WorldLII Home | Databases | WorldLII | Search | Feedback

EPIC Alert

You are here:  WorldLII >> Databases >> EPIC Alert >> 2000 >> [2000] EPICAlert 14

Database Search | Name Search | Recent Articles | Noteup | LawCite | Help

EPIC Alert 7.14 [2000] EPICAlert 14





EPIC ALERT




Volume 7.14 July 27, 2000

Published by the Electronic Privacy Information Center (EPIC)
Washington, D.C.

http://www.epic.org/alert/EPIC_Alert_7.14.html

Table of Contents



[1] Congress Examines FBI Carnivore Surveillance System
[2] New Bill Would Require Notice of Workplace Monitoring
[3] European Commission Adopts Safe Harbor Data Principles
[4] Microsoft Offers Security Patch for Third-Party Cookies
[5] EPIC Bill-Track: New Bills in Congress
[6] Resources Available for National High School Debate Topic
[7] EPIC Bookstore - The Electronic Privacy Papers
[8] Upcoming Conferences and Events


[1] Congress Examines FBI Carnivore Surveillance System


On July 24, the House Judiciary Committee convened a hearing on theFederal Bureau of Investigation's controversial Internet surveillanceprogram, Carnivore. The Committee hoped to shed light on the largelyunknown capabilities of the program, as well as to solicit feedbackfrom Carnivore's critics.

Carnivore is an advanced packet sniffer which the FBI installs on anInternet Service Provider's (ISP) backbone to scan and record selectedcommunications. Carnivore scans all of an ISP's Internet traffic,
looking for and recording relevant messages. It is Carnivore'sability to monitor large amounts of communications, as well as itsstill unknown configuration potential, that has raised concerns amongmembers of Congress and privacy and civil liberties advocates.

The FBI faced stiff bi-partisan questioning over Carnivore, led byReps. Jerrold Nadler (D-NY) and Bob Barr (R-GA). Both representativesexpressed skepticism about the FBI's assurances that Carnivore was a"surgical" instrument that is actually less intrusive than a standardwiretap, and both were curious as to why the FBI had not informedCongress about Carnivore earlier.

Witnesses on a second panel were also highly critical of the Bureau.
Barry Steinhardt of the ACLU said the use of Carnivore is like "awiretap capable of accessing the contents of all of the phonecompany's customers." This, he stated, was a direct violation of theFourth Amendment's requirement of narrow and targeted searches,
designed to protect both the privacy of individuals and the ability ofthe government to conduct searches. Like many members of theCommittee, Steinhardt was skeptical of the FBI's "trust us" approach.

One of the consistent criticisms of the Carnivore program is that verylittle information on its use and capabilities has been made public.
In the interest of the fullest possible public disclosure, EPICsubmitted a Freedom of Information Act request to the FBI on July 12seeking the disclosure of all information relating to Carnivore.

Testimony presented at the House Judiciary Committee hearing:

http://www.house.gov/judiciary/2.htm
The hearing can be viewed in its entirety over the web at:

http://www.cspan.org/technology_science/

More on the history of FBI monitoring of Internet communications andthe "digital telephony" law (or CALEA) is available at the EPICWiretap Page:

http://www.epic.org/privacy/wiretap/



[2] New Bill Would Require Notice of Workplace Monitoring


Bi-partisan legislation introduced in both houses of Congress wouldprevent employers from secretly monitoring the communications andcomputer use of their employees. The "Notice of Electronic MonitoringAct" (S.2898 and H.R.4908) would require employers to give "clear andconspicuous notice" to their employees if they intend to read e-mail,
monitor keystrokes or Web activity, or listen to telephoneconversations. The bill was introduced on July 20 by Sen. CharlesSchumer (D-NY) and Reps. Charles Canady (R-FL) and Bob Barr (R-GA).

The proposed legislation would not prohibit electronic monitoring, norwould it require employers to give notice each time they monitor anemployee's activity. Instead, employers would be required to provideworkers with initial notices when they are hired, and then annuallyand whenever there are changes to the company's monitoring policy.
Monitoring could be conducted without notice if there is reason tobelieve the employee is engaging in conduct harmful to the employer oranother employee.

The required notification would have to specify the type of computeruse that would be monitored, how the monitoring would be accomplished,
the frequency of the monitoring, the kinds of information that wouldbe obtained, and how the information would be stored, used ordisclosed. Employees would be able to sue employers for civil damagesif electronic monitoring is conducted without the required notice.

Workplace monitoring has become increasingly common in recent years --
an American Management Association report found that forty-fivepercent of major U.S. firms record and review employee communicationsand activities on the job -- but the courts have generally providedemployees with little recourse. Privacy advocates have longmaintained that providing notice of a monitoring policy should, as abare minimum, be required before employers can engage in such invasiveactivities.

