GLOBAL

INTERNET

LIBERTY

CAMPAIGN



NEWS

 GILC Actions 

 Presswire 


ISSUES

 Free Speech 

 Privacy 

 Cryptography

 Access


RESOURCES

 GILC Alert 

 Mailing List
 GILC Events 


ABOUT GILC

 Principles

 Members 

 Mail GILC 


Home Page

US Site
European Mirror

 

GILC Alert
Volume 5, Issue 2

March 29, 2001

 

Welcome to the Global Internet Liberty Campaign Newsletter

             

Welcome to GILC Alert, the newsletter of the Global Internet Liberty Campaign. We are an international organization of groups working for cyber-liberties, who are determined to preserve civil liberties and human rights on the Internet.

We hope you find this newsletter interesting, and we very much hope that you will avail yourselves of the action items in future issues.

If you are a part of an organization that would be interested in joining GILC, please contact us at gilc@gilc.org.

If you are aware of threats to cyber liberties that we may not know about, please contact the GILC members in your country, or contact GILC as a whole.

Please feel free to redistribute this newsletter to appropriate forums.


Free Expression

[1] British children face censors, spyware
[2] New Communist Chinese censorware and shutdowns
[3] Aussies face email bans & Net censor bills
[4] New Saudi Internet restrictions
[5] New US blocking law challenged
[6] Who will control .com, .net and .org?
[7] German Nazi website case muddled
[8] New copy protection schemes may curb fair use
[9] US Gov't seeks Supreme Court Net speech ruling
[10] 2nd round for DVD weblinks case
[11] Japanese plan: ISPs to become censors
[12] New anonymous net posting battles
[13] Cuba's continuing Internet woes
[14] UK plans may criminalize online protests

Privacy and Encryption

[15] Music companies & gov't spies: perfect together?
[16] DoubleClick launches new tracking program
[17] ECHELON spyware plug-ins: Oasis & FLUENT
[18] Euro privacy panel attacks cybercrime plan
[19] UK email surveillance regulations stall
[20] Hotmail/Microsoft selling user info
[21] Voter.com user political data auction
[22] New online breaches affect even celebrities
[23] New Privacy Coalition formed
[24] Privacy software in the works
[25] CFP 2001 Conference held

[26] New GILC members: APC and CCC


[1] British children face censors, spyware

It's a "good practice" to censor the Internet and spy on children.

That's what detractors are saying about new plans being pushed by the British Department of Education and Employment (DfEE) that are supposed to protect children from harmful content. Among other things, these guidelines stipulate: "All schools have a responsibility to filter both access at school and any access pupils are given as part of home-school links," despite the admitted fact that "no filtering software is foolproof." These proposals also support "keyboard monitoring products" to track exactly what children type into computers. This scheme does advise schools to keep individual student email addresses private; however, it also envisions "treating all incoming and outgoing email as public" and thus allowing the government conduct heavy surveillance of otherwise private email messages.

One example provided in these materials of "good practice" is Denbigh School, which proudly censors soccer sites and other Internet materials that have nothing to do with sex or violence. Students are completely banned from certain types of Internet transmissions, including all newsgroups, regardless of content. Interestingly, the official account also admits that "biology students suffered" when certain sites were blocked. The school has now implemented a point-based system to spy on students and measure their viewing of webpages that are deemed controversial. Students who try to visit the websites they want in spite of this system (such as the homepage of soccer powerhouse Manchester United) will lose points; once budding cybercitizens reach zero, they are automatically logged out, and teachers are notified of their activities.

These developments come after even harsher measures were taken by authorities in Glasgow, Scotland. A local council ordered 33 libraries to stop providing Internet access, after discovering that children were able to access to nude images online using library computers. Oddly enough, in spite of the council's purported concerns for young people, the decision apparently cut off Internet access for adults as well as children. Glasgow libraries were forced to stay away from the online world pending the installation of new blocking software on all library computers, which was scheduled to take several weeks. Ironically, the council had considering installing such programs in the past, but had shelved these plans because it prevented access to many types of non-controversial Internet content, such as newspaper websites.

To read more about Denbigh school's censoring of soccer sites, click http://safety.ngfl.gov.uk/document.php3?D=d31

The full DfEE guidelines are available under http://safety.ngfl.gov.uk

Read Wendy McAuliffe, "Glasgow libraries ban Internet access," ZDNet UK, Mar. 5, 2001 at http://www.zdnet.co.uk/news/2001/9/ns-21339.html


[2] New Communist Chinese censorware & shutdowns

After a recent network outage, Chinese citizens are facing additional hurdles to expressing themselves through the Internet.

Mainland Chinese agents have developed new powerful blocking software to stop online dissent. Internet Police 110 comes in three different versions (home, cafes and schools), but all versions are target "unhealthy information" regarding "cults, sex and violence"-an apparent reference to dissident groups such as the Falun Gong. The program blocks both domestic and foreign websites, as well as various forms of Internet messaging, in addition to monitoring user activity. One Communist official expressed the fervent belief that the software would "help purify China's Internet service."

At the same time, Chinese commissars have also stepped up attempts to close down unrestricted Internet establishments. Government agents have run several sweeps against Beijing cybercafes and closed down several of them, on the grounds that they did not possess proper licenses. Communist Chinese laws require all cybercafes to apply for certificates from the state public security bureau and install blocking software packages. Various dissidents have been jailed, including Jiang Shihua, who received a two-year prison sentence for pro-democracy statements that he posted in an Internet chatroom several months ago.

These efforts at censorship have intensified after a recent explosion at a school in the southern town of Fanglin. Many local residents (including parents of several of the victims) allege that the school was forcing children to assemble dangerous fireworks. In response, government officials have been trying to suppress the story both online and otherwise. As part of this endeavor, Communist agents have removed several hundred critical chatroom messages on the subject, according to various reports. However, these widescale protests apparently did help force Chinese Prime Minister Zhu Rongji to issue a public apology for the incident.

For further details and audio press coverage of attempts to suppress online criticism after the Fanglin school explosion, see "Beijing accused of school blast cover-up," BBC News, Mar. 9, 2001 at http://news.bbc.co.uk/hi/english/world/asia-pacific/newsid_1210000/1210522.stm

See also Joanne Lee-Young & Sharon Walsh, "Beijing Backs Down on School Explosion Story," The Industry Standard, Mar. 16, 2001 at http://www.thestandard.com/article/display/0,1151,22915,00.html

To read about the case of Jiang Shihua, see "China jails teacher over Web remark," Associated Press, Mar. 12, 2001 at http://salon.com/mwt/wire/2001/03/12/china_teacher/index.html

For additional information on new Chinese censorware products, see "Chinese police develop software to 'purify' the Net," Reuters, Feb. 27, 2001 at http://www.zdnet.com/zdnn/stories/news/0,4586,2690371,00.html

For more on Chinese prosecution of cybercafes, read "Beijing police pull plug on illegal Internet cafes," China Online, Feb. 23, 2001 at http://www.chinaonline.com/topstories/010223/1/C01021611.asp

See also "Undersea cable repair restores China's Internet connection," China Online, Feb. 20, 2001 at http://www.chinaonline.com/industry/infotech/NewsArchive/Secure/2001/Februar y/C01021609.asp


[3] Aussies face email bans & Net censor bills

It may be getting more difficult for Internet users Down Under to speak out online.

For one thing, newly enacted Australian copyright laws may prohibit the forwarding of certain email messages. In a press release, Australia's Attorney General, Daryl Williams, said that forwarding "a personal e-mail is unlikely to breach copyright laws," but then cryptically suggested that liability could result if a court determined that "the contents of the e-mail were an 'original literary work.'" Other legal experts have suggested that this ban may apply to many other types of Internet content, including mere caches. Maurice Gonsalves from the law firm of Mallesons Stephen Jaques noted that "the legislation is ambiguous" and "isn't specific enough to know what type of caching is and what type isn't permitted."

These legal clouds have left many educators and free speech advocates feeling uneasy. Nick Smith, who advises Australian libraries on copyright issues, warned that the new law would hurt educational institutions as they "try to provide the services they want to provide in the digital environment." In particular, Smith was concerned that copyright restrictions would create "a real impediment in the way of digitizing national collections."

Meanwhile, controversy continues to swell over a new South Australian bill that would further criminalize online speech. The proposal would make it a crime to post "matter unsuitable for minors" on the Internet, even if the material is screened or protected by passwords. The legislation would use criteria previously applied to films and videos, which are more restrictive than those applicable to books, pamphlets and other printed materials. Furthermore, under the proposal, it would be illegal to make sexually explicit material available via the Internet, regardless of the fact that it is legal to distribute such materials to adults by regular mail throughout Australia.

Numerous groups have savaged the bill. Electronic Frontiers Australia (EFA-a GILC member) highlighted how the legislation might make "it a criminal offence to make information available to adults about 'adult themes' including 'suicide, crime, corruption, marital problems, emotional trauma, drug and alcohol dependency, death and serious illness, racism, religious issues', except in a 'discreet' manner, that is, 'with little or no detail and generally brief.'" EFA Executive Director Irene Graham fears that "this Bill has the potential to be used to victimise people. It sets up the situation where only one person needs to complain about a site and it could be determined to be illegal. The law could be used to target people who upset the government, for example." In addition, industry executives are worried that the proposal, if enacted, would reduce job opportunities in the region and lead many information technology workers to move offshore.

Mr. Williams' press release is posted under http://www.law.gov.au/aghome/agnews/2001newsag/931_01.htm

See Thomas C. Greene, "Aussie AG denies e-mail penalty, sort of," The Register (UK), Mar. 5, 2001 at http://www.theregister.co.uk/content/6/17350.html

Read "Email forwarding law exempts personal messages, attorney general says," Sydney Morning Herald, Mar. 5, 2001 at http://www.theage.com.au/breaking/0103/05/A26800-2001Mar5.html

See also Rachel Lebihan, "Digital Copyright Act 'ambiguous,'" ZDNet Australia, Mar. 7, 2001 at http://www.zdnet.com.au/news/dailynews/story/0,2000013063,20207522,00.htm

To read EFA's alert on South Australia's new Internet content bill, click http://www.efa.org.au/Campaigns/alert0301.html

See Karen Dearne, "Censor Bill gets R rating," Australian IT, Feb. 27, 2001 at http://australianit.news.com.au/common/storyPage/0,3811,1751598%255E501,00.html

To learn more about industry fears regarding the South Australian bill, see Karen Dearne, "Censor Bill 'threatens' IT jobs growth," Australian IT, Mar. 6, 2001 at http://australianit.news.com.au/common/storyPage/0,3811,1773311%255E442,00.html


[4] New Saudi Internet restrictions

The government of Saudi Arabia has unveiled new measures to clamp down on certain types of Internet speech.

These standards were set forth in a recent Council of Ministers resolution. Under this regime, "All Internet users in the Kingdom of Saudi Arabia shall refrain from publishing or accessing data" that contains a variety of taboo subjects. The list includes statements that somehow infringe "the sanctity of Islam," "reports" that are deemed "damaging to the Saudi Arabian armed forces or to the dignity of heads of states," and transmissions that propagate "subversive ideas." These regulations also include stringent licensing and personal identification regimes. They restrict all Internet traffic to a single choke point--an "internet service unit at King Abdulaziz city for sciences and technology" in the capital, Riyadh, where "subversive ideas" and other such data can be blocked with ease.

To read the full text of the new rules, visit http://www.al-bab.com/media/docs/saudi.htm

See Brian Whitaker, "Losing the Saudi cyberwar," The Guardian, Feb. 26, 2001 at http://www.guardianunlimited.co.uk/elsewhere/journalist/story/0,7792,443261, 00.html


[5] New US blocking law challenged

Numerous groups are suing against a new United States law that mandates blocking software.

The so-called "Children's Internet Protection Act" was included as part of a Labor-Health and Human Resources appropriations bill, and combines several different filtering schemes. Among other things, the law essentially requires high schools and libraries to include blocking software on all of their computers. Institutions that refuse to do so (or implement policies to that effect) would lose federal funding. CIPA was approved despite vociferous objections from a broad coalition of groups, including GILC members the American Civil Liberties Union (ACLU), the Electronic Frontier Foundation (EFF) and the Center for Democracy and Technology (CDT).

After Congress enacted CIPA, the ACLU and the American Library Association (ALA) each filed lawsuits to strike down the law. ACLU staff attorney Ann Beeson noted that with the new Act, "The government is choking off the free flow of information on the Internet to the library patrons who need it the most," particularly minority and underprivileged children who cannot afford to have home Internet access and must depend on libraries to go online. Similar sentiments were voiced by ALA President Nancy Kranich: "Forcing libraries to choose between funding and censorship means millions of library users will lose - particularly those in the most poverty-stricken and geographically isolated areas of the country."

The ACLU's complaint is posted under http://www.aclu.org/court/multnomah.pdf

An ACLU press release on the CIPA lawsuit is available under http://www.aclu.org/features/f032001a.html

The ALA complaint is available via http://www.ala.org/cipa/cipacomplaint.pdf

An ALA press release on its CIPA lawsuit is posted at http://www.ala.org/cipa/cipapressrelease.html

Read Robert O'Harrow, "Curbs on Web Access Face Attack," Washington Post, Mar. 20, 2001, page A4 at http://washingtonpost.com/wp-dyn/articles/A28922-2001Mar19.html

See also "Internet Filter Law Facing Court Challenge," ABCNews.com (US), Mar. 20, 2001 at http://abcnews.go.com/sections/scitech/DailyNews/internet_filters010320.html


[6] Who will control .com, .net and .org?

Serious questions have arisen over the future of several well-known Internet suffixes.

During a public forum in Melbourne, Australia, the Internet Corporation for Assigned Names and Numbers (ICANN) drew fierce criticism over proposed contracts that would allow domain name giant Verisign to retain its powers over .com through at least 2007. Under these plans, Verisign would also retain a substantial level of control over two other key Top-Level Domains for several years, including .org (through December 2002) and .net (through December 2006).

Many attendees expressed concern over the apparently undemocratic approach with which these contracts were created, as well as the potential effects the agreements may have on competition and free expression. Indeed, ICANN's Board of Directors refused to make a final decision on this matter during its public meetings Down Under, but scheduled a private conference call on April 2, 2001 for this purpose.

These concerns have been reinforced by persistent signs that recognizable domain names are becoming scarce, and the possibility that this artificial scarcity problem may undercut free speech. Nevertheless, despite these problems, ICANN officials admitted during the Melbourne meeting that they have failed to complete negotiations to bring just 7 new Top-Level domains online. Moreover, the World Intellectual Property Organization is now seeking new "Best Practices" guidelines to be implemented within various country code domain names-a move that detractors say will further skew online expression to the benefit of large conglomerates and other powerful trademark holders.

Further doubts as to ICANN's legitimacy have been brought out in the wake of an initiative by New.net to allow computer users to use alternative web domains such as .family and many others. This initiative works through a special downloadable program that plugs into web browsers (such as Internet Explorer and Netscape) and reroutes queries to the new domains. ICANN Chairman Vint Cerf attacked the New.net program, calling it a mere "trick" and "sleight of hand" that would have little real impact on the Internet as a whole. However, several observers note that these and other efforts are evidence of growing disenchantment with ICANN. Professor A. Michael Froomkin from the University of Miami (Florida) said that New.net's venture "is not a real attractive idea on its own technical merit. But given where we are, what else can you do?"

ICANN's launching of a so-called "Clean Sheet" study further heightened concerns over its perceived undemocratic nature. The study is supposed to determine the proper role of the public voice in ICANN decisions. During its meetings in Melbourne, Australia, the domain name body presented tentative plans that were notable in that their apparent failure to recognize the legitimacy of ICANN's own At-Large Members, or whether these members should be allowed to exist in the future. Numerous experts are worried that this study will lead to the end of ICANN public elections. Some of these fears were voiced during special Civil Society meetings that coincided with the ICANN convention.

To read the proposed .com, .net and .org Registry Agreements, visit
http://www.icann.org/nsi/proposed-com-registry-agmt-01mar01.htm
http://www.icann.org/nsi/proposed-net-registry-agmt-01mar01.htm
http://www.icann.org/nsi/proposed-org-registry-agmt-01mar01.htm

Transcripts and video archives of ICANN's Melbourne meetings are available via http://cyber.law.harvard.edu/icann/melbourne/archive/index.html

For more on the ICANN-Verisign proposed contracts, see Stewart Taggart, "Furor over ICANN-Verisign Deal," Wired News, Mar. 13, 2001 at http://www.wired.com/news/print/0,1294,42392,00.html

For German language coverage, read Monika Ermert, "Deal mit Verisign/NSI uber .com-Domain verschoben," Heise Online, Mar. 13, 2001 at http://www.heise.de/newsticker/data/jk-13.03.01-003/

Further details regarding delays in ICANN's rollout of new Top-Level Domains are available from Stewart Taggart, "ICANN Readies for 'Land Rush,'" Wired News, Mar. 12, 2001 at http://www.wired.com/news/print/0,1294,42363,00.html

For more information on New.net, as well as Prof. Froomkin's remarks, see Don Clark, "New twist in top-level domain name game," Wall Street Journal, Mar. 5, 2001 at http://www.zdnet.com/zdnn/stories/news/0,4586,2692518,00.html

To read more of Vint Cerf's comments, see David McGuire, "Vint Cerf Calls New.Net Domain Scheme a 'Cute Trick,'" Newsbytes, Mar. 5, 2001 at http://www.newsbytes.com/news/01/162773.html

The text of WIPO's "Best Practices" proposal is posted under http://ecommerce.wipo.int/domains/cctlds/bestpractices/bestpractices.html

See also Imogen Foulkes, "Dot.com conflicts scrutinized," BBC News Online, Feb. 21, 2001 at http://news.bbc.co.uk/hi/english/sci/tech/newsid_1181000/1181926.stm

To read minutes from the Melbourne Civil Society meetings (as compiled by Kimberley Heitman, chairman of Electronic Frontiers Australia), click http://www.internetdemocracyproject.org/melbournemeeting.htm

For further background information, visit http://www.internetdemocracyproject.org


[7] German Nazi website case muddled

First it was France; will Germany come next?

The German Central Council for Jews is planning to sue Internet service providers for allowing access to Nazi websites. According to the group's vice president, Michel Friedman, such webpages should banned even if they are not located in Germany. The possibility that one country's free speech restrictions could be applied on a global basis worries many legal scholars. Mike Pullen, a lawyer from the British firm DLA, said that while "no one wants to support Nazi sites," the Council's stance represented "is a worrying principle. Who's next? What if the French government decides it doesn't like Greenpeace campaigning about nuclear weapons?" Pullen suggested that this suit might contravene article 10 of the European Convention on Human Rights.

This move comes after a recent French court ruling that mandated web portal Yahoo to block French Internet users from accessing the webpages in the United States that allowed auctions of Nazi memorabilia. The ruling was made pursuant to French laws that generally prohibit such goods from even being advertised, much less sold. Yahoo has since filed suit in a U.S. Federal court to prevent the French order from being enforced. However, in the meantime, Yahoo decided to start blocking Internet users from items that, in its judgment, somehow "promote or glorify hatred or violence."

Meanwhile, the German government has halted its investigation of Yahoo regarding online auctions of Hitler's "Mein Kampf." A government spokesperson explained that Yahoo was merely a service provider and did not itself offer the book for sale. From a prosecutorial standpoint, since Yahoo was not fully aware of the Nazi content and could not take steps to prevent its sale, it could not be held criminally liable for incitement to racial hatred.

In a related story, several Swiss Internet service providers (ISPs) are blocking foreign webpages at the behest of a local anti-Nazi group. Swisscom, Sunrise/Diax and Tiscalinet are denying access to some 754 sites after a complaint was lodged by the Basel-based Children of the Holocaust. The ISPs partly based their decision on fears of liability under Swiss laws against racist speech that are broadly similar to those in Germany and France.

See "Germany drops Yahoo 'Mein Kampf' auction probe," Associated Press, Mar. 22, 2001 at http://usatoday.com/life/cyber/tech/2001-03-22-yahoo-germany.htm

Read "German Jews sue over Nazi net content," The Guardian Unlimited, Feb. 20, 2001 at http://www.guardianunlimited.co.uk/internetnews/story/0,7369,440542,00.html

The European Convention on Human Rights is posted under http://conventions.coe.int/treaty/EN/cadreprincipal.htm

Read Kristi Essick, "Yahoo Defies Court Ruling Over Nazi Memorabilia," The Industry Standard (Europe), Feb. 21, 2001 at http://www.thestandard.com/article/display/0,1151,22360,00.html

See also "Nazi web platform blocked by Swiss Internet service providers," Swiss Radio International, Feb. 19, 2001 at http://www.swissinfo.org/sen/Swissinfo.html?siteSect=111&sid=584058


[8] New copy protection schemes may curb fair use

Various plans to strengthen the rights of intellectual property holders may be coming to a hard drive near you.

One of these schemes, termed Content Protection for Removable Media (CPRM), would have placed copy protection software and special digital markings on each individual's hard drive (as well as removable drives and other such systems). Afterwards, computer programs would have to be ported onto CPRM-compliant hard drives, and, to make backup copies, computer users may have to log in to a centralized server, which would ensure conformity with intellectual property restrictions.

Many cybercitizens balked at the intrusive nature of these plans, which led IBM to shelve CPRM for the time being. However, in its place, the company is working with other industry giants such as Intel, Toshiba and Matsushita toward adopting a new system (developed by Phoenix Technologies). While details are still sketchy, this plan apparently envisions a scenario where files would be encrypted, password-protected or otherwise restricted. Afterwards, the codes used to access these files would be logged-an approach that might still have the same effects as CPRM. It is unclear at this point whether this system would be applied to all types of storage devices (such as individual hard drives) rather than merely removable media.

