Computer underground Digest    Wed  Mar 8, 1994   Volume 6 : Issue 22
                          ISSN  1004-042X

      Editors: Jim Thomas and Gordon Meyer ([email protected])
      Archivist: Brendan Kehoe (He's sorting thru the files)
      Acting Archivist: Stanton McCandlish
      Shadow-Archivists: Dan Carosone / Paul Southworth
                         Ralph Sims / Jyrki Kuoppala
                         Ian Dickinson
      Copita Editor:      Sheri O'Nothera

CONTENTS, #6.22 (Mar 8, 1994)
File 1--CuD typos (6.21-"Rape in Cyperspace / 6.21-Newsday article)
File 2--Computers, Freedom, & Privacy (CFP) '94 Final Program/Info

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send a one-line message:  SUB CUDIGEST  your name
Send it to [email protected] or [email protected]
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at:  Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on  internet);
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

EUROPE:   from the ComNet in LUXEMBOURG BBS (++352) 466893;
         In ITALY: Bits against the Empire BBS: +39-461-980493

FTP:   UNITED STATES:  etext.archive.umich.edu (141.211.164.18)  in /pub/CuD/
                      aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
 EUROPE:         nic.funet.fi in pub/doc/cud/ (Finland)
                 nic.funet.fi
                 ftp.warwick.ac.uk in pub/cud/ (United Kingdom)

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.  CuD material may  be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission.  It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified.  Readers are encouraged to submit reasoned articles
relating to computer culture and communication.  Articles are
preferred to short responses.  Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
           the views of the moderators. Digest contributors assume all
           responsibility for ensuring that articles submitted do not
           violate copyright protections.

----------------------------------------------------------------------

Date: Tue, 8 Mar 1994 13:18:11 CST
From: CuD Moderators <[email protected]>
Subject: File 1--CuD typos (6.21-"Rape in Cyperspace / 6.21-Newsday article)

In CuD 6.21, the moderators' note indicated that the Village Voice
"Rape in Cyberspace"  "...may not be reprinted *WITH* the author's
permission."

This should have read: "...may not be reprinted *WITHOUT* the authors
permission." Readers who distribute CuDs should correct this typo
before redistributing.

In CuD 6.19, we indicated in the CuD response to the Newsday article
(File 3) that in the '93 Congressional hearings on wire fraud one of
the participants judged 2600 Magazine to be a primer for crime. In an
inadvertant typo, the line appeared "which we" (ie, CuD), when the
line should have been "when *HE*" (the participant) considered 2600 to
be "dangerous." CuD does not consider 2600 "dangerous" or an advocacy
manual for crime.

We apologize for both errors and thank the readers who brought them to
our attention.

------------------------------

Date: 3 Mar 94 05:03:15 CST
From: [email protected]
Subject: File 2--Computers, Freedom, & Privacy (CFP) '94 Final Program/Info

(MODERATORS' NOTE: The CFP conference is the best national conference
of it's type, and attracts an impressive cross-section of people. This
year's conference in Chicago lists an exciting and diverse program.
There is relatively cheap housing available at the Palmer house (4 per
room) for low income participants).


                            CFP '94

                     THE FOURTH CONFERENCE

                     ON COMPUTERS, FREEDOM

                          AND PRIVACY

                       MARCH 23-26, 1994

                  CHICAGO PALMER HOUSE HILTON

    "CYBERSPACE SUPERHIGHWAYS: ACCESS, ETHICS and CONTROL"


SPONSORS
ASSOCIATION FOR COMPUTING MACHINERY
    SPECIAL INTERESTS GROUPS ON:
    COMMUNICATIONS (SIGCOMM)
    COMPUTERS AND SOCIETY (SIGCAS)
    SECURITY, AUDIT AND CONTROL (SIGSAC)
JOHN MARSHALL LAW SCHOOL,
    CENTER FOR INFORMATICS LAW

PATRONS & SUPPORTERS (as of 15 December 1994)

AMERICAN EXPRESS CORP.
BAKER & McKENZIE
EQUIFAX, INC
LEGAL TRUSTEES, JERSEY, LTD. (UK)
MOTOROLA, INC
NATIONAL SCIENCE FOUNDATION (PENDING)
WIRED MAGAZINE

