WorldLII Home | Databases | WorldLII | Search | Feedback

EPIC Alert

You are here:  WorldLII >> Databases >> EPIC Alert >> 2000 >> [2000] EPICAlert 2

Database Search | Name Search | Recent Articles | Noteup | LawCite | Help

EPIC Alert 7.02 [2000] EPICAlert 2





EPIC ALERT




Volume 7.02 February 3, 2000

Published by the Electronic Privacy Information Center (EPIC)
Washington, D.C.

http://www.epic.org

Table of Contents



[1] EPIC Calls for Withdrawal of FIDNET at Senate Hearing
[2] DoubleClick Faces Lawsuit Over Change in Privacy Practices
[3] Privacy Groups Challenge Proposed FBI Wiretap Standards
[4] New Crypto Export Regulations: Still Not De-Control
[5] Industry Targets DVD Copying in Digital Copyright Suits
[6] Clinton Proposes Privacy Protections in State of Union Address
[7] EPIC Bookstore -- Critical Infrastructure Report
[8] Upcoming Conferences and Events


[1] EPIC Calls for Withdrawal of FIDNET at Senate Hearing


This week the Senate Judiciary Committee reviewed the Administration'scomputer security plan. Civil liberties organizations have criticizedthe National Plan for Information Systems Protection, saying it woulddramatically expand government surveillance of the nation'scommunications networks. They have singled out the Federal IntrusionDetection Network -- FIDNET -- as raising far-reaching threats toAmerican citizens.

Testifying before the committee, Marc Rotenberg, Executive Director ofthe Electronic Privacy Information Center (EPIC), called the FIDNETproposal contrary to "the spirit of the federal wiretap statute, theplain language of the federal Privacy Act, and the history of theFourth Amendment." He said that "the FIDNET proposal, as currentlyconceived, must simply be withdrawn.

EPIC also released a government memo at the hearing, obtained underthe Freedom of Information Act, which indicates that the U.S.
Department of Justice is aware that the FIDNET proposal may violateU.S. law. Other records obtained by EPIC show that the governmentwill use credit card records and telephone toll records as part of itsintrusion detection system. John Tritak, Director of the CriticalInfrastructure Assurance Office, was unable to answer questions put tohim by the committee members regarding what type of personalinformation would be collected by FIDNET.

Rotenberg charged that backers of the security plan were "trying toapply twentieth century notions of national defense to twenty-firstcentury problems of communications security."

Last year, EPIC warned that a similar "critical infrastructureprotection" proposal posed risks to the civil liberties of Americans.
The revised security plan discusses privacy issues in a number ofplaces, but civil liberties organizations contend that the plan islong on rhetoric and short on safeguards. "The plan lacks the legalprotections and independent oversight that would be necessary toprevent abuse," said Rotenberg.

Also testifying at the hearing was Frank Cilluffo, Senior PolicyAnalyst, Center for Strategic and International Studies. The SenateSubcommittee is chaired by Senator John Kyl (R-AZ). Senator Kyl saidthat future hearings will be held on the proposal and that governmentwitnesses will be called to answer specific legal and technicalquestions about the design and operation of FIDNET.

EPIC Testimony on "CyberAttack: The National Protection Plan and itsPrivacy Implications":

http://www.epic.org/security/cip/EPIC_testimony_0200.pdf [PDF]

EPIC Critical Infrastructure Protection Resources Page:

http://www.epic.org/security/cip/

Memo from Ronald D. Lee, Associate Deputy Attorney General, Departmentof Justice to Jeffrey Hunker, Director, Critical InfrastructureAssurance Office regarding the National Information Systems ProtectionPlan, March 8, 1999 (obtained by EPIC under the Freedom of InformationAct):

http://www.epic.org/security/cip/lee_memo.html
Memo from Jeffrey Hunker, CIAO to CICG Members regarding "OffsiteMaterials" (obtained by EPIC under the Freedom of Information Act):

http://www.epic.org/security/cip/hunker_memo.html
White House "National Plan for Information Systems Protection"
(January 7, 2000):

http://www.ciao.ncr.gov/National_Plan/national%20plan%20final.pdf
Executive Summary of "National Plan for Information SystemsProtection" (January 7, 2000)

http://www.whitehouse.gov/WH/EOP/NSC/html/documents/
npisp-execsummary-000105.pdf


[2] DoubleClick Faces Lawsuit Over Privacy Practices


DoubleClick, one of the largest advertisers on the World Wide Web, hastaken a dramatic new approach in learning about Internet users --
finding out their names and addresses. The move by the company towardpersonally identifying all the information it collects previously drewfire from privacy advocates and now from private citizens.