Experts have savaged these proposals as a threat to the rights of ordinary computer users. Stanton McCandlish of Electronic Frontiers Foundation (EFF-a GILC member) called CPRM and its successors "crippleware." He also reminded computer companies that their goal should be "to satisfy their customers," rather than restricting online free speech.

See John Borland, "Antipiracy efforts spark battle over copyright hardware," CNet News, Mar. 23, 2001 at http://news.cnet.com/news/0-1005-201-5211420-0.html

Read Robert Lemos, "IBM pulls digital tagging plan," CNet News, Feb. 22, 2001 at http://news.cnet.com/news/0-1006-201-4922288-0.html

See also Andrew Orlowski, "Will Phoenix keep your disks and OS CPRM-free?" The Register (UK), Feb. 23, 2001 at http://www.theregister.co.uk/content/4/17132.html

For more of McCandlish's remarks, read Andrew Orlowski, "IBM withdraws CPRM for hard drives proposal," The Register (UK), Feb. 22, 2001 at http://www.theregister.co.uk/content/2/17107.html


[9] US Gov't seeks Supreme Court Net speech ruling

The United States government is asking the nation's highest court to uphold a law that criminalizes online speech.

The so-called Child Online Protection Act made it a crime to use the Internet to pass along "for commercial purposes" information considered "harmful to minors." The statute was enacted in response to a 1997 decision by the U.S. Supreme Court, Reno v. American Civil Liberties Union, which struck down the Communications Decency Act and applied traditional free speech protections to the Information Superhighway. COPA was soon challenged by the American Civil Liberties Union (ACLU) on behalf of 17 groups and individuals. Several months ago, a U.S. Federal appeals court had ruled unanimously that COPA unconstitutionally barred Internet expression. However, the United States Attorney General, John Ashcroft, has now petitioned the Supreme Court, asking the tribunal to uphold COPA.

The US Government petition is posted under http://www.usdoj.gov/osg/briefs/2000/2pet/7pet/2000-1293.pet.aa.html

An ACLU press release about the lower court ruling is available via http://www.aclu.org/news/2000/n062200b.html

Read Brian Krebs, "Govt Asks Supreme Court To Reverse COPA's Death Warrant," Newsbytes, Feb. 28, 2001 at http://www.newsbytes.com/news/01/162531.html


[10] 2nd round for DVD weblinks case

Can you be sued for writing seven lines of computer code?

That's the question many people are asking after 2 students unveiled a new program entitled "grpff." The program unscrambles the copy protection scheme used in DVDs, and is a simplified version of DeCSS--a primitive computer program to help users of the Linux operating system play DVDs on their computers. Over the past year, the entertainment industry, through the DVD Content Control Association (DVD CCA) and the Motion Picture Association of America (MPAA), has waged legal battles in both New York and California to prevent Internet users from linking to websites that have DeCSS. Many experts fear that these actions may stifle free expression in cyberspace.

The developers of grpff, Keith Winstein and Marc Horowitz, are from the Massachusetts Institute of Technology's Student Information Processing Board, and wrote program for a class that Winstein was teaching. The two men were acutely aware of the potential legal threats they may soon face. Winstein called attempts to stifle the creation and dissemination of decryption programs "preposterous" and said that "there's some value in demonstrating how simple these things really are."

Meanwhile, the Electronic Frontier Foundation (EFF-a GILC member) is appealing a trial court ruling in the New York that banned 2600 magazine from providing information about DeCSS information on its website. The opposing sides already have filed briefs, and oral arguments will take place within the next few months.

For more on the new qrpff DVD decryption program, read Declan McCullagh, "Descramble That DVD in 7 Lines," Wired News, Mar. 7, 2001 at http://www.wired.com/news/print/0,1294,42259,00.html

See also Robert Lemos, "DeCSS 2? DVD code broken again," ZDNet News, Mar. 8, 2001 at http://www.zdnet.com/zdnn/stories/news/0,4586,2693768,00.html

For German language coverage of this development, see "Sieben Zeilen Code entschusseln kopiergeschutzte DVDs (Update)," Heise Online, Mar. 8, 2001 at http://www.heise.de/newsticker/data/nij-08.03.01-000/

For more on the court case, see "Studios Bolster DeCSS Suit," Reuters, Feb. 21, 2001 at http://www.wired.com/news/politics/0,1283,41943,00.html


[11] Japanese plan: ISPs to become censors

A new proposal may force Internet service providers (ISPs) to act as government speech examiners.

The Japanese Public Management Ministry is planning to submit a bill requiring ISPs to check for webpages that harm someone's reputation. Providers would then have to remove offending sites. The bill apparently contains similar takedown guidelines for copyrighted material, as well as provisions requiring ISPs to disclose the identity of website creators can be if deemed necessary.

Observers have suggested that these plans may violate Article 21 of the Japanese Constitution, which guarantees freedom of speech. In response, the Ministry has decided to write in provisions allowing both ISPs and courts to hear arguments on both sides (aggrieved parties and web content creators) for each case before a given webpage is deleted. However, it is unclear whether Internet authors will be forced to bear the burden of proving their innocence. The system may also make it difficult for people to retain their anonymity in cyberspace, which may intimidate online protestors and whistleblowers. Moreover, it is not known whether the new bill gives sufficient protection for various free speech uses of copyrighted material (such as for public commentary or criticism).

See "Law planned to let ISPs remove malicious sites," Yomiuri Shimbun, Mar. 6, 2001 at http://globalarchive.ft.com/globalarchive/article.html?id=010306000887

To read Article 21 of the Japanese Constitution, click http://home.ntt.com/japan/constitution/japanese-Constitution.html#ARTICLE_21

An English-language translation of the Japanese Constitution is posted under http://home.ntt.com/japan/constitution/english-Constitution.html#CHAPTER_III


[12] New anonymous net posting battles

Skirmishes continue to break out regarding the future of anonymity along the Information Superhighway.

In one of these cases, a judge in the United States is suing to discover the identities of online critics, who posted their comments on the "Grant Street 1999" website. A trial court decided that these identities should not be disclosed unless the plaintiff shows that her case has merit. However, the court refused to dismiss the judge's lawsuit at the outset. The American Civil Liberties Union (ACLU-a GILC member), which is representing the authors of the website, is now asking an appeals court to throw out the lawsuit and prevent unnecessary disclosures.

Meanwhile, in Seattle, the Electronic Frontier Foundation (EFF-a GILC member) joined forces with a local ACLU affiliate to fight a subpoena that would force an Internet service provider to divulge the name of a chat board entry. The plaintiff, 2TheMart.com, sought the identities of some 23 individuals, including at least one person who never posted messages about the company. EFF's Public Policy director Lauren Gelman warned that "courts should not allow subpoenas to be used for 'fishing expeditions' when individuals' First Amendment rights are at stake. The chilling of free speech would be catastrophic."

In a third case, a self-titled "Anonymous Publicly Traded Company" is suing America Online, hoping to discover the identities of 5 chatboard critics. The company claims that these 5 people made "defamatory and disparaging material misrepresentations," but said that it wanted to remain incognito to avoid losing business. A state supreme court ruled that the firm must first disclose its own name before it can go forward with its case, and held that "the likelihood of the plaintiff suffering some embarrassment or economic harm is not enough by itself to permit anonymity."