COOPERATING ORGANIZATIONS

AMERICAN BAR ASSOCIATION SECTION OF
    SCIENCE AND TECHNOLOGY
AMERICAN CIVIL LIBERTIES UNION
COMPUTER PROFESSIONALS FOR SOCIAL RESPONSIBILITY
ELECTRONIC FRONTIER FOUNDATION
GEORGE WASHINGTON UNIVERSITY INSTITUTE for COMPUTER and
    TELECOMMUNICATIONS POLICY
IEEE COMPUTER SOCIETY
IEEE-USA COMMITTEE ON COMMUNICATIONS
    AND INFORMATION POLICY
LIBRARY AND INFORMATION TECHNOLOGY ASSOCIATION
PRIVACY INTERNATIONAL
U.S. PRIVACY COUNCIL

UNITED AIRLINES IS THE OFFICIAL AIRLINE FOR CFP'94


Fourth Conference on Computers, Freedom and Privacy
Chicago, Il., March 23 - 26, 1994

CFP'94
"Cyberspace Superhighways: Access, Ethics and Control"


General Chair
    George B. Trubow
    Center for Informatics Law,
    John Marshall Law School
    Chicago, IL

Executive Committee
    George B. Trubow
    Chair, CFP'94

    Lance J. Hoffman
    George Washington University
    Washington, D.C.
    Chair, CFP'92

    Bruce Koball
    Motion West
    Berkeley, CA
    Chair, CFP'93

Conference Treasurer
    Robert Ashenhurst
    University of Chicago

Special Promotions
    Patric Hedlund
    Sweet Pea Productions

    Al Whaley
    CPSR, Palo Alto

Manager, Volunteers and Conference Office
    Judi Clark
    ManyMedia, Palo Alto

Chair, Student Writing Competition
    Gene Spafford
    Purdue University

Co-Chairs, Student Scholarship Program
    John McMullen
    Marist College

    Jim Thomas
    Northern Illinois University
Program Committee

    David Banisar
    Computer Professsionals for
    Social Responsibility

    Jerry Berman
    Electronic Frontier Foundation

    Robert Belair
    Mullenholz and Brimsek

    Roger Clarke
    Australian National Univesity

    Mike Godwin
    Electronic Frontier Foundation

    Mark Hellmann
    Pattishall, McAuliffe

    Linda Knutson
    Library & Information
    Technology Association

    Dennis McKenna
    Government Technology Magazine

    Michael Mensik
    Baker & McKenzie

    Ron Plesser
    Piper and Marbury

    Priscilla Regan
    George Mason University

    Lance Rose
    LOL Productions

    Marc Rotenberg
    Computer Professionals for
    Social Responsibility

    Robert Ellis Smith
    Privacy Journal

    Jim Thomas
    Northern Illinois University

    Alan F. Westin
    Columbia University


Conference Administration by John Marshall Law School:
Arrangements Director, RoseMarie Knight
Publicity & Publications, John McNamara
Financial Officer, James Kreminski
Program Coordinator, Gary Gassman

"CYBERSPACE SUPERHIGHWAYS: ACCESS, ETHICS and CONTROL

Cyberspace, Information Superhighway, National Information
Infrastructure, Open Platforms, Computer and Communications
Revolution, Electronic Networks, Digital Data Bases and Information
Society are words and phrases common to the rhetoric of our modern
era.  The relationships between and among individuals, society,
nations, government entities and business organizations are in
constant flux as new stresses and alliances change the old "rules
of the game."  Today's challenges are to define what is the "game,"
who owns the "franchises," who can play, what are the rules and who
calls the shots.  Information and communications technology raise
new issues for freedom and privacy in this new era.  Such questions
are on the agenda as the participants in CFP'94 consider the
alternatives and seek some solutions.  Come, join in the dialogue
that will help to shape the world's future!

PRE-CONFERENCE TUTORIALS

On Wednesday March 23, the day before the formal conference begins,
CFP '94 is offering a number of in-depth tutorials covering a wide
variety of subjects on five parallel tracks.  These presentations
will be interesting, educational, thought-provoking and often
controversial.  The tutorials are available at a nominal additional
registration cost.

