{"conf": "cfp", "generated_at": "2026-04-26T08:00:02.954878Z", "threads": [{"num": 1, "subject": "introductions", "response_count": 5, "posts": [{"response": 1, "author": "terry", "date": "Tue, Feb 17, 1998 (10:32)", "body": "I'm the chief cook on the Spring and iterim host here. I look forward to attending CFP98 in Austin over the next 3 days and getting to know folks better and learning how to be a more aware and saavy netizen. If you see me banging around the conference with a camcorder, and have something to say, I'd love to record it for our multimedia recap of the show in a few days. Actually, we should have some content up on the first night now the show, so check in at http://www.spring.com Enjoy! Now introduce yourself please!"}, {"response": 2, "author": "orange", "date": "Sun, Mar  8, 1998 (22:01)", "body": "thanks so much for putting the conference on-line Terry, it is SO interesting and informative. i will just keep listening to it, as you change the audio. thanks for going to all the effort of doing this!!"}, {"response": 3, "author": "terry", "date": "Mon, Mar  9, 1998 (11:00)", "body": "Thanks, I'll try and remember to keep changing the tapes and keeping the thing running, I'm going to go over right now and pop in the tape starting with the virtual commmunities conference. It's 10:30 am so if you see anything at a particular time let me know and I can run the tape back to there. It's an 8 hour tape so it will run until 6:30 pm tonight, at which time I'll put in another 8 hour tape."}, {"response": 4, "author": "orange", "date": "Mon, Mar  9, 1998 (19:13)", "body": "i just keep listening till i dont hear anything new."}, {"response": 5, "author": "terry", "date": "Mon, Mar  9, 1998 (19:26)", "body": "OK I'llput another tape in now. cfp conference Main Menu"}]}, {"num": 10, "subject": "Privacy Law in France - Peters, Carblanc, Vrayance, Reidenberg", "response_count": 1, "posts": [{"response": 1, "author": "terry", "date": "Wed, Mar  4, 1998 (07:11)", "body": "Danielle Gallo: Although many ideas and issues were raised in the panel on 'Privacy and Encryption Law in France', there are only a few I would like to touch on. Professor Joel Reidenberg of the Fordham University School of Law ( http://www.fordham.edu/law/faculty/reidenberg/main.htm ) cited the territorial impact of data protection. He suggested trans-border data flows enable data passing to places with inferior protection. This is of utmost concern to the French, who hold strong views on privacy. The French position on data protection issues prevents sensitive data such as political or religious beliefs to be transmitted without consent. Reidenberg concedes that there is not full respect for data privacy laws; therefore, organizations have been created to supervise enforcement -- for example, the CNIL (Commission Nationale Informatique et Libertes) in France. This part of the discussion relates to Brian Kahin's keynote address, which cited the need for international agreements and well-defined principles. I think that compromise on these issues will be difficult because the French are very stringent on privacy issues and may not agree with the rest of the world. cfp conference Main Menu"}]}, {"num": 11, "subject": "International Crypto", "response_count": 0, "posts": []}, {"num": 12, "subject": "Virtual Communities, Real Communities - Etzioni", "response_count": 0, "posts": []}, {"num": 13, "subject": "Godzilla vs. Mothra - Solveig Singleton, Cato Institute", "response_count": 0, "posts": []}, {"num": 14, "subject": "We work for the phone company", "response_count": 0, "posts": []}, {"num": 15, "subject": "Govt Jurisdiction over Cyberspace Transactions - Goldsmith and Post", "response_count": 0, "posts": []}, {"num": 16, "subject": "Acceptable uses of the net in grades K-12 - Biegel and DeVoe y", "response_count": 0, "posts": []}, {"num": 17, "subject": "How to do a wiretap", "response_count": 1, "posts": [{"response": 1, "author": "terry", "date": "Wed, Mar  4, 1998 (07:12)", "body": "The lunch breakout sessions offered a decent variety in subject topics. I attended 'How to Do a Wiretap' with Shabbir J. Safdar from The Voters Telecommunications Watch. This was an entertaining session because the information was relayed in the form of a mock wiretap involving lawyers, government agents, and snowboarders. The snowboarders possessed illegal drugs and the FBI wanted to set up a wiretap to monitor their conversations. Safdar outlined the process of obtaining a wiretap, focusing on the necessary requirement, predicate offense, and probable cause. He also outlined minimization, which is the capture of material relevant to the investigation only. For example, the wiretap was shut off when the snowboarders began discussing the 'killer slopes, dude'. When the snowboarders began using snowboarding lingo as code words for drug lingo, the taping was resumed. Finally, a few interesting tidbits: computer fraud is not a valid predicate offense; 8 out of 10 offenses involve gambling and the Mafia; rules for data interception are less stringent when dealing with equipment such as pagers. - Danielle Gallo cfp conference Main Menu"}]}, {"num": 18, "subject": "Sale of Public Records - Crick", "response_count": 3, "posts": [{"response": 1, "author": "EmpZoltar", "date": "Tue, Mar  3, 1998 (21:43)", "body": "How about requiring that each person on a mailing list be paid $1 for the use of their name and address? Suddenly, those credit card goobers have to send out 10,000,000 $1 checks, and if they sell the mailing list, they have to pay another $.50. A charg e could be levied by the government for access to a person's personal records, and a portion of that fee would go to the person being accessed. A privacy seal could be placed on the account if desired, which would be irrevocable unless a court order is o tained. I've had some pretty nasty run-ins with marketers. Several years ago, my wife had a miscarriage. That was bad enough, but for months afterwards, we got cards, coupons and phone solicitations about baby-related services. Every single day, we had the emo tional wounds ripped open again by some yotz at a computer terminal, offering to sell us baby pictures, diaper service, childrens' books, insurance - it got to where I didn't even try to be polite to these people - I'd just scream into the phone, \"The god amn baby died, you stupid jerk! Leave us alone!\" One telemarketer called back three times, not believing what we told him. For the most part, I was too emotionally wiped out to contact the companies that were doing this - I just kept hoping it would en d. Eventually, I found out that our insurance comany had provided some of the information used to solicit us. I changed jobs shortly thereafter, and also insurance. I'm a real nut on privacy issues as a result of that horrific experience."}, {"response": 2, "author": "terry", "date": "Wed, Mar  4, 1998 (06:01)", "body": "That's awful. What an excample of the excess of telemarketers run amok. I got a telemarketer call last night telling me I had won $500 and I had to go somewhere to pick up my prize money, I conference called them to the Attorney Generals Office of Consumer Protection and listened while they explained why this wasn't a scam to the AGs office. It made for some interesting listening. When I do this, the telemarketers tend to cross me off their list. Maybe I'll get on a list of people *not* to telemarket!"}, {"response": 3, "author": "EmpZoltar", "date": "Wed, Mar  4, 1998 (06:30)", "body": "How cool! I've got to try that. I ususlly just give the old \"I'm sorry, but we don't accept telephone solicitations. Please remove us from your call list.\", followed with a hangup. If they seem inclined to argue, and I'm in a foul mood, I stay on the line and get abusive, but the polite approach seems to work, most of the time. One telemarketer got kind of huffy with me, first insisting he wasn't soliciting anything, then, when I got scarcastic, told me, \"There's really no call to speak to me like th t.\" I informed him that, as he had called my house, I was entitled to speak to him as I chose, at which point I ripped him a new one. AG's office - I have _got_ to try it. cfp conference Main Menu"}]}, {"num": 19, "subject": "Electronic Benefits and Welfare Reform - Betz, Lightsey and Mazur", "response_count": 7, "posts": [{"response": 1, "author": "EmpZoltar", "date": "Sun, Mar  8, 1998 (23:25)", "body": "Heard an interesting piece on NPR recently about how a shift to a cashless economy might actually cut down on crime. Most robbery/assaults are committed by poor people on poor people, mainly due to the fact the middle- and upper- class citizens tend to carry credit/debit cards rather than large amounts of cash. The absence of banking opportunities for lower-income individuals means that they must carry cash pretty much at all times. This means that, if an addict is to get quick cash for a fix, he must ob a low-income person to get sufficient money. Some have proposed giving all welfare recipients electronic benefits in order to not only protect them from assault & robbery, but to control what their money is spent on. I'm of mixed feelings about this. On the one hand, it might indeed help, both with inner-city crime and drug use. On the other, it layers more stifling control on welfare recipients, and I'm not sure what the effect of that might be. Here in Texas, food stamp recipients are given a \"Lonestar\" card, which they can use like any debit card at the grocery store. It will not pay for the usual things - alcohol, medicine, stuff like that, which means that there is less error on the part of cashiers. Some friends of mine that were on food stamps said they preferred using the card to those coupons, as it was harder for someone to tell they were using food stamps. I'm not sure of the exact figures, but this program has, from what I've heard, resulted in considerable savings for the state."}, {"response": 2, "author": "orange", "date": "Mon, Mar  9, 1998 (19:48)", "body": "probably the direction of the future, and it will take off even more if some kind of inexpensive personal-physical id reader--palmprint, or retinal or voiceprint, etc, is developed for checkstand use"}, {"response": 3, "author": "EmpZoltar", "date": "Tue, Mar 10, 1998 (21:48)", "body": "That's not so far off, from what I've heard. I think Sprint has a voiceprint analyzer for some phonecards, and palm/thumbprint technology is not too out there. Wonder what the lunatic right thinks of this idea?"}, {"response": 4, "author": "orange", "date": "Thu, Mar 12, 1998 (15:50)", "body": "666 for sure. just as long as we can still use cash and barter i believe there is a margin of safety but we are becoming public figures, each of us, whether we want to or not. maybe the appropriate response is to become like New Yorkers--on the offense all the time."}, {"response": 5, "author": "EmpZoltar", "date": "Thu, Mar 12, 1998 (21:42)", "body": "I'm with you on that - even if there is some crime attached to it, a black or grey market based on cash/barter allows the freedom of anonymity, which is becoming more important every single day. It is too easy to simply let the technology wander where it will, without attempting to provide some safeguards against its excesses. I am willing to trade _some_ measure of privacy in return for greater simplicity in other arenas, but there are some things that I just don't want anyone else to know I do, often or the sole purpose of keeping it private, rather than fear of arrest or embarrassment. It is vital, then, to strive to protect our privacy, and use the technology we have and will have to ensure that that happens."