A recent ruling in the United Kingdom has counterbalanced these decisions in the United States. In a lawsuit, a British court has ordered Web trading company Motley Fool to divulge the identity of a netizen who posted allegedly defamatory remarks against Internet company Totalise. The court also held that Motley Fool was not protected by UK laws that allow newspapers and other publications in most cases to avoid disclosing their sources. Malcolm Hutty of the Campaign Against Censorship of the Internet in Britain (CACIB-a GILC member) warned: "A decision like this can be taken to mean that anonymity is not right and that is too broad. A court needs to consider carefully the implications of its decisions and consider peoples rights under the Human Rights Act." Hutty was apparently referring to the Council of Europe's Universal Declaration of Human Rights Act, which treats privacy as a fundamental right.

For more on the Totalise/Motley Fool case, see Steve Gold, "End of the anonymous net," The Guardian, Mar. 22, 2001 at http://www.guardianunlimited.co.uk/internetnews/story/0,7369,460668,00.html

"Website operators must identify maker of defamatory comments," The Times of London, Mar. 15, 2001 at http://www.thetimes.co.uk/article/0,,12-99112,00.html

See also Will Knight, "Forums face crackdown after Motley Fool ruling," ZDNet UK, Mar. 19, 2001 at http://www.zdnet.co.uk/news/2001/11/ns-21639.html

For more on the "Anonymous Publicly Traded Company," read Lisa M. Bowman, "Anonymous company goes after John Does," CNet News, March 14, 2001 at http://news.cnet.com/news/0-1005-200-5136753.html

For an ACLU press release on the Melvin and 2TheMart cases, click http://www.aclu.org/news/2001/n022601b.html

See Jeffrey Benner, "Chat Room Rants Protected," Wired News, Feb. 27, 2001 at http://www.wired.com/news/politics/0,1283,42039,00.html

See also Aaron Elstein, "AOL sides with anonymous posters," Wall Street Journal, Mar. 5, 2001 at http://www.zdnet.com/zdnn/stories/news/0,4586,2692564,00.html

Read Jeffrey Terraciano, "Can John Doe Stay Anonymous?" Wired News, Feb. 21, 2001 at http://www.wired.com/news/politics/0,1283,41714,00.html


[13] Cuba's continuing Internet woes

Cuba's strict rules on Internet use may be hampering its efforts to enter the Information Age.

People who live in the Caribbean nation must jump over many hurdles to go online. There is only one Internet service provider, which is run by the state, charges high fees (more than the annual salary of an average Cuban) and has slow connection speeds. After entering cyberspace, Cuban Internet users are then blocked from many sites that are deemed "subversive," including webpages with anti-Castro or anti-Communist messages, according to a government spokesperson. Reports have indicated that similar filtering regimes are applied to private e-mail messages. Netizens whom the government suspects of counter-revolutionary activities are subjected to surveillance, equipment seizures and possible jail time.

Academics have pointed out that these regimens have had a detrimental impact not only on freedom of information, but on Cuban society. Professor Juan Carlos Espinosa of St. Thomas University (in Miami, Florida) noted in particular that "Cuban young people are really hungry for information and have a sense of being left behind." Disturbingly, many scholars in Cuba have been forced to remain silent or have otherwise refused to comment on the government's actions, for fear of potential persecution.

See Julia Scheeres, "Cuba Not So Libre With the Net," Wired News, Feb. 23, 2001 at http://www.wired.com/news/politics/0,1283,41940,00.html


[14] UK plans may criminalize online protests

Experts fear that new British legislation will erode free speech rights on the Information Superhighway.

One of these proposals is actually contained within amendments to a Criminal Justice and Police Bill. The plan would, in theory, criminalize the sending of hate mail by electronic means. Violators may be thrown in jail or forced to pay fines of 6000 pounds. Free expression advocates are worried that the law's vague standards will deter online protests, particularly against prominent figures such as corporate executives. These fears were heightened after comments from British Home Secretary Jack Straw: "These new measures are designed to help prevent two tactics used by ... individuals-protesting outside employees' and directors' homes and sending intimidating mail. We want to ensure that all types of threatening messages are covered-including those by text messaging and email."

Meanwhile, a recently enacted British law, the Terrorist Act 2000, is also receiving negative reviews. Section 12 of the law contains language that bans people from merely expressing "support" for any "proscribed organization"; indeed, these provisions specifically state that "support ... is not restricted to the provision of money or other property." Similarly, the Act also bars people from attending and speaking at any "meeting ... to encourage support for a proscribed organization or to further its activities." A number of observers worry that this statute could be applied to stifle online gatherings such as newsgroups and chat rooms.

To read the text of the "Malicious Communications" amendment to the Criminal Justice and Police Bill, see http://www.publications.parliament.uk/pa/cm200001/cmstand/f/st010306/pm/1030 6s01.htm

See Graeme Warden, "Government to ban 'hate emails,'" ZDNet UK, Feb. 22, 2001 at http://www.zdnet.co.uk/news/2001/7/ns-21127.html

The text of the Terrorism Act 2000 (section 12) is available at http://www.hmso.gov.uk/acts/acts2000/00011--c.htm#12

Read Kieren McCarthy, "Newsgroups can be terrorists too," The Register (UK), Feb. 20, 2001 at http://www.theregister.co.uk/content/8/17073.html


[15] Music companies & gov't spies: perfect together?

The entertainment industry has apparently found a new way to protect their interests: have spies watch private citizens as they travel along the Information Superhighway.

This alliance between intelligence agencies and music companies has become particularly strong after a recent court ruling required Napster to block access to copyrighted songs. However, various record companies have pushed for further measures, as evidenced by a recent raid by government agents. The raid came at the behest of the International Federation of the Phonographic Industry (IFPI), which monitored individuals online, then passed their information on to the Belgian police. Marcel Hymans, who leads the IFPI in Belgium, boasted government authorities would soon break into homes of hundreds of cybercitizens. One Belgian publication quoted him proclaiming: "The time for warnings is over, now we're going into action."

These efforts have disturbed many within the Internet community, who worry about how entertainment conglomerates have apparently become de facto government agents. These fears have been heightened by IFPI initiatives in other countries. In the United Kingdom, a local IFPI spokesperson has already warned British computer users that they may want to watch what they do online: "We have a very aggressive commitment to the fight against piracy, especially those who upload large amounts of digital music onto the Net." Interestingly enough, the spokesperson claimed that IFPI was "not so bothered about the one-time downloader," but did not explain precisely what standards the group would follow in determining whether to bring in government law enforcement agents.

See Graeme Warden, "Music industry to snoop on Napster fans worldwide," ZDNet UK, Feb. 19, 2001 at http://www.zdnet.co.uk/news/2001/7/ns-21063.html

See also Michael Learmonth, "The Online Enforcer," The Industry Standard Europe, Feb. 16, 2001 at http://www.thestandard.com/article/display/0,1151,22315,00.html

Read Jeffrey Benner, "Napster Fallout: Privacy Loses?" Wired News, Mar. 6, 2001 at http://www.wired.com/news/politics/0,1283,42203,00.html

Further coverage is available from Janelle Brown, "Who is spying on your downloads?" Salon.com, Mar. 27, 2001 at http://salon.com/tech/feature/2001/03/27/media_tracker/index.html

See also John Borland, "Who will serve as Napster police?" ZDNet News, Mar. 27, 2001 at http://www.zdnet.com/zdnn/stories/news/0,4586,5080218,00.html


[16] DoubleClick launches new tracking program

Is DoubleClick at it again?