CONFERENCE NEWSPAPER

On each of the three days of the conference, a daily newspaper will
appear to highlight what has transpired and announce important
coming events.  The staff of "The Decisive Utterance," The John
Marshall Law School's student newspaper, is providing this service.


CONFERENCE RECEPTION AND TECHNOLOGY DISPLAY

On Wednesday evening, from 6:00 p.m. - 9:00 p.m., you are invited
to meet new and old friends and colleagues at an opening reception
at the John Marshall Law School from 6:00 p.m.-9:00 p.m. The School
is only two blocks from the conference hotel.  A state-of-the-art
computer lab will be used to demonstrate high-tech applications in
academia and registrants will be invited to take part.

SINGLE-TRACK MAIN PROGRAM

The technological revolution that is driving change in our society
has many facets and we are often unaware of the way they all fit
together, especially those parts that lie outside one's own daily
experience. An important goal of CFP '94 is to bring together
individuals from disparate disciplines and backgrounds and engage
them in a balanced discussion of CFP issues.  To this end our main
program, starting on Thursday, March 24, is on a single track
enabling registrants to attend all sessions.  The concurrent Birds-
of-a-Feather meetings Thursday after 9:15 p.m. are exceptions.

BIRDS OF A FEATHER SESSIONS (BoF)

CFP '94 will provide a limited number of meeting rooms to
interested individuals for informal "Birds of a Feather" sessions
after the formal program Thursday, from 9:15 p.m. - 11:15 p.m.
These sessions will provide an opportunity for special-interest
discussions. For further information or to request a BoF contact
CFP '94 Program Coordinator, Gary Gassman, at the John Marshall Law
School ([email protected])


MUSEUM OF SCIENCE AND INDUSTRY GALA

Registrants are invited to a very special reception and buffet at
Chicago's famed Museum of Science and Industry where they also will
be treated to a private showing and demonstration of the MSI's
newly-opened Communications and Imaging Exhibits.  These multi-
million dollar presentations occupy 15,000 sq.ft. of museum space
and required three years to develop.  "Communications" is a
panoramic display of how technology has transformed our lives by
dissolving distance and and making connections; visitors can even
enter the unreal world of virtual reality. "Imaging" is a mind-
boggling journey through modern applications of imaging technology.
Visitors can even play the role of brain surgeon, using
radiosurgery made possible by 3-D imaging, or explore imaging in
forensic science by using MRI, fingerprint enhancement, face aging
and other modern technologies to solve a crime!

REGISTRATION WILL BE LIMITED

CFP '94 registration will be limited to 550 attendees, so we advise
you to register early to assure admission and to take advantage of
the early registration discounts.

MEALS AND RECEPTIONS

A key component of the CFP conferences has been the interaction
between the diverse communities that constitute our audience.  To
promote this interaction CFP '94 provides three luncheons, three
receptions and three evening meals with the price of registration.

EFF PIONEER AWARDS

All conference attendees are invited to the EFF Pioneer Awards
Reception sponsored by the Electronic Frontier Foundation on
Thursday evening.  These, the third annual EFF Pioneer Awards, will
be given to individuals and organizations that have made
distinguished contributions to the human and technological realms
touched by computer-based communications.

CONFERENCE BUSINESS OFFICE

The Conference business and registration office will be open from
8:00 a.m. until 9:00 p.m. on Wednsday thru Friday, and until 6:00
p.m. on Saturday, for registration and general information.

NOTE: The following program content and schedule is subject to
change. The Information Superhighway is a fast track!

Wednesday, March 23, 1994
Pre-Conference Tutorials

9:00 a.m. - noon

    Cyberspace Law for Non-Lawyers
    This tutorial presents an outline of the law for laymen,
    dealing with Constitutional and legal issues that confront
    those concerned with privacy, crime, and freedom of expression
    in cyberspace. There will be summaries of recent cases,
    legislative proposals and government activities.
         Mike Godwin, Online Counsel, EFF

    Rules of the Road for Network Travelers. (CLE Credit Approved)
    The information superhighway presents a variety of rights and
    risks.  Learn about the legal issues of computer networks,
    services and bulletin boards, including on-line property
    rights; protecting personal privacy and business information;
    electronic publishing and multimedia rights; viruses, adult
    materials and other no-nos.
         Lance Rose, Attorney and Author of "Syslaw."

