home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Wed Mar 8, 1994 Volume 6 : Issue 22
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Archivist: Brendan Kehoe (He's sorting thru the files)
- Acting Archivist: Stanton McCandlish
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Copita Editor: Sheri O'Nothera
-
- CONTENTS, #6.22 (Mar 8, 1994)
- File 1--CuD typos (6.21-"Rape in Cyperspace / 6.21-Newsday article)
- File 2--Computers, Freedom, & Privacy (CFP) '94 Final Program/Info
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send a one-line message: SUB CUDIGEST your name
- Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
- In ITALY: Bits against the Empire BBS: +39-461-980493
-
- FTP: UNITED STATES: etext.archive.umich.edu (141.211.164.18) in /pub/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
- nic.funet.fi
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: Tue, 8 Mar 1994 13:18:11 CST
- From: CuD Moderators <cudigest@mindvox.phantom.com>
- Subject: File 1--CuD typos (6.21-"Rape in Cyperspace / 6.21-Newsday article)
-
- In CuD 6.21, the moderators' note indicated that the Village Voice
- "Rape in Cyberspace" "...may not be reprinted *WITH* the author's
- permission."
-
- This should have read: "...may not be reprinted *WITHOUT* the authors
- permission." Readers who distribute CuDs should correct this typo
- before redistributing.
-
- In CuD 6.19, we indicated in the CuD response to the Newsday article
- (File 3) that in the '93 Congressional hearings on wire fraud one of
- the participants judged 2600 Magazine to be a primer for crime. In an
- inadvertant typo, the line appeared "which we" (ie, CuD), when the
- line should have been "when *HE*" (the participant) considered 2600 to
- be "dangerous." CuD does not consider 2600 "dangerous" or an advocacy
- manual for crime.
-
- We apologize for both errors and thank the readers who brought them to
- our attention.
-
- ------------------------------
-
- Date: 3 Mar 94 05:03:15 CST
- From: 7TRUBOW@JMLS.EDU
- Subject: File 2--Computers, Freedom, & Privacy (CFP) '94 Final Program/Info
-
- (MODERATORS' NOTE: The CFP conference is the best national conference
- of it's type, and attracts an impressive cross-section of people. This
- year's conference in Chicago lists an exciting and diverse program.
- There is relatively cheap housing available at the Palmer house (4 per
- room) for low income participants).
-
-
- CFP '94
-
- THE FOURTH CONFERENCE
-
- ON COMPUTERS, FREEDOM
-
- AND PRIVACY
-
- MARCH 23-26, 1994
-
- CHICAGO PALMER HOUSE HILTON
-
- "CYBERSPACE SUPERHIGHWAYS: ACCESS, ETHICS and CONTROL"
-
-
- SPONSORS
- ASSOCIATION FOR COMPUTING MACHINERY
- SPECIAL INTERESTS GROUPS ON:
- COMMUNICATIONS (SIGCOMM)
- COMPUTERS AND SOCIETY (SIGCAS)
- SECURITY, AUDIT AND CONTROL (SIGSAC)
- JOHN MARSHALL LAW SCHOOL,
- CENTER FOR INFORMATICS LAW
-
- PATRONS & SUPPORTERS (as of 15 December 1994)
-
- AMERICAN EXPRESS CORP.
- BAKER & McKENZIE
- EQUIFAX, INC
- LEGAL TRUSTEES, JERSEY, LTD. (UK)
- MOTOROLA, INC
- NATIONAL SCIENCE FOUNDATION (PENDING)
- WIRED MAGAZINE
-
- COOPERATING ORGANIZATIONS
-
- AMERICAN BAR ASSOCIATION SECTION OF
- SCIENCE AND TECHNOLOGY
- AMERICAN CIVIL LIBERTIES UNION
- COMPUTER PROFESSIONALS FOR SOCIAL RESPONSIBILITY
- ELECTRONIC FRONTIER FOUNDATION
- GEORGE WASHINGTON UNIVERSITY INSTITUTE for COMPUTER and
- TELECOMMUNICATIONS POLICY
- IEEE COMPUTER SOCIETY
- IEEE-USA COMMITTEE ON COMMUNICATIONS
- AND INFORMATION POLICY
- LIBRARY AND INFORMATION TECHNOLOGY ASSOCIATION
- PRIVACY INTERNATIONAL
- U.S. PRIVACY COUNCIL
-
- UNITED AIRLINES IS THE OFFICIAL AIRLINE FOR CFP'94
-
-
- Fourth Conference on Computers, Freedom and Privacy
- Chicago, Il., March 23 - 26, 1994
-
- CFP'94
- "Cyberspace Superhighways: Access, Ethics and Control"
-
-
- General Chair
- George B. Trubow
- Center for Informatics Law,
- John Marshall Law School
- Chicago, IL
-
- Executive Committee
- George B. Trubow
- Chair, CFP'94
-
- Lance J. Hoffman
- George Washington University
- Washington, D.C.
