WorldLII Home | Databases | WorldLII | Search | Feedback

EPIC Alert

You are here:  WorldLII >> Databases >> EPIC Alert >> 2006 >> [2006] EPICAlert 13

Database Search | Name Search | Recent Articles | Noteup | LawCite | Help

EPIC Alert 13.13 [2006] EPICAlert 13






EPIC ALERT


Volume 13.13 June 30, 2006

Published by the Electronic Privacy Information Center (EPIC)
Washington, D.C.

http://www.epic.org/alert/EPIC_Alert_13.13.html

Table of Contents


[1] Government Program Probes Financial Records
[2] EPIC Opposes Photo ID Requirements for Voting
[3] Lawmakers, Industry, Call for Federal Privacy Law
[4] FTC Calls for Open Access to WHOIS
[5] Experts Find Wiretaps Weaken Security
[6] News in Brief
[7] EPIC Bookstore: Vernor Vinge's "Rainbows End"


[8] Upcoming Conferences and Events


[1] Government Program Probes Financial Records

Government officials confirmed last week that the Bush administrationhas been secretly examining banking transactions of thousands ofAmericans and others. The official confirmations followed news reportsthat revealed the program, the latest in a series of secret surveillanceprograms conducted by the government. News reports previously revealedthat the National Security Agency was eavesdropping on Americans' phonecalls and collecting domestic phone records without warrants.

The program, begun after the Sept. 11, 2001 attacks, is run by the CIAand overseen by the Treasury Department. The government used broad,secret subpoenas to review transactions from Brussels-based bankingconsortium Society for Worldwide Interbank Financial Telecommunications(SWIFT), which routes information among 7,800 financial institutions inmore than 200 countries.

London-based Privacy International has filed complaints with dataprotection and privacy regulators in 33 European countries againstSWIFT. Privacy International contends that SWIFT acted "without regardto legal process under Data Protection law when it secretly provided theTreasury Department with confidential banking transactions of thousandsof international customers. SWIFT's actions are also being scrutinizedby the Belgian government, which is investigating the legality of thesecret transactions.

President Bush and others in his administration are attacking newspapersfor reporting about and investigating recently discovered secretsurveillance programs. He claimed that such news reports helpedterrorists by publicizing that their financial transactions were beingwatched. However, Bush already announced this intention to terroriststwo weeks after the Sept. 11, 2001, attacks. On Sept. 24, 2001, Bushsaid, "We're putting banks and financial institutions around the worldon notice -- we will work with their governments, ask them to freeze orblock terrorists' ability to access funds in foreign accounts."

Treasury Department Press Release Confirming Secret Program:

http://www.treasury.gov/press/releases/js4332.htm

SWIFT Press Release Explaining Program:

http://www.swift.com/index.cfm?item_id=59897

Privacy International Press Release Describing Complaints:

http://www.epic.org/redirect/pi_finance_release.html

European Union Data Protection Laws:

http://ec.europa.eu/justice_home/fsj/privacy/law/index_en.htm

EPIC's Domestic Surveillance Resources Page:

http://www.epic.org/features/surveillance.html

EPIC's "Privacy Law Sourceboook," explaining U.S. and internationallaws:

http://www.epic.org/bookstore/pls/2004/


[2] EPIC Opposes Photo ID Requirements for Voting

The House Committee on Administration held a hearing on a proposal torequire newly registered voters to produce proof of citizenship. EPICprovided comments on the hearing, urging the Committee to address realthreats to election integrity. EPIC stated that there were twoconditions that must be satisfied to meet the requirements of a free,fair, and democratic election: all those who are eligible to vote mustbe allowed to do so, while those are not eligible must be prevented fromvoting. Violation of either of these two requirements undermines theintegrity of a public election.

In its comments, EPIC stressed that the voter registration processshould determine voter eligibility, not an ad hoc process conducted onthe day of the election. "The role of the poll worker is to authenticatevoters without consideration of their income, language of origin,education, gender, race, or ethnicity," EPIC said.

EPIC also noted the difference between proving citizenship and provingvoter eligibility. For instance, documents that provide proof ofcitizenship do not prove eligibility to vote: A passport that indicatesbirthplace, does not indicate whether the holder is currently a residentof the community in which she wishes to vote. EPIC pointed out thatthere is no evidence, research or reporting to substantiate the threatof illegal or ineligible voters' participation in public elections. EPICalso noted that the committee hearing did not address the more pressingand proven problem of fraud in absentee ballots.