Another privacy-related bill was introduced on July 26 by Sens. JohnMcCain (R-AZ), John Kerry (D-MA), and Spencer Abraham (R-MI). Thebi-partisan Internet privacy legislation would require all commercialwebsites to make clear disclosures about their information collectionpractices. The mandatory disclosures would be enforced by the FederalTrade Commission. The Senate Commerce Committee plans to holdhearings on the proposal in September.

The American Management Association's 1999 survey, "WorkplaceMonitoring and Surveillance," is available at:

http://www.amanet.org/research/monit/index.htm


[3] European Commission Adopts Safe Harbor Data Principles


On July 26, the European Commission finalized its decision to approvethe latest U.S. Safe Harbor proposal, thereby ending two years ofnegotiations between the U.S. Department of Commerce and the EuropeanUnion on the transborder flows of European citizens' personal data.
The agreement allows companies to voluntarily abide to a set ofprinciples protecting data belonging to EU citizens. However, thearrangement will not offer any increase in protections for U.S.
citizens.

The Commission decided to approve this agreement in spite of aforceful resolution by the European Parliament adopted on July 5 thatthe agreement needed to be re-negotiated in order to provide adequateprotection (see EPIC Alert 7.13). Acknowledging the Parliament'scriticisms, the Commission went ahead with the adoption of Safe Harborand promised to re-open negotiations on the arrangement if theremedies available to European citizens prove inadequate. EU memberstates will have 90 days to put the Commission's decision into effectand companies may join Safe Harbor starting in November.

In other international news, the Group of Eight (G8) has issued acharter on the "Global Information Society." The group, whichcomprises the top eight industrial countries in the world, met lastweek in Okinawa for its annual summit. The charter recognizes theneed to promote consumer trust and confidence in the electronicmarketplace (in particular by providing reliable means of settlingcross-border disputes), developing "effective and meaningful" privacyprotections, and ensuring the security of stored data. Addressing theissue of cyber-crime, the Group stated that it will continue topromote dialogue and co-operation between governments and industry.
Building on its earlier meeting in May of this year with industrygroups, the Group re-affirmed the need to tackle urgent securityissues such as hacking, viruses, and critical infrastructure.

Information regarding the European Commission's adoption of SafeHarbor:

http://europa.eu.int/rapid/start/cgi/guesten.ksh?p_action.gettxt=
gt&doc=IP/00/865|0|RAPID&lg=EN
The European Parliament resolution is available at:

http://www.epic.org/privacy/intl/EP_SH_resolution_0700.html
The G8 Communique from the Okinawa meeting is available at:

http://www.g8kyushu-okinawa.go.jp/e/documents/commu.html


[4] Microsoft Offers Security Patch for Third-Party Cookies


On July 20, Microsoft announced that it was introducing a betasecurity patch for the next version of Internet Explorer that wouldallow for better management of web cookies. The test version of thepatch should be available to the public by the end of August.

According to preliminary descriptions, the patch will offer severalfeatures that will allow users to control cookies more effectively.
The browser will be able to differentiate between first-party andthird-party cookies and the default setting will warn the user when apersistent third-party cookie is being served. Persistent third-partycookies are used heavily by Internet advertisers, such as DoubleClick,
to track computer users' activities. In addition, the newfunctionality will allow Internet users to delete all cookies with asingle click and will make information about security and privacy moreeasily accessible. The security patch does not, however, increaseconsumer control over the use of first-party cookies prevalent oncommercial websites.

The cookie management features follow on the heels of other recentsecurity patches issued by Microsoft correcting data leak issues. InMay, the company released a patch for the popular Outlook program thatwould turn off cookies in email messages.

In related news, the newly created non-profit Privacy Foundation hasannounced its first initiative, the creation of a Privacy Center atthe University of Denver. The Privacy Center will be a research andeducation organization that seeks to investigate new technology andinform the public on how to protect themselves from privacy invasions.
Richard Smith, noted Internet privacy expert, is the Chief TechnologyOfficer for the organization.

Information about the security patch is available at:

http://www.microsoft.com/windows/ie/default.htm
For cookie management software and other privacy enhancingtechnologies, visit the EPIC Online Guide to Practical Privacy Tools:

http://www.epic.org/privacy/tools.html
For more information about the Privacy Foundation's new researchcenter:

http://www.privacyfoundation.org/



[5] EPIC Bill-Track: New Bills in Congress


*House*

H.R.4311. Identity Theft Protection Act of 2000. Institutesconfirmations of changes of address, annually distributed free creditreports, and access to information held by individual referenceservices providers (see also S.2328). Sponsor: Rep. Hooley, Darlene(D-OR). Referred to the Subcommittee on Financial Institutions andConsumer Credit.