- Chair, CFP'92
-
- Bruce Koball
- Motion West
- Berkeley, CA
- Chair, CFP'93
-
- Conference Treasurer
- Robert Ashenhurst
- University of Chicago
-
- Special Promotions
- Patric Hedlund
- Sweet Pea Productions
-
- Al Whaley
- CPSR, Palo Alto
-
- Manager, Volunteers and Conference Office
- Judi Clark
- ManyMedia, Palo Alto
-
- Chair, Student Writing Competition
- Gene Spafford
- Purdue University
-
- Co-Chairs, Student Scholarship Program
- John McMullen
- Marist College
-
- Jim Thomas
- Northern Illinois University
- Program Committee
-
- David Banisar
- Computer Professsionals for
- Social Responsibility
-
- Jerry Berman
- Electronic Frontier Foundation
-
- Robert Belair
- Mullenholz and Brimsek
-
- Roger Clarke
- Australian National Univesity
-
- Mike Godwin
- Electronic Frontier Foundation
-
- Mark Hellmann
- Pattishall, McAuliffe
-
- Linda Knutson
- Library & Information
- Technology Association
-
- Dennis McKenna
- Government Technology Magazine
-
- Michael Mensik
- Baker & McKenzie
-
- Ron Plesser
- Piper and Marbury
-
- Priscilla Regan
- George Mason University
-
- Lance Rose
- LOL Productions
-
- Marc Rotenberg
- Computer Professionals for
- Social Responsibility
-
- Robert Ellis Smith
- Privacy Journal
-
- Jim Thomas
- Northern Illinois University
-
- Alan F. Westin
- Columbia University
-
-
- Conference Administration by John Marshall Law School:
- Arrangements Director, RoseMarie Knight
- Publicity & Publications, John McNamara
- Financial Officer, James Kreminski
- Program Coordinator, Gary Gassman
-
- "CYBERSPACE SUPERHIGHWAYS: ACCESS, ETHICS and CONTROL
-
- Cyberspace, Information Superhighway, National Information
- Infrastructure, Open Platforms, Computer and Communications
- Revolution, Electronic Networks, Digital Data Bases and Information
- Society are words and phrases common to the rhetoric of our modern
- era. The relationships between and among individuals, society,
- nations, government entities and business organizations are in
- constant flux as new stresses and alliances change the old "rules
- of the game." Today's challenges are to define what is the "game,"
- who owns the "franchises," who can play, what are the rules and who
- calls the shots. Information and communications technology raise
- new issues for freedom and privacy in this new era. Such questions
- are on the agenda as the participants in CFP'94 consider the
- alternatives and seek some solutions. Come, join in the dialogue
- that will help to shape the world's future!
-
- PRE-CONFERENCE TUTORIALS
-
- On Wednesday March 23, the day before the formal conference begins,
- CFP '94 is offering a number of in-depth tutorials covering a wide
- variety of subjects on five parallel tracks. These presentations
- will be interesting, educational, thought-provoking and often
- controversial. The tutorials are available at a nominal additional
- registration cost.
-
- CONFERENCE NEWSPAPER
-
- On each of the three days of the conference, a daily newspaper will
- appear to highlight what has transpired and announce important
- coming events. The staff of "The Decisive Utterance," The John
- Marshall Law School's student newspaper, is providing this service.
-
-
- CONFERENCE RECEPTION AND TECHNOLOGY DISPLAY
-
- On Wednesday evening, from 6:00 p.m. - 9:00 p.m., you are invited
- to meet new and old friends and colleagues at an opening reception
- at the John Marshall Law School from 6:00 p.m.-9:00 p.m. The School
- is only two blocks from the conference hotel. A state-of-the-art
- computer lab will be used to demonstrate high-tech applications in
- academia and registrants will be invited to take part.
