WorldLII [Home] [Databases] [WorldLII] [Search] [Feedback]

EPIC Alert

You are here:  WorldLII >> Databases >> EPIC Alert >> 2001 >> [2001] EPICAlert 14

[Database Search] [Name Search] [Recent Alerts] [Noteup] [Help]

EPIC Alert 8.14 [2001] EPICAlert 14 (31 July 2001)


 


EPIC ALERT




Volume 8.14 July 31, 2001

Published by the Electronic Privacy Information Center (EPIC)
Washington, D.C.

http://www.epic.org/alert/EPIC_Alert_8.14.html

Table of Contents



[1] Privacy Groups File FTC Complaint About Windows XP
[2] Court Hears Arguments on Use of Secret Keystroke Monitor
[3] House Adopts Carnivore Reporting Requirements
[4] FBI Nominee Questioned on Computer Privacy Issues
[5] Groups Petition Agencies to Improve Financial Privacy
[6] EPIC Bill-Track: New Bills in Congress
[7] EPIC Bookstore - Striking a Balance: ePrivacy in the Workplace
[8] Upcoming Conferences and Events


[1] Privacy Groups File FTC Complaint About Windows XP


On July 26, EPIC and thirteen other public interest groups filed aformal complaint with the Federal Trade Commission regarding WindowsXP, Microsoft's new operating system. The complaint alleges that thissystem and associated services such as Hailstorm, Passport, andE-Wallet, are intended to profile, track, and monitor millions ofInternet users, and therefore Microsoft is engaging in unfair anddeceptive trade practices in violation of Section 5 of the FederalTrade Commission Act.

The complaint examines in detail the privacy threats of Passport,
Hailstorm, Hotmail, the MSN network of Web sites, and the productactivation and registration procedures for Windows XP. It examineshow each of these services collects and discloses detailed personalinformation about users without sufficient guarantees of privacy orsecurity, and often without any real knowledge or consent. Itdemonstrates how Passport account information is shared among thirdparty Web-sites; how Windows XP users are forced to create a Passportaccount to use Internet communications features (such as instantmessaging); how Hailstorm essentially strips users of their right tocontrol their personal information; how Hotmail users areautomatically signed up for a Passport account without notice or evenan opt-out facility; and how Microsoft misleads consumers when it saysthat information gathered through product activation will not belinked to personally identifiable information. The complaintconcludes that the far-reaching and inter-connected nature of theseInternet business activities, coupled with the extraordinary marketdominance of Microsoft, constitutes a unique threat to the privacy ofcomputer users.

In terms of relief, the complainants request the FTC to initiate aninvestigation into the information collection practices of Windows XPand other services, and to order Microsoft to revise XP registrationprocedures; to block the sharing of Passport information amongMicrosoft properties absent explicit consent; to allow users ofWindows XP to gain access to Microsoft web sites without disclosingtheir actual identity; and to enable users of Windows XP to easilyintegrate services provided by non-Microsoft companies for onlinepayment, electronic commerce, and other Internet-based commercialactivity.

The complaint is available at:

http://www.epic.org/privacy/consumer/MS_complaint.pdf


[2] Court Hears Arguments on Use of Secret Keystroke Monitor


In a case that could have a significant impact on the conduct ofhigh-tech police investigations, a federal judge in Newark, New Jerseyheard arguments on July 30 on a motion to disclose informationconcerning the FBI's surreptitious installation of a "key logger" on asuspect's computer. The mechanism was used to capture the suspect'sPGP encryption passphrase. In the first known case of its kind, thedefense is seeking discovery that would allow analysis of thetechnique, which has only been described publicly as "specializedcomputer software, firmware and/or hardware." The government isvigorously opposing disclosure.

U.S. District Court Judge Nicholas Politan directed attorneys fordefendant Nicodemo Scarfo, Jr. to file a supplemental brief addressingtheir need for information describing the secret technique by August1; the government was ordered to respond by August 3.

