You are here:
WorldLII >>
Databases >>
EPIC Alert >>
2002 >>
[2002] EPICAlert 15
Database Search
| Name Search
| Recent Articles
| Noteup
| LawCite
| Help
EPIC Alert 9.15 [2002] EPICAlert 15
EPIC ALERT
Volume 9.15 August 9, 2002
Published by the Electronic Privacy Information Center (EPIC)
Washington, D.C.
http://www.epic.org/alert/EPIC_Alert_9.15.html
Table of Contents
[1] FTC Announces Action Against Microsoft Passport
[2] Court Orders DOJ to Disclose Names of 9/11 Detainees
[3] OECD Announces Computer Security Guidelines
[4] EPIC Files Brief in Online Offender Registry Case
[5] EPIC Argues Police Must Be Present for Online Search
[6] Eli Lilly Settles With States; NTIA to Hold ENUM Forum
[7] EPIC Bookstore - Trust Us, We're Experts
[8] Upcoming Conferences and Events
[1] FTC Announces Action Against Microsoft Passport
The Federal Trade Commission (FTC) yesterday announced a consentorder with Microsoft regarding the Passport identification andauthentication
system. Prompted by a complaint submitted by EPIC andfourteen leading consumer groups, the FTC's investigation found thatMicrosoft
had violated federal consumer protection law prohibitingunfair and deceptive trade practices.
In July and August 2001, EPIC -- joined by groups includingJunkbusters, Consumers Union, US PIRG and the Consumer Federation ofAmerica
-- submitted detailed complaints to the Commission. Thecomplaints described the serious privacy implications of MicrosoftWindows
XP and Microsoft Passport, and alleged that the collection anduse of personal information by the company would violate Section 5
ofthe Federal Trade Commission Act. After the complaints were filed,
the company experienced a series of serious security breaches,
including a vulnerability that would have allowed a person to stealinformation within the Microsoft Wallet service.
The FTC yesterday found that Microsoft made a series of falserepresentations about Passport. First, the company, despiteguarantees
to the contrary, did not employ reasonable methods toprotect the privacy of personal information collected by Passport.
Second, the company falsely represented that the Passport Walletservice provided extra security over standard e-commerce transactions.
Third, the company did not disclose that Passport tracked users'
visits to web sites, when in fact a log of user activity wasmaintained by the company for months. Fourth, Kids' Passport failedto
provide parental control over collection of information online.
The order requires Microsoft to implement a new information securityprogram. A third-party auditor will check compliance with thisprogram
within one year, and Microsoft must reassess its informationsecurity practices every two years. Further, Microsoft is prohibitedfrom
making future false representations about the Passport service.
Microsoft is bound by the order for 20 years, and fines can be leviedfor non-compliance.
The FTC will accept public comment on the order until September 9,
2002.
FTC Consent Order:
http://www.ftc.gov/os/2002/08/microsoftagree.pdf
FTC Complaint:
http://www.ftc.gov/os/2002/08/microsoftcmp.pdf
EPIC's Sign Out of Passport Page:
http://www.epic.org/privacy/consumer/microsoft/
EPIC's Passport Investigation Docket Page:
http://www.epic.org/privacy/consumer/microsoft/passport.html
[2] Court Orders DOJ to Disclose Names of 9/11 Detainees
In a decision issued on August 2, U.S. District Judge Gladys Kesslerdirected the Justice Department to disclose, no later than August
19,
the identities of more than 1,000 individuals detained in connectionwith the government's September 11 terrorist investigation. Under
theorder, detainees desiring confidentiality of their identities can filestatements requesting non-disclosure. The judicial decision
marks asignificant defeat for government secrecy in the wake of the terroristattacks. EPIC joined with a coalition of other groups
in seeking thedisclosure of the information under the Freedom of Information Act(FOIA) and serves as co-counsel in the case.
The Justice Department had argued that releasing the detainees' namesand other information could undermine the September 11 investigationand
harm national security. Disclosure would subject the detainees topossible intimidation or coercion, the government argued, and provideterrorists
with a potential "road map" of the investigation. JudgeKessler found the government's argument "unpersuasive"
and concludedthat "the public's interest in learning the identities of thosearrested and detained is essential to verifying
whether the governmentis operating within the bounds of the law."
