home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Handbook of Infosec Terms 2.0
/
Handbook_of_Infosec_Terms_Version_2.0_ISSO.iso
/
text
/
privacy
/
p04_008.txt
< prev
next >
Wrap
Text File
|
1996-09-03
|
29KB
|
587 lines
PRIVACY Forum Digest Saturday, 8 April 1995 Volume 04 : Issue 08
Moderated by Lauren Weinstein (lauren@vortex.com)
Vortex Technology, Woodland Hills, CA, U.S.A.
===== PRIVACY FORUM =====
The PRIVACY Forum digest is supported in part by the
ACM Committee on Computers and Public Policy,
and the Data Services Division
of MCI Communications Corporation.
CONTENTS
Data Mining (Phil Agre)
NIST Digital Signatures (Lim Chiang)
EPIC Alert 2.05 [Decency Act] (Dave Banisar)
Destruction of data (Charles M. Preston)
Destruction of data [more] (Charles M. Preston)
Misleading privacy claims (Charles M. Preston)
Medical Records Access (Valerie F. Gerberich)
Re: Perhaps privacy is not what it seems (Cliff Sojourner)
Protection of Youth Against Trashy and Smutty Literature
(Jim Warren)
More on "Communications Decency Act"
(Lauren Weinstein; PRIVACY Forum Moderator)
*** Please include a RELEVANT "Subject:" line on all submissions! ***
*** Submissions without them may be ignored! ***
-----------------------------------------------------------------------------
The Internet PRIVACY Forum is a moderated digest for the discussion and
analysis of issues relating to the general topic of privacy (both personal
and collective) in the "information age" of the 1990's and beyond. The
moderator will choose submissions for inclusion based on their relevance and
content. Submissions will not be routinely acknowledged.
All submissions should be addressed to "privacy@vortex.com" and must have
RELEVANT "Subject:" lines; submissions without appropriate and relevant
"Subject:" lines may be ignored. Excessive "signatures" on submissions are
subject to editing. Subscriptions are by an automatic "listserv" system; for
subscription information, please send a message consisting of the word
"help" (quotes not included) in the BODY of a message to:
"privacy-request@vortex.com". Mailing list problems should be reported to
"list-maint@vortex.com".
All messages included in this digest represent the views of their
individual authors and all messages submitted must be appropriate to be
distributable without limitations.
The PRIVACY Forum archive, including all issues of the digest and all
related materials, is available via anonymous FTP from site "ftp.vortex.com",
in the "/privacy" directory. Use the FTP login "ftp" or "anonymous", and
enter your e-mail address as the password. The typical "README" and "INDEX"
files are available to guide you through the files available for FTP
access. PRIVACY Forum materials may also be obtained automatically via
e-mail through the listserv system. Please follow the instructions above
for getting the listserv "help" information, which includes details
regarding the "index" and "get" listserv commands, which are used to access
the PRIVACY Forum archive. All PRIVACY Forum materials are available
through the Internet Gopher system via a gopher server on site
"gopher.vortex.com". Access to PRIVACY Forum materials is also available
through the Internet World Wide Web (WWW) via the Vortex Technology WWW
server at the URL: "http://www.vortex.com".
-----------------------------------------------------------------------------
VOLUME 04, ISSUE 08
Quote for the day:
"Bombs away, pretzel boy."
-- Military Commander (Lloyd Bridges)
"Rolled Gold Pretzels" Television Commercial (1995)
----------------------------------------------------------------------
Date: Fri, 24 Mar 1995 16:02:22 -0800
From: Phil Agre <pagre@weber.ucsd.edu>
Subject: data mining
Perhaps a bit out of date but still very interesting: The 8/16/94 Wall Street
Journal includes an article about the use of "data mining" by companies with
large amounts of customer transaction data. The full reference is:
Laurie Hays, Using computers to divine who might buy a gas grill, Wall
Street Journal, 16 August 1994, pages B1, B4.
