You are here:
WorldLII >>
Databases >>
EPIC Alert >>
2004 >>
[2004] EPICAlert 3
Database Search
| Name Search
| Recent Articles
| Noteup
| LawCite
| Help
EPIC Alert 11.03 [2004] EPICAlert 3
EPIC ALERT
Volume 11.03 February 11, 2004
Published by the Electronic Privacy Information Center (EPIC)
Washington, D.C.
http://www.epic.org/alert/EPIC_Alert_11.03.html
Table of Contents
[1] EPIC FOIA Docs Show Acxiom Was Considered as TIA Data Source
[2] Pentagon Cancels Internet Voting Project
[3] FBI Asks FCC to Delay Discussion of Internet Phone Rules
[4] DHS Deputy Secretary Questioned About Passenger Profiling
[5] EPIC and PI Open Nominations for Brandeis, Big Brother Awards
[6] News in Brief
[7] EPIC Bookstore: Protecting America's Health
[8] Upcoming Conferences and Events
[1] EPIC FOIA Docs Show Acxiom Was Considered as TIA Data Source
EPIC has obtained a document under the Freedom of Information Act containing internal communications among Defense Advanced Research Project Agency (DARPA) employees considering data broker Acxiom
as a supplier of personal information for the Total Information Awareness (TIA) program. In an e-mail dated May 21, 2002 to TIA
developers John Poindexter and Robert Popp, a DARPA employee writes that "Acxiom is the nation's largest commercial data warehouse
company ($1B/year)
with customers like Citibank, Walmart, and other companies whose names you know. They have a history of treating privacy issues
fairly and they don't advertise at all. As a result they haven't been hurt as much as ChoicePoint, Seisint, etc by privacy concerns
and press inquiries."
The e-mail claims that Jennifer Barrett, Acxiom's Chief Privacy Officer, provided recommendations that would help quell public scrutiny
of the transfer of data from the company to the government:
"One of the key suggestions she made is that people will object to Big Brother, wide-coverage databases, but they don't object to
use of relevant data for specific purposes that we can all agree on. Rather than getting all the data for any purpose, we should
start with the goal, tracking terrorists to avoid attacks, and then identify the data needed (although we can't define all of this,
we can say that our templates and models of terrorists are good places to start).
Already, this guidance has shaped my thinking."
The employee continues: "Ultimately, the US may need huge databases of commercial transactions that cover the world or certain areas
outside the US. This information provides economic utility, and thus provides two reasons why foreign countries would be interested.
Acxiom could build this mega-scale database."
In response, Robert Popp asked the employee about estimated costs associated with having Acxiom participate in the "TIA critical
experiment," and for the company's assistance in helping Rand "identify all the relevant databases."
DARPA E-mail Obtained by EPIC under the Freedom of Information Act:
http://www.epic.org/privacy/profiling/tia/darpaacxiom.pdf
For more information about TIA, see the EPIC Total InformationAwareness Page:
http://www.epic.org/privacy/profiling/tia/
For more information about consumer profiling, see the EPIC ConsumerProfiling Page:
http://www.epic.org/privacy/profiling/
[2] Pentagon Cancels Internet Voting Project
Citing security concerns, the Pentagon has cancelled an Internetvoting project designed to let military and other personnel overseasvote
in the 2004 local and general elections. The Defense Departmentdecided not to implement the program "in view of the inability toensure
legitimacy of votes, thereby bringing into doubt the integrityof the election[.]"
The Pentagon decision to abandon SERVE came two weeks after therelease of a security review that recommended cancellation of theprogram
because of numerous security risks. The report, authored by apanel of computer science experts, found the system vulnerable tohacking,
noted the lack of a paper audit, and pointed out the dangerto election data's validity. The report concluded that the securityweaknesses
inherent in voting over an Internet-based system were"fundamental," and fixing those weaknesses would require a redesign ofthe Internet
itself. Because these security risks could not bemitigated, the computer security experts recommended the cancellationof the SERVE
program.
In other electronic voting news, EPIC obtained an independent securityand verification audit of Diebold voting machines commissioned
by theMaryland Legislature. The legislative report agreed with an earlierindependent study of Diebold e-voting machines by Computer
Securityexpert Dr. Avi Rubin, at Johns Hopkins. Like the Rubin study, thelegislative report found numerous security vulnerabilities
in theDiebold system. The report also found that the Diebold system failedto incorporate strategies to counter component failure,
or any systemfailure.
The SERVE Security Analysis Report:
http://www.servesecurityreport.org/
The Maryland Legislature Study of Diebold Voting Machines:
http://www.epic.org/privacy/voting/mdvote1.04.pdf
http://www.epic.org/privacy/voting/mdvote1.04app.pdf (appendix)
Dr. Avi Rubin’s Study of Diebold Voting Machines:
http://avirubin.com/vote.pdf
Verified Voting Coalition:
http://www.verifiedvoting.com
For more information on electronic voting, see EPIC's Voting Page:
http://www.epic.org/privacy/voting/
[3] FBI Asks FCC to Delay Discussion of Internet Phone Rules
The Federal Bureau of Investigation (FBI) recently sent a letter tothe Federal Communications Commission (FCC) asking the FCC to put
offany discussion concerning the regulation of Voice over InternetProtocol (VoIP). VoIP is a technology that allows Internet users
tomake phone calls over high-speed Internet connections. The FBI, alongwith the Department of Justice (DOJ) and Drug Enforcement
Agency(DEA), want to delay the discussion until the FCC addresses how VoIPcommunications can be monitored by law enforcement.
At the center of the debate is the 1994 Communications Assistance toLaw Enforcement Act (CALEA). CALEA requires telecommunicationsservice
providers to provide wiretapping access to law enforcement.
However, VoIP is currently an information service rather than atelecommunications service and is therefore not subject to CALEA.
TheDOJ, FBI and DEA (DEA) are petitioning the FCC to regulate Internettelephony in such a way that CALEA can be legally and technicallyapplied.
VoIP providers would have to rewire their networks togovernment specifications so that law enforcement officials could moreeasily
listen in on VoIP calls. The FCC remains hesitant to regulatethe technology.
In December, EPIC sent a letter to the FCC urging the agency to adoptprivacy protections for VoIP. The letter states, "EPIC maintains
ourstrong reservations regarding the application of the CommunicationsAssistance to Law Enforcement Act (CALEA) requirements to thisservice.
It is simply not coherent to argue that VoIP services shouldbe free of government regulation and then for the government torequire
that communication service providers, hardware manufacturers,
and network developers incorporate the most extreme communicationssurveillance requirements of the Federal Bureau of Investigation.
Communications technologies like VoIP should be designed for preciselywhat they are intended for: to enable communication between
people,
not to allow surveillance on private citizens."
According to FCC spokesman Michael Balmoris, the agency has decided topress on with its review of VoIP this week despite the FBI's
request.
The FCC is holding an open meeting Thursday, February 12, 2004 toconsider VoIP and related issues. The meeting is scheduled for 9:30a.m.
in Room TW-C305 at 445 12th Street SW, Washington, D.C.
Audio/video coverage of the meeting will be broadcast live over theInternet from the FCC's Audio/Video Events web page at:
http://www.fcc.gov/realaudio
The FCC's VoIP Page:
http://www.fcc.gov/voip
EPIC's letter to the FCC:
http://www.epic.org/privacy/voip/fccltr12.15.03.html
For more information on Voice over Internet Protocol, see EPIC's VoIPPage:
http://www.epic.org/privacy/voip/
[4] DHS Deputy Secretary Questioned About Passenger Profiling
Department of Homeland Security Deputy Secretary Admiral James Loyencountered skepticism about the controversial Computer AssistedPassenger
Prescreening System (CAPPS II) program when he recentlytestified before the National Commission of Terrorist Attacks Upon theUnited
States (9-11 Commission). The 9-11 Commission is anindependent, bipartisan panel chartered by Congress and President Bushto investigate
and report on the circumstances surrounding theSeptember 11, 2001 terrorist attacks, and make recommendations on howto prevent such
attacks in the future.
After Admiral Loy testified on developments in transportation securitysince the 9-11 attacks, Commissioner Fred F. Fielding asserted
thatthe expansion of CAPPS II from an aviation security measure to a lawenforcement tool demonstrated "classic mission creep." Admiral
Loyresisted the characterization of the program, but stated that CAPPS II"should be as pristine as we can make it, focused on exactly
what wewant to use it for." In response to further questioning fromCommissioner Fielding, Admiral Loy conceded that CAPPS II is"gameable,"
and noted that the system as currently designed wouldlabel approximately 14.5 percent of air travellers "selectees" subjectto, at
a minimum, secondary screening.
