home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Handbook of Infosec Terms 2.0
/
Handbook_of_Infosec_Terms_Version_2.0_ISSO.iso
/
text
/
privacy
/
p02_031.txt
< prev
next >
Wrap
Text File
|
1996-09-03
|
23KB
|
506 lines
PRIVACY Forum Digest Sunday, 26 September 1993 Volume 02 : Issue 31
Moderated by Lauren Weinstein (lauren@vortex.com)
Vortex Technology, Woodland Hills, CA, U.S.A.
===== PRIVACY FORUM =====
The PRIVACY Forum digest is supported in part by the
ACM Committee on Computers and Public Policy.
CONTENTS
Re: consciousness and the DMV (Darren Senn)
DES is a dead dog... (Alan Wexelblat)
CPSR Alert 2.01 (Dave Banisar) [Extracts by MODERATOR]
Recent Journal Articles on Computers and Privacy? (Bruce Jones)
Wiretap Article (Dorothy Denning)
*** Please include a RELEVANT "Subject:" line on all submissions! ***
*** Submissions without them may be ignored! ***
-----------------------------------------------------------------------------
The Internet PRIVACY Forum is a moderated digest for the discussion and
analysis of issues relating to the general topic of privacy (both personal
and collective) in the "information age" of the 1990's and beyond. The
moderator will choose submissions for inclusion based on their relevance and
content. Submissions will not be routinely acknowledged.
ALL submissions should be addressed to "privacy@vortex.com" and must have
RELEVANT "Subject:" lines; submissions without appropriate and relevant
"Subject:" lines may be ignored. Excessive "signatures" on submissions are
subject to editing. Subscriptions are by an automatic "listserv" system; for
subscription information, please send a message consisting of the word
"help" (quotes not included) in the BODY of a message to:
"privacy-request@vortex.com". Mailing list problems should be reported to
"list-maint@vortex.com". All submissions included in this digest represent
the views of the individual authors and all submissions will be considered
to be distributable without limitations.
The PRIVACY Forum archive, including all issues of the digest and all
related materials, is available via anonymous FTP from site "ftp.vortex.com",
in the "/privacy" directory. Use the FTP login "ftp" or "anonymous", and
enter your e-mail address as the password. The typical "README" and "INDEX"
files are available to guide you through the files available for FTP
access. PRIVACY Forum materials may also be obtained automatically via
e-mail through the listserv system. Please follow the instructions above
for getting the listserv "help" information, which includes details
regarding the "index" and "get" listserv commands, which are used to access
the PRIVACY Forum archive. All PRIVACY Forum materials are also
available through the Internet Gopher system via a gopher server on
site "gopher.vortex.com".
For information regarding the availability of this digest via FAX, please
send an inquiry to privacy-fax@vortex.com, call (818) 225-2800, or FAX
to (818) 225-7203.
-----------------------------------------------------------------------------
VOLUME 02, ISSUE 31
Quote for the day:
"Uh, just one more thing..."
-- Variations on this line were spoken
by Columbo (Peter Falk) in virtually
every episode of "Columbo" (1971-1978, 1989-1990).
----------------------------------------------------------------------
Date: Mon, 30 Aug 1993 08:32:38 -0800 (PDT)
From: sinster@scintilla.santa-clara.ca.us (Darren Senn)
Subject: Re: consciousness and the DMV
Thus spake Mel Beckman:
> [...] While there may be isolated
> cases of abuse, as there are with most every law, the problem is not the law
> but individuals who overstep their authority.
I disagree. The problem definately _is_ with the law. To be specific,
paragraphs (a) and (f) are the problem:
> From: Henry Unger <hunger@hitech.com>
[...]
> (a) [...] However, if a
> physician and surgeon reasonably and in good faith believes that
> the reporting of a patient will serve the public interest, he or
> she may report a patient's condition even if it may not be
> required under the state department's definition of disorders
> characterized by lapses of consciousness pursuant to subdivision
> (d).