}, {"response": 6, "author": "orange", "date": "Sat, Mar 14, 1998 (13:49)", "body": "pray for encryption."}, {"response": 7, "author": "orange", "date": "Sat, Mar 14, 1998 (13:52)", "body": "have you been listening to the cfp98 link off the front page of thespring, really and excellent conference, and the link to all lectures only is at http://www.cfp98.org/schedule.html but terry has the pictures as well as the non-scheduled discussions. which are very interesting, but if you go over to the cfp98 site and listen to the crypto panels, it is worth doing, i think. cfp conference Main Menu"}]}, {"num": 2, "subject": "PICS - Is PICS the devil?", "response_count": 3, "posts": [{"response": 1, "author": "terry", "date": "Fri, Feb 20, 1998 (16:07)", "body": "Is PICS the devil? Does it do something to the architecture of the web that makes it easier for some folks to control the architecture of the web, is the question that Professor Weinberg asks. Searching and blocking are two sides of a coin, and Winberg doesn't like blocking when other people are designing it for him."}, {"response": 2, "author": "terry", "date": "Wed, Mar  4, 1998 (07:16)", "body": "Danielle Gallo: Following the Thursday evening dinner reception and entertaining speech by Nicholas Johnson, there were a number of BoFs held. I attended the GILC (Global Internet Liberty Campaign) BoF. This informal discussion group featured Mark Rotenberg from GILC ( http://www.gilc.org ) and Barry Steinhardt, counsel to the EFF (Electronic Frontier Foundation, http://www.eff.org) . Among other things, GILC has argued against PICS (Platform for Internet Content Selection). The BoF had a surprise element in the attendance of Paul Resnick, a professor at the University of Michigan School of Information ( http://www.si.umich.edu/) . Resnick is one of the developers of PICS. The discussion became a preview of the panel on the neutrality of technology and the question of 'is PICS the devil?'."}, {"response": 3, "author": "terry", "date": "Wed, Mar  4, 1998 (07:20)", "body": "Lorrie Cranor: Now, for the $64,000 question. Is PICS the devil? I don=92t think a definite answer surfaced. Panelists included Paul Resnick and Andrew Shapiro. Shaprio was highly opposed to PICS because it can be used to facilitate censorship. Resnick rebutted by stating that tools for censorship already existed before PICS. This question and answer period was also lively, including many comments directed at Resnick. Personally, I feel that PICS has provided a useful starting point and foundation for the selection of Internet content. cfp conference Main Menu"}]}, {"num": 20, "subject": "ZapNet - Zapitista rebellion forum - Cleaver, Ford, Garza", "response_count": 0, "posts": []}, {"num": 21, "subject": "Key Escrow and Recovery update - Davidson, Cross, Mahler", "response_count": 1, "posts": [{"response": 1, "author": "terry", "date": "Mon, Feb 23, 1998 (10:10)", "body": "Check out http://www.wired.com/news/news/email/other/politics/story/10437.html It's a Wired News item by Chris Jones \"AUSTIN, Texas - \"Government key recovery is the devil.\" So read the projection screen in the main conference room here Thursday at the Computers, Freedom and Privacy conference, where a panel discussed the outlook for encryption-control legislation in Congress this year. The 1997 session saw the rise and apparent fall of two bills that would have liberalized federal crypto export policy and all but forbidden a key-recovery infrastructure in the United States. Representative Bob Goodlatte's Safety and Freedom Through Encryption (SAFE) Act and parallel Senate legislation called the Promotion of Commerce Online in the Digital Era (Pro-CODE) Act fell victim to a Clinton administration counterattack.\" cfp conference Main Menu"}]}, {"num": 22, "subject": "How to Choke the Net - Blaze, Weitzner, Bellovin", "response_count": 1, "posts": [{"response": 1, "author": "terry", "date": "Wed, Mar  4, 1998 (07:13)", "body": "Matt Blaze and Steve Bellovin from AT&T Labs Research ( http://www.research.att.com ) discussed ways to 'Choke the Net.' Blaze and Bellovin cited the Net's structure as the cause of vulnerability. In addition, the technical characteristics of HTTP are a mismatch with what the Internet was designed for. To choke the Net, certain computers such as endpoints or central routers can be brought down. The Net is not just susceptible to intended takedown, however. Circumstances such as real-time multimedia and high bandwidth data will disable the Net. Routing problems, specifically misconfigured routers, were cited as a final threat. I agree with the panelists' contention that protocols for secure DNS will decrease the risk of malicious attacks, though it is questionable by what fraction the risk will be decreased. - Danielle Gallo cfp conference Main Menu"}]}, {"num": 23, "subject": "Crypto and Privacy at the Fringe - Froomkin, Ball, Toren", "response_count": 2, "posts": [{"response": 1, "author": "terry", "date": "Wed, Mar  4, 1998 (07:14)", "body": "Danielle Gallo: Thursday closed with a controversial panel on 'Crypto and Privacy at the Fringes of Society' moderated by Michael Froomkin from the University of Miami School of Law ( http://www.law.miami.edu/) . Patrick Ball of the AAAS Science and Human Rights Program ( http://www.aaas.org ) outlined security problems and provided crypto solutions for human rights organizations. He stated that human rights groups need encryption and digital signatures for protection. Ball finds traffic analysis a major threat to privacy, and suggests the use of anonymous remailers. Peter Toren from the United States Department of Justice ( http://www.usdoj.gov ) took the opposing view (big surprise there). Toren outlined the law enforcement perspective on crypto and privacy. He stated that unbreakable encryption will threaten public safety because it can be used to conceal criminal activity. He said, \"advances in technology should serve society not rule it.\" Furthermore, Toren suggests that privacy and liberty must be protected without leaving a harbor for criminality. Toren's comments created strong response from the attendees and consequently, the question and answer session was lengthy."}, {"response": 2, "author": "terry", "date": "Wed, Mar  4, 1998 (07:14)", "body": "In addition to the many thanks to Toren for actually attending, the Q & A featured predictable responses from each side. Matt Blaze expressed an interesting analogy in describing a paper shredder that created a digital copy of a document and sent it off to a central database. When a document was accidentally shred, the user could contact the database and have a copy faxed. Also, Toren was pressed about the encryption issue and repeatedly cited the significant increase in cases that involve unrecoverable evidence due to encryption. The government's case is made at http://www.fbi.gov/congress/encrypt/encrypt.htm . Audience members complained that the government repeatedly gives misleading information about the difficulty of cracking various encryption schemes. - Danielle Gallo cfp conference Main Menu"}]}, {"num": 24, "subject": "Archiving the Web - Madere, Peters, Cohen", "response_count": 1, "posts": [{"response": 1, "author": "terry", "date": "Wed, Mar  4, 1998 (07:16)", "body": "Danielle Gallo: I did not attend the Friday morning session in its entirety, so I will glaze over these panels. 'Archiving the Web' was a rather uneventful session that discussed online archives and their implications for privacy and copyright. Among the services highlighted was Deja News ( http://www.dejanews.com/) , a USENET archive. cfp conference Main Menu"}]}, {"num": 25, "subject": "Medical Records Privacy", "response_count": 0, "posts": []}, {"num": 26, "subject": "Moot Court: Suing Spammers - Dubois, Hamilton, Rasch, Zittrain", "response_count": 2, "posts": [{"response": 1, "author": "olic", "date": "Sun, Feb 22, 1998 (22:02)", "body": "Had a chance to sit in the first row and see the judges and lawyes up close... I hoped that the judges would speak up on the subject of spamming after the \"hearing\" was done, and give sort of a \"verdict\"."}, {"response": 2, "author": "terry", "date": "Mon, Feb 23, 1998 (12:17)", "body": "One of the few sessions I didn't videotape or even catch. I was getting into video burnout and around then and wanted to pump up my chi for Bruce's talk. So, I'd appreciate hearing further observations on this event. cfp conference Main Menu"}]}, {"num": 27, "subject": "Do you need a license to link - Effross", "response_count": 0, "posts": []}, {"num": 28, "subject": "Owning and Governing Virtual Communities", "response_count": 1, "posts": [{"response": 2, "author": "terry", "date": "Mon, Feb 23, 1998 (12:17)", "body": "*wink* I just might throw up those links!"}]}, {"num": 29, "subject": "Universal Access: Libraries, Schools and Freenets - Cannon, Beckwith", "response_count": 0, "posts": []}, {"num": 3, "subject": "Bruce Sterling", "response_count": 19, "posts": [{"response": 1, "author": "terry", "date": "Sat, Feb 21, 1998 (14:29)", "body": "CFP Closing Speech, Austin, Feb 20, 1998 Literary Freeware -- Not for Commercial Use Hi, my name's Bruce Sterling, I'm a local writer and a CFP veteran. I'm grateful for this chance to once again bring you the fabulous benefits of my freelance pontifications. When I first got involved in the computer civil liberties scene, it was 1990. We'd just had a Secret Service raid here in Austin that had shut down a science fiction publisher. This was a strange and rude intrusion in my daily life, this was an advent calculated to waken me from my dogmatic slumbers. The more I learned about this computer crime raid, the more peculiar and significant it seemed. I ended up writing an entire book about it. I was hoping the book would encourage some informed debate, and maybe the deeper political issues behind the computer revolution could somehow all be put straight. Now, eight years later, almost to the day, we have these four hundred interested and relevant parties all meeting here in Austin to get together face to face and thrash some of these things out. And you can even earn legal credit for it. This gives me a warm sense of closure, a very fulfilled feeling. There's plenty of thrash at CFP. There's always a lot of thrash. Very interesting thrash. Not a lot of permanent legal results, though. If you glance back over the past eight years and examine the whole enterprise to date, what you see is very remarkable. In the world of computers, privacy, and freedom, crises go in and out of vogue, but they are very rarely settled in any permanent legislative way. The only real permanence is the thrash itself. I'd go so far as to call this a new status quo. Permanent technological revolution. Permanent thrash. I was very intrigued by the remarkable presentation of our first keynote speaker, Mr. Kahin. It was a very congenial and gentle speech: \"modest\" was a word he used a lot. I don't think I've ever, ever heard an Administration science and technology expert describe the aims of American government as \"modest.