Increased voter registration requirements in the past have led to voterdisenfranchisement, EPIC said. Requiring voters to affirmatively provethat they can vote, after they have already done so at registration,placed an unconstitutional burden upon voters. EPIC also raised theconcern that policymakers seeking additional verification may imposeother identification requirements which would infringe upon the validityof the secret ballot.

Administration Committee Hearing on Voting ID Requirements:

http://cha.house.gov/hearings/hearing.aspx?NewsID=1359

EPIC's Comments to the Committee (pdf):

http://www.epic.org/privacy/voting/voter_id-statement.pdf

EPIC's Voting Page:

http://www.epic.org/privacy/voting

National Committee for Voting Integrity:

http://votingintegrity.org/


[3] Lawmakers, Industry, Call for Federal Privacy Law


On June 16, Senator Hillary Rodham Clinton (D-NY) announced plans tointroduce comprehensive privacy legislation. At a meeting of theAmerican Constitution Society, Clinton called for a "Privacy Bill ofRights" that would create privacy protections in the private sector,strengthen enforcement of medical privacy laws, and ensure checks andbalances on government surveillance. Clinton criticized the current lackof privacy protections in the United States, saying, "at all levels, theprivacy protections for ordinary citizens are broken, inadequate, andout of date."

Clinton announced that her consumer protection proposals were to beincorporated in a bill known as the "Privacy Rights and Oversight forElectronic and Commercial Transactions," or PROTECT, Act. The bill wouldprevent companies from sharing a person's personal information unlessthe person had opted in to that sharing. It would also grant consumersthe right to freeze their credit, an effective means of preventingidentity theft. Data brokers would have to grant consumers access totheir own records, and notify consumers if data has been breached.
Violators would be subject to private suit, in a tiered system designedto insulate small businesses.

The proposed law also would increase the breadth and enforcement ofmedical privacy laws, which Clinton noted were extremely lax. Of over35,000 privacy law complaints, "not a single, civil, monetary penaltyhas been imposed," she said. Clinton also criticized the Bushadministration on its warrantless surveillance programs, calling forsurveillance programs to be reviewed by the legislative and judicialbranches, to ensure the protection of privacy and civil liberties.

The PROTECT Act also creates a high-level privacy czar in the Office ofManagement and Budget, to oversee the federal government's privacypractices. "We had a privacy czar during the Clinton Administration, butthe current administration shoes not to follow that model," Clintonsaid.

In related news, Peter Swire, the former Clinton administration privacyczar, testified before a subcommittee of the House Energy and CommerceCommittee on June 20, representing the Consumer Privacy LegislativeForum, a consortium of businesses also calling for federal lawsregarding privacy and data security. The businesses called for a morelimited law that would grant consumers "reasonable" access toinformation held about them, but that would preempt state law, likelystriking down stronger state protections. Executives fromHewlett-Packard and eBay, members of the Forum, also testified, alongwith Dr. Thomas Lenard, of the Progress and Freedom Foundation, and EvanHendricks of Privacy Times.

Representatives from both parties agreed that national legislation wasnecessary, but many remained concerned as to whether the companies' planwould have effective enforcement. Representative Stearns (R-FL), Chairof the subcommittee, suggested that a private right of action mightencourage compliance with the law and grant individual consumers anamount of redress. Representative Barton (R-TX), Chair of the full HouseCommerce Committee, also appeared to support some form of a privateright, as did Representative Gonzalez (D-TX). Representative Schakowsky(D-IL), Ranking Member of the subcommittee, also promoted the idea ofcreating a cross-agency privacy czar.