[...]
> (f) A physician and surgeon who reports a patient diagnosed
> as a case of a disorder characterized by lapses of consciousness
> pursuant to this section shall not be civilly or criminally
> liable to any patient for making any report required or
> authorized by this section. (Amended by Stats 1987 ch 321 S1;
^^^^^^^^^^
> Stats 1990 ch 911 S2, eff. 1/1/91.)
These two prevent any recourse on the part of the patient for dealing with
these overenthusiastic medical staffs.
--
Darren Senn Phone: (408) 988-2640 Snail: 620 Park View Drive #206
sinster@scintilla.santa-clara.ca.us Santa Clara, CA 95054
------------------------------
Date: Wed, 8 Sep 93 13:13:12 -0400
From: "Alan (Gesture Man) Wexelblat" <wex@media.mit.edu>
Subject: DES is a dead dog...
> From: Philip Zimmermann <prz@columbine.cgd.ucar.EDU>
> Subject: Re: DES Key Search Paper (fwd)
>
> Michael Weiner presented a paper at Crypto93 that describes a fast DES key
> search engine that uses a special inside-out DES chip that he designed.
> This chip takes a single plaintext/ciphertext pair and quickly tries DES
> keys until it finds one that produces the given ciphertext from the given
> plaintext. Weiner can get these chips made for $10.50 each in quantity, and
> can build a special machine with 57000 of these chips for $1 million. This
> machine can exhaust the DES key space in 7 hours, finding a key in 3.5 hours
> on the average. He works for Bell Northern Research in Ottawa, and says
> they have not actually built this machine, but he has the chip fully
> designed and ready for fabrication.
>
> This is a stunning breakthrough in the realization of practical DES
> cracking. BTW-- note that PEM uses straight 56-bit DES.
>
> -prz
------------------------------
Date: Mon, 13 Sep 1993 12:55:03 EST
From: Dave Banisar <banisar@washofc.cpsr.org>
Subject: CPSR Alert 2.01 [Extracts by MODERATOR]
[ I have extracted items of interest to this forum from
the complete CPSR Alert text. Readers wishing to
obtain the entire publication should contact
CPSR directly. -- MODERATOR ]
CPSR Alert 2.01
=============================================================
@@@@ @@@@ @@@ @@@@ @ @ @@@@ @@@@ @@@@@
@ @ @ @ @ @ @ @ @ @ @ @ @
@ @@@ @ @@@ @@@@@ @ @@@ @@@ @
@ @ @ @ @ @ @ @ @ @ @ @
@@@@ @ @@@ @ @ @ @ @@@@ @@@@ @ @ @
=============================================================
Volume 2.01 September 10, 1993
-------------------------------------------------------------
Published by the
Computer Professionals for Social Responsibility
Washington Office
Editor: Dave Banisar
--------
CPSR Washington Office Staff:
Director: Marc Rotenberg (rotenberg@washofc.cpsr.org)
Legal Counsel: David Sobel (sobel@washofc.cpsr.org)
Policy Analyst: Dave Banisar (banisar@washofc.cpsr.org)
-------------------------------------------------------------
...
[3] National Performance Review Highlights.
The NPR, a massive study on streamlining government headed by Vice
President Albert Gore, has endorsed the creation of a Privacy
Protection Board and the development of uniform privacy protection
practices. It has also recommended the development of a Digital
Signature Standard by January 1994.
Other information technology recommendations include implementing
nationwide, integrated electronics benefits transfer, developing
integrated electronic access to government (including information
kiosks and a government wide electronic bulletin board system), the
development of a national law enforcement/public safety network,
government wide electronic mail and indexes for environmental and
trade data. It also calls for the establishment of a government
information infrastructure.