\" This was a remarkable confession this gentleman was making. In so many words, he said that policy development is cyberspace is just plain too hard to do. There are too many competing values to achieve a workable political balance. The Administration is simply too overwhelmed by all this random electronic thrashing, all this buzzing and bleeping. So they'll simply modestly step back and let the mighty forces of technology and private enterprise thrash the situation out on their own. And maybe twenty years from now, when things calm down and get safer for elected American politicians, we may see some actual laws passed. Well, of course this statement is very good news for the techno-libertarian post-industrial contingent. Really, there ought to be corks popping in the offices of WIRED magazine over this keynote speech. The Bay Area WIRED folks are very into all this: emergence, and market power, and bottom-up entrepreneurism, and the sublime beauty of nonlinear network economics that are profoundly Out of Control. And let's face it, after that stinking Decency Act debacle, a hands-off policy smells terrific. I think you can make some good arguments that there are aspects of reality that governments should be very modest about. Our keynote speaker pointed out that the real nodes in the World Wide Web are words. Hotlinked key words. So this isn't merely chips and wires that we are talking about. This is language. When government tries to regulate and police the structure of language, this is generally considered to be double-plus ungood. There's a long tradition of restraint and modesty here. The First Amendment may be a local ordinance, but it's clearly served us rather well, and the First Amendment says, \"make no law.\" Be modest. Make no law. But point of view is worth eighty IQ points. From another point of view, to say that American government should be modest in a flagship technology is a very weird thing to say. I have never before heard a federal official confess that some aspect of industrial development is simply beyond the mental grasp of government. That it just plain moves too fast to figure out, so we might as well throw up our hands and step back out of its way. This is a radical admission to make. It's very out of the ordinary. Rocket scientists are said to be pretty smart people, but that didn't lead the federal government to declare that NASA is impossible to manage politically, so that rockets should be best left to Westinghouse and General Dynamics. I don't think there are many Congressmen who fully grasp quantum chromodynamics, either. But you would never see the Administration say that quarks are too complex for government, and that relativity and subatomic physics should be left to the greater wisdom of the private sector. But that's the Internet policy. No actual government. Some form of emergent self-regulating governance. To me, that was the core message of CFP 98. They really are just plain givi"}, {"response": 2, "author": "terry", "date": "Sun, Feb 22, 1998 (06:50)", "body": "My friend and spring system ad noted (re: Bruces party): It was definetly the best party I've been to in the past year. Chatting with UCLA Sociology students, munching on carrots with Wired News guys, and shooting the bull with reporters for the New York Times really blows the hell out of the usual San Marcos nightlife. Great house, too. Somebody should put that place up as a QTVR. Oh, and I met Lisa Jordan, the girl who did the cfp98 design work, and she's very nice. :) I was trying to think of a proper concept to describe the party, as I was standing in Bruce's office thinking 'LambdaMOO... no, that's not it. Maybe a baby LambdaMOO', but I think that I've got it. It was very much like the party described in Douglas Adam's books, the perpetual party that never ended. It was alot like that, except it ended. Yes, that's definitely it."}, {"response": 3, "author": "terry", "date": "Sun, Feb 22, 1998 (07:05)", "body": "A phone phreak immobilized Bruce's phone, but it was only one of his four phone lines, a young punk couple passed out in the Sterling budoir and left the next morning, and empty 400 beer bottles were left over (one of them mine), and Bruce says \"it was the best party Nancy and I ever threw.\" My favorite quote and rallying cry from Bruce's CFP windup speech: \"We're all wrapped up in the eighty-hour weeks, and the piles of mounting email, and the constantly bleeping cellphones. We need to learn to kick back. We need to live less like galley slaves and more like human beings. We may never have it this good again.\" YES!"}, {"response": 4, "author": "terry", "date": "Sun, Feb 22, 1998 (08:12)", "body": "What struck me about Bruce's house, apart from the fact that it was a stunning re-creation of a 40 year old house, were those round rock columns supporting the front porch. I had been down that block before (unaware that this was Bruce's house) and had stopped to marvel at this place. It's definitely a \"stopper\" as you drive through the nighborhood. I also marveled at the book collection which included no less than four or five shelves full of only books by, about, or contributed to by Bruce. Very few magazines about except for Wired (of which there were boxes and boxes being freely distributed). My date, Therese, and I spent ten minutes discussing the novel toilet on the second floor, no rolls of toilet paper to be seen anywhere. I assume this is what we learned in French class was a \"bidet\"? And we spent quite a while pondering the significance of all the little statues and action figures at the \"altar\", mostly death related. The \"altar\" was another one of those details to marvel at."}, {"response": 5, "author": "olic", "date": "Sun, Feb 22, 1998 (21:47)", "body": "Greetings! Bruce's party had free beer and Wired, great minds, lots of food, a snake and an agressive cat. The fact that the house was actualy a castle also added to the feeling that this was quite possibly the most relaxed 5 hours I can remember (and I dont even claim to remember all 5 hours of it..hehe)"}, {"response": 7, "author": "CotC", "date": "Mon, Feb 23, 1998 (12:09)", "body": "Terry said: Bruce Sterling said: That's why I've made it my personal goal at this CFP to try and buy everybody a beer. And then assorted others of you said: It was definetly the best party I've been to in the past year. Bruce's party had free beer and Wired, great minds, lots of food, a snake and an agressive cat. The fact that the house was actualy a castle also added to the feeling that this was quite possibly the most relaxed 5 hours I can remember (and I dont even claim to remember all 5 hours of it..hehe) And now I say: But WER had to work and I was bedridden with the flu... dammit, dammit, dammit, waaaahahaaaaaaaaa!!!..."}, {"response": 8, "author": "CotC", "date": "Mon, Feb 23, 1998 (12:12)", "body": "But now, re: \"So they'll simply modestly step back and let the mighty forces of technology and private enterprise thrash the situation out on their own. And maybe twenty years from now, when things calm down and get safer for elected American politicians, we may see some actual laws passed.\" - and - \"That it just plain moves too fast to figure out, so we might as well throw up our hands and step back out of its way.\" -and- \"No actual government. Some form of emergent self-regulating governance.\" Ya mean they're actually beginning to figure out that there's no way to regulate something with no actual physical existence or national boundaries? Nope, they're the government. There's no way they could've acquired that kind of insight/wisdom that quick ly. There's gotta be a hidden agenda of some sort. Ain't there always?"}, {"response": 9, "author": "terry", "date": "Mon, Feb 23, 1998 (12:15)", "body": "Bruce showed the CFP98 folks how to party Austin style, with chips and beer and trays of shrimp and cheese. What an awesome group of great minds assembled together in one place. JeffK quoting Jon Lebkowsky, if a bomb had hit Bruce's house that night it would have wiped out the free speech movment. As I write this, the sights and sounds of Bruce speaking are streaming out of http://www.spring.com ."}, {"response": 11, "author": "terry", "date": "Tue, Feb 24, 1998 (14:07)", "body": "I wonder if Bruce will do another bash this year for SXSW? He did last year. But it would be hard on the heels of this monster bash."}, {"response": 13, "author": "terry", "date": "Wed, Mar  4, 1998 (07:20)", "body": "Danielle Gallo: Bruce Sterling's \"Thoughts on the Future\" was an entertaining speech that contained a great deal of ranting. The part I found interesting was when Sterling addressed the Monica Lewinsky scandal. He stated that she poses no real threat to the country, is not a terrorist, and there is no need to observe her. Following the speech, Sterling hosted a party at his house for CFP attendees."}, {"response": 14, "author": "terry", "date": "Mon, Mar  9, 1998 (12:15)", "body": "Oh Boy! Softball Coverage in the LA Times *8-/ - Bruce Sterling quote Digital Nation March 9, 1998 Ad-Hocracies Fill Void Left by Government By Gary Chapman Copyright 1998, The Los Angeles Times AUSTIN, Texas -- The highlight of every Computers, Freedom and Privacy conference is the closing speech of novelist Bruce Sterling, and this year's was no exception. Sterling, a respected science fiction writer who lives in Austin (and who is a friend of mine), is becoming the Jonathan Swift of the digital era. The speech he delivered at the conference here two weeks ago was simultaneously hilarious and thought-provoking. He started by scoring off the earlier keynote speech by Brian Kahin, a former Harvard University () researcher who now heads the information technology program of the White House Office of Science and Technology Policy. Kahin delivered the administration's viewpoint on the role of government in shaping the Internet. Kahin said, \"The private sector should take the lead, and the government should play a modest, minimalist role.\" This has become the mantra of the Clinton White House whenever the Internet is the subject. \"I have confidence in self-regulation,\" Kahin said. Sterling called the presentation \"a very congenial and gentle speech: 'Modest' was a word he used a lot. I don't think I've ever, ever heard an administration science and technology expert describe the aims of American government as 'modest.' This was a remarkable confession this gentleman was making. In so many words, he said that policy development is cyberspace is just plain too hard to do. . . . So they'll simply, modestly step back and let the mighty forces of technology and private enterprise thrash the situation out on their own.\" This, Sterling said provocatively, is \"the giant sucking sound of abdicated responsibility. So what fills the power vacuum? I would argue that it is already being filled by a different and more modern political arrangement: not bureaucracy, but ad-hocracy.\" He called the audience's attention to the way Silicon Valley technology companies are starting to take on the form -- or rather, formlessness -- of Hollywood production teams. Instead of the conventional model of a corporation that plots its longevity into eternity, the new model of high-tech business is a collection of talented people who come together for the ephemeral goal of modeling a \"concept,\" and then selling it off. The team then evaporates, leaving no trace, like quarks in a linear accelerator. The only persistent quality is the \"talent\" of individuals -- a model Hollywood has pioneered and refined to an art. This phenomenon has developed in part because of the omnipresent shadow of Microsoft. Smart people try to create and then cash in on ideas before Microsoft appropriates them for the next release of Windows and puts them out of business. Sterling believes that this model, which has overtaken the mind-set of entrepreneurs in high tech, is now creeping into politics -- particularly as we think about the future of the Internet or new media in general. Deregulation, the buzz word of the past decade, is giving way to no regulation (or self-regulation, which amounts to the same thing). \"You don't have to stretch too far to perceive this as a menace to democracy,\" Sterling said. Ad-hocracy is \"certainly a real and visible menace to the established order, because it can throw sand in the works at any of a hundred different points. When the established order hits back, it hits back with another, rival ad-hocracy.\" \"Ad-hocracy\" is becoming gospel in high-tech centers around the country and in Washington. The problem, however, is not simply that this idea produces friction with democracy. The new high-tech ideologists don't really believe in democracy or in \"public values.\" They are bent on convincing the public that interest group politics, \"ad-hocratic\" atomization, and a kind of digital update of Social Darwinism are equivalent to democracy. Thus the public is presented with a false choice about the future of the Internet: a choice between either ham-handed bureaucratic regulation or a Hobbesian world of raw market power. The alternative of a truly democratic communications sphere dominated neither by government nor commerce does not seem to be on the table or part of the debate. After his discouraging description of our predicament, Sterling rallied everyone at the conference with a call to party: \"There's one important thing about ad-hocracies, a charming quality they have. If you just get them outside of the video surveillance, and away from their podiums and microphones, and add a little social lubricant in the form of a couple of beers, they spontaneously disintegrate into parties.\" So party we did, at Sterling's house in Austin, setting aside for a brief time the troubling thoughts he had lodged in our minds. Gary Chapman is director of the 21st Century Project at the University of Texas at Austin. He can be reached at gary.chapman@mail"}, {"response": 15, "author": "orange", "date": "Mon, Mar  9, 1998 (19:43)", "body": "thanks for putting that up"}, {"response": 16, "author": "terry", "date": "Tue, Mar 10, 1998 (10:48)", "body": "From Richard Thieme. Islands in the Clickstream: Computers, Freedom, and Privacy A conference on computers, freedom, and privacy might be the last place one expects to find the deepest expressions of the quest for meaning in our lives, yet there it was, all over the place. So was evidence of new possibilities for what I call the human- computer symbiot, that new kind of community generated by our symbiotic relationship to our electronic sensory extensions and intelligent networks. The choices we make now as we take the reins of our own evolution more securely in our hands -- with fear and trembling at the perilous task before us -- will determine the kind of world we bequeath to our children. The quest for meaning would not be an issue if our lives were obviously meaningful. Every foreground is defined by a background. The threat of meaninglessness posed by an entropic universe headed toward heat death makes us ask if the evolution of complexity of form and consciousness is evidence of consciousness that is the source as well as the goal of evolution -- or merely something that happened to happen. Either way, the existential choices are the same, and the fact that they exist is the definition of freedom. The battle for freedom is not being fought in wars far from home but in the policies and decisions we make personally and professionally about how we will live in a wired world. If those decisions are conscious, deliberate, and grounded in our real values and commitments, we will build communities on-line and off that are open, evolving, and free. If we are manipulated into fearing fear more than the loss of our own power and possibilities, then our communities will be constricted, rigidly controlled, over-determined. Privacy is key to these choices. There is no such thing as a guaranteed private conversation any more. We used to be able to walk out behind a tree and know we could not be overheard. Now the information that is broadcast by everything we say and do is universally available for cross- referencing and mining for hidden patterns. Those patterns, as Solveig Singleton of the Cato Institute observed, are in the eye of the beholder, determined by their needs and ultimate intentions -- an eye that half-creates and half-perceives, as Wordsworth said, constructing reality in accordance with its wishes and deepest beliefs. What we deeply believe, and how we allow others and our intentional communities to reinforce our beliefs and values, determines our actions and commitments. The choices we make downstream will emerge upstream when the river widens. In a conversation with a career intelligence officer about the actions of various US agencies, I made this appeal: \"There is a cry for justice in a child's heart,\" I suggested, \"that is eroded over time by the way we sometimes have to live. Yet the day comes when we look at what we have done with our lives and its relationship to that cry for compassion.\" He disagreed. \"I long ago set aside the sentiments of my childhood religion,\" he said.... In order to do the things he had to do. And the growing sophistication of technologies of torture, that enable governments to leave fewer marks, fewer clear memories in the minds of victims? \"A sign of growing sensitivity to world opinion,\" he said. \"At least they're moving in the right direction.\" How we do hear that cry for compassion, when the foggy weather in our own minds works to obscure it? Would it help, I asked Patrick Ball of the American Association for the Advancement of Science, to have audio clips on the web of what happens in those interrogation rooms? \"No,\" he said with conviction. \"The descriptions I've read are sufficiently graphic.\" What I cannot represent in words is the look in his eyes as his brain did a quick sort of the hundreds of detailed torture scenarios he had studied. Nor can I say how the face of that intelligence professional went suddenly wooden and his eyes looked away as he remembered what he had done as part of his job. How wide do we draw the circle? A Department of Justice attorney arguing for weak encryption stopped at the border. Catching criminals inside America is his sole priority, so he wants a back door into every electronic conversation in the world. Ball draws a wider circle, including those in Guatemala, Ethiopia, or Turkey who might be alive if they had had a possibility of engaging in a private conversation. Ball favors strong encryption as a way to support human rights worldwide. Our knowledge of \"how things really work\" pushes the conversation further. Seldom have intelligence agents told me they worry about abuse of the information they gather. They trust the system. \"We abide by the law,\" said a CIA professional. He added that even the NSA can not intercept conversations inside our borders. They don't have to, said another. Our special friends in New Zealand or Canada listen to American traffic as we listen to theirs. Good friends, he added, help one another. So .."}, {"response": 17, "author": "terry", "date": "Tue, Mar 10, 1998 (10:49)", "body": "I included the above here because there is a relevant and related conversation between Sterling and Thieme on the realaudio playing at www.spring.com."}, {"response": 18, "author": "orange", "date": "Thu, Mar 12, 1998 (15:53)", "body": "thanks terry for the cite, i subscribed to the thieme newsletter as a result-- is the discussion between sterling and thieme the one about the future/present/past of the cyberpunk movement?"}, {"response": 19, "author": "terry", "date": "Thu, Mar 12, 1998 (17:36)", "body": "It is in fact, the pictures got out of synch today but now they should be matching up to the audio."}, {"response": 20, "author": "CotC", "date": "Tue, Mar 17, 1998 (15:34)", "body": "I hope I'm wrong, but I seem to recall reading a few years back in one of the mainstream news magazines (Time/Newsweek) a puff piece on Thieme being the \"spiritual advisor/mentor\" of Dan and Mrs. (sorry, I don't remember her name) Quayle (!) I just took a quick browse through the Thiemeworks (*gak*, what a lamely New-Agey title!) and my confirmations were neither suspicioned nor denied. :)"}, {"response": 21, "author": "CotC", "date": "Tue, Mar 17, 1998 (16:05)", "body": "OK. Here it is (in its entirety): See paragraph 4. THE MILLENNIAL CHURCH By: Bobby Lilly Mil-len-ni-um - a: a period of 1000 years b: a 1000th anniversary or its celebration 2a: the thousand years mentioned in Revelation 20 during which holiness is to prevail and Christ is to reign on earth b: a period of great happiness or human perfection. Ar-ma-ged-don - [scene of the battle foretold in Rev 16:14-16] a final and conclusive battle between the forces of good and evil b: the site or time of Armageddon 2: a vast decisive conflict (Webster's New Collegiate Dictionary). As we enter the last decade of the 20th Century, these words will gain new meaning for all of us. Christian mythology calls for a \"Kingdom\" on Earth after the Battle of Armageddon rains down fire and destroys all civilization only \"saved\" Christians will be left to enjoy this paradise on earth. Everyone else will have perished in the death and destruction of those last days. For fundamentalists, it is impossible to believe in a future of happiness or human perfection until after the final confrontation be ween good and evil. They believe they are living in the \"last days\" and look forward to the conflagration with eager joy. \"So what,\" you say, \"if people want to believe that the end of the world is near, why not let them? Why should it be a problem for the rest of us? Surely these beliefs can't hurt anyone else but themselves?\" Maybe not, but Bush calls himself a \"born-again\" Christian, what if his belief in the inevitability of Armageddon pushed him to posture in a more threatening manner than he should and he ends up egging Saddam Hussein on. Bush could be playing with the lives of a half million soldiers and we'd never kn w. Vice-president Quayle's wife is a follower of Colonel Robert Thieme, one of the more extreme fundamentalist preachers. What does Quayle think about Armageddon? Could that explain why he takes such a strong negative position to recent changes in the Soviet Union? According to \"Under God,\" an article by Garry Wills in December's Playboy magazine, religion has always been strong in this country and cyclically the Fundamentalist strain becomes more virulent. He quotes Gallop poll statistics like: \"Nine Americans in ten say they have never doubted the existence of God. Eight Americans in ten say they believe they will be called before God on judgment day to answer for their sins. Eight Americans in ten believe God still works miracles. Seven Americans in ten believe i life after death. 37% of Americans believe in the Devil. 