TUCoPS :: Privacy :: priv_419.txt

Privacy Digest 4.19 9/1/95

PRIVACY Forum Digest     Friday, 1 September 1995     Volume 04 : Issue 19

            Moderated by Lauren Weinstein (lauren@vortex.com)         
              Vortex Technology, Woodland Hills, CA, U.S.A.
	
                       ===== PRIVACY FORUM =====              

   	  The PRIVACY Forum digest is supported in part by the 
	      ACM Committee on Computers and Public Policy,
     		     and the Data Services Division 
	           of MCI Communications Corporation.


CONTENTS 
	Son-of-Clipper proposal (John Levine)
	Impossible to prevent non-escrowed encryption? (Peter Kaiser)
	Newsletter recommendation (Charles M. Preston)
	Medicare leak through FOIA analysis and 9-digit ZIP (Quentin Fennessy)
	Highway Surveillance (Phil Agre)
	Metromail chief loses job over privacy concerns (Phil Agre)
	Security & Privacy (Richard Owen)
	"New" Crypto Policy Announced: Clipper II? (David Sobel)


 *** Please include a RELEVANT "Subject:" line on all submissions! ***
            *** Submissions without them may be ignored! ***

-----------------------------------------------------------------------------
The Internet PRIVACY Forum is a moderated digest for the discussion and
analysis of issues relating to the general topic of privacy (both personal
and collective) in the "information age" of the 1990's and beyond.  The
moderator will choose submissions for inclusion based on their relevance and
content.  Submissions will not be routinely acknowledged.

All submissions should be addressed to "privacy@vortex.com" and must have
RELEVANT "Subject:" lines; submissions without appropriate and relevant
"Subject:" lines may be ignored.  Excessive "signatures" on submissions are
subject to editing.  Subscriptions are by an automatic "listserv" system; for
subscription information, please send a message consisting of the word
"help" (quotes not included) in the BODY of a message to:
"privacy-request@vortex.com".  Mailing list problems should be reported to
"list-maint@vortex.com". 

All messages included in this digest represent the views of their
individual authors and all messages submitted must be appropriate to be
distributable without limitations. 

The PRIVACY Forum archive, including all issues of the digest and all
related materials, is available via anonymous FTP from site "ftp.vortex.com",
in the "/privacy" directory.  Use the FTP login "ftp" or "anonymous", and
enter your e-mail address as the password.  The typical "README" and "INDEX"
files are available to guide you through the files available for FTP
access.  PRIVACY Forum materials may also be obtained automatically via
e-mail through the listserv system.  Please follow the instructions above
for getting the listserv "help" information, which includes details
regarding the "index" and "get" listserv commands, which are used to access
the PRIVACY Forum archive.  All PRIVACY Forum materials are available
through the Internet Gopher system via a gopher server on site
"gopher.vortex.com".  Access to PRIVACY Forum materials is also available
through the Internet World Wide Web (WWW) via the Vortex Technology WWW 
server at the URL: "http://www.vortex.com".
-----------------------------------------------------------------------------

VOLUME 04, ISSUE 19

   Quote for the day:

		"Where did I go wrong?"

			-- "Nix" (Daniel Von Bargen)
			   "Lord of Illusions" (1995)

----------------------------------------------------------------------

Date:    Sun, 20 Aug 1995 18:20:27 -0400
From:    John Levine <johnl@iecc.com>
Subject: Son-of-Clipper proposal

A short and not terribly informative article in the Wall Street Journal a
few days ago reported on a sort of son of Clipper proposal that seemed to be
intended for software encryption.  It also seemed to allow multiple
competing escrow agents, with a passing comment that they needed some way to
prevent mob controlled fly-by-night escrow companies from popping up.

More detailed info would be quite interesting, particularly in view of the
recently released documents that showed that law enforcement anticipates
asking for mandatory escrowed encription.

------------------------------

Date:    Mon, 21 Aug 95 08:53:33 MET DST
From:    Peter Kaiser <kaiser@heron.enet.dec.com>
Subject: Impossible to prevent non-escrowed encryption?