Today the Associated Press reported that a General Accounting Officereport on CAPPS II commissioned by Congress and scheduled for
releaseon February 13 states that the Transportation Security Administrationhas not adequately addressed privacy and security concerns
presentedby the program. The findings of the report will weaken Congressionalsupport for CAPPS II and throw the program's future
into doubt.
In related news, The Article 29 Working Party (WP29) has released itsopinion on the December 16, 2003 agreement between the Department
ofHomeland Security and the European Commission (EC) on the disclosureof passenger data between the European Union (EU) and the UnitedStates.
The opinion concluded that the agreement is inadequate underEU data protection laws.
The WP29 opinion recommends: 1) restricting the purpose of thedisclosure to the fight against terrorism, 2) implementing shorter andmore
proportionate data retention periods, 3) not using data forimplementing and/or testing CAPPS II or similar systems, 4) providingpassengers
with access to an independent redress mechanism, 5) makingthe agreement fully binding on the United States, and 6) strictlylimiting
further disclosures of passenger data to other government orforeign authorities. The WP29 opinion, though not binding on the EC,
may have an impact on Members of the European Parliament when theyvote in March on whether to adopt the EC's decision of adequacy,
aswell as on EU Member State data protection authorities in theirdecisions to pursue complaints by passengers for breach of EU privacylaws
by airline companies.
Article 29 Working Party Opinion 2/2004 (WP 87) on the AdequateProtection of Personal Data Contained in the PNR of Air Passengers
toBe Transferred to the United States Bureau of Customs and BorderProtection:
http://www.epic.org/redirect/opinion_22004.html
European Commission's Communication to the Council and Parliament onthe Transfer of Air Passenger Name Record Data:
http://www.epic.org/redirect/pnr.html
For more information on the transfer of passenger information betweenthe European Union and United States, see EPIC's EU-US AirlinePassenger
Data Page:
http://www.epic.org/privacy/intl/passenger_data.html
For more information about CAPPS II, see EPIC's Passenger ProfilingPage:
http://www.epic.org/privacy/airtravel/profiling.html
[5] EPIC and PI Open Nominations for Brandeis, Big Brother Awards
In April 2004, EPIC and Privacy International (PI) will hold the sixthU.S. "Big Brother Awards" to name and shame the public and privatesector
individuals and organizations that have done the most to invadepersonal privacy in the United States in the past year. Threedistinctive
"Orwell" statues of a golden boot stomping a head will bepresented to the government agencies and officials, companies andinitiatives
that have done the most to invade personal privacy in theprevious year. The "Admiral John M. Poindexter Lifetime Menace" awardwill
also be presented to an organization that has systematicallyinvaded privacy over a long period of time.
The judging panel, which consists of lawyers, academics, consultants,
journalists and civil rights activists, is currently invitingnominations from members of the public. Nominations can be submittedvia
the PI website.
Previous "winners" include the Federal Bureau of Investigation, theNational Security Agency, DoubleClick, ChoicePoint, Delta Airlines,
Trans Union, Oracle, the FAA's BodyScan system, the Department ofCommerce and Microsoft.
"Brandeis" awards will also be given out to champions of privacy. TheBrandeis Award is named after U.S. Supreme Court Justice LouisBrandeis,
who is considered the father of American privacy law,
describing privacy as "the right most valued by civilized" persons.
The awards are given to those who have done exemplary work to protectand enhance privacy. Previous winners include Phil Zimmermann,
creator of PGP; Beth Givens, founder of the Privacy RightsClearinghouse; and Robert Ellis Smith, editor of the Privacy Journal.
The Big Brother Awards are celebrated internationally. There havealso been ceremonies in the UK, Germany, Austria, Finland, Japan,
Bulgaria, Belgium, Spain, Switzerland, Hungary, France, Denmark andthe Netherlands.
Big Brother Awards France (BBAF) recently held the year's first BigBrother ceremony to "honor" six French individuals, initiatives
andcompanies with Big Brother prizes. BBAF also presented a VoltaireAward to a group of teachers who resisted government pressure
tobecome police informers against their students.
Big Brother Awards:
http://www.privacyinternational.org/bigbrother/
Submit a nomination:
http://www.epic.org/redirect/bba_nomination.html
Big Brother Awards France:
http://bigbrotherawards.eu.org/2003/presse.html#4
[6] News in Brief
MATRIX UNLOADED: UTAH BACKS OUT OF CONTROVERSIAL PROGRAM
Utah has ceased participation in a controversial data mining program,
joining other states that have either left the program or arescrutinizing their continued participation. Last week, Utah GovernorOlene
Walker withdrew Utah from the Multistate Anti-TerrorismInformation Exchange (MATRIX) program, which allows law enforcementofficials
to instantly request information on a person from multipledata sources, both public and private. Neither Governor Walker northe
Utah Legislature had been briefed on Utah’s involvement with theprogram. Under former Utah Governor Mike Leavitt, Utah was to haveshared
drivers license information, criminal records, and otherrecords with MATRIX. Connecticut legislators have also begun toexamine whether
their state should remain in MATRIX, while Georgiarecently terminated all connections with the MATRIX program, citingprivacy concerns.
Six states remain enrolled in MATRIX out of theoriginal thirteen states that participated in the prototype program.
EPIC’s amicus brief before the Supreme Court in Hiibel v. Nevadadescribing MATRIX:
http://www.epic.org/privacy/hiibel/hiibel_amicus.pdf
MATRIX program webpage:
http://www.iir.com/matrixBUSH REQUESTS INCREASED FUNDING FOR CAPPS II, JUSTICE DEPT. IT
President Bush has proposed greater funding for homeland securityinitiatives in the administration's fiscal year 2005 budget request.
The administration requested that $60 million be allotted for theComputer Assisted Passenger Prescreening System (CAPPS II), asignificant
increase over the $45 million proposed for the program infiscal year 2004. The administration has also requested that theJustice
Department be given $2.2 billion for information technologyprograms, which would constitute a 6 percent increase in the agency'soverall
budget from fiscal year 2004. $34 million is slated to gotoward the integration of fingerprint systems maintained by the FBIand
former INS. A combined $64.5 has been requested for the TerroristScreening Center, which will consolidate existing terrorist watchlists,
and the Terrorist Threat Integration Center, which will allowlaw enforcement and the Department of Homeland Security to shareinformation
in terrorism investigations.
The Bush Administration's 2005 Budget Request:
http://www.whitehouse.gov/omb/budget/fy2005/
NJ COURT ENHANCES PROTECTIONS FOR FINANCIAL INFO
A New Jersey appeals court has issued a decision that providesstronger protection for financial records than is currently affordedby
federal law. To acquire an individual's financial records from afinancial institution, the State now will have to obtain a searchwarrant
or a grand jury subpoena and notify the target of theinvestigation. In most circumstances, federal law requires only thatindividuals
be given notice and an opportunity to object before a bankor other specified institution can disclose personal financialinformation
to the federal government for law enforcement purposes.
Notably, the New Jersey court specifically rejected a 1970s SupremeCourt decision that refused to recognize privacy rights in informationheld
by third parties. That decision has allowed police to obtaininformation from a vast array of businesses without notice toindividuals
or involvement with an independent magistrate.
The New Jersey appellate decision is available at:
http://www.judiciary.state.nj.us/opinions/a6521-01.pdf
For more information about federal financial privacy law, see EPIC'sRight to Financial Privacy Act Page:
http://www.epic.org/privacy/rfpa/
CONFERENCE EXPLORES INTERNATIONAL IMPACT OF SPAM
The Organization for Economic Cooperation and Development (OECD) helda workshop on spam in Brussels last week to allow representatives
ofOECD Member State governments, the European Commission, consumergroups, and business stakeholders explore the problem of spam,
focusing on its international dimension. Panels discussed sources andcharacteristics of spam as well as its societal, economic, businessand
technical impacts; approaches to combat spam; and the next stepsto increase international cooperation to fight spam.
OECD Background Paper for the OECD Workshop on Spam:
http://www.epic.org/redirect/oecd_spam.html
European Commission January 22, 2004 Communication on UnsolicitedCommercial Communications or "Spam":
http://www.epic.org/redirect/ec_spam.html
Trans Atlantic Consumer Dialogue February 2004 survey on spam:
http://www.tacd.org/docs/?id=225
Trans Atlantic Consumer Dialogue February 2004 Resolution:
http://www.tacd.org/docs/?id=224
For more information on spam, see the EPIC Spam Page:
http://www.epic.org/privacy/junk_mail/spam/
SWIPE PROJECT INTRODUCES DATA TOOLKIT
Artists Beatriz da Costa, Jamie Schulte, and Brooke Singer havecreated the "SWIPE Toolkit," a collection of web-based utilities thatallow
individuals to read the barcode on their driver's license andrequest personal information from data brokers. The Toolkit alsofeatures
a "data calculator" that shows the fair market value ofpersonal information, and the sources from which data brokers collectthe information.