50% believe in angels--as opposed to the 15% who believe in astrology. About 40% attend church in a typical week. In 1989, 40% of the population called itself born again in response to a poll. Wills quotes George Gallop, Jr. as claiming that \"Religious affiliation remains one of the most accurate and least appreciated political indicators available.\" Wills, a Christian himself, argues that \"commentators continue to neglect the elements of the American religious experience: revivalism, Biblical literalism, millennial hope (for the Second Coming of Christ). Yet these have profoundly influenced our politics. Wills warns that \"the century's end may be more marked by domestic than by international conflict. The makings of a cultural war are present in religious attacks on pornography, homosexuality, abortion and the eroticism of rock music and television.\" He says that, while the Bible will not be at the center of these developments, \"we neglect it at our own peril.\" November's Spin magazine give us KulturKampf, a German term meaning \"the struggle for culture\" in an article titled \"The War Is On Us\" by Jefferson Moreley who argues that the national mood is war-like not just against Saddam Hussein. \"Americans are divided about the First Amendment and abortion. They are divided along racial lines and about drugs. They are divided to an unprecedented extent by class and income. President Bush says \"Our way of life is at stake\" in the Middle East, but no randomly selected groups of Americans would be able to agree upon what that way of life is.\" He continues, \"In America's Kulturkampf, state-sponsored morality is pitted not against organized religion but against the community and culture that emerged from the '60's counterculture...With old values failing, the struggle for culture intensifies. And, in November's \"Mother Jones\" magazine, a one page article \"Wildmon Kingdom?\" by Fred Clarkson should scare the pants off you. According to Clarkson, Rev. Donald Wildmon, and many of his associates are part of the Coalition on Revival (COR), a theopolitical movement that seeks to make a fundamentalist Christian nation out of the United States. This past year the National Coordinating Council the defacto political arm of COR developed a 24-point program. Clarkson advises that, among other things, the p ogram calls for the abolition of public schools, the IRS, and the Federal Reserve systems by the year 2000. He says that,"}, {"response": 22, "author": "terry", "date": "Wed, Mar 18, 1998 (09:53)", "body": "New Bruce Sterling stuff will be playing on our realaudio player. The pushy girls interview him at South by Southwest (SXSW) Interactive. If you haven't heard of the Pushy Girls, you will. cfp conference Main Menu"}]}, {"num": 30, "subject": "Big Brother Watching You: Video Surveillance - Haines, ACLU", "response_count": 2, "posts": [{"response": 1, "author": "terry", "date": "Sun, Feb 22, 1998 (08:35)", "body": "Marc Rotenberg was on Sunday Morning on CBS talking about video surveillance. Rotenberg says the feds probably can use the Tripp tapes. Even though they were illegally recording off Tripps answering machine recorder. These tapes raise unsettling questions for all of us."}, {"response": 2, "author": "terry", "date": "Wed, Mar  4, 1998 (07:18)", "body": "Danielle Gallo: I attended the lunch breakout session on video surveillance, \"Is Big Brother Watching You?\" The answer is yes. Donald Haines of the ACLU addressed the rise in usage of surveillance equipment due to decreases in cost. An example is the ITS, or Intelligent Transportation System. The ITS is designed for traffic analysis and management, yet it is commonly used to facilitate the mass and routine surveillance of crowds. Another example is E-Z Pass, a toll collecting service used in New Jersey and New York. When a driver passes through the gate, his account number is scanned and posted on a screen. Haines suggests that any particular car can be monitored each day based on the account any particular car can be monitored each day based on the account number scanned when the driver passes though. Time lapses between measurements can be used to observe the driver's speed and possibly result in a speeding ticket. Hashing the account number so it was not available at the second monitoring position would give the driver anonymity. Haines concluded with an emphatic need to increase the amount of privacy protection. He referred attendees to the Electronic Privacy Information Center http://www.epic.org -- an interesting but unrelated paper on this site is http://www.epic.org/Reports/surfer-appendix.html cfp conference Main Menu"}]}, {"num": 31, "subject": "Business Reputation and Identity on the Net - Burk", "response_count": 0, "posts": []}, {"num": 32, "subject": "Digital Signature Legislation - Merrill, Winn", "response_count": 0, "posts": []}, {"num": 33, "subject": "Organization and Future of CFP", "response_count": 0, "posts": []}, {"num": 34, "subject": "Library Filtering - Getgood, Martin, Harmon", "response_count": 1, "posts": [{"response": 1, "author": "terry", "date": "Wed, Mar  4, 1998 (07:19)", "body": "Danielle Gallo: The Friday afternoon session featured a lively panel on library filtering. Susan Getgood was the first speaker; she is a representative for The Learning Company ( http://www.cyberpatrol.com/) , the makers of Cyber Patrol filtering software. Getgood stated that the makers of Cyber Patrol will not market to libraries but will definitely sell to them. I accept this point as the Learning Company is in a business that wants to make a profit along with helping children surf safely. I think, though, that if librarians are going to purchase the product they need to know what limits filtering has. Charles Harmon presented the opposing view and argued that filters are against the library's mission of providing access to information. Harmon said, \"the use of filtering software to block sites is against ALA (American Library Association, http://www.ala.org amendments.\" Harmon stated that NO software will ever meet the standard for libraries, and filters impose the producer's viewpoint on the community. For criticism of Cyber Patrol, see http://www.spectacle.org/cwp/ada-yoyo.html . Many attendees lined up to disagree with Susan Getgood during the question and answer period. One attendee raised a good point in stating that many library software users don't have a technical background, thus they are not fully aware of how to use software products. Library users need to be informed of how the technology works, its limitations, and how to use it successfully. Finally, I felt Susan Getgood did an admirable job defending her product despite the heated comments directed at her by libertarians. She stated that she believes Cyber Patrol is a product worth purchasing, and 68% of the parents in California who use technology to monitor their children's surfing agree with her. And no, they aren't going to publish the list of blocked sites. cfp conference Main Menu"}]}, {"num": 35, "subject": "Covering the Net - What has press been smoking? Lappin, Lewis, Weise", "response_count": 0, "posts": []}, {"num": 36, "subject": "Richard Stallman - free software", "response_count": 1, "posts": [{"response": 1, "author": "terry", "date": "Mon, Feb 23, 1998 (10:16)", "body": "Check out Declan McCullagh's article at http://cgi.pathfinder.com/netly/opinion/0,1042,1754,00.html \" by Declan McCullagh February 20, 1998 Richard Stallman is nothing if not determined. For over two decades this bristly MIT geek has championed an arcane cause: free computer programs. Stallman wants you to have the right to twiddle your software -- to be able to add features, rewrite it and, if you can figure out how, teach it get down and do the fandango. Last month Netscape endorsed Stallman's idea by deciding to open the lid to its software toolbox and encouraging any interested programmer to tinker with it. Yesterday Stallman won an award from the Electronic Frontier Foundation for his efforts, including writing the popular (and, of course, free) EMACS text editor. \"I was trying to give people freedom,\" he said during the ceremony at the Computers, Freedom and Privacy (CFP) conference. Stallman is the type of fellow who frequents CFP, an annual event that brings together academics, government officials and Pilot-toting bitheads. Sparring is commonplace. Lawyers from the ACLU and the Center for Democracy and Technology shouted at each other yesterday morning when debating whether to cut deals on legislation in Congress. Former FTC commissioner Christine Varney said that the government should regulate corporations' privacy practices, and Solveig Singleton from the Cato Institute argued on a panel that the private sector should (not that I'm biased or anything). But the folks who trekked to Austin, Texas, this week generally share a common goal: preserving the unique culture of the Internet.\" cfp conference Main Menu"}]}, {"num": 37, "subject": "The history of CFP", "response_count": 0, "posts": []}, {"num": 38, "subject": "The future of CFP", "response_count": 2, "posts": [{"response": 1, "author": "terry", "date": "Tue, Feb 24, 1998 (17:31)", "body": "I gleaned this from Paul (biscuit@well.com): Wired News has an R.U. Sirius interview of Gary Chapman, who apparently co- counded CFP (i did not know that). It's way too much of an \"insider's conference,\" filled with inside jokes and jargon. On the other hand, there's something a little exhilarating about hearing young, smart, technically wizard speakers tell government and corporate authoritarians to shove it. http://www.wired.com/news/news/email/other/politics/story/10490.html"}, {"response": 2, "author": "terry", "date": "Wed, Mar  4, 1998 (08:22)", "body": "Danielle Gallo: As a final note, I think that next year's conference should feature a panel on taxing electronic commerce. President Clinton endorsed no-new-Net-taxes legislation in his recent remarks to the Technology 98 Conference in San Francisco, but the future on this issue is unclear. Although this area does not relate directly to privacy or free speech, it is an interesting issue to examine within the realm of e-commerce. *Random notes by the author: I liked the hotel but was disappointed to learn that the pool was outside. Could anyone tell me where to score a pair of John Gilmore's cool tie-dye socks? Bruce Sterling throws a good party. On Thursday, Richard Stallman explained that free software is like free speech and not free beer, but CFP seemed to do well in both departments. By Friday I felt like I had eaten my weight in tortillas. You're all checking out Crowds ( http://www.research.att.com/projects/crowds/) , right? Lastly, as this was my first visit to Texas, I was strongly encouraged by my cab driver to get a tattoo and eat a steak. I did not do either of these things, but enjoyed myself anyway. Danielle M. Gallo mailto://fmdk@nji.com 03/01/98 cfp conference Main Menu"}]}, {"num": 39, "subject": "CFP websites and sources of information", "response_count": 2, "posts": [{"response": 1, "author": "terry", "date": "Sun, Mar  1, 1998 (10:15)", "body": "One of the best I've seen: http://www.well.com/~pb/cfp98/ And, of course, there's: http://www.cfp.org And: http://www.cfp98.org Three of the best places to get started."