A spokesman in the Vice President's office told the Alert that the
specifics of the recommendations would be released within a few
weeks. Government sources have indicated that many of the
information technology recommendations originated at the National
Institute of Standards and Technology. An electronic copy of the NPR
is available from the CPSR Internet Library. See below (#8) for
details.
-------------------------------------------------------------
[4] Gov't Panel Questions Clipper Chip Proposal
After two days of sometimes tumultuous hearings, a government
advisory board chartered to advise the administration and Congress
on computer security and privacy issued two resolutions questioning
many of the aspects of the Clinton Administration's controversial
new encryption scheme, the Clipper Chip. The National Institute of
Standards and Technology's Computer System Security and Privacy
Advisory Board (CSSPAB) expressed continued concern over many
aspects of the proposal including the lack of a convincing statement
expressing the problems that the Clipper is supposed to solve, the
need to look for possible alternatives to the proposal, the legal,
economic, export controls issues, and software implementation of the
proposal. In addition, the board also expressed concern that the
Clipper proposal could negatively impact the availability of
cost-effective security products to the US government and industry
and that it may not be marketable or usable worldwide.
In a second resolution, the board unanimously called for a public
debate of the proposal and recommended that Congress take an active
role in determining US cryptography policy. It also recommended that
any new policy must address the interests of law enforcement and
intelligence, US industry and citizens' privacy and security in the
US and worldwide.
At the hearings, Geoff Greiveldinger from the Department of Justice
reported that the key escrow agents will be announced within a few
weeks after a briefing for members of Congress. Sources inside the
administration indicate that the administration may have decided to
eliminate from consideration outside organizations holding the keys
and is leaning towards the Department of the Treasury as one of the
key holders. In addition, NIST Deputy Director Ray Kammer announced
that the Data Encryption Standard (DES) will be recertified for
government, non-classified use for another five years. The paperwork
has been sent to Secretary of Commerce Ron Brown, who is expected to
sign it within two weeks.
The Clipper proposal was introduced April 16, 1993 and has been
strongly opposed by both civil liberties groups and industry. The
proposal calls for use of a secret encryption chip designed by the
National Security Agency for non-classified voice and data
transmission. The keys for the chip would be split and held in
escrow by two government agencies. NIST has submitted the Clipper
proposal for public comment. The FIPS was published in the Federal
Register at Volume 58, page 40791 (July 30, 1993) and is also
available in electronic form from the CPSR Internet Library
FTP/WAIS/Gopher cpsr.org /cpsr/crypto/clipper/call-for-comments.
Comments are due to NIST by September 28, 1993 to the Director,
Computer Systems Laboratory, ATTN: Proposed FIPS for Escrowed
Encryption Standard, Technology Building, room B-154, National
Institute of Standards and Technology, Gaithersburg, MD 20899. Other
background material on the Clipper proposal and other cryptography
issues is also available from the CPSR Internet Library.
CPSR has created an archive of comments on the proposal and has
asked people to electronically submit a copy of their comments to
clipper@washofc.cpsr.org.
A 450 page source book of materials on crypto policy is available
from CPSR for $50.00. Contact banisar@washofc.cpsr.org for more
information.
-------------------------------------------------------------
[5] Public Interest NII Coalition Meets in DC
The third meeting of the Telecommunications Policy Roundtable took
place on September 7 at the Carnegie Endowment for International
Peace in Washington, DC. Representatives from more than 60 public
interest organizations gathered to discuss the development of a
public interest agenda for the NII. CPSR President Eric Roberts,
Board member Todd Newman, and Seattle Chapter stalwart Doug Schuler
flew in from the West Coast to attend the meeting.
Larry Irving, Assistant Secretary of Commerce and head of the
National Telecommunication Information Administration spoke to the
group about the administration's plans for the National Information
Infrastructure. Mr. Irving said that he believed that universal
service will be one of the critical goals. He also said that the
administration seeks to development a competitive marketplace for
information services and to establish necessary consumer safeguards.
The TPR proposed a set of public interest policy principles and
prepared a document titled "Renewing the Commitment to Public
Interest Communications Policy. " The policies covered freedom of
communication, vital civic sector, universal access, competitive
markets, privacy protection, equitable workplace, and democratic
decision-making. (A copy of the draft document is available from
the CPSR archive).
A formal press conference is scheduled for Thursday, October 7 at
the National Press Club. The next meeting of the TPR will be
Tuesday, October 5. For more information, contact Jeff Chester,
Center for Media Education (cme@access.digex.net)
-------------------------------------------------------------
[6] California Passes Landmark Information Access Bill
The California Assembly on September 8 voted 78 to 0 for a bill to
make California legislative information available though the
Internet. The bill (AB1624) was previously approved by the state
Senate and now goes to Governor Pete Wilson, who has 12 days to
veto it before it becomes law.
The bill requires electronic distribution of the legislative agenda
and requires the " Legislative Council...to make available to the
public, by means of access by way of the largest non-propriety,
non-profit cooperative public computer network, specified
information concerning bills, [and] the proceedings of the houses."
It goes into effect January 1, 1994.
The grassroots battle to pass this bill was led by Micro Times
columnist and CPSR member Jim Warren. Using electronic networks, he
organized a massive national fax , telephone and letter writing
campaign to support the bill. It was opposed by LOGI-TECH, an
information provider that sells legislative data.
-------------------------------------------------------------
[7] Wisconsin Looking for Privacy Advocate
From: oravec@cs.wisc.edu (Jo Ann Oravec)
Privacy Advocate... Madison, Wisconsin
The State of Wisconsin is seeking a person responsible for support
and advocacy in development and implementation of state and local
government policies that protect personal privacy. This position
reports to the Privacy Council. Background in business and
government application of information technology. Salary $33,000
per year plus excellent benefits. Applicants should submit a
detailed resume and a statement outlining their perspectives and
approaches to privacy concerns to Mary Becker (608-266-0058, FAX
608-264-9500), Department of Administration, 9th Floor, 101 E.
Wilson, P.O. Box 7869, Madison, WI 53707-7869. Materials must be
received before 4:30 PM on September 27, 1993.
-------------------------------------------------------------
[8] The CPSR Internet Library
CPSR has set up an archive of materials on privacy, cryptography,
information access, the National Information Infrastructure and
other related issues. Recent additions to the archive include the
entire National Performance Review report, and the full text of the
Freedom of Information Act and the Federal Privacy Act of 1974.
NPR /cpsr/clinton/npr
FOIA /cpsr/foia/foia.txt
Privacy Act of 1974 /cpsr/privacy_law/privacy_act_1974.txt
The archive also archives materials from Privacy International,
the US Privacy Council, the Taxpayers Assets Project and the
Cypherpunks cryptography group. To access the archive,
FTP/WAIS/Gopher cpsr.org.
-------------------------------------------------------------
[9] Upcoming Events
International Privacy Roundtable, sponsored by Privacy International
and the University of Manchester Law School- Manchester, England.
September 29, 1993. Contact: simon davies
(davies@privint.demon.co.uk).
National Computer Security Conference, sponsored by NIST and NSA.
Baltimore Convention Center, Baltimore, MD. September 20-23, 1993
Contact NIST 301-975-2762.
CPSR Annual Meeting,Seattle, WA. October 16-17, Contact: Aki
Namioka (aki@atc.boeing.com)
Computers Freedom and Privacy 4. Chicago, Ill. March 1993. Contact:
George Trubow, 312-987-1445 (cfp94@jmls.edu)
==============================================================
To subscribe to the alert, send a message to listserv@gwuvm.gwu.edu
"subscribe cpsr <your name>" (without quotes or brackets) to
listserv@gwuvm.gwu.edu. Back issues of the Alert are available at
the CPSR Internet Library FTP/WAIS/Gopher cpsr.org /cpsr/alert
Computer Professionals for Social Responsibility is a national,
non-partisan, public-interest organization dedicated to
understanding and directing the impact of computers on society.