-
- SINGLE-TRACK MAIN PROGRAM
-
- The technological revolution that is driving change in our society
- has many facets and we are often unaware of the way they all fit
- together, especially those parts that lie outside one's own daily
- experience. An important goal of CFP '94 is to bring together
- individuals from disparate disciplines and backgrounds and engage
- them in a balanced discussion of CFP issues. To this end our main
- program, starting on Thursday, March 24, is on a single track
- enabling registrants to attend all sessions. The concurrent Birds-
- of-a-Feather meetings Thursday after 9:15 p.m. are exceptions.
-
- BIRDS OF A FEATHER SESSIONS (BoF)
-
- CFP '94 will provide a limited number of meeting rooms to
- interested individuals for informal "Birds of a Feather" sessions
- after the formal program Thursday, from 9:15 p.m. - 11:15 p.m.
- These sessions will provide an opportunity for special-interest
- discussions. For further information or to request a BoF contact
- CFP '94 Program Coordinator, Gary Gassman, at the John Marshall Law
- School (6gassman@jmls.edu)
-
-
- MUSEUM OF SCIENCE AND INDUSTRY GALA
-
- Registrants are invited to a very special reception and buffet at
- Chicago's famed Museum of Science and Industry where they also will
- be treated to a private showing and demonstration of the MSI's
- newly-opened Communications and Imaging Exhibits. These multi-
- million dollar presentations occupy 15,000 sq.ft. of museum space
- and required three years to develop. "Communications" is a
- panoramic display of how technology has transformed our lives by
- dissolving distance and and making connections; visitors can even
- enter the unreal world of virtual reality. "Imaging" is a mind-
- boggling journey through modern applications of imaging technology.
- Visitors can even play the role of brain surgeon, using
- radiosurgery made possible by 3-D imaging, or explore imaging in
- forensic science by using MRI, fingerprint enhancement, face aging
- and other modern technologies to solve a crime!
-
- REGISTRATION WILL BE LIMITED
-
- CFP '94 registration will be limited to 550 attendees, so we advise
- you to register early to assure admission and to take advantage of
- the early registration discounts.
-
- MEALS AND RECEPTIONS
-
- A key component of the CFP conferences has been the interaction
- between the diverse communities that constitute our audience. To
- promote this interaction CFP '94 provides three luncheons, three
- receptions and three evening meals with the price of registration.
-
- EFF PIONEER AWARDS
-
- All conference attendees are invited to the EFF Pioneer Awards
- Reception sponsored by the Electronic Frontier Foundation on
- Thursday evening. These, the third annual EFF Pioneer Awards, will
- be given to individuals and organizations that have made
- distinguished contributions to the human and technological realms
- touched by computer-based communications.
-
- CONFERENCE BUSINESS OFFICE
-
- The Conference business and registration office will be open from
- 8:00 a.m. until 9:00 p.m. on Wednsday thru Friday, and until 6:00
- p.m. on Saturday, for registration and general information.
-
- NOTE: The following program content and schedule is subject to
- change. The Information Superhighway is a fast track!
-
- Wednesday, March 23, 1994
- Pre-Conference Tutorials
-
- 9:00 a.m. - noon
-
- Cyberspace Law for Non-Lawyers
- This tutorial presents an outline of the law for laymen,
- dealing with Constitutional and legal issues that confront
- those concerned with privacy, crime, and freedom of expression
- in cyberspace. There will be summaries of recent cases,
- legislative proposals and government activities.
- Mike Godwin, Online Counsel, EFF
-
- Rules of the Road for Network Travelers. (CLE Credit Approved)
- The information superhighway presents a variety of rights and
- risks. Learn about the legal issues of computer networks,
- services and bulletin boards, including on-line property
- rights; protecting personal privacy and business information;
- electronic publishing and multimedia rights; viruses, adult
- materials and other no-nos.
- Lance Rose, Attorney and Author of "Syslaw."
-
- Get Mad, Get Motivated, Get Moving!
- The focus of this panel is on citizen action for privacy
- protection: how to reach and organize constituents; support
- legislation or other privacy protection measures; conduct
- public education activities; use the technology in program
- activities, etc.