The details are important for two reasons. First, the FBI installedthe logger with a standard search warrant rather than a wiretapauthorization. FBI pen register records, however, indicate that Scarfoaccessed his online account numerous times while his computer wassubject to monitoring. The defense argues that the logging mechanismmust be evaluated to determine whether it could have captured onlineactivity (which would have required a wiretap order).

The defense also argues that the technique may have violated theFourth Amendment by facilitating a "general search." While the courtorder authorizing the installation specified that Scarfo's encryptionpassphrase was the target of the search, it appears that allinformation entered into the computer was subject to capture.

The technique employed in the case is similar to procedures that wouldhave been authorized in legislation proposed by the ClintonAdministration in 1999. The draft legislation, known as theCyberspace Electronic Security Act (CESA), would have amended currentlaw to authorize "the alteration of hardware or software that allowsplaintext to be obtained even if attempts were made to protect itthrough encryption." The CESA proposal, which was dropped in the faceof strong public opposition, would have given law enforcementofficials the power to enter private premises surreptitiously toinstall a "recovery device." (See EPIC Alert 6.13).

Selected court documents on the Scarfo case are available at:

http://www.epic.org/crypto/scarfo.html


[3] House Adopts Carnivore Reporting Requirements


Following a recommendation made by EPIC last year in Congressionaltestimony, the House of Representatives has established new reportingrequirements for the use of the Carnivore Internet surveillance device(also known as DCS 1000) and other similar systems by law enforcementagents. These requirements were outlined in an amendment offered byRep. Bob Barr (R-GA), which passed as part of the Department ofJustice's annual appropriations bill, H.R. 2215.

The Barr Amendment requires the Attorney General and the Director ofthe FBI to submit annual reports to Congress, detailing suchinformation as the number of times Carnivore was used in the pastfiscal year and the criteria and procedures for submitting, reviewing,
and approving requests to use Carnivore.

Carnivore was developed to monitor e-mail and other online activitiesof suspected criminals. Privacy advocates argue that the system istoo invasive, and fear that it grants the government too much power inmonitoring citizens' private online activities by requiring Internetservice providers to give law enforcement full access to their datatraffic.

A spokesman for Rep. Dick Armey (R-TX) said that the legislation"sends a message [to the FBI] that Congress is watching and there willbe accountability if this system is used."

The bill was referred to the Senate Judiciary Committee on July 24.
If it passes the Senate, the Attorney General and the FBI Directorwill be required to submit their first report to Congress no laterthan 30 days after the end of Fiscal Year 2001.

For background information on Carnivore, see:

http://www.epic.org/privacy/carnivore/

Proposed Carnivore reporting requirements, as specified in H.R. 2215:

http://www.epic.org/privacy/carnivore/reporting.html


[4] FBI Nominee Questioned on Computer Privacy Issues


The Senate Judiciary Committee today concluded the second and finalday of hearings on the nomination of Robert S. Mueller to be the nextDirector of the FBI. Several days prior to the confirmation hearings,
EPIC sent a letter to the Committee, urging it to question the nomineeon his views on privacy and freedom of information issues. Several ofthe issues addressed in the letter were raised during the hearings.

On the first day of the confirmation hearings, in response to aquestion from Sen. Orrin Hatch (R-UT), Mr. Mueller laid out afour-tier hierarchy for the investigation of computer crimes. Inpriority order, Mr. Mueller said he would like to see the FBI focusmost heavily on computer intrusions and denial of service attacks;
theft of intellectual property and corporate espionage; fraud andchild pornography; and finally, the theft of high-tech hardware.

On the second day of the hearings, Sen. Maria Cantwell (D-WA) directlyasked Mr. Mueller about the FBI's high-tech investigative techniquesand the potentially invasive implications of systems such as Carnivoreand the FBI's "key logger" system (specifically referring to theScarfo case). Mr. Mueller stated that the FBI's newest technological"investigative tools" are "cutting edge" and "second to none." Hewent on to say that the "rapid advances" of these investigative toolshave led to "privacy concerns that we have to address." Stating thathe is "sensitive to the concerns relating to privacy," Mr. Muellernoted that he has "already had meetings with privacy groups"
concerning Carnivore and that he hopes that "technology overtakes thenecessity for using" such systems in the future.