The FOIA lawsuit was filed by the Center for National SecurityStudies, EPIC, and 21 other organizations, including the AmericanCivil
Liberties Union, Human Rights Watch and Amnesty InternationalUSA. The plaintiffs argued that the detentions constituted secretarrests
that violated longstanding legal requirements compelling thegovernment to account for the individuals it incarcerates.
"The Court fully understands and appreciates that the first priorityof the executive branch in a time of crisis is to ensure
the physicalsecurity of its citizens," Judge Kessler wrote. "By the same token,
the first priority of the judicial branch must be to ensure that ourgovernment always operates within the statutory and constitutionalconstraints
which distinguish a democracy from a dictatorship."
The Justice Department has appealed the ruling and asked Judge Kesslerto delay enforcement of her order pending resolution of the
appeal.
The court's decision is available at:
http://www.epic.org/open_gov/foia/cnssdecision.pdf
EPIC has produced a resource page with background on the litigation:
http://www.epic.org/open_gov/foia/cnss_v_doj.html
[3] OECD Announces Computer Security Guidelines
The Organization for Economic Cooperation and Development (OECD) hasreleased principles for computer security that emphasize democracy,
transparency, privacy, and education. The OECD principles areintended to protect important civil society values as countries andprivate
sector organizations go forward with computer security plans.
EPIC Research Director Sarah Andrews served on the OECD expert panelas the civil society representative, and consulted with computersecurity
experts, public policy experts, and NGO participants in thePublic Voice project during the year-long development of theguidelines.
The OECD, based in Paris, is a thirty-member organization of leadingindustrial nations in North America, Europe and East Asia. Over
theyears, the OECD has produced several important policy frameworks forinformation technology in such areas as privacy, cryptography,
andelectronic commerce.
The original OECD Security Guidelines were promulgated in 1992. Thenew Guidelines seek to take account of the development of networkcomputing
and the growth of commercial services, as well as theresponse of governments to the events of September 11.
The OECD Security Guidelines set out nine principles: Awareness,
Responsibility, Response, Ethics, Democracy, Risk Assessment, SecurityDesign and Implementation, Security Management, and Reassessment.
Each principle is followed by a definition and then a one paragraphdescription. Taken as a whole, the principles emphasize the jointresponsibility
of all participants to promote network security. TheGuidelines also draw attention to important democratic goals in thedesign of
security policy, including and specifically stating that:
Security should be implemented in a manner consistent with the values recognised by democratic societies including the
freedom to exchange thoughts and ideas, the free flow of information, the confidentiality of information and communication,
the appropriate protection of personal information, openness and transparency.
The OECD also adopted a principle on Risk Assessment that states:
Risk assessment identifies threats and vulnerabilities and should be sufficiently broad-based to encompass key internal
and external factors, such as technology, physical and human factors, policies and third-party services with security
implications. Risk assessment will allow determination of the acceptable level of risk and assist the selection of appropriate
controls to manage the risk of potential harm to information systems and networks in light of the nature and importance of
the information to be protected. Because of the growing interconnectivity of information systems, risk assessment should
include consideration of the potential harm that may originate from others or be caused to others.
A similar proposal was under consideration by the OECD in 1992 but wasnot adopted at that time.
Regrettably, the OECD adopted the authoritarian "culture of security"
as the tagline for its most recent effort. But overall the Guidelinesare a welcome contribution to the computer security field, and
shouldpromote policies that are more responsive to civil society intereststhan some of the recent proposals of national governments.
OECD Guidelines for the Security of Information Systems and Networks:
http://www.oecd.org/pdf/M00033000/M00033183.pdf
OECD Governments Launch Drive to Improve Security of Online Networks:
http://www.epic.org/redirect/oecd_redirect.html
The Public Voice:
http://www.thepublicvoice.org/
[4] EPIC Files Brief in Online Offender Registry Case
EPIC filed an amicus brief with the Supreme Court on August 5, urgingthe Court to uphold a circuit court ruling that the Alaska "Megan'sLaw"
statute violates the Constitution. EPIC argues that themandatory online dissemination of a sex offender registry is excessivewhen weighed against the statutory purpose
of protecting people in thegeographic vicinity of released offenders.