H.R.4857. Privacy and Identity Protection Act of 2000. Far-reachinglaw that would restrict government uses of the social security numberand create regulations over the sale and purchase and sale of socialsecurity numbers by the private sector (see also S.2876). Sponsor:
Rep. Shaw, E. Clay, Jr. (R-FL). Forwarded by Subcommittee to FullHouse Ways and Means Committee (Amended) by Voice Vote.

H.R.4908 Notice of Electronic Monitoring Act. Amends the ElectronicCommunications Privacy Act to require employers to provide notice toemployees of electronic monitoring unless the employer believes theemployee is engaged in harmful activity (see also S.2898). Sponsor:
Rep. Canady, Charles T. (R-FL). Referred to the House Committee on theJudiciary.


*Senate*

S.2328. Identity Theft Prevention Act of 2000. Institutesconfirmations of changes of address, annually distributed free creditreports, and access to information held by individual referenceservices providers (see also H.R.4311). Sponsor: Sen. Feinstein,
Dianne (D-CA). Read twice and referred to the Committee on Banking,
Housing, and Urban Affairs.

S.2554. Amy Boyer's Law. Would limit display of social securitynumbers. Sponsor: Sen. Gregg, Judd (R-NH). Read twice and referred tothe Committee on Finance.

S.2871. Social Security Number Privacy Act of 1999. Amends theGramm-Leach-Bliley Act (see S.900) to prohibit financial institutionsfrom selling social security numbers. Sponsor: Sen. Shelby, Richard C.
(R-AL). Read twice and referred to the Committee on Banking, Housing,
and Urban Affairs.

S.2876. Privacy and Identity Protection Act of 2000. Far-reaching lawthat would restrict government uses of the social security number andcreate regulations over the sale and purchase and sale of socialsecurity numbers by the private sector (see also H.R.4857). Sponsor:
Sen. Bunning, Jim (R-KY). Read twice and referred to the Committee onFinance.

S.2898. Notice of Electronic Monitoring Act. Amends the ElectronicCommunications Privacy Act to require employers to provide notice toemployees of electronic monitoring unless the employer believes theemployee is engaged in harmful activity (see also H.R. 4908). Sponsor:
Sen. Schumer, Charles E. (D-NY). Read twice and referred to theCommittee on the Judiciary.


EPIC Bill Track: Tracking Privacy, Speech, and Cyber-Liberties Billsin the 106th Congress, is available at:

http://www.epic.org/privacy/bill_track.html


[6] Resources Available for National High School Debate Topic


In response to requests for information regarding the 2000-2001National High School Debate Topic, "Resolved: that the United Statesfederal government should significantly increase protection of privacyin one or more of the following areas: employment, medical records,
consumer information, search and seizure," EPIC has produced a webpagecontaining links to relevant websites, litigation, court cases, andsurveys. A brief essay on the subject is also included.

We at EPIC are encouraged that the national debate topic relates toprivacy issues, and hope that the ideas and discussions produced willbecome part of the larger debate on privacy.

The National High School Debate Topic Resources page is at:

http://www.epic.org/privacy/debate_resources.html


[7] EPIC Bookstore - The Electronic Privacy Papers


The Electronic Privacy Papers: Documents on the Battle for Privacy inthe Age of Surveillance by Bruce Schneier, David Banisar
http://www.amazon.com/exec/obidos/ISBN=0471122971/electronicprivacA
While most books on privacy and security issues in cyberspace simplygive accounts of debates on the issues, The Electronic Privacy Papersdocuments the war
--
practically salvo by salvo. Authors Schneier andBanisar present the actual government and industry documents, whichcover both legal and technical matters. The information includesresearch reports on the value of wiretaps, influential speeches andarticles, and actual legislation that has gone before Congress. Manyof the government documents, although legally available to the publicthrough the Freedom of Information Act, were improperly kept secretuntil several lawsuits eventually forced their release. These"hidden" papers exhibit the FBI's push for government access to allelectronic communications, report on how increased government accesscould also increase the opportunities for computer crime, and recordthe conflict between those who favor private encryption technology andthose who'd make illegal encryption systems that don't allowgovernment agencies access to decryption keys. Legislation andSupreme Court decisions on these disputes are also presented. Thisbook will give you a clear understanding of both sides of the debateand will provide insight into the strategies that both government andprivacy advocates use in attempt to achieve their desired result.



EPIC Publications:

"Cryptography and Liberty 2000: An International Survey of EncryptionPolicy," Wayne Madsen and David Banisar, editors, (EPIC 2000).
Price: $20. http://www.epic.org/crypto&/

EPIC's third survey of encryption policies around the world. Theresults indicate that the efforts to reduce export controls on strongencryption products have largely succeeded, although severalgovernments are gaining new powers to combat the perceived threats ofencryption to law enforcement.