Committee Chairman Patrick Leahy (D-VT) picked up where Sen. Cantwellleft off, questioning Mr. Mueller about the recent Supreme Courtdecision in Kyllo v. U.S., where the warrantless use of thermalimaging devices was found to violate the Fourth Amendment (see EPICAlert 8.11). Mr. Mueller said that this was an area where "lawenforcement needed guidance from the Supreme Court," although hepointed out that the Kyllo decision was "not a unanimous decision."
Mr. Mueller went on to say that regarding issues "where there is a lawenforcement tool, [and] there are privacy issues implicated . . . wedo have to look at each of those issues and be cognizant of theprivacy interests involved." The nominee said that in the future, hewould like to be "sit down and get the input from a number ofdifferent people with different concerns . . . [and be] responsive tothose concerns and do so without the necessity of perhaps going to acourt or a third party."

EPIC's letter to the Senate Judiciary Committee is available at:

http://www.epic.org/privacy/jud_comm_mueller.html


[5] Groups Petition Agencies to Improve Financial Privacy


EPIC and a coalition of consumer and civil liberties groups havepetitioned federal agencies to improve financial privacy protectionsunder the Gramm-Leach-Bliley Act (GLBA). The petition requests thatthe agencies begin a new rulemaking to ensure that consumers receiveclear and concise notice and convenient methods of opting-out ofinformation sharing.

In recent months, consumers received GLBA privacy notices thatcontained information describing the opt-out process. However, thenotices were often lengthy and difficult to read. Many employedlanguage rife with double-negatives and confusing sentence structure.
A study conducted by a readability expert concluded that most policieswere written at a third or fourth-year college reading level. As aresult of confusing privacy notices and the burden placed on consumersby opt-out mechanisms, the American Banking Association has estimatedthat less than one percent of consumers have opted-out under the GLBA.

In order to inform consumers fully of their rights and to encourageopting-out, the petition suggests specific language to clarify rightsand mechanisms that will facilitate opting out. EPIC will continue tofollow developments surrounding the GLBA and financial privacy, andadvocate the adoption of an opt-in standard for privacy.

Coalition Petition to Federal Agencies to Improve GLBA PrivacyRequirements:

http://www.epic.org/privacy/consumer/glbpetition.pdf


[6] EPIC Bill-Track: New Bills in Congress


*House*

H.R.2215 21st Century Department of Justice AppropriationsAuthorization Act. To authorize appropriations for the Department ofJustice for fiscal year 2002, and for other purposes. Sponsor: RepSensenbrenner, F. James, Jr. (R-WI). Latest Major Action: 7/24/2001Referred to Senate committee: House Judiciary; Senate Judiciary
*Senate*

S.1215 Dpartments of Commerce, Justice, and State, the Judiciary, andRelated Agencies Appropriations Act, 2002. An original bill makingappropriations for the Departments of Commerce, Justice, and State,
the Judiciary, and related agencies for the fiscal year endingSeptember 30, 2002, and for other purposes. Sponsor: Sen Hollings,
Ernest F. (D-SC). Latest Major Action: 7/20/2001 Placed on SenateLegislative Calendar under General Orders. Calendar No. 95.
Committees: Senate Appropriations.

S.1234. A bill to amend title 18, United States Code, to provide thatcertain sexual crimes against children are predicate crimes for theinterception of communications, and for other purposes. Sponsor: SenHatch, Orrin G. (R-UT). Latest Major Action: 7/25/2001 Referred toSenate committee: Senate Judiciary.

S.1242. A bill to amend the Fair Credit Reporting Act to provide fordisclosure of credit-scoring information by creditors and consumerreporting agencies. Sponsor: Sen Schumer, Charles E. (D-NY). LatestMajor Action: 7/25/2001 Referred to Senate committee: Senate Banking,
Housing, and Urban Affairs.