The prototype of this kind of processing is American Express, which is
reported to have half a terabyte of information about its customers'
charges on its 35 million cards. The idea is to find patterns that predict
what product categories individual purchasers might be interested in, and
then send them advertisements accordingly. This kind of processing is ideal
for massively parallel computers, and many makers of such machines are doing
well. (Thinking Machines Corporation, unfortunately, is not one of them.
The same issue of WSJ reports on its imminent bankruptcy filing. This is
ironic, given that American Express was one of its first important customers
outside the military-government-research world.) From the numbers in the
article, it sounds like the number of companies using these techniques is in
the hundreds and growing rapidly.
What I find most interesting here is the set of cultural assumptions that
goes into the data searches. For example, people who recently bought outdoor
patio furniture are pitched gas grills. A woman who buys her dresses at
Saks is pitched Saks shoes. A bank analyzed customers' financial situations
and pitched home equity loans to those who were likely to pay them back. In
each case, a certain amount of social reasoning has gone into the algorithms,
based on assumptions about normal or average behavior and the connections in
people's lives between different categories of commodities.
All of the examples in the story involve companies mining information on their
own customers, though perhaps setting up partnerships with other companies to
fashion offers to them. No mention is made of mined information being sold.
Maybe that's because people would be too offended to hear of such information
being sold, or maybe it's because it's advisable to keep the practice quiet.
In any case it's hard to believe there's no market for it.
The data-mining techniques are used for other purposes as well, including
fraud detection and inferring bad batches of parts from patterns of warranty
service. (That one is my favorite.)
Some employees are reported resisting the new technology, though the one
case the article reports doesn't have specifically to do with data mining,
just with high-tech logistics in mass retailing. It seems reasonable to
guess that the resistance comes from deskilling: if restocking decisions are
taken away from local store managers (and this is definitely the trend) then,
other things being equal, the skill levels and thus the salaries of those
store managers tends to go down.
The massive aggregation of data in things like marketing databases and some
proposed intelligent vehicle-highway systems leads to new questions about
privacy. If any given fact about me is innocuous, or at least innocuous
enough that I'm willing to let a company store it in exchange for credit or
automatic toll collection etc, it doesn't follow that ten thousand facts about
me are equally innocuous. How to even conceptualize, much less regulate, this
phenomenon of emergent personal information?
In many cases, the problem is actually harder. If you've just bought patio
furniture then you might want a gas grill: this surmise only requires a few
facts about you. But heretofore those few facts had a sort of anonymity; they
were lost in the enormous crowd of other, equally arbitrary facts. But with
massively parallel processing, it becomes possible for numerous individual
facts to take on individual consequences. It's one thing if your charge slip
for patio furniture (or plastic surgery, or condoms) gets processed and filed
in a huge pile with a million others, but it's quite another thing if someone
pulls out your charge slip and says "hey, this person might want to hear from
a dating service!" or whatever. Can we even say that someone's privacy has
been invaded here? We need new words for these things, rather than stretching
the word "privacy" to cover all information-related offenses to human dignity
under the sun.
Phil Agre, UCSD
------------------------------
Date: Mon, 27 Mar 1995 16:18:00 +1000
From: Lim Chiang <Chiang.Lim@saa.sa.telememo.au> (Tel 02 746 4832)
Subject: NIST Digital Signatures
Can anyone direct me to documents describing the implementations of
digital signatures and NIST's digital signature standard.
If there is any information regarding central agencies/organisations
generating the public and private key pairs, the issuing of such and
the certificates, the auditing of organisations' and users' use of
the key pairs, etc., please indicate where such information is also
available.