(The PRIVACY Forum Moderator writes, in PRIVACY Forum Digest 04.18):
> Since it's clear that there's really no way to stop all non-Clipper
> encryption ....

If the meaning is really "no way to stop all non-escrowed encryption", this
seems to me far too sanguine a view.  You're really writing only about the
USA, where privacy policy is still in debate.  Nothing about the quality of
that debate encourages me to think that effective non-escrowed encryption
is safe from being made illegal.

There are places in the world where effective encryption is already illegal
or illegal if not licensed with a permit and escrowed.  Some of these
places have representative governments -- I live in one of them.  Why
shouldn't it happen in the USA?

___Pete

kaiser@acm.org

   [ France (where you appear to be located) is indeed one of the few
     countries, perhaps the only one in the "West", that has actually made
     non-approved encryption illegal.  However, I did not say that
     non-Clipper (non-escrowed) encryption couldn't be made illegal--perhaps
     with quite harsh penalities for use (especially in conjunction with the
     commission of other crimes).  I said that there's no way to actually
     *stop* all use of such systems.  It is probably safe to assume that
     even where encryption is illegal, there are entities that still use it
     in violation of local laws.  Drunk driving is illegal, but people still
     drink and drive.  When it comes to encryption, there's no way to stuff
     that genie back into the bottle.

     In the hypothetical case of a non-escrowed encryption ban, whether or
     not any individual violation would be deemed sufficiently significant
     to be prosecuted in any given case would of course be a matter of
     judgement (based on whatever criteria they choose or are directed to
     use by statute) on the part of the appropriate authorities.
	
     Governments have significant, real concerns regarding the impact on law
     enforcement that strong, non-escrowed encryption might possibly have in
     some situations.  However, other concerns, such as freedom of speech
     and privacy rights, are (or at least should be) among the fundamental
     human rights and also should come into play.

     No freedoms or rights are absolute--it's always a delicate balancing
     act.  But in the opinion of many, the area of encryption is one where
     the most weight should be assigned to the personal privacy side of the
     equation.
					-- MODERATOR ]

------------------------------

Date:    Sun, 20 Aug 1995 11:45:18 -0800
From:    cpreston@alaska.net (Charles M. Preston)
Subject: Newsletter recommendation

   I would like to recommend a new publication called The Jarvis Report.  It
is a quarterly newsletter about industrial espionage, and some technical
tricks of the trade.  Ray Jarvis, who puts out the newsletter, has an
extensive government background in technical surveillance and he provides
classes for government and private security in countermeasures and
associated subjects.  His stated aim is to collect and analyze verifiable
instances of the theft of proprietary information, and to provide an overall
look at trends and problems.
   All 6 sections of the July issue were either useful or entertaining.
This edition includes an account of widespread electronic eavesdropping in
Israel, and suggestions on balanced line detection of series telephone line
transmitters.  
   A newsletter sample (article on Israel) can be found in the Info-Sec
Super Journal area at http://all.net 
   The Jarvis Report is published by Jarvis International 
Intelligence, Inc., 11720 E. 21st Street, Tulsa, OK, 74129
          Tel 918-437-1100       Fax 918-437-1191
  
Charles Preston   Information Integrity   cpreston@alaska.net

------------------------------

Date: Sun, 20 Aug 1995 09:35:01 -0500
From: Quentin Fennessy <Quentin.Fennessy@sematech.org>
Subject: Medicare leak through FOIA analysis and 9-digit ZIP

   [ From Risks-Forum Digest,  Volume 17 : Issue 28  -- MODERATOR ]

I read an article on Medicare in the 20 Aug 1995 _Austin American-Statesman_.
The article was evidently done for the Cox Newspaper chain.  The article
talks of the deterioration of the service, and also touches on that fact
that a handful of doctors earn a disproportionate share of Medicare funds
paid out.

The article has a sidebar, which says, in short: Cox analyzed 100 million
computerized Medicare payment records for the report.  The information was
obtained via FOIA.  The doctors names were not released.  Evidently there is
an ongoing court case to release the doctors' names.  Cox was able to
identify some of the doctors.  The doctor's id codes were obscured by
Medicare, but the 9 digit zip codes of the doctor's offices were not.  Cox
was able to pinpoint individual doctors given this level of detail.