}, {"response": 2, "author": "terry", "date": "Wed, Mar  4, 1998 (00:19)", "body": "Warning. This is *long*. But worth it. From: Lorrie Faith Cranor mailto://lorrie@research.att.com For the past five years I have written a Computers, Freedom and Privacy conference report (see the archive at http://www.research.att.com/~lorrie/pubs/cfp.html This year, I turned the job over to Danielle Gallo, an undergraduate student who has been working with me. Feel free to forward this report. -- Lorrie Cranor Danielle Gallo's CFP98 Conference Report Computers, Freedom and Privacy '98 was held February 18-20 at the Austin, Texas Hyatt Regency Hotel. Although there have been eight in total, this is the first CFP I attended. The program featured daily single-track sessions, lunch breakout sessions, and several concurrent tutorials. I attended the Wednesday morning tutorial entitled, \"An Introduction to Copyright and Trademark Law.\" This tutorial, given by David J. Loundy ( http://www.Loundy.com ) of Davis, Mannix and McGrath, was a comprehensive and enlightening overview of the workings of copyright and trademark law. An interesting question of public display was addressed. If an image is displayed on a Web page that does not belong to the owner of the image's copyright, are display rights violated? Using several case studies as examples, Loundy suggested that the answer depends on the type of browser being used. Is it a text-based browser that will not display the image? If an image is present but not displayed, is there a violation? If so, who is at fault, the Internet Service Provider or the Web designer? This tutorial also discussed trademark law, especially as it applies to metatags. Search engines use metatags to help index Web sties. For example, the playboyxxx.com site contains the keywords \"playboy\", \"playmate\", and \"centerfold\" in its metatags. However, this is deceptive because the surfer believes he is accessing a site supported by Playboy. The remainder of the Wednesday session featured a keynote speech by Brian Kahin of the White House Office of Science and Technology Policy ( http://www.whitehouse.gov/WH/EOP/OSTP/html/OSTP_Home-plain.html) . Kahin addressed the future of Internet policy and discussed the effects on employment and productivity. He presented basic principles focusing on recognizing the unique qualities of the Internet and creating policy that will facilitate international commerce. One of Kahin's last points was the need for industry self-regulation. Kahin suggests that self-regulation creates more efficient markets. Kahin also cited the need for well-defined principles and international agreements as fundamental to success. International agreement appears to be a difficult process, as all parts of the world do not necessarily agree on major issues, such as privacy. Although Kahin strongly urged the private sector to lead such a movement, it seemed doubt surfaced among some attendees as to whether this is possible. Anne Beeson of the ACLU, attorney Lance Rose, and UCLA school law professor Eugene Volokh discussed the Communications Decency Act decision. Volokh) argued that although the CDA was a victory for free speech, the decision should be examined with scrutiny. Volokh felt the CDA decision suffered from poor fact finding. Volokh's documentation regarding the Reno v. ACLU decision is worth accessing ( http://www.law.ucla.edu/Faculty/volokh/index.htm) . Ann Beeson ( http://www.aclu.org ) claimed that celebration for the CDA was significantly well justified. Beeson also stated that the architecture of the Internet promotes freedom of expression, and threats to this right lie in Senator McCain's bill, ratings/private censorship (including PICS), and library filtering. One interesting example Beeson cited was a student whose individual homepage was removed after people complained about it. As expected, this raised a strong reaction from the crowd. A panel on 'Privacy Implications of Biometrics and Behavioral Identifiers' outlined the implications of the use of biometrics (thumbprints, retinal scans, etc) for identification purposes. Dr. Ann Cavoukian, the Ontario Information and Privacy Commissioner, presented the idea that biometrics are a threat to individual privacy when not used carefully. Dr. George Tomko of Mytec Technologies discussed combining biometrics with encryption in an effort to reduce privacy concerns and increase security. The last panel for the Wednesday session addressed Net Vengeance. The \"Kashpureff incident\" was addressed and discussed in great detail. The basic conclusion was that significant collateral damage resulted from his offense; however, he accepted responsibility and offered regret. This was not the highlight of the panel. Richard MacKinnon of the University of Texas at Austin ( http://bertie.la.utexas.edu/depts/gov/home.htm ) sparked a discussion on the proper procedure when disciplining an offending online user. Since people from all nations participate in computer-mediated offenses, where and how should they be disciplined? The logical answer "}]}, {"num": 4, "subject": "Free Speech, Constitution, Privacy in Cyberspace - Mike Godwin", "response_count": 2, "posts": [{"response": 1, "author": "terry", "date": "Sun, Feb 22, 1998 (08:14)", "body": "We have portions of this that will be running on our Realplayer server, so you can catch the sights and sounds of an incomparable Godwin presentation."}, {"response": 2, "author": "TIM", "date": "Mon, Nov 23, 1998 (03:19)", "body": "I can't believe that nobody's interested in this. It affects everybody. cfp conference Main Menu"}]}, {"num": 40, "subject": "Introduction to copyright and trademark law - David Loundy", "response_count": 1, "posts": [{"response": 1, "author": "terry", "date": "Wed, Mar  4, 1998 (08:04)", "body": "from Danielle Gallo's account: I attended the Wednesday morning tutorial entitled, \"An Introduction to Copyright and Trademark Law.\" This tutorial, given by David J. Loundy ( http://www.Loundy.com ) of Davis, Mannix and McGrath, was a comprehensive and enlightening overview of the workings of copyright and trademark law. An interesting question of public display was addressed. If an image is displayed on a Web page that does not belong to the owner of the image's copyright, are display rights violated? Using several case studies as examples, Loundy suggested that the answer depends on the type of browser being used. Is it a text-based browser that will not display the image? If an image is present but not displayed, is there a violation? If so, who is at fault, the Internet Service Provider or the Web designer? This tutorial also discussed trademark law, especially as it applies to metatags. Search engines use metatags to help index Web sties. For example, the playboyxxx.com site contains the keywords \"playboy\", \"playmate\", and \"centerfold\" in its metatags. However, this is deceptive because the surfer believes he is accessing a site supported by Playboy. cfp conference Main Menu"}]}, {"num": 41, "subject": "Keynote Speech CFP98 Kahin on future internet policy", "response_count": 6, "posts": [{"response": 1, "author": "terry", "date": "Wed, Mar  4, 1998 (08:07)", "body": "From Danielle Gallo's account: The remainder of the Wednesday session featured a keynote speech by Brian Kahin of the White House Office of Science and Technology Policy ( http://www.whitehouse.gov/WH/EOP/OSTP/html/OSTP_Home-plain.html) . Kahin addressed the future of Internet policy and discussed the effects on employment and productivity. He presented basic principles focusing on recognizing the unique qualities of the Internet and creating policy that will facilitate international commerce. One of Kahin's last points was the need for industry self-regulation. Kahin suggests that self-regulation creates more efficient markets. Kahin also cited the need for well-defined principles and international agreements as fundamental to success. International agreement appears to be a difficult process, as all parts of the world do not necessarily agree on major issues, such as privacy. Although Kahin strongly urged the private sector to lead such a movement, it seemed doubt surfaced among some attendees as to whether this is possible."}, {"response": 2, "author": "orange", "date": "Sun, Mar  8, 1998 (23:05)", "body": "i look forward to hearing his speech, Terry, on the spring audio."}, {"response": 3, "author": "terry", "date": "Mon, Mar  9, 1998 (12:29)", "body": "It's coming up at some point. There will be 16 hours running today. I just started an 8 hour tape at 8:30 am. Right now it's showing Peter Lewis and some other journalists."}, {"response": 4, "author": "orange", "date": "Mon, Mar  9, 1998 (20:50)", "body": "such a great speech bruces gave--it is worth putting on video and watching now and then for the entertainment value"}, {"response": 5, "author": "terry", "date": "Mon, Mar  9, 1998 (21:42)", "body": "It's hot. I enjoy Bruce's off the cuff comments that I caught in the lobby just as much, I've asked him if I can ride along with him to do a documentary on his trip to Budapest to the hippe cyber summit deal."}, {"response": 6, "author": "orange", "date": "Thu, Mar 12, 1998 (16:37)", "body": "wow!!! i want to be sure to see/hear it, hey, maybe you could just put a wire on him, i think i would enjoy living his life vicariously. he has such intellectual zest and curiosity cfp conference Main Menu"}]}, {"num": 42, "subject": "Gary Chapman", "response_count": 10, "posts": [{"response": 1, "author": "terry", "date": "Mon, Mar  9, 1998 (12:14)", "body": "Oh Boy! Softball Coverage in the LA Times *8-/ - Bruce Sterling Digital Nation March 9, 1998 Ad-Hocracies Fill Void Left by Government By Gary Chapman Copyright 1998, The Los Angeles Times AUSTIN, Texas -- The highlight of every Computers, Freedom and Privacy conference is the closing speech of novelist Bruce Sterling, and this year's was no exception. Sterling, a respected science fiction writer who lives in Austin (and who is a friend of mine), is becoming the Jonathan Swift of the digital era. The speech he delivered at the conference here two weeks ago was simultaneously hilarious and thought-provoking. He started by scoring off the earlier keynote speech by Brian Kahin, a former Harvard University () researcher who now heads the information technology program of the White House Office of Science and Technology Policy. Kahin delivered the administration's viewpoint on the role of government in shaping the Internet. Kahin said, \"The private sector should take the lead, and the government should play a modest, minimalist role.\" This has become the mantra of the Clinton White House whenever the Internet is the subject. \"I have confidence in self-regulation,\" Kahin said. Sterling called the presentation \"a very congenial and gentle speech: 'Modest' was a word he used a lot. I don't think I've ever, ever heard an administration science and technology expert describe the aims of American government as 'modest.' This was a remarkable confession this gentleman was making. In so many words, he said that policy development is cyberspace is just plain too hard to do. . . . So they'll simply, modestly step back and let the mighty forces of technology and private enterprise thrash the situation out on their own.\" This, Sterling said provocatively, is \"the giant sucking sound of abdicated responsibility. So what fills the power vacuum? I would argue that it is already being filled by a different and more modern political arrangement: not bureaucracy, but ad-hocracy.