With appreciation,
Chiang Lim
Standards Australia
X.400: S=LIM; O=SAA; P=SA; A=TELEMEMO; C=AU
Internet: lim@saa.sa.telememo.au
------------------------------
Date: Mon, 27 Mar 1995 02:54:36 -0800
From: banisar@epic.org (Dave Banisar)
Subject: EPIC Alert 2.05 [Decency Act]
[ Extracted from EPIC Alert 2.05 by PRIVACY Forum Moderator ]
=======================================================================
[1] Senate Committee Approves "Decency" bill
=======================================================================
The Senate Commerce Committee voted on March 23 to incorporate a
revised version of S. 314, the Communications Decency Act of 1995,
into the telecommunications reform legislation. The amendment makes
every person who creates, makes or solicits "any comment, request,
suggestion, proposal or other communication which is obscene, lewd,
lascivious, filthy, or indecent" subject to criminal prosecution. The
bill also gives the FCC sweeping new authority to regulate on-line
communications, and curtails First Amendment rights that currently
exist for print communication.
In a revision pushed by online providers, commercial carriers may
avoid liability if they do not exercise editorial control over
content, or if they take a series of good faith steps to comply with
the statute. A provision criminalizing anonymous messages that
"annoy, abuse, threaten, or harass" was also removed.
However, users of on-line services, content providers, electronic
publishers, and journalists face new restrictions on speech and
private communications. For this reason, there is still considerable
opposition to the bill. Civil liberties groups believe that the bill
is unconstitutional.
The Senate Commerce Committee approved the amendment, sponsored by
Senator Slade Gorton (R-WA), unanimously by voice vote. The entire
bill was approved by the Committee 17-2, subject to amendments. The
bill now goes to the full Senate, where more amendments are expected
to be added.
The legislation has generated considerable controversy. Earlier this
week, the presidents of the major computing societies in the US - ACM,
IEEE, SIAM, CPSR and AAAI - wrote to Senator Exon expressing concern
about the effects on the development of computer networks if the
legislation was enacted. An Internet petition calling for the
withdrawal of the legislation gathered over 100,000 signatures in only
a few weeks and Senators on the Telecommunications subcommittee
received a large number of calls, faxes and email messages on the
bill.
The bill is expected to be considered by the full Senate in the next
few months.
=======================================================================
[2] EPIC Statement on Communications Decency Act
=======================================================================
EPIC STATEMENT ON COMMUNICATIONS DECENCY ACT
March 24, 1995
The Electronic Privacy Information Center opposes the Communications
Decency Act as adopted by the Senate Commerce Committee on March 24,
1995. We believe that the bill is an unconstitutional restriction on
free expression, personal privacy, and intellectual freedom.
EPIC has urged Senator Exon and his staff to explore all
non-legislative solutions before further action on this bill.
Comprehensive hearings are still necessary. We recognize that there is
a genuine concern about the type of materials that are available to
children via the Internet. EPIC also believes that a thoughtful,
long-term solution to this problem will require the participation of
parents and schools, and the development of good technical and
educational measures. We do not believe that the contents of private
communication or the expression of public opinion should be regulated
by the government
The National Center for Missing and Exploited Children has produced a
fine publication for parents and others who are concerned about these
issues. This brochure, "Child Safety on the Information Highway," was
written by Lawrence J. Magid, a syndicated columnist for the Los
Angeles Times. Mr. Magid encourages parents to take an active interest
in the on-line activities of their children, and opposes passage of
the Communications Decency Act. For a copy of the brochure, contact
The National Center for Missing & Exploited Children 2101 Wilson Blvd,
Suite 550, Arlington, VA 22201-3052 or call 1-800-The-LOST
(1-800-843-5678).
EPIC will continue to oppose the Communications Decency Act. We urge
others to do the same.
------------------------------
Date: Tue, 28 Mar 1995 10:13:12 +0900
From: cpreston@alaska.net (Charles M. Preston)
Subject: Destruction of data
I'd like to mention that the Security Management article on destruction of
data is available in text format on CompuServe in the NCSA forum, Library
22, as sm9502.zip. This is the one referenced in Privacy Digest 04-06. I
hope to have it formatted as an HTML document in a few days, so it will be
more widely available.
