Computer underground Digest Wed Mar 8, 1994 Volume 6 : Issue 22 ISSN 1004-042X Editors: Ji

---
Master Index Current Directory Index Go to SkepticTank Go to Human Rights activist Keith Henson Go to Scientology cult

Skeptic Tank!

Computer underground Digest Wed Mar 8, 1994 Volume 6 : Issue 22 ISSN 1004-042X Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) Archivist: Brendan Kehoe (He's sorting thru the files) Acting Archivist: Stanton McCandlish Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Copita Editor: Sheri O'Nothera CONTENTS, #6.22 (Mar 8, 1994) File 1--CuD typos (6.21-"Rape in Cyperspace / 6.21-Newsday article) File 2--Computers, Freedom, & Privacy (CFP) '94 Final Program/Info Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically. CuD is available as a Usenet newsgroup: comp.society.cu-digest Or, to subscribe, send a one-line message: SUB CUDIGEST your name Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU The editors may be contacted by voice (815-753-0303), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115, USA. Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" On Delphi in the General Discussion database of the Internet SIG; on RIPCO BBS (312) 528-5020 (and via Ripco on internet); and on Rune Stone BBS (IIRGWHQ) (203) 832-8441. CuD is also available via Fidonet File Request from 1:11/70; unlisted nodes and points welcome. EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893; In ITALY: Bits against the Empire BBS: +39-461-980493 FTP: UNITED STATES: etext.archive.umich.edu (141.211.164.18) in /pub/CuD/ aql.gatech.edu (128.61.10.53) in /pub/eff/cud/ EUROPE: nic.funet.fi in pub/doc/cud/ (Finland) nic.funet.fi ftp.warwick.ac.uk in pub/cud/ (United Kingdom) COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ---------------------------------------------------------------------- Date: Tue, 8 Mar 1994 13:18:11 CST From: CuD Moderators Subject: File 1--CuD typos (6.21-"Rape in Cyperspace / 6.21-Newsday article) In CuD 6.21, the moderators' note indicated that the Village Voice "Rape in Cyberspace" "...may not be reprinted *WITH* the author's permission." This should have read: "...may not be reprinted *WITHOUT* the authors permission." Readers who distribute CuDs should correct this typo before redistributing. In CuD 6.19, we indicated in the CuD response to the Newsday article (File 3) that in the '93 Congressional hearings on wire fraud one of the participants judged 2600 Magazine to be a primer for crime. In an inadvertant typo, the line appeared "which we" (ie, CuD), when the line should have been "when *HE*" (the participant) considered 2600 to be "dangerous." CuD does not consider 2600 "dangerous" or an advocacy manual for crime. We apologize for both errors and thank the readers who brought them to our attention. ------------------------------ Date: 3 Mar 94 05:03:15 CST From: 7TRUBOW@JMLS.EDU Subject: File 2--Computers, Freedom, & Privacy (CFP) '94 Final Program/Info (MODERATORS' NOTE: The CFP conference is the best national conference of it's type, and attracts an impressive cross-section of people. This year's conference in Chicago lists an exciting and diverse program. There is relatively cheap housing available at the Palmer house (4 per room) for low income participants). CFP '94 THE FOURTH CONFERENCE ON COMPUTERS, FREEDOM AND PRIVACY MARCH 23-26, 1994 CHICAGO PALMER HOUSE HILTON "CYBERSPACE SUPERHIGHWAYS: ACCESS, ETHICS and CONTROL" SPONSORS ASSOCIATION FOR COMPUTING MACHINERY SPECIAL INTERESTS GROUPS ON: COMMUNICATIONS (SIGCOMM) COMPUTERS AND SOCIETY (SIGCAS) SECURITY, AUDIT AND CONTROL (SIGSAC) JOHN MARSHALL LAW SCHOOL, CENTER FOR INFORMATICS LAW PATRONS & SUPPORTERS (as of 15 December 1994) AMERICAN EXPRESS CORP. BAKER & McKENZIE EQUIFAX, INC LEGAL TRUSTEES, JERSEY, LTD. (UK) MOTOROLA, INC NATIONAL SCIENCE FOUNDATION (PENDING) WIRED MAGAZINE COOPERATING ORGANIZATIONS AMERICAN BAR ASSOCIATION SECTION OF SCIENCE AND TECHNOLOGY AMERICAN CIVIL LIBERTIES UNION COMPUTER PROFESSIONALS FOR SOCIAL RESPONSIBILITY ELECTRONIC FRONTIER FOUNDATION GEORGE WASHINGTON UNIVERSITY INSTITUTE for COMPUTER and TELECOMMUNICATIONS POLICY IEEE COMPUTER SOCIETY IEEE-USA COMMITTEE ON COMMUNICATIONS AND INFORMATION POLICY LIBRARY AND INFORMATION TECHNOLOGY ASSOCIATION PRIVACY INTERNATIONAL U.S. PRIVACY COUNCIL UNITED AIRLINES IS THE OFFICIAL AIRLINE FOR CFP'94 Fourth Conference on Computers, Freedom and Privacy Chicago, Il., March 23 - 26, 1994 CFP'94 "Cyberspace Superhighways: Access, Ethics and Control" General Chair George B. Trubow Center for Informatics Law, John Marshall Law School Chicago, IL Executive Committee George B. Trubow Chair, CFP'94 Lance J. Hoffman George Washington