The Alaska law is the state's adaptation of federal legislationrequiring public notification of the locations of convicted sexoffenders
upon their release. Commonly called "Megan's Law," thefederal law directing such notification was enacted in 1996 after
theslaying of Megan Kanka, a seven-year-old New Jersey girl, by aneighbor who had been released after serving time for sex offenses.
The federal appellate court determined that that the Alaska law,
permitting inclusion of names, addresses, descriptions, and otherprivate information in a sex offender registry to be posted on theInternet,
violated the ex post facto clause of the Constitutionbecause the information included in the registry was too broad and themethods
of gathering that information were extremely burdensome. Mostimportantly, the appeals court found that the intent of protectingthose
in the geographical area from individuals required to registerwas not furthered by allowing people all over the world to access thepersonal
data included in the registry.
EPIC's amicus brief focuses on the effect of Internet dissemination ofstigmatizing information collected by the government. EPIC
arguesthat the government has a duty to impose safeguards and limitationsupon its dissemination of private, stigmatizing information
that itcollects, especially when such information would otherwise beeffectively unavailable but is made readily accessible worldwidethrough
government action.
EPIC's resource page with background information on the case:
http://www.epic.org/privacy/godfrey/
EPIC's amicus brief is available at:
http://www.epic.org/privacy/otte_v_doe/godfrey_amicus.pdf
[5] EPIC Argues Police Must Be Present for Online Search
On July 26, EPIC filed an amicus brief in the Eighth Circuit arguingthat police officer presence is required during the service of
awarrant on an ISP. EPIC argues that the service of a search warrantby fax machine doesn't adequately safeguard Fourth Amendment
guaranteeof a "reasonable" search. EPIC's brief details the history of U.S.
search and seizure law, which has mandated officer presence at theservice of a warrant since the 1700s.
The case arose in October 2000, when police officers in Minnesotabegan investigating Dale Robert Bach for potential child pornographycrimes.
As part of the investigation, an officer obtained a searchwarrant to be served upon Yahoo, an Internet service provider inCalifornia.
Minnesota requires that an officer be present at theservice of a search warrant. However, rather than adhering to therequirements
provided by Minnesota law, the officer investigating Bachserved the search warrant on Yahoo by fax. Upon receiving the fax,
Yahoo employees retrieved all data from Bach's account, includingdeleted email messages. Yahoo then mailed the disk to Minnesota,
where the data became evidence in Bach's federal criminal trial.
At trial, Bach moved to have the evidence suppressed, citingviolations of the Minnesota statute as well as a federal statute. Thedistrict
court held that the evidence should be suppressed as thesearch was illegal under both federal and state laws. EPIC's briefurges
the appellate court to uphold this ruling, because officerpresence is a historical and crucial procedural safeguard guaranteeingFourth
Amendment protections.
There are more than 140 million Internet users in the United States;
thus, the court's resolution of this case could potentially affect theprivacy interests of millions of citizens.
EPIC's Bach Page:
http://www.epic.org/privacy/bach/
EPIC's amicus brief is available at:
http://www.epic.org/privacy/bach/brief.pdf
[6] Eli Lilly Settles With States; NTIA to Hold ENUM Forum
New York and seven other states have settled an investigation ofpharmaceutical company Eli Lilly, which accidentally disclosed over600
personally-identifiable e-mail addresses of individuals who signedup for an online messaging service. The messaging service sentsubscribers
a daily reminder to take Prozac, a prescriptionanti-depressant. In July 2001, the ACLU alerted federal authoritiesto the privacy
violation.
Under the settlement agreement, the company agreed to improve internalinformation security standards. The company will issue informationsecurity
reports, and undergo independent compliance reviews. Thecompany also paid $160,000 to the eight states for attorney fees andinvestigative
costs. In January 2002, Eli Lilly settled a federalinvestigation of the same matter, but was not required to pay monetarydamages.
Individuals who were harmed by the disclosure may stillbring suit against the company.
The Department of Commerce's National Telecommunications InformationAgency (NTIA) will hold a roundtable on Electronic Numbering (ENUM)
onAugust 14, 2002. ENUM is a technology that enables a user to storecontact information that can be accessed by another person through
theuse of a single number. For instance, a person could store fax,
voice, and voicemail numbers, as well as e-mail and home addresses,
all in a single ENUM account. By using the ENUM associated with theaccount, another person could access all the personal contactinformation
contained within that account.