I have recently come across a program designed to overwrite a Windows
(virtual memory) swap file semi-automatically, and a version of Linux has an
option for keeping its swap file encrypted. The note didn't say how the
encryption key was stored.
Tom Zmudzinski (Privacy Digest 04-07) mentions, regarding recovery of data,
that saying "with enough processing power and time" is not a useful way to
discuss the subject. I thought the IDA report was very useful in several
regards.
First, many people are not aware that "overwritten" or degausser erased data
may be recoverable at all. Second, it's very helpful when deciding "how
much is enough" to have some guidelines as to the level of risk.
The report states that it takes a magnetic field 5 times the coercivity of
the media to make large scale recovery impractical, and defines
"impractical". It also states
"there is no known process or equipment that will completely erase Type II
magnetic media (coercivity 350-750 Oe)"
All high density floppy disks fall into this group. Many hard drives and
tape backup products, including DAT, 8 MM, and video tape, have even higher
coercivity.
Here's an example of needing to know "how much is enough".
Let's say someone in the business world depends on current software file
overwriting options for extremely valuable data. The two leading U.S.
utility software vendors have products that overwrite files 7 times when you
use their highest security - "US Department of Defense" settings. A
commercial data recovery firm told me they have recovered data that has been
overwritten 7 times.
To summarize: If the people who want your data don't have a lot of money and
expertise, overwrite -all- the file storage locations and don't worry about
it. Otherwise, you need expert help to consider not only erased data
recovery, but your overall security situation. Smart opponents won't attack
your strongest area.
Charles M. Preston Information Integrity
cpreston@alaska.net
------------------------------
Date: Tue, 28 Mar 1995 10:44:00 +0900
From: cpreston@alaska.net (Charles M. Preston)
Subject: Destruction of data [more]
Discussions of when data is really gone from magnetic media (Privacy Digest
04-05,06,07) are helpful to people partly because program documentation is
incomplete. To avoid filling their manuals with ugly fudge words like
"almost", "maybe", "under most circumstances", the two leading U.S. utility
software companies have this to say about their overwriting programs:
Company 1
XXX protects the confidentiality of deleted data by erasing it completely
from a hard or floppy disk.....Once you wipe a file or disk, you can no
longer recover or read the data by any means.
Company 2
YYY protects confidential data by erasing it from the disk so that it is
unrecoverable, even using the most sophisticated hardware and software
recovery techniques.
These claims are not unusual. Some software companies have continued to
claim strong security features that other commercial software could crack in
a second or two.
All of us deal with risks every day, but to deal with them rationally it's
nice to have a good idea what the real level of risk is.
Charles M. Preston Information Integrity
cpreston@alaska.net
------------------------------
Date: Tue, 28 Mar 1995 11:20:08 +0900
From: cpreston@alaska.net (Charles M. Preston)
Subject: Misleading privacy claims
Some months ago in a leading health magazine I saw an announcement that a
"home AIDS test" would be available. This wasn't really a home test, since
a sample had to be sent to the company for determination. Confidentiality
was supposed to be maintained because the person with suspected AIDS had a
special ID number to inquire about the test results. But the inquiry was
through an 800 number.
I called and FAXed the magazine to ask if they could caution readers that
all callers' numbers are available to the company furnishing the 800
service. I explained that phone records and other seemingly routine records
are not well protected in many companies. An employee of the company
probably could match the time of the call, ID, and phone number.
People can and have done this sort of thing for blackmail, to furnish
information to extremist groups, and for other reasons. If the testing
company wanted to, for less than $300 for a CD-ROM, they could pull up a
name and address for any published number in a matter of seconds.
I don't think that is the kind of confidentiality many people would prefer
after testing positive for HIV.
So far, I have not seen any kind of notice in the magazine.
Shortly after that, I saw an announcement for confidential AIDS counseling
from a U.S. Government agency using, of course, a convenient 800 number.