Risks: If information needs to be split into private and public components
then care needs to be taken for the job to be done correctly.  9-digit zip
codes divide the US into fairly small areas and so can (and have) given away
the store.

This is not to say that I think this Medicare information should be kept
secret.  However, 9 digit zip codes in databases can be used to pinpoint all
sorts of details about folks.

Quentin Fennessy  quentin.fennessy@sematech.org

------------------------------

Date:    Tue, 22 Aug 1995 23:48:04 -0700
From:    Phil Agre <pagre@weber.ucsd.edu>
Subject: highway surveillance

The California Department of Transportation (Caltrans) has been conducting
surveys of people who drive particular roadways.  They collect all license
plate numbers of cars driving past a certain point in a certain direction
during a certain window of time, they look those plates up in DMV files,
and they mail survey forms to the people whose names are attached to the
plates.  This practice raises serious civil liberties concerns.  It is
part of a larger push by state and regional transportation authorities
to expand their collection of statistical information on driving patterns.
Although the information they seek is aggregate in nature, it is gathered
through the capture and storage of significant amounts of individually
identifiable information which can be highly sensitive in nature.

This clearly sets a very poor precedent for citizens' ability to drive on
public roads without fear of surveillance.  It is far from clear that the
advantages to the public of creating these additional statistics in this
manner outweigh the danger of chilling the fundamentally important freedom
of association upon which democracy is based.

I have attached the text of the survey that one citizen received in the
mail.  This individual called the ACLU, who suggested passing the survey
along to the Privacy Rights Clearinghouse at the University of San Diego,
from whom I obtained it.  Bold type is bounded by *asterisks*.

     ----------------------------------------------------------- 

  Dear Motorist:

  The California Department of Transportation (Caltrans) is studying
  potential transportation improvements in the Sacramento - Stockton
  region.  We would greatly appreciate your assistance with this effort.

  On *Sunday, March 5, 1995*, Caltrans observed traffic on *Interstate 5*
  between Sacramento and Stockton.  On this day we believe we observed a
  vehicle registered to this address traveling *southbound*.

  Please have the vehicle driver take a few minutes to fill out and
  return the entire survey below.  This response is anonymous; *no
  personal information about you will ever be revealed.*  All records of
  names, addresses, and data sources connected with this survey will be
  destroyed.  Postage is pre-paid.

  If you should have questions regarding the survey or the study please
  call (916) 327-4577.  Thank you for your contribution to this important
  study.

  Sincerely,

  Cindy McKim
  Deputy Director

  If the vehicle license number appearing on the front of this survey
  was recorded in error, please check here [box] and return this form.

     ---------------------------------------------------------

The "Intercity Travel Survey" asks questions about trip origin (home,
work, etc, city, zip, cross streets, time to the minute), destination
(likewise), number of people in the vehicle, frequency with which one
makes such trips, driver's age and sex, how many people live in the
household, how many motor vehicles are owned or used by members of that
household, the household's total annual income (six boxes for successive
income brackets), and "comments or suggestions".

It should be emphasized that this kind of routine surveillance is
probably not now illegal under US law.  For example, the Supreme Court,
in US v. Knotts, 460 U.S. 276 (1982), has asserted that, so far as the
Constitution is concerned, "[a] person traveling in an automobile on
public thoroughfares has no reasonable expectation of privacy in his
movements from one place to another" (at 281).  But that doesn't make
it right.

The Supreme Court made its decision before a reasonable prospect arose
that individuals' travels might be routinely, automatically tracked
from origin to destination on a large scale.  This scenario is becoming
entirely imaginable, however, and proposals to this effect are found
in a variety of documents.  Citizens of Washington State, for example,
recently uncovered a report to the state Department of Transportation by
a prominent consultant suggesting that individuals' movements be routinely
tracked for statistical purposes by automatically tracking their cellular
telephones (see Risks 17.23).

This is a very serious matter.  Individuals who feel they may have been
subjected to automated surveillance on public roadways without probable
cause should certainly make inquiries with their local transportation
authorities and publicize what they learn on the net.

