Welcome to the Global Internet Liberty Campaign
Newsletter
Welcome to GILC Alert, the newsletter of the Global
Internet Liberty Campaign. We are an international
organization of groups working for cyber-liberties, who
are determined to preserve civil liberties and human
rights on the Internet.
We hope you find this newsletter interesting, and we
very much hope that you will avail yourselves of the
action items in future issues.
If you are a part of an organization that would be
interested in joining GILC, please contact us at
gilc@gilc.org.
If you are aware of threats to cyber liberties that we
may not know about, please contact the GILC members in
your country, or contact GILC as a whole.
Please feel free to redistribute this newsletter to
appropriate forums.
Free Expression
[1] Mainland China restricts Net news
[2] Only 7 new domain names approved
[3] French court ruling boosts blocking
[4] New Australian net censorship rules
[5] US court rulings support anonymous Net
speakers
[6] Indian portal case threatens online
speech
[7] Yahoo's new "inspector" hurts free
expression
[8] US candidate sites blocked by filters
Privacy and Encryption
[9] US gov't conducts blackbag net tapping
break-ins
[10] Carnivore spyware report criticized
[11] UK plan: keep everyone's emails for 7
yrs
[12] Euro anti-privacy "cybercrime" treaty
drafted
[13] New Zealand gov't pushes cybertapping
plan
[14] IBM backs controversial data-profiling
plan
[15] Yahoo unveils crypto email service
[16] UK workplace Net surveillance woes
[17] Airline wants IDs of protest site's
visitors
[18] Study: US Internet users want privacy
safeguards
[19] Nightclub biometric card privacy
problems
[20] New GILC member: Privacy Ukraine
[1] Mainland China restricts Net news
In its fight against online democracy activists,
Mainland China trying several new approaches that may
include Western technology.
Chinese officials have launched a special Golden
Shield Project, which will include web surveillance
cameras in public places and registration files on every
man, woman and child in the country. The idea is to help
government agents shut down demonstrations or other such
activity with greater speed. The Project will also
include filtering software to find and block out
politically taboo messages along the Information
Superhighway. What is notable about this endeavor is that
several major Western companies, including Cisco, Sun
Microsystems and Nortel Networks are marketing their
products and expertise to Communist Chinese leaders for
use within the Golden Shield.
Besides these measures, Beijing has also announced new
heavy restrictions on Internet news reporting. Under
these rules, private websites cannot publish "news"
unless they first get approval from Communist officials.
After receiving the blessing of the government, these
websites still cannot report the news themselves, but
generally must use content provided by state-run news
agencies under special contracts. Even after jumping over
these hurdles, the operators of these webpages must hire
a cadre of experts to oversee their operations-experts
who essentially would have to come from government owned
news bureaus.
Human rights groups and free speech advocates have
voiced fears that these developments will severely
curtail online expression, and have expressed
considerable dismay over the apparent willingness of
Western firms to cooperate with Chinese censors. Judy M.
Chen of Human Rights in China said that "the full
potential of the Internet to contribute to China's
political and social development needs to be fostered by
strong and principled adherence to agreed global
standards of human rights - freedom of expression and
information. Companies which claim to support such values
should, at the very least, demonstrate their
unwillingness to be associated with the use of technology
for repression by avoiding selling such equipment to the
security services in China."
The Digital Freedom Network (DFN-a GILC member) posted
Ms. Chen's comments under http://dfn.org/focus/china/multinationals.htm
Read Martin Fackler, "The Great Fire Wall of China?"
Associated Press, Nov. 8, 2000 at http://abcnews.go.com/sections/tech/DailyNews/chinanet001108.html
See also "China targets 'enemies' on net," BBC News,
Nov. 7, 2000 at http://news.bbc.co.uk/hi/english/world/asia-pacfic/newsid_1010000/1010708.stm
[2] Only 7 new domain names approved
Will we soon see many new Internet domain names,
including .health, .union and so forth? Not exactly.
That is according to the Internet Corporation for
Assigned Names and Numbers (ICANN). ICANN, which is
charged with handling the Internet domain name system,
decided to approve only 7 new domain names: .biz, .pro,
.coop, .museum, .aero, .name, and .info. The decision
came despite increasing evidence that desirable space in
current domain names like .com and .org was quickly
disappearing, and the opinions of numerous technologists
that perhaps millions of new domain names could be
introduced without a significant threat to Internet
stability. Moreover, the application process itself was
apparently hamstrung by ICANN's self-described "very
stringent criteria," which included a $50,000
nonrefundable application fee-a fee that seemed to
discourage many potential proposals to benefit private
individuals and noncommercial groups (such as
.humanrights).
ICANN's refusal to approve these new domain names has
sparked considerable protests, particularly from failed
applicants. Duncan Pruett of the International
Confederation of Free Trade Unions (ICFTU) lamented
ICANN's refusal to back his organizations' proposal from
.union, and said that "the ICANN Board's suggestion that
the ICFTU, whose affiliates include 216 national trade
union centres from all over the world, is not
representative of the global trade union community is
astonishing. While some board members had certainly done
their homework, others seemed to do little justice to
proposals which represent large investments of time and
money." Similarly, the World Health Organization, whose
application for .health was also rejected, said that it
was "extremely disappointed with this outcome" and that
it would "begin immediately to explore ways of
recourse."