Charles M. Preston Information Integrity
cpreston@alaska.net
------------------------------
Date: Fri, 7 Apr 1995 19:37:04 -0700 (MST)
From: "Valerie F Gerberich" <65393@ef.gc.maricopa.edu>
Subject: MEDICAL RECORDS ACCESS
Did you know that there is a leading credit information warehouser
(Equifax) that is now proposing to create a mega-database comprised of
your/our medical records? Their reply is that they are doing it to make
it easier for hospitals and doctors to have access to pertinent medical
information about you, especially in the situation where a hospital needs
to know your allergic status, past medical history, etc, before they treat
you in a manner that may adversely affect you.
That is all well and good, but what about our privacy. Will they do the
same thing with that information as they did with our credit information?
They just recently lost a lawsuit against them that dealt with the manner
in which they (mis)handled our credit history. They allowed access to it
in an unfavorable manner. Do you want that to happen to your medical
information also?
I don't know about you, but I want my medical information kept highly
confidential. People can and will refuse you insurance should they have
information about you that is not positive. You can bet that Equifax will
harvest this database for all it's worth, selling it's contents to whoever
is willing to pay. I am sure the insurance companies would pay good money
to avoid giving insurance to someone with the slightest blemish on their
medical history. Take this scenario: I had two high risk pregnancies,
although the outcome was good, the costs were astronomical, but, I have no
intention of having anymore children. Do you think any insurance company
would give a care? No, they would see that, they would see that I was
still very young, and think "Hmmm...she is still in prime child bearing
years, and it just is not a good risk." The insurance industry already
has some access to this kind of information, but this would just make it
too easy for them. It is unfair to reject someone for insurance, but they
get away with it....why make it any easier. I say NO to this, and I hope
that there is some way that they are unable to do this.
------------------------------
Date: 30 Mar 95 17:01:00 -0800
From: SOJOURNER_CLIFF@tandem.com
Subject: Re: Perhaps privacy is not what it seems
Steve Mann's point is well taken. Later in the same issue, the debate
about CNID continues. There is a parallel. In both cases, the
product defect (anonymity and privacy) has become a feature.
Remember the trouble Mr. Bell had convincing people to install
telephones in their houses. The problem was that "it was like opening
your front door and letting anyone walk in". You couldn't tell who
was calling until you answered. (Why, some lower class person might
telephone and you'd actually have to be civil to them.)
That product defect is now a feature. People are demanding anonymity
in telephone use, despite attempts to fix the defect.
The situation with credit card records is similar. Purchase records
used to be private. The marketers decided that product feature was a
defect.
If we had a workable, anonymous digital cash system I'd use it. As it
stands now, I'm off of credit cards and checks and on cash for most
things. (Ever try to pay the mortgage or buy an airline ticket or
rent a car with cash?) And I'd sure like to get rid of all the junk
mail (~5 pounds a week) and marketer's cold calls (4 last night (!),
usually 1 a day).
Cliff
------------------------------
Date: Wed, 5 Apr 1995 23:16:53 +0800
From: jwarren@well.sf.ca.us (Jim Warren)
Subject: Protection of Youth Against Trashy and Smutty Literature
"Those who cannot remember the past are condemned to repeat
it"
Santayana, _The Life of Reason_
In 1926, seven years before the National Socialists achieved
absolute power, a bill similar to Exon amendment was passed
in the German Reichstag. I quote the following passage from
page 266 of _Purity in Print_ (Scribner's: 1968) by Paul S. Boyer:
The purity crusade now found a focus in the "Act for the
Protection of Youth Against Trashy and Smutty Literature,"
a national censorship bill proposed to the Reichstag late
in 1926. This _Schmutz und Schund_ (Smut and Trash) bill,
as it was dubbed, aroused fears in German literary and
intellectual circles, but the Minister of the Interior
soothed the apprehensive with assurances that it
"threatens in no way the freedom of literature, [the]
arts, or [the] sciences," having been designed solely for
the "protection of the younger generations." It was aimed
only at works which "undermine culture" and purvey "moral
dirt," he added, and had been devised "not by
reactionaries, but by men holding liberal views..." On
December 18, 1926, after a bitter debate, the _Schmutz und
Schund_ bill passed the Reichstag by a large majority.