ENUM may become a widely-used technology to facilitate convenientcommunications. However, its privacy implications have not beenadequately
addressed. The ENUM database would be public andsearchable by anyone. It is likely that marketers, spammers, andmalicious actors
will mine the database for personal contactinformation. Since there are no statutory protections in placeregulating the use of ENUM
contact information, marketers and spammersmay use the contact information for junk mail, unsolicited commerciale-mail, and other
forms of commercial solicitations.
Lilly's Multi-State Settlement Agreement:
http://www.epic.org/privacy/medical/lillyagreement.pdf
The ACLU's Complaint:
http://www.aclu.org/news/2001/n070501b.html
EPIC's ENUM resource page:
http://www.epic.org/privacy/enum/
NTIA ENUM Public Meeting Notice:
http://www.epic.org/redirect/ntia_redirect.html
[7] EPIC Bookstore - Trust Us, We're Experts
Trust Us, We're Experts: How Industry Manipulates Science and GamblesWith Your Future, by Sheldon Rampton and John Stauber (Putnam
2001).
http://www.epic.org/bookstore/powells/redirect/alert915.html
At a recent Federal Trade Commission (FTC) workshop on telemarketing,
Jim Miller, former FTC Chairman and now Washington lobbyist, presenteda study showing that predictive dialers, the systems that allowtelemarketers
to phone many persons at the same time, should not beeliminated because they lower costs for consumers. Miller's report,
sponsored by the "Consumer Choice Coalition," glossed over objectionsto predictive dialers, which result in hang-up calls
to phonesubscribers. While calculating in detail the costs of newtelemarketing regulations to industry, Miller did not attempt toaccount
for the lost time and frustration caused by predictivedialers. A little digging shows that no consumers seem to be membersof the
Consumer Choice Coalition -- rather, it is a "cross-industrycoalition of companies and associations."
In "Trust Us, We're Experts," Sheldon Rampton and John Stauber'ssecond book on the public relations (PR) industry, the reader
iswarned about the role that Miller and other experts play in the publicpolicy process. These experts, supported by massive funding
fromindustry, formulate clever studies that ward off regulators andlegislators. In some cases, these experts even endanger the public.
The authors illustrate a formula for industry advocacy. First,
experts are acquired to present the appearance of neutral, third-partysupport. Third-party advocacy is well-recognized as a force
forcreating credibility, and in fact, it is the first guideline in adeveloping field called "persuasive computing," which
seeks to developcomputer interfaces that alter individuals' behavior. Second,
industry groups grow "astroturf" -- that is, fake grassroots supportfor their position. This usually takes the form of
letters tonewspapers and legislators from concerned citizens who are quietlyremunerated for their support. Third, well-organized
PR firms sendout pre-written news stories that are republished by busy journalists,
sometimes in full as original news.
PR techniques are also used to distract the public from public healthhazards. A typical approach is to deny that the hazard exists
at all.
But when denial is no longer tenable, PR experts advise companies toblame the problem on other hazards, or on the victim himself.
Whenblame can no longer be assigned, they claim that assigningresponsibility to the company will result in lost jobs or bankruptcy.
While these approaches sound simple and predictable, they have beeneffective in duping the public repeatedly. The authors illustrate
howthey successfully delayed or stopped regulations to protectindividuals from known toxins, including asbestos, tobacco, vinylchloride,
and conditions such as silicosis. They were even effectivein stalling the removal of lead from gasoline, despite the fact thatlead
has been a known toxin for centuries.
The book is full of surprises, including a description of a softwareprogram called "Outrage" that helps companies manage
potential PRproblems. The software advises companies to "deflect, defer, dismiss,
or defeat" negative attention, depending on the situation. Companiescan even purchase "crisis management" consulting
packages to ward offnegative media attention.
The authors do present solutions to lessen the impact of industryexperts on public policy. One important practice, which was recentlyadopted
by the prestigious New England Journal of Medicine, is torefuse to publish any study where the sponsor has the right topre-publication
review and veto -- in essence, the ability to withholdunfavorable results from public view. The authors also suggest thatresearch
from other countries be relied upon to evaluate publicpolicy. Researchers in other countries sometimes have exposedindustrial hazards
decades before American experts. But, mostimportantly, the authors urge us to question authority. Collectively,
whether the issue is privacy, pesticides, or global warming, we needto pay more attention to the man behind the curtain.