The Toolkit is part of a larger performance,
installation, and workshop that heightens awareness about automatedcollection of personal information. In March 2004, a SWIPEinstallation
and performance will be exhibited at the Beall Center atUniversity of California-Irvine.
The SWIPE Toolkit:
http://www.turbulence.org/Works/swipe/
The SWIPE Project:
http://www.we-swipe.us/
Beall Center SWIPE Performance:
http://beallcenter.uci.edu/calendar/swipe.htm
[7] EPIC Bookstore: Protecting America's Health
Protecting America's Health, The FDA, Business, and One Hundred Yearsof Regulation, by Philip J. Hilts (Knopf 2003).
http://www.powells.com/cgi-bin/biblio?inkey=1-037540466x-5
I have been interested in the history of the Food and DrugAdministration for some time. The agency's development follows apolicy
debate of central importance: in protecting public health, towhat degree will we adopt precautionary principles for food and drugsafety
and purity? The stakes are large, because regulation toostrict will increase food prices, while as Hilts demonstrates, pure oreven
limited self-regulation results in serious harms to the public.
Before the process of establishing precautionary principles in foodand drug law took hold, manufacturers would lie, falsify evidence,
andwithhold information on the dangers of drugs. Food companies wouldmislabel products, for instance, by passing off laboratory-createdglucose
with added honeycombs and dye as pure honey. Patent medicinequacks would sell colored water as a cure for cancer, and productscontaining
opium to sooth children.
Hilts' book is also interesting because drug and food policy debatesclosely track modern privacy law issues. The same arguments used
tofight food and drug laws in 1900 are used today to prevent privacyprotection. Invocations of "innovation" and free enterprise
rightsrepeatedly stopped Congress from enacting food and drug safety lawsuntil people died and were disfigured by reckless behavior.
Inhindsight, we know the food and drug manufacturers' arguments wereboguslaws that required safety and purity, although imperfect,
reduced fraud and led to modern pharmaceutical science. We also knowthat not all innovation is good -- both in food and drugs and
intechnology. For instance, one well-known "innovation" quashed in theearly days of the FDA was the practice of collecting abandoned
horsesin Manhattan for resale as "beef" in New Jersey.
In the conclusion, Hilts visits a now famous experiment that testedthe ethics of business school students. In it, Wharton students
wereplaced in a role-playing situation where their profitable company isreaping $1 million a month by continuing to market an ineffective,
unsafe drug. A large majority of the students consistently chose theprofit-maximizing role, one that kept the drug on the market
withoutwarnings, and actively frustrated government intervention. Perhapsthe book should start with that study. It suggests that
for all thetalk of the benefits self-regulation, the most privileged businessstudents will act like the charlatans of the 1900s (and
believe thatit is their duty to shareholders to do so). Hilts' book is a reminderthat there still is a strong role for law in consumer
protection toshield the public from less than ethical business behavior.
- Chris Jay Hoofnagle
EPIC Publications:
"The Privacy Law Sourcebook 2003: United States Law, InternationalLaw, and Recent Developments," Marc Rotenberg, editor (EPIC 2003).
Price: $40. http://www.epic.org/bookstore/pls2003/
The "Physicians Desk Reference of the privacy world." An invaluableresource for students, attorneys, researchers and journalists
who needan up-to-date collection of U.S. and International privacy law, aswell as a comprehensive listing of privacy resources.
"FOIA 2002: Litigation Under the Federal Open Government Laws," HarryHammitt, David Sobel and Mark Zaid, editors (EPIC 2002). Price:
$40.
http://www.epic.org/bookstore/foia2002/
This is the standard reference work covering all aspects of theFreedom of Information Act, the Privacy Act, the Government in theSunshine Act, and the Federal Advisory Committee Act. The 21stedition fully updates the manual
that lawyers, journalists andresearchers have relied on for more than 25 years. For those wholitigate open government cases (or
need to learn how to litigatethem), this is an essential reference manual.