That's what some computer users are wondering after the online advertising juggernaut (along with comScore Networks) launched a new plan to collect personal information from Internet users. While details are sketchy, this new software package (called netScore) apparently can track people wherever they are logged in-whether they are at home, at work or even overseas. In a press release, the DoubleClick boasted that the program was based on a comScore database that contained personal information dossiers on some one and a half million computer users.

The launching of this program comes nearly a year after DoubleClick recently admitted to tracking viewers through the Internet by placing digital identification numbers in files known as "cookies" on a user's hard drive, which it matches with name and address information that has been collected by its partners. Despite initial claims to the contrary, DoubleClick expressed its intention to match this data with more extensive information contained in millions of files maintained by its merger partner Abacus Direct. Subsequently, DoubleClick shelved its data-matching plan after a storm of public criticism.

To read a DoubleClick press release on the subject, visit http://www.doubleclick.net/us/corporate/presskit/press-releases.asp?asp_object_1=&press%5Frelease%5Fid=2496

Read "DoubleClick rolls out ad-tracking tools," Reuters, Mar. 5, 2001 at http://www.zdnet.com/zdnn/stories/newsbursts/0,7407,2692765,00.html


[17] ECHELON spyware plug-ins: Oasis & FLUENT

A global surveillance network may be getting even more powerful than before.

United States intelligence officials have released some information regarding two new programs. One of these programs, Oasis, automatically creates machine-readable transcripts from television and audio broadcasts. Reports indicate that Oasis can also distinguish individual speakers and detect personal characteristics (such as gender) then denote these characteristics in the transcripts it creates. At least one division of the U.S. Central Intelligence Agency (CIA) already operates Oasis, and there are plans to expand the program's use over the course of this year, as well as develop Chinese and Arabic versions.

The other program, FLUENT, allows English-language keyword searches of non-English materials. This data mining tool not only finds pertinent documents, but also translates them, although the number of languages that can currently be translated is apparently limited (Russian, Chinese, Portuguese, Serbo-Croatian, Korean and Ukrainian). In addition, FLUENT displays the frequency with which a given word is used in a document and can handle alternate search term spellings.

Many experts note that this new software may be used to upgrade the massive surveillance system, popularly known as ECHELON. ECHELON is designed to intercept communications from around the world, and is reportedly operated by the United States National Security Agency in conjunction with several other intelligence agencies. It is supposed to be capable of intercepting e-mail messages, faxes, and telephone conversations. Concerns about ECHELON's potential threat to individual privacy were heightened by a Congressional hearing several months ago, where the directors of both the Central Intelligence Agency (CIA) and NSA refused to provide details on the legal standards by which ECHELON operates.

See Vernon Loeb, "Making Sense of the Deluge of Data," Washington Post, Mar. 26, 2001, page A23 at http://washingtonpost.com/wp-dyn/articles/A57318-2001Mar25.html

Read Tabassum Zakaria, "CIA using data mining to keep smart," Reuters, Mar. 3, 2001 at http://www.zdnet.com/zdnn/stories/news/0,4586,2692457,00.html

See also Thomas C. Greene, "CIA patching ECHELON shortcomings," The Register (UK), Mar. 6, 2001 at http://www.theregister.co.uk/content/8/17361.html


[18] Euro privacy panel attacks cybercrime plan

Continued efforts to create a new European cybercrime treaty are raising serious concerns from both Internet companies and privacy groups.

While the Council of Europe treaty is still being revised, a previous version would have signatory countries enact laws that might make it easier for government agents to search computers and conduct real-time surveillance on private citizens through telecommunications networks. The convention included provisions that may allow law enforcement officials greater access to many types of personal security information, such as encryption keys. Additionally, the scheme could make Internet service providers (ISPs) liable for their customers' content, and may lead ISPs to monitor and retain records on customer activities. Furthermore, the prior draft mandated signatories to create new harsh penalties for copyright infringement. European Union officials are now pushing for new sections that would ban websites containing language deemed hateful or inflammatory, an apparent extension of a controversial French ruling against Yahoo regarding Nazi memorabilia on its auction pages.

These plans have drawn a great deal of criticism. The European Commission Data Protection Working Party issued an opinion that strongly criticized the draft treaty. Among other things, the panel (which is composed of Data Protection officials from Council of Europe member states) noted that while the proposal may be entered into by non-European nations, the treaty did not require those countries to create conditions and safeguards to protect individual privacy. Indeed, the group felt that portions "of the draft Convention could create the impression that the protection of human rights shall only be considered when it is 'due' and shall only be 'adequate'." In addition, these experts had "serious concerns" about the proposal's language "which obliges service providers to collect or record within their technical capability traffic data in real-time," as well as requirements for such providers to keep traffic and other computer data for 60 days." Thus, the Working Party felt that many parts of the Convention "are not sufficient to fully safeguard the fundamental rights to privacy and personal data protection."

The panel's concerns echoed views expressed in a series of recent letters from the Global Internet Liberty Campaign. These views were reiterated by the French cyberliberties group Imaginons on Reseau Internet Solidaire (IRIS-a GILC member) which gave a special presentation on these and other cybercrime efforts at a special EU briefing held March 7. Meanwhile, the computing industry has also expressed alarm at these developments. Fred Eisner from the Dutch Association of Internet Providers complained: "This draft convention lacks balance. While it gives far more powers to law enforcement agencies, there are no built-in checks and balances...on behalf of all other actors." Nevertheless, in spite of these difficulties, the Council may approve a final draft by June.

The Working Party's "Opinion 4/2001 on the Council of Europe's Draft Convention on Cybercrime" is posted at http://europa.eu.int/comm/internal_market/en/media/dataprot/wpdocs/wp41en.htm

For German language press coverage, see Stefan Krempl, "Fette Bugs in Cybercrime-Abkommen," Heise Telepolis, Mar. 28, 2001 at http://www.heise.de/tp/deutsch/inhalt/te/7239/1.html

The IRIS presentation (in French) is located under http://www.iris.sgdg.org/actions/cybercrime/iris-ec0201.html

For more information on the briefing, visit the official EU website via http://europa.eu.int/ISPO/eif/InternetPoliciesSite/Crime/crime1.html

For further details on industry opposition to these cybercrime proposals, read the following Austrian Chamber of Commerce statement (in German/Deutsch): http://europa.eu.int/ISPO/eif/InternetPoliciesSite/Crime/Comments/FEEI.html

See "Net execs, governments collide on cybercrime treaty," Reuters, Mar. 6, 2001 at http://news.cnet.com/news/0-1007-200-5043832.html

See also "Europe Slaving Over Cybercrime," Associated Press, Mar. 6, 2001 at http://www.wired.com/news/politics/0,1283,42228,00.html

The latest version (no. 25) of the CoE cybercrime treaty is available at http://conventions.coe.int/treaty/EN/projets/cybercrime25.htm

To read a Dec. 2000 GILC letter on the Council of Europe cybercrime proposal, see http://www.gilc.org/privacy/coe-letter-1200.html


[19] UK email surveillance regulations stall

Will Great Britain ever try to protect the privacy of its workers?

That's the question many UK Internet users are posing after continued delays in devising new regulations on the subject. These regulations are related to the controversial Regulation of Investigatory Powers Act (RIP) which, among other things, includes language stating that employers have a legal right to monitor their workers. The British Data Protection Commission had issued a draft code that would place a few restrictions on this supposed right, including fines against firms that violate the code.