- Chris Hoofnagle
EPIC Publications:
"Privacy & Human Rights 2001: An International Survey of Privacy Lawsand Developments," (EPIC 2001). Price: $20.
http://www.epic.org/bookstore/phr2001/
This survey, by EPIC and Privacy International, reviews the state ofprivacy in over fifty countries around the world. The survey
examinesa wide range of privacy issues including, data protection, telephonetapping, genetic databases, ID systems and freedom of
informationlaws.
"The Privacy Law Sourcebook 2001: United States Law, InternationalLaw, and Recent Developments," Marc Rotenberg, editor
(EPIC 2001).
Price: $40. http://www.epic.org/bookstore/pls2001/
The "Physicians Desk Reference of the privacy world." An invaluableresource for students, attorneys, researchers and journalists
who needan up-to-date collection of U.S. and International privacy law, aswell as a comprehensive listing of privacy resources.
"Filters and Freedom 2.0: Free Speech Perspectives on Internet ContentControls" (EPIC 2001). Price: $20.
http://www.epic.org/bookstore/filters2.0/
A collection of essays, studies, and critiques of Internet contentfiltering. These papers are instrumental in explaining why filteringthreatens
free expression.
"The Consumer Law Sourcebook 2000: Electronic Commerce and the GlobalEconomy," Sarah Andrews, editor (EPIC 2000). Price:
$40.
http://www.epic.org/cls/
The Consumer Law Sourcebook provides a basic set of materials forconsumers, policy makers, practitioners and researchers who areinterested
in the emerging field of electronic commerce. The focus ison framework legislation that articulates basic rights for consumersand
the basic responsibilities for businesses in the online economy.
"Cryptography and Liberty 2000: An International Survey of EncryptionPolicy," Wayne Madsen and David Banisar, authors (EPIC
2000).
Price: $20. http://www.epic.org/crypto&/
EPIC's third survey of encryption policies around the world. Theresults indicate that the efforts to reduce export controls on strongencryption
products have largely succeeded, although severalgovernments are gaining new powers to combat the perceived threats ofencryption
to law enforcement.
EPIC publications and other books on privacy, open government, freeexpression, crypto and governance can be ordered at:
EPIC Bookstore http://www.epic.org/bookstore/
"EPIC Bookshelf" at Powell's Books http://www.powells.com/features/epic/epic.html
[8] Upcoming Conferences and Events
IT and Law. University of Geneva, University of Bern, SwissAssociation of IT and Law. September 9-10, 2002. Geneva, Switzerland.
For more information: http://www.informatiquejuridique.ch/
ILPF Conference 2002: Security v. Privacy. Internet Law & PolicyForum. September 17-19, 2002. Seattle, WA. For more information:
http://www.ilpf.org/conference2002/
Privacy2002: Information, Security & New Global Realities. TechnologyPolicy Group. September 24-26, 2002. Cleveland, OH. For moreinformation:
http://www.privacy2000.org/privacy2002/
Privacy in Ubicomp 2002: Workshop on Socially-informed Design ofPrivacy-enhancing Solutions in Ubiquitous Computing. Held as part
ofUBICOMP 2002. September 29, 2002. Goeteborg, Sweden. For moreinformation: http://guir.berkeley.edu/privacyworkshop2002/
Shrinking World, Expanding Net. Computer Professionals for SocialResponsibility (CPSR). October 5, 2002. Cambridge, MA. For moreinformation:
http://www.cpsr.org/conferences/annmtg02/
Bridging the Digital Divide: Challenge and Opportunities. 3rd WorldSummit on Internet and Multimedia. October 8-11, 2002. Montreux,
Switzerland. For more information: http://www.internetworldsummit.org/
2002 WSEAS International Conference on Information Security (ICIS'02). World Scientific and Engineering Academy and Society. October14-17,
2002. Rio de Janeiro, Brazil. For more information:
http://www.wseas.org/conferences/2002/brazil/icis/
IAPO Privacy & Security Conference. International Association ofPrivacy Officers. October 16-18, 2002. Chicago, IL. For moreinformation:
http://www.privacyassociation.org/html/conferences.html
Privacy Trends: Complying With New Demands. Riley Information ServicesInc. and the Commonwealth Centre for Electronic Governance.
