WorldLII Home | Databases | WorldLII | Search | Feedback

EPIC Alert

You are here:  WorldLII >> Databases >> EPIC Alert >> 1998 >> [1998] EPICAlert 14

Database Search | Name Search | Recent Articles | Noteup | LawCite | Help

EPIC Alert 5.14 [1998] EPICAlert 14






EPIC ALERT




Volume 5.14 October 13, 1998

Published by the Electronic Privacy Information Center (EPIC)
Washington, D.C.

http://www.epic.org

Table of Contents



[1] Congress Expands Surveillance Authority
[2] Child Protection Bill Includes Privacy Loophole
[3] Digital Millennium Copyright Act Sent to President
[4] GILC Convenes Policy Conference in Ottawa
[5] NGOs Issue Declaration at OECD Conference
[6] National DNA Database Goes Online
[7] New Bills and Actions in Congress
[8] Upcoming Conferences and Events


[1] Congress Expands Surveillance Authority


The House and the Senate last week approved legislation that wouldexpand wiretapping and the collection of personal information by lawenforcement and intelligence agencies. The bill, H.R. 3694 -- theIntelligence Authorization Act for Fiscal Year 1999 -- funds theoperations of the intelligence agencies, which reportedly received afunding increase to expand signals intelligence and analysis. Thetotal budget figures are classified.

The bill authorizes the expansion of the use of roving wiretaps, whichallow law enforcement to wiretap multiple telephones to intercept thecommunications of a single person who is using different phones. Underthe revisions, law enforcement agencies are no longer required todemonstrate in court that the person is deliberately switching phonesto avoid interception, only that there is "probably cause that theperson's actions could have the effect of thwarting interception."
Under current law, roving taps are uncommon -- there were twelve rovingtaps authorized in 1997, three in 1996, and four in 1995.

The bill also authorizes the Attorney General to ask the ForeignIntelligence Surveillance Court to issue orders placing pen registersand trap and trace devices on telephones "to gather foreignintelligence or information concerning international terrorism." IfCongress declares war on any country, a court order will not berequired. The number of orders will not be disclosed, except to theHouse and Senate Intelligence Committees.

The bill also increases access to records held by businesses in thename of national security. Under the new law, the FBI will be able toobtain information on individuals from travel records, hotelinformation, and storage facilities with an order from the ForeignIntelligence Surveillance Court.

The bill has been sent to President Clinton for his signature; thePresident has expressed his intent to sign the bill into law shortly.



[2] Child Protection Bill Includes Privacy Loophole


Congress has enacted legislation requiring Internet service providers(ISPs) to report to law enforcement all suspected activities involvingchild pornography. The "Child Protection and Sexual PredatorPunishment Act," which passed the House on October 12 and the Senate onOctober 9, carves out a new exception to provisions of the ElectronicCommunications Privacy Act (ECPA) protecting the confidentiality ofe-mail. While ECPA generally requires the government to obtain asearch warrant before obtaining the "contents" of a communication, thenew legislation appears to waive that requirement where the presence ofchild pornography is suspected.

Under the "Child Protection Act," whenever an ISP "obtains knowledge offacts or circumstances from which a violation of [child pornographylaws] is apparent," it must report such information to a lawenforcement agency. The law does not establish any standard of proofthat must be met, and creates substantial disincentives forunder-reporting; ISPs could be fined up to $50,000 for the firstfailure to report suspicious activity, and up to $100,000 for eachsubsequent failure to contact law enforcement authorities. While notrequiring ISPs to turn over detailed information on the activities ofsubscribers, the legislation clearly permits such disclosures. Itprovides, for example, that an ISP's report "may include additionalinformation or material developed by [the ISP], except that the FederalGovernment may not require the production of such information ormaterial."

Subscribers will have little recourse if an overzealous ISP improperlydiscloses confidential information; the bill provides that no ISP"shall be held liable on account of any action taken in good faith tocomply" with the reporting requirement.



[3] Digital Millennium Copyright Act Sent to President


On October 12, the House of Representatives approved legislation toupdate copyright law for digital media (H.R. 2281). The bill will nowbe sent to the White House where President Clinton is expected to signit into law. The Senate approved the bill last week. The legislationcreates criminal penalties for circumventing copyright protectionsystems and also forbids the manufacture, import, sale or distributionof devices or services used for circumvention.

In response to the concerns of cryptographers and security experts,
limited exemptions for circumventing for the purposes of securitytesting or encryption research were included. However, there stillremain concerns that the exemptions are too limited and will preventthe development and use of necessary research and security tools.