University Washington, D.C. Chair, CFP'92 Bruce Koball Motion West Berkeley, CA Chair, CFP'93 Conference Treasurer Robert Ashenhurst University of Chicago Special Promotions Patric Hedlund Sweet Pea Productions Al Whaley CPSR, Palo Alto Manager, Volunteers and Conference Office Judi Clark ManyMedia, Palo Alto Chair, Student Writing Competition Gene Spafford Purdue University Co-Chairs, Student Scholarship Program John McMullen Marist College Jim Thomas Northern Illinois University Program Committee David Banisar Computer Professsionals for Social Responsibility Jerry Berman Electronic Frontier Foundation Robert Belair Mullenholz and Brimsek Roger Clarke Australian National Univesity Mike Godwin Electronic Frontier Foundation Mark Hellmann Pattishall, McAuliffe Linda Knutson Library & Information Technology Association Dennis McKenna Government Technology Magazine Michael Mensik Baker & McKenzie Ron Plesser Piper and Marbury Priscilla Regan George Mason University Lance Rose LOL Productions Marc Rotenberg Computer Professionals for Social Responsibility Robert Ellis Smith Privacy Journal Jim Thomas Northern Illinois University Alan F. Westin Columbia University Conference Administration by John Marshall Law School: Arrangements Director, RoseMarie Knight Publicity & Publications, John McNamara Financial Officer, James Kreminski Program Coordinator, Gary Gassman "CYBERSPACE SUPERHIGHWAYS: ACCESS, ETHICS and CONTROL Cyberspace, Information Superhighway, National Information Infrastructure, Open Platforms, Computer and Communications Revolution, Electronic Networks, Digital Data Bases and Information Society are words and phrases common to the rhetoric of our modern era. The relationships between and among individuals, society, nations, government entities and business organizations are in constant flux as new stresses and alliances change the old "rules of the game." Today's challenges are to define what is the "game," who owns the "franchises," who can play, what are the rules and who calls the shots. Information and communications technology raise new issues for freedom and privacy in this new era. Such questions are on the agenda as the participants in CFP'94 consider the alternatives and seek some solutions. Come, join in the dialogue that will help to shape the world's future! PRE-CONFERENCE TUTORIALS On Wednesday March 23, the day before the formal conference begins, CFP '94 is offering a number of in-depth tutorials covering a wide variety of subjects on five parallel tracks. These presentations will be interesting, educational, thought-provoking and often controversial. The tutorials are available at a nominal additional registration cost. CONFERENCE NEWSPAPER On each of the three days of the conference, a daily newspaper will appear to highlight what has transpired and announce important coming events. The staff of "The Decisive Utterance," The John Marshall Law School's student newspaper, is providing this service. CONFERENCE RECEPTION AND TECHNOLOGY DISPLAY On Wednesday evening, from 6:00 p.m. - 9:00 p.m., you are invited to meet new and old friends and colleagues at an opening reception at the John Marshall Law School from 6:00 p.m.-9:00 p.m. The School is only two blocks from the conference hotel. A state-of-the-art computer lab will be used to demonstrate high-tech applications in academia and registrants will be invited to take part. SINGLE-TRACK MAIN PROGRAM The technological revolution that is driving change in our society has many facets and we are often unaware of the way they all fit together, especially those parts that lie outside one's own daily experience. An important goal of CFP '94 is to bring together individuals from disparate disciplines and backgrounds and engage them in a balanced discussion of CFP issues. To this end our main program, starting on Thursday, March 24, is on a single track enabling registrants to attend all sessions. The concurrent Birds- of-a-Feather meetings Thursday after 9:15 p.m. are exceptions. BIRDS OF A FEATHER SESSIONS (BoF) CFP '94 will provide a limited number of meeting rooms to interested individuals for informal "Birds of a Feather" sessions after the formal program Thursday, from 9:15 p.m. - 11:15 p.m. These sessions will provide an opportunity for special-interest discussions. For further information or to request a BoF contact CFP '94 Program Coordinator, Gary Gassman, at the John Marshall Law School (6gassman@jmls.edu) MUSEUM OF SCIENCE AND INDUSTRY GALA Registrants are invited to a very special reception and buffet at Chicago's famed Museum of Science and Industry where they also will be treated to a private showing and demonstration of the MSI's newly-opened Communications and Imaging Exhibits. These multi- million dollar presentations occupy 15,000 sq.ft. of museum space and required three years to develop. "Communications" is a panoramic display of how technology has transformed our lives by dissolving distance and and making connections; visitors can even enter the unreal world of virtual reality. "Imaging" is a mind- boggling journey through modern applications of imaging technology. Visitors can even play the role of brain surgeon, using radiosurgery made possible by 3-D imaging, or explore imaging in forensic science by using MRI, fingerprint enhancement, face aging and other modern technologies to solve a crime! REGISTRATION WILL BE LIMITED CFP '94 registration will be limited to 550 attendees, so we advise you to register early to assure admission and to take advantage of the early registration discounts. MEALS AND RECEPTIONS A key component of the CFP conferences has been the interaction between the diverse communities that constitute our audience. To promote this interaction CFP '94 provides three luncheons, three receptions and three evening meals with the price of registration. EFF PIONEER AWARDS All conference attendees are invited to the EFF Pioneer Awards Reception sponsored by the Electronic Frontier Foundation on Thursday evening. These, the third annual EFF Pioneer Awards, will be given to individuals and organizations that have made distinguished contributions to the human and technological realms touched by computer-based communications. CONFERENCE BUSINESS OFFICE The Conference business and registration office will be open from 8:00 a.m. until 9:00 p.m. on Wednsday thru Friday, and until 6:00 p.m. on Saturday, for registration and general information. NOTE: The following program content and schedule is subject to change. The Information Superhighway is a fast track! Wednesday, March 23, 1994 Pre-Conference Tutorials 9:00 a.m. - noon Cyberspace Law for Non-Lawyers This tutorial presents an outline of the law for laymen, dealing with Constitutional and legal issues that confront those concerned with privacy, crime, and freedom of expression in cyberspace. There will be summaries of recent cases, legislative proposals and government activities. Mike Godwin, Online Counsel, EFF Rules of the Road for Network Travelers. (CLE Credit Approved) The information superhighway presents a variety of rights and risks. Learn about the legal issues of computer networks, services and bulletin boards, including on-line property rights; protecting personal privacy and business information; electronic publishing and multimedia rights; viruses, adult materials and other no-nos. Lance Rose, Attorney and Author of "Syslaw." Get Mad, Get Motivated, Get Moving! The focus of this panel is on citizen action for privacy protection: how to reach and organize constituents; support legislation or other privacy protection measures; conduct public education activities; use the technology in program activities, etc. Robert Ellis Smith, Privacy Journal Exploring Internet: A Guided Tour This tutorial gives participants a practical introduction to the most popular and powerful applications available via the world's largest computer network, the Internet. There will be hands-on demonstrations of communications tools such as e- mail, conferencing, Internet Relay Chat and resource discover, and navigations aids such as Gopher, WAIS, Archie and World Wide Web. Extensive documentation will be provided. Mark Graham, Pandora Systems Using the Freedom of Information Act The Federal FOIA is the principal focus of this tutorial though some attention is given to the use of state FOIAs. The session will cover procedures for making requests, identifying the information desired, differences between electronic and hard copy responses, and the appeals process within agencies and the courts. David Sobel, Counsel, Computer Professional for Social Responsibility 2:00 p.m. - 5:00 p.m. Cryptography: What, and How? Data encryption is in the cyberspace limelight as perhaps the only technique to ensure digital privacy and security; it is also the subject of sharp debate regarding control of the development and use of the technology. This tutorial will display what encryption is, how it works, and some of the options for its use. Computer animations and graphic displays will be used to help make cryptography comprehensible; the audience will engage in some hands-on encryption exercises. Mark Hellmann, Pattishall, McAuliffe et.al, Chicago Electronic Detectives: Critical Issues for Public and Private Investigators. Both governmental and private sector investigators have unprecedented access