\" He called the audience's attention to the way Silicon Valley technology companies are starting to take on the form -- or rather, formlessness -- of Hollywood production teams. Instead of the conventional model of a corporation that plots its longevity into eternity, the new model of high-tech business is a collection of talented people who come together for the ephemeral goal of modeling a \"concept,\" and then selling it off. The team then evaporates, leaving no trace, like quarks in a linear accelerator. The only persistent quality is the \"talent\" of individuals -- a model Hollywood has pioneered and refined to an art. This phenomenon has developed in part because of the omnipresent shadow of Microsoft. Smart people try to create and then cash in on ideas before Microsoft appropriates them for the next release of Windows and puts them out of business. Sterling believes that this model, which has overtaken the mind-set of entrepreneurs in high tech, is now creeping into politics -- particularly as we think about the future of the Internet or new media in general. Deregulation, the buzz word of the past decade, is giving way to no regulation (or self-regulation, which amounts to the same thing). \"You don't have to stretch too far to perceive this as a menace to democracy,\" Sterling said. Ad-hocracy is \"certainly a real and visible menace to the established order, because it can throw sand in the works at any of a hundred different points. When the established order hits back, it hits back with another, rival ad-hocracy.\" \"Ad-hocracy\" is becoming gospel in high-tech centers around the country and in Washington. The problem, however, is not simply that this idea produces friction with democracy. The new high-tech ideologists don't really believe in democracy or in \"public values.\" They are bent on convincing the public that interest group politics, \"ad-hocratic\" atomization, and a kind of digital update of Social Darwinism are equivalent to democracy. Thus the public is presented with a false choice about the future of the Internet: a choice between either ham-handed bureaucratic regulation or a Hobbesian world of raw market power. The alternative of a truly democratic communications sphere dominated neither by government nor commerce does not seem to be on the table or part of the debate. After his discouraging description of our predicament, Sterling rallied everyone at the conference with a call to party: \"There's one important thing about ad-hocracies, a charming quality they have. If you just get them outside of the video surveillance, and away from their podiums and microphones, and add a little social lubricant in the form of a couple of beers, they spontaneously disintegrate into parties.\" So party we did, at Sterling's house in Austin, setting aside for a brief time the troubling thoughts he had lodged in our minds. Gary Chapman is director of the 21st Century Project at the University of Texas at Austin. He can be reached at gary.chapman@mail.utexa"}, {"response": 2, "author": "orange", "date": "Mon, Mar  9, 1998 (19:53)", "body": "hummmmm i thought i just posted here, oh well. glad you put up the chapman article. i agree, it isnt an entirely swell idea to leave this to the corporations."}, {"response": 3, "author": "terry", "date": "Mon, Mar  9, 1998 (20:43)", "body": "I posted it twice because I realized that it fit better in the Bruce Sterling topic just as much as it deserved to be posted here."}, {"response": 4, "author": "orange", "date": "Tue, Mar 10, 1998 (11:29)", "body": "any idea when the chapman audio will run on spring right now is more from the conference (which i always enjoy) i will just keep it on in the background as long as i can maybe you will be able to replay the chapman interview several times."}, {"response": 5, "author": "terry", "date": "Tue, Mar 10, 1998 (11:50)", "body": "I'll have to transfer it from super 8 to vhs this afternoon, you'll see it as I do the transfer (which will be the best video and audio quality you'll ever see, because it will come straight from the source). Then I'll put it on replay. I'll try and and start this at noon CST."}, {"response": 6, "author": "orange", "date": "Thu, Mar 12, 1998 (15:32)", "body": "darn, i could not manage to fit it in yesterday, i hope it will still be running now and then, i have been going over to the cfp98 site and clicking on the audio links over there to pick up specific seminars when i have an hour or so when i can stay and listen-- but i enjoy watching your video along with your audio much more. i think it is fantastic that you are putting this online terry, and very very unique the only outfits i know who are doing this are the major news servers and freespeech tv---which is often way too raunchy for me. btw, you know that idea that was discussed over at the Well about making posts to the server, able to be sent by email--i really like that-- i didnt realize how much i like it--until one of my main elist groups, decided to get on a permanent server and go to a threaded conference forum, and i dont have the time really to set aside to go over there and check the new stuff---i really miss when they were sending it to me by email would it be really hard and difficult to set that up here? i would want it for specific conferences/topics but i know how busy you are, and dont mean to bury you in extra projects."}, {"response": 7, "author": "terry", "date": "Thu, Mar 12, 1998 (17:38)", "body": "That's a very good suggestion and I'll get a quote from Kaylene Thaler on doing this!"}, {"response": 8, "author": "orange", "date": "Sat, Mar 14, 1998 (13:57)", "body": "good!! i would enjoy participating in that--in specific areas of interest i think jeff over at acme has set up a version of it, but i havent seen it in operation, might be good to have your programmer open a discussion somewhere on the pring (and be sure to tell me where) about how it would work, and what features people would like to see, and what is possible to do)"}, {"response": 9, "author": "terry", "date": "Mon, Aug 24, 1998 (10:19)", "body": "What happened to orange?"}, {"response": 10, "author": "terry", "date": "Fri, Jan 15, 1999 (09:54)", "body": "Monday, January 4, 1999 The Los Angeles Times DIGITAL NATION The Future Lies Beyond the Box By Gary Chapman Copyright 1999, The Los Angeles Times, All Rights Reserved Reporters and columnists attempting to sum up developments in the high-tech field in 1998, or speculating on the big stories for this year, are all ticking off what one would expect: the boom in Internet commerce, the Microsoft antitrust trial, highflying Internet stocks, the resurgence of Apple Computer, the merger of America Online and Netscape Communications, the rise of open-source software such as the Linux operating system, and the year 2000 bug, among other notable subjects. The interesting developments I saw in 1998 were mostly in research laboratories, and they pointed to a profound rethinking of how networks operate and information is circulated. The buzzwords to watch this year and beyond are \"embedded\" or \"ubiquitous\" computing and \"distributed\" computing, terms now used by computer scientists to describe a reorienting of how we'll use networking and information technologies in the future. This new paradigm, whose building blocks only began to appear in 1998, will be the next big thing in computing. Embedded or ubiquitous computing refers first of all to the trend of putting computational and networking capabilities into devices and services other than the familiar \"screen-keyboard-box\" of the personal computer. We're seeing a huge shift among technology companies that are looking beyond the PC toward a proliferation of hand-held network devices such as 3Com's PalmPilot, a new networking cellular phone from Microsoft and Qualcomm, a promised palmtop system from Apple and electronic books from Rocketbook and Softbook, among other related products. Compaq's Western Research Laboratory in Palo Alto, which the company acquired when it bought Digital Equipment Corp., has even produced a working prototype of a hand-held computer that runs Linux. At the Internet Society convention in Geneva in July, I frequently heard the slogan, \"IP on everything, everything on IP.\" IP stands for Internet Protocol, the basic data standard that allows information to be \"seen\" or passed around on the Internet. With everything on IP and IP on everything, nearly all our common, everyday devices will be \"smart\" and \"on\" the Internet: cars, refrigerators, household appliances and light switches, manufacturing tools, TVs, cameras, sensors and even smart cards in our wallets or purses. In order to get all these devices to talk to each other and to be identified on the network, we need a new standard of software that's small, platform-independent and ubiquitous itself. Sun Microsystems' solution is called Jini ( http://java .sun.com/products/jini/), which was previewed for developers in 1998 and will be formally announced Jan. 25 in New York. Jini is based on Java, the programming language that runs on a \"virtual machine\" that can be included with any operating system. Jini-enabled devices contain \"agents,\" small segments of software code that tell other Jini machines what they do, where they are and how they operate. A Jini-powered house, for example, would show up in a Web browser or on a PC desktop displaying its capabilities, such as the ability to turn lights on or off, inventory its refrigerator or cupboards, set the temperature, check phone messages, etc. This is how embedded computation and distributed computing intersect: Machine intelligence shifts from general-purpose computing, such as in a PC, to device-specific intelligence, and the network itself becomes smart as an aggregate of billions of devices performing specific tasks and sharing information. The network architecture may change too. Instead of the familiar client-server model we use today, distributed computing allows a peer-to-peer architecture, which means that there's no longer any need for large, centralized computers running huge operating systems such as Windows NT. Jini resources can \"see\" one another without having to be switched through a server, and Jini agent software can run in under a megabyte of memory space. Microsoft is aware of the threat this model poses to its core software products. It has its own version of the Jini approach, called the Millennium Project. Lucent Technologies has one called Inferno ( http://www.lucent-inferno.com/) , and General Magic, in Sunnyvale, Calif., has a product called Odyssey ( http://www.generalmagic.com/technology/odyssey.html) . This is where the money and research are headed these days. Another interesting and related development is under investigation at Caltech in Pasadena, a program called the Infospheres Project ( http://www.infospheres.caltech.edu/) , directed by Caltech computer science professor K. Mani Chandy. The Infospheres Project, funded by the U.S. Air Force and the National Science Foundation, grew out of the tragedy of TWA Flight 800 near Long Island, N.Y., in 1996, Chandy says. After the airliner blew up, a large array of ins"}]}, {"num": 43, "subject": "cfp99", "response_count": 6, "posts": [{"response": 1, "author": "terry", "date": "Tue, Nov 10, 1998 (10:04)", "body": "According to Rotenberg, the conference will be held at the Omni Shoreham hotel, April 6-8 (and I presume that the 5th would be the traditional tutorial day); there's apparently an announcement list: Send SUBSCRIBE to 'cfp99-announce@cfp99.org\" the dramatis personae have been revealed: Marc Rotenberg EPIC Washington, DC CFP99 Chair PROGRAM COMMITTEE Carlos Afonso