- Robert Ellis Smith, Privacy Journal
-
- Exploring Internet: A Guided Tour
- This tutorial gives participants a practical introduction to
- the most popular and powerful applications available via the
- world's largest computer network, the Internet. There will be
- hands-on demonstrations of communications tools such as e-
- mail, conferencing, Internet Relay Chat and resource discover,
- and navigations aids such as Gopher, WAIS, Archie and World
- Wide Web. Extensive documentation will be provided.
- Mark Graham, Pandora Systems
-
- Using the Freedom of Information Act
- The Federal FOIA is the principal focus of this tutorial
- though some attention is given to the use of state FOIAs.
- The session will cover procedures for making requests,
- identifying the information desired, differences between
- electronic and hard copy responses, and the appeals process
- within agencies and the courts.
- David Sobel, Counsel, Computer Professional for Social
- Responsibility
-
- 2:00 p.m. - 5:00 p.m.
-
- Cryptography: What, and How?
- Data encryption is in the cyberspace limelight as perhaps the
- only technique to ensure digital privacy and security; it is
- also the subject of sharp debate regarding control of the
- development and use of the technology. This tutorial will
- display what encryption is, how it works, and some of the
- options for its use. Computer animations and graphic displays
- will be used to help make cryptography comprehensible; the
- audience will engage in some hands-on encryption exercises.
- Mark Hellmann, Pattishall, McAuliffe et.al, Chicago
-
- Electronic Detectives: Critical Issues for Public and Private
- Investigators.
- Both governmental and private sector investigators have
- unprecedented access to "open" sources that were practically
- inaccessible a few years ago. This information environment
- poses opportunities and risks that will be the focus of this
- program. Investigative techniques via networks will be
- demonstrat
- ed and the legal, ethical and practical issues will be explored.
- Actual case-studies will be utilized.
- Michael Moran, CCO; Michael Robertson, CFE
-
- Hi-Tech Intellectual Property Law Primer (CLE Credit Approved)
- This panel will cover the special problems in patent,
- copyright and tradmark law engendered by computers and digital
- technology, with attention to the impact of recent cases. The
- differences in European protection will be surveyed as well as
- technology export restrictions.
- Raymond Nimmer, University of Texas Law School
- Leslie A. Bertagnolli, Baker & McKenzie, Chicago
-
- Transactional Data Analyses: Making FOI Access Useful
- Electronic communication, coupled with federal and state
- Freedom of Information Acts, has made a great deal of data
- available to the public regarding the activities and policies
- of government enforcement and regulatory agencies. Knowing
- how to evaluate and use this information is critical to
- understanding and demonstrating what the data really means.
- The Transactional Records Access Clearinghouse (TRAC) of
- Syracuse University uses its various knowledge-bases to
- demonstrate the power of transactional data. Colorgraphics
- and analytic techniques are combined in demonstrations of how
- otherwise drab statistics can be displayed dramatically to aid
- in policy analyses and advocacy.
- David Burnham, former New York Times Investigative
- Reporter;
- Susan Long, Co-director, TRAC, SUNY-Syracuse
-
- Election Fraud and Modern Technology
- There has been increasing attention, in the U.S. and abroad,
- to the use of modern technology in the electoral process.
- Buying votes, stealing votes, changing votes -- whether in the
- environment of punch-cards or fully automated voting machines
- -- is the subject of this tutorial. Mock elections will be
- staged in which the participants have roles in planning to
- perpetrate as well as prevent vote fraud. Voter registration,
- phone-based voting, cryptography and verification are among
- the strategies and technologies to be considered.
- Russel L. Brand, Reasoning Systems.
-
- SPECIAL EVENTS ON WEDNESDAY, Mar. 23:
-
- Noon - 4:00 p.m., Privacy International Business Meeting
- This meeting, at the John Marshall Law School, begins with a
- buffet luncheon. Non-members interested in learning about
- P.I. and the Illinois Privacy Council are invited to be guests
- for lunch and a briefing. Guest space will be limited so
- attendance on a "first come" basis MUST be confirmed by
- March 8, 1994.
-
- 6:00 p.m. - 9:00 p.m. Conference Reception
- All CFP registrants are invited to a reception and open house
- demonstrating the John Marshall Law School's recently opened
- computer lab. This also is an opportunity to "network" the
- old-fashioned way, meeting old friends and making new ones
- while enjoying the reception and buffet. This state-of-the-art
- facility will display information and communications
- technology being used in the educational environment. Guests
- also may participate in hands-on demonstrations of the
- technology under the tutelage of JMLS faculty and staff.
- (Wed. Special Events, Cont'd)
- 9:15 p.m. - 11:15 p.m. "CFP SOAPBOX SQUARE"
-
- On Wednesday, March 23, from 9:15 p.m. to 11:15 p.m., "CFP Soapbox
- Square" will be open. This is a chance for those who have
- something to say publicly to say it and to hear response from
- others! Those interested in making a brief statement (3 minutes)
- at this meeting must file their request and describe their topics
- by 5:00 p.m. on Wednesday. Discussion time for various topics will
- be allocated based upon the number of topics and the number who
- have asked to speak. Requests to speak can be made at the time of
- pre-registration or at the conference site.
-
-
- Thursday, March 24, 1994
-
- 8:30 a.m., CFP'94 Official Opening
-
- Welcome to the Conference: George B. Trubow, General Chair
- Welcome to Chicago: Hon. Richard M. Daley, Mayor (Invited)
-
- 9:00 a.m. Keynote Address: Mr. John Podesta, Assistant to the
- President, Washington, D.C.
-
- 10:00 a.m. Break
-
- 10:30 a.m. The Information Superhighway: Politics and the Public
- Internet.
- The Administration and Congress propose policies that will
- lead to a digital multimedia highway. How can the road be
- built at affordable cost while serving the public interest and
- our constitutional values?
- Chair: Jerry Berman, Electronic Frontier Foundation
-
-
- 12:00 p.m. Lunch
- Speaker: U.S. Senator Paul Simon (Invited)
-
- 1:30 p.m. Is It Time for a U.S. Data Protection Agency?
- Beginning with the Privacy Act of 1974, proposals to establish
- an oversight body for data protection have been offered but
- not adopted; another proposal is currently pending in
- Congress. Against a background of almost twenty years
- experience under the Privacy Act, the panel will consider
- whether the current political, economic and technological
- mileau favors establishment of a data protection agency.
- Chair: Priscilla M. Regan, George Mason University
-
- 2:45 p.m. Break
- 3:00 p.m. "Owning and Operating the NII: Who, How, When?"
- The National Information Infrastructure is an important
- initiative for the present Administration. This panel will
- explore policy and technical issues such as equity and access,
- connectivity and standards, funding and regulation, privacy
- and security, ownership and operation.
- Chair: Marc Rotenberg, Computer Professionals for Social
-
- 4:15 p.m. Break
-
- 4:30 p.m. Data Encryption: Who Holds The Keys?
- Recent attempts, led by federal law enforcment agencies, to
- control the development and dissemination of strong
- cyptography programs has engendered considerable discussion
- and disagreement. The interests of law enforcement agencies
- may conflict with the need for data security and personal
- privacy demanded by users of electronic networks. This panel
- will evaluate proposals to deal with the question.
- Moderator: Willis Ware, Rand Corporation
-
- 5:30 p.m. Adjourn
-
- 6:00 p.m. EFF Awards Reception
- Once again, the Electronic Frontier Foundation hosts a
- reception prior to its annual Pioneer Awards presentation.
- All CFP attendees are invited to enjoy the recepiton and
- congratulate the new honorees.
-
- 7:00 p.m. Conference Banquet (Speaker to be announced)
-
- 9:15 - 11:15 p.m. "Birds-of-a-Feather" sessions run concurrently.
-
-
- Friday, March 25, 1994.
-
- 8:30 a.m. Keynote: David Flaherty, Data Protection Commissioner,
- Victoria, British Columbia
-
- 9:15 a.m. Health Information Policy
- The Clinton Health Reform Plan, and variations on that theme,
- stress the use of information technology to help the
- efficiency and effectiveness of health care. Expert
- consultation, improved service delivery through new
- technology, and improvements in the processing of health
- insurance claims bring promise of cost cuts as well as the
- possibilities of threats to personal privacy. This panel of
- experts will form the "CFP Group" to explore these promises
- and threats.