Meanwhile, ICANN is also facing criticism over its
decision to conduct a "clean-sheet" study regarding its
internal structures and procedures. Many experts fear
that this study may lead to the end of ICANN public
elections and cause the organization to become even less
democratic than before.
An official ICANN press release on the introduction of
new Top-Level domains is located at http://www.icann.org/announcements/icann-pr16nov00.htm
An ICFTU press release on ICANN's rejection of .union
is available at http://www.icftu.org/displaydocument.asp?Index=991211910&Language=EN
For more on the WHO's response to ICANN's domain name
decision, see http://www.who.int/inf-pr-2000/en/state2000-10.html
For comments from the American Civil Liberties Union
(ACLU-a GILC member) regarding this process, click
http://www.internetdemocracyproject.org/ACLUcomments.htm
For further analysis, read Ben Charny, "Did ICANN help
the rich get richer?" ZDNet News, Nov. 17, 2000 at
http://www.zdnet.com/filters/printerfriendly/0,6061,2655497-2,00.html
See also Mark Ward, "New net domains remain in short
supply," BBC News Online, Nov. 21, 2000 at http://news.bbc.co.uk/low/english/sci/tech/newsid_1033000/1033835.stm
For further background information, visit http://www.internetdemocracyproject.org
[3] French court ruling boosts blocking
A French court ruling against a major web portal
company could have a serious detrimental impact on
Internet free speech.
Yahoo was recently sued for allowing auctions of Nazi
memorabilia on its site in the United States. The suit
was made pursuant to French laws that generally prohibit
such goods from even being advertised, much less sold.
The court ruled against Yahoo and required the company to
block French Internet users from accessing the webpages
in question within three months. If Yahoo fails to
comply, it will have to pay fines amounting to US $13,000
per day.
The ruling has generated criticism from a number of
experts. In a press release, Imaginons un réseau
Internet solidaire (IRIS-a French GILC member) argued
that the court's decision was distressing because it
imposed filtering on the basis of French citizenship
(supposedly deduced from the ISP's IP number) or on the
basis of a mere declaration of citizenship. Moreover,
IRIS contended that the ruling even went beyond the
bounds of French law, which does permit people to view
such materials.
Similarly, Alan Davidson of the Center for Democracy
and Technology (CDT-a GILC member) said that the ruling
"would lead to a lowest-common-denominator world where
the most restrictive rules of any country would govern
all speech on the Internet. What happens when the
government of China decides to prosecute a human rights
group in the U.S. for publishing dissident materials that
are legal here but illegal there?"
Since the decision, Yahoo has stated that it will defy
the court ruling on jurisdictional grounds. The firm also
insisted compliance with the court's edict would be
impossible because current computer programs to block
questionable Internet content are not effective. However,
there is now a similar push to block Yahoo sites in
Germany, where prosecutors are planning to sue the
corporation for allowing the sale of Hitler's "Mein
Kampf" to German citizens, which is forbidden under
German law.
An English-language translation of the decisions is
posted at http://www.istf.org/archive/yahoo_france.html
IRIS's press release (in French) is posted at
http://www.iris.sgdg.org/info-debat/comm-yahoo1100.html
More information on developments in Germany is
available from Steve Kettmann, "German Hate Law: No
Denying It," Wired News, Dec. 15, 2000 at http://www.wired.com/news/print/0,1294,40669,00.html
Read Simon Johanson, "Toben says he won't return for
German trial," The Age (Australia), Dec. 13, 2000 at
http://www.theage.com.au/frontpage/2000/12/13/FFXA25UEOGC.html
See also Steve Gold, "Germany Landmark Nazi Ruling,"
Newsbytes, Dec. 12, 2000 at http://www.newsbytes.com/news/00/159301.html
For more on Yahoo's refusal to abide by the French
court ruling, see "Yahoo! Will Ignore Ban," CBS News,
Nov. 20, 2000 at http://cbsnews.com/now/story/0,1597,250927-412,00.shtml
See also Pierre-Antoine Souchard, "France Calls for
Net 'Zoning'," Associated Press, Nov. 21, 2000 at
http://washingtonpost.com/wp-dyn/articles/A46742-2000Nov20.html
[4] New Australian net censorship rules
Cyberliberties groups are warning that new South
Australian rules may have a chilling effect on Internet
expression.
While details are sketchy, the South Australian
Attorney-General, Trevor Griffin said that the bill would
"make it illegal to make available online matter which
would be illegal if left in a public place offline."
However, the legislation would apparently include
criteria that had previously been used for films and
video tapes, which are more restrictive than those
applicable to books, pamphlets and other printed
materials. Furthermore, the proposal may make it illegal
simply to make sexually explicit material available via
the Internet, even if it is legal to distribute such
materials to adults by regular mail throughout Australia.