    Get Mad, Get Motivated, Get Moving!
    The focus of this panel is on citizen action for privacy
    protection: how to reach and organize constituents; support
    legislation or other privacy protection measures; conduct
    public education activities; use the technology in program
    activities, etc.
         Robert Ellis Smith, Privacy Journal

    Exploring Internet: A Guided Tour
    This tutorial gives participants a practical introduction to
    the most popular and powerful applications available via the
    world's largest computer network, the Internet.  There will be
    hands-on demonstrations of communications tools such as e-
    mail, conferencing, Internet Relay Chat and resource discover,
    and navigations aids such as Gopher, WAIS, Archie and World
    Wide Web.  Extensive documentation will be provided.
         Mark Graham, Pandora Systems

    Using the Freedom of Information Act
    The Federal FOIA is the principal focus of this tutorial
    though some attention is given to the use of  state FOIAs.
    The session will cover procedures for making requests,
    identifying the information desired, differences between
    electronic and hard copy responses, and the appeals process
    within agencies and the courts.
    David Sobel, Counsel, Computer Professional for Social
    Responsibility

    2:00 p.m. - 5:00 p.m.

    Cryptography: What, and How?
    Data encryption is in the cyberspace limelight as perhaps the
    only technique to ensure digital privacy and security; it is
    also the subject of sharp debate regarding control of the
    development and use of the technology.  This tutorial will
    display what encryption is, how it works, and some of the
    options for its use.  Computer animations and graphic displays
    will be used to help make cryptography comprehensible; the
    audience will engage in some hands-on encryption exercises.
         Mark Hellmann, Pattishall, McAuliffe et.al, Chicago

    Electronic Detectives: Critical Issues for Public and Private
    Investigators.
    Both governmental and private sector investigators have
    unprecedented access to "open" sources that were practically
    inaccessible a few years ago.  This information environment
    poses opportunities and risks that will be the focus of this
    program.  Investigative techniques via networks will be
    demonstrat
ed and the legal, ethical and practical issues will be explored.
Actual case-studies will be utilized.
    Michael Moran, CCO; Michael Robertson, CFE

    Hi-Tech Intellectual Property Law Primer (CLE Credit Approved)
    This panel will cover the special problems in patent,
    copyright and tradmark law engendered by computers and digital
    technology, with attention to the impact of recent cases.  The
    differences in European protection will be surveyed as well as
    technology export restrictions.
         Raymond Nimmer, University of Texas Law School
         Leslie A. Bertagnolli, Baker & McKenzie, Chicago

    Transactional Data Analyses: Making FOI Access Useful
    Electronic communication, coupled with federal and state
    Freedom of Information Acts, has made a great deal of data
    available to the public regarding the activities and policies
    of government enforcement and regulatory agencies.  Knowing
    how to evaluate and use this information is critical to
    understanding and demonstrating what the data really means.
    The Transactional Records Access Clearinghouse (TRAC) of
    Syracuse University uses its various knowledge-bases to
    demonstrate the power of transactional data.  Colorgraphics
    and analytic techniques are combined in demonstrations of how
    otherwise drab statistics can be displayed dramatically to aid
    in policy analyses and advocacy.
         David Burnham, former New York Times Investigative
         Reporter;
         Susan Long, Co-director, TRAC, SUNY-Syracuse

    Election Fraud and Modern Technology
    There has been increasing attention, in the U.S. and abroad,
    to the use of modern technology in the electoral process.
    Buying votes, stealing votes, changing votes -- whether in the
    environment of punch-cards or fully automated voting machines
    -- is the subject of this tutorial.  Mock elections will be
    staged in which the participants have roles in planning to
    perpetrate as well as prevent vote fraud.  Voter registration,
    phone-based voting, cryptography and verification are among
    the strategies and technologies to be considered.
    Russel L. Brand, Reasoning Systems.

