, the highest
  honor in computer science. Membership is open to everyone.

  For more information, please contact: cpsr@cpsr.org

  ...

------------------------------

Date:    Tue, 14 Sep 1993 11:18:06 -0700
From:    bjones@weber.ucsd.edu (Bruce Jones)
Subject: Recent Journal Articles on Computers and Privacy?

I am tentatively scheduled to teach a course on computers and
networks for the Department of Communication at UCSD.  The course
will be organized around the Internet and current cultural, social,
economic, and political debates: privacy, commercialization and
privatization, anonymity/identity, computer networks and the
changing nature of work, electronic publishing and copyright, etc.

I am looking here for references to recent journal articles covering 
current privacy and computer network concerns that I might use in a
course reader for this upper-division course.

Thank you,

Bruce Jones                     Communication Department
bjones@ucsd.edu/bitnet          University of California, San Diego
(619) 534-0417/4410             9500 Gilman Drive
FAX (619) 534-7315              La Jolla, Ca. 92093-0503

------------------------------

Date:    Fri, 24 Sep 1993 16:49:45 -0400 (EDT)
From:    denning@cs.georgetown.edu (Dorothy Denning)
Subject: Wiretap Article

The following article on wiretap laws and procedures was written in
response to the many questions and misunderstandings that have arisen
about wiretaps in the context of escrowed encryption as well as Digital
Telephony.  This article may be distributed.

Dorothy Denning
denning@cs.georgetown.edu

        [ I have included the introductory portion of the paper below.
          The entire text (~33K bytes) has been placed into the
          PRIVACY Forum archives.  To access:

            Via Anon FTP: From site "ftp ftp.vortex.com": /privacy/wiretap-laws.Z
                                                  or: /privacy/wiretap-laws

            Via e-mail: Send mail to "listserv@vortex.com" with
                        the line:

                            get privacy wiretap-laws

                        as the first text in the BODY of your message.

            Via gopher: From the gopher server on site "gopher.vortex.com/"
                in the "*** PRIVACY Forum ***" area under "wiretap-laws".

                                                        -- MODERATOR ]


                -----------------------------------------

                        WIRETAP LAWS AND PROCEDURES
             WHAT HAPPENS WHEN THE U.S. GOVERNMENT TAPS A LINE


                   Donald P. Delaney, Senior Investigator
                           New York State Police

                  Dorothy E. Denning, Professor and Chair
             Computer Science Department, Georgetown University

                      John Kaye, County Prosecutor
                      Monmouth County, New Jersey

        Alan R. McDonald, Special Assistant to the Assistant Director
        Technical Services Division, Federal Bureau of Investigation 


                           September 23, 1993
                                     

1.  Introduction

Although wiretaps are generally illegal in the United States, the
federal government and the governments of thirty seven states have been
authorized through federal and state legislation to intercept wire and
electronic communications under certain stringent rules which include
obtaining a court order.  These rules have been designed to ensure the
protection of individual privacy and Fourth Amendment rights, while
permitting the use of wiretaps for investigations of serious criminal
activity and for foreign intelligence.

This article describes the legal requirements for government
interceptions of wire and electronic communications and some of the
additional procedures and practices followed by federal and state
agencies.  The legal requirements are rooted in two pieces of federal
legislation: the Omnibus Crime Control and Safe Streets Act (Title III
of the Act (hereafter "Title III")), passed in 1968, and the Foreign
Intelligence Surveillance Act (FISA), passed in 1978.  Title III
established the basic law for federal and state law enforcement
interceptions performed for the purpose of criminal investigations,
while FISA established the law for federal-level interceptions
performed for intelligence and counterintelligence operations.  We will
first describe Title III interceptions and then describe FISA
interceptions.

------------------------------

End of PRIVACY Forum Digest 02.31
************************


PRIVACY Forum Home Page

Vortex Technology Home Page

Copyright © 2005 Vortex Technology. All Rights Reserved.