"The Privacy Law Sourcebook: United States Law, International Law, andRecent Developments," Marc Rotenberg, editor (EPIC 1999). Price: $50.
http://www.epic.org/pls/

The "Physicians Desk Reference of the privacy world." An invaluableresource for students, attorneys, researchers and journalists who needan up-to-date collection of U.S. and International privacy law, as wellas a comprehensive listing of privacy resources.



"Filters and Freedom - Free Speech Perspectives on Internet ContentControls," David Sobel, editor (EPIC 1999). Price: $20.
http://www.epic.org/filters&freedom/

A collection of essays, studies, and critiques of Internet contentfiltering. These papers are instrumental in explaining why filteringthreatens free expression.



"Privacy and Human Rights 1999: An International Survey of Privacy Lawsand Developments," David Banisar, Simon Davies, editors, (EPIC 1999).
Price: $15. http://www.epic.org/privacy&humanrights99/

An international survey of the privacy and data protection laws foundin 50 countries around the globe. This report outlines theconstitutional and legal conditions of privacy protection, andsummarizes important issues and events relating to privacy andsurveillance.



Additional titles on privacy, open government, free expression,
computer security, and crypto, as well as films and DVDs can beordered through the EPIC Bookstore: http://www.epic.org/bookstore/



[8] Upcoming Conferences and Events


CPSR Meeting on Privacy & Security. August 15, 2000. TorontoCypherpunks/Webgrrls. Toronto, Canada. For more information:
http://toronto.cypherpunks.ca/

First International Hackers Forum. The Green Planet. August 18-20,
2000. Zaporozhye, Ukraine. For more information:
http://www.geocities.com/hack_forum
Surveillance Expo 2000. August 28-30, 2000. Arlington, VA. For moreinformation: http://www.surveillance-expo.com
Health Information Privacy: A Dialogue with the Stakeholders.
September 21, 2000. Westin Hotel. Ottawa, Canada. For moreinformation: http://www.rileyis.com/seminars
KnowRight 2000 - InfoEthics Europe. Austrian Computer Society andUNESCO. September 26-29, 2000. Vienna, Austria. For more information:
http://www.ocg.at/KR-IE2000.html
One World, One Privacy: 22nd Annual International Conference onPrivacy and Personal Data Protection. September 28-30, 2000. Venice,
Italy. For more information: http://www.dataprotection.org/

Privacy: A Social Research Conference. New School University. October5-7, 2000. New York, NY. For more information:
http://www.newschool.edu/centers/socres/privacy/

Privacy2000: Information and Security in the Digital Age. October 31-
November 1, 2000. Columbus, Ohio. Adam's Mark Hotel. For moreinformation: http://www.privacy2000.org

Subscription Information


The EPIC Alert is a free biweekly publication of the ElectronicPrivacy Information Center. A Web-based form is available forsubscribing or unsubscribing at:

http://www.epic.org/alert/subscribe.html
To subscribe or unsubscribe using email, send email toepic-newsepic.org with the subject: "subscribe" (no quotes) or"unsubscribe".

Back issues are available at:

http://www.epic.org/alert/


About EPIC


The Electronic Privacy Information Center is a public interestresearch center in Washington, DC. It was established in 1994 tofocus public attention on emerging privacy issues such as the ClipperChip, the Digital Telephony proposal, national ID cards, medicalrecord privacy, and the collection and sale of personal information.
EPIC is sponsored by the Fund for Constitutional Government, anon-profit organization established in 1974 to protect civil libertiesand constitutional rights. EPIC publishes the EPIC Alert, pursuesFreedom of Information Act litigation, and conducts policy research.
For more information, e-mail infoepic.org, http://www.epic.org orwrite EPIC, 1718 Connecticut Ave., NW, Suite 200, Washington, DC20009. +1 202 483 1140 (tel), +1 202 483 1248 (fax).

If you'd like to support the work of the Electronic PrivacyInformation Center, contributions are welcome and fullytax-deductible. Checks should be made out to "The Fund forConstitutional Government" and sent to EPIC, 1718 ConnecticutAve., NW, Suite 200, Washington, DC 20009.

Your contributions will help support Freedom of Information Act andFirst Amendment litigation, strong and effective advocacy for theright of privacy and efforts to oppose government regulation ofencryption and expanding wiretapping powers.

Thank you for your support.


Privacy Policy


The EPIC Alert mailing list is used only to mail the EPIC Alert and tosend notices about EPIC activities. We do not sell, rent or share ourmailing list. We also intend to challenge any subpoena or other legalprocess seeking access to our mailing list. We do not enhance (linkto other databases) our mailing list or require your actual name.

In the event you wish to subscribe or unsubscribe your email addressfrom this list, please follow the above instructions under"subscription information". Please contact infoepic.org if you haveany other questions.

END EPIC Alert 7.14


.


WorldLII: Copyright Policy | Disclaimers | Privacy Policy | Feedback
URL: http://www.worldlii.org/int/journals/EPICAlert/2000/14.html