SPECIAL EVENTS ON WEDNESDAY, Mar. 23:

Noon - 4:00 p.m.,  Privacy International Business Meeting
    This meeting, at the John Marshall Law School, begins with a
    buffet luncheon.  Non-members interested in learning about
    P.I. and the Illinois Privacy Council are invited to be guests
    for lunch and a briefing. Guest space will be limited so
    attendance on a "first come" basis MUST be confirmed by
    March 8, 1994.

6:00 p.m. - 9:00 p.m.  Conference Reception
    All CFP registrants are invited to a reception and open house
    demonstrating the John Marshall Law School's recently opened
    computer lab.  This also is an opportunity to "network" the
    old-fashioned way, meeting old friends and making new ones
    while enjoying the reception and buffet. This state-of-the-art
    facility will display information and communications
    technology being used in the educational environment. Guests
    also may participate in hands-on demonstrations of the
    technology under the tutelage of JMLS faculty and staff.
(Wed. Special Events, Cont'd)
9:15 p.m. - 11:15 p.m. "CFP SOAPBOX SQUARE"

On Wednesday, March 23, from 9:15 p.m. to 11:15 p.m., "CFP Soapbox
Square" will be open.  This is a chance for those who have
something to say publicly to say it and to hear response from
others!  Those interested in making a brief statement (3 minutes)
at this meeting must file their request and describe their topics
by 5:00 p.m. on Wednesday. Discussion time for various topics will
be allocated based upon the number of topics and the number who
have asked to speak.  Requests to speak can be made at the time of
pre-registration or at the conference site.


Thursday, March 24, 1994

8:30 a.m., CFP'94 Official Opening

    Welcome to the Conference: George B. Trubow, General Chair
    Welcome to Chicago: Hon. Richard M. Daley, Mayor (Invited)

9:00 a.m.  Keynote Address:  Mr. John Podesta, Assistant to the
         President, Washington, D.C.

10:00 a.m. Break

10:30 a.m.  The Information Superhighway: Politics and the Public
          Internet.
    The Administration and Congress propose policies that will
    lead to a digital multimedia highway.  How can the road be
    built at affordable cost while serving the public interest and
    our constitutional values?
    Chair: Jerry Berman, Electronic Frontier Foundation


12:00 p.m.  Lunch
              Speaker: U.S. Senator Paul Simon (Invited)

1:30 p.m.  Is It Time for a U.S. Data Protection Agency?
    Beginning with the Privacy Act of 1974, proposals to establish
    an oversight body for data protection have been offered but
    not adopted; another proposal is currently pending in
    Congress.  Against a background of almost twenty years
    experience under the Privacy Act, the panel will consider
    whether the current political, economic and technological
    mileau favors establishment of a data protection agency.
    Chair: Priscilla M. Regan, George Mason University

2:45 p.m.  Break
 3:00 p.m.  "Owning and Operating the NII: Who, How, When?"
    The National Information Infrastructure is an important
    initiative for the present Administration.  This panel will
    explore policy and technical issues such as equity and access,
    connectivity and standards, funding and regulation, privacy
    and security, ownership and operation.
    Chair: Marc Rotenberg, Computer Professionals for Social

4:15 p.m.  Break

4:30 p.m.  Data Encryption: Who Holds The Keys?
    Recent attempts, led by federal law enforcment agencies, to
    control the development and dissemination of strong
    cyptography programs has engendered considerable discussion
    and disagreement.  The interests of law enforcement agencies
    may conflict with the need for data security and personal
    privacy demanded by users of electronic networks.  This panel
    will evaluate proposals to deal with the question.
    Moderator: Willis Ware, Rand Corporation

5:30 p.m. Adjourn

6:00 p.m.  EFF Awards Reception
    Once again, the Electronic Frontier Foundation hosts a
    reception prior to its annual Pioneer Awards presentation.
    All CFP attendees are invited to enjoy the recepiton and
    congratulate the new honorees.

7:00 p.m.  Conference Banquet (Speaker to be announced)

9:15 - 11:15 p.m. "Birds-of-a-Feather" sessions run concurrently.


Friday, March 25, 1994.