October22, 2002. Ottawa, Canada. For more information:
http://www.rileyis.com/seminars/
3rd Annual Privacy and Security Workshop: Privacy & Security: TotallyCommitted. Centre for Applied Cryptographic Research, University
ofWaterloo and the Information and Privacy Commissioner/Ontario.
University of Toronto. November 7-8, 2002. Toronto, Canada. For moreinformation: http://www.epic.org/redirect/cacr.html
First Hawaii Biometrics Conference. Windward Community College,
Pacific Center for Advanced Technology Training (PCATT). November10-13, 2002. Waikiki, HI. For more information:
http://biometrics.wcc.hawaii.edu/
Transformations in Politics, Culture and Society. Inter-
Disciplinary.Net. December 6-8, 2002. Brussels, Belgium. For moreinformation: http://www.inter-disciplinary.net/tpcs1.htm
18th Annual Computer Security Applications Conference (ACSAC):
Practical Solutions to Real Security Problems. Applied ComputerSecurity Associates. December 9-13, 2002. Las Vegas, NV. For moreinformation:
http://www.acsac.org/
Third Annual Privacy Summit. International Association of PrivacyOfficers. February 26-28, 2003. Washington, DC. For more information:
http://www.privacyassociation.org/html/conferences.html
CFP2003: 13th Annual Conference on Computers, Freedom, and Privacy.
Association for Computing Machinery (ACM). April 1-4, 2003. New York,
NY. For more information: http://www.cfp.org/
Subscription Information
Subscribe/unsubscribe via Web interface:
http://mailman.epic.org/cgi-bin/mailman/listinfo/epic_news
Subscribe/unsubscribe via email:
To: epic_news-requestmailman.epic.org
Subject line: "subscribe" or "unsubscribe" (no quotes)
Help with subscribing/unsubscribing:
To: epic_news-requestmailman.epic.org
Subject: "help" (no quotes)
Back issues are available at:
http://www.epic.org/alert/
The EPIC Alert displays best in a fixed-width font, such as Courier.
Privacy Policy
The EPIC Alert mailing list is used only to mail the EPIC Alert and tosend notices about EPIC activities. We do not sell, rent or
share ourmailing list. We also intend to challenge any subpoena or other legalprocess seeking access to our mailing list. We do
not enhance (linkto other databases) our mailing list or require your actual name.
In the event you wish to subscribe or unsubscribe your email addressfrom this list, please follow the above instructions under"subscription
information". Please contact infoepic.org if you wouldlike to change your subscription email address, if you areexperiencing subscription/unsubscription problems, or if you
have anyother questions.
About EPIC
The Electronic Privacy Information Center is a public interestresearch center in Washington, DC. It was established in 1994 tofocus
public attention on emerging privacy issues such as the ClipperChip, the Digital Telephony proposal, national ID cards, medicalrecord
privacy, and the collection and sale of personal information.
EPIC publishes the EPIC Alert, pursues Freedom of Information Actlitigation, and conducts policy research. For more information,
e-mail infoepic.org, http://www.epic.org or write EPIC, 1718Connecticut Ave., NW, Suite 200, Washington, DC 20009.
+1 202 483 1140 (tel), +1 202 483 1248 (fax).
If you'd like to support the work of the Electronic PrivacyInformation Center, contributions are welcome and fullytax-deductible.
Checks should be made out to "EPIC" and sent to1718 Connecticut Ave., NW, Suite 200, Washington, DC 20009.
Or you can contribute online at:
http://www.epic.org/donate/
Drink coffee, support civil liberties, get a tax deduction, and learnLatin at the same time! Receive a free epic.org "sed quis
custodietipsos custodes?" coffee mug with donation of $75 or more.
Your contributions will help support Freedom of Information Act andFirst Amendment litigation, strong and effective advocacy for theright of privacy and efforts to oppose government regulation
ofencryption and expanding wiretapping powers.
Thank you for your support.
END EPIC Alert 9.15
.
WorldLII:
Copyright Policy
|
Disclaimers
|
Privacy Policy
|
Feedback
URL: http://www.worldlii.org/int/journals/EPICAlert/2002/15.html