- Chair: Robert R. Belair, Mullenholz & Brimsek, Wash., D.C.
-
- 10:30 a.m. Break
-
- 10:45 a.m. Can Market Mechanisms Protect Consumer Privacy?
- When does protection of consumer privacy require legal
- standards and government regulation and when can bargains and
- agreements in the market suffice? What role do new
- technological options for individuals and organizations play
- in facilitating private choice and market transactions? Is
- "ownership" of personal information a useful concept or a dead
- end for privacy protection in an information age?
- Chair: Dr. Alan F. Westin, Columbia University
-
- Noon Lunch, Speaker: Philip Zimmerman, PGP
-
- 1:30 p.m. Creating an Ethical Community in Cyberspace
- The fundamental ethical questions posed by the "settlement" of
- cyberspace are not new. What is new is that the relationship
- between behavior and the ethical conceptions by which we judge
- behavior shift and become more ambiguous and vague. This
- sessions examines the ethical dilemmas brought about by the
- "colonization" of cyberspace that must be resolved to
- establish and maintain a stable, humane environment.
- Chair: Prof. Jim Thomas, Northern Ilinois University
-
- 2:45 p.m. Break
-
- 3:00 p.m. Standards for Certifying Computer Professionals
- The subject of licensing of computer professionals is
- receiving increased attention by professional organizations
- and by state legislatures. Both the ACM and IEEE have
- proposals under study, and perhaps a half-dozen states are
- considering licensing bills. This panel will consider the
- pros and cons and suggest some standards for certification.
- Chair: Donald Gotterbarn, East Tennessee State Univ.
-
- 4:15 p.m. Break
-
- 4:30 p.m. Hackers and Crackers: Using and Abusing the Networks
- This session will explore issues surrounding the "fringe" of
- network use. What can and should be exchanged? Who will
- monitor "appropriate" use? What's the current difference, if
- any, between "hacker" and "cracker"? What should be expected
- and accepted regarding the role of law enforcement agencies?
-
- 5:30 p.m. Adjourn
-
- 5:45 p.m. Buses begin departing for the Chicago Museum of Science
- and Industry for a private reception and demonstration at
- the Communications and Imaging exhibits.
-
- 9:00 p.m. Buses begin departing for return to the Palmer House and
- Chicago's "Loop."
-
- Saturday, March 26, 1994
-
- 9:00 a.m. The Role of Libraries on the Information Superhighway
- As the information landscape changes dramatically the historic
- role of libraries as the "information commons" is challenged.
- How will the Carnegie ideal of free, public access be
- implemented by the library community? Should it be? This
- panel will consider policy for an information network in the
- public interest.
- Moderator: Tamara J. Miller, President, Library and
- Information Technology Association
-
- 10:15 a.m. Break
-
- 10:30 a.m. International Governance of Cyberspace: New Wine in Old
- Bottles -- Or Is It Time For New Bottles?
- Much discussion transpires between members of the Economic
- Community, the O.E.C.D., the Council of Europe, and the United
- States, regarding data protection, intellectual property
- rights, transborder data flow, the mediation of disputes, etc.
- This panel will consider whether existing mechanisms can solve
- the problems or a new structure for the governance of
- cyberspace is needed.
- Chair: Ronald L. Plesser, Piper and Marbury
-
- Noon: Lunch
- Speaker: Simon Davies, Director General, Privacy
- International
-
- 1:30 p.m. The Electronic Republic: Delivery of Government Services
- over the Information Superhighway
- State and local governments use computer networks to deliver
- a wide range of services and information to the public;
- electronic "kiosks" are moving to "government by ATM." How
- will this interaction between government and the people affect
- the process of American government in the future?
- Chair: Dennis McKenna, Publisher, "Government Technology."
-
- 2:45 p.m. Break
-
- 3:00 p.m. Education and NREN, K - 12
- Internetworking is a very new technology being rapidly
- deployed to conventional classrooms, a very old technology.
- The panel will explore the clash of contradictory assumptions
- embedded within these systems -- a clash which has profound
- implications for the future of both the network and the
- classrooom.
- Chair: Steven Hodas, NASA NREN Project
-
-
- 4:00 Break
-
- 4:15 p.m. Guarding the Digital Persona
- After this panel has established the threats to personal
- privacy from individual profiling and target marketing, and a
- regime to legally recognize and protect an "electronic
- personality" is put forth, Bruce Sterling will offer to
- explain why much of that worry is misdirected!
- Chair: Roger Clarke, Australian National University
-
- 5:30 p.m. Adjournment
-
- Featured Speakers Confirmed as of 12/15/93
-
- Philip Agre, Dept. of Sociology, U. of Cal., San Diego
- David Banisar, Computer Professional for Social Responsibility
- Robert R. Belair, Mullenholz & Brimsek, Washington, D.C.
- Jerry Berman, Executive Director, Electronic Frontier Foundation
- Leslie A. Bertagnolli, Baker & McKenzie, Chicago
- Andrew Blau, The Benton Foundation, Washington, D.C.
- Dr. Herbert Burkert, Univ. of St. Galen, Switzerland
- Jeffrey Chester, Director, Center for Media Education
- Roger Clarke, College of Commerce, Australian National University
- Ellen Craig, Commissioner, Illinois Commerce Commission
- Simon Davies, Director General, Privacy International, London
- David Flaherty, Information and Privacy Commissioner, British
- Columbia
- Oscar H. Gandy, Media Studies Center, Columbia University
- Donald Gotterbarn, East Tennessee State University
- Allan Hammond, New York University Law School
- Steven Hodas, NASA NREN Project, Washington, D.C.
- David Johnson, Wilmer, Cutler & Pickering, Washington
- Steven Kolodney, Dir., Information Technology, State of California
- Curtis Kurnow, Landels, Ripley & Diamond, San Francisco
- Kenneth Laudon, School of Information Systems, New York University
- Lee Ledbetter, HDX
- Jay Lemke, School of Education, City University of New York
- Duncan MacDonald, V.P. & Gen. Couns., Citicorp Credit Services
- Shirley Marshall, Public Sector Marketing, IBM
- Dennis McKenna, Publisher, Government Technology Magazine
- Michael Mensik, Baker & McKenzie, Chicago
- Raymond Nimmer, University of Texas
- Eli Noam, Columbia University School of Business
- Michael North, President, North Communications
- Ronald L. Plesser, Piper and Marbury, Washington, D.C.
- Marc Rotenberg, Computer Professionals for Social Responsibility
- Rohan Samarajiva, Department of Communication, Ohio State Univ.
- David Sobel, Computer Professionals for Social Responsibility
- Bruce Sterling, Sci-Fi Writer and Journalist, Austin, Texas
- Connie Stout, Texas Education Network
- Jim Thomas, Department of Sociology, Northern Illinois University
- Greg Tucker, Head of the Business School, Monash Univ., Australia
- Bruce Umbaugh, Old Dominion University
- Patricia Valey, Acting Director, Office of Consumer Affairs
- Maarten van Swaay, Dept. of Computer Science, Kansas State U.
- Daniel Weitzner, Sr. Staff Counsel, Electronic Frontier Foundation
- Alan Westin, Columbia University
- Christine Zahorik, Staff, Senate Committee on
-
- FP '94 SCHOLARSHIPS
-
- The Fourth Conference on Computers, Freedom and Privacy (CFP '94)
- will provide a limited number of full registration scholarships for
- students and other interested individuals. These scholarships will
- cover the full costs of registration, including luncheons, two
- banquets, and all conference materials. Scholarship recipients
- will be responsible for their own lodging and travel expenses.
- Persons wishing to apply for one of these fully-paid registrations
- should contact CFP '94 Scholarship Chair:
-
- John F. McMullen
- CFP '94 Scholarship Committee
- Perry Street
- Jefferson Valley, NY 10535
- Phone: (914) 245-2734 or email mcmullen@mindvox.phantom.com
-
- HOTEL ACCOMMODATIONS
-
- CFP'94 will be held at the Palmer House Hilton, a venerable Chicago
- landmark in the "Loop." This spacious and comfortable facility is
- easily accessible from the O'Hare International and Chicago Midway
- airports, and is only 2 blocks from The John Marshall Law School.
- Special conference rates of $99/night, single or multiple
- occupancy, are available. Our room block is guaranteed only until
- March 1, 1994, so we urge you to make your reservations as early as
- possible. When calling for reservations, please be sure to mention
- CFP'94 to obtain the conference rate.