EPIC Bill Track: Tracking Privacy, Speech, and Cyber-Liberties Billsin the 107th Congress, is available at:

http://www.epic.org/privacy/bill_track.html


[7] EPIC Bookstore - Striking a Balance: e-Privacy in the Workplace


Striking a Balance: e-Privacy in the Workplace by the Business forSocial Responsibility Education Fund
http://store.bsr.org/product.cfm?product=16521
With the American Management Association finding that nearly 3/4 ofmajor businesses monitor their employees, the Business for SocialResponsibility Education Fund has released a report arguing thatemployers should accommodate workers' privacy. The report finds thatnot accommodating privacy in the workplace can result in a lack ofemployee trust, creativity, and health. Accordingly, the studyrecommends that employers accommodate some fundamental privacy rightsfor their employees. These include notice, employee participation indrafting a monitoring policy, and employee access to informationcollected under the policy.



EPIC Publications:

"Filters and Freedom 2.0: Free Speech Perspectives on Internet ContentControls," (EPIC 2001). Price: $20.
http://www.epic.org/bookstore/filters2.0/

A collection of essays, studies, and critiques of Internet contentfiltering. These papers are instrumental in explaining why filteringthreatens free expression.



"The Consumer Law Sourcebook 2000: Electronic Commerce and the GlobalEconomy," Sarah Andrews, editor (EPIC 2000). Price: $40.
http://www.epic.org/cls/

The Consumer Law Sourcebook provides a basic set of materials forconsumers, policy makers, practitioners and researchers who areinterested in the emerging field of electronic commerce. The focus ison framework legislation that articulates basic rights for consumersand the basic responsibilities for businesses in the online economy.



"Privacy & Human Rights 2000: An International Survey of Privacy Lawsand Developments," David Banisar, author (EPIC 2000).
Price: $20. http://www.epic.org/phr/

This survey, by EPIC and Privacy International, reviews the state ofprivacy in over fifty countries around the world. The survey examinesa wide range of privacy issues including, data protection, telephonetapping, genetic databases, ID systems and freedom of informationlaws.



"The Privacy Law Sourcebook 2000: United States Law, InternationalLaw, and Recent Developments," Marc Rotenberg, editor (EPIC 2000).
Price: $40. http://www.epic.org/pls/

The "Physicians Desk Reference of the privacy world." An invaluableresource for students, attorneys, researchers and journalists who needan up-to-date collection of U.S. and International privacy law, aswell as a comprehensive listing of privacy resources.



"Cryptography and Liberty 2000: An International Survey of EncryptionPolicy," Wayne Madsen and David Banisar, authors (EPIC 2000).
Price: $20. http://www.epic.org/crypto&/

EPIC's third survey of encryption policies around the world. Theresults indicate that the efforts to reduce export controls on strongencryption products have largely succeeded, although severalgovernments are gaining new powers to combat the perceived threats ofencryption to law enforcement.



Additional titles on privacy, open government, free expression,
computer security, and crypto, as well as films and DVDs can beordered through the EPIC Bookstore: http://www.epic.org/bookstore/



[8] Upcoming Conferences and Events


Healthcare Transactions and Code Sets, Privacy, Data Security andHIPAA/GLB Compliance: The Future of Technology, the Internet and EDIin Healthcare. The Health Colloquium at Harvard and the HIPAA SummitConference Series. August 19-22, 2001. Cambridge, MA. For moreinformation: http://www.ehc-info.com/

The Broadband Economy: The Emerging Market System in Bandwidth.
Columbia Institute for Tele-Information (CITI). September 14, 2001.
New York, NY. For more information: http://www.citi.columbia.edu/

Key Drivers for 3G Wireless: Will 3G Deliver its Promise? ColumbiaInstitute for Tele-Information (CITI). September 20, 2001. New York,
NY. For more information: http://www.citi.columbia.edu/

Health Information Privacy: Dialogue with the Stakeholders. RileyInformation Services, Inc. September 28, 2001. Ottawa, Canada. Formore information: http://www.rileyis.com/seminars/

Call For Submissions - August 3, 2001. Workshop on Security andPrivacy in Digital Rights Management 2001. Eighth Association forComputing Machinery (ACM) Conference on Computer and CommunicationsSecurity. November 5, 2001. Philadelphia, PA. For more information:
http://www.star-lab.com/sander/spdrm/