The Catholic Center and the Nationalist parties were
strong in it support, the Socialists divided. In
accordance with the provisions of the new law, the
Interior Minister appointed boards of censorship for each
of the Federal states. These eight-member panels,
including representatives from publishers', authors', and
booksellers' groups as well as from youth, welfare, and
educational organizations, were empowered to prohibit the
advertising, display, or sale to minors of any book deemed
morally objectionable.
Presented for your information by,
David Dubin@notes.pw.com
[via pys@well.com]
------------------------------
Date: Sat, 8 Apr 95 20:29 PDT
From: lauren@vortex.com (Lauren Weinstein; PRIVACY Forum Moderator)
Subject: More on "Communications Decency Act"
Greetings. As you can see from some preceeding items, controversy continues
over the issues surrounding the provisions of the "Communications Decency
Act". While recent changes may be good news for information service
providers (though the borderline between "transmitting information" and
"creating information" seems to open up a can of worms), the lumping
together of a variety of non-obscene speech types by the provisions would
still seem likely to conflict with existing First Amendment protections.
However, there seems to be considerable agreement that *some* sort of
controls need to be in place in some situations, at least to bring
computer-based communications into line with existing telephone conversation
legislation. And there would also seem to be agreement by most observers
that some mechanism to help prevent minors from accessing material online
that they are not supposed to obtain through other venues is also
desirable.
To agree that Senator Exon's provisions seem to be the wrong way to deal
with the problems is not to say that there aren't problems in need of
solutions in this area.
During a question and answer period after a speech to the American Society
of Newspaper Editors on April 7, 1995 (yesterday), President Clinton briefly
addressed this topic. I've included this exchange below.
--Lauren--
--------------------
Q You alluded to our being in the Information Age. Many
of us in this room are investigating and developing ways of
disseminating information electronically. There are thousands outside
this room who are doing the same. What role, if any, does the federal
government have in censoring or regulating that information and news?
THE PRESIDENT: Let me begin by saying I support what
you're doing and I've tried to bring the White House up to date
electronically. You know, we have a pretty sophisticated e-mail
operation. And now you can take a tour of the White House and all the
federal agencies on the Internet and find out more than you ever wanted
to know. So we're trying to be there for you in virtual reality land.
I guess you're asking me about the bill that Senator Exon
introduced on trying to regulate obscenity through the e-mail system, or
through the electronic superhighway. To be perfectly honest with you, I
have not read the bill. I am not familiar with its contents, and I
don't know what I think. I do believe -- about this specific bill.
(Laughter.) I'll tell you what I think about the issue.
I believe that insofar as that governments have the legal
right to regulate obscenity that has not been classified as speech under
the First Amendment, and insofar as the American public widely supports,
for example, limiting access of children to pornographic magazines, I
think it is folly to think that we should sit idly by when a child who
is a computer whiz may be exposed to things on that computer, which in
some ways are more powerful, more raw and more inappropriate than those
things from which we protect them when they walk in a 7-Eleven.
So as a matter of principle, I am not opposed to it. I
just can't comment on the details of the bill, because I do not know
enough about it. And I do not believe in any way, shape or form that we
should be able to do on e-mail, or through the electronic superhighway,
in terms of government regulation of speech, anything beyond what we
could elsewhere. I think the First Amendment has to be uniform in its
application.
So I'm not calling for a dilution of the First Amendment.
But if you just imagine, those of us who have children and who think
about this, you just think about what's the difference in going in the
7-Eleven and hooking up to the computer. I think that we have to find
some resolution of this. And within the Supreme Court's standards,
which are very strict, I am not -- am philosophically opposed to some
action.
------------------------------
End of PRIVACY Forum Digest 04.08
************************