to "open" sources that were practically inaccessible a few years ago. This information environment poses opportunities and risks that will be the focus of this program. Investigative techniques via networks will be demonstrat ed and the legal, ethical and practical issues will be explored. Actual case-studies will be utilized. Michael Moran, CCO; Michael Robertson, CFE Hi-Tech Intellectual Property Law Primer (CLE Credit Approved) This panel will cover the special problems in patent, copyright and tradmark law engendered by computers and digital technology, with attention to the impact of recent cases. The differences in European protection will be surveyed as well as technology export restrictions. Raymond Nimmer, University of Texas Law School Leslie A. Bertagnolli, Baker & McKenzie, Chicago Transactional Data Analyses: Making FOI Access Useful Electronic communication, coupled with federal and state Freedom of Information Acts, has made a great deal of data available to the public regarding the activities and policies of government enforcement and regulatory agencies. Knowing how to evaluate and use this information is critical to understanding and demonstrating what the data really means. The Transactional Records Access Clearinghouse (TRAC) of Syracuse University uses its various knowledge-bases to demonstrate the power of transactional data. Colorgraphics and analytic techniques are combined in demonstrations of how otherwise drab statistics can be displayed dramatically to aid in policy analyses and advocacy. David Burnham, former New York Times Investigative Reporter; Susan Long, Co-director, TRAC, SUNY-Syracuse Election Fraud and Modern Technology There has been increasing attention, in the U.S. and abroad, to the use of modern technology in the electoral process. Buying votes, stealing votes, changing votes -- whether in the environment of punch-cards or fully automated voting machines -- is the subject of this tutorial. Mock elections will be staged in which the participants have roles in planning to perpetrate as well as prevent vote fraud. Voter registration, phone-based voting, cryptography and verification are among the strategies and technologies to be considered. Russel L. Brand, Reasoning Systems. SPECIAL EVENTS ON WEDNESDAY, Mar. 23: Noon - 4:00 p.m., Privacy International Business Meeting This meeting, at the John Marshall Law School, begins with a buffet luncheon. Non-members interested in learning about P.I. and the Illinois Privacy Council are invited to be guests for lunch and a briefing. Guest space will be limited so attendance on a "first come" basis MUST be confirmed by March 8, 1994. 6:00 p.m. - 9:00 p.m. Conference Reception All CFP registrants are invited to a reception and open house demonstrating the John Marshall Law School's recently opened computer lab. This also is an opportunity to "network" the old-fashioned way, meeting old friends and making new ones while enjoying the reception and buffet. This state-of-the-art facility will display information and communications technology being used in the educational environment. Guests also may participate in hands-on demonstrations of the technology under the tutelage of JMLS faculty and staff. (Wed. Special Events, Cont'd) 9:15 p.m. - 11:15 p.m. "CFP SOAPBOX SQUARE" On Wednesday, March 23, from 9:15 p.m. to 11:15 p.m., "CFP Soapbox Square" will be open. This is a chance for those who have something to say publicly to say it and to hear response from others! Those interested in making a brief statement (3 minutes) at this meeting must file their request and describe their topics by 5:00 p.m. on Wednesday. Discussion time for various topics will be allocated based upon the number of topics and the number who have asked to speak. Requests to speak can be made at the time of pre-registration or at the conference site. Thursday, March 24, 1994 8:30 a.m., CFP'94 Official Opening Welcome to the Conference: George B. Trubow, General Chair Welcome to Chicago: Hon. Richard M. Daley, Mayor (Invited) 9:00 a.m. Keynote Address: Mr. John Podesta, Assistant to the President, Washington, D.C. 10:00 a.m. Break 10:30 a.m. The Information Superhighway: Politics and the Public Internet. The Administration and Congress propose policies that will lead to a digital multimedia highway. How can the road be built at affordable cost while serving the public interest and our constitutional values? Chair: Jerry Berman, Electronic Frontier Foundation 12:00 p.m. Lunch Speaker: U.S. Senator Paul Simon (Invited) 1:30 p.m. Is It Time for a U.S. Data Protection Agency? Beginning with the Privacy Act of 1974, proposals to establish an oversight body for data protection have been offered but not adopted; another proposal is currently pending in Congress. Against a background of almost twenty years experience under the Privacy Act, the panel will consider whether the current political, economic and technological mileau favors establishment of a data protection agency. Chair: Priscilla M. Regan, George Mason University 2:45 p.m. Break 3:00 p.m. "Owning and Operating the NII: Who, How, When?" The National Information Infrastructure is an important initiative for the present Administration. This panel will explore policy and technical issues such as equity and access, connectivity and standards, funding and regulation, privacy and security, ownership and operation. Chair: Marc Rotenberg, Computer Professionals for Social 4:15 p.m. Break 4:30 p.m. Data Encryption: Who Holds The Keys? Recent attempts, led by federal law enforcment agencies, to control the development and dissemination of strong cyptography programs has engendered considerable discussion and disagreement. The interests of law enforcement agencies may conflict with the need for data security and personal privacy demanded by users of electronic networks. This panel will evaluate proposals to deal with the question. Moderator: Willis Ware, Rand Corporation 5:30 p.m. Adjourn 6:00 p.m. EFF Awards Reception Once again, the Electronic Frontier Foundation hosts a reception prior to its annual Pioneer Awards presentation. All CFP attendees are invited to enjoy the recepiton and congratulate the new honorees. 7:00 p.m. Conference Banquet (Speaker to be announced) 9:15 - 11:15 p.m. "Birds-of-a-Feather" sessions run concurrently. Friday, March 25, 1994. 8:30 a.m. Keynote: David Flaherty, Data Protection Commissioner, Victoria, British Columbia 9:15 a.m. Health Information Policy The Clinton Health Reform Plan, and variations on that theme, stress the use of information technology to help the efficiency and effectiveness of health care. Expert consultation, improved service delivery through new technology, and improvements in the processing of health insurance claims bring promise of cost cuts as well as the possibilities of threats to personal privacy. This panel of experts will form the "CFP Group" to explore these promises and threats. Chair: Robert R. Belair, Mullenholz & Brimsek, Wash., D.C. 10:30 a.m. Break 10:45 a.m. Can Market Mechanisms Protect Consumer Privacy? When does protection of consumer privacy require legal standards and government regulation and when can bargains and agreements in the market suffice? What role do new technological options for individuals and organizations play in facilitating private choice and market transactions? Is "ownership" of personal information a useful concept or a dead end for privacy protection in an information age? Chair: Dr. Alan F. Westin, Columbia University Noon Lunch, Speaker: Philip Zimmerman, PGP 1:30 p.m. Creating an Ethical Community in Cyberspace The fundamental ethical questions posed by the "settlement" of cyberspace are not new. What is new is that the relationship between behavior and the ethical conceptions by which we judge behavior shift and become more ambiguous and vague. This sessions examines the ethical dilemmas brought about by the "colonization" of cyberspace that must be resolved to establish and maintain a stable, humane environment. Chair: Prof. Jim Thomas, Northern Ilinois University 2:45 p.m. Break 3:00 p.m. Standards for Certifying Computer Professionals The subject of licensing of computer professionals is receiving increased attention by professional organizations and by state legislatures. Both the ACM and IEEE have proposals under study, and perhaps a half-dozen states are considering licensing bills. This panel will consider the pros and cons and suggest some standards for certification. Chair: Donald Gotterbarn, East Tennessee State Univ. 4:15 p.m. Break 4:30 p.m. Hackers and Crackers: Using and Abusing the Networks This session will explore issues surrounding the "fringe" of network use. What can and should be exchanged? Who will monitor "appropriate" use? What's the current difference, if any, between "hacker" and "cracker"? What should be expected and accepted regarding the role of law enforcement agencies? 5:30 p.m. Adjourn 5:45 p.m. Buses begin departing for the Chicago Museum of Science and Industry for a private reception and demonstration at the Communications and Imaging exhibits. 9:00 p.m. Buses begin departing for return to the Palmer House and Chicago's "Loop." Saturday, March 26, 1994 9:00 a.m. The Role of Libraries on the Information Superhighway As the information landscape changes dramatically the historic role of libraries as the "information commons" is challenged. How will the Carnegie ideal of free, public access be implemented by the library community? Should it be? This panel will consider policy for an information network in the public interest. Moderator: Tamara J. Miller, President, Library and Information Technology Association 10:15 a.m. Break 10:30 a.m. International Governance of Cyberspace: New Wine in Old Bottles -- Or Is It Time For New Bottles? Much discussion transpires between members of the Economic Community, the O.E.C.D., the Council of Europe, and the United States, regarding data protection, intellectual property rights, transborder data flow, the mediation of disputes, etc. This panel will consider whether existing mechanisms can solve the problems or a new structure for the governance of cyberspace is needed. Chair: Ronald L. Plesser, Piper and Marbury Noon: Lunch Speaker: Simon Davies, Director General, Privacy International 1:30 p.m. The Electronic Republic: Delivery of Government Services over the Information Superhighway State and local governments use computer networks to deliver a wide range of services and information to the public; electronic "kiosks" are moving to "government by ATM." How will this interaction between government and the people affect the process of American government in the future? Chair: Dennis McKenna, Publisher, "Government Technology." 2:45 p.m. Break 3:00 p.m. Education and NREN, K - 12 Internetworking is a very new technology being rapidly deployed to conventional classrooms, a very old technology. The panel will explore the clash of contradictory assumptions embedded within these systems -- a clash which has profound implications for the future of both the network and the classrooom. Chair: Steven Hodas, NASA NREN Project 4:00 Break 4:15 p.m. Guarding the Digital Persona After this panel has established the threats to personal privacy from individual profiling and target marketing, and a regime to legally recognize and protect an "electronic personality" is put forth, Bruce Sterling will offer to explain why much of that worry is misdirected! Chair: Roger Clarke, Australian National University 5:30 p.m. Adjournment Featured Speakers Confirmed as of 12/15/93 Philip Agre, Dept. of Sociology, U. of Cal., San Diego David Banisar, Computer Professional for Social Responsibility Robert R. Belair, Mullenholz & Brimsek, Washington, D.C. Jerry Berman, Executive Director, Electronic Frontier Foundation Leslie A. Bertagnolli, Baker & McKenzie, Chicago Andrew Blau, The Benton Foundation, Washington, D.C. Dr. Herbert Burkert, Univ. of St. Galen, Switzerland Jeffrey Chester, Director, Center for Media Education Roger Clarke, College of Commerce, Australian National University Ellen Craig, Commissioner, Illinois Commerce Commission Simon Davies, Director General, Privacy International, London David Flaherty, Information and Privacy Commissioner, British Columbia Oscar H. Gandy, Media Studies Center, Columbia University Donald Gotterbarn, East Tennessee State University Allan Hammond, New York University Law School Steven Hodas, NASA NREN Project, Washington, D.C. David Johnson, Wilmer, Cutler & Pickering, Washington Steven Kolodney, Dir., Information Technology, State of California Curtis Kurnow, Landels, Ripley & Diamond, San Francisco Kenneth Laudon, School of Information Systems, New York University Lee Ledbetter, HDX Jay Lemke, School of Education, City University of New York Duncan MacDonald, V.P. & Gen. Couns., Citicorp Credit Services Shirley Marshall, Public Sector Marketing, IBM Dennis McKenna, Publisher, Government Technology Magazine Michael Mensik, Baker & McKenzie, Chicago Raymond Nimmer, University of Texas Eli Noam, Columbia University School of Business Michael North, President, North Communications Ronald L. Plesser, Piper and Marbury, Washington, D.C. Marc Rotenberg, Computer Professionals for Social Responsibility Rohan Samarajiva, Department of Communication, Ohio State Univ. David Sobel, Computer Professionals for Social Responsibility Bruce Sterling, Sci-Fi Writer and Journalist, Austin, Texas Connie Stout, Texas Education Network Jim Thomas, Department of Sociology, Northern Illinois University Greg Tucker, Head of the Business School, Monash Univ., Australia Bruce Umbaugh, Old Dominion University Patricia Valey, Acting Director, Office of Consumer Affairs Maarten van Swaay, Dept. of Computer Science, Kansas State U. Daniel Weitzner, Sr. Staff Counsel, Electronic Frontier Foundation Alan Westin, Columbia University Christine Zahorik, Staff, Senate Committee on FP '94 SCHOLARSHIPS The Fourth Conference on Computers, Freedom and Privacy (CFP '94) will provide