The change in DoubleClick's strategy was not unexpected by privacyadvocates who have been following their recent acquisitions. In lateNovember, DoubleClick completed a merger with market research firmAbacus Direct. From the dramatic increase in information, DoubleClickhopes to find out more about all Internet users in order to providetargeted one-to-one advertising. Prior to the merger, DoubleClick hadbeen learning about Internet users through the use of cookietechnology -- an Internet protocol that allows for uniqueidentification and tracking. While DoubleClick had been collectingpersonal information before, correlating existing information it hasalready accumulated from Internet users with the data in the Abacusdatabase requires access to personally identifying information such asa name. For that reason, DoubleClick formed the Abacus Alliance -- anunnamed group of Internet websites that will pass on personalinformation to the advertiser.

On January 28, attorneys in California filed a lawsuit alleging thatDoubleClick had unlawfully represented that it was only collectingnon-personally identifying information. Judnick's attorneys are askingfor an injunction against DoubleClick that would prevent any furthercollection of personal information without written consent, an easyway for Internet users to destroy any personal information inDoubleClick's possession, and the destruction of all personalinformation collected without consent in the past.

For more information about DoubleClick and its recent merger withAbacus Direct, see:

http://www.epic.org/doubletrouble/



[3] Privacy Groups Challenge Proposed FBI Wiretap Standards


On January 20, EPIC and other Internet privacy advocacy groups asked afederal appeals court to block new rules that would enable the FBI todictate the design of the nation's communication infrastructure. Thechallenged rules would enable the Bureau to track the physicallocations of cellular phone users and potentially monitor Internettraffic.

In a brief filed with the U.S. Court of Appeals for the District ofColumbia Circuit, EPIC, the American Civil Liberties Union (ACLU) andthe Electronic Frontier Foundation (EFF) said that the rules --
contained in a Federal Communications Commission (FCC) decision issuedlast August -- could result in a significant increase in governmentinterception of digital communications.

The court challenge involves the Communications Assistance for LawEnforcement Act (CALEA), a controversial law enacted by Congress in1994, which requires the telecommunications industry to design itssystems in compliance with FBI technical requirements to facilitateelectronic surveillance. In negotiations over the last few years, theFBI and industry representatives were unable to agree upon thosestandards, resulting in the recent FCC ruling. EPIC, ACLU and EFFparticipated as parties in the FCC proceeding and argued that theprivacy rights of Americans must be protected.

The groups' court filing asserts that the FCC ruling exceeds therequirements of CALEA and frustrates the privacy interests protectedby federal statutes and the Fourth Amendment. Among other things, theCommission order would require telecommunications providers todetermine the physical locations of cellular phone users and deliver"packet-mode communications" -- such as those that carry Internettraffic -- to law enforcement agencies.

The privacy groups are being represented on a pro bono basis by KurtWimmer and Gerard J. Waldron, attorneys at the Washington law firm ofCovington & Burling, and Carlos Perez-Albuerne, an attorney at theBoston law firm of Choate, Hall & Stewart. Oral argument in the courtchallenge to the CALEA standards is scheduled for May 17, 2000.

