Computer underground Digest Wed Mar 8, 1994

 



Computer underground Digest    Wed  Mar 8, 1994   Volume 6 : Issue 22

                           ISSN  1004-042X


       Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)

       Archivist: Brendan Kehoe (He's sorting thru the files)

       Acting Archivist: Stanton McCandlish

       Shadow-Archivists: Dan Carosone / Paul Southworth

                          Ralph Sims / Jyrki Kuoppala

                          Ian Dickinson

       Copita Editor:      Sheri O'Nothera


CONTENTS, #6.22 (Mar 8, 1994)

File 1--CuD typos (6.21-"Rape in Cyperspace / 6.21-Newsday article)

File 2--Computers, Freedom, & Privacy (CFP) '94 Final Program/Info


Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are

available at no cost electronically.


CuD is available as a Usenet newsgroup: comp.society.cu-digest


Or, to subscribe, send a one-line message:  SUB CUDIGEST  your name

Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU

The editors may be contacted by voice (815-753-0303), fax (815-753-6302)

or U.S. mail at:  Jim Thomas, Department of Sociology, NIU, DeKalb, IL

60115, USA.


Issues of CuD can also be found in the Usenet comp.society.cu-digest

news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of

LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT

libraries and in the VIRUS/SECURITY library; from America Online in

the PC Telecom forum under "computing newsletters;"

On Delphi in the General Discussion database of the Internet SIG;

on RIPCO BBS (312) 528-5020 (and via Ripco on  internet);

and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.

CuD is also available via Fidonet File Request from

1:11/70; unlisted nodes and points welcome.


EUROPE:   from the ComNet in LUXEMBOURG BBS (++352) 466893;

          In ITALY: Bits against the Empire BBS: +39-461-980493


FTP:   UNITED STATES:  etext.archive.umich.edu (141.211.164.18)  in /pub/CuD/

                       aql.gatech.edu (128.61.10.53) in /pub/eff/cud/

  EUROPE:         nic.funet.fi in pub/doc/cud/ (Finland)

                  nic.funet.fi

                  ftp.warwick.ac.uk in pub/cud/ (United Kingdom)


COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing

information among computerists and to the presentation and debate of

diverse views.  CuD material may  be reprinted for non-profit as long

as the source is cited. Authors hold a presumptive copyright, and

they should be contacted for reprint permission.  It is assumed that

non-personal mail to the moderators may be reprinted unless otherwise

specified.  Readers are encouraged to submit reasoned articles

relating to computer culture and communication.  Articles are

preferred to short responses.  Please avoid quoting previous posts

unless absolutely necessary.


DISCLAIMER: The views represented herein do not necessarily represent

            the views of the moderators. Digest contributors assume all

            responsibility for ensuring that articles submitted do not

            violate copyright protections.


----------------------------------------------------------------------


Date: Tue, 8 Mar 1994 13:18:11 CST

From: CuD Moderators <cudigest@mindvox.phantom.com>

Subject: File 1--CuD typos (6.21-"Rape in Cyperspace / 6.21-Newsday article)


In CuD 6.21, the moderators' note indicated that the Village Voice

"Rape in Cyberspace"  "...may not be reprinted *WITH* the author's

permission."


This should have read: "...may not be reprinted *WITHOUT* the authors

permission." Readers who distribute CuDs should correct this typo

before redistributing.


In CuD 6.19, we indicated in the CuD response to the Newsday article

(File 3) that in the '93 Congressional hearings on wire fraud one of

the participants judged 2600 Magazine to be a primer for crime. In an

inadvertant typo, the line appeared "which we" (ie, CuD), when the

line should have been "when *HE*" (the participant) considered 2600 to

be "dangerous." CuD does not consider 2600 "dangerous" or an advocacy

manual for crime.


We apologize for both errors and thank the readers who brought them to

our attention.


------------------------------


Date: 3 Mar 94 05:03:15 CST

From: 7TRUBOW@JMLS.EDU

Subject: File 2--Computers, Freedom, & Privacy (CFP) '94 Final Program/Info


(MODERATORS' NOTE: The CFP conference is the best national conference

of it's type, and attracts an impressive cross-section of people. This

year's conference in Chicago lists an exciting and diverse program.

There is relatively cheap housing available at the Palmer house (4 per

room) for low income participants).