Hence, experts are suggesting that these rules would in
fact ban material online that is legal offline, contrary
to Mr. Griffin's assertions. The SA State legislation is
apparently intended to complement and enforce
Commonwealth legislation, which became effective on 1
January 2000 and similarly censors material online that
can legally be published and distributed offline.
Not surprisingly, free speech advocates have fiercely
resisted this plan. Electronic Frontiers Australia (EFA-a
GILC member) issued a statement arguing that "parents are
better placed than Governments to determine whether a
problem exists with their child's use of the Internet."
Indeed, the group noted that potentially far-reaching
impact the proposal would have, and said that "The
physical location of Internet content is a matter of
little relevance. A content provider in any Australian
State or Territory can have content hosted elsewhere in
Australia or any other country." In the end, EFA held
that such "legislative attempts to regulate content on
the Internet should be abandoned."
See EFA's coverage of this issue by visiting http://www.efa.org.au/Campaigns/sabill.html
Read Megan McAuliffe, "South Australian government
censors Net," ZDNet Australia, Nov. 9, 2000 http://www.zdnet.com.au/news/dailynews/story/0,2000011358,20106865,00.htm
[5] US court rulings support anonymous Net
speakers
Several recent court rulings may help protect the
anonymity of speakers online.
In one of these cases, Melvin v. Doe, a Pennsylvania
jurist, Joan Orie Melvin, tried to discover the identity
of her online critics as part of a defamation lawsuit.
State court Judge R. Stanton Wettick Jr. ruled that
"anonymous Internet speakers, unlike the national media,
are vulnerable because they lack power or money. Without
anonymity, speakers will be less willing to express
controversial positions because of fears of reprisal." He
held that the identity of defendant may not be disclosed
until that person has had an opportunity to prove that
the defamation lawsuit is groundless. Ann Beeson of the
American Civil Liberties Union (ACLU-a GILC member), who
was a part of the litigation team, noted the importance
of this ruling, explaining that "[u]ntil today, a
public official or employer claiming defamation could get
a court to disclose the name of an anonymous Web author
simply by filing a lawsuit."
Similarly, in New Jersey, Dendrite International sued
four anonymous Internet users (including two purported
employees) for their statements about the company. New
Jersey Superior Court Judge Kenneth C. MacKenzie denied
Dendrite's request to unmask these speakers.
Subsequently, Paul Levy of Public Citizen (which
intervened in the case) praised the decision: "By setting
forth strict evidentiary standards for compelled
identification, and then showing that these standards can
produce real protection for anonymity, this decision is a
tremendous victory for free speech."
For an ACLU press release regarding the Melvin
decision, click http://www.aclu.org/news/2000/n111500a.html
For more on the New Jersey decision, read Martin
Stone, "Judge Protects Web-Posters' Anonymity,"
Newsbytes, Nov. 30, 2000 at http://www.newsbytes.com/news/00/158764.html
[6] Indian portal case threatens online
speech
Should a person be held responsible for questionable
Internet content that is located on another person's
website?
That is the question being posed by an upcoming
criminal trial against the proprietors of an Indian
search engine. The case arose when a law student
complained that Rediff.com allowed access to pornographic
material. Subsequent police inquiry revealed that the
website did not create or contain any such files, and
acted as a normal general purpose portal for all types of
Internet content. Nevertheless, Judge S. Bhosie claimed
that search engines ought to incorporate filters to block
out objectionable sites, and ordered that Rediff
directors be put on trial. The defendants could be
sentenced to two years in prison.
Bhosie apparently disregarded arguments made by
numerous experts that filtering software programs are
flawed and block out many types of valuable Internet
speech, including sites that have no adult content
whatsoever. A Rediff spokesperson held that
"[e]ven God cannot alter the way a search engine
works. Either you ban Indian sites from using search
engines, which is a ridiculous idea, or you live with the
fact that any Indian user will be able to access porn
sites."
Read Manu Joseph, "Porn a Thorn for Indian Portal,"
Wired News, Dec. 4, 2000 at http://www.wired.com/news/print/0,1294,40432,00.html
[7] Yahoo's new "inspector" hurts free
expression
One of the world's most popular websites is launching
a new program that may severely curtail Internet
expression.
A Yahoo executive admitted that the firm will hire a
special "inspector" to monitor its Messenger system for
questionable content. Martina King, the managing director
of Yahoo in the United Kingdom, said that her company is
working with law enforcement officials as part of this
project. Under this plan, if the inspector discovers
certain types of "unacceptable use," the police will be
notified and joint operations will be carried out to
silence or prosecute the offender. Oddly enough, she even
said that if these officials suggest Yahoo should
shutdown its chat rooms as a proper way to deal with the
purported problems of adult material, she would carry it
out, as part of "a zero-tolerance strategy."
King has further suggested that Yahoo may require
computer users to register using credit card information,
then transfer this data along to the police. It is
unclear what effect these measures will have on Internet
privacy as well as freedom of expression.
Read Richard Barry & Wendy McAuliffe, "Yahoo! vows
to stop pedophiles," ZDNet News, Nov. 24, 2000 at
http://www.zdnet.com/zdnn/stories/news/0,4586,2656730,00.html
[8] US candidate sites blocked by filters
A number of American politicians are thinking twice
about the supposed virtues of Internet filtering
software.
This comes after the websites of several government
office seekers were blocked by such programs as
CyberPatrol. Jeffery Pollock, a conservative Christian
candidate for the United States House of Representatives,
said that he "was quite baffled" when his election
homepage was shutout. Pollock had previously stated that
"We should demand that all public schools and libraries
install and configure Internet Filters." He later
commented, "Now to find out that a lot of schools may
have filtered out my Web site is very disturbing to
me."
Indeed, these concerns were bolstered by a recent
study by Peacefire (a GILC member) and NetElection.org.
Entitled "Blind Ballots: Web Sites of U.S. Political
Candidates Censored by Censorware," this report showed
that together, filtering software packages such as
CyberPatrol and N2H2 Bess censored dozens of websites,
including the homepages of several prominent incumbent
elected officials. The report concluded that
"[w]hile blocking software companies often
justify their errors by pointing out that they are
quickly corrected, this does not help any of the
candidates listed above. Their campaigns have been
sabotaged in our public schools and libraries, and
corrections made after Election Day do not help them at
all."
The joint Peacefire/NetElection.org "Blind Ballots"
study is available under http://peacefire.org/blind-ballots/
See Lisa M. Bowman, "Filtering programs block
candidate sites," ZDNet News, Nov. 8, 2000 at http://www.zdnet.com/zdnn/stories/news/0,4586,2651471,00.html
[9] US gov't conducts blackbag net tapping
break-ins
Privacy advocates are alarmed over revelations that
United States law enforcement officials have conducted
secret break-ins to steal passwords, encryption keys and
other types of sensitive computer-related
information.
Previously, US government officials had sought new
laws that would allow them to conduct these so-called
"blackbag" jobs. These proposals came in the form of both
stand alone bills (such as the Cyberspace Electronic
Security Act) and provisions within other pieces of
legislation (including a recent anti-Methamphetamine
plan). Despite the fact that these proposals never did
become law, recent court documents reveal that government
officials have now gone ahead and conducted at least one
break-in. Operatives from the Federal Bureau of
Investigation (FBI) got a court's permission to
surreptitiously enter a private building and use
"recovery methods which will capture the necessary
key-related information and encrypted [computer]
files." While neither the FBI nor Federal prosecutors
have been forthcoming with information about the
break-in, reports indicated that government agents
installed a keystroke-capture device so that they could
intercept virtually anything that was typed into a
particular computer, including password information.
It is unclear at this point how many other buildings
have been invaded by Federal agents or whether all of the
targets of such break-ins were actually criminals at all.
David Sobel of the Electronic Privacy Information Center
(EPIC-a GILC member) worries: "If we're now talking about
expanding (black bag jobs) to every case in which the
government has an interest where the subject is using a
computer and encryption, the number of break-ins is going
to skyrocket. Break-ins are going to become
commonplace."
The court order is available at http://www.epic.org/crypto/breakin/order.pdf
The FBI's prior application is located under http://www.epic.org/crypto/breakin/application.pdf
Read Declan McCullagh, "FBI Hacks Alleged Mobster,"
Wired News, Dec. 6, 2000 at http://www.wired.com/news/print/0,1294,40541,00.html
See also George Anastasia, "Scarfo case could test
cyber-spying tactic," Philadelphia Inquirer, Dec. 5,
2000, at http://inq.philly.com/content/inquirer/2000/12/04/front_page/JMOB04.htm
For more on the Cyberspace Electronic Security Act,
visit http://www.epic.org/crypto/legislation/cesa/
For background information on the anti-Methamphetamine
bill, read the following press release on this subject
from the American Civil Liberties Union (ACLU-a GILC
member): http://www.aclu.org/news/2000/n072500a.html
[10] Carnivore spyware report criticized
Controversy continues to grow over a US government
spyware program.
After considerable public outcry, the US government
commissioned an "independent" review panel to see whether
Carnivore complies with Federal wiretapping laws, which,
however, contained a large number of White House
insiders, including a former Clinton information policy
advisor, and a former Justice Department official. In a
draft report, the panel ignored questions about the
constitutionality of Carnivore and did not conduct a
number of key tests due to an apparent lack of resources.
Despite the apparent failure of the team to address these
root issues, and despite confirming reports that
"Carnivore can collect everything that passes by on the
Ethernet segment to which it is collected," the panel
somehow concluded that the system "protects privacy and
enables lawful surveillance better than alternatives."
The report also contained curiously condescending
language saying that "the public, service providers and
privacy advocates ... do not understand how electronic
surveillance works."