The bill also contains an exemption that allows circumvention if "thetechnological measure, or the work it protects, contains the capabilityof collecting or disseminating personally identifying informationreflecting the online activities" of a user who seeks to gain access tothe work protected. The circumvention is only allowed to disable theinformation collecting program. This provision was added after EPICtestified about the threats to personal privacy presented by the bill.
The EPIC testimony stressed that users needed the ability to removecookies, or other information collecting technologies, which also maybe used as copyright protection measures.

EPIC's testimony can be found at:

http://epic.org/privacy/copyright/epic-wipo-testimony-698.html


[4] GILC Convenes Policy Conference in Ottawa


The Global Internet Liberty Campaign (GILC) sponsored a conference on"The Public Voice in the Development of Internet Policy" in Ottawa,
Canada on October 7. More than 140 people from a dozen differentcountries attended the day-long symposium. The conference occurredjust prior to an OECD Ministerial conference on electronic commerce.

John Manley, the Canadian Minister of Industry and chair of the OECDconference on Electronic Commerce, opened the Public Voice conferenceand thanked GILC for bringing together NGOs. Mr. Manley stated thatthe GILC conference presented an excellent opportunity to bring diversepublic interest groups together in a structured forum to discuss thedevelopment of global policy for electronic commerce.

According to Mr. Manley, the GILC concerns have been heard by the OECDministers and there is a link between the two conferences and the OECDconference should benefit from a diversity of voices regardless offrontiers. In his conclusion Mr. Manley emphasized the importance of a"global village," and showed his desire to have a "cyber marketplace"
which is available to wealthy and poor. "We gather from many countriesto develop e-commerce in the global village. Our challenge is muchbroader today. Access to the Internet should be available to all andat a stage where half of the world population did not make a telephonecall, this remains a very important challenge for consumers andsuppliers."

Mr. Manley was followed by David Johnston, the former Chair of theCanadian Information Highway Advisory Council and former Provost ofMcGill University. According to Mr. Johnston, "we need to establish anenvironment where innovation can thrive, which recognizes that ideasand innovation are keys to wealth creation and institutional adoption,
where change is not feared and strangled." Also governments arechallenged to adopt themselves in the information age and betterunderstanding of the new technologies are needed.

Next was a panel on Consumer Protection, chaired by Karen Coyle ofCPSR, that included Benoit De Bayer (Centre de droit de laconsummation, Belgium), Phillip McKee (National Consumer's League,
USA), Nathalie St. Pierre, (Fédération Nationale des Associations deConsommateurs du Quebec), Louise Sylvan (Vice President of Consumers'
International and Chief Executive of the Australian Consumers'
Association) and Bjorn Erik Thon (Consumer Council of Norway).

The second panel focused on Free Speech and Access. It was chaired byBarry Steinhardt of the Electronic Frontier Foundation and featuredYaman Akdeniz (Cyber-Rights and Cyber-Liberties UK), Pippa Lawson(Public Interest Advocacy Center), Meryem Marzouki (Imaginons un ReseauInternet Soldaire), Sid Shniad (BC Telecommunications Workers Union),
Rigo Wenning (Fîrderverein Informationstechnik undGesellschaft), andJames Dempsey (Center for Democracy and Technology).

The luncheon speaker was Stephen Lau, the privacy commissioner for HongKong. Mr. Lau spoke about the need to protect dignity in the on-lineworld.

The third panel was chaired by Deborah Hurley, director of the HarvardUniversity Information Infrastructure Project, and looked at issuesrelated to Privacy and Encryption. Speakers on this panel includedDavid Banisar (Electronic Privacy Information Center), Ulf Bruhan(European Commission, DG XV), David Jones (Electronic Frontier Canadaand Computer Science Professor, McMaster University), ViktorMayer-Schonberger (University of Vienna, Austria and Kennedy School ofGovernment, Harvard University), and Jim Savary (York University).

The final panel was on Human Rights in the Twenty-First Century and waschaired by Marc Rotenberg of the Electronic Privacy Information Center.
The speakers were Harry Hochheiser (Computer Professionals for SocialResponsibility), Jagdish Parikh (Human Rights Watch), Edwin Rekosh(Public Interest Law Initiative in Transitional Societies), FelipeRodriguez (Electronic Frontiers Australia) and Laurie Wiseberg (HumanRights Internet).

The GILC participants and other NGOs representatives produced astatement that was later forwarded to the OECD Ministers (see below).

Complete conference reports are available at the conference report page:

http://www.gilc.org/events/ottawa98/agenda.html


[5] NGOs Issue Declaration at OECD Conference


Consumer, labor, civil liberties, and research organizations joinedtogether last week in support of a letter addressed to Organization forEconomic Co-operation and Development (OECD) Ministers on the future ofInternet policy. Representatives of more than twenty non-governmentalorganizations (NGOs) from eight countries signed the statement.