a limited number of full registration scholarships for students and other interested individuals. These scholarships will cover the full costs of registration, including luncheons, two banquets, and all conference materials. Scholarship recipients will be responsible for their own lodging and travel expenses. Persons wishing to apply for one of these fully-paid registrations should contact CFP '94 Scholarship Chair: John F. McMullen CFP '94 Scholarship Committee Perry Street Jefferson Valley, NY 10535 Phone: (914) 245-2734 or email mcmullen@mindvox.phantom.com HOTEL ACCOMMODATIONS CFP'94 will be held at the Palmer House Hilton, a venerable Chicago landmark in the "Loop." This spacious and comfortable facility is easily accessible from the O'Hare International and Chicago Midway airports, and is only 2 blocks from The John Marshall Law School. Special conference rates of $99/night, single or multiple occupancy, are available. Our room block is guaranteed only until March 1, 1994, so we urge you to make your reservations as early as possible. When calling for reservations, please be sure to mention CFP'94 to obtain the conference rate. Hotel Reservations: Palmer House Hilton, 17 E. Monroe, Chicago, Il., 60603. Tel: 312-726-7500; 1-800-HILTONS; Fax, 312-263-2556 REFUND POLICY Refund requests received in writing by March 8, 1994 will be honored. A $50 cancellation fee will be applied. No refunds will be made after this date; however, registrants may designate a substitute. OFFICIAL AIRLINE CFP'94 is proud to have United Airlines as our own exclusive official airline! United will give our conferees a 5% discount off any published United or United Express airfare, including First Class, or 10% off the new BUA fare when purchased at least a week in advance of travel. Call toll-free 1-800-521-4041 to make reservations and be sure to give our CFP'94 ID Number: 541QI. REGISTRATION (Voice: 312-987-1420; E-MAIL: cfp94@jmls.edu Fax: 312-427-7128) CFP'94 John Marshall Law School 315 S. Plymouth Ct., Chicago, IL 60604 Register for the conference by returning the Registration Form along with the appropriate payment. The registration fee includes conference materials, three luncheons (Thursday, Friday and Saturday), a reception, open house and buffet (Wednesday), a reception and banquet (Thursday), and a gala reception and buffet at the Museum of Science and Industry. Payment must accompany registration. NAME (Please Print) TITLE AFFILIATION MAILING ADDRESS CITY, STATE, ZIP TELEPHONE E-MAIL PRIVACY LOCKS: We will not sell, rent. loan, exchange or use this information for any purpose other than official Computers, Freedom and Privacy Conference activities. A printed roster containing this information will be distrusted at the conference. Please indicate if you wish information to be excluded from the roster: ( ) Print only name, affiliation and phone no. ( ) Print name only ( ) Omit my name from the roster ( ) I would like to attend the Privacy International luncheon and briefing at noon on Wednesday, March 23. (Your attendance as a guest of P.I. and the Illinois Privacy Council MUST be confirmed by March 8, and is on a "first come" basis.) "CFP Soapbox Square" ( ) I would like to make a formal statement (3 mins.) during "CFP Soapbox Square" to be held from 9:15 p.m. - 11:15 p.m. on March 23. My topic: ( ) I plan to attend "Soapbox Square" but do not wish to make a prepared statement, though I may join in the discussion. REGISTRATION FEES If paid by: 7 February 8 March On Site Early Regular Late Conference Fees $315 $370 $420 Tutorial Fees $145 $175 $210 Conf. & Tutorial $460 $545 $630 Note: If you have registered for the Tutorials, please select one from each group: 9:00 A.M. - 12:00 NOON ( ) Cyberspace Law for Non-Lawyers ( ) Rules of the Road for Network Travelers (CLE Credit) ( ) Citizen Action: Get Mad, Get Motivated, Get Moving! ( ) Exploring Internet: A Guided Tour ( ) Using FOIA 2:00 P.M. - 5:00 P.M. ( ) Cryptography: What, and How? ( ) Introduction to Hi-Tech Law (CLE Credit) ( ) TRAC: Evaluative Data Analysis ( ) The Electronic Detective" Online Investigations ( ) Electoral Fraud PAYMENTS TOTAL AMOUNT Please indicated method of payment: ( ) Check (payable to JMLS-CFP '94) ( ) VISA ( ) MasterCard Credit Card # Expiration Date Name on Card Signature *********** George B. Trubow, Professor of Law Director, Center for Informatics Law The John Marshall Law School 315 S. Plymouth Ct. Chicago, IL 60604-3907 Fax: 312-427-8307; Voice: 312-987-1445 E-mail: 7trubow@jmls.edu ------------------------------ End of Computer Underground Digest #6.22 ************************************

---

E-Mail Fredric L. Rice / The Skeptic Tank