Alliance for Progressive Computing Rio de Janeiro, BRAZIL Phil Agre University of California San Diego, California Yaman Akdeniz Centre for Criminal Justice Studies Leeds University London, UNITED KINGDOM Roger Clarke Australian National University Canberra, AUSTRALIA Tracey Cohen Centre For Applied Legal Studies SOUTH AFRICA Lorrie Faith Cranor AT&T Labs-Research Florham Park, New Jersey Simon Davies London School of Economics London, UNITED KINGDOM David Flaherty Office of the Privacy and Information Commissioner British Columbia, CANADA Oscar Gandy Annenburg School of Communication Philadelphia, Pennsylvania Deborah Hurley Harvard Information Infrastructure Project Kennedy School of Government Cambridge, Massachusetts Joichi Ito Digital Garage Tokyo, JAPAN Stephen Lau Privacy Commission HONG KONG Paul McMasters Freedom Forum Rosslyn, Virginia Peter Neumann SRI Menlo Park. California Eli Noam Columbia University New York, New York Jonathan Peizer Open Society Institute New York, New York Bruce Schneier Counterpane Systems Minneapolis, Minnesota Keith Sears Creative Artists Los Angeles, California Barbara Simons USACM Palo Alto, California Ross Stapleton-Gray Electronic Embassy Program Arlington, Virginia Barry Steinhardt Electronic Frontier Foundation San Francisco, California Nadine Strossen American Civil Liberties Union New York, New York Frank Tuerkheimer University of Wisconsin Madison, Wisconsin ADMINISTRATIVE COMMITTEE Dave Banisar Washington, DC Kathleen Ellis, Washington, DC Lauren Gelman, Washington, DC Bruce Koball Berkeley, California David Sobel Washington, DC Shauna van Dongen Washington, DC FUNDRAISING COMMITTEE Rob Kushen Open Society Institute New York, New York (note - no hackers or activists need apply) The call for participation is scheduled to go out within the week."}, {"response": 2, "author": "TIM", "date": "Sun, Nov 15, 1998 (16:24)", "body": "No hackers, or activists? Why not don't they have a say about computers also?"}, {"response": 3, "author": "terry", "date": "Mon, Nov 16, 1998 (07:49)", "body": "They sure do, but they seem to be conspicuously absent from the CFP participant list."}, {"response": 4, "author": "TIM", "date": "Mon, Nov 16, 1998 (08:30)", "body": "Are they absent because they are not wanted, or because they choose not to participate?"}, {"response": 5, "author": "terry", "date": "Mon, Nov 16, 1998 (08:32)", "body": "They were uninvited."}, {"response": 6, "author": "terry", "date": "Wed, Dec 16, 1998 (10:17)", "body": "The Association for Computing Machinery PRESENTS Computers, Freedom + Privacy 1999 THE GLOBAL INTERNET OMNI SHOREHAM HOTEL WASHINGTON, DC APRIL 6-8, 1999 CALL FOR PROPOSALS The Program Committee of the conference on Computers, Freedom, and Privacy (CFP99) is seeking proposals for the ninth annual CFP, which will be held in Washington DC between April 6th and April 8th 1999 at the Omni Sheraton Hotel. CFP is sponsored by the Association for Computing Machinery (ACM). CFP is the leading Internet policy conference. For almost a decade, CFP has shaped the public debate on the future of privacy and freedom in the online world. The CFP audience is diverse with representatives from government, business, education, non-profits and the media. The themes are broad and forward-looking. CFP explores what will be, not what has been. It is the place where the future is mapped. The theme of the 1999 CFP conference is \"The Global Internet.\" Proposals are welcomed on all aspects of privacy and freedom. The 1999 Program Committee is particularly interested in receiving proposals that deal with: ACCESS TO THE INTERNET, particularly those relating to globalization and governance. Of particular interest are issues of privacy, censorship, free speech and access. INTERNATIONAL ISSUES, especially the emerging issues of global privacy protection, encryption policy, international principles of human rights, regulation, legislation, and copyright. ELECTRONIC COMMERCE, including the impact of payment systems, regulations, and technical standards on personal freedom and privacy. CULTURE AND LANGUAGE ON THE INTERNET, such as the significance of diversity, multilingualism, and cultural representation We strongly encourage proposals that involve leading experts, innovators, policymakers, and thinkers. The CFP99 Program Committee will finalize the selection of proposals by February 1, 1999, and all proposals must be received by January 15, 1999 Please follow the submission guidelines below. CFP99 PROPOSAL SUBMISSION GUIDELINES Proposals should be sent by email to proposals@cfp99.org before January 15, 1999. Proposals should include the following information: 1. Presentation Title 2. Presentation Type (Panel discussion, Luncheon meeting, Tutorial, \"BOF\" Session) 3. Proposed Length of Presentation (typical CFP sessions are 1 hour) 4. Name(s) of Speaker(s), plus brief background description for each speaker. 5. A one to two paragraph description of the Topic and Format, suitable for conference brochure and press release. 6. Complete contact information (email, phone, and mailing address). For presentations with more than one speaker, please provide contact information for all of the proposed speakers. For more information on the Computers, Freedom, and Privacy Conferences, please visit the conference Web page http://www.cfp99.org . If your have further questions about CFP, please feel free to contact a member of the Program Committee. PROGRAM COMMITTEE Marc Rotenberg, EPIC and ACM, Washington, DC, CFP99 Chair Carlos Afonso, Alliance for Progressive Computing, Rio de Janeiro, BRAZIL Phil Agre, University of California, San Diego, California Yaman Akdeniz, Centre for Criminal Justice Studies, Leeds University, London, UNITED KINGDOM Roger Clarke, Australian National University, Canberra, AUSTRALIA Tracey Cohen, Centre For Applied Legal Studies, SOUTH AFRICA Lorrie Faith Cranor, AT&T Labs-Research, Florham Park, New Jersey Simon Davies, London School of Economics, London, UNITED KINGDOM David Flaherty, Office of the Privacy and Information Commissioner, British Columbia, CANADA Oscar Gandy, Annenburg School of Communication, Philadelphia, Pennsylvania Deborah Hurley, Harvard Information Infrastructure Project, Kennedy School of Government, Cambridge, Massachusetts Joichi Ito, Digital Garage, Tokyo, JAPAN Stephen Lau, Privacy Commission, HONG KONG Paul McMasters, Freedom Forum, Rosslyn, Virginia Peter Neumann, SRI, Menlo Park. California Eli Noam, Columbia University, New York, New York Jonathan Peizer, Open Society Institute, New York, New York Bruce Schneier, Counterpane Systems, Minneapolis, Minnesota Keith Sears, Creative Artists, Los Angeles, California Barbara Simon, ACM, Palo Alto, California Ross Stapleton-Gray, Electronic Embassy Program, Arlington, Virginia Barry Steinhardt, American Civil Liberties Union, New York Nadine Strossen, American Civil Liberties Union, New York, New York Frank Tuerkheimer, University of Wisconsin, Madison, Wisconsin FUNDRAISING COMMITTEE Rob Kushen, Open Society Institute, New York, New York PREVIOUS CFP CHAIRS Jim Warren, Woodside, California (CFP91) Lance Hoffman, George Washington University, Washington, DC (CFP92) Bruce Koball, Berkeley, California (CFP93) George Trubow, John Marshall School of Law, Chicago, Illinois (CFP94) Carey Heckman, Stanford Law School, Stanford, California (CFP95) Hal Abelson, MIT, Cambridge, Massachusetts (CFP96) Kent Walker, Netscape Communication, Mountain View, California (CFP"}]}, {"num": 5, "subject": "Nethacks and Defenses - Catagnoli, Daniel, Shipley and Green", "response_count": 0, "posts": []}, {"num": 6, "subject": "After Communications Decency Act - Beeson, Rose, Volokh", "response_count": 1, "posts": [{"response": 1, "author": "terry", "date": "Wed, Mar  4, 1998 (07:08)", "body": "From Danielle Gallo's account: (Danielle is a student of Lorrie Cranor) Anne Beeson of the ACLU, attorney Lance Rose, and UCLA school law professor Eugene Volokh discussed the Communications Decency Act decision. Volokh) argued that although the CDA was a victory for free speech, the decision should be examined with scrutiny. Volokh felt the CDA decision suffered from poor fact finding. Volokh's documentation regarding the Reno v. ACLU decision is worth accessing ( http://www.law.ucla.edu/Faculty/volokh/index.htm) . Ann Beeson ( http://www.aclu.org ) claimed that celebration for the CDA was significantly well justified. Beeson also stated that the architecture of the Internet promotes freedom of expression, and threats to this right lie in Senator McCain's bill, ratings/private censorship (including PICS), and library filtering. One interesting example Beeson cited was a student whose individual homepage was removed after people complained about it. As expected, this raised a strong reaction from the crowd. cfp conference Main Menu"}]}, {"num": 7, "subject": "Biometrics - Hurley, Caoukian, Tomko", "response_count": 1, "posts": [{"response": 1, "author": "terry", "date": "Wed, Mar  4, 1998 (07:09)", "body": "From Danielle Gallo, who works with Lorrie Cranor: A panel on 'Privacy Implications of Biometrics and Behavioral Identifiers' outlined the implications of the use of biometrics (thumbprints, retinal scans, etc) for identification purposes. Dr. Ann Cavoukian, the Ontario Information and Privacy Commissioner, presented the idea that biometrics are a threat to individual privacy when not used carefully. Dr. George Tomko of Mytec Technologies discussed combining biometrics with encryption in an effort to reduce privacy concerns and increase security. cfp conference Main Menu"}]}, {"num": 8, "subject": "Net Vengeance - offenders payback- Smith, Everett-Church, MacKinnon", "response_count": 1, "posts": [{"response": 1, "author": "terry", "date": "Wed, Mar  4, 1998 (07:09)", "body": "Danielle Gallo writes: The last panel for the Wednesday session addressed Net Vengeance. The \"Kashpureff incident\" was addressed and discussed in great detail. The basic conclusion was that significant collateral damage resulted from his offense; however, he accepted responsibility and offered regret. This was not the highlight of the panel. Richard MacKinnon of the University of Texas at Austin ( http://bertie.la.utexas.edu/depts/gov/home.htm ) sparked a discussion on the proper procedure when disciplining an offending online user. Since people from all nations participate in computer-mediated offenses, where and how should they be disciplined? The logical answer appears to be in their country of residence. MacKinnon suggests, though, that the offender may be judged by the standards of the group the offense occurred in. This apparently promotes preservation of the environment's integrity through punishment based on the environment and its members. cfp conference Main Menu"}]}, {"num": 9, "subject": "Pragmatism and Principle in Online Advocacy", "response_count": 1, "posts": [{"response": 1, "author": "terry", "date": "Wed, Mar  4, 1998 (07:10)", "body": "The Thursday general session began with a panel on 'Pragmatism and Principle in Online Advocacy.\" Danny Weitzner from the Center for Democracy and Technology ( http://www.cdt.org ) joined Donald Haines from the American Civil Liberties Union in a friendly discussion. Even though the panelists were supposed to be arguing different points of view there was much agreement. They agreed on the need for involvement in the political process but differed on what approach to take. cfp conference Main Menu"}]}]}