                             CFP '94


                      THE FOURTH CONFERENCE


                      ON COMPUTERS, FREEDOM


                           AND PRIVACY


                        MARCH 23-26, 1994


                   CHICAGO PALMER HOUSE HILTON


     "CYBERSPACE SUPERHIGHWAYS: ACCESS, ETHICS and CONTROL"



SPONSORS

ASSOCIATION FOR COMPUTING MACHINERY

     SPECIAL INTERESTS GROUPS ON:

     COMMUNICATIONS (SIGCOMM)

     COMPUTERS AND SOCIETY (SIGCAS)

     SECURITY, AUDIT AND CONTROL (SIGSAC)

JOHN MARSHALL LAW SCHOOL,

     CENTER FOR INFORMATICS LAW


PATRONS & SUPPORTERS (as of 15 December 1994)


AMERICAN EXPRESS CORP.

BAKER & McKENZIE

EQUIFAX, INC

LEGAL TRUSTEES, JERSEY, LTD. (UK)

MOTOROLA, INC

NATIONAL SCIENCE FOUNDATION (PENDING)

WIRED MAGAZINE


COOPERATING ORGANIZATIONS


AMERICAN BAR ASSOCIATION SECTION OF

     SCIENCE AND TECHNOLOGY

AMERICAN CIVIL LIBERTIES UNION

COMPUTER PROFESSIONALS FOR SOCIAL RESPONSIBILITY

ELECTRONIC FRONTIER FOUNDATION

GEORGE WASHINGTON UNIVERSITY INSTITUTE for COMPUTER and

     TELECOMMUNICATIONS POLICY

IEEE COMPUTER SOCIETY

IEEE-USA COMMITTEE ON COMMUNICATIONS

     AND INFORMATION POLICY

LIBRARY AND INFORMATION TECHNOLOGY ASSOCIATION

PRIVACY INTERNATIONAL

U.S. PRIVACY COUNCIL


UNITED AIRLINES IS THE OFFICIAL AIRLINE FOR CFP'94



Fourth Conference on Computers, Freedom and Privacy

Chicago, Il., March 23 - 26, 1994


CFP'94

"Cyberspace Superhighways: Access, Ethics and Control"



General Chair

     George B. Trubow

     Center for Informatics Law,

     John Marshall Law School

     Chicago, IL


Executive Committee

     George B. Trubow

     Chair, CFP'94


     Lance J. Hoffman

     George Washington University

     Washington, D.C.

     Chair, CFP'92


     Bruce Koball

     Motion West

     Berkeley, CA

     Chair, CFP'93


Conference Treasurer

     Robert Ashenhurst

     University of Chicago


Special Promotions

     Patric Hedlund

     Sweet Pea Productions


     Al Whaley

     CPSR, Palo Alto


Manager, Volunteers and Conference Office

     Judi Clark

     ManyMedia, Palo Alto


Chair, Student Writing Competition

     Gene Spafford

     Purdue University


Co-Chairs, Student Scholarship Program

     John McMullen

     Marist College


     Jim Thomas

     Northern Illinois University

Program Committee


     David Banisar

     Computer Professsionals for

     Social Responsibility


     Jerry Berman

     Electronic Frontier Foundation


     Robert Belair

     Mullenholz and Brimsek


     Roger Clarke

     Australian National Univesity


     Mike Godwin

     Electronic Frontier Foundation


     Mark Hellmann

     Pattishall, McAuliffe


     Linda Knutson

     Library & Information

     Technology Association


     Dennis McKenna

     Government Technology Magazine


     Michael Mensik

     Baker & McKenzie


     Ron Plesser

     Piper and Marbury


     Priscilla Regan

     George Mason University


     Lance Rose

     LOL Productions


     Marc Rotenberg

     Computer Professionals for

     Social Responsibility


     Robert Ellis Smith

     Privacy Journal


     Jim Thomas

     Northern Illinois University


     Alan F. Westin

     Columbia University



Conference Administration by John Marshall Law School:

Arrangements Director, RoseMarie Knight

Publicity & Publications, John McNamara

Financial Officer, James Kreminski

Program Coordinator, Gary Gassman


"CYBERSPACE SUPERHIGHWAYS: ACCESS, ETHICS and CONTROL


Cyberspace, Information Superhighway, National Information

Infrastructure, Open Platforms, Computer and Communications

Revolution, Electronic Networks, Digital Data Bases and Information

Society are words and phrases common to the rhetoric of our modern

era.  The relationships between and among individuals, society,

nations, government entities and business organizations are in

constant flux as new stresses and alliances change the old "rules

of the game."  Today's challenges are to define what is the "game,"

who owns the "franchises," who can play, what are the rules and who

calls the shots.  Information and communications technology raise

new issues for freedom and privacy in this new era.  Such questions

are on the agenda as the participants in CFP'94 consider the

alternatives and seek some solutions.  Come, join in the dialogue

that will help to shape the world's future!