Senator Clinton's Press Release on Comprehensive Privacy Legislation:

http://clinton.senate.gov/news/statements/details.cfm?id=257234&&

Text of Senator Clinton's speech:

http://clinton.senate.gov/news/statements/details.cfm?id=257288&&

Consumer Privacy Legislative Forum Statement on Federal PrivacyLegislation (pdf):

http://www.cdt.org/privacy/20060620cplstatement.pdf

Testimony of Prof. Peter Swire, on behalf of the Consumer PrivacyLegislative Forum (pdf):

http://www.epic.org/redirect/swire_test.html

EPIC's Privacy and Preemption page:

http://www.epic.org/privacy/preemption/


[4] FTC Calls for Open Access to WHOIS

At the annual meeting of the Internet Corporation for Assigned Names andNumbers (ICANN), U.S. Federal Trade Commissioner Jonathan Leibowitzcalled for open access to the WHOIS database, as part of the FTC's fightagainst online fraud. WHOIS allows the public to view the name andpersonal information of any domain name holder. In order to protecttheir privacy, many domain name holders register through a proxyservice, so that users can contact them via the proxy while theirpersonal information remains protected.

At the Marrakech meeting of the domain name authority, Leibowitz notedthat the database helps law enforcement track down spyware, spam, andInternet fraud. However, the commissioner also stated that the WHOISdatabase "is most useful when it is accurate." Ensuring accuracy inWHOIS, however, threatens the ability of users to engage in anonymousfree speech online. Recently, the U.S. National Telecommunications andInformation Administration prohibited registrars of domain names endingin ".US" from offering proxy services. (EPIC filed a "friend of thecourt" brief supporting a challenge to this policy in April.)

Leibowitz also criticized ICANN's vote in April to define the purpose ofthe WHOIS database narrowly. The adopted definition stated that WHOISshould be used to allow users to contact domain name holders to resolve"issues related to the configuration of the records associated with thedomain name within a DNS nameserver." Leibowitz worried that adefinition of WHOIS that did not include law enforcement as a purposefor the database would hamper law enforcement access to the personalinformation of domain name holders.

The commissioner did acknowledge, however, that enforcement can continueeven without accurate data, citing cases where the FTC was able to trackdown fraudsters who had used obviously phony names. Others at themeeting also noted that the existing definition of the purpose of WHOISdoes not mean that WHOIS data will be removed from public access.

FTC Press Release on WHOIS Access (with link to Leibowitz statement):

http://www.ftc.gov/opa/2006/06/icann.htm

Communique of ICANN's Governmental Advisory Committee (pdf):

http://gac.icann.org/web/communiques/gac25com.pdf

EPIC's WHOIS page:

http://www.epic.org/privacy/whois/

EPIC's Peterson v. NTIA page:

http://www.epic.org/privacy/peterson/


[5] Experts Find Wiretaps Weaken Security

According to a report by the Information Technology Association ofAmerica, attempts to create wiretap-friendly Internet and VoIP serviceswill build security vulnerabilities into the services. This reportfollows a recent ruling by the D.C. Circuit Court of Appeals thatrequires broadband and VoIP providers to build systems that thegovernment can wiretap easily. However, technology experts say that thisrequires either a massive change in Internet infrastructure, or theintroduction of serious security risks.

The report notes that, unlike the traditional phone system, thedecentralized nature of the Internet makes it extremely difficult, ifnot impossible, to simply extract the desired information from Internetrouters. Doing so would require the restructuring of "a very largeportion of the routing infrastructure." Other dangers include the easeof accidentally intercepting innocent parties' communications; creatingeavesdropping systems that could be readily co-opted by bad actors; andthe detection or possible interception of the transmission to the lawenforcement agency itself. Technical hurdles included the relative lackof physical security surrounding Internet routing equipment, as well asthe ease with which identities can change on the Internet.

The report, authored by a group of technology and network experts,outlines the technical dangers to applying the Communications Assistancefor Law Enforcement Act (CALEA) to Internet services. CALEA was createdin 1994, when law enforcement agencies grew concerned that thedevelopment of wireless and other telephone technologies would hampertheir ability to wiretap phone calls. CALEA required telephone companiesto build systems that the government could wiretap easily, but,recognizing the differences between telephone service and Internetservices, Congress did not apply the law to "information services." Arecent ruling, however, upheld the Federal Communications Commission'sextension of CALEA to VoIP services and broadband.