The Commission then delayed finalizing this document, supposedly due to a large number of public responses (110). The Commission is now planning to release these new standards in pieces, with the workplace privacy section to come later rather than sooner. Some experts worry that this will leave British workers with little protection against undue monitoring by their bosses for an indefinite amount of time. Others wonder whether the code will pay sufficient attention to the latest threats to Internet privacy, including tracking programs built into corporate blocking software.

See Kieren McCarthy, "Email snooping code of practice delay," The Register (UK), Mar. 6, 2001 at http://www.theregister.co.uk/content/8/17365.html

See also David Neal, "Email monitoring code delayed," IT Week, Feb. 23, 2001 at http://www.zdnet.co.uk/news/2001/7/ns-21172.html


[20] Hotmail/Microsoft selling user info

Special offer: sign on now to receive lots of junk e-mail messages.

That's what many cynics are saying about Hotmail. The Microsoft subsidiary has admitted to sharing customer information lists with a public Internet directory site. Under this arrangement, Hotmail provided e-mail addresses and other personal information to Infospace, including the towns and states were individual users lived. Infospace matched that data with telephone numbers, home addresses and other tidbits, then made the files available through the World Wide Web, which telemarketers apparently used for targeted advertising campaigns. Both Microsoft and Infospace claimed that these practices should already have been known to customers through their privacy policies, and that customers could simply opt-out of this system. However, Hotmail's privacy policy actually says: "Hotmail keeps all of your Personal Information private and does not share it with any third parties." Moreover, Hotmail (in its default settings) assumes consumer consent to this sharing procedure; users have the burden of discovering this data transfer program and making an effort to change these specifications.

The procedure was discovered by Bennett Haselton of Peacefire (a GILC member). Haselton noted that the entire scheme invaded user privacy, and that "[o]nce your e-mail addresses get into the spammers' databases, you can't get it out again." However, a Microsoft spokesperson nevertheless claimed that her company was "clearly stating" its procedures, and even suggested that passing along personal information to third parties was "a consumer benefit."

A copy of Hotmail's privacy policy is available at http://www.hotmail.msn.com/cgi-bin/dasp/hminfo_shell.asp?content=pstate&_lang=EN&id=2&ct=985039874

Read "Hotmail addresses shared with Internet directory site," Associated Press, Mar. 6, 2001 at http://abcnews.go.com/wire/Business/ap20010306_436.html


[21] Voter.com user political data auction

Many dot-coms may have poor policies on user privacy. A number of them sell information about their users. But few of them have sold data on their customers' political views...until now.

Voter.com, which recently went bankrupt, is planning to auction off details regarding some 170 000 users. These files include what political parties individuals adhere to, what issues they find important, as well as e-mail addresses and other personal information. The proprietors of the former policy portal have also made the bizarre claim that this sale is consistent with its previously announced privacy standards, in that it will require buyers to use the data only to "provide personalized political news and information to subscribers."

Not surprisingly, privacy advocates have panned this move. Jason Catlett from Junkbusters called Voter.com's auctioning of personal user files as just "another example of how privacy policies are usually a hopeless way to protect privacy because the customer doesn't have predictable rights." Indeed, these developments come several months after another failed Internet company, Toysmart.com was prevented from auction data about its customers. Toysmart's majority owner eventually purchased the files and destroyed them as part of a court-approved settlement.

In addition, government officials are now starting to take an interest in the way bankrupt Internet corporations handle their user databases. The United States Senate has included an amendment on the subject within a recently approved bankruptcy bill. Under this standard, dot-coms essentially must adhere to their privacy policies even when they go under. Such companies might be allowed to sell customer data to independent third parties, but only if a court finds the privacy risk is relatively insignificant.

For more on the Senate dot-com privacy amendment, see Patrick Ross, "Senate protects consumer data," CNet News, Mar. 16, 2001 at http://news.cnet.com/news/0-1005-200-5160763.html

Read Keith Perine, "State Attorneys General Compromise on Privacy," The Industry Standard, Mar. 16, 2001 at http://www.thestandard.com/article/display/0,1151,22917,00.html

For more on Voter.com, see Aaron Pressman, "Voter.com to sell membership list," The Industry Standard, Mar. 15, 2001 at http://www.thestandard.com/article/display/0,1151,22894,00.html


[22] New online breaches affect even celebrities

A rash of recent online data intrusions has heightened concerns about online privacy.

Perhaps the biggest of these breaches occurred in New York. Government investigators say that Abraham Abdullah took advantage of lax security measures and used the Internet to break into the accounts of several prominent celebrities. The list of alleged victims includes Steven Spielberg, Ted Turner, Oprah Winfrey and many others. According to prosecutors, Abdullah was particularly effective in manipulating large financial institutions (including Merrill Lynch, Goldman Sachs, Equifax and others) into accessing sensitive account information. Some experts suggest that the total amount of stolen materials could be in the millions of US dollars.

This event was one of only several highly publicized incidents that have heightened concerns about online privacy. Bibliofind, a subsidiary of Amazon, has admitted that hackers have been able to access customer data such as credit card numbers, names, addresses and telephone numbers for nearly 4 months. The number of consumers affected by this breach may be as high as 98 000. Meanwhile, OfficeMax.com (which sells office supplies) exposed personal user information (such as credit card numbers and expiration dates) on its website. While it is unclear how many online customers were affected, the site had attracted nearly one and half million visitors in January.

For more on the celebrity credit card scam, see Murray Weiss, "How NYPD Cracked the Ultimate Cyberfraud," New York Post, Mar. 20, 2001 at http://www.nypost.com/news/regionalnews/26868.htm

See also "Cybertheft Case Skewers Celebs," CBS News, Mar. 20, 2001 at http://cbsnews.com/now/story/0,1597,280107-412,00.shtml

For more on the Amazon subsidiary security breach, see Stuart Millar, "Hackers humiliate Amazon," The Guardian, Mar. 8, 2001 at http://www.guardianunlimited.co.uk/internetnews/story/0,7369,448408,00.html

Read "Hackers Hit Amazon Unit Site," Washington Post, Mar. 6, 2001, page E2, at http://washingtonpost.com/wp-dyn/articles/A27498-2001Mar5.html

See also "Amazon.com unit Bibliofind subject of hacker attacks," Associated Press, Mar. 5, 2001 at http://abcnews.go.com/wire/Business/ap20010305_1551.html

For more on the OfficeMax credit card disclosures, see Michele Kessler, "OfficeMax site exposes private customer info," USA Today, Feb. 22, 2001 at http://www.usatoday.com/life/cyber/tech/2001-02-22-officemax.htm


[23] New Privacy Coalition formed

Dozens of organizations have banded together to launch a new initiative: the Privacy Coalition.

In this Coalition, individual groups have signed on to a special Privacy Pledge supporting a privacy framework to protect the rights of citizens in the information age. This system includes such principles as "Fair Information Practices, independent enforcement and oversight, promotion of genuine Privacy Enhancing Technologies, legal restrictions on surveillance technologies, and a solid foundation of federal privacy safeguards that permit the private sector and states to implement supplementary protections as needed."

Ed Mierzwinski of the United States Public Interest Research Group said that one of the Coalition's first priorities is to urge "legislators to sign our new privacy pledge to help us defend consumer and citizen privacy rights against a massive industry campaign to dumb them down." Other Coalition members hoped that these efforts would also lead lawmakers to enact proposals to create strong privacy standards. Marc Rotenberg of the Electronic Privacy Information Center (EPIC-a GILC member) pointed out that "[t]here needs to be an agency or statute to enforce privacy interests, because the current arrangement puts all of the burden on the individual." These moves come in light of recent Forrester Research study which suggests that consumers have lingering fears about their privacy on the Internet, and that industry efforts to quiet these fears have come up short. As one Forrester analyst put it, "Anyone who thinks the privacy issue has peaked is greatly mistaken."

To read the Privacy Pledge, visit http://www.privacypledge.org

For press coverage of this event, see Brian Krebs, "Group Urges Lawmakers To Sign Privacy Pledge," Newsbytes, Feb. 12, 2001 at http://www.newsbytes.com/news/01/161859.html

See also Brock N. Meeks, "Privacy groups to Congress: Get your act together," MSNBC, Feb. 13, 2001 at http://www.zdnet.com/zdnn/stories/news/0,4586,2685081,00.html

For more on the Forrester study, see David McGuire, "Firms Must Tackle Consumers' Privacy Anxieties-Forrester," Newsbytes, Mar. 5, 2001 at http://www.newsbytes.com/news/01/162712.html


[24] Privacy software in the works

Scientists are busy creating several new computer programs that may enhance online privacy.

One of these programs is the brainchild of Richard M. Smith from the Privacy Foundation. This software is designed to counter tiny image files (known "webbugs") which are being used increasingly to identify and track computer users. The Privacy Foundation program, which is currently being tested, causes individual computers to say "uh-oh" when a webbug is encountered. Smith hopes that "if people see the Web bug, they'll contact the Web site and ask why. So it's sort of putting social pressure on Web sites."

Another new program, the Evidence Eliminator, allows users to leave little or no trace of their activities. To do this it destroys a vast array of files and logs which may betray a given user's actions, including caches, temporary swap files, media player histories, registry streams and so on. It also permanently erases these files to a greater extent than usual methods. The program's creators also claim that the Eliminator can accelerate computing performance, presumably by freeing up system resources.

Observers hope that these and other devices will usher in a new privacy age that will foster Internet growth. David Sobel of the Electronic Privacy Information Center (EPIC-a GILC member) notes that "[t]echnologies that facilitate anonymous use of the Internet are really critical to the survival of the Internet as an open and democratic form."

See "Software tools help Web users protect privacy," Associated Press, Mar. 19, 2001 at http://www.usatoday.com/life/cyber/tech/2001-03-19-privacy.htm

For more on webbug detectors, read Stefanie Olsen, "New tools hatch for sniffing out Web bugs," CNet News, Mar. 5, 2001 at http://news.cnet.com/news/0-1005-200-5008849.html

For further details on the Evidence Eliminator, see http://www.evidence-eliminator.com/


[25] CFP 2001 Conference held

Despite a massive snowstorm, intrepid attendees to the Computers, Freedom, and Privacy (CFP) conference discussed a variety of hot cyberliberties issues.

In one noteworthy session, Richard M. Smith of the Privacy Foundation demonstrated how several new devices may help various parties spy on individuals. An cited example was SportBrain, which is worn on the user's body and tracks the person's heart beat, body movements and other personal information. It turns out that the device sends this data back to the manufacturer's website, apparently so that the company can better target advertisements. Yet despite the apparent security issues involved, a corporate spokesperson claimed that SportBrain posed "no privacy concerns."

Coinciding with the CFP meetings was the third annual United States Big Brother Awards ceremony, sponsored by Privacy International (a GILC member). These awards were designed to publicize some of the most serious threats to individual privacy online. This year's Most Invasive Proposal prize went to the notorious the US government's Carnivore spyware program; data mining firm ChoicePoint won the corporate invader award for "massive selling of records, accurate and inaccurate to cops, direct marketers and elected officials." The City of Tampa, Florida won the worst public official award for its facial scans of everyone who went to see the Super Bowl in January. The Lifetime Menace prize went to The US National Security Agency for, among other things, "50 years of spying."

In addition, the Electronic Frontier Foundation (EFF-a GILC member) conferred its 2001 Pioneer Awards. The winners included Seth Finkelstein for "raising the level of public awareness about the dangers to free expression posed by Internet content blocking and labelling systems." Other recipients included Canadian privacy advocate Stephanie Perrin and the late Bruce Ennis, who he successfully argued the case of online free speech case of Reno v. the American Civil Liberties Union before the U.S. Supreme Court.

For more on SportBrain and other new possible tracking technologies, see Eric Auchard, "Those great gadgets may be spying on you," Reuters, Mar. 8, 2001 at http://www.zdnet.com/zdnn/stories/news/0,4586,2693860,00.html

For more details on the 2001 U.S. Big Brother Awards, click http://www.privacyinternational.org/bigbrother/us2001/

See Michael S. James, "Is 'Big Brother' Watching?" ABCNews.com (U.S.), Mar. 8, 2001 at http://abcnews.go.com/sections/scitech/DailyNews/bigbrother_010307.html

For German language coverage of the Big Brother Awards, see Stefan Krempl, "NSA offiziel zum Big Brother gekurt," Heise Telepolis, Mar. 8, 2001 at http://www.heise.de/tp/deutsch/inhalt/te/7092/1.html

EFF's announcement of the 2001 Pioneer Awards winners is posted at http://www.eff.org/awards/20010305_pioneer_press_release.html


[26] New GILC Members: APC and CCC

The Global Internet Liberty Campaign welcomes two new members: the Association for Progressive Communications (APC) and the Chaos Computer Club (CCC).

Founded in 1990, APC has fought to make information technology more readily accessible to members of civil society. Towards that end, it has mounted strong protests against government-sponsored surveillance plans around the world, ranging from the British Regulation of Investigatory Powers Bill (RIP) to the global ECHELON spy network. APC has also launched an Internet Rights Program to foster democracy in cyberspace, and has fought attempts to censor the Internet in several countries, including most recently Korea.

Over the past ten years, the Germany-based CCC has vigorously defended the rights of computers users to engage in a whole of activities, including freedom of expression and information. In the past, the group has made efforts to increase public awareness of such Internet privacy issues as encryption key escrow, the security of online banks and many others.

The APC homepage is located at http://www.apc.org

Visit the CCC website at http://www.ccc.de


ABOUT THE GILC NEWS ALERT:

The GILC News Alert is the newsletter of the Global Internet Liberty Campaign, an international coalition of organizations working to protect and enhance online civil liberties and human rights. Organizations are invited to join GILC by contacting us at gilc@gilc.org. To alert members about threats to cyber liberties, please contact members from your country or send a message to the general GILC address.

To submit information about upcoming events, new activist tools and news stories, contact: GILC Coordinator, American Civil Liberties Union 125 Broad Street 17thFloor, New York, New York 10004 USA. email: gilcedit@aclu.org

More information about GILC members and news is available at http://www.gilc.org. You may re-print or redistribute the GILC NEWS ALERT freely. To subscribe to the alert, please send an mail to gilc-announce@gilc.org with the following message in the body: subscribe gilc-announce


PUBLICATION OF THIS NEWSLETTER IS MADE POSSIBLE BY A GRANT FROM THE OPEN SOCIETY INSTITUTE (OSI)