8:30 a.m.  Keynote: David Flaherty, Data Protection Commissioner,
          Victoria, British Columbia

9:15 a.m.  Health Information Policy
    The Clinton Health Reform Plan, and variations on that theme,
    stress the use of information technology to help the
    efficiency and effectiveness of health care.  Expert
    consultation, improved service delivery through new
    technology, and improvements in the processing of health
    insurance claims bring promise of cost cuts as well as the
    possibilities of threats to personal privacy.  This panel of
    experts will form the "CFP Group" to explore these promises
    and threats.
    Chair: Robert R. Belair, Mullenholz & Brimsek, Wash., D.C.

10:30 a.m.  Break

10:45 a.m.  Can Market Mechanisms Protect Consumer Privacy?
    When does protection of consumer privacy require legal
    standards and government regulation and when can bargains and
    agreements in the market suffice?  What role do new
    technological options for individuals and organizations play
    in facilitating private choice and market transactions?  Is
    "ownership" of personal information a useful concept or a dead
    end for privacy protection in an information age?
    Chair: Dr. Alan F. Westin, Columbia University

Noon      Lunch, Speaker: Philip Zimmerman, PGP

1:30 p.m.  Creating an Ethical Community in Cyberspace
    The fundamental ethical questions posed by the "settlement" of
    cyberspace are not new.  What is new is that the relationship
    between behavior and the ethical conceptions by which we judge
    behavior shift and become more ambiguous and vague.  This
    sessions examines the ethical dilemmas brought about by the
    "colonization" of cyberspace that must be resolved to
    establish and maintain a stable, humane environment.
    Chair: Prof. Jim Thomas, Northern Ilinois University

2:45 p.m.  Break

3:00 p.m.  Standards for Certifying Computer Professionals
    The subject of licensing of computer professionals is
    receiving increased attention by professional organizations
    and by state legislatures.  Both the ACM and IEEE have
    proposals under study, and perhaps a half-dozen states are
    considering licensing bills.  This panel will consider the
    pros and cons and suggest some standards for certification.
    Chair: Donald Gotterbarn, East Tennessee State Univ.

4:15 p.m.  Break

4:30 p.m.  Hackers and Crackers: Using and Abusing the Networks
    This session will explore issues surrounding the "fringe" of
    network use.  What can and should be exchanged?  Who will
    monitor "appropriate" use?   What's the current difference, if
    any, between "hacker" and "cracker"?  What should be expected
    and accepted regarding the role of law enforcement agencies?

5:30 p.m. Adjourn

5:45 p.m. Buses begin departing for the Chicago Museum of Science
         and Industry for a private reception and demonstration at
         the Communications and Imaging exhibits.

9:00 p.m.  Buses begin departing for return to the Palmer House and
         Chicago's "Loop."

Saturday, March 26, 1994

9:00 a.m.  The Role of Libraries on the Information Superhighway
    As the information landscape changes dramatically the historic
    role of libraries as the "information commons" is challenged.
    How will the Carnegie ideal of free, public access be
    implemented by the library community?  Should it be?  This
    panel will consider policy for an information network in the
    public interest.
    Moderator: Tamara J. Miller, President, Library and
               Information Technology Association

10:15 a.m. Break

10:30 a.m.  International Governance of Cyberspace: New Wine in Old
              Bottles -- Or Is It Time For New Bottles?
    Much discussion transpires between members of the Economic
    Community, the O.E.C.D., the Council of Europe, and the United
    States, regarding data protection, intellectual property
    rights, transborder data flow, the mediation of disputes, etc.
    This panel will consider whether existing mechanisms can solve
    the problems or a new structure for the governance of
    cyberspace is needed.
    Chair:  Ronald L. Plesser, Piper and Marbury

Noon:  Lunch
         Speaker: Simon Davies, Director General, Privacy
         International

1:30 p.m. The Electronic Republic: Delivery of Government Services
       over the Information Superhighway
    State and local governments use computer networks to deliver
    a wide range of services and information to the public;
    electronic "kiosks" are moving to "government by ATM."  How
    will this interaction between government and the people affect
    the process of American government in the future?
    Chair: Dennis McKenna, Publisher, "Government Technology."

2:45 p.m.  Break

3:00 p.m. Education and NREN, K - 12
    Internetworking is a very new technology being rapidly
    deployed to conventional classrooms, a very old technology.
    The panel will explore the clash of contradictory assumptions
    embedded within these systems -- a clash which has profound
    implications for the future of both the network and the
    classrooom.
    Chair: Steven Hodas, NASA NREN Project


4:00 Break

4:15 p.m.  Guarding the Digital Persona
    After this panel has established the threats to personal
    privacy from individual profiling and target marketing, and a
    regime to legally recognize and protect an "electronic
    personality" is put forth, Bruce Sterling will offer to
    explain why much of that worry is misdirected!
    Chair: Roger Clarke, Australian National University

5:30 p.m.  Adjournment

Featured Speakers Confirmed as of 12/15/93

Philip Agre, Dept. of Sociology, U. of Cal., San Diego
David Banisar, Computer Professional for Social Responsibility
Robert R. Belair, Mullenholz & Brimsek, Washington, D.C.
Jerry Berman, Executive Director, Electronic Frontier Foundation
Leslie A. Bertagnolli, Baker & McKenzie, Chicago
Andrew Blau, The Benton Foundation, Washington, D.C.
Dr. Herbert Burkert, Univ. of St. Galen, Switzerland
Jeffrey Chester, Director, Center for Media Education
Roger Clarke, College of Commerce, Australian National University
Ellen Craig, Commissioner, Illinois Commerce Commission
Simon Davies, Director General, Privacy International, London
David Flaherty, Information and Privacy Commissioner, British
Columbia
Oscar H. Gandy, Media Studies Center, Columbia University
Donald Gotterbarn, East Tennessee State University
Allan Hammond, New York University Law School
Steven Hodas, NASA NREN Project, Washington, D.C.
David Johnson, Wilmer, Cutler & Pickering, Washington
Steven Kolodney, Dir., Information Technology, State of California
Curtis Kurnow, Landels, Ripley & Diamond, San Francisco
Kenneth Laudon, School of Information Systems, New York University
Lee Ledbetter, HDX
Jay Lemke, School of Education, City University of New York
Duncan MacDonald, V.P. & Gen. Couns., Citicorp Credit Services
Shirley Marshall, Public Sector Marketing, IBM
Dennis McKenna, Publisher, Government Technology Magazine
Michael Mensik, Baker & McKenzie, Chicago
Raymond Nimmer, University of Texas
Eli Noam, Columbia University School of Business
Michael North, President, North Communications
Ronald L. Plesser, Piper and Marbury, Washington, D.C.
Marc Rotenberg, Computer Professionals for Social Responsibility
Rohan Samarajiva, Department of Communication, Ohio State Univ.
David Sobel, Computer Professionals for Social Responsibility
Bruce Sterling, Sci-Fi Writer and Journalist, Austin, Texas
Connie Stout, Texas Education Network
Jim Thomas, Department of Sociology, Northern Illinois University
Greg Tucker, Head of the Business School, Monash Univ., Australia
Bruce Umbaugh, Old Dominion University
Patricia Valey, Acting Director, Office of Consumer Affairs
Maarten van Swaay, Dept. of Computer Science, Kansas State U.
Daniel Weitzner, Sr. Staff Counsel, Electronic Frontier Foundation
Alan Westin, Columbia University
Christine Zahorik, Staff, Senate Committee on

FP '94 SCHOLARSHIPS

The Fourth Conference on Computers, Freedom and Privacy (CFP '94)
will provide a limited number of full registration scholarships for
students and other interested individuals.  These scholarships will
cover the full costs of registration, including luncheons, two
banquets, and all conference materials.  Scholarship recipients
will be responsible for their own lodging and travel expenses.
Persons wishing to apply for one of these fully-paid registrations
should contact CFP '94  Scholarship Chair:

John F. McMullen
CFP '94 Scholarship Committee
Perry Street
Jefferson Valley, NY  10535
Phone: (914) 245-2734 or email [email protected]

HOTEL ACCOMMODATIONS

CFP'94 will be held at the Palmer House Hilton, a venerable Chicago
landmark in the "Loop."  This spacious and comfortable facility is
easily accessible from the O'Hare International and Chicago Midway
airports, and is only 2 blocks from The John Marshall Law School.
Special conference rates of $99/night, single or multiple
occupancy, are available.  Our room block is guaranteed only until
March 1, 1994, so we urge you to make your reservations as early as
possible.  When calling for reservations, please be sure to mention
CFP'94 to obtain the conference rate.

Hotel Reservations: Palmer House Hilton, 17 E. Monroe, Chicago,
Il., 60603.  Tel: 312-726-7500; 1-800-HILTONS; Fax, 312-263-2556


REFUND POLICY

Refund requests received in writing by March 8, 1994 will be
honored.  A $50 cancellation fee will be applied.  No refunds will
be made after this date; however, registrants may designate a
substitute.

OFFICIAL AIRLINE
CFP'94 is proud to have United Airlines as our own exclusive
official airline!  United will give our conferees a 5% discount off
any published United or United Express airfare, including First
Class, or 10% off the new BUA fare when purchased at least a week
in advance of travel.  Call toll-free 1-800-521-4041 to make
reservations and be sure to give our CFP'94 ID Number: 541QI.

REGISTRATION
(Voice: 312-987-1420;  E-MAIL: [email protected]  Fax: 312-427-7128)
              CFP'94
              John Marshall Law School
              315 S. Plymouth Ct., Chicago, IL 60604

Register for the conference by returning the Registration Form
along with the appropriate payment.  The registration fee includes
conference materials, three luncheons (Thursday, Friday and
Saturday), a reception, open house and buffet (Wednesday), a
reception and banquet (Thursday),  and a gala reception and buffet
at the Museum of Science and Industry.  Payment must accompany
registration.

NAME (Please Print)

TITLE

AFFILIATION

MAILING ADDRESS

CITY, STATE, ZIP

TELEPHONE

E-MAIL

PRIVACY LOCKS:  We will not sell, rent. loan, exchange or use this
information for any purpose other than official Computers, Freedom
and Privacy Conference activities.  A printed roster containing
this information will be distrusted at the conference.  Please
indicate if you wish information to be excluded from the roster:

              ( ) Print only name, affiliation and phone no.
              ( )  Print name only
              ( )  Omit my name from the roster

    ( ) I would like to attend the Privacy International luncheon
and briefing at noon on Wednesday, March 23.  (Your attendance as
a guest of P.I. and the Illinois Privacy Council MUST be confirmed
by March 8, and is on a "first come" basis.)

"CFP Soapbox Square"
    ( ) I would like to make a formal statement (3 mins.) during
"CFP Soapbox Square" to be held from 9:15 p.m. - 11:15 p.m. on
March 23.  My topic:

    ( ) I plan to attend "Soapbox Square" but do not wish to make
a prepared statement, though I may join in the discussion.

REGISTRATION FEES
If paid by:         7 February     8 March        On Site
                   Early          Regular        Late

Conference Fees     $315           $370           $420

Tutorial Fees       $145           $175           $210

Conf. & Tutorial    $460           $545           $630

Note: If you have registered for the Tutorials, please select one
from each group:
         9:00 A.M. - 12:00 NOON
              ( ) Cyberspace Law for Non-Lawyers
              ( ) Rules of the Road for Network
                   Travelers (CLE Credit)
              ( ) Citizen Action: Get Mad, Get
                   Motivated, Get Moving!
              ( ) Exploring Internet: A Guided Tour
              ( ) Using FOIA

         2:00 P.M. - 5:00 P.M.
              ( ) Cryptography: What, and How?
              ( ) Introduction to Hi-Tech Law (CLE Credit)
              ( ) TRAC: Evaluative Data Analysis
              ( ) The Electronic Detective" Online
                   Investigations
              ( ) Electoral Fraud

PAYMENTS            TOTAL AMOUNT

                   Please indicated method of payment:
                   ( )  Check (payable to JMLS-CFP '94)

                   ( )  VISA
                   ( )  MasterCard
                   Credit Card #

                   Expiration Date

                   Name on Card

                   Signature
***********
George B. Trubow, Professor of Law
Director, Center for Informatics Law
The John Marshall Law School
315 S. Plymouth Ct.
Chicago, IL 60604-3907
Fax: 312-427-8307; Voice: 312-987-1445
E-mail: [email protected]

------------------------------

End of Computer Underground Digest #6.22
************************************