-
- Hotel Reservations: Palmer House Hilton, 17 E. Monroe, Chicago,
- Il., 60603. Tel: 312-726-7500; 1-800-HILTONS; Fax, 312-263-2556
-
-
- REFUND POLICY
-
- Refund requests received in writing by March 8, 1994 will be
- honored. A $50 cancellation fee will be applied. No refunds will
- be made after this date; however, registrants may designate a
- substitute.
-
- OFFICIAL AIRLINE
- CFP'94 is proud to have United Airlines as our own exclusive
- official airline! United will give our conferees a 5% discount off
- any published United or United Express airfare, including First
- Class, or 10% off the new BUA fare when purchased at least a week
- in advance of travel. Call toll-free 1-800-521-4041 to make
- reservations and be sure to give our CFP'94 ID Number: 541QI.
-
- REGISTRATION
- (Voice: 312-987-1420; E-MAIL: cfp94@jmls.edu Fax: 312-427-7128)
- CFP'94
- John Marshall Law School
- 315 S. Plymouth Ct., Chicago, IL 60604
-
- Register for the conference by returning the Registration Form
- along with the appropriate payment. The registration fee includes
- conference materials, three luncheons (Thursday, Friday and
- Saturday), a reception, open house and buffet (Wednesday), a
- reception and banquet (Thursday), and a gala reception and buffet
- at the Museum of Science and Industry. Payment must accompany
- registration.
-
- NAME (Please Print)
-
- TITLE
-
- AFFILIATION
-
- MAILING ADDRESS
-
- CITY, STATE, ZIP
-
- TELEPHONE
-
- E-MAIL
-
- PRIVACY LOCKS: We will not sell, rent. loan, exchange or use this
- information for any purpose other than official Computers, Freedom
- and Privacy Conference activities. A printed roster containing
- this information will be distrusted at the conference. Please
- indicate if you wish information to be excluded from the roster:
-
- ( ) Print only name, affiliation and phone no.
- ( ) Print name only
- ( ) Omit my name from the roster
-
- ( ) I would like to attend the Privacy International luncheon
- and briefing at noon on Wednesday, March 23. (Your attendance as
- a guest of P.I. and the Illinois Privacy Council MUST be confirmed
- by March 8, and is on a "first come" basis.)
-
- "CFP Soapbox Square"
- ( ) I would like to make a formal statement (3 mins.) during
- "CFP Soapbox Square" to be held from 9:15 p.m. - 11:15 p.m. on
- March 23. My topic:
-
- ( ) I plan to attend "Soapbox Square" but do not wish to make
- a prepared statement, though I may join in the discussion.
-
- REGISTRATION FEES
- If paid by: 7 February 8 March On Site
- Early Regular Late
-
- Conference Fees $315 $370 $420
-
- Tutorial Fees $145 $175 $210
-
- Conf. & Tutorial $460 $545 $630
-
- Note: If you have registered for the Tutorials, please select one
- from each group:
- 9:00 A.M. - 12:00 NOON
- ( ) Cyberspace Law for Non-Lawyers
- ( ) Rules of the Road for Network
- Travelers (CLE Credit)
- ( ) Citizen Action: Get Mad, Get
- Motivated, Get Moving!
- ( ) Exploring Internet: A Guided Tour
- ( ) Using FOIA
-
- 2:00 P.M. - 5:00 P.M.
- ( ) Cryptography: What, and How?
- ( ) Introduction to Hi-Tech Law (CLE Credit)
- ( ) TRAC: Evaluative Data Analysis
- ( ) The Electronic Detective" Online
- Investigations
- ( ) Electoral Fraud
-
- PAYMENTS TOTAL AMOUNT
-
- Please idicated method of payment:
- ( ) Check (payable to JMLS-CFP '94)
-
- ( ) VISA
- ( ) MasterCard
- Credit Card #
-
- Expiration Date
-
- Name on Card
-
- Signature
- ***********
- George B. Trubow, Professor of Law
- Director, Center for Informatics Law
- The John Marshall Law School
- 315 S. Plymouth Ct.
- Chicago, IL 60604-3907
- Fax: 312-427-8307; Voice: 312-987-1445
- E-mail: 7trubow@jmls.edu
-
- ------------------------------
-
- End of Computer Underground Digest #6.22
- ************************************
-
-
-