Privacy2001: Information, Security & Ethics for the New Century.
Technology Policy Group. October 3-4, 2001. Cleveland, OH. For moreinformation: http://www.privacy2000.org/

Privacy: The New Management Imperative - Chief Privacy OfficerTraining Program. Southern Methodist University and Privacy Council.
October 15-17, 2001. Dallas, TX. For more information:
http://execdev.cox.smu.edu/

Nurturing the Cybercommons, 1981-2001. Computer Professionals forSocial Responsibility (CPSR) 20th Annual Meeting. October 19-21, 2001.
Ann Arbor, MI. For more information:
http://www.cpsr.org/conferences/annmtg01/

The Third National HIPAA Summit: From Theory to Practice - FromPlanning to Implementation. October 24-26, 2001. Washington, DC. Formore information: http://www.hipaasummit.com/

The 29th Research Conference on Communication, Information andInternet Policy. Telecommunications Policy Research Conference.
October 27-29, 2001. Alexandria, VA. For more information:
http://www.tprc.org
The 8th Annual Centre for Applied Cryptographic Research (CACR)
Information Security Workshop: The Human Face of Privacy Technology.
University of Waterloo and Information and Privacy Commission/Ontario.
November 1-2, 2001. Toronto, Ontario. For more information:
http://www.cacr.math.uwaterloo.ca/

Privacy: The New Management Imperative - Chief Privacy OfficerTraining Program. Cambridge University and Privacy Council. November5-8, 2001. Cambridge, England. For more information:
kturnerprivacycouncil.com
Learning for the Future. Business for Social Responsibility's NinthAnnual Conference. November 7-9, 2001. Seattle, WA. For moreinformation: http://www.bsr.org/events/2001.asp

Subscription Information


The EPIC Alert is a free biweekly publication of the ElectronicPrivacy Information Center. A Web-based form is available forsubscribing or unsubscribing at:

http://www.epic.org/alert/subscribe.html
To subscribe or unsubscribe using email, send email toepic-newsepic.org with the subject: "subscribe" (no quotes) or"unsubscribe".

Back issues are available at:

http://www.epic.org/alert/


Privacy Policy


The EPIC Alert mailing list is used only to mail the EPIC Alert and tosend notices about EPIC activities. We do not sell, rent or share ourmailing list. We also intend to challenge any subpoena or other legalprocess seeking access to our mailing list. We do not enhance (linkto other databases) our mailing list or require your actual name.

In the event you wish to subscribe or unsubscribe your email addressfrom this list, please follow the above instructions under"subscription information". Please contact infoepic.org if you haveany other questions.


About EPIC


The Electronic Privacy Information Center is a public interestresearch center in Washington, DC. It was established in 1994 tofocus public attention on emerging privacy issues such as the ClipperChip, the Digital Telephony proposal, national ID cards, medicalrecord privacy, and the collection and sale of personal information.
EPIC publishes the EPIC Alert, pursues Freedom of Information Actlitigation, and conducts policy research. For more information,
e-mail infoepic.org, http://www.epic.org or write EPIC, 1718Connecticut Ave., NW, Suite 200, Washington, DC 20009.
+1 202 483 1140 (tel), +1 202 483 1248 (fax).

If you'd like to support the work of the Electronic PrivacyInformation Center, contributions are welcome and fullytax-deductible. Checks should be made out to "EPIC" and sent to1718 Connecticut Ave., NW, Suite 200, Washington, DC 20009.
Or you can contribute online athttp://www.guidestar.org/aol/search/report/report.adp?ein=52-2225921
Your contributions will help support Freedom of Information Act andFirst Amendment litigation, strong and effective advocacy for theright of privacy and efforts to oppose government regulation ofencryption and expanding wiretapping powers.

Thank you for your support.

END EPIC Alert 8.14


.


WorldLII: Copyright Policy | Disclaimers | Privacy Policy | Feedback
URL: http://www.worldlii.org/int/journals/EPICAlert/2001/14.html