In a related development, the Internet Engineering Task Force (IETF)
has published a draft document explaining its decision not to considerrequirements for wiretapping as part of the process for creating andmaintaining IETF standards. Among other things, the draft notes that"[a]dding a requirement for wiretapping will make the designsconsiderably more complex, thereby jeopardizing the security ofcommunications …"

Background materials on CALEA, including the brief filed by EPIC, ACLUand EFF, are available at EPIC's website:

http://www.epic.org/privacy/wiretap/

The draft IETF document on wiretapping standards is available at:

http://www.ietf.org/internet-drafts/draft-ietf-iab-raven-00.txt


[4] New Crypto Export Regulations: Still Not De-Control


The U.S. Commerce Department released its revised encryption exportregulations on January 12. While the new rules will allow for theexport of a wide variety of "retail" encryption products, they fallshort of the Clinton Administration's promise to deregulate theprivacy-enhancing technology. Following the release of the newregulations, EPIC joined the American Civil Liberties Union (ACLU) andthe Electronic Frontier Foundation (EFF) in announcing that the groupswill continue to press pending constitutional litigation challengingencryption controls.

While recognizing that the Administration has taken a positive andlong-overdue step with its latest revisions, the cyber-libertiesgroups believe that the fundamental constitutional defects of theencryption export regime have not been remedied. Specifically:

- The new regulations, like the old ones, impose special requirementson Internet speech, contrary to the Supreme Court's 1997 ruling inReno v. ACLU. The regulations require that the government be notifiedof any electronic "export" of publicly available encryption sourcecode, and prohibit electronic "export" to certain countries. Yetpeople may freely send the same information anywhere on paper.

- The export regulations are still a completely discretionarylicensing scheme. They continue to require licenses for a largeamount of communication protected by the First Amendment, includingtransmitting source code that is not "publicly available," source codethat is "restricted," source code forming an "open cryptographicinterface," and various forms of object code.

- While the new regulations appear to permit free posting ofencryption source code to Internet discussion lists, such posting maybe illegal if the poster has 'reason to know' that it will be read bya person in one of the seven regulated countries (such as Cuba).

- The new regulations still ban providing information on how to createor use some encryption technology as prohibited "technicalassistance." Software publishers can be fined or imprisoned forhelping people to use their code. These same limitations do not applyto non-encryption source code.

In a highly-publicized court case, mathematician Daniel Bernstein haschallenged the export control laws on First Amendment grounds.
Professor Bernstein claims that his right to publish his ownencryption software and share his research results with others overthe Internet is being unconstitutionally restricted by thegovernment's controls. Bernstein won his case at the trial level, andlast year won an appeal in the Ninth Circuit Court of Appeals. Priorto the release of the new regulations, the court had granted thegovernment's request that the appeal be reconsidered by a larger "enbanc" panel of eleven judges, but recently sent the case back to thethree-judge panel that originally heard it for further considerationin light of the new regulations.

A similar case challenging the constitutionality of the export ruleswas brought by the ACLU of Ohio on behalf of Ohio law professor PeterJunger, who wished to publish an electronic version of an encryptionprogram he wrote. The case is pending in the Sixth Circuit FederalCourt of Appeals. EPIC has participated as a "friend-of-the-court" inboth the Bernstein and Junger cases.

The text of the revised encryption regulations is available at:

http://www.epic.org/crypto/export_controls/regs_1_00.html


[5] Industry Targets DVD Copying in Digital Copyright Suits


The movie industry has filed lawsuits in California, New York, andConnecticut to prevent Internet sites from distributing informationabout the DVD Content Scrambling System. A federal judge in adistrict court in New York granted a preliminary injunction January 20against three defendants who provided the decoding software on theirWeb sites. A judge in a California state court granted a preliminaryinjunction the following day against 21 defendants. The contendedprogram, DeCSS, created by a Norwegian programmer, allows users todecode the encryption used on DVDs.

The California case was filed by the DVD Copy Control Association, anindustry trade group, after Christmas against 72 Web sites andindividuals who had either published information about DeCSS orprovided a link to the information from their sites. The DVD-CCAclaims that the defendants are violating their trade secrets bydiscussing the source code used to bypass the DVD encryption schemethrough reverse engineering. The defendants, however, assert that thepurpose of the DeCSS is not to engage in illegal duplication of DVDsbut rather to allow DVDs to operate on computers using the Linuxoperating system. The Global Internet Liberty Campaign, a coalitionof more than 50 civil liberties groups worldwide, issued a statementclaiming that the DVD-CCA's assault could have a severe impact on freeexpression: "We believe that intellectual property owners should notbe allowed to expand their property rights at the expense of freespeech -- particularly when the speech in question explains howcompanies have prevented the dissemination of new scientific ideas."

