Copy Link
Add to Bookmark
Report

Computer Privacy Digest Volume 5 Issue 05

eZine's profile picture
Published in 
Computer Privacy Digest
 · 28 Dec 2019

  

Computer Privacy Digest Thu, 14 Jul 94 Volume 5 : Issue: 005

Today's Topics: Moderator: Leonard P. Levine

Privacy of E-Mail and Other Data in the Workplace
Improved CPSR Web Pages
New National ID Card Proposal
Subjective Questionnaires re Privacy
Re: CID is not the same as 800 or 911 ANI
Re: Question About CallerID
Re: Question About CallerID
RE: Caller ID - Unblocking Per Line Block
Re: Video Camera on Utility Poles
Re: Clipper security and other lies

The Computer Privacy Digest is a forum for discussion on the effect
of technology on privacy. The digest is moderated and gatewayed into
the USENET newsgroup comp.society.privacy (Moderated). Submissions
should be sent to comp-privacy@uwm.edu and administrative requests
to comp-privacy-request@uwm.edu. Back issues are available via
anonymous ftp on ftp.cs.uwm.edu [129.89.9.18]. Login as "ftp"
with password "yourid@yoursite". The archives are in the directory
"pub/comp-privacy". Archives are also held at ftp.pica.army.mil
[129.139.160.133].
----------------------------------------------------------------------

From: hsdjpl1@rcinet.res.utc.com
Date: 11 Jul 1994 18:24:22 GMT
Subject: Privacy of E-Mail and Other Data in the Workplace
Organization: UTRC

I am looking for references (or opinions) on the subject of E-Mail
privacy and/or data privacy in the workplace.

Does (should) a company have unlimited rights to intercept, monitor an
and view data placed on its systems or networks (by employees)?

Have there been any court rulings on this issue?

Replies to hsdjpl1@rcinet.utc.com (John Lashnits)

Thanks in advance...


------------------------------

From: "Prof. L. P. Levine" <levine@blatz.cs.uwm.edu>
Date: 13 Jul 1994 08:35:07 -0500 (CDT)
Subject: Improved CPSR Web Pages

NEWS RELEASE

7/12/94

Computer Professionals for Social Responsibility (CPSR)
P.O. Box 717
Palo Alto, CA 94302
415-322-3778
415-322-4748 (FAX)
E-mail: cpsr-info@cpsr.org

FOR IMMEDIATE RELEASE

CPSR ANNOUNCES WEB SERVER WITH 60 NEW PAGES OF INFORMATION

Palo Alto, July 12, 1994. Computer Professionals for Social
Responsibility (CPSR) is pleased to announce the availability of its
redesigned World-Wide Web (WWW) server, now with 60 new hypertext pages
of timely and important information for Internet users and the general
public. The CPSR Home Page can be found at:

URL: http://www.cpsr.org/home

with hypertext browsers like Mosaic and Lynx.

WWW grew from the need of physicists at the European Particle Physics
Laboratory (CERN) to communicate with pictures and text to colleagues
around the world in hypertext, non-linear format. Since its beginning
in 1989, WWW has allowed people to link their electronic documents and
images to other documents on computers around the world. Estimates say
there were, as of May 1994, over 4,500 hypertext Web server computers
capable of linking documents on the 10,000 computer networks comprising
the world-wide Internet.

CPSR's Web Pages cover issues related to the organization's mission to
provide the public and policymakers with realistic assessments of the
power, promise, and problems of information technology. These issues
include the National Information Infrastructure, Civil Liberties and
Privacy, Computers in the Workplace, Technology Policy and Human Needs,
Gender and Minority Issues, Reliability and Risks of Computer-Based
Systems and Community Networking. There are also links to many reports
and other sources of information. All links are provided with
descriptive narratives, and are not just lists of files. CPSR will
continually update their pages to insure the accuracy and usefulness of
this resource.

CPSR was founded in 1981 by a group of computer scientists concerned
about the use of computers in nuclear weapons systems. CPSR has since
grown into a national public-interest alliance of information
technology professionals and other people. Currently, CPSR has 22
chapters in the U.S. and affiliations with similar groups worldwide.
The National Office is in Palo Alto, California.