ITAA Report (pdf):

http://www.itaa.org/news/docs/CALEAVOIPreport.pdf

Opinion in ACE v FCC (pdf):

http://www.epic.org/privacy/wiretap/ace_v_fcc.pdf

EPIC's Wiretap page:

http://www.epic.org/privacy/wiretap/


[6] News in Brief

EPIC Opposes D.C. Police's Proposed Expansion of CCTV SystemIn comments to the Metropolitan Police Department, EPIC opposed aproposed pilot project that would expand the District's limited systemto a system of constant, surreptitious surveillance of the public.
However, if the project goes forward, EPIC urged the MPD not to changeits public notification standards. As proposed, the new regulationswould allow the police chief to install and maintain a system of secretvideo cameras without informing the public. Also, EPIC urged the MPD toset clear, objective standards for evaluating the success of theexpanded system.

EPIC's comments (pdf):

http://www.epic.org/privacy/surveillance/cctvcom062906.pdf

Metropolitan Police Department's site:

http://mpdc.dc.gov/

EPIC's Video Surveillance page:

http://www.epic.org/privacy/surveillance/Stolen Veterans Affairs Laptop and Hard Drive Are FoundThe stolen laptop computer and hard drive containing sensitive data forup to 26.5 million veterans, their spouses, and active-duty militarypersonnel have been found, according to Veterans Affairs Secretary JimNicholson. This comes as newly discovered documents show that VeteransAffairs had given permission in 2002 for the analyst, from whom theequipment was stolen, to work from home with data that included millionsof Social Security numbers, disability ratings and other personalinformation. Agency officials previously said the analyst was firedbecause he violated agency procedure by taking the data home.

EPIC's Veterans Affairs page:

http://www.epic.org/privacy/vatheft/default.html

Department of Veterans Affairs site:

http://www.va.gov/AT&T Privacy Policy Claims Control over Customers' InfoA new privacy policy unveiled for AT&T's Internet TV offerings claimsthat customers' personal information belongs to the company. "While yourAccount information may be personal to you, there records constitutebusiness records that are owned by AT&T, " the policy stated. The policyalso notes that information on users' browsing and viewing habits willbe recorded. The disclosure of such information by cable companies tothird parties is prohibited by the Cable Communications Policy Act.
However, it is unlikely that the Act would apply to an Internet providerlike AT&T.

AT&T's Privacy Policy for AT&T Yahoo! and Video Services:

http://support.sbcglobal.net/article.php?item=574

Cable Communications Policy Act, Section 551:

http://www.epic.org/redirect/ccpa.htmlJustice Department Considers Data Retention PlanThe U.S. Department of Justice met with representatives of technologycompanies and privacy organizations to discuss its Internet dataretention plans. These plans would require Internet service providers tostore all user records so that law enforcement can later examine themfor evidence of wrongdoing. The data retention scheme is being presentedas part of an initiative to combat child pornography. The JusticeDepartment has not provided details on this plan, nor has it stated whythe drastic step of retaining every user's records is necessary.

EPIC's Data Retention Page:

http://www.epic.org/privacy/intl/data_retention.htmlStudy Finds Yahoo's China Filters Most RestrictiveA study released by Reporters Without Borders revealed that, of varioussearch engines operating in China, Yahoo's filters removed the mostinformation from search results. China severely restricts access toInternet information, employing filters that block dissident materialfrom being viewed. The study compared the results returned from searchengines Yahoo, Google, MSN, and local competitor Baidu when researcherssearched for material on topics like "Tibet Independence," "democracy,"
and "human rights." Yahoo and Baidu were also found to prevent users whosearched for such topics from conducting any additional searches, evenon neutral topics, for an hour.

Reporters Without Borders Study:

http://www.rsf.org/article.php3?id_article=18015


[7] EPIC Bookstore: Vernor Vinge's "Rainbows End"


Vernor Vinge. Rainbows End. Tor Books, 2006.

http://www.powells.com/partner/24075/biblio/1-0312856849-0

"Robert Gu is a recovering Alzheimer's patient. The world that heremembers was much as we know it today. Now, as he regains his facultiesthrough a cure developed during the years of his near-fatal decline, hediscovers that the world has changed and so has his place in it.
...
With knowledge comes risk. When Robert begins to re-train at FairmontHigh, learning with other older people what is second nature to Miri andother teens at school, he unwittingly becomes part of a wide-rangingconspiracy to use technology as a tool for world domination.

In a world where every computer chip has Homeland Security built-in,this conspiracy is something that baffles even the most sophisticatedsecurity analysts, including Robert's son and daughter-in law, two toppeople in the U.S. military. And even Miri, in her attempts to protecther grandfather, may be entangled in the plot.

As Robert becomes more deeply involved in conspiracy, he is shocked tolearn of a radical change planned for the UCSD Geisel Library; all thebooks there, and worldwide, would cease to physically exist. He and hisfellow re-trainees feel compelled to join protests against the change.
With forces around the world converging on San Diego, both theconspiracy and the protest climax in a spectacular moment as unique andsatisfying as it is unexpected. This is science fiction at its verybest, by a master storyteller at his peak."
EPIC Publications:

"Information Privacy Law: Cases and Materials, Second Edition" Daniel J.
Solove, Marc Rotenberg, and Paul Schwartz. (Aspen 2005). Price: $98.
http://www.epic.org/redirect/aspen_ipl_casebook.html

This clear, comprehensive introduction to the field of informationprivacy law allows instructors to enliven their teaching of fundamentalconcepts by addressing both enduring and emerging controversies. TheSecond Edition addresses numerous rapidly developing areas of privacylaw, including: identity theft, government data mining,and electronicsurveillance law, the Foreign Intelligence Surveillance Act,intelligence sharing, RFID tags, GPS, sypware, web bugs, and more.
Information Privacy Law, Second Edition, builds a cohesive foundationfor an exciting course in this rapidly evolving area of law.



"Privacy & Human Rights 2004: An International Survey of Privacy Lawsand Developments" (EPIC 2004). Price: $50.
http://www.epic.org/bookstore/phr2004

This annual report by EPIC and Privacy International provides anoverview of key privacy topics and reviews the state of privacy in over60 countries around the world. The report outlines legal protections,new challenges, and important issues and events relating to privacy.
Privacy & Human Rights 2004 is the most comprehensive report on privacyand data protection ever published.



"FOIA 2004: Litigation Under the Federal Open Government Laws," HarryHammitt, David Sobel and Tiffany Stedman, editors (EPIC 2004). Price:
$40.
http://www.epic.org/bookstore/foia2004

This is the standard reference work covering all aspects of the Freedomof Information Act, the Privacy Act, the Government in the Sunshine Act,and the Federal Advisory Committee Act. The 22nd edition fully updatesthe manual that lawyers, journalists and researchers have relied on formore than 25 years. For those who litigate open government cases (orneed to learn how to litigate them), this is an essential referencemanual.



"The Public Voice WSIS Sourcebook: Perspectives on the World Summit onthe Information Society" (EPIC 2004). Price: $40.
http://www.epic.org/bookstore/pvsourcebook

This resource promotes a dialogue on the issues, the outcomes, and theprocess of the World Summit on the Information Society (WSIS). Thisreference guide provides the official UN documents, regional andissue-oriented perspectives, and recommendations and proposals forfuture action, as well as a useful list of resources and contacts forindividuals and organizations that wish to become more involved in theWSIS process.



"The Privacy Law Sourcebook 2004: United States Law, International Law,and Recent Developments," Marc Rotenberg, editor (EPIC 2005). Price:
$40.
http://www.epic.org/bookstore/pls2004/

The Privacy Law Sourcebook, which has been called the "Physician's DeskReference" of the privacy world, is the leading resource for students,attorneys, researchers, and journalists interested in pursuing privacylaw in the United States and around the world. It includes the fulltexts of major privacy laws and directives such as the Fair CreditReporting Act, the Privacy Act, and the OECD Privacy Guidelines, as wellas an up-to-date section on recent developments. New materials includethe APEC Privacy Framework, the Video Voyeurism Prevention Act, and theCAN-SPAM Act.



"Filters and Freedom 2.0: Free Speech Perspectives on Internet ContentControls" (EPIC 2001). Price: $20.
http://www.epic.org/bookstore/filters2.0

A collection of essays, studies, and critiques of Internet contentfiltering. These papers are instrumental in explaining why filteringthreatens free expression.



EPIC publications and other books on privacy, open government, freeexpression, crypto and governance can be ordered at:

EPIC Bookstore http://www.epic.org/bookstore

"EPIC Bookshelf" at Powell's Bookshttp://www.powells.com/features/epic/epic.html



EPIC also publishes EPIC FOIA Notes, which provides brief summaries ofinteresting documents obtained from government agencies under theFreedom of Information Act.

Subscribe to EPIC FOIA Notes at:
https://mailman.epic.org/cgi-bin/control/foia_notes


[8] Upcoming Conferences and Events

7th Annual Institute on Privacy Law: Evolving Laws and Practices in aSecurity-Driven World. Practising Law Institute. June 19-20, New York,New York. July 17-18, Chicago, Illinois. Live webcast available. Formore information:
www.pli.edu

identitymashup: Who Controls and Protects the Digital Me? Berkman Centerfor Internet & Society, Harvard Law School. June 19-21, 2006. Cambridge,Massachusetts. For more information:
http://www.identitymash-up.org/

Call for papers for Identity and Identification in a Networked World.
Submissions due by July 5. New York University. Symposium on September29-30, 2006. New York, New York. For more information:
http://www.easst.net/node/976

Infosecurity New York. Reed Exhibitions. September 12-14, 2006. NewYork, New York. For more information:
http://www.infosecurityevent.com

34th Research Conference on Communication, Information, and InternetPolicy. Telecommunications Policy Research Conference. September29-October 1, 2006. Arlington, Virginia. For more information:
http://www.tprc.org/TPRC06/2006.htm

6th Annual Future of Music Policy Summit. Future of Music Coalition.
October 5-7, 2006. Montreal, Canada. For more information:
http://www.futureofmusic.org/events/summit06/

The IAPP Privacy Academy 2006. International Association of PrivacyProfessionals. October 18-20, 2006. Toronto, Ontario, Canada. For moreinformation:
www.privacyassociation.org

International Conference on Privacy, Security, and Trust (PST 2006).
University of Ontario Institute of Technology. October 20-November 1,
2006. Markham, Ontario, Canada. For more information:
http://www.businessandit.uoit.ca/pst2006/

BSR 2006 Annual Conference. Business for Social Responsibility. November7-10, 2006. New York, New York. For more information:
http://www.bsr.org/BSRConferences/index.cfm

CFP2007: Computers, Freedom, and Privacy Conference. Association forComputing Machinery. May 2007. Montreal, Canada. For more information:
http://www.cfp2007.org


Subscription Information

Subscribe/unsubscribe via web interface:

https://mailman.epic.org/cgi-bin/mailman/listinfo/epic_news

Back issues are available at:

http://www.epic.org/alert

The EPIC Alert displays best in a fixed-width font, such as Courier.


Privacy Policy

The EPIC Alert mailing list is used only to mail the EPIC Alert and tosend notices about EPIC activities. We do not sell, rent or share ourmailing list. We also intend to challenge any subpoena or other legalprocess seeking access to our mailing list. We do not enhance (link toother databases) our mailing list or require your actual name.

In the event you wish to subscribe or unsubscribe your e-mail addressfrom this list, please follow the above instructions under "subscriptioninformation."


About EPIC

The Electronic Privacy Information Center is a public interest researchcenter in Washington, DC. It was established in 1994 to focus publicattention on emerging privacy issues such as the Clipper Chip, theDigital Telephony proposal, national ID cards, medical record privacy,and the collection and sale of personal information. EPIC publishes theEPIC Alert, pursues Freedom of Information Act litigation, and conductspolicy research. For more information, see http://www.epic.org or writeEPIC, 1718 Connecticut Ave., NW, Suite 200, Washington, DC 20009. +1 202483 1140 (tel), +1 202 483 1248 (fax).

If you'd like to support the work of the Electronic Privacy InformationCenter, contributions are welcome and fully tax-deductible. Checksshould be made out to "EPIC" and sent to 1718 Connecticut Ave., NW,Suite 200, Washington, DC 20009. Or you can contribute online at:

http://www.epic.org/donate

Your contributions will help support Freedom of Information Act andFirst Amendment litigation, strong and effective advocacy for the rightof privacy and efforts to oppose government regulation of encryption andexpanding wiretapping powers.

Thank you for your support.



.


WorldLII: Copyright Policy | Disclaimers | Privacy Policy | Feedback
URL: http://www.worldlii.org/int/journals/EPICAlert/2006/13.html