Phil Agre

	[ Another "interesting" system now being deployed here in California
	  is a remote infrared sensing system (combined with automated
	  license plate photography) to try detect (and ultimately subject
	  to various sanctions) vehicles in motion on public roads which
	  exceed emission standards.  The technology appears to be rather
	  unproven however, and reportedly has an annoying tendency toward
	  false positives--sometimes close to 70% false positives!

					-- MODERATOR ]

------------------------------

Date:    Wed, 23 Aug 1995 15:52:46 -0700
From:    Phil Agre <pagre@weber.ucsd.edu>
Subject: Metromail chief loses job over privacy concerns

The Privacy Journal 21(10), August 1995, reports that James D. McQuaid,
CEO of R.R.Donnelley's Metromail company will retire.  Back in December
the Wall Street Journal revealed that Metromail had been making commercial
use of voter registration lists in states where such use is prohibited by
law, and that it had used a fake survey about ice cream to add information
about individuals' ages to the data.  The company then became the subject
of a number of class action lawsuits.  PJ notes that the Direct Marketing
Association "never issued any sanctions against the company".  This is 
bound to raise questions about the effectiveness of self-regulation in
the highly controversial direct marketing industry.

Privacy Journal (PO Box 28577, Providence RI 02908) is an excellent montly
publication edited by Robert Ellis Smith.

Phil Agre

------------------------------

Date:    Fri, 01 Sep 1995 11:57:10 -0600
From:    Richard Owen <Richard.Owen@OAG.STATE.TX.US>
Subject: Security & Privacy

Does anyone know how this works in other states/countries?

In looking forward to the October meeting of the Capital of Texas ISSA
Chapter, which will be a debate on Privacy, does anyone know the official
position on the following question:

When I go to renew my driver's license (or possibly any other state record
or license - this case just came to mind because my wife just got a notice
to renew) they ask for you SSN and it appears may also take a digital photo
and digital image of your finger prints.  If someone else puts in an open
records request for all, or specifically your, Texas Driver's License info
what do they get?  Do they get everything including my SSN, picture, finger
prints, record, etc.?  Is there some way that the individual can protect
themselves and limit what can be given the state agency or limit personal
information the agency can hand out?

Does anyone know the official answers?  Does anyone know of similar
requests, uses, and dissemination of private data by public agencies
(federal, state, or local)?

If someone knows of official limitation in the collection, processing or
dissemination of private information, what controls are used to ensure that
the limits are followed?

------------------------------

Date:    Tue, 22 Aug 1995 01:47:24 -0700
From:    "David Sobel" <sobel@epic.org>
Subject: "New" Crypto Policy Announced: Clipper II?

   [ From Epic Alert 2.09 -- MODERATOR ]

"New" Crypto Policy Announced: Clipper II?

The Clinton Administration ended a year of silence on August 17 when
it issued a long-awaited statement on the Clipper Chip and key-escrow
encryption.  Unfortunately, the "new" policy is merely a re-working of
the old one -- the Administration remains committed to key-escrow
techniques that ensure government agents access to encrypted
communications.  The only changes are a willingness to consider the
export of 64-bit encryption (if "properly escrowed"), the possibility
of private sector escrow agents to serve as key-holders, and
consideration of software implementations of key-escrow technologies.

As EPIC Advisory Board member Whit Diffie observed in an op-ed piece
in the New York Times, the new approach won't work.  "While other
nations may share our interest in reading encrypted messages for law
enforcement purposes, they are unlikely to embrace a system that
leaves them vulnerable to U.S. spying.  They will reject any system
that gives decoding ability to agents in the United States."  Diffie
further notes that "64-bit keys are not expected to be adequate."

In a statement re-printed below, the National Institute of Standards
and Technology (NIST) announced two public workshops "to discuss key
escrow issues."  More information concerning these meetings can be
obtained from Arlene Carlton at NIST, (301) 975-3240, fax: (301)
948-1784, e-mail: carlton@micf.nist.gov.

------------------------------

End of PRIVACY Forum Digest 04.19
************************

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH