EPIC logo



========================================================================
                           E P I C  A l e r t
========================================================================
Volume 13.04                                           February 23, 2006
------------------------------------------------------------------------

                            Published by the
               Electronic Privacy Information Center (EPIC)
                            Washington, D.C.

             http://www.epic.org/alert/EPIC_Alert_13.04.html

========================================================================
Table of Contents
========================================================================
[1] Court Orders Release of NSA Spy Documents to EPIC
[2] EPIC Urges Privacy for Whois Data
[3] Report on US-VISIT: Government is Lax on Security, Privacy
[4] Congress Slams Tech Firms On Censorship in China
[5] Federal Intelligence Agencies Reclassify Thousands of Documents
[6] News in Brief
[7] EPIC Bookstore: James Bamford's "The Puzzle Palace"
[8] Upcoming Conferences and Events

========================================================================
[1] Court Orders Release of NSA Spy Documents to EPIC
========================================================================

In response to a Freedom of Information Act lawsuit filed by EPIC, a
federal judge has ordered the Department of Justice to either process
and release documents related to the Bush Administration's warrantless
surveillance program or explain why it will withhold them by March 8. It
is the first court ruling involving the controversial domestic spying
operation.

"President Bush has invited meaningful debate about the warrantless
surveillance program," U.S. District Judge Henry H. Kennedy wrote. "That
can only occur if DOJ processes [EPIC's] FOIA requests in a timely
fashion and releases the information sought."

He continued, "Given the great public and media attention that the
government's warrantless surveillance program has garnered and the
recent hearings before the Senate Judiciary committee, the public
interest is particularly well-served by the timely release of the
requested documents."

EPIC submitted FOIA requests to four Justice Department offices the same
day that the New York Times reported a secret presidential order
authorizing the National Security Agency to conduct warrantless
surveillance of international telephone and Internet communications on
American soil. Noting the extraordinary public interest in the program,
as well as its potential illegality, EPIC asked the offices to expedite
the processing of its requests. The Justice Department agreed that the
requests warranted priority treatment, but failed to comply with the
FOIA's usual time limit of twenty working days.

Last month, EPIC filed suit against the Justice Department to compel the
immediate disclosure of information about the warrantless surveillance.
EPIC's case has been consolidated with a lawsuit filed by the American
Civil Liberties Union and the National Security Archive concerning
requests for the same documents.

Once the Justice Department finishes processing the material, any
decision to withhold the requested documents will be subject to Judge
Kennedy's review.  He will have the ability to order "in camera"
production of the material and make an independent determination
concerning public disclosure.

In related news, the American Bar Association has issued a report
calling upon President Bush to abide by constitutional checks and
balances, and to end electronic surveillance inside the United States
that does not comply with the requirements of the Foreign Intelligence
Surveillance Act. The Association expressed overwhelming support for the
report, which also urged the Congress to undertake comprehensive
investigations of the Bush Administration's domestic surveillance
activities.

Judge Kennedy's order in EPIC v. DOJ (pdf):

     http://www.epic.org/privacy/nsa/pi_order.pdf

EPIC's Domestic Surveillance FOIA Page:

     http://www.epic.org/privacy/nsa/foia

American Bar Association report:

     http://www.abanet.org/media/releases/news021306_3.html

EPIC's Foreign Intelligence Surveillance Act Page:

     http://www.epic.org/privacy/terrorism/fisa


========================================================================
[2] EPIC Urges Privacy for Whois Data
========================================================================

On February 13, EPIC submitted comments urging privacy protections for
Whois data, in response to ICANN's Preliminary Task Force Report on the
Purpose of Whois. Whois provides the personal contact information for
the owners of domain names. The Task Force was put together in order to
determine how the Whois function of domain name registry is supposed to
work, and what information about domain name owners should be made
public.

ICANN is the corporation that manages the assignment of domain names
(such as epic.org) to Internet Protocol addresses (such as
209.183.239.12). Every person or company that registers a domain name is
required to make certain information publicly accessible to a Whois
lookup. This information includes the contact information for the domain
name holder, including her mailing address, email address, telephone
number, and fax number. This same information has to be provided for the
site's administrative contact and technical contact.

EPIC recommended that ICANN adopt "Formulation One," which limits the
use of Whois data to technical and administrative purposes only. EPIC
specifically opposed a proposal that would make Whois data available for
broader purposes, such as law enforcement and copyright investigations.

Since ICANN doesn't let users register anonymously, EPIC contended,
"anyone with Internet access has access to Whois data, including
stalkers, corrupt governments cracking down on dissidents, spammers,
aggressive intellectual property lawyers, and police agents without
legal authority." The comments also pointed out that, since the
information was available worldwide, and available for all registrants,
Whois data can prove dangerous to "political, artistic, and religious
groups around the world [who] rely on the Internet to provide
information and express views while avoiding persecution."

EPIC further explained that ICANN's Whois policy conflicts with the laws
of many countries that have comprehensive privacy laws and the European
Union's Data Protection Directive. The Directive requires that when
information is collected, it be used only for its intended purpose.

EPIC argued that much of this information in Whois is unnecessary for
its intended purpose, which was to allow network administrators to find
and fix technical problems with minimal hassle in order to maintain the
stability of the Internet.  Providing more information that is necessary
for this basic purpose, EPIC said, could also increase the risk of
identity theft for domain name holders.

ICANN's Preliminary Report on Whois:

     http://www.epic.org/redirect/prelim_whois.html

EPIC's Comments on Whois:

     http://forum.icann.org/lists/whois-comments/msg00042.html

EPIC's Whois Page:

     http://www.epic.org/privacy/whois/

Privacy and Human Rights 2004 Report on Whois:

     http://www.epic.org/redirect/phr2004_whois.html


========================================================================
[3] Report on US-VISIT: Government is Lax on Security, Privacy
========================================================================

The Department of Homeland Security's sluggishness has jeopardized the
effectiveness of the US-VISIT border security program, according to a
new report from the Government Accountability Office. Homeland Security
has yet to develop and begin implementing a system security plan and
privacy impact assessment, the key recommendation that the GAO made when
it assessed the program two and a half years ago.

US-VISIT requires foreign nationals entering or exiting the country to
submit biometric and biographical information. This data collection
often begins before a visitor buys her plane ticket, as U.S. consular
offices abroad may, before issuing a U.S. visa, collect fingerscans from
potential visitors and compare them against those in a criminal
database. Fingerscans are again collected upon the visitor's arrival in
the U.S. for verification and then stored in a government database,
along with travelers' arrival and departure records. Failure to be
processed through this departure confirmation system could jeopardize a
visitor's re-admittance to the U.S., as the government compares the
manifest information provided by air and cruise lines to ascertain that
visitors have not overstayed their visas.

The GAO report found that US-VIST has yet to complete a strategic plan
and key cost-benefit analyses, despite the $1.4 billion already spent on
the program and despite GAO's strong recommendation in 2002 that it do
so. "However, although considerable time has passed since the
recommendations were made, key actions have not yet been taken in such
critical areas as (1) assessing security risks and planning for
cost-effective controls to address the risks, (2) determining -- before
US-VISIT increments are deployed -- whether each increment will produce
mission value commensurate with cost and risk, and (3) ensuring that
each increment is adequately tested," the GAO said.

Of the 18 recommendations the GAO suggested in 2002 to improve US-VISIT,
the Department of Homeland Security has only implemented two, the GAO
said. Homeland Security has "also taken steps to implement the other
recommendations partially completed 11 and is just beginning on five,"
the GAO said. The GAO also said that the longer it took to implement the
recommendations, "the greater the risk that the program will not meet
its stated goals and commitments."

Last month, Randolph Hite, GAO's Director of Information Technology
Architecture and Systems Issues, testified about US-VISIT before the
Senate Appropriations Committee's Subcommittee on Homeland Security.
Hite described problems with US-VISIT's current tests on the use of
radio frequency identification (RFID) tags in arrival and departure
forms to track people traveling through land ports. RFID tags do not
ensure the document belongs to the person carrying it and the technology
is imperfect, Director Hite said.

According to the GAO, "Despite DHS's estimate in February 2003, that the
total overall cost of the US-VISIT program would be about $7.2 billion
through fiscal year 2014, the potential government wide cost of US-VISIT
over just a 10-year period could be about twice as much." For Fiscal
Year 2007, President Bush has requested $399.5 million for the US-VISIT
program, $62.9 million more than it received in 2006. Most of the
increase will go toward the expansion of US-VISIT's fingerprint system;
it will now capture all 10 fingerprints instead of two.

Government Accountability Office Report on US-VISIT (pdf):

     http://www.gao.gov/new.items/d06296.pdf

Testimony of Randolph C. Hite, Government Accountability Office, Before
the Senate Subcommittee on Homeland Security (Jan. 25, 2006) (pdf):

     http://www.epic.org/redirect/hite_usvisit.html

Department of Homeland Security's Budget in Brief Fiscal Year 2007 (pdf):

     http://www.epic.org/redirect/dhs2007budget.html

EPIC's US-VISIT Page:

     http://www.epic.org/privacy/us-visit/

Department of Homeland Security's US-VISIT Page:

    http://www.dhs.gov/us-visit


========================================================================
[4] Congress Slams Tech Firms On Censorship in China
========================================================================

On February 15, a subcommittee of the House International Relations
Committee held hearings on the presence of U.S. tech firms in China, and
the complicity of these companies in suppressing free speech in China.
Representatives from Yahoo, Cisco, Microsoft, and Google testified
before the subcommittee.

Each of the four firms has been implicated in helping the Chinese
government maintain a strict control over speech in the People's
Republic of China.  Yahoo, for instance, gave Chinese authorities data
on at least two of its users who posted information critical of the
government online.  The two users, Shi Tao and Li Zhi, were imprisoned
for ten and eight years, respectively, for separate incidents of
speaking out against the government.

Cisco has come under fire for selling equipment that can be used to
monitor and censor speech, as well as training Chinese police in its
use.  Upon requests by the government, Microsoft removed the blog of
another cyberdissident, Zhao Jing (aka "Anti"), not just from Chinese
servers, but from circulation entirely.  Google, along with other search
engines in China, has self-censored its search results in exchange for
being able to operate in-country.

The hearings took a decidedly hostile tone, with both Republicans and
Democrats harshly criticizing the assembled witnesses for the companies.
Representative Tom Lantos (D-CA), pointedly asked the witnesses if they
were "ashamed" of their companies' actions. Representatives also blamed
China for its poor human rights record and its policies of censoring and
harassing or imprisoning dissidents. Yahoo and Google were most heavily
grilled, while Cisco was largely left unquestioned.

Human rights experts who testified in the next panel seemed to indicate,
however, that Cisco should have received further scrutiny. Harry Wu, of
the China Information Center, and Lucie Morillon of Reporters Without
Borders both targeted Cisco for training Chinese police in the use of
Cisco networking equipment that can be used to monitor online speech.
The panel's witnesses, who also included Sharon Hom of Human Rights in
China, Xiao Qiang of Berkeley's China Internet Project, and Libby Liu of
Radio Free Asia all called for tech companies in China to take a firmer
stand against speech-repressive policies overseas.

Representative Christopher Smith (R-NJ), who chairs the Subcommittee on
Africa, Global Human Rights, and International Operations, and who
called for the hearing, has proposed a bill that would, among many other
things, prevent search engines and Internet hosting services from
operating within China and other designated countries.

Hearing Notice, "The Internet in China: A Tool for Freedom or
Suppression?":

     http://wwwc.house.gov/international_relations/109/af021506.htm

Subcommittee Home Page (includes links to hearing testimony and
webcast):

     http://wwwc.house.gov/international_relations/afhear.htm

Human Rights in China Home Page:

     http://www.hrichina.org/public/

Reporters Without Borders China Page:

     http://www.rsf.org/country-50.php3?id_mot=88&Valider=OK

Draft Version of Rep. Smith's Global Online Freedom Act of 2006 (pdf):

     http://www.epic.org/redirect/gofa2006.html

Privacy and Human Rights 2004 China Report:

     http://www.epic.org/redirect/phr2004china.html

EPIC's Filters and Freedom 2.0:

     http://www.epic.org/bookstore/filters2.0/

========================================================================
[5] Federal Intelligence Agencies Reclassify Thousands of Documents
========================================================================

Intelligence agencies have reclassified about 9,500 documents that were
available to the public for years at the National Archives, according to
a recent report by the New York Times. The effort began seven years ago
after the CIA and five other agencies complained about the implications
of a declassification order signed by President Clinton in 1995. About
8,000 documents have been reclassified during the Bush presidency alone.

Documents that have been taken off the Archive's shelves through the
program include decades-old reports from the State Department, as well
as historical documents that researchers photocopied and have kept in
their files.

The National Archives' Information Security Oversight Office launched an
investigation into the program after receiving complaints from
historians and reviewing 16 reclassified documents, none of which were
found to warrant secrecy. Furthermore, the office had not been informed
of reclassifications made through the program, even though a 2003 law
requires reclassifications to be reported to the office. While the
office cannot order that the documents be declassified, its director,
William J. Leonard, is the President's top advisor on classification
policy and may urge the White House to terminate the program.

A hint of the reclassification program's existence came in 2004, when a
State Department official informed the agency's Historical Advisory
Committee that the CIA had been reclassifying State Department
documents. In that meeting, CIA officials "claimed the right to remove
documents from the open files that, in their view, had never been
'properly declassified.'"

Under current executive orders, secret documents must be made public
after 25 years unless there is a compelling reason to keep them
classified.

New York Times, U.S. Reclassifies Many Documents in Secret Review:

     http://www.nytimes.com/2006/02/21/politics/21reclassify.html

National Archives Information on Declassification:

     http://www.archives.gov/about/regulations/part-1260.html

Minutes of the State Department Historical Advisory Committee Meeting
(Sept. 2004):

     http://www.fas.org/sgp/advisory/state/hac0904.html

EPIC's Open Government Litigation Page:

     http://www.epic.org/privacy/litigation/

EPIC's Litigation Under the Federal Open Government Laws:

     http://www.epic.org/bookstore/foia2004/


========================================================================
[6] News in Brief
========================================================================

New Anti-Identity Theft Resource for Katrina/Rita Victims

EPIC has prepared an easy to use guide for those affected by the
devastation of last year's hurricane season. The involuntary relocation
of 300,000 persons dispossessed many people of their property, means of
providing identification, and community support for establishing
identity, thus placing those affected at a higher risk of identity
theft. To help, EPIC has created a resource to advise evacuees on what
to do if they suspect identity theft, and the best means of protecting
themselves from identity thieves. The best defense against identity
theft is monitoring your credit report and placing restrictions with
credit reporting agencies on providing information about you to credit
grantors or others.

EPIC's Identity Theft Resource for Hurricane Victims:

     http://www.epic.org/privacy/idtheft/katrina.html


EPIC Urges Personal Data Be Scrubbed from Court Files
 
In comments to the federal judiciary, EPIC called for changes to
procedural rules to shield personal information in court files from
disclosure.  EPIC argued that the very purpose of public records -- the
ability of the individual to learn about the government -- is turned on
its head when the records include excessive personal information.
Instead of being a citizen's window into government activities, these
records are giving the government, law enforcement, and data brokers a
window into our daily lives.  EPIC made several specific
recommendations, including preventing commercial uses of public records,
limiting bulk access to records, and removing unique identifiers from
the records.

EPIC Comments on Personal Data in Court Files:
 
     http://epic.org/privacy/publicrecords/frcpcom21506.html
 
EPIC Privacy and Public Records Page:
 
     http://epic.org/privacy/publicrecords/


Canada to Establish Do-Not-Call List

The Canadian Radio-television and Telecommunications Commission (CRTC)
is seeking comments from the public on the development of a national
do-not-call registry and telemarketing rules.  Comments are due by May
10th. The CRTC will also hold a public meeting on the proceeding from
May 2-5, 2006 in Gatineau, Quebec.
 
Do-Not-Call Registry Press Release:

     http://www.crtc.gc.ca/eng/NEWS/RELEASES/2006/r060220.htm


EPIC Warns Ethics Board of Attorneys' Use of Pretexting
 
In a letter sent to lawyers' ethics boards, EPIC warned that attorneys
appear to be major purchases of "pretexting" services, and that use of
such services is unethical under state professional responsibility
rules. Pretexting is the practice of using false pretenses to trick a
company into releasing personal information. EPIC urged state boards to
evaluate pretexting under ethics rules, and to issue opinions to
attorneys advising them not to pretext or hire investigators who use
pretexting to obtain information. Generally, ethical rules governing
attorneys prevent them from engaging in fraud, dishonesty, or
misrepresentation. Since pretexting involves impersonation or other
fraud to obtain personal information, EPIC argued that ethics boards
must advise attorneys not to engage in the practice.
 
EPIC Letter to Ethics Boards:
 
     http://epic.org/privacy/iei/attyltr22106.html
 
EPIC Pretexting Page:
 
     http://epic.org/privacy/iei/


Groups Urge San Francisco to Deploy Privacy-Friendly Wifi Network
 
The ACLU of Northern California, EFF, and EPIC submitted comments to San
Francisco TechConnect urging it to establish a privacy-friendly
municipal broadband service in the city. San Francisco TechConnect has
been tasked by Mayor Gavin Newsom to research options for a free or
low-cost municipal Internet service. In October 2005, the groups
highlighted privacy issues in a letter to TechConnect, and the agency
incorporated the issues as questions posed to providers in the city's
formal request for proposals. Provider proposals were due this week, and
several were expected to pitch systems that would use personal
information for advertising or otherwise implicate privacy interests.
The coalition comments urged TechConnect to set minimum standards for
privacy protection in the new network, including accommodations for
anonymous and pseudonymous users, limits on the retention of personal
information, and strong standards protecting users' interests when legal
demands are made for network data.
 
Coalition Letter on San Francisco Municipal Broadband:
 
     http://epic.org/privacy/internet/sfws22106.html
 
San Francisco TechConnect:

     http://www.sfgov.org/site/tech_connect_page.asp?id=33899


UK Moves Closer To Mandatory National ID Card

The House of Commons last week voted to require that all Britons seeking
passports also obtain a government-issued identity card that would
include biometrics such as a scanned  fingerprint or a digital iris
image. Privacy advocates, including Privacy International, have
vigorously opposed the plan. A report by leading academics from the
London School of Economics indicates that the ID scheme will be costly,
inefficient, and easily subverted. The proposal goes next to the House
of Lords.

London School of Economics Report (pdf):

     http://is2.lse.ac.uk/IDcard/identityreport.pdf

EPIC's National ID Cards and REAL ID Act Page:

     http://www.epic.org/privacy/id_cards/


Houston Proposes Cameras in Public and in Private Places

Houston's Chief of Police proposed last week to install video
surveillance cameras in downtown streets, shopping malls, apartment
complexes and even private homes, in order to fight against crime and to
remedy a shortage of police officers. Chief Harold Hurtt's intended
purpose is to make people "feel safer" "in reality and perception."
However, most studies of video surveillance have shown that cameras do
not reduce crime in public places, because criminals simply go elsewhere
to commit their crimes out of camera range. Though the cameras may make
residents "feel safer," their actual safety is unchanged.

Houston Chronicle Article on Proposed Cameras:

     http://www.chron.com/disp/story.mpl/headline/metro/3663189.html

EPIC's Video Surveillance Page:

     http://www.epic.org/privacy/surveillance/default.html


FTC Announces Settlement in CardSystems Security Breach

On February 23, the Federal Trade Commission announced that it had
reached a settlement with CardSystems Solutions, Inc., whose poor
security practices led to the breach of tens of millions of consumers'
personal information. The company's unnecessary storage of personal
data, along with its lack of network protections, allowed fraudsters to
rack up millions of dollars in fraudulent purchases. The settlement
requires CardSystems and its successor company, Solidus Networks, to
implement a stronger security program and be audited every two years for
the next twenty years.

FTC Press Release on CardSystems:

     http://ftc.gov/opa/2006/02/cardsystems_r.htm

Text of the CardSystems Settlement Agreement (pdf):

     http://ftc.gov/os/caselist/0523148/0523148consent.pdf

EPIC's Page on Identity Theft:

     http://www.epic.org/privacy/idtheft/


========================================================================
[7] EPIC Bookstore: James Bamford's "The Puzzle Palace"
========================================================================

The Puzzle Palace: Inside America's Most Secret Intelligence
Organization. Penguin Books, 1983.

http://www.powells.com/partner/24075/biblio/0140067485

"In this remarkable tour de force of investigative reporting, James
Bamford exposes the inner workings of America's largest, most secretive,
and arguably most intrusive intelligence agency. The NSA has long eluded
public scrutiny, but The Puzzle Palace penetrates its vast network of
power and unmasks the people who control it, often with shocking
disregard for the law. With detailed information on the NSA's secret
role in the Korean Airlines disaster, Iran-Contra, the first Gulf War,
and other major world events of the 80s and 90s, this is a brilliant
account of the use and abuse of technological espionage."


================================

EPIC Publications:

"Information Privacy Law: Cases and Materials, Secod Edition" Daniel J.
Solove, Marc Rotenberg, and Paul Schwartz. (Aspen 2005). Price: $98.
http://www.epic.org/redirect/aspen_ipl_casebook.html

This clear, comprehensive introduction to the field of information
privacy law allows instructors to enliven their teaching of fundamental
concepts by addressing both enduring and emerging controversies. The
Second Edition addresses numerous rapidly developing areas of privacy
law, including: identity theft, government data mining,and electronic
surveillance law, the Foreign Intelligence Surveillance Act,
intelligence sharing, RFID tags, GPS, sypware, web bugs, and more.
Information Privacy Law, Second Edition, builds a cohesive foundation
for an exciting course in this rapidly evolving area of law.

================================

"Privacy & Human Rights 2004: An International Survey of Privacy Laws
and Developments" (EPIC 2004). Price: $50.
http://www.epic.org/bookstore/phr2004

This annual report by EPIC and Privacy International provides an
overview of key privacy topics and reviews the state of privacy in over
60 countries around the world. The report outlines legal protections,
new challenges, and important issues and events relating to privacy.
Privacy & Human Rights 2004 is the most comprehensive report on privacy
and data protection ever published.

================================

"FOIA 2004: Litigation Under the Federal Open Government Laws," Harry
Hammitt, David Sobel and Tiffany Stedman, editors (EPIC 2004). Price:
$40.
http://www.epic.org/bookstore/foia2004

This is the standard reference work covering all aspects of the Freedom
of Information Act, the Privacy Act, the Government in the Sunshine Act,
and the Federal Advisory Committee Act.  The 22nd edition fully updates
the manual that lawyers, journalists and researchers have relied on for
more than 25 years.  For those who litigate open government cases (or
need to learn how to litigate them), this is an essential reference
manual.

================================

"The Public Voice WSIS Sourcebook: Perspectives on the World Summit on
the Information Society" (EPIC 2004). Price: $40.
http://www.epic.org/bookstore/pvsourcebook

This resource promotes a dialogue on the issues, the outcomes, and the
process of the World Summit on the Information Society (WSIS).  This
reference guide provides the official UN documents, regional and
issue-oriented perspectives, and recommendations and proposals for
future action, as well as a useful list of resources and contacts for
individuals and organizations that wish to become more involved in the
WSIS process.

================================

"The Privacy Law Sourcebook 2004: United States Law, International Law,
and Recent Developments," Marc Rotenberg, editor (EPIC 2005). Price:
$40.
http://www.epic.org/bookstore/pls2004/

The Privacy Law Sourcebook, which has been called the "Physician's Desk
Reference" of the privacy world, is the leading resource for students,
attorneys, researchers, and journalists interested in pursuing privacy
law in the United States and around the world. It includes the full
texts of major privacy laws and directives such as the Fair Credit
Reporting Act, the Privacy Act, and the OECD Privacy Guidelines, as well
as an up-to-date section on recent developments. New materials include
the APEC Privacy Framework, the Video Voyeurism Prevention Act, and the
CAN-SPAM Act.

================================

"Filters and Freedom 2.0: Free Speech Perspectives on Internet Content
Controls" (EPIC 2001). Price: $20.
http://www.epic.org/bookstore/filters2.0

A collection of essays, studies, and critiques of Internet content
filtering.  These papers are instrumental in explaining why filtering
threatens free expression.

================================

EPIC publications and other books on privacy, open government, free
expression, crypto and governance can be ordered at:

EPIC Bookstore http://www.epic.org/bookstore

"EPIC Bookshelf" at Powell's Books
http://www.powells.com/features/epic/epic.html

================================

EPIC also publishes EPIC FOIA Notes, which provides brief summaries of
interesting documents obtained from government agencies under the
Freedom of Information Act.

Subscribe to EPIC FOIA Notes at:
https://mailman.epic.org/cgi-bin/control/foia_notes


========================================================================
[8] Upcoming Conferences and Events
========================================================================

A Universal DNA Database: Do the Benefits Outweigh the Risks? The
National Academies. Washington, DC. February 28, 2006. For more
information:
http://www7.nationalacademies.org/policyfellows/Events.html

Call for papers for the Workshop on Generating Collaborative Research in
the Ethical Design of Surveillance Infrastructures.  The deadline for
proposals is March 1, 2006. For more information:
http://communication.utexas.edu/ethicalsurveillance/

IAPP National Summit. International Association of Privacy
Professionals. Washington, DC. March 8-10, 2006. For more information:
https://www.privacyassociation.org/registration

Call for papers for the 34th Research Conference on Communication,
Information, and Internet Policy. Telecommunications Policy Research
Conference. Proposals should be based on current theoretical or
empirical research relevant to communication and information policy, and
may be from any disciplinary perspective. Deadline is March 31, 2006.
For more information:
http://www.tprc.org/TPRC06/call06.htm

Beyond the Basics: Advanced Legal Topics in Open Source and
Collaborative Development in the Global Marketplace. University of
Washington School of Law. March 21, 2006. Seattle, Washington. For more
information:
http://www.law.washington.edu/lct/Events/FOSS/

Making PKI Easy to Use. National Institutes of Health. April 4-6, 2006.
Gaithersburg, Maryland. For more information:
http://middleware.internet2.edu/pki06/

First International Conference on Availability, Reliability and
Security. Vienna University of Technology. April 20-22, 2006. Vienna,
Austria. For more information:
http://www.ifs.tuwien.ac.at/ares2006/

CHI 2006 Workshop on Privacy-Enhanced Personalization. UC Irvine
Institute for Software Research and the National Science Foundation.
April 22-23. Montreal, Quebec, Canada. For more information:
http://www.isr.uci.edu/pep06/

The First International Conference on Legal, Security and Privacy Issues
in IT (LSPI). CompLex. April 30-May 2, 2006. Hamburg, Germany. For more
information:
http://www.kierkegaard.co.uk/

Computers, Freedom, and Privacy Conference (CFP 2006). Association for
Computing Machinery May 2-5, 2006. Washington, DC. For more information:
http://cfp2006.org/

34th Research Conference on Communication, Information, and Internet
Policy. Telecommunications Policy Research Conference. September
29-October 1, 2006. Arlington, Virginia. For more information:
http://www.tprc.org/TPRC06/2006.htm

International Conference on Privacy, Security, and Trust (PST 2006).
University of Ontario Institute of Technology. October 20-November 1,
2006. Oshawa, Ontario, Canada. For more information:
http://www.businessandit.uoit.ca/pst2006/

BSR 2006 Annual Conference. Business for Social Responsibility. November
7-10, 2006. New York, New York. For more information:
http://www.bsr.org/BSRConferences/index.cfm

======================================================================
Subscription Information
======================================================================

Subscribe/unsubscribe via web interface:

https://mailman.epic.org/cgi-bin/mailman/listinfo/epic_news

Back issues are available at:

http://www.epic.org/alert

The EPIC Alert displays best in a fixed-width font, such as Courier.

========================================================================
Privacy Policy
========================================================================

The EPIC Alert mailing list is used only to mail the EPIC Alert and to
send notices about EPIC activities.  We do not sell, rent or share our
mailing list.  We also intend to challenge any subpoena or other legal
process seeking access to our mailing list.  We do not enhance (link to
other databases) our mailing list or require your actual name.

In the event you wish to subscribe or unsubscribe your e-mail address
from this list, please follow the above instructions under "subscription
information."

========================================================================
About EPIC
========================================================================

The Electronic Privacy Information Center is a public interest research
center in Washington, DC.  It was established in 1994 to focus public
attention on emerging privacy issues such as the Clipper Chip, the
Digital Telephony proposal, national ID cards, medical record privacy,
and the collection and sale of personal information. EPIC publishes the
EPIC Alert, pursues Freedom of Information Act litigation, and conducts
policy research.  For more information, see http://www.epic.org or write
EPIC, 1718 Connecticut Ave., NW, Suite 200, Washington, DC 20009. +1 202
483 1140 (tel), +1 202 483 1248 (fax).

If you'd like to support the work of the Electronic Privacy Information
Center, contributions are welcome and fully tax-deductible.  Checks
should be made out to "EPIC" and sent to 1718 Connecticut Ave., NW,
Suite 200, Washington, DC 20009.  Or you can contribute online at:

http://www.epic.org/donate

Your contributions will help support Freedom of Information Act and
First Amendment litigation, strong and effective advocacy for the right
of privacy and efforts to oppose government regulation of encryption and
expanding wiretapping powers.

Thank you for your support.

------------------------- END EPIC Alert 13.04 -------------------------

.