------------------------------

From: "Prof. L. P. Levine" <levine@blatz.cs.uwm.edu>
Date: 13 Jul 1994 15:57:50 -0500 (CDT)
Subject: New National ID Card Proposal

from Risks-Forum Digest Weds 13 July 1994 [16:23] Forum on Risks to
the Public in Computers and Related Systems ACM Committee on Computers

Date: 12 Jul 1994 20:11:46 -0500
From: David Banisar <Banisar@epic.org>
Subject: New National ID Card Proposal

CBS Evening News just reported that Clinton has "tentatively signed
off" on a National ID card recommended to him by a commission on
immigration reform. The ostensible reason for the card is for
employment and immigration. Each card will contain a name, photo, mag
stripe with info and a "verified SSN." It was supported by Senator Alan
Simpson of Wyoming, a long-time supporter of ID cards. Gov. Pete Wilson
of California has apparently offered to make California a test-bed for
the proposal. The proposal was opposed by Xavier Beccera, a
Congressman from California. A previous effort to impose a national ID
card was rejected by Congress in 1986.

EPIC is working with Privacy International to investigate this report.
PI has led successful campaigns against national ID cards in Australia,
New Zealand, and the Philippines.

In Australia, the PI-led campaign led to the dissolution of both houses
of the federal Parliament in 1987 after hundreds of thousands marched
in protest. The Australian campaign brought together groups from all
parts of the political spectrum from the Communist Party to the
Libertarian Alliance, farmers and conservation groups, rock stars,
academics, large businesses such as banks and mining corporations, but
the overwhelming support came from the public who created the biggest
civil protest in Australian history.

David Banisar (banisar@epic.org) Electronic Privacy Information Center
666 Penn. Ave, SE #301, Washington, DC 20003 202-544-9240 (v)
202-547-5482 (f)


------------------------------

From: weh@SEI.CMU.EDU (Bill Hefley)
Date: 13 Jul 1994 23:03:47 EDT
Subject: Subjective Questionnaires re Privacy
Organization: Software Engineering Institute

As an adjunct to some work that I'm presently doing with advanced
automation, I'm interested in exploring some perceptions of users with
respect to privacy concerns.

I've found few studies that looked at these areas, but would be
interested in knowing of any references to such studies or examples of
questionnaires that have been used in the past.

--
Bill Hefley Software Engineering Institute
Carnegie Mellon University
Pittsburgh, PA 15213 U.S.A.
Office: +1-412-268-7793, Fax: +1-412-268-5758, internet: weh@sei.cmu.edu


------------------------------

From: jwendel@ccnet.com (Jesse Wendel)
Date: 11 Jul 1994 19:21:47
Subject: Re: CID is not the same as 800 or 911 ANI
Organization: Kid SmartWare, Inc.

Michael Travers <mt@media.mit.edu> writes: ... In the Boston area,
the recently introduced caller-id system only has a line-blocking
feature that DOES block 911 calls. They say this will be fixed
sometime in late 1995. In the meantime, you have to choose between
privacy and safety.

Is this true!!! A working caller-id system that actually blocks 911?

How/why is this tolerated? Any fatalities or near misses yet?

Can you provide sources/verification?

Thanks.


------------------------------

From: makyen@netcom.com (makyen)
Date: 12 Jul 1994 13:19:15 GMT
Subject: Re: Question About CallerID
Organization: NETCOM On-line Communication Services (408 261-4700 guest)

kadokev@rci.ripco.com (Kevin Kadow) writes: At least in Chicago,
not only will Caller ID give the number, but CID with name gives
the name for any caller, listed or unlisted, who they've got around
to entering into their database- unfortunately the database seems
to be consistently a few months behind reality.

In California, the PUC ruled that if the local carrier is going
to provide CID to customers then it must do the following:
Two types of line categories:
A. CID is normally blocked
Can unblock on a per-call basis with correct
*## code, as spec'ed by Bellcore (*68 as I
recall).

B. CID is normally unblocked
Can block with correct *## code, as spec'ed
by Bellcore (*67 as I recall).

Upon setup of CID service all lines must be assigned to A & B
as follows:
All currently unlisted numbers placed in category A.
All currently listed numbers placed in category B.

A charge is permitted to change from A to B.

Based on this ruling, PacBell, the largest provider in California,
has stated that they will _NOT_ provide CID service because complying
with the PUc ruling would be too expensive. I have heard PacBell
complain about this ruling because "other 800 line providers
are not required to do this".

makyen


------------------------------

From: snyderra@dunx1.ocs.drexel.edu (Bob Snyder)
Date: 12 Jul 1994 18:25:22 -0400
Subject: Re: Question About CallerID
Organization: Drexel University (Computing Services)

Bernie Cosell <bernie@fantasyfarm.com> wrote: But there's an
interesting standoff [at least here in Bell Atlantic land]. One
option you can purchase is "refused blocked calls". So you, with
your unpub number, may discover that you're caught between a rock
and a hard place: either you give out your unpub number, or you
can't call the person _at_all_.

This is, IMHO, a fairly good trade off. You can protect your number,
but I don't have to take the call.

As far as I know, BA provides this service for free, if you have Caller
ID. At least, that's the case for Bell Atlantic - New Jersey. It
doesn't make sense to have the service without Caller ID.

However, you can still call the person without revealing your number:
Use a pay phone.

--
Bob Snyder N2KGO MIME, RIPEM mail accepted
snyderra@dunx1.ocs.drexel.edu finger for RIPEM public key
When cryptography is outlawed, bayl bhgynjf jvyy unir cevinpl.


------------------------------

From: Lynne Gregg <lynne.gregg@mccaw.com>
Date: 11 Jul 94 16:28:00 PDT
Subject: RE: Caller ID - Unblocking Per Line Block

kadokev@rci.ripco.com (Kevin Kadow) stated: Personally, I am in
favor of BOTH per call and line blocking, with *67 doing nothing on
a line with line blocking enabled, and another code (*68?) enabling
caller-id sending if it was disabled. All at no charge.

I agree, both per line and per call options should be made available to
consumers. Several States and Service Providers support "unblocking"
as you describe as "caller-id sending". Then, *82 is generally used.

Regards,
Lynne


------------------------------

From: cntrspy@netcom.com (Executive Protection Assoc)
Date: 13 Jul 1994 00:07:20 GMT
Subject: Re: Video Camera on Utility Poles
Organization: NETCOM On-line Communication Services (408 261-4700 guest)

Glen Roberts (glr@ripco.com) wrote: It might not be widespread yet,
however, my sources tell me that they are one of the most popular
surveillance items (to the law enforcement markert place). What
are they? Remote control, pan, tilt, zoom, video cameras (some of
the literature I've seen also says they have audio). They are
mounted inside a utility transformer (looks like a Edison
Transformer on a telephone pole). Also, telephone splicing boots
and boxes.

Actually they can be had for as little as $5K for the Telco splice boot
and about $10-12K for the transformer. Pan tilt and zoom are
controlled via the DTMF pad on a hand held radio, signal can be fed
either via 24Gig microwave or a spare pair at 56Kbs with a high
sampling rate. They are also VERY popular with our foreign clients,
especially with an 880 Nms Infrared flood light source. Will light up
a country or city intersection and take GREAT quality video !

They have been around for at least 8 years that I know of.

We use them for our High risk clients.

--
Chris Hall
Chief Operating Officer
Executive Protection Associates, Inc.
Worldwide Investigations, Privacy Protection, Off-Shore Banking and
Trust Agents. Second Passport and Economic Citizenship Agents.

Opinions Expressed are those of the author and NOT those of E.P.A.I.


------------------------------

From: lupienj@wal.hp.com (John Lupien)
Date: 13 Jul 94 17:41:58 EDT
Subject: Re: Clipper security and other lies

patchman writes: Subject: What's a Cop to Do? Greetings Cyberati,
My question regarding the Clipper is this: If a law enforcement
official suspects illegal activity behind electronic enemy lines,
what would he/she do for surveillance if he/she didn't have the
Clipper?

A better question might be "what would the cop do if they DID have
Clipper?" Unless the suspect is not only crooked but stupid, they won't
be using Clipper for sensitive communications. And in fact, geven that
Clipper is a manifestly insecure system, nobody who wants security,
whether for licit or illicit reasons, will use it for sensitive
communications unless they are either stupid or they don't really care
that much about the security of the sensitive conversation. Unless I
am quite sure that the channel I am using can be decrypted ONLY by my
trusted correspondent, then use of that channel for sensitive
correspondence is simply untennable. The notion that the law
enforcement community needs Clipper to catch "bad guys" is apparently a
red herring: many electronic eavesdropping mechanisms exist which do
not require wiretapping, and wiretapping is relatively ineffective for
catching any but the stupidest of crooks. I rather doubt that any crook
smart enough to know that they want to encrypt sensitive phone calls is
dumb enough to use an encryption mechanism that the government can
decrypt. Given that, it would appear that the real purpose behind the
Clipper proposal is an attempt to prevent people from using effective
encryption mechanisms, which is an effort which seems doomed to failure
from the get-go, as in fact strong and effective encryption is already
available and in use, world-wide.

--
John R. Lupien lupienj@wal.hp.com


------------------------------


End of Computer Privacy Digest V5 #005
******************************

loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT