PRIVACY Forum Archive Document
PRIVACY Forum Digest Wednesday, 22 July 1992 Volume 01 : Issue 09 Moderated by Lauren Weinstein (email@example.com) Vortex Technology, Topanga, CA, U.S.A. ===== PRIVACY FORUM ===== The PRIVACY Forum digest is supported in part by the ACM Committee on Computers and Public Policy. CONTENTS PRIVACY Brief (Moderator--Lauren Weinstein) Knowing Better (Phil Karn) 911 privacy concern (Mel Beckman) U.S. encryption export control policy softens somewhat (Peter G. Neumann) Emerging Privacy Issues: Libraries (Peter Marshall) Telephone wiretapping (Erling Kristiansen) *** Please include a RELEVANT "Subject:" line on all submissions! *** *** Submissions without them may be ignored! *** ----------------------------------------------------------------------------- The PRIVACY Forum is a moderated digest for the discussion and analysis of issues relating to the general topic of privacy (both personal and collective) in the "information age" of the 1990's and beyond. The moderator will choose submissions for inclusion based on their relevance and content. Submissions will not be routinely acknowledged. ALL submissions should be addressed to "firstname.lastname@example.org" and must have RELEVANT "Subject:" lines. Submissions without appropriate and relevant "Subject:" lines may be ignored. Subscriptions are by an automatic "listserv" system; for subscription information, please send a message consisting of the word "help" (quotes not included) in the BODY of a message to: "email@example.com". Mailing list problems should be reported to "firstname.lastname@example.org". All submissions included in this digest represent the views of the individual authors and all submissions will be considered to be distributable without limitations. The PRIVACY Forum archive, including all issues of the digest and all related materials, is available via anonymous FTP from site "cv.vortex.com/", in the "/privacy" directory. Use the FTP login "ftp" or "anonymous", and enter your e-mail address as the password. The typical "README" and "INDEX" files are available to guide you through the files available for FTP access. PRIVACY Forum materials may also be obtained automatically via e-mail through the listserv system. Please follow the instructions above for getting the listserv "help" information, which includes details regarding the "index" and "get" listserv commands, which are used to access the PRIVACY Forum archive. For information regarding the availability of this digest via FAX, please send an inquiry to email@example.com, call (310) 455-9300, or FAX to (310) 455-2364. ----------------------------------------------------------------------------- VOLUME 01, ISSUE 09 Quote for the day: "It's such a comfort having a machine to do our thinking for us." -- Morticia Addams (referring to "Whizzo" the computer) "The Addams Family" (1964-1966) ---------------------------------------------------------------------- PRIVACY Brief (from the Moderator) --- The California State Supreme Court recently reversed the conviction of a wife and her lover for the murder of the wife's husband. The prosecution's primary evidence in the case was tapes of telephone conversations between the wife and her lover that the husband had been secretly making, which the prosecution had obtained. The court ruled unanimously that federal law bars family members from tapping the family phone, and that the tape was not admissible. The prosecution had argued that "domestic" taping of that sort was not illegal, and that even if the taping was illegal it was still admissible since the government had played no role in the making of the tapes (i.e. they acquired evidence made by a citizen). The court rejected both of these arguments, but reversed the conviction reluctantly. The court also suggested that perhaps it was unfortunate that Congress had adopted laws allowing such a broad-based suppression of evidence in such cases. ------------------------------ Date: Sat, 18 Jul 92 00:20:14 -0700 From: karn@chicago.Qualcomm.COM (Phil Karn) Subject: Knowing Better Okay, here's a personal anecdote for you. The other day I made an offer on a house. Sitting with my realtor in a Carl's Jr, I'm signing a large stack of forms when her transportable cell phone rings. It's a mortgage broker who wants to prequalify me for a loan. She hands the phone to me and before I know it, I'm telling him where I work, how much I make, how much I have in the bank, what other loans I have outstanding, etc. Unlike most people who can at least plead ignorance, I know all too well how easily these things are monitored. But in the excitement of the moment I did it anyway. That's why meaningful encryption ought to be a standard feature of any cellular telephone system. Phil ------------------------------ Date: Sat, 18 Jul 92 11:41:26 PST From: firstname.lastname@example.org (Mel Beckman) Subject: 911 privacy concern In this morning's Ventura County Star/Free Press newspaper (Sat 92jul17) appears an article headlined "Woman calls for help, lands in jail." Here is my own summary of their story: Oxnard, CA resident Helene Golemon called 911 to report (twice) a loud teenage street party in the wee hours. Later, at 6:00am, an officer arrived and arrested her on a (subsequently learned-to-be) erroneous misdemeanor traffic warrant. Golemon expressed outrage at the 911 records check, and that the warrant even existed at all. "Those kids were out there drinking and driving drunk. Nothing happened to them and I got arrested." After booking, including fingerprints and mug shots, she was detained in a holding cell until her husband posted $188 bond later that morning. Assistant police chief William Cady claimed that dispatchers often check available records, even on a reporting person, to know as much as possible about the people involved when responding to 911 calls. "Procedurally, our people did nothing wrong" he said. The arrest warrant, dated from an illegal left turn from May, 1988. Golemon fought the ticket and lost, then attended state-sponsored driver's education (a CA alternative to fines available for first-time offenders) in August 1988. The court has a copy of Golemon's driver education certificate on file, and Linda Finn, deputy executive officer for Ventura County Superior and Municipal Courts, couldn't explain why a warrant was later issued in 1989. Goleman was never notified of the warrant. Goleman felt the incident was vindictive, because the dispatcher was annoyed with her. "When I tried to explain the continuing problems we're having, she was very short with me," she said. Golemon then asked for the dispatchers name, and the dispatcher in turn demanded Golemon's full name. After Golemon complied, the dispatcher only told Golemon her badge number. The dispatcher remains unidentified in the news report, and an Oxnard police sergeant who reviewed the tape said the dispatcher was "absolutely professional." The privacy and computer risk concerns here seems to me three fold. First, the police often act with inappropriate gravity on erroneous, and apparently unverifiable, data. Under what circumstances does a misdemeanor warrant demand a 6:00am public arrest? Certainly more time could have been expended verifying the data, as an at-large illegal left-turner hardly threatens public safety. Second, apparently innocuous -- even beneficial -- contacts with government can result in record searches for unrelated information. Not only can this result in egregious seizures, as in this case, such an atmosphere can only stultify public/government relations. Crime and corruption thrive in such an environment. Third, although individuals have the right to know most information the government retains on them (FOIA), that right becomes meaningless if the government can, at any time, decided to integrate facts from disjoint data bases and then act without notice on resulting conclusions. One cannot submit an FOI request on the union of multiple far-flung data sets! -mel ___________________________________________________________________ | Mel beckman | Internet: email@example.com | | Beckman Software Engineering | Compuserve: 75226,2257 | | 1201 Nilgai Place | Voice: 805/647-1641 | | Ventura, CA 93003 | Fax: 805/647-3125 | |____________________________|__________________________________| ------------------------------ Date: Sun, 19 Jul 92 11:39:44 PDT From: "Peter G. Neumann" <firstname.lastname@example.org> Subject: U.S. encryption export control policy softens somewhat In the ongoing struggle between NSA's desires to be able to intercept international communications and software vendors' desires to be able to compete in international markets, the Bush administration has agreed to ease export controls on encryption-based software somewhat. The decision transfers control of encryption software (albeit only on a case-by-base basis) to the Commerce Department (from the State Department, which enforces standards equivalent to those of weapons export). An article by Don Clark in the San Francisco Chronicle, 18 July 1992, p.B1, suggests that systems with up to 40-digit RSA keys will now be considered for export. Clark's article notes that it is possible to get much better stuff on the streets of Europe -- and mentions "Cryptos", which uses both DES and RSA, which is available today in Moscow! In addition, the administration will now meet with industry representatives up to twice a year. The privacy implications remain murky. If the government can compromise 40-bit RSA keys, then this "softening" is only cosmetic. If they cannot, then one wonders why the "softening" has taken place. But the real irony is that RSA is almost trivial to implement anywhere, and is in some sense a better mousetrap. Perhaps we have here a case of the mousetrap that roared! Peter ------------------------------ Date: Mon, 20 Jul 92 08:47:02 -0700 From: email@example.com (Peter Marshall) Subject: Emerging Privacy Issues: Libraries Public libraries, those traditional, universal information providers and heirs to a long tradition of defense of users' privacy interests, would appear to be in for an otherwise unexpected change in the nature and extent of the sort of privacy concerns they're accustomed to facing. With increasing--and often, trendy--employment of a number of information technologies and services, coupled with an increase in the extent of library automation, and aided and abetted by a fashionable trend to implement fees for services often grounded on use of information technologies--sometimes referred to as the "entrepreneurial movement; the horizon in the public library world would seem to carry a marked increase in the collection, processing, etc. of transaction-generated information. This tendency, familiar enough in other areas of emerging privacy issues, seems to be occurring, as in some other areas, in an environment that shows signs of a broader tendency to information-as-commodity, and thus to concerns about commercialization and privatization. Although these latter concerns get attention in the professional library community, this group appears generally less tuned-in to privacy issues other' than those that are traditional in the library setting; while at the same time, these same broader concerns appear to get less attention themselves from the broader community these perhaps all-too-familiar civic institutions serve. Emerging privacy issues for public libraries would seem to call up the usual panoply of information-privacy and information-policy concerns; e.g., disclosure as the flip side of access, and those otherwise well-known reference-points, Principles of Fair Information Practices. The public library as the good 'ol bastion of privacy? Let's see. Peter Marshall ------------------------------ Date: Wed, 22 Jul 92 09:16:03 CET From: "E. Kristiansen - WMS" <EKRISTIA@estec.estec.esa.nl> Subject: Telephone wiretapping NRC Handelsblad, a Dutch newspaper, of 20 July has two articles concerning telephone wiretapping. The first article describes several cases of alleged unauthorized wiretaps performed by PTT Telecon, the Dutch telephone company. The PTT is accused of establishing wiretaps on telephone lines without the required court order, on request of the police and legal authorities (district attorney). In one case, a PTT employee has allegedly passed on information obtained from illegally bugging a phone line, to a criminal (drug dealer). The employee has been fired. A PTT spokesperson says that "according to current procedure", the police cannot request a wiretap directly. The request is to be submitted through the proper legal channels. Fron a technical point of view, the article suggests, without giving much detail, that it is very easy to establish a wiretap, and that the only control is through procedures, relying on "highly trusted personnel". Further, it is said that the PTT never performs wiretapping itself, it only establishes the tap to a line going to the police office. It is not said that the PTT CANNOT do wiretapping, and I would assume that they can, e.g. for technical monitoring of line quality. The other article describes how an on-hook telephone set can be used for bugging the room in which it is installed. The trick can be performed by anybody who can gain access, legally or illegally, to any point of the wire pair connecting the telephone set to the exchange. A high frequency signal is injected into the line. This signal bypasses the hook switch of the set (capacitive coupling, I suppose). The microphone modulates the signal (technical details not given), and the intruder can demodulate, and listen to the conversation in the room. When this trick was published in the press, PTT says it will shortly be offering a telephone plug with a built-in capacitor to short the HF signal. The plug will sell for about Dfl.5 (USD 3). Consumer organizations urge that the plug should be available free of charge to anybody asking for it. It is not said whether the trick will work on all current types of phones, or only on particular brands. Erling Kristiansen [ This sort of bugging is definitely not new and has been described in various "popular" books concerning law enforcement and intelligence topics. -- MODERATOR ] ------------------------------ End of PRIVACY Forum Digest 01.09 ************************
Vortex Technology Home Page
Copyright © 2005 Vortex Technology. All Rights Reserved.