The New York case and a companion case in a Connecticut federal courtwere filed on Jan. 15 and center upon the Digital Millennium CopyrightAct, a 1998 law that prohibits the distribution of products that cancircumvent copy protection schemes. The Motion Picture Association ofAmerica, as well as six other movie studios, are plaintiffs. Criticsassert that the decoding of encryption schemes is crucial toresearching, developing, and testing information processing systems.
The Electronic Frontier Foundation is providing legal counsel todefendants both in California and New York.

The Global Internet Liberty Campaign statement is available at:

http://www.gilc.org/speech/DVD-CSS.html
Testimony of EPIC Executive Director Marc Rotenberg on the DigitalMillennium Copyright Act (June 5, 1998) is available at:

http://www.epic.org/privacy/copyright/epic-wipo-testimony-698.html
The Electronic Frontier Foundation maintains an archive of courtmaterial relating to the DVD-CCA case at:

http://www.eff.org/ip/Video/DVDCCA_case/

EFF also maintains an archive of court material relating to the MPAADVD cases at:

http://www.eff.org/ip/Video/MPAA_DVD_cases/



[6] Clinton Proposes Privacy Protections in State of Union Address


In President Clinton's State of the Union speech on January 27, hebrought attention to the growing need to protect personal informationin the next century.

After referring to the recent growth of information technology, hereminded his audience that technology has to be carefully directed inorder to assure that its reach does not compromise societal values.
Additionally, he said, "First and foremost, we have to safeguard ourcitizens' privacy."

Specifically, he mentioned the ongoing rule-making process overmedical privacy regulations, the need for stronger protections overfinancial records, and more work on preventing genetic discriminationfrom insurers and employers.

The full text of the President's speech is available at:

http://www.whitehouse.gov/WH/SOTU00/sotu-text.html


[7] EPIC Bookstore -- Critical Infrastructure Report


Critical Infrastructure Protection and the Endangerment of CivilLiberties: An Assessment of the President's Commission on CriticalInfrastructure Protection (PCCIP) by Wayne Madsen.

http://www.amazon.com/exec/obidos/ISBN=1893044017/electronicprivacA
Excerpt from the Executive Summary:

On July 15, 1997, President Clinton signed Executive Order 13010,
which established the President's Commission on CriticalInfrastructure Protection (PPCIP). The Executive Order listed eightsectors that the PCCIP was to examine for security vulnerabilities.
They are: telecommunications, electrical power systems, gas and oilstorage and transportation, banking and finance, transportation, watersupply systems, emergency services, and continuity of government.

President Clinton appointed retired Air Force General Robert T. Marshto chair the PCCIP. Although the commission, its Steering Committee,
and its Advisory Committee were composed of members of government andindustry, the membership of the three bodies consisted of a majorityof military and intelligence representatives.

PCCIP's report, issued in October 1997, contained many recommendationsthat have the potential to curtail a number of important civilliberties, including freedom of speech and freedom of information.
Although the report concluded there was no evidence of an "impendingcyber attack which could have a debilitating effect on the nation'scritical infrastructure," it did recommend a new bureaucratic securityestablishment with expansive authority. If not properly monitored andcontrolled, these new national security structures andintelligence-sharing networks, in addition to those that alreadyexist, may, instead of protecting the national infrastructure, be usedby the government and private corporations to further erode theprivacy of U.S. and foreign citizens.



Additional titles on privacy, open government, free expression,
computer security, and crypto, as well as films and DVDs can beordered through the EPIC Bookstore: http://www.epic.org/bookstore/



[8] Upcoming Conferences and Events


Privacy, Security & Confidentiality of Medical Records 2000: ComplyingWith New HIPAA Regulations. NonProfit Management. One Day Seminars.
Various Locations and Times. For more information:
http://www.nonprofitmgt.com/privacy
Federal Trade Commission Advisory Committee on Online Privacy andSecurity. Series of Meetings. Federal Trade Commission Headquarters.
Washington, D.C. For more information: http://www.ftc.gov/acoas/

Cyberspace and Privacy: A New Legal Paradigm? February 7, 2000.
Stanford Law School. Stanford, CA. For more information:
http://lawreview.stanford.edu or http://stlr.stanford.edu
Santa Clara University Computer and High Technology Journal Symposiumon Internet Privacy. February 11-12, 2000. For more information:
http://www.scu.edu/techlaw/symposium
Government Technology Conference 2000. February 14-18, 2000. AustinConvention Center. Austin, TX. For more information:
http://www.govtech.net
E-Commerce and Privacy: Implementing the New Law. Riley InformationServices. February 21, 2000. Westin Hotel, Ottawa. For moreinformation: http://www.rileyis.com/seminars/

Financial Cryptography '00. International Financial CryptographyAssociation. February 21-24, 2000. InterIsland Hotel. Anguilla, BritishWest Indies. For more information: http://fc00.ai/

The New Wave of Privacy Protection in Canada. BC Freedom of Informationand Privacy Association and Riley Information Services. March 9-10,
2000. Hotel Vancouver. Vancouver, British Columbia. For moreinformation: http://www.rileyis.com
HIPAA Security and Privacy Requirements: A How To Blueprint forCompliance. MIS Training Institute. Two-day Seminars. Various Locationsand Times. For more information: http://www.misti.com
Entrust SecureSummit 2000. May 1-4, 2000. Hyatt Regency Dallas atReunion. Dallas, Texas. For more information:
http://www.securesummit.com
Shaping the Network: The Future of the Public Sphere in Cyberspace.
Computer Professionals for Social Responsibility (CPSR). Call forPapers -- Abstracts Due February 15. May 20-23, 2000. Seattle,
Washington. For more information: http://www.scn.org/cpsr/diac-00
Telecommunications: The Bridge to Globalization in the InformationSociety. Biennial Conference of the International TelecommunicationsSociety. July 2-5, 2000. For more information:
http://www.its2000.org.ar

Subscription Information


The EPIC Alert is a free biweekly publication of the Electronic PrivacyInformation Center. A Web-based form is available for subscribing orunsubscribing at:

http://www.epic.org/alert/subscribe.html
To subscribe or unsubscribe using email, send email toepic-newsepic.org with the subject: "subscribe" (no quotes) or"unsubscribe".

Back issues are available at:

http://www.epic.org/alert/


About EPIC


The Electronic Privacy Information Center is a public interest researchcenter in Washington, DC. It was established in 1994 to focus publicattention on emerging privacy issues such as the Clipper Chip, theDigital Telephony proposal, national ID cards, medical record privacy,
and the collection and sale of personal information. EPIC is sponsoredby the Fund for Constitutional Government, a non-profit organizationestablished in 1974 to protect civil liberties and constitutionalrights. EPIC publishes the EPIC Alert, pursues Freedom of InformationAct litigation, and conducts policy research. For more information,
e-mail infoepic.org, http://www.epic.org or write EPIC, 666Pennsylvania Ave., SE, Suite 301, Washington, DC 20003. +1 202 544 9240(tel), +1 202 547 5482 (fax).

If you'd like to support the work of the Electronic Privacy InformationCenter, contributions are welcome and fully tax-deductible. Checksshould be made out to "The Fund for Constitutional Government" and sentto EPIC, 666 Pennsylvania Ave., SE, Suite 301, Washington, DC 20003.

Your contributions will help support Freedom of Information Act andFirst Amendment litigation, strong and effective advocacy for the rightof privacy and efforts to oppose government regulation of encryptionand expanding wiretapping powers.

Thank you for your support.

END EPIC Alert 7.02


.










WorldLII: Copyright Policy | Disclaimers | Privacy Policy | Feedback
URL: http://www.worldlii.org/int/journals/EPICAlert/2000/2.html