"Privacy & Human Rights 2003: An International Survey of Privacy Lawsand Developments" (EPIC 2002). Price: $35.
http://www.epic.org/bookstore/phr2003/
This survey, by EPIC and Privacy International, reviews the state ofprivacy in over fifty-five countries around the world. The surveyexamines
a wide range of privacy issues including data protection,
passenger profiling, genetic databases, video surveillance, ID systemsand freedom of information laws.
"Filters and Freedom 2.0: Free Speech Perspectives on Internet ContentControls" (EPIC 2001). Price: $20.
http://www.epic.org/bookstore/filters2.0/
A collection of essays, studies, and critiques of Internet contentfiltering. These papers are instrumental in explaining why filteringthreatens
free expression.
"The Consumer Law Sourcebook 2000: Electronic Commerce and the GlobalEconomy," Sarah Andrews, editor (EPIC 2000). Price: $40.
http://www.epic.org/cls/
The Consumer Law Sourcebook provides a basic set of materials forconsumers, policy makers, practitioners and researchers who areinterested
in the emerging field of electronic commerce. The focus ison framework legislation that articulates basic rights for consumersand
the basic responsibilities for businesses in the online economy.
"Cryptography and Liberty 2000: An International Survey of EncryptionPolicy," Wayne Madsen and David Banisar, authors (EPIC 2000).
Price:
$20. http://www.epic.org/bookstore/crypto00&/
EPIC's third survey of encryption policies around the world. Theresults indicate that the efforts to reduce export controls on strongencryption
products have largely succeeded, although severalgovernments are gaining new powers to combat the perceived threats ofencryption
to law enforcement.
EPIC publications and other books on privacy, open government, freeexpression, crypto and governance can be ordered at:
EPIC Bookstore http://www.epic.org/bookstore/
"EPIC Bookshelf" at Powell's Books http://www.powells.com/features/epic/epic.html
[8] Upcoming Conferences and Events
Living with the New Private Sector - Privacy Law: What YourOrganization Needs to Know, a One Day Seminar and Training Session.
Riley Information Services Inc. February 16, 2004. Ottawa, Canada.
For more information: http://www.rileyis.com/seminars/index.html.
Antiterrorism and the Security Agenda: Impacts on Rights, Freedoms,
and Democracy. International Civil Liberties Monitoring Group.
February 17, 2004. Ottawa, Ontario, Canada. Emailpublicforumiclmg.ca.
SPAM Technology Workshop. Computer Security Resource Center.
February 17, 2004. Gaithersburg, MD. For more information:
http://csrc.nist.gov/spam.
Free Seminar on Electronic Advocacy for Nonprofits. Confluence.
February 18, 2004. Washington, DC. E-mail infoconfluencecorp.com.
IAPP 4th Annual Privacy & Security Summit & Expo. February 18-20,
2004. Washington, DC. For more information:
http://www.privacyassociation.org/html/conferences.html.
RSA Conference 2004 - The Art of Information Security. February23-27, 2004. San Francisco, CA. For more information:
http://www.rsaconference.com.
Third Conference on Privacy and Public Access to Court Records.
Courtroom 21 Project. February 27-28, 2004. Williamsburg, VA. Formore information: http://www.courtroom21.net.
PKC 2004: International Workshop on Practice and Theory in Public KeyCryptography. Institute for Infocomm Research. March 1-4, 2004.
Sentosa, Singapore. For more information: http://pkc2004.lit.org.sg.
A Summit on Healthcare Privacy and Data Security: HIPAA and Beyond.
Health Care Conference Administrators. March 7-9, 2004. Baltimore,
MD. For more information: http://www.hipaasummit.com.
Securing Privacy in the Internet Age. Stanford Law School. March13-14, 2004. Palo Alto, CA. For more information:
http://cyberlaw.stanford.edu/privacysymposium.
Sixth Annual National Freedom of Information Day Conference. FirstAmendment Center, in cooperation with the American LibraryAssociation.
March 16, 2004. Arlington, VA. E-mailfoidayconferencefreedomforum.org.
CFP2004: 14th Annual Conference on Computers, Freedom, and Privacy.
Association for Computing Machinery (ACM). April 20-23, 2004.
Berkeley, CA. For more information: http://www.cfp2004.org.
2004 IEEE Symposium on Security and Privacy. IIEEE Computer SocietyTechnical Committee on Security and Privacy, in cooperation with
theInternational Association for Cryptologic Research (IACR). May 9-12,
2004. Oakland, CA. For more information:
http://www.cs.berkeley.edu/~daw/oakland04-cfp.html.
International Conference on Data Privacy and Security in a GlobalSociety. Wessex Institute. May 11-13, 2004. Skiathos, Greece.
Formore information:
http://www.wessex.ac.uk/conferences/2004/datasecurity04/index.html.
The Third Annual Workshop on Economics and Information Security.
University of Minnesota Digital Technology Center. May 13-14, 2004.
Minneapolis, MN. For more information:
http://www.dtc.umn.edu/weis2004.
Workshop on Privacy Enhancing Technologies. University of Toronto.
May 26-28, 2004. Toronto, Canada. For more information:
http://petworkshop.org/2004.
Access & Privacy Conference 2004: Sorting It Out. Government Studies,
Faculty of Extension. June 10-11, 2004. University of Alberta.
Edmonton, Alberta, Canada. For more information:
http://www.govsource.net/programs/iapp/conference/main.nclk.
O'Reilly Open Source Convention. July 26-30, 2004. Portland, OR. Formore information: http://conferences.oreilly.com/oscon.
First Conference on Email and Anti-Spam. American Association forArtificial Intelligence and IEEE Technical Committee on Security
andPrivacy. July 30-31, 2004. Mountain View, CA. For more information:
http://www.ceas.cc.
Crypto 2004: The Twenty-Fourth Annual IACR Crypto Conference.
International Association for Cryptologic Research, IEEE ComputerSociety Technical Committee on Security and Privacy, and the ComputerScience
Department of the University of California, Santa Barbara.
Santa Barbara, CA. August 15-19, 2004. For more information:
http://www.iacr.org/conferences/crypto2004.
2004 Telecommunications Policy Research Conference. National Centerfor Technology & Law, George Mason University School of Law.
October1-3, 2004. Arlington, VA. For more information:
http://www.tprc.org/TPRC04/call04.htm.
Subscription Information
Subscribe/unsubscribe via Web interface:
http://mailman.epic.org/cgi-bin/mailman/listinfo/epic_news
Subscribe/unsubscribe via e-mail:
To: epic_news-requestmailman.epic.org
Subject: "subscribe" or "unsubscribe" (no quotes)
Automated help with subscribing/unsubscribing:
To: epic_news-requestmailman.epic.org
Subject: "help" (no quotes)
Problems or questions? e-mail <infoepic.org >
Back issues are available at: http://www.epic.org/alert/
The EPIC Alert displays best in a fixed-width font, such as Courier.
Privacy Policy
The EPIC Alert mailing list is used only to mail the EPIC Alert and tosend notices about EPIC activities. We do not sell, rent or
share ourmailing list. We also intend to challenge any subpoena or other legalprocess seeking access to our mailing list. We do
not enhance (linkto other databases) our mailing list or require your actual name.
In the event you wish to subscribe or unsubscribe your e-mail addressfrom this list, please follow the above instructions under"subscription
information". Please contact infoepic.org if you wouldlike to change your subscription e-mail address, if you areexperiencing subscription/unsubscription problems, or if you
have anyother questions.
About EPIC
The Electronic Privacy Information Center is a public interestresearch center in Washington, DC. It was established in 1994 tofocus
public attention on emerging privacy issues such as the ClipperChip, the Digital Telephony proposal, national ID cards, medicalrecord
privacy, and the collection and sale of personal information.
EPIC publishes the EPIC Alert, pursues Freedom of Information Actlitigation, and conducts policy research. For more information,
e-mail infoepic.org, http://www.epic.org or write EPIC, 1718Connecticut Ave., NW, Suite 200, Washington, DC 20009. +1 202 483 1140(tel), +1 202 483 1248 (fax).
If you'd like to support the work of the Electronic PrivacyInformation Center, contributions are welcome and fullytax-deductible.
Checks should be made out to "EPIC" and sent to 1718Connecticut Ave., NW, Suite 200, Washington, DC 20009. Or you cancontribute
online at:
http://www.epic.org/donate/
Your contributions will help support Freedom of Information Act andFirst Amendment litigation, strong and effective advocacy for theright of privacy and efforts to oppose government regulation
ofencryption and expanding wiretapping powers.
Thank you for your support.
END EPIC Alert 11.03
.
WorldLII:
Copyright Policy
|
Disclaimers
|
Privacy Policy
|
Feedback
URL: http://www.worldlii.org/int/journals/EPICAlert/2004/3.html