The NGOs urged the establishment of a permanent Public InterestAdvisory Committee (PIAC), similar in type and function to business andlabor groups that currently advise the OECD. The group said that theCommittee should include representatives of public interest groups inthe fields of human rights and democracy, privacy and data protection,
consumer protection, and access. The group said that the promotion ofelectronic commerce "must be considered within the broader framework ofprotection of human rights, the promotion and strengthening ofdemocratic institutions, and the provision of affordable access toadvanced communication services."

The group made the following recommendations to the OECD:

- Authentication and certification: All OECD member countries shouldimplement and enforce the 1992 OECD Guidelines for the Security ofInformation Systems, particularly the Principles on Democracy, Ethics,
and Proportionality. The OECD should also consider issues ofauthentication and certification within the context of consumerprotection and privacy protection. Policies and practices thatdisregard consumer and privacy concerns will ultimately underminepublic trust.

- Cryptography: The OECD should promote implementation of theCryptography Guidelines of 1997 and urge the removal of all controls onthe use and export of encryption and other privacy enhancingtechniques. Trust requires the widespread availability of thestrongest means to protect privacy and security.

- Protection of privacy: The OECD should urge member states toimplement fully and develop means to enforce the Privacy Guidelines of1980. The OECD Guidelines provide an essential framework to establishconsumer trust in online transactions. Self-regulation has failed toprovide adequate assurance. The group further recommended efforts topromote anonymity and minimize the collection of personal informationso as to promote consumer confidence.

- Consumer protection: The OECD should support the establishment ofminimum standards for consumer protection, including the simplificationof contracts, means for cancellation, effective complaint mechanisms,
limits on consumer liability, non-enforceability of unreasonablecontract provisions, recourse at least to the laws and courts of theirhome country, and cooperation among governments in support of legalredress. Such minimal standards should provide a functional equivalenceto current safeguards, offering at least the same levels of protectionthat would be afforded in the off-line world.

- Intellectual property: The framework for intellectual propertyprotection should be based upon mechanisms that are least intrusive topersonal privacy, and least restrictive for the development of newtechnologies.

- Internet governance: Governments should foster Internet governancestructures that reflect democratic values and are transparent andpublicly accountable to users. Standards processes should be open andshould foster competition.

- Taxation: At the Ottawa ministerial Conference, Charles Rossotti,
Commissioner of the United States Internal Revenue Service, spoke ofthe creation of a Tax Advisory Group, in which government andbusinesses will participate. Similarly, the public interest groupsshould be invited to participate in this advisory group.

- Employment: Impacts on employment must be evaluated and taken fullyinto account in all discussions and negotiations.

Finally, the group recommended continued support for the OECD Committeefor Consumer Policy.

The following versions of the NGO letter are available:

http://www.gilc.org/speech/oecd/ngo-oecd-letter-1098.html (English)

http://www.gilc.org/speech/oecd/ong-lettre-ocde-1098.html (French)

http://www.ottawaoecdconference.com/english/announcements/e_tuac.pdf(PDF)



[6] National DNA Database Goes Online


An FBI database of the DNA of up to a million convicted criminals>from all fifty states will be activated on October 13, according topublished reports. States will provide data to the National DNAIdentification System and share the DNA information. Investigatorswill be able to upload DNA crime scene samples to the nationwidesystem and locate matches.

The federal DNA Identification Act of 1994 limits the database to DNA>from convicted criminals. Access will be restricted to lawenforcement agencies and court orders will be required to use theinformation in judicial proceedings. For security reasons, thephysical location of the database will not be disclosed.

DNA collection has been controversial, as it singles out individualsbased upon past criminal activity. The practice varies from state tostate; every state collects DNA of sex offenders, while they differon whether they collect the DNA of other criminals, includingmurderers, robbers and those who commit crimes against children.
White-collar criminals are universally excluded from collection.

In recent years, millions of dollars have been set aside in thefederal budget for "DNA Identification State Grants." The grantswere made contingent on the state databases being networked withfederal computer systems.

In an August ruling that invalidated the Massachusetts "DNA Seizureand Dissemination Act," the State Superior Court held that theinvoluntary seizure of DNA samples from prisoners, parolees, andprobationers without probable cause violates both the FourthAmendment of the U.S. Constitution and Article 14 of theMassachusetts Constitution.



[7] New Bills and Actions in Congress


* NOTE: Several important measures, including the "CDA II" Internetcensorship legislation, remain pending in Congress. FinalCongressional action will be reported in the next issue of the Alert.

H.R. 4651. Federal Criminal Law Improvements Act of 1998. Allowswiretapping for money laundering offenses, disclosure of illegallyobtained wiretap information. Introduced by McCullum (R-FL) onSeptember 28. Referred to the Committee on the Judiciary.

H.R. 4667. Electronic Privacy Bill of Rights Act of 1998. Limitscollection of personal information of children under 13. Gives FTCenforcement power. Orders FTC and FCC to hold proceedings onelectronic privacy. Introduced by Markey (D-MA) on October 1.
Referred to the Committee on Commerce. Text included in H.R. 3783 andapproved by the House.

S.2529. The Patients' Bill of Rights Act of 1998. Sets limited ruleson patient records privacy. Introduced by Daschle (D-SD) on September29. Placed on Senate Calendar October 2.

S.2536. International Crime and Anti-Terrorism Amendments of 1998.
Allows for wiretaps in computer crime cases. Introduced by Hatch(R-UT). Placed on the Calendar On October 1.



[8] Upcoming Conferences and Events


Privacy Pandemonium: What the EU's Privacy Directive Means for theUnited States. October 16. Washington, DC. Sponsored by the CatoInstutute. Contact: jenyepcato.org.

1998 UK Big Brother Awards. October 26. London School of Economics,
London, UK. Sponsored by Privacy International. Contact:
http://www.privacy.org/pi/bigbrother/

Symposium on Infowar and Civil Liberties. October 26. National PressClub, Washington, D.C. Sponsored by EPIC and FCG. Contact:
infoepic.org.

Encryption Controls Workshop. Bedford, MA, October 29. Sponsored byU.S. Department of Commerce. Contact: (202) 482-6031.

PDC 98 - the Participatory Design Conference, "BroadeningParticipation" November 12-14. Seattle, WA. Sponsored by ComputerProfessionals for Social Responsibility in cooperation with ACM andCSCW 98. Contact: http://www.cpsr.org/conferences/pdc98
Data Privacy in the Global Age. November 13. Milwaukee, WI. Sponsoredby ACLU of Wisconsin Data Privacy Project. Contact: Carole Doeppers<acluwicmdaol.com>.

Computer Ethics. Philosophical Enquiry 98 (CEPE'98). December 14-15.
London, UK. Sponsored by ACMSIGCAS and London School of Economics.
http://is.lse.ac.uk/lucas/cepe98.htm
1999 RSA Data Security Conference. January 18-21, 1999. San Jose, CA.
Sponsored by RSA. Contact: http://www.rsa.com/conf99/

FC '99 Third Annual Conference on Financial Cryptography. February22-25, 1999 Anguilla, B.W.I. Contact: http://fc99.ai.

Computers, Freedom and Privacy (CFP) '99. April 6-8, 1999. Washington,
DC. Sponsored by ACM. Contact: infocfp99.org.

1999 EPIC Cryptography and Privacy Conference. June 7, 1999.
Washington, DC. Sponsored by EPIC. Contact: infoepic.org.


Subscription Information


The EPIC Alert is a free biweekly publication of the ElectronicPrivacy Information Center. To subscribe or unsubscribe, send emailto epic-newsepic.org with the subject: "subscribe" (no quotes) or"unsubscribe". A Web-based form is available at:

http://www.epic.org/alert/subscribe.html
Back issues are available at:

http://www.epic.org/alert/


About EPIC


The Electronic Privacy Information Center is a public interestresearch center in Washington, DC. It was established in 1994 tofocus public attention on emerging privacy issues such as the ClipperChip, the Digital Telephony proposal, national ID cards, medicalrecord privacy, and the collection and sale of personal information.
EPIC is sponsored by the Fund for Constitutional Government, anon-profit organization established in 1974 to protect civil libertiesand constitutional rights. EPIC publishes the EPIC Alert, pursuesFreedom of Information Act litigation, and conducts policy research.
For more information, e-mail infoepic.org, http://www.epic.org orwrite EPIC, 666 Pennsylvania Ave., SE, Suite 301, Washington, DC20003. +1 202 544 9240 (tel), +1 202 547 5482 (fax).

If you'd like to support the work of the Electronic PrivacyInformation Center, contributions are welcome and fully tax-
deductible. Checks should be made out to "The Fund forConstitutional Government" and sent to EPIC, 666 Pennsylvania Ave.,
SE, Suite 301, Washington DC 20003. Individuals with First Virtualaccounts can donate at http://www.epic.org/epic/support.html
Your contributions will help support Freedom of Information Act andFirst Amendment litigation, strong and effective advocacy for theright of privacy and efforts to oppose government regulation ofencryption and funding of the digital wiretap law.

Thank you for your support.

END EPIC Alert 5.14










WorldLII: Copyright Policy | Disclaimers | Privacy Policy | Feedback
URL: http://www.worldlii.org/int/journals/EPICAlert/1998/14.html