Founded in 1981, CPSR has 2000 members from all over the world and
22 chapters across the country. Our National Advisory Board includes
a Nobel laureate and three winners of the Turing Award, the highest
honor in computer science. Membership is open to everyone.
For more information, please contact: cpsr@cpsr.org
...
------------------------------
Date: Tue, 14 Sep 1993 11:18:06 -0700
From: bjones@weber.ucsd.edu (Bruce Jones)
Subject: Recent Journal Articles on Computers and Privacy?
I am tentatively scheduled to teach a course on computers and
networks for the Department of Communication at UCSD. The course
will be organized around the Internet and current cultural, social,
economic, and political debates: privacy, commercialization and
privatization, anonymity/identity, computer networks and the
changing nature of work, electronic publishing and copyright, etc.
I am looking here for references to recent journal articles covering
current privacy and computer network concerns that I might use in a
course reader for this upper-division course.
Thank you,
Bruce Jones Communication Department
bjones@ucsd.edu/bitnet University of California, San Diego
(619) 534-0417/4410 9500 Gilman Drive
FAX (619) 534-7315 La Jolla, Ca. 92093-0503
------------------------------
Date: Fri, 24 Sep 1993 16:49:45 -0400 (EDT)
From: denning@cs.georgetown.edu (Dorothy Denning)
Subject: Wiretap Article
The following article on wiretap laws and procedures was written in
response to the many questions and misunderstandings that have arisen
about wiretaps in the context of escrowed encryption as well as Digital
Telephony. This article may be distributed.
Dorothy Denning
denning@cs.georgetown.edu
[ I have included the introductory portion of the paper below.
The entire text (~33K bytes) has been placed into the
PRIVACY Forum archives. To access:
Via Anon FTP: From site "ftp.vortex.com": /privacy/wiretap.laws.Z
or: /privacy/wiretap.laws
Via e-mail: Send mail to "listserv@vortex.com" with
the line:
get privacy wiretap.laws
as the first text in the BODY of your message.
Via gopher: From the gopher server on site "gopher.vortex.com"
in the "*** PRIVACY Forum ***" area under "wiretap.laws".
-- MODERATOR ]
-----------------------------------------
WIRETAP LAWS AND PROCEDURES
WHAT HAPPENS WHEN THE U.S. GOVERNMENT TAPS A LINE
Donald P. Delaney, Senior Investigator
New York State Police
Dorothy E. Denning, Professor and Chair
Computer Science Department, Georgetown University
John Kaye, County Prosecutor
Monmouth County, New Jersey
Alan R. McDonald, Special Assistant to the Assistant Director
Technical Services Division, Federal Bureau of Investigation
September 23, 1993
1. Introduction
Although wiretaps are generally illegal in the United States, the
federal government and the governments of thirty seven states have been
authorized through federal and state legislation to intercept wire and
electronic communications under certain stringent rules which include
obtaining a court order. These rules have been designed to ensure the
protection of individual privacy and Fourth Amendment rights, while
permitting the use of wiretaps for investigations of serious criminal
activity and for foreign intelligence.
This article describes the legal requirements for government
interceptions of wire and electronic communications and some of the
additional procedures and practices followed by federal and state
agencies. The legal requirements are rooted in two pieces of federal
legislation: the Omnibus Crime Control and Safe Streets Act (Title III
of the Act (hereafter "Title III")), passed in 1968, and the Foreign
Intelligence Surveillance Act (FISA), passed in 1978. Title III
established the basic law for federal and state law enforcement
interceptions performed for the purpose of criminal investigations,
while FISA established the law for federal-level interceptions
performed for intelligence and counterintelligence operations. We will
first describe Title III interceptions and then describe FISA
interceptions.
------------------------------
End of PRIVACY Forum Digest 02.31
************************