The report was savaged by many organizations. In
formal comments submitted to the DoJ, the American Civil
Liberties Union (ACLU-a GILC member) mentioned that
"[w]hen the 'independent review' ... was
announced, we expressed substantial reservations about
both the independence of the reviewers and the proposed
scope of their review. ... Having now read the report,
which we note was itself redacted and subject to the
sanitizing authority of the Justice Department, our
concerns have been reinforced." Among other things, the
ACLU pointed out that "despite repeated assertions to the
contrary from the FBI, the report concludes that
Carnivore has no effective auditing function that would
expose and prevent abuses." Moreover, while "the review
team recommends against the immediate public release of
Carnivore source code, out of the fear that Internet
users will use the information to exploit its
weaknesses," the ACLU argued that "[t]his fear is
belied by the detailed descriptions (contained within the
report) of numerous Carnivore flaws."
In short, as David Sobel from the Electronic Privacy
Information Center (EPIC-a GILC member) pointed out in
his comments to the DoJ, "Despite FBI claims that the
review has vindicated Carnivore, it has actually
validated many of the privacy concerns that have been
voiced by the public and members of Congress. Internet
users won't find much comfort in the review team's
report. Private communications are very much at
risk."
The Final version of the Carnivore review team report
is available (in PDF Format) under http://www.usdoj.gov/jmd/publications/carniv_final.pdf
To see EPIC's collection of Carnivore FOIA documents,
click http://www.epic.org/privacy/carnivore/foia_documents.html
The ACLU's comments on the review team draft report
are available under http://www.aclu.org/news/2000/carnivore_comments.html
EPIC's comments on the review team draft report are
posted at http://www.epic.org/privacy/carnivore/review_comments.html
A critique of the IITRI report by a special panel of
experts (including Matt Blaze, Steven Bellovin and
others) can be seen at http://www.crypto.com/papers/carnivore_report_comments.html
See D. Ian Hopper, "'Carnivore' Report Questioned,"
Associated Press, Nov. 22, 2000 at http://www.abcnews.go.com/sections/tech/DailyNews/carnivore001122.html
See also Brian Krebs, "Senate Judiciary Committee
Keeps Pressure On FBI's Carnivore," Newsbytes, Nov. 28,
2000 at http://www.newsbytes.com/news/00/158690.html
[11] UK plan: keep everyone's emails for 7
yrs
Here's an idea to stop cybercrime: let the government
collect and read all email messages sent along the
network, then keep those messages for several years at a
time.
That's apparently the plan being considered by the
British Home Office. Several law enforcement agencies in
the United Kingdom (including M.I.5, M.I.6 and others)
are seeking laws to record every email and phone call
made (as well as every webpage accessed) in the nation
and retain the records for 7 years. Implementation of
this "data warehouse" scheme is expected to cost several
million pounds. The proposal was revealed in a restricted
document written by Roger Gaspar of the British National
Intelligence Service on behalf of several groups,
including Great Britain's Government Communications
Headquarters (GCHQ). GCHQ in the past has been linked
with ECHELON, a super-secret system designed to intercept
communications from around the world that principally
operated by the US National Security Agency (NSA).
These revelations have ignited a firestorm of
criticism. Opposition party leader Lord Cope stated that
he and many other people "are sympathetic to the need for
greater powers to fight modern types of crime. But vast
banks of information on every member of the public can
quickly slip into the world of Big Brother." Indeed, a
number of observers believe that the plan would violate
numerous international accords, including the Human
Rights Act and the European Union data privacy directive.
Not surprisingly, the office of the European Data
Protection Commissioner has said it has "grave concerns"
about the entire project. Additionally, John Wadham from
the National Council for Civil Liberties (Liberty-a GILC
member) warned that if the proposal is approved, "we will
challenge this in the courts in this country and the
European court of human rights."
Read Kamal Ahmed, "Secret plan to spy on all British
phone calls," The Observer, Dec. 3, 2000 at http://www.observer.co.uk/Print/0,3848,4099838,00.html
The original proposal paper is available online under
http://cryptome.org/ncis-carnivore.htm
For more of John Wadham's remarks, see Richard
Norton-Taylor, "Spies seek access to phone, email and net
links," The Guardian, Dec. 4, 2000 at http://www.guardian.co.uk/uk_news/story/0,3604,406439,00.html
[12] Euro anti-privacy treaty receives
backlash
Controversy continues to swirl around a new version of
a proposed cybercrime convention, which privacy advocates
say will allow massive government surveillance
online.
Among other things, this new draft of a Council of
Europe proposal would have signatory countries enact laws
that might make it easier for government agents to search
computers and conduct real-time surveillance on private
citizens through telecommunications networks. The
convention includes provisions which may allow law
enforcement officials greater access to many types of
personal security information, such as encryption keys.
Additionally, the scheme could make Internet service
providers (ISPs) liable for their customers' content, and
may lead ISPs to monitor and retain records on customer
activities. Furthermore, the draft treaty mandates
signatories to create new harsh penalties for copyright
infringement.
Minor changes were made to the convention partly in
response to a previous Global Internet Liberty Campaign
statement, which had condemned an earlier draft of the
treaty. Subsequently, the Campaign said in a second
letter that "To our dismay and alarm, the convention
continues to be a document that threatens the rights of
the individual while extending the powers of police
authorities, creates a low-barrier protection of rights
uniformly across borders, and ignores highly-regarded
data protection principles. Although some changes have
been made ... we remain dissatisfied with the substance
of the convention. We question the validity of the
process that still endures a closed environment and
secrecy." In addition, many companies have expressed
anxiety because they fear they will burdened with high
installation costs. This has apparently already happened
in the Netherlands, where Dutch Internet service
providers (ISPs) have passed along the costs to ordinary
computer users by raising access fees by up to 25%. Yet
despite these apparent problems, similar anti-cybercrime
proposals are sprouting up around the world, from Hong
Kong to Germany.
To read the latest draft (no. 24 rev. 2) of the
treaty, click http://conventions.coe.int/treaty/EN/projets/cybercrime24.htm
The GILC letter in response to version 24-2 of the
cybercrime convention is posted at http://www.gilc.org/privacy/coe-letter-1200.html
For a German translation, of this statement, click
http://www.quintessenz.org/gilc-coe-de-1200.html
A French translation is available at http://www.iris.sgdg.org/actions/cybercrime/gilc-coe-fr-1200.html
To see the first GILC statement, click http://www.gilc.org/privacy/coe-letter-1000.html
For the latest press coverage on this subject, see
Mark Ward, "Cybercrime treaty condemned," BBC News
Online, Dec. 18, 2000 at http://news.bbc.co.uk/hi/english/sci/tech/newsid_1072000/1072580.stm
"Cybercrime pact steps on privacy, groups say,"
Reuters, Dec. 14, 2000 at http://www.cnn.com/2000/TECH/computing/12/14/cybercrime.reut/index.html
Read Robert Lemos, "Cybercrime treaty still doesn't
cut it," ZDNet News, Dec. 13, 2000 at http://www.zdnet.com/zdnn/stories/news/0,4586,2664493,00.html
For a special dossier of cybercrime materials created
by Imaginons un Reseau Internet Solidaire (IRIS-a GILC
member), visit http://www.iris.sgdg.org/actions/cybercrime
For additional background information, visit the
Center for Democracy and Technology website under
http://www.cdt.org/international/cybercrime/
For more on the plight of Dutch ISPs, see Joris Evers,
"Dutch ISPs to Pass Along Cybercrime Costs," IDG News,
Dec. 4, 2000 at http://www.thestandard.com/article/display/0,1151,20571,00.html
For more on the Hong Kong government's new cybercrime
plans, see Adam Creed, "Hong Kong Govt Proposes New Laws
To Tackle Cyber Crime," Newsbytes, Dec. 4, 2000 at
http://www.newsbytes.com/news/00/158894.html
For more on recent German plans for Internet
surveillance, read Rick Perera, "German Officials Warn of
Net 'Big Brother'," IDG News, Dec. 6, 2000 at http://www.thestandard.com/article/display/0,1151,20635,00.html
[13] New Zealand gov't unveils cybertapping
plan
A recent New Zealand government proposal may
significantly erode online privacy.
The Crimes Amendment Bill would apparently allow law
enforcement agents to secretly break into the computers
of unsuspecting users. Under the proposal, individuals
could be forced to divulge their passwords or hand over
their encryption keys to the government. In addition,
Internet service providers and other communications
companies may have to build spyware into their networks
to fulfill the requirements of New Zealand security
forces. Observers have noted similarities between this
scheme and similar measures adopted in other countries,
such as the British Regulation of Investigatory Powers
Act (RIP) and the United States Communications Assistance
for Law Enforcement Act (CALEA).
While the plan is supposedly meant to deter
cybercrime, critics claim that the Bill is really
designed to expand police surveillance powers on a
massive scale. To wit, New Zealand's Information Minister
Paul Swain, claimed that he had been given "an absolute
assurance that law-abiding citizens who are not involved
in criminal activity have nothing to fear from this
legislation." However, it is not clear just what specific
language would safeguard citizens from unnecessarily
intrusive government behavior.
Not surprisingly, the Bill has run into considerable
opposition. Keith Locke, a member of New Zealand's
Parliament, called the legislation "draconian" and is
supporting a petition drive to keep law enforcement
officials from intercepting email transmissions. He also
called on fellow politicians to extend the comment period
for the proposal (which currently ends on February 9),
saying that the "Internet is abuzz with protest" and that
the short timeframe for submissions may prevent these
dissenting voices from being heard.
For more on the Crime Amendment Bill, see Nicky Hager,
"International co-operation in internet surveillance,"
Heise Telepolis, Nov. 22, 2000 at http://www.heise.de/tp/english/special/enfo/4306/1.html
For more of Keith Locke's comments, read Adam Creed,
"New Zealand MP Unhappy With Anti-Hacking Bill Process,"
Newsbytes, Nov. 30, 2000 at http://www.newsbytes.com/news/00/158760.html
[14] IBM backs controversial data-profiling
plan
Several major corporations are formulating a new
computerized database system that critics say will have
an adverse impact on individual privacy.
IBM, MicroStrategy Inc., First Union Corp. and several
other companies are pushing a Customer Profile Exchange
standard that will allow large companies to more easily
transfer data files on ordinary citizens. These files
will not be restricted merely to names, email addresses
and telephone numbers; they will include such details as
passport numbers, national identifiers, taxpayer
identifications numbers, marital status, hobbies,
occupations, and even smoking habits. The system will be
completely automated, so that all of these tidbits can be
reduced to an XML formatted file and sent on to countless
companies at the click of a button.
Privacy groups have expressed dismay at these
developments, which they say could allow large scale
corporate tracking of individuals, as well as invite
fraud by creating a massive database that may then become
a huge target for criminals. Lauren Gelman from the
Electronic Frontier Foundation (EFF-a GILC member) noted
that the dearth of strong privacy regulations that could
prevent such intrusive behavior. "There are no standards
for what they can and cannot do. The privacy protection
is not something you can build into a system designed to
ease the exchange of information."
Indeed, a number of prominent lawmakers have raised
red flags over the new plan. Senator Richard Shelby wrote
a letter to the head of the United States Federal Trade
Commission (FTC), saying that though the IBM proposal "is
intended to enhance commercial activity, I am troubled
that insufficient attention has been given to the
negative ramifications that the use of this exchange will
have on the privacy of American consumers. When this
standard is put in practice, the personal information of
hundreds of millions of Americans will be readily and
widely available." He called for the FTC to investigate
the potential privacy problems that the new database
system might cause.
Senator Shelby's remarks are posted at http://www.senate.gov/~shelby/press/prsrs373.htm
See also Robert O'Harrow Jr., "Internet Firms Act to
Ease Sharing of Personal Data," Washington Post, Dec. 5,
2000, page E1 at http://washingtonpost.com/wp-dyn/articles/A23676-2000Dec4.html
[15] Yahoo unveils crypto email service
One of the world's largest search engine companies
will soon offer encrypted email service.
To do this, Yahoo has teamed up with Zixit Corporation
to add an encryption function into its free email
software. Under this system, users who receive encoded
transmissions will receive special notifications. The
recipients would then click links contained within the
notification messages to read the underlying encrypted
emails, via securedelivery.com, which is run by Zixit.
However, Yahoo has already informed potential applicants
that "this is not an end-to-end secure service."
Specifically, email messages sent under this plan are
only encrypted after they travel from users' computers to
Yahoo's servers. The entire system should be operational
sometime within the next few months.
Yahoo's new encrypted web-based email program is just
one of several emerging technologies that are just now
becoming available to consumers. Several weeks ago, Hush
Communications and Cyber-Rights & Cyber-Liberties UK
(a GILC member) joined forces to create a free service,
Cyber-Rights.Net, which allows users to send and receive
email that is encrypted and secured from end-to-end,
assuming both the recipient and the sender use Hushmail
on their computers. Because the system is web-based,
registrants can utilize Cyber-Rights.Net from any
location in the world that has Internet access.
Cyber-Rights.Net is part of a campaign against the
controversial British Regulation of Investigatory Powers
Act (RIP) 2000, which passed into law this past October
and has been heavily criticized by privacy advocates.
Read Dick Kelsey, "Yahoo Intros Encrypted E-mail
Delivery," Newsbytes, Nov. 29, 2000 at http://www.newsbytes.com/news/00/158750.html
See Paul Festa, "Yahoo! delivers encrypted email,"
CNet News, Nov. 29, 2000 at http://news.cnet.com/news/0-1005-200-3901784.html
The Cyber-Rights.net homepage is located at http://www.cyber-rights.net
[16] UK workplace Net surveillance woes
New questions have arisen over the extent to which
British bosses can monitor their workers online.
These questions come after the British Parliament
enacted the much-maligned Regulation of Investigatory
Powers Act (RIP), which many people feel will enable
government agents to conduct wide scale searches into the
activities of private Internet users. The Act includes
language stating that employers have a legal right to
monitor their workers. Since then, the British Data
Protection Commission has issued a draft code that would
place restrictions on this supposed right, including
fines against firms that violate the code. Yet despite
these restraints, a Commission spokesperson claimed that
they did not contradict the language of RIP.
This series of events has led to considerable
confusion. The British Chamber of Commerce is now arguing
that companies should ban all non-business use of their
email systems to avoid liability under the code. By
contrast, a Data Protection Commission spokesman
suggested that corporations "should look at the real
risks and introduce solutions that are least intrusive."
It is not known whether the draft will be revised to
further protect the privacy of employees before it is
scheduled to become law in the spring.
Read Will Knight, "Could employers ban personal
email?" ZDNet UK, Nov. 28, 2000 at http://www.zdnet.co.uk/news/2000/47/ns-19354.html
See also Jane Wakefield, "Cable company sacks six for
email 'misuse'," ZDNet UK, Nov. 29, 2000 at http://www.zdnet.co.uk/news/2000/47/ns-19364.html
[17] Airline wants IDs of protest site's
visitors
A major US air carrier is trying to discover personal
information about its online critics.
United Airlines is seeking to identify visitors to
www.the-mechanic.com, which purportedly was popular with
union member employees. United had previously gone to
court and won a restraining order that banned its
mechanics from taking part in certain labor-related job
actions (such as strikes). However, the company went
further by getting a subpoena for data regarding 30 or so
people who had posted messages on the message board of
the aforementioned site. It tried to justify its action
by claiming that merely expressing views through the
Internet was tantamount to engaging in the sort of job
actions that were banned in the restraining order. In the
words of United spokesperson Andy Plews, "It is clear the
temporary restraining order is not being complied
with."
Dennis Sanderson, who runs www.the-mechanic.com,
vehemently objected to these suggestions from airline
officials, and noted the intimidating nature of United's
court maneuvers: "The objective of the whole thing is to
shut the Web site down. I'm no constitutional lawyer, but
don't people have a right to disagree with corporate
management?" For his part, Sanderson not only denied
taking part in any job action, but said he had no
official role in the union that represents United's
mechanics and had not received any sport from the
group.
See Marilyn Adams & David Field, "United Seeks
Identities of Web Site's Users," USA Today, Nov. 28, 2000
at http://www.usatoday.com/life/cyber/tech/cti846.htm
[18] Study: US Internet users want privacy
safeguards
Many American Internet users would like to see
stronger protection of their privacy online rights.
That is the apparent conclusion of a recent study
entitled "Public Records and the Responsible Use of
Information." In this report, a whopping 88% of
respondents said that they are at least "somewhat
concerned" about the possibility that their personal data
may be abused. 84% of those polled were against the
online display of public records that contain personal
information. Over 60% of the users would be willing to
pass along such information, but only if the entity
seeking this data asked their permission first-a process
known as opt-in.
Read David McGuire, "Americans Cautiously Willing To
Share Info Online-Study," Newsbytes, Nov. 30, 2000 at
http://www.newsbytes.com/news/00/158801.html
See also Brian Krebs, "Privacy, Info Reliability Key
Issues For Internet Users," Newsbytes, Nov. 30, 2000 at
http://www.newsbytes.com/news/00/158794.html
[19] Nightclub biometric card privacy
problems
Privacy advocates are concerned about new biometric
identification cards that are being issued by European
discotheques.
These cards contain sensitive personal information
including the holder's fingerprints, as well as the
number of times the holder has been to a particular club.
The technology is in part used for identification
purposes; individuals can use these cards to log on to
the Internet, enter clubs, and even acquire everyday
items such as beverages. However, the system also
apparently allows nightspot owners and other interested
parties to track users both in clubs and online. Indeed,
a spokesperson for Interstrat ICT Group, one of the
system's creators, boasted that "[d]ue to the
stored biometrics, the card is a 'powerful' and extremely
'fair' entrance control tool."
Many experts are worried that these cards will have a
damaging effect on individual privacy. Indeed, it is
unclear whether this system conforms with European Union
data privacy directives. Yet despite these difficulties,
Interstrat is hoping to expand the system into other
countries, including the United States.
Read Jennifer Askin, "Cyber Bouncer," ABCNews.com
(US), Nov. 30, 2000 at http://www.abcnews.go.com/sections/world/DailyNews/britain_cyberbouncers0011
30.html
[20] New GILC member: Privacy Ukraine
The Global Internet Liberty Campaign recently welcomed
a new member: Privacy Ukraine.
Founded in 1999, this non-profit organization is a
strong advocate of privacy rights and free expression
throughout the former Soviet republic. The group has
successfully launched a special project entitled
"Assistance to the development of right to privacy in
Ukraine." This initiative has fostered greater government
deference to the privacy values, and has been involved
with the revision and presentation of an alternative
draft Ukrainian Data Protection directive. The project
has also created a Ukrainian-language international
privacy law sourcebook. In the past, Privacy Ukraine has
actively cooperated with the Parliament Committee on
Legal Policy, the State Telecommunication Committee, the
Ministry of Justice, Council of Europe Data Protection
Unit. It has also collaborated with several other GILC
member organizations, including Privacy International,
the Electronic Privacy Information Center (EPIC),
Cyber-Rights & Cyber-Liberties UK.
Privacy Ukraine can be contacted by e-mail via
privacy@ukrnet.net
ABOUT THE GILC NEWS ALERT:
The GILC News Alert is the newsletter of the Global
Internet Liberty Campaign, an international coalition of
organizations working to protect and enhance online civil
liberties and human rights. Organizations are invited to
join GILC by contacting us at gilc@gilc.org.
To alert members about threats to cyber liberties, please
contact members from your country or send a message to
the general GILC address.
To submit information about upcoming events, new
activist tools and news stories, contact: GILC
Coordinator, American Civil Liberties Union 125 Broad
Street 17thFloor, New York, New York 10004 USA. email:
gilcedit@aclu.org
More information about GILC members and news is
available at http://www.gilc.org.
You may re-print or redistribute the GILC NEWS ALERT
freely. To subscribe to the alert, please send an mail to
gilc-announce@gilc.org
with the following message in the body: subscribe
gilc-announce
PUBLICATION OF THIS NEWSLETTER IS MADE POSSIBLE BY A
GRANT FROM THE OPEN SOCIETY INSTITUTE (OSI)