PRE-CONFERENCE TUTORIALS


On Wednesday March 23, the day before the formal conference begins,

CFP '94 is offering a number of in-depth tutorials covering a wide

variety of subjects on five parallel tracks.  These presentations

will be interesting, educational, thought-provoking and often

controversial.  The tutorials are available at a nominal additional

registration cost.


CONFERENCE NEWSPAPER


On each of the three days of the conference, a daily newspaper will

appear to highlight what has transpired and announce important

coming events.  The staff of "The Decisive Utterance," The John

Marshall Law School's student newspaper, is providing this service.



CONFERENCE RECEPTION AND TECHNOLOGY DISPLAY


On Wednesday evening, from 6:00 p.m. - 9:00 p.m., you are invited

to meet new and old friends and colleagues at an opening reception

at the John Marshall Law School from 6:00 p.m.-9:00 p.m. The School

is only two blocks from the conference hotel.  A state-of-the-art

computer lab will be used to demonstrate high-tech applications in

academia and registrants will be invited to take part.

SINGLE-TRACK MAIN PROGRAM


The technological revolution that is driving change in our society

has many facets and we are often unaware of the way they all fit

together, especially those parts that lie outside one's own daily

experience. An important goal of CFP '94 is to bring together

individuals from disparate disciplines and backgrounds and engage

them in a balanced discussion of CFP issues.  To this end our main

program, starting on Thursday, March 24, is on a single track

enabling registrants to attend all sessions.  The concurrent Birds-

of-a-Feather meetings Thursday after 9:15 p.m. are exceptions.


BIRDS OF A FEATHER SESSIONS (BoF)


CFP '94 will provide a limited number of meeting rooms to

interested individuals for informal "Birds of a Feather" sessions

after the formal program Thursday, from 9:15 p.m. - 11:15 p.m.

These sessions will provide an opportunity for special-interest

discussions. For further information or to request a BoF contact

CFP '94 Program Coordinator, Gary Gassman, at the John Marshall Law

School (6gassman@jmls.edu)



MUSEUM OF SCIENCE AND INDUSTRY GALA


Registrants are invited to a very special reception and buffet at

Chicago's famed Museum of Science and Industry where they also will

be treated to a private showing and demonstration of the MSI's

newly-opened Communications and Imaging Exhibits.  These multi-

million dollar presentations occupy 15,000 sq.ft. of museum space

and required three years to develop.  "Communications" is a

panoramic display of how technology has transformed our lives by

dissolving distance and and making connections; visitors can even

enter the unreal world of virtual reality. "Imaging" is a mind-

boggling journey through modern applications of imaging technology.

Visitors can even play the role of brain surgeon, using

radiosurgery made possible by 3-D imaging, or explore imaging in

forensic science by using MRI, fingerprint enhancement, face aging

and other modern technologies to solve a crime!


REGISTRATION WILL BE LIMITED


CFP '94 registration will be limited to 550 attendees, so we advise

you to register early to assure admission and to take advantage of

the early registration discounts.


MEALS AND RECEPTIONS


A key component of the CFP conferences has been the interaction

between the diverse communities that constitute our audience.  To

promote this interaction CFP '94 provides three luncheons, three

receptions and three evening meals with the price of registration.


EFF PIONEER AWARDS


All conference attendees are invited to the EFF Pioneer Awards

Reception sponsored by the Electronic Frontier Foundation on

Thursday evening.  These, the third annual EFF Pioneer Awards, will

be given to individuals and organizations that have made

distinguished contributions to the human and technological realms

touched by computer-based communications.


CONFERENCE BUSINESS OFFICE


The Conference business and registration office will be open from

8:00 a.m. until 9:00 p.m. on Wednsday thru Friday, and until 6:00

p.m. on Saturday, for registration and general information.


NOTE: The following program content and schedule is subject to

change. The Information Superhighway is a fast track!


Wednesday, March 23, 1994

Pre-Conference Tutorials


9:00 a.m. - noon


     Cyberspace Law for Non-Lawyers

     This tutorial presents an outline of the law for laymen,

     dealing with Constitutional and legal issues that confront

     those concerned with privacy, crime, and freedom of expression

     in cyberspace. There will be summaries of recent cases,

     legislative proposals and government activities.

          Mike Godwin, Online Counsel, EFF


     Rules of the Road for Network Travelers. (CLE Credit Approved)

     The information superhighway presents a variety of rights and

     risks.  Learn about the legal issues of computer networks,

     services and bulletin boards, including on-line property

     rights; protecting personal privacy and business information;

     electronic publishing and multimedia rights; viruses, adult

     materials and other no-nos.

          Lance Rose, Attorney and Author of "Syslaw."


     Get Mad, Get Motivated, Get Moving!

     The focus of this panel is on citizen action for privacy

     protection: how to reach and organize constituents; support

     legislation or other privacy protection measures; conduct

     public education activities; use the technology in program

     activities, etc.

          Robert Ellis Smith, Privacy Journal


     Exploring Internet: A Guided Tour

     This tutorial gives participants a practical introduction to

     the most popular and powerful applications available via the

     world's largest computer network, the Internet.  There will be

     hands-on demonstrations of communications tools such as e-

     mail, conferencing, Internet Relay Chat and resource discover,

     and navigations aids such as Gopher, WAIS, Archie and World

     Wide Web.  Extensive documentation will be provided.

          Mark Graham, Pandora Systems


     Using the Freedom of Information Act

     The Federal FOIA is the principal focus of this tutorial

     though some attention is given to the use of  state FOIAs.

     The session will cover procedures for making requests,

     identifying the information desired, differences between

     electronic and hard copy responses, and the appeals process

     within agencies and the courts.

     David Sobel, Counsel, Computer Professional for Social

     Responsibility


     2:00 p.m. - 5:00 p.m.


     Cryptography: What, and How?

     Data encryption is in the cyberspace limelight as perhaps the

     only technique to ensure digital privacy and security; it is

     also the subject of sharp debate regarding control of the

     development and use of the technology.  This tutorial will

     display what encryption is, how it works, and some of the

     options for its use.  Computer animations and graphic displays

     will be used to help make cryptography comprehensible; the

     audience will engage in some hands-on encryption exercises.

          Mark Hellmann, Pattishall, McAuliffe et.al, Chicago


     Electronic Detectives: Critical Issues for Public and Private

     Investigators.

     Both governmental and private sector investigators have

     unprecedented access to "open" sources that were practically

     inaccessible a few years ago.  This information environment

     poses opportunities and risks that will be the focus of this

     program.  Investigative techniques via networks will be

     demonstrat

ed and the legal, ethical and practical issues will be explored.

Actual case-studies will be utilized.

     Michael Moran, CCO; Michael Robertson, CFE


     Hi-Tech Intellectual Property Law Primer (CLE Credit Approved)

     This panel will cover the special problems in patent,

     copyright and tradmark law engendered by computers and digital

     technology, with attention to the impact of recent cases.  The

     differences in European protection will be surveyed as well as

     technology export restrictions.

          Raymond Nimmer, University of Texas Law School

          Leslie A. Bertagnolli, Baker & McKenzie, Chicago

     Transactional Data Analyses: Making FOI Access Useful

     Electronic communication, coupled with federal and state

     Freedom of Information Acts, has made a great deal of data

     available to the public regarding the activities and policies

     of government enforcement and regulatory agencies.  Knowing

     how to evaluate and use this information is critical to

     understanding and demonstrating what the data really means.

     The Transactional Records Access Clearinghouse (TRAC) of

     Syracuse University uses its various knowledge-bases to

     demonstrate the power of transactional data.  Colorgraphics

     and analytic techniques are combined in demonstrations of how

     otherwise drab statistics can be displayed dramatically to aid

     in policy analyses and advocacy.

          David Burnham, former New York Times Investigative

          Reporter;

          Susan Long, Co-director, TRAC, SUNY-Syracuse


     Election Fraud and Modern Technology

     There has been increasing attention, in the U.S. and abroad,

     to the use of modern technology in the electoral process.

     Buying votes, stealing votes, changing votes -- whether in the

     environment of punch-cards or fully automated voting machines

     -- is the subject of this tutorial.  Mock elections will be

     staged in which the participants have roles in planning to

     perpetrate as well as prevent vote fraud.  Voter registration,

     phone-based voting, cryptography and verification are among

     the strategies and technologies to be considered.

     Russel L. Brand, Reasoning Systems.


SPECIAL EVENTS ON WEDNESDAY, Mar. 23:


Noon - 4:00 p.m.,  Privacy International Business Meeting

     This meeting, at the John Marshall Law School, begins with a

     buffet luncheon.  Non-members interested in learning about

     P.I. and the Illinois Privacy Council are invited to be guests

     for lunch and a briefing. Guest space will be limited so

     attendance on a "first come" basis MUST be confirmed by

     March 8, 1994.


6:00 p.m. - 9:00 p.m.  Conference Reception

     All CFP registrants are invited to a reception and open house

     demonstrating the John Marshall Law School's recently opened

     computer lab.  This also is an opportunity to "network" the

     old-fashioned way, meeting old friends and making new ones

     while enjoying the reception and buffet. This state-of-the-art

     facility will display information and communications

     technology being used in the educational environment. Guests

     also may participate in hands-on demonstrations of the

     technology under the tutelage of JMLS faculty and staff.

(Wed. Special Events, Cont'd)

9:15 p.m. - 11:15 p.m. "CFP SOAPBOX SQUARE"


On Wednesday, March 23, from 9:15 p.m. to 11:15 p.m., "CFP Soapbox

Square" will be open.  This is a chance for those who have

something to say publicly to say it and to hear response from

others!  Those interested in making a brief statement (3 minutes)

at this meeting must file their request and describe their topics

by 5:00 p.m. on Wednesday. Discussion time for various topics will

be allocated based upon the number of topics and the number who

have asked to speak.  Requests to speak can be made at the time of

pre-registration or at the conference site.



Thursday, March 24, 1994


8:30 a.m., CFP'94 Official Opening


     Welcome to the Conference: George B. Trubow, General Chair

     Welcome to Chicago: Hon. Richard M. Daley, Mayor (Invited)


9:00 a.m.  Keynote Address:  Mr. John Podesta, Assistant to the

          President, Washington, D.C.


10:00 a.m. Break


10:30 a.m.  The Information Superhighway: Politics and the Public

           Internet.

     The Administration and Congress propose policies that will

     lead to a digital multimedia highway.  How can the road be

     built at affordable cost while serving the public interest and

     our constitutional values?

     Chair: Jerry Berman, Electronic Frontier Foundation



12:00 p.m.  Lunch

               Speaker: U.S. Senator Paul Simon (Invited)


1:30 p.m.  Is It Time for a U.S. Data Protection Agency?

     Beginning with the Privacy Act of 1974, proposals to establish

     an oversight body for data protection have been offered but

     not adopted; another proposal is currently pending in

     Congress.  Against a background of almost twenty years

     experience under the Privacy Act, the panel will consider

     whether the current political, economic and technological

     mileau favors establishment of a data protection agency.

     Chair: Priscilla M. Regan, George Mason University


 2:45 p.m.  Break

3:00 p.m.  "Owning and Operating the NII: Who, How, When?"

     The National Information Infrastructure is an important

     initiative for the present Administration.  This panel will

     explore policy and technical issues such as equity and access,

     connectivity and standards, funding and regulation, privacy

     and security, ownership and operation.

     Chair: Marc Rotenberg, Computer Professionals for Social


 4:15 p.m.  Break


 4:30 p.m.  Data Encryption: Who Holds The Keys?

     Recent attempts, led by federal law enforcment agencies, to

     control the development and dissemination of strong

     cyptography programs has engendered considerable discussion

     and disagreement.  The interests of law enforcement agencies

     may conflict with the need for data security and personal

     privacy demanded by users of electronic networks.  This panel

     will evaluate proposals to deal with the question.

     Moderator: Willis Ware, Rand Corporation


5:30 p.m. Adjourn


6:00 p.m.  EFF Awards Reception

     Once again, the Electronic Frontier Foundation hosts a

     reception prior to its annual Pioneer Awards presentation.

     All CFP attendees are invited to enjoy the recepiton and

     congratulate the new honorees.


7:00 p.m.  Conference Banquet (Speaker to be announced)


9:15 - 11:15 p.m. "Birds-of-a-Feather" sessions run concurrently.



Friday, March 25, 1994.


8:30 a.m.  Keynote: David Flaherty, Data Protection Commissioner,

           Victoria, British Columbia


9:15 a.m.  Health Information Policy

     The Clinton Health Reform Plan, and variations on that theme,

     stress the use of information technology to help the

     efficiency and effectiveness of health care.  Expert

     consultation, improved service delivery through new

     technology, and improvements in the processing of health

     insurance claims bring promise of cost cuts as well as the

     possibilities of threats to personal privacy.  This panel of

     experts will form the "CFP Group" to explore these promises

     and threats.

     Chair: Robert R. Belair, Mullenholz & Brimsek, Wash., D.C.


10:30 a.m.  Break


10:45 a.m.  Can Market Mechanisms Protect Consumer Privacy?

     When does protection of consumer privacy require legal

     standards and government regulation and when can bargains and

     agreements in the market suffice?  What role do new

     technological options for individuals and organizations play

     in facilitating private choice and market transactions?  Is

     "ownership" of personal information a useful concept or a dead

     end for privacy protection in an information age?

     Chair: Dr. Alan F. Westin, Columbia University


Noon      Lunch, Speaker: Philip Zimmerman, PGP


1:30 p.m.  Creating an Ethical Community in Cyberspace

     The fundamental ethical questions posed by the "settlement" of

     cyberspace are not new.  What is new is that the relationship

     between behavior and the ethical conceptions by which we judge

     behavior shift and become more ambiguous and vague.  This

     sessions examines the ethical dilemmas brought about by the

     "colonization" of cyberspace that must be resolved to

     establish and maintain a stable, humane environment.

     Chair: Prof. Jim Thomas, Northern Ilinois University


2:45 p.m.  Break


3:00 p.m.  Standards for Certifying Computer Professionals

     The subject of licensing of computer professionals is

     receiving increased attention by professional organizations

     and by state legislatures.  Both the ACM and IEEE have

     proposals under study, and perhaps a half-dozen states are

     considering licensing bills.  This panel will consider the

     pros and cons and suggest some standards for certification.

     Chair: Donald Gotterbarn, East Tennessee State Univ.


4:15 p.m.  Break


4:30 p.m.  Hackers and Crackers: Using and Abusing the Networks

     This session will explore issues surrounding the "fringe" of

     network use.  What can and should be exchanged?  Who will

     monitor "appropriate" use?   What's the current difference, if

     any, between "hacker" and "cracker"?  What should be expected

     and accepted regarding the role of law enforcement agencies?


5:30 p.m. Adjourn


5:45 p.m. Buses begin departing for the Chicago Museum of Science

          and Industry for a private reception and demonstration at

          the Communications and Imaging exhibits.


9:00 p.m.  Buses begin departing for return to the Palmer House and

          Chicago's "Loop."

Saturday, March 26, 1994


9:00 a.m.  The Role of Libraries on the Information Superhighway

     As the information landscape changes dramatically the historic

     role of libraries as the "information commons" is challenged.

     How will the Carnegie ideal of free, public access be

     implemented by the library community?  Should it be?  This

     panel will consider policy for an information network in the

     public interest.

     Moderator: Tamara J. Miller, President, Library and

                Information Technology Association


10:15 a.m. Break


10:30 a.m.  International Governance of Cyberspace: New Wine in Old

               Bottles -- Or Is It Time For New Bottles?

     Much discussion transpires between members of the Economic

     Community, the O.E.C.D., the Council of Europe, and the United

     States, regarding data protection, intellectual property

     rights, transborder data flow, the mediation of disputes, etc.

     This panel will consider whether existing mechanisms can solve

     the problems or a new structure for the governance of

     cyberspace is needed.

     Chair:  Ronald L. Plesser, Piper and Marbury


Noon:  Lunch

          Speaker: Simon Davies, Director General, Privacy

          International


1:30 p.m. The Electronic Republic: Delivery of Government Services

        over the Information Superhighway

     State and local governments use computer networks to deliver

     a wide range of services and information to the public;

     electronic "kiosks" are moving to "government by ATM."  How

     will this interaction between government and the people affect

     the process of American government in the future?

     Chair: Dennis McKenna, Publisher, "Government Technology."


2:45 p.m.  Break


3:00 p.m. Education and NREN, K - 12

     Internetworking is a very new technology being rapidly

     deployed to conventional classrooms, a very old technology.

     The panel will explore the clash of contradictory assumptions

     embedded within these systems -- a clash which has profound

     implications for the future of both the network and the

     classrooom.

     Chair: Steven Hodas, NASA NREN Project



4:00 Break


4:15 p.m.  Guarding the Digital Persona

     After this panel has established the threats to personal

     privacy from individual profiling and target marketing, and a

     regime to legally recognize and protect an "electronic

     personality" is put forth, Bruce Sterling will offer to

     explain why much of that worry is misdirected!

     Chair: Roger Clarke, Australian National University


5:30 p.m.  Adjournment


Featured Speakers Confirmed as of 12/15/93


Philip Agre, Dept. of Sociology, U. of Cal., San Diego

David Banisar, Computer Professional for Social Responsibility

Robert R. Belair, Mullenholz & Brimsek, Washington, D.C.

Jerry Berman, Executive Director, Electronic Frontier Foundation

Leslie A. Bertagnolli, Baker & McKenzie, Chicago

Andrew Blau, The Benton Foundation, Washington, D.C.

Dr. Herbert Burkert, Univ. of St. Galen, Switzerland

Jeffrey Chester, Director, Center for Media Education

Roger Clarke, College of Commerce, Australian National University

Ellen Craig, Commissioner, Illinois Commerce Commission

Simon Davies, Director General, Privacy International, London

David Flaherty, Information and Privacy Commissioner, British

Columbia

Oscar H. Gandy, Media Studies Center, Columbia University

Donald Gotterbarn, East Tennessee State University

Allan Hammond, New York University Law School

Steven Hodas, NASA NREN Project, Washington, D.C.

David Johnson, Wilmer, Cutler & Pickering, Washington

Steven Kolodney, Dir., Information Technology, State of California

Curtis Kurnow, Landels, Ripley & Diamond, San Francisco

Kenneth Laudon, School of Information Systems, New York University

Lee Ledbetter, HDX

Jay Lemke, School of Education, City University of New York

Duncan MacDonald, V.P. & Gen. Couns., Citicorp Credit Services

Shirley Marshall, Public Sector Marketing, IBM

Dennis McKenna, Publisher, Government Technology Magazine

Michael Mensik, Baker & McKenzie, Chicago

Raymond Nimmer, University of Texas

Eli Noam, Columbia University School of Business

Michael North, President, North Communications

Ronald L. Plesser, Piper and Marbury, Washington, D.C.

Marc Rotenberg, Computer Professionals for Social Responsibility

Rohan Samarajiva, Department of Communication, Ohio State Univ.

David Sobel, Computer Professionals for Social Responsibility

Bruce Sterling, Sci-Fi Writer and Journalist, Austin, Texas

Connie Stout, Texas Education Network

Jim Thomas, Department of Sociology, Northern Illinois University

Greg Tucker, Head of the Business School, Monash Univ., Australia

Bruce Umbaugh, Old Dominion University

Patricia Valey, Acting Director, Office of Consumer Affairs

Maarten van Swaay, Dept. of Computer Science, Kansas State U.

Daniel Weitzner, Sr. Staff Counsel, Electronic Frontier Foundation

Alan Westin, Columbia University

Christine Zahorik, Staff, Senate Committee on


FP '94 SCHOLARSHIPS


The Fourth Conference on Computers, Freedom and Privacy (CFP '94)

will provide a limited number of full registration scholarships for

students and other interested individuals.  These scholarships will

cover the full costs of registration, including luncheons, two

banquets, and all conference materials.  Scholarship recipients

will be responsible for their own lodging and travel expenses.

Persons wishing to apply for one of these fully-paid registrations

should contact CFP '94  Scholarship Chair:


John F. McMullen

CFP '94 Scholarship Committee

Perry Street

Jefferson Valley, NY  10535

Phone: (914) 245-2734 or email mcmullen@mindvox.phantom.com


HOTEL ACCOMMODATIONS


CFP'94 will be held at the Palmer House Hilton, a venerable Chicago

landmark in the "Loop."  This spacious and comfortable facility is

easily accessible from the O'Hare International and Chicago Midway

airports, and is only 2 blocks from The John Marshall Law School.

Special conference rates of $99/night, single or multiple

occupancy, are available.  Our room block is guaranteed only until

March 1, 1994, so we urge you to make your reservations as early as

possible.  When calling for reservations, please be sure to mention

CFP'94 to obtain the conference rate.


Hotel Reservations: Palmer House Hilton, 17 E. Monroe, Chicago,

Il., 60603.  Tel: 312-726-7500; 1-800-HILTONS; Fax, 312-263-2556



REFUND POLICY


Refund requests received in writing by March 8, 1994 will be

honored.  A $50 cancellation fee will be applied.  No refunds will

be made after this date; however, registrants may designate a

substitute.


OFFICIAL AIRLINE

CFP'94 is proud to have United Airlines as our own exclusive

official airline!  United will give our conferees a 5% discount off

any published United or United Express airfare, including First

Class, or 10% off the new BUA fare when purchased at least a week

in advance of travel.  Call toll-free 1-800-521-4041 to make

reservations and be sure to give our CFP'94 ID Number: 541QI.


REGISTRATION

(Voice: 312-987-1420;  E-MAIL: cfp94@jmls.edu  Fax: 312-427-7128)

               CFP'94

               John Marshall Law School

               315 S. Plymouth Ct., Chicago, IL 60604


Register for the conference by returning the Registration Form

along with the appropriate payment.  The registration fee includes

conference materials, three luncheons (Thursday, Friday and

Saturday), a reception, open house and buffet (Wednesday), a

reception and banquet (Thursday),  and a gala reception and buffet

at the Museum of Science and Industry.  Payment must accompany

registration.


NAME (Please Print)


TITLE


AFFILIATION


MAILING ADDRESS


CITY, STATE, ZIP


TELEPHONE


E-MAIL


PRIVACY LOCKS:  We will not sell, rent. loan, exchange or use this

information for any purpose other than official Computers, Freedom

and Privacy Conference activities.  A printed roster containing

this information will be distrusted at the conference.  Please

indicate if you wish information to be excluded from the roster:


               ( ) Print only name, affiliation and phone no.

               ( )  Print name only

               ( )  Omit my name from the roster


     ( ) I would like to attend the Privacy International luncheon

and briefing at noon on Wednesday, March 23.  (Your attendance as

a guest of P.I. and the Illinois Privacy Council MUST be confirmed

by March 8, and is on a "first come" basis.)


"CFP Soapbox Square"

     ( ) I would like to make a formal statement (3 mins.) during

"CFP Soapbox Square" to be held from 9:15 p.m. - 11:15 p.m. on

March 23.  My topic:


     ( ) I plan to attend "Soapbox Square" but do not wish to make

a prepared statement, though I may join in the discussion.

REGISTRATION FEES

If paid by:         7 February     8 March        On Site

                    Early          Regular        Late


Conference Fees     $315           $370           $420


Tutorial Fees       $145           $175           $210


Conf. & Tutorial    $460           $545           $630


Note: If you have registered for the Tutorials, please select one

from each group:

          9:00 A.M. - 12:00 NOON

               ( ) Cyberspace Law for Non-Lawyers

               ( ) Rules of the Road for Network

                    Travelers (CLE Credit)

               ( ) Citizen Action: Get Mad, Get

                    Motivated, Get Moving!

               ( ) Exploring Internet: A Guided Tour

               ( ) Using FOIA


          2:00 P.M. - 5:00 P.M.

               ( ) Cryptography: What, and How?

               ( ) Introduction to Hi-Tech Law (CLE Credit)

               ( ) TRAC: Evaluative Data Analysis

               ( ) The Electronic Detective" Online

                    Investigations

               ( ) Electoral Fraud


PAYMENTS            TOTAL AMOUNT


                    Please indicated method of payment:

                    ( )  Check (payable to JMLS-CFP '94)


                    ( )  VISA

                    ( )  MasterCard

                    Credit Card #


                    Expiration Date


                    Name on Card


                    Signature

***********

George B. Trubow, Professor of Law

Director, Center for Informatics Law

The John Marshall Law School

315 S. Plymouth Ct.

Chicago, IL 60604-3907

Fax: 312-427-8307; Voice: 312-987-1445

E-mail: 7trubow@jmls.edu


------------------------------


End of Computer Underground Digest #6.22

************************************





Comments

Popular posts from this blog

BOTTOM LIVE script

Evidence supporting quantum information processing in animals

ARMIES OF CHAOS